Training Program Agenda
The agenda is subject to change. The agenda times are reflected in local time in Copenhagen — Central European Summer Time (UTC +2).
About TLP Designations
If you are unfamiliar with the Traffic Light Protocol ("TLP"), please visit https://www.first.org/tlp/ for details. In the use case for FIRST events, TLP levels specifically indicate whether press, social media, and photography/videography may occur. You do not need to be "invited" to attend a TLP:RED session as a confirmed, registered delegate. Please see the Registration Terms & Conditions: Photography or Recording Usage by Attendees.
Meetings notated with "invite-only" or "invitation only" are private meetings.
Registration & Fees
Training is a separate activity from the annual conference and requires a standalone registration. You do not need to attend the annual conference to register for training. Training registration includes:
- Welcome Coffee
- Two coffee breaks
- Buffet lunch
- Entry to the Sunday evening Conference Welcome Reception
- Applicable training materials
Training is not available as a virtual option.
Fees:
- Member: €300.00 + 25% VAT
- Non-member and Liaison: €500.00 + 25% VAT
Track 1
Track 2
Track 3
Track 4
Sunday, June 22nd
Track 1 | Track 2 | Track 3 | Track 4 | |
---|---|---|---|---|
08:30 – 10:00 | PH On-Site Incident Response: Collaboration of teams for Complex Cyber Incidents Alwell Mulsid (Philippine National Computer Emergency Response Team (CERT-PH), DICT, PH) TLP:AMBER | CH Ransomware Empowerment (Full Day) Meichtry Nadia (Oneconsult AG, CH) TLP:CLEAR | AU Fortifying AI: Hands-On Training in Adversarial Attacks and Defense of AI Systems (Full Day) John Lopes, Vishal Thakur (TikTok USDS, AU) TLP:CLEAR | US Mike Cunningham (MITRE Center for Threat-Informed Defense, US); Suneel Sundar (MITRE Center for Threat-Informed Defense) TLP:CLEAR |
10:00 – 10:15 | Coffee Break | |||
10:15 – 12:30 | PH On-Site Incident Response: Collaboration of teams for Complex Cyber Incidents Alwell Mulsid (Philippine National Computer Emergency Response Team (CERT-PH), DICT, PH) TLP:AMBER | CH Ransomware Empowerment (Full Day) Meichtry Nadia (Oneconsult AG, CH) TLP:CLEAR | AU Fortifying AI: Hands-On Training in Adversarial Attacks and Defense of AI Systems (Full Day) John Lopes, Vishal Thakur (TikTok USDS, AU) TLP:CLEAR | US Mike Cunningham (MITRE Center for Threat-Informed Defense, US); Suneel Sundar (MITRE Center for Threat-Informed Defense) TLP:CLEAR |
12:30 – 13:30 | Lunch Break | |||
13:30 – 15:30 | IN Swapneel Patnekar (Shreshta IT Technologies Pvt. Ltd. , IN) TLP:CLEAR | CH Ransomware Empowerment (Full Day) Meichtry Nadia (Oneconsult AG, CH) TLP:CLEAR | AU Fortifying AI: Hands-On Training in Adversarial Attacks and Defense of AI Systems (Full Day) John Lopes, Vishal Thakur (TikTok USDS, AU) TLP:CLEAR | US Measure, Inform, and Mature your Enterprise Defense Mike Cunningham (MITRE Center for Threat-Informed Defense, US); Suneel Sundar (MITRE Center for Threat-Informed Defense) TLP:CLEAR |
15:30 – 15:45 | Coffee Break | |||
15:45 – 17:30 | IN Swapneel Patnekar (Shreshta IT Technologies Pvt. Ltd. , IN) TLP:CLEAR | CH Ransomware Empowerment (Full Day) Meichtry Nadia (Oneconsult AG, CH) TLP:CLEAR | AU Fortifying AI: Hands-On Training in Adversarial Attacks and Defense of AI Systems (Full Day) John Lopes, Vishal Thakur (TikTok USDS, AU) TLP:CLEAR | US Measure, Inform, and Mature your Enterprise Defense Mike Cunningham (MITRE Center for Threat-Informed Defense, US); Suneel Sundar (MITRE Center for Threat-Informed Defense) TLP:CLEAR |
- AUTLP:CLEAR
Fortifying AI: Hands-On Training in Adversarial Attacks and Defense of AI Systems (Full Day)
John LopesVishal ThakurJohn Lopes (TikTok USDS, AU), Vishal Thakur (TikTok USDS, AU)
Vishal Thakur is a seasoned expert in the information security industry, with extensive experience in hands-on technical roles specializing in Incident Response, Emerging Threats, Malware Analysis, and Research. Over the years, Vishal has developed a strong reputation for his deep technical expertise and ability to address complex security challenges. He has shared his research and insights at prominent international conferences, including BlackHat, DEFCON, FIRST, and the SANS DFIR Summit, where his sessions have been highly regarded for their depth and practical relevance. Additionally, Vishal has delivered training and workshops at BlackHat and the FIRST Conference, equipping participants with cutting-edge skills and techniques. Currently, Vishal leads as Head of Security Operations AU, Cyber Fusion Center at TikTok USDS, where he oversees advanced security operations and incident response strategies. Previously, he worked as a Senior Researcher at Salesforce, where he contributed to
As AI becomes integral to critical systems, its vulnerabilities to adversarial attacks and data-related weaknesses pose serious risks. This interactive, one-day training is designed for researchers, and security professionals to understand and mitigate these challenges and get ready for the future of AI Security. Participants will gain a comprehensive foundation in AI security, exploring adversarial attack techniques, defense mechanisms, and best practices for building robust datasets.
The training combines engaging lectures, live demonstrations, and four hands-on labs focused on real-world adversarial attack scenarios, including CIFAR-10, IMDB, Fashion-MNIST, and SVHN datasets. Participants will learn to craft adversarial examples, test model vulnerabilities, and implement practical defenses like adversarial training, input transformations, and feature squeezing. All code required for the labs will be provided during the sessions, and attendees will receive pre-configured Google Colab notebooks after the training to continue their learning independently.
A group exercise will simulate securing a facial recognition system, challenging attendees to collaboratively identify threats and apply defenses in a realistic context. By the end of the session, participants will leave with actionable skills, ready-to-use tools, and strategies to enhance the security and resilience of their AI models. This training is ideal for professionals looking to stay ahead in the rapidly evolving field of AI security and robustness.
Learning Outcomes By the end of the training, participants will:
- Understand key concepts like adversarial attacks, perturbations, and dataset vulnerabilities.
- Learn practical methods for generating adversarial examples using real-world datasets.
- Gain knowledge of defense mechanisms, including adversarial training, feature squeezing, and input preprocessing.
- Apply their knowledge in a collaborative group exercise to secure an AI system in a simulated scenario.
- Leave with actionable skills and pre-configured tools to continue learning and apply defenses in their own projects.
June 22, 2025 08:30-10:00, June 22, 2025 10:15-12:30, June 22, 2025 13:30-15:30, June 22, 2025 15:45-17:30
- INTLP:CLEAR
It all starts with a phish! - Building a phishing detection pipeline using open source software and custom tooling
Swapneel PatnekarSwapneel Patnekar (Shreshta IT Technologies Pvt. Ltd. , IN)
Swapneel is the Chief Security researcher and CEO of Shreshta IT Technologies Pvt. Ltd. , a DNS security and threat intelligence company based in India.
He has 15 years of experience in information security. Swapneel is a Liaison Member of the Forum of Incident Responders(FIRST) and the co-chair of the DNS Abuse SIG at FIRST. He also has been on the board of India Internet Engineering Society(IIESoc).
He also volunteers as a FIRST trainer and has most recently delivered a workshop on Fundamentals of Cyber Threat Intelligence in Kazakhstan.
He is a prolific speaker and has recently presented at numerous international cyber crime conferences in Latvia, France and Singapore.
Since 2019, he has been an APNIC Community Trainer and has delivered technical workshops in Bhutan, Myanmar, Papua New Guinea, Bangladesh, Nepal and Sri Lanka.
He has also delivered technical workshops to law enforcement agencies on countering cyber crime.
This hands-on workshop uses the concept of persistent monitoring for building a phishing detection pipeline using Open source software - Lookyloo[1], MISP[2] and custom tooling.
The workshop uses OSINT feeds( newly registered domain names and other sources etc) and builds a pipeline for ingesting domain names/websites into Lookyloo. The custom tooling enables the enrichment of data and exporting key attributes of the domain names/websites into MISP.
The workshop starts by guiding participants in building ad-hoc flows - ingesting domain names (campaign specific) into Lookyloo, MISP and using custom tooling to enrich the data.
The workshop then dives into building an automated pipeline by putting the building blocks together.
[1]: Lookyloo - Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.
[2]MISP - MISP Threat Sharing (MISP), Malware Information Sharing Platform is an open source threat intelligence platform.
Key takeaways - How will participants benefit from the workshop: At the end of the workshop,
- Participants will get an introduction to MISP & Lookyloo.
- Confidence in leveraging Lookyloo, MISP, and other tools for phishing threat detection and analysis.
- Strategies to automate phishing detection workflows.
- Participants will leave with a functioning phishing detection pipeline and the skills to implement and expand it within their organizations.
Important prerequisites for participants attending the workshop:
- Ability to navigate and use Linux/Unix command-line tools. Open-source tools like Lookyloo, MISP and the custom tools/scripts require terminal interaction.
- Knowledge of Python or similar scripting languages will be helpful for the tooling customization.
Who should attend this workshop:
- Threat intelligence researchers/CTI folks
- Detection engineers
- Existing users of MISP, Lookyloo, or similar open-source tools who wish to integrate them into a phishing detection pipeline.
Technical requirements for the workshop: Participants should bring a laptop with the following:
- Virtualbox or Vmware Player (VM will be made available atleast one week before the workshop)
- At least 8GB RAM and sufficient storage(atleast 100GB) for the VM installation.
- Admin/root access for installation and configuration
- Access to a private Github/Gitlab repository containing all scripts/code demonstrated in the workshop will be provided in the workshop
June 22, 2025 13:30-15:30, June 22, 2025 15:45-17:30
- USTLP:CLEAR
Level Up Your Analytics
Mike CunninghamMike Cunningham (MITRE Center for Threat-Informed Defense, US), Suneel Sundar (MITRE Center for Threat-Informed Defense)
Mike Cunningham is the R&D Program Manager in MITRE’s Center for Threat-Informed Defense. He continuously advances the state of the art and the state of practice in threat-informed defense through cutting-edge research and innovation. Before joining MITRE, Mike was an Interactive On-Net Operator in Tailored Access Operations at the NSA. In his spare time, Mike cherishes quality time with his wife and three daughters. He also enjoys playing music, staying fit, and basking in the San Diego sun.
In this workshop, participants will explore the relationships between sensors and advanced detection strategies. This session is designed for cybersecurity professionals seeking to enhance their technical acumen in building robust, adaptable detection capabilities.
The workshop begins with a detailed exploration of sensors, event IDs, and data sources, focusing on how to leverage them to align organizational telemetry with adversary techniques as outlined in MITRE ATT&CK. Participants will learn to assess sensor coverage, identify telemetry gaps, and prioritize sensor deployment for maximum visibility.
Building on this foundation, the session transitions to a methodology for developing resilient detection analytics that withstand adversary evasion. Attendees will gain hands-on experience in creating detection logic that spans from basic event-level indicators to high-fidelity, behavior-based detections at the top of the Pyramid of Pain.
Through guided exercises, participants will apply these principles to map real-world sensor data to ATT&CK techniques and develop analytics that are robust against adversary change. The workshop concludes with a demonstration of how these concepts come together to detect and respond to adversary behaviors, validating the effectiveness of the strategies discussed.
Key Takeaways:
- Learn to identify and address telemetry gaps to optimize threat detection coverage.
- Gain practical skills in creating resilient detection logic that withstands adversary evasion techniques.
- Develop a systematic approach to aligning detection engineering efforts with real-world adversary behaviors for enhanced security outcomes.
June 22, 2025 08:30-10:00, June 22, 2025 10:15-12:30
- USTLP:CLEAR
Measure, Inform, and Mature your Enterprise Defense
Mike CunninghamMike Cunningham (MITRE Center for Threat-Informed Defense, US), Suneel Sundar (MITRE Center for Threat-Informed Defense)
Mike Cunningham is the R&D Program Manager in MITRE’s Center for Threat-Informed Defense. He continuously advances the state of the art and the state of practice in threat-informed defense through cutting-edge research and innovation. Before joining MITRE, Mike was an Interactive On-Net Operator in Tailored Access Operations at the NSA. In his spare time, Mike cherishes quality time with his wife and three daughters. He also enjoys playing music, staying fit, and basking in the San Diego sun.
Threat-Informed Defense (TID) is the systematic application of a deep understanding of adversary tradecraft and technology to improve defenses. This workshop equips participants with the skills and tools needed to evaluate and enhance their team’s TID maturity. This workshop is specifically designed for team leads, managers, and decision-makers responsible for shaping and driving their organization’s security practices.
The session begins with an exploration of what TID is—and what it is not. Through interactive exercises, participants will identify practical examples of TID and assess how these align with their organization’s SOPs.
The workshop then dives into the three dimensions of TID:
- Cyber Threat Intelligence (CTI)
- Defensive Measures
- Testing & Evaluation
Attendees will evaluate their team’s application of each dimension and measure their maturity level using a structured approach. Practical, open-source tools and hands-on challenges for each dimension will provide insights for improvement.
Finally, the session introduces the Inform model, a framework designed to represent TID markers as a score. This score allows team leads and managers to track progress over time, prioritize resources effectively, and communicate improvements to stakeholders.
Key Takeaways:
- A clear framework for understanding and articulating TID principles.
- Tools to measure and assess team performance across TID dimensions.
- Practical strategies for implementing improvements using open-source resources.
This workshop provides the strategic and technical foundations that leaders need to operationalize TID, build stronger teams, and drive measurable security outcomes.
June 22, 2025 13:30-15:30, June 22, 2025 15:45-17:30
- PHTLP:AMBER
On-Site Incident Response: Collaboration of teams for Complex Cyber Incidents
Alwell Mulsid (Philippine National Computer Emergency Response Team (CERT-PH), DICT, PH)
Led the CERT-PH incident response section and managed a dynamic team of 15 DFIR professionals and analysts with diverse skill sets, providing critical incident response and support to government agencies across the Philippines. Successfully handled 34 high-priority incidents to date, spanning categories such as ransomware attacks, compromised infrastructures, and advanced persistent threats (APTs). Demonstrated expertise in coordinating complex investigations, ensuring rapid containment, and delivering actionable recommendations to organizations assets.
- In 2024, conducted 25 hands-on training in incident response operations (artifact gathering, cyber range, table top exercises)
- Holder of SANS's Lethal Forensicator Coins during the 508 Advanced Incident Response, Threat Hunting, and Digital Forensics training.
- On-going exam preparations for SANS 508 and ISACA CISA.
- SEC+, ECIH, CC
When face with complex cyber incident, an effective incident response requires collaboration beyond internal teams. The integration of internal IT, security teams, and external units such as third-party vendors, and CERTs is crucial for addressing complex cyber incidents. This training session will focus on strategies for fostering communication and collaboration during onsite response to mitigate risks, restore operations, and preserve evidence. Attendees will gain hands-on knowledge of some common tools, techniques, and best practices for managing cybersecurity incidents with a collective approach, ensuring a thorough and coordinated response.
Training Objectives
- To equip participants with practical knowledge and actionable steps for conducting onsite incident response, ensuring effective measures are taken to minimize the impact of cyber incidents on the organization.
- To simulate the basic process of acquiring and analyzing traces of cyberattacks from compromised machines, enabling participants to practice evidence collection and forensic techniques.
Training Session Applicability This is highly applicable for National CERTs and organizational CSIRTs tasked with providing assistance not only within their own organizational environments but also to sub-units located across diverse locations and operating in varying environments. CERT operations insights will be also explained how IR team collaborate with SOC, VAPT and Threat Intelligence monitoring teams.
June 22, 2025 08:30-10:00, June 22, 2025 10:15-12:30
- CHTLP:CLEAR
Ransomware Empowerment (Full Day)
Meichtry NadiaMeichtry Nadia (Oneconsult AG, CH)
Nadia Meichtry has been working as a DFIR specialist at Oneconsult AG for the last 4.5 years, where she regularly deals with cyber incidents, including ransomware. She holds a Masters in Digital Forensics and several SANS certifications. She joined the FIRST Multi-Stakeholder Ransomware SIG in 2022 and became one of the co-chairs of the MSR-SIG in June 2024. She co-developed and delivered this training at FIRSTCON24 in Fukuoka.
If you missed out on our full-day introductory ransomware training in Fukuoka, you’re in luck!
This improved version, based on last year’s feedback, will cover:
- Introduction into the world of ransomware attacks: -- What is ransomware? -- How bad is it? -- What do current attacks look like? -- What are the risks to keep an eye on?
- Preparing for ransomware attacks: -- Who should be involved? -- Measures and recommendations
- Darknet & ransomware groups: -- How TOR works -- Data leak sites
- Handling and responding to ransomware attacks: -- Incident response process -- Analysis steps
- Key points on recovery
- Negotiation takeaways
You’ll get valuable insights from the co-chairs and members of the FIRST Multi-Stakeholder Ransomware SIG, who’ll share their experience with real ransomware cases.
June 22, 2025 08:30-10:00, June 22, 2025 10:15-12:30, June 22, 2025 13:30-15:30, June 22, 2025 15:45-17:30