Talere 2025
Gitte Gormsen
Moderator
Sören Pettersson
Have we lost our Identity in a world of compliance?
Identity is more critical than ever, it’s the foundation of who we are, guiding our values, decisions, and interactions with the world. Within the context of compliance and digital security, identity becomes even more significant. In a world where personal data is constantly at risk of being hacked or manipulated, maintaining a clear and secure sense of identity is essential to protect not just our personal information, but our autonomy and control.
Fred Noordam
"How Non-Human Identities Create Operational and Cyber Risk for Organisations"
Non-Human Identities (NHIs) pose one of the most significant cyber threats to an organisation as they can pose severe operational risks. In many cases, NHIs have elevated privileges, lack proper oversight, are not documented, and are often not linked to specific individuals. This makes them attractive targets for attackers, who may exploit them to gain unauthorised access, move laterally within systems, and carry out malicious activities without being detected. In our session, Silverfort will examine how organisations can reduce operational risk by understanding and implementing security controls around their Non-Human Identities.
Key Takeaways:
- Understand why Non-Human Identities should be a top priority for your board
- Learn about how to measure and detect the level of risk Non-Human Identities poseyou’re your organisation
- Grow your knowledge of how to mitigate the risk of Non-Human Identities, before, during and after a cyber breach
Steven Hayhoe
"Enabling Continuous Trust Through Verifiable Credentials, Low-Friction Authentication, and Identity Verification"
Traditional perimeter-based identity models are no longer sufficient in an environment where threats are persistent, identities are dynamic, and user interactions span multiple devices and platforms. This technical workshop will dive deep into how continuous trust models can be architected using decentralized identity technologies, low-friction authentication mechanisms, and real-time verification process.
Sami Mäkelä
"Tomorrow will be different"
The future is spelled A.I., and it’s rewriting Identity Security in more ways than we dare to admit.
Get ready for a thought-provoking journey from the messy present to the autonomous future of Identity. This talk explores the explosive evolution of both AI and Identity Security, challenging us to look beyond today’s manual toil and into a redefined world powered by AI Native technology.
Mikael Wikström
"Why the Identity Graph is key to the future of Identity Security"
- Learn why governance and security always starts with insight.
- Discover how a modern data model strengthens identity security.
- Hear how a platform approach simplifies and enhances identity management.
- Learn from the leader in Identity Security why this is just the beginning – and find out what’s next for identity security.
Alan Radford
“An Identity Security Fabric is no longer optional"
An Identity Security Fabric is no longer optional—it’s essential for protecting access across IT, OT, DevOps, multicloud, AI, and non-human identities while meeting growing regulatory demands.
Too often, security tooling and teams operate in isolation from PAM, IGA, Access Management, AD security, and other controls, creating blind spots and inconsistent policies.
The result? Limited visibility, fragmented accountability, and unanswered questions about who has access to what, how, and why.
Join this session to learn how the One Identity Fabric unifies security silos, strengthens compliance, and delivers 360° oversight of all identities and entitlements—human and non-human alike.
Anders Rönnquist
"Weaving the Future"
Identity is no longer an IT side note it’s the foundation of digital trust and business growth.
This session uncovers how Identity Fabric turns today’s fragmented systems into one unified strategy, driving ROI, agility, and resilience in the AI era. The organizations that master it will lead. The rest will be left unraveling the loose threads.
Ford Merrill
"Hidden Dragon: A Thriving Chinese Fraud Ecosystem"
Dive into a complex ecosystem representing a massive threat in the fraud space. Gain a deeper understanding of the components, services, actors, and trends of the growing Chinese criminal underground. Supported by and built on top of nearly 2 years of research into the Chinese smishing syndicates who pioneered the use of Digital Wallets to enable fraud, we’ll focus on the entire ecosystem’s evolution and supporting pillars. This presentation will cover major actors, services on offer, trends in targeting, monetization, money laundering, and more.
Agenda for 2025
Queens Hall
Welcome
Registration & breakfastWelcome
We start the day with breakfast and networking.
Dipylon Hall
Gitte Gormsen
ModeratorIntroduction
Our moderator Gitte Gormsen will start the day in Dipylon Hall.
Dipylon Hall
Fred Noordam
Regional Sales Manager at Silverfort"How Non-Human Identities Create Operational and Cyber Risk for Organisations"
Non-Human Identities (NHIs) pose one of the most significant cyber threats to an organisation as they can pose severe operational risks. In many cases, NHIs have elevated privileges, lack proper oversight, are not documented, and are often not linked to specific individuals. This makes them attractive targets for attackers, who may exploit them to gain unauthorised access, move laterally within systems, and carry out malicious activities without being detected. In our session, Silverfort will examine how organisations can reduce operational risk by understanding and implementing security controls around their Non-Human Identities.
Dipylon Hall
Sören Pettersson
Principal Solutions Consultant at OpenText"Have we lost our Identity in a world of compliance?"
Identity is more critical than ever, it’s the foundation of who we are, guiding our values, decisions, and interactions with the world. Within the context of compliance and digital security, identity becomes even more significant. In a world where personal data is constantly at risk of being hacked or manipulated, maintaining a clear and secure sense of identity is essential to protect not just our personal information, but our autonomy and control.
Dipylon Hall
Steven Hayhoe
Principal Sales Engineer at Ping Identity"Enabling Continuous Trust Through Verifiable Credentials, Low-Friction Authentication, and Identity Verification"
Traditional perimeter-based identity models are no longer sufficient in an environment where threats are persistent, identities are dynamic, and user interactions span multiple devices and platforms. This technical workshop will dive deep into how continuous trust models can be architected using decentralized identity technologies, low-friction authentication mechanisms, and real-time verification process.
Queens Hall
Mingle and coffee
Break & coffeeBreak
Mingle & coffee in Queens Hall.
Take the opportunity to visit the sponsors in their stands during break.
Dipylon Hall
Ford Merrill
Senior Director Cyber Intelligence Services at CSIS"Hidden Dragon: A Thriving Chinese Fraud Ecosystem"
Dive into a complex ecosystem representing a massive threat in the fraud space. Gain a deeper understanding of the components, services, actors, and trends of the growing Chinese criminal underground. Supported by and built on top of nearly 2 years of research into the Chinese smishing syndicates who pioneered the use of Digital Wallets to enable fraud, we’ll focus on the entire ecosystem’s evolution and supporting pillars. This presentation will cover major actors, services on offer, trends in targeting, monetization, money laundering, and more.
Dipylon Hall
Sami Mäkelä
CTO at ID North"Tomorrow will be different"
The future is spelled A.I., and it’s rewriting Identity Security in more ways than we dare to admit.
Get ready for a thought-provoking journey from the messy present to the autonomous future of Identity. This talk explores the explosive evolution of both AI and Identity Security, challenging us to look beyond today's manual toil and into a redefined world powered by AI Native technology.
Dipylon Hall
Mikael Wikström
Cyber Security Technical Advisor at SailPoint"Why the Identity Graph is key to the future of Identity Security"
- Learn why governance and security always starts with insight.
- Discover how a modern data model strengthens identity security.
- Hear how a platform approach simplifies and enhances identity management.
- Learn from the leader in Identity Security why this is just the beginning – and find out what’s next for identity security.
Queens Hall
Lunch & networking
Enjoy local lunch from CopenhagenLunch
Enjoy tasty mini versions of the Danish classic “smörrebröd” - and take the chance to meet our sponsors at their stands during lunch.
Dipylon Hall
Alan Radford
Field Strategy at One Identity"An Identity Security Fabric is no longer optional"
An Identity Security Fabric is no longer optional—it’s essential for protecting access across IT, OT, DevOps, multicloud, AI, and non-human identities while meeting growing regulatory demands.
Too often, security tooling and teams operate in isolation from PAM, IGA, Access Management, AD security, and other controls, creating blind spots and inconsistent policies.
The result? Limited visibility, fragmented accountability, and unanswered questions about who has access to what, how, and why.
Join this session to learn how the One Identity Fabric unifies security silos, strengthens compliance, and delivers 360° oversight of all identities and entitlements—human and non-human alike.
Dipylon Hall
Anders Rönnquist
CRO at Arctic Group"Weaving the Future"
Identity is no longer an IT side note it’s the foundation of digital trust and business growth.
This session uncovers how Identity Fabric turns today’s fragmented systems into one unified strategy, driving ROI, agility, and resilience in the AI era.
The organizations that master it will lead.
The rest will be left unraveling the loose threads.
Dipylon Hall
Panel discussion
Learn from our expertsPanel discussion
Discussion with our experts from SailPoint, Ping Identity, Opentext, Silverfort and One Identity on stage.
Gallery Hall
Open bar & snacks
Mingle & networkingEnjoy drinks & snacks
Enjoy drinks & snacks while you take the opportunity to visit the sponsors in their stands during mingle.
Carlsberg Premises
Guided Tour of Carlsberg Premises
OptionalEnjoy the tour
Optional guided tour of Carlsberg Premises.