2026-05-16 –, Track 2
Cyber attacks don’t start with alerts — they start long before, hidden in data.
This talk explores how Cyber Threat Intelligence (CTI) transforms raw data into actionable insights, enabling defenders to move from reactive to proactive security.
Through real-world examples, including large-scale event targeting scenarios, we’ll break down how attackers operate, how defenders detect them, and how you can start threat hunting effectively.
This session dives into the practical side of Cyber Threat Intelligence (CTI) and Threat Hunting, focusing on how defenders can anticipate, detect, and respond to modern cyber threats.
We will begin by understanding what threat intelligence really means beyond buzzwords, covering its lifecycle, types, and how it integrates into real security operations.
The session then explores attacker behavior using frameworks like MITRE ATT&CK and the Cyber Kill Chain, helping attendees understand how adversaries think, move, and exploit systems.
A key part of the talk will focus on threat hunting — how to proactively search for threats using indicators of compromise (IOCs), behavioral patterns, and attacker TTPs.
We will also walk through a real-world inspired case study based on large-scale global events (such as international sporting events).
By the end of the session, attendees will:
Understand how to apply CTI in real environments
Learn how to identify high-value detection signals (TTPs vs IOCs)
Gain a beginner-friendly roadmap to start threat hunting
Be able to think like both an attacker and a defender
This talk is designed for students, beginners, and intermediate cybersecurity enthusiasts who want practical, actionable insights not just theory.
I am a cybersecurity researcher, threat analyst, and bug bounty hunter based in Warwick, UK, currently pursuing an MSc in Cybersecurity. I have also worked as a Research Assistant with WMG, contributing to cybersecurity-focused research.
I have reported multiple security vulnerabilities across leading global platforms and have been recognized in the Hall of Fame by organizations including BBC, Microsoft, Apple, HubSpot, and the University of San Diego.
I discovered CVE-2023-37728, an XSS vulnerability in IceWarp Server impacting over 100,000 users globally. I I was recognized by Apple, Microsoft, and Red Bull as an Elite, world-class bug hunter.
I am passionate about securing digital ecosystems and continuously work on identifying and responsibly disclosing security vulnerabilities.