This presentation forms part of the CTA's Threat Intelligence Practitioners' Summit
Thursday 25 September 15:00 - 15:30, Small Talks room
Righard Zwienenberg (ESET), Robin Staa (NCSC-NL), John Alexander (Mayo Clinic), Geri Revay (Fortinet)
Despite decades of cybersecurity progress, Common Vulnerabilities and Exposures (CVEs) continue to emerge at a relentless pace – creating operational headaches, disclosure dilemmas, and coordination challenges across the industry. This panel brings together seasoned voices from security teams and CSIRTs to unpack the ongoing struggles and systemic issues behind the growing volume of CVEs. We'll explore the historical trajectory of vulnerability management, discuss why the problem persists – and in many cases, worsens – and compare how different organizations triage, process, and respond to newly discovered threats. From responsible disclosure protocols to the tension between public transparency and security, panelists will dive into the practical realities of navigating these challenges. We'll also debate the pros and cons of CVE handling versus modern bounty-hunting approaches, and whether either model is truly sustainable in today’s evolving threat landscape. Join us for a candid, pragmatic, and possibly cathartic discussion about life in the loop of vulnerabilities that just keep going 'round and 'round.
![]() |
Righard Zwienenberg Zwienenberg started dealing with computer viruses in 1988 after encountering the first virus problems at the Technical University of Delft. His interest thus kindled and studied virus behaviour and presented solutions and detection schemes ever since. Initially starting as an independent consultant, in 1991 he co-founded CSE Ltd. In November 1995 Zwienenberg joined the R&D department of ThunderBYTE. In 1998 he joined the Norman Development team to work on the scanner engine. In 2005 Zwienenberg took the role of Chief Research Officer. After AMTSO was formed, Zwienenberg was elected as president, later he served as CTO and CEO. He serves on the board of AVAR and on the conference selection committee of Virus Bulletin. In 2012 Zwienenberg joined ESET as a senior Research Fellow. He was also the Vice Chair of the Executive Committee of IEEE ICSG. In 2018, Zwienenberg joined the Europol European Cyber Crime Center (EC3) Advisory Group as an ESET representative. He also runs his on computer security consultancy company (RIZSC). Zwienenberg has been a member of CARO since late 1991. He is a frequent speaker at conferences – among these Virus Bulletin, EICAR, AVAR, FIRST, APWG, RSA, InfoSec, SANS, CFET, ISOI, SANS Security Summits, IP Expo, Government Symposia, SCADA seminars, etc. – and general security seminars. His interests are not limited to malicious code but have broadened to include general cybersecurity issues and encryption technologies over the past years.
|
![]() |
Robin Staa Robin Staa is a senior cyber threat intelligence analyst at the National Cyber Security Centre of the Netherlands (NCSC-NL). With a strong foundation in international relations, intelligence, and cybersecurity, she supports critical infrastructure sectors and central government bodies in strengthening their cyber resilience. Robin focuses on identifying emerging cyber and international security trends, offering strategic insights to help organizations safeguard their operations and sensitive information. Passionate about the power of collaboration in tackling the dynamic threat landscape, she actively promotes a culture of information sharing and collective defence across the cybersecurity community.
|
![]() |
John Alexander John Alexander is a senior cybersecurity engineer with over 30 years of experience. He has previously worked for Mayo Clinic, Lockheed Martin, and Wells Fargo (formerly Norwest). He is both a Certified Information Systems Security Professional (CISSP) and a HealthCare Information Security and Privacy Practitioner (HCISPP) in good standing with (ISC)2. His work experience includes anti-virus management, incident response, email security & deliverability, security architecture, threat intelligence, cloud & SAAS security, SIEM (Security Information and Event Management), log management, proxy management, and more. He has been attending Virus Bulletin since 1999, has presented several times over the years, and can often be found chairing sessions. He was a founding member of AVIEN (Anti-Virus Information Exchange Network) and of Rochester Pride (in Minnesota). John recently upgraded to European living and now resides in Haarlem, Netherlands with his husband, Joseph, and their German Shepherd, Eljay. His personal interests include science fiction, Eurovision, Virus Bulletin, travel, and food.
|
![]() |
Geri Revay Geri has more than 15 years of experience in cybersecurity. He started on this path as he specialized in network and information security in his M.Sc. in computer engineering. Since then, he has worked as a QA engineer for a security vendor, then changed to penetration testing, first as an external consultant and then as an internal consultant at Siemens. He is a hacker at heart and a consultant by trade. He has worked on both IT and OT systems. In the past years, he has focused on security research in binary analyses and reverse engineering, which led him to Fortinet. At FortiGuard Labs, he currently does malware analysis, reverse engineering, and threat intelligence related research. |
Back to VB2025 conference page