All times are listed in Central Standard Time – San Mexico City, CDMX, Mexico (GMT-6)
October 27 - Plenary Sessions
October 28 - Plenary Sessions
October 29 - Training Day: XDR-Driven Response: Strategies for Modern Threat Environments
| October 27 - Plenary Sessions | |
|---|---|
| 09:00 – 09:30 | Registration and Welcome Coffee TLP:CLEAR |
| 09:30 – 10:00 | MX Opening FIRSTMX25 and Remarks Autoridades Universidad IBERO y Comitre FIRST (MX) TLP:CLEAR |
| 10:00 – 11:00 | MX Incident Response: Making It Everyone’s Business Juan Pablo Castro (Trend Micro, MX) TLP:CLEAR |
| 11:00 – 11:50 | Advanced Signals: NextGen Threat Hunting using Active and Passive DNS and Internet NetFlow Telemetry Ed Gibbs (WHOIS); Ernesto Guzmán (Digital Forensics Incident Response and ES Consulting) TLP:GREEN |
| 12:00 – 12:15 | Coffee Break |
| 12:15 – 13:00 | RU Privacy Digital Identity by Criminal Eyes: Insights From Russian-Speaking Underground Vladimir Kropotov (Trend Micro, RU) TLP:GREEN |
| 13:00 – 13:50 | How to Cook Hora-bot... The Long and Slow Way David Martin (CERT Arteria) TLP:GREEN |
| 14:00 – 15:00 | Lunch |
| 15:00 – 15:50 | MX Beyond Incident Reponse: Mastering the Art of Cyber Crisis Forecasting Maricarmen García de Ureña (Secure Information Technologies, MX) TLP:CLEAR |
| 16:00 – 16:30 | Networking Coffee |
| October 28 - Plenary Sessions | |
|---|---|
| 09:00 – 10:50 | US Agentic CTI: Automating Threat Intelligence with MCP-Powered AI Agents Ensar Şeker (SOCRadar, US) TLP:GREEN |
| 11:00 – 11:50 | Sean Jones (Groupsense, cognyte) TLP:GREEN |
| 12:00 – 12:15 | Coffee Break |
| 12:15 – 13:00 | MX Are You Talking to Me? Tailoring CTI Communication for Maximum Impact Demian García (CTI Analyst Sr, MX) TLP:CLEAR |
| 13:00 – 13:50 | MX Building a Threat Landscape: The Foundation of an Effective Cybersecurity Strategy Juan Alberto Muñoz (Infomatec, MX) TLP:CLEAR |
| 14:00 – 14:45 | Lunch |
| 14:45 – 15:35 | MX Know Your Enemy: Unveiling the Most Prevalent TTPs in Latin America 2025 Arturo Torres (FortiGuard Labs , MX) TLP:GREEN |
| 15:35 – 16:30 | MX From Breadcrumbs to Breaches: OSINT in the Heat of Incident Response Evelyn Hernández (Sr. Cyber Threat Intelligence Analyst, MX) TLP:GREEN |
| October 29 - Training Day: XDR-Driven Response: Strategies for Modern Threat Environments | |
|---|---|
| 09:00 – 11:15 | Session: Introduction and Recent Case Example Marc Lanzerdorfen (Trend Micro) TLP:GREEN |
| 11:15 – 11:30 | Coffee Break |
| 11:30 – 13:00 | Marc Lanzerdorfen (Trend Micro) TLP:GREEN |
| 13:00 – 13:45 | Lunch |
| 13:45 – 15:45 | Marc Lanzerdorfen (Trend Micro) TLP:GREEN |
| 15:45 – 16:00 | Coffee Break |
| 16:00 – 16:45 | Marc Lanzerdorfen (Trend Micro) TLP:GREEN |
Ed Gibbs (WHOIS), Ernesto Guzmán (Digital Forensics Incident Response and ES Consulting)
Cybersecurity teams face an asymmetric battle against AI-enabled adversaries who register millions of malicious domains daily, often lying dormant to evade traditional newly-registered-domain detections. This presentation explores advanced approaches to DNS and NetFlow telemetry that transform raw network data into actionable threat intelligence. We demonstrate how domain clustering analysis detects sophisticated typosquatting campaigns and bulk-registered brand impersonation domains that evade conventional security tools. Through real-world case studies, we show how major security platforms miss 60-100% of coordinated domain registrations, while cluster-based detection identifies behavioral and infrastructural patterns that may indicate state-sponsored activity.
The session covers the strategic integration of passive and active DNS data with NetFlow telemetry to achieve comprehensive visibility across the threat landscape. Topics include: infrastructure reuse detection, shadow IT discovery, attack surface mapping, and adversary pattern analysis. We examine how NetFlow's "agentless" approach enables forensic timeline reconstruction, exfiltration quantification, and incident response maturity measurement. Attendees will learn practical fusion techniques for correlating DNS and NetFlow data to reduce false positives, accelerate threat detection, and close visibility gaps in modern security operations. The presentation emphasizes that detection maturity requires not just data collection, but contextual correlation—transforming telemetry from noise into strategic defensive capability.
Ed Gibbs, is a seasoned cybersecurity executive with WHOISXMLAPI.Com and a Forbes Technology Council member. With decades of experience spanning roles at Cisco, McAfee, Symantec, and most recently leading technical and research efforts at WhoisXML API, Ed has cultivated a reputation for advancing cyber threat intelligence, DNS analytics, and internet infrastructure security. His work involves spearheading domain and subdomain discovery techniques, overseeing passive DNS research, and managing complex security data ecosystems used by governments, cybercrime units, and market researchers globally. As an accomplished team leader, Ed has built and led diverse groups of security professionals and researchers while fostering collaborations with internet registrars and infrastructure providers to combat abuse and elevate security standards. Ed brings a deep well of knowledge on security operations, firewalls, VPNs, and cutting-edge threat intelligence methodologies. His insights into DNS and domain-based research especially how passive DNS and domain enrichment can expose malicious activity make him an ideal guest for discussions on emerging cyber threats, operational security challenges, and innovations in managing external attack surfaces. Whether it's discussing AI's role in cybersecurity, sharing real-world insights from enterprise security leadership, or examining the future of DNS infrastructure, Ed delivers compelling, informed perspectives tailored for both technical and strategic audiences.
Ernesto Guzmán leads the Digital Forensics and Incident Response team at ES Consulting, bringing more than 15 years of experience in technology, cybersecurity, and digital forensics. He holds certifications as ISO/IEC 27035 Lead Incident Manager, ISO/IEC 27001 Lead Auditor, ISO/IEC 9001 Lead Auditor, Certified Ethical Hacker (CEH), among other international credentials.
Throughout his career, he has successfully led critical incident response operations and complex forensic investigations, strengthening his expertise in digital asset protection, threat intelligence, and comprehensive security incident management. His work includes the development of practical methodologies for forensic analysis and data recovery, enhancing organizational resilience after security incidents. Currently, he leads the cyber defense team at ES Consulting, driving advanced strategies for digital resilience and incident management aligned with international standards.
October 27, 2025 11:00-11:50
Ensar Şeker (SOCRadar, US)
In rapidly evolving threat landscapes, CTI ingestion and enrichment remain bottlenecks for SOCs and CERTs due to manual parsing, siloed data sources, and inconsistent formats. This session introduces Agentic CTI, a novel approach leveraging Agentic AI and Model Context Protocol (MCP)“enabled agents to automate CTI pipelines end-to-end. These AI agents autonomously ingest reports, extract indicators of compromise (IOCs), enrich data with context (e.g., geolocation, TTP mapping), and generate structured outputs all with minimal human intervention. We'll demonstrate how MCP servers act as adaptable bridges between AI agents and multiple CTI sources (open feeds, private databases, threat feeds), allowing context-aware agents to perform real-time tool invocations such as querying reputational APIs or mapping to STIX format. The session covers: Agentic AI's autonomy in reasoning, tool invocation, and multi-step CTI workflows. MCP's role as a universal, secure integration layer between agents and CTI sources/tools. Security considerations for MCP-based CTI systems, including injection risks and trust enforcement strategies. A live demo showing how an MCP enabled agent retrieves CTI, applies enrichment, and outputs a structured incident package.
Ensar Şeker received his undergraduate and graduate degrees in Electronics and Computer Engineering at New York Tech. He continued his academic career by pursuing a Ph.D. in Information and Communication Technologies at TalTech (Tallinn University of Technology). He began his professional journey in the United States as an IT Specialist at Solaris between 2010 and 2013. Subsequently, he served as the Head of the IT Department at Turkish Petroleum Corporation (TPAO) in Turkey from 2013 to 2015. In 2016, Ensar took on an important role as a security researcher at the NATO Cooperative Cyber Defense Centre of Excellence (CCD COE) in Tallinn, Estonia, a role he held until 2018. Additionally, from 2015 to 2021, he continued his role as a senior researcher at the Turkish Scientific Council. Since 2021, he has held various roles in cyber security firms, including leadership positions in the Blue Team and Red Team and roles such as VP of Research and CISO at SOCRadar.
October 28, 2025 09:00-10:50
Demian García (CTI Analyst Sr, MX)
The value of a Cyber Threat Intelligence (CTI) function lies not only in its technical capabilities, but also in how effectively it communicates the right message to the right team. A single malicious campaign can generate multiple insights for different stakeholders such as SOC analysts, security operations managers, or executive leadership. Delivering the right message to the right audience can drive swift action and improve the organization's overall security posture. On the other hand, misaligned communication can lead to confusion, wasted effort, or even operational risk. This talk explores how CTI teams can tailor their messaging to maximize impact across diverse cybersecurity functions. By understanding the language, priorities, and workflows of each audience, CTI professionals can ensure their intelligence adds tangible value. Attendees will leave with practical strategies to enhance CTI communication and foster stronger collaboration across their security organization.
Demian García, CTI Analyst Sr, is a cybersecurity professional with over 12 years of experience, specializing in Cyber Threat Intelligence to support digital forensics and incident response (DFIR), threat detection, data loss prevention, and insider threat investigations. Passionate about knowledge sharing, Demian is also dedicated to mentoring and teaching the next generation of cybersecurity professionals. In his free time, he serves as a professor at the largest university in Mexico.
October 28, 2025 12:15-13:00
Maricarmen García de Ureña (Secure Information Technologies, MX)
In today's landscape, a reactive approach to cybersecurity is no longer sufficient. This presentation introduces and defines the Cyber Crisis Forecaster (CCF), a necessary new specialist role that redefines anticipation in corporate cyber-resilience. The CCF is an expert dedicated to continuously studying the behavior of cyber threats within specific regional and industry contexts to actively predict Cyber Attacks and Cyber Crises.
The session will detail the core proposed characteristics of the CCF, positioning them not as a simple methodology, but as a strategic asset for intelligent decision-making and long-term organizational protection. We will map the CCF's function within established frameworks like the NIST Cyber Security Framework (CSF) and models of organizational cyber-resilience, specifically highlighting the critical areas of Anticipate, Resist, Recover, and Adapt. Attendees will gain a forward-looking perspective on integrating advanced threat analysis, continuous risk management, and strategic balancing into their cybersecurity processes to move from detection and response to true proactive forecasting.
Maricarmen García de Ureña is a seasoned entrepreneur, international consultant, speaker, and official Instructor/Spokesperson for bsi (British Standards Institution) on numerous ISO standards, including ISO 27001, ISO 27035, ISO 22301, ISO 31000, ISO 42001 and ISO 27701. With 34 years of experience in the field, she is a recognized expert in Information Security, Personal Data Protection, Business Continuity, Risk Management, and Organizational Resilience. She is the Founder and CEO of Secure Information Technologies, a consultancy firm with a strong presence across the Americas. Academically, she holds an IT Service Administration Master's degree from Universidad IBERO.
Her expertise is critical in the global cybersecurity ecosystem; she is an active member of various associations WOMCY, OMCS, ISACA, AMCS, ALAPSI). Her contributions were recognized with the Top Women in Cybersecurity Award for the LATAM and USA regions in 2021 and 2022. Furthermore, she is a certified expert witness (Perito Profesional) in cybersecurity and intelligence for the investigation of technology-related crimes, and she delivers regular academic lectures at major universities, focusing on IT Governance, Information Security, and Risk Systems.
October 27, 2025 15:00-15:50
Juan Alberto Muñoz (Infomatec, MX)
The importance of building and maintaining a Threat Landscape in the creation of an effective Cybersecurity strategy: The treat landscape of an organization is ever-changing. Threats evolve over time and cybercriminals develop new techniques constantly. Understanding your threat landscape is imperative for creating a comprehensive and effective Cybersecurity strategy to protect your organization.
Juan Muñoz, CISO (Infomatec), is Chief Information Security Officer at a leading Financial Group in Mexico. Specialized in Cybersecurity, with more than 20 years of experience in different sectors in Mexico and the United States. Beyond his professional role, He is passionate about bridging the gap between executive leadership and Cybersecurity, focusing on monetizing risk to build awareness at the board level. Currently, Juan is focused on creating Cybersecurity strategies for financial services organizations in Mexico.
October 28, 2025 13:00-13:50
Marc Lanzerdorfen (Trend Micro)
Marc Lanzerdorfen is a seasoned cybersecurity professional currently serving as a Senior Incident Response Analyst at Trend Micro, where he has been a vital member of the European Incident Response Team for the past six years. With a strong background in incident response and digital forensics, Marc brings deep technical expertise and analytical precision to handling complex security incidents across the region. Before stepping into his current role, Marc worked as a Senior Technical Trainer at Trend Micro, where he delivered in-depth training sessions to both internal teams and external clients. His passion for knowledge sharing and education continues to be a driving force in his career, as he remains committed to empowering others through skill development and cybersecurity awareness. Marc’s professional interests lie at the intersection of threat detection, forensic investigation, and proactive defense strategies, making him a trusted expert in the field.
October 29, 2025 16:00-16:45
Evelyn Hernández (Sr. Cyber Threat Intelligence Analyst, MX)
In a cyber incident, time is precious. This session aims to explore how Open Source Intelligence (OSINT) can turn a single breadcrumb (an IP, a domain, a leaked credential) into actionable insights, how to leverage OSINT to track threats, guide containment, and strengthen the response strategy. We'll dive into practical techniques, real life use cases, and lessons learned from using OSINT.
Evelyn Hernández, Sr. Cyber Threat Intelligence Analyst, is a Computer Engineer graduated from FES Aragón, UNAM, México, with over 9 years of experience in the cybersecurity field. Currently working as a Cyber Threat Intelligence Analyst, specializing in the detection and analysis of digital threats. Holding a Diploma in Information Security and a certification in Open Source Intelligence (GOSI - OSINT). I have been speaker at events such as NotPinkCon Security Conference and BugCON contributing to the dissemination of knowledge in cybersecurity and technology.
October 28, 2025 15:35-16:30
Sean Jones (Groupsense, cognyte)
UMINT is one of the most powerful, yet least understood tools in cyber threat intelligence. This talk will walk through the full lifecycle of a deep cover HUMINT operation—from identifying high-value sources, to crafting believable personas, navigating forum dynamics, and extracting intelligence through direct engagement with threat actors. We’ll explore how these operations provide early warning of attacks, insights into actor motivations, and access to tools before they’re deployed. But going undercover isn’t without risk. We’ll cover the technical and psychological challenges, OPSEC fundamentals, and ethical dilemmas that define this high-stakes work. Attendees will learn how to map underground communities, build credibility, and collect actionable intelligence without blowing cover. With real-world examples and field-tested strategies, this session offers a rare look inside the human side of CTI—where trust, deception, and tradecraft matter more than tooling. For anyone serious about adversary engagement, this is where the automation ends—and infiltration begins.
Sean Thomas Jones is a highly accomplished Senior Information Security Professional with extensive experience across information technology and cybersecurity. Recognized for his analytical precision, innovative problem-solving, and steady leadership, he has built and implemented tools and automation processes that have enhanced efficiency and strengthened organizational resilience. Guided by strong principles and a sense of purpose, Sean consistently delivers reliable, forward-thinking solutions that safeguard organizations in a constantly evolving digital landscape. Beyond his professional accomplishments, Sean values integrity, family, and meaningful leadership. He approaches both work and life with humility, service, and gratitude—striving to elevate others while maintaining excellence in everything he does. This purpose-driven mindset defines his reputation as a trusted cybersecurity leader and a person dedicated to creating lasting, positive impact.
October 28, 2025 11:00-11:50
David Martin (CERT Arteria)
In the session I will present the new Horabot (Botnet) obfuscation/cybercrime techniques that I observed in a real case handled by my team at CERT-Arteria, the incident took place in March 2025, and the techniques will be presented as a cooking recipe along with fragments of the real malicious files that were analyzed.
David Martin is a dedicated and creative professional with +10 years of experience. He is passionate about technology, security, intelligence, hacking and cryptography. He is a strategic/analytic thinker with skills and experience in leadership and teamwork. He has a Master’s degree in Cybersecurity and a Cybersecurity Specialist degree, (both graduated with honors) from La Salle University. He has extensive experience in Cyber Threat Intelligence (CTI), has founded Computer Emergency Response Teams (CERTs) and achieved FIRST (Forum of Incident Response Security Teams) international certification for it, he is also a member of Special Interest Group CTI-SIG on FIRST. He has experience working with financial entities and National Bank Guilds. He holds several certifications from DEF-CON, U.S. Homeland Security, I-intelligence and UNAM among others. He is a lifelong martial artist and an eternal student of the Warrior's Path, from which he has acquired the discipline and focus that he applies in every other realm of his life. Top Skills: Cyber Security, Strategic Thinking, Cyber Threat Intelligence & analysis, Cryptography and Ethical Hacking.
October 27, 2025 13:00-13:50
Juan Pablo Castro (Trend Micro, MX)
Every incident tells a story not just of an attacker's ingenuity, but of a risk that was never fully anticipated or mitigated. In many ways, incident response is the reverse of cyber risk management: it exposes the scenarios your risk models missed. This session explores how incident response can become a strategic feedback loop that drives better cyber risk decisions. When treated only as firefighting, it restores operations but leaves systemic weaknesses intact. When combined with cyber risk managers and threat hunters, it becomes a catalyst for long-term resilience especially when powered by predictive capabilities. I will share how leading organizations are: Turning post-incident findings into living risk models that continuously refine their defenses. Embedding cyber risk managers to orchestrate lessons learned across silos and prevent repeat failures. Creating synergy between threat hunters (who uncover lurking threats), incident responders (who contain active attacks), and risk managers (who close systemic gaps).Using Predictive Attack Path Modeling to anticipate how future intrusions might unfold and prepare countermeasures before they happen. Leveraging Cybersecurity Digital Twins to simulate infrastructure, test response plans, and validate risk mitigation strategies under realistic attack scenarios ” without impacting production. Applying unified frameworks like the Cybersecurity Compass, CRML (Cyber Risk Management Lifecycle), Cyber RiskOps, and CROC (Cyber Risk Operations Center) to ensure accountability, reduce tool fragmentation, and focus on the cyber risks that matter most. Attendees will gain a practical blueprint for transforming incidents from isolated crises into organization-wide learning opportunities, enhancing readiness through predictive modeling, and reducing incident frequency while strengthening enterprise resilience over time.
Juan Pablo Castro es Director de Innovación Tecnológica y Estrategia de Ciberseguridad en Trend Micro Latinoamérica, con más de 20 años de experiencia en ciberseguridad, ciber riesgo y privacidad de datos. A lo largo de su carrera, ha guiado a organizaciones en la implementación de estrategias de ciberseguridad en un panorama de amenazas en constante evolución. Colabora con organismos internacionales como INTERPOL y la OEA, y trabaja estrechamente con entidades gubernamentales y cuerpos de seguridad especializados en cibercrimen en distintos países de Latinoamérica. Su enfoque está en desarrollar soluciones innovadoras para los sectores gubernamental, financiero y de seguridad nacional. Además de su rol en la industria, Juan Pablo ha sido profesor en programas de maestría en ciberseguridad y blockchain en tres prestigiosas universidades. También es el creador de varios conceptos clave en el sector, como el Cybersecurity Compass, el Ciclo de Gestión de Riesgos Cibernéticos (CRML) y el Centro de Operaciones de Riesgos Cibernéticos (CROC), los cuales han influido en las mejores prácticas de la industria. Como conferencista, Juan Pablo ha participado en numerosos eventos en toda Latinoamérica, compartiendo su visión y experiencia con sectores clave como el financiero, gubernamental y académico, destacando siempre la importancia de la ciberseguridad para organizaciones e individuos.
October 27, 2025 10:00-11:00
Arturo Torres (FortiGuard Labs , MX)
In my talk, I will provide an in-depth analysis of the current trends in cyber threats prevalent in Latin America, supported by real 2025 telemetry data and statistics. By examining recent exploitation attempts and attack vectors. I aim to offer a comprehensive understanding of the evolving threat landscape in the region by using The Cyber Kill Chain model and the MITRE ATT&CK framework. Understanding the threat actors and cybercriminal groups targeting Latin America is crucial in developing effective countermeasures. By identifying their motives, tactics, and preferred targets, we can tailor threat intelligence to enhance detection and response capabilities. This research-driven insight holds immense potential for the regional CERT/CSIRT teams to issue targeted cybersecurity alerts and recommendations. As we collectively navigate this perilous cyber terrain, harnessing these data-driven insights will fortify our cybersecurity posture and elevate our ability to safeguard the digital frontiers.
Arturo Torres es Director de FortiGuard Labs LATAM, liderando estrategias de ciberseguridad y análisis de inteligencia de amenazas en la región de América Latina y el Caribe. Desde este rol, ha llevado a cabo investigaciones sobre el panorama de amenazas, generando informes trimestrales con alcance nacional e internacional, citados en medios de seguridad y tecnología, así como en prensa tradicional. Además, dirige el programa de intercambio de inteligencia de amenazas de FortiGuard para LATAM. Cuenta con múltiples certificaciones en ciberseguridad, incluyendo CISSP, CEH, CTIA, MITRE ATT&CK, entre otras. Además de su trayectoria en la industria, Arturo es un reconocido académico y líder en educación en ciberseguridad. Es coordinador de la Maestría en Ingeniería en Seguridad de la Información en la Universidad Autónoma de Nuevo León (UANL), una de las más prestigiosas de México. Posee una Maestría en Administración, Negocios y Relaciones Industriales, así como un Doctorado en Ingeniería y Tecnologías de la Información con especialidad en Inteligencia Artificial. Ha participado como conferencista y autor en diversos foros tecnológicos y de ciberseguridad en el ámbito académico, empresarial e industrial, incluyendo OWASP LATAM, CICESE, DEF CON Porto Alegre, EkoParty, DragonJAR y la European Alliance for Innovation (EAI).
October 28, 2025 14:45-15:35
Vladimir Kropotov (Trend Micro, RU)
Many criminal business processes are focused on fast and scalable monetisation. The recent changes in such processes, including the scale of obtained profit and side effects of recent attacks expanded both attack surface targeted by cyber actors and geographical scale. The actors are leveraging biometrics to bypass identification and capable to penetrate the regions, where they don't have options to act before LLM era. This talk will be focused on privacy and digital identity aspects of the modern criminal business processes and will be based on insights and recent developments on Russian-speaking underground.
Vladimir Kropotov is an Advisor and principal researcher with the Trend Micro Forward-Looking Threat Research team. Active for over 20 years in information security projects and research, he previously built and led incident response teams at Fortune 500 companies. He holds a master's degree in applied mathematics and information security. He also participates in various projects for leading financial, industrial, and telecom companies. His main interests lie in cyber and business risks of the new technologies, strategic threat intelligence, incident response, and botnet and cybercrime investigations. Vladimir was a speaker at a variety of cyber security events, including BHEU, BHAsia, HITB, hack.lu, FIRST and others.
October 27, 2025 12:15-13:00
Marc Lanzerdorfen (Trend Micro)
Marc Lanzerdorfen is a seasoned cybersecurity professional currently serving as a Senior Incident Response Analyst at Trend Micro, where he has been a vital member of the European Incident Response Team for the past six years. With a strong background in incident response and digital forensics, Marc brings deep technical expertise and analytical precision to handling complex security incidents across the region. Before stepping into his current role, Marc worked as a Senior Technical Trainer at Trend Micro, where he delivered in-depth training sessions to both internal teams and external clients. His passion for knowledge sharing and education continues to be a driving force in his career, as he remains committed to empowering others through skill development and cybersecurity awareness. Marc’s professional interests lie at the intersection of threat detection, forensic investigation, and proactive defense strategies, making him a trusted expert in the field.
October 29, 2025 09:00-11:15
Marc Lanzerdorfen (Trend Micro)
Marc Lanzerdorfen is a seasoned cybersecurity professional currently serving as a Senior Incident Response Analyst at Trend Micro, where he has been a vital member of the European Incident Response Team for the past six years. With a strong background in incident response and digital forensics, Marc brings deep technical expertise and analytical precision to handling complex security incidents across the region. Before stepping into his current role, Marc worked as a Senior Technical Trainer at Trend Micro, where he delivered in-depth training sessions to both internal teams and external clients. His passion for knowledge sharing and education continues to be a driving force in his career, as he remains committed to empowering others through skill development and cybersecurity awareness. Marc’s professional interests lie at the intersection of threat detection, forensic investigation, and proactive defense strategies, making him a trusted expert in the field.
October 29, 2025 11:30-13:00, October 29, 2025 13:45-15:45