Program Agenda

2026 Cyber Threat Intelligence Conference

Agenda is subject to change. Times are reflected in UTC +2 (CEST). Workshops have limited seating and based on the registration admission purchased. Plenary sessions are open to all registered delegates.

All sessions will take place at the Holiday Inn - Munich City Centre. All meetings rooms are on the main conference floor.

Registration Hours

Tuesday, April 21 - Registration Located in Foyer Grosser Saal
07:30-11:00 | Registration for Workshop Participants ONLY
14:00-17:30 | Registration for Plenary Participants

Wednesday, April 22 - Registration Located in Foyer Grosser Saal
08:00-17:30 | Registration and Information

Thurday, April 23 - Registration Located in Foyer Grosser Saal
08:00-16:00 | Registration and Information

Exhibits, Coffee Breaks, Meals, and Networking Reception

Exhibitors, coffee breaks, lunches, and the Wednesday evening networking reception will be located in the Ballsaal Ballroom.

Tuesday, April 21st

Workshop Stream 1
Room Forum 7
Workshop Stream 2
Room Forum 5
Workshop Stream 3
Room Forum 6
Workshop Stream 4 |Room Forum 4
08:30 – 10:00
 NL US

Workshop Cyber Scenario Planning for Cybersecurity Decision-Making

Gert-Jan Bruggink (Venation, NL); Sherman Chu (BlackRock, US)

TLP:CLEAR
 CH

Cloud Forensics with Open Source: Building Your Own OSDFIR Lab on GCP

Alexander Jäger, Janosch Köpper (Google, CH)

TLP:GREEN
 NO US GB

Intelligence Collection Planning Workshop: Maturing your Threat Intelligence Program through Targeted Stakeholder Engagement and Advanced Analytic Techniques

Freddy Murstad (Nordic Financial CERT, NO); Garrett Carstens (Intel471, US); Kevin Williams (Intel471, GB)

TLP:GREEN
 DE

Detection Engineering with Sigma

Thomas Patzke (Evonik Industries AG, DE)

TLP:CLEAR
10:00 – 10:15

Networking Break

10:15 – 12:30
 NL

Workshop Cyber Scenario Planning for Cybersecurity Decision-Making

Gert-Jan Bruggink (Venation, NL)

TLP:CLEAR
 CH

Cloud Forensics with Open Source: Building Your Own OSDFIR Lab on GCP

Alexander Jäger, Janosch Köpper (Google, CH)

TLP:GREEN
 NO US GB

Intelligence Collection Planning Workshop: Maturing your Threat Intelligence Program through Targeted Stakeholder Engagement and Advanced Analytic Techniques

Freddy Murstad (Nordic Financial CERT, NO); Garrett Carstens (Intel471, US); Kevin Williams (Intel471, GB)

TLP:GREEN
 DE

Detection Engineering with Sigma

Thomas Patzke (Evonik Industries AG, DE)

TLP:CLEAR
12:30 – 13:30

Lunch

13:30 – 15:30
 LU

Drone Threat Intelligence Workshop

Christian Studer (CIRCL, LU); Paul Jung (He/Him) (CIRCL, LU)

TLP:CLEAR
 NO US GB

Intelligence Collection Planning Workshop: Maturing your Threat Intelligence Program through Targeted Stakeholder Engagement and Advanced Analytic Techniques

Freddy Murstad (Nordic Financial CERT, NO); Garrett Carstens (Intel471, US); Kevin Williams (Intel471, GB)

TLP:GREEN
 LU

Collaborative Detection Engineering with Rulezet

Théo Geffe (CIRCL, LU)

TLP:CLEAR
15:30 – 15:45

Networking Break

15:45 – 17:30
 LU

Drone Threat Intelligence Workshop

Christian Studer (CIRCL, LU); Paul Jung (He/Him) (CIRCL, LU)

TLP:CLEAR
 NO US GB

Intelligence Collection Planning Workshop: Maturing your Threat Intelligence Program through Targeted Stakeholder Engagement and Advanced Analytic Techniques

Freddy Murstad (Nordic Financial CERT, NO); Garrett Carstens (Intel471, US); Kevin Williams (Intel471, GB)

TLP:GREEN

Wednesday, April 22nd

Plenary Sessions Day 1
Grosser Saal
09:00 – 09:15
 DE

Welcome Remarks

Prof. Dr. Thomas Schreck (Munich University of Applied Sciences, DE)

09:15 – 09:45
 US

Evaluating Threat Intelligence Through Velocity

Joe Slowik (Paralus, US)

TLP:CLEAR
09:45 – 10:15
 NL

Dealing With Uncertainty: Scenario Planning for Cybersecurity Decision-Making

Gert-Jan Bruggink (Venation, NL)

TLP:CLEAR
10:15 – 10:45

Networking Break

10:45 – 11:15
 NO

Who Did It? Getting Started with Threat Actor Profiling

Marthe Raaheim Rogndokken (Sopra Steria, NO)

TLP:CLEAR
11:15 – 11:45
 LU

CTI-Transmute: Harmonizing Threat Intelligence in a Multi-Standard Ecosystem

Alexandre Dulaunoy, Christian Studer (CIRCL, LU)

TLP:CLEAR
11:45 – 12:15
 US

Filtering the Noise: Crafting an Actionable Threat Feed from Community-Shared Intelligence

JJ Josing (Retail & Hospitality ISAC, US)

TLP:CLEAR
12:15 – 13:30

Lunch

12:35 – 13:15

CTI SIG Meeting (12:35-13:15) - Room Forum 8

TLP:CLEAR
13:30 – 14:00
 NL LU

OpenTide: From Raw Intelligence to Structured Threat-Informed Detections

Amine Besson (European Commission CSOC, NL); Rémi Séguy (European Commission CSOC, LU)

TLP:CLEAR
14:00 – 14:30
 LU

Building Intelligence with What You Have: Lessons from the Field

Casey Knerr (LU); Jean-Louis Huynen (ICRC, LU)

TLP:AMBER
14:30 – 15:00
 JP

From Grassroots to Governance: Getting CTI on Track Against All Odds

Yu Hirata (Recruit, JP)

TLP:GREEN
15:00 – 15:30

Networking Break

15:30 – 16:00
 DK

Big Game Hunting: Detection Opportunities in Residential Proxy Networks

Jonathan Andersen (Webscout, DK)

TLP:AMBER
16:00 – 16:30
 NL

Hunting Cyber Threat Intelligence on Telegram

Emmanuele Zambon, Luca Allodi, Roy Ricaldi, Victor Asanache (Eindhoven University of Technology, NL)

TLP:CLEAR
16:30 – 17:00

Lightning Talks

TLP:CLEAR
17:00 – 17:10

Day 1 Wrap Up

TLP:CLEAR
17:30 – 19:30

Thursday, April 23rd

Plenary Sessions Day 2
Grosser Saal
08:50 – 09:00

Opening Remarks: Day 2

09:00 – 09:30
 TW

One Bad OSINT Can Ruin Everything: How Secure is Your CTI RAG System, and Can You Minimize the Risk?

Sian-Yao Huang, Yen-Shan Chen (CyCraft Technology, TW)

TLP:CLEAR
09:30 – 10:00
 GB

Operational Efficiency in CTI: A Blueprint for SME's Using Open-Source AI and Cognitive Automation

Omar Saenz, Raquel Guzman (Google, GB)

TLP:CLEAR
10:00 – 10:30
 US

Beyond Human Scale: AI and Automation as Force Multipliers in Cyber Threat Intelligence

Cydney Stude, Steve de Vera (Amazon/AWS, US); Vamshi Krishna Edamadaka (Amazon Web Services, US)

TLP:CLEAR
10:30 – 11:00

Networking Break

11:00 – 11:30
 ES

Forecasting to Stay Clear of Blizzards, Typhoons, Sandstorms, Tempests and more.

Clara Bayón González, Elena Casado González (Deloitte, ES)

TLP:GREEN
11:30 – 12:00
 LU FR

Forecasting Vulnerability Sightings Under Data Scarcity: Modeling Sparse and Bursty Cyber Threat Signals

Alexandre Dulaunoy (CIRCL, LU); Cédric Bonhomme (CIRCL, FR)

TLP:CLEAR
12:00 – 13:15

Lunch

12:45 – 13:15

FIRST Membership Lunch & Learn - Room Forum 8

TLP:CLEAR
13:15 – 13:45
 CA US

How NOT to be Your Adversary's Best Friend - Doing What Matters...

Brian Hein (CA); James Shank (Expel, US)

TLP:CLEAR
13:45 – 14:15
 IN

The Integrated CERT Communication Framework (ICCF): A Behavioral Model for Effective CERT Communication, CTI Sharing, and Advisory Dissemination

Rakesh Kumar Singh, Yudhishthira Sapru (CERT-In (Indian Computer Emergency Response Team), IN)

TLP:CLEAR
14:15 – 14:45

Networking Break

14:45 – 15:15

Keep Calm and ETL On: CTI 101

Jamila Boutemeur

TLP:AMBER
15:15 – 15:45

Unlocking Insights: The Role of TI in Modern DFIR Operations

Efstratios Lontzetidis , Stef Collart (NVISO)

TLP:CLEAR
15:45 – 16:15
 BR

Billions of Indicators, Zero Action: How We Fixed That

Daniel Lima, Gabriel Testoni (NTT DATA, BR)

TLP:CLEAR
16:15 – 16:30

Closing Remarks

TLP:CLEAR