BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//hacksw/handcal//NONSGML v1.0//EN
CALSCALE:GREGORIAN
BEGIN:VEVENT
LOCATION:Webcast
DESCRIPTION:In penetration tests\, it is almost always possible to gain access to an IT environment. The key question\, therefore\, is not whether it is possible – but rather what needs the most protection\, where there are entry points and which risks that exist – how to get the most value out of your security tests. Don’t be the Catch of the Day Don’t assume. Audit for clarity. Pentest for proof.
DTSTART:20260528T080000Z
DTEND:20260528T090000Z
SUMMARY:CyberTalk 2026: From Assumption to Evidence
URL;VALUE=URI:https://netnordic.noboxdesign.se/events/cybertalk-2026-from-assumption-to-evidence/
DTSTAMP:20260423T161526Z
UID:69ea459ea0021
END:VEVENT
END:VCALENDAR