Program Overview

Amsterdam 2025 FIRST Technical Colloquium

Draft agenda. Times are reflected in the local time of the host city, UTC +1:00.


Tuesday, March 25th

Training Day
08:00 – 09:45

Registration & Coffee

09:45 – 14:00
 GB US

How to Surf the Dark Web Like a Boss (or Eastern European)

Gabriel Cirlig (HUMAN Security, GB); Lindsay Kaye (HUMAN Security, US)

Wednesday, March 26th

Plenary Sessions Day 1
08:00 – 09:30

Registration & Coffee

09:30 – 09:45
 US

Welcome & Introduction

Jeff Bollinger (LinkedIn, US); Matthew Valites (SAP, US)

09:45 – 10:30
 NL

From Buzzword to Battlefield: The Cybersecurity Challenges of Smart Cities

Marina Bochenkova (Corbion Group BV, NL)

10:30 – 11:15
 US PT

CI/CD Security in Action: Strategies for Threat Detection and Response

Julie Agnes Sparks (Datadog, US); Juvenal Araujo (Datadog, PT)

11:15 – 11:30

Sponsored Coffee Break

11:30 – 12:15
 DK

PepsiDog: Inside the Rise of a Professional Chinese Phishing Actor

Ionut Bucur (CSIS Security Group A/S , DK); Stefan Tanase (CSIS Security Group A/S, DK)

12:15 – 13:15

Lunch at The W

13:15 – 14:00
 NL

Shadow Patching: Using AI to Discover Undisclosed Security Fixes in Open-Source

Mackenzie Jackson (Aikido Security, NL)

14:00 – 14:45
 AT

Engineering the Loop: SAP's Journey to Continuous Behavior Testing

Nikolas Dobiasch (SAP SE, AT)

14:45 – 15:00

Socialization Break

15:00 – 15:45
 GH

Monetisation of Cybercrime in Ghana’s Forestry Sector

Anthony Yeboah Akoto (University College of Agriculture and Environmental Studies, GH); James Ofori (Kwame Nkrumah University of Science and Technology Kumasi, GH)

15:45 – 16:30
 BR

Guardians of Identity: Key Takeaways from Identity Theft Breaches

Diego Matos Martins (IBM, BR)

Thursday, March 27th

Plenary Sessions Day 2
08:00 – 09:30

Registration & Coffee

09:30 – 09:45
 US

Welcome & Introduction

Gavin Reid (HUMAN Security, US)

09:45 – 10:30
 CH

In-Depth Study of Linux Rootkits: Evolution, Detection, and Defense

Stephan Berger (InfoGuard AG, CH)

10:30 – 11:15
 HR

BYOVD and Ransomware

Vanja Svajcer (Cisco Talos, HR)

11:15 – 11:30

Sponsored Coffee Break

11:30 – 12:15
 NL

Incident Response in Kubernetes Environment

Mahdi Alizadeh (Databricks, NL)

12:15 – 13:15

Lunch at The W

13:15 – 14:00
 US

A Security Professional’s Guide to Malicious Packages

Kirill Boychenko , Philipp Burckhardt (Socket, US)

14:00 – 14:45
 TR

Scattered Spider's Cloud Tactics: Understanding the Ransomware Deployment Life Cycle

Arda Büyükkaya (EclecticIQ, TR)

14:45 – 15:00

Socialization Break

15:00 – 15:45
 NL

LLMs are Unreliable for Cyber Threat Intelligence: How LLMs Show Low Performance, Inconsistency and Low Calibration in CTI Tasks

Emanuele Mezzi (Vrije Universiteit Amsterdam / Ethikon Institute, NL); Fabio Massacci (Vrije Universiteit Amsterdam / University of Trento, NL); Katja Tuma (Vrije Universiteit Amsterdam, NL)

15:45 – 16:30
 NL

Old School Fraud in 2024: Without Ransomware but with Ransomware Precursor

Rustam Mirkasymov, Vito Alfano (Group-IB, NL)