Talere 2025

Gitte Gormsen

Moderator

Sören Pettersson

Have we lost our Identity in a world of compliance?

Identity is more critical than ever, it’s the foundation of who we are, guiding our values, decisions, and interactions with the world. Within the context of compliance and digital security, identity becomes even more significant. In a world where personal data is constantly at risk of being hacked or manipulated, maintaining a clear and secure sense of identity is essential to protect not just our personal information, but our autonomy and control.

Fred Noordam

"How Non-Human Identities Create Operational and Cyber Risk for Organisations"

Non-Human Identities (NHIs) pose one of the most significant cyber threats to an organisation as they can pose severe operational risks. In many cases, NHIs have elevated privileges, lack proper oversight, are not documented, and are often not linked to specific individuals. This makes them attractive targets for attackers, who may exploit them to gain unauthorised access, move laterally within systems, and carry out malicious activities without being detected. In our session, Silverfort will examine how organisations can reduce operational risk by understanding and implementing security controls around their Non-Human Identities.

Key Takeaways:

  • Understand why Non-Human Identities should be a top priority for your board
  • Learn about how to measure and detect the level of risk Non-Human Identities poseyou’re your organisation
  • Grow your knowledge of how to mitigate the risk of Non-Human Identities, before, during and after a cyber breach

 

Steven Hayhoe

"Enabling Continuous Trust Through Verifiable Credentials, Low-Friction Authentication, and Identity Verification"

Traditional perimeter-based identity models are no longer sufficient in an environment where threats are persistent, identities are dynamic, and user interactions span multiple devices and platforms. This technical workshop will dive deep into how continuous trust models can be architected using decentralized identity technologies, low-friction authentication mechanisms, and real-time verification process.

Sami Mäkelä

"Tomorrow will be different"

The future is spelled A.I., and it’s rewriting Identity Security in more ways than we dare to admit.

Get ready for a thought-provoking journey from the messy present to the autonomous future of Identity. This talk explores the explosive evolution of both AI and Identity Security, challenging us to look beyond today’s manual toil and into a redefined world powered by AI Native technology.

Mikael Wikström

"Why the Identity Graph is key to the future of Identity Security"

  • Learn why governance and security always starts with insight.
  • Discover how a modern data model strengthens identity security.
  • Hear how a platform approach simplifies and enhances identity management.
  • Learn from the leader in Identity Security why this is just the beginning – and find out what’s next for identity security.

Alan Radford

“An Identity Security Fabric is no longer optional"

An Identity Security Fabric is no longer optional—it’s essential for protecting access across IT, OT, DevOps, multicloud, AI, and non-human identities while meeting growing regulatory demands.

Too often, security tooling and teams operate in isolation from PAM, IGA, Access Management, AD security, and other controls, creating blind spots and inconsistent policies.
The result? Limited visibility, fragmented accountability, and unanswered questions about who has access to what, how, and why.

Join this session to learn how the One Identity Fabric unifies security silos, strengthens compliance, and delivers 360° oversight of all identities and entitlements—human and non-human alike.

Anders Rönnquist

"Weaving the Future"

Identity is no longer an IT side note it’s the foundation of digital trust and business growth.

This session uncovers how Identity Fabric turns today’s fragmented systems into one unified strategy, driving ROI, agility, and resilience in the AI era. The organizations that master it will lead. The rest will be left unraveling the loose threads.

Ford Merrill

"Hidden Dragon: A Thriving Chinese Fraud Ecosystem"

Dive into a complex ecosystem representing a massive threat in the fraud space. Gain a deeper understanding of the components, services, actors, and trends of the growing Chinese criminal underground. Supported by and built on top of nearly 2 years of research into the Chinese smishing syndicates who pioneered the use of Digital Wallets to enable fraud, we’ll focus on the entire ecosystem’s evolution and supporting pillars. This presentation will cover major actors, services on offer, trends in targeting, monetization, money laundering, and more.

Agenda for 2025

08:30-09:20
Queens Hall

Welcome

Registration & breakfast

Welcome

We start the day with breakfast and networking.

09:20-09:30
Dipylon Hall

Gitte Gormsen

Moderator

Introduction

Our moderator Gitte Gormsen will start the day in Dipylon Hall.

09:30-10:00
Dipylon Hall

Fred Noordam

Regional Sales Manager at Silverfort

"How Non-Human Identities Create Operational and Cyber Risk for Organisations"

Non-Human Identities (NHIs) pose one of the most significant cyber threats to an organisation as they can pose severe operational risks. In many cases, NHIs have elevated privileges, lack proper oversight, are not documented, and are often not linked to specific individuals. This makes them attractive targets for attackers, who may exploit them to gain unauthorised access, move laterally within systems, and carry out malicious activities without being detected. In our session, Silverfort will examine how organisations can reduce operational risk by understanding and implementing security controls around their Non-Human Identities.

10:00-10:30
Dipylon Hall

Sören Pettersson

Principal Solutions Consultant at OpenText

"Have we lost our Identity in a world of compliance?"

Identity is more critical than ever, it’s the foundation of who we are, guiding our values, decisions, and interactions with the world. Within the context of compliance and digital security, identity becomes even more significant. In a world where personal data is constantly at risk of being hacked or manipulated, maintaining a clear and secure sense of identity is essential to protect not just our personal information, but our autonomy and control.

10:30-11:00
Dipylon Hall

Steven Hayhoe

Principal Sales Engineer at Ping Identity

"Enabling Continuous Trust Through Verifiable Credentials, Low-Friction Authentication, and Identity Verification"

Traditional perimeter-based identity models are no longer sufficient in an environment where threats are persistent, identities are dynamic, and user interactions span multiple devices and platforms. This technical workshop will dive deep into how continuous trust models can be architected using decentralized identity technologies, low-friction authentication mechanisms, and real-time verification process.

11:00-11:30
Queens Hall

Mingle and coffee

Break & coffee

Break

Mingle & coffee in Queens Hall.
Take the opportunity to visit the sponsors in their stands during break.

11:30-12:00
Dipylon Hall

Ford Merrill

Senior Director Cyber Intelligence Services at CSIS

"Hidden Dragon: A Thriving Chinese Fraud Ecosystem"

Dive into a complex ecosystem representing a massive threat in the fraud space. Gain a deeper understanding of the components, services, actors, and trends of the growing Chinese criminal underground. Supported by and built on top of nearly 2 years of research into the Chinese smishing syndicates who pioneered the use of Digital Wallets to enable fraud, we’ll focus on the entire ecosystem’s evolution and supporting pillars. This presentation will cover major actors, services on offer, trends in targeting, monetization, money laundering, and more.

12:00-12:30
Dipylon Hall

Sami Mäkelä

CTO at ID North

"Tomorrow will be different"

The future is spelled A.I., and it’s rewriting Identity Security in more ways than we dare to admit.

Get ready for a thought-provoking journey from the messy present to the autonomous future of Identity. This talk explores the explosive evolution of both AI and Identity Security, challenging us to look beyond today's manual toil and into a redefined world powered by AI Native technology.

12:30-13:00
Dipylon Hall

Mikael Wikström

Cyber Security Technical Advisor at SailPoint

"Why the Identity Graph is key to the future of Identity Security"

- Learn why governance and security always starts with insight.
- Discover how a modern data model strengthens identity security.
- Hear how a platform approach simplifies and enhances identity management.
- Learn from the leader in Identity Security why this is just the beginning – and find out what’s next for identity security.

13:00-14:00
Queens Hall

Lunch & networking

Enjoy local lunch from Copenhagen

Lunch

Enjoy tasty mini versions of the Danish classic “smörrebröd” - and take the chance to meet our sponsors at their stands during lunch.

14:00-14:30
Dipylon Hall

Alan Radford

Field Strategy at One Identity

"An Identity Security Fabric is no longer optional"

An Identity Security Fabric is no longer optional—it’s essential for protecting access across IT, OT, DevOps, multicloud, AI, and non-human identities while meeting growing regulatory demands.
Too often, security tooling and teams operate in isolation from PAM, IGA, Access Management, AD security, and other controls, creating blind spots and inconsistent policies.
The result? Limited visibility, fragmented accountability, and unanswered questions about who has access to what, how, and why.
Join this session to learn how the One Identity Fabric unifies security silos, strengthens compliance, and delivers 360° oversight of all identities and entitlements—human and non-human alike.

14:30-15:00
Dipylon Hall

Anders Rönnquist

CRO at Arctic Group

"Weaving the Future"

Identity is no longer an IT side note it’s the foundation of digital trust and business growth.
This session uncovers how Identity Fabric turns today’s fragmented systems into one unified strategy, driving ROI, agility, and resilience in the AI era.
The organizations that master it will lead.
The rest will be left unraveling the loose threads.

15:00-15:30
Dipylon Hall

Panel discussion

Learn from our experts

Panel discussion

Discussion with our experts from SailPoint, Ping Identity, Opentext, Silverfort and One Identity on stage.

15:30-18:30
Gallery Hall

Open bar & snacks

Mingle & networking

Enjoy drinks & snacks

Enjoy drinks & snacks while you take the opportunity to visit the sponsors in their stands during mingle.

16:00-17:00
Carlsberg Premises

Guided Tour of Carlsberg Premises

Optional

Enjoy the tour

Optional guided tour of Carlsberg Premises.