Sicra Header Logo
  • Careers
  • About us
  • People
EnglishNorsk
Talk to us
  1. Knowledge
  2. Insights
  3. Blog
Blog
05.12.2025
min read

Attack Conference 2025: Real threats and new regulations require action

The next cyberattacks against Norwegian businesses will not only be about stealing data or financial gains, but also operational shutdowns. This summarizes the main message from Attack 2025, Norway’s leading cybersecurity conference.

<span id="hs_cos_wrapper_name" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="text" >Attack Conference 2025: Real threats and new regulations require action</span>
Terje-Vatle-Sicra1
Terje VatleChief Innovation Officer
Terje Vatle is the Chief Innovation Officer (CIO) at Sicra. He is responsible for developing security products that are tailored to meet the needs of customers.

Digitalization and Public Governance Minister Karianne Oldernes Tung opened Attack 2025. She emphasized that Norway is in the most severe geopolitical situation since World War II. This increases the likelihood of destructive attacks against critical digital infrastructure. At the same time, the probability of profit-driven cyberattacks on businesses is also rising.

Attack 2025 brought together central security actors such as the Norwegian National Security Authority (NSM), the Directorate for Civil Protection (DSB), the Police Security Service (PST), Kripos, the Norwegian Cyber Security Center (NCSC), the Norwegian Defence Research Establishment (FFI), Cyber Defence, and the leading technology environments in cybersecurity.

A key theme was that Norway’s digital vulnerability is increasing in step with the digitalization of industry and critical infrastructure. The convergence between IT (information technology) and OT (operational technology) makes the threat landscape more complex than ever. At the same time, threat actors have become more skilled, have stronger tools such as artificial intelligence (AI), and there are more nation-state actors. This places greater demands on both public and private organizations, regardless of size.

Today’s digital threats

Because of the geopolitical situation, PST, NSM, Kripos, and other security authorities are warning about different cyberattacks targeting Norwegian organizations.


Authorities believe there is a high likelihood of:

  • Destructive cyberattacks.

  • Sabotage of digital or physical infrastructure.

  • Influence operations.

  • Organized crime becoming more professional and more targeted toward infrastructure — both OT (for example production systems) and IT through digital attacks for profit, such as ransomware.

  • Technically advanced online fraud aimed at individuals or organizations through their employees.

  • Intelligence operations, including mapping of physical and digital infrastructure and the placement of insiders.


The conference highlighted the following risk factors and trends:

  • Mobile phones: an underestimated risk

  • Information thieves: collecting as much information as possible without leaving traces

  • Access through login credentials

  • ClickFix and FakeUpdates: new forms of social engineering

  • QR codes, voice-phishing and cross-platform attacks

  • Attack-as-a-service: ready-made attack packages

  • Vulnerable supply chains and embedded malware

  • AI agents and automated fraud

  • Further personalization of attacks

IT and OT introduce new risks

The digitalization of industry, energy, water, healthcare, and transport brings major benefits — and new vulnerabilities. Systems originally developed to be isolated, such as controllers, sensors and control systems, are today connected to IT platforms. When IT and OT become more closely linked, a seemingly small incident in the IT environment can develop into a critical OT situation. Threat actors attempt to exploit weaknesses in these connections.


This creates two major challenges:

  1. A larger attack surface: OT systems become an entry point into an organization’s most critical systems.

  2. Greater consequences: A successful attack is no longer only about data. It can stop production, harm the environment, weaken national infrastructure, or put lives and health at risk.

Holistic security through leadership, monitoring, and expertise

Attack 2025 underlined what we at Sicra experience — that digital risk is increasing not only in IT systems but also in production environments, industrial systems and society-critical processes. With the merger of Sicra and Bluetree, we took a strategic step to address this development. We combine leadership, technology, monitoring and OT expertise to give organizations the security they need today. Many organizations have come far in IT security but lack the same level of maturity in OT.


To increase security, organizations must acknowledge that:

  • IT and OT can no longer be treated as two separate worlds.

  • The risk arises in the intersection between IT and OT.

Sicra’s security triangle is our method for building holistic security, from the boardroom to the server room and all the way out to industrial control systems. To create real digital security, organizations must handle security at several levels: strategic, operational, technical and industrial.


Sicra’s security triangle consists of three areas:


1. Security management/ CISO

Strategic security leadership supported by a full team of technical consultants and advisors. Sicra acts as an advisor and partner to the organization’s leadership.


2. Consultants with deep expertise in security, OT and infrastructure

This is Sicra’s professional foundation: advisors, architects and specialists in infrastructure, networking, cybersecurity and a strong, specialized OT security environment.

3. Operations Center – Network | Security Operations Center (NOC/SOC)

Sicra’s operational muscle: our operations center includes both the Network Operations Center (NOC) and the Security Operations Center (SOC).

  • NOC monitors and operates critical network services, infrastructure and platforms to ensure stability, performance and high availability.

  • SOC combines monitoring, response capability and forensic expertise to provide continuous protection, 24/7, where Sicra is the local security partner for Arctic Wolf. Our SOC is independent from the teams operating the infrastructure, avoiding conflicts of interest.

Attack 2025 made it clear that cybersecurity is about more than technology and isolated measures.


We need:

  • Shared situational awareness between IT and OT

  • Holistic risk management across technology, processes and value chains

  • Operational security that monitors both IT and OT environments

  • Competence that understands the connections

This is what Sicra works with every day: helping organizations modernize, secure and operate both IT and OT — as one coherent whole.

Need Assistance?

We are happy to have a non-binding conversation. 
Contact us

Explore more

Six steps that can save Norway from the next cyberattack
Blog

Six steps that can save Norway from the next cyberattack

Cybersecurity
OT
Network
Six steps that can protect Norway from cyberattacks on critical infrastructure.
Three days to attack: Why vulnerabilities must be closed faster
Blog

Three days to attack: Why vulnerabilities must be closed faster

Cybersecurity
CISO
Vulnerability
Vulnerabilities are exploited in 72 hours. Leadership must act faster.
Secure and user-friendly multi-factor authentication (MFA) is possible
Blog

Secure and user-friendly multi-factor authentication (MFA) is possible

Tech blog
Cybersecurity
Microsoft
How to achieve both secure and user-friendly multi-factor authentication.
Considering a Security Operations Center (SOC)? Here’s how to get the most for your money
Blog

Considering a Security Operations Center (SOC)? Here’s how to get the most for your money

How to achieve security, rapid response, and financial balance with Sicra SOC.

Stay updated
Receive the latest news

Links
SustainabilityFAQPartnersCertifications and awardsCareerPress & brand
Contact
Tel: +47 648 08 488
E-mail: firmapost@sicra.no
Posthuset, Biskop Gunnerus’ gate 14A, 0185 Oslo, Norway
Follow us on LinkedIn
Certifications
iso27001-white
ISO 27001 compliance
miljofyrtarnlogo-hvit-rgb
Eco-Lighthouse
Sicra Footer Logo
Sicra © 2025
Privacy Policy