BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//bsidesluxembourg-2026//speaker//7UZAT9
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-bsidesluxembourg-2026-A7AXTC@pretalx.com
DTSTART;TZID=CET:20260507T103500
DTEND;TZID=CET:20260507T111500
DESCRIPTION:Nowadays\, the detection of generic mass-scale phishing attacks
  is quite\neffective.  Techniques that leverage indicators of compromise (
 IOCs) collection\nand sharing tools\, such as MISP (the Open Source Threat
  Intelligence Sharing\nPlatform)\, are well established and give good resu
 lts in the field. However\,\ndetection of targeted attack attempts aka spe
 ar-phishing\, is much more\nchallenging because the attackers exploit cont
 extual information about the\ntargets they aim for.\nBy using up-to-date\,
  relevant and precise information about the inner\noperations of the targe
 ted company\, attackers can make their deception far more\neffective.\nSPO
 T makes use of state-of-the-art natural language\nprocessing (NLP) techniq
 ues based on machine learning (ML) and large language\nmodels (LLMs) in pa
 rticular to try to detect and prevent spear-phishing\nattack attempts.\nTh
 is opensource project was co-financed by the LU-CID initiative by the Mini
 stry\nof Economy Luxembourg.
DTSTAMP:20260412T011750Z
LOCATION:Workshops and Stage - Design Space (C1.05.12)
SUMMARY:SPOT - Spear-Phishing Overwatching Tool - Pauline Bourmeau (Cookie)
 \, William Robinet\, Thibaut Diels\, Mathieu Fourcroy
URL:https://pretalx.com/bsidesluxembourg-2026/talk/A7AXTC/
END:VEVENT
END:VCALENDAR
