In penetration tests, it is almost always possible to gain access to an IT environment.
The key question, therefore, is not whether it is possible – but rather what needs the most protection, where there are entry points and which risks that exist – how to get the most value out of your security tests.
Don’t be the Catch of the Day
Don’t assume. Audit for clarity. Pentest for proof.
How Organizations Derive Value from Their Penetration Tests
Welcome to CyberTalk!
Many organizations want to rigorously test their IT, but often fall into one or more pitfalls instead of validating their security. Results and interpretations of flawed security validation tests can, unfortunately, lead to a false sense of security and incorrect assumptions about the organization’s level of security. CyberTalk 2026: From Assumption to Evidence addresses these very pitfalls.
This year’s CyberTalk episode is a one-hour webcast from our studio, intended for analysts, decision-makers, and everyone working to keep IT environments accessible and secure. We talk about how organizations can move from assumption to clarity; how important it is to have an evidence-based idea of the security situation and an understanding of where the weaknesses lie and how they should be addressed.
This episode focuses on one of the most current topics in cybersecurity today:
Security validation and penetration testing.
Understanding how attackers gain access to an environment and being able to act on that information is crucial for effective security work. Penetration testing is not a new concept, but the subject is complex and more relevant than ever.
CyberTalk 2026: From Assumption to Evidence addresses these common mistakes:
1. That compliance equals safety.
2. Confusing vulnerability scanning with penetration testing.
3. Undefined scope for penetration testing and security validation.
4. Considering penetration testing a one-time activity.
5. Testing for technical vulnerabilities but not other attack vectors.
6. Investing in tools but not validating if they work together.
The conversations in the CyberTalk studio are based on the points above – some of the most common pitfalls associated with security testing. By understanding why organizations fail in their security validation, the path to success becomes easier to outline. The discussion is product neutral and is conducted in Swedish/Norwegian, with subtitles available.
In the studio, we meet guests who work daily with these issues from different perspectives with different methodologies: Eirik Hole and Björn Björkman. With the panel’s different areas of expertise on security validation and penetration testing, we promise interesting dialogues on how they each believe security tests best should be planned, conducted, as well as converted into organizational improvements. The talk draws on Eirik’s and Björn’s experiences from organizations and IT environments, involve different prerequisites, conditions and efforts.
Featuring
Jonas Åström
Professional Services Security Consultant: Jonas is a cybersecurity consultant with extensive experience across a wide range of environments, solutions, and challenges.
Featuring
Eirik Hole
Lead Consultant, Offensive Security: Eirik is a manual penetration tester who knows what it’s like to gain access to environments and use human skills to bypass security layers.
Featuring
Björn Björkman
Senior Security Solution Advisor: Björn works with automated penetration tests and digital tools that continuously validate security.
In CyberTalk, we dive deep into the most pressing cybersecurity issues. This episode is no exception, as we take an in-depth look at one of the industry’s hottest topics in 2026. Sign up now!
Don’t be the Catch of the Day
Don’t assume. Audit for clarity. Pentest for proof.
Add to calendar
Download this event to your calendar application.
The file will work with most calendar applications including:
Google Calendar
Apple Calendar
Microsoft Outlook
Other ICS-compatible applications
* Gmail:
Send the downloaded ICS-file as an attachment to your Gmail account and it will be added to your calendar automatically.