GVIP Summit Speaker: Philippe Ombredanne

Organising a conference can be stressful. Fixing the hotel, making decisions about food, microphones, rollups, badges and… so much details. And then we have the speakers. Trying to get the information needed for the agenda, the web site and social media. When I got the feedback from Philippe I could Read more

By Olle Johansson, ago
Alexandre Delaunay, CIRCL

GVIP Summit Speaker: Alexandre Dulaunoy

Alexandre is a Security Researcher and Head of CIRCL in Luxembourg. In the GVIP summit, he will talk about the GCVE project and the open-source Vulnerability Lookup project. The Global CVE (GCVE) allocation system is a new, decentralized approach to vulnerability identification and numbering, designed to improve flexibility, scalability, and autonomy for Read more

By Olle Johansson, ago
Yogesh Mittal, Red Hat

GVIP Summit Speaker: Yogesh Mittal, Red Hat

Yogesh is a PSIRT Manager at Red Hat, where he specializes in the organizational design of global vulnerability ecosystems. His talk is titled: “Designing the Hierarchy of Trust: Governance Lessons from a CVE Root and CNA-LR” As the EU CRA establishes a continent-wide vulnerability infrastructure, the primary challenge is organizational: Read more

By Olle Johansson, ago
Andrey Lukashenkov, Vulners

GVIP Summit speaker: Andrey Lukashenkov

We are proud to present one of the speakers at the first GVIP Summit: Andrey Lukashenkov from Vulners. Andrey has worked a long time with vulnerabilities and have a lot of insights to share. Talk title: Beyond CVE: Reconciling Overlap, Gaps, and Granularity Across Vulnerability Sources Vulnerability “databases” increasingly behave Read more

OWASP Calls to Build a Unified Framework for Global Vulnerability Intelligence

“In response to increasing concerns over the effectiveness of the CVE Program and the sustainability of the U.S. government’s role in managing the world’s largest vulnerability database, cybersecurity leaders and international stakeholders are coming together to explore a federated model for vulnerability identification. The initiative seeks to address modern security Read more