Mar 26, 2026
Online
09:00 - 09:30

NetTalk: The Intelligent Network

Strategic level discussion Webinar

One of the highlights of this webinar is a practical case example drawn from real-world implementation. We will demonstrate how an Intelligent Network architecture — built on Zero Trust principles, automated security, and compliance by design — has been successfully deployed in complex environments.

How many of you have woken up at 3 a.m. because a critical vulnerability was discovered?

NetTalk: This webinar is about how to sleep at night — not because threats disappear, but because your network is designed to handle them.

Audience: CTOs, CIOs, IT Directors

Format: 25 minutes + Q&A

Speakers: Erik Hovstad, Director Product & Architecture, Network and Erik Ramstad, Head of Network, Infrastructure & Cybersecurity.

About the webinar

Modern networks are no longer just infrastructure. They are control systems, security platforms, and compliance engines — all at once. The network is the heart of the operations, and the critcal plattform for your growth and success.

In this session, we focus on three practical pillars of the Intelligent Network:

  • Zero Trust architecture – what it really means in practice.
  • Automated security – eliminating manual patch cycles.
  • Compliance by design – NIS2-ready from day one.

Why Attend?

  • Expert Insights: Gain valuable knowledge from our network experts as they share their insight and practical solutions.
  • Practical approach: We understand your operations and need for control and insight in your network operations.
  • Network Security Tips: Learn the best practices to secure your network and ensure compliance with the latest regulations.

Don’t miss out! Joins us for in-depth discussions on:

1. Zero Trust – beyond the concept

Zero Trust is not “trust but verify.” It is never trust, always verify.

We will walk through how Zero Trust architecture is structured, and how segmentation, identity-based access, and continuous verification reduce lateral movement and risk exposure.

We break down the three core principles:

  • Assume breach
  • Verify explicitly
  • Enforce least privilege

In practical terms: Even if your laptop sits inside your office network, you authenticate and authorize every time you access a resource. Think of it as showing ID every time you enter a new room — even if you already have access to the building.

2. Automated security – closing the window of vulnerability

Manual patching creates exposure windows.
Threat actors do not wait for maintenance windows.

We demonstrate how automated, zero-touch patching reduces risk without downtime — and without overloading internal IT teams.

3. Compliance by design – not as an afterthought

You cannot patch your way into compliance. It must be built into the architecture.

We provide a practical overview of:

  • What NIS2 requires at a structural level
  • How architecture choices impact compliance posture
  • Built-in reporting and documentation
  • Governance and risk visibility

Compliance by design means security controls, logging, segmentation, and documentation are integrated from day one — not retrofitted when regulators ask questions.

Sign Up Today!

Don’t miss this opportunity to stay ahead of the curve and empower your business with the latest network intelligence. Register now and secure your spot!

Erik Ramstad
Featuring

Erik Ramstad

Head of Network, Infrastructure & Cybersecurity
Erik Hovstad
Featuring

Erik Hovstad

Director Product & Architecture, Network

When and where?

Online

Date: 26 of March 2025

Time: 09.00

Location: Webinar

Sign Up Now

Click the link to sign up for the webinar and secure your spot. Don’t miss this opportunity to stay ahead in the ever-evolving world of network services!

NetNordic-NetTalk-30-min-Webinar
Location

Online

Webinar

Our newsletter

Latest news and updates directly to your inbox.