Find a Track:

Jump to:

  • Main Track (Auditorium A1) – 08:30–16:30Keynotes and expert talks on red/blue teaming, DFIR, and threat intelligence.
  • Badge Track (Auditorium A2) – 09:00–10:00Hardware hacking and electronics demos. Great for hands-on enthusiasts.
  • Rookie Track (Auditorium A2) – 10:30–14:20  Student and first time speakers on DFIR, malware analysis, and early-career research.

Main Track Schedule :

Venue: Auditorium A1

Time Session
08:00 Badge Pickup and Registration
08:20 Conference Opening
08:30 Opening Keynote – An Investigative Mindset, the Key to Success

Shaun Reardon

09:00 It’s Game Over, Man – How to Train Your Blue Team

Paul Svenning

09:30 On the Receiving End of TIBER: A Reformed Red Teamer’s Perspective

Eirik Sveen

10:00 Break
10:30 Hardware Hacking and Methodology
Chris Dale
11:00 EDR Evasion 101: in a professional hacker Red Team

André Lima

11:30 Shellcode: what it is and why it’s loved by cybercriminals

Trym Skilleås

12:00 Lunch
13:00 Games as a Tool for Securing Your Apps

Johan Sydseter

13:30 Malware Analysis with r2ai

Axelle Apvrille

14:00 CTI Acquisition with the Cloud Telescope

Fabricio Bortoluzzi

14:30 Break
15:00 Life on the Line: Exploiting TEE/HSM

Tamil Mathi

15:30 Cybersecurity Incidents as Secondary Causes of Death

Jorge Acevedo Canabal & Janine Medina

16:00 Closing Keynote – History of EPT & Equinor CTF

Eirik Nordbø & Rune Johansen

 

16:30 Conference Close
17:00 Venue Closure

Badge Track :

Venue: Auditorium A2

Time Badge Track
09:00 Unveiling the BSides Kristiansand Badge
Solasec.io
09:30 Tinker with your badge

Rookie Track:

Venue: Auditorium A2

Time Rookie Track
10:00 Break
10:30 How hunting for an attack surface led me to the front door of a wind turbine
Knut Erik Hollund
11:00 A Comparative Case Study of a Cloud-Native Telescope
Christian Berglund
11:30 Re-evaluating Jailbreak Detection in Banking Applications
Muhammad Irfan
12:00 Lunch
13:00 Blue Team Needs to Succeed Every Time — and Other Lies We Tell Ourselves
Jarkko Kinnunen
13:20 Ransomware Detection Based on Comparative Hybridised Analysis
Alida Øvermo-Mortensen
13:40 A Comprehensive Hybrid Analysis of Ransomware Behaviour
Daniel Dahl
14:00 Building Confidence in DFIR: Investigative Strategies for Better Decisions
Tony Knutson
14:20 Break