Program Agenda

Agenda is subject to change. Times are reflected in UTC +2 (CEST). Workshops have limited seating and based on the registration admission purchased. Plenary sessions are open to all registered delegates.

Registration Hours

Monday, April 21 - Registration Located on Level 2, Atrium
07:00-10:00 | Registration for Workshop Participants ONLY
11:00-18:00 | Registration for Plenary Participants

Tuesday, April 22 - Registration Located on Level 1, Near Stairway from 2 and Mall Entrance
08:00-15:00 | Registration

Wednesday, April 23 - Registration Located on Level 1, Near Stairway from 2 and Mall Entrance
08:00-15:00 | Registration

Monday, April 21st

Workshop: Track 1
MOA 14
Workshop: Track 2
MOA 15
Workshop: Track 3
MOA 16
08:30 – 10:00
 NL

Build Your Own Threat Landscape (8:30-12:30)

Gert-Jan Bruggink (Venation, NL)

TLP:CLEAR
 NO US

Intelligence Collection Planning Workshop: How to Create A Plan that Synchronizes Collection with Your Stakeholders' Needs (8:30-12:30)

Freddy Murstad (Nordic Financial CERT, NO); Garrett Carstens (Intel471, US); Michael DeBolt (Intel 471, US)

TLP:GREEN
 CA

Hands-On Data Breach Investigation with the Dark Net (8:30-12:30)

Olivier Bilodeau, Tammy Harper (Flare, CA)

TLP:AMBER
10:00 – 10:15

Networking Break

10:15 – 12:30
 NL

Build Your Own Threat Landscape (8:30-12:30)

Gert-Jan Bruggink (Venation, NL)

TLP:CLEAR
 NO US

Intelligence Collection Planning Workshop: How to Create A Plan that Synchronizes Collection with Your Stakeholders' Needs (8:30-12:30)

Freddy Murstad (Nordic Financial CERT, NO); Michael DeBolt (Intel 471, US)

TLP:GREEN
 CA

Hands-On Data Breach Investigation with the Dark Net (8:30-12:30)

Olivier Bilodeau, Tammy Harper (Flare, CA)

TLP:AMBER
12:30 – 13:30

Lunch

13:00 – 14:00

CTI SIG Meetup

14:00 – 16:00
 DE

Operationalization of Sigma Rules

Thomas Patzke (Evonik Industries AG, DE)

TLP:CLEAR
 DE

Geopolitical Cyber Threat Intelligence (14:00-18:00)

Robin Dimyanoglu (HelloFresh SE, DE)

TLP:CLEAR
 LU

Integrating New Tools in Your Workflows Within Minutes In MISP (14:00-18:00)

Sami Mokaddem (CIRCL, LU)

TLP:CLEAR
16:00 – 16:15

Networking Break

16:15 – 18:00
 DE

Geopolitical Cyber Threat Intelligence (14:00-18:00)

Robin Dimyanoglu (HelloFresh SE, DE)

TLP:CLEAR
 LU

Integrating New Tools in Your Workflows Within Minutes In MISP (14:00-18:00)

Sami Mokaddem (CIRCL, LU)

TLP:CLEAR

Tuesday, April 22nd

Plenary Sessions Day 1
MOA 6-9
09:00 – 09:15
 DE

Welcome Remarks

Prof. Dr. Thomas Schreck (Forum of Incident Response and Security Teams (FIRST), DE)

09:15 – 09:45
 GR US

Decoding a Decade: 10 Years of Applied CTI Discipline

Andreas Sfakianakis (ThreatIntel.EU, GR); Rebekah Brown (Citizen Lab, US)

TLP:CLEAR
09:45 – 10:15
 US

Adversary Evolution: Mechanics, Drivers, & Implications for Cyber Defense

Scott Small (Tidal Cyber, US)

TLP:CLEAR
10:15 – 10:45

Networking Break

10:45 – 11:15
 US DE

Navigating the Fog of War: A Programmatic Approach to Capturing and Communicating Relevant Insights from Rising Geopolitical Tensions

John Doyle (Mandiant, US); Simone Kraus (Orange Cyberdefense, DE)

TLP:CLEAR
11:15 – 11:45
 NO

From Your Gut to a Gold Standard: Introducing the Admiralty System in CTI

Freddy Murre (Nordic Financial CERT, NO)

TLP:CLEAR
11:45 – 12:15
 US

Building a CTI Program Around a CTI Platform

Byron Graham (FBI, US); Chris Ante (MITRE, US)

TLP:CLEAR
12:15 – 13:30

Lunch

13:30 – 14:00
 US

Numbers Game: The Case for Quantifying Cyber Threats

Scott Small (Tidal Cyber, US)

TLP:CLEAR
14:00 – 14:30
 DK

Securing Green Energy: CTI, OT, and Geopolitics

Ilmar Üle (Ørsted, DK)

TLP:GREEN
14:30 – 15:00
 AU

Rethinking Data Visualisation for CTI

Chris Horsley (Cosive, AU)

TLP:CLEAR
15:00 – 15:30

Networking Break

15:30 – 16:00
 LU

Scoring Vulnerabilities by Leveraging Activity Data from the Fediverse

Alexandre Dulaunoy, Cédric Bonhomme (CIRCL, LU)

TLP:CLEAR
16:00 – 16:30
 BE

HA - Not "High Availability" but "Hunting Automation"

Xavier Mertens (Xameco SRL, BE)

TLP:CLEAR
16:30 – 17:00

Lightning Talks

17:00 – 18:00

Wednesday, April 23rd

Plenary Sessions Day 2
MOA 6-9
08:50 – 09:00

Opening Remarks: Day 2

09:00 – 09:30
 LU

The Art of Pivoting - How You Can Discover More from Adversaries with Existing Information

Alexandre Dulaunoy (CIRCL, LU)

TLP:CLEAR
09:30 – 10:00
 IE

You Shall Not Pass! (Without Proper Attribution): Untangling a Complex Attribution Case

Asli Koksal (Mandiant, IE)

TLP:AMBER
10:00 – 10:30
 US

If Everything is Priority... That's Okay!

Jake Nicastro (Mandiant, US)

TLP:CLEAR
10:30 – 11:00

Networking Break

11:00 – 11:30
 NO

Fortifying Your Brand: The Intersection of Cyber Threat Intelligence, Brand Abuse, and Physical Security

Alfredo Reyes (Equinor, NO)

TLP:AMBER
11:30 – 12:00
 SE

CTI in a PSIRT Context

Rhys Mataira (Ericsson, SE)

TLP:GREEN
12:00 – 13:15

Lunch

13:15 – 13:45
 AU

Evolve or Perish: Integrating Software Supply Chain Intel into Enterprise CTI

Paul McCarty (SourceCodeRED, AISA, AU)

TLP:CLEAR
13:45 – 14:15
 US CZ

Bridging Gaps in CTI: Using PIRs for Threat-Informed Security

Keith Swagler (Red Hat, US); Ondra Rojcik (Red Hat, CZ)

TLP:CLEAR
14:15 – 14:45

Networking Break

14:45 – 15:15
 CA GB LT

Leveraging Geopolitical Intelligence in the Private Sector: Key Findings from a Multi-Industry Study

Brian Hein (Silobreaker, CA); David Hunt, Maggie Fonseca (Silobreaker, GB); Lukas Vaivuckas (Silobreaker, LT)

TLP:CLEAR
15:15 – 15:45
 AU

Ransomware Payment Profiles - Exposing the risk through enhanced STIX threat intelligence

Adam Turner (Macquarie University, AU)

TLP:GREEN
15:45 – 16:15
 US

Why Are We Building a Newer, Rounder Intelligence Cycle: Why We Need Bring Cyber Intelligence Back to the Basics of Solid Project Management

Brian Mohr (US)

TLP:CLEAR
16:15 – 16:30

Closing Remarks