2nd Global Vulnerability Reporting Summit

Vulnerability Information Systems

Summit Invitation

2nd Global Vulnerability Reporting Summit will be held in March 14-16, 2018 at NTT WEST (NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION) Training Center in Osaka, Japan.

This summit will consist of working sessions on a number of vulnerability information systems topics. The primary goal of the summit is to develop a global vision to improve multiple aspects of the vulnerability response lifecycle.

Who should attend?

Anybody that is developing, using, or considering standards, specifications, initiatives, or practices related to the following topics should attend the summit:

Those that wish to attend the summit should have practical experience and familiarity with one or more of these topics in order to participate meaningfully in the working sessions. To attend the summit, send this registration form to vrdx-sig-events@first.org. Also, for more details of Co-located Meeting: the Osaka 2018 FIRST TC, refer to the agenda.

Please send questions, comments, or topic ideas to vrdx-sig-events@first.org.

Program Overview

Please note: the program schedule is not in its final version, adjustments will occur.

Wednesday, March 14th

Summit Days (Room 4)
11:00 – 13:00

Registration

13:00 – 13:10

Opening remarks (Room1)

13:10 – 14:10

Introductions

14:10 – 15:00

Review of outcomes from 1st Global Vulnerability Reporting Summit

15:00 – 15:30

Break

15:30 – 16:20

Review of activities / initiatives since the 1st Global Vulnerability Reporting Summit

16:20 – 17:00

Discussion on topics to be discussed for the working sessions

18:00 – 20:00

Thursday, March 15th

Summit Days (Room 4)
09:00 – 09:10

Opening remarks (Room1)

09:10 – 10:00

Vulnerability identification, naming, and tracking

10:00 – 10:30

Break

10:30 – 11:20

Vulnerability identification, naming, and tracking

11:20 – 12:00

Vulnerability data formats and information sharing

12:00 – 13:30

Lunch

13:30 – 14:20

Vulnerability data formats and information sharing

14:20 – 15:00

Severity, priority, and threat assessment

15:40 – 16:10

Break

16:10 – 17:50

Inventory and software component transparency

17:50 – 18:30

Review of 1st day discussion

19:00 – 21:00

Friday, March 16th

Summit Days (Room 4)
09:00 – 09:10

Opening remarks (Room1)

09:10 – 10:00

High-volume data management and automation

10:00 – 10:30

Break

10:30 – 11:10

High-volume data management and automation

11:10 – 12:00

Non-technical obstacles to vulnerability reporting and response

12:00 – 13:30

Lunch

13:30 – 14:20

Non-technical obstacles to vulnerability reporting and response

14:20 – 15:10

Review of 2nd day discussion

15:10 – 15:40

Break

15:40 – 17:10

Review of 2nd Summit Days

17:10 – 17:20

Closing remarks (Room 1)