Don’t miss out

CIOXDenmark

21 May 2026

Radisson Collection Royal Hotel, Denmark

Welcome to CIOXDenmark, the premier event exclusively designed for accomplished CIOs across Denmark. Step into the forefront of strategic technology leadership as we navigate the evolving post-pandemic landscape and unlock unparalleled opportunities for enterprise success. Join us at CIOXDenmark, where visionary CIOs converge to engage in transformative discussions, gain strategic insights, and address the pressing challenges shaping the world of enterprise technology.

intro

Speakers

Accelerate your network growth

Secure up to twelve exclusive meetings with relevant leads at CIOXDenmark maximising your opportunity to forge valuable connections and drive business growth.

Become a sponsor

Learn from industry titans

Immerse yourself in thought-provoking discussions, as top leaders share their expertise and provide you with invaluable insights to propel your strategic initiatives forward.

Forge meaningful Connections

Engage with industry peers, thought-leaders, and solution providers to foster meaningful connections and explore collaborative opportunities that drive innovation and growth.

Agenda

Discover what awaits you at CIOXDenmark.

Registration & Networking Breakfast

Welcome & Opening Remarks From EDS

OPENING PANEL: Strategic Right-Sourcing in 2026: Balancing Internal Capability, External Partners and Risk Ownership

  • Sara Mehrabi
    VP, Data, Analytics & Decision Intelligence COWI
  • Sauli Hurnanen
    Head of Digital Product Delivery Denmark Everllence
  • Gry Lagerqvist
    SVP Development Director, Banking Technology Nykredit
  • Mads Jung Johansen
    Director, Head of Technology Products Falck

As cost pressures, cyber risk, and sovereignty rise up the board agenda, right-sourcing has become a strategic leadership decision, not just an operational one. Technology leaders are increasingly accountable for defining what capabilities must be owned in-house, where external partners add value, and how to avoid the costly cycle of outsource, reverse, and repeat. This session will explore how senior technology leaders can design sourcing models that balance control, capability maturity, resilience, and long-term value.

Discussion Points:
• What capabilities should be driven in-house vs. external, to maintain control, innovation and security?
• How do leaders mitigate risk, govern exposure, and ensure accountability across different sourcing models.
• Creating flexible, long-term strategies that survive leadership change and evolving business priorities.

The AI Threat: Protecting Your Email from AI-Generated Attacks

AI is rapidly changing the cyber threat landscape, enabling attackers to create more convincing, scalable, and targeted email-based attacks than ever before. From highly personalised phishing to automated social engineering, traditional security controls are struggling to keep pace.
In this session, we explore how AI is being used by threat actors, why email remains the primary entry point for breaches, and what organisations must do to strengthen detection, response, and user protection. Learn how to adapt your security strategy to defend against AI-generated attacks while keeping communication and productivity flowing.

Key takeaways

How attackers are using AI to create more sophisticated phishing, impersonation, and social engineering attacks
Why email remains the most exploited entry point — and where traditional defences fall short
Practical strategies to detect, prevent, and respond to AI-generated threats without disrupting the business

SPOTLIGHT FORUM: Reality of Regulations - What Does Execution Look Like? (NIS2, CRA, DORA)

  • Marcus Molleskov
    CRCO Januar
  • Martin Kofoed Høding
    Vice President Cybersecurity & CISO SAS - Scandinavian Airlines
  • Sebastian Mabillion
    CISO Bunker Holdings
  • Jan Jans
    DORA, NIS2, Cybersecurity, Financial legislation Finanstilsynet

As EU regulatory frameworks reshape the operational and cybersecurity landscape, organisations across Denmark are moving beyond policy into the realities of implementation. With NIS2, CRA and DORA introducing expanded accountability, stricter security requirements, and increased oversight, technology leaders are under pressure to operationalise compliance while maintaining business agility and innovation. This interactive forum brings together senior IT, security and GRC leaders to share practical lessons and challenges, while giving the audience a chance to ask questions and explore solutions for embedding regulatory requirements into governance, technology, and supply chain operations.

Discussion Points:
• Turning regulatory requirements into operational GRC frameworks, security controls and accountability
• Managing overlapping EU regulations while maintaining efficiency and agility
• Strengthening supply chain, resilience, and reporting to meet evolving compliance expectations

Quick Tech Tale: Identity is the New Perimeter; Combine Prevention and Recovery to Ensure Organisational Survivability During and After an Attack


  • Rubrik

As identity becomes the primary attack surface, traditional perimeter-based security is no longer enough to protect modern organisations. Today’s threat landscape requires a shift from prevention alone to a strategy that also prioritises containment, resilience, and rapid recovery.
In this session, we explore how organisations can secure their identity and data estate, limit the impact of attacks, and remain operational even during ransomware or credential-based breaches. Learn how combining zero-trust principles with robust cyber-recovery capabilities enables businesses to maintain control, minimise downtime, and ensure continuity during and after an incident.

Key takeaways

How to strengthen identity and data security to contain threats and reduce the blast radius of an attack
Why prevention alone is not enough — building recovery and resilience into your security strategy
How zero-trust and cyber-recovery approaches help keep critical systems running during ransomware and other advanced attacks

AM BREAK & 1:1 Xchange

Roundtable Xchanges

  • 1. AI as a Growth Lever, not a Science Project

    AI is moving from experimentation to execution, but many organisations still struggle to turn pilots into measurable business value. This interactive roundtable will explore how leaders are positioning AI as a growth driver rather than a technical side project, sharing practical approaches to scaling use cases, proving ROI, and aligning AI initiatives with real business priorities.

  • 2. Agents with Impact: Moving AI from IT Experimentation to Enterprise-Outcomes

    AI agents are rapidly moving from technical experiments to tools that can drive real business outcomes. In this interactive roundtable, we will discuss how organisations are scaling agentic AI beyond IT, embedding it into core processes, and ensuring it delivers measurable value across the enterprise.

  • 3. From Breach to Business Continuity: Building Anti-Fragile Cyber Resilience

    As cyber threats grow in frequency and impact, resilience has become as important as prevention. In this interactive discussion, we will examine how leaders are designing security strategies that prioritise rapid recovery, operational continuity, and the ability to remain in control even during a breach.

In this interactive session, our event partners will take the lead in initiating and facilitating conversations centered on challenges and solutions within the industry. Attendees can expect dynamic discussions where diverse perspectives are shared, fostering collaborative problem-solving and the exploration of innovative solutions to common industry hurdles.

Starting from Scratch: How Carlsberg's Security Engineering Team Changed the Game

  • Jason Harle
    Director, Security Engineering Carlsberg Group

Building a modern security engineering function from the ground up requires more than new tools — it demands vision, cultural change, and technical precision. This session explores how Carlsberg’s Security Engineering team established a scalable, engineering-led security model designed to proactively reduce risk and embed resilience across the enterprise. From defining core capabilities and securing executive buy-in to integrating security into DevOps and cloud environments, this discussion will share practical lessons on transforming security from a reactive control function into a strategic business enabler.

Unmasking Fraud. The Lifecycle and Operational Dynamics of Identity Deception

  • Marcin Zimny
    Senior Principal Solution Architect Ping Identity

Identity fraud is no longer a one-time breach—it’s a coordinated lifecycle. Modern attackers use AI, deepfakes, synthetic identities, and credential abuse to infiltrate systems, escalate privileges, and commit fraud—often causing the most damage after authentication. Fragmented identity tools and static controls can’t keep up.
Organizations must adopt a unified, identity-first approach that continuously evaluates risk across the entire user journey. By combining real-time threat detection, adaptive authentication, identity verification, and dynamic authorization, enterprises can stop bad actors without adding friction for legitimate users—reducing fraud losses while protecting digital growth.
Key takeaways:
1. You must secure the entire identity journey — not just the login.
Fraud doesn’t stop at authentication. Continuous verification is essential across registration, login, and post-access activity.

2. You can’t afford fragmented identity defenses.
Disconnected tools increase risk, operational cost, and user friction. A unified approach closes gaps and simplifies operations.

3. You don’t have to choose between security and experience.
Risk-based, adaptive identity controls allow you to stop bad actors while keeping legitimate users moving seamlessly.

Quantum-Safe Trust: Turning Telco Infrastructure Into Customer-Ready Security

  • Maria Christiansen
    Head of Applied AI, Digital Transformation TDC NET

Rising geopolitical tension and nation state threats are turning telecommunications infrastructure into a primary security target. In this talk, we share how TDC NET is operationalizing quantum safe technologies to protect critical connectivity, moving from controlled lab experiments to customer ready security services. We discuss how we think about quantum risk today, why infrastructure matters, and what CISOs must prepare for as trust, resilience, and cryptography are fundamentally reshaped.

LUNCH & 1:1 Xchange

Quick Tech Tale: Technology is The Business Model

  • Eri Kejser
    Global CISO Semco Maritime

Many companies still talk about IT as a support function. In reality, software, data, and digital platforms are increasingly part of the product, the customer experience, and the revenue model. This session explores what it means when IT becomes the business and how that shift affects strategy, skills, integration, security, and even geopolitical risk.

The Game The SOC Chose To Play

  • Chris Wood
    Principal Application Security SME Immersive

What happens when multiple SOC teams tackle the same DFIR exercise under identical conditions but define success differently? This session shares benchmark results that reveal not a skills gap, but a values gap. Learn how inherent biases shape the metrics teams prioritize, how those metrics influence outcomes, and how to ensure your SOC is measuring what truly matters.

Key Takeaways
• Why silence around expectations creates its own metrics
• How the metrics you track shape outcomes
• Why defining success upfront is critical to SOC performance

Quick Tech Tale: Tech, People, Impact: Engineering the Right Team Mix

  • Martina Zrimsek
    Head of Analytics & Insights GN Group

In many organizations, data and analytics teams are still built around narrow technical roles, while the real value lies in how well technology is understood, adopted, and scaled by the business. As data and AI become core to enterprise value creation, the data leaders can’t ignore the shifting balance where analytics, coding and insights creation are being anchored in all levels of enterprise. The session will examine how to analyse and orchestrate the right mix of capabilities to support data democratization, self-service and technical literacy, all in parallel to upskilling, agility, strong innovation demands and culture the team itself needs. The result? “Full spectrum” teams that operate at the intersection of IT and the business, through a practical blueprint for re-balancing roles, embedding enablement into delivery, and establishing operating models that strengthen collaboration with the business while maintaining execution discipline and control.

PM BREAK & 1:1 Xchange, Community Conversations

Community Conversations

  • Madhavi Latha Thanneeru
    Senior IT Architect, Digital Workplace EMEA Novo Nordisk
  • Jacob Haagen Jensen
    Head of Nordic Operations The Magnum Icecream Company
  • Humayan Khan
    Principal Security and Cloud Lead Hempel
  • 1. Use-Cases on Successful AI Adoption

    Enterprises are moving from AI experimentation to scalable, value-driven adoption. Share practical strategies, lessons learned, and real-world challenges in implementing AI securely and effectively across the organisation, while balancing innovation, risk, and regulation.

  • 2. Breaking Silos & Building Bridges between IT and Commercial

    As digital investment accelerates, stronger alignment between IT and commercial teams is critical. Join this roundtable to discuss how technology leaders can break down silos, align on shared goals to ensure IT initiatives deliver measurable business value and revenue impact.

  • 3. How Are Attackers Using AI Against You? Protecting AI and Protecting Against AI

    As organisations accelerate AI adoption, attackers are weaponising AI to automate phishing, evade detection, and scale attacks. This roundtable explores how to protect enterprise AI systems, defend against AI-driven threats, and strengthen governance, controls, and resilience in an evolving cyber landscape.

In this second roundtable breakout, enterprise leaders will guide discussions on their favourite topic, fostering an environment of open exchange, exploration of diverse perspectives and experiences. Attendees can grab a coffee and anticipate engaging conversations through roundtables discussions, driven by shared challenges and interests, offering valuable insights and opportunities for collaborative learning and networking.

Good AI vs. Bad AI: Outwitting Adversaries with AI-Native Cybersecurity

  • Casper Krogh
    Enterprise Sales Engineer, Nordics Abnormal Security

Join us to experience the future of cybersecurity—where Good AI outsmarts Bad AI. See how attackers use malicious AI in real-world scenarios, why traditional defenses can’t stop them, and how AI-native security empowers teams to detect and respond faster with greater precision and confidence. We’ll break down how generative and autonomous AI are already reshaping phishing, BEC, and supply chain attacks, and show what it takes to build defenses that learn from behavior, adapt in real time, and scale with your business. You’ll leave with practical examples, key questions to ask your security vendors, and a clear roadmap for staying ahead as the gap between good and bad AI continues to widen.
Key Takeaways:
– Understand how AI is transforming modern attacks like phishing, BEC, and supply chain compromises, with real-world examples of how malicious AI helps attackers move faster and customize their tactics.
– Recognize the limits of traditional security tools and learn what “AI-native” defense really means—behavior-based detection, continuous learning, and real-time adaptation instead of static rules and signatures.
– Leave with a practical roadmap and vendor checklist so you know which questions to ask, which capabilities to prioritize, and how to evaluate solutions that keep your organization ahead as attackers’ AI continues to evolve.

CLOSING PANEL: The Modern Enterprise Workforce - Humanity & AI

  • Larisa Andrei
    Director, Head of Digital Experience & Applications 3Shape
  • Neeraj Avasthi
    Senior IT Director Ørsted

As AI transforms the way organisations operate, the modern workforce must adapt to a new reality where human expertise and artificial intelligence work hand-in-hand. This session will explore the strategic, operational, and cultural implications of AI adoption on workforce planning, skills development, and employee engagement. Leaders will examine how organisations can reskill, redeploy, and empower employees while leveraging AI to drive innovation, productivity, and competitive advantage. Gain actionable insights on balancing technology with human potential in the enterprise of the future.

Key Takeaways
• Strategies to reskill and redeploy employees for an AI-enabled enterprise
• Best practices for integrating AI into workflows without compromising employee engagement
• How to create a culture that balances human judgment with AI-driven decision-making

Closing Remarks

Drinks Reception

Apply to Attend

Location

Radisson Collection Royal Hotel, Copenhagen, Hammerichsgade, Copenhagen, Denmark

Radisson Collection Royal Hotel, Copenhagen, Hammerichsgade, Copenhagen, Denmark

Past Events

Testimonials

See what attendees, speakers and sponsors say about our events.

FAQs

Who attends?

Attendance is reserved for C-Suite executives and Senior Executives within IT, including Chief Information Officers, Chief Technology Officers, and other senior IT decision-makers from a wide array of industries. Joined by our select sponsor partners, enriching networking opportunities and offering cutting-edge solutions.

What does my delegate pass include?

Thanks to our sponsors, your access is entirely complimentary, providing you with full-day access to all presentations, exclusive networking sessions, personalised one-to-one meetings, delectable catering, and an open bar for added networking.

What are the one-on-one meetings?

These 25-minute meetings provide invaluable opportunities to discover new solutions and expand your network with leading innovative providers that can help solve your current or future complex challenges.

What is the dress code?

Professional business attire is appropriate.

Do I need to prepare anything?

No preparation is needed on your part. We take care of all the final details. Simply arrive at the specified time, date, and location, and we’ll handle the rest to ensure you have a seamless and enjoyable experience.

Why attend?

Our events offer unparalleled experiences where interactive sessions spark innovation, keynotes unveil insights from industry luminaries, and exclusive one-on-one meetings with best-in-breed solution providers unfold in some of the world’s most prestigious venues. This unique format ensures that your challenges are addressed directly, providing invaluable insights, connections, and maximising value for your time. With a compact schedule featuring a variety of presentations, you’ll gain a comprehensive view of the latest innovations and have ample opportunity to network with like-minded peers—all under one roof, and in just one day. This fosters collaboration and forges invaluable connections among executives with a genuine influence, setting the standard for elite gatherings in the industry.

Have any more questions?

Get in touch here

Have any more questions?

Get in touch