Information on the processing of personal data

Before you give your consent in the sign-up form, we are obligated to inform about the processing of personal data based on Databeskyttelsesforordningen.

We are obligated to inform you about the details of our processing of your data and furthermore inform you about your rights in reference to this.


Legal basis

Our processing of personal data is based on article 6, paragraph 1, item a (consent) of Databeskyttelsesloven.

The data will be stored safely with Aarhus Kommune for as long as you wish to receive news from Tech City Aarhus. Your data will be deleted permanently if you choose to unsubscribe. The information will not be shared with others and data will exclusively be processed by Aarhus Kommune Erhverv.


Your rights

You have the right to request insight in the information we hold about you.

You have the right to request eligibility or deletion of the information.


Who is using your information?

The data responsible is part of Aarhus Kommune and your personal data is processed only by:


Data responsible:

Borgmesterens Afdeling
Erhverv og Bæredygtig Udvikling
Aarhus Kommune Erhverv

Rådhuspladsen 2
8000 Aarhus C

Telephone: +45 89 40 22 00


If you have any questions in connection to the processing of your data by Aarhus Kommune, please contact the advisor of data protection of Aarhus Kommune at:

Finally, we will inform you that it is possible to address a complaint to Datatilsynet about our processing of personal data at:

Tec icon Tec5 Tastatur På Computer




15:00- 17:00

Dyssen 1
8200 Aarhus N

Tec Five-Tec-O-Meter

Henrik Skovfoged & Anders Fleinert

Essential Cyber Security Insights in Two Hours

In late August, Trifork Security will host a TECH5 event in Aarhus. Under the heading ‘Essential Cyber Security Insights in Two Hours’ we will explore the current threat landscape and take a closer look at the NIS2 directive, and how it will impact many Danish companies. 

Cyber criminals, state-sponsored actors, hacktivists and other malicious entities are continuously developing new techniques, tactics, and tools to harm individuals, organizations, and nations. The first session of the afternoon will concern itself with the ever evolving threat landscape, our adversaries and how to best defend ourselves.

The NIS2 directive was published at the end of 2022 and the countdown to implementation has begun. One of the main aspects of the directive is how to handle cyber and information security in the future – especially if you work with critical infrastructure. This will be our point of departure for the second session of the afternoon. 

Building on this, technical self assessment is extremely important. How does your current set-up hold up and are you properly prepared for NIS2? What are the requirements and how does this affect third party suppliers? These questions and more will be addressed during the final session of the day before we open the floor to questions and discussions. 

Ventue to be confirmed shortly. We hope to see you there.