Program

08:30 - 09:20 Registration and coffee

09:20 - 09:30 Welcome by Monica Kello

09:30 - 10:20 Keynote and Q&A by Ben Nimmo

10:20 - 10:40 Break

10:40 - 11:00 Threat Runner: Proactive Intelligence and Being the Threat by Jay Christiansen

11:00 - 11:20 Shifting Shadows: The Evolution of Initial Access Brokers by Selena Larson

11:20 - 11:40 No photo or video, TLP:AMBER - Presentation by an analyst of the General Intelligence and Security Service of the Netherlands (AIVD)

11:40 - 12:00 Public-Private Partnership: A Failed Project by Juan Andrés Guerrero-Saade

12:00 - 12:20 Q&A sessions with Jay Christiansen, Selena Larson, AIVD and Juan Andrés Guerrero-Saade

12:20 - 13:20 Lunch break

13:20 - 13:40 Chinese Pre-Placement Activity – Preparation for War, or Deterrence? by Tim Haines

13:40 - 14:00 Fast and Reproducible Data Analysis Beyond State Actors' Leaked Data – Utilizing Classic Techniques and the Latest AI LLMs by Jair Santanna

14:00 - 14:20 Dragon's Bite: The Tactics of Chinese Cyber Espionage in Europe by Jean-Ian Boutin

14:20 - 14:40 Q&A sessions with Tim Haines, Jair Santanna and Jean-Ian Boutin

14:40 - 15:00 Break

15:00 - 15:20 Spies in Disguise: Iranian Cyber-enabled Influence in the Israel-Hamas Conflict by Saher Naumaan

15:20 - 15:40 Seek and Destroy: Tales of an Iranian Iconic Duo by Amitai Ben Shushan Ehrlich

15:40 - 16:00 The Non-Chaotic, Non-Edge Case that is Yellow Eris by Allison Wikoff

16:00 - 16:20 Q&A sessions with Saher Naumaan, Amitai Ben Shushan Ehrlich and Allison Wikoff

16:20 - 16:40 Break

16:40 - 17:00 The Bandwagon Effects and Cyber Deceptions: ALPHV's Assault on Optum and the AT&T Outage by Jung Seob “Scott” Kim

17:00 - 17:20 Election Ops: Dissecting a Multi-Vector Influence Campaign Targeting the European Elections by Yusuf Polat

17:20 - 17:40 Decoding a Cyber Matryoshka by Bernhard Schneider

17:40 - 17:50 Closing by Monica Kello

17:50 - 18:10 Q&A sessions with Jung Seob "Scott" Kim, Yusuf Polat and Bernhard Schneider

18:10 - 19:30 Closing drinks