We hope you had a rewarding day with interesting keynote presentations, break-out sessions and discussions.
You can access the presentation slides covered during the event here:
Bjørn Kristian Rasmussen: DK Threat Landscape 2024
Ulrik Ledertoug: How to navigate in the landscape of cyber extortion, hacktivism, ransomware and DDoS attacks
Grant Paling: OCD Live 2024 - Know yourself
Ulrik Ledertoug: How to detect prevend respond to ransomeware
DAHL & OCD NIS2-DORA OCD Live
Bo Drejer: Resilience og GRC - OCD Live
Hasan Rahman, Microsoft: AI and Cybersecurity How Microsoft Empowers Defenders
Grant Paling: OCD Live 2024 - thinking outside the box
CTO, Orange Cyberdefense Norway
Director of Business Development and Services, Orange Cyberdefense Denmark
Product Manager, Global Service Lines
Why actionable intelligence is a difference maker. Our World Watch team collects, analyzes, prioritizes, contextualizes, and summarizes the essential threat and vulnerability data you need to make informed decisions. Let’s go behind the scenes.
Governance Risk & Compliance Manager, Orange Cyberdefense Denmark
Chief Security Advisor, STU – Denmark – EMEA
How does Microsoft leverage AI to enhance its cybersecurity products and services? How does it help defenders protect their organizations and customers from ever-evolving cyber threats? Hasan will present some of the latest innovations and best practices in AI and cybersecurity, and how you can apply them to your own security strategy. Whether you are a security professional or a business leader, this session will provide you with valuable insights and actionable tips to stay ahead of your adversaries.
The importance of discovering C2C communication, the blind spots and what to do about them
Most malware and ransomware attacks rely on C2C communication. Although C2C is not a new challenge, unfortunately we still see successful attacks where early detection and blocking of the C2C communication could have prevented the attack in the early stages. We are also seeing the threat actors develop their toolbox on C2C communications, giving companies and organizations a blind spot that requires adjustment in the implementations of security controls. In this session, we will give an overview of the malware & ransomware communication techniques we expect to be used in 2024, what the challenges are and which blind spots you should be aware of, and not least what you can do about it. We will also discuss why C2C should be a focus area for your 24/7 SOC operations or SOC Managed Services.
Navigating Human-Centric Risk: Unveiling the Four Elements
The human element is considered both the greatest vulnerability and the most valuable asset in the security equation. By recognizing that individuals play a central role in the success or failure of security measures, taking a human-centric approach to your security strategy can be pivotal in risk reduction.
Join us as we explore the four elements of human-centric risk and set a path to risk reduction with people at the center of our strategy.
Matt Cooke is a Cybersecurity Strategist at Proofpoint, where he drives product marketing strategy across the EMEA region. He provides expertise on key regional cybersecurity strategies such as people-centric security, security awareness, risk management and insider threats.
Matt has 20+ years of experience in hands-on technical and strategic marketing roles within IT teams and security vendors. Prior to joining Proofpoint, he was Director of Product Marketing at Sophos, following a senior product marketing role at Symantec, as well as additional product-focused roles at IT organisations.
Matt holds a Certified Information Systems Security Professional (CISSP) certification and has a passion for making cybersecurity accessible and relevant to everyone.
The meaning of AI in SASE – the power of intelligent cloud security
How can a true AI based Unified SASE platform help customers to drive business and accelerate productivity safely with better user experience.
Moving from “we told you so” to “we’re telling you so”: intelligence-led security in action
We analyze the key strategic information from the cyber security threat landscape and present it each year in our Security Navigator. We also make predictions. Sometimes they even come true.
Of course, having actionable intelligence in real-time is important also. Intelligence-led security is about using intelligence to drive actions but how does it work in practice? We will work through some real-life examples and share our vision on how we see this area developing in the coming years.
Streamline your Cloud Security Operation Model
An insight into the Digital Transformation and accelerating cloud adoption, and the need for securing this journey properly.
How to navigate the regulatory Cyber Security Landscapes according to NIS2/DORA
What’s EU’s main purpose behind NIS2/DORA, and which legal, management as well technical considerations are necessary in order meet the prupose and ensure compliance? Frans and Bo will guide You through the different perspectives with examples and operational scenarios, coupled with advise on what to prioritize in Your NIS2/DORA compliance work in order to optimize ressources as well support the purpose of NIS2/DORA.
Additionally, as part of the session, there will be a case study highlighting a real-world security breach. Through this case study, participants will actively engage in training the strategic approach to handling such incidents, gaining invaluable insights and practical skills for managing security breaches effectively.
This includes Security Experts, IT Managers/Cyber Security Officers, Chief Information Security Officers (CISOs), Cyber Analysts and Solution Architects who work to protect critical infrastructure, networks, systems and data against cyber threats at some of Denmark's largest companies, public organizations, and authorities.
When registering, you will choose which tracks you would like to attend. If you change your mind and want to pick another track you can do so by updating your registration.
This event is a part of the Orange Cyberdefense Live 2024 - Nordic Tour. We will visit three countries and six cities during the year. The tour will start in April and end in September. See you there!
Register and read more about the Nordic Tour