mnemonic at Sikkerhetsfestivalen 2025
Come and join us at Sikkerhetsfestivalen from August 25 - 27 in Lillehammer! You can find mnemonic on stage, in the exhibition hall, and at our morning running club.

mnemonic will once again be present at Sikkerhetsfestivalen - Norway's largest meeting place for cyber security.
At this year's sold-out event we have a range of exciting sessions, a booth in the exhibition hall, and a morning running club to help kickstart your days.
Find us on stage
So Long, and Thanks for All the Phish
Harrison Edward Sand & Erlend Leiknes
A rare look behind the scenes of a global phishing-as-a-service operation. We tell the story of how we infiltrated a phishing group, cracked their software, exploited a hidden backdoor, and followed an OSINT rabbit hole to uncover the identity of the primary software developer.
Tuesday 15:00 - 15:30 | Kulturhuset, Festsalen
Skille trusselaktører fra hverandre: Nyttig innsikt eller analytisk blindvei?
Kristoffer Svensen Solberg
Attribusjon og sammenlignende analyse av Advanced Persistent Threats (APT-er) er komplekst og omdiskutert. Man kan fokuserer på aktørnivå, der man forsøker å skille mellom de forskjellige nasjonalstatlige gruppene, eller man kan gå for bredere tilnærming der modus operandi vektlegges – altså taktikker, teknikker og prosedyrer (TTP-er) fremfor attribusjon.
Denne presentasjonen tar for seg noen av utfordringene med å sammenligne APT-er på aktørnivå, basert på en analyse av seks kinesiske og russiske trusselaktører. Vi diskuterer begrensningene ved attribusjon, den dynamiske naturen til statsstøttede cyberoperasjoner, samt de strategiske fordelene ved ulike sammenligningsmetoder. Hvem har egentlig nytte av aktørnivå-analyser, og når er det mer hensiktsmessig å fokusere på modus operandi?
Tuesday 15:45 - 16:15 | Hammer, Moen nede
Tracking the Adversaries in the Middle
Magnus Walmsnæss Refsnes
Adversary in The Middle (AiTM) attacks and token theft has grown steadily as MFA becomes more widely adopted. From our managed SOC we have observed how the right phishing email, at the right time, from a compromised sender makes it extremely difficult for the end user to discern good from evil. Often these attacks arrive from the compromised emails of a trusted partner, supplier, or co-worker. Sometimes just mere moments after a conversation has taken place between the two victims. Phishing awareness and training can only help so much.
In this talk, I will present how we have tackled the rise in AiTM from the Threat Intelligence perspective. It goes into the details of how we started and eventually systemized our collection of AiTM kits and from this collection created intelligence products for both our internal detection engineers and the security analysts within the SOC. Lastly, I will discuss some recommendations for hardening environments against these attacks.
Tuesday 15:00 - 15:30 | Hammer, Moen nede
Podcast: State of the Union: Agentic LLMs
Robby Peralta
Everyone’s talking about “Agentic AI,” but beyond the buzz, what’s actually happening on the ground? In this episode we cut through the noise and look at real-world implementations of agent-based systems, with a spotlight on what’s been done here in Norway. Are we ahead, behind, or just cautious?
We’ll discuss lessons learned from local projects, the current state of the global ecosystem, and what it really takes to make Agentic AI useful, diving into integration concepts like MCP and RAG, and how they’re being applied in practice.
And because no good AI discussion is complete without a few war stories, we’ll explore some of the more notable incidents in the space and what they reveal about the risks, gaps, and growing pains of this rapidly evolving technology.
Tuesday 13:15 - 14:45 | Microbryggeriet
Commercially sourced intelligence: Friend or foe?
Tor Erling Bjørstad & Vivi Rignes Berrefjord
Today, commercial datasets provide surveillance and tracing abilities at unprecedented levels and private vendors hold data collection and analysis capabilities to rival nation state actors. Low cost, adaptability, richness and velocity offer an attractive patch for information-hungry intelligence organizations.
The rise of commercially sourced intelligence (CSINT) has significant implications for both privacy and cybersecurity. As a small and highly digitalized country in an increasingly volatile world, Norway must both harness the benefits of CSINT, and defend against its misuse. To do so, we must build a bridge between the technological trends that drive these developments, and the impacts of CSINT on democratic legitimacy and accountability.
For Sikkerhetsfestivalen we will also discuss new (unpublished) research on how commercial sources may be tampered with or sabotaged
Tuesday 11:30 - 12:00 | Kulturhuset, Holbøsalen
DevSecOps: Easier Said than Done
Nora Bodin & Anna Hovd Beruldsen
Development happens fast, sometimes at the expense of security. DevSecOps is without a doubt a good idea, but what should you watch out for to actually succeed with the automated tools you introduce into your development process? We’ll share our experiences from real-world cases and offer practical advice for reducing both technical and human risk in an automated development workflow. Is it possible to find something that makes both development and security happy?
Wednesday 09:00 - 09:30 | Frimurerlosjen, Rom 1
Are you going to Sikkerhetsfestivalen? The mnemonic Running Club is once again featured as a side event at Sikkerhetsfestivalen 2025, and we'd love to have you join us!
Don’t miss out — we’ve got a limited number of premium mnemonic Running Club t-shirts to hand out to participants!
August 26th: meet-up at Lillehammer Bakeri, at 07:00
https://www.sikkerhetsfestivalen.no/side-eventer