BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//bsidesluxembourg-2026//talk//L9773J
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-bsidesluxembourg-2026-L9773J@pretalx.com
DTSTART;TZID=CET:20260507T133000
DTEND;TZID=CET:20260507T141000
DESCRIPTION:Threat intelligence is often reduced to reactive IOC lists or s
 uperficial color-coded reports. This talk dismantles that paradigm. We wil
 l explore the application of Cyber Threat (Counter) Intelligence - CT(C)I 
 - in a geopolitical context\, demonstrating how to engineer detections tha
 t actively hunt sophisticated adversaries operating both outside and insid
 e your perimeter. Moving beyond standard threats\, we dissect the rising t
 rend of APT-backed "remote workers" infiltrating organizations using deepf
 akes and fabricated histories. We will show you how to weaponize cyber cou
 nterintelligence and deploy deceptive defenses to expose the threat\, tran
 sforming your internal environment into your primary intelligence sensor -
  detection. Finally\, we will outline a modern\, graph-based "Detection-as
 -Code" methodology that replaces static documentation with visual\, automa
 ted defense logic.
DTSTAMP:20260412T024934Z
LOCATION:IFEN room 1\, Workshops and Detection Engineering village (Buildin
 g D)
SUMMARY:CT(C)I-Driven detection against internal and external threats - Ond
 rej Nekovar
URL:https://pretalx.com/bsidesluxembourg-2026/talk/L9773J/
END:VEVENT
END:VCALENDAR
