Don’t miss out
21 May 2026
Radisson Collection Royal Hotel, Denmark
Welcome to CIOXDenmark, the premier event exclusively designed for accomplished CIOs across Denmark. Step into the forefront of strategic technology leadership as we navigate the evolving post-pandemic landscape and unlock unparalleled opportunities for enterprise success. Join us at CIOXDenmark, where visionary CIOs converge to engage in transformative discussions, gain strategic insights, and address the pressing challenges shaping the world of enterprise technology.

Secure up to twelve exclusive meetings with relevant leads at CIOXDenmark maximising your opportunity to forge valuable connections and drive business growth.
Become a sponsor
Immerse yourself in thought-provoking discussions, as top leaders share their expertise and provide you with invaluable insights to propel your strategic initiatives forward.
Engage with industry peers, thought-leaders, and solution providers to foster meaningful connections and explore collaborative opportunities that drive innovation and growth.
Discover what awaits you at CIOXDenmark.
As cost pressures, cyber risk, and sovereignty rise up the board agenda, right-sourcing has become a strategic leadership decision, not just an operational one. Technology leaders are increasingly accountable for defining what capabilities must be owned in-house, where external partners add value, and how to avoid the costly cycle of outsource, reverse, and repeat. This session will explore how senior technology leaders can design sourcing models that balance control, capability maturity, resilience, and long-term value.
Discussion Points:
• What capabilities should be driven in-house vs. external, to maintain control, innovation and security?
• How do leaders mitigate risk, govern exposure, and ensure accountability across different sourcing models.
• Creating flexible, long-term strategies that survive leadership change and evolving business priorities.
AI is rapidly changing the cyber threat landscape, enabling attackers to create more convincing, scalable, and targeted email-based attacks than ever before. From highly personalised phishing to automated social engineering, traditional security controls are struggling to keep pace.
In this session, we explore how AI is being used by threat actors, why email remains the primary entry point for breaches, and what organisations must do to strengthen detection, response, and user protection. Learn how to adapt your security strategy to defend against AI-generated attacks while keeping communication and productivity flowing.
Key takeaways
How attackers are using AI to create more sophisticated phishing, impersonation, and social engineering attacks
Why email remains the most exploited entry point — and where traditional defences fall short
Practical strategies to detect, prevent, and respond to AI-generated threats without disrupting the business
As EU regulatory frameworks reshape the operational and cybersecurity landscape, organisations across Denmark are moving beyond policy into the realities of implementation. With NIS2, CRA and DORA introducing expanded accountability, stricter security requirements, and increased oversight, technology leaders are under pressure to operationalise compliance while maintaining business agility and innovation. This interactive forum brings together senior IT, security and GRC leaders to share practical lessons and challenges, while giving the audience a chance to ask questions and explore solutions for embedding regulatory requirements into governance, technology, and supply chain operations.
Discussion Points:
• Turning regulatory requirements into operational GRC frameworks, security controls and accountability
• Managing overlapping EU regulations while maintaining efficiency and agility
• Strengthening supply chain, resilience, and reporting to meet evolving compliance expectations
As identity becomes the primary attack surface, traditional perimeter-based security is no longer enough to protect modern organisations. Today’s threat landscape requires a shift from prevention alone to a strategy that also prioritises containment, resilience, and rapid recovery.
In this session, we explore how organisations can secure their identity and data estate, limit the impact of attacks, and remain operational even during ransomware or credential-based breaches. Learn how combining zero-trust principles with robust cyber-recovery capabilities enables businesses to maintain control, minimise downtime, and ensure continuity during and after an incident.
Key takeaways
How to strengthen identity and data security to contain threats and reduce the blast radius of an attack
Why prevention alone is not enough — building recovery and resilience into your security strategy
How zero-trust and cyber-recovery approaches help keep critical systems running during ransomware and other advanced attacks
1. AI as a Growth Lever, not a Science Project
AI is moving from experimentation to execution, but many organisations still struggle to turn pilots into measurable business value. This interactive roundtable will explore how leaders are positioning AI as a growth driver rather than a technical side project, sharing practical approaches to scaling use cases, proving ROI, and aligning AI initiatives with real business priorities.
2. Agents with Impact: Moving AI from IT Experimentation to Enterprise-Outcomes
AI agents are rapidly moving from technical experiments to tools that can drive real business outcomes. In this interactive roundtable, we will discuss how organisations are scaling agentic AI beyond IT, embedding it into core processes, and ensuring it delivers measurable value across the enterprise.
3. From Breach to Business Continuity: Building Anti-Fragile Cyber Resilience
As cyber threats grow in frequency and impact, resilience has become as important as prevention. In this interactive discussion, we will examine how leaders are designing security strategies that prioritise rapid recovery, operational continuity, and the ability to remain in control even during a breach.
In this interactive session, our event partners will take the lead in initiating and facilitating conversations centered on challenges and solutions within the industry. Attendees can expect dynamic discussions where diverse perspectives are shared, fostering collaborative problem-solving and the exploration of innovative solutions to common industry hurdles.
Building a modern security engineering function from the ground up requires more than new tools — it demands vision, cultural change, and technical precision. This session explores how Carlsberg’s Security Engineering team established a scalable, engineering-led security model designed to proactively reduce risk and embed resilience across the enterprise. From defining core capabilities and securing executive buy-in to integrating security into DevOps and cloud environments, this discussion will share practical lessons on transforming security from a reactive control function into a strategic business enabler.
Identity fraud is no longer a one-time breach—it’s a coordinated lifecycle. Modern attackers use AI, deepfakes, synthetic identities, and credential abuse to infiltrate systems, escalate privileges, and commit fraud—often causing the most damage after authentication. Fragmented identity tools and static controls can’t keep up.
Organizations must adopt a unified, identity-first approach that continuously evaluates risk across the entire user journey. By combining real-time threat detection, adaptive authentication, identity verification, and dynamic authorization, enterprises can stop bad actors without adding friction for legitimate users—reducing fraud losses while protecting digital growth.
Key takeaways:
1. You must secure the entire identity journey — not just the login.
Fraud doesn’t stop at authentication. Continuous verification is essential across registration, login, and post-access activity.
2. You can’t afford fragmented identity defenses.
Disconnected tools increase risk, operational cost, and user friction. A unified approach closes gaps and simplifies operations.
3. You don’t have to choose between security and experience.
Risk-based, adaptive identity controls allow you to stop bad actors while keeping legitimate users moving seamlessly.
Rising geopolitical tension and nation state threats are turning telecommunications infrastructure into a primary security target. In this talk, we share how TDC NET is operationalizing quantum safe technologies to protect critical connectivity, moving from controlled lab experiments to customer ready security services. We discuss how we think about quantum risk today, why infrastructure matters, and what CISOs must prepare for as trust, resilience, and cryptography are fundamentally reshaped.
Many companies still talk about IT as a support function. In reality, software, data, and digital platforms are increasingly part of the product, the customer experience, and the revenue model. This session explores what it means when IT becomes the business and how that shift affects strategy, skills, integration, security, and even geopolitical risk.
What happens when multiple SOC teams tackle the same DFIR exercise under identical conditions but define success differently? This session shares benchmark results that reveal not a skills gap, but a values gap. Learn how inherent biases shape the metrics teams prioritize, how those metrics influence outcomes, and how to ensure your SOC is measuring what truly matters.
Key Takeaways
• Why silence around expectations creates its own metrics
• How the metrics you track shape outcomes
• Why defining success upfront is critical to SOC performance
In many organizations, data and analytics teams are still built around narrow technical roles, while the real value lies in how well technology is understood, adopted, and scaled by the business. As data and AI become core to enterprise value creation, the data leaders can’t ignore the shifting balance where analytics, coding and insights creation are being anchored in all levels of enterprise. The session will examine how to analyse and orchestrate the right mix of capabilities to support data democratization, self-service and technical literacy, all in parallel to upskilling, agility, strong innovation demands and culture the team itself needs. The result? “Full spectrum” teams that operate at the intersection of IT and the business, through a practical blueprint for re-balancing roles, embedding enablement into delivery, and establishing operating models that strengthen collaboration with the business while maintaining execution discipline and control.
1. Use-Cases on Successful AI Adoption
Enterprises are moving from AI experimentation to scalable, value-driven adoption. Share practical strategies, lessons learned, and real-world challenges in implementing AI securely and effectively across the organisation, while balancing innovation, risk, and regulation.
2. Breaking Silos & Building Bridges between IT and Commercial
As digital investment accelerates, stronger alignment between IT and commercial teams is critical. Join this roundtable to discuss how technology leaders can break down silos, align on shared goals to ensure IT initiatives deliver measurable business value and revenue impact.
3. How Are Attackers Using AI Against You? Protecting AI and Protecting Against AI
As organisations accelerate AI adoption, attackers are weaponising AI to automate phishing, evade detection, and scale attacks. This roundtable explores how to protect enterprise AI systems, defend against AI-driven threats, and strengthen governance, controls, and resilience in an evolving cyber landscape.
In this second roundtable breakout, enterprise leaders will guide discussions on their favourite topic, fostering an environment of open exchange, exploration of diverse perspectives and experiences. Attendees can grab a coffee and anticipate engaging conversations through roundtables discussions, driven by shared challenges and interests, offering valuable insights and opportunities for collaborative learning and networking.
Join us to experience the future of cybersecurity—where Good AI outsmarts Bad AI. See how attackers use malicious AI in real-world scenarios, why traditional defenses can’t stop them, and how AI-native security empowers teams to detect and respond faster with greater precision and confidence. We’ll break down how generative and autonomous AI are already reshaping phishing, BEC, and supply chain attacks, and show what it takes to build defenses that learn from behavior, adapt in real time, and scale with your business. You’ll leave with practical examples, key questions to ask your security vendors, and a clear roadmap for staying ahead as the gap between good and bad AI continues to widen.
Key Takeaways:
– Understand how AI is transforming modern attacks like phishing, BEC, and supply chain compromises, with real-world examples of how malicious AI helps attackers move faster and customize their tactics.
– Recognize the limits of traditional security tools and learn what “AI-native” defense really means—behavior-based detection, continuous learning, and real-time adaptation instead of static rules and signatures.
– Leave with a practical roadmap and vendor checklist so you know which questions to ask, which capabilities to prioritize, and how to evaluate solutions that keep your organization ahead as attackers’ AI continues to evolve.
As AI transforms the way organisations operate, the modern workforce must adapt to a new reality where human expertise and artificial intelligence work hand-in-hand. This session will explore the strategic, operational, and cultural implications of AI adoption on workforce planning, skills development, and employee engagement. Leaders will examine how organisations can reskill, redeploy, and empower employees while leveraging AI to drive innovation, productivity, and competitive advantage. Gain actionable insights on balancing technology with human potential in the enterprise of the future.
Key Takeaways
• Strategies to reskill and redeploy employees for an AI-enabled enterprise
• Best practices for integrating AI into workflows without compromising employee engagement
• How to create a culture that balances human judgment with AI-driven decision-making
Radisson Collection Royal Hotel, Copenhagen, Hammerichsgade, Copenhagen, Denmark
Radisson Collection Royal Hotel, Copenhagen, Hammerichsgade, Copenhagen, Denmark
See what attendees, speakers and sponsors say about our events.
“I attended because the list of speakers was an attraction, and the time of the year also worked for me. It met my expectations. I was planning on leaving earlier, but stayed all through because I did not want to miss anything."
“I enjoyed the people, the interaction, the conversations and insights on what happening currently or near term in the industry, also the exceptional customer service by the team and staff, the intimacy EDS showed me throughout the event, I wasn’t left on an island. "
“I had lots of fun and met a lot of great people there & most importantly I learned a few things as well."
“I attended last year’s EDS CIO CISO event and thought the speakers and content were excellent. This year was even better with a good mix of topics and some interesting participants."
“I was impressed by all of the speakers and took away some interesting insights from the participants. The EDS team was well organized and made things flow well, and the event location / venue was great."
“This was well worth the trip and would certainly attend again if invited."
“This event is definitely better than others I've attended - service-oriented and really focused on ensuring a lot of dialogue. Both in 1:1 interactions and at the tables. Very well done."
“Interesting agenda, top experts and speakers, expectations were fully met by the participants and presentations. The event was great, vibrant until the end and at a great venue!"
“This is in the Top 5 of my best IT conferences to date, including commercial events. I already recommended EDS to my colleagues."
“It was a real value for me to be part of your event. You did a great job in organizing and performing."
“Attending EDS events as a CTO opened doors to insightful discussions and connections that felt truly genuine. It's not often you find such a perfect blend of knowledge sharing and camaraderie."
“Another great event! The atmosphere is relaxed yet intellectually stimulating, making it easy to connect with peers and exchange real-world insights with real CISOs."
“Thank you EDS. Your gatherings are refreshing and I always leave feeling inspired and armed with actionable ideas for our digital strategy."
“Sponsoring EDS events has been a fantastic opportunity for us. The focus on genuine engagement rather than just promotion allows us to build lasting relationships with industry leaders in a natural, authentic way."
“I've been attending EDS dinners as a CIO for a while now, and they never disappoint. The blend of thought-provoking discussions and genuine connections is unmatched in the industry."
“EDS events provide an invaluable platform for CISOs like myself to exchange ideas and best practices in a relaxed, yet professional setting. The conversations are always real and relevant. Thank you EDS team!"
“We're repeat sponsors of EDS dinners for a reason! Each time, we get unique opportunities to connect with decision-makers on a personal level. It's not just about business; it's about building authentic relationships, every time"
“EDS events have become a staple for me as a CDO"
“Sponsoring EDS events has been a breath of fresh air. The focus on quality over quantity ensures that our brand gets genuine exposure to the right audience in a way that feels natural and human."
Attendance is reserved for C-Suite executives and Senior Executives within IT, including Chief Information Officers, Chief Technology Officers, and other senior IT decision-makers from a wide array of industries. Joined by our select sponsor partners, enriching networking opportunities and offering cutting-edge solutions.
Thanks to our sponsors, your access is entirely complimentary, providing you with full-day access to all presentations, exclusive networking sessions, personalised one-to-one meetings, delectable catering, and an open bar for added networking.
These 25-minute meetings provide invaluable opportunities to discover new solutions and expand your network with leading innovative providers that can help solve your current or future complex challenges.
Professional business attire is appropriate.
No preparation is needed on your part. We take care of all the final details. Simply arrive at the specified time, date, and location, and we’ll handle the rest to ensure you have a seamless and enjoyable experience.
Our events offer unparalleled experiences where interactive sessions spark innovation, keynotes unveil insights from industry luminaries, and exclusive one-on-one meetings with best-in-breed solution providers unfold in some of the world’s most prestigious venues. This unique format ensures that your challenges are addressed directly, providing invaluable insights, connections, and maximising value for your time. With a compact schedule featuring a variety of presentations, you’ll gain a comprehensive view of the latest innovations and have ample opportunity to network with like-minded peers—all under one roof, and in just one day. This fosters collaboration and forges invaluable connections among executives with a genuine influence, setting the standard for elite gatherings in the industry.
Get in touch here