Thursday 

Room 6 

15:00 - 16:00 

(UTC+02

Talk (60 min)

Lightning Talks 4

Lightning talks (approx 10-15 minutes each)

Agile
People
AI
Machine Learning
Security
Fun
GenAI
IoT

Talk 1: More than 70 years of AI history in 15 minutes! - Tomas Hensrud Gulla
The launch of ChatGPT in 2022 was not the beginning of AI.
Deep Blue defeating Kasparov in 1997 was not the beginning of AI.
Even Eliza, the 1966 chatbot was not the beginning of AI.

Join me for a journey, from the very beginning of AI until today!

Talk 2: Computer vision on edge devices - Tom Daniel Sivertsen
AI is moving from digital interfaces into the physical world. Robotics, autonomous driving, and self-checkout systems require advanced models running on edge devices. This talk explores how computer vision can transform the supermarket experience and addresses the challenges of real-time object detection with limited storage and compute.

We will discuss the main hurdles of self-checkout counters in high-volume supermarkets and share how NorgesGruppen balances frictionless experiences with waste reduction. You’ll learn how we try to make large object detection models—recognizing tens of thousands of items—run efficiently on small, low-cost edge devices.

Talk 3: Performance improvements' and other lies: exposing hidden security fixes in Open Source - Mackenzie Jackson
Silent patching- fixing security vulnerabilities without disclosure—presents a critical blind spot in software supply chain security. With 1 in 6 vulnerabilities patched silently, traditional security tools relying on public vulnerability databases like CVE or NVD fall short, leaving organizations exposed to unknown risks. This presentation introduces an entirely novel approach that harnesses the power of Large Language Models (LLMs) to detect these hidden vulnerabilities in open-source software.

We'll show how our novel dual-LLM architecture analyses public changelog data to identify and classify silently patched vulnerabilities. Through a live demo, we'll show how this AI-driven method has allowed us to uncover hundreds of previously unknown vulnerabilities in major open-source projects, with 20% classified as critical or high severity.

Key points:

- The threat landscape of silent patching and its impact on supply chain security
- Detailed breakdown of our dual-LLM model architecture and methodology
- Real-world findings and their implications for the security community
- The crucial role of Human-in-the-Loop (HITL) verification in the AI-driven process
- Benchmarking results against traditional security research methods
- Limitations of the current approach and future improvements

Talk 4: Tech debt nomads and slash-and-burn development - Einar Høst
Many developers are tech debt nomads. When starting in a new role, we are righteously indignant about the shortcomings of existing solutions, preferring to burn them to the ground and start anew. A couple of years down the road, when the consequences of our own choices start to make themselves manifest and progress slows down, we find it's time to move on. To replace us come other tech debt nomads, and the process repeats itself. What fuels this process? And what are the effects on the systems we build? On the organizations that own them? On us?

Tomas Hensrud Gulla

Tomas is a developer with more than 20 years of experience in the Microsoft .NET space. He enjoys learning new programming languages, regular expressions, skiing and beer.

Tom Daniel Sivertsen

Tom has a robust background in risk management, financial modeling, and derivatives, backed by over a decade of experience in banking and startup experience with a credit brokering business. In the last two years he has been actively involved in various AI initiatives in NorgesGruppen and now leads the organization's new AI Lab. In this role, he focuses on advancing computer vision technologies and integrating generative AI tools across the group.

Mackenzie Jackson

Mackenzie is a developer advocate with a passion for DevOps and code security. As the co-founder and former CTO of a health tech startup, he learnt first-hand how critical it is to build secure applications with robust developer operations.
Today as the Developer Advocate at GitGuardian, Mackenzie is able to share his passion for code security with developers and works closely with research teams to show how malicious actors discover and exploit vulnerabilities in code.

Einar Høst

Einar W. Høst works at the Norwegian Labour and Welfare Administration. He enjoys collaborative modelling, API design and computer programming. Over the past twelve years, he has done talks on a variety of topics, including hypermedia, resiliency, recursive art and lambda calculus. He has a PhD in Computer Science from the University of Oslo.