77th TF-CSIRT Meeting, May 2026: Riga: Agenda


The 77th TF-CSIRT Meeting will be held from 11 - 13 May 2026. We gratefully thank our local hosts CERT.LV for allowing us to come to Riga (LV).

This page outlines the agenda for the upcoming session. It provides a clear overview of the planned topics, timing, and structure to help participants prepare and follow the flow of the event efficiently.

How to register for a training?

If you have already registered for the meeting, you should update your registration for the training sessions yourself.

Go to: https://indico.tf-csirt.org/event/11/

Please note that if you have already registered, you will need to amend your booking. By going to the above URL, you should see a message confirming your registration for this event. You can then click on 'See details'. You will then see a 'feather' icon with the option to 'Modify'. Click on that, scroll down to 'Selection of Meeting Sessions' and make your choices!

As always, time and space are limited, so seats will be assigned on a first-come, first-served basis based on your updated registrations. Accredited and certified team members are given priority.


Details for the MorningTrainings/Workshops (9:00-12:30) and full day training

Bad out of Hell - FAT32

Trainer:

  • Michael Hamm, CIRCL

How to hide and find data in file systems defect sectors.
Many file systems provide the possibility to mark cluster with defect sectors as defect. So that they are not used to store valid data any further.

Attackers can abuse this feature to hide data persistently on the disk, as this sectors/clusters are circumvent and not used any more.

We will explore how file systems do some of their most important activity. We will explore how this is implemented by the FAT32 file system. We will use this techniques on hands-on exercises to hide data in bad clusters And we will learn how to forensically detect such kind of data.

This is a hands-on training and attendees should bring a Linux laptop to be able to perform the exercise. All standard Linux distributions should be sufficient. Just the package "The Sleuth Kit" should be installed.

Mind Your Step: Operational Security (OPSEC) Essentials

Trainers:

  • Bernhards Blumbergs, CERT.LV
  • Gabrielle Verreault, TalTech

Maximum: 40 participants

This interactive workshop provides a practical, first-steps introduction to Operational Security (OPSEC) as a mindset and decision-making framework for everyday professional activities in a everyday cyber/physical environment. Using an immersive, scenario-driven narrative following a a conference participant’s journey from their departure and transit, through hotel stay and conference participation to return, the workshop teaches how to be aware of how nation-state and cybercrime adversaries observe, correlate, and exploit information across digital and physical domains, the effects they seek to achieve, and the OPSEC measures that can prevent, mitigate, or contain impact. Delivered in an informal, discussion-driven format and requiring no prior OPSEC or technical background, the session emphasizes situational awareness over tool dependency and equips participants with immediately applicable practices relevant to their international travel, participation in events, and daily work. Workshop enforces proactive, human-centric security decisions to strengthen individual security, thus enhancing collective resilience against evolving cyber and operational threats.

Security Operations Hangout: beer, snacks & SOC stories

Trainers:
Kristīne Kaula, CERT.LV
Uldis Košķins, CERT.LV
Katrīna Strupule, CERT.LV


Crack open a drink, and join a room full of battle-tested SOC operators, CSIRT engineers, and detection nerds who’ve seen “the stuff”. This isn’t a typical workshop, but a candid and very real exchange of short war stories, uncomfortable questions, and open-floor discussions of what works (and what absolutely doesn’t) when building and running a Security Operations Center at scale. Expect practical insights and geeky humor as we collectively unpack the messy reality of SOC operations:
- Regulation vs reality: How do you reach the long tail of “invisible”
constituents?
- What even is Your SOC?: From endpoint detection and response and log management to CTI, threat hunting, and vulnerability management. Where do you draw the boundary?
- Incident Response: notify or act?: How far do you go without breaking trust (or contracts)?
- SLA gymnastics: Delivering meaningful services across wildly different expectations, while pretending 24×7 coverage is easy.
- Build vs Buy vs Pray
- Staffing and resource constraints: Can your SOC actually support
everything it promises, from client onboarding to backend analytics?
- Data hoarding Olympics: Retention, backups and the “impossible” data volumes.
- AI in the SOC (hype vs reality) - where AI helps, where it hallucinates, and how you measure success without fooling yourself.
- Metrics that truly matter: Beyond buzzwords like MTTD/MTTR (Mean Time to Detect and Respod), how do you prove value to a CISO who speaks only fluent ROI (Return on Investments)?

Your mission (should you choose to accept it): Come prepared to share
things that worked surprisingly well and things that failed spectacularly. Bonus points for scars, dashboards, or lessons learned
the hard way.

No slides required. No marketing allowed. Just practitioners talking and swapping tactics, and maybe discovering that everyone else is
“duct-taping’ their SOC together too.

Full day PR Working Group Meeting (9:00-17:00)

Preliminary Agenda for PR Working Group Meeting:
08:00 - 09:00/30 - Registration
09:00/30 - 10:30 - Introduction and Round Table
10:30 - 11:00 Coffee break
11:00 - 11:30 - An experience story from a national-level cybersecurity
awareness campaign in Latvia (Līga Besere, CERT.LV)
11:30 - 12:00 - Introduction to the kibertests.lv (Cybertest) platform
(Madara Krutova, CERT.LV) 12:15 - 12:30 – Our Findings and Lessons
Learned from Leading a Business Continuity Challenge for Constituents
(Dana Ludviga, CERT.LV)
12:30 - 13:30 - Lunch
13:30 - 14:00 - Insights and real-life experience on communication
during a national level crisis (Vineta Sprugaine, LVRTC)
14:00 - 14:30 - Insight on crisis management exercises (Daina Ozoliņa,
CERT.LV)
14:30 - 15:00 - .LV registry crises (real and exercises) experience
(Kristiāna Mūze-Feldberga, NIC.LV)
15:00 - 15:30 Coffee break
15:30 - 16:30 - Crises exercise for PRs (Dana Ludviga, Kristiāna
Mūze-Feldberga, CERT.LV)
16:30 - 17:00 - Other topics


Details for the Afternoon Trainings/Workshops (13:30-17:00)

Cyber Crisis Exercise

Trainers:

  • Maria Edblom Tauson, SUNET-CERT
  • Monika Allöv Andersson, SUNET-CERT

Maximum: 20 participants

This half day workshop provides a focused, scenario‑based cyber crisis exercise designed to build competence in crisis coordination, communication, and decision‑making. Participants receive a short introduction to crisis management, engage in a light icebreaker, and then work through an escalating cyber incident simulation.

This training is based on the exercise Maria and Monika did within our NREN Sunet October 2025, so it is new to the TF-CSIRT community.


Programme on Tuesday 12th April

On Tuesday there is planned open meeting.

Time Presentation Presenter TLP
9:00 – 9:10 Welcome Věra Mikušová, TF-CSIRT Steering Committee Chair
9:10 – 9:30 CERT.LV team update Baiba Kaškina, CERT.LV
9:30 – 10:00 KPIs for CSIRT/CERT: 9 Lessons to Avoid Shooting Yourself in the Foot Etienne Ladent, Kering-CERT
10:00 – 10:30 Foreign Adversary Operations against Latvia: An Insight into Commercial Threat Enablement Kārlis Svilāns, CERT.LV TLP: AMBER
10:30 – 11:00 Coffee Break
11:00 – 11:45 From Reactive alert management to Proactive Internet Intelligence Jonas Gyllenhammar, Martin Solang, Censys
1:45 – 12:00 SOCs' cooperation - some lessons learned Vilius Benetis,
NRD Cyber Security
TLP:AMBER
12:00 – 12:30 Asses and OESes James McLaren, JCSC
12:30 – 13:30 Lunch
13:30 – 14:15 Anatomy of "Digital Arson" - Strategic Lessons from the 2025 Polish Energy Attacks Radoslaw Dumanski, PSE
14:15 -15:00 Cybersecurity Beyond the Blackout: Governmental CERT Operations and Post-Event Resilience in the 2025 Spanish Energy Crisis Felix Barrio, National Cyber Security Institute of Spain
15:00 – 15:30 Coffee Break
15:30 – 15:45 Building cybersecurity awareness through student education and peer engagement Pavol Sokol, CSIRT-UPJS
15:45 – 16:30 Security in multimedia Jaroslav Svoboda, CESNET
16:30 – 16:40 TF-CSIRT event hosting Ivo Dijkhuis, Dana Ludviga, TF-CSIRT SC
16:40 - 17:00 Lightning talks

Programme on Wednesday 13th April

Time Presentation Presenter TLP
9:00 - 13:30 CLOSED SESSION