top of page
Program 2025
- 5 timer
Workshop: Hands-On Investigation of Malware Delivery
Sopra Steria, Posthuset - 7 timer
Incident Response Manager Training
mnemonic, Henrik Ibsens Gt 100
- 30 minutter
Registration and Coffee
Eldorado Hub, Torggata 9B - 15 minutter
Welcome Remarks
- 30 minutter
TBD | Jørgen Bøhnsdalen, Helse- Og KommuneCERT
- 15 minutter
Break
- 30 minutter
Exploiting Adversary Infrastructure | Martin Öberg, Visma
- 15 minutter
Break
- 30 minutter
Threat Hunting for Beginners | Ã…got Stornes, NAV
- 1 time
Lunch
- 30 minutter
Tracking the Adversaries in the Middle | Magnus Refsnes, mnemonic
- 15 minutter
Break
- 30 minutter
CEO Fraud - Playing along with the Bad Guys | Linn Kristin Klausen, DNB
- 15 minutter
Break
- 30 minutter
Lessons in Modern Resilience: Closing the Gaps We Didn’t See | Petter B. Bjørklund & Sivert S. Lund, Norges Bank
- 15 minutter
Break
- 45 minutter
Confusing and (Somewhat) Amusing – Red Ishtar’s Ever Evolving TTPs Over Multiple Years | Jono Davis, PwC
- 15 minutter
Closing Remarks
- 30 minutter
Registration and Coffee
Eldorado Hub, Torggata 9B - 15 minutter
Welcome Remarks
- 30 minutter
The Curious Case of the Storage Spoofing | Jesse Voet, LyondellBasell
- 15 minutter
Break
- 45 minutter
Stop Hitting Yourself: Turning Evasion Techniques Against Malware
- 15 minutter
Break
- 30 minutter
APT Defense Without Illusions: Good Practices, Bad Habits, and How to Fix Them | Raymond Hagen, Digdir
- 1 time
Lunch
- 45 minutter
Who did it? Getting started with Threat Actor Profiling | Marthe R. Rogndokken, Sopra Steria
- 15 minutter
Break
- 30 minutter
We need the factory up by Sunday! | HÃ¥kon Prestvik, Defendable
- 15 minutter
Break
- 45 minutter
Analyzing a Nation-State Linux Rootkit: Inside the DPRK's Latest Malware | Craig H. Rowland, Sandfly
- 15 minutter
Closing Remarks
bottom of page