Security and GRC

Security at Arkimentum

At Arkimentum, we view security and compliance as a strategic foundation that creates value for the entire business. Our consultants cover areas such as Operational Technology (OT), NIS2 compliance, Microsoft Defender, and Active Directory hardening.

Governance, Risk, and Compliance (GRC)

We connect all aspects of security through standards such as ISO 27001, IEC 62443, NIS2, and DORA, ensuring a holistic and future-proof approach. Our methodology is always tailored to your company culture, systems & procedures.

How we define IT security

Holistic Security

We combine business understanding with technical expertise and experience from industries such as energy and utilities. We help you build a robust, future-proof infrastructure.

Shadow IT

We help you map and control applications and cloud services that may create vulnerabilities and compliance challenges. With automated enforcement, we minimize the risk of malware and unforeseen costs.

Technical Debt

Outdated systems and inefficient processes create security risks and hinder efficiency. By updating and modernizing the IT environment, we strengthen security and ensure compliance with relevant standards.

Governance, Risk and Compliance (GRC)

Compliance is also a holistic discipline that connects all aspects of security and creates measurable value for the entire business. We integrate standards such as ISO 27001, IEC 62443, and EU directives and regulations like NIS 2 and DORA into a context that fits your company culture and existing procedures.

We are with you at the table every step of the way—from planning and implementation to ongoing optimization—so that compliance is not just a requirement, but a foundation that creates transparency, enabling clear decision-making and making the return on investment in IT and cybersecurity tangible. We place great emphasis on delivering results you can see and feel, which is why we focus on creating a foundation for:

  • Implementing processes that align with your company’s structure and culture

  • Reducing uncertainties in decision-making processes
  • Identifying risks and vulnerabilities across the business

  • Minimizing compliance risks in relation to regulatory authorities

  • Reducing the risk of IT and OT security incidents

  • Reducing the financial impact of IT downtime

  • Strengthening your cybersecurity culture

A prerequisite for strengthening the cybersecurity side of your business is ensuring the right expertise is in place. Our combination of competencies and experience enables us to cover most—if not all—aspects of governance, risk management, compliance, and technical cybersecurity.

Project examples

✓ NIS2 in the energy sector

✓ OT security

✓ Microsoft Defender implementation

✓ Active Directory hardening

✓ Shadow IT-control

Contact our security experts

Anne Duedahl

Anne Duedahl

+45 30 68 75 38

Anne Duedahl leads our OT security and GRC services. She advises critical infrastructure within energy, finance, and pharma on NIS2, IEC 62443 and ISO 27001 – always with a focus on integrity, quality and long-term impact. She contributes to strengthen the connection between IT and OT and help organizations build real resilience.

Read more
Kent Rifbjerg Erichsen

Kent Rifbjerg Erichsen

+45 21 47 54 55

Experienced system architect with broad competence within Microsoft technologies, but also other manufacturers. In particular telephony, client and server security, and the home workplace. Supplier-independent counseling is one of Kent's trademarks. If you are looking for a very technical architect, then Kent is the man you need for your project.

Read more
Jacob Laue Petersen

Jacob Laue Petersen

+45 22 23 63 23

Jacob is an experienced infrastructure consultant working with medium and large Microsoft environments. His passion for making processes simpler and more efficient, e.g. through automation and common sense, ensures good results - both Online and Onprem. The safe and efficient operation and development of the Microsoft platform is paramount.

Read more
Carsten Hagedorn Midtgaard

Carsten Hagedorn Midtgaard

+45 25 26 74 58

Carsten is an experienced infrastructure architect with broad knowledge of Microsoft technologies, especially when it comes to vulnerability management, hardening / securing existing environments and designing new. In addition to Microsoft, Carsten can help with design, setup and operation of products such as Cisco ESA, security regarding email in general incl. user awareness, Rapid7 vulnerability management and some of the products on the ManageEngine portfolio. He also has some experience with SIEM.

Read more
Michael Bombales Noer

Michael Bombales Noer

+45 26 15 39 95

Senior Security and Cloud Architect with extensive experience driving transformations through cloud technologies. Specialized in modern workplace solutions with deep expertise in the Microsoft 365 E5 suite, focusing on security (Microsoft Defender) and device and identity management using Microsoft Intune and Entra ID. Strong proficiency in Office 365 and related collaboration tools, such as Teams and Power Automate. Highly experienced in designing and implementing Zero Trust security models, aligning security architecture with modern threat landscapes and compliance needs. Brings a solid background in traditional Microsoft Server Architectures, including Active Directory and Certificate Services, gained from years of hands-on experience in enterprise IT environments.

Read more
Jakob Østergaard Nielsen

Jakob Østergaard Nielsen

+45 20 85 91 56

Jakob Østergaard Nielsen is a highly qualified and experienced IT architect known for his structured approach and extensive experience with Microsoft infrastructure. With over two decades in the industry, Jakob excels in designing and implementing robust IT solutions that drive business efficiency and innovation. His technical and operational expertise includes hybrid cloud architecture, Microsoft Azure, Microsoft 365, Entra ID and data governance, Dynamics 365, artificial intelligence, networking, licensing, and regulatory compliance standards (ISO27001, NIS2, SWIFT, etc.).

Read more
AsbjĂžrn Hoffskov Lund

AsbjĂžrn Hoffskov Lund

+45 31 16 02 76

As a specialist in Information Security and organizational Cybersecurity, Asbjþrn’s focus is on how Cyber and Information Security are implemented with an emphasis on YOUR business. He places particular emphasis on the human element and on creating a culture where it is safe to acknowledge mistakes so that everyone can learn from them. Additionally, he stresses that processes must make sense and be understandable, and that tools alone do not solve the challenges.

Read more
Lasse Bloch Petersen

Lasse Bloch Petersen

+45 93 80 19 90

Lasse is an information security specialist who works with large and small organizations that want to implement or want or must follow ISO 27001, NIS2, GDPR, DORA etc. Lasse specializes in transferring understanding and meaning of information security to management and employees as well as designing robust organizations.

Read more
Henning Christian Hofflund

Henning Christian Hofflund

+45 40 26 93 39

Henning is a highly experienced infrastructure architect and technical advisor with more than 25 years of experience in complex IT transformations. He specializes in the design, migration, and consolidation of large-scale infrastructures—often acting as technical lead, architect, and trusted sparring partner for both customers and project teams. Henning brings solid expertise in transformations, IT security, and automation, and works in a structured, pragmatic way to deliver solutions that scale, can be operated efficiently, and stand the test of real-world use.

Read more
Casper Holtermann

Casper Holtermann

+45 51 49 11 41

As a Principal IAM & Security Architect, Casper brings more than 25 years of experience in IT, digital identity and information security across both public and private organizations. He is typically engaged when organizations face complex, business-critical or regulated identity and security challenges where the impact of failure is high. Casper's core strength is his ability to carry complexity on behalf of the organization, creating clarity where environments are fragmented and coherence where silos exist, both technically and organizationally. He is known for communicating complex topics clearly and constructively at all levels, including CxO, and for delivering architectures that can be operated, audited and evolved over time.

Read more

Ready to get started?

With Arkimentum as your partner, you gain not only a technical upgrade but also a lasting security culture. We create transparency in decision-making processes and ensure that investments in IT security deliver measurable results.