top of page
Program 2025
Pre-Conference Workshop: Jupyter Notebooks for DFIR
Henrik Ibsens Gate 100Pre-Conference Workshop: Introduction to Malware Analysis and Reversing Techniques
Biskop Gunnerus Gate 14
Security Monitoring Day: Registration and Coffee
Eldorado Esport EntertainmentOpening Remarks
The Tool Is Not What Is Important, You Are. | Sarah Camilla Ansen, Defendable
Break
How To Improve the Security Posture of Your Cloud Environments – Best Practices | Nicoleta Botosan, Visma
Break
Azure Databricks: Near Real-Time Threat Detection and Response | Kyrre Wahl Kongsgård, DNB
Lunch
How to Tango with MISP |Â Ingrid Grimstad, Sopra Steria
Pulling the (KEY)PLUG: A Dive into the Ecosystem of yet Another Shared Malware Family | Bendik Hagen, PwC
Break
DevOps in the SOC | Emil Flakk & Didrik Koren - eduCSC-NO
Catching a Chinese APT with Detection Engineering | Oscar Lejerbäck Wolf, Truesec
Break
Cobalt Strike: Analysis, Monitoring & Sharing | Raymond Lund, NFCERT
Closing Remarks
Incident Response Day: Registration and Coffee
Eldorado Esport EntertainmentOpening Remarks
Incident Response: A Christmas Carol | Erik de Jong, Securify & Francisco Dominguez, Hunt & Hackett
Break
Detecting Evasive Linux Backdoors | Craig Rowland, Sandfly
Break
Purple Teaming: Strengthening Cybersecurity Through Collaboration and Validation | Chris Risvik & Julie Hodne Gundersen
Lunch
A Collaborative Approach to Security: Red and Purple Teaming | Johanna Fauske-Palmér & Joakim Harbitz, KLP
Break
A Race Against Time: Responding to Advanced Threat Actors | Per Morten Sandstad, mnemonic
Break
Automation and Scaling of Digital Forensic Tooling | Aaron Peterson & Wajih Yassine, Google
Break
Cookie Theft and Other War Stories | Marius Følling Sagdal, Microsoft
Quiz & Closing Remarks
bottom of page

