Program Agenda

Agenda is subject to change. Additional Sunday programming coming soon.

The Sunday Training Agenda can be found at: https://www.first.org/conference/2026/training/program

If you have any questions, please contact the Event Office via email at events@first.org.

Program At-A-Glance

  • Sunday, June 14 | Pre-conference Workshops, Meetings, and Welcome Reception
  • Monday, June 15 | Conference Day 1
  • Tuesday, June 16 | Conference Day 2
  • Wednesday, June 17 | Conference Day 3
  • Thursday, June 18 | Conference Day 4
  • Friday, June 19 | Conference Day 5

Registration Hours & Location

  • Registration will be held the Plaza Foyer and available Sunday through Friday.

Hours are as follows and subject to change:

  • Sunday - Training Only | 07:00-09:00
  • Sunday - All Delegates | 13:00-20:00
  • Monday | Conference Day 1
  • Tuesday | Conference Day 2
  • Wednesday | Conference Day 3
  • Thursday | Conference Day 4
  • Friday | Conference Day 5
  • Sunday, June 14th

    Plenary (Plaza ABC)

    Social Activity

  • Monday, June 15th

    Plenary (Plaza ABC)

    Track 1 (Plaza ABC)

    Track 2 (Plaza E)

    Track 3 (Plaza F)

    Social Activity

  • Tuesday, June 16th

    Plenary (Plaza ABC)

    Track 1 (Plaza ABC)

    Track 2 (Plaza E)

    Track 3 (Plaza F)

    Social Activity

  • Wednesday, June 17th

    Plenary (Plaza ABC)

    Track 1 (Plaza ABC)

    Track 2 (Plaza E)

    Track 3 (Plaza F)

    Social Activity

  • Thursday, June 18th

    Plenary (Plaza ABC)

    Track 1 (Plaza ABC)

    Track 2 (Plaza E)

    Track 3 (Plaza F)

    Social Activity

  • Friday, June 19th

    Plenary (Plaza ABC)

    Track 1 (Plaza ABC)

    Track 2 (Plaza E)

    Track 3 (Plaza F)

    Social Activity

Sunday, June 14th

Plenary (Plaza ABC)Social Activity
17:30 – 18:00

FIRST Newbie Intro Session!

TLP:CLEAR
18:00 – 20:00

Welcome Reception in Plaza Foyer

TLP:CLEAR

Monday, June 15th

Plenary (Plaza ABC)Track 1 (Plaza ABC)Track 2 (Plaza E)Track 3 (Plaza F)Social Activity
08:30 – 09:30

Conference Welcome Remarks

TLP:CLEAR
09:30 – 10:30

Monday Keynote

TLP:CLEAR
10:30 – 11:00

Networking Break

TLP:CLEAR
11:00 – 11:35
 US

Mind Over Malware: Reducing Decision Fatigue in Incident Response Teams

John Hollenberger (Fortinet, US); Jennifer Hollenberger (Grove City College, US)

TLP:CLEAR
 US

Indicator Message eXchange (IMX): Turning Human Expertise and Experiences into Machine-Readable CTI-Fast

Brian DeWyngaert (CISA, US)

TLP:CLEAR
 BE PT

Everything Everywhere All at Once…in 2038

Trey Darley (Liaison, BE); Pedro Umbelino (Liaison, PT)

TLP:CLEAR

11:00 – 11:45

11:50 – 12:25
 US

Disparate Data, Distorted Decisions: Vendor Data Bias in CTI

Eli Woodward (Team Cymru, US)

TLP:GREEN
 US NL

Operational Intelligence Starts Here: Structuring Threat Actors & Tools in MISP for AI-Driven Defense

John Fokker (Trellix, US); Mo Cashman (Trellix, NL)

TLP:GREEN
 IL

From Discovery to Fix: What 10,000 Open Source Projects Reveal About CVE Remediation

Mor Weinberger (IL)

TLP:CLEAR
12:25 – 14:00

Lunch Break

TLP:CLEAR
14:00 – 14:35
 JP

CSIRTeaming: Forging Resilient Incident Management Teams with Psychological Safety and High Reliability Principles

Yoshiki Sugiura (NTT-CERT, JP)

TLP:CLEAR
 US

From CVD to Secure Releases: Automating Security from Source to Releases

Vijay Sarvepalli (Software Engineering Institute, US)

TLP:CLEAR
 US

The Art of the Notification

Daniel Gordon (US)

TLP:GREEN
14:40 – 15:25
 US

Panel: From Takedown to Touchpoint: An Inside Look at the Data-sharing Pipeline in the Victim Notification Processfor International Law Enforcement Cybercrime Disruption Operations

Tod Eberle (The Shadowserver Foundation, US)

TLP:CLEAR
 US

A Researcher Centric Approach to Coordinated Vulnerability Disclosure

Patrick Garrity (VulnCheck, US)

TLP:CLEAR
 FI

Benchmarking Your Constituency: A Practical Framework for CERTs with Results from Academic Sector

Juha Haaga (Arctic Security, FI)

TLP:CLEAR
15:25 – 15:55

Networking Break

TLP:CLEAR
16:00 – 17:15

Annual General Meeting (AGM)

TLP:CLEAR
17:30 – 19:30

Sponsor Showcase Reception

TLP:CLEAR

Tuesday, June 16th

Plenary (Plaza ABC)Track 1 (Plaza ABC)Track 2 (Plaza E)Track 3 (Plaza F)Social Activity
09:00 – 09:35
 TW

Hack Your Board's Mindset: Closing the Strategy-Operations Gap via Board Game Simulations

Tien-Chih Lin, Yi-Hsien Chen (CyCraft Technology, TW); Wei-Chia Kao (CyCraft Japan, TW)

TLP:CLEAR
 GR LT

Standing Strong in a Cyber Crisis: The Assurance Every Organization Must Have

Andrea Dufkova (ENISA, GR); Vilius Benetis (NRD Cyber Security, LT)

TLP:GREEN
 TW

Short Videos, Crypto, and Crime: Inside the Chinese-Speaking Malware Ecosystem

Linda Kuo, Li-An Huang (TeamT5, TW)

TLP:GREEN
09:40 – 10:15
 NZ

Threats are Climbing - How to Elevate Your Tabletop Exercises to Meet Them

Tim Myers (NCSC NZ, NZ)

TLP:GREEN
 US

Stripe's Insider Threat Common Controls Framework

Shauna Stoeger, Josh Covey (Stripe, US)

TLP:GREEN

09:40 – 10:25

 CA

Syndicate: The Life of a Ransomware Affiliate

Tammy Harper (Flare, CA)

TLP:GREEN

09:40 – 10:25

10:25 – 10:55

Networking Break

TLP:CLEAR
10:55 – 11:40
 US

How EPSS Is Wrong and Useful at the Same Time

Jay Jacobs (Empirical Security, US)

TLP:CLEAR
 PL NL

From Planning to Impact: Lessons from Poland’s National Cybersecurity Exercises with a Dedicated TTX Platform

Marcin Fronczak (Cybersecurity Foundation, PL); Miroslaw Maj (Open CSIRT Foundation, NL)

TLP:CLEAR
 TH

Understanding Scammer Threats: Detection Strategies Aligned with Thailand’s Cybersecurity Act 2562

(Major General) Teerawut Wittayakorn (NCSA, TH); Saichon Saelee (NCSA, Director of Cyber Coordination office)

TLP:CLEAR
11:45 – 12:20
 US

The SOC Of The Future… The Future Is Now

Carson Zimmerman (Microsoft, US)

TLP:CLEAR
 AL

From Breach to Benchmark Albania’s Cybersecurity Turning Point

Saimir Kapllani (National Cyber Security Authority, AL)

TLP:AMBER
 DE

Sliding into the Enemy’s DMs: Detecting SaaS-Backed Malware C2

Patrick Staubmann (VMRay GmbH, DE)

TLP:AMBER
12:20 – 13:45

Lunch Break

TLP:CLEAR
13:45 – 14:30
 US

The Vulnerability Identity Crisis

Art Manion (Tharros Labs, US); Jay Jacobs (Empirical Security, US)

TLP:CLEAR
 JP

Climbing Toward the Summit of Defense: Practical Methods for Strengthening CSIRT Organizations and Specialists

Aya Ohara (LY Corporation CSIRT, JP); Kaori Fukuda (DNV Business Assurance Japan, JP); Ikuya Hayashi (NTT-CERT, JP)

TLP:CLEAR
 PL

How to Detect and Block over 200 Thousands of Investment Scam Domains

Krzysztof Zając (CERT PL, PL)

TLP:AMBER
14:35 – 15:10
 FR IT

Tips and Tricks to Run a CSIRT in Low-income and Fragile Contexts

Ghislain de Salins (World Bank, FR); Giacomo Assenza (World Bank, IT)

TLP:CLEAR

14:35 – 15:20

 US

You Need Some Neurosparkle In Your SOC

Carson Zimmerman (Microsoft, US); Megan Roddie-Fonesca (Datadog, US)

TLP:CLEAR

14:35 – 15:20

 JP

Itinerary to Defeat Yet Another Beacon Implementation

Naoki Takayama (Internet Initiative Japan Inc., JP)

TLP:CLEAR
15:25 – 16:00
 US

Threat-INFORM to Optimize Security Operations

Jon Baker (AttackIQ, US)

TLP:CLEAR
 NL

Building a Regional ISAC for West Africa that Works: Governance, Tools and Community Maturity

Don Stikvoort, Miroslaw Maj (Open CSIRT Foundation, NL)

TLP:CLEAR
 US

Malicious Code-signing at Scale: How Attackers Impersonate Thousands of Real Businesses and What to Do About It

Aaron Walton (Expel, US)

TLP:CLEAR
16:00 – 16:30

Networking Break

TLP:CLEAR
16:30 – 17:50

Lightning Talks

TLP:CLEAR

Wednesday, June 17th

Plenary (Plaza ABC)Track 1 (Plaza ABC)Track 2 (Plaza E)Track 3 (Plaza F)Social Activity
09:00 – 09:35
 JP

Bringing Chronological Context to Disparate Artifacts: Accelerating Digital Forensics

Junya Hiwatari, Yuta Kuwahara (NTT Security Japan K.K., JP)

TLP:CLEAR
 US

DPRK Fake Applicants in Your Recruitment Funnel? How to Catch Them All

Adam Messer (Datadog, US)

TLP:CLEAR
 NO

Who Did It? Getting Started with Threat Actor Profiling

Marthe Råheim Rogndokken (Sopra Steria, NO)

TLP:CLEAR
09:40 – 10:25
 US

Peak Performance Under Pressure: Building Cross-Functional Resilience in Incident Response

Merisa Lee (Okta (former), US); Brooke Pearson (Google Chrome (former), US); Div Joshi (Cisco Meraki, US); Melanie Ensign (Discernible, US)

TLP:CLEAR
 US

After the Storm: Incident Response Perspectives from a Cyber Insurance Broker

Matt Berninger, Martin Leicht (Marsh, US)

TLP:CLEAR
 CA

Introducing StealerLens: An LLM-Powered Forensics Microscope to Accelerate InfoStealer Investigations

Olivier Bilodeau (Flare, CA)

TLP:CLEAR
10:25 – 10:55

Networking Break

TLP:CLEAR
10:55 – 11:30
 ES

Eiffel: A Tool to Oversee Incident Response From the Heights

Oscar Salvador, Juan Gonzalez (Cybersecurity Agency of Catalonia, ES)

TLP:CLEAR
 US

From Dork to Diplomat: Communicating Coherently for Vulnerability & Incident Response

Tom Millar, Rina Rakipi (CISA, US)

TLP:CLEAR
 GR

Ghost Networks and the Imitation Game

Antonis Terefos (Check Point Software Technologies, GR)

TLP:CLEAR
11:35 – 12:10
 RS

MISP-GPT: Open Source Large Language Models System

Marko Krstić (Assistant Professor at Faculty of Civil Engineering, University of Belgrade., RS)

TLP:CLEAR

11:35 – 12:20

 GB

Battle-Tested Incident Recovery: Lessons from the Front Lines

Jack Hughes (Unit 42 by Palo Alto Networks, GB)

TLP:CLEAR

11:35 – 12:20

 US

nx Compromise - AI as an Attack Vector

Olivia Brown (Socket, US)

TLP:CLEAR
12:20 – 13:30

Lunch Break

TLP:CLEAR
13:30 – 14:15
 US

Weight Sparsity Meets Threat Modeling: A New Framework for AI Security

Eric Zielinski (Jumpmind, US)

TLP:CLEAR
 US GB

Tabletop Lessons from 3 Decades and 2 Continents

Kenneth Van Wyk (KRvW Associates, LLC, US); Elliott Atkins (Exercise3 Limited, GB)

TLP:CLEAR
 DE

Threat From The Inside: eBPF Used by Malware

Geri Revay (Fortinet, DE)

TLP:CLEAR
14:20 – 14:55
 TW

Shattering the Compliance Illusion: Operationalizing Adaptive Multi-Turn Red-Teaming for Enterprise AI Assurance

Kuan-Lun Liao (CyCraft Technology, TW); Cheng-Lin Yang (CyCraft AI Lab, Taiwan, TW)

TLP:GREEN
 AU

Arcana: A Unified Framework for Incident Response Documentation and Knowledge Management

Vishal Thakur (Ankura, AU); Jayden Vo (Atlassian, AU)

TLP:CLEAR
 AT

Defeating Node.js Malware through API Tracing

Sven Rath (Check Point Research, AT)

TLP:CLEAR
14:55 – 15:30

Networking Break

TLP:CLEAR
15:30 – 16:30

Keynote: Cyber Defense: Making the Difference - Getting to Why, What and How

TLP:CLEAR
19:00 – 22:00

Conference Social

TLP:CLEAR

Thursday, June 18th

Plenary (Plaza ABC)Track 1 (Plaza ABC)Track 2 (Plaza E)Track 3 (Plaza F)Social Activity
09:00 – 09:35

SIG Updates

TLP:CLEAR

09:00 – 10:25

 US

From Logs to Living Timelines: AI-Assisted Incident Response in Hybrid Cloud Using OCSF

Dr. Stephen Coston, Willam Rodriguez (Centene, US)

TLP:CLEAR
 SE

Cyber Security Specialist/Incident Handler

Mathias Persson (CERT-SE, SE)

TLP:CLEAR
09:40 – 10:25
 CA

How Attackers Reconstruct You: Measuring Identity Exposure Across Four Attack Surfaces

Andreanne Bergeron (Flare and Université de Montréal, CA)

TLP:CLEAR
09:45 – 10:20
 US

The Clock is Ticking: CRA Compliance at Scale

Lisa Bradley (Dell Technologies, US); Sarah Evans (Dell, US)

TLP:CLEAR
10:25 – 10:55

Networking Break

TLP:CLEAR
10:55 – 11:30
 KR

On the Frontline: Inside Adversaries' Infrastructure Before the First Shot Is Fired

Seulgi Lee, Chanwoong Hwang, Byeongjae Kim, Kwangyeon Kim (KrCERT/CC, KR)

TLP:RED
 JP TW

PSIRT 2.0 in Action: Implementing Agentic AI Architecture for Autonomous Operations

Hikohiro Lin, Kosuke Ito (GMO Cybersecurity by IERAE, Inc., JP); Ken Lee (Ken Associates LLC, TW)

TLP:AMBER
 US

Tackling Bulletproof Hosting: Cutting off the Facilitators

Matthew Stith (Spamhaus, US)

TLP:AMBER
11:35 – 12:10
 US

Proactive Defense and Collective ISAC Collaboration within Critical Infrastructure

Zach Nelson, Ethan Muntz (Health-ISAC, US)

TLP:GREEN
 JP

Technical Recovery Plan (TRP) Exercise in a Cloud-Native Environment: Practical Lessons from a Ransomware Scenario

Masanori Morino (KINTO Technologies Corporation, JP)

TLP:CLEAR
 US

Cl0p^_- Til You Drop - Analysis of 6 Years of Campaigns

Eli Woodward (Team Cymru, US)

TLP:GREEN
12:10 – 13:30

Lunch Break

TLP:CLEAR
13:30 – 14:15
 JP

The Dark Side of Autonomy: Exploiting DFIR Agents Through Adversarial Manipulation

Yusuke Nakajima (NTTDATA, JP)

TLP:AMBER
 US

Protecting Customers Through Smarter OSS Management

Lisa Bradley, Patricia Tarro (Dell Technologies, US)

TLP:CLEAR
 BR

Beyond RAG: Lessons from Experiment with Agentic Pivotingfor Security Triage

Romulo Rocha (BR)

TLP:CLEAR
14:20 – 15:05
 US

Critical SaaS, Critical Blind Spots: A Detection Engineer's Field Guide to SaaS Attacks

Julie Agnes Sparks, Greg Foss (Datadog, US)

TLP:CLEAR
 US

Leveraging AI to Review and Strengthen Your Incident Response Plan: A Proof of Concept

John Hollenberger (Fortinet, US)

TLP:CLEAR
 TW

One Poisoned Artifact Can Steer Your AI: How Robust Are Your LLM-Assisted Security Workflows?

Cheng-Lin Yang (CyCraft AI Lab, Taiwan, TW); Yen-Shan (Lily) Chen (CyCraft AI Lab, TW)

TLP:CLEAR
15:05 – 15:40
 NL

Your Cloud, Their Code: The Supply Chain Attack You Didn't See Coming

Soufian El Yadmani (Modat, NL)

TLP:AMBER
 JP

Proactive EDR Against Adaptive Evasion: Countering Self‑Modifying Agentic Malware

Hiroaki Toyota (LAC Co., Ltd., JP)

TLP:CLEAR
 US IN

CoAnalyst: An AI-Driven Framework for Enhanced SOC Triage

Logan Wilkins (Cisco, US); Avinash Kumar (Cisco, IN)

TLP:CLEAR
15:40 – 16:10

Networking Break

TLP:CLEAR
16:10 – 17:30

Lightning Talks

TLP:CLEAR

Friday, June 19th

Plenary (Plaza ABC)Track 1 (Plaza ABC)Track 2 (Plaza E)Track 3 (Plaza F)Social Activity
08:30 – 09:05
 TW

The EU's Cybersecurity Resilience Act (CRA) has Begun – How Can Manufacturers Confidently Address their Obligations and Security Requirements?

Mars Cheng (TXOne Networks Inc., TW)

TLP:CLEAR
 US

Trading Privacy for Convenience: Leading Through Example in a Hyper-Connected Era

Krassimir Tzvetanov (Purdue University, US)

TLP:CLEAR
 NL

Agentic LLMs for JavaScript Malware Deobfuscation: From Obfuscated Trojans to Evidence Based Reports

Rustam Mirkasymov (Independent Researcher, NL)

TLP:CLEAR
09:10 – 09:55
 US

Chaos Stack: Designing Layered Tabletop Exercises for Complex Crisis Simulation

John Hollenberger (Fortinet, US)

TLP:CLEAR
 IN

"Malice in the Modules" - How NPM Became a Supply-Chain Battleground?

Harish Shankar (Schneider Electric, IN)

TLP:CLEAR
 CA

Seeing Through the Fog: Interpreting Entra ID Signals During AiTM Attacks

Pierre Audonnet (Microsoft, CA)

TLP:CLEAR
10:00 – 10:45
 JP

Attack or Noise?: Tracking and Evaluating the Impact of Internet-Wide Survey Scanners

Yukiko Endo, Masato Jingu, Masaki Kubo (NICT, JP)

TLP:CLEAR
 AR

Practical AWS Antiforensics

Santiago Abastante (Solidarity Labs, AR)

TLP:GREEN
 PL

From Internet Noise to Cyber Intelligence: Lessons from a Network Telescope

Jan Adamski, Marcin Rytel (NASK - National Research Institute, PL); Paweł Pawliński (CERT.PL / NASK - National Research Institute, PL)

TLP:GREEN
10:45 – 11:00

Networking Break

TLP:CLEAR
11:00 – 11:45
 AU NL

The PR3TACK Initiative: Building the World’s First Preemptive Tactics & Countermeasures Knowledgebase

Vishal Thakur (Ankura, AU); Niels Heijmans (Atlassian, NL); David Wearing (Atlassian, AU)

TLP:CLEAR
 CA

Cyber Deception 2.0: Adaptive Honeynets and Canary Intelligence in Production

Peter Morin (PwC, CA)

TLP:CLEAR
 IL

The AI Assistant’s Betrayal: One-Click for AI to Turn into the Perfect Insider

Dolev Taler, Mark Vaitsman (Varonis, IL)

TLP:CLEAR
11:50 – 12:25
 US

Fighting Back Without Hacking Back: Why “Risk Management” Isn’t Enough In The Era of Cyber War

Tom Millar (CISA, US); Adam Shostack (Shostack + Associates, US)

TLP:CLEAR
 US

Dark Silicon: Unmasking GPU Threats in the Age of AI

Sneha Rangari (Visa, US)

TLP:CLEAR

Beyond Manual Hunting: Building an Autonomous Analyst with RAG, MCP Plugins and Evidence-Based Reasoning

Matheus Bezerra, Frank Vieira (Apura Cyber Intelligence S/A)

TLP:CLEAR
12:25 – 12:40

Networking Break

TLP:CLEAR
12:40 – 13:40

Closing Remarks

13:40 – 14:40

Lunch Break

TLP:CLEAR
  •  USTLP:CLEAR

    A Researcher Centric Approach to Coordinated Vulnerability Disclosure

    Patrick Garrity is a security researcher at VulnCheck where he focuses on vulnerabilities, vulnerability exploitation and threat actors.

    Coordinated Vulnerability Disclosure (CVD) is meant to create a predictable process for researchers and vendors to work together, yet researchers often bear the majority of the operational burden. Unresponsive suppliers, unclear disclosure channels, and inefficient communication workflows slow remediation and discourage future reporting.

    This session introduces a researcher‑centric approach to CVD that shifts the operational load away from researchers and onto a dedicated coordination team. By validating findings, identifying the correct supplier, establishing communication channels, and managing timelines, this model allows researchers to focus on what they do best — finding vulnerabilities.

    Attendees will learn how this approach differs from bug bounty programs, what patterns consistently improve vendor engagement, and what pitfalls to avoid when handling disclosures at scale. Whether you are a researcher, vendor, or PSIRT, you will leave with practical strategies to make CVD more predictable, efficient, and sustainable.

    June 15, 2026 14:40-15:25

  •  USTLP:CLEAR

    After the Storm: Incident Response Perspectives from a Cyber Insurance Broker

    Matt Berninger is a Senior VP in the Marsh McLennan Cyber Risk Intelligence Center. In this role he performs cybersecurity research, builds predictive cyber models, and advises customers on cybersecurity strategies. During his 15+ years in cybersecurity he has led teams in Incident Response, Detection and Response, and Data Science in industry, government, and defense. He lives in Denver and enjoys the outdoors, dogs, and math.

    Martin (Marty) Leicht is Marsh’s Cyber Claims Transformation Leader and is responsible for executing the firm’s cyber claims advocacy strategy in the United States. Marty assists clients throughout the entire cyber event response process, providing expert claims advocacy to achieve optimal outcomes. Additionally, he serves as a senior advisor for large commercial clients across the country, offering valuable insights on risk identification and complex risk transfer for professional liability and cyber exposures.

    Cybersecurity incident response often centers on technical investigation and remediation, but critical aspects of incident management lie beyond the digital forensics and incident response (DFIR) domain. Drawing on real‑world experience as an insurance broker specializing in cyber risk, this talk explores the often‑overlooked operational and strategic elements that can reduce financial losses, streamline response and recovery efforts, and aid successful insurance claim submission.

    Attendees will gain practical insights into the cyber insurance ecosystem, managing communication and documentation, coordinating with insurers, and understanding policy nuances. Through real case studies, this session highlights how aligning incident response with insurance considerations improves organizational resilience and financial outcomes. This presentation is designed for incident response professionals seeking to understand how cyber insurance may interact with existing incident workflows.

    June 17, 2026 09:40-10:25

  •  NLTLP:CLEAR

    Agentic LLMs for JavaScript Malware Deobfuscation: From Obfuscated Trojans to Evidence Based Reports

    Rustam is a cyber threat intelligence expert with over nine years of experience in tracking APT and cybercrime groups, leading complex investigations, and assisting law enforcement in identifying threat actors. He is the author of reports and blog posts on Cobalt, Silence, RedCurl, OPERA1ER, and Oktapus (Scattered Spider).

    Modern attacks increasingly rely on heavily obfuscated JavaScript droppers and trojans, from NodeJS stealers and WSH droppers to proxy C2 scripts on compromised websites. This makes it hard for incident responders to extract reliable indicators without executing untrusted code and spending days manually deobfuscating the payload. Applying LLMs directly to such samples often leads to hallucinations or missed functionality that is hard to validate.

    In this talk, I present an agentic LLM‑assisted framework built on staged Babel transforms that statically deobfuscates JavaScript malware and turns it into structured, incident‑ready intelligence. The LLM inspects the sample, matches it against a catalog of safe, single‑purpose transforms, and incrementally assembles the deobfuscation pipeline instead of editing code directly.

    I will walk through real incident samples, showing how this approach transforms heavily obfuscated scripts into readable code while preserving an auditable chain from original script to final analysis and yielding consistent, reproducible, evidence‑grounded results. Attendees will leave with a reusable methodology and patterns they can adapt in their own environments to accelerate malware triage with the help of agentic LLMs constrained by static analysis.

    June 19, 2026 08:30-09:05

  •  AUTLP:CLEAR

    Arcana: A Unified Framework for Incident Response Documentation and Knowledge Management

    Vishal Thakur is a Regional Manager of CSIRT operations and security researcher based in Sydney, Australia. With over 13 years of experience leading incident response and cyber defense teams across Atlassian, Salesforce, TikTok USDS, Commonwealth Bank of Australia, he specializes in large-scale threat detection, malware analysis, and proactive cyber operations.

    Vishal is the Founder of HackSydney and BSides Sydney, and a frequent speaker and trainer at FIRST, DEF CON, Black Hat, SANS conferences. His current research focuses on anticipatory threat modeling, AI-enabled adversarial simulation, and preemptive defense frameworks. He is the creator of PR3TACK, a next-generation threat modeling framework, and Warhead, a research project for offensive techniques that can be used for red-teaming operations. Vishal has also actively worked in the research field of cognitive malware and has published papers on that subject in academic and institutional journals.

    Jayden Vo is a Senior Security Incident Response Analyst at Atlassian, where he has spent the past five years responding to a wide variety of incidents and threat actors. Outside of responding to security incidents, Jayden dedicates time for proactive threat hunting and tracking threat actors targeting Atlassian. He has previously shared his threat hunting methodologies and threat actor research in various TLP:RED environments.

    The Arcana Framework is an open‑source initiative designed to standardize and elevate the way Incident Response teams document, share, and operationalize security knowledge. Built and maintained by the Atlassian Incident Response team, Arcana structures IR knowledge across Playbooks, Runbooks, SOPs, and Knowledge Base Articles, providing immediate, customizable templates ready for operational use.

    The framework will be released publicly at the FIRST Conference and hosted on Atlassian’s official GitHub repository, where the community can contribute their own documents and receive full credit. Arcana aims to close the gap between documentation theory and field application—bridging best practices, automation readiness, and real‑world response needs.

    June 17, 2026 14:20-14:55

  •  JPTLP:CLEAR

    Attack or Noise?: Tracking and Evaluating the Impact of Internet-Wide Survey Scanners

    Yukiko Endo is a Senior Technical Researcher at the Cybersecurity Laboratory, National Institute of Information and Communications Technology (NICT) in Japan, where she actively works on darknet monitoring, internet-wide scanning analysis, and threat intelligence research. Before joining NICT, she worked in both Japan and Germany on research and product development in the field of Identity and Access Management. Her broader interests include IoT security, Internet-wide measurement, and the collection and analysis of threat intelligence data.

    Masato Jingu is an analyst with the Analysis Team at the Cybersecurity Laboratory of the National Institute of Information and Communications Technology (NICT). He also serves as a member of NICT-CSIRT, where he is primarily responsible for the analysis of a livenet. Prior to joining NICT, he held positions in the private sector, where he was engaged in cybersecurity incident response as well as research and development activities.

    Masaki Kubo leads the analysis team at the Cybersecurity Research Laboratory of NICT. His responsibilities extend to both the internal security operation and a darknet monitoring research project known as 'NICTER'. Prior to joining NICT, He was a manager of JPCERT coordination center, focusing on the analysis and coordination of vulnerabilities and advocating for a secure coding initiative.

    Security teams routinely waste time investigating benign scans from services such as Censys, Shodan, ZoomEye, and other survey‑scanners. However, there has been no comprehensive, openly available source that identifies which organizations are scanning the global IPv4 space and from which IP addresses.

    We operate a large darknet monitoring network and developed a real‑time methodology to classify survey‑scanner traffic and distinguish it from malicious activity. Using this approach, we have identified more than 75 active scanning organizations worldwide.

    Our team publishes a quarterly, publicly accessible list of survey‑scanner IP addresses and organizations on GitHub, enabling SOC analysts, incident responders, and network defenders to reduce false investigations and focus on actual threats. We also demonstrate how we integrate this list into our own security operations and quantify its operational impact.

    Because many survey‑scanners provide ASM‑related commercial services based on their scanning activity, we additionally highlight behavioral differences among scanners to help practitioners better interpret and validate ASM outputs. Drawing on years of large‑scale darknet monitoring and continuous IP intelligence publishing, we provide practical insights that the community can immediately use to improve alert triage and threat‑hunting accuracy.

    June 19, 2026 10:00-10:45

  •  GBTLP:CLEAR

    Battle-Tested Incident Recovery: Lessons from the Front Lines

    Bringing over a decade of experience leading world-class incident response teams, I've had a front-row seat to the ever-evolving landscape of cyber threats. My passion lies in transforming that experience into actionable strategies that empower organisations to not only withstand attacks but emerge stronger.

    My expertise spans the full spectrum of incident response, from dissecting malware to orchestrating global investigations involving forensic experts, legal teams, and crisis communication specialists. I thrive on building and leading high-performing teams, fostering a collaborative environment where technical excellence meets strategic thinking.

    With 86% of attacks resulting in business impact, there is no one‑size‑fits‑all path to recovery. This session moves beyond theory to present battle‑tested strategies derived from Unit 42’s front‑line experience. We will dissect the critical decision‑making process between Brownfield recovery (remediating the existing estate) and Greenfield recovery (building fresh), helping you determine the right approach for your specific crisis.

    Central to this approach is the Sheep Dipping methodology, a rigorous process to sanitise and verify assets. We will demonstrate how to apply this technique to secure your Minimum Viable Business, ensuring that whether you repair or rebuild, you emerge from the incident resilient and response‑ready.

    June 17, 2026 11:35-12:20

  •  FITLP:CLEAR

    Benchmarking Your Constituency: A Practical Framework for CERTs with Results from Academic Sector

    Juha leads Arctic Security's CSIRT Development Program, helping new national and sectoral CSIRT teams build early warning systems and navigate common obstacles. As Head of Customer and Market Engagement, he also leads research on large-scale cybersecurity data analysis. His 15 years working with national CSIRTs have focused on making threat data actionable, from production through consumption and distribution, and benchmarking. His background in software engineering, solutions architecture, and product management informs his practical approach to security metrics.

    How do CERTs benchmark cybersecurity posture when available data is noisy, unverified, or incomparable? This presentation introduces a methodology for systematic security posture analysis using a selected set of verified cyber issue data, demonstrated across 8,000 categorized academic institutions in the United States and Europe.

    We classify organizations by type, size, country, and public‑facing asset profile, then categorize issues into public exposure, known vulnerabilities, suspected compromise, and potential threats. Cross‑border findings reveal how security posture correlates with regulatory environments, governance models, and organizational resources—challenging common assumptions and informing priority‑setting for resource‑constrained organizations.

    Education faces the highest attack rates of any sector yet lacks systematic comparative analysis. This research fills that gap while developing a transferable framework. CERTs can adapt this methodology for healthcare, government, finance, or any constituency they serve.

    Attendees will gain a replicable benchmarking framework, a review of concrete cross‑border findings, and practical guidance for implementing sector‑wide posture analysis.

    June 15, 2026 14:40-15:25

  • TLP:CLEAR

    Beyond Manual Hunting: Building an Autonomous Analyst with RAG, MCP Plugins and Evidence-Based Reasoning

    Matheus Fernandes Bezerra – Software Engineer, Apura Cyber Intelligence

    Matheus Fernandes Bezerra – Software Engineer, Apura Cyber IntelligenceMatheus Fernandes Bezerra is a Software Engineer at Apura Cyber Intelligence. He holds a Bachelor’s degree in Computer Science from the Instituto Federal de Brasília and is currently pursuing a Master’s degree in Machine Learning at the University of Brasília. Over the past five years at Apura, he has worked across OSINT analysis, cybersecurity operations, and backend engineering.

    Matheus Fernandes Bezerra – Software Engineer, Apura Cyber IntelligenceMatheus Fernandes Bezerra is a Software Engineer at Apura Cyber Intelligence. He holds a Bachelor’s degree in Computer Science from the Instituto Federal de Brasília and is currently pursuing a Master’s degree in Machine Learning at the University of Brasília. Over the past five years at Apura, he has worked across OSINT analysis, cybersecurity operations, and backend engineering.Matheus specializes in building scalable security tools, data pipelines, and analytical dashboards that support threat detection, leak monitoring, and exposure intelligence workflows. His work bridges practical incident-response needs with advanced data processing and automation, contributing directly to Apura’s threat intelligence platforms and operational capabilities.

    Frank Vieira is the Head of Research and Development at Apura Cyber Intelligence, where he leads the engineering efforts behind the company’s core threat intelligence and exposure monitoring platforms. With more than a decade of experience in software engineering and cybersecurity, he has worked across major Brazilian security companies, including PSafe and GAS Tecnologia, building large-scale systems for threat detection and analysis.

    Frank Vieira is the Head of Research and Development at Apura Cyber Intelligence, where he leads the engineering efforts behind the company’s core threat intelligence and exposure monitoring platforms. With more than a decade of experience in software engineering and cybersecurity, he has worked across major Brazilian security companies, including PSafe and GAS Tecnologia, building large-scale systems for threat detection and analysis.At Apura, Frank is responsible for the architecture and development of platforms such as BTTNg and BTTLi, driving innovation in data processing, automation, and security intelligence workflows. His work combines deep technical expertise with a strong focus on practical, operational impact, contributing significantly to the maturity and effectiveness of Apura’s intelligence ecosystem.

    Open-source intelligence (OSINT) provides an enormous volume of data from freely accessible sources such as social networks, public channels, forums, ransomware blogs, and paste services. While openly available, this data is highly unstructured, duplicated, and noisy, making deep analysis difficult at scale. These factors make it hard for professionals to navigate the dataset and extract meaningful insights. This work presents a practical, incident response oriented methodology for transforming raw OSINT into structured, actionable context using open tooling, Retrieval-Augmented Generation (RAG), and agentic LLM workflows.

    Public events such as: text posts, images, documents, or arbitrary files, are processed through a reproducible pipeline that extracts meaningful features such as identifiers, domain names, URLs, actor names, name of groups, keywords, and contextual metadata. During processing, when new URLs or infrastructure indicators are discovered, an integrated lightweight crawler service collects auxiliary context such as OCR, full screenshot, content and basic network information. All normalized fields and enriched data are indexed in an Elasticsearch stack engineered for high-volume retrieval and efficient filtering across multi-billion-record datasets.

    An agentic LLM operates as a structured reasoning layer above this dataset. Rather than functioning as a detector, the model iteratively generates DSL queries, interprets retrieved events, identifies relevant entities, and proposes investigation pivots in a manner consistent with Incident Response workflows. Its outputs are auditable, deterministic in structure with a "permalink" for real event, enabling reproducible analytical steps without reliance on proprietary data.

    We present empirical observations from evaluating the accuracy, stability, and failure modes of LLM-generated queries and assessments. The talk focuses on the engineering techniques such as: data normalization, field extraction, RAG architecture, iterative agent design and scaling to work with multiple billions events. It demonstrates how these components together reduce analyst workload and accelerate incident scoping and triage. The methodology is fully reproducible using open-source components and can be adopted or adapted by organizations seeking practical, AI-assisted IR capabilities.

    June 19, 2026 11:50-12:25

  •  BRTLP:CLEAR

    Beyond RAG: Lessons from Experiment with Agentic Pivotingfor Security Triage

    With over 15 years of experience, Romulo Rocha is an Information Security leader specializing in building and scaling high-performance SOCs for mission-critical environments, including the Rio 2016 Olympic Games and Nubank. An expert in security automation, he focuses on evolving incident response beyond traditional SOAR using innovative architectures. His current research centers on evaluating Generative AI and autonomous agents within SOC pipelines to tackle alert fatigue and streamline complex triage. An active contributor to FIRST and the international security community, he is dedicated to sharing open, reproducible methodologies that advance the collective maturity of cyber defense.

    Can a General Context LLM replace the intuition of a Tier 1 Analyst without expensive fine‑tuning? While vendors promise “AI‑driven SOCs,” this talk reveals the engineering reality of building an Autonomous Triage Agent from scratch using LangGraph, ChromaDB, and TheHive.

    We present the design and execution of a controlled experiment: an agent tasked with identifying hidden threat campaigns buried inside a “Golden Dataset” of synthetic alerts. The session explores the architectural limitations of standard Vector Search — which often groups alerts by syntax rather than causality — and introduces “Agentic Pivoting,” a logic flow that allows the AI to autonomously investigate entities across time.

    Attendees will leave with a blueprint for “Narrative‑Driven Triage,” a breakdown of the logic required to bridge the “Vector Gap,” some insights from an operational standpoint and applicability in real‑world scenarios, and the full source code to replicate the experiment.

    June 18, 2026 13:30-14:15

  •  JPTLP:CLEAR

    Bringing Chronological Context to Disparate Artifacts: Accelerating Digital Forensics

    Junya Hiwatari is a member of NTT-CERT and a GCFE holder. Since 2020, he has worked on digital forensics and incident response, as well as R&D on new attack detection technologies using machine learning. He is also a member of "The Institute of Digital Forensics" which promotes digital forensics in Japan. In the community, he supports collaboration among young members and contributes to developing technical documentation on cloud forensics for IaaS services, including GCP and AWS.

    Yuta Kuwahara is a chief at NTT-CERT, leading the forensic team since 2025. His main expertise is in digital forensics and incident response. Previously, he worked at NTT-East, where he led projects on perimeter security and C2 server detection through network flow analysis. He also contributes to IT education in Japan by organizing the "ICT Troubleshooting Contest (ICTSC)" and actively participates in CTF competitions.

    In digital forensics and incident response (DFIR), analysts must not only examine various artifacts but also trace their chronological relationships to understand the full scope of an incident. However, because of the complex interrelationships between artifacts, traditional manual analysis becomes increasingly time‑consuming.

    To address this problem, we developed Attack Flow Finder (AFF) to automate and accelerate digital forensic investigations. AFF assists analysts by investigating and organizing artifacts according to user‑defined detection rules, called Ordered‑Sigma, which describe the intended sequence of events.

    In this presentation, we will share the implementation ideas and use cases of AFF, focusing on:

    1. designing “Ordered‑Sigma” rules;
    2. implementing an algorithm to efficiently process chronological relationships;
    3. comparison with existing tools;
    4. analyzing endpoints infected with various cyber threats;
    5. indicating response improvements through stakeholder use.

    Through these points, we propose a new approach for accelerating digital forensics and discuss future challenges.

    June 17, 2026 09:00-09:35

  •  NLTLP:CLEAR

    Building a Regional ISAC for West Africa that Works: Governance, Tools and Community Maturity

    Don Stikvoort - Stichting Open CSIRT Foundation, chairman of the board.

    Don Stikvoort is founder of the companies “S-CURE” and “Cross Your Limits”. S-CURE offers senior consultancy in the area of cyber security – specialising in CSIRT matters. Cross Your Limits coaches and trains in the human area. Based in Europe, Don’s client base is global.

    After his MSc degree in Physics, he became Infantry platoon commander in the Dutch Army. In 1988 he joined the Dutch national research network SURFnet. In that capacity he was among the pioneers who together created the European Internet since November 1989. He recognised “security” as a future concern in 1991, and was chair of the 2nd CSIRT in Europe (now SURFcert) from 1992-8, and FIRST member since 1992. Today Don is a FIRST Liaison Member. Together with Klaus-Peter Kossakowski he initiated and built the closer cooperation of European CSIRTs starting in 1993 – this led to the emergence of TF-CSIRT in 2000. In 1998 he finished the "Handbook for Computer Security Incident Response Teams (CSIRTs)" together with Kossakowski and Moira J. West-Brown of CERT/CC. He was active in the IETF and RIPE (cocreator of the IRT-object). Don chaired the Program Committee for the 1999 FIRST conference in Brisbane, Australia, and kick-started the international FIRST Secretariat in the same year. From 2001-2011 his company ran TF-CSIRT’s Trusted Introducer service. He wrote and taught several training modules for the CSIRT community.

    In 1998 Don started his first company. A first assignment was to build the network connecting over 10,000 schools in The Netherlands. Many CSIRTs were created with his help and guidance, among which the Dutch national team (NCSC-NL). Second opinions, audits and maturity assessments in this field have become a specialty – and in that capacity Don developed SIM3 in 2008, the maturity model for CSIRTs which is used worldwide today for maturity assessments and certifications. SIM3 has is now under the wings of the “Open CSIRT Foundation” (OCF). Don was one of the founders in 2016 and now chairs its board.

    Starting in 1999, Don was certified in NLP, Time Line Therapy®, Coaching and Hypnotherapy, and brought that under the wing of “Cross Your Limits”, which portfolio is life & executive coaching, and training courses in what Don likes to call “human arts”. He also trains communicators, presenters and trainers, including many in the CSIRT field. Don thrives as motivational and keynote speaker. He enjoys to share his views on how the various worlds of politics, economics, psychology and daily life, but also cyber security, all intertwine and relate – and how deeper understanding and a better ability to express ourselves, increase our ability to bring good change to self as well as the world around us. He has discussed such topics all over the world, from Rome to the Australian Outback. His goal is to challenge his audience to think out-of-the-box, and motivate them to be the difference that makes the difference, along the lines of the old African proverb: “If you think you’re too small to make a difference, try sleeping in a closed room with a mosquito”.

    Mirosław Maj (Open CSIRT Foundation, Cybersecurity Foundation) has nearly 30 years of experience in ICT security and has played a major role in shaping cybersecurity capabilities in Poland and abroad. He is the co-founder of the Open CSIRT Foundation, responsible for developing SIM3 maturity model and supporting the Trusted Introducer service certifying security teams worldwide, as well as the founder and president of the Cybersecurity Foundation and co-founder of ComCERT.PL. A former head of CERT Polska, he co created CyberBastion - a simulation and training platform powering the multi-edition CyberBastion League.

    He advised the Polish Minister of National Defence on cyberdefence development, is a member of the Polish Digitalization Council, and serves as an expert for ENISA, co-authoring numerous European cybersecurity reports. His international work includes major projects in Georgia, CIS countries and the UN, supporting the creation and maturity of national CERTs. He has organized ten editions of Cyber-EXE exercises for key sectors and national-level NIS-based testing. A regular FIRST speaker and founder of the Security Case Study conference, he also lectures on cybersecurity at several universities.

    This session presents practical, experience‑based insights from a two‑year effort to build and operationalize the ECOWAS ISAC, bringing together West African countries from Nigeria to Sénégal and Cabo Verde. It highlights how the project bridged the gap between the traditional information‑sharing mission of an ISAC and the more operational, incident‑focused functions typically associated with CSIRTs.

    The presentation shows how SIM3 was used to structure governance, roles, and capabilities, creating a clear and realistic maturity roadmap. It also demonstrates how established standards and tools—such as the FIRST CSIRT Services Framework and MISP—were adapted to define feasible services, strengthen collaboration, and enable consistent information exchange.

    Participants will also learn how table‑top exercises and cyber‑attack simulations were used to validate workflows and build trust. The session concludes with lessons learned and actionable recommendations for regions or sectors seeking to develop or mature their own ISAC communities.

    June 16, 2026 15:25-16:00

  •  USTLP:CLEAR

    Chaos Stack: Designing Layered Tabletop Exercises for Complex Crisis Simulation

    John Hollenberger is a seasoned cybersecurity consultant with over 19 years of experience helping organizations strengthen their defenses and prepare for the realities of today’s evolving threat landscape. Throughout his career, John has guided clients through complex security challenges — from building proactive security strategies to leading high-impact incident response efforts.

    As the Lead Consultant of Proactive Services at Fortinet, he works closely with organizations to enhance their readiness, resilience, and ability to respond effectively when incidents occur. John is deeply committed to educating others on the importance of preparation, collaboration, and continuous improvement in cybersecurity. He holds a range of industry certifications, including CISSP, GCIH, GWAPT, CISA, CISM, CRISC, and Security+.

    June 19, 2026 09:10-09:55

  •  USTLP:GREEN

    Cl0p^_- Til You Drop - Analysis of 6 Years of Campaigns

    Eli Woodward is a Senior Threat Intelligence Advisor with 20+ years in law enforcement and private-sector security and a Master’s in Intelligence Studies. He helped build regional cyber intel reporting at Maricopa County and spent four years with Zelle. He is active in the Phoenix security community supporting CactusCon.

    Cl0p’s 6‑year campaign of breaches has been the outcome of novel 0‑days and persistent campaigns, but they’ve been enabled by the way organizations architect data‑movement systems. For over half a decade now, Cl0p repeatedly targeted file‑transfer and middleware platforms that temporarily store the highest‑value organizational data in plaintext, operating as if these systems were Tier‑0 assets while defenders treated them as routine infrastructure utilities.

    This session presents a timeline of major Cl0p campaigns (2019–2025) and demonstrates consistent patterns in malicious infrastructure, reconnaissance, exploit selection, and target choice. We then map these behaviors to underlying architectural flaws across commonly deployed MFT and middleware systems.

    Attendees will leave with concrete design corrections—encrypting before ingestion, eliminating static staging folders, re‑classifying middleware as privilege boundaries, and building breach‑survivability into data‑movement workflows. This talk looks at structural fixes, not just IOCs, and offers practical guidance to reduce recurrence of MOVEit‑class events.

    June 18, 2026 11:35-12:10

  •  JPTLP:CLEAR

    Climbing Toward the Summit of Defense: Practical Methods for Strengthening CSIRT Organizations and Specialists

    Aya Ohara works at LY Corporation, where she is involved in CSIRT operations and incident coordination. She has been an active member of the Nippon CSIRT Association since 2017 and contributes to strengthening national CSIRT collaboration through her work on the Regional Activities Committee.

    She organizes regional workshops and online events to foster professional networking and peer learning across the community. Aya also serves as a trainer in CSIRT capacity-building programs, supporting organizational resilience and the development of future cybersecurity practitioners. Her professional interests include incident response coordination, communication within security teams, and building trusted relationships among CSIRTs.

    Kaori Fukuda is a cybersecurity consultant specializing in CSIRT/PSIRT operations, factory security, and supply chain risk management. She has extensive experience in security governance, privacy protection, and regulatory compliance, and previously led IT operations and connected-car cybersecurity initiatives at a major automotive manufacturer.

    Since 2020, Kaori has been with DNV Business Assurance Japan, where she helps organizations improve resilience and align with global cybersecurity standards. She also serves as a board member of the Nippon CSIRT Association and contributes to advancing cybersecurity maturity across the ecosystem through advisory, assessment, and training activities.

    Ikuya Hayashi is the Steering Committee Chair of the Nippon CSIRT Association and a Senior Manager responsible for CSIRT operations at NTT Group (NTT-CERT). He has more than a decade of experience designing enterprise communication systems and over 15 years of academic and practical engagement in CSIRT architecture and operations.

    He specialized in organizational theory at Meiji University’s Graduate School of Business Administration and in Business Engineering at Universiti Teknologi Malaysia. He has been actively promoting CSIRT adoption in Japan and has served as a Visiting Lecturer at Tokyo Denki University since 2015, focusing on cybersecurity workforce development. Ikuya is the author of the book CSIRT: From Planning to Operation and holds CISSP, SIM3 Auditor, and RISS certifications.

    Modern cyber threats evolve faster than many CSIRTs can adapt, creating increasing pressure on limited teams to maintain resilience. This presentation introduces a five‑year initiative designed to build adaptive, scalable collaboration within Japan’s CSIRT community. Through 57 continuous sessions involving 508 organizations and 534 practitioners, the initiative generated curated evidence on how sustained, community‑driven interaction strengthens collective defense capabilities.

    The findings reveal that the most valuable outcomes were not planned but emerged organically through monthly engagement. These include accelerated specialist development, reduced dependence on senior experts, and the formation of an “organic adaptive model” in which mutual learning and distributed support enhance both individual and organizational capacity. Simple academic models—combined with a strong focus on psychological safety—help explain why these mechanisms work and how they can be replicated.

    The session will also provide practical tools that participants can implement immediately to strengthen adaptability and collaboration within their own CSIRTs. Ultimately, this work offers actionable guidance for organizations and communities seeking to climb toward their own summit of defense and build adaptive systems for modern threats.

    June 16, 2026 13:45-14:30

  •  US INTLP:CLEAR

    CoAnalyst: An AI-Driven Framework for Enhanced SOC Triage

    Logan Wilkins is a seasoned cybersecurity leader with over 15 years of experience in the field. He currently leads a software engineering team within Cisco’s CSIRT, overseeing development programs focused on incident detection and response, data management, and security metrics. Logan holds industry-recognized certifications including CISSP, GSEC, and PMP.

    He plays an active role in the global security community as the chair of the Metrics SIG within FIRST and has served as a FIRST Candidate Sponsor for multiple groups. Before joining Cisco’s security organization, Logan gained diverse experience in e-commerce, pharmaceutical drug discovery, and education, bringing a broad perspective to his cybersecurity work. He is passionate about building meaningful relationships and collaborating across teams to achieve common goals.

    Avinash Kumar brings over 10 years of experience in security and software development, specializing in the full security operations lifecycle. He expertly manages detection content and builds applications and workflows to support event triage and incident response processes. Avinash has extensive software development skills in Python, Java, relational and graph databases, as well as experience with large language models (LLMs) and AI development.

    Passionate about addressing critical business challenges in incident detection and response, Avinash builds strong, collaborative relationships with stakeholders to ensure effective and efficient security operations. His technical expertise and commitment to operational excellence make him a key contributor to the team’s success.

    Security Operations Centers (SOCs) continue to be overwhelmed by a relentless surge in alert volume, leading to challenges such as analyst fatigue and reliance on manual, repetitive processes. These in turn result in improper verdicts, missed threats, and hindered incident response, negatively impacting the organization's security posture.

    This session introduces “CoAnalyst” – a practical, AI‑driven framework developed to streamline and enhance security incident triage and analysis. We integrate Large Language Models (LLMs) with rich historical incident data and a diverse suite of existing security tools to present effective and efficient event‑triage options.

    Our methodology empowers Tier 1 analysts to focus on higher‑level analysis and remediation rather than initial data gathering, leading to faster, more informed decisions, substantial reductions in manual effort, and improved accuracy. Attendees will gain practical, transferable insights into the architectural principles, integration strategies, and lessons learned from implementing such an AI‑assisted workflow.

    June 18, 2026 15:05-15:40

  •  USTLP:CLEAR

    Critical SaaS, Critical Blind Spots: A Detection Engineer's Field Guide to SaaS Attacks

    Julie Agnes Sparks is a security engineer specializing in threat detection, threat hunting, and incident response with over 7 years defending organizations. She is currently working under Security Research at Datadog to develop novel detections and hunting opportunities on critical SaaS applications and cloud infrastructure. She was previously on Detection & Response teams at Brex and Cloudflare. In her spare time, she focuses on community building and mentorship for those in security operations.

    Greg Foss is a seasoned cybersecurity leader with over 15 years of experience spanning threat research, security operations, and offensive security. As the Engineering Manager of Threat Detection Engineering at Datadog, he leads a team of elite threat hunters and detection engineers, developing cutting-edge defenses against sophisticated cloud-native intrusions by nation-state and criminally motivated adversaries.

    What do you know about the visibility and threats in your critical SaaS applications? Come join us to learn about what you can see, what you’re missing, and the most common attack paths we are observing in the wild.

    This technical deep‑dive talk will provide details on emerging SaaS attack trends across critical third‑party applications, such as case studies into Salesforce, GitHub, and GitLab attacks. Common behaviors include weak authentication methods, malicious or compromised third‑party applications, lateral movement within cloud infrastructure, and enumeration and exfiltration of critical data.

    Leave this session with a guide on the next threat detections to develop and queries to use for threat hunts in your environment.

    June 18, 2026 14:20-15:05

  •  JPTLP:CLEAR

    CSIRTeaming: Forging Resilient Incident Management Teams with Psychological Safety and High Reliability Principles

    Yoshiki Sugiura has been working in CSIRTs for 26 years. He used to be a member of JPCERT/CC from 1998 to 2002. He works for IL-CSIRT and NTT-CERT. He is also a board member of Nippon CSIRT Association. He is a certified trainer and auditor for SIM3. His current working area is management of CSIRT.

    In the face of sophisticated attacks and escalating pressure, CSIRT/Incident Management Teams must fundamentally rethink their operating model. The root cause of recurrent incidents, despite having comprehensive procedures, often lies not just in technical vulnerabilities but in the “Human Element” — the structure of the team itself. Simple oversights like unpatched VPNs or basic account takeovers, which should have been preventable, often stem from a lack of field reports, stagnant organizational learning, and team dysfunction.

    Drawing on the speaker’s 26 years of security experience and research into High Reliability Organizations (HRO), this presentation proposes “CSIRTeaming” — the optimal model for modern incident response. By applying the HRO core concept of Mindfulness alongside Dr. Amy C. Edmondson’s ideas of Psychological Safety and Teaming, organizations can embrace a “Preoccupation with Failure,” “Reluctance to Simplify,” and dynamically learn.

    This approach complements the technical focus of The Art of Incident Management (FIRSTCON24), establishing the cultural foundation needed to make frameworks like the P/CSIRT Services Framework and SIM3 truly effective and to build genuinely resilient security organizations.

    June 15, 2026 14:00-14:35

  •  CATLP:CLEAR

    Cyber Deception 2.0: Adaptive Honeynets and Canary Intelligence in Production

    Peter Morin is a Senior Consultant specializing in OT/IoT cybersecurity, bringing over 25 years of industry experience to the table. With a robust background information technology and cybersecurity, Peter has become a trusted advisor to organizations navigating the complex and rapidly evolving landscape of operational technology security. His expertise encompasses the full spectrum of OT/IoT security, from risk assessment and vulnerability management to the design and implementation of comprehensive security frameworks to the deployment of OT passive monitoring solutions.

    Peter has successfully led numerous high-profile projects across diverse sectors, including energy, manufacturing, and critical infrastructure, helping clients safeguard their systems against emerging threats. His hands-on experience in the field is complemented by a deep understanding of regulatory requirements and best practices, ensuring that his solutions are both effective and compliant.

    In addition to his consulting work, Peter is a frequent speaker and educator, regularly presenting at industry conferences and contributing to leading cybersecurity publications. He holds multiple certifications, including CISSP, CISA, CGEIT, CRISC, CDPSE and GCFA, and is actively involved in professional organizations such as ISACA.Passionate about advancing the state of OT/IoT cybersecurity, Peter is dedicated to helping organizations build resilient systems that can withstand the challenges of today's dynamic threat environment.

    This session explores how adaptive deception has evolved beyond static honeypots into a dynamic, intelligence‑driven layer of defense. Attendees will see how organizations are integrating canary assets across IT, OT, and cloud environments to generate precise telemetry, confuse attackers, and reduce mean‑time‑to‑detect from weeks to hours.

    Real‑world case studies and live demonstrations will illustrate how deception can be safely automated, measured, and scaled as part of a mature detection and response strategy.

    June 19, 2026 11:00-11:45

  •  SETLP:CLEAR

    Cyber Security Specialist/Incident Handler

    Mathias Persson is a cybersecurity specialist at CERT-SE, Sweden’s national Computer Security Incident Response Team. Passionate about collaboration and practical solutions, Mathias works closely with municipalities, regions, and national stakeholders to strenghten resilience against evolving threats. In this session, Mathias shares real-world insights from a year-long battle against persistent phishing campaigns and the lessons learned from building effective partnerships.

    Between June 2024 and May 2025, CERT‑SE observed an alarming surge in phishing attacks aimed at Swedish municipalities, regions, and schools. These campaigns were not only widespread but highly persistent, exploiting compromised M365 accounts to spread malicious emails internally and externally. The impact included reputational damage and, in some cases, financial fraud, as well as an increased risk of data breaches.

    In this presentation, we will share how CERT‑SE analyzed these attacks, uncovering common patterns and tactics used by threat actors. More importantly, we will tell the story of how collaboration became the key to an effective response. By partnering with SKR (Swedish Association of Local Authorities and Regions), we developed and distributed a practical guide for handling compromised accounts in M365 environments. This initiative helped organizations regain control and implement proper remediation steps.

    Attendees will gain insight into the anatomy of these phishing campaigns, lessons learned from large‑scale incident coordination, and actionable recommendations for improving resilience in similar environments.

    June 18, 2026 09:00-09:35

  •  USTLP:CLEAR

    Dark Silicon: Unmasking GPU Threats in the Age of AI

    SNEHA RANGARI received the M.S. degree in Cybersecurity from the University of North Carolina at Charlotte, Charlotte, NC, USA, in 2019. Since July 2019, she has been with Visa, where she initially joined as a fresh graduate Cybersecurity Engineer. In this role, she worked with the Security Engineering team, focusing on Perimeter Engineering tools, including Web Application Firewalls (WAFs) and traditional Firewalls. She currently serves on the Security Architecture team. Her current work focuses on projects related to the strategic use of Generative AI in security, the application of advanced machine learning and deep learning techniques to counter sophisticated adversarial models and primarily focused on strengthening Visa's front-end payment security posture. She holds the prestigious certifications of Certified Information Systems Security Professional (CISSP) and SANS GIAC Machine Learning Engineer (GMLE). She is also an active mentor and a frequent speaker on cybersecurity topics at various industry conferences.

    GPUs power the AI revolution and silently harbor the next wave of cyber threats. From data centers to cloud AI workloads, attackers are exploiting GPU memory, kernels, and interconnects in ways traditional security tools cannot detect.

    As AI reshapes industries, Graphics Processing Units (GPUs) have become indispensable engines, accelerating everything from neural network training to high‑performance inference. Yet this reliance has created a new, largely invisible attack surface. Adversaries are leveraging this gap to deploy VRAM‑resident malware (Jellyfish), perform GPU snooping, launch side‑channel attacks, hijack GPUs for cryptocurrency mining, and even steal proprietary AI models — all while evading conventional defenses.

    This session draws on primary research, case studies, and hands‑on demonstrations to illustrate how GPU threats compromise AI confidentiality, integrity, and reliability. Attendees will gain actionable techniques for GPU telemetry monitoring, VRAM forensics, and integrating GPU visibility into SOC workflows.

    The talk also empowers participants to take ownership of GPU security in their own environments, exploring research, defense strategies, and leadership opportunities in hardware‑aware AI protection. By the end, participants will understand why securing GPUs is critical to securing the future of AI — and how to illuminate the dark silicon powering intelligent systems worldwide.

    June 19, 2026 11:50-12:25

  •  ATTLP:CLEAR

    Defeating Node.js Malware through API Tracing

    Sven Rath works as a Security Researcher at Check Point Research, spending most of his time hunting for emerging malware threats and reverse engineering different malware, from malicious Browser Extensions to Kernel Level Rootkits. After work, he spends his time researching Windows Kernel Internals and fringe malware techniques and writing blog posts about both.

    Node.js has become a staple in the malware development toolkit of crimeware authors: it is easy to develop, trivial to obfuscate, and difficult to analyze — with a wide array of open‑source obfuscators, originally designed to protect intellectual property, commonly abused by threat actors to hide their malicious code.

    This talk introduces a purpose‑built Node.js Tracer designed to cut through the noise by instrumenting the runtime rather than having to deal with tedious manual source‑code deobfuscation, ultimately saving precious time for analysts and incident responders. After an overview of different forms of Node.js malware observable in the wild, the talk reconstructs a malware research effort that sparked the tool’s development, outlines the mechanics of tracing as a dynamic reverse‑engineering method, and demonstrates how runtime hooking exposes the malware’s real behavior.

    Attendees will see, using case studies of several real incidents, how the utility neutralizes anti‑analysis checks, bypasses obfuscation, and speeds up the analysis process — resulting in a practical workflow for incident response teams facing increasingly obfuscated JavaScript‑based malware families.

    June 17, 2026 14:20-14:55

  •  USTLP:GREEN

    Disparate Data, Distorted Decisions: Vendor Data Bias in CTI

    Eli Woodward is a Senior Threat Intelligence Advisor with 20+ years in law enforcement and private-sector security and a Master’s in Intelligence Studies. He helped build regional cyber intel reporting at Maricopa County and spent four years with Zelle. He is active in the Phoenix security community supporting CactusCon.

    Organizations routinely rely on annual IR and threat‑intelligence reports to guide strategy and prioritize security investments. Yet across the industry, these reports frequently contradict one another on the top intrusion vectors, dominant attacker behaviors, and definitions of common categories such as credential misuse. These contradictions do not reflect attacker volatility; they stem from structural bias in each vendor’s data‑collection pipeline.

    This session presents an empirical comparison of major public IR/TI reports, shows how intake pathways and telemetry footprints shape what each vendor “sees,” and offers a practical framework for interpreting vendor reports as partial lenses rather than authoritative truth. Attendees will learn how to normalize conflicting data, reduce mis‑prioritization in their IR programs, and push for shared taxonomies that improve collective situational awareness.

    June 15, 2026 11:50-12:25

  •  USTLP:CLEAR

    DPRK Fake Applicants in Your Recruitment Funnel? How to Catch Them All

    Adam Messer is a security engineer with 6+ years of experience in detection engineering, incident response, and cloud security on both government and private systems. He is currently a Senior Security Engineer at Datadog on the Detection Engineering and Threat Hunting team. In his free time, he hikes and rock climbs in the Rocky Mountains.

    North Korean threat actors are increasingly infiltrating global hiring pipelines by posing as legitimate software developers and security engineers. In this session, we’ll break down what these synthetic applicants look like in practice, the visibility gaps most organizations don’t realize they have, how their tradecraft has evolved, and the system you need to detect them.

    This talk will cover how we built a detection stack for identifying and blocking fake applicants, including the use of behavioral and IOC‑based detections, cross‑system enrichment for correlation, and AI‑driven risk assessment. Our team has utilized this system to collect intelligence from these synthetic personas and convert it into actionable indicators.

    At the end, we will dive into our metrics and tangible insights from 9 months of detecting and tracking fake applicants. By covering common IOCs, infrastructure fingerprints, recurring resume features, and operational patterns, you can launch a threat hunt within your own recruiting funnel.

    Attendees will leave this session with practical detection strategies and a roadmap for building talent‑security visibility.

    June 17, 2026 09:00-09:35

  •  ESTLP:CLEAR

    Eiffel: A Tool to Oversee Incident Response From the Heights

    Oscar Salvador:Experienced systems and cybersecurity specialist with more than 10 years of expertise in IT infrastructures, cybersecurity incident response, digital forensics, and security engineering. Currently, I work for the Cybersecurity Agency of Catalonia where I serve as the head of the Incident Response team at CATALONIA-CERT, a role that involves addressing cybersecurity challenges that affect the Government of Catalonia and its related public sector.

    Juan Gonzalez: Computer scientist with over 17 years of experience as a team leader in cybersecurity incident response, threat analysis, pentesting, and file system researching. I currently work at the Cybersecurity Agency of Catalonia, from where I serve as the head of the CATALONIA-CERT, which is the Government of Catalonia's CSIRT. At our CERT we deal on a daily basis with cyberincidents that might affect hospitals, universities, municipalities and information systems that provide service to more than 8M people in Catalonia. Before joining the Cybersecurity Agency of Catalonia I worked as a senior cybersecurity consultant at EY and as a file systems engineer both at Xyratex, a Seagate Company and at the Barcelona Supercomputing Center.

    Modern incident response teams often face situations where dozens or even hundreds of endpoints require rapid triage and preliminary forensic analysis. Traditional manual approaches may not always scale efficiently and can slow down decision‑making during high‑pressure investigations.

    Eiffel is a soon‑to‑be‑open‑source solution designed to assist DFIR practitioners during investigations, enabling analytics and SIGMA‑based alerts on top of large volumes of evidence, helping them find the few key needles in the haystack of logs, KAPE targets, and Velociraptor hunts.

    This session will cover Eiffel’s current architecture and core components and will touch on how AI can leverage — or be leveraged by — the platform to unlock new critical capabilities. Attendees will leave with a clear understanding of how a solution like Eiffel can help their teams and how they could improve their evidence‑processing pipelines.

    June 17, 2026 10:55-11:30

  •  BE PTTLP:CLEAR

    Everything Everywhere All at Once…in 2038

    Trey Darley leads the FIRST Time Security SIG, coordinating international research and remediation efforts related to the 2036–2038 rollover vulnerabilities. He has spent the past decade studying temporal fragility across embedded, cloud, and critical-infrastructure systems, and recently presented the draft technical report for this work at the ITU-T.

    A long-standing member of the BruCON and FIRST communities, Trey has served in multiple volunteer roles, including a term on the FIRST Board of Directors, where he co-founded the FIRST Standards Committee. He is recognized for his contributions to open cybersecurity standards such as STIX/TAXII, and for his long association with the Langsec community’s approach to software correctness and input handling. Trey’s patron saints are Grace Hopper, Evi Nemeth, and Paul Erdős. Trey has presented at USENIX, FIRST, BruCON, O'Reilly Security Amsterdam, RSAC, hack.lu, BSides Lisbon, and others.

    Pedro Umbelino currently holds the position of Principal Research Scientist at Bitsight Technologies and brings over a decade of experience in dedicated security research. ⁤His eclectic curiosity has led to the uncovering of vulnerabilities spanning a gamut of technologies, highlighting critical issues in multiple devices and software, ranging from your everyday smartphone to household smart vacuums, from the intricacies of HTTP servers to the nuances of NFC radio frequencies, from vehicle GPS trackers to protocol-level denial of service attacks. Pedro is committed to advancing cybersecurity knowledge and has shared his findings at prominent conferences, including Bsides Lisbon, DEF CON, Hack.lu and RSA.

    The 2036–2038 rollover is not a legacy timestamp bug. It is a cross‑sector vulnerability class and a global systemic risk, rooted in a pervasive design pattern inherited from the original 32‑bit Unix time_t representation. Modern dependency chains amplify this exposure through orphaned firmware, unmaintained toolchains, libraries, userland components, certificate‑validity windows, distributed authentication flows, and other long‑tail software lifecycle failures.

    Many production environments cannot be safely tested without emulating upstream Internet dependencies — the same observer‑effect challenge that malware analysts face when studying complex malware behavior in isolated sandboxes.

    This talk introduces a temporal‑stress testing framework for CERTs, PSIRTs, and IR teams, along with cross‑sector dependency models, early‑warning indicators, communication templates, and priority mitigations. Drawing on a decade of analysis across embedded, automotive, telecom, cloud, and critical‑infrastructure domains — including over a year of intensive research mapping how these dependencies interact — we offer a practical, repeatable approach organizations can begin implementing now, before correlated failures begin to cascade into predictable crises that will otherwise appear as Black Swan events in retrospective postmortems.

    June 15, 2026 11:00-11:45

  •  USTLP:CLEAR

    Fighting Back Without Hacking Back: Why “Risk Management” Isn’t Enough In The Era of Cyber War

    Tom Millar has served in CISA since 2009, working to strengthen the nation’s cyber defenses and resilience against emerging threats. His work has included increasing the level of public, private and international partner engagement, and supporting initiatives to improve information sharing, such as the standardization of the Traffic Light Protocol. As the Branch Chief of Cyber Resilience within the Cyber Security Division, he oversees CISA’s architectural cybersecurity assessments, the Cybersecurity Performance Goals program, and training and standards for assessment performance. Prior to his cybersecurity career, he served as a linguist with the 22nd Intelligence Squadron of the United States Air Force. Mr. Millar holds a Master’s of Science from the George Washington University and is a Distinguished Graduate of the National Defense University’s College of Information and Cyberspace.

    Adam Shostack is the author of Threat Modeling: Designing for Security and Threats: What Every Engineer Should Learn from Star Wars. He’s a leading expert on threat modeling, a consultant, expert witness, and game designer. He has decades of experience delivering security. His experience ranges across the business world from founding startups to nearly a decade at Microsoft.

    His accomplishments include:

    • Helped create the CVE. Now an Emeritus member of the Advisory Board.
    • Fixed Autorun for hundreds of millions of systems
    • Led the design and delivery of the Microsoft SDL Threat Modeling Tool (v3)
    • Created the Elevation of Privilege threat modeling game
    • Co-authored The New School of Information Security

    Beyond consulting and training, Shostack serves as a member of the Blackhat Review Board, an advisor to a variety of companies and academic institutions, and an Affiliate Professor at the Paul G. Allen School of Computer Science and Engineering at the University of Washington.

    Since the dawn of FIRST, most cyber adversaries have been engaged in cyber espionage rather than targeted disruption. Over the last several years, this paradigm has shifted; while many bad actors still seek to steal secrets, many others are positioned to act destructively, including against targets with direct effects on life and safety.

    This presentation will explain how the modern threat landscape requires novel thinking from defenders and incident responders, explaining in detail the limitations of the “risk management” mindset, and exploring what lessons we can learn from the field of war.

    June 19, 2026 11:50-12:25

  • TLP:CLEAR

    FIRST Newbie Intro Session!

    Is this your first FIRST? Join us for a quick introductory session and meet other FIRST newbies and the FIRST staff.

    June 14, 2026 17:30-18:00

  •  ALTLP:AMBER

    From Breach to Benchmark Albania’s Cybersecurity Turning Point

    Saimir Kapllani is a senior cybersecurity official with over 15 years of experience in securing national critical information infrastructures and developing resilient cyber governance frameworks in Albania. As Director of Cybersecurity Governance, Risk, and Compliance at the National Cybersecurity Authority, he has led the design and implementation of policies, standards, and regulatory mechanisms that ensure the security, resilience, and operational continuity of critical sectors.

    Mr. Kapllani has overseen the establishment of a national cybersecurity risk management program, the implementation of compliance and audit frameworks aligned with international standards (NIST, ISO 27001, COBIT, ENISA guidelines), and capacity-building initiatives targeting public and private operators of essential services. He also serves as Albania’s national technical point of contact with the OSCE on Confidence Building Measures and actively contributes to regional efforts on cyber maturity, CERT development, and cyber hygiene. His expertise lies in building scalable, trusted, and adaptive cybersecurity governance models that reinforce national resilience and align with EU and NATO frameworks.

    In 2022, Albania faced one of the most disruptive nation‑state cyberattacks in its history, resulting in critical infrastructure downtime and unprecedented public exposure. Rather than retreat, the country responded with swift, coordinated reforms that reshaped its entire cybersecurity governance landscape. This session explores Albania’s transformation from being the target of a cyber breach to becoming a regional benchmark for resilience and governance.

    Through this case study, we will examine the steps taken post‑attack: the restructuring of national cyber response mechanisms, capacity‑building within public institutions, implementation of international frameworks, and the elevation of CSIRT capabilities. The presentation will highlight lessons learned, challenges encountered, and the strategies that enabled Albania to turn crisis into opportunity — offering practical insights for nations and organizations seeking to enhance their cyber resilience.

    Attendees will gain a first‑hand look at how adversity catalyzed long‑term security improvements and how a small country emerged as a role model in cybersecurity governance.

    June 16, 2026 11:45-12:20

  •  USTLP:CLEAR

    From CVD to Secure Releases: Automating Security from Source to Releases

    Vijay Sarvepalli works as Principal Engineer at CERT division of Carnegie Mellon University Software Engineering Institute.  Vijay is a seasoned professional with extensive expertise in software architecture, cybersecurity, and enterprise systems.  Vijay has a broad background in software architecture, solutions architecture and enterprise architecture.  Vijay is TOGAF 9 Enterprise Architect Practitioner with specialized skills in developing strategy, innovation with a focus on closing the gap between strategy and execution.  In his previous roles, he has broad experience in multiple vertical industries with roles such as Practice Head for Innovations, Technical Lead for Managed Services and IT Architect for Campus Information Services.  Vijay has BS and MS degrees in Electrical and Computer Engineering and a MIT Executive Certificate in Strategy and Innovations.

    As open‑source ecosystems grow ever more central to modern software development, the traditional view of Coordinated Vulnerability Disclosure (CVD) as a “nice‑to‑have” becomes dangerously inadequate. In this talk — “Beyond CVD: Automating Software Security from Source Code to Release” — I argue that CVD must evolve: not just to notify, but to actively secure software supply chains, builds, releases, and audit tools. By integrating CVD into developer workflows on platforms such as GitHub, GitLab, and public registries like npm and PyPI, we can shift security “left,” enforce continuous policy checks, and ensure that disclosure actually leads to safer software in production.

    June 15, 2026 14:00-14:35

  •  ILTLP:CLEAR

    From Discovery to Fix: What 10,000 Open Source Projects Reveal About CVE Remediation

    Mor is a Staff Software Engineer specializing in analyzing cloud-native security and supply chain threats. His efforts have uncovered a variety of emerging threats, including unsecured environments and platforms, as well as cryptomining campaigns. Additionally, he has collaborated with the Center for Internet Security (CIS) to develop guidelines for software supply chains and an open-source security tool to address these challenges.

    We analyzed CVE remediation patterns across 10,000 open‑source projects to understand a critical problem: the mean time to repair (MTTR) for vulnerabilities as they propagate through the ecosystem. Our research reveals a sobering reality — CVEs fixed upstream take weeks or months to reach downstream containers, creating massive security‑exposure windows in Kubernetes environments.

    In this talk, we'll present our findings showing how CVE fixes flow (or stall) through different ecosystem layers — from upstream projects to package managers to base images to final containers. You'll see real data on remediation delays, bottlenecks, and the compounding effect of layered dependencies.

    But we won't stop at the problem. The second half focuses on practical solutions. We'll demonstrate remediation strategies that actually work at scale, from automated patch backporting to in‑place image patching with tools like Copa. You'll learn how to build workflows that dramatically reduce MTTR, including dependency‑automation patterns and risk‑based prioritization.

    Attendees will leave with both a data‑driven understanding of the CVE remediation challenge and a practical playbook for fixing it, complete with automation templates and proven patterns from the field.

    June 15, 2026 11:50-12:25

  •  USTLP:CLEAR

    From Dork to Diplomat: Communicating Coherently for Vulnerability & Incident Response

    Tom Millar has served in CISA since 2009, working to strengthen the nation’s cyber defenses and resilience against emerging threats. His work has included increasing the level of public, private and international partner engagement, and supporting initiatives to improve information sharing, such as the standardization of the Traffic Light Protocol. As the Branch Chief of Cyber Resilience within the Cyber Security Division, he oversees CISA’s architectural cybersecurity assessments, the Cybersecurity Performance Goals program, and training and standards for assessment performance. Prior to his cybersecurity career, he served as a linguist with the 22nd Intelligence Squadron of the United States Air Force. Mr. Millar holds a Master’s of Science from the George Washington University and is a Distinguished Graduate of the National Defense University’s College of Information and Cyberspace.

    Rina Rakipi serves as the Operations Lead within CISA’s Threat Hunting subdivision. She turns complex threat activity into clear, actionable intelligence, driving cyber campaigns and strengthening coordination across federal, industry, and international partners. She previously led CISA’s Secure by Design Alert series, advancing efforts to reduce systemic software vulnerabilities, and helped modernize the CVE Program to improve the speed and accuracy of national vulnerability records. Earlier in her career, she shaped major joint cybersecurity guidance as a lead technical editor and writer, bridging technical depth with strategic communication. Rina holds a B.A. in International Relations from Michigan State University and an M.Eng. in Cybersecurity Policy and Compliance from the George Washington University. Her work sits at the crossroads of global affairs, software security, and national cyber defense.

    If you’ve ever struggled to translate technical threat and vulnerability data into actionable risk information that both peers and senior decision‑makers can intuitively understand — this session is for you.

    In the fast‑moving world of incident and vulnerability response, technical precision is critical — but it’s trust and communication that determine whether your message drives action or gets lost in translation. This talk, co‑presented by threat intel and vulnerability operations leaders, explores how to communicate effectively across silos, sectors, and sensitivities.

    We’ll share real‑world lessons from coordinating across government, industry, and international partners — where the stakes are high, the timelines tight, and the audiences diverse. From decoding threat intel for non‑technical stakeholders to navigating disclosure diplomacy, we’ll show how clarity, credibility, and context can turn a “dork” into a trusted diplomat.

    Attendees will leave with practical tools for briefing leadership, collaborating across teams, and building trust in the heat of response. Whether you’re deep in the hunt or leading the charge, this session will help you communicate with impact — and without compromise.

    June 17, 2026 10:55-11:30

  •  PLTLP:GREEN

    From Internet Noise to Cyber Intelligence: Lessons from a Network Telescope

    Jan Adamski: Senior Software Engineer at NASK’s Cybersecurity Team, specializing in large-scale Internet measurements, darknet/network-telescope analytics, and vulnerability research. Author of multiple CVEs (including CVE-2023-4617 – CVSS 10.0) and contributor to projects focused on IoT security, Bluetooth threat analysis, and unsolicited-traffic intelligence. Speaker at Polish cybersecurity conferences such as THS and OMH, with a background in telecommunications from Warsaw University of Technology.

    Paweł Pawliński: Paweł Pawliński is an expert at CERT.PL. His job experience includes data analysis, threat tracking, and automation. He is always looking for better ways to collect, leverage, and share CTI.

    Marcin Rytel: Cybersecurity Expert at NASK-PIB with a background in Telecommunications from the Warsaw University of Technology. He began his career at the university’s Institute of Radioelectronics and Multimedia Technology, designing RF-enabled devices and measurement equipment. At NASK-PIB, he contributed to building vulnerability and exploit databases for Internet-of-Things devices within the VARIoT project, and researched the security of their radio-frequency communication as part of the LaVA initiative. He is currently involved in a project focused on large-scale network telescope traffic analysis.

    Every publicly exposed IPv4 address gets unsolicited traffic, so‑called Internet background radiation. Typically, it is discarded as “noise,” but with some effort it is possible to find cyber threat‑intelligence nuggets inside.

    In this presentation, we will share results of our research into unsolicited Internet traffic collected through a large passive “network telescope” operated by NASK/CERT.PL and a system we built to analyze such data. We highlight multiple practical use cases: early warning for emerging or weaponized vulnerabilities, monitoring the DDoS landscape through backscatter analysis, detection of misconfigurations and potential data leakage, and behavioral fingerprinting of scanners and botnets.

    The session will provide insight into implementation of the analytical pipeline that converts raw packets into enriched, high‑value events, as well as the storage and alerting aspects. We will also compare our system with other projects working with similar data, and how we distribute generated alerts to constituents and partners.

    Overall, we will demonstrate the value of network telescopes as a source of threat intelligence and help you decide if looking into Internet noise is worth spending your time on.

    June 19, 2026 10:00-10:45

  •  USTLP:CLEAR

    From Logs to Living Timelines: AI-Assisted Incident Response in Hybrid Cloud Using OCSF

    The presenters serves as a Lead Security Architect and Director of Security Operator leading hybrid-cloud and AI-augmented incident-response initiatives for a large U.S. healthcare insurer. His work spans log normalization, SOC automation, AI governance, and evidence reliability frameworks. He has designed log-to-timeline pipelines aligned to OCSF and has published on AI governance, bias mitigation, and forensically sound automation in security operations.

    above

    Hybrid‑cloud infrastructures generate fragmented evidence trails across AWS, Azure, SaaS, and endpoint telemetry, which slows investigations when every second matters. This session introduces an AI‑assisted, schema‑driven incident‑response pipeline that automatically normalizes any log source to the latest Open Cybersecurity Schema Framework (OCSF), enforces UTC timestamping, and produces a defensible, time‑ordered narrative like outputs from log2timeline/plaso but optimized for operational SOC use.

    Unlike ad‑hoc scripts, this framework embeds Daubert, Frye, and Durant evidentiary‑reliability criteria, ensuring that all AI‑assisted transformations remain transparent, auditable, and admissible in regulatory or legal contexts. Each step is version‑controlled, hash‑verified, and explainable, providing both analytical speed and forensic integrity.

    Attendees will see reference architectures deployable in Splunk, Sentinel, or Databricks Lakehouse environments, learn how to integrate large‑language models (LLMs) for field inference and semantic clustering safely, and receive reproducible templates for audit‑ready timeline generation. The presentation closes by mapping the architecture to NIST IR, MITRE ATT&CK, and NIST AI RMF controls, offering a practical blueprint for building adaptive, legally defensible incident‑response pipelines in the age of hybrid cloud and AI.

    June 18, 2026 09:00-09:35

  •  PL NLTLP:CLEAR

    From Planning to Impact: Lessons from Poland’s National Cybersecurity Exercises with a Dedicated TTX Platform

    Marcin Fronczak - spent 12 years as Chief Information Security Officer in the financial and insurance sectors and performed IT/OT area security audits for a critical infrastructure operator. Prior to that, he spent 5 years as a consultant in the area of technology risk and security. During many audits and consulting projects in Europe, he gained extensive experience and thorough knowledge of risks and auditing of ICT systems, confirmed by obtaining international certifications including CISA, CIA, CRISC, Comptia Security +, ISO 27001 LA. He was the first Pole to earn the CCSK certification in the Cloud Security Area.

    Mirosław Maj (Open CSIRT Foundation, Cybersecurity Foundation) has nearly 30 years of experience in ICT security and has played a major role in shaping cybersecurity capabilities in Poland and abroad. He is the co-founder of the Open CSIRT Foundation, responsible for developing SIM3 maturity model and supporting the Trusted Introducer service certifying security teams worldwide, as well as the founder and president of the Cybersecurity Foundation and co-founder of ComCERT.PL. A former head of CERT Polska, he co created CyberBastion - a simulation and training platform powering the multi-edition CyberBastion League.

    He advised the Polish Minister of National Defence on cyberdefence development, is a member of the Polish Digitalization Council, and serves as an expert for ENISA, co-authoring numerous European cybersecurity reports. His international work includes major projects in Georgia, CIS countries and the UN, supporting the creation and maturity of national CERTs. He has organized ten editions of Cyber-EXE exercises for key sectors and national-level NIS-based testing. A regular FIRST speaker and founder of the Security Case Study conference, he also lectures on cybersecurity at several universities.

    National‑level cybersecurity exercises require precise planning, credible threat modelling, and an understanding of how a country’s cybersecurity system functions in practice. This presentation shares lessons from three editions of Poland’s KSC‑EXE, conducted with the Ministry of Digital Affairs and involving all national cybersecurity actors, including national CSIRTs, competent authorities, sectoral CSIRTs, and operators of essential services. Built on the Polish NIS‑based legal framework, the exercises ensured scenarios and evaluation matched real obligations.

    The session outlines how to design national exercises: setting objectives aligned with legislation, creating realistic multi‑sector threat scenarios, balancing participant engagement, integrating real and simulated entities, and using an advanced TTX platform for dynamic injects. It also presents methods for evaluating results and generating actionable improvements for national cyber resilience.

    June 16, 2026 10:55-11:40

  •  GRTLP:CLEAR

    Ghost Networks and the Imitation Game

    Antonis Terefos is a malware reverse engineer at Check Point Research with experience in the cyber threat landscape. He specializes in dissecting and analyzing malicious software to uncover hidden threats within the ever-evolving cyber threat landscape. In addition to his professional work, Antonis enjoys testing malware command-and-control (C2) infrastructures in his spare time. By exploring these C2 systems, he gains valuable insights into the strategies and tactics employed by threat actors, enriching his overall understanding of the adversarial landscape.

    A new era of malware distribution has emerged. Hackers no longer need to approach their victims directly — they only need to attract them. This new method of spreading malware is enabled by Ghost Networks, which operate across popular platforms. A Ghost Network is a collection of fake or “ghost” accounts that function as a coordinated service, manipulating platform‑engagement tools to disguise malicious activity as legitimate and enable large‑scale malware distribution.

    These networks have grown in popularity due to their efficiency in infecting large numbers of victims in a short time while remaining undetected, as their account activities appear benign to the platforms on which they operate. They achieve this by operating across popular platforms, including GitHub, YouTube, X, Discord, SourceForge, and Twitch, using fake accounts to manipulate engagement tools on each platform.

    Alan Turing, in his seminal 1950 paper, introduced the concept of “The Imitation Game.” In this “game,” a machine’s goal is to imitate a human so convincingly that an interrogator cannot reliably distinguish between the machine and a human participant. Nearly 75 years later, Turing’s ideas remain relevant, as Ghost Networks now play a similar “Imitation Game,” using AI (LLMs) to mimic human behavior and infect unsuspecting users with malware.

    June 17, 2026 10:55-11:30

  •  TWTLP:CLEAR

    Hack Your Board's Mindset: Closing the Strategy-Operations Gap via Board Game Simulations

    Tien-Chih Lin (aka Dange) is the research team lead at CyCraft Technology, specializing in machine learning, red teaming, vehicle security, and cloud security. Alongside his technical expertise in offensive security, he has significant experience in cybersecurity management and holds a CACSP certification. His research and work have been presented at conferences including Black Hat USA/Europe, HITCON CMT/ENT, USENIX Security, CYBERSEC, MOPCON, and ECCWS. Beyond research, Tien-Chih has delivered training at events such as AIS3, HITCON Training, and NICS. He is also one of the creators behind the educational cybersecurity board games "Cybercans" and "Cybercrete."

    Wei-Chia Kao is a Project Manager at CyCraft Japan Corporation and a board member of the Association of Hackers In Taiwan (HIT). She holds a B.S. in Computer Science from National Taiwan University of Science and Technology and an MBA from Hosei University in Japan. With professional experience across AI, indie games, and cybersecurity, she brings a unique cross-disciplinary perspective to her work. Active in the cybersecurity community for years, she served as the vice coordinator of HITCON Community 2016, Taiwan’s most representative cybersecurity conferences. She is the producer of two cybersecurity-themed educational board games, Cybercans and Cybercrete, with Cybercans has been experienced by thousands of security professionals, business leaders, students, and educators from Taiwan, Japan, and the United States. She has also spoken at AVTokyo, HITCON, TGDF, and other cybersecurity / game development conferences. Believing that education has the power to change the world, Wei-Chia is passionate about making cybersecurity more accessible and engaging. Drawing on her diverse background, she transforms complex technical knowledge into intuitive and interactive formats. She is dedicated to inspiring future cybersecurity talent and raising public awareness to strengthen cyber defense.

    Yi-Hsien Chen earned his B.S. degree in Computer Science at National Chiao Tung University (NCTU) and is currently a Ph.D. candidate in the Department of Electrical Engineering at National Taiwan University (NTU), a research assistant in the Department of Computer Science at National Yang Ming Chiao Tung University (NYCU), and a security researcher for the CyCraft research team. His research focuses on automatic malware analysis techniques, cyber threat intelligence, machine learning, and various cybersecurity topics. His work has been published in IEEE TIFS, DSC, ACM ASIACCS, and CCSW. He has also spoken at HITB CyberWeek, AVTokyo, HITCON, SECCON, and CODE BLUE. Additionally, he was a member of the BambooFox CTF team from NYCU, has participated in several CTFs, and has won 12th and 2nd place in DEFCON 26 and 27, respectively, with BFS and BFKinesiS CTF teams.

    Even organizations with robust cyber budgets and advanced tools often struggle during real incidents — not due to technical gaps, but because boards and operators lack shared mental models of risk and trade‑offs. Traditional briefings fail to close this divide; they are consumed passively and forgotten quickly.

    We propose a radical alternative: encode critical cybersecurity concepts (CDM, CTEM) into game‑based simulations, where decision‑makers experience failures, resource constraints, and coordination friction firsthand. Through visceral, compressed feedback loops, participants build durable intuitions that PPTs cannot deliver. Validated across 1,000+ participants in multiple regions, this approach accelerates organizational learning and cross‑role alignment by months.

    This talk shares how to leverage the learning science in simulation‑based encoding, demonstrates how it transforms abstract frameworks into embodied knowledge, and provides a concrete blueprint for building adaptive defense through experiential practice — not more lectures.

    June 16, 2026 09:00-09:35

  •  CATLP:CLEAR

    How Attackers Reconstruct You: Measuring Identity Exposure Across Four Attack Surfaces

    Andréanne Bergeron, PhD, is a researcher at Flare, specializing in online attackers’ behaviors. Her expertise delves into the intersection of criminology and cybersecurity. In addition, Andréanne holds an esteemed position as an affiliated professor in the Department of Criminology of Montreal University, bridging academia and industry. Her commitment to provide a unique perspective on the human element behind digital threats reflects a holistic approach, enriched by theoretical depth and real-world applicability. Andréanne has showcased her research at prestigious conferences such as BlackHat USA, Defcon, CypherCon, and ShmooCon. Active in her community, Andréanne serves as Vice President in NorthSec organizing team.

    Cybersecurity executives still treat “exposure” as a single number, then want to know their one risk score, even though attackers haven’t operated in a single dimension for over a decade. It is now very easy for threat actors to automate large‑scale, hyper‑targeted phishing campaigns using full‑spectrum, graph‑like profiles of organizations and individuals, blending leaked credentials, personal identifiers, behavioral signals, financial data, corporate access paths, and vulnerable assets to create multi‑vector entity‑exploitation opportunities.

    In this talk, we introduce a new four‑branch Identity Exposure Metric that redefines how defenders measure vulnerability in a world where password leaks are only one piece of the attack surface. Drawing from 216B+ compromised records and deep empirical modeling, we show how identity reconstruction, authentication leakage, financial sensitivity, and social‑engineering susceptibility each contribute to different pathways of harm.

    Attendees will learn how the Identity Exposure Metric can prioritize real‑world risk, help detection engineers and threat hunters spot AI‑based phishing, and reinforce identity‑centric defense strategies. This session challenges existing assumptions and presents a new blueprint for measuring digital exposure.

    June 18, 2026 09:40-10:25

  •  USTLP:CLEAR

    How EPSS Is Wrong and Useful at the Same Time

    Jay is a Co-founder and Data Scientist at Empirical Security and Data Scientist Emeritus at Cyentia Institute. Jay is also the lead data scientist for the Exploit Prediction Scoring System (EPSS), a co-chair of the EPSS special interest group at FIRST and chair of the Consumer Working Group within the CVE program. He is also a co-founder of the Society for Information Risk Analysts (SIRA), a not-for-profit association dedicated to advancing risk management practices where he served on the board of directors for several years.

    Come learn how the Exploit Prediction Scoring System (EPSS) works and where it’s headed. We will cover the history, what EPSS was designed for, and the evolution of EPSS through the years, including the latest release. Learn about the massive data‑collection system behind EPSS, what data is used and is useful, and which data is the most “interesting.”

    We will cover how EPSS overcomes the limitations in common scoring systems and get into common criticisms of the scoring system. Finally, no talk of EPSS would be complete without a discussion about how EPSS should fit into your vulnerability‑prioritization strategy (spoiler: it depends!), so you can grab the scores right away and get to work!

    June 16, 2026 10:55-11:40

  •  PLTLP:AMBER

    How to Detect and Block over 200 Thousands of Investment Scam Domains

    Krzysztof Zając: Senior Threat Analysis Specialist at CERT PL, currently working on automated vulnerability discovery techniques. Before becoming a security specialist, he was a software engineer with more than ten years of experience. Teaches offensive security at the University of Warsaw. Formerly a CTF player, playing with the p4 CTF team. Likes cats and bad puns.

    Investment scams pose a serious threat in Polish cyberspace. Typically, they begin with an advertisement that links to an article promising unrealistically high investment returns. The article then directs users to fraudulent exchanges, where they can deposit funds but are unable to withdraw them.

    Such articles or fraudulent exchanges are reported to CERT‑PL, which allows them to be flagged as malicious and, in consequence, have them blocked by major Polish ISPs. Because ISPs in Poland quickly block such domains, criminals have adapted by registering hundreds — or even thousands — of new domains.

    In this talk, we will outline the scam’s flow in detail and present the method we developed to semi‑automatically identify a large number of malicious domains. We will also describe how we kept the number of false positives low and what problems we encountered (and solved!) during the project.

    June 16, 2026 13:45-14:30

  •  USTLP:CLEAR

    Indicator Message eXchange (IMX): Turning Human Expertise and Experiences into Machine-Readable CTI-Fast

    Brian John DeWyngaert Jr. is the Senior Technical Advisor for Threat Hunting at the Cybersecurity and Infrastructure Security Agency (CISA), bringing over 20 years of experience across the U.S. Military, U.S. Federal Executive, and private sectors. A strategic thought leader for CISA since 2009, Brian has held pivotal leadership roles including leading coordinated defensive operations for CISA and Deputy Officer in Charge for a U.S. Military Operations Team. His expertise lies in bridging the gap between executive strategy and technical engineering.

    Threat intelligence is only as valuable as an analyst’s ability to translate human insight into machine‑readable data — yet most indicators still circulate in ad‑hoc emails and chat threads, bypassing STIX/TAXII pipelines and slowing collective defense.

    This session unveils CISA’s Indicator Message eXchange (IMX), a newly open‑sourced, containerized platform that lets experts publish high‑fidelity STIX 2.x packages in minutes — no schema expertise required. Attendees will see live demos of IMX’s dual interface: a Guided Mode that walks any analyst through five intuitive questions (Who, What, Where, How, Why) and an Expert Mode with real‑time validation and enrichment hooks.

    June 15, 2026 11:00-11:35

  •  CATLP:CLEAR

    Introducing StealerLens: An LLM-Powered Forensics Microscope to Accelerate InfoStealer Investigations

    Olivier Bilodeau, a principal researcher at Flare, brings 12+ years of cutting-edge infosec expertise in honeypot operations, binary reverse-engineering, and RDP interception. Passionate communicator, Olivier spoke at conferences like BlackHat, DEFCON, SecTor, Derbycon, and more. Invested in his community, he co-organizes MontréHack, is NorthSec’s Vice-president, and runs its Hacker Jeopardy.

    Information stealer malware represents a critical threat vector, with over 50 million stealer logs posted in 2025 alone, creating an analysis bottleneck impossible to address at scale. These logs contain rich forensic artifacts revealing infection vectors and malware‑campaign behaviors — insights that remain untapped due to manual analysis requirements.

    Building upon our BlackHat USA 2025 work on LLM‑based infection screenshot analysis (“Hackers Dropping Mid‑Heist Selfies”), we introduce StealerLens, an LLM‑powered forensic tool to accelerate infostealer log investigations.

    June 17, 2026 09:40-10:25

  •  JPTLP:CLEAR

    Itinerary to Defeat Yet Another Beacon Implementation

    Naoki Takayama is a security researcher at Internet Initiative Japan, Inc. As a member of IIJ-SECT, the private CSIRT of his company, he is engaged in threat research and incident response. His research focuses on malware and tactics used in targeted attacks. He has spoken at BSides Tokyo and VB in the past.

    Cobalt Strike remains one of the most widely abused post‑exploitation frameworks, favored by both cybercrime groups and state‑sponsored APT actors. In recent years, defenders have significantly improved their tooling and techniques for detecting and analyzing the Cobalt Strike Beacon. As a response to this, some threat actors have shifted toward reimplementation of the Cobalt Strike Beacon written in modern programming languages such as Rust and Go. These new variants offer improved stealth, flexible customization, and inherent evasive characteristics originating from their language ecosystems.

    This talk will present an in‑depth analysis of these emerging variants, exploring their architecture, behaviors, and notable samples observed in the wild. Additionally, we will offer practical strategies for blue teams, including configuration‑extraction methods and YARA detection rules designed to identify these new threats.

    June 16, 2026 14:35-15:10

  • TLP:CLEAR

    Keynote: Cyber Defense: Making the Difference - Getting to Why, What and How

    Teeing up lessons learned from eight years as the NSA Deputy Director and Chief Operating Officer and his service as the nation's first National Cyber Director, Chris Inglis will address the why, what and how of effective cyber defense.  Defining these essential components correctly will mobilize more resources, employ them with greater effect, and better achieve the intended outcome - ensuring the cyberspace meets the expectations of people and organization dependent on them for life and business critical services.

    June 17, 2026 15:30-16:30

  •  USTLP:CLEAR

    Leveraging AI to Review and Strengthen Your Incident Response Plan: A Proof of Concept

    John Hollenberger is a seasoned cybersecurity consultant with over 19 years of experience helping organizations strengthen their defenses and prepare for the realities of today’s evolving threat landscape. Throughout his career, John has guided clients through complex security challenges — from building proactive security strategies to leading high-impact incident response efforts.

    As the Lead Consultant of Proactive Services at Fortinet, he works closely with organizations to enhance their readiness, resilience, and ability to respond effectively when incidents occur. John is deeply committed to educating others on the importance of preparation, collaboration, and continuous improvement in cybersecurity. He holds a range of industry certifications, including CISSP, GCIH, GWAPT, CISA, CISM, CRISC, and Security+.

    Incident Response Plans (IRPs) are essential but maintaining them is often time-consuming and reactive. This session presents a proof of concept that uses artificial intelligence to analyze and enhance IRPs for completeness, clarity, and alignment with standards such as NIST 800-61.Attendees will see how AI can identify gaps, flag outdated procedures, and suggest targeted improvements—reducing manual review time while supporting better preparedness. We’ll explore the process from data preparation through analysis and validation, sharing lessons learned and practical takeaways from testing AI-assisted review on areal plan. By the end, participants will understand both the potential and limitations of using AI to modernize IR planning, improve response readiness, and strengthen overall cyber resilience.

    June 18, 2026 14:20-15:05

  •  INTLP:CLEAR

    "Malice in the Modules" - How NPM Became a Supply-Chain Battleground?

    Harish Shankar is currently working as Director – Head of Product Vulnerability Management in Schneider Electric. In this role, he heads Schneider Electric’s PSIRT Team which is represented as SE - Corporate Product Cyber Emergency Response Team (CPCERT) where he is responsible for defining and governing product vulnerability response.Prior to this role, he handled Product Incident Response and has hands-on experience on Incident Response and Digital Forensics. He also held the positions of Information Security Officer for the APAC region in Schneider Electric.

    The JavaScript ecosystem has become a primary target for sophisticated supply chain attacks, with NPM—the package manager for 3M+ code packages serving billions of installations. This presentation analyses the anatomy of modern NPM compromises, from initial attack vectors through autonomous propagation mechanisms, and provides actionable defence strategies.

    Attendees will understand how attackers exploit NPM's centralized model through phishing (npmjs.help spoofing), CI/CD token theft via infostealer malware, and typosquatting to achieve account compromise. We'll examine the September 2025 attack that compromised a single maintainer account to reach 2.6 billion weekly downloads across 18 packages, and the Shai-Hulud worm that autonomously infected 27,000+ repositories by exploiting transitive dependencies.

    The presentation will dissect the evolving attack workflow: multi‑stage payloads, environmental fingerprinting, GitHub Actions backdoors, credential harvesting via TruffleHog integration, and self‑replicating worm mechanisms that create exponential impact from minimal attacker exposure. Real-world payload analysis demonstrates cryptocurrency theft, cryptomining, and destructive fallbacks.

    Finally, we'll address practical countermeasures: SCA tools with behavioral detection, strict version pinning with lifecycle hook blocking, private registry/proxy implementations, ephemeral token strategies, and organizational incident response playbooks and essential controls as supply chain attacks are expected to scale up.

    June 19, 2026 09:10-09:55

  •  USTLP:CLEAR

    Malicious Code-signing at Scale: How Attackers Impersonate Thousands of Real Businesses and What to Do About It

    Aaron Walton is a Threat Intel Analyst at Expel, responsible for monitoring, tracking, and analyzing trends to help customers disrupt their adversaries. He’s an accomplished malware and threat researcher, frequently contributing to cybersecurity publications and conferences. His interactions with the cyber world are shaped by a lifetime of exposure to other disciplines, such as aviation regulation, compliance, cultural and linguistic anthropology, ethnomusicology, social justice, and world religion. As a career changer, Aaron brings this diverse skillset to his work to share information that aims to equip others in studying, hunting, and foiling bad actors. When he's not at a computer, he is often playing Irish flute in a local pub.

    Code‑signing certificates are meant to indicate that a software application is issued by a trusted party and hasn’t been modified. But what about when attackers have the keys to sign?

    Based heavily on original research, this talk discusses the problem of malicious code‑signing certificates: we will examine the means attackers use to obtain certificates, who is doing it, what malware families are being signed, and the trends over time.

    Defenders can use these same code‑signing certificates to their advantage. We’ll explore how defenders can identify suspicious certificates, the revocation process and value of revocation, and highlight the additional research and detection opportunities that allow defenders to flip‑the‑script and make code‑signing a liability for threat actors rather than an asset.

    June 16, 2026 15:25-16:00

  •  USTLP:CLEAR

    Mind Over Malware: Reducing Decision Fatigue in Incident Response Teams

    John Hollenberger is a seasoned cybersecurity consultant with over 19 years of experience helping organizations strengthen their defenses and prepare for the realities of today’s evolving threat landscape. Throughout his career, John has guided clients through complex security challenges — from building proactive security strategies to leading high-impact incident response efforts.

    As the Lead Consultant of Proactive Services at Fortinet, he works closely with organizations to enhance their readiness, resilience, and ability to respond effectively when incidents occur. John is deeply committed to educating others on the importance of preparation, collaboration, and continuous improvement in cybersecurity. He holds a range of industry certifications, including CISSP, GCIH, GWAPT, CISA, CISM, CRISC, and Security+.

    Jennifer Trujillo Hollenberger, PhD, LCSW is an Associate Professor of Social Work and the BSW Program Director at Grove City College in Grove City PA. She earned an MSW from the University of Pittsburgh and her PhD in Social Work from Baylor University. She has over 15 year of clinical practice experience in mental health, 10+ peer reviewed publications, and lives with her family in Pittsburgh PA.

    Incident response is high-stakes, fast-paced, and information-dense. Teams often make critical decisions while stressed, multitasking, and operating with incomplete information. These conditions can lead to decision fatigue, cognitive overload, and errors that prolong incidents or amplify damage. John and Jennifer Hollenberger explore cognitive load in incident response and introduce psychologically-informed strategies and gamified tabletop techniques to improve decision-making, clarity, and team performance. Attendees will learn practical methods to structure exercises, design decision support tools, and manage stress to maintain peak cognitive function during real incidents. Whether your team is large or small, this session provides actionable guidance to reduce mental strain, improve communication, and enhance response outcomes. 

    June 15, 2026 11:00-11:35

  •  RSTLP:CLEAR

    MISP-GPT: Open Source Large Language Models System

    Marko Krstić completed his bachelor, master, and doctoral studies at the School of Electrical Engineering in Belgrade. His topic of doctoral thesis was related to application of AI in recommender systems. He has been working in the field of information technology and security at the Regulatory Authority for Electronic Communications and Postal Services (RATEL) for almost ten years. He is currently serving as the Head of the Cyber Security Division and National CERT Affairs in the RATEL. Marko was part of several projects related to the application of artificial intelligence for children protection on the Internet as well as for digital forensics at the European level.

    MISP‑GPT introduces a fully open‑source approach to integrating Large‑Language Models (LLMs) with the Malware Information Sharing Platform (MISP), without relying on proprietary tools such as Claude Desktop. Built on Ollama, an open‑source platform, and compatible with community MCP (Model Communication Protocol)‑based integrations, MISP‑GPT enables analysts to query, retrieve, and summarize threat‑intelligence data directly from MISP using natural‑language prompts.

    The system can also structure and input new threat‑intel data into MISP, accelerating IOC ingestion and reducing manual overhead. This talk will demonstrate how MISP‑GPT works, compare it with existing MISP‑MCP‑SERVER and misp‑mcp implementations, and show how teams can deploy a secure, local LLM workflow for CTI operations. Attendees will leave with actionable guidance, sample architectures, and practical steps to build their own open‑source LLM‑powered threat‑intel assistant.

    June 17, 2026 11:35-12:20

  •  USTLP:CLEAR

    nx Compromise - AI as an Attack Vector

    Olivia Brown is a cyber threat intelligence analyst at Socket. Previously, she has worked for the US State Department and the US Defense Department in roles focused on cybersecurity. She has a Master's in Strategy, Cybersecurity, and Intelligence from the Johns Hopkins School of Advanced International Studies. She also attended Johns Hopkins for her undergraduate degree, where she double majored in Computer Science and International Studies.

    On August 26, 2025, nx npm packages were compromised in a supply‑chain attack. It was one of the first documented supply‑chain attacks to weaponize Claude, Gemini, and Q Command‑Line‑Interface (CLI) developer tools. The malware stole GitHub tokens, npm credentials, SSH keys, and cryptocurrency wallets from thousands of developer systems within hours, and exfiltrated the data to over 1,000 attacker‑controlled repositories in victim accounts.

    Other novel aspects of the campaign include LLM‑powered reconnaissance, triple‑base64 encoding, and a denial‑of‑service persistence mechanism. This 30‑minute presentation thoroughly explains this attack, how we found it, and what the malware script did. Attendees will learn how to detect AI‑assisted malware in their supply chains, implement defensive scanning strategies, and understand emerging attack vectors that weaponize the very AI tools designed to help developers.

    June 17, 2026 11:35-12:10

  •  KRTLP:RED

    On the Frontline: Inside Adversaries' Infrastructure Before the First Shot Is Fired

    Seulgi Lee is a malware analyst at KrCERT/CC, where he conducts threat hunting on attacks targeting Korea, and shares insights to help prevent incidents and minimize their impact.

    Chanwoong Hwang is a malware analyst at KrCERT/CC, where he specializes in analyzing malware targeting South Korea and focuses on developing AI-driven malware analysis workflows.

    KrCERT/CC presents a study using data from a Korean free DNS provider that has been abused by multiple threat actors, including groups such as Kimsuky and Andariel, since 2016. By accessing account, domain, DNS, and login‑log data, KrCERT/CC analyzed how attackers created and maintained their infrastructure before launching attacks.

    We automated pivots from malicious domains to the accounts that created them and then to additional domains registered by those accounts, profiling and clustering the accounts using connected IPs, passwords, and naming themes to refine attribution of threat actors and uncover relationships between groups.

    This study analyzes threat‑actor behavior in managing their infrastructure across the domain lifecycle and their operational management tasks, and proposes several implications, including the operational and legal limits of malicious‑domain takedown and the need for collaboration and improved policy to regain the initiative from attackers.

    June 18, 2026 10:55-11:30

  •  TWTLP:CLEAR

    One Poisoned Artifact Can Steer Your AI: How Robust Are Your LLM-Assisted Security Workflows?

    Dr. Yang Cheng-Lin, the data science director at CyCraft Technology, holds a PhD in Artificial Intelligence from the University of Edinburgh. His focus is on security issues in AI applications. His notable work has been featured at prestigious academic conferences like EMNLP and NeurIPS, and his expertise has been showcased at various cybersecurity conferences, including the FIRST CTI Summit, Black Hat USA, Code Blue Japan, HITCon Enterprise, and SINCON.

    Yen-Shan (Lily) Chen is a data scientist at CyCraft Technology, where she currently focuses on research into potential vulnerabilities in Retrieval-Augmented Generation (RAG) frameworks and developing methods to evaluate them. Lily has previously presented at major cybersecurity conferences such as Code Blue Japan and SINCON, and she also published her work at the renowned ACL conference. 

    As SOCs, CSIRTs, and incident‑response teams adopt LLM and RAG systems for alert triage, investigation, and automation, they introduce a new attack surface: data‑level manipulation in the artifacts these systems ingest. This session shows how a single attacker‑crafted item — such as a phishing email, chat transcript, incident note, or external report — can be formatted so that retrieval baits are consistently surfaced by embedding models and malicious instructions are attended to by generative LLMs. Rather than exploiting model internals, attackers simply shape document structure to steer what the system retrieves and what it outputs.

    We will walk through a live, end‑to‑end demonstration of how such an artifact biases retrieval, influences generation, and ultimately alters the analyst‑facing narrative of an investigation. The session concludes with practical, low‑cost defenses that SOCs and CSIRTs can deploy immediately to harden AI‑augmented workflows and detect adversarial influence before it reaches decision‑makers.

    June 18, 2026 14:20-15:05

  •  US NLTLP:GREEN

    Operational Intelligence Starts Here: Structuring Threat Actors & Tools in MISP for AI-Driven Defense

    John Fokker is the Vice-President Threat Intelligence Strategy at Trellix, where he and his team drive a cross-functional mission to detect, understand, and disrupt cyber adversaries—delivering intelligence-led outcomes for customers, products, and global partners. Prior to joining Trellix, he served with the Dutch National High-Tech Crime Unit (NHTCU), the Dutch National Police unit dedicated to investigating advanced forms of cybercrime. Over the course of his career, he has supervised numerous large-scale cybercrime investigations and takedowns. Fokker is also a co-founder of the NoMoreRansom Project and a member of the Europol EC3 advisory group on Internet Security.

    Mo Cashman is one of Trellix’s senior leaders in cyber security. Mo’s passion is to inspire our next generation security leaders, build impactful teams and programs, and help customers architect security solutions for future resilience. As a Field CTO at Trellix, Mo advises our largest global customers and partners on their cyber threat management, security operations and zero trust strategies. With that passion and 25 years of experience, Mo also leads Solutions Engineering teams, global technical and customer programs, and advises Trellix senior leaders on future product strategy. In previous roles at McAfee and Intel, Mo was the Chief Technical Strategist for the Global Government program and just prior to joining the company, lead Computer Emergency Response Teams doe Defense customers investigating and responding to sophisticated cyber threats.

    Modern defenders are drowning in indicators but starving for context. Most CTI sharing still relies on loose IoCs and unstructured notes that are impossible to operationalize at scale — let alone feed into AI systems. This talk presents a practical, open approach to transforming MISP from an indicator repository into a structured, AI‑ready threat‑intelligence backbone.

    We show how to model threat actors, tools, campaigns, and TTPs using MISP objects, galaxies, and relationships to create a consistent, machine‑readable knowledge layer. This framework enables automated enrichment, faster correlation, and more reliable detection engineering by shifting the focus from isolated indicators to behavioral intelligence.

    As part of the session, we release our public GitHub repository containing reusable actor and tool models so teams can immediately adopt — and contribute to — the same structured approach. The talk ends with a call to action: if we want scalable, AI‑assisted incident response, we must standardize how we model threats. MISP gives us the foundation; the community provides the momentum.

    June 15, 2026 11:50-12:25

  •  USTLP:CLEAR

    Panel: From Takedown to Touchpoint: An Inside Look at the Data-sharing Pipeline in the Victim Notification Processfor International Law Enforcement Cybercrime Disruption Operations

    Tod Eberle is the Alliance Director at The Shadowserver Foundation, a nonprofit cybersecurity organization. Shadowserver collects cyber threat data at Internet-scale and distributes free daily network remediation reports to help 10,000+ organizations and National CSIRTs covering 175 countries secure their networks. Shadowserver also provides free support to many of the world’s most significant international Law Enforcement cybercrime disruption operations. Tod leads Shadowserver’s Alliance Partnership, a community of like-minded organizations that support Shadowserver’s nonprofit mission and work collaboratively to share information and address the latest cyber threats.

    Prior to joining Shadowserver in 2023, Tod served for 19 years as a U.S. Department of Justice prosecutor where he specialized in investigating, prosecuting, and disrupting cybercrime activities committed by organized criminal groups and nation-state threat actors.

    The panel will examine the operational means and challenges in each stage of the data‑sharing pipeline of the victim‑notification process associated with international law‑enforcement cybercrime takedowns and disruption operations. The panelists will include a federal law‑enforcement officer, a representative of the Shadowserver Foundation, and a representative of a National CSIRT, who each will provide their unique perspectives on the victim‑notification process from start to finish.

    The discussion will include their respective roles in the data‑sharing pipeline; the current framework in place for sharing victim data on a global scale; the various operational means by which each entity shares data with third parties; limitations on data sharing due to legal, technical, and jurisdictional factors; overcoming challenges that arise in the process; and the impact of Early Warning Services and similar mechanisms by which National CSIRTs can most effectively share victim data with ISPs and help make notifications to end‑user victims.

    June 15, 2026 14:40-15:25

  •  USTLP:CLEAR

    Peak Performance Under Pressure: Building Cross-Functional Resilience in Incident Response

    Merisa Lee is a seasoned security professional with over 27 years of experience in technology, including more than 15 years in cybersecurity. She has served as an engineer, people manager, and technical program manager, leading defensive operations and major incident response efforts at global companies such as Amazon, Meta, Cisco Meraki, DoorDash, Uber, Dell, and Okta.

    Merisa specializes in building sustainable security programs, developing confident and empathetic leaders, and improving communication between security teams and executive stakeholders. Her experience across technical and leadership roles has shaped her practical approach to managing crises, fostering psychological safety, and guiding organizations toward long-term operational resilience.

    Brooke Pearson is a senior security leader. She’s celebrated across the industry for helping teams build adaptive security strategy while managing cross-functional risk, and improving organizational response capabilities at Facebook, Uber, and Google. Her background spans incident response, operational resilience, and large-scale coordination across global teams. Brooke frequently works at the intersection of engineering, policy, and human factors, and has a strong interest in building trust, shaping governance, and aligning diverse teams during high-pressure events.

    Div Joshi is a seasoned security professional with over 12 years of experience across Digital Forensics, Incident Response, Threat Intelligence, and Vulnerability Management. She has built and scaled multiple security programs from the ground up, helping organizations navigate emerging threats with clarity and precision. Div is an active contributor to the security community and has spoken on topics including intelligence-driven detection, incident management, and building effective security programs. She remains committed to advancing the field and supporting practitioners working to strengthen the security ecosystem.

    Melanie Ensign is a renowned communications strategist specializing in security, privacy, and risk. As founder and CEO of Discernible, she advises some of the world’s most recognized brands on incident communication, stakeholder trust, and organizational transparency. Previously, Melanie led global security, privacy, and engineering communications at Uber and served in key security communication roles at Facebook and AT&T. She brings deep expertise in navigating high-impact incidents, communicating uncertainty responsibly, and guiding executives through complex security crises.

    Most incident response plans are designed for disasters, but these comprehensive frameworks often gather dust until a crisis strikes. Security incidents aren't rare catastrophes; they’re daily realities that occasionally escalate. This creates a dangerous paradox: IR plans that only activate once the business panics can become self‑fulfilling prophecies, broadcasting chaos through sudden behavioral changes and leaving teams unprepared.

    This panel reunites four leaders who forged their IR philosophy in the trenches at Uber and have since operationalized it at Okta, Google, Cisco Meraki, and across Web3 security. We’ll share hard‑won lessons on embedding incident‑response methodologies into daily operations so teams practice constantly, build organizational trust before crises hit, and establish decision‑making authority in advance.

    Attendees will leave with practical strategies to collapse the distance between daily ops and incident response, turning resilience from an aspiration into organizational muscle memory.

    June 17, 2026 09:40-10:25

  •  ARTLP:GREEN

    Practical AWS Antiforensics

    Former Police Officer from Argentina, now a Cloud Incident Responder and Security Engineer with over 10 years of IT experience. A Digital Nomad and international speaker, I've presented on Cloud Security and Incident Response at Ekoparty, FIRST, Virus Bulletin (three times), Hack.Lu, and various BSides events worldwide. I hold a Bachelor's degree in Information Security and an MBA (Master in Business Administration).

    What’s more frightening than a 0‑day? A series of false negatives combined with a false sense of security in an unprepared Security Operations Team. Today, most AWS detection and response strategies rely on CloudTrail and GuardDuty, with logs shipped to a SIEM — the heart of security monitoring. But few teams account for the complexity of this supply chain: multiple moving parts, permissions, policies, and inevitable delays. These blind spots create opportunities for attackers to quietly dismantle detection controls.

    In this demo‑driven talk, I’ll explore the concept of Cloud Antiforensics. Using a real scenario with AWS API calls shipped to Datadog and a decoupled GuardDuty instance reporting to Discord, I’ll show how an attacker can disrupt log collection and evade detection within the delay window. The goal is not just to demonstrate attacks, but to raise awareness: centralizing everything in a SIEM is not enough. We must design anti‑antiforensics mechanisms that operate independently, ensuring resilience even when attackers target the detection pipeline itself.

    June 19, 2026 10:00-10:45

  •  USTLP:GREEN

    Proactive Defense and Collective ISAC Collaboration within Critical Infrastructure

    With over 15 years of experience in cyber and physical security, Zach Nelson currently serves as the Vice President of Health-ISAC's Threat Operations Center. He leads and mentors a global Threat Operations Center (TOC) responsible for producing and disseminating actionable cyber, strategic, and physical threat intelligence. Zach's leadership is instrumental in assisting Health-ISAC members in reducing their attack surface and significantly enhancing their security defenses. Furthermore, as the Health-ISAC liaison, he spearheads collaboration and innovation across the Cyber Threat Intelligence Program Development, Insider Threat, and Business Information Security Officer (BISO) working groups. His efforts drive these vital intelligence initiatives' ongoing refinement and success to support Health-ISAC membership. Zach holds a Master of Science in Cybersecurity and various certifications in cybersecurity, cyber threat intelligence, security operations, and incident response.

    Ethan Muntz is a Strategic Threat Analyst at Health-ISAC. Combining interest in cybersecurity issues with international experience and intensive cybersecurity studies, Ethan aspires to bring unbiased trend analysis to the Health-ISAC membership. Ethan has spearheaded many strategic initiatives, such as joint research with members, a biweekly geopolitical newsletter, and monthly deep-dive reports into influential policy. Ethan also acts as the Health-ISAC liaison in joint research into the developing security risks facing healthcare, such as AI model poisoning and large-scale social engineering. Finally, Ethan facilitates two working groups at Health-ISAC, the Artificial Intelligence Working Group and the Regional Tensions Working Group.

    Join us for an engaging session that shares key findings from the 2025 Annual Threat Report, with a specific focus on the maturation of ransomware campaigns and the evolving tactics of cybercriminal operations targeting critical health‑sector infrastructure.

    The session will include insights into recent operations that successfully disrupted phishing and adversary tooling infrastructure. The session will also include insights from targeted alerts, demonstrating the value of proactive intelligence sharing in reducing vulnerabilities and maintaining business resilience.

    We will close the session by highlighting the role of ISAC collaboration for coordinating defenses against complex supply‑chain risks. Participants will receive actionable strategies for implementing targeted intelligence and collective defense measures.

    June 18, 2026 11:35-12:10

  •  JPTLP:CLEAR

    Proactive EDR Against Adaptive Evasion: Countering Self‑Modifying Agentic Malware

    Hiroaki Toyota is an AI Researcher at LAC Co., Ltd., specializing in Agentic AI and AI Safety within the cybersecurity domain. He leads research and development efforts to enhance security operations through AI automation and ensures the safe implementation of AI systems. Mr. Toyota possesses extensive knowledge of AI mechanisms, having previously served in R&D roles focused on machine learning and deep learning algorithms at an AI startup. He recently presented his high-impact research on Agentic AI for Offensive Security at the prestigious CODE BLUE 2025 (Tokyo, Japan), delivered in English, highlighting his expertise in solving complex, practical security challenges.

    Traditional defense models may soon face a formidable challenger: Self‑Modifying Agentic Malware, LLM‑guided code that continuously rewrites itself in response to local conditions, aiming to sidestep Endpoint Detection and Response (EDR). This talk presents a safe, containerized adversary‑emulation rig that demonstrates the observe–plan–act loop and showcases likely ATT&CK‑aligned techniques, from file‑less memory residence and process injection to polymorphic payloads and covert cloud‑based C2.

    We then outline a Proactive EDR strategy built on five pillars, prominently featuring AI‑driven Intent‑Centric Correlation alongside sensor‑integrity checks, dynamic deception assets, moving‑target hardening, and risk‑based automated containment. Replayable telemetry, sample detection rules, and concise playbooks will be shared, enabling participants to reinforce their SOCs quickly with tool‑neutral methods and AI‑assisted analytics before this adaptive threat moves from laboratory proof‑of‑concept to real‑world incidents.

    June 18, 2026 15:05-15:40

  •  USTLP:CLEAR

    Protecting Customers Through Smarter OSS Management

    Dr. Lisa Bradley is a distinguished cybersecurity expert and visionary leader, currently serving as the Senior Director of Product & Application Security at Dell Technologies. With over two decades of experience in enterprise-class engineering, including 13 years in product security leadership, Dr. Bradley has established herself as a trailblazer in the field of cybersecurity and vulnerability management. In her current role, she leads Dell’s Product Security Remediation efforts, driving initiatives such as Vulnerability Response/PSIRT, post-GA security findings remediation, the Bug Bounty Program, Product 360 Risk, and Dependency Management. She also plays a pivotal role in supporting Dell’s Software Bill of Materials (SBOM) initiative, ensuring transparency and security across the product lifecycle. Her commitment to advancing the cybersecurity industry extends beyond her corporate responsibilities. She is a frequent speaker at industry events and podcasts, and a proud co-author of the FIRST PSIRT Services Framework, contributing to global standards in incident response. Outside of her professional endeavors, Dr. Bradley enjoys spending quality time with her three children and friends. Her unwavering dedication to cybersecurity, combined with her leadership and advocacy, continues to inspire innovation and build trust in the ever-evolving landscape of technology and cyber defense.

    Patricia Tarro is the Product Manager for Dependency Management at Dell Technologies. In this role, she is responsible for building and maintaining a platform that modernizes and adds efficiency to existing Dell processes related to the assessment of internal and external component security risk in product releases. Tricia has over 30 years of Information Technology experience, having spent the most recent years in Dell’s Product and Applications Security team. In 2020, she earned a master’s degree in Administration of Justice and Homeland Security with a concentration in Cybersecurity and Intelligence. Currently she is pursuing a doctoral degree in Homeland Security at St. John’s University in Queens, NY. Her research focus is software supply chain security. Tricia is the Branch Assistant for Supply Chain Risk Management in the U.S. Coast Guard Auxiliary Cybersecurity Directorate.

    As organizations increasingly rely on Open Source Software (OSS) to drive innovation, strong security practices are critical to safeguarding customers. This session provides a practical roadmap for building a mature OSS security strategy — from defining trusted OSS and maintaining secure repositories to generating Software Bills of Materials (SBOMs) for visibility, dependency tracking, incident response, and end‑of‑life planning.

    Drawing on real‑world lessons from Dell Technologies’ OSS security journey, we’ll share challenges faced, strategies implemented, and actionable insights for creating a scalable, resilient framework. Attendees will learn how to select trustworthy OSS, proactively address vulnerabilities, and stay current with secure versions — transforming OSS management from a compliance task into a strategic advantage.

    Whether you’re starting your OSS program or looking to strengthen it, this talk equips you with the tools to protect customers and secure your open‑source future.

    June 18, 2026 13:30-14:15

  •  JP TWTLP:AMBER

    PSIRT 2.0 in Action: Implementing Agentic AI Architecture for Autonomous Operations

    Hikohiro Lin had been in charge of Product Security at Panasonic headquarters for over 15 years. He led several projects, including devising and deploying security test methods and risk assessments for IoT devices, formulating product security standard rules and guidelines, building a global product security system, formulating head office product security strategies, establishing Panasonic Cyber Security Lab for future cybersecurity research and product-focused security incident responses team, etc. He had served as Head of Panasonic PSIRT, Head of Product Security at Panasonic Global, and Director of Panasonic Cyber Security Laboratory. Also, He has received (ISC)² ISLA(Information Security Leadership Achievement)APAC Senior Information Security Professional 2018 Showcased Honoree and Community Service Star. He is Review Board member of HITCON and HITB(Hack In The Box) and a much used cyber security speaker at many international conferences such as Black Hat, CODE BLUE, Kaspersky Security Analyst Summit (SAS), HITCON and Government invited roundtable Panelist. He is currently appointed to Sr. Executive Officer of GMO Cybersecurity by IERAE, Inc.

    Ken Lee is a security professional who serves as both an Independent Security Advisor and a Security Consultant at Amazon Web Services. He provides vulnerability response and cloud security governance consulting expertise in his independent role. Prior to AWS, Ken served as the Product Security Officer at Synology, where he led the Bug Bounty Program and the Security Incident Response Team, overseeing critical security operations across the organization. Ken's industry leadership includes serving on the program committee of the 36th Annual FIRST Conference and VulnCon 2026. He has been an active contributor to the security community, sharing his expertise in Product Security and CVE Program management through speaking engagements and community initiatives.

    Kosuke Ito is an IoT security expert with over 15 years of experience and was the first PSIRT leader founding the product security activities at JVCKENWOOD Corp. before joining GMO Cybersecurity by IEARE. He had led several projects to found the basic security activities, including formulating corporate product security policy, strategies and product security standard rules and guidelines including deployment of security test methods and risk assessments for IoT devices, formulating product security incident response system (PSIRT) and guidelines, and developing the product security educational materials and delivering seminars group-wide, etc. He had played a key role in promoting group-wide product security at JVCKENWOOD. He also founded a manufacturing industry-wide product security promotion council and played a key role in developing the IoT security certification program, the first in Japan.

    The PSIRT 2.0 vision promises AI‑assisted ecosystem coordination to address the sustainability crisis facing product‑security teams: 40,000+ annual CVEs, complex supply chains, and unprecedented regulatory pressure from EU CRA, NIS2, and global SBOM mandates. However, early implementation attempts reveal a critical tension: PSIRT decisions require precision that pure AI automation cannot guarantee, yet human‑only operations cannot achieve the necessary scale.

    This presentation concludes our three‑year trilogy at the FIRST Annual Conference, progressing from understanding Japan’s manufacturing readiness (2024), introducing PSIRT 2.0 with generative‑AI foundations (2025), to demonstrating practical agentic‑AI implementation with essential human oversight (2026).

    This session presents architectural patterns and findings from developing augmented‑intelligence systems that balance automation with human judgment, and provides practical blueprints for organizations seeking to implement PSIRT 2.0. Building on our 2025 Retrieval‑Augmented Generation (RAG) demonstrations, we present the evolution to multi‑agent systems that automate complex PSIRT workflows while maintaining human insight for critical decisions.

    Our research reveals that while 85% of APAC PSIRTs operate with fewer than five members, agentic AI can amplify their capabilities — but only when guided adequately by human expertise.

    June 18, 2026 10:55-11:30

  •  CATLP:CLEAR

    Seeing Through the Fog: Interpreting Entra ID Signals During AiTM Attacks

    For the past decade, I’ve worked with SOC teams of all sizes to help them detect, investigate, and respond to modern threats. My primary focus is the Microsoft identity stack (Entra ID and the full suite of on-premises Active Directory technologies). I specialize in understanding attacker tradecraft and translating it into practical detection strategies for defenders. When I’m not helping my customers with their cyber fires, I’m creating and teaching technical workshops and helping large organizations deploy Zero Trust architecture.

    This session focuses on what AiTM activity looks like inside Entra ID: the key authentication events, token behaviors, and anomalies attackers leave behind. We then cover how to surface and interpret these signals, using KQL only as an example to navigate telemetry (especially since Entra ID logs are often unclear or incomplete).

    Attendees leave with a clear takeaway: practical patterns, investigative cues, and a short list of effective mitigations to quickly detect and block AiTM techniques in real environments.

    June 19, 2026 09:10-09:55

  •  TWTLP:GREEN

    Shattering the Compliance Illusion: Operationalizing Adaptive Multi-Turn Red-Teaming for Enterprise AI Assurance

    Kuan-Lun Liao is a data scientist at CyCraft Technology responsible for applying various NLP techniques to solve cybersecurity issues, focusing on AI system compliance testing and automated threat intelligence integration. He was a speaker at FIRST CTI, CYBERSEC, and SECCON. His work has been published in ICML, ICLR, and AAAI, three of the world's leading machine learning conferences.

    Dr. Yang Cheng-Lin, the data science director at CyCraft Technology, holds a PhD in Artificial Intelligence from the University of Edinburgh. His focus is on security issues in AI applications. His notable work has been featured at prestigious academic conferences like EMNLP and NeurIPS, and his expertise has been showcased at various cybersecurity conferences, including the FIRST CTI Summit, Black Hat USA, Code Blue Japan, HITCon Enterprise, and SINCON.

    Modern enterprises are deploying LLMs into high‑risk workflows at a rapid pace, yet many rely on static, single‑shot testing to satisfy compliance requirements. This approach creates a dangerous illusion of safety. Our research into real‑world deployments, including a top‑tier medical institution and a leading enterprise AI provider, reveals that over 90% of vulnerabilities remain invisible to static tests, surfacing only through adaptive, multi‑turn interaction.

    This session introduces an automated operational framework for Adaptive Multi‑Turn Red‑Teaming. We apply a closed‑loop validation model where testing strategies evolve based on model refusals to uncover hidden risks like policy disclosure and jailbreaks. Attendees will learn how to integrate this methodology with the OWASP AI Testing Guide, transforming theoretical checklists into continuous, resilient security controls within their SDLC and MLOps pipelines.

    June 17, 2026 14:20-14:55

  •  TWTLP:GREEN

    Short Videos, Crypto, and Crime: Inside the Chinese-Speaking Malware Ecosystem

    Linda Kuo is currently a Senior Threat Intelligence Analyst working in TeamT5. She devoted herself to cyber intelligence research especially in APT attacks and Chinese cybercrime underground market. She is also a frequent speaker at international conferences and private seminars, including BHA, HITB, CODEBLUE, etc.

    Li-an Huang is a CTI Analyst at TeamT5. His research interests include Information Operations (IO), Advanced Persistent Threats (APTs), and China’s cyber ecosystem. Before joining TeamT5, he worked as a legislative assistant at Taiwan's Parliament.

    Telegram has emerged as a major hub in the underground cybercrime ecosystem. In this talk, we present firsthand observations from our analysis of how malware is advertised and sold in Chinese Telegram channels. As short‑video platforms and cryptocurrency apps gain popularity, we’ve seen threat actors increasingly exploit these trends to trick users into installing malicious software.

    We will share two recent campaigns — one aimed at users in China and Malaysia, and another targeting South Korea — both of which distribute trojanized APKs masquerading as legitimate apps. By examining these operations, we aim to clarify how threat actors function in these regions and how they leverage trusted platforms to broaden their reach.

    June 16, 2026 09:00-09:35

  •  DETLP:AMBER

    Sliding into the Enemy’s DMs: Detecting SaaS-Backed Malware C2

    Patrick Staubmann joined VMRay in 2019 as a Threat Researcher and has been leading the Threat Analysis team for over two years now. His work focuses on researching the evolving threat landscape and performing in-depth malware analysis, with interests in reverse engineering, low-level system security, and exploitation. In addition, he lectures at university on Network Security, System Exploitation, and Low-Level Programming.

    Threat actors increasingly “live off the SaaS land” by abusing well‑known collaboration and gaming platforms as covert command‑and‑control (C2) channels. This talk presents findings from ongoing research into e‑crime malware families that use services like Telegram, Discord, Steam, and others for C2, exfiltration, and dead‑drop resolving.

    By leveraging a malware sandbox with full visibility into decrypted TLS traffic, we analyze how these families structure their communication: API usage, message formats, embedded configuration data, and the delivery of second‑stage payloads via legitimate services. From these patterns, we derive network‑level fingerprints and YARA rules on plaintext traffic that enable robust detection, hunting, and clustering of related malware families.

    Finally, for cases where blocking these services is not feasible, we discuss realistic options for SOC analysts and incident responders on how to operationalize SaaS‑backed C2 telemetry in incident‑response workflows.

    June 16, 2026 11:45-12:20

  •  GR LTTLP:GREEN

    Standing Strong in a Cyber Crisis: The Assurance Every Organization Must Have

    Ms. Andrea Dufkova is a senior cyber security expert at the European Union Agency for Cyber Security (ENISA), where she has driven the development of CSIRTs and strengthened incident management capabilities across Europe since 2008. A certified SIM3 auditor and long-standing member of TF-CSIRT and FIRST, Andrea brings first-hand expertise in operational readiness, crisis coordination, and maturity assessment. She has led high-impact ENISA initiatives, including operational training programmes, the CSIRTs Network Secretariat, the Cyber Partnership Programme, and the EU Cybersecurity Reserve. With a track record of shaping pan-European crisis response and collaborating closely with governments, industry and global cyber communities, Andrea offers a strategic and practical perspective on how organizations can build resilience and maturity to face emerging cyber crises.

    Dr. Vilius Benetis is a cybersecurity capacity building expert who leads a team of experts to consult, establish and modernise CSIRTs/SOCs for governments, organisations and sectors in Africa, Asia, Europe and Latin America. He is an active contributor to the development of practical cybersecurity methodologies for FIRST.org, GFCE, ITU, and ENISA.

    To ensure resilience, all organizations must maintain the continuity of their most important business processes and develop incident‑response capabilities. These are needed to handle all kinds of crises, i.e., adverse events that strongly impact an organization's ability to execute. However, the current unpredictable nature of cyber threats and the emergence of new attack methods create uncertainty for managers. Are organizations ready to handle the next cyber crisis effectively?

    This presentation will introduce ENISA's new Cyber Crisis Maturity Model, which is aligned with SIM3. Through real‑world examples, it will demonstrate the model's practical value and explain the assurance it provides. The presentation will show how such a model can benefit SOCs, CSIRTs, and CISOs in achieving their objectives.

    June 16, 2026 09:00-09:35

  •  USTLP:GREEN

    Stripe's Insider Threat Common Controls Framework

    Shauna is a Security Investigative Analyst focused on maturing Stripe's Insider Threat program. She transitioned to tech after nearly five years as an FBI Intelligence Analyst, first tackling trust and safety at Meta before specializing in insider risk at Stripe. When not at work, you can usually find her outside, either running with her pitbull, regardless of the Wisconsin seasons, and/or gardening when the seasons allow.

    Josh is an engineering manager with +10 years of experience in security, having led teams at Stripe and Facebook focused on insider threat detection and incident response. Prior to working in tech, he freelanced as an interpreter and translator for Spanish < > English. When not at his desk, he enjoys cycling, PNW nature, and handling a stubborn Bernese Mountain Dog named Snickers.

    Managing insider risk is a complex challenge, often leaving security teams with reactive, hard‑to‑measure programs. This presentation details the journey of developing and implementing a bespoke maturity‑assessment model: Stripe’s Insider Threat Common Controls Framework (ITCCF).

    We will explore the core principles that guided its creation, from its foundational pillars of Prevention, Detection, and Response, to the five‑level maturity scale used for assessment. This presentation will focus on the process: how we identified key controls, benchmarked them against industry standards, and built a framework tailored to our organization’s unique risks.

    Attendees will gain insight into how Stripe has utilized this framework to methodically assess insider‑threat controls, using the findings to drive cross‑functional priorities within the insider‑risk space.

    June 16, 2026 09:40-10:25

  •  CATLP:GREEN

    Syndicate: The Life of a Ransomware Affiliate

    Tammy Harper is a Senior Threat Intelligence Researcher at Flare, specializing in dark web ecosystems, ransomware affiliate operations, and adversary psychology. Her work combines technical analysis with narrative and sociological approaches to understand how modern cybercriminals think, organize, and operate. Tammy regularly presents at international conferences and leads workshops on cybercrime operations, cryptocurrency investigations, and adversary tradecraft. Her prior talks, including Persona Theory, explore the human dynamics behind threat actors, blending intelligence analysis with storytelling to make complex underground systems accessible and actionable for defenders.

    Ransomware is a gig economy fueled by ego, rivalry, and burnout. Syndicate exposes the actual human workflows behind modern RaaS operations. With in‑depth analysis of leaked internal RaaS chat logs, playbooks, and wallet tracking, this talk reconstructs the daily grind of the modern RaaS affiliate.

    We track the evolution of three distinct operator archetypes:

    • The Skid: hunting for opportunistic shortcuts and quick flips.
    • The Mid‑Tier Merc: balancing tooling investment, reputation, and the hustle.
    • The Syndicate: navigating bureaucracy and betrayal within cartels like Conti, BlackBasta, and LockBit.
    • Through POV storytelling and reconstructed operational artifacts, we will dissect how these actors actually approach reconnaissance, negotiation, and OPSEC — and where they screw up.

    We will explore the psychology and external influences — like greed, social pressures, and geopolitics — that shape the human behind the keyboard. Defenders will leave with a realistic mental model of the affiliate lifecycle, identifying exactly where to disrupt operations before the threat actors come knocking.

    June 16, 2026 09:40-10:25

  •  US GBTLP:CLEAR

    Tabletop Lessons from 3 Decades and 2 Continents

    Kenneth R. van Wyk is an internationally recognized information security expert and author of three popular books, Enterprise Software Security, Secure Coding, and Incident Response. In addition to providing consulting and training services through his company, KRvW Associates, LLC (https://KRvW.com). He also currently is a faculty member at IANS Research (https://iansresearch.com) and a visiting scientist at Carnegie Mellon University’s Software Engineering Institute.

    Ken served 11 years on the Forum of Incident Response and Security Team’s (FIRST, https://first.org) Steering Committee and Board of Directors. Ken was previously the project founder and leader of the Open Web Application Security Project (OWASP) iGoat project (https://github.com/owasp/igoat) and served 10+ years on the Board of Directors for SecAppDev (http://secappdev.org).

    Ken has over 30 years experience as an IT Security practitioner in the commercial, academic, and military sectors. He has held executive and senior technologist positions at Tekmark, Para-Protect, Science Applications International Corporation (SAIC), the U.S. Department of Defense, Carnegie Mellon University, and Lehigh University.

    At Carnegie Mellon University’s Software Engineering Institute, Ken was one of the founders of the Computer Emergency Response Team (CERT®). He holds a mechanical engineering degree from Lehigh University and is a frequent speaker at technical conferences, and has presented tutorials and technical sessions CSI, ISF, USENIX, FIRST, AusCERT, and others.

    Elliott Atkins is the founder of Exercise3, an NCSC-UK assured provider of cyber incident exercising which uses realistic scenarios to help organisations test and improve their cyber incident preparedness. Prior to founding Exercise3, he held a series of senior roles, including Head of the UK Government’s Computer Emergency Response Team (GovCertUK), Head of Cyber Intelligence at QinetiQ and Head of Incident Response at Nominet, the UK top-level domain registry.

    Elliott is a Professor of Practice at the University of Wales Trinity Saint David, a Fellow of the British Computer Society and a FIRST Liaison Member. He was appointed by Her Majesty the Queen as the first Chief Information Security Officer to the Royal Household in 2021.

    The authors have decades of experience in incident response operations as well as in building and delivering realistic tabletop exercises across two continents. In this session, they dive deeply into the most common and painful lessons they've observed, and how to prevent them.

    June 17, 2026 13:30-14:15

  •  USTLP:AMBER

    Tackling Bulletproof Hosting: Cutting off the Facilitators

    Matt is a seasoned anti-abuse advocate with over a decade of experience in email, cloud hosting, and general internet abuse. The internet community is where Matt’s passion lies. By coming together and sharing lessons learned, Matt believes that this community has the power and means to combat abuse on the internet. As Spamhaus's Community and Industry Partnerships representative, Matt gets to put his experience into practice, working alongside a multitude of companies, organizations, governments and law enforcement to drive forward Spamhaus's mission of making the internet a safer place for everyone.

    Present‑day bulletproof hosts (BPHs), particularly those based in Western jurisdictions, are increasingly operating through distributed structures. By distributing key functions across multiple business entities, they obscure responsibility for abusive activity, becoming far more resistant to takedowns. What was once an advantage — owning everything from datacenter to virtual machines — has become a liability to BPHs, pushing them toward fragmented, disposable infrastructures.

    In this TLP:AMBER session, we will present two case studies of distributed BPHs, and:

    • Show how they evade anti‑abuse countermeasures.
    • Discuss ways to incentivize cybercrime facilitators to adopt stronger vetting and abuse prevention.
    • Explain Spamhaus’s approach to balancing protection, increasing costs for bad actors, and coordinating with law enforcement and the infosec community.

    June 18, 2026 10:55-11:30

  •  JPTLP:CLEAR

    Technical Recovery Plan (TRP) Exercise in a Cloud-Native Environment: Practical Lessons from a Ransomware Scenario

    MORINO Masanori is a member of KINTO Technologies’ Security & Privacy Department and also contributes to the Toyota Financial Services IS Team. His work focuses on product security and security governance, and he joined KINTO Technologies in July 2022. He developed an interactive information security education program using board games, applying participatory methods to make security risks tangible and relatable across departments, including the use of generative AI to craft realistic training scenarios.

    This session presents a practical case study of conducting a Technical Recovery Plan (TRP) exercise in a cloud‑native environment, triggered by a real‑world ransomware incident. The presentation covers the background and motivation for the exercise, the preparation process — including scenario design, product selection, and recovery planning — and the execution of the training itself.

    Special attention is given to risk assessment and recovery strategies for AWS Aurora DB, as well as the challenges faced in restoring encrypted data and maintaining business continuity. Key lessons learned include the importance of clear communication, efficient information sharing, administrator‑account protection, and defining service‑level agreements (SLA) for recovery.

    Attendees will gain actionable insights into operationalizing incident‑response methodologies and strengthening organizational resilience against ransomware and other cyber threats.

    June 18, 2026 11:35-12:10

  •  ILTLP:CLEAR

    The AI Assistant’s Betrayal: One-Click for AI to Turn into the Perfect Insider

    Dolev Taler is a senior security researcher at Varonis threat labs with over a decade of cybersecurity experience spanning red teaming, reverse engineering, vulnerability research, and malware analysis. He is passionate about machine learning and its pivotal role in modern threat detection, having developed advanced detection models, investigated ransomware attacks for major global enterprises, and reported vulnerabilities in critical infrastructure systems. Beyond tackling high-stakes cyber threats, Dolev also enjoys perfecting the art of coffee brewing and improving his lock-picking skills.

    Mark Vaitsman, Security Research Team Leader – https://www.linkedin.com/in/mark-vaitzman/ Spoken at BlackHat USA 2025 Navigating the Identity Crisis: Why Authentication Keeps Failing. (recording available at BlackHat) Presented a research of “Beyond Flesh, Beyond Code: LLM based attack lifecycle with self-guided agent”, https://vimeo.com/1035325824. Presented at CrestCon twice, multiple Meetups, Webinars – available in Youtube, BrightTalk. Additionally, I am a Lecturer in a few Cyber Security colleges.

    AI assistants feel like trusted companions — we share sensitive data, seek advice, and rely on them without hesitation. But what happens when that trusted companion turns into an insider threat with just one innocent click?

    In this talk, we reveal a family of vulnerabilities we discovered in widely used AI assistants — among the most dangerous identified in the AI era, both for their ease of exploitation and their potential impact.

    This session spotlights PromptJack, a one‑click attack that turns a harmless link into a data‑exfiltration weapon. This technique takes advantage of how AI assistants interpret link‑based input, making them execute hidden instructions automatically — leaking confidential data and even sending it to an attacker‑controlled server.

    We’ll explore:

    • How employing prompts as parameters in AI platforms can lead to unforeseen risks.
    • Two critical vulnerabilities:
      • MS Copilot Exposure: A single click can unlock the entire user conversation history and stored memories.
      • Rovo Insider Threat: Atlassian’s AI assistant weaponized to leak PII and organizational secrets through crafted links.
    • Why 1‑click attacks can be more devastating than 0‑click exploits.

    Beyond showcasing these attacks, we’ll discuss real‑world implications and outline practical defense strategies for users and enterprises. Finally, we’ll provide guidance for security researchers on identifying other platforms vulnerable to PromptJack.

    June 19, 2026 11:00-11:45

  •  USTLP:GREEN

    The Art of the Notification

    Daniel Gordon, CySA+, CISSP, CEH, GCIA, GCTI, GCFA is a cyber threat intelligence analyst with a background in network defense, digital forensics, incident response, and IT support. He has degrees in Political Science as well as Modeling and Simulation. He has published blogs in Dark Reading, War on the Rocks, and Risky.biz and spoken at a large number of events including MTEM, FTSCon, and SleuthCon.

    My name is Daniel Gordon and I am a security researcher and expert on North Korean hacking. This message is to let you know that you have a serious problem and I encourage your team to take appropriate steps or relay this message to the correct individual. This talk is about the art of notification. Periodically security researchers will come across evidence of the successful or attempted compromise of an individual or organization. I certainly have, as part of analyzing North Korean activity for most of the past 10 years in both public and private sector. This talk will explore the decision about whether to perform a victim or target notification, the best approaches to conducting notifications, what information to include, and how to handle a notification when you are on the receiving end. This presentation will include some real-world examples (anonymized) of notifications gone right, as well as notifications gone wrong.

    June 15, 2026 14:00-14:35

  •  USTLP:CLEAR

    The Clock is Ticking: CRA Compliance at Scale

    Dr. Lisa Bradley is a distinguished cybersecurity expert and visionary leader, currently serving as the Senior Director of Product & Application Security at Dell Technologies. With over two decades of experience in enterprise-class engineering, including 13 years in product security leadership, Dr. Bradley has established herself as a trailblazer in the field of cybersecurity and vulnerability management. In her current role, she leads Dell’s Product Security Remediation efforts, driving initiatives such as Vulnerability Response/PSIRT, post-GA security findings remediation, the Bug Bounty Program, Product 360 Risk, and Dependency Management. She also plays a pivotal role in supporting Dell’s Software Bill of Materials (SBOM) initiative, ensuring transparency and security across the product lifecycle. Her commitment to advancing the cybersecurity industry extends beyond her corporate responsibilities. She is a frequent speaker at industry events and podcasts, and a proud co-author of the FIRST PSIRT Services Framework, contributing to global standards in incident response. Outside of her professional endeavors, Dr. Bradley enjoys spending quality time with her three children and friends. Her unwavering dedication to cybersecurity, combined with her leadership and advocacy, continues to inspire innovation and build trust in the ever-evolving landscape of technology and cyber defense.

    Sarah Evans delivers technical innovation for secure business outcomes through her role as a distinguished engineer and the security applied research program lead in the Office of the CTO at Dell Technologies. She is an industry leader and advocate for extending secure operations and supply chain development principles in AI. Sarah also ensures the security research program explores the overlapping security impacts of emerging technologies in other research programs, such as agentic AI. Sarah partners with engineering, product security, cyber security and IT teams to incorporate applied research to evolve product and business processes. She leverages her extensive practical experience in security and IT, spanning small businesses, large enterprises (including the highly regulated financial services industry and a 21-year military career), and academia (computer information systems). She earned an MBA, an AIML professional certificate from MIT, and is a certified information security manager (CISM). Sarah is also a strategic and technical leader representing Dell in OpenSSF, a foundation for securing open-source software. Sarah is based in Denver, Colorado.

    The Cyber Resiliency Act (CRA) was passed into EU law in 2024, and the clock is ticking. Manufacturers of products with digital elements must begin actively exploited‑vulnerability reporting in 2026, with full compliance enforceable in late 2027.

    This talk will share the approach taken by a large tech company, which includes analyzing requirements and intent into actionable items to drive product teams toward compliance and roadmap‑development efforts. The presenters will focus on managing third‑party risk and share how enterprise participation in foundations such as OpenSSF accelerates the internal CRA‑compliance journey, creating opportunities for enterprises to collaborate with others in the industry to improve OSS security across shared upstream OSS and upstream suppliers.

    June 18, 2026 09:45-10:20

  •  JPTLP:AMBER

    The Dark Side of Autonomy: Exploiting DFIR Agents Through Adversarial Manipulation

    Joined the NTT DATA Group in 2019, initially working in sales, providing solutions such as image processing and natural language processing. In April 2023, transferred to the company’s CSIRT unit, NTTDATA-CERT, where engaged in incident response, threat hunting, IoC collection and distribution, as well as enhancing CSIRT operations through LLM-based automation. Also has a strong interest in offensive security, including C2 framework development, OSS vulnerability research, and participation in bug bounty programs. Presented at conferences such as Black Hat USA 2025 Arsenal, HITCON 2025, JSAC 2025, and BSides Tokyo 2025. CISSP, OSDA, OSTH.

    In recent years, Digital Forensics and Incident Response (DFIR) tools have increasingly adopted Large Language Models (LLMs) to enhance automation, analysis, and reporting. Prominent examples include Velociraptor’s MCP integration and Timesketch’s AI Summary feature. This study empirically demonstrates that attackers can exploit prompt injection through boundary perturbation of structured data — a form previously considered resistant to manipulation.

    By embedding malicious instructions into routine forensic artifacts such as logs and scheduled tasks, adversaries can cause DFIR LLM agents to misinterpret benign data as instructions, leading to three outcomes: Hide, Mislead, and Exploit. To the best of my knowledge, this is the first work to demonstrate structured‑data injection attacks in LLM‑integrated DFIR environments.

    The study also proposes practical defense‑in‑depth countermeasures, including enforcing least privilege, mandating strict structured‑output validation, and maintaining human‑in‑the‑loop verification to ensure the reliability and safety of automated forensic workflows. This presentation aims to provide organizations advancing DFIR automation with LLM agents a foundation for rethinking, at the design level, how much autonomy should be granted to such agents and where human oversight must remain integral.

    June 18, 2026 13:30-14:15

  •  TWTLP:CLEAR

    The EU's Cybersecurity Resilience Act (CRA) has Begun – How Can Manufacturers Confidently Address their Obligations and Security Requirements?

    Mars Cheng (@marscheng_) is the Head of Cyber Threat & Product Defense Center at TXOne Networks Inc., responsible for leading the three subgroups under the center, including PSIRT, Advanced Threat Research Group, and Threat Operation Group. He also serves as the Executive Director of the Association of Hackers in Taiwan (HIT/HITCON), a Review Board Member for both HITCON Conference and Training, FIRSTCON26, the General Coordinator of HITCON CISO Summit 2026, and a Cybersecurity Auditor for the Taiwan Government. In these roles, he plays a pivotal part in fostering collaboration between industry and government to strengthen national cybersecurity resilience.

    Mars specializes in IoT, ICS/SCADA systems, malware analysis, threat intelligence and hunting, blue team, and enterprise security. A seasoned speaker, Mars has delivered over 60 presentationst at international cybersecurity conferences, including Black Hat USA, Europe, and MEA, RSA Conference, DEF CON, CODE BLUE, FIRST, HITB, HITCON, Troopers, NOHAT, SecTor, S4, SINCON, ROOTCON, among others. He is also an experienced cybersecurity instructor, having delivered over 35 training sessions at events such as Global Cybersecurity Camp (GCC) 2026, 2024, HITCON Training (2025, 2022, 2021, 2020, 2019), NICS Elite Practical Training Taiwan (2025–2022), and for various ministries in Taiwan, including National Defense, Economic Affairs, Education, and Finance, as well as for publicly listed companies.

    He has successfully organized several notable HITCON events, such as the HITCON CISO Summit in 2025, 2024 and 2023, HITCON PEACE 2022, and HITCON 2021 and 2020.

    The EU’s Cybersecurity Resilience Act (CRA) is a landmark regulation targeting the cybersecurity of products with digital elements within the EU market. While full mandatory enforcement is set for December 2027, manufacturers must comply with critical reporting obligations starting in September 2026. With harmonized standards and third‑party verification bodies (Notified Bodies) still pending clarity, how can manufacturers move from a reactive, rushed state to a proactive, composed compliance strategy?

    This presentation will focus on the manufacturer’s reporting obligations and the cybersecurity requirements for “Important Products.” We will share our Product Security Incident Response Team (PSIRT)’s practical approach to planning and evaluating the future compliance roadmap.

    June 19, 2026 08:30-09:05

  •  AU NLTLP:CLEAR

    The PR3TACK Initiative: Building the World’s First Preemptive Tactics & Countermeasures Knowledgebase

    Vishal Thakur is a Regional Manager of CSIRT operations and security researcher based in Sydney, Australia. With over 13 years of experience leading incident response and cyber defense teams across Atlassian, Salesforce, TikTok USDS, Commonwealth Bank of Australia, he specializes in large-scale threat detection, malware analysis, and proactive cyber operations.

    Vishal is the Founder of HackSydney and BSides Sydney, and a frequent speaker and trainer at FIRST, DEF CON, Black Hat, SANS conferences. His current research focuses on anticipatory threat modeling, AI-enabled adversarial simulation, and preemptive defense frameworks. He is the creator of PR3TACK, a next-generation threat modeling framework, and Warhead, a research project for offensive techniques that can be used for red-teaming operations. Vishal has also actively worked in the research field of cognitive malware and has published papers on that subject in academic and institutional journals.

    Neils Heijmans is a senior security architect based in the Netherlands. With over a decade of experience in the Cyber Security space and assuming different roles like incident responser, threat hunting, detection engineer and security automation engineer.

    David Wearing’s worked in security for over 14 years while working towards the goal of becoming a master workworker (furniture), whose past experience has involved working in mostly defensive roles at Google and currently at Atlassian as the Principal Security Engineer on the Incident Response team.

    Cyber defense has always lagged behind adversarial innovation. Frameworks such as MITRE ATT&CK have revolutionized how defenders codify and respond to known tactics and techniques — but they remain retrospective by design. PR3TACK (Preemptive Tactics & Countermeasures Knowledgebase) challenges this paradigm by introducing a structured, openly accessible framework to catalogue plausible but unobserved or unreported adversary TTPs.

    As opposed to documenting what has occurred, PR3TACK anticipates what could (and most likely will) occur. Drawing from technical plausibility, adversarial‑innovation patterns, and foresight methodologies, the framework bridges the gap between known vulnerabilities and emerging threat surfaces.

    Developed within the Atlassian CSIRT and currently shared with select industry peers, PR3TACK was built to integrate directly into real‑world incident‑response and detection‑engineering programs. The framework will be released to the wider security community at the 38th Annual FIRST Conference, accompanied by an open application process for contributions, enabling researchers, defenders, and academic teams to propose and validate new tactics and countermeasures collaboratively. CSIRTs can also request membership to join the PR3TACK Members Team and the Core Team, gaining access to newly catalogued TTPs and preemptive‑defense mappings as they are added.

    This talk will unveil PR3TACK’s conceptual foundations, including its novel tactic classes such as Pre‑Positioning, Resilience Erosion, Governance Subversion, Cognitive Manipulation, and Digital Exhaust Manipulation — domains that extend well beyond code execution into governance, cognition, and socio‑technical manipulation.

    Participants will learn how to use PR3TACK’s interactive Seed Matrix and Navigator to map emerging TTPs, guide red and purple team exercises, and harden environments before exploitation occurs. We will also share how to get involved with the project and submit new TTPs for inclusion in the framework by becoming a PR3TACK Affiliated Researcher.

    PR3TACK redefines cyber defense as a proactive discipline, empowering analysts, CSIRTs, and researchers to think one step ahead of the adversary.

    June 19, 2026 11:00-11:45

  •  USTLP:CLEAR

    The SOC Of The Future… The Future Is Now

    Carson Zimmerman is the Chief Architect of Microsoft’s Security Operations Center (SOC), where he leads strategic initiatives to advance global threat detection and response. He is co-author of 11 Strategies of a World-Class Cybersecurity Operations Center, a widely adopted guide available freely at mitre.org/11Strategies. Previously at MITRE, Carson’s career spans the full spectrum of SOC roles—from tier 1 analyst, to engineer, to investigator, to SOC team lead.

    The SOC of the future isn’t a glossy demo, nor a buzzword‑fueled AI hallucination. Rather, it is engineered to withstand complexity, scale, and burnout. This session confronts legacy models and shares hard‑earned lessons on evolving workflows, sustainable ops tempo, and design for human cognition, not just automation. It will challenge your thinking on what’s next, and how to evolve.

    June 16, 2026 11:45-12:20

  •  USTLP:CLEAR

    The Vulnerability Identity Crisis

    Art Manion spends a lot of time working on various aspects of technical cybersecurity vulnerabilities including coordinated disclosure, measurement, management, information systems, risk assessment, and public policy. Art has led and contributed to vulnerability-related efforts the Forum of Incident Response and Security Teams (FIRST), the CVE Program, ISO/IEC JTC 1/SC 27, the Open Source Security Foundation (OpenSSF), and the National Telecommunications and Information Administration (NTIA, US). Art is the Deputy Director of ANALYGENCE Labs and previously managed vulnerability analysis at the CERT Coordination Center (CERT/CC).

    Jay is a Co-founder and Data Scientist at Empirical Security and Data Scientist Emeritus at Cyentia Institute. Jay is also the lead data scientist for the Exploit Prediction Scoring System (EPSS), a co-chair of the EPSS special interest group at FIRST and chair of the Consumer Working Group within the CVE program. He is also a co-founder of the Society for Information Risk Analysts (SIRA), a not-for-profit association dedicated to advancing risk management practices where he served on the board of directors for several years.

    Current vulnerability management programs struggle with identity. Anyone working in defensive vulnerability management will recognize the challenges in associating a vulnerability with the variety of products used in or by any technology estate. We struggle not only with product identification but also vulnerability identification. This double challenge of poor product and poor vulnerability identity creates a collection of vulnerability records that provide sub‑optimal coverage, cannot be de‑duplicated within and across vulnerability data sources, and require significant human resources to manage.

    These records are often overly complicated or overly simplistic and difficult to associate with other critical information. This work is based on two long‑time vulnerability veterans spending the better part of a year discussing and debating the state of vulnerability‑information management and focusing on underlying first principles. The result is Minimum Viable Vulnerability Enumeration (MVVE) for every vulnerability record and a detailed ontology for defining and assessing the importance of other vulnerability‑information elements.

    June 16, 2026 13:45-14:30

  •  DETLP:CLEAR

    Threat From The Inside: eBPF Used by Malware

    Geri has more than 15 years of experience in cybersecurity. He started on this path as he specialized in network and information security in his M.Sc. in computer engineering. Since then, he has worked as a QA engineer for a security vendor, then changed to penetration testing first as an external consultant and then as an internal consultant at Siemens. He is a hacker at heart and a consultant by trade. He worked on both IT and OT systems. In the past years, he focused on security research in binary analyses and reverse engineering, which led him to Fortinet. At FortiGuard Labs, he currently does malware analysis, reverse engineering, and threat intelligence.

    eBPF (extended Berkeley Packet Filter) is a powerful and mysterious technology in the Linux kernel. As its name suggests, it was originally created for network‑packet filtering. However, it evolved into a more general‑purpose mechanism to observe and manipulate kernel behavior. What could go wrong?

    We will not pick on eBPF because it is not a flawed or vulnerable technology, but it is a powerful one — and threat actors also recognize that. In this presentation, we will first understand how eBPF works, then look into the different use cases and how threat actors like to use them, and finally, we will look into what defenders can do to keep eBPF usage under control.

    This presentation is intended for a technical audience: incident responders, malware analysts, SOC analysts, or anybody else who might face Linux malware using eBPF or be responsible for the security of Linux systems.

    June 17, 2026 13:30-14:15

  •  USTLP:CLEAR

    Threat-INFORM to Optimize Security Operations

    As VP Threat-Informed Defense at AttackIQ, Jon brings over 20 years of experience leading innovation in cybersecurity with a focus on making security more efficient and effective at scale. He is the former Director and Co-Founder of MITRE’s Center for Threat-Informed Defense (CTID), where he united sophisticated security teams to advance the state of the art and the practice in threat-informed defense globally. Prior to launching the CTID, Jon led MITRE’s Cyber Threat Intelligence and Adversary Emulation Department where he advanced those critical capabilities across MITRE and managed the CALDERA and MITRE ATT&CK® teams. Jon led teams developing open standards including STIX and TAXII for threat intelligence sharing and was the co-creator of OVAL while managing MITRE’s security automation program.

    Many organizations struggle to apply threat intelligence effectively and measure progress in cyber defense. The INFORM threat‑informed defense maturity model is an open‑source tool designed to help security teams assess their current posture and systematically improve operations.

    This talk introduces INFORM, guides attendees through a self‑assessment, and highlights practical steps for advancing threat‑informed defense. Attendees will leave with the tools to assess their organization’s maturity, actionable KPIs, and free resources to drive continuous improvement. This session empowers security teams to move from reactive operations to measurable, threat‑informed defense.

    June 16, 2026 15:25-16:00

  •  NZTLP:GREEN

    Threats are Climbing - How to Elevate Your Tabletop Exercises to Meet Them

    Tim Myers is the Principal Advisor for Incident Response in the Pacific Partnerships Team at NCSC New Zealand, where he focuses on delivering meaningful and impactful cyber capacity building in the region. Before joining NCSC, Tim served as a Digital Forensic Analyst with the New Zealand Police. In this role, he conducted digital forensic investigations related to serious crime, fraud and cybercrime. Building on his experience, Tim is dedicated to improving cyber security capabilities in the Pacific through fostering Pacific-led initiatives.

    This talk explores the development of interactive tabletop exercises that engage participants by adding additional layers of realism. We will explore the development of a portable tabletop‑exercise platform that allows participants to connect their own devices to interact with each other and the scenario.

    June 16, 2026 09:40-10:15

  •  FR ITTLP:CLEAR

    Tips and Tricks to Run a CSIRT in Low-income and Fragile Contexts

    Ghislain de Salins is the Global Lead for Cybersecurity at the World Bank. He has helped developing countries' governments and cybersecurity teams establish, operate, upgrade and finance CSIRTs across Western Africa, Eastern Europe, the Caribbean and East Asia Pacific. He recently published a practitioner note entitled "Digital First Responders", which focuses on how to successfully build CSIRTs in developing countries. He previously worked for the OECD as a cybersecurity policy analyst.

    Giacomo Assenza is a Cybersecurity Specialist in the Digital Development Unit of the World Bank. He has supported governments in establishing CSIRTs in Eastern Africa, Latin America and South Asia. He previously served as Cybersecurity Research Officer at the International Telecommunication Union (ITU) and recently earned a PhD in Engineering for Humans and Environment at the University Campus Biomedico, where he is also tutor for the Cybersecurity module. His research interests cover the development of cybersecurity strategies for the protection of critical sectors. Giacomo has a background in consulting and academia and has achieved several publications in academic, technical and educational journals.

    Establishing and operating CSIRTs in low‑income, fragile environments can be particularly challenging. In many developing countries, CSIRTs face limited funding, uncertain legal landscapes, as well as difficulty in hiring and retaining skilled staff. Yet over the past decade, a growing number of low‑ and lower‑middle‑income countries have successfully established national and sectoral CSIRTs, often with support from development partners such as the World Bank and FIRST.

    This panel will focus on practical lessons for doing more with less. Speakers from Togo, Sierra Leone, Mozambique, and the World Bank will share concrete “tips and tricks” based on real‑life experience: how to define a minimum viable CSIRT; prioritize services in the first 12–24 months; learn how to use open‑source tools and shared platforms (e.g., feeds from the Shadowserver Foundation, OpenCTI); build trust and legitimacy with constituents; and explore sustainable financing models from membership fees, government budgets, or private‑sector support.

    Participants will leave with a realistic checklist, examples to replicate (and mistakes to avoid), and ideas for peer‑to‑peer collaboration.

    June 16, 2026 14:35-15:20

  •  USTLP:CLEAR

    Trading Privacy for Convenience: Leading Through Example in a Hyper-Connected Era

    For the past six years, Dr. Tzvetanov has been a graduate researcher at Purdue University, focusing on Homeland Security, Cyber Threat Intelligence, Operational Security, and Influence Operations within the cyber domain, as well as the primary instructor for courses in Cybersecurity and Homeland Security.

    He currently serves as Director of Security Engineering at Hydrolix. Prior to this role, he was a Security Architect at Fastly, a major content delivery network (CDN), where he led initiatives in secrets management, threat intelligence, and investigations into DDoS adversaries and has supported federal law enforcement in a number of cases. His earlier experience includes positions at leading hardware vendors such as Cisco and A10 Networks, where he specialized in threat research and information sharing, DDoS mitigation, product security, and secure software development practices. Before that, he worked at Yahoo! as a Dedicated Paranoid, helping design and secure the company’s production edge infrastructure. He began his career at Google as a Site Reliability Engineer (SRE) supporting two mission-critical systems: the global ads database, which handled all advertising revenue, and the authentication infrastructure used across all Google services.

    Dr. Tzvetanov is an active member of the global security research and incident response communities. He has contributed to multiple FIRST Special Interest Groups, participated in the Honeynet Project, and organized the BayThreat security conference. His involvement also extends to major industry events - including leading the Radio Communications department at DefCon - and serving on program committees for ShmooCon, NANOG, BayThreat, and several FIRST conferences.

    He holds a Ph.D. and an M.Sc. in Technology with a concentration in Homeland Security, a Master’s degree in Digital Forensics and Investigations, and a Bachelor’s degree in Electrical Engineering with a specialization in Communications Equipment Engineering.

    In contemporary digital environments, individuals increasingly exchange personal privacy for the convenience afforded by online services, often without full awareness of the breadth or implications of this trade‑off. This study examines this phenomenon through a comparative analysis of the data practices of major communication, social networking, and dating applications, including Meta, Instagram, WhatsApp, TikTok, LinkedIn, Google, WeChat, Signal, Telegram, Snapchat, and others.

    By systematically reviewing privacy policies and related disclosures, the research evaluates how these platforms collect, process, and utilize a wide range of user data, encompassing identifiers such as IP address, location information, demographic attributes, behavioral telemetry, device metadata, and access to sensitive content.

    The analysis reveals substantial heterogeneity in data‑collection practices — both in terms of scope and transparency — across different categories of applications and geopolitical ecosystems. Notably, privacy‑oriented services such as Signal demonstrate markedly reduced data gathering compared to mainstream or commercially driven platforms. An illustrative comparison between high‑privacy and low‑privacy application models highlights the extent to which features that enhance user convenience, including personalization algorithms and streamlined authentication, are frequently enabled by extensive behavioral tracking.

    The findings underscore the imperative for security professionals to advocate for stronger privacy standards, promote informed consent, and encourage data‑minimizing design principles. Ultimately, the study argues that safeguarding privacy is not solely a technical undertaking but also a cultural and ethical responsibility requiring leadership within the security community.

    June 19, 2026 08:30-09:05

  •  THTLP:CLEAR

    Understanding Scammer Threats: Detection Strategies Aligned with Thailand’s Cybersecurity Act 2562

    Major General Teerawut Wittayakorn is the Deputy Secretary-General of the National Cyber Security Agency since October 2022, he is also the Director of the ASEAN-Japan Cybersecurity Capability Building Center (AJCCBC) and the Head of the Thailand Computer Emergency Response Team (ThaiCERT). Prior to take the office, he was in the military services for 25 years, his previous important positions included Director of Special Operation at Royal Thai Armed Forces, Signal Battalion Commander, Instructor at Royal Thai Army Command and General Staff College.

    Scammer operations have rapidly evolved into organized and highly adaptive threat campaigns targeting individuals, enterprises, and national digital infrastructure. This session provides a structured understanding of scammer behavior, communication patterns, and attack flows that enable early detection.

    By mapping real examples to practical threat‑analysis techniques, attendees will learn how to recognize indicators, classify scam events, and respond effectively. The talk also highlights how Thailand’s Cybersecurity Act B.E. 2562 supports this process, including incident classification, reporting obligations, and coordination requirements for organizations.

    Participants will leave with actionable detection strategies and a clear, practical response workflow that can be implemented immediately to strengthen organizational resilience against scam‑driven threats.

    June 16, 2026 10:55-11:40

  •  USTLP:CLEAR

    Weight Sparsity Meets Threat Modeling: A New Framework for AI Security

    Eric Zielinski is Chief Information Security Officer at Jumpmind, where he navigates the challenge at the heart of this talk: deploying AI to accelerate security while remaining accountable when those systems fail. With over two decades of cybersecurity leadership across Fortune 100 enterprises, financial services, and cloud-native SaaS platforms, he has built programs that treat AI governance as a security engineering problem, not a compliance checkbox.

    As Director of AI and Cloud Security at OCC, Eric led efforts aligning generative AI governance with regulatory and enterprise risk frameworks, giving him firsthand experience with the "show me how this model makes decisions" questions now coming from regulators and boards. Previously, as CISO at Dizzion, he scaled security programs balancing innovation velocity with resilience.

    Eric is a frequent speaker at industry conferences including several FIRST events, FS-ISAC, and many others, presenting on topics including securing generative AI and embedding cyber resilience in high-velocity development pipelines. He holds a Master's from Carnegie Mellon and founded Cyber Pathways, a career development initiative mentoring the next generation of cyber talent.

    Security leaders face an impossible mandate: deploy AI everywhere while remaining accountable when it fails. Today’s AI systems make security‑consequential decisions — triaging alerts, blocking policy violations, evaluating access requests — yet we cannot explain how those decisions are made. We’re running unauditable security controls.

    Recent advances in circuit sparsity offer a path forward. By forcing most of a model’s weights to zero, researchers have shown that the remaining connections form small, interpretable circuits implementing identifiable algorithms: a “string closer,” a “bracket counter,” a “variable‑type tracker.” These aren’t abstractions — they're the actual computational mechanisms we can now inspect, test, and harden.

    This session translates circuit‑sparsity research into practical security engineering. We’ll examine real circuit examples, including one with a built‑in vulnerability exploitable through targeted adversarial inputs. We’ll map interpretability to AI threat models, showing how attackers probe for decision boundaries and how defenders can get ahead.

    Finally, we’ll cover concrete applications: treating interpretability as a security control, building circuit‑informed red‑team methodologies, establishing AI‑security KPIs around circuit stability, and raising the bar for vendor transparency. The goal isn’t interpretability for its own sake — it’s shifting AI security from “trust the accuracy metrics” to “show me the control logic and prove it’s defensible.”

    June 17, 2026 13:30-14:15

  •  NOTLP:CLEAR

    Who Did It? Getting Started with Threat Actor Profiling

    Marthe Råheim Rogndokken has a background spanning business, law enforcement, and cybersecurity. She has studied International Business in Slovenia. Later she graduated from the Norwegian Police Academy, and served as a police officer in both the first response unit and investigations. Her passion for technology and security led her to Australia, where she specialized further by completing a bachelor’s degree in cyber security. Marthe is currently a Cyber Threat Intelligence Analyst at Sopra Steria, Norway.

    Her research on the PACT - a profiling and attribution model - was published in Procedia Computer Science on ScienceDirect 2025, and presented at the International Conference on Industry Sciences and Computer Science Innovation (iSCSi) in Portugal.

    Marthe is an experienced public speaker, having presented at several conferences in Norway, including FIRST TC Oslo. She is well-versed in sharing knowledge with both technical and non-technical audiences.

    Outside of work, Marthe is drawn to speed and adrenaline — whether it’s go-karting, surfing, or downhill mountain biking.

    Every cyber attack raises the same question: Who did it? But what should you know before trying to find that out? This talk takes you through the first steps of getting started with threat‑actor profiling — exploring the attribution problem, profiling, existing attribution models, and PACT, a new framework in progress built to facilitate the cyberattack‑attribution process.

    Key takeaways:
    Attendees will learn how to get started with threat‑actor profiling, understand the key elements that should be included, and apply a structured methodology to the process. The session will also cover challenges and suggestions on how to address them.

    June 17, 2026 09:00-09:35

  •  USTLP:CLEAR

    You Need Some Neurosparkle In Your SOC

    Carson Zimmerman is the Chief Architect of Microsoft’s Security Operations Center (SOC), where he leads strategic initiatives to advance global threat detection and response. He is co-author of 11 Strategies of a World-Class Cybersecurity Operations Center, a widely adopted guide available freely at mitre.org/11Strategies. Previously at MITRE, Carson’s career spans the full spectrum of SOC roles—from tier 1 analyst, to engineer, to investigator, to SOC team lead.

    Megan Roddie‑Fonseca is a Security Engineer at Datadog specializing in digital forensics, incident response, and threat hunting. She holds multiple GIAC certifications and is a graduate of the SANS Technology Institute. Beyond her technical expertise, Megan advocates for mental health in the security community as CFO of Mental Health Hackers and mentors through Cyber Patriot. She has contributed to OpenSOC Blue Team CTF events at DEFCON, BSides, and other conferences, bringing a blend of hands‑on SOC experience and community leadership to her work.

    Neurodivergent minds bring brilliant pattern matching, insightful results, and glorious weirdness to your cybersecurity team. This talk shows how to harness it all — no pity party required. Expect laughs, lived experience, and practical strategies for building teams that truly work.

    June 16, 2026 14:35-15:20

  •  NLTLP:AMBER

    Your Cloud, Their Code: The Supply Chain Attack You Didn't See Coming

    Soufian El Yadmani is a researcher, ethical hacker, and entrepreneur. In 2024, founded cybersecurity company Modat, where he now serves as CEO. Soufian is also the Head of Research at CSIRT.global, and a PhD researcher at Leiden University, where he focuses on threat actor attribution and hacking automation.

    With the widespread adoption of cloud-native development practices, organizations increasingly rely on cloud storage to host development artifacts and application resources. While cloud storage misconfigurations exposing sensitive data have been explored, the specific risks associated with complete source code repository exposure and its implications for software supply chain security remain largely unexplored. These sensitive code leaks can provide attackers with comprehensive insights into application architecture, embedded secrets, and development workflows, creating opportunities for sophisticated supply chain attacks. In this work, we present the first large-scale analysis of source code exposure through misconfigured cloud storage buckets across five major providers. By analyzing exposed buckets, we identified 1,942 buckets containing 20,384 Git repositories. Our analysis revealed that 18,340 of these repositories point to private ones, exposing organizations’ know-how and making them vulnerable to a variety of supply chain attacks. In the Git configuration files, we discovered 232 credential leaks that could be used to authenticate at remote Git services. We also analyzed the contents of the repositories, uncovering 983 valid secrets. Additionally, we identified187 storage buckets with misconfigured permissions that allow unauthorized write access, endangering software supply chain integrity. Our findings span multiple types of organizations, including a European hospital serving over250,000 patients annually, a telecom provider, and a major newspaper with more than 14 million monthly visitors.

    June 18, 2026 15:05-15:40