SIG-ISM Meeting

(Timezone - UTC)
(Trondheim, Norway)
Trondheim, Norway

Face to face spring meeting for SIG-ISM members and others interested in Information Security Management for Research & Education.

The main topics in this meeting are:

  • International projects and collaborations (Alf Moens)
  • Risk and Threat landscape (Nicole Harris, Rolf Sture Normann)
  • Preparing for NIS2 (Alf Moens)
  • Sharing agreements for Cyber Threat Intelligence (Roderick Mooi)
  • AI - Security Observations: CHATgpt (Asbjørn Thorsen - CISO, SIKT)

Remote participation options will be available. Please indicate with your registration if you want to participate in person or online.

You can find access information and videolinks on the wiki page:

More info is available on:

  • Elias Dürr
  • Joe Pitt
  • +29
  • Wednesday, May 3
    • 1:30 PM 2:00 PM
      Welcome and introductions 30m

      Alf Moens (GÉANT ) and Rolf Sture Normann (SIKT)

      Speakers: Alf Moens, Rolf Sture Normann
    • 2:00 PM 3:30 PM
      Current Risk and Threat landscape 1h 30m
      Speaker: David Heed
    • 3:30 PM 5:00 PM
      NIS2: state of affairs and how to prepare 1h 30m

      The Security Union will keep us busy in the coming years: NIS2, CER, CRA and the uncertainty about the way they will be implemented in every member state and affiliate states. One thing is certain: There will hardly be any surprises for the security requirements.

      Prepare for NIS2 with the GÉANT Security baseline and pick your choice of international security standards.

      Speakers: Vladislav Bidikov (MARNET / UKIM), Dr Šarūnas Grigaliūnas (LITNET)
    • 5:00 PM 5:10 PM
      Summary of the day; evening programme 10m

      Evening programme will be disclosed.

      Speakers: Alf Moens, Rolf Sture Normann
    • 9:00 AM 9:30 AM
      Welcome and Coffee 30m
    • 9:30 AM 10:30 AM
      Security Intelligence Operations 1h

      Roderick will talk with you about "Sharing agreements for Cyber Threat Intelligence"

      Speaker: Roderick Mooi (GÉANT)
    • 10:30 AM 11:30 AM
      "Successful Security Operations​" 1h

      Security operations should be an essential part of any organization's cyber defense. But making them work efficiently and effectively is a hard challenge. This talk shares operating models and lessons learned from over 20 years running successful security operations ourselves and helping others in their design and set up. It covers the relationships between detection and response, the importance of prevention, different ways to leverage threat intelligence and threat hunting, and how to shape constructive collaboration with IT and management.

      Speaker: Christo Butcher (Fox IT/NCC group)
    • 11:30 AM 12:30 PM
      AI - Security Observations: CHATgpt 1h
      Speaker: Asbjørn Thorsen (CISO @ SIKT)
    • 12:30 PM 12:45 PM
      Summary, lunch and farewells 15m