BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//CREST - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:CREST
X-ORIGINAL-URL:https://www.crest-approved.org
X-WR-CALDESC:Events for CREST
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Europe/London
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20240331T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20241027T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20250330T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20251026T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20260329T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20261025T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250909
DTEND;VALUE=DATE:20250910
DTSTAMP:20260422T151239
CREATED:20250811T101613Z
LAST-MODIFIED:20250909T130235Z
UID:8957-1757376000-1757462399@www.crest-approved.org
SUMMARY:CRESTCon UK Cyber Threat Intelligence Community Event 2025
DESCRIPTION:Join us as we deep-dive into the topic of threat intelligence at one of our CRESTCon UK community events. Whether you are just beginning your career in cyber threat intelligence\, or are experienced in the field\, this event will offer great insights and a chance to meet with peers from across the industry. \nAcross the day we’ll be featuring expert tech talks\, networking opportunities\, and fresh insights into the tools\, techniques\, and trends shaping the field. \nAgenda \n09:00\nArrivals and refreshments \n09:30\nWelcome \n09:45\nDr Konstantia Barmpatsalou\nHow can LLM’s enhance Cyber Threat Intelligence \n10:15\nMaggie van Nortwick\nDown the Threat Funnel – Turning Targeting Data into Actionable Intelligence \n10:45\nBreak \n11:15\nLuke Donovan\nAssessing the Collateral Damage of Ransomware Leak Data \n12:00\nGloria Jorge Lema\nUnited by Hate\, Driven by Gain: The Rise of Hybrid Hacktivist Campaigns \n12:45\nVerona Johnstone-Hulse & Katharina Sommt\nComputer Misuse Act 1990: Providing stronger legal protections for UK CTI researchers \n13:30\nLunch and networking \n14:15\nVerona Johnstone-Hulse\nComputer Misuse Act 1990: Providing stronger legal protections for UK CTI researchers \n15:00\nHarry Glover\nNorth Korean Subversion and Deception in the Job Market \n15:30\nCaroline Kamper\nThe Arctic Battleground: Lessons from Greenland on Securing the High North \n16:00\nCyber Exchange – Panel session \n16:45\nClosing comments \n17:00 – 20:00\nPost conference drinks reception – Revolucion de Cuba\nOur post conference drinks and networking reception is kindly sponsored by NCC Group.
URL:https://www.crest-approved.org/event/crestcon-uk-cyber-threat-intelligence-community-event-2025/
LOCATION:Everyman Manchester St. John’s\, 21-23 Quay Street\, Manchester\, M3 4AS\, United Kingdom
CATEGORIES:UK events
ATTACH;FMTTYPE=image/jpeg:https://www.crest-approved.org/wp-content/uploads/2025/08/CCon-UK-TI-event-header.jpg
END:VEVENT
END:VCALENDAR