One of the highlights of this webinar is a practical case example drawn from real-world implementation. We will demonstrate how an Intelligent Network architecture — built on Zero Trust principles, automated security, and compliance by design — has been successfully deployed in complex environments.
How many of you have woken up at 3 a.m. because a critical vulnerability was discovered?
NetTalk: This webinar is about how to sleep at night — not because threats disappear, but because your network is designed to handle them.
Audience: CTOs, CIOs, IT Directors
Format: 25 minutes + Q&A
Speakers: Erik Hovstad, Director Product & Architecture, Network and Erik Ramstad, Head of Network, Infrastructure & Cybersecurity.
About the webinar
Modern networks are no longer just infrastructure. They are control systems, security platforms, and compliance engines — all at once. The network is the heart of the operations, and the critcal plattform for your growth and success.
In this session, we focus on three practical pillars of the Intelligent Network:
Zero Trust architecture – what it really means in practice.
Expert Insights: Gain valuable knowledge from our network experts as they share their insight and practical solutions.
Practical approach: We understand your operations and need for control and insight in your network operations.
Network Security Tips: Learn the best practices to secure your network and ensure compliance with the latest regulations.
Don’t miss out! Joins us for in-depth discussions on:
1. Zero Trust – beyond the concept
Zero Trust is not “trust but verify.” It is never trust, always verify.
We will walk through how Zero Trust architecture is structured, and how segmentation, identity-based access, and continuous verification reduce lateral movement and risk exposure.
We break down the three core principles:
Assume breach
Verify explicitly
Enforce least privilege
In practical terms: Even if your laptop sits inside your office network, you authenticate and authorize every time you access a resource. Think of it as showing ID every time you enter a new room — even if you already have access to the building.
2. Automated security – closing the window of vulnerability
Manual patching creates exposure windows. Threat actors do not wait for maintenance windows.
We demonstrate how automated, zero-touch patching reduces risk without downtime — and without overloading internal IT teams.
3. Compliance by design – not as an afterthought
You cannot patch your way into compliance. It must be built into the architecture.
We provide a practical overview of:
What NIS2 requires at a structural level
How architecture choices impact compliance posture
Built-in reporting and documentation
Governance and risk visibility
Compliance by design means security controls, logging, segmentation, and documentation are integrated from day one — not retrofitted when regulators ask questions.
Sign Up Today!
Don’t miss this opportunity to stay ahead of the curve and empower your business with the latest network intelligence. Register now and secure your spot!
Featuring
Erik Ramstad
Head of Network, Infrastructure & Cybersecurity
Featuring
Erik Hovstad
Director Product & Architecture, Network
Add to calendar
Download this event to your calendar application.
The file will work with most calendar applications including:
Google Calendar
Apple Calendar
Microsoft Outlook
Other ICS-compatible applications
* Gmail:
Send the downloaded ICS-file as an attachment to your Gmail account and it will be added to your calendar automatically.
Click the link to sign up for the webinar and secure your spot. Don’t miss this opportunity to stay ahead in the ever-evolving world of network services!