Skip to content

Telenor interview: Enterprise cybersecurity challenges and solutions

Kjell Kjebekk, Head of Business Security for Telenor in Norway

We asked Kjell Kjebekk, Head of Business Security for Telenor in Norway, about the cybersecurity challenges and threats on the rise in companies today.

In our discussion, Kjell reveals key cybersecurity solutions, detailing what exactly enterprise organizations can do to protect themselves. Here’s what Kjell shared:  

What is the most challenging security issue(s) facing enterprise right now?

Kjell: Our new geopolitical reality requires us to think differently to protect societal values. Those who attack us actively work every single day to discover the weak links in Norway's digital infrastructure. They are less concerned about whether they attack private companies, municipalities, hospitals, or the military infrastructure.

At the same time, and regardless of the geopolitical situation, the threat posed by organized cybercrime is ever-increasing. Financially motivated and organized cybercriminals operate somewhat opportunistically, for example, when ransomware attacks that exploit known vulnerabilities hit vulnerable businesses, regardless of who they are for the most part. The police say in their threat assessment for 2022 that data breaches and ransomware are crime phenomena that could affect all Norwegian public and private businesses in the years to come. 

Do you see an evolution happening in the corporate mindset towards cybersecurity challenges?

Kjell: In recent years, several Norwegian institutions, agencies, companies, municipalities, and media houses have been exposed to extensive cyber-attacks that have majorly impacted their ability to deliver goods and services, and some have even threatened state security. Several of these attacks have received considerable media attention. It is positive that there is more transparency about these attacks and what methods the attackers use. Companies previously wanted as little attention as possible and were afraid to expose their mistakes and weaknesses publicly, but now we see that more people are open about their experiences. This kind of knowledge sharing makes us all better equipped. 



zero trust environment with Pexip-1

Zero Trust security and video conferencing: why should you care?


Discover: Are you ready to learn how Zero Trust will shape the future of your organization's data security?



What does cybersecurity have to do with corporate culture? 

Kjell: From time to time, there is talk about the "security culture" in companies, as if it is a separate issue. But companies that succeed in security, in a way that corresponds to the real threat picture and the desired level of risk in the business, are the ones that manage to establish security as part of the corporate culture in everything they do.

Good IT security is a combination of stable and secure architecture, along with an organization that keeps the systems secure and up to date – and can detect if the damage has occurred and has good processes across the organization to close these incidents. This is a knowledge and competence challenge for managers, technologists, and other employees who all face daily choices and must take actions that could have consequences for cybersecurity. 

What's the most important thing that companies should think about when working with IT vendors or other technology providers when it comes to security?

Kjell: Most companies have digitalization high on their agendas, while security has perhaps been further down. Security in supply chains is very important. It is about setting requirements for suppliers and ensuring that these requirements are passed on to subcontractors – implementing security and control mechanisms for suppliers and deliveries. This will require strong expertise for most businesses. Security in supplier/supply chains is not only about what comes from subcontractors, but also about one's own role in supply chains. It is essential to consider that you as a supplier bear risk for your own customers.

What are the 3 most important steps that organizations can take when it comes to cybersecurity solutions?


  1. Add the basics in a systematic way. There are many well-known best practice frameworks and guidelines to choose from. The company's current maturity, industry affiliation and to some extent operational jurisdiction should influence what one chooses. Many governments issue clear guidelines on which basic measures to prioritize if the current maturity of cybersecurity in the enterprise is moderate to low. In Norway, the NSM (National Security Authority) Basic Principles are a good starting point.

  2. Start at the top. Senior executives must set a clear ambition for the organization's stance on cybersecurity, with a clear policy that is well communicated, along with a mandate and explanation on why this is important to the organization. If this is not anchored at the top, practical implementation will have little chance of success.

  3. Find competent partners. The type of expertise you need and the extent to which you need partners will vary, especially considering the size of the organization. But even large enterprises with capable cybersecurity teams will need niche expertise and additional resources through a partner who specializes in cybersecurity.


Find out how Pexip's secure video technology platform secures global organizations to help safeguard them against cybersecurity threats and breaches.


Ian Mortimer;Senior Vice President - Technology
Ian Mortimer
Senior Vice President - Technology
Ian is the SVP of Technology in Pexip responsible for helping shape our unique tech and products. He's worked in software and communications technology for over 20 years with a strong focus on creating high quality products with a clear value for our customers.

Pexip Blog

Subscribe to our blog for the latest company news, product updates and upcoming events.