Program Overview

CVE Program & FIRST VulnCon 2025

Schedule is subject to change.

Monday, April 7th

Room 1ABRoom 1CDRoom 6Room 7Room 8
07:30 – 09:00

Registration Opens - Main Lobby

09:00 – 09:30

Opening Remarks (Room 1ABC)

09:30 – 10:00
 MX US

Practical Software Bill of Materials: From Generation to Distribution Workshop

Adolfo García Veytia (Carabiner Systems, MX); Ian Dunbar-Hall (Lockheed Martin, US); Michael Lieberman (Kusari, US)

TLP:CLEAR

09:30 – 11:00

 AU

Vulnerability Data Analysis with Google Spreadsheets and Apps Script for Fun and Profit

Andrew Pollock (Google Open Source Security Team, AU)

TLP:CLEAR

09:30 – 11:00

 US

Don’t Forget the Little Guy: Vulnerability Management in Operational Technology

Alex Assante (Network and Security Technologies , US); Kylie McClanahan (Bastazo, US)

TLP:CLEAR

09:30 – 10:30

 US

Towards a Minimum Viable Enumeration of Vulnerabilities

Art Manion (ANALYGENCE Labs, US); Jay Jacobs (Cyentia, US)

TLP:CLEAR
 CA

With VEX, The Possibilities are (Almost) Limitless!

Vincent Danen (Red Hat , CA)

TLP:CLEAR
10:00 – 10:30
 US JP

Establishing a Global Community of Practice on Coordinated Vulnerability Disclosure (CVD)

Justin Murphy (CISA, US); Tomo Ito (JPCERT/CC, JP)

TLP:CLEAR
 US

Modeling Asset Risk Using Grouped EPSS

Stephen Shaffer (Moderna, US)

TLP:CLEAR
10:30 – 11:00
 KR

Comprehensive Vulnerability Management Framework for Nuclear Fa-cilities: Integrating Security, Safety, and Risk Assessment

Ieck-Chae Euom, Joon-seok Kim, Seong-Su Yoon (System Security Research Center, Chonnam National University , KR)

TLP:GREEN
 CA

Where Do We Aim? A Look at the State of Vulnerable Software Identification and Its Future (Virtual)

Andrew Suter (BlackBerry Ltd , CA)

TLP:CLEAR

Networking Break with Exhibitors (Room 2)

11:00 – 11:30

Networking Break with Exhibitors (Room 2)

11:30 – 12:00
 US IE

Vulnerability Root Cause Mapping with CWE: Challenges, Solutions, and Insights from Grounded LLM-based Analysis

Alec Summers (The MITRE Corporation, US); Chris Madden (Yahoo Product Security Team , IE)

TLP:CLEAR

11:30 – 12:30

 US

Using Jupyter Notebooks to Explore Public CVE Data

Jerry Gamblin (Cisco, US)

TLP:CLEAR

11:30 – 13:30

 US

Diagnosing the Hurdles in the Medical Device Regulatory Landscape

Ethan Muntz, Taylor Porter (Health-ISAC , US)

TLP:CLEAR
 BE

Belgian Federal Government invites Ethical Hackers for First-Ever 'Hack the Government' Event (Virtual)

Johan Caluwe (Centre for Cybersecurity Belgium, BE); Susan Bushe (Centre for Cybersecurity Belgium , BE)

TLP:CLEAR

11:30 – 12:30

 US

Distributing Product Vulnerability Information: The Cisco VEXperience

Dario Ciccarone (Cisco PSIRT – Cisco Systems Inc., US)

TLP:CLEAR

11:30 – 12:30

12:00 – 12:30
 US

Securing the Future: Navigating AI Vulnerabilities and Evolving Security Practices

Lisa Bradley, Sarah Evans (Dell, US)

TLP:CLEAR
12:30 – 13:00
 US

BOF: Vulnerability Data Consumers

Jay Jacobs (Cyentia, US)

TLP:CLEAR
 US

From NIST to FIRST: How GitHub’s Product Security Response Organization Transitioned

Jeffrey Guerra, Sara Clements (GitHub, US)

TLP:CLEAR
 MX

Weaving a VEX Feed Through the Kubernetes Project

Adolfo García Veytia (Carabiner Systems, MX)

TLP:CLEAR
13:00 – 14:30

Lunch Break with Exhibitors (Room 2)

14:30 – 15:00
 US

The Enriched CVE Record: Redefining Completeness and Quality for Greater Impact

Alec Summers (The MITRE Corporation, US)

TLP:CLEAR
 US DE

Vulnerability Poker: Real or AI Fake Vulnerabilities?

Madison Oliver (GitHub, US); Tobias Heldt (OpenSSF, DE)

TLP:CLEAR

14:30 – 15:30

 US

Product Security Incident Response at a Fortune 500 SaaS

Garrett McNamara (ServiceNow, US)

TLP:CLEAR
 US IL

Who’s Vulnerability Is It Anyway? Harmonizing Stakeholder Roles in Vulnerability Management

Havaya Garti (Snyk, US); James Berthoty ( Latio Tech, US); Kayla Underkoffler (Zenity, US); Yotam Perkal ( Zscaler , IL)

TLP:CLEAR

14:30 – 15:30

 US

Streamlining Vulnerability Management: The Power of VEX Inheritance in Container Ecosystems

Jessica Butler (NVIDIA, US); Kaajol Dhana (NVIDIA , US)

TLP:CLEAR
15:00 – 15:30
 US

Adversarial Intelligence: Redefining Application Security Through the Eyes of an Attacker

Mahesh Babu, Roy Talyosef (Kodem, US)

TLP:CLEAR
15:30 – 16:00

Networking Break with Exhibitors (Room 2)

16:00 – 16:30
 IT US CZ

Validating Vulnerability Analysis with Statistical Analysis of Metadata (In Person & Virtual)

Alexander Bushkin (Red Hat , IT); Chess Hazlett (Red Hat, US); Keith Grant (Red Hat , US); Marian Rehak (Red Hat, CZ)

TLP:CLEAR
 BE

Scaling Vulnerability Management: A Scale-Up's Journey to Enterprise-Grade Security

Niels Hofmans (Intigriti, BE)

TLP:GREEN
 FR

Distribution Builders Meet VEX (Virtual)

Marta Rybczynska (Ygreky, FR)

TLP:CLEAR
16:30 – 17:00

Day 1 - Wrap Up (Room 1ABC)

TLP:CLEAR
17:00 – 19:00

Opening Reception with the Exhibitors (Room 2) - Sponsored by: Nucleus Security

Tuesday, April 8th

Room 1ARoom 1BRoom 1CRoom 1DRoom 6Room 7Room 8
08:00 – 09:00

Registration Opens - Main Lobby

09:00 – 09:30
 US

Models and Systems: How to Think About Vulnerabilities and Artificial Intelligence

Erick Galinkin (NVIDIA, US)

TLP:CLEAR

09:00 – 10:00

 JP US

CVD Table Top Exercise

Tomo Ito (JPCERT/CC, JP); Justin Murphy (CISA, US)

TLP:CLEAR

09:00 – 11:00

 US

Software Identity in the Vulnerability Management Ecosystem

Andrew Lilley Brinker (MITRE, US); Christopher Turner (NIST, US); Mz Megazone (F5, Inc., US); Steve Springett (OWASP, US)

TLP:CLEAR
 US

Outpacing Attackers: How Data-Driven Insights Speed Up Vulnerability Remediation

Saeed Abbasi (Qualys, US)

TLP:CLEAR

09:00 – 10:00

 US

EU CRA TL/DR for PSIRTS - What Product Security Needs To Do To Be Compliant with the CRA

Christopher Robinson (Open Source Security Foundation, US)

TLP:CLEAR

09:00 – 10:30

 US

The Quality Imperative for CVEs: The Need For Enhancing Vulnerability Reporting Standards

Jerry Gamblin (Cisco, US)

TLP:CLEAR
 US

UC2 Risk Ruler for CVSS 4.0: Visualizing Vulnerability Severity and Data Confidence (Virtual)

Rob Arnold (Acorn Pass, US)

TLP:CLEAR

09:00 – 10:00

10:00 – 10:30
 GB

CPE Metadata: Know IT ALL

Karman Liu (MongoDB, GB)

TLP:CLEAR
 PL

OpenEoX - Unified Machine-Readable Approach to Software and Hardware Product Lifecycle Data Representation

Przemysław Roguski (Red Hat Product Security, PL)

TLP:CLEAR
10:30 – 11:00

Networking Break with Exhibitors (Room 2)

11:00 – 11:30
 CA

AIBOM: Powering Transparency and Security in AI and Software Supply Chains

Dmitry Raidman (Cybeats, CA); Helen Oakley (SAP, CA)

TLP:CLEAR
 US

Quick Start Session For Using CPE Within the CVE Record Format

Chris Coffin (The MITRE Corporation, US)

TLP:CLEAR
 US

What's New in CSAF and OpenEoX

Justin Murphy (CISA, US); Omar Santos (Cisco)

TLP:CLEAR
 BE

The CVD, EUVD, and the CRA SRP

Kaspar Clos (ENISA, BE)

TLP:GREEN

11:00 – 12:00

 GB US

Madness of Vulnerability Management in Modern Cloud, Container, How to Win the Battle Practitioners View

Francesco Cipollone (Phoenix Security , GB); Nate Sanders (Bazaarvoice , US)

TLP:CLEAR

11:00 – 12:00

 US

CVSS v4.0 By The Numbers

Nick Leali (Cisco and CVSS SIG Chair, US)

TLP:CLEAR

11:00 – 12:00

11:30 – 12:00
 US

Nothing to Risk but Risk Itself: Expanding Vulnerability Risk with Internet-Scale Data

Benjamin Edwards, Sander Vinberg (Bitsight, US)

TLP:CLEAR

11:30 – 12:30

 JP

Lessons Learned From Assigning CWE's to Test Items for Security Assessments

Yuichi Kikuchi, Takayuki Uchiyama (Panasonic PSIRT, JP)

TLP:GREEN
 US

Open Interchange on CPE - Purl Between Communities of Interest and the CVE and NVD Programs

Chris Coffin (The MITRE Corporation, US); Christopher Robinson (Open Source Security Foundation, US); Peter Allor (Red Hat, US)

11:30 – 12:30

 US GB

Unlocking the Power of SBOMs: A Deep Dive into Risk Management and Cybersecurity Posture

John Bergland (IBM, US); Zadia Alden (Security and Legal Scanning Services, GB)

TLP:CLEAR
12:00 – 12:30
 DE

“I Can Do This All Day.” – CVD From a Governmental Perspective

Tassilo Thieme (Federal Office for Information Security (BSI), DE)

TLP:GREEN
 US

Updates from the CVSS SIG

Nick Leali (Cisco and CVSS SIG Chair, US)

TLP:CLEAR
12:30 – 14:00

Lunch Break with Exhibitors (Room 2)

14:00 – 14:30
 IT US

How Do We Leverage CVE Root Cause Mapping and CWE Data to Prevent New Vulnerabilities?

Alexander Bushkin (Red Hat , IT); Jeremy West (Red Hat Inc, US)

TLP:CLEAR

14:00 – 16:30

 US

Breaking the Bot: GenAI Web App Attack Surface & Exploitation

Ken Smith (Praetorian, US)

TLP:CLEAR

14:00 – 15:30

 US

Open Interchange on CPE - Purl Between Communities of Interest and the CVE and NVD Programs

Chris Coffin (The MITRE Corporation, US); Christopher Robinson (Open Source Security Foundation, US); Peter Allor (Red Hat, US)

14:00 – 15:00

 DE US

CSAF Writing Workshop (Workshop Will Not Be Streamed)

Thomas Schmidt (BSI, DE); Justin Murphy (CISA, US)

TLP:CLEAR

14:00 – 15:30

 CA

EU Cyber Resilience Act - A Product Owner’s Approach

Langley Rock (Dell Technologies , CA)

TLP:CLEAR
 US

State of EPSS and What to Expect from Version 4

Jay Jacobs (Cyentia, US)

TLP:CLEAR

14:00 – 15:00

 FR

Towards a Vulnerability Reporting Specification (In Person & Virtual)

Marta Rybczynska, Mikael Barbero (Eclipse Foundation, FR)

TLP:CLEAR
14:30 – 15:30
 GB

The EU Cybersecurity Resilience Act (CRA) - Boring, Scary or Exciting?

Mike Bursell (Confidential Computing Consortium, GB)

TLP:CLEAR
 KR

Simulation Analysis of Vulnerability Assessment Using CVSS 4.0

Seunghyun Cho (Korea Internet & Security Agency (KISA) , KR)

TLP:GREEN
15:00 – 16:00
 US

CNA Birds of a Feather: Open Forum with Certified Naming Authorities

David Welch (HeroDevs, US); Jonathan Evans (GitHub, US); Lisa Olson (Microsoft, US); Scott Moore (IBM, US)

TLP:CLEAR
15:30 – 16:00

Networking Break with Exhibitors (Room 2)

16:00 – 16:30
 US

Managing Coordinated Disclosures: A Practical Workshop on Vulnerability Coordination

Sara Clements, Jeffrey Guerra (GitHub, US)

TLP:CLEAR

16:00 – 17:30

 DE US

CSAF Writing Workshop (Workshop Will Not Be Streamed)

Thomas Schmidt (BSI, DE); Justin Murphy (CISA, US)

TLP:CLEAR

16:00 – 17:30

 RO

Applying Cybersecurity Regulations and Industry Standards to Open Source Projects

Luci Stanescu (Canonical , RO)

TLP:CLEAR

16:00 – 17:00

 US

Vulnrichment: Year One (In-Person & Virtual)

Art Manion (ANALYGENCE Labs, US); Lindsey Cerkovnik (CISA, US)

TLP:CLEAR
 NL

Ask Not Whether CVSSv3.1 and v4 Scores are Inconsistent, But What Can You Do About It

Mengyuan Zhang, Siqi Zhang (Vrije Universiteit Amsterdam , NL)

TLP:CLEAR
16:30 – 17:00
 US

Exploit Maturity: Your New Best Friend in CVSS

Shelby Cunningham (GitHub, US)

TLP:CLEAR
19:00 – 21:00

After Party - Transfer Co. Food Hall (Off-site; Must Purchase Separate Ticket)

Wednesday, April 9th

Room 6Room 7Room 8
08:00 – 09:00

Registration Opens - Main Lobby

09:00 – 09:30
 US

Merging Security and Compliance: Perspectives on Emerging Regulations and Best Practices

Christopher Robinson (Open Source Security Foundation, US); Eddie Knight (Sonatype, US); Michael Lieberman (Kusari, US)

TLP:CLEAR

09:00 – 10:00

 US

Identifying and Assigning AI Model Vulnerabilities

Kyle Kilian, Sasha Romanosky (RAND Corporation, US)

TLP:CLEAR
 US

Breaking the Build: How Attackers Abuse GitHub Actions

Jonathan Evans (GitHub, US)

TLP:CLEAR
09:30 – 10:30
 GH

Advancing Threat Intelligence Automation with Taranis-NG and Taranis AI: A Beginner's Journey (09:30-10:30, 60 mins)

Prince Asiedu (Open Source Security Foundation , GH)

TLP:CLEAR
10:00 – 10:30
 RO

Managing Vulnerabilities through SSDLC

Luci Stanescu (Canonical , RO)

TLP:CLEAR
10:30 – 11:00

Networking Break with Exhibitors (Room 2)

11:00 – 11:30
 US

Production, Consumption, and the Data: The Open Source Security Sandwich

Michael Lieberman (Kusari, US)

TLP:CLEAR
 US

Challenges in Open Source Software Identification

Martin Prpic (Red Hat, US)

TLP:CLEAR

11:00 – 12:00

 DE

Efficient Vulnerability Management in Hierarchical Supply Chains

Thomas Kittel, Tobias Limmer (Siemens, DE)

TLP:CLEAR
11:30 – 12:00
 CA

The Open Source Paradox: Unpacking Risk, Equity, and Acceptance (11:30-12:30, 60-minutes)

Vincent Danen (Red Hat , CA)

TLP:CLEAR
 US

Where The Wild Things Are: The State Of Open Source Supply Chain Risk Management In Three Stories (11:30-12:00, 60-minutes)

Munawar Hafiz (OpenRefactory, US)

TLP:CLEAR
12:00 – 12:30
 PL US

Airflow Beach Cleaning - Supply Chain Security with Community in Mind

Jarek Potiuk (Apache Software Foundation , PL); Michael Winser (Alpha-Omega , US)

TLP:CLEAR
12:30 – 14:00

Lunch Break with Exhibitors (Room 2)

13:30 – 14:00
 PL

Building Trust Through Proactive Security - Key Parts of the Trusted Software Supply Chain

Przemysław Roguski (Red Hat Product Security, PL)

TLP:CLEAR
 US

From Idea to Open-Source: Building CNA-GURU, a Generative AI Assistant for Security Advisories

Ryan Nolette (AWS, US)

TLP:CLEAR
 US

Identifying Malicious OSS Across Ecosystems

Dan Fiedler (Microsoft, US)

TLP:CLEAR
14:00 – 14:30
 US

Alpha-Omega: What We've Learned From Funding Open Source Security Over the Past 3 Years, What's Ahead

Michael Winser (Alpha-Omega , US)

TLP:CLEAR

14:00 – 15:00

 AU

Let’s Talk About Fitness for Purpose: Comparing and Contrasting the CVE List with OSV.dev

Andrew Pollock (OpenSSF, AU)

TLP:CLEAR

14:00 – 15:00

 US

Securing Citizen Developers: A New Opportunity to Build Safe Applications

Kayla Underkoffler (Zenity, US)

TLP:CLEAR
14:30 – 15:00
 US

Operationalizing SSVC (Virtual)

Lindsey Cerkovnik, Sean Letona (CISA, US)

TLP:CLEAR
15:00 – 15:30

Networking Break with Exhibitors (Room 2)

15:30 – 16:00
 PT

Vulnerability Response of Last Resort: Dealing with Un(der)maintained Packages in the Open Source Ecosystem

Diogo Sousa (Canonical, PT)

TLP:CLEAR
 AU

Lessons from OSV: Vulnerability Management for Open Source

Oliver Chang (Google , AU)

TLP:CLEAR

15:30 – 16:30

Thursday, April 10th

Room 1ABCDRoom 6Room 7Room 8
08:00 – 09:00

Registration Opens - Main Lobby

09:00 – 09:30
 US

The National Vulnerability Database (NVD) – Where It Is and Where It’s Going

Matthew Scholl, Tanya Brewer (NIST, US)

TLP:CLEAR
10:00 – 10:30

Networking Break with Exhibitors (Room 2)

11:00 – 11:30
 US

CISA’s North Star Vision for the CVE Program (In Person & Virtual)

Alec Summers (The MITRE Corporation, US); Benjamin Edwards (Bitsight, US); Bob Lord, Sandy Radesky (CISA, US)

TLP:CLEAR

11:00 – 12:00

 US

CVE Unmoored: Implications of the Removal of the Technology Requirement

Jonathan Evans (GitHub, US)

TLP:CLEAR
 US

When it Comes to Managing Risk, Context is King

Lucas Tamagna-Darr (Tenable, US)

TLP:CLEAR

11:00 – 12:00

 US

CVE Record Format - Past, Present, and Future

Chris Coffin (The MITRE Corporation, US); Mz Megazone (F5, Inc., US)

TLP:CLEAR
12:00 – 13:30

Lunch Break with Exhibitors (Room 2)

13:30 – 14:30
 US

Resolution Revolution: Turbocharging Security Ticketing Timelines

Joseph Seasly, Shruti Datta Gupta (Adobe, US)

TLP:CLEAR
 US

Context Matters: Qualitative Insights into Developers’ Approaches and Challenges with Software Composition Analysis

Elizabeth Lin (North Carolina State University, US)

TLP:CLEAR
 US

Hard Problems in CWE, and What it Tells us about Hard Problems in the Industry (Virtual)

Steve Christey Coley (The MITRE Corporation , US)

TLP:CLEAR
 US

SBOMs in the Real World: Practical Guidance for Managing Three Common SBOM Scenarios

Cortez Frazier Jr. (FOSSA, US)

TLP:CLEAR
14:30 – 15:30
 US

Managing Risk Across the Vulnerability Ecosystem

Julia Hopkins, Cassi Rodano, Patricia Tarro (Dell Technologies, US)

TLP:AMBER
 US

CVE Records: The Cybersecurity Glow-Up You Didn’t Know You Needed

Julia Turkevich, Rina Rakipi (CISA, US)

TLP:CLEAR
 US

No Action Required: CVE for Software as a Service

Art Manion (ANALYGENCE Labs, US); Lisa Olson (Microsoft, US); Don Bailey (AWS, US); Michael Coté (Google , US)

TLP:CLEAR
15:30 – 16:00

Networking Break with Exhibitors (Room 2)

16:00 – 16:30
 US

Exploited CVEs of 2024: Lessons for Vendors and Defenders

Patrick Garrity (VulnCheck, US)

TLP:CLEAR
 IN US

State of Attack Surface Elimination in a World Plagued by Vulnerable Software

Gaurav Gogia (Qualys, IN); Mayuresh Dani (Qualys, US)

TLP:CLEAR
 US

BOF - Discussion Regarding False Positive Results from Vulnerability Scanners and the Use of VEX

Lisa Olson (Microsoft, US); Peter Allor (Red Hat, US)

TLP:CLEAR

16:00 – 17:00

16:30 – 17:00
 US

Building a PSIRT for a Standards Organization

Jim Duncan (US)

TLP:CLEAR
 US

Evolving Secure Development through FedRAMP Continuous Monitoring Trends

Christopher Lusk (Red Hat , US); Stephanie Harris (Red Hat, US)

TLP:CLEAR
17:00 – 17:30

Closing Remarks (Room 1ABCD)