CARVIEW |
- About FIRST
- Mission Statement
- Strategy Framework
- History
- Sustainable Development Goals
- Organization
- FIRST Policies
- Anti-Corruption Policy
- Antitrust Policy
- Bylaws
- Board duties
- Bug Bounty Program
- Code of Conduct
- Conflict of Interest Policy
- Document Record Retention and Destruction Policy
- FIRST Press Policy
- General Event Registration Refund Policy
- Guidelines for Site Selection for all FIRST events
- Identity & Logo Usage
- Mailing List Policy
- Media Policy
- Privacy Policy
- Registration Terms & Conditions
- Services Terms of Use
- Standards Policy
- Statement on Diversity & Inclusion
- Translation Policy
- Travel Policy
- Uniform IPR Policy
- Whistleblower Protection Policy
- Partnerships
- Newsroom
- Procurement
- Jobs
- Contact
- Membership
- Initiatives
- Special Interest Groups (SIGs)
- SIGs Framework
- Academic Security SIG
- AI Security SIG
- Automation SIG
- Cybersecurity Communications SIG
- Common Vulnerability Scoring System (CVSS-SIG)
- CSIRT Framework Development SIG
- Cyber Insurance SIG
- Cyber Threat Intelligence SIG
- Curriculum
- Introduction
- Introduction to CTI as a General topic
- Methods and Methodology
- Priority Intelligence Requirement (PIR)
- Source Evaluation and Information Reliability
- Machine and Human Analysis Techniques (and Intelligence Cycle)
- Threat Modelling
- Training
- Standards
- Glossary
- Communicating Uncertainties in CTI Reporting
- Webinars and Online Training
- Building a CTI program and team
- Curriculum
- Detection Engineering & Threat Hunting SIG
- Digital Safety SIG
- DNS Abuse SIG
- Stakeholder Advice
- Detection
- Cache Poisoning
- Creation of Malicious Subdomains Under Dynamic DNS Providers
- DGA Domains
- DNS As a Vector for DoS
- DNS Beacons - C2 Communication
- DNS Rebinding
- DNS Server Compromise
- DNS Tunneling
- DoS Against the DNS
- Domain Name Compromise
- Dynamic DNS (as obfuscation technique)
- Fast Flux (as obfuscation technique)
- Infiltration and exfiltration via the DNS
- Lame Delegations
- Local Resolver Hijacking
- Malicious registration of (effective) second level domains
- On-path DNS Attack
- Stub Resolver Hijacking
- Detection
- Code of Conduct & Other Policies
- Examples of DNS Abuse
- Stakeholder Advice
- Ethics SIG
- Exploit Prediction Scoring System (EPSS)
- FIRST Multi-Stakeholder Ransomware SIG
- Human Factors in Security SIG
- Industrial Control Systems SIG (ICS-SIG)
- Information Exchange Policy SIG (IEP-SIG)
- Information Sharing SIG
- Law Enforcement SIG
- Malware Analysis SIG
- Metrics SIG
- NETSEC SIG
- Public Policy SIG
- PSIRT SIG
- Red Team SIG
- Security Lounge SIG
- Security Operations Center SIG
- Threat Intel Coalition SIG
- Traffic Light Protocol (TLP-SIG)
- Transportation and Mobility SIG
- Vulnerability Coordination
- Vulnerability Reporting and Data eXchange SIG (VRDX-SIG)
- Women of FIRST
- CCB Initiatives
- FIRST CORE
- Internet Governance
- IR Database
- Fellowship Program
- Mentorship Program
- IR Hall of Fame
- Victim Notification
- Volunteers at FIRST
- Previous Activities
- Special Interest Groups (SIGs)
- Standards & Publications
- Events
- Education
- Blog
FIRST CORE Sponsorship Opportunities
Incident response is a global task and supporting FIRST CORE provides a unique opportunity for organizations to demonstrate their commitment to sustainable digital resilience and building a stronger incident response community locally, in their region, and globally.
Sponsor organizations will:
- Access unique insights on local and regional developments from our network of partners, liaisons, and fellows
- Support building partners in global communities and markets
- Increase worldwide awareness of your brand by demonstrating your commitment to best practice security in one of the fastest growing fields
- Gain recognition for your support at FIRST events and on the FIRST website
- Access professional development and networking opportunities for your staff through capacity building delivery
Join us as a founding partner in the inaugural year of FIRST CORE and help launch our new effort!
Sponsorship ProspectusImpact Vision
Values | Founding CORE Establishment Partner | Founding CORE Patron | Founding CORE Advocate | Founding CORE Supporter |
---|---|---|---|---|
Pricing | $250,000+/year (minimum 3–year commitment) |
$200,000/yr | $150,000/yr | $90,000/yr |
Community and Capacity Building Benefits |
||||
Ability to support FIRST training program (through submission process) | Yes | Yes | Yes | Yes |
Invitation-only access to exclusive Regional Insights meetings led by FIRST Regional Liaison* | Yes | Yes | Yes | Yes |
FIRST Event Benefits |
||||
Logo featured on CORE supporter acknowledgement page | Yes | Yes | Yes | Yes |
FIRST Annual Conference Complimentary Registrations | x2 | - | - | - |
FIRST Annual Conference Reserved Registrations at the standard member rate of $2,250 | Up to 10 | Up to 8 | Up to 6 | Up to 4 |
Opportunity to host a workshop or present as part of the FIRST CORE track at the FIRST Annual Conference1 | Self-select | Self-select | Self-select | Self-select |
FIRST Regional Symposium Branding and Pass Benefits | Up to 2 | 1 | 1 | 1 |
Access to CORE Collateral Table at Conference Sponsor Showcase Evening2 | Yes | Yes | Yes | - |
Discounted rate for Exhibitor Booth at the Annual Conference | Complimentary Booth + 2 Staff Passes | $4000 | $6000 | $8000 |
Branding Opportunities |
||||
Logo on FIRST CORE Webpage | Landing Page | Sponsor Page | Sponsor Page | Sponsor Page |
Company Description on Sponsors Webpage3 | 200 words | 150 words | 75 words | 50 words |
Logo Listed in FIRST Annual Conference Mobile App | Yes | Yes | Yes | Yes |
Logo featured on FIRST CORE Banner at Annual Conference4 | Yes | Yes | Yes | Yes |
Logo featured on FIRST CORE Banner at Regional Symposiums4 | Yes | Yes | Yes | Yes |
Media Benefits |
||||
Press Release Mention | Yes | Yes | Yes | Yes |
Acknowledgement of support on FIRST Social media | Up to 4/ year | Up to 2 | 1 | 1 |
Featured guest blog/ podcast5 | Yes | Yes | Yes | Yes |
*Certain benefits will come online as the CCB offerings become available.
Have a community and capacity building or sponsorship idea?
Email us at events@first.org and let’s talk!
FIRST CORE track includes half and quarter day workshops and various presentation slots available to CORE sponsors. Slot type is self-selected and allocated on a sponsorship level basis. FIRST reserves the right to finalize time slot assignments. Presentation and workshop material must follow the guidelines of Annual Conference Call for Speakers submissions and may not include sales or marketing content. All materials must be submitted for approval by FIRST. ↩
Space on the CORE Collateral table is allocated on a sponsorship level, first-come, first-served basis. FIRST reserves the right to finalize space allocation. ↩
Content of messaging must be submitted for approval by FIRST. ↩
FIRST reserves the right to select and finalize design of all CORE deliverables. ↩ ↩
Guest blog and podcast content must be non-commercial and content of messaging must be submitted for approval by FIRST. ↩
- Initiatives
- Special Interest Groups (SIGs)
- SIGs Framework
- Academic Security SIG
- AI Security SIG
- Automation SIG
- Cybersecurity Communications SIG
- Common Vulnerability Scoring System (CVSS-SIG)
- CSIRT Framework Development SIG
- Cyber Insurance SIG
- Cyber Threat Intelligence SIG
- Curriculum
- Introduction
- Introduction to CTI as a General topic
- Methods and Methodology
- Priority Intelligence Requirement (PIR)
- Source Evaluation and Information Reliability
- Machine and Human Analysis Techniques (and Intelligence Cycle)
- Threat Modelling
- Training
- Standards
- Glossary
- Communicating Uncertainties in CTI Reporting
- Webinars and Online Training
- Building a CTI program and team
- Curriculum
- Detection Engineering & Threat Hunting SIG
- Digital Safety SIG
- DNS Abuse SIG
- Stakeholder Advice
- Detection
- Cache Poisoning
- Creation of Malicious Subdomains Under Dynamic DNS Providers
- DGA Domains
- DNS As a Vector for DoS
- DNS Beacons - C2 Communication
- DNS Rebinding
- DNS Server Compromise
- DNS Tunneling
- DoS Against the DNS
- Domain Name Compromise
- Dynamic DNS (as obfuscation technique)
- Fast Flux (as obfuscation technique)
- Infiltration and exfiltration via the DNS
- Lame Delegations
- Local Resolver Hijacking
- Malicious registration of (effective) second level domains
- On-path DNS Attack
- Stub Resolver Hijacking
- Detection
- Code of Conduct & Other Policies
- Examples of DNS Abuse
- Stakeholder Advice
- Ethics SIG
- Exploit Prediction Scoring System (EPSS)
- FIRST Multi-Stakeholder Ransomware SIG
- Human Factors in Security SIG
- Industrial Control Systems SIG (ICS-SIG)
- Information Exchange Policy SIG (IEP-SIG)
- Information Sharing SIG
- Law Enforcement SIG
- Malware Analysis SIG
- Metrics SIG
- NETSEC SIG
- Public Policy SIG
- PSIRT SIG
- Red Team SIG
- Security Lounge SIG
- Security Operations Center SIG
- Threat Intel Coalition SIG
- Traffic Light Protocol (TLP-SIG)
- Transportation and Mobility SIG
- Vulnerability Coordination
- Vulnerability Reporting and Data eXchange SIG (VRDX-SIG)
- Women of FIRST
- CCB Initiatives
- FIRST CORE
- Internet Governance
- IR Database
- Fellowship Program
- Mentorship Program
- IR Hall of Fame
- Victim Notification
- Volunteers at FIRST
- Previous Activities
- Special Interest Groups (SIGs)