In a era of increasing digital threats, having full visibility is crucial to protect your organization’s most critical assets. Observability empowers you to distinguish between normal and abnormal activity, enhancing your cybersecurity posture by enabling faster threat detection, prevention, and response. However, it is not just about securing the IT infrastructure – it is about maintaining operations, strengthening system resilience, and delivering value to the business through good digital experiences for both customers and employees.
The event focuses on digital security and observability and how these areas must be interconnected to ensure critical infrastructure and stable business operations.
The event offers you professional development, technological deep dives, networking opportunities, and inspirational talks.
We offer sessions for those who like to dive into technical details, but we also have exiting content for those who work higher up in the stack. Regardless of topic or level of the sessions you choose, our goal is for you to go home with new knowledge and a replenished knowledge bank.
Participation is free for Conscia’s costumers, and for others, we charge 1.000 NOK. Are you a Conscia costumer in need of an invoice? Please make a note in the registration form, and we will arrange it. Registrations are binding, and no-shows will be charged 1.000 NOK.
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
torsdag, 8. mai 2025
Registration and light refreshments in the Expo (stand area)
Welcome to Puls!
Kent Heide kicks off the day by inviting exciting guests on stage to discuss trends and current topics.
Break
NIS2 and Cybersecurity in Practice – What Does It Take?
Did you know that not only the board and CEO but also employees can be held personally liable if cybersecurity measures fail?
The impact of a cyberattack can be profound. In today’s interconnected digital landscape, no organization is immune. Vulnerabilities in a single company can introduce significant risks to customers, partners, and society at large through increasingly complex supply chains.
Conscia and Bull invite you to an in-depth session on the NIS2 directive, its legal and operational implications, and the critical steps required to safeguard your organization against cyber threats. In these two consecutive sessions, leading lawyers from Bull and cybersecurity experts from Conscia will provide strategic insights into roles and responsibilities, key security requirements, and how to ensure compliance with NIS2 and the new Digital Security Act.
The Future of Digital Employee Experience
How can forward-thinking leaders drive business success through a strategic approach to Digital Employee Experience (DEX)? In this session, Bas Bremmer and Torsten Granli, will explore the latest trends and strategies shaping the future of DEX. Gain insights into how data-driven approaches, cutting-edge technologies, and proactive IT strategies can enhance workforce productivity, reduce costs, and create a seamless digital workplace.
The Time I Almost Blew Up a City
The consultant was tasked with updating a switch in an OT environment. Upon reboot, dependencies in the OT environment were discovered that nearly blew the factory sky-high – right in the middle of a city in Norway. In this entertaining session, you will learn more about the unique challenges of OT and IT, as well as how to effectively integrate them.
Break
Break
Complete Control: Identify IoT Devices and Secure the Dark Side of the Network
Do you know which IoT devices are actually in your network and what vulnerabilities they have? In this presentation, we show how Palo Alto Networks IoT Security gives you an overview of devices, their unusual behavior – like when the coffee machine suddenly takes control of the printer – and how you can detect and address vulnerabilities before hostile actors exploit them. Learn how to protect your network from hidden threats.
Are you ready for Wi-Fi 7?
Wi-Fi 7 introduces a range of exciting innovations, delivering significantly improved performance, greater stability, and lower latency. Devices supporting Wi-Fi 7 are already available, but do you have a strategy for your wireless network?
By leveraging multiple frequency bands and incorporating new security requirements with WPA3, Wi-Fi 7 demands both understanding and careful planning for a successful transition. In this session, Michal Knasiak will share key strategies to help you seamlessly migrate to Wi-Fi 7.
After the session, you can also meet Michal at Cisco’s booth, to answer any questions you may have.
Lunch in Expo
Real-life Network Automation
Jørgen Spange, Network Engineer at DNB Bank, shares his experiences and gives us an exclusive insight into how they have implemented automation and orchestration to streamline operations and reduce risk in critical network infrastructure. Through concrete examples, he demonstrates how they use modern tools to solve complex, repetitive tasks.
Manipulative Design and the Erosion of Consent
How are deceptive user interfaces, known as manipulative design or dark patterns, used to trick users into giving unintended consent, sharing information, or granting system access? Christer looks at some potential areas for misuse and how these mechanisms can be used to compromise users’ privacy and organizations’ security mechanisms.
Applied Observability: Making it work
Observability is essential for ensuring seamless digital experiences—but too often, organizations struggle to unlock its full potential. Whether due to limited know-how, lack of resources, or time constraints, businesses risk missing out on the true value of their observability investments.
In this session, Michael Breen, CEO of Kanari – part of Conscia, will introduce the Kanari approach to Applied Observability—a way to transform raw data into actionable insights, solve issues before they impact your business, and turn observability into a true strategic advantage. Learn how leading organizations are maximizing ROI and optimizing performance through advisory services and managed solutions designed to make observability work for you.
Break
Automation without Blind Spots: How to Succeed
Automation has the potential to revolutionize IT operations, but why do so many projects stall before reaching their goals? In this session, Bjarne Jensås and Øyvind Ellefsen from Conscia will delve into what it takes to succeed with automation – from setting clear goals and ambition levels to avoiding the pitfalls that often stop projects.
We look at critical success factors such as:
- The importance of thorough research before choosing tools
- The need for competence and resources
- Support from management, both in terms of time and money
- Development of real test environments
- The maturity of products for automation and the manufacturers’ preferred approaches
Cortex XDR Live Demo: Discover the Power of Centralized Security Incident Forensics
Explore the potential of Cortex XDR in Kristian Samstad’s live demo to investigate a security incident. Discover how much you can achieve from a single console. We dive into the details and demonstrate how Cortex XDR provides you with powerful tools and features to effectively identify and combat threats.
Cisco Security Vision and Strategy - When Security meets the network
In this session Christian Heinel, Technical leader, will update you on the latest Cisco Security innovations and future outlooks.
This will include the AI strategy FOR and IN Security with Cisco AI Defense and Hybrid mesh firewalling, including the latest on Cisco HyperShield. Finally Cisco has executed on a unified cloud based management platform that will enable AI operations and combine a common security platform for connectivity and security policy management.
Break
Cegal's Cloud Journey: Experiences, Challenges and Gains from a Large-Scale Migration
In a world where data is crucial, navigating through the complexity of the cloud and ensuring efficient data management is a challenge. In this session, Arve Osmundsen will take you through how Cegal, as a leading supplier to the energy industry, uses advanced cloud services to reduce costs and increase flexibility, while maintaining high performance and availability. Furthermore, he will share insights and experiences from their successful migration of 1450 servers, to achieve maximum cost efficiency without sacrificing performance.
Securing the Cryptography of the Future When Quantum Becomes a Reality
Are we ready for a future where our digital secrets are no longer safe? With the rise of quantum computing, today’s cryptographic standards – such as RSA, ECC, and DH, used in protocols like VPN, HTTPS, and digital certificates – face an existential threat. Quantum computers have the potential to break asymmetric cryptography, putting both our digital lives and global security systems at risk.
Thomas Kjensmo invites you on an exciting journey through post-quantum cryptography (PQC). Here, you will gain insight into why this transition is crucial, the security challenges we face, and how future algorithms are being developed and standardized to ensure a secure digital everyday life in the face of the quantum threat.
Digital experiences assured by Cisco ThousandEyes
Cisco empowers companies with Digital Resilience, ensuring they deliver exceptional digital experiences even amid disruptions or attacks. Assurance powered by Cisco ThousandEyes is a critical component that assures End-to-end visibility into every aspect of digital experience delivery. In this session we will show you how Cisco ThousandEyes can empower every user everywhere, wherever they are on their digital journey.
Break
Simplifying Connectivity Management Across the Datacenter, Cloud, & Beyond
Standardizing and simplifying connectivity management is a lasting challenge for organizations looking to accelerate the rollout of new business applications & services.
Enabling rapid, secure, & consistent provisioning of security policies across disparate network security technologies is key to simplifying connectivity delivery. Creating visibility to compliance & governance concerns early in the design of access requirements is key to an improved experience for your internal customers, including application teams, developers, & business stakeholders. Finally creating self-serve functions to empower connectivity owners can move your application connectivity management functions into the future.
During this session you will see first hand how AlgoSec drastically simplifies the challenges associated with managing this complex challenge. This session will include an overview & live software demonstration, ensuring you will leave with new concepts to help you simplify managing connectivity, anywhere in your organization.
Data Center Networking Built for the Future
Data center networking is evolving rapidly, with multiple architectures available to meet different needs. But which solution is the best fit for your organization?
In this session, Jon-Anders and Gaute will explore the various data center network architectures, the maturity of different solutions, their typical use cases, and their predictions for future developments. They will also discuss how these solutions are implemented and operated using Infrastructure as Code (IaC), as well as the available integration possibilities.
This is not about picking a winner but about understanding the strengths and weaknesses of each architecture—and the direction data center networking is heading. Join us for a technical discussion featuring real-world examples and industry insights!
Winning management approval: How to secure funding for your IT project
Securing funding for an IT project requires more than just a good idea – it’s about translating technical solutions into business value and clearly communicating the project’s strategic importance to management. In this session, you will learn how to build a compelling business case that engages decision-makers and demonstrates how the project contributes to the company’s goals.
Arnstein Schei will show you how to:
- Identify management’s priorities and link the project to these.
- Develop clear and measurable benefits, such as increased efficiency, cost reduction, or risk minimization.
- Use concrete examples and data to build credibility.
- Handle common objections and uncertainties to strengthen the project’s chances of approval.
This practical and inspiring session provides you with the tools and strategies you need to make management your supporters, so you can take your project from idea to reality.
Break
From tunnel vision to panoramic insight: Splunk ITSI gives you full visibility
In a world of increasing complexity, having a comprehensive overview of your IT infrastructure is crucial. In this presentation, we will demonstrate how Splunk IT Service Intelligence (ITSI) helps organizations aggregate data from various systems to achieve full observability, streamline troubleshooting processes, and enhance service resilience.
An exciting session is coming up
40 Years of Innovation: Why Cisco Remains the Global Leader in Networking Technology
Even after 40 years, Cisco continues to lead the way in networking technology. But why is that? What makes Cisco the most innovative player in core networking?
In this session, Kjetil will explore the innovation, strategy, and acquisitions that have cemented Cisco’s position as the world’s leading networking company.
You’ll learn about Silicon One, the groundbreaking technology powering Cisco’s hardware, and AIOps, which simplifies and enhances troubleshooting. We’ll also dive into how Cisco prioritizes security by monitoring every data packet in the network. And most importantly – we’ll explore self-healing networks and much more!
Break
Meet Prisma Access Browser - Your New Enterprise Browser
In this session, Okan Kalak will introduce you to Prisma® Access Browser, your new enterprise browser. He will demonstrate how this SASE-integrated browser can enhance the digital experience, provide full control over user activities on all SaaS web applications, and handle apps that do not allow decryption. Furthermore, you will learn how the browser secures access for third-party partners and consultants, and how your company can safely implement BYOD.
Unlocking Observability into Kubernetes-based systems: A Practical Guide with Grafana Cloud
Discover how to quickly detect, investigate, and resolve issues in modern applications using Grafana Cloud. This presentation covers observability best practices and demonstrates how metrics, logs, traces, and synthetic monitoring come together to provide full visibility into Kubernetes-based systems. Learn practical techniques you can apply immediately to improve system reliability and performance.
Digital Detective Work: Uncovering the Truth Behind the Data
When a serious incident occurs—whether it’s a bank robbery or a cyberattack—the investigation requires a methodical approach. At a physical crime scene, you would gather evidence: fingerprints, surveillance footage, witness statements. In the digital world, the principle remains the same.
Your website or application is like the bank. Every event leaves behind digital traces—logs, metrics, and traces—that can reveal what happened. Observability is about continuously monitoring and analyzing these traces in real time to understand performance issues, security threats, and user behavior.
Fredrik Lima Sudmann from Splunk will show you how to collect, analyze, and visualize data, enabling you to quickly identify the root cause of issues and take action before they escalate. The digital detective doesn’t work with a magnifying glass, but with insights driven by data.
Thank you for coming - meet up in the stand area
Demoes and pre-party in the stand area
We are heading to Grand Cafe for the anniversary dinner and entertainment
Anniversary dinner with entertainment at Grand Cafe
Some feedback from participants at Puls 2024:
«Nice balance between professional and soft topics»
«Good atmosphere and lots of interesting things to talk about in the stand area, so the breaks were almost too short»
«Good and relevant topics in the sessions.»
Registration