top of page
Program 2025
Pre-Conference Workshop: Hands-On Investigation of Malware Delivery
Sopra Steria, PosthusetPre-Conference Workshop: Incident Response Manager Training
mnemonic, Henrik Ibsens Gt 100
Registration and Coffee
Eldorado Hub, Torggata 9BWelcome Remarks | Ingvild Giset & Hans-Petter Fjeld
SHAZAM - A Targeted Invoice Scammer | Jørgen Bøhnsdalen, Helse- Og KommuneCERT
Break
Exploiting Adversary Infrastructure | Martin Öberg, Visma
Break
Threat Hunting for Beginners | Ã…got Stornes, NAV
Lunch
Tracking the Adversaries in the Middle | Magnus Refsnes, mnemonic
Break
CEO Fraud - Playing along with the Bad Guys | Linn Kristin Klausen, DNB
Break
Lessons in Modern Resilience: Closing the Gaps We Didn’t See | Petter B. Bjørklund & Sivert S. Lund, Norges Bank
Break
Confusing and (Somewhat) Amusing – Red Ishtar’s Ever Evolving TTPs Over Multiple Years | Jono Davis, PwC
Closing Remarks | Ingvild Giset & Hans-Petter Fjeld
Community Get-Together
Oslo Streetfood, Torggata 16B
Registration and Coffee
Eldorado Hub, Torggata 9BWelcome Remarks | Ingvild Giset & Hans-Petter Fjeld
The Curious Case of the Storage Spoofing | Jesse Voet, LyondellBasell
Break
Stop Hitting Yourself: Turning Evasion Techniques Against Malware | Patrick Staubmann, VMRay
Break
APT Defense Without Illusions: Good Practices, Bad Habits, and How to Fix Them | Raymond Hagen, Digdir
Lunch
Who did it? Getting started with Threat Actor Profiling | Marthe R. Rogndokken, Sopra Steria
Break
We need the factory up by Sunday! | HÃ¥kon Prestvik, Defendable
Break
Analyzing a Nation-State Linux Rootkit: Inside the DPRK's Latest Malware | Craig H. Rowland, Sandfly
Closing Remarks | Ingvild Giset & Hans-Petter Fjeld
bottom of page

