top of page
Program 2025
Workshop 1: Hands-on Investigation of Email-based Malspam | Hans Kristian Strømme, HelseCERT
mnemonic, Henrik Ibsens Gt 100
Registration and Coffee
Eldorado Hub, Torggata 9BOpening Remarks | Mats Koteng & Isabel Quiroga Arkvik
Collective Cyber Defence: Bridging Nations, NATO and Industry | Erik Kursetgjerde, NATO CCD COE
Security Debt in Practice | Maren Kruke, Visma
Break
Unboxing the Black Box - Vulnerabilities and Incident Handling in Appliances | K. Solberg & T. E. Bjørstad, mnemonic
Break
Sigma Unleashed: A Realistic Implementation | Mathieu Le Cleach, CERT-EU
Lunch
To Trace an Attacker from Z to A | Aleksander Bjørkhaug, Defendable
Break
What Do You Do When the IT Guy Is Terje Vigen? | Ã…got Stornes, NAV
Break
Building a New Cyber Defense Platform | Karl Bernhard Gudmundsen, Equinor
Closing Remarks
Community Dinner | Oslo Streetfood
Registration and Coffee
Eldorado Hub, Torggata 9BOpening Remarks | Mats Koteng & Isabel Quiroga Arkvik
Wiser the second time around? Lessons Learned from Setting up Intel Teams | Peter Ottis, Equinor
Break
Hunting Cyber Criminals | Sigrunn Bohne & Bjørn Erik Aubert, NC3
Break
Fantastic Orb Networks and Where to Find Them | Bendik Hagen, PwC
Lunch
Change Management & Risk Assessment: There Might be Something to it! | Thomas R. Andersen, KONGSBERG
Break
Ensuring Forensically Sound Digital Evidence: Key Principles and Procedures for Effective IR | Ivar Friheim, eduCSC
Break
Peeling Apples: How To Find and Avoid Canker | Susanne Larsen, NSM NCSC
Closing Remarks
bottom of page

