Department director from the National Security Authority comes to visit!

In a time of increased uncertainty and a complex and unclear threat landscape against both public and private enterprises, knowledge of how best to protect oneself is important. Frode's long experience from the Armed Forces, the Foreign Service, the Intelligence Service and the National Security Authority means that he has many good perspectives on how you are affected by this and how to create robust systems to protect yourself.

The lecture will be divided into two parts:
Insiders and academic freedom: The insider threat in academia represents a serious and often overlooked risk that can have major implications for research, security and the overall integrity of educational institutions. While universities and colleges are known for fostering an environment of openness and knowledge sharing, this welcoming atmosphere can unfortunately also attract those with hidden agendas. There are many examples of foreign states actively working to infiltrate communities in the knowledge sector. The aim is to exploit insiders - such as administrative staff, researchers, and students - to obtain sensitive information or manipulate research results. These insiders operate under the radar, often without raising suspicion, because they are part of the organization and enjoy the trust of their colleagues and superiors. In fact, research indicates that a third of all businesses have experienced an insider threat, highlighting how difficult it can be to identify and manage these threats effectively. Therefore, identifying strategies and concrete measures to prevent and manage insider threats is key to ensuring that academic institutions can continue to be bastions of research and innovation, without being compromised by those with malicious intent.

Social engineering - "from fake to deepfake"
Social engineering or human information fraud gives state actors and criminal organizations access to assets such as trade secrets, personal data and information about IT systems. The vast majority of fraudsters play on fear, trust or temptation and exploit our emotions. They use human contact and social skills to obtain information.

The lecture will cover the most common methods and what you can do to reduce the risk of someone succeeding in deceiving you! The guest lectures are open to everyone - although they are aimed at the topics SIK2000 / SEC3001R

A warm welcome!

Time

Friday 26. Apr, 10:00 -

Where

E
Ringerike

People

100 pcs
Read more/register