top of page

Program 2025

  • Pre-Conference Workshop: Hands-On Investigation of Malware Delivery

    Sopra Steria, Posthuset
  • Pre-Conference Workshop: Incident Response Manager Training

    mnemonic, Henrik Ibsens Gt 100

  • Registration and Coffee

    Eldorado Hub, Torggata 9B
  • Welcome Remarks | Ingvild Giset & Hans-Petter Fjeld

  • SHAZAM - A Targeted Invoice Scammer | Jørgen Bøhnsdalen, Helse- Og KommuneCERT

  • Break

  • Exploiting Adversary Infrastructure | Martin Öberg, Visma

  • Break

  • Threat Hunting for Beginners | Ã…got Stornes, NAV

  • Lunch

  • Tracking the Adversaries in the Middle | Magnus Refsnes, mnemonic

  • Break

  • CEO Fraud - Playing along with the Bad Guys | Linn Kristin Klausen, DNB

  • Break

  • Lessons in Modern Resilience: Closing the Gaps We Didn’t See | Petter B. Bjørklund & Sivert S. Lund, Norges Bank

  • Break

  • Confusing and (Somewhat) Amusing – Red Ishtar’s Ever Evolving TTPs Over Multiple Years | Jono Davis, PwC

  • Closing Remarks | Ingvild Giset & Hans-Petter Fjeld

  • Community Get-Together

    Oslo Streetfood, Torggata 16B

  • Registration and Coffee

    Eldorado Hub, Torggata 9B
  • Welcome Remarks | Ingvild Giset & Hans-Petter Fjeld

  • The Curious Case of the Storage Spoofing | Jesse Voet, LyondellBasell

  • Break

  • Stop Hitting Yourself: Turning Evasion Techniques Against Malware | Patrick Staubmann, VMRay

  • Break

  • APT Defense Without Illusions: Good Practices, Bad Habits, and How to Fix Them | Raymond Hagen, Digdir

  • Lunch

  • Who did it? Getting started with Threat Actor Profiling | Marthe R. Rogndokken, Sopra Steria

  • Break

  • We need the factory up by Sunday! | HÃ¥kon Prestvik, Defendable

  • Break

  • Analyzing a Nation-State Linux Rootkit: Inside the DPRK's Latest Malware | Craig H. Rowland, Sandfly

  • Closing Remarks | Ingvild Giset & Hans-Petter Fjeld

bottom of page