Identity Day Copenhagen 2025

Torsdag den 18. september
IT Sikkerhedsevent
Carlsberg Museum & Business Centre Valby Langgade 1
Book din plads

Identity Day Copenhagen

Velkommen til Identity Day! Efter stor succes i Sverige og Finland, er vi nu glade for endelig at bringe eventet til Danmark.

I Sverige og Finland har vi de seneste år haft fornøjelsen af at samle nogle af branchens førende eksperter inden for Identitetssikkerhed, og sidste år kunne vi byde over 500 deltagere velkommen til vores events. Nu får Danmark også chancen for at deltage i årets mest inspirerende event.

På Identity Day deler eksperter indsigt, værktøjer og strategier til at beskytte din organisation mod cybertrusler og databrud. Du vil få mulighed for at høre inspirerende oplæg om de nyeste tendenser og kommende udfordringer, og lære, hvilke løsninger der er mest effektive for at styrke din organisations sikkerhed.

Få dybdegående ekspertviden inden for vigtige områder som IAM, IGA, PAM, AM og meget mere.

Det er den perfekte mulighed for at netværke med branchekolleger og nyde god mad og drikke – helt gratis.

Book din plads og vær med til årets mest inspirerende event!

Tilmelding

Dagen byder på

Talere i verdensklasse

Brancheførende eksperter deler erfaringer og fremtidsperspektiver.

Inspiration

Lær nye ting og få værktøjer, du kan tage med tilbage til dine kolleger.

Netværk

Skab nye forbindelser med andre i branchen og udbyg dit netværk.

Historiske omgivelser

Vi ses i de hyggelige og inspirerende lokaler på Carlsberg Museum & Business Centre.

Guided tur i Carlsberg museum

Dagen byder også på en spændende, valgfri guided tur i Carlsberg Museum.

God mad og drikke

Lækker mad og drikke serveres hele dagen og aftenen.

Talere 2025 - præsenteres løbende

Gitte Gormsen

Moderator

Gitte Gormsen has worked with Identity & Access Management for the past five years, focusing on marketing activities and business development within the domain. She has engaged in the cybersecurity, GRC and compliance agenda for more than 10 years. She has run professional IAM client communities, published articles and newspaper inserts on the IAM agenda and headed up some of the most successful IAM events on the Danish scene. Gitte will be guiding you through the day and make sure you leave with a firm overview of the learnings brought to you by the leading tech providers in the market.

Läs mer

Sören Pettersson

Have we lost our Identity in a world of compliance?

Identity is more critical than ever, it’s the foundation of who we are, guiding our values, decisions, and interactions with the world. Within the context of compliance and digital security, identity becomes even more significant. In a world where personal data is constantly at risk of being hacked or manipulated, maintaining a clear and secure sense of identity is essential to protect not just our personal information, but our autonomy and control.

With over 20 years of experience in Identity and Access Management (IAM), Sören specialize in Identity Lifecycle Management, Identity Governance, and Zero Trust Architectures.

Läs mer

Allistair Scott

"How Non-Human Identities Create Operational and Cyber Risk for Organisations"

Non-Human Identities (NHIs) pose one of the most significant cyber threats to an organisation as they can pose severe operational risks. In many cases, NHIs have elevated privileges, lack proper oversight, are not documented, and are often not linked to specific individuals. This makes them attractive targets for attackers, who may exploit them to gain unauthorised access, move laterally within systems, and carry out malicious activities without being detected. In our session, Silverfort will examine how organisations can reduce operational risk by understanding and implementing security controls around their Non-Human Identities.

Key Takeaways:

  • Understand why Non-Human Identities should be a top priority for your board
  • Learn about how to measure and detect the level of risk Non-Human Identities poseyou’re your organisation
  • Grow your knowledge of how to mitigate the risk of Non-Human Identities, before, during and after a cyber breach

 

Allistair Scott is a Senior Sales Engineer with nearly 25 years of experience in cybersecurity, spanning multiple disciplines. With a background in both pre-sales and operational roles, including leading global security operations, Allistair is passionate about helping customers find solutions to meet their unique security needs.

Läs mer

Steven Hayhoe

"Enabling Continuous Trust Through Verifiable Credentials, Low-Friction Authentication, and Identity Verification"

Traditional perimeter-based identity models are no longer sufficient in an environment where threats are persistent, identities are dynamic, and user interactions span multiple devices and platforms. This technical workshop will dive deep into how continuous trust models can be architected using decentralized identity technologies, low-friction authentication mechanisms, and real-time verification process.

Steven Hayhoe is a seasoned identity and cloud specialist with over two decades enabling large scale, secure digital transformations across a range of industries including financial services, government, and critical infrastructure. As Principal Solution Consultant at Ping Identity, he helps global organisations design and implement resilient, secure and scalable IAM solutions that support workforce, customer and B2B IAM use cases.

Läs mer

Sami Mäkelä

"Tomorrow will be different"

The future is spelled A.I., and it’s rewriting Identity Security in more ways than we dare to admit.

Get ready for a thought-provoking journey from the messy present to the autonomous future of Identity. This talk explores the explosive evolution of both AI and Identity Security, challenging us to look beyond today’s manual toil and into a redefined world powered by AI Native technology.

Sami Mäkelä, CTO at ID North, brings nearly 30 years of experience in system development, IT risk, and security. His expertise spans Identity and Access Management (IAM), Security Information and Event Management (SIEM), Identity & Access Governance, as well as risk and quality metrics. Throughout his career, Sami has combined deep technical knowledge with strategic insight to deliver secure, scalable, and future-ready solutions.

Läs mer

Mikael Wikström

"Why the Identity Graph is key to the future of Identity Security"

  • Learn why governance and security always starts with insight.
  • Discover how a modern data model strengthens identity security.
  • Hear how a platform approach simplifies and enhances identity management.
  • Learn from the leader in Identity Security why this is just the beginning – and find out what’s next for identity security.

Mikael Wikström works as a Cyber Security Technical Advisor covering the Nordics region where he assists enterprises and organizations in defining the strategy and adoption of an integrated Identity Governance Platform. Mikael has more than 30 years experience in the Cyber Security software industry, where he has lead teams in the development and implementation of complex Cyber Security solutions with a focus on Identity Governance, Identity Management, Access Management in a wide range of organizations and enterprises.

Läs mer

Alan Radford

“An Identity Security Fabric is no longer optional"

An Identity Security Fabric is no longer optional—it’s essential for protecting access across IT, OT, DevOps, multicloud, AI, and non-human identities while meeting growing regulatory demands.

Too often, security tooling and teams operate in isolation from PAM, IGA, Access Management, AD security, and other controls, creating blind spots and inconsistent policies.
The result? Limited visibility, fragmented accountability, and unanswered questions about who has access to what, how, and why.

Join this session to learn how the One Identity Fabric unifies security silos, strengthens compliance, and delivers 360° oversight of all identities and entitlements—human and non-human alike.

As an evangelist and innovator, helping the c-suite understand the business value of a digital transformation journey. Alan assist in creating strong security strategies and roadmap to protect the most valuable assets in people, process and technology.

Passionate about the technology he has worked with over the past 20 years, Alan consider himself privileged in having a profession that he also enjoys in his spare time.

Läs mer

Anders Rönnqvist

Läs mer

Agenda for 2025

09:00-09:20
Queens Hall

Welcome

Registration & coffee

Welcome

We start the day with breakfast and networking

09:20-09:30
Dipylon Hall

Gitte Gormsen

Moderator

Introduction

Our moderator Gitte Gormsen will start the day in Dipylon Hall.

09:30-10:00
Dipylon Hall

Allistar Scott

Senior Sales Engineer, Silverfort

"How Non-Human Identities Create Operational and Cyber Risk for Organisations"

Non-Human Identities (NHIs) pose one of the most significant cyber threats to an organisation as they can pose severe operational risks. In many cases, NHIs have elevated privileges, lack proper oversight, are not documented, and are often not linked to specific individuals. This makes them attractive targets for attackers, who may exploit them to gain unauthorised access, move laterally within systems, and carry out malicious activities without being detected. In our session, Silverfort will examine how organisations can reduce operational risk by understanding and implementing security controls around their Non-Human Identities.

10:00-10:30
Dipylon Hall

Sören Pettersson

Principal Solutions Consultant, OpenText

"Have we lost our Identity in a world of compliance?"

Identity is more critical than ever, it’s the foundation of who we are, guiding our values, decisions, and interactions with the world. Within the context of compliance and digital security, identity becomes even more significant. In a world where personal data is constantly at risk of being hacked or manipulated, maintaining a clear and secure sense of identity is essential to protect not just our personal information, but our autonomy and control.

10:30-11:00
Dipylon Hall

Steven Hayhoe

Principal Sales Engineer, Ping Identity

"Enabling Continuous Trust Through Verifiable Credentials, Low-Friction Authentication, and Identity Verification"

Traditional perimeter-based identity models are no longer sufficient in an environment where threats are persistent, identities are dynamic, and user interactions span multiple devices and platforms. This technical workshop will dive deep into how continuous trust models can be architected using decentralized identity technologies, low-friction authentication mechanisms, and real-time verification process.

11:00-11:30
Queens Hall

Mingle and coffee

Break & coffee

Break

Mingle & coffee in Queens Hall.
Take the opportunity to visit the sponsors in their stands during break.

11:30-12:00
Dipylon Hall

Presentation with CSIS

Presentation.

12:00-12:30
Dipylon Hall

Sami Mäkelä

CTO at ID North

"Tomorrow will be different"

The future is spelled A.I., and it’s rewriting Identity Security in more ways than we dare to admit.

Get ready for a thought-provoking journey from the messy present to the autonomous future of Identity. This talk explores the explosive evolution of both AI and Identity Security, challenging us to look beyond today's manual toil and into a redefined world powered by AI Native technology.

12:30-13:00
Dipylon Hall

Mikael Wikström

Cyber Security Technical Advisor at SailPoint

"Why the Identity Graph is key to the future of Identity Security"

- Learn why governance and security always starts with insight.
- Discover how a modern data model strengthens identity security.
- Hear how a platform approach simplifies and enhances identity management.
- Learn from the leader in Identity Security why this is just the beginning – and find out what’s next for identity security.

13:00-14:00
Queens Hall

Lunch & networking

Enjoy local lunch from Copenhagen

Break

Take the opportunity to visit the sponsors in their stands during lunch.

14:00-14:30
Dipylon Hall

Alan Radford

Field Strategy at One Identity

"An Identity Security Fabric is no longer optional"

An Identity Security Fabric is no longer optional—it’s essential for protecting access across IT, OT, DevOps, multicloud, AI, and non-human identities while meeting growing regulatory demands.
Too often, security tooling and teams operate in isolation from PAM, IGA, Access Management, AD security, and other controls, creating blind spots and inconsistent policies.
The result? Limited visibility, fragmented accountability, and unanswered questions about who has access to what, how, and why.
Join this session to learn how the One Identity Fabric unifies security silos, strengthens compliance, and delivers 360° oversight of all identities and entitlements—human and non-human alike.

14:30-15:00
Dipylon Hall

Anders Rönnqvist

CRO at Arctic Group

Presentation with Arctic Group.

15:00-15:30
Dipylon Hall

Panel discussion

Learn from our experts

Panel discussion

Discussion with our experts from SailPoint, Ping Identity, Opentext, Silverfort and One Identity on stage.

15:30-18:30
Gallery Hall

Open bar & snacks

Mingle & networking

Enjoy drinks & snacks

Enjoy drinks & snacks while you take the opportunity to visit the sponsors in their stands during mingle.

16:00-17:00
Carlsberg Premises

Guided Tour of Carlsberg Premises

Optional

Enjoy the tour

Optional guided tour of Carlsberg Premises.

Karta

Map

Vore sponsorer for 2025 præsenteres løbende

Fra Identity Day 2024 i Stockholm

Identity Day præsenteres af

Arctic Group er Nordens førende eksperter inden for Identitetssikkerhed & Cybersikkerhed. Vi er din langsigtede partner i din digitaliseringsrejse – vores ekspertise hjælper dig med at sikre fremtiden. Vær sikker sammen med os!

Vi hos ID North er specialiseret i identitetssikkerhed og hjælper din virksomhed med at beskytte jeres digitale identiteter. Hos os får du adgang til branchens førende eksperter. Vore løsninger sikrer effektivitet, omfattende kontrol og beskyttelse på højeste niveau. Sikr din organisations fremtid sammen med os.

Spørgsmål og svar

Kræves der tilmelding?

Ja! Selvom eventet er gratis, vil vi gerne minde om, at der kræves tilmelding for at deltage. Vi ser virkelig frem til at byde jer velkommen og ønsker at sikre, at alle får en fantastisk oplevelse!

Kan jeg tilmelde mig på stedet?

Nej! Da det er et gratis event, har vi et begrænset antal pladser. Vi vil ikke kunne tage imod tilmeldinger på stedet under eventet, så sørg for at sikre din plads allerede i dag!

Gælder eventet kun for personer inden for IT?

Eventet er åbent for alle virksomheder og organisationer, der opererer i digitale miljøer. Arbejder I med hybride arbejdspladser? Har du en digital profil? Håndterer I personlige data? Så er identitetssikkerhed af største relevans.

Jeg er tilmeldt, kan jeg tage en ven med?

Selvfølgelig, sørg bare for at tilmelde jer, så der er den rette mængde mad og pladser. Tag en ven eller kollega med og tilmeld jer i dag.

Hvad kan jeg forvente mig ud over inspirerende talere?

Netværk, mad & mingling. I løbet af dagen og aftenen får du også mulighed for at skabe nye forbindelser i branchen, blive underholdt og nyde lækker mad.

Hvilket sprog vil eventet blive afholdt på?

Eventet afholdes på dansk med indslag af præsentationer, der vil blive holdt på engelsk.