top of page

Program 2025

  • Pre-Conference Workshop: Jupyter Notebooks for DFIR

    Henrik Ibsens Gate 100
  • Pre-Conference Workshop: Introduction to Malware Analysis and Reversing Techniques

    Biskop Gunnerus Gate 14

  • Security Monitoring Day: Registration and Coffee

    Eldorado Esport Entertainment
  • Opening Remarks

  • The Tool Is Not What Is Important, You Are. | Sarah Camilla Ansen, Defendable

  • Break

  • How To Improve the Security Posture of Your Cloud Environments – Best Practices | Nicoleta Botosan, Visma

  • Break

  • Azure Databricks: Near Real-Time Threat Detection and Response | Kyrre Wahl KongsgÃ¥rd, DNB

  • Lunch

  • How to Tango with MISP | Ingrid Grimstad, Sopra Steria

  • Pulling the (KEY)PLUG: A Dive into the Ecosystem of yet Another Shared Malware Family | Bendik Hagen, PwC

  • Break

  • DevOps in the SOC | Emil Flakk & Didrik Koren - eduCSC-NO

  • Catching a Chinese APT with Detection Engineering | Oscar Lejerbäck Wolf, Truesec

  • Break

  • Cobalt Strike: Analysis, Monitoring & Sharing | Raymond Lund, NFCERT

  • Closing Remarks

  • Incident Response Day: Registration and Coffee

    Eldorado Esport Entertainment
  • Opening Remarks

  • Incident Response: A Christmas Carol | Erik de Jong, Securify & Francisco Dominguez, Hunt & Hackett

  • Break

  • Detecting Evasive Linux Backdoors | Craig Rowland, Sandfly

  • Break

  • Purple Teaming: Strengthening Cybersecurity Through Collaboration and Validation | Chris Risvik & Julie Hodne Gundersen

  • Lunch

  • A Collaborative Approach to Security: Red and Purple Teaming | Johanna Fauske-Palmér & Joakim Harbitz, KLP

  • Break

  • A Race Against Time: Responding to Advanced Threat Actors | Per Morten Sandstad, mnemonic

  • Break

  • Automation and Scaling of Digital Forensic Tooling | Aaron Peterson & Wajih Yassine, Google

  • Break

  • Cookie Theft and Other War Stories | Marius Følling Sagdal, Microsoft

  • Quiz & Closing Remarks

bottom of page