Program Agenda

Agenda is subject to change. Last updated March 6, 2026.

If you have any questions, please contact the Event Office via email at events@first.org.

Program At-A-Glance

  • Monday, April 13 | Pre-conference Workshops
  • Tuesday, April 14 | Conference Day 1
  • Wednesday, April 15 | Conference Day 2
  • Thursday, April 16 | Conference Day 3

Registration Hours & Location

  • Registration will be held in the Grand Ballroom Foyer of the DoubleTree Resort by Hilton Hotel Paradise Valley
  • Registration will be available each morning of the conference

Hours are as follows and subject to change:

  • Monday, April 13 | 07:30-10:00 and 12:00-17:30
  • Tuesday, April 14 | 07:00-17:00
  • Wednesday, April 15 | 07:30-17:00
  • Thursday, April 16 | 07:30-12:00
  • Monday, April 13th

    Workshop Room 1 (Sedona)

    Workshop Room 2 (Palomas)

    Workshop Room 3 (Coronado)

    Coordinators Summit (Rattlers)

    Social Activity & Breaks

  • Tuesday, April 14th

    General Session (Grand Ballroom)

    Breakout 1 (North Ballroom)

    Breakout 2 (Center Ballroom)

    Breakout 3 (South Ballroom)

    Social Activity & Breaks

  • Wednesday, April 15th

    General Session (Grand Ballroom)

    Breakout 1 (North Ballroom)

    Breakout 2 (Center Ballroom)

    Breakout 3 (South Ballroom)

    Social Activity & Breaks

  • Thursday, April 16th

    General Session (Grand Ballroom)

    Breakout 1 (North Ballroom)

    Breakout 2 (Center Ballroom)

    Breakout 3 (South Ballroom)

    Social Activity & Breaks

Monday, April 13th

Workshop Room 1 (Sedona)Workshop Room 2 (Palomas)Workshop Room 3 (Coronado)Coordinators Summit (Rattlers)Social Activity & Breaks
07:30 – 09:00

Breakfast

08:30 – 12:30
 US

International Workshop on Firmware Security Vulnerabilities (FirmVuln26)

Aravind Machiry (Purdue University, US); Armin Moin, Terrance Boult (University of Colorado Colorado Springs (UCCS), US)

TLP:CLEAR

08:30 – 17:00

 US JP

Coordinated Vulnerability Disclosure (CVD) Table Top Exercise

Justin Murphy (DHS/CISA, US); Tomo Ito (JPCERT/CC, JP)

TLP:CLEAR
 US

Vibe Coding a Backport: Deep Dive into Backported Patch Generation

John Amaral (Root.io, US)

TLP:CLEAR
10:00 – 10:15

Networking Break

12:30 – 13:30

Lunch Break

13:30 – 17:30
 US

From Backlog to Battle Plan: A Hands-On Vulnerability Management Strategy Lab

Maggie Morganti (Worldpay, US)

TLP:CLEAR
 US

Deep Dive Workshop into CVE-to-CWE Root Cause Mapping

Connor Mullaly (MITRE, US); Steve Christey Coley (The MITRE Corporation, US)

TLP:CLEAR
14:00 – 17:00
 US JP

Global CVD-COP International Coordinator Summit

Justin Murphy (DHS/CISA, US); Tomo Ito (JPCERT/CC, JP)

TLP:CLEAR
15:15 – 15:30

Networking Break

18:00 – 19:00

Early Arrivals Networking Reception

Tuesday, April 14th

General Session (Grand Ballroom)Breakout 1 (North Ballroom)Breakout 2 (Center Ballroom)Breakout 3 (South Ballroom)Social Activity & Breaks
07:00 – 08:30

Breakfast

08:30 – 09:00

Welcome Remarks

09:00 – 10:00
 US BE

CISA-ENISA Joint Messaging

Lindsey Cerkovnik (CISA, US); Nuno Rodrigues Carvalho (ENISA, BE)

TLP:CLEAR
10:00 – 10:30

Networking Break with Exhibits

10:30 – 11:30
 US IN

Panel: The CVE Supplier ADP (SADP) Pilot: Am I Affected byUpstream?

Art Manion (Tharros Labs, US); Feng Cao (Oracle, US); Jeremy Daigneau (MITRE, US); Lisa Olson (Microsoft, US); Yogesh Mittal (Red Hat, IN)

TLP:CLEAR
 US

Automating CNA CVE Reporting and Monthly Bulletins at Atlassian

Deepak Chintala, Zachary Echouafni (Atlassian, US)

TLP:GREEN
 US

What is to be Published? Analyzing Chinese Vulnerability Disclosures and Omissions

Benjamin Edwards, Sander Vinberg (Bitsight, US)

TLP:CLEAR
11:35 – 12:05
 US

Embracing the Era of Transparency: Automating VEX Application for Scalable, Context-Aware Security

Jessica Butler, Kristina Joos (NVIDIA, US)

TLP:CLEAR
 US

Automating Container Releases for Regulated Environments

Kaajol Dhana (NVIDIA, US)

TLP:CLEAR
 US

Operationalizing AIBOMs: Extending Vulnerability Management to AI Models and Datasets

Alexandra Selldorff (Manifest Cyber, US); Ugur Koc (Manifest Cyber)

TLP:CLEAR
12:05 – 13:30

Lunch Break

13:30 – 14:30
 US

A Paradigm Shift in Vulnerability Identity: Why Vulnerability Databases Struggle

Art Manion (Tharros Labs, US); Jay Jacobs (Emprirical Security, US)

TLP:CLEAR
 US

The Dependency Mirage: Hidden Vulnerabilities in Your Compiled Binaries

Anthony Feddersen, Craig Heffner (NetRise, US)

TLP:CLEAR
 US

CVE Record Format - Purl and CPE Workshop

Chris Coffin (MITRE); MZ MegaZone (F5, Inc., US)

TLP:CLEAR
14:35 – 15:05
 US

The Hidden Cost of CVEs: Can CSAF and VEX Change the Equation?

Lisa Olson (Microsoft, US)

TLP:CLEAR
 US

Boosting Vulnerability Intelligence: How Accurate CWE Mappings Transform ML Model Performance

David Starobinski, Sevval Simsek, Varsha Athreya (Boston University, US)

TLP:CLEAR
 US

Vulnrichment Playground

Art Manion (Tharros Labs, US); Lindsey Cerkovnik (CISA, US)

TLP:CLEAR
15:05 – 15:35

Networking Break with Exhibits

15:30 – 16:30
 US

From Overload to Operational Leverage: Using Agentic AI to Scale PSIRT Triage

Chris Farrell, Raaghavv Devgon (Salesforce, US)

TLP:GREEN
 US

What We Learned When AI Analyzed Tens of Millions of Vulnerabilities

Snir Ben Shimol (ZEST Security, US)

TLP:GREEN
 PL

Contextual SBOMs: Unlocking Precise Vulnerability Management with Build-Time Content Intelligence

Przemyslaw "Rogue" Roguski (Red Hat, PL)

TLP:CLEAR
16:35 – 17:05
 BE

Stepping up the ENISA's role in Support of EU Vulnerability Services

Kaspar Clos (ENISA, BE)

TLP:GREEN
 US

Identifying Exploited and Likely-to-Be-Exploited Vulnerabilities

Patrick Garrity, Wade Sparks (VulnCheck, US)

TLP:CLEAR
 US GB

From JSON to Clarity: Practical Tools for SBOM Interpretation

John Bergland (Program Manager, Supply Chain Security, IBM CISO, US); Zadia Alden (Manager - Security and Legal Scanning Services, IBM CISO, GB)

TLP:GREEN
17:10 – 17:40
 US IN

The Vulnerability Ecosystem’s Vendor Bias — Exposed by Open Source

Pete Allor (PSIRT SIG, US); Yogesh Mittal (Red Hat, IN)

TLP:CLEAR
 US

CVE Decaf: Brewing Better and More Actionable Data Quality

Jerry Gamblin (Cisco, US); Jay Jacobs (Emprirical Security, US)

TLP:CLEAR
 ES

Agentic CVE Triage Without the Hype: Context, Cost, and Confidence

Andrey Lukashenkov (Vulners, ES)

TLP:CLEAR
17:40 – 19:40

Networking Reception with Exhibits

Wednesday, April 15th

General Session (Grand Ballroom)Breakout 1 (North Ballroom)Breakout 2 (Center Ballroom)Breakout 3 (South Ballroom)Social Activity & Breaks
07:30 – 09:00

Breakfast

09:00 – 10:00

NIST's National Vulnerability Database Update and the Vulnerability Enrichment Ecosystem

TLP:CLEAR
10:00 – 10:30

Networking Break with Exhibits

10:30 – 11:30
 US

The CVE Program Quality Era: Strengthening Trust and Impact In Global Vulnerability Data

Lindsey Cerkovnik (CISA, US); Alec Summers (The MITRE Corporation, US)

TLP:CLEAR
 US

Fragile by Design: Large-Scale Evidence of Supply Chain Risk

Thomas Pace (NetRise, US)

TLP:CLEAR
 US

Lessons From NPM's Dark Side: Preventing the Next Shai-Hulud

Jenn Gile (OpenSourceMalware, US)

TLP:CLEAR
11:35 – 12:05
 US

Flipping the Criticality Funnel, A Practical Path to Real Prioritization

Sophia Sanles-Luksetich, Zachary Goldman (GitHub, US)

TLP:CLEAR
 US

Saving Ourselves the ID Headache: How Purls Can Work for Models and Datasets

Daniel Bardenstein (Manifest, US)

TLP:CLEAR
 GB

Honeypot‑to‑Detection-Rule: Auto‑Generating Nuclei Templates from Arkime PCAPs to Accelerate Detection and Discovery

Adlan Chaykin (Recorded Future, GB)

TLP:CLEAR
12:05 – 13:15

Lunch Break

13:15 – 13:45
 US

Preparing Vulnerability Management for the Quantum Era: From Legacy Crypto to Crypto-Agility

Arun Singh (Qualys, US)

TLP:CLEAR
 US

Transforming Vulnerability Management with Advanced Dependency Knowledge Graphs

David Starobinski, Sevval Simsek (Boston University, US)

TLP:CLEAR
 US

Accuracy Is Not Enough: Detecting Hidden Risk in CVE Impact Prediction

Keerthana Purushotham (cve.org CWG , AWG, UCSD, IEEE, US)

TLP:CLEAR
13:50 – 14:20
 AU

How to Answer “What’s Affected?” in Open Source

Jess Lowe, Rex Pan (Google, AU)

TLP:CLEAR
 US

Production Is the New Attack Surface: Why Post-Deployment Endpoint Detection Is Now Critical

Tracy Ragan (DeployHub.com, US)

TLP:CLEAR
 JP

Diving into the CVSS Base Score Metrics - An Exploratory Analysis Bridging Product Security Assessments and Real-World Attacks-

Kohei Taguchi, Takayuki Uchiyama, Yuichi Kikuchi (Panasonic Holdings Corporation, JP)

TLP:CLEAR
14:25 – 14:55
 US

Mind the Match: Why Vulnerability Matching Is Harder Than You Think

Alexandra Selldorff (Manifest Cyber, US)

TLP:CLEAR
 ES

Risk Context Score: A Quantitative Framework for Business-Contextualized Vulnerability Prioritization

Nikita Borovkov (SOFTSWISS, ES)

TLP:CLEAR
 NL

Deriving CVSS from Multi-Scenario Attack Graphs: A Reproducible, Auditable Scoring Method

Karel Knibbe, Ruben Bos (Volerion, NL)

TLP:CLEAR
14:55 – 15:25

Networking Break with Exhibits

15:25 – 16:25
 US IN

Panel: CVE Record Disputes Discussion: Policy, Process, and Opportunities for Improvement

Alec Summers (The MITRE Corporation, US); Yogesh Mittal (Red Hat, IN); Yves Younan (Cisco, US)

TLP:CLEAR
 US

Vulnerabilities Without CVEs: Governing the Dark Matter of Internal and Unknown Software

Josh Skorich (Spektion, US)

TLP:CLEAR
 ES

Speeding Up Vulnerability Triage: Automating Context Retrieval with AI Agents

Jorge Gimenez (Kraken, ES)

TLP:CLEAR
16:30 – 17:30
 US

Three Musketeers: CVE, CSAF, and VEX

Daniel Larson (Cybersecurity Infrastructure and Security Agency, US); Eoin Wilson-Manion (ANALYGENCE Lab); Tyler Zellers (ANALYGENCE Labs)

TLP:CLEAR
 US

From Roadmap to Results: Measuring CWE Adoption to Enable Prevention

Alec Summers, Steve Christey Coley (The MITRE Corporation, US)

TLP:CLEAR
 PL

National CSIRT as a CVD Hub: Lessons from CERT.PL’s Vulnerability Coordination Cases

Michał Dondajewski (CERT.PL, PL)

TLP:CLEAR
19:00 – 21:00

Offsite Social: Western Spirit Museum - ticket purchase required

Thursday, April 16th

General Session (Grand Ballroom)Breakout 1 (North Ballroom)Breakout 2 (Center Ballroom)Breakout 3 (South Ballroom)Social Activity & Breaks
07:30 – 09:00

Breakfast

09:00 – 10:00
 US

AI Systems Are Software Systems

Jonathan Spring (CISA, US)

TLP:CLEAR
 US

Axiomatic Events that Evolved Vulnerability Databases

Johnny Shaieb (IBM, US)

TLP:CLEAR
 US

Quantifying Swiss Cheese, the Bayesian Way

Stephen Shaffer (Moderna | EPSS SIG, US)

TLP:CLEAR
10:00 – 10:30

Networking Break

10:30 – 11:00
 US

The Myth of the Meteoric Rise in Vulnerabilities

Scott Moore (VulnCheck, US)

TLP:CLEAR
 US

The Quality Era of CVE: A Blueprint for Global Software Safety

Bob Lord (n/a, US)

TLP:CLEAR
 US

AI Is Writing Your Bug Reports. Can You Tell?

Jyoti Wadhwa (Self Employeed, US); Khushali Dalal (Self Employed, US)

TLP:CLEAR
11:05 – 12:05
 GB

Remediation-Aware Reachability: Patching Containers, Prioritizing with Agentic-CTI, and Scaling Fixes from Code to Cloud

Francesco Cipollone (Phoenix Security, GB)

TLP:CLEAR
 TR

Organizational Context Matters: Security Control Effectiveness on Vulnerabilities for Prioritization

Ertugrul Yaprak, Mehmet Kiliç (Picus Security, TR)

TLP:CLEAR
 US IN

Edge Blindness: How 20 Million Detections Reveal the Fatal Lag Between Compliance and Weaponization

Saeed Abbasi (Qualys Threat Research Unit (TRU), US); Shreya Salvi (Qualys, IN)

TLP:CLEAR
12:05 – 13:15

Lunch Break

13:15 – 14:15
 US

Supply Chains and Malware Campaigns: Is CVE the Right Way to Name the Game?

Art Manion (Tharros Labs, US); Caitlin Condon (VulnCheck, US); David Welch (HeroDevs, US); Shelby Cunningham (GitHub, US)

TLP:CLEAR
 IL

The AI Arms Race in Vulnerability Management, Who’s Winning?

Yotam Perkal (Pluto Security, IL)

TLP:CLEAR
 JP

The CVE Blind Spot: Defeating "Hidden EOLs" and Repo Jacking with Engineering Triage & Code Diet

Kota Kanbe, Ryunosuke Tanai (Future Corporation, JP)

TLP:CLEAR
14:15 – 14:30

Networking Break

14:30 – 15:00

Closing Remarks

  •  USTLP:CLEAR

    A Paradigm Shift in Vulnerability Identity: Why Vulnerability Databases Struggle

    Art Manion spends a lot of time working on various aspects of technical cybersecurity vulnerabilities including coordinated disclosure, measurement, management, information systems, risk assessment, and public policy. Art has led and contributed to vulnerability-related efforts the Forum of Incident Response and Security Teams (FIRST), the CVE Program, ISO/IEC JTC 1/SC 27, the Open Source Security Foundation (OpenSSF), and the National Telecommunications and Information Administration (NTIA, US). Art is the Deputy Director of Tharros Labs and previously managed vulnerability analysis at the CERT Coordination Center (CERT/CC).

    Jay is a Co-founder and Data Scientist at Empirical Security and Data Scientist Emeritus at Cyentia Institute. Jay is also the lead data scientist for the Exploit Prediction Scoring System (EPSS) and co-chair of the EPSS special interest group at FIRST. He also serves as the chair of the Consumer Working Group within the CVE program. Prior to his current roles, he was the Chief Data Scientist at Cyentia for several years and produced dozens of data-driven industry reports. He also served as the lead data scientist at Verizon working on the Data Breach Investigations report from 2010-2015 and he also served on the board of directors for the Society of Information Risks Analysts (SIRA) where he co-founded the non-profit dedicated to advancing risk management practices.

    In this talk, we build the case for an identity-first redesign of vulnerability records. Instead of open prose and after-market labels, each record should be anchored to the minimal, machine-verifiable set of assertions that unambiguously denote the same vulnerability across sources and time. We will connect familiar pain points (conflicting assertions, ambiguously defined affected products, flawed cross-repository joins, incomplete records and metric-driven shortcuts), to their root causes and the challenges facing us as we try to establish the identity of a vulnerability. We will explore the inherent tension between being human-meaningful, machine-usable, secure and decentralized, and how that is compounded by the analyst's natural limitations during the vulnerability discovery process. Our goal is an identity contract that is small, testable, and publisher-anchored that enables local discovery, deduplication, and practical adoption.

    April 14, 2026 13:30-14:30

  •  USTLP:CLEAR

    Accuracy Is Not Enough: Detecting Hidden Risk in CVE Impact Prediction

    An applied research summary introducing advanced confusion-matrix metrics that outperform accuracy in predicting CVE exploitability impact. CVE impact prediction is often evaluated using accuracy, despite operating in a domain characterized by extreme class imbalance, asymmetric risk, and incomplete ground truth. This paper argues that accuracy is a poor proxy for security effectiveness and can actively obscure dangerous failure modes, particularly false negatives involving rare but high-impact vulnerabilities. Grounded in statistical fundamentals, we reframe CVE evaluation through confusion-matrix–derived metrics- such as false-negative rate, likelihood ratios, and correlation-based measures, that apply to any predictive black box, not just machine learning models. Using real-world CVE workflows and illustrative failure cases, we show how these metrics provide earlier and more reliable signals of degraded trust in vulnerability assessments. The result is a practical, risk-aware evaluation framework that aligns statistical measurement with operational security outcomes, enabling teams to detect hidden blind spots before they translate into exploitable incidents.

    April 15, 2026 13:15-13:45

  •  ESTLP:CLEAR

    Agentic CVE Triage Without the Hype: Context, Cost, and Confidence

    Andrey Lukashenkov handles all things revenue, product, and marketing at Vulners - a bootstrapped, profitable company committed to providing an all-in-one vulnerability intelligence platform to the cybersecurity community.

    Being naturally curious and having a technical background, he leverages unlimited access to the Vulners database to research various topics related to vulnerability management, prioritization, exploitation, and scoring.

    AI is increasingly used in vulnerability workflows, but many implementations still depend on ad hoc prompt-driven summaries that are difficult to evaluate, hard to reproduce, and risky to operationalize. This session focuses on practical design choices that help agentic AI systems contribute responsibly to CVE triage, risk scoring, and coordinated response - without treating multi-agent approaches as magic or assuming a single framework is the answer. I’ll share a set of lightweight, framework-agnostic patterns and illustrate them with a compact demonstrator that combines specialized agents, tool-grounded vulnerability intelligence, and structured outputs. We’ll look at how to separate stable security knowledge from live retrieval, how to structure agent handoffs to reduce ambiguity, and how to move from narrative answers to verifiable artifacts that can support review and audit conversations. I’ll also show simple evaluation and cost-control techniques that replace “vibe checks” with measurable confidence signals and keep agent depth proportional to risk. Attendees will leave with pragmatic patterns they can apply whether they’re using CrewAI, LangGraph, PydanticAI, or an internal orchestration approach - plus a clear sense of when agentic systems truly add value over single-prompt analysis.

    April 14, 2026 17:10-17:40

  •  USTLP:CLEAR

    AI Is Writing Your Bug Reports. Can You Tell?

    Jyoti Wadhwa is a global cybersecurity and risk executive with over two decades of experience driving secure digital transformation across cloud, AI, and enterprise technology environments. Most recently, as Global Head of Product and Cloud Security at NetApp, she led end-to-end security for more than 160 products generating nearly $7 billion in licensed and SaaS revenue.

    Jyoti brings deep expertise in AI-driven security strategies, uniting governance, threat modeling, and attack surface management to build resilience against emerging adversarial techniques. She has developed cross-enterprise frameworks integrating AI assurance, secure development lifecycle (SDLC) principles, and continuous risk reduction across financial, healthcare, energy, and technology sectors.

    A CISSP-certified leader and board advisor, Jyoti specializes in aligning AI and security innovation with measurable business outcomes—bridging executive risk programs, NIST and ISO 27001 compliance, and next-generation AI workload security.

    Beyond the technical domain, Jyoti is passionate about inclusive talent development and mentorship, guiding professionals on practical pathways into cybersecurity and AI governance. Her leadership philosophy emphasizes continuous learning, collaboration, and purpose-driven innovation at the intersection of AI for Security and Security for AI.

    Khushali Dalal, a Product Security Engineer at Juniper Networks with deep expertise in vulnerability assessment, CVSS scoring, and secure product development. With certifications including CCNA, CompTIA Security+, and Juniper’s own credentials, she brings a strong technical foundation in networking and cybersecurity. Khushali is passionate about advancing product security at scale and bridging the gap between engineering and risk management. As a chair of Women of First SIG, she is very much passionate about spreading awareness and supporting women in cybersecurity.

    Khushali began her journey at Juniper in the infrastructure Verizon team as an Associate Systems Engineer(SE), where she supported and implemented Juniper lab in Verizon PoC, with a focus on LAN and WLAN design. Then she moved into the Verizon channel team as a Partner SE for Verizon’s Managed WLAN solutions. And in her last role she established an early-in-career program to support and build relationships between the Juniper SE and Verizon SA community.

    Educational background, Khushali was born and raised in a small town of India- Ahmedabad, Gujarat. She has a bachelor’s in electrical and Telecommunication Engineering from India and a master’s in cyber security from University of Maryland College Park.

    The rise of large language models has fundamentally changed how vulnerability reports are written. As AI dramatically increases both the volume and perceived credibility of vulnerability submissions. PSIRT and vulnerability management teams are seeing a surge of submissions that are partially or entirely AI-generated—often polished, technically plausible, and sometimes completely wrong. In this interactive session, attendees will explore how AI-generated vulnerability reports are reshaping vulnerability intake, triage, and validation. Participants will be presented with a series of real-world–inspired vulnerability reports and asked to determine whether each report was written by a human researcher, generated by AI, or produced through a mix of both. As the session progresses, new context will be revealed: missing proof-of-concept details, contradictory technical claims, hallucinated CVEs, reused templates, and subtle signals that affect credibility and prioritization. The audience will vote and debate in real time, followed by facilitated analysis explaining how PSIRT teams evaluate signal versus noise when AI is in the loop. The challenge is no longer identifying AI use, but preserving signal, accuracy, and response quality as AI becomes embedded in researcher workflows. Rather than framing AI as purely a problem or a solution, this talk focuses on practical detection, validation strategies, and process adaptations that security teams can use today. Unlike talks focused on AI detection tooling or automation alone, this session examines real PSIRT decision-making failures and corrections observed in live vulnerability response programs.

    April 16, 2026 10:30-11:00

  •  USTLP:CLEAR

    AI Systems Are Software Systems

    Dr. Jonathan Spring is a cybersecurity specialist in the Cybersecurity and Infrastructure Security Agency. Working within the Cybersecurity Division’s Vulnerability Management Office, his area of focus includes researching and producing reliable evidence to support effective cybersecurity policies at various levels of vulnerability management, machine learning, and threat intelligence.

    Several processes around AI systems are new or at least updated. We spend a lot of time talking about what's new, but not a lot of talking about what stays the same. In this talk, Dr. Spring provides a thorough review of all the various vulnerability management norms and processes that actually work pretty well for AI-related cybersecurity vulnerabilities. These items span asset management (such as SBOM), secure software development (such as the SSDF), coordinated vulnerability disclosure (for example CVE-2024-3660), and vulnerability triage systems. There are some practices that are not new to vulnerability management but have new names in AI systems. For example, "download arbitrary code from the internet and execute it" has always been an unpatchable security vulnerability. AI systems just happen to make it extraordinarily easy to configure a system that will download and run arbitrary code from the internet. We will just need to help our AI engineer colleagues manage that risk. The best way we can help our AI colleagues is to be clear about what cybersecurity norms and processes still work and that we expect the AI folks should integrate into, rather than make a parallel process that duplicates existing cybersecurity processes.

    April 16, 2026 09:00-10:00

  •  USTLP:GREEN

    Automating CNA CVE Reporting and Monthly Bulletins at Atlassian

    Zachary Echouafni is the technical lead for Atlassian's marketplace security team and CNA program, helping protect customers and marketplace app developers from emerging third party threats.

    Running a CNA program inside a fast‑moving product security organization is hard enough; doing it while coordinating globally distributed engineering teams, multiple scanners, and manual JSON submissions to MITRE is a recipe for burnout and blind spots. At Atlassian, our CVE reporting started as an ad‑hoc, highly manual process: engineers hand‑crafted CVE JSON in MITRE’s GitHub repo, vulnerability data lived in scattered tools, and every disclosure felt like a bespoke project. Coverage was inconsistent, timelines were unpredictable, and the friction made it difficult to scale beyond a handful of teams. In this talk, I’ll walk through how I evolved that process into a fully automated CNA pipeline integrated with the MITRE CVE Services API and the Atlassian Cloud stack. I’ll show how we built an application on top of Jira and Confluence that lets engineers report CVEs through standard Jira tickets, auto‑drafts vulnerability reports using CVSSv4 vectors, and drives a monthly bulletin process that aggregates CVEs from dozens of engineering teams into a single, ready‑to‑review draft. I’ll dig into the hard parts: sanitizing vulnerability data coming from many scanners and sources, deciding what exploitation detail to include or omit, and building guardrails so we don’t leak sensitive information while still being transparent. Beyond the tooling, I’ll focus on the operational side. I’ll describe how we aligned product release cycles to a monthly patch timeline that supports coordinated disclosure, and how I built buy‑in with product engineering organizations across multiple geos. That includes establishing monthly on‑call rotations and clear ownership for security bulletins so that CVE reporting is a shared responsibility, not a security‑only burden. Attendees will leave with practical patterns for using the MITRE CVE Services API from within Jira, turning CVSSv4 data into structured reports, and building the relationships and processes needed to run a sustainable, high‑coverage CNA program.

    April 14, 2026 10:30-11:30

  •  USTLP:CLEAR

    Automating Container Releases for Regulated Environments

    Kaajol Dhana is a senior software engineer for NVIDIA’s Product Security Tools team. She is interested in container security and providing actionable and insightful reports for teams to be able to remediate security risks. Kaajol has over 5 years of experience and earned her BS in Computer Engineering from the University of Texas at Austin. Outside of work, Kaajol enjoys playing tennis, trying out new restaurants, and traveling with her husband.

    Releasing containers into regulated environments requires meeting stringent compliance requirements—DISA STIG hardening, approved base image policies, and stricter vulnerability remediation timelines. As container portfolios scale, manual compliance reviews become release bottlenecks that slow delivery without meaningfully improving security. We built an automated release gating system that flips the script: compliance becomes a design constraint, not a release gate. This talk reveals how we translate fuzzy compliance language into hard technical controls, then automate them in-pipeline where teams can act on them early. We'll show you how we enforced approved base image checks, integrated vendor VEX data to cut through vulnerability alert fatigue, and gave development teams visibility to fix gaps before enforcement kicked in. We designed exception workflows alongside hard gates—ensuring teams could formally document edge cases instead of finding workarounds. Aimed at compliance practitioners, PSIRT teams, and tooling engineers, this session shares real program lessons for scaling compliance automation across container portfolios for regulated environments, directly aligned with VulnCon’s focus on consumer workflows, vulnerability metadata and data quality, enterprise and vendor collaboration, and tooling and automation.

    April 14, 2026 11:35-12:05

  •  USTLP:CLEAR

    Axiomatic Events that Evolved Vulnerability Databases

    Johnny Shaieb is currently working on his PhD at the University of Tulsa, where his dissertation focuses on vulnerability database history and scoring. He is the Chief Architect of IBM’s Cyber Threat Exposure Management practice, an elite unit specializing in penetration testing, adversary simulation, and vulnerability management. His cybersecurity journey began in 1998 at WorldCom after earning a bachelor’s in management information systems from Oklahoma State University. He later pursued a master’s in Telecommunications at OSU and a second master’s in Computer Science at the University of Tulsa, focusing on NSA CyberCorps security.

    With over 25 years of experience, Johnny has honed his offensive security skills through academic and professional endeavors. Since 2011, he has taught ethical hacking at institutions like Houston Community College and created the "Hac-King-Do" framework for free ethical hacker training. At IBM, he patented a methodology to automate hacker research and co-founded the X-Force Red Hacker internship with "Space Rogue" to recruit top cybersecurity talent.

    This paper is a cause-and-effect narrative that examines the historical events, key individuals, challenges, and vulnerability analyses that contributed to the development of vulnerability repositories—both lists and databases—forming the foundation for the “Common Vulnerabilities and Exposures (CVE)” and later the “National Vulnerability Database (NVD)”. This narrative follows a cause-and-effect progression, beginning with the very first message sent over ARPANET, which caused a buffer overflow and served as a catalyst for the development of modern vulnerability tracking. As the nascent ARPANET developed, operating system pioneers began documenting vulnerabilities with meticulous care, restricting awareness to legitimate users only. However, cultural moments such as the film WarGames (1983) and cyber incidents like the Morris Worm (1988), The Cuckoo’s Egg (1989), and Solar Sunrise (1998) began to erode this cautious approach, highlighting the need for full public disclosure of vulnerabilities stored in a centralized database. To provide an authoritative account of seldom-told stories and historical events, a combination of virtual interviews, phone calls, emails, messaging, questionnaires, and white paper discussions were conducted with the following thought leaders: Scott Moore, Jay Jacobs, Brian Martin, Steve Christey, Peter Mell, Dr. David Mann, Andre Frech, Dr. Eugene Spafford, Dr. Matt Bishop, Elias Levy, Art Manion, Dr. Cliff Stoll, Dr. Leonard Kleinrock, and Dr. John Hale.

    April 16, 2026 09:00-10:00

  •  USTLP:CLEAR

    Boosting Vulnerability Intelligence: How Accurate CWE Mappings Transform ML Model Performance

    Prof. David Starobinski is a Professor of Electrical and Computer Engineering and of Systems Engineering at Boston University, with an affiliated appointment in the Department of Computer Science. His research interests are in cybersecurity, wireless networking, blockchain and cryptocurrency, and network economics.

    Sevval Simsek is a Computer Engineering PhD candidate at Boston University. She is a part of Networking and Information Systems Lab, and has been focusing on ML for Cybersecurity, and improving cybersecurity operations with graphs and algorithms.

    Varsha Athreya is an undergraduate student studying Computer Engineering with a Concentration in Machine Learning. She is working on using knowledge graphs to fix mappings in the National Vulnerability Database as well as using the New England Research Cloud for model training and deployment.

    Accurate mapping between Common Vulnerabilities and Exposures (CVE) and Common Weakness Enumeration (CWE) entries is critical for effective vulnerability management and risk assessment. However, public databases, such as the National Vulnerability Database (NVD), suffer from inconsistent and incomplete CVE–CWE mappings, complicating automated analysis and remediation. We introduce FixV2W, a lightweight approach that leverages knowledge graph embeddings and longitudinal trends to improve mapping accuracy of the NVD. FixV2W systematically analyzes historical remapping patterns and leverages hierarchical relationships within NVD and CWE data to predict more precise CWE mappings for vulnerabilities linked to Prohibited or Discouraged categories. We run extensive experimental evaluation of FixV2W, based on test data set collected between August 2021 and December 2024. Considering the Top-10 ranked predictions, the results show that FixV2W predicts the correct CWE mappings for 69% of exploited vulnerabilities that had invalid CWEs before they were exploited. We also show that FixV2W significantly improves the performance of ML models relying on NVD data. For instance, for a model geared at uncovering unknown CVE-CWE mappings, FixV2W improves the Mean Reciprocal Rank (MRR) from 0.174 to 0.608. These results show that FixV2W is a promising approach to identify and thwart emerging threats.

    April 14, 2026 14:35-15:05

  •  US BETLP:CLEAR

    CISA-ENISA Joint Messaging

    Lindsey Cerkovnik is the Chief of CISA’s Vulnerability Response & Coordination (VRC) Branch. Her team is responsible for CISA’s Coordinated Vulnerability Disclosure

    (CVD) process, the Known Exploited Vulnerabilities (KEV) catalog, and CISA’s Stakeholder Specific Vulnerability Categorization (SSVC) process. Lindsey and her team help to maintain, support, and advance the global vulnerability ecosystem by funding and overseeing the CVE and CVE Numbering Authority (CNA) programs, leading the production and dissemination of machine-readable vulnerability enrichment information, and engaging in valuable technical collaboration with the vulnerability research community.

    Nuno Rodrigues Carvalho currently serves as Head of Sector of the Incident & Vulnerabilities Services within the Operations and Situational Awareness Unit (OSA) of the European Union Agency for Cybersecurity (ENISA). Before joining ENISA as a Senior Threat and Vulnerability Analyst, he developed more than 15 years of experience in strategic, tactical, and operational analysis and situational awareness through roles at both national and international levels. Previously, he also worked at the European Parliament and in the banking sector.

    "The Common Vulnerabilities and Exposures (CVE) Program is a global standard for identifying vulnerabilities, with over 460 CVE Numbering Authorities (CNAs). In this talk, CISA and ENISA will discuss their commitment to the CVE program. CISA will share insights from its 25 years of involvement as a sponsor and participant while ENISA will elaborate on its current work and outline its plans for further expanding its role in the CVE program. Together they will discuss the program’s future and other topics to such as program diversification, internationalization, partnerships, infrastructure modernization, and data quality. Participants will gain valuable insights from ENISA’s and CISA’s unique perspectives as representatives of nation states. The talk will highlight the strong partnerships between CISA and ENISA and their dedication to the CVE program, emphasizing its importance as a public good. Additionally, it will showcase their operational and strategic efforts to enhance the CVE Program's role in global cybersecurity. "

    April 14, 2026 09:00-10:00

  •  PLTLP:CLEAR

    Contextual SBOMs: Unlocking Precise Vulnerability Management with Build-Time Content Intelligence

    Przemysław “Rogue” Roguski is a Security Architect at Red Hat who specializes in shift-left security initiatives focusing on embedding security best practices and attestation into the earliest stages of the SDLC. He contributes security analysis work on Red Hat OpenShift and other OpenShift-related products. He also designs security solutions and processes across Red Hat.

    Przemysław “Rogue” Roguski is a Security Architect at Red Hat who specializes in shift-left security initiatives focusing on embedding security best practices and attestation into the earliest stages of the SDLC. He contributes security analysis work on Red Hat OpenShift and other OpenShift-related products. He also designs security solutions and processes across Red Hat.
    He contributes to the security ecosystem as a member of the various SBOM/VEX working groups, an OASIS OpenEoX Technical Committee member and a key contributor to the CWE program.

    Software Bills of Materials (SBOMs) are fundamental to modern software transparency, providing a component inventory vital for vulnerability management programs. However, in complex, modern build environments, especially those involving multistage builds, traditional analyzed SBOMs fail to provide the necessary detail, often grouping content from various build stages and layers into a single component. This session delves into the critical need for and implementation of Contextual SBOMs. A Contextual SBOM is an advanced form of the SBOM that captures origin of the content sourced from base image or build stages of the multistage builds. By precisely identifying content that is COPY-ied from builders in multistage builds , the Contextual SBOM enables a significant "shift-left" in security. This intelligence is essential for precise vulnerability management, allowing security teams to differentiate between transient build tools and actual product dependencies, thereby ensuring a verifiable, trusted software supply chain and proactively managing vulnerabilities during the build phase. Key Topics The Foundational Role of SBOMs: An overview of why SBOMs are critical for software transparency and establishing an effective organizational vulnerability program. The Challenge of “Legacy” SBOMs: Discussing the limitations of non-contextual SBOMs in modern containerized and multistage build environments, where content origin and dependencies are obscured. Defining Contextual SBOMs: An in-depth look at what a Contextual SBOM is and how it delivers the granular data required for precise vulnerability management. Establishing Content Relationships: The use of relationships (e.g., CONTAINS, DESCENDANT_OF) within the Contextual SBOM to accurately define how content is sourced from specific build layers. Identifying Build-Time Dependencies: Technical methods for parsing information from build layers, identifying and contextualizing content copied from different build steps. Examples of Contextual SBOMs effective usage.

    April 14, 2026 15:30-16:30

  •  US JPTLP:CLEAR

    Coordinated Vulnerability Disclosure (CVD) Table Top Exercise

    Justin Murphy is a Vulnerability Analyst with the Cybersecurity and Infrastructure Security Agency (CISA). He helps to coordinate the remediation, mitigation, and public disclosure of newly identified cybersecurity vulnerabilities in products and services with affected vendor(s), ranging from industrial control systems (ICS), operational technology (OT), medical devices, and traditional information technology (IT) vulnerabilities. Justin is involved with many other vulnerability management related efforts, including CISA’s Software Bill of Materials (SBOM) and Vulnerability Exploitability eXchange

    (VEX) work, and he serves as co-chair for the OASIS Open Common Security Advisory Framework (CSAF) and OpenEoX Technical Committees. Justin is also a founding member of the Global Community of Practice on Coordinated Vulnerability Disclosure (Global CVD-COP). Justin is a former high school mathematics teacher turned cybersecurity professional and has a M.Sc. in Computer Science from Tennessee Technological University, and a B.Sc. degree in Mathematics and Statistics from the University of Tennessee

    (Knoxville).

    Working on CVD at JPCERT/CC for 10 years, Tomo currently leads the Global CVD project of the organization, which aims to contribute to the global CVD ecosystem stability through collaborations with the stakeholders from different parts of the world.

    CVD table top exercise offers a realistic, scenario-based experience designed to enhance the understanding of the CVD process and to develop practical skills related to vulnerability coordination. Participants from government agencies, security teams, and critical infrastructure sectors will come together to practice collaboration in a simulated vulnerability scenario. Participants will work through the steps of identifying, assessing, and disclosing vulnerabilities, coordinating across organizations to address key issues like information sharing and risk mitigation. The scenario will highlight the roles of various stakeholders, including reporters, vendors, downstream users, and third-party coordinators, and highlight the importance of following best practices while balancing transparency and security. Engaging in practical application of CVD concepts will allow participants to truly grasp the complexities and nuances of the CVD process from the perspectives from different stakeholder roles, providing a hands-on opportunity to navigate real-world challenges and build effective solutions. Participants will leave with a deeper understanding of the CVD process, the critical role of communication, and actionable insights to improve their own vulnerability management and disclosure practices.

    April 13, 2026 08:30-12:30

  •  USTLP:CLEAR

    CVE Decaf: Brewing Better and More Actionable Data Quality

    Jerry Gamblin is a prominent voice in the vulnerability management community and the creator of RogoLabs.net, an innovation lab for security data science. He serves on the EPSS SIG and contributes to various CVE Program working groups. An international speaker and researcher, Jerry’s work focuses on the practical application of data science to solve complex vulnerability challenges.

    Jay is a Co-founder and Data Scientist at Empirical Security and Data Scientist Emeritus at Cyentia Institute. Jay is also the lead data scientist for the Exploit Prediction Scoring System (EPSS) and co-chair of the EPSS special interest group at FIRST. He also serves as the chair of the Consumer Working Group within the CVE program. Prior to his current roles, he was the Chief Data Scientist at Cyentia for several years and produced dozens of data-driven industry reports. He also served as the lead data scientist at Verizon working on the Data Breach Investigations report from 2010-2015 and he also served on the board of directors for the Society of Information Risks Analysts (SIRA) where he co-founded the non-profit dedicated to advancing risk management practices.

    Anyone who has tried to ingest vulnerability data knows that it’s often incomplete, inconsistent, and rather difficult to operationalize. With the CVE program entering its “data quality” era, we need to begin efforts to define and measure data quality. In this talk I will introduce a Data Quality Assessment Framework (DQAF - pronounced “decaf”) for CVE and vulnerability data that draws on established information-quality research, but is tailored to the realities of CNAs, NVD, vendors, and downstream consumers. The framework separates the quality of the record design (what the schema can express) from the quality of record instances (how well CNAs actually populate those fields), and scores multiple dimensions such as completeness, accuracy, consistency and machine-usability.

    April 14, 2026 17:10-17:40

  •  USTLP:CLEAR

    CVE Record Format - Purl and CPE Workshop

    Chris Coffin has been involved in the security industry for more than 25 years and has been involved in the CVE Program specifically since joining MITRE in 2012. Chris is also a CVE Board member and is co-chair of the Quality Working Group (QWG) where efforts are underway to update and improve the CVE Record Format.

    MegaZone (yes, that's his name, call him MZ) has been with F5, Inc. since 2010, and the F5 SIRT (Security Incident Response Team) since 2016, where he is currently a Principal Security Engineer. Prior to F5 he did time at Xylogics, Livingston Enterprises, Lucent, GTE Internetworking (BBN), Sling Media, and a few others, after graduating from WPI in 1994. Outside of work he collects whisk(e)y, enjoys travel with his wife (often Disney-related), and volunteers to help a local non-profit in their small Massachusetts town with their tech issues.

    MegaZone (yes, that's his name, call him MZ) has been with F5, Inc. since 2010, and the F5 SIRT (Security Incident Response Team) since 2016, where he is currently a Principal Security Engineer. Prior to F5 he did time at Xylogics, Livingston Enterprises, Lucent, GTE Internetworking (BBN), Sling Media, and a few others, after graduating from WPI in 1994. Outside of work he collects whisk(e)y, enjoys travel with his wife (often Disney-related), and volunteers to help a local non-profit in their small Massachusetts town with their tech issues.MegaZone has been involved with the CVE program since F5 joined as a CNA in 2016 and has taken an increasingly active role over time, eventually running out of working groups to join. He is currently representing the CNA community in the AWG, CNACWG, OCWG, SPWG, TWG, QWG, and VECWG, including being a co-chair of the last two. He is honored to further represent the CNA community before the CVE Board in his new role as CNA Liaison.

    April 14, 2026 13:30-14:30

  •  USTLP:CLEAR

    Deep Dive Workshop into CVE-to-CWE Root Cause Mapping

    Connor Mullaly is a Cyber Security Engineer at MITRE and a member of the CWE team. Connor is the task lead for the CWE Top 25, heavily involved in CWE content development, and a SME on vulnerability root cause mapping where he leads the Root Cause Mapping Working Group with community members. Outside of CWE work Connor also leads the MITRE Secure Code Review program, combining static and manual code analysis to eliminate as many software weaknesses as possible in MITRE internally developed codebases.

    Steve Christey Coley is a Principal INFOSEC Engineer at The MITRE Corporation. He was the co-founder and technical lead of CVE, and chair of its Editorial Board from 1999 to 2015. He co-authored the "Responsible Vulnerability Disclosure Process" IETF draft and contributed to CVSS v2. He is the co-founder and technical lead for the Common Weakness Enumeration (CWE) circa 2005. Since 2014, he has supported FDA in various aspects of medical device security, including vulnerability handling, risk assessment, threat modeling, SBOM handling, adoption of emerging technologies, and a rubric for applying CVSS to medical devices.

    Root cause mapping is the identification of the underlying cause(s) of a vulnerability. This is best done by correlating CVE Records and/or bug or vulnerability tickets with CWE entries. Today, this is not done accurately at scale by the vulnerability management ecosystem.
    Accurate root cause mapping is valuable because it directly illuminates where investments, policy, and practices can address the root causes responsible for vulnerabilities so that they can be eliminated. This applies to both industry and government decision makers.
    Additionally, it enables:
    - Driving the removal of classes of vulnerabilities: Root cause mapping encourages a valuable feedback loop into a vendor’s SDLC or architecture design planning
    - Saving money: the more weaknesses avoided in your product development, the less vulnerabilities to manage after deployment
    - Trend analysis (e.g., how big of a problem is memory safety compared to other problems like injection)
    - Further insight to potential “exploitability” based on root cause (e.g., command injection vulnerabilities tend to see increased adversary attention, be targeted by certain actors)
    - Organizations demonstrating transparency to customers how they are targeting and tackling problems in their products

    Many people in the CVE community – especially CNAs, product security managers, and vulnerability researchers – have begun to map CVEs to CWE identifiers in order to identify root-cause patterns across all known vulnerabilities of interest.
    While there has been significant progress in easily-measurable CWE usage in recent years – such as the near-complete avoidance of CWE categories, and an increase in the percentage of CNAs who provide CWE mappings – there are still concerns about the accuracy and precision of CWE mappings.
    This workshop is intended to help CNAs, vulnerability researchers, and other interested parties to improve the accuracy and precision of their CWE mappings.

    April 13, 2026 13:30-17:30

  •  NLTLP:CLEAR

    Deriving CVSS from Multi-Scenario Attack Graphs: A Reproducible, Auditable Scoring Method

    Ruben Bos is co-founder of Volerion, where he and co-founder Karel Knibbe use AI to improve the quality, consistency, and timeliness of CVE data. Ruben studied software engineering and holds a cum laude Bachelor’s degree in Cyber Security. He has over a decade of experience in bug bounty and penetration testing, including winning multiple live hacking events hosted by companies such as Meta and Intel. Over the past two years, he has focused on high-accuracy CVSS automation and vulnerability enrichment, progressing from direct vector prediction to guided walkthrough approaches and ultimately to a graph-based method that models exploitation as explicit scenarios and derives CVSS vectors programmatically.

    CVSS is standardized, yet difficult to apply in practice. Traditional CVSS enrichment starts by mentally constructing an attack scenario, but that context is abstracted away by the final vector. In addition to this, many vulnerabilities have multiple plausible exploitation paths, but workflows lack the ability to choose the most severe candidate. Without first considering all plausible scenarios, it is unclear which scenario the final vector should be based on, and "worst case" becomes an assumption rather than fact. In an attempt to represent multiple possibilities with a single score, analysts often end up mixing metric choices drawn from different scenarios, producing a hybrid vector that does not faithfully represent any single attack. These shortcomings drive inconsistency, inaccuracy, and lack auditability. This talk presents a transparent, multi-scenario scoring method based on attack graphs, thereby eliminating all three.

    April 15, 2026 14:25-14:55

  •  JPTLP:CLEAR

    Diving into the CVSS Base Score Metrics - An Exploratory Analysis Bridging Product Security Assessments and Real-World Attacks-

    Kohei joined Panasonic in 2024 out of school and joined the global strategy team at the Product Security Center as his first job in the cyber security field. His daily work focuses on the analysis of IoT honeypot data and the monitoring of cybersecurity trends.

    Taki is a member of Panasonic PSIRT. Main roles are the handling of vulnerabilities, creating and conducting product security training to product developers and providing assistance to product development teams.

    Yuichi joined Panasonic in 2019 out of school and joined the vulnerability testing team at the Product Security Center as his first job in the cyber security field. His daily work involves vulnerability testing various products and devices for Panasonic business units and alongside that work he thinks about better ways to score and classify vulnerabilities.

    In recent years, the number of publicly disclosed vulnerabilities has continued to increase, making it increasing challenging for product vendors and developers to determine which security issues should be addressed with priority while considering resource constraints. CVSS Base Scores have traditionally been widely used as an indicator for prioritizing remediation efforts; however, its numerical value alone does not always sufficiently reflect risk to a particular organization, or which vulnerabilities attackers actually choose to exploit in real-world attacks. In this study, we attempt to explore the characteristics of vulnerabilities that attackers exploit, leveraging real-world attack data collected using an in-house developed IoT honeypot system. From this attack data, we analyzed the metrics that make up CVSS base scores to see if there are patterns in scoring for vulnerabilities that are exploited. In addition to this analysis, we correlated this with the vulnerability data obtained from pre-release product security assessments that have been conducted on in-house products for over 15 years. We will present insights into which vulnerabilities product vendors and developers should focus on and determining how to set remediation priorities.

    April 15, 2026 13:50-14:20

  •  US INTLP:CLEAR

    Edge Blindness: How 20 Million Detections Reveal the Fatal Lag Between Compliance and Weaponization

    The vulnerability management industry operates on a set of golden rules: patch within 30 days, prioritize CISA KEV entries, and track Mean Time to Remediate (MTTR). However, our analysis suggests that for Edge and Network infrastructure, these rules are not just ineffective—they are often obscuring the true state of systemic risk. In a joint study conducted by the Qualys Threat Research Unit and the Qualys Data Science Team, we analyzed 20 million vulnerability detection events across edge devices from 2021 to 2025. We specifically focused on weaponized vulnerabilities that are actively exploited in the wild and listed in the CISA KEV catalog. The results contradict the standard linear model of risk management. We discovered a distinct split in remediation behaviors where the “middle class” of patching has largely collapsed: devices are either remediated almost immediately (often via automation) or effectively abandoned for extended periods, creating a significant gap in defense. This session will highlight the visibility gaps affecting modern security programs. We will present evidence suggesting that the race between attacker and defender is often skewed; for legacy vendors, attackers frequently enjoy a statistical head start of 180 days to 2 years before the average enterprise detects and fixes the flaw. Furthermore, we will analyze the timing of the CISA KEV list relative to edge weaponization. The data indicates that relying solely on regulatory lists for this asset class is often a reactive strategy—akin to reading a history book rather than receiving an early warning—as the alerts frequently arrive long after exploitation has begun. Attendees will leave with new, data-backed metrics on prioritization—and a clear takeaway: compliance isn’t security. We will move beyond high-level theory to propose detailed, product-specific recommendations for the most frequently weaponized product lines found in our research, including Cisco, F5, Juniper, Citrix, QNAP, Sophos, Palo Alto Networks, Ivanti, Check Point, ConnectWise, and Fortinet. The session will conclude with strategies to pivot from reactive remediation to architectural resilience.

    April 16, 2026 11:05-12:05

  •  USTLP:CLEAR

    Embracing the Era of Transparency: Automating VEX Application for Scalable, Context-Aware Security

    Jessica Butler is a Senior Product Security Engineer at NVIDIA, where she scales vulnerability detection and remediation across complex software and AI ecosystems. She leads automation of vendor VEX ingestion and overlays exploitability context onto scan results—turning raw data into actionable insights for engineering teams and customers. Jessica partners with scanning vendors to optimize how VEX intelligence enhances container image security at scale. She also integrates NVIDIA’s Vulnerability Analysis for Containers into internal workflows, applying AI-driven, evidence-based techniques to reduce analyst toil and improve decision quality. She is passionate about pragmatic security automation that bridges standards, tools, and real-world developer practices.

    Kristina is a Product Manager at NVIDIA working diligently to accelerate AI adoption in enterprises, focusing on OSS security management. Before this, Kristina was a product manager for NVIDIA's NGC catalog, facilitating SDK access for developers.

    As organizations accelerate AI adoption, managing software vulnerabilities in sprawling open-source ecosystems has become increasingly complex. Traditional vulnerability scanning alone cannot match the speed and scale of modern AI software supply chains. This session explores how open standards and automated Vulnerability Exploitability eXchange (VEX) integration are transforming vulnerability management with precise, machine‑readable insights. We’ll show how VEX documents, built on open specifications, can be directly associated with software release artifacts, ensuring traceable context that persists across the release lifecycle. By collaborating with leading scanning vendors, we’re streamlining VEX ingestion into vulnerability management workflows—enabling automated filtering of exploitable vulnerabilities at scan time without additional user effort. This standards‑based integration reduces false positives, improves prioritization, and keeps focus squarely on real, exploitable risks. Attendees will dive into the architecture behind VEX automation, the open ecosystem standards that power it, and practical steps to implement these capabilities in their own environments. A live demo will showcase end‑to‑end automation in action—turning raw vulnerability data into actionable intelligence for secure, production‑grade AI deployments. Participants will leave with a clear blueprint for adopting open, automated, and scalable vulnerability management practices that enhance both resilience and speed in the AI era.

    April 14, 2026 11:35-12:05

  •  USTLP:CLEAR

    Flipping the Criticality Funnel, A Practical Path to Real Prioritization

    Sophia Sanles-Luksetich: Senior Security Analyst with 6+ years of experience, focused on building data visualizations and producing analytics for vulnerability management, with prior experience in bug bounty triage. Her work has been critical in navigating and leveraging vulnerability management’s massive and continuously growing database of security findings.

    Zach Goldman: Security Engineer with 5+ years of experience, currently specializing in developing the Exceptions feature to better track and manage deviations from standard remediation processes. His work directly supports leadership at both the organizational and team levels, requiring a high degree of polish and cross‑departmental collaboration.

    Modern vulnerability management is drowning in noise: massive alert volumes, inconsistent vendor scores, and fragmented data sources make it difficult to understand what truly matters. This session shows how GitHub flipped its inverted risk funnel by building a unified, extensible risk‑scoring model that normalizes findings across 20+ heterogeneous sources and hundreds of thousands of daily alerts. We’ll demonstrate how combining CVSS with threat‑driven metrics like EPSS and KEV, asset‑specific context, and the newly updated FedRAMP SLA requirements turns raw findings into actionable prioritization. We’ll also cover the engineering systems that make this scale possible, including routing strategies and enrichment pipelines. You’ll learn how to evolve industry standards rather than replace them, tune formulas and weights using calibration sets, and future‑proof your scoring model as new metadata and detection strategies emerge. If your critical alerts outnumber all other severities, this talk will show you how to restore clarity, reduce alert fatigue, and drive remediation where it has the greatest impact.

    April 15, 2026 11:35-12:05

  •  USTLP:CLEAR

    Fragile by Design: Large-Scale Evidence of Supply Chain Risk

    Thomas is the co-founder and CEO of NetRise, a cybersecurity company focused on providing visibility into the software supply chain to identify vulnerabilities and risk via binary analysis. Prior to NetRise, Thomas served as the Global Vice President of Enterprise Solutions at Cylance where his responsibilities ranged from conducting incident response investigations, product marketing, public speaking and analyst relations. Thomas was also responsible for ICS security at the DOE for 3 years and served in the United States Marine Corps serving in both Iraq and Afghanistan. Thomas has spoken at Black Hat, DEFCON, RSA, and was interviewed on 60 Minutes and Last Week Tonight with John Oliver for his efforts related to ransomware.

    Analysis of millions of binaries across firmware, containers, applications, and cloud workloads shows systemic risk: 88% contained vulnerabilities, more than half had hardcoded credentials, and nearly a third exposed private keys. This session presents aggregated findings on the fragility of the global software supply chain.

    April 16, 2026 11:05-12:05

  •  USTLP:CLEAR

    From Backlog to Battle Plan: A Hands-On Vulnerability Management Strategy Lab

    Maggie Morganti is a seasoned leader in cyber-physical and industrial cybersecurity, currently serving as Senior Director of Product Security at Worldpay. With a career grounded in securing complex systems across energy, automation, and critical infrastructure, Maggie has shaped strategies that enhance resilience, visibility, and threat response in operational environments. Notably, she has directly led and assisted in leading multiple responses for APT custom malware against industrial control systems, including PIPEDREAM. Before joining Worldpay, she served as Product Security Research Manager at Rockwell Automation and held pivotal roles in product security at Schneider Electric. Her early career included safeguarding critical energy systems at Oak Ridge National Laboratory and analyzing real-world threats with Mandiant’s Cyber‑Physical Threat Intelligence team. Maggie is featured on RSAC’s expert roster, co-chairs the Device Security & Accessibility Program Committee, and continues to drive critical conversations on diversity, ICS policy, and proactive cyber risk governance. Her work unites technical rigor with leadership, forging secure-by-design paths for the future of industrial cybersecurity.

    April 13, 2026 13:30-17:30

  •  US GBTLP:GREEN

    From JSON to Clarity: Practical Tools for SBOM Interpretation

    John Bergland is based in Boston, Massachusetts and works as a Program Manager for Supply Chain Security at IBM Office of the CISO. He currently specializes in working with SBOMs, helping to define and scale IBM’s process for both analyzing and producing SBOMs. During his career at IBM, he has worked as a business analyst and requirements engineer. He has an MBA and Masters in Information Systems from Boston University.

    Zadia Alden is based in Winchester, England. She has over 25 years' experience in Software Development, performing various different roles over those years. In her current role, she manages the Open-Source Program Office within the CISO organisation. Over the last couple of years, she has been working in the SBOM space, building her expertise to become an SME in SBOM generation and analysis. She is a Certified Project Management Professional, within the Project Management Institute.

    SBOMs are critical for software supply chain security, but their complexity often limits their value beyond engineering teams. Business leaders frequently ask: “Why isn’t this human-readable?” or “Is this all open source?”—revealing a gap between technical detail and business understanding. This session demonstrates how to bridge that gap using lightweight, web-based tools enhanced with AI. Built without advanced programming skills, these tools transform raw SBOM data into clear, actionable insights for both technical and non-technical audiences. By demystifying SBOMs, this approach empowers organizations to improve compliance, risk management, and collaboration across technical and business teams—without requiring deep technical expertise. Attendees will see six practical tools in action, each designed to answer critical questions about SBOM quality and security posture: - SBOM Validator: Confirms compliance with CycloneDX/SPDX standards. - Completeness Checker: Verifies NTIA minimum elements. - Component Analyzer: Distinguishes open source vs. proprietary components. - CVE Mapper: Detects known vulnerabilities across supplier SBOMs. - Version Drift Analyzer: Highlights outdated components and upgrade priorities. - Scan Readiness Checker: Flags issues that could impact downstream vulnerability scanning. These tools accelerate SBOM interpretation, reduce manual effort, and provide actionable insights that can integrate into CI/CD pipelines and supplier risk assessments. Attendees will leave with practical strategies and examples of how automation and AI can make SBOMs more transparent and useful across the organization. Session Takeaways: - Understand why SBOM complexity creates barriers for both technical and business teams. - Learn practical strategies to make SBOMs accessible without sacrificing technical rigor. - Explore six lightweight tools that validate, analyze, and enrich SBOM data. - Gain actionable ideas for integrating SBOM insights into CI/CD and supplier risk assessments. - Discover how automation and AI accelerate SBOM adoption and compliance.

    April 14, 2026 16:35-17:05

  •  USTLP:GREEN

    From Overload to Operational Leverage: Using Agentic AI to Scale PSIRT Triage

    Chris Farrell leads the Product Vulnerability Response team at Salesforce. He has 35 years experience in computer information technology and 20 years experience leading successful vulnerability and incident response teams in the healthcare, financial, and SaaS industries. He holds a Bachelor's degree in Computer Information Technologies from Purdue University, and a Master’s degree in Information Security Engineering from the SANS Technology Institute. Chris is also certified GIAC Security Expert #174.

    Raaghavv Devgon is a Senior Product Vulnerability Engineer at Salesforce with over five years of experience across the security lifecycle—from Incident Response to Application Security. Currently focused on the unique challenges of AI Security, Raaghavv leverages a deep technical background that earned him a Salesforce A4D Bug Bounty win. His perspective is informed by prior roles at IBM and KKR and is backed by a Master’s in Computer Science. He holds SANS GCPN and GWAPT certifications for offensive security, alongside an IAPP CIPT for privacy engineering.

    Modern PSIRT and vulnerability response teams face a common scaling challenge: expanding product portfolios and rising submission volumes without corresponding growth in engineering capacity. As vulnerability intake increases, teams must rapidly distinguish high-quality, actionable reports from incomplete submissions and false positives—without degrading response quality or engineer morale. This session presents a practical, production-tested approach for scaling vulnerability intake and triage using agentic AI as a first-pass operational layer. Rather than replacing human judgment, the model was deliberately designed to augment security engineers by absorbing high-volume, repetitive triage tasks and enforcing consistent intake quality standards. We will walk through the architectural and operational decisions behind deploying an always-on AI triage agent, including how it evaluates report completeness, identifies likely false positives, and generates structured, high-quality feedback for reporters. Particular attention will be paid to guardrails, confidence thresholds, and failure modes—what the system is allowed to decide autonomously versus when cases are escalated to human review. Attendees will learn how agentic AI can function as a durable “first responder” in vulnerability workflows, enabling teams to scale throughput, improve submission quality, and reduce cognitive load on engineers without increasing headcount. The session concludes with transferable design patterns, metrics, and lessons learned that other PSIRTs and vulnerability management programs can adapt within their own tooling ecosystems.

    April 14, 2026 15:30-16:30

  •  USTLP:CLEAR

    From Roadmap to Results: Measuring CWE Adoption to Enable Prevention

    Alec Summers is a principal cybersecurity engineer at the MITRE Corporation with diverse and extensive experience in software assurance and vulnerability management, as well as cyber operations, assessments, and supply chain risk management. He is the MITRE CVE and CWE Project Leader, managing teams that support vulnerability and weakness research & analysis, content production, program coordination, services development, and community engagement across a global partner base comprising industry, government, and academia. He serves as the moderator for the CVE Board and CWE Board. LinkedIn: https://www.linkedin.com/in/ajrsummers/

    Steve Christey Coley is a Principal INFOSEC Engineer at The MITRE Corporation. He was the co-founder and technical lead of CVE, and chair of its Editorial Board from 1999 to 2015. He co-authored the "Responsible Vulnerability Disclosure Process" IETF draft and contributed to CVSS v2. He is the co-founder and technical lead for the Common Weakness Enumeration (CWE) circa 2005. Since 2014, he has supported FDA in various aspects of medical device security, including vulnerability handling, risk assessment, threat modeling, SBOM handling, adoption of emerging technologies, and a rubric for applying CVSS to medical devices.

    In 2024, at the first VulnCon, I presented the CWE Program’s current state and road ahead, focusing on federation, community working groups, and infrastructure modernization as necessary foundations for growth. Two years later, it is now possible to reflect on what those investments enabled – and what has changed as a result. This session looks back on the last several years of CWE evolution to assess progress in usability, adoption, and practical application. In particular, it highlights measurable increases in root cause weakness mapping at the time of vulnerability disclosure, driven by clearer guidance, improved tooling, and sustained community collaboration. These changes have begun to transform CWE from a reference taxonomy into a usable signal for understanding systemic security failures. The talk also looks forward, arguing that the ecosystem is now positioned to move beyond reactive vulnerability and attack-centric thinking. If we want to avoid whole classes of vulnerabilities rather than keep responding to similar issues, we must increasingly frame security problems in terms of weaknesses – the conditions that make exploitation possible. By reflecting on how far the CWE community has come since 2024, this session explores what lies ahead and how shared language, measurement, and intent can drive more preventative outcomes.

    April 15, 2026 16:30-17:30

  •  US JPTLP:CLEAR

    Global CVD-COP International Coordinator Summit

    Justin Murphy is a Vulnerability Analyst with the Cybersecurity and Infrastructure Security Agency (CISA). He helps to coordinate the remediation, mitigation, and public disclosure of newly identified cybersecurity vulnerabilities in products and services with affected vendor(s), ranging from industrial control systems (ICS), operational technology (OT), medical devices, and traditional information technology (IT) vulnerabilities. Justin is involved with many other vulnerability management related efforts, including CISA’s Software Bill of Materials (SBOM) and Vulnerability Exploitability eXchange

    (VEX) work, and he serves as co-chair for the OASIS Open Common Security Advisory Framework (CSAF) and OpenEoX Technical Committees. Justin is also a founding member of the Global Community of Practice on Coordinated Vulnerability Disclosure (Global CVD-COP). Justin is a former high school mathematics teacher turned cybersecurity professional and has a M.Sc. in Computer Science from Tennessee Technological University, and a B.Sc. degree in Mathematics and Statistics from the University of Tennessee

    (Knoxville).

    Working on CVD at JPCERT/CC for 10 years, Tomo currently leads the Global CVD project of the organization, which aims to contribute to the global CVD ecosystem stability through collaborations with the stakeholders from different parts of the world.

    Meeting Summary - Open to Registered VulnCon Delegates

    The International Coordinator Summit aims to gather members of the Global Community of Practice on Coordinated Vulnerability Disclosure (CVD-COP) and other key stakeholders. The event will focus on enhancing global cooperation, sharing knowledge, and harmonizing best practices in vulnerability coordination among public, private and government entities. Through presentations, panel discussions, and collaborative sessions, participants will discuss global challenges and successes in CVD, ultimately aiming to strengthen relationships and deepen insights within the international CVD community. All attendees of the VulnCon conference are welcome to attend the event.

    Overview of Global CVD-COP: The Global Community of Practice on Coordinated Vulnerability Disclosure (CVD-COP) was formed to enhance vulnerability coordination and promote best practices between varied global communities including governmental entities, national coordinators, and national CERTs. The community seeks to cultivate and harmonize global support for CVD among public and private entities across all technology types and sectors, while bridging communication gaps to establish a more cohesive and structured approach to CVD.

    Purpose of Summit and Motivation: The "International Coordinator Summit" event is designed to bring together members of the Global CVD-COP and other stakeholders in the CVD ecosystem to build momentum for collaboration, experience and knowledge exchange, and harmonizing global CVD best practices.

    Agenda Proposals:

    • Welcome and Opening Remarks by VulnCon Program Committee Member
    • Presentations from community members (by invite of CVD-COP Co Chairs) on topics of Global Perspectives on CVD, Non-specific case studies and best practices of CVD, Global Challenges of CVD, Global cooperation (or collaboration), etc.
    • Short panel inviting the program committee
    • Presentation/discussion of CVD-COP deliverables
    • Presentation on related topics re: CVE Program and CNAs
    • Devoted time for collaborative discussion Key Features of the Summit:
    • Contributions from international SMEs in CVD, including 19 different international governments, national coordinators, and national CERTs.
    • Emphasis on experience/knowledge sharing and harmonizing practices.

    Expected Outcomes:

    • Enhanced international cooperation on CVD.
    • Deepen insights and gain multiple perspectives through in-person discussions among participants.
    • Shared understanding of best practices and regional nuances.
    • Strengthened relationships among global CVD stakeholders.
    • A roadmap for the Global CVD-COP and the potential for future in person summits.

    April 13, 2026 14:00-17:00

  •  GBTLP:CLEAR

    Honeypot‑to‑Detection-Rule: Auto‑Generating Nuclei Templates from Arkime PCAPs to Accelerate Detection and Discovery

    Adlan Chaykin is a senior vulnerability analyst and detection engineer at Recorded Future. He builds detections‑as‑code pipelines that transform honeypot traffic and proof‑of‑concept exploits into testable detection rules (Nuclei templates). His work and experience blend web application testing, vulnerability research, threat intelligence enrichment, vulnerability management and prioritization, and attack surface and exposure management. He has previously built detection-as-code pipelines around Nuclei, Metasploit, Arkime, Shodan, and vendor APIs, including those designed to reduce authoring time and achieve measurable improvements in time-to-detect and mean-time-to-remediate.

    Security teams drown in interesting traffic but starve for ready‑to‑ship detection rules. This talk presents a practical system that converts honeypot traffic captured by Arkime into review‑ready Nuclei templates, automating the repetitive scaffolding of Nuclei rule authoring so engineers can accelerate detection. Arkime is an open-source packet-capturing system, while Nuclei is an open-source vulnerability scanner. The pipeline extracts request URI, method, headers, and body from packet captures; normalizes and clusters similar requests; ranks them by risk and relevance; and compiles draft Nuclei templates with appropriate request methods and paths, headers, and payloads. This presentation will cover noise reduction (filtering scanners and benign requests), false‑positive control, and how to replay PCAPs in a lab to produce positive and negative assertions for every detection rule. Beyond faster rule creation, the approach also aids vulnerability discovery (for example, identifying novel malformed paths and headers) and supports detection-engineering workflows with reproducible steps. Attendees will leave with a design they can implement using open source technologies, pitfalls to avoid, and a roadmap for extending the technique to multi‑step workflows and other rule systems. All examples are TLP: CLEAR and have been tested against isolated environments.

    April 15, 2026 11:35-12:05

  •  AUTLP:CLEAR

    How to Answer “What’s Affected?” in Open Source

    Jess is a Software Engineer on the Open Source Vulnerabilities (OSV) project within Google’s Open Source Security Team. Recently, she's been deep in the weeds of bulk CVE conversion, designing the logic and heuristics required to turn ambiguous security records into actionable, machine-readable data.

    Rex Pan is a Software Engineer Tech Lead on the Open Source Vulnerabilities (OSV) team and the Google Open Source Security team. His current work concentrates on enhancing developer workflows for addressing and remediating vulnerabilities within their Open Source Software (OSS) dependencies.

    A scalable "alert on artifact" workflow for vulnerability management requires precise and accurate data on which code versions are affected. This is already challenging for linear versioning but becomes significantly more difficult when dealing with non-linear Git graphs. What exactly do "introduced" and "fixed" commits communicate about the vulnerable commits? How do intermediate branches, merges, and forks complicate this picture? We will explore all scenarios encountered while developing the OSV database, offering real-world examples and the corresponding solutions implemented in the OSV-Schema. Attendees will learn how these solutions can help accurately identify vulnerabilities within their dependencies.

    April 15, 2026 13:50-14:20

  •  USTLP:CLEAR

    Identifying Exploited and Likely-to-Be-Exploited Vulnerabilities

    Patrick Garrity is a security researcher at VulnCheck where he focuses on vulnerabilities, vulnerability exploitation and threat actors.

    Many high-impact vulnerabilities first emerge through real-world exploitation rather than coordinated disclosure, leaving defenders without reliable identifiers at the moment risk is greatest. In 2025, the VulnCheck research team launched a project to identify vulnerabilities that are actively exploited or likely to be exploited but lack CVE identifiers. This talk presents the methodology and lessons learned from correlating exploitation evidence, public exploit code, security advisories, in-house detection capabilities, and third-party intelligence sources such as ShadowServer. We walk through our end-to-end workflow for auditing sources, mapping findings to existing CVEs, and navigating the CVE assignment or coordination process when gaps are identified. Attendees will gain insight into blind spots in current vulnerability tracking, how exploitation often precedes formal disclosure, and practical steps for surfacing and tracking the vulnerabilities that matter most to defenders.

    April 14, 2026 16:35-17:05

  •  USTLP:CLEAR

    International Workshop on Firmware Security Vulnerabilities (FirmVuln26)

    Dr. Aravind Machiry is an Assistant Professor and a founding member of Purdue Systems and Software Security

    (PurS3) Lab at Purdue University in the Electrical and Computer Engineering Department. He is a recipient of the NSF CAREER award and the Amazon Research award. Dr. Machiry is interested in designing principled yet practical solutions to system security problems. He currently works on Security threats from AI Accelerators, Rust for Embedded Systems, vulnerability detection, prevention, and mechanisms for developing secure systems. His solutions have a flavor of static/dynamic program analysis, fuzzing, type systems, language-based techniques, machine learning, or a combination of the above. Dr. Machiry has received funding from NSF, DARPA, Amazon, Rolls-Royce, and Qualcomm to enable his team to do high-quality research and create long-lasting impact. He has extensive experience in firmware and embedded system security, for example, through the DARPA HARDEN program and his NSF CAREER award.

    Dr. Armin Moin is a Tenure-Track Assistant Professor and Director of the Quantum-Classical AI and Software Engineering (QAS) Lab at the Computer Science (CS) Department of the University of Colorado Colorado Springs

    (UCCS). Before starting his faculty position, he worked as a Postdoctoral Scholar-Employee at the CS Department of the University of California, Santa Barbara (UCSB) and prior to that as a Postdoctoral Scholar at the University of Antwerp in Belgium. Dr. Moin obtained his Ph.D. in CS from the Technical University of Munich (TUM), Germany, one of the world’s top universities, in 2022. He also has a Master’s in CS and an Executive MBA. His research focuses on the intersection of Artificial Intelligence and Software Engineering with an emphasis on hybrid quantum-classical computing. Grants from various sources, including NSF and Colorado OEDIT, have supported his QAS Lab. Besides research and teaching, he reviews top academic journals and conferences.

    Dr. Terrance Boult is a Distinguished Professor Emeritus at the University of Colorado Colorado Springs (UCCS). He worked as the El Pomar Endowed Professor of Innovation and Security and Co-director of the Bachelor of Innovation family of degrees for nearly two decades. Dr. Boult has published over 150 Papers and holds 6 patents with 9 pending. Before joining UCCS in 2003, he was an endowed professor and founding chairman of Lehigh University's CSE Department. He received his BS in Applied Math (1983), MS in CS (1984), and Ph.D. in Computer CS (1986) from Columbia University and then spent 8 years on the Columbia CS Department Faculty. He has won 2 teaching awards, multiple research/innovation awards, and IEEE service awards, and is a member of the IEEE Golden Core. His VAST Lab has been supported by over $2M in funding from multiple sources, e.g., ONR, Army, SOCOM, Air Force, and DARPA.

    https://tianoshield.github.io/home/events

    A firmware program is embedded in non-volatile storage on a computer's motherboard. It controls how computing devices, ranging from cloud servers to resource-constrained Internet of Things (IoT) platforms, start up their boot processes and interact with their operating systems after they are powered on. The Unified Extensible Firmware Interface (UEFI) is an open standard for computing system firmware architecture specification. The TianoCore community maintains reference implementations of various components of the UEFI specification, for example, EDK II. This has resulted in a vibrant and mature Open-Source Ecosystem (OSE) with a significant impact on global security, safety, and privacy. Given the widespread use of the TianoCore repositories, security vulnerabilities may be leveraged by malicious actors and cyber-criminals to develop exploits that could cause potentially massive-scale harm to individuals, businesses, and the public sectors, including critical infrastructure. A recent $1.2M project (2025-2027) sponsored by the U.S. National Science Foundation (NSF), named TianoShield, aims to enhance the state of security of the TianoCore OSE and improve its overall open-source development process and practices. The proposed one-day workshop for VulnCon26 in Scottsdale, AZ, USA, called International Workshop on Firmware Security Vulnerabilities (FirmVuln26), will focus on improvements, new results, and open problems in protecting the TianoCore OSE by using the TianoShield project as the anchor, while welcoming talks from other participants and stakeholders in the firmware world.

    April 13, 2026 08:30-17:00

  •  USTLP:CLEAR

    Lessons From NPM's Dark Side: Preventing the Next Shai-Hulud

    Jenn Gile is a community builder and tech educator in the Security and DevOps fields. She's Co-Founder of OpenSourceMalware.com, on staff with BSides Seattle, and is an advisor at Endor Labs. Jenn previously worked at NGINX, F5, and the U.S. Department of State. Outside of work, she's deeply involved in the cycling community as a board member for 2nd Cycle.

    Malware is all about scale and time: How can I hit the most people in the shortest time? But not all ecosystems are equally vulnerable. The JavaScript ecosystem, particularly its package manager npm, is arguably the most vulnerable to supply chain malware attacks. And with JavaScript being the language of the web, this is a problem that impacts an estimated 27.4 million developers. So what are we to do?

    April 15, 2026 10:30-11:30

  •  USTLP:CLEAR

    Mind the Match: Why Vulnerability Matching Is Harder Than You Think

    Lexi Selldorff is a Senior Engineering Manager at Manifest, leading work on SBOM vulnerability scanning. Previously, she was an Engineering Manager at Rula and a Forward Deployed Engineer at Palantir. She has built and operated software in highly regulated environments, including healthcare and government, and is passionate about delivering mission-critical systems quickly and securely. Lexi enjoys getting deep into data, and her work at Manifest focuses on the real-world challenges of vulnerability matching, package identification, and reducing noise in vulnerability management.

    Matching vulnerabilities to software components sounds straightforward: take a list of packages, take a list of CVEs, and connect the two. In reality, vulnerability matching is one of the most complex and error-prone parts of modern vulnerability management. The identifiers we rely on, such as CPEs and Package URLs (PURLs), are imperfect abstractions of real-world software, while vulnerability data sources often contain gaps, inconsistencies, and conflicting interpretations. This talk explores why vulnerability matching is such a nuanced problem. We’ll examine how CPEs struggle to model modern package ecosystems, how PURLs vary across languages and distributions, and how incomplete or mismatched metadata leads to false positives and missed vulnerabilities. We’ll also compare discrepancies across major data sources including NVD, CVE.org, OSV, and vendor advisories. Attendees will leave with practical techniques for investigating suspicious findings, verifying vulnerability matches, and reducing noise in scanner outputs. The session concludes with guidance on selecting and combining scanners, and proven workflows for managing false positives while maintaining trust in SBOMs and vulnerability reporting.

    April 15, 2026 14:25-14:55

  •  PLTLP:CLEAR

    National CSIRT as a CVD Hub: Lessons from CERT.PL’s Vulnerability Coordination Cases

    This session presents practical lessons from CERT.PL CNA’s role as a national CVD hub mediating between mostly Polish security researchers and product vendors, including both successful collaborations and difficult, low‑engagement cases. Using anonymised coordination examples, the talk explores researcher and vendor motivations and the operational constraints faced by a national CSIRT, such as limited influence over remediation decisions and communication bottlenecks. The session will also describe improvements introduced into CERT.PL’s CVD process: diversified contact channels to reach vendors, the adoption of a 90‑day default disclosure window, and the systematic involvement of sectoral CSIRTs where appropriate to share context and reduce fragmented communication. Attendees will leave with actionable patterns and anti‑patterns for enhancing their own CVD workflows, especially when acting as intermediaries between independent researchers and domestic vendors with varying maturity levels.

    April 15, 2026 16:30-17:30

  • TLP:CLEAR

    NIST’s National Vulnerability Database Update and the Vulnerability Enrichment Ecosystem

    Harold Booth is a Computer Scientist and Group Manager at NIST and served as the program manager for the NVD from 2010 until 2016. His current work includes research into the security and measurement of AI systems, software understanding and software development. He is an emeritus member of the CVE Board.

    The NVD is a major provider of vulnerability reference data that is used throughout the vulnerability management ecosystem. In recent years, keeping up with the flow of CVEs and providing enrichment data for each CVE has been a major challenge for the NVD. Adapting to the changing landscape of the vulnerability management ecosystem is a major challenge, not just for the NVD, but for all participants. This talk aims to provide some discussion on what some of those challenges are and potential paths for adaptation.

    April 15, 2026 09:00-10:00

  •  USTLP:CLEAR

    Operationalizing AIBOMs: Extending Vulnerability Management to AI Models and Datasets

    Lexi Selldorff is a Senior Engineering Manager at Manifest, leading work on SBOM vulnerability scanning. Previously, she was an Engineering Manager at Rula and a Forward Deployed Engineer at Palantir. She has built and operated software in highly regulated environments, including healthcare and government, and is passionate about delivering mission-critical systems quickly and securely. Lexi enjoys getting deep into data, and her work at Manifest focuses on the real-world challenges of vulnerability matching, package identification, and reducing noise in vulnerability management.

    April 14, 2026 11:35-12:05

  •  TRTLP:CLEAR

    Organizational Context Matters: Security Control Effectiveness on Vulnerabilities for Prioritization

    Ertugrul Yaprak is the Director of the Data Department at Picus Security and leads the data engineering pipeline and AI workflows. He holds a bachelor's degree in computer science and has been involved in data projects for over 20 years.

    Mehmet KILIC is the Director of Cyber Security Practices at Picus Security. In this role, he leads the company’s cybersecurity product strategy, identifies real-world customer challenges, and explores innovative security solutions. He focuses on bridging business needs with technical development to deliver effective and practical cybersecurity capabilities.

    Most vulnerability management programs still rely on base CVSS scores and scanner output, even though real‑world risk is heavily shaped by an organization’s own security controls and asset context. The result is familiar: long lists of “critical” findings that are already mitigated, and overlooked “medium” issues that are fully exposed. In this session, we will present a practical approach to validate vulnerability management by combining CVE data, adversary techniques, attack modules, security control effectiveness, and asset criticality into a unified, exposure-driven prioritization workflow. We will begin by examining the relationship between CVEs and security controls, focusing on how standard controls actually impact exploitability in practice. Building on this, we will refine the existing CVSS score to “Contextual CVSS”, which utilizes temporal metrics with exploitability and environmental metrics derived from an organization's context and security control effectiveness. Using real-world, data-driven insights from our ongoing research and development, we will demonstrate how contextualization alters score distributions and risk rankings across groups of CVEs, and how a score of vulnerability or exposure can be layered on top to drive re-prioritization at scale. We will introduce the “Exposure Score”, a unified risk measure that combines control effectiveness, exploitability, and asset importance, as well as contextual CVSS. Finally, we will demonstrate how these exposure metrics can be aggregated at the asset level to support risk-based decision-making for both technical teams and business stakeholders, in a tool- and vendor-agnostic manner that attendees can adapt to their own environments.

    April 16, 2026 11:05-12:05

  •  US INTLP:CLEAR

    Panel: CVE Record Disputes Discussion: Policy, Process, and Opportunities for Improvement

    Alec Summers is a principal cybersecurity engineer at the MITRE Corporation with diverse and extensive experience in software assurance and vulnerability management, as well as cyber operations, assessments, and supply chain risk management. He is the MITRE CVE and CWE Project Leader, managing teams that support vulnerability and weakness research & analysis, content production, program coordination, services development, and community engagement across a global partner base comprising industry, government, and academia. He serves as the moderator for the CVE Board and CWE Board. LinkedIn: https://www.linkedin.com/in/ajrsummers/

    Yogesh Mittal is a PSIRT Manager at Red Hat, where he orchestrates strategic initiatives at the intersection of enterprise security and open source supply chain health. He oversaw Red Hat’s elevation to both CVE Program Root and CNA of Last Resort (CNA-LR) status. As a member of the CVE Program Roots Council, Yogesh plays a central role in evolving CNA Policy and operational standards, ensuring that governance frameworks are robust enough for global enterprises while remaining viable for decentralized communities.

    Beyond policy, Yogesh bridges the gap between corporate governance and operational reality to align industry standards with the needs of the modern supply chain. He established a collaborative forum for Open Source CNAs and is dedicated to operationalizing "Federated Responsibility"—designing policy-backed frameworks that improve data quality without overburdening the volunteer workforce.

    Disagreements about vulnerabilities are inevitable in a globally scaled, federated ecosystem like CVE. In practice, CVE Record disputes occur for a variety of reasons, and when a dispute arises, the CVE Program’s “Policy and Procedure for Disputing a CVE Record” is followed. This can mean a CVE Record is updated to include different positions on an issue. Each side’s rationale is documented, and the record itself is explicitly tagged as “disputed.” Unless there is a convergence of perspective, the record may remain in this state indefinitely. This moderated panel brings together representatives from across the vulnerability ecosystem – including a supplier CNA, a CVE Root authority, a government stakeholder, a security researcher, and enterprise CVE data consumers – to examine how disputes arise, how they are handled today under the CVE Program dispute policy, and where that policy succeeds or falls short and needs to evolve. Rather than litigating individual cases, the panel uses the current CVE dispute policy as a shared reference point to explore how good-faith disagreement is navigated in practice, how revisions and updates propagate downstream, and how dispute mechanisms might evolve to deliver greater value to producers, consumers, and regulators alike. Attendees will leave with a more informed understanding of CVE Record dispute handling and greater insight into how policy, process, and transparency intersect in the CVE Program.

    April 15, 2026 15:25-16:25

  •  US INTLP:CLEAR

    Panel: The CVE Supplier ADP (SADP) Pilot: Am I Affected byUpstream?

    Art Manion spends a lot of time working on various aspects of technical cybersecurity vulnerabilities including coordinated disclosure, measurement, management, information systems, risk assessment, and public policy. Art has led and contributed to vulnerability-related efforts the Forum of Incident Response and Security Teams (FIRST), the CVE Program, ISO/IEC JTC 1/SC 27, the Open Source Security Foundation (OpenSSF), and the National Telecommunications and Information Administration (NTIA, US). Art is the Deputy Director of Tharros Labs and previously managed vulnerability analysis at the CERT Coordination Center (CERT/CC).

    Feng Cao is Senior Principal Security Analyst in Oracle Security Alerts Group. He had been with several industrial organizations before Oracle,including Cisco Systems and NTT Labs.

    He had been involved in and made contributions to international standard activities, such as IETF, ICASI, OASIS, CVE program, and FIRST.

    Feng received the Ph.D. degree in Computer Science from the University of Minnesota, Minneapolis, USA. He received B.S. and M.S. from Tsinghua University, Beijing, China.

    Jeremy Daigneau is a Lead software engineer at MITRE. He began working at MITRE in 2015 and started working on the CVE Program as the lead developer of the CVE-Services API in early 2022. He’s since worked on many different CVE automation components. Jeremy is currently the CVE Automation team lead, which includes multiple different CVE automation applications, such as CVE-Services, CVE.org, CVE search, and more.

    Lisa Olson is a Principal Security Release Program Manager at Microsoft, where she has led the Patch Tuesday release process since 2013. A member of the CVE Board since 2018, Lisa is a passionate advocate for improving vulnerability communication through automation and machine-readable formats. Her work focuses on transforming how security information is shared to help organizations respond faster and more effectively.

    Yogesh Mittal is a PSIRT Manager at Red Hat, where he orchestrates strategic initiatives at the intersection of enterprise security and open source supply chain health. He oversaw Red Hat’s elevation to both CVE Program Root and CNA of Last Resort (CNA-LR) status. As a member of the CVE Program Roots Council, Yogesh plays a central role in evolving CNA Policy and operational standards, ensuring that governance frameworks are robust enough for global enterprises while remaining viable for decentralized communities.

    Beyond policy, Yogesh bridges the gap between corporate governance and operational reality to align industry standards with the needs of the modern supply chain. He established a collaborative forum for Open Source CNAs and is dedicated to operationalizing "Federated Responsibility"—designing policy-backed frameworks that improve data quality without overburdening the volunteer workforce.

    Software is made up of other software, and globally indentifying software and relationships between software components remains a hard problem. Work on Software Bill of Materials (SBOM) lead to Vulnerability Exploitabilty eXchange (VEX): Conveying how downstream software affected (or not) by a vulnerability in an upstream component. The CVE Program is running a Supplier authorized data publisher (SADP) pilot to help determine how best to collect, provide, and manage VEX-like inherited vulnerability status information. This panel will frame the goals, questions, and design of the SADP pilot (how it started) and discuss what the participants have learned up to this point (how it's going).

    April 14, 2026 10:30-11:30

  •  USTLP:CLEAR

    Preparing Vulnerability Management for the Quantum Era: From Legacy Crypto to Crypto-Agility

    Arun Pratap Singh is a Security Research Engineer at Qualys, working on the company’s flagship Vulnerability Management, Detection and Response (VMDR) platform. Over the past eight years at Qualys, he has worked across the vulnerability lifecycle: first as a Security Operations Engineer responsible for securing three Qualys cloud platforms through internal vulnerability management, where he also served on the core FedRAMP audit team for two consecutive years; then as a Threat Research Engineer for the Qualys XDR and EDR products; and now as a signature author creating and maintaining Qualys QIDs used by customers worldwide. His day-to-day work includes designing detections for real-world vulnerabilities, tuning them to reduce noise at scale, and collaborating with operations and product teams. I am particularly interested in how vulnerability management must evolve to handle cryptographic and post-quantum risks.

    Quantum computing is still emerging but its impact on today’s cryptography is already a security problem. RSA and ECC will not fail overnight, yet many organizations are storing data that must remain confidential for 10-20+ years while still relying on quantum-vulnerable algorithms and hard-to-change infrastructure. Today’s vulnerability management programs are excellent at tracking CVEs and patching software, but they rarely treat cryptography itself as an inventory item or risk object. In this talk, I reframe “quantum-era vulnerabilities” from the perspective of vulnerability management and large-scale detection engineering. We will look at: - How to define quantum-era risk in practical terms: harvest-now-decrypt-later, long-lived data, and fragile PKI. - Lessons from building detections for deprecated ciphers and protocols (TLS, SSH, IPsec) and how those patterns extend to post-quantum migration. - What “crypto-agility” really means for blue teams: crypto inventories, quantum-risk scoring, and policy-driven deprecation instead of one-off cipher clean-ups. - How vulnerability scanners, PSIRTs, and asset owners can collaborate to surface quantum-era issues as first-class findings-alongside traditional CVEs. Attendees will leave with a concrete, vendor-neutral playbook to start integrating post-quantum readiness into their existing vulnerability management processes today, without needing to be quantum-cryptography experts.

    April 15, 2026 13:15-13:45

  •  USTLP:CLEAR

    Production Is the New Attack Surface: Why Post-Deployment Endpoint Detection Is Now Critical

    Tracy Ragan is a well-known speaker in open source security, DevOps, and the software supply chain. She has provided keynotes for Open Source Summit and CDCon. She is a regular analyst for TechStrong Gang (Futurum Group) where various topics in security are discussed. Tracy serves as the CEO and Co-Founder of DeployHub. She sits in leadership roles across the OpenSSF and Continuous Delivery Foundation Tracy and has contributed significantly to the CI/CD Cybersecurity SIG and Ortelius.io. Ortelius is the open-source CDF project delivering deployment-centric SBOM intelligence and digital-twin-based post-deployment detection. She advocates for modernizing how organizations secure live, mission-critical systems across cloud, edge, and space environments, hardening software assets after pre-deployment scans.

    Traditional vulnerability management has been rooted in the pre-deployment world, utilizing CI/CD scans, SCA tools, and secure-by-design controls. But attackers have already moved on. With daily CVE surges, rapid open-source package churn, and software spread across clouds, edge devices, and even space systems, production has become the new attack surface. Vulnerabilities that matter most now appear after deployment, when software is already running in the wild and exposed. This talk explains why organizations must pivot to post-deployment endpoint detection and how the open-source community, through projects like Ortelius.io, a Continuous Delivery Foundation initiative, has built the foundational architecture to make it possible. Ortelius introduced the industry’s first deployment-centric SBOM catalog and digital-twin model, enabling teams to understand exactly which live endpoints are impacted by newly reported vulnerabilities without scanning or instrumenting production environments. Attendees will learn how digital-twin mapping, SBOM-driven intelligence, and deployment lineage tracking reveal the true attack surface of new CVEs across containers, clusters, edge devices, satellites, ground systems, and distributed infrastructures. We will show why pre-deployment tools alone cannot determine real risk, and how a post-deployment detection layer closes the gap that attackers are actively exploiting.

    April 15, 2026 13:50-14:20

  •  USTLP:CLEAR

    Quantifying Swiss Cheese, the Bayesian Way

    Stephen is currently a Principal Security Engineer at Moderna focused on vulnerability risk management and security data science. He is also the Exploit Prediction Scoring System (EPSS) Special Interest Group (SIG) Co-Chair, championing the use of the EPSS model to quantify vulnerability risk. Previously, he had stints at Peloton, and Centers for Medicare and Medicaid Services (CMS) as a contractor, where he mainly focused on cloud security, compliance engineering, and building security tooling. Stephen is passionate about continuous learning, leading with empathy, and cutting through the FUD in the industry

    This session shows how to use asset and CVE data to build a living, Bayesian quantitative model that updates asset-level exploitation likelihoods and overall organization-level exploit-vector incident likelihood using the Exploit Prediction Scoring System (EPSS), control effectiveness data, and public incident data.

    April 16, 2026 09:00-10:00

  •  GBTLP:CLEAR

    Remediation-Aware Reachability: Patching Containers, Prioritizing with Agentic-CTI, and Scaling Fixes from Code to Cloud

    Francesco Cipollone is a seasoned entrepreneur, CISO, and Founder of Phoenix Security, the code-to-runtime contextual, actionable ASPM platform. He’s a published author, host of the multi-award Cyber Security & Cloud Podcast, and a frequent international speaker known for pragmatic, forward-looking views on modern vulnerability management and product security. He previously presented this reachability-and-remediation concept at OWASP LASCON

    (including a keynote) and at other major events over the past year.

    Francesco sits on the board of the UK&I Cloud Security Alliance Chapter and is a faculty member at IANS, focusing on application and cloud security. His work has been featured in outlets such as Forbes, Help Net Security, and Hacker Noon, and he has appeared on well-known industry podcasts including Application Security Weekly, Down the Rabbit Hole, Cloud Security Podcast, and AppSec Weekly. He has spoken at conferences across the US and Europe, including AppSec Cali, Open Security Summit, and Cyber Security & Cloud Expo.

    Previously, Francesco led application and cloud security at HSBC and worked as a Senior Security Consultant at AWS. Outside of work, he runs marathons, snowboards in the Italian Alps, and enjoys a good single malt in London.

    Podcast: https://phoenix.security/resources/podcasts/ Books: https://phoenix.security/whitepapers-resources/modern-application-security-ebook/ Research: https://phoenix.security/vulnerability-weekly/ Whitepapers: https://phoenix.security/whitepapers-resources/ Talks: https://www.youtube.com/watch?v=bDtJA551vpI&list=PLVlvQpDxsvqESE7DcPTe2BbZgGvFtWla4 More talks: https://www.youtube.com/results?search_query=francesco+cipollone+security Blog: https://phoenix.security/author/fcphoenix-security/ Press: https://www.nsc42.co.uk/press

    Vulnerability management is still judged by “how many findings” and “how fast we closed tickets.” That breaks down the moment you introduce containers, ephemeral workloads, shared base images, and sprawling dependency graphs. In Product Security, the hard part isn’t detecting vulnerabilities—it’s patching the right thing, in the right place, by the right team, fast enough to matter. This talk reframes reachability analysis as a remediation engine, not just a prioritization trick. We’ll show how code-to-cloud tracing and reachability (code, library, container, static, runtime) changes the patching playbook—especially for container vulnerabilities where “just upgrade the package” often doesn’t exist, isn’t safe, or doesn’t land in production. We’ll also connect Cyber Threat Intelligence (CTI) to remediation decisions: which vulnerabilities are actively dangerous, which are theoretical, and which demand compensating controls when patching is slow. Finally, we’ll demonstrate how AI-assisted CTI (Google Gemini-based enrichment) can rewrite and normalize vulnerability data at scale—turning noisy scanner output into actionable, fix-oriented guidance—and how agentic remediation for library upgrades becomes dramatically more effective when constrained by reachability. The outcome: a practical CTEM approach built on three pillars—ownership attribution, vulnerability attribution, and remedy attribution—so teams stop drowning in alerts and start shipping fixes that measurably reduce exposure. Key topics 1. Patching vs remediation: patch, upgrade, rebuild, mitigate 2. Containers: why “just patch it” is often wrong 3. Reachability + tracing: from CVE to deployed exploit path 4. CTI-driven prioritization: what’s burning now 5. AI-CTI at scale (Gemini): rewriting vulnerabilities into fix-ready guidance 6. Agentic remediation for libraries: PRs gated by reachability 7. CTEM 3 pillars: right team, right vuln, right remedy, right context Takeaways for Attendees • A clear model for why container patching is not traditional patching—and how to fix it without chaos. • A practical method to combine reachability + code-to-cloud tracing to route remediation to the right owners with minimal noise. • How CTI (and AI-CTI at scale) changes remediation priority from theoretical severity to real-world danger. • How to use agentic remediation for library upgrades safely by constraining it with reachability and production relevance. • A CTEM blueprint (3 pillars) that turns vulnerability management into measurable exposure reduction.

    April 15, 2026 10:30-11:30

  •  USTLP:CLEAR

    Saving Ourselves the ID Headache: How Purls Can Work for Models and Datasets

    Daniel Bardenstein is the CEO and co-founder of Manifest, focused on making software and AI supply chains more transparent and secure. He is a co-chair of both the CISA AI Bill of Materials (AIBOM) Working Group and the OWASP AIBOM Working Group, helping shape how AI systems are identified, described, and secured in practice. Previously, Daniel served as Chief of Technology Strategy at CISA, where he led technology modernization efforts, OT/ICS strategy, and the development of the Cybersecurity Performance Goals. At the Defense Digital Service, he ran cybersecurity initiatives across the Department of Defense, including securing COVID-19 vaccine distribution and leading Hack the Pentagon. Before government service, Daniel built cybersecurity and data platforms at Exabeam and Palantir.

    Vulnerability management has spent the last decade arguing about identifiers (as we’ve seen from each previous VulnCon) – mostly between CPEs in NVD and for commercial products, and Package URLs (PURLs)for open-source software (leaving aside the technical argument about purls being locators and not identifiers). CPEs promised standardization and delivered ambiguity. PURLs emerged as a practical alternative,imperfect, but grounded in how software is actually built, packaged, and consumed. Along the way, the community learned hard lessons about versioning, namespaces, ecosystems, vulnerability scanning, and the cost of getting identifiers wrong.

    Now we’re repeating the same mistakes with AI.

    Security teams are being asked to reason about vulnerabilities, licenses, and provenance for models and datasets that have no consistent identifiers, unclear version semantics, and weak ties to their underlying components. Without stable, resolvable IDs, everything from SBOMs to VEX to policy enforcement breaks down.

    This talk draws on lessons learned from years of wrestling with CPEs and PURLs in traditional software supply chains and applies them to AI systems. We’ll explore why models and datasets need first-class identifiers, what properties those identifiers must have to be security-relevant, and why the PURL design turns out to be a surprisingly good fit. We’ll walk through concrete examples of model and dataset PURLs, discuss edge cases like fine-tuning and composite models, and highlight where existing tooling can already be reused—or where it needs to evolve.

    If we want to save ourselves the headache around identifiers for AI vulnerability management, we need to get identifiers right this time. This talk is about how to do that, before the ecosystem calcifies around another bad abstraction. 

    April 15, 2026 11:35-12:05

  •  ESTLP:CLEAR

    Speeding Up Vulnerability Triage: Automating Context Retrieval with AI Agents

    Jorge Gimenez is a Security Engineer at Kraken on the Vulnerability Management team, where he works on vulnerability triage, security automation, and risk prioritization at scale. Before joining Kraken, he worked as a red teamer focused on malware development and infrastructure hacking, a perspective he brings into his current role.

    Modern vulnerability management suffers not from a lack of data, but from an overload of it. Security teams receive thousands of vulnerability findings from scanners, cloud platforms, and bug bounty programs, each providing fragmented and incomplete context. As a result, vulnerabilities are often evaluated in isolation, making triage slow and inconsistent and delaying remediation of issues that actually pose real risk. This talk presents a practical vulnerability triage enrichment process built around AI agents. Instead of treating findings as individual alerts, these agents aggregate all available context related to a detection. Each alert is expanded by examining how the code is written, where and how it runs, and whether the vulnerable functionality can realistically be reached. Bringing this information together into a single view helps analysts move faster and make more consistent risk decisions.

    April 15, 2026 15:25-16:25

  •  BETLP:GREEN

    Stepping up the ENISA's role in Support of EU Vulnerability Services

    Johannes discovered his interest in computers initially through his passion for audio engineering and signal processing. After encountering the strength of cryptography he got interested in information security and the political implications of technology. After receiving his diploma in computer science from Technische Universität Darmstadt he followed initial research (e.g., at Fraunhofer SIT and IGD) and network security work before starting at BSI’s national CSIRT section CERT-Bund. While supporting the team in various ways (vulnerability disclosure, abuse automation, OSS development) he cultivated a passion for CSIRT collaboration and is now part of ENISA’s Operational Cooperation Unit where his tasks include supporting the CSIRTs Network Secretariat and the EU vulnerability database implementation.

    As part of this talk we will present ENISA's ongoing activities in support of useful and reliable EU Vulnerability Services. The presentation will cover the latest details about a new listing of EU CSIRT known exploited vulnerability information and provide an overview of ENISA's new tasks under the Cyber Resilience Act.

    April 14, 2026 16:35-17:05

  •  USTLP:CLEAR

    Supply Chains and Malware Campaigns: Is CVE the Right Way to Name the Game?

    Art Manion spends a lot of time working on various aspects of technical cybersecurity vulnerabilities including coordinated disclosure, measurement, management, information systems, risk assessment, and public policy. Art has led and contributed to vulnerability-related efforts the Forum of Incident Response and Security Teams (FIRST), the CVE Program, ISO/IEC JTC 1/SC 27, the Open Source Security Foundation (OpenSSF), and the National Telecommunications and Information Administration (NTIA, US). Art is the Deputy Director of Tharros Labs and previously managed vulnerability analysis at the CERT Coordination Center (CERT/CC).

    Caitlin Condon is the VP of research at VulnCheck, where she works on initial access intelligence, emerging threat response, and coordinated vulnerability disclosure with some of the kindest, most talented researchers and analysts around. She previously led research and Metasploit development at Rapid7. Caitlin also chairs the CVE Program's Researcher Working Group (RWG), which you should totally join if you’re a researcher or bug bounty CNA!

    David Welch is a seasoned industry leader with 20+ years of experience. Passionate about open source software, security, and compliance, he brings a unique perspective to the evolving tech landscape. As Chief Architect at HeroDevs, David spearheads the technical direction of the Never-Ending Support program, delivering Long-Term Support for end-of-life open-source projects.

    Shelby Cunningham has been an advisory curator for the GitHub Advisory Database (GHAD) for five years. Her duties include, but are not limited to, organizing and publishing vulnerability information for the GHAD and gathering vulnerability information from project maintainers on GitHub to submit to the CVE list. Shelby has supported best security practices in the open source software community by advising projects that are part of the GitHub Secure Open Source Fund. In 2025, she responded to multiple incidents involving compromise of legitimate packages in ecosystems supported by the GHAD.

    2025 was a year of attention-grabbing malware campaigns targeting the open-source supply chain. From a campaign that affected a single package (tj-actions/changed-files) to massive supply chain compromises like the Shai Hulud attacks against npm, vulnerability management teams need ways to keep track of compromised packages that provides accurate information in a timely fashion. While CVE rules prohibit the use of CVE for tracking general-purpose malicious code, the rules do allow issuing a CVE ID to a legitimate package infected with malware. This raises a question: Is CVE the best way to track these supply chain compromises? This panel discusses situations in which CVE helped to facilitate tracking of a single-package supply chain attack, while acknowledging the drawbacks that arise when CVE rules are applied to campaigns that affect hundreds of packages.

    April 16, 2026 13:15-14:15

  •  ESTLP:CLEAR

    TBA

     
    Nikita Borovkov is an Application Security Engineer at SOFTSWISS, specializing in penetration testing, vulnerability research, and application security as a whole. With over three years of experience in cybersecurity, Nikita has transitioned from penetration testing to a defense-focused application security role. He holds a Bachelor's degree in Computer Science with a specialization in Cybersecurity from Kyiv Polytechnic Institute and maintains certifications including eJPT, CWEE, and OAWSP. 

     
    Nikita Borovkov is an Application Security Engineer at SOFTSWISS, specializing in penetration testing, vulnerability research, and application security as a whole. With over three years of experience in cybersecurity, Nikita has transitioned from penetration testing to a defense-focused application security role. He holds a Bachelor's degree in Computer Science with a specialization in Cybersecurity from Kyiv Polytechnic Institute and maintains certifications including eJPT, CWEE, and OAWSP. Beyond profesisonal achievements, Nikita enjoys participating in weekend CTFs, going surfing, and eating nice food.

    April 15, 2026 14:25-14:55

  •  ILTLP:CLEAR

    The AI Arms Race in Vulnerability Management, Who’s Winning?

    Yotam Perkal leads security research at Pluto Security, a next-generation AI security and governance platform designed to protect the rapidly emerging ecosystem of AI builders, low-code/no-code tools, and agentic applications. His work focuses on securing AI-native development environments and building scalable methods for detecting, validating, and mitigating risks in AI-driven software workflows.

    Previously, Yotam led the Threat Research team at Zscaler, headed the Vulnerability Research team at Rezilion, and held multiple roles within PayPal’s security organization across vulnerability management, threat intelligence, and insider threat.

    Yotam is an active participant in several cross-industry working groups dealing with AI security, vulnerability management, and supply chain security.

    AI is rapidly reshaping vulnerability management, and the upcoming years will determine whether defenders or attackers are gaining the upper hand. On the defensive side, AI promises meaningful progress: improved prioritization in the face of exponential vulnerability growth, better signal extraction from increasingly noisy data, faster identification of vulnerable components, and earlier insight into real-world exposure. As the rate of vulnerability disclosure continues to outpace remediation capacity, these capabilities are becoming essential to keeping VM programs viable. At the same time, AI is actively increasing pressure across the vulnerability ecosystem. Automated, low-effort vulnerability submissions (“AI slop”) are placing growing burdens on triagers, CNAs, and open-source maintainers. The technical barrier for effective exploitation is rapidly dropping, shortening the time from vulnerability discovery to weaponization and enabling more adaptive, personalized attacks at scale. Recent research and real-world incidents demonstrate that AI-powered attacks have moved from theory to practice, spanning nearly the entire MITRE ATT&CK lifecycle. This talk examines the AI arms race through a vulnerability management lens, highlighting both its defensive potential and its destabilizing effects. We explore where current workflows begin to fail when confronted with AI-driven discovery and exploitation, and what must change as a result. Rather than incremental optimization, defenders need to revisit foundational choices, from prioritization and disclosure to automation boundaries and system design, to remain effective in an environment shaped by autonomous, adaptive adversaries.

    April 16, 2026 13:15-14:15

  •  JPTLP:CLEAR

    The CVE Blind Spot: Defeating "Hidden EOLs" and Repo Jacking with Engineering Triage & Code Diet

    Kota Kanbe is the creator of "Vuls," a globally recognized OSS vulnerability scanner with over 11.9k GitHub stars. As a Senior Architect at Future Corporation and leader of the FutureVuls team, he manages large-scale vulnerability data and complex supply chain risks. His contributions were recognized with the Google OSS Peer Bonus in 2022 and the Software Japan Award in 2019. A prominent speaker in the Japanese security community with extensive domestic experience, Kota has also brought his expertise to international stages such as BlackHat Asia Arsenal and HITCON. He is a leading advocate for a paradigm shift in vulnerability management, moving from traditional CVSS-based triage to risk-based prioritization through Reachability Analysis and SSVC. Drawing from his research on 20,000+ production components, Kota focuses on automating "Engineering Triage" to solve the real-world challenges of EOL management and supply chain bloat.

    Ryunosuke Tanai is an Engineer at Future Corporation, currently contributing to the SRE domain of "FutureVuls," a cloud-based vulnerability management service. Since joining the company, he has been involved in the Technology Innovation Group (TIG) and the Cyber Security Innovation Group (CSIG), specializing in infrastructure, cloud services, and security. He is proficient in English, having completed a half-year study abroad program, and holds the Registered Information Security Specialist certification. He is also an active member of the tech community, frequently sharing his expertise on Datadog implementation and cloud architecture at conferences and through the Future Technical Blog.

    Standard vulnerability management relies heavily on CVEs. However, this creates a dangerous "Blind Spot": End-of-Life (EOL) OSS components often stop receiving CVE assignments even when critical vulnerabilities exist. Furthermore, abandoned components become prime targets for "Repo Jacking" and supply chain attacks.

    April 16, 2026 13:15-14:15

  •  USTLP:CLEAR

    The CVE Program Quality Era: Strengthening Trust and Impact In Global Vulnerability Data

    Lindsey Cerkovnik is the Chief of CISA’s Vulnerability Response & Coordination (VRC) Branch. Her team is responsible for CISA’s Coordinated Vulnerability Disclosure

    (CVD) process, the Known Exploited Vulnerabilities (KEV) catalog, and CISA’s Stakeholder Specific Vulnerability Categorization (SSVC) process. Lindsey and her team help to maintain, support, and advance the global vulnerability ecosystem by funding and overseeing the CVE and CVE Numbering Authority (CNA) programs, leading the production and dissemination of machine-readable vulnerability enrichment information, and engaging in valuable technical collaboration with the vulnerability research community.

    Alec Summers is a principal cybersecurity engineer at the MITRE Corporation with diverse and extensive experience in software assurance and vulnerability management, as well as cyber operations, assessments, and supply chain risk management. He is the MITRE CVE and CWE Project Leader, managing teams that support vulnerability and weakness research & analysis, content production, program coordination, services development, and community engagement across a global partner base comprising industry, government, and academia. He serves as the moderator for the CVE Board and CWE Board. LinkedIn: https://www.linkedin.com/in/ajrsummers/

    As the Common Vulnerabilities and Exposures (CVE™) Program transitions from a period of growth to a new Quality Era, the global cybersecurity community faces a pivotal opportunity: to strengthen the foundations of vulnerability data so that defenders can make faster, more accurate, and more reliable decisions. Under the strategic vision outlined by Cybersecurity and Infrastructure Security Agency (CISA), the Quality Era prioritizes trust, responsiveness, and data quality alongside continued program federation – recognizing that comprehensive, timely, and high-fidelity vulnerability information is a cornerstone of effective cyber defense.

    This joint presentation will talk about what the Quality Era means in practice. It will explore how improvements in governance, community partnerships, transparency, modernization, and vulnerability data enrichment are being pursued to meet the evolving needs of defenders worldwide. Speakers will share the emerging technical roadmap for elevating CVE Record quality, discuss efforts to expand collaboration and standardization, and highlight how a quality-first approach directly supports operational and strategic objectives across government, industry, and research.

    Attendees will gain insight into why the CVE Program’s evolution matters now more than ever, how quality-focused initiatives align with broader cyber resilience goals, and what collective actions the ecosystem can take to ensure that CVE data remains trusted, actionable, and a public good well into the future.

    April 15, 2026 10:30-11:30

  •  USTLP:CLEAR

    The Dependency Mirage: Hidden Vulnerabilities in Your Compiled Binaries

    Anthony Feddersen is the SVP of Engineering at NetRise, where he leads the development of advanced binary analysis solutions to secure the software supply chain. His career has focused on building and securing foundational cloud services at scale, previously serving as head of engineering at Chainguard and in senior leadership roles at Electronic Arts, VMware, and Google.

    Craig Heffner is a Senior Staff Engineer at NetRise and the creator of the popular open source tool, Binwalk. He has over 20 years experience analyzing wireless and embedded systems, and has presented at prominent security conferences including Black Hat and DEFCON. His former employers include the NSA, Microsoft, various government contractors, and multiple successful cyber security start-ups.

    Your application security scanners are lying to you. Manifest files show what developers intended to ship, but compiled binaries reveal a harsher truth: hidden, vulnerable dependencies that never show up in SBOMs. This session uses real-world case studies to expose the gap and show how Binary Composition Analysis uncovers the vulnerabilities your tools miss.

    April 14, 2026 13:30-14:30

  •  USTLP:CLEAR

    The Hidden Cost of CVEs: Can CSAF and VEX Change the Equation?

    Lisa Olson is a Principal Security Release Program Manager at Microsoft, where she has led the Patch Tuesday release process since 2013. A member of the CVE Board since 2018, Lisa is a passionate advocate for improving vulnerability communication through automation and machine-readable formats. Her work focuses on transforming how security information is shared to help organizations respond faster and more effectively.

    The CRA is calling for disclosing many more classes of vulnerabilities and clearly articulating the exploit status of all known vulnerabilities in the entire supply chain. To execute successfully, the industry is going to have to work together to come up with the tooling necessary to make this possible. This talk will explore the challenges and opportunities for this industry collaboration.

    April 14, 2026 14:35-15:05

  •  USTLP:CLEAR

    The Myth of the Meteoric Rise in Vulnerabilities

    The prevailing myth in cybersecurity circles—that the escalating number of vulnerabilities indicates a fundamental decline in software security—deserves scrutiny, as it often oversimplifies complex dynamics. While Common Vulnerabilities and Exposures (CVEs) did increase 20% from 40,000 in 2024 and over 50,000 by the end of 2025, this uptick is frequently misconstrued by speculation in blogs, media outlets and annual cyber security trend and insight reports. This trend is amplified by a rising volume of CVEs in non-enterprise and academic initiatives even as major vendors' vulnerability counts hold relatively steady. Flawed incentives in reporting mechanisms promote the logging of minor or spurious issues for prestige, artificially inflating figures without correlating to actual threats fuels undue panic, misallocates remediation efforts, and eclipses genuine strides in secure coding practices. Debunking it calls for a shift toward risk-centric vulnerability management, emphasizing exploit potential over raw quantity to cultivate a more informed perspective on evolving cyber risks.

    April 16, 2026 10:30-11:00

  •  USTLP:CLEAR

    The Quality Era of CVE: A Blueprint for Global Software Safety

    Bob is a cybersecurity executive and public-interest technologist with deep experience building and defending high profile digital systems. He has led major secure by design initiatives at the Institute for Security and Technology (IST) and at the Cybersecurity and Infrastructure Security Agency (CISA), where he served as a Senior Technical Advisor focused on shifting more responsibility for customer safety to software manufacturers. He was the first Chief Security Officer

    (CSO) at the Democratic National Committee (DNC), boosting the security of the Committee along with state parties and campaigns. Earlier in his career he was the CISO at Yahoo and the first security hire at Twitter, where he built and led the information security program from the ground up.

    The CVE Program is one of the most important public-interest technology infrastructures, but it was built for a very different era. Today’s defenders face adversaries who move faster, exploit automation, and operate at global scale. Meanwhile, the CVE ecosystem still relies on fragmented governance, inconsistent data quality, and processes that treat vulnerability reporting as a clerical task rather than a safety-critical function. This talk asks a simple but disruptive question: What would the CVE program look like if we designed it from scratch today? Drawing from lessons in aviation safety, transportation safety, and public health, we will explore a vision for a modern software defect registry that treats software as critical infrastructure, focuses on classes of defects rather than individual bugs, and enforces quality-by-design at the moment records are created. Attendees will see concrete examples of how this vision can work in practice, including walkthroughs of a CNA Dashboard and a User Dashboard that surface CVE record quality, recurring defect patterns, and manufacturer accountability in ways that are not possible today. These prototypes demonstrate what becomes immediately achievable when the system creates CVE records that are complete, accurate, timely, and structured for automation—giving defenders faster answers while enabling systemic analysis of how software fails over time. The goal of the session is not incremental change. It is a call to reimagine CVE as the backbone of software safety: an authoritative defect registry, an accountability mechanism for manufacturers, and an engine for eliminating entire classes of vulnerability. The talk will close with a pragmatic discussion of initial steps the community could take in 2026 to begin implementing this vision, focusing on quality-by-design requirements, opinionated tooling, and governance changes that enable meaningful progress without requiring a wholesale reset of the ecosystem.

    April 16, 2026 10:30-11:00

  •  US INTLP:CLEAR

    The Vulnerability Ecosystem’s Vendor Bias — Exposed by Open Source

    Yogesh Mittal is a PSIRT Manager at Red Hat, where he orchestrates strategic initiatives at the intersection of enterprise security and open source supply chain health. He oversaw Red Hat’s elevation to both CVE Program Root and CNA of Last Resort (CNA-LR) status. As a member of the CVE Program Roots Council, Yogesh plays a central role in evolving CNA Policy and operational standards, ensuring that governance frameworks are robust enough for global enterprises while remaining viable for decentralized communities.

    Beyond policy, Yogesh bridges the gap between corporate governance and operational reality to align industry standards with the needs of the modern supply chain. He established a collaborative forum for Open Source CNAs and is dedicated to operationalizing "Federated Responsibility"—designing policy-backed frameworks that improve data quality without overburdening the volunteer workforce.

    The global vulnerability management ecosystem operates on a hidden "Vendor Bias"—the assumption that software producers have full visibility into downstream deployments and funded security teams. While this model works for commercial vendors, it breaks catastrophically when applied to Open Source Software (OSS). This paper exposes how this structural bias creates five critical failures in the OSS supply chain: the "Context Failure" (systemic risk inflation), the "Consensus Failure" (conflicting data from centralized authorities), the "Automation Failure" (AI-driven triage debt), the "Capacity Failure" (administrative exhaustion), and the "Resolution Failure" (the "Disputed" tag deadlock). We conclude that the technical ecosystem must mirror emerging policy innovations. We propose a "Federated Responsibility" framework that decouples risk assessment from upstream code maintenance, using the EU Cyber Resilience Act’s "Stewardship" model as a blueprint. By retiring the ambiguous "Disputed" tag in favor of a "Conditional" status, we can ensure enterprise-grade data quality while protecting the volunteer capacity that powers modern infrastructure.

    April 14, 2026 17:10-17:40

  •  USTLP:CLEAR

    Three Musketeers: CVE, CSAF, and VEX

    Daniel Larson is the Coordinated Vulnerability Disclosure (CVD) Team Lead at the Cybersecurity and Infrastructure Security Agency where he and his team oversee the day-to-day CVD operations conducted by CISA and its partners. His roles also include overseeing the daily operations for the CISA Top-Level Root, CISA ICS Root CNA-LR, and CISA-Civilian Government CNA. Daniel has supported CISA’s Disclosure mission for six years, working closely with software suppliers and researchers to enhance Coordinated Vulnerability Disclosure (CVD) capabilities and maturity through automation and policy improvements.

    Eoin Wilson-Manion is a vulnerability analyst at ANALYGENCE Labs, where he performs Coordinated Vulnerability Disclosure (CVD) and contributes to related research and development efforts with his buddy Tyler! 

    Tyler Zellers is a vulnerability analyst at ANALYGENCE Labs, where he performs Coordinated Vulnerability Disclosure (CVD) and contributes to related research and development efforts.

     
    Vulnerability management, perhaps unsurprisingly, relies on information about vulnerabilities. The results of most coordinated vulnerability disclosure (CVD) efforts are, also unsurprisingly, disclosures, ideally public disclosures. What information does vulnerability management need? What information does CVD provide? How, in what formats? How do we assess quality and support automation? CISA Vulnerability Response and Coordination (VRC) publishes vulnerability information in CVE, CSAF, VEX, and a collection of related formats including SSVC, CVSS, CWE, and vers. This talk will detail our experience from collecting and analyzing vulnerability information to producing and publishing CSAF Advisories and CVE Records.

    April 15, 2026 16:30-17:30

  •  USTLP:CLEAR

    Transforming Vulnerability Management with Advanced Dependency Knowledge Graphs

    Prof. David Starobinski is a Professor of Electrical and Computer Engineering and of Systems Engineering at Boston University, with an affiliated appointment in the Department of Computer Science. His research interests are in cybersecurity, wireless networking, blockchain and cryptocurrency, and network economics.

    Sevval Simsek is a Computer Engineering PhD candidate at Boston University. She is a part of Networking and Information Systems Lab, and has been focusing on ML for Cybersecurity, and improving cybersecurity operations with graphs and algorithms.

    Modern software supply chains are complex, driving the need for tools to manage dependencies and detect vulnerabilities. However, integrating these tools for unified vulnerability-dependency views is an open challenge. We introduce VDGraph, a knowledge graph methodology that merges project dependency data and vulnerability scan outputs into a holistic graph that represents the complex dependency chains leading to vulnerabilities, and is queryable. We formally analyze VDGraph’s properties and resolve dependency and vulnerability data conflicts. A proof-of-concept using CycloneDX Maven plugin and Google’s OSV-Scanner demonstrates automation and scalability across over 100 Maven-based Java projects. Queries on VDGraph uncover concentrated risk points and show that most vulnerabilities are deeply nested inside projects (i.e, depth of three or greater). We further demonstrate VDGraph’s capability of efficiently visualizing and patching vulnerable projects

    April 15, 2026 13:15-13:45

  •  USTLP:CLEAR

    Vibe Coding a Backport: Deep Dive into Backported Patch Generation

    John Amaral is the Co-founder and CTO of Root.io. John has more than 25 years of experience as a technologist and product development leader in information security and networking. Before Root, John was Head of Product at Cisco Cloud Security. John previously held product and engineering leadership roles at CloudLock (acquired by Cisco), Trustwave (acquired by Singtel), and Vericept, among others. In 2007, John was selected as a top 40 under 40 business leader by American Venture Magazine.

    When a new CVE drops, a new cycle begins where teams have to scramble and prioritize fixing since it isn't as simple as pulling the latest upstream commit. Legacy dependencies, shifting APIs, and operational stability requirements turn backporting into a surgical exercise in code archaeology. In this hands-on lab, attendees will go deep on how to generate a backported patch for a real-world vulnerability, which will start with the CVE-2024-37370 in MIT Kerberos example, used across major Linux distributions and many CNCF projects. We’ll start by walking through what makes a vulnerability CVE-worthy, examining the affected code, and studying how upstream fixed it. From there, attendees will work step-by-step to adapt that fix for an older codebase, tracing impact across API changes, dependencies, test suites, and documentation. Along the way, we’ll explore other techniques to evaluate patch safety, prevent regressions, and identify unintended side effects before they hit production. Participants will get hands-on with live systems, debugging failed patches, exploring incomplete fixes, and learning techniques to trace risk across multiple legacy branches. We’ll cover both the defender’s and attacker’s perspectives understanding how incomplete backports leave exploitable gaps, and how to close them. By the end of the session, attendees will have produced and validated their own safe backport patch, gaining practical skills they can apply immediately in production environments. This lab is designed for engineers, SREs, and security practitioners who want to move beyond “apply and pray” and learn the craft of backporting in high-stakes, real-world conditions.

    April 13, 2026 08:30-12:30

  •  USTLP:CLEAR

    Vulnerabilities Without CVEs: Governing the Dark Matter of Internal and Unknown Software

    Josh Skorich is Founder and CTO at Spektion, working on runtime-based security for production environments. He spent over a decade in red teaming and adversary simulation, leading offensive security programs across financial systems, critical infrastructure, and cloud environments. His focus is bringing operational security reality into scalable, repeatable vulnerability governance.

    Vulnerability management programs are optimized for what can be named and matched: a product, a version, a CVE. But real environments contain significant software that exists outside practical CVE coverage: legacy tools from defunct vendors (no one to coordinate disclosure with), obscure utilities embedded in base images (no fingerprint for scanners to match), regional software without CNA relationships (unlikely to receive research attention), and abandoned projects that still run in production (no vendor maintaining a vulnerability feed). This software is operationally important yet structurally invisible to CVE-centric workflows. The failure mode is identity: if you cannot fingerprint the component, your VM pipeline produces no finding, no ticket, no owner.

    This talk presents a runtime-centric approach to governing that blind spot, born from a career in red teaming where the most interesting findings were rarely in software with CVE coverage. I show how multi-layer runtime telemetry (Kubernetes metadata, gateway/mesh logs, network flows, and host events) can bootstrap stable component identity using a three-layer model that survives rebuilds and reduces churn. I introduce an evidence framework (Observed/Derived/Assumed with confidence scoring) so every claim has a clear basis, and I'm explicit about what runtime telemetry can and cannot prove.

    I then introduce Behavioral Vulnerability Records (BVRs): evidence-backed exploit paths tied to runtime-identified components, with fields for identity, preconditions, exploit path, impact, controls, and supporting evidence. I walk through one deep case study (telemetry to remediation) plus two concrete examples demonstrating breadth. Finally, I show how BVRs integrate into existing VM workflows and map to existing standards (CWE classification, CSAF/OSV-style records, VEX-like status) so they complement CVEs rather than compete with them.

    Attendees leave with a concrete schema, an evidence model they can defend, and a 30-day pilot plan using common enterprise telemetry.

    April 15, 2026 15:25-16:25

  •  USTLP:CLEAR

    Vulnrichment Playground

    Art Manion spends a lot of time working on various aspects of technical cybersecurity vulnerabilities including coordinated disclosure, measurement, management, information systems, risk assessment, and public policy. Art has led and contributed to vulnerability-related efforts the Forum of Incident Response and Security Teams (FIRST), the CVE Program, ISO/IEC JTC 1/SC 27, the Open Source Security Foundation (OpenSSF), and the National Telecommunications and Information Administration (NTIA, US). Art is the Deputy Director of Tharros Labs and previously managed vulnerability analysis at the CERT Coordination Center (CERT/CC).

    Lindsey Cerkovnik is the Chief of CISA’s Vulnerability Response & Coordination (VRC) Branch. Her team is responsible for CISA’s Coordinated Vulnerability Disclosure

    (CVD) process, the Known Exploited Vulnerabilities (KEV) catalog, and CISA’s Stakeholder Specific Vulnerability Categorization (SSVC) process. Lindsey and her team help to maintain, support, and advance the global vulnerability ecosystem by funding and overseeing the CVE and CVE Numbering Authority (CNA) programs, leading the production and dissemination of machine-readable vulnerability enrichment information, and engaging in valuable technical collaboration with the vulnerability research community.

    The CISA Vulnrichment project has demonstrated how a CVE Program authorized data publisher (ADP) can provide additional information to CVE Records, supporting a more consistent baseline that includes SSVC, KEV, CVSS, and CWE. Beyond this baseline, Vulnrichment allows CISA to experiment with different types of information, assessing costs, value to consumers, and potential policy recommendations. What additional information should Vulnrichment provide? Or stop providing? What if Vulnrichment disagrees with CNA-provided information? This presentation will review "Vulnrichment Year 2" and explore new enrichment options.

    April 14, 2026 14:35-15:05

  •  USTLP:CLEAR

    What is to be Published? Analyzing Chinese Vulnerability Disclosures and Omissions

    Dr. Benjamin Edwards is a principal research scientist working at Bitsight. An expert in ML and statistics, Ben synthesized security data into actionable insights. He has led research on a wide variety of security topics including vulnerability management, application security, human risk, Next-gen SIEM, nation state cybersecurity policy, and the security of ML models. He is an active member of the security community, contributing to open standards. His work has been published in leading industry and academic venues.

    Sander Vinberg is a Manager of Security Research at Bitsight. He specializes in the cultivation and application of data sources for cybersecurity decision making. He lives in Washington state.

    The relationship between vulnerability researchers in China and the Chinese government underwent a transformation in 2021, in which the 13th Bureau of the Ministry of State Security (MSS) became authorized to suppress or modify vulnerability disclosures happening under their jurisdiction. [Cary, del Rosso 2023] This created an epochal shift in Chinese vulnerability publication which we can study to better understand both the vulnerabilities and, potentially, the thinking of the government controlling their appearance. This data-driven study will focus on the characteristics of the vulnerabilities within Chinese vulnerability databases and how they change over time, to draw conclusions about vulnerabilities that may otherwise be undercounted or underappreciated in North America and Europe. Furthermore, we explore whether we can draw interpolations about the Ministry of State Security’s approach to offensive cyber operations based on the vulnerabilities that do appear. These conclusions should serve as useful context for decision making about vulnerability management as well as more fundamental questions about identifying and publishing vulnerability data, such as how a fragmented vulnerability cataloguing space complicates the task of vulnerability management.

    April 14, 2026 10:30-11:30

  •  USTLP:GREEN

    What We Learned When AI Analyzed Tens of Millions of Vulnerabilities

    Human vulnerability researchers do not evaluate findings using severity scores or exploit headlines. They reason about prerequisites, privilege boundaries, reachable assets, and realistic attack chains. Yet most modern vulnerability programs still rely on static signals, scoring systems like CVSS, EPSS and KEV that cannot replicate this reasoning process. This talk presents original research on using AI workers (different LLMs) to investigate vulnerabilities the same way experienced human researchers do. Instead of prioritizing based on likelihood or popularity, we tasked our LLMs to analyze exploit chains, environmental conditions, identity relationships, and asset exposure to determine whether a vulnerability is actually feasible in a specific environment. The session explores how reasoning models can be constrained to perform deterministic investigation, which LLMs was better and which ones fell short, and why this shift enables vulnerability analysis that is both more accurate and more actionable than traditional approaches we used today for probabilistic guessing.

    April 14, 2026 15:30-16:30