You can’t secure what you can’t see! 

8 May 2025 | Rebel, Oslo

REGISTER

In a era of increasing digital threats, having full visibility is crucial to protect your organization’s most critical assets. Observability empowers you to distinguish between normal and abnormal activity, enhancing your cybersecurity posture by enabling faster threat detection, prevention, and response. However, it is not just about securing the IT infrastructure – it is about maintaining operations, strengthening system resilience, and delivering value to the business through good digital experiences for both customers and employees.

The event focuses on digital security and observability and how these areas must be interconnected to ensure critical infrastructure and stable business operations.

The event offers you professional development, technological deep dives, networking opportunities, and inspirational talks.

We offer sessions for those who like to dive into technical details, but we also have exiting content for those who work higher up in the stack. Regardless of topic or level of the sessions you choose, our goal is for you to go home with new knowledge and a replenished knowledge bank.

Participation is free for Conscia’s costumers, and for others, we charge 1.000 NOK. Are you a Conscia costumer in need of an invoice? Please make a note in the registration form, and we will arrange it. Registrations are binding, and no-shows will be charged 1.000 NOK.

 

 

 

torsdag, 8. mai 2025

Plenumsal 0001
Auditorium 0100
Exposalen
Expo
08:30
Expo
08:30 → 09:15, 45 minutter

Registration and light refreshments in the Expo (stand area)

tor 08:30 - 09:15
09:15
Plenumsal 0001
L1
09:15 → 10:30, 1 time 15 minutter

Welcome to Puls!

Kent Heide

Kent Heide kicks off the day by inviting exciting guests on stage to discuss trends and current topics.

tor 09:15 - 10:30
10:30
10:30 → 10:45, 15 minutter

Break

tor 10:30 - 10:45
10:45
Plenumsal 0001
Cybersikkerhet/ComplianceConscia/BULLL1
10:45 → 12:00, 1 time 15 minutter

NIS2 and Cybersecurity in Practice – What Does It Take?

Christer Berg Johannesen, Kristian Foss, Mira Levánd Bergsland

Did you know that not only the board and CEO but also employees can be held personally liable if cybersecurity measures fail?

The impact of a cyberattack can be profound. In today’s interconnected digital landscape, no organization is immune. Vulnerabilities in a single company can introduce significant risks to customers, partners, and society at large through increasingly complex supply chains.

Conscia and Bull invite you to an in-depth session on the NIS2 directive, its legal and operational implications, and the critical steps required to safeguard your organization against cyber threats. In these two consecutive sessions, leading lawyers from Bull and cybersecurity experts from Conscia will provide strategic insights into roles and responsibilities, key security requirements, and how to ensure compliance with NIS2 and the new Digital Security Act.

tor 10:45 - 12:00
Exposalen
ObservabilityKanari/RiverbedL1
10:45 → 11:15, 30 minutter

The Future of Digital Employee Experience

Bas Bremmer, Torsten Granli

How can forward-thinking leaders drive business success through a strategic approach to Digital Employee Experience (DEX)? In this session, Bas Bremmer and Torsten Granli, will explore the latest trends and strategies shaping the future of DEX. Gain insights into how data-driven approaches, cutting-edge technologies, and proactive IT strategies can enhance workforce productivity, reduce costs, and create a seamless digital workplace.

tor 10:45 - 11:15
Auditorium 0100
OT securityConsciaL1
10:45 → 11:15, 30 minutter

The Time I Almost Blew Up a City

Magnar Barsnes, Erling Rahbek

The consultant was tasked with updating a switch in an OT environment. Upon reboot, dependencies in the OT environment were discovered that nearly blew the factory sky-high – right in the middle of a city in Norway. In this entertaining session, you will learn more about the unique challenges of OT and IT, as well as how to effectively integrate them.

tor 10:45 - 11:15
11:15
Auditorium 0100
11:15 → 11:30, 15 minutter

Break

tor 11:15 - 11:30
Exposalen
11:15 → 11:30, 15 minutter

Break

tor 11:15 - 11:30
11:30
Auditorium 0100
CybersecurityPalo Alto NetworksL2
11:30 → 12:00, 30 minutter

Complete Control: Identify IoT Devices and Secure the Dark Side of the Network

Frode Wøllo

Do you know which IoT devices are actually in your network and what vulnerabilities they have? In this presentation, we show how Palo Alto Networks IoT Security gives you an overview of devices, their unusual behavior – like when the coffee machine suddenly takes control of the printer – and how you can detect and address vulnerabilities before hostile actors exploit them. Learn how to protect your network from hidden threats.

tor 11:30 - 12:00
Exposalen
Wi-FiConsciaL2
11:30 → 12:00, 30 minutter

Are you ready for Wi-Fi 7?

Michal Knasiak

Wi-Fi 7 introduces a range of exciting innovations, delivering significantly improved performance, greater stability, and lower latency. Devices supporting Wi-Fi 7 are already available, but do you have a strategy for your wireless network?

By leveraging multiple frequency bands and incorporating new security requirements with WPA3, Wi-Fi 7 demands both understanding and careful planning for a successful transition. In this session, Michal Knasiak will share key strategies to help you seamlessly migrate to Wi-Fi 7.

After the session, you can also meet Michal at Cisco’s booth, to answer any questions you may have.

tor 11:30 - 12:00
12:00
Expo
12:00 → 13:00, 1 time

Lunch in Expo

tor 12:00 - 13:00
13:00
Plenumsal 0001
Customer CaseNetworkAutomationL2
13:00 → 13:30, 30 minutter

Real-life Network Automation

Jørgen Spange

Jørgen Spange, Network Engineer at DNB Bank, shares his experiences and gives us an exclusive insight into how they have implemented automation and orchestration to streamline operations and reduce risk in critical network infrastructure. Through concrete examples, he demonstrates how they use modern tools to solve complex, repetitive tasks.

tor 13:00 - 13:30
Auditorium 0100
CybersecurityConsciaL1
13:00 → 13:30, 30 minutter

Manipulative Design and the Erosion of Consent

Christer Berg Johannesen

How are deceptive user interfaces, known as manipulative design or dark patterns, used to trick users into giving unintended consent, sharing information, or granting system access? Christer looks at some potential areas for misuse and how these mechanisms can be used to compromise users’ privacy and organizations’ security mechanisms.

tor 13:00 - 13:30
Exposalen
KanariObservabilityL1
13:00 → 13:30, 30 minutter

Applied Observability: Making it work

Michael Breen

Observability is essential for ensuring seamless digital experiences—but too often, organizations struggle to unlock its full potential. Whether due to limited know-how, lack of resources, or time constraints, businesses risk missing out on the true value of their observability investments.

In this session, Michael Breen, CEO of Kanari – part of Conscia, will introduce the Kanari approach to Applied Observability—a way to transform raw data into actionable insights, solve issues before they impact your business, and turn observability into a true strategic advantage. Learn how leading organizations are maximizing ROI and optimizing performance through advisory services and managed solutions designed to make observability work for you.

tor 13:00 - 13:30
13:30
13:30 → 13:45, 15 minutter

Break

tor 13:30 - 13:45
13:45
Plenumsal 0001
NetworkAutomationL2Conscia
13:45 → 14:15, 30 minutter

Automation without Blind Spots: How to Succeed

Øyvind Ellefsen, Bjarne Jensås

Automation has the potential to revolutionize IT operations, but why do so many projects stall before reaching their goals? In this session, Bjarne Jensås and Øyvind Ellefsen from Conscia will delve into what it takes to succeed with automation – from setting clear goals and ambition levels to avoiding the pitfalls that often stop projects.

We look at critical success factors such as:

  • The importance of thorough research before choosing tools
  • The need for competence and resources
  • Support from management, both in terms of time and money
  • Development of real test environments
  • The maturity of products for automation and the manufacturers’ preferred approaches
tor 13:45 - 14:15
Auditorium 0100
CybersecurityPalo Alto NetworksL2
13:45 → 14:15, 30 minutter

Cortex XDR Live Demo: Discover the Power of Centralized Security Incident Forensics

Kristian Samstad

Explore the potential of Cortex XDR in Kristian Samstad’s live demo to investigate a security incident. Discover how much you can achieve from a single console. We dive into the details and demonstrate how Cortex XDR provides you with powerful tools and features to effectively identify and combat threats.

tor 13:45 - 14:15
Exposalen
CiscoCybersecurityL1
13:45 → 14:15, 30 minutter

Cisco Security Vision and Strategy - When Security meets the network

Christian Brandt Heinel

In this session Christian Heinel, Technical leader, will update you on the latest Cisco Security innovations and future outlooks.

This will include the AI strategy FOR and IN Security with Cisco AI Defense and Hybrid mesh firewalling, including the latest on Cisco HyperShield. Finally Cisco has executed on a unified cloud based management platform that will enable AI operations and combine a common security platform for connectivity and security policy management.

tor 13:45 - 14:15
14:15
14:15 → 14:30, 15 minutter

Break

tor 14:15 - 14:30
14:30
Plenumsal 0001
CloudCegalL2
14:30 → 15:00, 30 minutter

Cegal's Cloud Journey: Experiences, Challenges and Gains from a Large-Scale Migration

Arve Osmundsen

In a world where data is crucial, navigating through the complexity of the cloud and ensuring efficient data management is a challenge. In this session, Arve Osmundsen will take you through how Cegal, as a leading supplier to the energy industry, uses advanced cloud services to reduce costs and increase flexibility, while maintaining high performance and availability. Furthermore, he will share insights and experiences from their successful migration of 1450 servers, to achieve maximum cost efficiency without sacrificing performance.

tor 14:30 - 15:00
Auditorium 0100
CybersecurityConsciaL2
14:30 → 15:00, 30 minutter

Securing the Cryptography of the Future When Quantum Becomes a Reality

Thomas Kjensmo

Are we ready for a future where our digital secrets are no longer safe? With the rise of quantum computing, today’s cryptographic standards – such as RSA, ECC, and DH, used in protocols like VPN, HTTPS, and digital certificates – face an existential threat. Quantum computers have the potential to break asymmetric cryptography, putting both our digital lives and global security systems at risk.

Thomas Kjensmo invites you on an exciting journey through post-quantum cryptography (PQC). Here, you will gain insight into why this transition is crucial, the security challenges we face, and how future algorithms are being developed and standardized to ensure a secure digital everyday life in the face of the quantum threat.

tor 14:30 - 15:00
Exposalen
Cisco ThousandEyesObservabilityL2
14:30 → 15:00, 30 minutter

Digital experiences assured by Cisco ThousandEyes

Steve Doyle

Cisco empowers companies with Digital Resilience, ensuring they deliver exceptional digital experiences even amid disruptions or attacks. Assurance powered by Cisco ThousandEyes is a critical component that assures End-to-end visibility into every aspect of digital experience delivery. In this session we will show you how Cisco ThousandEyes can empower every user everywhere, wherever they are on their digital journey.

tor 14:30 - 15:00
15:00
15:00 → 15:15, 15 minutter

Break

tor 15:00 - 15:15
15:15
Plenumsal 0001
CybersecurityAlgosecL3
15:15 → 15:45, 30 minutter

Simplifying Connectivity Management Across the Datacenter, Cloud, & Beyond

Kyle Wickert

Standardizing and simplifying connectivity management is a lasting challenge for organizations looking to accelerate the rollout of new business applications & services.

Enabling rapid, secure, & consistent provisioning of security policies across disparate network security technologies is key to simplifying connectivity delivery. Creating visibility to compliance & governance concerns early in the design of access requirements is key to an improved experience for your internal customers, including application teams, developers, & business stakeholders. Finally creating self-serve functions to empower connectivity owners can move your application connectivity management functions into the future.

During this session you will see first hand how AlgoSec drastically simplifies the challenges associated with managing this complex challenge. This session will include an overview & live software demonstration, ensuring you will leave with new concepts to help you simplify managing connectivity, anywhere in your organization.

tor 15:15 - 15:45
Auditorium 0100
CiscoNettverkL2
15:15 → 15:45, 30 minutter

Data Center Networking Built for the Future

Jon-Anders Frigård, Gaute Bråten Melhus

Data center networking is evolving rapidly, with multiple architectures available to meet different needs. But which solution is the best fit for your organization?

In this session, Jon-Anders and Gaute will explore the various data center network architectures, the maturity of different solutions, their typical use cases, and their predictions for future developments. They will also discuss how these solutions are implemented and operated using Infrastructure as Code (IaC), as well as the available integration possibilities.

This is not about picking a winner but about understanding the strengths and weaknesses of each architecture—and the direction data center networking is heading. Join us for a technical discussion featuring real-world examples and industry insights!

tor 15:15 - 15:45
Exposalen
L1
15:15 → 15:45, 30 minutter

Winning management approval: How to secure funding for your IT project

Arnstein Schei

Securing funding for an IT project requires more than just a good idea – it’s about translating technical solutions into business value and clearly communicating the project’s strategic importance to management. In this session, you will learn how to build a compelling business case that engages decision-makers and demonstrates how the project contributes to the company’s goals.

Arnstein Schei will show you how to:

  • Identify management’s priorities and link the project to these.
  • Develop clear and measurable benefits, such as increased efficiency, cost reduction, or risk minimization.
  • Use concrete examples and data to build credibility.
  • Handle common objections and uncertainties to strengthen the project’s chances of approval.

This practical and inspiring session provides you with the tools and strategies you need to make management your supporters, so you can take your project from idea to reality.

tor 15:15 - 15:45
15:45
15:45 → 16:00, 15 minutter

Break

tor 15:45 - 16:00
16:00
Exposalen
SplunkObservabilityL2
16:00 → 16:30, 30 minutter

From tunnel vision to panoramic insight: Splunk ITSI gives you full visibility

Fredrik Lima Sudmann, Roman Kovalenko

In a world of increasing complexity, having a comprehensive overview of your IT infrastructure is crucial. In this presentation, we will demonstrate how Splunk IT Service Intelligence (ITSI) helps organizations aggregate data from various systems to achieve full observability, streamline troubleshooting processes, and enhance service resilience.

tor 16:00 - 16:30
Auditorium 0100
16:00 → 16:30, 30 minutter

An exciting session is coming up

tor 16:00 - 16:30
Plenumsal 0001
CiscoNetworkL2
16:00 → 16:30, 30 minutter

40 Years of Innovation: Why Cisco Remains the Global Leader in Networking Technology

Kjetil Berge

Even after 40 years, Cisco continues to lead the way in networking technology. But why is that? What makes Cisco the most innovative player in core networking?

In this session, Kjetil will explore the innovation, strategy, and acquisitions that have cemented Cisco’s position as the world’s leading networking company.

You’ll learn about Silicon One, the groundbreaking technology powering Cisco’s hardware, and AIOps, which simplifies and enhances troubleshooting. We’ll also dive into how Cisco prioritizes security by monitoring every data packet in the network. And most importantly – we’ll explore self-healing networks and much more!

tor 16:00 - 16:30
16:30
16:30 → 16:45, 15 minutter

Break

tor 16:30 - 16:45
16:45
Plenumsal 0001
CybersecurityPalo Alto NetworksL2
16:45 → 17:15, 30 minutter

Meet Prisma Access Browser - Your New Enterprise Browser

Okan Kalak

In this session, Okan Kalak will introduce you to Prisma® Access Browser, your new enterprise browser. He will demonstrate how this SASE-integrated browser can enhance the digital experience, provide full control over user activities on all SaaS web applications, and handle apps that do not allow decryption. Furthermore, you will learn how the browser secures access for third-party partners and consultants, and how your company can safely implement BYOD.

tor 16:45 - 17:15
Auditorium 0100
ObservabilityKubernetesGrafanaL2
16:45 → 17:15, 30 minutter

Unlocking Observability into Kubernetes-based systems: A Practical Guide with Grafana Cloud

Daisy Muyldermans

Discover how to quickly detect, investigate, and resolve issues in modern applications using Grafana Cloud. This presentation covers observability best practices and demonstrates how metrics, logs, traces, and synthetic monitoring come together to provide full visibility into Kubernetes-based systems. Learn practical techniques you can apply immediately to improve system reliability and performance.

tor 16:45 - 17:15
Exposalen
SplunkObservabilityL2
16:45 → 17:15, 30 minutter

Digital Detective Work: Uncovering the Truth Behind the Data

Fredrik Lima Sudmann

When a serious incident occurs—whether it’s a bank robbery or a cyberattack—the investigation requires a methodical approach. At a physical crime scene, you would gather evidence: fingerprints, surveillance footage, witness statements. In the digital world, the principle remains the same.

Your website or application is like the bank. Every event leaves behind digital traces—logs, metrics, and traces—that can reveal what happened. Observability is about continuously monitoring and analyzing these traces in real time to understand performance issues, security threats, and user behavior.

Fredrik Lima Sudmann from Splunk will show you how to collect, analyze, and visualize data, enabling you to quickly identify the root cause of issues and take action before they escalate. The digital detective doesn’t work with a magnifying glass, but with insights driven by data.

tor 16:45 - 17:15
17:15
Plenumsal 0001
17:15 → 17:30, 15 minutter

Thank you for coming - meet up in the stand area

tor 17:15 - 17:30
17:30
Expo
17:30 → 18:30, 1 time

Demoes and pre-party in the stand area

tor 17:30 - 18:30
18:30
18:30 → 19:00, 30 minutter

We are heading to Grand Cafe for the anniversary dinner and entertainment

tor 18:30 - 19:00
19:00
19:00 → 23:00, 4 timer

Anniversary dinner with entertainment at Grand Cafe

tor 19:00 - 23:00

Some feedback from participants at Puls 2024:

«Nice balance between professional and soft topics»

«Good atmosphere and lots of interesting things to talk about in the stand area, so the breaks were almost too short»

«Good and relevant topics in the sessions.»

Registration


Kontakt
Ta kontakt med Conscias eksperter