Program Agenda
A preliminary agenda has been provided to help participants of the conference plan their travel prior to the publishing of the detailed agenda in March 2025.
The agenda is subject to change. The agenda times are reflected in local Central European Summer Time (UTC +2). All pre-conference and conference activities — including FIRST hosted social activities — will take place on premisis at the Bella Center Copenhagen.
- Additional side meetings, SIG Meetings, and BoFs to be posted by end of April.
- Additional room designations to be posted at a later date.
About TLP Designations
If you are unfamiliar with the Traffic Light Protocol ("TLP"), please visit www.first.org/tlp for details. In the use case for FIRST events, TLP levels specifically indicate whether press, social media, and photography/videography may occur. You do not need to be "invited" to attend a TLP:RED session as a confirmed, registered delegate. Please see the Registration Terms & Conditions: Photography or Recording Usage by Attendees.
Meetings notated with "invite-only" or "invitation only" are private meetings.
Sunday Trainings
Sunday pre-conference training is a limited opportunity for interested conference delegates and locals who may not be planning to attend the full event. Separate registration is required.
Sessions Available to Virtual Participants
TLP:CLEAR sessions from Plenary talks, Breakout 1, Breakout 2, and Breakout 3 will be available to registered virtual participant ticket holders via the conference mobile/desktop app. Access information will be provided several days from the start of the event. Sunday Training content is NOT recorded.
Registration Hours & Location
Registration will be located on the 1st Floor of the Bella Center Copenhagen in “Foyer 3”.
Agenda At-A-Glance
A preliminary agenda has been provided to help participants of the conference plan their travel prior to the publishing of the detailed agenda in March 2025.
View Preliminary Agenda
Call for Training
Call for Speakers
If you have any questions regarding the agenda, please contact the event office via email at events@first.org.
Social Activity
Plenary (Hall A1)
Breakout 1 (Auditorium 10)
Breakout 2 (Auditorium 11)
Breakout 3 (Auditorium 12)
Social Activity
Plenary (Hall A1)
Breakout 1 (Auditorium 10)
Breakout 2 (Auditorium 11)
Breakout 3 (Auditorium 12)
Plenary (Hall A1)
Breakout 1 (Auditorium 10)
Breakout 2 (Auditorium 11)
Breakout 3 (Auditorium 12)
Social Activity
Plenary (Hall A1)
Breakout 1 (Auditorium 10)
Breakout 2 (Auditorium 11)
Breakout 3 (Auditorium 12)
Plenary (Hall A1)
Breakout 1 (Auditorium 10)
Breakout 2 (Auditorium 11)
Breakout 3 (Auditorium 12)
Sunday, June 22nd
Social Activity | |
---|---|
17:30 – 18:00 | FIRST Newbie Session in Hall A1 |
18:00 – 20:00 | Sunday Welcome Reception - 1st Floor Balcony TLP:CLEAR |
Monday, June 23rd
Plenary (Hall A1) | Breakout 1 (Auditorium 10) | Breakout 2 (Auditorium 11) | Breakout 3 (Auditorium 12) | Social Activity | |
---|---|---|---|---|---|
08:30 – 09:30 | Conference Opening & Welcome Remarks TLP:CLEAR | ||||
09:30 – 10:30 | NO Nina Sunde (Norwegian Police University College, NO) TLP:CLEAR | ||||
10:30 – 11:00 | Networking Break with Exhibits TLP:CLEAR | ||||
11:00 – 11:35 | JE What Can Cybersecurity Incident Responders Learn from Real-World Crises? Matt Palmer (Jersey Cyber Security Centre, JE) TLP:CLEAR | AT AU From Unstructured CTI Reports to Yara/SPL via LLMs Aaron Kaplan (independent / EC-DIGIT-CSIRC, AT); Jürgen Brandl (BMI, AT); Chris Horsley (Cosive, AU) TLP:GREEN | AR ES From TTPs to Deception: Crafting Strategies Diego Staino (BASE4 Security, AR); Federico Pacheco (BASE4 Security, ES) TLP:CLEAR | ||
11:45 – 12:20 | FI Case: City of Helsinki Data Breach 2024 Matias Mesiä (NCSC-FI, FI) TLP:CLEAR | US We All Want Validation (in our SecOps Detections) John Stoner (Google Cloud, US) TLP:CLEAR | TW Breaking Down Barriers: Analyzing Active Directory Security Across Industries Gary Sun, Vivian Teng (CyCraft Technology, TW) TLP:CLEAR | ||
12:20 – 14:00 | Lunch Break TLP:CLEAR | ||||
14:00 – 14:35 | GB Building Towards #SquadGoals - Brick by Brick to a Unified Cyber Response Effort Michael S (National Cyber Security Centre - United Kingdom, GB) TLP:CLEAR | US John Kristoff (Dataplane.org, US) TLP:CLEAR | IN Uncovering the Whispers of an APT Targeting Specific Industries in South Asia Sathwik Ram Prakki, Subhajeet Singha (Quick Heal, IN) TLP:CLEAR | ||
14:45 – 15:20 | JP Securing a Global Conglomerate: Mitsui & Co.'s Journey from Chaos to Control Takahiro Okuhara (MITSUI & CO., LTD., JP) TLP:AMBER | CH Anti-Forensics - You are Doing it Wrong (Believe Me, I'm an IR Consultant) Stephan Berger (InfoGuard AG, CH) TLP:CLEAR | US Where Did I Put My Keys? Preventing Data Leaks at Scale with Automation Braxton Plaxco (Red Hat, US) TLP:GREEN | ||
15:20 – 15:50 | Networking Break with Exhibits TLP:CLEAR | ||||
16:00 – 17:15 | FIRST AGM (Annual General Meeting) | ||||
17:30 – 19:30 | Sponsor Showcase & Networking Reception TLP:CLEAR |
Tuesday, June 24th
Plenary (Hall A1) | Breakout 1 (Auditorium 10) | Breakout 2 (Auditorium 11) | Breakout 3 (Auditorium 12) | |
---|---|---|---|---|
09:00 – 09:35 | US From Zero to Prepared: Implementing a Weekly Incident Response Drill Program Jeffrey Carpenter (Accuray, Inc., US) TLP:CLEAR | US Justin Novak, Chris Rodman (Software Engineering Institute, US) TLP:CLEAR | US Response via Prevention Engineering Steve McKinney, Lauren Tam (Stripe, US) TLP:AMBER | |
09:45 – 10:20 | NO Incident Preparedness Takeaways from 5000 Exercise Participants Erlend Andreas Gjære (Secure Practice, NO) TLP:CLEAR | BE US 99 Bottles of Trust on the Wall: Approaches to Building Convivial Communities Trey Darley (Liaison, BE); Tom Millar (CISA, US) TLP:CLEAR | DK Anton Kalinin (Principal Security Consultant at CSIS Security Group A/S, First member, DK) TLP:RED | |
10:20 – 10:50 | Networking Break with Exhibits TLP:CLEAR | |||
10:45 – 11:20 | US GB JP Pivoting To Resilience: Disruptive Incidents And How We Prepare For Them Tom Millar (CISA, US); Eireann Leverett (Killara Cyber, GB); Wendy Nather (None, US); Hendrik Adrian (LACERT, JP) TLP:CLEAR 10:45 – 12:05 | DE Konstantin Zangerle (KIT-CERT, DE) TLP:CLEAR | IT Why Be the King When You Can Be the Rogue Prince? Insights from Scraping of I2P and Freenet Lorenzo Nicolodi (Microlab.red, IT) TLP:AMBER | |
11:30 – 12:05 | TW Aztronomy: Establishing the Foundation of Attack Path Analysis in Azure Tung-Lin Lee (Cycraft, TW) TLP:CLEAR | NL Routing Security for Enterprises: Secure Your Supply Chain Andrei Robachevsky (Global Cyber Alliance, NL) TLP:CLEAR | ||
12:05 – 13:30 | Lunch Break TLP:CLEAR | |||
13:30 – 14:05 | US Building the Blueprint: Designing Effective Storyboards for Cybersecurity Tabletop Exercises John Hollenberger (Secureworks, US); Aamir Lakhani (Fortinet, US) TLP:CLEAR | LU BE It Wasn't Me - Sharing Threat Intel Anonymously using Abracadabra Andras Iklody (CIRCL, LU); Trey Darley (Liaison, BE) TLP:CLEAR | Apollo Program : From Planet Earth to Space! Jun Hyeong Lee (PLAINBIT) TLP:AMBER | |
14:15 – 14:50 | CH Social Engineering in the Age of AI: Rethinking Security Training Cornelia Puhze (SWITCH-CERT, CH) TLP:CLEAR | AR AWS Advanced Offensive Techniques, What Defenders Need to Know Santiago Abastante (Solidarity Labs, AR) TLP:CLEAR | CA Pers?na Theory: Infiltration & Deception of Emerging Threat Groups Tammy Harper (Flare, CA) TLP:AMBER | |
15:00 – 15:35 | BE RE(HACK)T: Open-Sourcing a Boardgame for User Awareness Emilien Le Jamtel, Francien Giebels, Marton Szabo (CERT-EU, BE) TLP:CLEAR | JP Masato Suzuki, Shota Sugawara, Atsushi Kobayashi, Hirofumi Kawauchi (NTT-ME CORPERATION, JP) TLP:CLEAR | DK Jan Kaastrup (CSIS Security Group, DK); Michael Sjøberg (Delta Crisis Management, DK) TLP:AMBER | |
15:35 – 16:05 | Networking Break with Exhibits TLP:CLEAR | |||
16:05 – 17:05 | Lightning Talks! |
Wednesday, June 25th
Plenary (Hall A1) | Breakout 1 (Auditorium 10) | Breakout 2 (Auditorium 11) | Breakout 3 (Auditorium 12) | Social Activity | |
---|---|---|---|---|---|
08:45 – 09:00 | Wednesday Remarks TLP:CLEAR | ||||
09:00 – 10:00 | DK Søren Maigaard (SektorCERT, DK) TLP:CLEAR | ||||
10:00 – 10:30 | Networking Break with Exhibits TLP:CLEAR | ||||
10:30 – 11:05 | US Best Practices for Data Privacy Breach Response: Lessons Learned from Social Media Case Studies Anne Connell, Lauren Cooper (CERT Software Engineering Institute Carnegie Mellon University, US) TLP:CLEAR | CZ From p0f to JA4+: Network Fingerprinting and Reconnaissance Vlad Iliushin (Cybersecurity Expert @ ELLIO, President of AMTSO (Anti-Malware Testing Standards Organization), CZ) TLP:CLEAR | CA US Inside the Information Stealer Ecosystem: From Compromise to Countermeasure Olivier Bilodeau (Flare, CA); Nick Ascoli (Flare, US) TLP:CLEAR | ||
11:15 – 11:50 | FI Why is Finnish Healthcare Doing So Well Against Ransomware? Perttu Halonen (National Cyber Security Centre Finland, FI) TLP:CLEAR | LU Beyond CVEs: Mastering the Landscape with Vulnerability-Lookup Alexandre Dulaunoy (CIRCL, LU) TLP:CLEAR | DE US Crypted Hearts: Exposing the HeartCrypt Operation Daniel Bunce (Palo Alto Networks, Unit 42, DE); Jerome Tujague (Palo Alto Networks, Unit 42, US) TLP:GREEN | ||
11:50 – 13:15 | Lunch Break TLP:CLEAR | ||||
13:15 – 13:50 | AU Enhancing Incident Response with AWS CIRT, MSSPs, and ISVs Matthew Gurr (Full Membership via Amazon, AU) TLP:CLEAR | IL Evading in Plain Sight: How Adversaries Beat User-Mode Protection Engines Omri Misgav (Independent, IL) TLP:CLEAR | DK Claudiu Chelaru (Mnemonic, DK) TLP:CLEAR | ||
14:00 – 14:35 | NO Beyond Scanners and Tickets: A New Paradigm for Attack Surface Management Eirik Nordbø, Anders Nese (Equinor ASA, NO) TLP:CLEAR | IT The Dark Side of Digital Ads: How to Protect Your Brand using Meta AD Library Giuseppe Morici, Grazia Leonetti (Intesa Sanpaolo S.p.A., IT) TLP:AMBER | US Anthony Talamantes, Todd Kight (Johns Hopkins University Applied Physics Laboratory, US) TLP:CLEAR | ||
14:45 – 15:20 | NL Piotr Kijewski (The Shadowserver Foundation, NL) TLP:CLEAR | AU What Can Threat Intel Teams Learn from Journalists? Chris Horsley (Cosive, AU) TLP:CLEAR | JP Broken Seals, Broken Trust: Flaws and Defences in the Certificate Ecosystem Yuta Sawabe, Rintaro Koike (NTT Security Holdings, JP) TLP:CLEAR | ||
19:00 – 22:00 | Conference Social Event TLP:CLEAR |
Thursday, June 26th
Plenary (Hall A1) | Breakout 1 (Auditorium 10) | Breakout 2 (Auditorium 11) | Breakout 3 (Auditorium 12) | |
---|---|---|---|---|
09:00 – 09:35 | US GB NZ Avengers Assemble: Collaborating Across the Globe to Create Joint Cybersecurity Advisories Bonnie Limmer (Cybersecurity and Infrastructure Security Agency (CISA), US); Keir P (UK's National Cyber Security Centre (NCSC-UK), GB); Jane O'Loughlin (CERT New Zealand, NZ) TLP:GREEN 09:00 – 10:20 | FR The Funny Story of Active Directory Backdooring Sylvain Cortes (Hackuity, FR) TLP:CLEAR | US Detection Engineering 101 : Establishing a Structured Approach to Detection Engineering Tomohisa Ishikawa (Tokio Marine Holdings, US) TLP:CLEAR | |
09:45 – 10:20 | SE Nicklas Keijser (Truesec CSIRT – Truesec, SE); Anders Olsson (Truesec, SE) TLP:CLEAR | AU Navigating the Threat Actor Maze: A Tool for Mapping Names, Families and Insights Dave Matthews (Avast (Gen Digital), AU) TLP:CLEAR | ||
10:20 – 10:50 | Networking Break with Exhibits TLP:CLEAR | |||
10:45 – 11:20 | LT LV Engaging with the Media to Foster Cybersecurity Resilience Zivile Necejauskaite (NRD Cyber Security, LT); Madara Krutova (Latvia's CERT.LV, part of the National Cybersecurity Centre, LV) TLP:CLEAR | US Alex Holden (Hold Security LLC, US) TLP:CLEAR | AU Understand and Detect - Stealthy Techniques Used to Conceal Artifacts on Modern Linux Systems Robert Byrne (Ericsson, AU) TLP:GREEN | |
11:30 – 12:05 | GB All Ransomware Economic Models are Wrong, But This One is Useful Eireann Leverett (Killara Cyber, GB) TLP:CLEAR | Lazarus Group Evolved Their Infection Chain with Old and New Malware Sojun Ryu (Kaspersky) TLP:CLEAR | US A Story about Fighting Disinformation or How We Helped the Russian Trolls Krassimir Tzvetanov (Purdue University, US) TLP:GREEN | |
12:05 – 13:30 | Lunch Break TLP:CLEAR | |||
13:30 – 14:05 | DE US Burnout: Detect, Investigate, Respond, Recover, Prevent Desiree Sacher (Finanz Informatik, DE); Carson Zimmerman (Microsoft, US) TLP:CLEAR | US Threat Hunting with Python & Pandas Anthony Talamantes, Matt Dulle (Johns Hopkins University Applied Physics Laboratory, US) TLP:CLEAR | US Revolutionizing Malware Analysis with Agentic AI: Lessons and Innovations Justin Page (Booz Allen Hamilton, US) TLP:CLEAR | |
14:15 – 14:50 | NZ Unmasking Cyber Security: Rethinking Small to Medium Business Security Awareness Sophie Horgan (NCSC, NZ) TLP:CLEAR | US DE What's New in CSAF v2.1: Key Updates Explained Justin Murphy (DHS/CISA, US); Thomas Schmidt (BSI, DE) TLP:CLEAR | PL Using DNS Registry and Requests for Securing Dot Pl and Beyond Piotr Białczak, Paweł Pawlński (CERT.PL/NASK, PL) TLP:GREEN | |
15:00 – 15:35 | GH Developing a Sectoral CERT Ecosystem Albert Antwi-Boasiako, Stephen Cudjoe-Seshie (Cyber Security Authority, GH) TLP:GREEN | US The Convergence of Threat Behaviors Across Intrusions Joe Slowik (The MITRE Corporation, US) TLP:CLEAR | BE Emilien Le Jamtel (CERT-EU, BE) TLP:GREEN | |
15:45 – 16:15 | Networking Break with Exhibits TLP:CLEAR | |||
16:15 – 17:15 | Lightning Talks! |
Friday, June 27th
Plenary (Hall A1) | Breakout 1 (Auditorium 10) | Breakout 2 (Auditorium 11) | Breakout 3 (Auditorium 12) | |
---|---|---|---|---|
09:00 – 09:35 | CH Serge Droz (FIRST / Swiss FDFA, CH) TLP:CLEAR | NO Automated ATT&CK Technique Chaining Martin Eian (mnemonic, NO) TLP:CLEAR | US Forecasting Cybersecurity Data: Making Sense of the Senseless Leigh Metcalf (CERT, US) TLP:CLEAR | |
09:45 – 10:20 | LT BW Southern African Development Community's CII handbook - What Others Can Re-Use? Vilius Benetis (NRD Cyber Security, LT); Shukya Kiroga (CRASA - The Communication Regulators' Association of Southern Africa, BW) | PL Artemis: How CERT PL Improves the Security of the Polish Internet Krzysztof Zając (CERT PL, PL) TLP:CLEAR | CA Hossein Jazi, Douglas Santos (Fortinet, CA) TLP:CLEAR | |
10:30 – 11:05 | JP TW Hikohiro Lin (GMO Cybersecurity by IERAE, Inc., JP); Ken Lee (Independent Security Advisor, TW); Kosuke Ito (Product Security Governance Advisor, JP) TLP:AMBER | US Only Seeing Stars: Enabling the Open Source Scripting Community with OCSF Michael Bunner (REI, US) TLP:CLEAR | JP US Establishing a Global Community of Practice on Coordinated Vulnerability Disclosure (CVD) Tomo Ito (JPCERT Coordination Center, JP); Justin Murphy (DHS/CISA, US) TLP:CLEAR | |
11:15 – 11:50 | UA Denys Yashchuk (CERT-UA, UA) TLP:GREEN | US The Party Isn't Over: Uncovering Konfety's Novel "Evil Twin" Technique Lindsay Kaye, Gavin Reid (HUMAN Security, US) TLP:CLEAR | JP Comprehensive Investigation Results on Malware Code Interpretation by GPT-4 Yasuuyuki Tanaka (NTT Social Informatics Laboratories, JP) TLP:CLEAR | |
11:50 – 12:20 | Networking Break TLP:CLEAR | |||
12:20 – 13:20 | Friday Keynote TLP:CLEAR | |||
13:20 – 13:50 | Closing Remarks TLP:CLEAR | |||
13:50 – 14:20 | Lunch Break TLP:CLEAR |
- BE USTLP:CLEAR
99 Bottles of Trust on the Wall: Approaches to Building Convivial Communities
Trey Darley (Liaison, BE), Tom Millar (CISA, US)
Trey Darley has been a long-standing member of the FIRST community, and has served a variety of volunteer roles, including a term on the FIRST board, during which he co-founded the FIRST standards committee. Trey is well known for his work on open cybersecurity standards like STIX/TAXII and others. He's also been aligned with the Langsec faction for many years. Trey's patron saints are Grace Hopper, Evi Nemeth, and Paul Erdös.
Mr. Millar has served in CISA since 2009, working to strengthen the nation's cyber defenses and resilience against emerging threats. His work has included increasing the level of public, private and international partner engagement, and supporting initiatives to improve information sharing, such as the standardization of the Traffic Light Protocol. As the Branch Chief of Cyber Resilience within the Cyber Security Division, he oversees CISA's architectural cybersecurity assessments, the Cybersecurity Performance Goals program, and training and standards for assessment performance. Prior to his cybersecurity career, he served as a linguist with the 22nd Intelligence Squadron of the United States Air Force. Mr. Millar holds a Master's of Science from the George Washington University and is a Distinguished Graduate of the National Defense University's College of Information and Cyberspace.
In the face of increasing threats to the stability of the Internet and our other critical infrastructure, it's crucial for FIRST community members to know how to best build and leverage their personal networks to collectively respond to all types of incidents, especially those that seek to disrupt our supply chains and national critical infrastructure. In this presentation, attendees will learn how to make the most of their FIRST membership by building stronger connections with their community partners, creating strong trusted relationships that go deeper than simply being part of a shared workspace or a mailing list.
June 24, 2025 09:45-10:20
- USTLP:CLEAR
A Look at New ASNs
John KristoffJohn Kristoff (Dataplane.org, US)
John is a PhD candidate in Computer Science at the University of Illinois Chicago. He is a co-founder of Dataplane.org and serves as a research fellow at ICANN. He is a principal analyst at NETSCOUT on the ATLAS Security Engineering and Response Team (ASERT). John's primary career interests, experience, and expertise are in Internet infrastructure. He is particularly focused on better understanding and improving the routing system (BGP), the naming system (DNS), and internetwork security. John is or has been associated with a number of other organizations and projects involving Internet operations and research, some of which include: DNS-OARC, DePaul University, Dragon Research Group (DRG), IETF, FIRST, Internet2, NANOG, Neustar - formerly UltraDNS, Northwestern University, nsp-security, ops-trust, REN-ISAC, and Team Cymru.
In the first half of 2024 over 3000 new autonomous system numbers (ASNs) were registered and assigned. Approximately one third of them were originating one or more IP address prefixes during that same time frame. This got us to thinking. What are some of the characteristics of these new ASNs? What impact, if any, do they have on the security landscape, and just as importantly, what risks do they face upon arrival? This presentation is a first look at some of our results including the relatively short dwell time from their appearance on the Internet to when they first receive or participate in DDoS attacks.
June 23, 2025 14:00-14:35
- USTLP:GREEN
A Story about Fighting Disinformation or How We Helped the Russian Trolls
Krassimir TzvetanovKrassimir Tzvetanov (Purdue University, US)
For the past five years Krassimir Tzvetanov has been a graduate student at Purdue University focusing on Homeland Security, Threat Intelligence, Operational Security and Influence Operations, in the cyber domain.
At Purdue University, Krassimir works as a researcher for the Purdue Homeland Security Institute and is a junior fellow at the FORCES program with the School of Communication.
Before that, Krassimir was a security engineer at a small CDN, where he focused on incident response, investigations and threat research. Previously he worked for companies like Cisco and A10 focusing on threat research and information exchange, DDoS mitigation, product security. Before that Krassimir held several operational (SRE) and security positions at companies like Google and Yahoo! And Cisco.
Krassimir is very active in the security research and investigation community and has contributed to FIRST SIGs. He is also a co-founder and ran the BayThreat security conference, and has volunteered in different roles at DefCon, ShmooCon, and DC650.
Krassimir holds a PhD with focus on Information Technology in Homeland Security and is finishing his second PhD focusing on Hybrid warfare and Influence operations conducted through social media. He also holds a Masters in Digital Forensics and Investigations, a Masters in Homeland Security, and Bachelors in Electrical Engineering.
Over the past decade, the term "fake news" has become so common that most people turn off the TV when you hear it. So, how is that publicity serving society? Let me even ask a more controversial question: how is this publicity helping the enemy? Half-baked intellectuals are talking about "active measures" without even realizing the translation of the original Russian term is fairly limited and does not capture the depth of the wording. However they go around teaching us how this adversary did this and that adversary did that...Those same people count Russian bots and tell us how they are convincing people, while they do no even grasp basic communication theory concepts. "Beware of Greeks bearing gifts" has a whole new meaning in today's information age. It reads more like "beware of geeks bearing gifts". Have you ever considered that maybe, just maybe, this is exactly what the adversaries want them to talk about? Have you considered what are the second and third order effects from a simple messaging aka propaganda? And is that what the adversary really wants to accomplish?In this talk I'll cover basics of the so called reflexive influence operations and how they can be used to entice parts of the target audience to emit messaging congruent with the adversary objectives. I'll also provide some examples of what appear to be such types of operations.
June 26, 2025 11:30-12:05
- GBTLP:CLEAR
All Ransomware Economic Models are Wrong, But This One is Useful
Eireann Leverett (Killara Cyber, GB)
Eireann Leverett is the CTO of Killara Cyber, and a long time to collaborater to FIRST. He has risen through the roles of penetration tester, incident responder, researcher, and risk analyst to his current role. He has written many articles and one book, and has a deep interest in critical infrastructure, technology and risk, and catastrophe economics. He's like the little kid on this panel of international experts, and excited to be at the table!
How much ransomware is out there, and what is the cost to companies?
Economic modelling of cyber crime is not often discussed at FIRST, but perhaps it should be. It impacts everything, from budgets, team numbers, to response strategies, to risk management. If we can accurately model cyber crime costs, we can unify responses across countries, or collaborate more effectively. It also helps with scaling the maturity of teams within FIRST. This presentation is about constructing, using, releasing, and validating an open source ransomware economics model. It is also about the challenges, the data, and the quantification tasks required to do so. Partnering with financial institutions isn't easy, but it does help us get our ideas of how to respond to cyber crime across.
Are you a regulator, or a cyber insurer? Are you an incident responder or data scientist who is model curious, or a willing code contributer? Help us make useful models, and use them to help solve the ransomware crisis.
June 26, 2025 11:30-12:05
- CHTLP:CLEAR
Anti-Forensics - You are Doing it Wrong (Believe Me, I'm an IR Consultant)
Stephan Berger (InfoGuard AG, CH)
Stephan Berger has over a decade of experience in cybersecurity. Currently working with the Swiss-based company InfoGuard, Stephan investigates breaches and hacked networks as Head of Investigation of the Incident Response team. An avid Twitter user under the handle @malmoeb, he actively shares insights on cybersecurity trends and developments. Stephan also authors the blog DFIR.ch, where he provides in-depth analysis and commentary on digital forensics and incident response. Stephan has spoken at numerous conferences, sharing his expertise with audiences worldwide.
In this talk, we'll dissect common anti-forensics strategies -- like USN Journal deletion, shellbag clearing, timestamp manipulation, and disabling access time updates -- and reveal how they are often executed ineffectively or misunderstood. We'll explore practical examples, such as:- Deleting the USN Journal (fsutil usn deletejournal /d C:) and why it's rarely a perfect solution.- Clearing shellbags to wipe file explorer history but failing to account for deeper registry artifacts.- Time stomping (Get-Item "C:pathtofile.txt").CreationTime = "2022-01-01 00:00:00) and how forensic tools detect inconsistencies.- Disabling last access time updates (fsutil behavior set disablelastaccess 1) and its limited effectiveness against comprehensive timeline analysis.- Wiping MFT free space (sdelete -z C:) while ignoring the traces left behind in unstructured data.From registry edits like masking user account activity to configuring Windows EFS, we'll examine why these techniques often fail against modern investigative workflows and how defenders use these "footprints of erasure" to uncover malicious intent.Attendees will gain a comprehensive understanding of what works and what doesn't and how to identify these techniques during incident response. Whether you're an IR consultant, security analyst, or blue teamer, this talk offers actionable knowledge to outsmart adversarial anti-forensics tactics.We use Python code to show how 'clean' evidence cleaning can be done, e.g., if only individual MFT entries are deleted or even if entries in the SRUM database are deleted or manipulated. This means it is not immediately obvious that the data has been manipulated, unlike when everything is deleted.
June 23, 2025 14:45-15:20
- TLP: AMBER
Apollo Program : From Planet Earth to Space!
Jun Hyeong Lee (PLAINBIT)
I have been working in the DFIR field in Korea for over 10 years. Our company's DFIR analyst organization is the largest single organization in Korea, and I am the head of that organization. I have analyzed and solved famous digital forensics cases in Korea, and currently, I analyze and respond to breaches using digital forensics, track attackers, and collaborate with Korean investigative agencies to catch criminals.
Until this moment, our primary perspective on defense has been organizations. The defense of individual attacks, introduced in this presentation, is different, and they should be different from the organizational defense. So far, there have been limited methods to counter individual attacks, and even ineffective. That's mainly because the methods vary by case. In the hopes of opening up a discussion between global analysts to seek new methods (building bridges) to protect individuals rooted in the previous security experience (walls) that protected organization, just like the theme of ?Fortresses of the Future: Building Bridges, Not Walls?, this presentation covers how the attackers build infrastructure and use them, monitor individual victims, methods of stealing cryptocurrencies, and behaviors related to their attacks through digital forensics analysis.
June 24, 2025 13:30-14:05
- PLTLP:CLEAR
Artemis: How CERT PL Improves the Security of the Polish Internet
Krzysztof Zając (CERT PL, PL)
Senior Threat Analysis Specialist at CERT PL, currently working on automated vulnerability discovery techniques. Before becoming a security specialist, he was a software engineer with more than ten years of experience. Teaches offensive security at the University of Warsaw. Formerly a CTF player, playing with the p4 CTF team. Likes cats and bad puns.
Since the beginning of 2023, CERT PL has been periodically scanning more than 900 thousand domains and IP addresses of universities, hospitals, government institutions, schools, banks and other organizations, and detecting hundreds of thousands of vulnerabilities and misconfigurations (including high-severity ones, such as SQL Injection, in important entities).For that task we built a custom tool: Artemis (https://github.com/CERT-Polska/Artemis). It checks various aspects of website security and builds easy-to-read messages informing organizations about the scanning results.During the presentation, I will show how Artemis works, what we are looking for, and most significantly - lessons we've learned during our large-scale scanning project. As the tool is open-source, I will touch upon how to set up your own scanning pipeline.
June 27, 2025 09:45-10:20
- NOTLP:CLEAR
Automated ATT&CK Technique Chaining
Martin EianMartin Eian (mnemonic, NO)
Dr. Martin Eian is a Researcher at mnemonic. He has more than 20 years of work experience in IT security, IT operations, and information security research roles. In addition to his position at mnemonic, he is a member of the Europol EC3 Advisory Group on Internet Security. He has previously worked as the Head of Research at mnemonic, as an Adjunct Associate Professor at the Norwegian University of Science and Technology (NTNU), as a Threat Intelligence analyst at mnemonic, and as an Information Security Specialist at Nordea. He holds a PhD in Telematics from NTNU (2012). His current research topics are threat intelligence automation, quantitative cyber risk analysis, vulnerability measurements and analysis, and alert aggregation and contextualization. He has previously presented at the FIRST Annual Conference, the ONE Conference, and at Black Hat USA Arsenal.
Incident response teams need to determine what happened before and after an observation of adversary behavior in order to effectively respond to incidents. The MITRE ATT&CK knowledge base provides useful information about adversary behaviors, but provides no guidance on what most likely happened before and after an observed behavior. We have developed methods and open source tools to help incident responders answer the questions ?What did most likely happen prior to this observation?? and ?What are the adversary?s most likely next steps given this observation??. To be able to answer these questions, we combine semantic modeling of subject matter expert knowledge with data-driven methods trained on data from computer security incidents.
June 27, 2025 09:00-09:35
- US GB NZTLP:GREEN
Avengers Assemble: Collaborating Across the Globe to Create Joint Cybersecurity Advisories
Bonnie Limmer (Cybersecurity and Infrastructure Security Agency (CISA), US), Keir P (UK's National Cyber Security Centre (NCSC-UK), GB), Jane O'Loughlin (CERT New Zealand, NZ)
Bonnie Limmer is the Chief of Production within the Cybersecurity Division of the Cybersecurity and Infrastructure Security Agency (CISA). Evolving in this role for the past 10 years, Bonnie started her federal career within the legacy US-CERT organization. Currently, her team leads CISA's cyber information sharing mission to create, coordinate, and release operational cyber alerts, advisories, and guidance on known cyber threats and vulnerabilities impacting government and critical infrastructure networks. Her role is at the center of CISA cyber operations to respond to cyber incidents that impact national security. It's a chaotic and exciting mission space, and a place where adrenaline junkies can thrive.
Keir is the Head of Strategic Response at the UK's National Cyber Security Centre (NCSC-UK). He focuses on developing the NCSC-UK and UK Government response to significant cyber events in order to reduce harm to the wider UK ecoystem. Keir sees partnership, collaboration and community as the best way of tackling our common set of challenges. Keir has been with NCSC-UK since its foundation in 2016, having previously worked in incident response in the NCSC's precursor organisation, CERT-UK. Keir has had wide experience at both a technical and strategic level in dealing with a variety of prominent cyber events with significant impact in both the UK, and across the globe.
When government cyber agencies release a cybersecurity advisory, especially an advisory that is co-sealed with multiple international government partners, it represents the collaboration, combined insights, and expertise of a global coalition. The coordination that goes into these advisories is an intricate dance. These joint advisories are not just a collection of data points; they are meticulously crafted with input from a broad spectrum of partners and perspectives, including industry leaders and international counterparts. This session will provide a rare glimpse into the intricate, collaborative process behind these advisories -- highlighting how the panelists, together with their partners and within their organizations, prioritizes accuracy, relevance, and actionable guidance.
June 26, 2025 09:00-10:20
- ARTLP:CLEAR
AWS Advanced Offensive Techniques, What Defenders Need to Know
Santiago Abastante (Solidarity Labs, AR)
Former Police Officer from Argentina, now a Cloud Incident Responder and Security Engineer with over 10 years of IT experience. A Digital Nomad an international speaker, I've presented on Cloud Security and Incident Response at Ekoparty, FIRST, Virus Bulletin (three times), Hack.Lu, and various BSides events worldwide. I hold a Bachelor's degree in Information Security and an MBA (Master in Business Administration).
In this technical, demo-driven session, we'll explore the tactics and techniques attackers use to compromise infrastructures in Amazon Web Services (AWS), from initial access to achieving advanced persistence. Using known threat actor techniques in an adversary emulation approach, we'll examine common attack vectors such as credential exploitation, privilege escalation, and lateral movement, along with advanced persistence methods that allow attackers to maintain control of compromised environments. Defensive and detection strategies will be highlighted, leveraging both AWS-native services and external tools, helping security teams strengthen their defenses. This session promises a practical, real-world experience for attendees.
June 24, 2025 14:15-14:50
- TWTLP:CLEAR
Aztronomy: Establishing the Foundation of Attack Path Analysis in Azure
Tung-Lin Lee (Cycraft, TW)
Tung-lin Lee is a cybersecurity researcher at CyCraft Technology, specializing in network and cloud security. He has presented at several industry conferences, including HITCON ENT, ROOTCON, InfoSec Taiwan, and CyberSec.
In our journey of developing an attack path analysis tool for Azure, we encountered several obstacles, primarily derived from outdated and unclear documentation of Entra APIs which is partially mitigated by the amazing open-source project Bark. However, the issue was further compounded by API permission misalignments across different APIs, such as the Provisioning API and Azure AD Graph API.In addition, the rising prevalence of research into undocumented APIs reveals a neglected attack surface. Moreover, we discovered that the token redemption mechanisms behind the Azure Portal present additional attack vectors. By manipulating the mechanisms, threat actors would abuse multiple undocumented APIs & expand Microsoft Graph permission scopes after obtaining a single refresh token.To address these risks, we are developing an open-source framework for precise identity risk assessments in Azure and laying the groundwork for building safer security solutions.
June 24, 2025 11:30-12:05
- UATLP:GREEN
Behind the Mask
Denys Yashchuk (CERT-UA, UA)
Denys Yashchuk - Deputy Chief at CERT-UA. Leads the Threat Intelligence and Malware Analysis team, specializing in proactive threat detection and analysis. Work for CERT-UA for over six years. Possesses extensive experience in cybersecurity, with a particular focus on threat analysis, hunting, clustering, cyber attacks attribution and intelligence sharing.
The full-scale invasion of Ukraine by Russia is accompanied by a significant number of cyberattacks.We have unique experience in defending ourselves against cyberattacks with different severity, investigating various cyber incidents, from phishing to intrusions into networks.Clustering cyber threats helps organize information, making it easier to share details and provide context, so everyone understands the nature of the threat.During the presentation, we will talk about CERT-UA's classification (UAC-XXXX) of cyber threats and how it correlates with widely known names. The main part of it will describe the most active clusters, their TTPs, and present real cases of attacks. In the end, we will talk briefly about the main causes and vulnerabilities in security systems that make cyber-attacks possible and how to handle them.
June 27, 2025 11:15-11:50
- USTLP:CLEAR
Best Practices for Data Privacy Breach Response: Lessons Learned from Social Media Case Studies
Anne Connell (CERT Software Engineering Institute Carnegie Mellon University, US), Lauren Cooper (CERT Software Engineering Institute Carnegie Mellon University, US)
Anne Connell is a Senior Cybersecurity Engineer with the Cybersecurity Risk & Resilience Directorate of the CERT Division at Carnegie Mellon University’s (CMU) Software Engineering Institute (SEI). Anne contributes to research and development that is focused on improving the security and resilience of the Nation’s critical infrastructure and assets. Anne has over 20 years of experience in cybersecurity model and assessment development, data privacy program development, resilience management, software development, and instructional design. She has led the development of products for CISA, DHS, DoE, DoD, and other federal law enforcement communities.
Anne’s contributions to CERT include creating data privacy programs, framework development for implementing privacy standards, data breach incident response, and protecting incident related data. She also creates custom cybersecurity training solutions for sponsors, requirements gathering, and application development. Anne’s research focus is to address privacy and cybersecurity concerns in a manner that protects our work partners and complies with regulations. This area consists of compliance management, transactional issues, and data breach response. Anne holds certifications in CISSP and CIPM. Anne was the project lead of the FBI Cyber Investigator Certification Program (CICP), developed for the 750,000 LEO members on cybersecurity investigations. Anne is an instructor of Privacy in the Digital Age at the CMU Heinz College of Information Systems and Public Policy, and is an active speaker at Pittsburgh Public Schools to educate students on the internet and social media. Anne holds a bachelor's degree in Information Systems and a master's degree in Human and Computer Interaction from Carnegie Mellon University.Lauren Cooper is a member of the technical staff in the Cybersecurity Risk and Resilience directorate at the Software Engineering Institute, CERT Division, a federally funded research and development center operated by Carnegie Mellon University. She began her career in IT operations, before shifting her focus to information security. She earned her MS in Information Security Policy and Management from Carnegie Mellon University, where she was a Scholarship for Service awardee, a competitive scholarship program sponsored by the United States government. Her favorite areas of research include privacy, community approaches to cybersecurity, security of 5G and future networks, cybersecurity strategy, security by design in complex systems, and understanding and integrating human factors in security and privacy.
Organizations employ social media platforms for a variety of communication purposes, including sharing industry news and generating website traffic. According to the Pew Research Center News Platform Study, 54 percent of U.S. adults say they at least sometimes get news from social media. The almost instantaneous speed of social media to reach a broad audience makes it a communication outlet well adapted for dissemination of information about data breaches and response status, as well as for combatting misinformation. Many threat actors have found success manipulating social media to target organizations with the intent to damage, disrupt, or destroy trusted communications channels, brand reputation, or financial standing. Communication on social media about an organization's data breach or disclosure can have far-reaching consequences. Management's understanding of how to navigate the aftermath of such a breach is essential to its success in preserving and building the organization's real-world reputation and security. CERT, a division of the Software Engineering Institute (SEI) at Carnegie Mellon University, in this presentation will spotlight case studies using evidence gathered from social media, and conclude with specific and practical incident response recommendations (best practices) how organizations can address data privacy breaches and disclosures proactively.
June 25, 2025 10:30-11:05
- LUTLP:CLEAR
Beyond CVEs: Mastering the Landscape with Vulnerability-Lookup
Alexandre DulaunoyAlexandre Dulaunoy (CIRCL, LU)
Alexandre Dulaunoy enjoys when humans are using machines in unexpected ways. I break stuff and I do stuff at CIRCL.
Although CVEs are a cornerstone of vulnerability management, they often present an incomplete view of the security landscape. Vulnerability-Lookup, a new open-source project developed by CIRCL, overcomes this limitation by providing a comprehensive and enriched vulnerability intelligence platform that extends beyond basic CVE data. This platform aggregates and correlates data from various sighting sources, such as exploit databases, vulnerability scanners, product advisories, and community contributions, offering a more complete picture of vulnerability threats. We will demonstrate how this richer level of detail enables security professionals to move beyond simple patch management and implement proactive, actionable, risk-based strategies.
June 25, 2025 11:15-11:50
- NOTLP:CLEAR
Beyond Scanners and Tickets: A New Paradigm for Attack Surface Management
Eirik Nordbø (Equinor ASA, NO), Anders Nese (Equinor ASA, NO)
Eirik is a team lead for Vulnerability and Exposure management in the Equinor Cyber Defense Center with many years of hands-on experience in incident response and penetration testing.
Anders Nese is an experienced incident responder who now heads up the cyber engineering team in the Equinor Cyber Defense Center.
Traditional vulnerability management often feels like a never-ending game of whack-a-mole, where security teams become the "security police" through ticketing systems or manual follow-ups. After years of struggling with this approach, we discovered that the real challenge wasn't in collecting vulnerability data -- it was in making that data meaningful and actionable for everyone involved.This talk shares our journey of transforming vulnerability management from a security team problem into an organizational collaboration, through the development of a visualization and prioritization platform that emphasizes human factors over pure metrics. We'll explore how this shift in perspective led to better engagement from risk owners, more efficient remediation processes, and ultimately, a stronger security posture.Learn how we moved beyond traditional approaches to create a system that turns overwhelming security data into clear, actionable insights that resonate with both technical and non-technical stakeholders. This presentation will provide practical insights for security teams struggling with vulnerability management at scale, offering both strategic approaches and tactical implementation details that can be adapted to various organizational contexts.
June 25, 2025 14:00-14:35
- TWTLP:CLEAR
Breaking Down Barriers: Analyzing Active Directory Security Across Industries
Gary Sun (CyCraft Technology, TW), Vivian Teng (CyCraft Technology, TW)
Gary Sun is a cyber security software engineer of the Engineering and Development Team at CyCraft Technology. Currently, he focuses on research on active directory security and cloud security. He graduated from National Yang Ming Chiao Tung University with master degree in Network Engineering. He has publish papers in CISC 2021 && 2022. Also, he is a speaker of Sans Blue Team Summit, AVTokyo, HITCON Enterprise and CyberSec.
Vivian Teng is a detection and response analyst on customer success team at CyCraft Technology. She is responsible for the Active Directory analysis and provide Best Practice to solidfy the security for customers. She has publish research in ACM Advances in Social Network Analsisys and Mining, as well as NTCIR16 (NII Testbeds and Community for Information Access Research).
Active Directory (AD) is a critical role of identity and access management for organizations, serving as the backbone for authenticating users and managing access to resources. Thus, AD is a popular target for attackers. According to DEVCORE, a professional red team company, 72% of AD environments are successfully compromised during red team assessments. It shows that it is easy for attackers to compromise AD. We investigate real world cases, finding that misconfigurations, such as excessive permissions and weak segmentations, are common root causes behind these vulnerabilities.In this talk, we explore real-world cases to reveal how industry-specific needs shape AD configurations across three sectors -- Finance, Government, and Technology. We conclude six common permission settings observed in corporate environments. We would discuss real world cases and statistical insights into these configurations. These insights emphasize the critical need for permission management, segmentation, and access control to mitigate risks and secure AD environments effectively.Lastly, we would provide actionable recommendations to address these misconfigurations and protect organizations from potential breaches. Attendees will gain knowledge about industry-specific AD configuration challenges, common risky permissions, case studies on misconfigurations, and actionable strategies to strengthen AD security.
June 23, 2025 11:45-12:20
- USTLP:CLEAR
Breaking the SIEM Confinement
Anthony Talamantes (Johns Hopkins University Applied Physics Laboratory, US), Todd Kight (Johns Hopkins University Applied Physics Laboratory, US)
Anthony has over 24 years of experience in cybersecurity and the last 17 years focused on nation state and sophisticated adversaries. Anthony developed the Cyber Hunt program at Johns Hopkins Applied Physics Laboratory and current manages the Cyber Hunt, Applied Cyber Research, and Architecture & Engineering.
Todd has over 12 years of experience in cybersecurity and is the Lead Cyber Analyst on the Applied Cyber Research team at Johns Hopkins Applied Physics Lab. Todd leads the end point behavioral analysis and uses behavioral patterns to proactively hunt for malicious activity in the enterprise.
The focus of this presentation is exploring the limitations of traditional SIEMs and how we have engineered solutions around these limitations at Johns Hopkins University Applied Physics Laboratory. SIEM's are designed for a single query and basic correlation and using the returned data becomes problematic, especially if there are thousands of results or more. These common approaches in SIEM's are often impossible techniques to use to identify sophisticated adversaries. We will illustrate how we use our SIEM, PowerShell, Python, SQL, SOAR, and other methodologies to create and combine more complex analytics that is impossible to complete in any existing SIEM.
June 25, 2025 14:00-14:35
- NLTLP:CLEAR
Bringing Actionable Data to Internet Defenders: Threat & Vulnerability Intelligence Capacity Building Efforts Across the Planet
Piotr KijewskiPiotr Kijewski (The Shadowserver Foundation, NL)
Piotr Kijewski is the CEO and a Trustee at The Shadowserver Foundation, a non-profit organization with a mission of making the Internet a more secure environment. He also manages Shadowserver's large-scale data threat collection and sharing projects, as well as National CSIRT relationships. Piotr has over 20 years of operational experience in cybersecurity and incident response. He headed CERT.PL building up its various security data gathering and analysis projects as well as managing its anti-malware operations, including numerous botnet disruptions. Piotr is also a member of the Honeynet Project (where he has also served on the Board of Directors), a well-known and respected non-profit that is committed to the development of honeypot technologies and threat analysis. Recently, Piotr joined the Management Board of The Hague Chapter of the CyberPeace Institute.
The non-profit Shadowserver Foundation (https://shadowserver.org) has been active for over 15 years, delivering free daily threat and vulnerability intelligence feeds to 201 National CSIRTs covering 175 countries and territories, as well as over 8000 other organizations that have an Internet presence of any kind (including Sectoral CSIRTs, ISP/CSPs, hosting providers, enterprises, banks, academia, hospitals and SMEs).The presentation will cover Shadowserver's unique data driven approach to cybersecurity capacity building around the world. Shadowserver's focus is on delivering actionable, timely and relevant threat/vulnerability intelligence and victim data into the hands of Internet defenders at the operational level, and teaching them to understand the data being shared, automation, tools (such as IntelMQ) and processes necessary to respond to reported issues and incidents. It includes collaboration to understand and track the attack surface exposure of a country/constituency, potentially including deployment of dedicated sensor networks for improved insights. Our capacity building efforts aim to improve incident response capabilities across a country/constituency and strengthen its cyber resilience - by actioning, rather than merely collecting, reported security events or incidents. The goal is to help CSIRTs become high functioning through sustainable low cost solutions that can be realistically maintained for the mid to long term. As part of the talk, we will focus on our cyber capacity building efforts in Africa (which include collaboration with FIRST.org) and the Indo-Pacific, funded by the UK Foreign, Commonwealth and Development Office.
June 25, 2025 14:45-15:20
- JPTLP:CLEAR
Broken Seals, Broken Trust: Flaws and Defences in the Certificate Ecosystem
Yuta Sawabe (NTT Security Holdings, JP), Rintaro Koike (NTT Security Holdings, JP)
Yuta Sawabe is a SOC analyst at NTT Security Holdings, where he is primarily involved in log analysis and malware analysis. He previously worked on malicious domain names. His is an Information Processing Society of Japan JIP Special Paper Winner (2019). He has spoken at Botconf, HITCON, JSAC and CODE BLUE in the past.
Rintaro Koike is a security analyst at NTT Security Holdings. He is engaged in threat research and malware analysis. In addition, he is the founder of "nao_sec" and is in charge of threat research. He focuses on APT attacks targeting East Asia and web-based attacks. He has been a speaker at VB, SAS, Botconf, AVAR and others.
It is not uncommon for malware and malicious files to carry code signatures, which have become a traded commodity in cybercrime forums. This presentation begins with an overview of the current state of malicious code-signing certificates, including an examination of how these certificates are bought and sold in such forums.Our research uncovered unusual behaviours among sellers dealing in malicious code-signing certificates. By exploiting these behaviours, we successfully predicted the potential misuse of certain code-signing certificates several months in advance. This presentation will detail our methodology, the findings of our analysis, and propose practical measures to combat these sellers.Through this presentation, attendees will gain a comprehensive understanding of the current landscape of malicious code-signing certificates, experimental approaches to address the issue, and effective defence strategies. This knowledge will enable SOC, IR, CSIRT, and other cybersecurity professionals to take proactive measures against malware and malicious files bearing fraudulent code signatures.
June 25, 2025 14:45-15:20
- USTLP:CLEAR
Building the Blueprint: Designing Effective Storyboards for Cybersecurity Tabletop Exercises
John Hollenberger (Secureworks, US), Aamir Lakhani (Fortinet, US)
John Hollenberger is a cybersecurity consultant with seventeen years of experience in web- and host-based vulnerability assessments, incident response, digital forensics collection, PCI compliance, and Data Loss Prevention with a primary focus on proactive incident response consulting services. John is also the co-author of Cybersecurity Tabletop Exercises: From Planning to Execution.
In his current position, John is a Lead Consultant of Proactive Services, conducting training exercises in Incident Response fundamentals, developing and facilitating tabletop exercises, and reviewing and creating Cybersecurity Incident Response Plans for large corporations, small businesses, and non-profit organizations. John currently holds the following degrees and certifications: BA, CISSP, CISA, CISM, CRISC, GCIH, GWAPT, and Security+.
Storyboarding plays a pivotal role in the successful planning and execution of cybersecurity tabletop exercises, which are designed to assess incident response and decision-making within an organization. A well-constructed storyboard acts as a blueprint for the exercise, providing a clear, structured roadmap that guides participants through various injects and decision points. It ensures clarity, consistency, and focus throughout the exercise while outlining objectives, challenges, and potential outcomes. The storyboard's key components include: objectives, which define the purpose and learning goals; scenarios, which describe the unfolding events tailored to the objectives and roles; injects, or planned events that drive the narrative; and key issues, critical junctures where decisions impact the exercise's progression. By incorporating these elements, a storyboard helps create dynamic, engaging simulations that reflect real-world challenges, encourage collaboration, and improve preparedness. This talk will provide participants with the tools to craft their own effective storyboards for their organization's cybersecurity tabletop exercises.
June 24, 2025 13:30-14:05
- GBTLP:CLEAR
Building Towards #SquadGoals - Brick by Brick to a Unified Cyber Response Effort
Michael S (National Cyber Security Centre - United Kingdom, GB)
Mike is the Deputy Head of Incident Management Policy & International in the UK's National Cyber Security Centre (NCSC-UK). With a background in national law enforcement and now as a generalist civil servant, he is now responsible for delivering the frameworks for the UK Government response to significant cyber events. Additionally, he proactively seeks and maintains relationships across industry and international partners to ensure collaboration to strengthen the resilience against, and response to, cyber adversaries.
In 2016 when the United Kingdom's National Cyber Security Centre was established, the landscape of those involved in the response to cyber incidents was vast. Flash forward nine years to 2025, this is significantly more crowded and this won't be a phenomenon faced only by the UK. In the face of adversary activity increasing in severity and scale, strong collaboration between government, industry and academia is key to strengthening cyber security resilience - and if it does go wrong - effective response.In this session, we will explore how to navigate the complexities posed by public/private partnerships, with differing duties to clients and often competing entities, to produce world-leading cyber security outputs. Case studies of NCSC-UK's recent successes with academic partners, c-suite engagement and co-sealing with insurance sector colleagues will reflect the opportunities available when sectors come together and operate as one.
June 23, 2025 14:00-14:35
- DE USTLP:CLEAR
Burnout: Detect, Investigate, Respond, Recover, Prevent
Carson ZimmermanDesiree Sacher (Finanz Informatik, DE), Carson Zimmerman (Microsoft, US)
Desiree Sacher-Boldewin works as Head of Operational IT Security at Finanz Informatik (DE). She has been in the cyber security industry for 20 years and in various Security Operation positions and published papers and talks about optimizing processes. She can be found on GitHub and on Twitter as @d3sre.
Carson Zimmerman has been working in and around security operations centers (SOCs) for over 20 years. Carson is a Principal Security Researcher at Microsoft, working to elevate SOCs around the globe through industry-leading security capabilities. He co-authored 11 Strategies of a World-Class Cybersecurity Operations Center, available at mitre.org/11Strategies.
Carson and Desiree -- both industry veterans, both used to high stress roles -- have bailed from excellent security jobs because they burned out. Emotional outbursts, damaged family relationships, lost job opportunities, degraded health, weight gain, the list goes on. We've seen our close friends experience resume generating events because they pushed themselves past their limit. Don't let this happen to you. There's a lot more to dealing with burnout than just "get some rest" and "take breaks". An easy ops tempo for one person is an unsustainable death march to others; everyone is different.Burnout has impacted all of us, but almost no one's talking about it. We are. In this talk, we will give you the tools you need to prevent, detect, investigate, respond, and recover from burnout. Combating burnout and stress is not just your responsibility; your coworkers and your boss have a role too -- we will cover both. By the end of this talk, you will have a better understanding of how burnout is different than ordinary stress, how it impacts your body and your mind, and what you can do about it.
June 26, 2025 13:30-14:05
- FITLP:CLEAR
Case: City of Helsinki Data Breach 2024
Matias Mesiä (NCSC-FI, FI)
Matias Mesiä has worked at NCSC-FI, the Finnish National Cyber Security Center, since 2020 with various responsibilities especially coordinating cases which needed special attention.
In 2024, the city of Helsinki was the victim of a data breach. The attacker stole the personal information of more than 100,000 Helsinki residents. Helsinki is the capital of Finland and the largest employer in Finland. The breach occurred in the city's education department.This presentation gives an insight into what happened and the role of NCSC-FI in this type of critical cyber incident. The cooperation between the city, NCSC-FI, ICT service providers and the police is crucial in such cases. What happens when the incident is in the media and the investigation is still ongoing? There are many lessons to be learned from this case. From keeping your environment up to date to dealing with the media.
June 23, 2025 11:45-12:20
- JPTLP:CLEAR
Comprehensive Investigation Results on Malware Code Interpretation by GPT-4
Yasuuyuki Tanaka (NTT Social Informatics Laboratories, JP)
Yasuyuki Tanaka, Ph.D, CISSP, GREM is currently engaged in vulnerability and malware analysis at NTT-CERT. Additionally, he teaches malware analysis techniques at a university.
The code interpretation capabilities of LLM, especially GPT4, are remarkable. On the other hand, the problem is that it contains errors that are difficult to confirm. The same is true for malware code analysis, and quantitative and comprehensive evaluation has not been performed. In this paper, we created a dataset that covers all the behaviors used in many malware, and quantitatively and comprehensively clarified the malware code interpretation performance of GPT4 through experiments. We obtained disassembly code and decompiled code for the corresponding functions for 35 categories and 233 typical malware behaviors, and had GPT4 interpret the code to analyze whether each behavior could be identified. As a result, 70% of the behaviors in the decompiled code and 8% of the behaviors in the disassembly code could be identified. We explain the specific behaviors that could and could not be identified for each. We present eight findings obtained by classifying and analyzing each behavior into three categories: method and logic, Windows specifications, and algorithms, and discuss future challenges.
June 27, 2025 11:15-11:50
- DE USTLP:GREEN
Crypted Hearts: Exposing the HeartCrypt Operation
Daniel Bunce (Palo Alto Networks, Unit 42, DE), Jerome Tujague (Palo Alto Networks, Unit 42, US)
Daniel Bunce is a Principal Malware Reverse Engineer at Unit 42 within Palo Alto Networks. He's mostly focused on analyzing malware linked to incident response cases, reverse engineering malicious code and identifying the TTPs used by cybercriminals. In addition to his professional role, Daniel is invested in the development of reverse engineering courses. He designs and delivers training programs such as Zero2Automated, which aim to educate and prepare individuals interested in the field.
As a dedicated malware reverse engineer at Palo Alto Networks' Unit 42, I specialize in uncovering the mechanics behind cyber threats, focusing on crimeware and APT-level malware. Each day involves a deep dive into disassembled code or building custom scripts to extract Indicators of Compromise (IOCs) that support defensive efforts. Outside of cybersecurity, I love music (building my vinyl collection), weight training, and reading sci-fi or fantasy books.
In June 2024, Unit 42 began tracking a new Packer-as-a-Service operation, self-titled "HeartCrypt", which was sold across several forums and Telegram accounts. Through our research, we've identified over 2,000 malware samples packed with HeartCrypt, comprising over 45 malware families in the last 10 months. The malware families packed by HeartCrypt range from commodity malware such as Remcos and LummaStealer, to pre-ransomware deployment tooling leveraged by high-level ransomware group affiliates, such as BlackSuit and Hive Ransomware.HeartCrypt provides threat actors with a low-cost entry of only $20 USD per "crypt", and a moderately sophisticated approach to malware payload crypting, which explains the high adoption rate over the past several months. Elements of polymorphism, control flow obfuscation, and EDR/AV evasion techniques are present within HeartCrypt, and while the core packer is rudimentary in nature, it is highly successful in evading both scantime and runtime anti-malware scanners.This talk will explore the inner workings of HeartCrypt, covering its evasion techniques, obfuscation methods, and development timeline - from the early stages, to its use in recent LummaStealer Fake Captcha campaigns. We'll conclude by examining the threat actor behind this packer-as-a-service, specifically focusing on sales channels and underground forum activity. We'll also be sharing YARA rules developed to track every sample of HeartCrypt so far.
June 25, 2025 11:15-11:50
- USTLP:CLEAR
Detection Engineering 101 : Establishing a Structured Approach to Detection Engineering
Tomohisa Ishikawa (Tokio Marine Holdings, US)
Tomohisa is a Lead Cyber Security Architect at a global insurance company, bringing a wealth of expertise across diverse domains of cybersecurity. His professional experience spans global security strategy, security architecture, detection engineering, security operations, threat intelligence analysis, and digital forensics and incident response (DFIR). He has also been involved in red teaming and delivering security training. Tomohisa holds a Doctor of Engineering degree and a broad array of industry-recognized certifications, including CISSP, CSSLP, CCSP, CISA, CISM, CDPSE, and PMP.
Beyond his corporate responsibilities, Tomohisa has made significant contributions to the cybersecurity community. He has served as a speaker, a Cybersecurity Expert Advisor to the Ministry of Internal Affairs and Communications (MIC) in Japan, and a member of the national IT exam committee. He is also a translator and author. Tomohisa has spoken at international conferences such as SANSFIRE 2011 & 2012, DEFCON 24 SE Village, and FIRSTCON23, as well as numerous domestic conferences in Japan. As an author, he has written a book on threat intelligence in Japanese and translated seven security books published by O'Reilly Japan.
Detection Engineering (DE) is a vital aspect of modern cybersecurity operations, aimed at enhancing detection and response capabilities to address the ever-evolving threat landscape. This session presents a structured approach to DE, centered around the Detection and Response Development Lifecycle (DR-DLC) and supported by key frameworks and methodologies. These include the three techniques for improving detection capabilities, the HOPE framework, the VECTOR framework, the 3M+C framework, and three essential metrics (Time, Efficiency, and Coverage) for evaluating and managing an effective DE program. Together, these tools and processes enable a systematic approach to conducting DE and building a robust program.The key takeaway for attendees is a set of actionable strategies and thought toolbox to implement and refine DE practices. Participants will gain practical insights into structured processes and standardized methodologies, equipping them to enhance their organization's detection engineering capabilities effectively.
June 26, 2025 09:00-09:35
- GHTLP:GREEN
Developing a Sectoral CERT Ecosystem
Albert Antwi-Boasiako (Cyber Security Authority, GH), Stephen Cudjoe-Seshie (Cyber Security Authority, GH)
Dr. Albert Antwi-Boasiako, for more than a decade, has been pioneering cybersecurity development activities in Africa- both in the private sector and in government. Since 2017, Dr. Antwi-Boasiako has led the institutionalisation of Ghana's cybersecurity development, positioning the country in the Tier-1 category (role modelling) of the ITU's 2024 Global Cybersecurity Index.
Stephen is a versatile Technology Manager with nearly 2 decades of experience in ICT infrastructure strategy, planning, design, deployment, and operations. He holds an MBA in Engineering Management from Coventry University, UK and a Bachelor of Engineering (Hons.) in Electronics Engineering from the Multimedia University, Malaysia. He has been a Certified Information Systems Security Professional (CISSP�) since 2011. Stephen�s mandate at the CSA is to help build a Secure and Resilient Digital Ghana through world-class proactive and reactive cybersecurity incident response measures within a framework of global collaboration.
This presentation will discuss considerations for developing a Sectoral CERT ecosystem as part of the wider national cybersecurity strategy and highlight some key learnings from Ghana's approach.
June 26, 2025 15:00-15:35
- LT LVTLP:CLEAR
Engaging with the Media to Foster Cybersecurity Resilience
Zivile Necejauskaite (NRD Cyber Security, LT), Madara Krutova (Latvia's CERT.LV, part of the National Cybersecurity Centre, LV)
Zivile Necejauskaite is the Director of Marketing and Communication at NRD Cyber Security, a Lithuanian cybersecurity technology consulting and incident response company. With over 15 years of experience as a communication specialist, she has focused the past 7 years on the cybersecurity sector, specialising in impact, change, and crisis communications. In her role, Zivile actively engages with media professionals to enhance public understanding of cybersecurity issues. She has moderated and hosted cybersecurity panels and events both in Lithuania and internationally, including co-hosting the Cyber Defence East Africa conference. Through her efforts, Zivile contributes to strengthening cybersecurity resilience by fostering informed public discourse and promoting best practices in the digital landscape.
Madara Krutova is a representative of CERT.LV, Latvia's Information Technology Security Incident Response Institution. In this role, she actively engages with the media to enhance public awareness of cybersecurity issues. Madara has provided expert advice on safe online shopping practices, especially during peak periods like the holiday season, emphasizing vigilance against cyber threats such as phishing and fraudulent websites. She has also addressed potential increases in Distributed Denial-of-Service (DDoS) attacks during significant events, advising the public on preparedness and response strategies. Through her efforts, Madara contributes to strengthening cybersecurity resilience in Latvia.
Engaging with the media is an essential yet underutilised strategy for fostering cybersecurity resilience. This presentation explores approaches from Latvia and Lithuania, showcasing how different entities can collaborate with media to enhance public understanding of cybersecurity. Latvia's CERT.LV, part of the National Cybersecurity Centre, prioritises providing accurate, evidence-based information to media outlets, addressing the public's reliance on news portals for cybersecurity knowledge. In contrast, Lithuania, lacking a centralised cybersecurity awareness body, provides opportunities for other cybersecurity ecosystem members like NRD Cyber Security to foster media engagement initiatives. The company emphasises educating journalists through collaborative press releases and informal events to counter misconceptions and promote constructive narratives on cybersecurity. By sharing experiences and insights, this session highlights effective tactics to cultivate productive relationships with media professionals. These efforts aim to shift media focus from sensationalised reporting to fostering informed discussions, ultimately empowering the public to adopt cyber-resilient practices.
June 26, 2025 10:45-11:20
- AUTLP:CLEAR
Enhancing Incident Response with AWS CIRT, MSSPs, and ISVs
Matthew Gurr (Full Membership via Amazon, AU)
Matt Gurr is a Senior Security Engineer with the AWS Global Services Security Organisation. In his role, Matt is responsible for a team of incident responders that assist customers during active security events on the customer side of the shared responsibility model. The team is made up of Senior Security Engineers and Solution Architects with experience in performing incident response in AWS. Prior to joining AWS, Matt brings over 25 years of experience in security roles in the banking and finance, government and defense industries. Matt holds a master's degree in Information Technology from Queensland University of Technology (QUT), and industry certifications from ISC2, ISACA, SABSA and SANS organisations. In his spare time, Matt enjoys being outdoors with family and cycling.
AWS strategically partners with Managed Security Service Providers (MSSPs), Independent Software Vendors (ISVs), National Computer Security Incident Response Teams (CSIRTs), and other agencies to amplify and enhance its security and incident response capabilities. This global ecosystem leverages AWS's robust cloud infrastructure while incorporating specialized security expertise and innovative software solutions developed by partners. MSSPs can offer managed security services, continuous monitoring, and rapid incident response, complemented by ISVs who create the cutting-edge security tools and integrations tailored for AWS customer environments. National CSIRTs and other agencies contribute their unique insights and capabilities to this collaborative framework. Together, these partnerships form a comprehensive security ecosystem that addresses evolving threats, ensures compliance, and enables rapid threat detection and mitigation. This multi-faceted approach empowers organizations with robust, highly scalable security solutions, expert management, and seamless integrations, significantly bolstering a customers' overall security posture in the cloud.
June 25, 2025 13:15-13:50
- JP USTLP:CLEAR
Establishing a Global Community of Practice on Coordinated Vulnerability Disclosure (CVD)
Tomo ItoTomo Ito (JPCERT Coordination Center, JP), Justin Murphy (DHS/CISA, US)
Working on CVD at JPCERT/CC for 9 years, Tomo currently leads the Global CVD project of the organization, which aims to contribute to the global CVD ecosystem stability through collaborations with the stakeholders from different parts of the world.
Justin Murphy is a Vulnerability Analyst with the Cybersecurity and Infrastructure Security Agency (CISA). As part of CISA's Coordinated Vulnerability Disclosure (CVD) Team, he helps to coordinate the remediation, mitigation, and public disclosure of newly identified cybersecurity vulnerabilities in products and services with affected vendor(s), ranging from industrial control systems (ICS), medical devices, Internet of Things (IoT), and traditional information technology (IT) vulnerabilities. Justin also focuses on international collaboration regarding vulnerability management serving as co-chair for the Global Community of Practice on CVD (CVD-COP) as well as the OASIS Open technical committees for the Common Security Advisory Framework (CSAF) and OpenEoX standards.
As global cyber threats become increasingly sophisticated and widespread, Coordinated Vulnerability Disclosure (CVD) serves as an essential, structured approach for timely and effective communication of vulnerability information among the affected stakeholders. The recently established Global Community of Practice on CVD (CVD-COP) is an important initiative aimed at encouraging collaboration among governmental entities and national CERTs in their roles as third-party CVD coordinators. This presentation will explore the motivations behind the CVD-COP's formation, emphasizing the critical need for CVD as a good global practice and an essential risk reduction activity.We will outline the community's key activities, including developing best practices and training materials, facilitating knowledge and experience sharing, and promoting international cooperation among stakeholders. These efforts aim to establish harmonization and enhance the effectiveness of CVD across the globe.The presentation will also review the challenges faced by the CVD-COP, such as varying levels of understanding among participants and the complexities of different governance criteria. Addressing these issues is crucial for achieving the community's objectives and realizing the benefits of harmonization for CVD practices globally. The presentation will facilitate an interactive discussion, inviting audience input on how the community can optimize its support for the vulnerability management ecosystem. By inviting participants to share their insights and experiences, we hope to identify strategies that can strengthen the CVD-COP's effectiveness and foster a collaboration among global stakeholders, including security researchers, vendors, and downstream users, ultimately promoting a more secure vulnerability management ecosystem.
June 27, 2025 10:30-11:05
- ILTLP:CLEAR
Evading in Plain Sight: How Adversaries Beat User-Mode Protection Engines
Omri Misgav (Independent, IL)
Omri is an independent security researcher with over a decade of experience in the field. Previously, he headed a security research group in Fortinet's FortiGuard Labs, focused on OS internals, malware and vulnerabilities. Omri joined Fortinet following enSilo's acquisition, where he was the security research team leader and spearheaded the development of new offensive and defensive techniques. Before that, He led the R&D of unique network and endpoint security products for large-scale enterprise environments and was part of an incident response team, conducting investigations and hunting for nation-state threat actors. Omri is a past speaker in various conferences such as DEF CON, AVAR, BSideLV, BSidesTLV and others.
Following the largest global IT outage in history on last July, which disrupted numerous services and industries, many took to the public stage to advocate against allowing endpoint security vendors to design and deploy agents that are kernel-based, even prompting regulators to weigh in.User mode-based engines are already integral piece of many endpoint-oriented security solutions from different malware analysis tools to various commercial products like AVs, EDRs, sandboxes and more. This kicked off research to map the entire threat landscape to assess the impact of the proposed design shift. Analyzing and reverse-engineering over 40 different malware families and open-source projects yielded an in-depth understanding and insights into attackers' tradecraft.This talk will explore all the unique tactics and techniques which malware authors and red teamers have developed to beat user mode-based protection engines, showcasing their very fundamental design flaw: the reliance on the same execution environment that is intended to be protected. The talk will also highlight drawbacks of the various methods and provide a detection scheme focusing on runtime and forensics indicators to give a leg up to CISRTs, malware researchers and detection engineers facing this issue.
June 25, 2025 13:15-13:50
- USTLP:CLEAR
Forecasting Cybersecurity Data: Making Sense of the Senseless
Leigh Metcalf (CERT, US)
Leigh Metcalf is a Senior Network Security Research Analyst at the Carnegie Mellon University Software Engineering Institute's cybersecurity (CERT) division. She develops cutting-edge information and training to improve the practice of cybersecurity. Before joining CERT, Leigh spent more than ten years in industry working as a systems engineer, architect, and security specialist. Leigh also has a PhD in theoretical mathematics from Auburn University. Leigh has presented research at numerous conferences and is co-author of Cybersecurity: Myths and Misconceptions with Gene Spafford and Josiah Dykstra.
Planning resource management in cybersecurity is difficult and is always affected by the trends. How many vulnerabilities do we expect? How much malware? How many security incidents? Unfortunately, these trends are often affected by multiple causes that are not always related. For example, a new threat actor, a new malware library, a new class of vulnerability, or a new method of finding vulnerabilities. They may be interrelated, they may be unrelated, and they may be unknown, but at the core, they influence how many vulnerabilities, malware, incidents, and other cybersecurity events occur.As an outgrowth of analyzing COVID-19 trends and causes, we developed a new method for modeling multicausal data, which can have disparate underlying causes for the changes in trends. This method has been expanded to prediction, where we predict the point at which the trend in data changes, allowing us to forecast the number of events in the future.
June 27, 2025 09:00-09:35
- DKTLP:CLEAR
From OSINT to Production Floor: How Threat Actors Can Infiltrate Your OT Operations Without You Even Knowing
Claudiu Chelaru (Mnemonic, DK)
I do ICS/OT security with a focus on attack detection capabilities and purple teaming. I have a pentester background, and have worked extensively across transportation, manufacturing and energy sectors. In my spare time I play around with product/hardware security.
This presentation details the outcomes of a purple teaming exercise with an industrial client, focusing on the security intersections between Information Technology (IT) and Operational Technology (OT) systems.Parts:- Part 1: Assessment background, OSINT, Internet Asset Mapping- Part 2: Initial Foothold (primary and alternative attack paths), Lateral Movement within the IT-DMZ- Part 3: Lateral Movement from IT-DMZ towards Enterprise IT, Lateral Movement from Enterprise IT towards OT- Part 4: OT Environment (Cyber Physical Payloads), Remote Manipulation of Water Tank Levels- Part 5: Conclusion and Countermeasures
June 25, 2025 13:15-13:50
- CZTLP:CLEAR
From p0f to JA4+: Network Fingerprinting and Reconnaissance
Vlad Iliushin (Cybersecurity Expert @ ELLIO, President of AMTSO (Anti-Malware Testing Standards Organization), CZ)
Vlad is the co-founder and cybersecurity expert at ELLIO and President of the Anti-Malware Testing Standards Organization (AMTSO). A true cybersecurity enthusiast, Vlad�s passionate about network security, IoT, and cyber deception. Before ELLIO, he founded and led the Avast IoT Lab (now Gen Digital), developing security features and researching IoT threats. He has spoken at many conferences, including Web Summit and South by Southwest (SXSW), where he demonstrated IoT vulnerabilities.
As scanning and reconnaissance methods grow more diverse -- from public platforms like Shodan and Censys to hidden probing by botnets and bulletproof hosting services -- security teams need better ways to understand who is on the other side of their network connections. This talk will show how network fingerprinting has developed over time, starting with simple tools like p0f and moving up to more advanced methods like JA4, JA4+, and MuonFP. We'll discuss how these modern fingerprints can help analysts recognize the tools and infrastructure used by attackers, whether they are fast scanners, basic banner grabbers, or connections routed through VPNs and jump servers. You'll learn how to use these fingerprints to strengthen your defenses, protect critical infrastructure, and reduce your visibility to public scanners. We will also explain how to fit fingerprinting into SOC and CSIRT workflows, noting both what it can and cannot do. Attendees will leave with a practical understanding of modern fingerprinting techniques and a few examples they can apply in their daily work.
June 25, 2025 10:30-11:05
- AR ESTLP:CLEAR
From TTPs to Deception: Crafting Strategies
Diego Staino (BASE4 Security, AR), Federico Pacheco (BASE4 Security, ES)
Cybersecurity professional with 14+ years of experience as IT and security consultant. Certified Incident Handler (ECIH) and Undergraduate education in "Security in ICTs and Communications" (IUPFA). Currently Cybersecurity Innovation Leader at BASE4 Security where he designs initiatives in various areas of cybersecurity that lead to the creation of new capabilities for internal areas of the organization or services and products for third parties. Full Profile: https://www.linkedin.com/in/diegostaino/
Cybersecurity professional with a background in electronic engineering and several industry-recognized certifications. 20+ years of teaching experience at the most prestigious universities in Argentina. Has worked in the public and private sectors, including regional roles in global companies. He is in charge of R&D+i at BASE4 Security. Full Profile: https://www.linkedin.com/in/federicopacheco/
Defining deception strategies in production environments is a challenge that requires a strategic approach. This session introduces a practical methodology for translating Tactics, Techniques, and Procedures (TTPs) into concrete deception activities applicable to real-world scenarios. We will explore a four-phase process: behavior extraction, criteria selection, mapping TTPs to deception activities, and storytelling design. Attendees will leave with an approach for analyzing cyber threats, identifying adversary behaviors, selecting appropriate deception criteria, and designing narratives to enhance their deception strategies. By the end of the session, participants will be equipped with a guide to begin developing an effective cyber deception plan.
June 23, 2025 11:00-11:35
- AT AUTLP:GREEN
From Unstructured CTI Reports to Yara/SPL via LLMs
Aaron KaplanAaron Kaplan (independent / EC-DIGIT-CSIRC, AT), Jürgen Brandl (BMI, AT), Chris Horsley (Cosive, AU)
Aaron is currently working for EC-DIGIT-CSIRC where he focuses on how to leverage the power of Large Language Models (LLMs) for CTI purposes. Prior to joining EC-DIGIT-CSIRC, Aaron was employee #4 of CERT.at. He co-founded intelmq.org.
In the field of AI, Aaron co-founded deep-insights.ai, a medical AI research group focussing on delivering deep learning based classifiers for the rapid detection of lesions in the human body. He also co-chairs the AI Security SIG at FIRST.org. Aaron likes to come up with ideas which have a strong benefit for (digital) society as a whole and that scale up. He loves sharing knowledge and open source tools to automate stuff.
Jürgen Brandl is a senior cyber security analyst at the Federal Ministry of the Interior and has 10 years of experience working in incident response, protecting both governmental and critical infrastructure from cyber attacks. In his current role, he is researching and advocating for the need to use AI to face the emerging threat landscape.
Chris Horsley is the CTO and one of the co-founders of Cosive, a cybersecurity and CTI specialist consultancy based in Australia and New Zealand with a particular focus on security operations, IR, CTI practices, and tooling. He also enjoys experimenting with LLMs and CTI data formats like STIX and MISP and how to visualise and represent CTI concepts better.
He also has a long background in the international CSIRT community, which spanned roles including open source intelligence gathering, vulnerability disclosure handling, software and tooling development, malware analysis, and joint initiatives for national CSIRTs. Chris has previously worked as a security analyst for AusCERT, the national CSIRT at that time, and JPCERT/CC, the Japanese national CSIRT.
This talk builds on top of our research (presented at FIRSTCON 2024) on how to train and fine-tune a local LLM ("neuroCTI") for Cyber Threat Intel (CTI) reports. While the previous talk focused on making a local LLM "understand" CTI reports, this talk focuses on leveraging the previous successes.The presenters will show how to use a fine-tuned local LLM to extract relevant information from CTI reports and turn this info into search queries for your favorite SIEM.We believe, achieving this task with a local LLM is important in IT security settings, since not all data may be shared with cloud based LLMs such as Openai's GPT-4*.We will share insights as well as failures from our journey and enable the audience to replicate our findings within their own organisation.All results will be made available as open source.
June 23, 2025 11:00-11:35
- USTLP:CLEAR
From Zero to Prepared: Implementing a Weekly Incident Response Drill Program
Jeffrey Carpenter (Accuray, Inc., US)
Jeffrey Carpenter has dedicated more than 35 years to improving the state of information security in roles such as incident responder, product security officer, information security officer and leader. He currently is the deputy CISO at Accuray, a medical device manufacturer. Jeffrey spent two decades at the CERT® Coordination Center, based at Carnegie Mellon University's Software Engineering Institute and he also was Senior Director of Incident Response Consulting and Threat Intelligence at Dell Secureworks. Jeffrey has been inducted into the Incident Response Hall of Fame by the Forum of Incident Response and Security Teams (FIRST).
Many incident response teams lack the real-world incident experience needed to confidently respond to attacks. This presentation demonstrates how to implement a weekly cyber drill program to build muscle memory and enhance incident response skills within your team. We will showcase how realistic scenarios, injected challenges, and post-drill analysis can cultivate practical expertise and improve incident response playbooks. A key focus will be how to leverage Large Language Models (LLMs) like Google Gemini and ChatGPT to accelerate and streamline the drill creation process. Attendees will learn how to design a weekly drill program, use AI to generate content, and drive improvements in their incident response process. Leave with ready to use drills, prompts and actionable knowledge that will help improve your teams capability and confidence. Targeted at incident response leaders and managers, but valuable for all team members.
June 24, 2025 09:00-09:35
- SETLP:CLEAR
Guardians of the Hypervisor
Nicklas Keijser (Truesec, SE), Anders Olsson (Truesec, SE)
Nicklas Keijser is a Senior Threat Analyst at Truesec, a role that involves much reverse engineering and looking into all things malware. Nicklas is also a subject matter expert in industrial control systems and anything related to its security. He started his career programming PLCs, SCADA systems, and almost anything else possible within the industry. Before joining Truesec, Nicklas worked at the Swedish National CERT in the Swedish Civil Contingencies Agency.
Anders is a Senior Infrastructure Architect with more than 25 years of experience in design and implementation of IT infrastructure. He�s one of only 301 people worldwide who have passed the VMware Certified Design Expert (VCDX) design and in-person panel defense, and he has also been awarded the VMware vExpert title every year from 2016 to present. Anders specializes in VMware vSphere security, covering both proactive security design and hardening as well as reactive incident response and forensics work.
All ransomware actors have now the capability to encrypt hypervisors that has led to some of the biggest attacks and brings down whole organisation. This talk will give in-depth insight how these attacks are performed, how to protect from them but also how detection and response can be accomplished, even thou it is not possible to install any agents on ESXi and vSphere, so they can be stopped.
June 26, 2025 09:45-10:20
- DKTLP: RED
I Got 99 Problems But a Decryptor Ain't One: How to Save $1.5 Million on Ransom Via Manual Recovery of Encrypted VMs
Anton Kalinin (Principal Security Consultant at CSIS Security Group A/S, First member, DK)
Anton has over 13 years of experience in the cybersecurity field and has a wide area of expertise, including malware analysis, digital forensics, and incident response. He joined Kaspersky in 2011 as a malware analyst. He spent seven years at Kaspersky and had different positions across the company, such as senior digital forensics analyst and security researcher prior to moving to Sophos. During his Sophos years, Anton was working on the analysis and detection of emerging threats and in-house sandbox development to provide better detection capabilities for the customers. At Yandex, he was a part of the SOC team performing varieties of different tasks such as incident response and threat hunting. In addition, he worked closely with system administrators and various service teams to improve network visibility and make it easier for security engineers to catch suspicious activity inside the network. Currently, Anton performs full-cycle incident response as a Principal Security Consultant at CSIS Security Group.
There are plenty of resources on how to prepare, investigate and how to recover from critical incidents such as a ransomware attack, they are one of the most common attacks incident responders deal with. However, the resources are high-level, provide very few technical details or rely on adequate disaster recovery preparations. With modern ransomware attacks targeting hypervisors more frequently it is important for defenders to understand what the possible options are for recovery beyond some of the typical responses of paying a ransom or standing up a new environment. This research was carried out during the recovery stage of a recent incident in a customer's environment. During the research, several tools were identified which could aid an organizations recovery efforts but they have limited compatibility with ESXI hosts, so we had to develop a solution. The talk aims to provide hands-on experience of the manual recovery of partially encrypted Virtual Machines on an ESXI server and provide a step-by-step guide on how to recover.The talk is aimed to cover following topics:- Foundational knowledge you need to perform recovery of partially encrypted VMs by yourself (Virtual Machine Disks (VMDK) and partition table basics)- Step-by-step walkthrough of the actual case and the problems we overcame.- Hands-on approach to real world recovery and the difficulties which may arise- How to automate the process of recoveryWe will conclude with lessons learned from the research and the case we faced , and limitations of the approach.
June 24, 2025 09:45-10:20
- NOTLP:CLEAR
Incident Preparedness Takeaways from 5000 Exercise Participants
Erlend Andreas Gjære (Secure Practice, NO)
Erlend Andreas Gjære has studied security and people for 15 years, including six years as a research scientist, with a focus on training, awareness and culture, behavior and incident response. In 2017, he became a tech-founder at Secure Practice, to help people with digital security at scale. He has delivered more than one hundred preparedness exercises across Norway and Denmark, through a tour concept of free events to increase cyber preparedness among thousands of small and medium enterprises, with support from the European Cybersecurity Competence Centre (ECCC), and winning the European Digital Skills Award 2024 for this effort.
Preparedness exercises allow people to engage first-hand with a cyber incident scenario, seeing how they respond to various situations and dilemmas. They help us learn how to better respond to a crisis, but will often highlight risks and vulnerabilities which are possible to immediately convert to preventive mitigations. When multiple companies exercise together, participants can also learn from each other, and even make new security friends.This talk summarizes what we've learned through national cyber exercise tours in Norway and Denmark, where 5000 people who are responsible for IT, security and preparedness from 3500 companies have participated since last year. We will describe key findings from discussions and input across a wide range of sectors, roles and locations participating. You will also learn useful tips and tricks for facilitating your own exercises, to create awareness and good learning moments for all of your colleagues -- whether they are part of an incident response team or not.
June 24, 2025 09:45-10:20
- CA USTLP:CLEAR
Inside the Information Stealer Ecosystem: From Compromise to Countermeasure
Olivier Bilodeau (Flare, CA), Nick Ascoli (Flare, US)
Olivier Bilodeau, a principal researcher at Flare, brings 12+ years of cutting-edge infosec expertise in honeypot operations, binary reverse-engineering, and RDP interception. Passionate communicator, Olivier spoke at conferences like BlackHat, DEFCON, SecTor, Derbycon, and more. Invested in his community, he co-organizes MontrèHack, is NorthSec's President, and runs its Hacker Jeopardy.
Nick Ascoli is a Senior Product Strategist at Flare and an experienced threat researcher who is recognized for his expertise in data leaks, reconnaissance, and detection engineering. Nick is an active member of the cybersecurity community contributing to open-source projects, regularly appearing on podcasts (Cyberwire, Simply Cyber, etc.) and sharing research and insights at conferences (GrrCON, B-Sides, DEFCON Villages, SANS, etc.)
Modern information stealers have evolved far beyond simple credential harvesters into sophisticated tools that capture complete digital fingerprints of their victims. This technical deep-dive unveils groundbreaking research into stealer architecture, attack chains, and defensive countermeasures. Through analysis of real-world compromise scenarios, including desktop screenshots captured at infection moments, we reveal how threat actors leverage compromised ad networks and trojanized software for mass deployment. The presentation examines the Operation Magnus takedown, a collaborative effort with ESET and law enforcement, demonstrating the complex infrastructure behind professional criminal enterprises.Building on hands-on experience with stealer log analysis, we detail how modern threats bypass multi-factor authentication, compromise password managers, and extract cryptocurrency wallets. We examine Chrome's application-bound encryption and why, although already circumvented, it creates new detection opportunities. The session concludes with practical defensive strategies and the release of two community resources: a PowerShell framework for automated credential testing against Entra ID and a curated dataset of stealer logs for security research.This presentation equips security practitioners with concrete insights and tools to defend against one of today's most consequential yet underexamined threats.
June 25, 2025 10:30-11:05
- LU BETLP:CLEAR
It Wasn't Me - Sharing Threat Intel Anonymously using Abracadabra
Andras IklodyAndras Iklody (CIRCL, LU), Trey Darley (Liaison, BE)
Andras Iklody works at the Luxembourgian Computer Security Incident Response Team (CSIRT) CIRCL as a software engineer and has been leading the development of the MISP core since early 2013. He is a firm believer that there are no problems that cannot be tackled by building the right tool.
Trey Darley has been a long-standing member of the FIRST community, and has served a variety of volunteer roles, including a term on the FIRST board, during which he co-founded the FIRST standards committee. Trey is well known for his work on open cybersecurity standards like STIX/TAXII and others. He's also been aligned with the Langsec faction for many years. Trey's patron saints are Grace Hopper, Evi Nemeth, and Paul Erdös.
Sharing threat information has come a long way - we have thriving communities such as the FIRST community, national networks, industry groups all engaged in sharing their research, incident analyses as well as high level threat intelligence.However, whilst there is plenty of sharing happening today, a large part of the community still isn't able to contribute out of fear of reputation loss or generally the responsibility that comes with attaching the shared information to one's employer or self.In order to offer an (open-source) solution to this, as well as various new reporting duties that have emerged, we'd like to introduce Abracadabra.
June 24, 2025 13:30-14:05
- NOTLP:CLEAR
Keynote Address: Unpacking the Human Factor: Navigating Individual, Socio-Technical, and Systemic Challenges in Incident Investigations
Nina SundeNina Sunde (Norwegian Police University College, NO)
Nina Sunde is a Police Superintendent with a PhD in criminology and works as a researcher and lecturer at The Norwegian Police University College. She co-leads the Police and Technology research group and is actively involved in research projects, including the EU Horizon-funded Clarus project and EB-CRIME. Her research primarily focuses on investigation practices related to digital evidence and cybercrime, with an emphasis on quality assurance and error mitigation in digital forensic investigations. With 25 years of experience in the Norwegian Police, where she specialized in cybercrime investigations, Sunde brings extensive practical expertise to her academic work.
June 23, 2025 09:30-10:30
- BETLP:GREEN
Keypocalypse
Emilien Le Jamtel (CERT-EU, BE)
Emilien Le Jamtel has been a cyber security expert for the last 15 years. After building up his technical skills in penetration testing and red teaming, he joined CERT-EU in 2014 as a Threat Intelligence Analyst before quickly moving to CERT-EU's Digital Forensics and Incident Response team. Since 2021, he has been leading the DevSecOps team responsible for the infrastructure and tooling used by CERT-EU staff to deliver a wide range of services to all the european union entities. Emilien is a regular speaker at cybersecurity conferences such as FIRST, Hack.lu, Botconf, and NorthSec.
Mechanical keyboards are trendy and cherished not only by the gaming community but also among IT professionals. While they offer advanced customisation and productivity features, they can also introduce new risks for organisations. In this talk, we will dive into the fascinating world of mechanical keyboard enthusiasts and explore how these devices can be abused by threat actors. Topics will include threat modelling, supply chain attacks, firmware extraction, and a zero-trust approach to keyboard firmware security.
June 26, 2025 15:00-15:35
- TLP:CLEAR
Lazarus Group Evolved Their Infection Chain with Old and New Malware
Sojun Ryu (Kaspersky)
Sojun Ryu graduated from the 'Next Generation of Top Security Leader Program' (Best of Best, BoB) at the Korea Information Technology Institute (KITRI) in 2013, and holds a Master's degree in information security from Sungkyunkwan University in Korea. Sojun worked at KrCERT/CC for seven years, analyzing malware and responding to incidents, and is one of the authors of "Operation Bookcodes" published by KrCERT/CC in 2020. After moving to S2W, a cybersecurity startup in Korea, he expanded his coverage during his time as a team leader, focusing on not only APT but also on cybercrime. Sojun is now a member of GReAT at Kaspersky and is very focused on APT research.
Over recent years, the Lazarus APT group has distributed their own malware by leveraging fraudulent job opportunities targeting employees in various industries, including defense, aerospace, cryptocurrency, and other global sectors. This attack campaign is called DeathNote campaign and is also referred to as "Operation DreamJob".During our recent investigation, we observed that the Lazarus group had delivered archive files containing malicious files to at least two employees who were engaged with the same organization over the course of one month. The threat actor used a fake job offer sent by an impersonated recruiter.After looking into the attack, we were able to uncover a detailed infection chain, giving us insight into their intentions. Although they used known strategies and malware for initial infiltration, they intentionally introduced new malware to avoid detection by leveraging on the fact that the malware hasn't been used before. They have also stepped up their efforts to actively evade detection by exploiting legitimately compromised websites as C2 servers.
June 26, 2025 11:30-12:05
- JPTLP:CLEAR
Maximizing the Potential of AWS-WAF: Fully Automating threat detection with Custom Managed Rules and Proprietary Threat Intelligence
Masato Suzuki (NTT-ME CORPERATION, JP), Shota Sugawara (NTT-ME CORPERATION, JP), Atsushi Kobayashi (NTT-ME CORPERATION, JP), Hirofumi Kawauchi (NTT-ME CORPERATION, JP)
Masato Suzuki is engaged in service development and maintenance to provide Managed Security Services (MSS) for enterprises and municipalities. His experience includes researching advanced log analysis methods for ISPs and enhancing OSINT technologies for NTT Group's CSIRT as part of NTT-CERT. During the Tokyo Olympic and Paralympic Games, he conducted vulnerability testing and security audits, ensuring the security configuration of over 10,000 network and security devices.
Shota Sugawara leads the development and operation of Managed Security Services (MSS) for enterprises and municipalities, focusing on cloud security operations using AWS. His experience includes conducting vulnerability testing and ensuring the security of hundreds of IT systems owned by NTT East, Japan's largest telecom carrier. He is also actively involved in CTF competitions, specializing in Pwnable challenges.
Dr. Atsushi Kobayashi, SOC Manager at NTT-ME, has over 5 years of experience in cybersecurity. He was previously involved in research on traffic monitoring technology at NTT Laboratories, participated in the standardization work of IPFIX at IETF, and then wrote RFC5982, 6183, 7119, etc. After transferring to NTT East, he was engaged in the planning and maintenance of internal networks, integrating dozens of AD servers, renewing a VDI infrastructure and file servers for 50,000 users.
Dr. Hirofumi Kawauchi, SOC Manager at NTT-ME, has over 10 years of experience in cybersecurity. He previously led incident response and vulnerability management at NTT East, Japan's largest telecom carrier. He also worked as a SOC analyst and threat intelligence developer at NTT Security US. Upon returning to Japan, he launched NTT East's Managed Security Service as a tech lead, developing SOC infrastructure. He actively contributes to Japan's telecom industry and cybersecurity education through ICT-ISAC JAPAN, university lectures, and industry events. He has also presented at BSides Las Vegas. He holds CISSP, GCFA, GPEN, and AWS-SAP/SCS certifications. NTT Group Certified Security Principal, PhD in Engineering.
In our SOC, we leverage AWS-WAF to protect numerous client web servers, but we have taken it a step further. By integrating it with our proprietary threat intelligence, we have fully automated the process -- from detecting attacks to investigating and blocking them. In this presentation, we will share how we achieved this through: 1) Setting up custom rules to make AWS-WAF operations more effective and efficient, 2) Implementing an automated detection and blocking system, and 3) Presenting examples of these functions successfully countering actual cyber threats. This presentation will provide practical and actionable insights to enhance your day-to-day security operations.
June 24, 2025 15:00-15:35
- DETLP:CLEAR
Modern MISP
Konstantin Zangerle (KIT-CERT, DE)
Konstantin Zangerle is a member of KIT-CERT since November 2020. He started programming in python when the new thing was called Python 3000. After studying computer science in Karlsruhe, he loves to implement automation at KIT-CERT. In his job, he is fascinated by the fusion of infosec and law.
In 2023 he started to supervise multiple groups of students to implement Modern MISP. Until now, 35 students have been working on the project.
Efficient threat intelligence sharing across organisations is crucial for CSIRTs.Different software solutions are available, with MISP being the most commonly used tool.However, using MISP also comes with some challenges and limitations, e.g. MISP only supports MySQL/MariaDB and the OpenAPI specification is incomplete and in parts incorrect.Therefore, in Oct 2023, KIT-CERT started a reimplementation called Modern MISP that serves as a direct replacement, i.e. an existing database can be used, and the API provides the same endpoints.Modern MISP uses a modern software architecture with well-maintained libraries like FastAPI, Pydantic, SQLAlchemy, Svelte, and Celery.Currently Modern MISP supports CRUD Operations for Events, Attributes, Galaxies, Tags, and Users, and will most likely be production ready in April 2025.As Modern MISP tries to focus on widely used features, not all features of MISP will be implemented in Modern MISP.We provide an overview which features are already implemented in Modern MISP, the ongoing development and the plans for the next winter semester starting in October.
June 24, 2025 10:45-11:20
- AUTLP:CLEAR
Navigating the Threat Actor Maze: A Tool for Mapping Names, Families and Insights
Dave MatthewsDave Matthews (Avast (Gen Digital), AU)
After getting his PhD in Mathematics, Dave spent the next 25 years consulting for the Australian Government, primarily working with Defence, Intelligence, and Law Enforcement, before moving to CrowdStrike and Gen Digital (which was formed from the merger of Avira, Avast, and NortonLifelock). He has continually worked in Incident Response and Forensics and has had the privilege of helping people during their worst days at work.
He has experience with all aspects of cybersecurity, ranging from attack and defence to incident response and security capability development. He is particularly passionate about digital forensics and incident response, helping people prevent and recover from attacks and breaking down barriers to sharing information.
Overwhelmed with the myriad of Threat Actor names? Fancy Bear vs Forest Blizzard? Wicked Panda vs BRONZE ATLAS? What about malware families? CageyChameleon vs Cabbage RAT? Qakbot vs Pinkslipbot?In this talk, we release a free tool that enables mapping between different Threat Actor naming conventions and malware families. We demonstrate its use and show how it allows for easy offline search of threat actors and published research. It provides rapid access to Threat Actor and malware family information - undoubtedly helpful for your intelligence analysis, research and operational work.
June 26, 2025 09:45-10:20
- USTLP:CLEAR
Only Seeing Stars: Enabling the Open Source Scripting Community with OCSF
Michael Bunner (REI, US)
I have worked in IT for telecommunications, forestry, healthcare, retail and then 12 years in critical infrastructure where I built and lead Network Operations Center and Infrastructure Observability teams. Automation has always been part of every role I've ever had, ultimately performing it full-time on an "Automation Factory" where my favorite use-cases were cybersecurity. Security automation is not easy, or always obvious, but was the most rewarding. Automation is not just about doing things faster or more often, but how we can shift our focus to more meaningful work only humans can do. Mike Bunner lives in Seattle, WA, USA and currently works as a Senior Security Automation Engineer at a large outdoor retailer. When he's not automating, you'll find him skiing year-round on one of the regions many volcanoes.
Do you have more starred repos than you have time to think about? Are you a script or content builder seeing friction with integration and adoption of your work?Community software is innovative, responds quickly to emerging issues and is immediately accessible. But it's extremely disparate and operates ad-hoc. SOAR attempts to solve this with closed ecosystems, but at the cost of vendor lock-in.In this presentation we will demonstrate how we as script builders, implementers and data providers can build a more cohesive open source ecosystem with the adoption of Open Cybersecurity Schema Framework (OCSF) and Elastic Common Schema (ECS).Adoption of a standard schema brings your work into a predictable ecosystem and production readiness. Standards allow us to chain our tooling with less integration overhead, increasing the likelihood of seeing our tools put into production.See how a single object in OCSF can enable automation across threat hunting, EDR, software removal, email gateways, firewalls, and 3rd party registries.
June 27, 2025 10:30-11:05
- CATLP: AMBER
Pers?na Theory: Infiltration & Deception of Emerging Threat Groups
Tammy Harper (Flare, CA)
Tammy is a Senior Threat Intelligence Researcher and Certified Dark Web Investigator at Flare. She is a contributor and volunteer threat intelligence researcher for the open-source project RansomLook. When not working on threat intelligence, she listens to techno and ambient music. Her other hobbies include street and nature photography, reading, camping, hiking, and learning about theoretical astrophysics, hypothetical stars, and exotic forms of matter.
This talk explores various techniques, tactics, and psychological models used to infiltrate emerging threat actor groups. We will examine the process of target identification and discuss when it is appropriate to attempt infiltration. Additionally, we take a closer look at the concept of probing the enemy and the idea of weaponizing new relationship energy (NRE), which can be effective at destabilize individuals and placing them outside of their comfort zones. An important aspect of Persona Theory is not only what we write but also how we present it. Stylometric analysis can be particularly useful in this area. We will compare transliteration and translation (both human and machine) to understand how to pass as a native speaker.
June 24, 2025 14:15-14:50
- US GB JPTLP:CLEAR
Pivoting To Resilience: Disruptive Incidents And How We Prepare For Them
Tom Millar (CISA, US), Eireann Leverett (Killara Cyber, GB), Wendy Nather (None, US), Hendrik Adrian (LACERT, JP)
Mr. Millar has served in CISA since 2009, working to strengthen the nation's cyber defenses and resilience against emerging threats. His work has included increasing the level of public, private and international partner engagement, and supporting initiatives to improve information sharing, such as the standardization of the Traffic Light Protocol. As the Branch Chief of Cyber Resilience within the Cyber Security Division, he oversees CISA's architectural cybersecurity assessments, the Cybersecurity Performance Goals program, and training and standards for assessment performance. Prior to his cybersecurity career, he served as a linguist with the 22nd Intelligence Squadron of the United States Air Force. Mr. Millar holds a Master's of Science from the George Washington University and is a Distinguished Graduate of the National Defense University's College of Information and Cyberspace.
Eireann Leverett is the CTO of Killara Cyber, and a long time to collaborater to FIRST. He has risen through the roles of penetration tester, incident responder, researcher, and risk analyst to his current role. He has written many articles and one book, and has a deep interest in critical infrastructure, technology and risk, and catastrophe economics. He's like the little kid on this panel of international experts, and excited to be at the table!
Wendy Nather has been working in cybersecurity for over 25 years. She was previously the Director of Advisory CISOs at Duo Security, Research Director at the Retail ISAC, and Research Director of the Information Security Practice at 451 Research. Wendy led IT security for the EMEA region of the investment banking division of Swiss Bank Corporation (now UBS), and served as CISO of the Texas Education Agency. She was inducted into the Infosecurity Europe Hall of Fame in 2021. Wendy serves on the board of directors for Sightline Security, is on the steering committee for the IST Ransomware Task Force, and is a Senior Fellow at the Atlantic Council's Cyber Statecraft Initiative.
Hendrik Adrian is the representative of FIRST Team LACERT and FIRST CTI SIG and FIRST NETSEC co-chair, he is working as cyber threat intrusion senior analyst at Cyber Emergency Center. Hendrik works as Japan government support for various educational security lecture activities in IPA i.e. Security Camp, CyberCREST, and he is putting more efforts in national and international security communities as an active lecturer and speaker in various conferences. His known malware analysis contributed to the security community is listed in the Wikipedia at https://en.wikipedia.org/wiki/MalwareMustDie
As threat actors become increasingly focused on disruptive incidents (ransomware being only one example) and such incidents increasingly becoming a matter of "when, not if," defenders must be increasingly prepared not only to rapidly minimize harm, but to quickly and safely recover after a disruption. This panel of experts from around the world will discuss lessons learned in cyber resiliency, including supply chain risk management, cyber hygiene, trustworthy ad hoc side channels, individual versus collective resilience (and the need for stronger collaboration), metrics for assessing resilience, and more. In addition, panelists will have an opportunity to share "war stories" of cyber resilience in the current threat context, so that all attendees can learn from the triumphs of other resilient teams.
June 24, 2025 10:45-12:05
- JP TWTLP: AMBER
PSIRT 2.0: Revolutionizing Product Security with the Generative AI Strategy - Approach for Empowering Product Cyber Resilience and PSIRT Operation
Hikohiro Lin (GMO Cybersecurity by IERAE, Inc., JP), Ken Lee (Independent Security Advisor, TW), Kosuke Ito (Product Security Governance Advisor, JP)
Hikohiro Lin had been in charge of Product Security at Panasonic headquarters for over 15 years. He led several projects, including devising and deploying security test methods and risk assessments for IoT devices, formulating product security standard rules and guidelines, building a global product security system, formulating head office product security strategies, establishing Panasonic Cyber Security Lab for future cybersecurity research and product-focused security incident responses team, etc. He had served as Head of Panasonic PSIRT, Head of Product Security at Panasonic Global, and Director of Panasonic Cyber Security Laboratory.Also, He has received (ISC)² ISLA(Information Security Leadership Achievement)APAC Senior Information Security Professional 2018 Showcased Honoree and Community Service Star. He is Review Board member of HITCON and HITB(Hack In The Box) and a much used cyber security speaker at many international conferences such as Black Hat, CODE BLUE, Kaspersky Security Analyst Summit (SAS),HITCON and Government invited roundtable Panelist. He is currently appointed to Sr. Executive Officer of GMO Cybersecurity by IERAE, Inc.
Ken Lee is a security professional who serves as both an Independent Security Advisor and a Security Consultant at Amazon Web Services. He provides vulnerability response and cloud security governance consulting expertise in his independent role. Prior to AWS, Ken was the Product Security Officer at Synology, where he led the Bug Bounty Program and Security Incident Response Team, overseeing critical security operations across the organization. Ken's industry leadership includes serving on the program committee of the 36th Annual FIRST Conference. He has been an active contributor to the security community, sharing his expertise in Product Security and CVE Program management through speaking engagements and community initiatives.
Kosuke Ito is an IoT security expert with over 15 years of experience and was the first PSIRT leader founding the product security activities at JVCKENWOOD Corp. before joining GMO Cybersecurity by IEARE. He had led several projects to found the basic security activities, including formulating corporate product security policy, strategies and product security standard rules and guidelines including deployment of security test methods and risk assessments for IoT devices, formulating product security incident response system (PSIRT) and guidelines, and developing the product security educational materials and delivering seminars group-wide, etc. He had played a key role in promoting group-wide product security at JVCKENWOOD. He also founded a manufacturing industry-wide product security promotion council and played a key role in developing the IoT security certification program, the first in Japan.
As organizations grapple with increasingly complex software supply chains and an exponential rise in security vulnerabilities, traditional PSIRT operations are becoming unsustainable. The challenge is particularly acute for organizations managing IoT devices and embedded systems, where vulnerability management requires coordinated efforts across multiple stakeholders and complex supply chains.Following our previous analysis of manufacturing industry's cybersecurity readiness presented in FIRSTCON 2024, this session presents PSIRT 2.0, a strategic solution addressing the key challenges identified in our survey. With approximately 40% of manufacturers struggling with vulnerability management and resource constraints, there's a clear need for a more efficient and scalable approach to product security.PSIRT 2.0 represents a paradigm shift from traditional manual operations to an intelligent, automated platform enabling organizations to manage product security across their supply chains effectively. This session will explore how this evolution addresses the manufacturers' specific challenges, particularly in meeting new regulatory requirements and managing security throughout the product life cycle. Building on real-world insights from manufacturers, we'll demonstrate how PSIRT 2.0 can help organizations transform their product security operations while optimizing resources and improving supply chain collaboration.
June 27, 2025 10:30-11:05
- BETLP:CLEAR
RE(HACK)T: Open-Sourcing a Boardgame for User Awareness
Emilien Le Jamtel (CERT-EU, BE), Francien Giebels (CERT-EU, BE), Marton Szabo (CERT-EU, BE)
Emilien Le Jamtel has been a cyber security expert for the last 15 years. After building up his technical skills in penetration testing and red teaming, he joined CERT-EU in 2014 as a Threat Intelligence Analyst before quickly moving to CERT-EU's Digital Forensics and Incident Response team. Since 2021, he has been leading the DevSecOps team responsible for the infrastructure and tooling used by CERT-EU staff to deliver a wide range of services to all the european union entities. Emilien is a regular speaker at cybersecurity conferences such as FIRST, Hack.lu, Botconf, and NorthSec.
Francien has a multidisciplinary and legal background with a focus on cybersecurity law and policy. She began her European Commission journey as a trainee working on the Cyber Resilience Act and NIS2. For the past 1.5 years at CERT-EU, Francien has worked on implementing the recently enacted cybersecurity regulation and addressing legal questions arising from CERT-EU's operations.
Marton holds an IT engineering degree and began his career as a sysadmin before transitioning into cybersecurity. With over 15 years of experience, including 10 years working with Union entities, Marton is committed to contributing to a safer cyberspace. He currently works in the Security Consultation team of CERT-EU, whose tasks is, besides many others, to raise cybersecurity awareness among the staff of the European Union entities.
In 2020, CERT-EU created RE(HACK)T, a board game designed to support security awareness sessions for European Union entities. After several years of successfully conducting awareness sessions with dozens of users and distributing the game to hundreds of colleagues across EU organisations, CERT-EU decided to open-source all game files and assets. This initiative aims to help other organisations enhance their security awareness efforts.
In 2020, CERT-EU created RE(HACK)T, a board game designed to support security awareness sessions for European Union entities. After several years of successfully conducting awareness sessions with dozens of users and distributing the game to hundreds of colleagues across EU organisations, CERT-EU decided to open-source all game files and assets. This initiative aims to help other organisations enhance their security awareness efforts.In this talk, we will introduce the game, explain its rules and assets, and share insights into the open-sourcing process, including the selected licence. Finally, we will share lessons learned from delivering awareness sessions to EU entity users, providing practical tips and future improvement ideas.
June 24, 2025 15:00-15:35
- USTLP: AMBER
Response via Prevention Engineering
Steve McKinney (Stripe, US), Lauren Tam (Stripe, US)
Steve is a tech lead within Stripe's Security Analytics and Detection team focused on scaling detection and response. He started his career 15+ years ago at Cisco in security engineering, architecture, and solving large scale threat analytics problems. When not working, he enjoys hiking, hacking on side projects, and woodworking.
Lauren is a program manager supporting Stripe's security team focused on supporting complex, large-scale work. Lauren has been doing security related work for nearly 10 years starting as an auditor then moving into the GRC space. When she's not thinking about security, you'll probably find her reading or doing ceramics.
Over the past two years, Stripe leveraged a prevention-first approach to harden our laptops. We combined insights from response investigations and known threat actor tactics, techniques, and procedures (TTPs) to systematically eliminate classes of attack techniques. By focusing on prevention, Stripe has reduced workload on analysts, eliminated the need for some detection mechanisms, minimized response toil, and freed up time to expand capabilities. This talk will cover our work with Chrome and macOS, discussing how we went from idea to production rollout while prioritizing minimal friction for employees. We will touch on several projects, but focus on allowlisting for Chrome extensions and macOS applications. Attendees will gain insight into how Stripe successfully implemented these changes with a data driven approach coupled with building trust and relationships across multiple teams and the company at large. We will talk about what went well, what we learned, and what changed along the way.
June 24, 2025 09:00-09:35
- USTLP:CLEAR
Revolutionizing Malware Analysis with Agentic AI: Lessons and Innovations
Justin Page (Booz Allen Hamilton, US)
Justin Page is a leader in cybersecurity innovation and the head of Booz Allen Hamilton's DarkLabs Applied Research, with over 20 years of experience in delivering advanced solutions to complex security challenges. He and his team developed multiple agentic systems for cybersecurity challenges from compliance to detection and automated static reverse engineering. His expertise includes intrusion analysis, malware analysis, threat hunting, and cyber threat intelligence against Nation-State Advanced Persistent Threats (APTs) across government and commercial sectors.
Malware analysis is critical for defending against cyber threats, but traditional approaches are often too slow and resource-intensive for modern needs. This talk explores how agentic AI can transform malware reverse engineering by automating repetitive tasks, improving scalability, and delivering actionable insights more efficiently. Drawing on the experience of designing and implementing an AI-driven system for malware analysis, we'll share key lessons learned, including best practices for agent collaboration, system scalability, and integration with existing tools. Attendees will gain practical strategies for applying these concepts in their own environments, as well as insights into the future of AI in cybersecurity. This session is ideal for professionals interested in enhancing malware analysis workflows and advancing their understanding of AI applications in security.
June 26, 2025 13:30-14:05
- NLTLP:CLEAR
Routing Security for Enterprises: Secure Your Supply Chain
Andrei Robachevsky (Global Cyber Alliance, NL)
Increasingly the enterprise digital assets are located outside the organization perimeter. Therefore, routing security becomes a critical requirement of security the supply chain. To increase awareness and participation among enterprises, a second, elevated tier of MANRS (https://www.manrs.org) participation is being developed that requires connectivity providers to comply with more stringent provisions and auditing – MANRS+. It creates a stronger business case for routing security for providers while engaging their customers by raising awareness, generating demand, and providing necessary tools for security assurance. It is a compact set of routing security controls and audit requirements that can be embedded in common infosec frameworks and referenced in procurement practices. This talk will talk about strengthening security for enterprises and their connectivity providers.
June 24, 2025 11:30-12:05
- JPTLP: AMBER
Securing a Global Conglomerate: Mitsui & Co.'s Journey from Chaos to Control
Takahiro Okuhara (MITSUI & CO., LTD., JP)
Takahiro works as the operational leader of MBK-CSIRT at Mitsui & Co., Ltd His responsibilities cover a wide range of tasks, including planning the cybersecurity strategy for the entire Mitsui & Co. group, a global conglomerate, designing measures in line with the strategy, project management for implementing these measures, managing cybersecurity operations, and leading incident response. In his previous job, he worked at a security vendor, where he was mainly involved in security assessments, penetration testing, and other technical consulting services related to PCI DSS for clients in the credit card industry.
Mitsui & Co., Ltd, a leading "Sogo Shosha" (a Japanese conglomerate engaged in trading and business investment), manages a global network of approximately 500 consolidated group companies. This extensive reach means protecting a wide range of businesses. MBK-CSIRT (MBK stands for Mitsui & Co.) operates with a dual mandate, functioning as both the internal CSIRT for Mitsui & Co. and the group CSIRT for its affiliates. This involves daily coordination of incidents across the group, ensuring a unified response to cybersecurity threats. In this session, I will present several distinctive incident cases within the Mitsui & Co. group, highlighting challenges, response strategies, and outcomes. Additionally, I will introduce lessons learned and security enhancements, including the expansion of MBK-CSIRT, establishment of group cybersecurity standards, and formation of a global cyber insurance policy. The session will conclude with reflections on the journey from chaos to control, emphasizing a proactive and coordinated approach to cybersecurity.
June 23, 2025 14:45-15:20
- CHTLP:CLEAR
Social Engineering in the Age of AI: Rethinking Security Training
Cornelia Puhze (SWITCH-CERT, CH)
Cornelia is a security awareness & communications expert at Switch-CERT, advocating for a human-centred approach to security. She supports various communities to become better security advocates and thereby empower people to improve their digital literacy and be safe online. Cornelia is educated to postgraduate level in corporate and political communications and has a background in teaching. Cornelia co-chairs the FIRST SIG Human Factors in Security.
In the age of AI, social engineering (SE) attacks have become more sophisticated than ever. AI-generated deepfakes and flawlessly crafted phishing emails make it impossible to rely on familiar cues like voice, images, or writing styles. Yet traditional security awareness training still focuses on teaching users to spot specific signs -- an approach that assumes rational, System 2 thinking. The reality? SE attacks succeed by exploiting emotional, reactive System 1 thinking, making existing training methods increasingly ineffective.This talk introduces a different type of approach. Instead of relying on rule-based detection, we focus on meta-level awareness: teaching users the adversarial mindset so they understand how they're being targeted and manipulated. Drawing on Cialdini's principles of influence and incorporating mindfulness techniques, this approach equips users to pause, recognize emotional triggers, and respond rationally. Attendees will leave with actionable insights to build a resilient, human-centred defence against SE attacks.
June 24, 2025 14:15-14:50
- LT BW
Southern African Development Community's CII handbook - What Others Can Re-Use?
Vilius BenetisVilius Benetis (NRD Cyber Security, LT), Shukya Kiroga (CRASA - The Communication Regulators' Association of Southern Africa, BW)
Dr. Vilius Benetis is member of NRD CIRT (@NRD Cyber Security), where he leads a team of experts to consult, establish, and modernise CSIRT/SOCs for governments, organisations, and sectors in Africa, Asia, Europe, and Latin America.
He is an active contributor to the development of CSIRT/SOC-related methodologies for ENISA, FIRST.org, GFCE and ITU. He is co-author of presented handbook.
Shukya Kiroga is Head of Electronic Communications at CRASA - The Communication Regulators' Association of Southern Africa, part of Southern African Development Community (SADC). He lead the development of the CIIP regional handbook.
Southern African Development Community (SADC) is a regional African intergovernmental organization that includes 16 countries, all of which are striving to establish well-functioning cybersecurity. Previously, SADC set target to establish national CSIRTs in all member countries, now they follow with proper Critical Information Infrastructure protection setup on top. To this end, a new SADC CII Handbook has been developed to assist all countries to make it work.The presentation will explain the value of having such a regional handbook, it's use cases, dependencies on CSIRT and SOC ecosystems.In addition, the presenters will motivate other countries in Africa and beyond that are building CSIRTs and CIIP frameworks to partner and use such a handbook as a common practice.
June 27, 2025 09:45-10:20
- USTLP:CLEAR
The Convergence of Threat Behaviors Across Intrusions
Joe SlowikJoe Slowik (The MITRE Corporation, US)
Joe Slowik has over 15 years of experience across multiple information security domains. Joe currently leads the CTI and ICS functions within the MITRE ATT&CK framework, along with researching threats to critical infrastructure. Joe has previously worked in CTI, detection engineering, and threat hunting roles at Dragos, Huntress, DomainTools, and Los Alamos National Laboratory.
Information security, and especially threat intelligence, often elevates adversaries into unique, "sophisticated" entities practicing particular, specific tradecraft. However, the truth of the matter is that threat actor operations have undergone a great convergence in behaviors in the past several years. This great convergence results in commodity eCrime actors looking almost indistinguishable from state-sponsored entities in many phases of network intrusions. As a result, threat actors look less "unique" and begin to blend together into a nearly indistinguishable mess of tradecraft and tool reuse.In this discussion, we will explore how this convergence has come to pass, then review its implications. From a threat intelligence perspective, delineating between threat actors has become increasingly difficult as behaviors overlap, but from a defender perspective countering these entities has become somewhat simplified or at least focused given adversary overlap. However, such overlap does not take place in a vacuum. Particularly, threat actors have naturally evolved toward methodologies that inherently blend in with normal actions - from LOLBins to RMM abuse - creating significant problems for detection and response. We will conclude the discussion with an overview of how adversaries have converged on abuse of "benign" mechanisms and what this means for the future of both offense and defense in network security.
June 26, 2025 15:00-15:35
- ITTLP: AMBER
The Dark Side of Digital Ads: How to Protect Your Brand using Meta AD Library
Giuseppe Morici
Grazia LeonettiGiuseppe Morici (Intesa Sanpaolo S.p.A., IT), Grazia Leonetti (Intesa Sanpaolo S.p.A., IT)
A seasoned professional Manager with 14 years of experience in cybersecurity, this expert brings deep knowledge in Blue Team operations, Offensive Security, and Cyber Threat Intelligence.
A criminologist & intelligence analyst particularly interested in all kinds of threats.working in cyber security since 2016 with a focus on security architecture, awareness and cyber security culture and, from 2020, in cyber threat intelligence.
Our project focuses on Cyber Threat Intelligence to tackle the misuse of social media platforms like Facebook and Instagram for fraudulent activities, particularly brand abuse through malicious Ads, until now, often overlooked as a real Threat, as we will clearly demonstrate.We present a scalable and cost-effective solution to detect and combat brand abuse using the Meta Ad Library, a public domain resource.By leveraging this library, we created an automated system for real-time detection and response. This approach, adaptable to any SOAR platform, custom scripts, or manual processes, demonstrates that even organizations with limited resources can implement robust cybersecurity measures.The key benefit for the community lies in the ability to replicate this solution across industries.Organizations of all sizes can use the tools and methods shared in this project to enhance their own cybersecurity and contribute to a safer digital ecosystem. By adopting these strategies, the community can work together to reduce the impact of cyber threats and build a more resilient online environment for all.This presentation highlights how open-access tools, scalable solutions, and a collaborative approach can empower the community to tackle cybercrime effectively and efficiently.
June 25, 2025 14:00-14:35
- CHTLP:CLEAR
The Evolving Cybersecurity Governance Landscape: Non-State Actors, the UN Framework and Critical Infrastructure
Serge DrozSerge Droz (FIRST / Swiss FDFA, CH)
Serge Droz is a senior IT-Security expert and seasoned incident responder. Today he works as a senior advisor at the Swiss federal department of foreign affairs where he looks the interface between cybersecurity, international law, peace and cyber-diplomacy. He studied physics at ETH Zurich and the University of Alberta, Canada and holds a PhD in theoretical astrophysics. He has worked in private industry and academia in Switzerland and Canada in different security roles, at a national CERT in Switzerland or at Proton for more than 20 years.
Serge is a member of the board of directors of FIRST (Forum for Incident Response and Security Teams), the premier organisation of recognised global leaders in incident response. In this role he actively participates in discussion relating to cyber security at various policy bodies, in particular related to norm building.
Serge is an active speaker and a regular trainer for CSIRT (Computer Security Incident Response Team) courses around the world.
Over the past two decades, states have grappled with regulatory challenges in cyberspace. Currently, most states have committed to the United Nations Framework on Responsible State Behavior in Cyberspace, which primarily comprises soft law norms, confidence-building measures (CBMs), and capacity-building initiatives. Despite widespread adoption, ongoing debates persist regarding the framework's interpretation and practical implications for non-state actors.The Geneva Dialogue, an innovative initiative launched by the Swiss government, addresses this critical gap. This inclusive platform is open to all non-state actors and systematically explores the UN framework's broader consequences. Through the ongoing development of the Geneva Manual, the dialogue meticulously documents the roles and responsibilities of diverse stakeholders, including cybersecurity teams, researchers, and open-source developers. In its last edition the Dialogue focused on critical infrastructre.This presentation will provide an overview of the UN cybersecurity framework, followed by an in-depth, scenario-based discussion of its implications for non-state actors. Notably, the Geneva Manual is conceptualized not as a definitive guide, but as a dynamic, evolving document. Shaped by real-world cases and the collaborative insights of volunteers and practitioners, it represents a novel approach to understanding cybersecurity governance in an increasingly complex digital landscape.
June 27, 2025 09:00-09:35
- FRTLP:CLEAR
The Funny Story of Active Directory Backdooring
Sylvain Cortes (Hackuity, FR)
Sylvain Cortes is an international expert in identity and access management (IAM) and cybersecurity. During his career, he has mainly worked with large organizations to carry out identity or directory governance projects, including authentication processes, inter-OS privilege management, cloud identity management and Active Directory cybersecurity. He has developed a deep expertise in Active Directory security and backdooring concept. Sylvain is the president of CADIM, a French non-profit organization that organizes an annual event in Paris dedicated to identity management and cyber security: www.identitydays.com. Sylvain is a speaker for various events such as: Blackhat, Cloud Expo, IdentityDays, FS-ISAC, aOS, IT Nordics, Les Assises de la S�curit�, FIC, etc. For 18 years, Sylvain has been recognized by Microsoft as a Microsoft MVP on Active Directory & Security.
What is the hardest question to answer after an Active Directory attack? It's very simple: "Do I have a backdoor in my directory after this attack?"In this session, we will present the state of the art regarding backdoors in AD, with concrete examples of simple and advanced techniques working from AD 2003 to AD 2025 and ensuring attackers' group persistence. We will cover AD backdoors in general, then go into detail about backdooring techniques targeting SIDhistory, Managed by, gPLink, GPOs, ACEs, and more.Finally, we'll look at the combination of multiple techniques used to hide leads and make persistent attackers virtually undetectable.
June 26, 2025 09:00-09:35
- DKTLP: AMBER
The Negotiation Paradox
Jan Kaastrup (CSIS Security Group, DK), Michael Sjøberg (Delta Crisis Management, DK)
Jan has been an Advisory Board Member of Europol's European Cybercrime Centre (EC3) from 2013-2018 and has been an advisor on numerous major international security incidents, such as WannaCry, Petya, etc. With over 25 years' experience in IT-security (including network architecture, forensics, incident response, malware research, penetration testing and financial fraud), Jan frequently appears on Danish TV as a cybersecurity subject-matter expert. Jan regularly presents at regional and international cyber security conferences, in addition to hosting the annual Copenhagen Cybercrime Conference.
Michael Sjøberg leads hostage negotiation and crisis management consultancy Human Advisor Group. Michael has worked professionally with crisis management and negotiations since 2001 - he is an army captain (ret.) and holds a Master's Degree in International Relations with complex risk management, crisis negotiations and strategic handling of high profile political hostage takings as his specialty. He is a trained hostage negotiator by ways of New Scotland yard. Michael is frequently used in Scandinavian media as subject matter expert on kidnap situations and hostage negotiations and advises a number of clients in the financial and energy sectors.
There are many opinions when it comes to communicating and even negotiating with Threat Actors (TA). Often, the victim is strongly recommended NOT to engage with the TA. This talk will give you a unique insight into examples from real-life cases where TA communication assisted the technical investigation and vice-versa. The talk will include technical and strategic elements within Incident Response, and you will understand why TA communication is not the same as paying a ransom. In fact, sometimes, TA communication is the only way to understand the entire risk set associated with the incident.
June 24, 2025 15:00-15:35
- USTLP:CLEAR
The Ontology for SOC Creation Assistance and Replication (OSCAR): A Community-Derived Tool for Developing SOC Capabilities
Justin NovakJustin Novak (Software Engineering Institute, US), Chris Rodman (Software Engineering Institute, US)
Dr. Justin Novak is a Senior Security Operations Researcher at the CERT Division of the Software Engineering Institute, leading a team as part of the Security Operations Division supporting the US Department of State, Department of Defense, and United States Treasury. In this role, his main focus in on capacity building for incident responders - both at the individual and organizational level. At the SEI, he is also involved in research on the development and operation of CSIRTs, Sector CSIRTs, and Security Operations Centers, focusing on incident response and incident management. Prior to the SEI, Justin worked in a variety of government roles, including with the federal government at the Department of Defense, and in state government. Justin holds a bachelor's degree in Physics from the University of Pittsburgh, a master's degree in Security Studies from the University of Pittsburgh, and a PhD in Science and Technology Policy from George Mason University with a focus on the impacts of development of innovative open-source software. Justin also serves as an adjunct professor at George Mason University's College of Engineering and Computing.
Christopher began his professional career following the completion of his Bachelor of Science degree in Information Science and Technology from the University of Penn State. Shortly after he joined the corporate IT department of a prominent Pittsburgh based manufacturing company. He worked in roles for database and infrastructure administration, application performance and consulting, crisis management, incident response, data loss prevention, and vulnerability management. With a focus on security, Christopher obtained his Master of Science degree in Information Security and Assurance from Robert Morris University in 2016 and in 2018 he joined the CERT division of the Software Engineering Institute (SEI) of Carnegie Mellon University to build high fidelity exercise and training simulation for various agencies within the United States government. The following year he became a Senior Cybersecurity Operations Researcher within CERT to assist security operation center teams and international CSIRTs with capacity and capability building. Christopher has previously served as an adjunct professor at University of Pittsburgh's School of Computers and Information, Carnegie Mellon University's Heinz College and currently teaches Host-Based Digital Forensics at CMU Information Networking Institute.
More organizations are choosing to deploy a Security Operations Center (SOC) model to improve enterprise security and to monitor data and information assets. However, developing a SOC can be a difficult, time-consuming, and expensive task. This also applies to organizations which may stop short of deploying a full stand-alone SOC, but which may nevertheless choose to deploy some capabilities normally associated with a SOC. To help organizations develop SOCs and SOC capabilities, we developed the Ontology for SOC Creation Assistance and Replication (OSCAR), a freely available resource meant to guide an organization through the development process, providing important baselines and a useful knowledge base along the way. OSCAR was developed using community input, including from interviews with FIRST members teams and input from other public and private sector SOC experts. Using this input, we synthesized a purpose-built dataset containing real-world insights into the SOC knowledge domain. For OSCAR, we used this dataset to develop a knowledge hierarchy that focuses on the traditionally emphasized people, process, and technology knowledge classes, while also addressing planning and functional considerations. OSCAR fills a gap in existing cyber ontologies by describing the development of SOCs and SOC capabilities, which is not a well-defined knowledge domain within existing cybersecurity ontologies, such as the Unified Cyber Ontology. Additionally, because the domain-specific knowledge used to create OSCAR is derived directly from working experts in the field, the ontology itself is a unique dataset not replicated elsewhere.
June 24, 2025 09:00-09:35
- USTLP:CLEAR
The Party Isn't Over: Uncovering Konfety's Novel "Evil Twin" Technique
Lindsay Kaye (HUMAN Security, US), Gavin Reid (HUMAN Security, US)
Lindsay Kaye is the Vice President of Threat Intelligence at HUMAN Security. Her technical specialty spans the fields of malware analysis and reverse engineering, with a keen interest in dissecting custom cryptographic systems. Prior to her work at HUMAN, Lindsay served as Senior Director of Advanced Reversing, Malware, Operations and Reconnaissance as part of the Insikt Group at Recorded Future. She has proposed, won funding for and led research projects, particularly during her time at The MITRE Corporation. Outside of work, Lindsay writes articles on complex cybersecurity issues including data and trends analysis, technical pieces on reverse engineering and TTPs, and discussions on the business of the cybercriminal underground. Lindsay is an internationally-recognized cybersecurity speaker and author. She holds a BS in Engineering with a Concentration in Computing from Olin College of Engineering and an MBA from Babson College.
Gavin Reid serves as the CISO for HUMAN Security, a cybersecurity company that specializes in safeguarding enterprises from digital attacks while preserving digital experiences for users. In addition, he leads the Satori Threat Intelligence and Research Team as VP of Threat Intelligence. Gavin began his cybersecurity career in information security at NASA's Johnson Space Center. He later went on to create Cisco's Security Incident Response Team (CSIRT), Cisco's Threat Research and Communications (TRAC), and Fidelity's Cyber Information Group (CIG). Before joining HUMAN, Gavin served as the CSO for Recorded Future, where he was responsible for ensuring the protection, integrity, confidentiality, and availability of all customer-facing services, internal operational systems, and related information assets. For more than 20 years, Gavin has managed every aspect of security for large enterprises.
Evil twins can be the topic of science fiction, tales of mystery and... advertising fraud? We uncovered a sophisticated ad fraud campaign, that we dubbed Konfety, involving over 250 Android apps in which each benign app distributed via the Play Store had an "evil twin" adware app counterpart - and its corresponding infrastructure. We will explain how Konfety was able to effectively create its own malicious ecosystem, from their ad SDK to their malicious infrastructure that could be started and scaled to support the evil twins at the press of a button to reselling ad inventory to make money, and provide a technical overview of how they did it. While Konfety is an ad fraud campaign, at its core, the distribution of the malicious twin applications was done via drive-by malvertising, broadening the scope and impact of the campaign past the mobile ecosystem. During this talk, we will also explain how we conducted this investigation, and others like it, including how we discovered the novel "evil twin" technique, and provide insight into our investigative framework. We will also provide guidance for how to incorporate threat intelligence and threat hunting investigation techniques into your own organization, even without having a threat intelligence team.
June 27, 2025 11:15-11:50
- USTLP:CLEAR
Threat Hunting with Python & Pandas
Anthony Talamantes (Johns Hopkins University Applied Physics Laboratory, US), Matt Dulle (Johns Hopkins University Applied Physics Laboratory, US)
Anthony has over 24 years of experience in cybersecurity and the last 17 years focused on nation state and sophisticated adversaries. Anthony developed the Cyber Hunt program at Johns Hopkins Applied Physics Laboratory and current manages the Cyber Hunt, Applied Cyber Research, and Architecture & Engineering.
Matt has over 13 years of experience in cybersecurity and is the Lead Reverse Engineer in the Applied Cyber Research team at Johns Hopkins Applied Physics Lab. Matt performs malware analysis and uses behavioral indicators to proactively hunt for malicious activity in the enterprise.
This presentation will discuss some of the limitations with traditional SIEM’s and how cybersecurity is evolving away from them. We continue to describe threat hunting and detection engineering with a more iterative and scalable methodology than typically used with traditional SIEM’s. We will be examining the use of Python, Pandas, and other libraries in Jupyter notebooks to gain additional visibility and analyses into adversarial activities. We will demonstrate how this approach can work in cyber operations and give examples of the entire process including code examples. We will wrap up by discussing how this can be achievable by analysts without python and data science backgrounds.
June 26, 2025 13:30-14:05
- INTLP:CLEAR
Uncovering the Whispers of an APT Targeting Specific Industries in South Asia
Sathwik Ram Prakki (Quick Heal, IN), Subhajeet Singha (Quick Heal, IN)
Sathwik Ram Prakki works as Senior Security Researcher at Seqrite Labs, Quick Heal. His areas of research are threat intelligence, APT hunting, delving into dark web and malware analysis. With a background in offensive security and knowledge of OS internals, he is keen on enhancing detections and infrastructure for threat hunting and CTI. Starting his cybersecurity career at C-DAC, under the Ministry of Electronics & IT in India, Sathwik has shared insights on APTs, ransomware and malware ecosystems at conferences such as AVAR, Botconf, c0c0n, and Virus Bulletin.
Subhajeet is working as a Security Researcher in Security Labs at Quick Heal. His areas of focus are threat intelligence, research along with reverse engineering to improve detection capabilities and to aid in further research.
A new campaign targeting various industries such as the Defense Sector in Pakistan and predominantly researchers from Hong Kong has been uncovered. Tracked as Operation Cobalt Whisper, the entire campaign heavily leverages the use of a post-exploitation tool Cobalt Strike, which is deployed using obfuscated VBScript. A total of 20 infection chains have been identified along with additional individual samples, where 18 of them targeted Hong Kong and have two targeted Pakistan where over 30 decoy files have been identified.In this talk, we will explore the technical details of one of the campaigns we encountered during our initial analysis and examine the various stages of the infection chain, starting with a deep dive into the decoy documents. We will then investigate the common Tactics, Techniques, and Procedures (TTPs), such as the use of malicious VBScript and LNK payloads employed by this threat actor across most campaigns. These methods facilitate the in-memory execution of the Cobalt Strike implant, which is delivered alongside these lures in an archive file. At the end, we will explore hunting of its infrastructure that leads us to multiple host-headers of Cobalt Strike beaconing from Chinese ASN and correlation with Bitter APT.
June 23, 2025 14:00-14:35
- AUTLP:GREEN
Understand and Detect - Stealthy Techniques Used to Conceal Artifacts on Modern Linux Systems
Robert ByrneRobert Byrne (Ericsson, AU)
Robert Byrne is a principal security specialist hosted in a global competence center for security within the Ericsson CTO office. Bringing over 18 years of experience in telecommunication engineering and information security, Robert holds cross functional roles, spending his time performing vulnerability assessments and incident response activities that touch Ericsson's product and services portfolio. Robert holds a double degree in Engineering and Computer science and is Offensive Security OSCP and (ISC)2 CISSP certified.
This presentation will discuss lesser known, anti-forensic techniques used to hide processes and files on modern Linux platforms. We will be exploring examples taken from both real-world cases and novel security research.
June 26, 2025 10:45-11:20
- NZTLP:CLEAR
Unmasking Cyber Security: Rethinking Small to Medium Business Security Awareness
Sophie Horgan (NCSC, NZ)
The talk will be presented by Sophie Horgan, Senior Communication and Engagement Advisor NCSC. Sophie joined CERT NZ (now NCSC) over four years ago and prior to that worked with the organisation on media relations and incident response. Throughout that time, she has gained a great deal of knowledge through working with stakeholders such as media, SMEs and general public who look at cyber security through a different lens than those working in the field. This helped Sophie understand how we bring our knowledge and insight to SMEs in a way that is digestible and fit for purpose.
Small to medium enterprises (SMEs) are an important part of the worldwide economy. Good cyber security practices are an integral part of keeping SMEs secure and running their business practices smoothly.However significant numbers of SMEs are not meeting best practice cyber security standards. In New Zealand less than half of SMEs would describe their organisation as prepared for a cyber attack. In Australia, 43% of cyber crime targets small business. Research tells us that while SMEs are aware and concerned, competing priorities and lack of knowledge or time stops action. How do we make cyber security simpler, more accessible and easier for SMEs to action? How do we get them to make it a priority? We know from international engagement that this is a problem faced by agencies worldwide working to support SMEs.The Nation Cyber Security Centre (NCSC) has developed and produced a video series designed to engage with businesses at their level, along side simple resources they could use to continue their cyber security journey.
June 26, 2025 14:15-14:50
- CATLP:CLEAR
Unmasking MSC Files: A Deep Dive into APT Weaponization, Grim Resource Injection, and AppDomain Manager Hijacking
Hossein Jazi (Fortinet, CA), Douglas Santos (Fortinet, CA)
Hossein Jazi is a senior threat intelligence specialist at Fortinet, where he contributes as an active researcher with interests in APT tracking, malware analysis, cyber threat intelligence, and machine learning. His current efforts are centred on identifying and monitoring APT activities, along with publishing insightful blogs on their operations. In addition to these projects, Jazi is focused on developing proactive techniques to monitor cyber threat actors' actions and collaborating with various partners to enhance cyber threat research capabilities. He holds a Master's degree in computer science and has over 14 years of experience specializing in cybersecurity and APT analysis.
With more than two decades of experience in the cybersecurity field, I possess a unique blend of sales soft skills and deep technical acumen, making me a well-rounded individual who is at ease working in both technical and non-technical environments. My keen understanding of the cyber threat landscape allows me to communicate potential threats and vulnerabilities, as well as complex security issues and possible countermeasures, to any audience with ease.
Currently, my focus is on developing innovative ways to advance the state of the art in cyber threat intelligence, while managing a team of researchers and engineers. Our goal is to identify new attack vectors and develop proactive intelligence to protect against them. To help me achieve this mission, I am driving our partnership with MITRE CTID and participating in projects that are augmenting the state of the art when it comes to threat intelligence standards, tools, and response. We are also deploying these tools and standards across Fortinet's products and systems.
My vast experience, technical expertise, and communication skills have enabled me to excel in the cybersecurity industry, and I look forward to continuing to drive innovation and progress in this field.
As the cyber threat landscape evolves, so do the tactics employed by advanced persistent threats (APTs). With the increasing disablement of macros in Microsoft Office, threat actors have adapted, turning to new methods for malware delivery over recent years. Since early 2022, there has been a noticeable shift away from traditional macro-based attacks toward techniques involving ISO files, HTML smuggling, LNK files, and CHM files. Among these methods, the use of Microsoft Common Console (MSC) files remains underexplored yet has emerged as a powerful tool for malware delivery and persistence in Windows environments.Although initially limited in use, MSC files began gaining significant traction among threat actors in early 2024. Kimsuky was one of the first groups to incorporate MSC files into its campaigns, leveraging various techniques to target victims. Recently, Kimsuky expanded its MSC-based attacks by using Zoom-themed lures, incorporating the legitimate Zoom application to add credibility and increase engagement. Following Kimsuky's example, other APT groups- including Mustang Panda, APT41, and APT Bitter- have adopted MSC files as part of their initial infection strategies. Some of these APTs combine novel methods like Grim Resource Injection and AppDomain Manager Hijacking to enhance the efficacy and stealth of their attacks.These attacks, which use legitimate Windows subsystems and tools to deliver malicious payloads, pose significant challenges for detection. Traditional enterprise security solutions often focus on identifying the aftermath of these techniques- such as the loading of malicious code into legitimate Windows processes- rather than the techniques themselves. Current EDR tools generally provide limited visibility into the full attack chain and tend to rely on known malicious payload signatures or newer detection methods, such as stack-based similarity hashing, to detect frameworks like Sliver, Cobalt Strike, and Metasploit.This technical deep dive will explore how APT groups are exploiting the hidden capabilities of MSC files to conduct stealthy, sophisticated attacks. We'll provide a timeline of MSC file adoption by various threat actors and examine the structure of weaponized MSC files, focusing on advanced techniques like Grim Resource Injection and AppDomain Manager Hijacking, which enable malicious code execution in .NET environments. Recent campaigns demonstrate how APTs are increasingly using these novel techniques to expand their toolsets and evade modern security controls. We'll also discuss detection challenges, showcase a demo of these methods in action, and highlight their implications for current detection mechanisms.
June 27, 2025 09:45-10:20
- PLTLP:GREEN
Using DNS Registry and Requests for Securing Dot Pl and Beyond
Paweł PawlńskiPiotr Białczak (CERT.PL/NASK, PL), Paweł Pawlński (CERT.PL/NASK, PL)
Piotr Białczak is a researcher at CERT.PL. His professional interests include network traffic analysis, phishing detection, and applying machine learning to security problems.
Paweł Pawliński is a principal specialist at CERT.PL. His job experience includes data analysis, threat tracking and automation. He is always looking for better ways to collect, leverage and share CTI.
Detecting and mitigating phishing on a country scale is a big part of our operations at CERT.PL. In this talk we will share our experiences with applying machine learning to identify suspicious sites using the .pl registry data and DNS traffic observed at the resolver level. We will compare results of different approaches to proactive detection of phishing domains and benchmark our work against alternative solutions.Deploying machine learning tools in production is often challenging and we will share how we integrated new monitoring capabilities with a country-wide DNS firewall, serving millions of users. Our lessons learned can be useful for operators of DNS infrastructure and anyone interested in translating large volumes of data into indicators.
June 26, 2025 14:15-14:50
- USTLP:CLEAR
Versus Killnet
Alex Holden (Hold Security LLC, US)
Alex Holden is the founder and CISO of Hold Security, LLC. Under his leadership, Hold Security played a pivotal role in information security and threat intelligence, becoming one of the most recognizable names in its field. Mr. Holden researches minds and techniques of cyber criminals and helps our society to build better defenses against cyber-attacks.
The Russian infamous hacktivist group Killnet is more than meets the eye; it's a cyber army directed by a few to cause harm. With a checkered history and inconsistent behaviors, deciphering who is behind this group is challenging. Nevertheless, we will lift this veil and share a personal story of disrupting the group, unbalancing Killnet into chaos.
June 26, 2025 10:45-11:20
- USTLP:CLEAR
We All Want Validation (in our SecOps Detections)
John StonerJohn Stoner (Google Cloud, US)
John Stoner is a Global Principal Security Strategist at Google Cloud and leverages his experience to improve users' capabilities in Security Operations, Threat Hunting, Incident Response, Detection Engineering and Threat Intelligence. He blogs on threat hunting and security operations and has built multiple APT threat emulations for blue team capture the flag events. John has presented and led workshops at various industry symposia including FIRST (CTI, Tech Colloquium), BSides (SF, Las Vegas), SANS Summits (DFIR, Threat Hunting, Cloud and SIEM), WiCyS, Way West Hacking Fest, AISA and DefCon Packet Hacking Village. He also enjoys listening to what his former teammates referred to as "80s sad-timey music."
Adversary emulation and simulation isn't just for threat hunting. These capabilities can be extended to detection engineering to provide security operations teams the ability to craft detection logic that can move from indicators of compromise to adversary tactics and techniques.But how do we ensure detections are valid next year or even next month? After all, environments aren't static. To make this more challenging, many organizations have test environments that don't reflect their production environments, so testing may need to take place in production.To make meaningful progress in the field of detection engineering, testing and validation needs to occur due to evolving security controls, infrastructure and adversaries. This presentation will focus on highlighting the challenges security operations teams face and ideas how these obstacles can be overcome.To highlight these efforts, we are leveraging the open source Atomic Red Team library of tests to build an infrastructure to generate events that facilitate the testing and validation of detections. The presentation will discuss bridging the gap from building initial rules to the practical application of continual testing and validation, and will include ideas how this kind of testing can be performed in a production environment without causing disruptions to the current security operation team's cadence and reporting.Attendees will come away with:-A greater understanding of why testing of detections on an on-going basis is crucial-Potential pitfalls when setting up an on-going testing process-Solutions to simplify this process that can be used in your organization
June 23, 2025 11:45-12:20
- DKTLP:CLEAR
Wednesday Keynote
Søren MaigaardSøren Maigaard (SektorCERT, DK)
Søren Maigaard is Director of SectorCERT – the cybersecurity centre for critical sectors.
Søren Maigaard is Director of SectorCERT – the cybersecurity centre for critical sectors.SectorCERT (formerly EnergiCERT) is an essential part of the sectors’ defence against cyber threats. We help detect and manage when critical infrastructure is exposed to cyberattacks, and it is with us that the crucial knowledge that can prevent the next attack is built and shared.
Søren Maigaard is Director of SectorCERT – the cybersecurity centre for critical sectors.SectorCERT (formerly EnergiCERT) is an essential part of the sectors’ defence against cyber threats. We help detect and manage when critical infrastructure is exposed to cyberattacks, and it is with us that the crucial knowledge that can prevent the next attack is built and shared.Søren is chairman of the board of the Association of Danish Security Managers and has previously worked as CISO in major Danish companies within critical infrastructure.
June 25, 2025 09:00-10:00
- JETLP:CLEAR
What Can Cybersecurity Incident Responders Learn from Real-World Crises?
Matt Palmer (Jersey Cyber Security Centre, JE)
As Director of Jersey Cyber Security Centre (JCSC), Matt leads national cyber defence for the island of Jersey, overseeing the direction of the CSIRT in order to promote and improve cyber resilience across critical national infrastructure, businesses, communities, and citizens. A former Chief Information Security Officer for fortune 500 companies and some of the world's leading financial institutions, Matt became the first Director of JCSC in 2021. He is a FIRST liaison member. Matt is also the co-founder of the Channel Islands Information Security Forum and a Commissioner of Jersey's Financial Regulator, the JFSC.
From bombings to floods and fires, real-world emergencies often demand rapid, effective responses under pressure. These scenarios present lessons that can significantly benefit the cybersecurity incident response community. Matt Palmer will explore how a series of life-and-death crises inspired the Jersey Cyber Security Centre (JCSC) to align its approach with emergency management principles and practices from civil defence and emergency services. By examining parallels between physical and cyber incidents, he will share actionable steps that security teams can take to adopt these best practices, build collaboration, and improve outcomes.
June 23, 2025 11:00-11:35
- AUTLP:CLEAR
What Can Threat Intel Teams Learn from Journalists?
Chris Horsley (Cosive, AU)
Chris Horsley is the CTO and one of the co-founders of Cosive, a cybersecurity and CTI specialist consultancy based in Australia and New Zealand with a particular focus on security operations, IR, CTI practices, and tooling. He also enjoys experimenting with LLMs and CTI data formats like STIX and MISP and how to visualise and represent CTI concepts better.
He also has a long background in the international CSIRT community, which spanned roles including open source intelligence gathering, vulnerability disclosure handling, software and tooling development, malware analysis, and joint initiatives for national CSIRTs. Chris has previously worked as a security analyst for AusCERT, the national CSIRT at that time, and JPCERT/CC, the Japanese national CSIRT.
Cyber threat intelligence (CTI) attracts a lot of fancy frameworks and terminology, often coming from military intelligence. In spite of this, we often see CTI packages in feeds and sharing communities listing a few IPs addresses with very little context about their exact nature. If we find one of these IPs in our environment, so what? Will the CTI report tell us what we're dealing with?Let's get back to fundamentals and remove all the specialist language: what makes a CTI report actually useful? What does it need to do and who are we writing it for?There's something we all learned in primary school English classes that can help us write better CTI reports: how to write a newspaper article. If we get into the headspace of a reporter verifying their sources, thinking about their audience, and including the who, what, when, where, why, and how translated into cyber threats, we can improve the standard of CTI packages than a lot of what we see shared today.In this presentatation, we'll use this approach from first principles for making better CTI packages using MISP and STIX as well as something better for the humans in our constituency.
June 25, 2025 14:45-15:20
- US DETLP:CLEAR
What's New in CSAF v2.1: Key Updates Explained
Thomas SchmidtJustin Murphy (DHS/CISA, US), Thomas Schmidt (BSI, DE)
Justin Murphy is a Vulnerability Analyst with the Cybersecurity and Infrastructure Security Agency (CISA). As part of CISA's Coordinated Vulnerability Disclosure (CVD) Team, he helps to coordinate the remediation, mitigation, and public disclosure of newly identified cybersecurity vulnerabilities in products and services with affected vendor(s), ranging from industrial control systems (ICS), medical devices, Internet of Things (IoT), and traditional information technology (IT) vulnerabilities. Justin also focuses on international collaboration regarding vulnerability management serving as co-chair for the Global Community of Practice on CVD (CVD-COP) as well as the OASIS Open technical committees for the Common Security Advisory Framework (CSAF) and OpenEoX standards.
Thomas Schmidt works in the 'Industrial Automation and Control Systems' section of the German Federal Office for Information Security (BSI). His focus is the automation of advisories at both sides: vendors/CERTs and asset owners. Schmidt has been a leader in the OASIS Open CSAF technical committee, and key in bridging this work with the CISA SBOM work. Prior to this, Schmidt was BSI's lead analyst for TRITION/TRISIS/HatMan and developed, together with partners, a rule set for Recognizing Anomalies in Protocols of Safety Networks: Schneider Electric's TriStation (RAPSN SETS). To increase security of ICS and the broader ecosystem, BSI responsibilities cover many areas including establishing trust and good relations with vendors and asset owners. Mr. Schmidt completed his masters in IT-Security at Ruhr-University Bochum (Germany) which included a period of research at the SCADA Security Laboratory of Queensland University of Technology (Brisbane, Australia).
The Common Security Advisory Framework (CSAF), an international, open standard for producing, distributing, and discovering machine-readable security advisories has been making strides in enhancing transparency and efficiency for vulnerability management processes.This talk will explore the key changes introduced in CSAF v2.1 compared to CSAF v2.0, highlighting the enhanced capabilities and flexibility of the new version. Through concrete examples, the presentation will demonstrate what can now be achieved with CSAF v2.1 that was either not possible or more challenging with CSAF v2.0. Specific focus will be given to new features, support for other updated standards like CVSS and TLP, shifting of perspectives (score to metrics, cwe to cwes, etc.), and incorporating support for the Exploit Prediction Scoring System (EPSS) and Stakeholder Specific Vulnerability Categorization (SSVC) frameworks. The session will also address migration strategies, tooling needs and updates, easy conversion, and offer practical scenarios for moving CSAF v2.0 content to v2.1, ensuring organizations can smoothly adopt the updated standard while maximizing its benefits. As the number of vulnerabilities identified rapidly increase, possibly at an exponential rate, this talk is essential for those looking to stay ahead in vulnerability management and make the most of CSAF v2.1's new features.
June 26, 2025 14:15-14:50
- USTLP:GREEN
Where Did I Put My Keys? Preventing Data Leaks at Scale with Automation
Braxton Plaxco (Red Hat, US)
Braxton Plaxco is a Principal Security Software Engineer on Red Hat's Information Security Incident Response team and has been a member of FIRST's Automation SIG. He leads Red Hat's InfoSec Developer Team which is formed from members across the organization to build custom tooling and automation to help the Information Security team scale, reduce human error, and focus on its core objectives.
This case study delves into the lessons learned from Red Hat's efforts to detect, mitigate, and prevent data leaks not only on GitHub but also across a myriad of highly distributed sources. It all began with an internal monitoring solution, which subsequently evolved into a comprehensive architecture designed to tackle leaks at scale. The project has proven instrumental in saving considerable time and effort for our Incident Response analysts, significantly compressing the timeframe from data exposure to its successful mitigation. Furthermore, it has given rise to new tools aimed at preventing the initial exposure of sensitive data. Presently, our capability to detect leaks has reached a level where we often outpace the bad guys and preemptively avert potentially expensive incidents all together. We invite you to join us for an overview of the architecture and a preview of our upcoming open-source release to learn how you can do it too!
June 23, 2025 14:45-15:20
- ITTLP: AMBER
Why Be the King When You Can Be the Rogue Prince? Insights from Scraping of I2P and Freenet
Lorenzo NicolodiLorenzo Nicolodi (Microlab.red, IT)
Lorenzo embarked on his career as a forensic examiner before being captivated by the thrill of offensive security, with a penchant for ICS/embedded systems. Throughout the years, he has actively engaged in multiple Incident Response (IR) initiatives, progressively deepening his expertise in cyber security Research and Development (R&D). Since August 2022, Lorenzo has been immersed day and night in the pursuit of ransomware data. Recently, he has expanded his focus to include research on anonymous networks.
The 2024 Interpol Internet Organized Crime Threat Assessment report says this about I2P: "The Tor network remains the most popular way for cybercriminals to access the dark web, despite efforts to promote the Invisible Internet Project (commonly known as I2P) as a more law enforcement-resistant solution." If Tor is still the top choice, does that mean I2P is being avoided? And what about Freenet/Hyphanet?I decided to find out for myself.Join me as I share how the "Let's-Do-This-At-Scale"® approach (inspired by the CIRCL team <3) led me down the rabbit hole of scraping content from these networks. I'll walk you through what it takes, the obstacles and the surprises I found, and whether spending months diving into these systems was worth it- or just an exercise in digital masochism.
June 24, 2025 10:45-11:20
- FITLP:CLEAR
Why is Finnish Healthcare Doing So Well Against Ransomware?
Perttu Halonen (National Cyber Security Centre Finland, FI)
Mr Perttu Halonen, senior specialist, the National Cyber Security Centre Finland (NCSC-FI). Perttu has worked as healthcare cyber security liaison at the NCSC-FI since 2017, and facilitates the operation of Finnish social services and healthcare information sharing and analysis centre SOTE-ISAC.
Healthcare cyber security is a major topic, especially because of proliferation of ransomware, and cyber criminals deliberately targeting such attacks against healthcare delivery organisations. Meanwhile, Finnish healthcare providers are doing surprisingly well in terms of ransomware incidents: none reported since the year 2017. It's not clear why is it so. Ransomware incidents have become commonplace in Finnish society, and the good situation in healthcare stands out even inside Finland. In this presentation we study which kind of cyber security challenges do Finnish healthcare providers face, how is cyber security managed in the Finnish healthcare system, and how does the Finnish way compare to approaches in some other European countries. The presentation provides useful insights for policymakers, national level CSIRTs and cyber security managers.
June 25, 2025 11:15-11:50