BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//bsidesluxembourg-2026//speaker//J3PRCC
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-bsidesluxembourg-2026-CVMLKB@pretalx.com
DTSTART;TZID=CET:20260506T090000
DTEND;TZID=CET:20260506T110000
DESCRIPTION:Incident response isn't just about knowing your tools - it's ab
 out coordinating under pressure\, communicating when things go sideways\, 
 and making calls with incomplete information. Traditional training focuses
  on isolated techniques\, missing the collaborative reality of actual inci
 dents. And most tabletop exercises? Painfully dull. Participants zone out\
 , give checkbox answers\, and leave having learned little.\n\nThis worksho
 p introduces Malware & Monsters (https://malwareandmonsters.com)\, a frame
 work that turns IR training into something people actually enjoy. Think ta
 bletop role-playing meets creature-collection mechanics\, where teams "hun
 t and contain" digital threats through story-driven gameplay.\nGame-based 
 learning works - research shows it beats traditional instruction for skill
  building and retention. M&M makes participants actively discover concepts
  instead of sitting through lectures. Scenarios include organizational pre
 ssures\, evolving threats\, and stakeholder drama\, turning abstract secur
 ity concepts into tangible problems.\n\nYou'll experience the full methodo
 logy: learn the mechanics\, build custom scenarios based on real malware f
 amilies (mapped to MITRE ATT&CK)\, and run live simulations. Participants 
 take specialized roles - Hunter\, Analyst\, Forensicator\, Communicator\, 
 Coordinator\, or Researcher - experiencing how security functions actually
  collaborate during incidents.\n\nThe framework includes legacy malmons fr
 om malware history—because history always repeats itself\, and understan
 ding past threats reveals patterns in current attacks. The "type effective
 ness" system teaches strategic thinking about matching defenses to threats
 . Evolution mechanics show how attacks escalate when containment fails.\n\
 nParticipants walk away with ready-to-use materials and facilitation techn
 iques for training that actually works.\n\nBest of all? M&M is free to pla
 y in most cases.
DTSTAMP:20260502T094000Z
LOCATION:IFEN room 3 Workshops and AI Security Village (Building D)
SUMMARY:Gotta Contain 'Em All: Collaborative Incident Response Training Thr
 ough Gaming - Klaus Agnoletti\, Glen Sorensen
URL:https://pretalx.com/bsidesluxembourg-2026/talk/CVMLKB/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidesluxembourg-2026-EFGX97@pretalx.com
DTSTART;TZID=CET:20260506T140000
DTEND;TZID=CET:20260506T180000
DESCRIPTION:You've identified the vulnerability\, tested the exploit\, and 
 written the report. But they just don’t see the urgency. Now what? This 
 4-hour\, hands-on workshop bridges the gap between technical mastery and b
 oardroom influence. We'll move beyond simply reporting risks to crafting c
 ompelling narratives\, quantifying value\, and building the relationships 
 necessary to drive meaningful security improvements.\n\nThis isn't your ty
 pical "compliance" training. We'll delve into the psychology of decision-m
 aking\, explore adversarial communication tactics (used against you)\, and
  arm you with practical strategies to become a trusted advisor who can eff
 ectively advocate for security and get things done.
DTSTAMP:20260502T094000Z
LOCATION:Main Stage
SUMMARY:From Zero Trust to Trusted Advisor - Selling Security to Stakeholde
 rs - Daniela Parker\, Glen Sorensen
URL:https://pretalx.com/bsidesluxembourg-2026/talk/EFGX97/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidesluxembourg-2026-J9BBAM@pretalx.com
DTSTART;TZID=CET:20260507T154000
DTEND;TZID=CET:20260507T162000
DESCRIPTION:Tired of security training that puts your team to sleep? What i
 f I told you the most powerful training tool in cybersecurity has been sit
 ting in your game room all along? Welcome to the world of game-based learn
 ing\, where the proven power of play transforms how professionals master c
 omplex skills.\n\nResearch shows that humans learn best when working toget
 her\, yet traditional training methods keep pushing isolated\, theoretical
  learning. Game-based learning flips this approach on its head\, creating 
 environments where people forget about office politics and actually engage
  with the material. Through structured play and collaborative storytelling
 \, participants don't just memorize concepts—they live them\, breaking d
 own professional barriers and building genuine understanding through exper
 ience.\n\nI'll show you the compelling evidence behind why using roleplayi
 ng games work\, and demonstrate how to transform resistant learners into e
 ngaged participants. Using compelling examples\, you'll discover how table
 top role-playing mechanics can turn your most challenging training scenari
 os—from incident response to zero trust architecture—into adventures y
 our team actually looks forward to.\n\nJoin me to learn why adding rolepla
 ying games to your professional development isn't just about making traini
 ng fun—it's about making it work.
DTSTAMP:20260502T094000Z
LOCATION:Main Stage
SUMMARY:Dungeons & Dragons: The security power tool you didn’t know you n
 eeded - Klaus Agnoletti\, Glen Sorensen
URL:https://pretalx.com/bsidesluxembourg-2026/talk/J9BBAM/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidesluxembourg-2026-PWM8ER@pretalx.com
DTSTART;TZID=CET:20260508T090000
DTEND;TZID=CET:20260508T094000
DESCRIPTION:Every day\, millions of data points about YOU\, whether public\
 , leaked\, scraped\, or sold\, quietly feed into a largely legal ecosystem
  of personal information. For modern threat actors\, Artificial Intelligen
 ce (AI) is no longer just a buzzword\; it is a tool used to weaponize this
  data at scale against both individuals and their organisations. What once
  required a non-trivial skillset in OSINT and social engineering can now b
 e executed by anyone with a prompt and a scraped data set (or worse\, an a
 utonomous team of AI agents).\n\nThis talk explores the intersection of pr
 ivacy and offensive security\, demonstrating how exposed personal informat
 ion is harvested and amplified by AI to create highly convincing phishing\
 , deepfake scams\, and automated fraud. We will break down how your digita
 l footprint becomes an attack surface and build a defensive strategy to co
 unter it.\n\nWe will focus on helping individuals and security leaders ide
 ntify the human exposure\, human attack surface\, and cyber risk. We will 
 tie this into Cyber Threat Intelligence (CTI)\, with actionable techniques
  for the individual and the SOC alike. We’ll discuss practical tips to d
 eal with exposure\, limit data leakage\, spot AI-driven targeting and expl
 ore actionable privacy practices\, such as email masking\, and ways to ope
 rationalize techniques and services to exercise your GDPR right to be forg
 otten. Attendees will leave with a clear understanding of the emerging thr
 eat landscape and the defensive techniques to remove or reduce the "fuel" 
 attackers use in order for individuals and organizations to protect themse
 lves.
DTSTAMP:20260502T094000Z
LOCATION:IFEN room 2\, Workshops and AI Security Village  (Building D)
SUMMARY:The High-Performance Fuel for Social Engineering (Now in AI Flavors
 !) - Glen Sorensen
URL:https://pretalx.com/bsidesluxembourg-2026/talk/PWM8ER/
END:VEVENT
END:VCALENDAR
