Skip to main content

IT & Operations

IT administrators and operations teams managing infrastructure and security.

55 items 5 Articles 12 Events 22 Laws 6 Publications

You manage the infrastructure Norway depends on. When ministers call for exit strategies, you're the one who knows where every dependency lives. Map your systems, document your providers, and build the resilience that keeps critical services running — no matter what happens in Washington.

Event

ONE Conference 2026

Oct 6, 2026 The Hague

Europe's prime cybersecurity event organized by the Dutch National Cyber Security Centre. Leading platform for sharing knowledge, best practices, and research on technical security, law enforcement, governance, and public-private partnerships.

Event

NDC Oslo 2026

Sep 14, 2026 Oslo

Major 5-day software developer conference with 160+ sessions, 150 speakers, and 12 workshops covering modern development practices, architecture, security, and emerging technologies.

Event

Security Festival 2026

Aug 24, 2026 Lillehammer

Norway's largest gathering for cybersecurity and information security professionals, with high relevance for total defence and NIS2 compliance.

Event

CyCon 2026

May 26, 2026 Tallinn

NATO CCDCOE's premier multidisciplinary conference examining technical, legal, policy, strategic, and military dimensions of cyber defence. Brings together global experts on cyber conflict and security.

Event

Oslo Tech Show 2026

May 6, 2026 Lillestrøm

Nordic region's leading exhibition for innovation and technology, featuring AI, cybersecurity, cloud, DevOps, mobile, infrastructure, and datacenters. Free entry with world-class speakers and hands-on demos.

Event

Total Defence Cybersecurity Conference 2026

May 6, 2026 Lillehammer

Conference focused on cybersecurity, digital sovereignty, and total defence. Arena for exploring how totalforsvaret can be strengthened through open dialogue, expert deep-dives, and political perspectives.

Event

NFEA Cyber Security 2026

Apr 22, 2026 Oslo

Conference on industrial and operational technology (OT) cybersecurity, featuring practical examples of incident handling, international standards, and best practices for securing critical infrastructure.

Event

CYBERUK 2026

Apr 21, 2026 Glasgow

UK National Cyber Security Centre's flagship conference marking NCSC's 10th anniversary. Theme: 'The Next Decade: Accelerating Our Cyber Defence' - exploring future defence strategies, resilience, and emerging threats.

Event

Datasenterdagen 2026

Apr 9, 2026 Oslo

Annual datacenter conference exploring hybrid cloud, security, infrastructure, and Norway's role in sustainable data management amid international uncertainty and climate challenges.

Event

NDC Security 2026

Mar 2, 2026 Oslo

Security conference for software developers featuring 60+ sessions, workshops, and presentations on application security, DevSecOps, and secure coding practices.

Event

Datacenter Forum Oslo 2026

Feb 26, 2026 Oslo

The 12th annual edition of Datacenter Forum Oslo, bringing together professionals from the datacenter sector to discuss infrastructure, sustainability, and digital transformation.

Event

HackCon #21

Feb 11, 2026 Oslo

The Norwegian Cyber Security Convention. Norway's premier IT security conference for technical and strategic security professionals, featuring over 1600 presentations on vulnerabilities, research, and best practices.

From ARPANET to Amazon: How We Broke the Internet's Original Promise
Article

From ARPANET to Amazon: How We Broke the Internet's Original Promise

Dec 25, 2025 3 min read

The internet was built to survive nuclear war. We've since made it vulnerable to fishing trawlers and policy changes in Washington. The same architecture designed for resilience has been recentralized - and Russia is already testing our cables.

Take Control: How You Can Protect Your Digital Life and Help Norway Stay Sovereign
Article

Take Control: How You Can Protect Your Digital Life and Help Norway Stay Sovereign

Dec 12, 2025 10 min read

You have the power to protect yourself from being locked out of your own computer. Small steps toward open standards create personal insurance and national sovereignty.

From Hyperscaler to Local: Why Norwegian Organizations Are Rethinking Cloud Strategy
Article

From Hyperscaler to Local: Why Norwegian Organizations Are Rethinking Cloud Strategy

Dec 8, 2025 7 min read

The geopatriation trend - moving from US hyperscalers to local cloud providers for sovereignty, security, and control.

EU Launches €180 Million Sovereign Cloud Initiative
Article

EU Launches €180 Million Sovereign Cloud Initiative

Dec 3, 2025 3 min read

The European Commission commits major funding to reduce dependence on US hyperscalers

SecureNet
Sovereignsky

SecureNet

Dec 1, 2025

Remote workers are prime targets for state-sponsored attacks. SecureNet ensures that even if a developer's laptop is compromised, attackers cannot pivot into your critical infrastructure - essential protection against foreign cyber operations targeting your organization.

Norway's Digitalisation Minister: All Organizations Need a Cloud Exit Strategy
Article

Norway's Digitalisation Minister: All Organizations Need a Cloud Exit Strategy

Dec 1, 2025 3 min read

Minister Karianne Tung urges Norwegian organizations to prepare contingency plans for US cloud providers

EU Cloud Sovereignty Framework
Publication

EU Cloud Sovereignty Framework

Jan 15, 2025

Understanding the European Commission's framework for measuring and achieving cloud sovereignty

sovdev-logger
Sovereignsky

sovdev-logger

Jan 1, 2025

Application telemetry often flows to foreign cloud providers, exposing operational patterns and sensitive metadata. sovdev-logger works with self-hosted backends like Grafana and Loki, keeping your observability data under your control and jurisdiction.

Totalberedskapsmeldingen 2025
Publication

Totalberedskapsmeldingen 2025

Jan 1, 2025

Norwegian Government's comprehensive national preparedness strategy covering civil-military cooperation, digital resilience, and societal security

Software Database
Sovereignsky

Software Database

Dec 1, 2024

Every foreign SaaS tool is a potential backdoor for extraterritorial data access. This database helps organizations identify European and open-source alternatives to reduce dependency on US Cloud Act-subject vendors and maintain data sovereignty.

Handbook on Data Protection in Humanitarian Action
Publication

Handbook on Data Protection in Humanitarian Action

Jan 15, 2024

The authoritative reference on data protection for humanitarian organisations, covering cloud services, biometrics, digital identity, and risk assessment frameworks

Norwegian Digital Sovereignty Index (NDSI)
Sovereignsky

Norwegian Digital Sovereignty Index (NDSI)

Jan 1, 2024

What gets measured gets managed. NDSI provides a structured framework to assess your organization's sovereignty posture, identify vulnerabilities to foreign control, and track improvement over time - aligned with EU standards and Norwegian regulations.

DevContainer Toolbox
Sovereignsky

DevContainer Toolbox

Jan 1, 2024

Cloud-based IDEs like GitHub Codespaces send your code through foreign infrastructure. DevContainer Toolbox provides the same convenience locally, keeping your source code and development activity within your own security perimeter.

Urbalurba Infrastructure
Sovereignsky

Urbalurba Infrastructure

Jan 1, 2024

Cloud lock-in is sovereignty lock-in. Urbalurba provides identical infrastructure locally, on-premises, and in any cloud - giving you true portability and the freedom to move workloads to sovereign providers without rewriting applications.

Bifrost
Sovereignsky

Bifrost

Jan 1, 2024

You cannot secure what you cannot see. Bifrost maps your entire application landscape and data flows, revealing hidden dependencies on foreign services - the essential first step in any sovereignty assessment or migration planning.

DocuWrite
Sovereignsky

DocuWrite

Jan 1, 2024

Cloud document services scan your content and may share data with foreign authorities. DocuWrite runs entirely locally, ensuring sensitive documentation never leaves your infrastructure - critical for classified, legal, or confidential materials.

Humanitarian Security in an Age of Uncertainty: The Intersection of Digital and Physical Risks
Publication

Humanitarian Security in an Age of Uncertainty: The Intersection of Digital and Physical Risks

Jan 1, 2024

Practitioner guidance on integrating digital threats into security risk management

Safeguarding Humanitarian Organisations from Digital Threats
Publication

Safeguarding Humanitarian Organisations from Digital Threats

Oct 13, 2022

ICRC analysis of how cyber operations, data breaches, and disinformation cause real-world harm to humanitarian organisations

The Humanitarian Metadata Problem: 'Doing No Harm' in the Digital Era
Publication

The Humanitarian Metadata Problem: 'Doing No Harm' in the Digital Era

Nov 1, 2020

Technical analysis of how metadata from telecommunications, messaging apps, cash transfers, and social media can endanger humanitarian beneficiaries and staff

Sovereignsky

Norwegian Digital Sovereignty Survey

Find out how dependent your organization is on foreign cloud providers

Sovereignsky

Software Risk Check

Check the sovereignty risk of your software tools

Law

APPI

Act on the Protection of Personal Information (2003)

Japan's data protection law, substantially revised in 2020 and 2022 to strengthen protections and align with international standards.

🛡️ Privacy Laws
Law

CRA

Cyber Resilience Act (2024)

EU regulation establishing mandatory cybersecurity requirements for products with digital elements sold in the EU market.

🔒 Security Laws
Law

Cybersecurity Law

Cybersecurity Law of the People's Republic of China (2017)

Chinese law establishing data localization requirements for critical infrastructure operators and security review processes.

📍 Localization Laws
Law

Data Act

Regulation on harmonised rules on fair access to and use of data (2024)

EU regulation establishing rules for data sharing, public sector access to private data, and cloud switching rights.

📋 Sector-Specific Laws
Law

Data Localization Law

Federal Law No. 242-FZ on Personal Data Localization (2015)

Russian law requiring personal data of Russian citizens to be stored on servers physically located within Russia.

📍 Localization Laws
Law

Data Security Law

Data Security Law of the People's Republic of China (2021)

Chinese law establishing data classification, cross-border transfer controls, and government access for national security.

🔓 Access Laws
Law

DORA

Digital Operational Resilience Act (2025)

EU regulation establishing ICT risk management and digital resilience requirements for the financial sector.

📋 Sector-Specific Laws
Law

DPDP Act

Digital Personal Data Protection Act 2023 (2023)

India's first comprehensive data protection law providing individual rights while maintaining broad government exemptions.

🛡️ Privacy Laws
Law

Ekomloven

Lov om elektronisk kommunikasjon (Electronic Communications Act) (2003)

Norwegian law regulating electronic communications networks, services, and lawful interception requirements.

📋 Sector-Specific Laws
Law

ePrivacy Directive

Directive on privacy and electronic communications (2002)

EU directive protecting privacy in electronic communications, covering cookies, spam, and confidentiality of communications.

🛡️ Privacy Laws
Law

EU-US DPF

EU-US Data Privacy Framework (2023)

2023 adequacy decision enabling personal data transfers from EU to certified US companies, successor to invalidated Privacy Shield.

🛡️ Privacy Laws
Law

GDPR

General Data Protection Regulation (2018)

EU regulation giving individuals control over their personal data with comprehensive rights and strong enforcement.

🛡️ Privacy Laws
Law

IT Act

Information Technology Act 2000 (2000)

Indian law enabling government interception, monitoring, and decryption of any computer resource in the interest of national security.

🔓 Access Laws
Law

National Intelligence Law

National Intelligence Law of the People's Republic of China (2017)

Chinese law requiring all organizations and citizens to support, assist, and cooperate with state intelligence activities.

🔓 Access Laws
Law

NIS2 Directive

Directive on measures for a high common level of cybersecurity across the Union (2024)

EU directive mandating cybersecurity requirements for essential and important entities across critical sectors.

🔒 Security Laws
Law

PIPA

Personal Information Protection Act (2011)

South Korea's comprehensive data protection law with strong enforcement, individual rights, and strict cross-border transfer requirements.

🛡️ Privacy Laws
Law

PIPEDA

Personal Information Protection and Electronic Documents Act (2000)

Canada's federal privacy law for commercial activities, establishing fair information principles for private sector data handling.

🛡️ Privacy Laws
Law

PIPL

Personal Information Protection Law (2021)

China's comprehensive personal data protection law providing GDPR-like rights while operating alongside state access requirements.

🛡️ Privacy Laws
Law

Privacy Act 2020

Privacy Act 2020 (2020)

New Zealand's modernized privacy law strengthening individual rights, requiring breach notification, and enhancing enforcement powers.

🛡️ Privacy Laws
Law

Schrems II

Data Protection Commissioner v Facebook Ireland Limited and Maximillian Schrems (Case C-311/18) (2020)

Landmark 2020 CJEU ruling that invalidated EU-US Privacy Shield and imposed strict requirements for international data transfers.

🛡️ Privacy Laws
Law

SORM

System for Operative Investigative Activities (1995)

Russian system requiring all telecommunications providers to install FSB-accessible surveillance backdoors.

👁️ Surveillance Laws
Law

Yarovaya Law

Yarovaya Law (Federal Law No. 374-FZ) (2016)

Russian anti-terrorism law requiring communications data retention for 6 months and mandatory assistance with decryption.

👁️ Surveillance Laws