Keerthana PurushothamKeerthana Purushotham (IEEE, US)
Keerthana Purushotham is a software engineer and applied researcher specializing in Linux security, cloud infrastructure, and AI-driven automation. She currently works on Amazon Linux at AWS, where she focuses on vulnerability management, CVE triage, and security tooling for large-scale, correctness-critical systems. Her work bridges low-level systems engineering with machine learning and statistics, enabling predictive approaches to risk assessment, patch prioritization, and threat modeling.
Keerthana holds a Master’s degree in Computer Science from UC San Diego, with strong foundations in algorithms, operating systems, probabilistic learning, and security. She has published peer-reviewed research in IEEE and ACL venues, with work spanning cloud security, NLP, web crawling, and image processing, and maintains an active Google Scholar profile.
Her open-source projects explore secure ephemeral AI tooling, distributed cloud services, and structured prediction models. Across industry and research, she is driven by building reliable, explainable, and scalable systems that operate at the intersection of security, infrastructure, and applied machine intelligence.
An applied research summary introducing advanced confusion-matrix metrics that outperform accuracy in predicting CVE exploitability impact. CVE impact prediction is often evaluated using accuracy, despite operating in a domain characterized by extreme class imbalance, asymmetric risk, and incomplete ground truth. This paper argues that accuracy is a poor proxy for security effectiveness and can actively obscure dangerous failure modes, particularly false negatives involving rare but high-impact vulnerabilities. Grounded in statistical fundamentals, we reframe CVE evaluation through confusion-matrix–derived metrics- such as false-negative rate, likelihood ratios, and correlation-based measures, that apply to any predictive black box, not just machine learning models. Using real-world CVE workflows and illustrative failure cases, we show how these metrics provide earlier and more reliable signals of degraded trust in vulnerability assessments. The result is a practical, risk-aware evaluation framework that aligns statistical measurement with operational security outcomes, enabling teams to detect hidden blind spots before they translate into exploitable incidents.
TLPCLEAR-Accuracy-Is-Not-Enough-Detecting-Hidden-Risk-in-CVE-Impact-Prediction.pdf
MD5: a797fc33e6d12cfa944ab943598d21a6
Format: application/pdf
Last Update: April 15th, 2026
Size: 21.32 Mb
Ken Dunham
Ken Dunham has over three decades of combined business, technical, and global leadership experience in cybersecurity, incident response, and cyber threat intelligence. His career path is non-traditional, starting with education, consulting, and programming.
Mr. Dunham has extensive experience with all sectors and business sizes and former TS-SCI US DOD experience (redacted). He has led many of the largest global investigations in the history of computing and countered emergent threats to counter actors, campaigns, and payloads of all types as the threat of the unknown are discovered and countered.
CTI threat hunting is a critical function for effective actionable outcomes in reducing cyber risk to an organization. Changes in the CTI community in the last few years, coupled with tooling and culture and influence of CRINK nations and bias, have diluted our collective integrity and understanding of analytical tradecraft for effective and efficient threat hunting outcomes in the CTI lifecycle. What are the essential tenants of success to ensure efficient and effective CTI threat hunting outcomes to reduce risk within an organization to the left of boom?
CTI Threat Hunting with Effectiveness
January 7, 2026 09:00-11:00
Sophia Sanles-Luksetich
Zachary GoldmanSophia Sanles-Luksetich (GitHub, US), Zachary Goldman (GitHub, US)
Sophia Sanles-Luksetich: Senior Security Analyst with 6+ years of experience, focused on building data visualizations and producing analytics for vulnerability management, with prior experience in bug bounty triage. Her work has been critical in navigating and leveraging vulnerability management’s massive and continuously growing database of security findings.
Zach Goldman: Security Engineer with 5+ years of experience, currently specializing in developing the Exceptions feature to better track and manage deviations from standard remediation processes. His work directly supports leadership at both the organizational and team levels, requiring a high degree of polish and cross‑departmental collaboration.
Modern vulnerability management is drowning in noise: massive alert volumes, inconsistent vendor scores, and fragmented data sources make it difficult to understand what truly matters. This session shows how GitHub flipped its inverted risk funnel by building a unified, extensible risk‑scoring model that normalizes findings across 20+ heterogeneous sources and hundreds of thousands of daily alerts. We’ll demonstrate how combining CVSS with threat‑driven metrics like EPSS and KEV, asset‑specific context, and the newly updated FedRAMP SLA requirements turns raw findings into actionable prioritization. We’ll also cover the engineering systems that make this scale possible, including routing strategies and enrichment pipelines. You’ll learn how to evolve industry standards rather than replace them, tune formulas and weights using calibration sets, and future‑proof your scoring model as new metadata and detection strategies emerge. If your critical alerts outnumber all other severities, this talk will show you how to restore clarity, reduce alert fatigue, and drive remediation where it has the greatest impact.
MD5: 20f0354b16cbbb8c88374dacb13dc57d
Format: application/pdf
Last Update: April 13th, 2026
Size: 193.72 Kb
Arūnas VenclovasArūnas Venclovas (NRD Cyber Security, LT)
Security analysts and threat hunters often want to sharpen their ability to detect and respond to malicious network activity, especially without relying on expensive commercial platforms. In this presentation we will review a curated set of free, open-source tools, which provide deeper visibility into organizational network traffic and uncover threats before they escalate.
The presentation begins with a quick dive into core network traffic collection methods, such as packet capture, logging, and NetFlow analysis. We will also explore the daily workflows and investigative mindset of an effective threat hunter. Lastly, we will go through how to identify suspicious patterns, enrich findings with intelligence feeds from the Malware Information Sharing Platform (MISP), and connect the dots between seemingly unrelated events.
Through brief case studies and live-style investigative walkthroughs, you will see how theory translates into practice. The session will conclude with a guided, hands-on demonstration of open-source tools in action—equipping participants with ready-to-use techniques to strengthen their monitoring and detection capabilities immediately.
Arūnas Venclovas, Director of Product Development at NRD Cyber Security Arūnas is an experienced leader in product development with a deep understanding of cybersecurity, IT, and telecommunication markets. Currently serving as the Director of Product Development at NRD Cyber Security, Arūnas is responsible for deploying cyber security solutions in National and sectorial CERTs with the aim to automate operations, build capacity and empower for successful work. Arunas has played a major role in automating and modernizing CSIRTMalta (Malta Critical Infrastructure Protection) operations by improving Incident Detection, Response and Threat Intelligence actualization. Also, he is working closely with multiple CIRT's (Eg-FinCIRT, etc.) in assisting them to improve network detection capabilities by automating threat hunting, rulesets adjustment and solving other related challenges.
MD5: e885de5279279ab3407a2a3654b28fa2
Format: application/pdf
Last Update: March 4th, 2026
Size: 1.82 Mb
Sebastian WagnerSebastian Wagner (Institute for Common Good Technology, AT)
IntelMQ is a Free and Open Source tool chain to automate Threat Intelligence data handling.
IntelMQ automates the boring processes of incident handling to concentrate on the tasks that really need your attention. Learn how to ingest data from various sources such as Shadowserver, how to arrange your bespoke workflows, connect with other systems (such as MISP, databases, RDAP, Ticketing systems etc) and how to notify your constituency.
Contents of the workshop include:
The content may vary based on participants' input and questions. Participants are encouraged to send in their questions and examples to intelmq@commongoodtechnology.org beforehand, so we can cover them in more detail in the workshop
About IntelMQ: The open source tool was created in 2014 by CERT.pt and CERT.at (Aaron Kaplan, Tomas Lima) and is used globally for incident handling automation globally by at least 600 IT security teams. It is entirely free of charge. IntelMQ.org is the community supporting the project's the long-term evolution.
What will participants gain from the workshop? An in-depth know-how as well as the skills to deploy and adapt the IntelMQ tool to their specific automation needs.
Sebastian Wagner is an IT-Security expert and trainer, Free Software enthusiast, full-stack software developer, and project manager. He currently working for a small software firm, and is active in NGOs for the common good in cooperation with FIRST and Shadowserver. He co-maintains IntelMQ for 11 years and previously worked at CERT.at for six years.
FIRST Regional Symposium for Central Asia
Tashkent, UZ
February 26, 2026 13:30-15:00, February 26, 2026 15:30-17:30
Hosted by UZCERT
MD5: 5eef0cb292a5464db0023f2a33c4ebac
Format: application/pdf
Last Update: March 23rd, 2026
Size: 553.67 Kb
Harold BoothHarold Booth (National Institute of Standards and Technology (NIST), US)
Harold Booth is a Computer Scientist and Group Manager at NIST and served as the program manager for the NVD from 2010 until 2016. His current work includes research into the security and measurement of AI systems, software understanding and software development. He is an emeritus member of the CVE Board.
The NVD is a major provider of vulnerability reference data that is used throughout the vulnerability management ecosystem. In recent years, keeping up with the flow of CVEs and providing enrichment data for each CVE has been a major challenge for the NVD. Adapting to the changing landscape of the vulnerability management ecosystem is a major challenge, not just for the NVD, but for all participants. This talk aims to provide some discussion on what some of those challenges are and potential paths for adaptation.
TLPCLEAR-NIST-s-National-Vulnerability-Database-Update-and-the-Vulnerability-Enrichment-Ecosystem
MD5: d41d8cd98f00b204e9800998ecf8427e
Format: directory
Last Update: April 15th, 2026
Size: 6 Kb
Sebastian WagnerSebastian Wagner (Institute for Common Good Technology, AT)
In today's cyber threat landscape, effective coordination among incident response teams is crucial. This session will provide participants with a high-level overview of open-source tools that facilitate coordination, data sharing, and threat intelligence. The session will cover key tools like MISP and TheHive, and also highlight lesser-known gems that help you maintain an overview of your constituency.
We will focus on coordination tools and also scrape the topic of analysis and forensics.
The session gives you an overview of the role of open-source tools in enhancing coordination and cooperation among teams, including these tooling areas: Threat Intelligence Sharing and OSINT gathering, Attack Surface Reduction, Incident Response, Forensics and Analysis Tools, Analysis tools, Network Monitoring
Sebastian Wagner is an IT-Security expert and trainer, Free Software enthusiast, full-stack software developer, and project manager. He currently working for a small software firm, and is active in NGOs for the common good in cooperation with FIRST and Shadowserver. He co-maintains IntelMQ for 11 years and previously worked at CERT.at for six years.
MD5: c3feb9017d5a2ec12d30b020e9a50aad
Format: application/pdf
Last Update: March 23rd, 2026
Size: 2.05 Mb
MD5: 744764a451f357906d15def44cefedcb
Format: application/pdf
Last Update: March 23rd, 2026
Size: 4.74 Mb
Vladimir Kropotov
Fyodor YarochkinVladimir Kropotov (Trend Micro, DE), Fyodor Yarochkin (Trend Micro, TW)
AI is bringing a lot of good by optimising processes, finding unexpected correlations, predicting critical events, creating content, and significantly optimising our jobs and daily routine tasks. At the same time over reliance on AI can bring risks to a variety of critical verticals and humans. This talk will be focused on increasing awareness about the risks of over reliance on AI decisions and highlight both general risks and the risks for particular critical verticals. It will include insights on how AI is changing the attack surface and being leveraged in different opportunistic, hacktivism and targeted attack scenarios.
Vladimir Kropotov is an Advisor and principal researcher with the Trend Micro Forward-Looking Threat Research team. Active for over 20 years in information security projects and research, he previously built and led incident response teams at Fortune 500 companies. He holds a master's degree in applied mathematics and information security. He also participates in various projects for leading financial, industrial, and telecom companies. His main interests lie in network traffic analysis, incident response, and botnet and cybercrime investigations. Vladimir was a speaker at a variety of cyber security events, including BHEU, BHAsia, HITB, hack.lu, FIRST and others.
Fyodor Yarochkin is a Senior Researcher, Forward-Looking Threat Research Senior at Trend Micro with a Ph.D. from EE, National Taiwan University. An early Snort Developer and Open Source Evangelist as well as a Programmer, his professional experience includes several years as a threat investigator and over eight years as an Information Security Analyst.
The risks of AI (over)reliance to the security and privacy
February 18, 2026 09:00-10:00