08:30 - 09:20 Registration and coffee
09:20 - 09:30 Welcome by Monica Kello
09:30 - 10:20 Keynote and Q&A by Ben Nimmo
10:20 - 10:40 Break
10:40 - 11:00 Threat Runner: Proactive Intelligence and Being the Threat by Jay Christiansen
11:00 - 11:20 Shifting Shadows: The Evolution of Initial Access Brokers by Selena Larson
11:20 - 11:40 No photo or video, TLP:AMBER - Presentation by an analyst of the General Intelligence and Security Service of the Netherlands (AIVD)
11:40 - 12:00 Public-Private Partnership: A Failed Project by Juan Andrés Guerrero-Saade
12:00 - 12:20 Q&A sessions with Jay Christiansen, Selena Larson, AIVD and Juan Andrés Guerrero-Saade
12:20 - 13:20 Lunch break
13:20 - 13:40 Chinese Pre-Placement Activity – Preparation for War, or Deterrence? by Tim Haines
13:40 - 14:00 Fast and Reproducible Data Analysis Beyond State Actors' Leaked Data – Utilizing Classic Techniques and the Latest AI LLMs by Jair Santanna
14:00 - 14:20 Dragon's Bite: The Tactics of Chinese Cyber Espionage in Europe by Jean-Ian Boutin
14:20 - 14:40 Q&A sessions with Tim Haines, Jair Santanna and Jean-Ian Boutin
14:40 - 15:00 Break
15:00 - 15:20 Spies in Disguise: Iranian Cyber-enabled Influence in the Israel-Hamas Conflict by Saher Naumaan
15:20 - 15:40 Seek and Destroy: Tales of an Iranian Iconic Duo by Amitai Ben Shushan Ehrlich
15:40 - 16:00 The Non-Chaotic, Non-Edge Case that is Yellow Eris by Allison Wikoff
16:00 - 16:20 Q&A sessions with Saher Naumaan, Amitai Ben Shushan Ehrlich and Allison Wikoff
16:20 - 16:40 Break
16:40 - 17:00 The Bandwagon Effects and Cyber Deceptions: ALPHV's Assault on Optum and the AT&T Outage by Jung Seob “Scott” Kim
17:00 - 17:20 Election Ops: Dissecting a Multi-Vector Influence Campaign Targeting the European Elections by Yusuf Polat
17:20 - 17:40 Decoding a Cyber Matryoshka by Bernhard Schneider
17:40 - 17:50 Closing by Monica Kello
17:50 - 18:10 Q&A sessions with Jung Seob "Scott" Kim, Yusuf Polat and Bernhard Schneider
18:10 - 19:30 Closing drinks