Knowledge sharing

We believe knowledge sharing is vital to increase the domain knowledge within cyber security while also challenging our own opinions and established practices. The format of our knowledge sharing varies in different formats and technical depth, from our podcast and video blog, to technical content on securing cloud and managing risk.

Our consultants are experienced public speakers and lecturers. You may inquire for a private presentation or workshop.

Post image
Article
Azure VM Persistence Using Bastion Shareable Links

Earlier this week, Microsoft announced the public preview of Shareable Links in Azure Bastion. We decided to look closely at the potential for feature abuse and opportunities for prevention and detection.

Read article ->
Post image
Podcast
S03E16 - CISO i 2022 med Stig Torsbakken (Storebrand) og Eirik Thormodsrud (Møller Mobility Group)

Beskrivelse: I sekstende episode av sesong tre snakker vi med Stig Torsbakken (Storebrand) og Eirik Thormodsrud (Møller) om hvordan det er å være CISO i 2022, ulike typer CISOer, hvor CISO rollen bør være plassert i organisasjonen, utfordringer, med mer.  Level: 100 Kilder som nevnes/anbefales:  – https://www.o3c.no/ Medvirkende:  - Olav Østbye, O3 CYBER  - Karim El-Melhaoui, O3 CYBER - Stig Torsbakken, Storebrand - Eirik Thormodsrud, Møller Mobility Group  Følg oss!  – https://www.linkedin.com/company/O3CYBER – https://twitter.com/O3CYBER – https://www.youtube.com/channel/UCioc25HRY1lSqXcwloFvIyA  Ris og ros? Gi oss gjerne en tilbakemelding, både positive og forbedringspotensiale. Dette kan du gjøre via kontakt oss på nettsiden vår, O3C.no Forslag til nye episoder? Skulle du ha noen ønsker/forslag til nye episoder så ta gjerne kontakt med oss med oss via nettsiden vår, O3C.no

Listen to episode
Post image
Article
ISMS challenges, and how you can solve them

In this article, we'd like to help you understand what an Information Security Management System (ISMS) is, what challenges we usually see with ISMS in organizations, and how you should implement and operationalize an ISMS today.

Read article ->
Post image
Article
Uncovering Cloud Risks

In our previous article, we touched upon risks related to cloud computing, cultural transformation, and compensating controls. This article is written with examples for Microsoft Azure and seeks to educate on what an accurate Cloud Security Assessment should offer to provide value. In reality, most organizations we engage with that have moved to the cloud are operating with risks, often introduced in the early stages before knowledge of the best practice and pitfalls. How can we help organizations identify these risks and provide actionable remediation guidance?

Read article ->
Post image
Article
Building a security team for the Cloud

Whether you have started thinking about transitioning to the cloud, are already on your way or have been ‘there’ for a while, how involved is your security team in the transformation? This article is inspired by the discussions from my session ‘10 lessons learned from 5 years in the cloud’, which focuses on the transformational challenges for security teams when it comes to adopting the cloud and, strategies for succeeding with building your security team for the cloud.

Read article ->
Post image
Video
Sikkerhetsmåneden

I denne episoden gir vi dere en god oppdatering på hva som skjer hos oss i sikkerhetsmåneden med "behind the scenes" på ...

View video