top of page

Program 2023


  • 6 timer

    Pre-Conference Workshop: Jupyter Notebooks for DFIR

    Henrik Ibsens Gate 100

  • 6 timer

    Pre-Conference Workshop: Introduction to Malware Analysis and Reversing Techniques

    Biskop Gunnerus Gate 14


  • 30 minutter

    Security Monitoring Day: Registration and Coffee

    Eldorado Esport Entertainment

  • 15 minutter

    Opening Remarks


  • 30 minutter

    The Tool Is Not What Is Important, You Are. | Sarah Camilla Ansen, Defendable


  • 10 minutter

    Break


  • 30 minutter

    How To Improve the Security Posture of Your Cloud Environments – Best Practices | Nicoleta Botosan, Visma


  • 15 minutter

    Break


  • 30 minutter

    Azure Databricks: Near Real-Time Threat Detection and Response | Kyrre Wahl Kongsgård, DNB


  • 1 time

    Lunch


  • 30 minutter

    How to Tango with MISP | Ingrid Grimstad, Sopra Steria


  • 30 minutter

    Pulling the (KEY)PLUG: A Dive into the Ecosystem of yet Another Shared Malware Family | Bendik Hagen, PwC


  • 10 minutter

    Break


  • 30 minutter

    DevOps in the SOC | Emil Flakk & Didrik Koren - eduCSC-NO


  • 45 minutter

    Catching a Chinese APT with Detection Engineering | Oscar Lejerbäck Wolf, Truesec


  • 10 minutter

    Break


  • 30 minutter

    Cobalt Strike: Analysis, Monitoring & Sharing | Raymond Lund, NFCERT


  • 10 minutter

    Closing Remarks


  • 30 minutter

    Incident Response Day: Registration and Coffee

    Eldorado Esport Entertainment

  • 10 minutter

    Opening Remarks


  • 30 minutter

    Incident Response: A Christmas Carol | Erik de Jong, Securify & Francisco Dominguez, Hunt & Hackett


  • 15 minutter

    Break


  • 45 minutter

    Detecting Evasive Linux Backdoors | Craig Rowland, Sandfly


  • 10 minutter

    Break


  • 45 minutter

    Purple Teaming: Strengthening Cybersecurity Through Collaboration and Validation | Chris Risvik & Julie Hodne Gundersen


  • 55 minutter

    Lunch


  • 45 minutter

    A Collaborative Approach to Security: Red and Purple Teaming | Johanna Fauske-Palmér & Joakim Harbitz, KLP


  • 15 minutter

    Break


  • 45 minutter

    A Race Against Time: Responding to Advanced Threat Actors | Per Morten Sandstad, mnemonic


  • 10 minutter

    Break


  • 45 minutter

    Automation and Scaling of Digital Forensic Tooling | Aaron Peterson & Wajih Yassine, Google


  • 10 minutter

    Break


  • 45 minutter

    Cookie Theft and Other War Stories | Marius Følling Sagdal, Microsoft


  • 25 minutter

    Quiz & Closing Remarks

bottom of page