May 28, 2026
Webcast
09:00 - 10:00

CyberTalk 2026: From Assumption to Evidence

Sign Up
Days
Hours
Minutes
Seconds
Strategic level discussion Webinar

In penetration tests, it is almost always possible to gain access to an IT environment.

The key question, therefore, is not whether it is possible – but rather what needs the most protection, where there are entry points and which risks that exist – how to get the most value out of your security tests.

Don’t be the Catch of the Day
Don’t assume. Audit for clarity. Pentest for proof.

How Organizations Derive Value from Their Penetration Tests

Welcome to CyberTalk!

Many organizations want to rigorously test their IT, but often fall into one or more pitfalls instead of validating their security. Results and interpretations of flawed security validation tests can, unfortunately, lead to a false sense of security and incorrect assumptions about the organization’s level of security. CyberTalk 2026: From Assumption to Evidence addresses these very pitfalls.

This year’s CyberTalk episode is a one-hour webcast from our studio, intended for analysts, decision-makers, and everyone working to keep IT environments accessible and secure. We talk about how organizations can move from assumption to clarity; how important it is to have an evidence-based idea of the security situation and an understanding of where the weaknesses lie and how they should be addressed.

This episode focuses on one of the most current topics in cybersecurity today:

Security validation and penetration testing.

Understanding how attackers gain access to an environment and being able to act on that information is crucial for effective security work. Penetration testing is not a new concept, but the subject is complex and more relevant than ever.

CyberTalk 2026: From Assumption to Evidence
addresses these common mistakes:

  • 1. That compliance equals safety.
  • 2. Confusing vulnerability scanning with penetration testing.
  • 3. Undefined scope for penetration testing and security validation.
  • 4. Considering penetration testing a one-time activity.
  • 5. Testing for technical vulnerabilities but not other attack vectors.
  • 6. Investing in tools but not validating if they work together.

The conversations in the CyberTalk studio are based on the points above – some of the most common pitfalls associated with security testing. By understanding why organizations fail in their security validation, the path to success becomes easier to outline. The discussion is product neutral and is conducted in Swedish/Norwegian, with subtitles available.

In the studio, we meet guests who work daily with these issues from different perspectives with different methodologies: Eirik Hole and Björn Björkman. With the panel’s different areas of expertise on security validation and penetration testing, we promise interesting dialogues on how they each believe security tests best should be planned, conducted, as well as converted into organizational improvements. The talk draws on Eirik’s and Björn’s experiences from organizations and IT environments, involve different prerequisites, conditions and efforts.

Featuring

Jonas Åström

Professional Services Security Consultant: Jonas is a cybersecurity consultant with extensive experience across a wide range of environments, solutions, and challenges.
Featuring

Eirik Hole

Lead Consultant, Offensive Security: Eirik is a manual penetration tester who knows what it’s like to gain access to environments and use human skills to bypass security layers.
Featuring

Björn Björkman

Senior Security Solution Advisor: Björn works with automated penetration tests and digital tools that continuously validate security.

In CyberTalk, we dive deep into the most pressing cybersecurity issues. This episode is no exception, as we take an in-depth look at one of the industry’s hottest topics in 2026. Sign up now!

Don’t be the Catch of the Day

Don’t assume. Audit for clarity. Pentest for proof.

When and where?

Webcast

Date: May 28.

Time: 9.00–10.00 a.m.

Where to watch: Online in a web browser.

Sign Up Now

Sign up to receive more information on how to watch the webcast. Please use the form below to register.

CyberTalk_image 19
Location

Webcast

Online

Our newsletter

Latest news and updates directly to your inbox.