Skip Ribbon Commands
Skip to main content

Infosecurity 2020

September 30 & October 1| Copenhagen

About the conference

Infosecurity Denmark 2020 will entail more than 100 seminars and cases, 20 selected keynotes and 80 exhibitors. Two days full of knowledge and networking. 

The program covers compliance, cybercrime, IoT, enterprise mobility as well as cloud security and will give a unique look into the newest IT security challenges on a high professional level. As a participant you will be updated on both the newest technical progess from top researchers, get insight into the current threats from some of the best advisors in the world and finally, you can discuss your user experiences with some of the best known danish security brands. 

Presentation: Data is the new gold - but how do you protect it?

The amount of data is increasing, which means that companies generate, handle and store much more data than previously. With the growing amounts of data, the need for data protection increases as well. Esben Kaufmann, Head of Cybersecurity Consulting in NNIT will in this presentation present his take on how you can ensure that cybersecurity is a natural part of your data journey. 

 

 

Joakim Gunnløgsson30778738jkgu@nnit.comMarketing Consultant https://www.linkedin.com/in/joakimbaik/Joakim Gunnløgsson

 

 

Are you prepared to protect your business-critical IT?https://www.nnit.com/cybersecurity/Pages/Are-you-prepared-to-protect-your-business-critical-IT-.aspxAre you prepared to protect your business-critical IT?
Are you prepared to protect your business-critical IT?https://www.nnit.com/OfferingsAndArticles/Pages/Are-you-prepared-to-protect-your-business-critical-IT-.aspxAre you prepared to protect your business-critical IT?
Protect your gold: How to avoid your data ending up in the wrong handshttps://www.nnit.com/OfferingsAndArticles/Pages/Protect-your-gold-How-to-avoid-your-data-ending-up-in-the-wrong-hands.aspxProtect your gold: How to avoid your data ending up in the wrong hands
How scammers attack your company using CEO fraudhttps://www.nnit.com/cybersecurity/Pages/How-scammers-attack-your-company-using-CEO-fraud.aspxHow scammers attack your company using CEO fraud
VR Cybersecurity Traininghttps://www.nnit.com/cybersecurity/Pages/VR-Cybersecurity-Training.aspxVR Cybersecurity Training
Cloud Securityhttps://www.nnit.com/cybersecurity/Pages/Cloud-Security.aspxCloud Security
Identity & Access Managementhttps://www.nnit.com/cybersecurity/Pages/iam.aspxIdentity & Access Management
Managed Securityhttps://www.nnit.com/cybersecurity/Pages/Managed-Security.aspxManaged Security
The Fine Art of Aligning Business Strategy and Information Security Strategyhttps://www.nnit.com/OfferingsAndArticles/Pages/The-Fine-Art-of-Aligning-Business-Strategy-and-Information-Security-Strategy.aspxThe Fine Art of Aligning Business Strategy and Information Security Strategy
​​​Building a sustainable defence: How to secure your operational technology (OT) environment​https://www.nnit.com/OfferingsAndArticles/Pages/BuildingSustainableDefence.aspx​​​Building a sustainable defence: How to secure your operational technology (OT) environment​