Program (med forbehold om endringer)
-
09:00
Registration & Morning Break
-
09:50
Welcome
Karin Sundsvik | NFEA
-
10:00
Keynote
Suzanne Lightman | NIST (National Institute of Standards and Technology)
-
10:45
Securing Operational Technology: Latest Trends in Destructive Malware and Cyber-Physical Threats
Thomas Scriven | Mandiant
-
11:30
Lunch
-
12:30
Status of EU cybersecurity regulations – Norwegian Digital Security Act and NIS 2
Andreas Gard Meyer | Advokatfirmaet Haavind AS
-
13:00
Demystifying Norway's Digital Security Act(s): What It Means for Your Business
Ulrik Sagelvmo | mnemonic AS
-
13:30
Break - Meet companies in the Exhibition area for networking and mingling
-
14:00
How to develop an organizations OT Cyber Security Risk Assessment Competency
Paul Piotrowski | Shell Global Solutions International BV
-
14:30
Lessons learned from a cyberattack at TOMRA
Kelsey Nutland | TOMRA Systems AS
Espen Haagenrud | TOMRA Systems AS -
15:00
Afternoon Break - Meet companies in the Exhibition area for networking and mingling
-
15:30-16:15
Panel discussion: The Practical experience to vulnerability and asset management in OT environments
A panel where we discuss and evaluate practical implementation of Vulnerability and Vulnerability Management in an Operational Technology environment.
Moderator: Lars Erik Smevold | Statkraft
Panelists:
Espen Endal | KraftCERT
Steffen Bjerkeland | Odfjell Drilling
Rune Wærstad | OKEA -
19:00
Dinner at the hotel
-
09:00
Guardians of the Grid - Empowering Community Defence in OT Cybersecurity
Magpie Graham | Dragos
-
09:30
Davy Jones’ Firmware: Containers, Bare Metal, and Traditional
Ron Brash | aDolus Technology Inc.
-
10:00
Morning Break - Meet companies in the Exhibition area for networking and mingling
-
10:30
Asset Administration Shell Security
Lutz Jänicke | PHOENIX CONTACT GmbH & Co.
-
11:00
Interactive incident preparedness exercise
Erlend Andreas Gjære | Secure Practice AS
Koen Fosse Matthys | Advisense -
11:30
Lunch
-
12:30
Unmasking the Shadows: Navigating the Ominous Landscape of OT Cybersecurity
Ari Rajamäki | Valmet
-
13:00
The Hidden Cyber Risk of IoT / OT
Ole André Bråten | Bråten Organisasjon & Ledelse
-
13:30
Detecting destructive malware in OT protocols
Odin Jenseg | mnemonic AS
Simen Lybekk | mnemonic ASMalware written for OT protocols are often developed and executed with destructive intent. Lightwork and Industroyer2 represent a group of malware designed to cause electric power disruption. During this talk we’ll share our experience in developing behaviour based detection mechanisms for both of these tools, and what techniques we use for doing this. We’ll briefly cover the tools, reverse engineering them and their traffic in order to better understand what patterns to look for, and we’ll explain what benefits our techniques have compared to alternatives like pure signature based detection
-
14:00 - 14:05
Ultra quick sum up
Foredragsholdere

Andreas Gard Meyer | Senior Lawyer | Advokatfirmaet Haavind AS (Haavind Law Firm)
Andreas specializes in IT-contracts and tech regulatory matters. He has several years of practical experience in advising on the drafting and negotiation of national and international IT agreements, as well as cybersecurity legislation and upcoming EU regulations within technology and innovation, including the Data Act and the AI Regulation.
Today, he will discuss the current state of the European Union’s cybersecurity legislation, including an overview of the forthcoming Norwegian Digital Security Act and the NIS 2 Directive. He will offer insights into the entities covered by these acts, outline the principal obligations, and explain the supervisory mechanisms involved.

Ulrik Sagelvmo | Service Lead National Digital Security | mnemonic AS
Ulrik specializes in national security, focusing on empowering nations to protect their national security interests effectively. He collaborates closely with Norwegian enterprises that support fundamental national functions or critical societal functions, guiding them towards achieving a sustainable and holistic security posture.
In his presentation, Ulrik will delve into the strategies organizations providing essential societal services should adopt to comply with NIS/NIS2 directives and the Digital Security Act (Digitalsikkerhetsloven).

Paul Piotrowski | Principal OT Cyber Security Engineer | Shell Global Solutions International
Paul Piotrowski is currently a Principal OT Cyber Security Engineer in Shell’s Global OT Security Discipline. He consults on Global Capital Projects and supports Shell Operated and Non-Operated Assets across all business units.
Paul has spent over 22 years in Shell in various security roles including network operations, risk governance and compliance, audit, incident management, forensics, pen testing and project management. He has traveled extensively for Shell allowing him the opportunity to work across diverse set of cultures and landscapes which have shaped his view of the world.

Espen Haagenrud | Chief Information Security Officer | TOMRA Systems ASA
Espen Haagenrud has practiced IT-auditing, and Security Management in various industries for 25 years. In later years focused on Security governance from a corporate perspective, focusing measuring Security maturity and Security culture and awareness work.
In his presentation, supported by Kelsey Nutland, Head of TOMRA Security Governance, Espen will go through the publicly known cyber security event that struck TOMRA on 16 July 2023, the short- and long-term effect on IT and OT.

Ron Brash | VP of Technical Research & Integration | aDolus Technology Inc.
Ron Brash is a household name when it comes to ICS/OT cybersecurity and embedded vulnerability research. He was instrumental in creating the datasets for the S4 ICS Detection Challenges, received the Top 40 under 40 award for Engineering Leaders 2020 from Plant Engineering, was an embedded developer at Tofino Security, advised several large asset owners in a variety of industries for OT security, and brought a number of products to market.
While IoT or IIoT is a major topic today, whether a product is new or old, history often repeats. This session will discuss the designs of many new industrial products, and some common embedded problems found in ICS and OT products – often due to extended life cycles, profitability, and the breakneck pace of technology. Despite a push for security, some of the emerging «secure» design patterns have unintended effects and allow risks to go unnoticed (or unmanaged by Defenders). Join us for a journey into Davy Jone’s firmware locker and a world of risk hiding beneath the surface.

Dr.Ing. Lutz Jänicke | Corporate Product & Solution Security Officer | PHOENIX CONTACT GmbH & Co.
I am working on making Phoenix Contact product offerings more secure, mainly by providing guidance and governance. I am also active in the security standardization and developing security concepts for Industrie 4.0.
The digital twin represented by the Asset Administration Shell is a very important concept in the Industrie 4.0. Use cases are product related data as for the Digital Product Passport 4.0 or operational data as in concepts for Collaborative Condition Monitoring. The Industrial Digital Twin Association (IDTA) is working on specifying the interoperable security mechanisms of the AAS.

Erlend Andreas Gjære | Co-founder | Secure Practice AS
Erlend Andreas Gjære has studied security and people for 15 years, including six years as a research scientist. In 2017, he became a tech-founder at Secure Practice, to help people with digital security at scale.
He is now on a cyber preparedness exercise tour across 20 cities in Norway with «Hele Norge øver», which is also a precursor to similar tours in several European countries
He will give the lecture together with Koen Fosse Matthys from Advisense

Ari Rajamäki | Product Manager Cybersecurity | Valmet
Ari works in the Automation Systems business line helping customers’ OT asset owners in risk management, countermeasure and threat monitoring implementation projects.
Production and process industry digitalization and connectivity to IT services and cloud introduces new threats in OT. Connectivity is also added because of OT threat visibility and IT counter measures. These connections and cloud managed xDRs tear down the ICS isolation myth. How OT is protected and what are the consequences of doing so?
Cyber Security 2024 takes place in Oslo – the capital of Norway April 23 – 24.
At this year’s conference, our presenters will highlight the challenges we meet in our daily operations, and how these are met in practice.
We will focus on what can be done to improve cyber security in Operational Technology (OT). There will be giveen practical examples on how cyber incidents in industrial settings have been handled.
You will meet industry experts on stage, but also in informal discussion arenas. Let these inspire you with innovative ideas on both today’s possibilities and tomorrow’s solutions.
Join Cyber Security 2024 to meet and discuss industrial cyber security topics with peers.
Other NFEA events can be found here!
PåmeldingPraktisk informasjon
Date
23.04.24 - 24.04.24
Participation fee
- Company member kr. 7 300,-
- Personal member kr. 7 300,-
- Education member kr. 4 000,-
- Education Non member kr. 5 000,-
- Non member kr. 10 300,-
Press participates for free! (*dinner is not included) Send email to [email protected] for registration.
(Subject to changes)
Dinner
There will be a conference dinner at the hotel on the evening of day 1. Price for dinner is NOK 1200
Accommodation
Each participant must book their own accomodation.
For booking and booking code CLICK HERE
Exhibition / logo
Exhibition is now fully booked. Email us for waitinglist: [email protected]
Exhibition
kr. 6 000,- (+ Participation fee)
Exhibition incl. logo on eventpage/in app etc:
kr. 10 000,- (+ Participation fee)
Maximum exhibition size: 3 meters width x 2 meters depth
Logo in the program:
- Members kr. 6 000,-
- Non members kr. 8 500,-
Program Committee
Marie Moe | Mandiant (Committee Leader)
Judith Rossebø | ABB AS
Lars Benjamin Vold | NORMA Cyber
Lars Erik Smevold | Statkraft
Pål Børre Kristoffersen | DNV AS
Knut-Erik Tovslid | Triple-S AS
Karin Sundsvik | NFEA
Tonje Olsen Benestad | NFEA
Other information
DOWNLOAD THE NFEA MULTI-EVENT APP
The app is available in Appstore and Googleplay and it is named NFEA.
Use the same email as you used to register for the conference to log in.
In the App you`ll find list of participants, program, sponsors and eventually also PDF version of those lectures we are permitted to share.
PS: The same app will also apply if you participate at other NFEA conferences.
List of participants: each participant can choose to hide their identity in the app.
The app for this event will be available aprox. 4 weeks before the event starts
HERE you will find NFEAs Terms for cancellation and refund
Sponsor









