IT & Operations
IT administrators and operations teams managing infrastructure and security.
You manage the infrastructure Norway depends on. When ministers call for exit strategies, you're the one who knows where every dependency lives. Map your systems, document your providers, and build the resilience that keeps critical services running — no matter what happens in Washington.
ONE Conference 2026
Europe's prime cybersecurity event organized by the Dutch National Cyber Security Centre. Leading platform for sharing knowledge, best practices, and research on technical security, law enforcement, governance, and public-private partnerships.
NDC Oslo 2026
Major 5-day software developer conference with 160+ sessions, 150 speakers, and 12 workshops covering modern development practices, architecture, security, and emerging technologies.
Security Festival 2026
Norway's largest gathering for cybersecurity and information security professionals, with high relevance for total defence and NIS2 compliance.
CyCon 2026
NATO CCDCOE's premier multidisciplinary conference examining technical, legal, policy, strategic, and military dimensions of cyber defence. Brings together global experts on cyber conflict and security.
Oslo Tech Show 2026
Nordic region's leading exhibition for innovation and technology, featuring AI, cybersecurity, cloud, DevOps, mobile, infrastructure, and datacenters. Free entry with world-class speakers and hands-on demos.
Total Defence Cybersecurity Conference 2026
Conference focused on cybersecurity, digital sovereignty, and total defence. Arena for exploring how totalforsvaret can be strengthened through open dialogue, expert deep-dives, and political perspectives.
NFEA Cyber Security 2026
Conference on industrial and operational technology (OT) cybersecurity, featuring practical examples of incident handling, international standards, and best practices for securing critical infrastructure.
CYBERUK 2026
UK National Cyber Security Centre's flagship conference marking NCSC's 10th anniversary. Theme: 'The Next Decade: Accelerating Our Cyber Defence' - exploring future defence strategies, resilience, and emerging threats.
Datasenterdagen 2026
Annual datacenter conference exploring hybrid cloud, security, infrastructure, and Norway's role in sustainable data management amid international uncertainty and climate challenges.
NDC Security 2026
Security conference for software developers featuring 60+ sessions, workshops, and presentations on application security, DevSecOps, and secure coding practices.
Datacenter Forum Oslo 2026
The 12th annual edition of Datacenter Forum Oslo, bringing together professionals from the datacenter sector to discuss infrastructure, sustainability, and digital transformation.
HackCon #21
The Norwegian Cyber Security Convention. Norway's premier IT security conference for technical and strategic security professionals, featuring over 1600 presentations on vulnerabilities, research, and best practices.

From ARPANET to Amazon: How We Broke the Internet's Original Promise
The internet was built to survive nuclear war. We've since made it vulnerable to fishing trawlers and policy changes in Washington. The same architecture designed for resilience has been recentralized - and Russia is already testing our cables.

Take Control: How You Can Protect Your Digital Life and Help Norway Stay Sovereign
You have the power to protect yourself from being locked out of your own computer. Small steps toward open standards create personal insurance and national sovereignty.

From Hyperscaler to Local: Why Norwegian Organizations Are Rethinking Cloud Strategy
The geopatriation trend - moving from US hyperscalers to local cloud providers for sovereignty, security, and control.

EU Launches €180 Million Sovereign Cloud Initiative
The European Commission commits major funding to reduce dependence on US hyperscalers

SecureNet
Remote workers are prime targets for state-sponsored attacks. SecureNet ensures that even if a developer's laptop is compromised, attackers cannot pivot into your critical infrastructure - essential protection against foreign cyber operations targeting your organization.

Norway's Digitalisation Minister: All Organizations Need a Cloud Exit Strategy
Minister Karianne Tung urges Norwegian organizations to prepare contingency plans for US cloud providers

EU Cloud Sovereignty Framework
Understanding the European Commission's framework for measuring and achieving cloud sovereignty

sovdev-logger
Application telemetry often flows to foreign cloud providers, exposing operational patterns and sensitive metadata. sovdev-logger works with self-hosted backends like Grafana and Loki, keeping your observability data under your control and jurisdiction.

Totalberedskapsmeldingen 2025
Norwegian Government's comprehensive national preparedness strategy covering civil-military cooperation, digital resilience, and societal security

Software Database
Every foreign SaaS tool is a potential backdoor for extraterritorial data access. This database helps organizations identify European and open-source alternatives to reduce dependency on US Cloud Act-subject vendors and maintain data sovereignty.

Handbook on Data Protection in Humanitarian Action
The authoritative reference on data protection for humanitarian organisations, covering cloud services, biometrics, digital identity, and risk assessment frameworks

Norwegian Digital Sovereignty Index (NDSI)
What gets measured gets managed. NDSI provides a structured framework to assess your organization's sovereignty posture, identify vulnerabilities to foreign control, and track improvement over time - aligned with EU standards and Norwegian regulations.

DevContainer Toolbox
Cloud-based IDEs like GitHub Codespaces send your code through foreign infrastructure. DevContainer Toolbox provides the same convenience locally, keeping your source code and development activity within your own security perimeter.

Urbalurba Infrastructure
Cloud lock-in is sovereignty lock-in. Urbalurba provides identical infrastructure locally, on-premises, and in any cloud - giving you true portability and the freedom to move workloads to sovereign providers without rewriting applications.

Bifrost
You cannot secure what you cannot see. Bifrost maps your entire application landscape and data flows, revealing hidden dependencies on foreign services - the essential first step in any sovereignty assessment or migration planning.

DocuWrite
Cloud document services scan your content and may share data with foreign authorities. DocuWrite runs entirely locally, ensuring sensitive documentation never leaves your infrastructure - critical for classified, legal, or confidential materials.

Humanitarian Security in an Age of Uncertainty: The Intersection of Digital and Physical Risks
Practitioner guidance on integrating digital threats into security risk management

Safeguarding Humanitarian Organisations from Digital Threats
ICRC analysis of how cyber operations, data breaches, and disinformation cause real-world harm to humanitarian organisations

The Humanitarian Metadata Problem: 'Doing No Harm' in the Digital Era
Technical analysis of how metadata from telecommunications, messaging apps, cash transfers, and social media can endanger humanitarian beneficiaries and staff
Norwegian Digital Sovereignty Survey
Find out how dependent your organization is on foreign cloud providers
Software Risk Check
Check the sovereignty risk of your software tools
APPI
Japan's data protection law, substantially revised in 2020 and 2022 to strengthen protections and align with international standards.
CRA
EU regulation establishing mandatory cybersecurity requirements for products with digital elements sold in the EU market.
Cybersecurity Law
Chinese law establishing data localization requirements for critical infrastructure operators and security review processes.
Data Act
EU regulation establishing rules for data sharing, public sector access to private data, and cloud switching rights.
Data Localization Law
Russian law requiring personal data of Russian citizens to be stored on servers physically located within Russia.
Data Security Law
Chinese law establishing data classification, cross-border transfer controls, and government access for national security.
DORA
EU regulation establishing ICT risk management and digital resilience requirements for the financial sector.
DPDP Act
India's first comprehensive data protection law providing individual rights while maintaining broad government exemptions.
Ekomloven
Norwegian law regulating electronic communications networks, services, and lawful interception requirements.
ePrivacy Directive
EU directive protecting privacy in electronic communications, covering cookies, spam, and confidentiality of communications.
EU-US DPF
2023 adequacy decision enabling personal data transfers from EU to certified US companies, successor to invalidated Privacy Shield.
GDPR
EU regulation giving individuals control over their personal data with comprehensive rights and strong enforcement.
IT Act
Indian law enabling government interception, monitoring, and decryption of any computer resource in the interest of national security.
National Intelligence Law
Chinese law requiring all organizations and citizens to support, assist, and cooperate with state intelligence activities.
NIS2 Directive
EU directive mandating cybersecurity requirements for essential and important entities across critical sectors.
PIPA
South Korea's comprehensive data protection law with strong enforcement, individual rights, and strict cross-border transfer requirements.
PIPEDA
Canada's federal privacy law for commercial activities, establishing fair information principles for private sector data handling.
PIPL
China's comprehensive personal data protection law providing GDPR-like rights while operating alongside state access requirements.
Privacy Act 2020
New Zealand's modernized privacy law strengthening individual rights, requiring breach notification, and enhancing enforcement powers.
Schrems II
Landmark 2020 CJEU ruling that invalidated EU-US Privacy Shield and imposed strict requirements for international data transfers.
SORM
Russian system requiring all telecommunications providers to install FSB-accessible surveillance backdoors.
Yarovaya Law
Russian anti-terrorism law requiring communications data retention for 6 months and mandatory assistance with decryption.