Horaire des conférences

May 16 2024

Day 1
(EDT)
Doors open and Registration - Thursday/Jeudi

🥐 ☕ 🥯 🧃 Breakfast sponsored by KeepSec // Déjeuner grâce à KeepSec

KeepSec

Registration - Thursday/Jeudi

Refreshments sponsored by KoaSec // Rafraichissements grâce à KoaSec

KoaSec

(EDT)
Conference Introduction

Opening speech by our President, the Conference VP and our sponsor CyberEco // Discours d'ouverture par le président, le Vice-président aux conférences et notre partenaire CyberEco

(EDT)
Technical Analysis Past, Present, and Future - Insights from a Reverse Engineering Perspective
  • Sergei Frankoff OpenAnalysis Inc

(EDT)
API: Alternate Pathway to Injection
  • Fennix

With Great gAIn Comes Greater Security Issues - When ML Frameworks' Scale for Growth Incorporates Security Risks to Users' Cloud Accounts
  • Berenice Flores Bishop Fox

(EDT)
Under the Radar: How we found 0-days in the Build Pipeline of OSS Packages
  • François Proulx BoostSecurity.io

  • Benoit Cote-Jodoin BoostSecurity.io

What's New is Old - Parallels of OWASP's Top 10 for LLMs and Web Applications
  • Logan MacLaren GitHub

(EDT)
Discussion: AppSec Q&A
  • Philippe Arteau

  • François Proulx BoostSecurity.io

  • Benoit Cote-Jodoin BoostSecurity.io

  • Fennix

Discussion: Machine Learning Q&A
  • François Labrèche

  • Berenice Flores Bishop Fox

  • Logan MacLaren GitHub

(EDT)
Ebury, 10 years in: The evolution of a sophisticated Linux server threat
  • Marc-Etienne M.Léveillé ESET

Hardware Hacking Curiosity
  • Adrien Lasalle

(EDT)
Will the real attribution please stand up?
  • Alexis Dorais-Joncas Proofpoint

  • Greg Lesnewich

Scrutiny Debugger - Debug, test and configure embedded softwares through instrumentation
  • Pier-Yves Lessard

(EDT)
Reverse-Engineering Nim Malware: Or a brief tale of analyzing the compiler for a language I had never used
  • Alexandre Côté ESET

Discussion: Hardware Q&A
  • Marc-André Labonté

  • Adrien Lasalle

  • Pier-Yves Lessard

(EDT)
Discussion: Malware Q&A
  • Sergei Frankoff OpenAnalysis Inc

  • Pierre-Marc Bureau

  • Alexis Dorais-Joncas Proofpoint

  • Marc-Etienne M.Léveillé ESET

  • Alexandre Côté ESET

  • Greg Lesnewich

Insert coin: Hacking arcades for fun
  • Ignacio Navarro N/A

(EDT)
Unveiling the OT Threat Landscape
  • Camille Felx Leduc

  • Thomas Poinsignon Clavel

Crowdsourced DDoS Attacks Amid Geopolitical Events
  • Zaid Osta Flare

(EDT)
UnRegister Me - Advanced Techniques for hunting and securing user registration vulnerabilities.
  • Priyank

Cyber Incident Command System: A Firefighter's Approach to Managing Cyber Incidents
  • AJ Jarrett DTCC

(EDT)
Gaming on the video wall

Smash, Mario Kart, who knows...

(EDT)
Pickpocket Show

Come and see James Harrison's unique craft!

https://pickpocketmagic.com

(EDT)
Electroencephalogram (EEG) Duel

Venez déployer vos pouvoirs de concentration dans un duel EEG comme vous n'en avez jamais vécu!

(EDT)
Thursday Party

Party with guest DJs from Toronto! // Party avec des performances de DJ de Toronto !

Party poster

May 17 2024

Day 2
(EDT)
Doors open and Registration - Friday/Vendredi

🥐 ☕ 🥯 🧃 Breakfast sponsored by IMC2 // Déjeuner grâce à l'IMC2

IMC2

(EDT)
BEWARE of Infosec Influencers
  • W. Garrett Myler Red Trident Inc.

Heartbleed, ten years later
  • Louis Melançon

(EDT)
Real or fake? Tools to fight online disinformation
  • Christian Paquin Microsoft

GraphRunner and Defending Your Microsoft Tenant
  • John Stoner Google Cloud

(EDT)
I will look for you and I will find you: OSINT on publicly shared pictures
  • Patricia Gagnon-Renaud GoSecure

Jupyter Jetpack: Automating Cloud Threat Hunting
  • Kai Iyer EY Canada

(EDT)
Discussion: Human in the Middle Q&A
  • Patricia Gagnon-Renaud GoSecure

  • W. Garrett Myler Red Trident Inc.

  • Octavia Hexe

  • Christian Paquin Microsoft

Double Trouble: Unmasking Twin Phishing Campaigns Targeting E-commerce and Travel Sites
  • Mangatas Tondang (@tas_kmanager) Microsoft / Curated Intelligence

(EDT)
Browser is the new LSASS
  • Charles F. Hamilton (Mr.Un1k0d3r)

(EDT)
Simplified Malware Evasion - Entropy and other Techniques
  • Will Summerhill Mandiant

(EDT)
Discussion: Red Team Q&A
  • Charles F. Hamilton (Mr.Un1k0d3r)

  • Laurent Desaulniers

  • Will Summerhill Mandiant

(EDT)
Finding signals in the noise: Why write exploits when attackers share them for free?
  • Ron Bowes GreyNoise Intelligenc

(EDT)
Redefining Digital Security: A New Approach for IPV Victims
  • Corinne Pulgar Lab2038

(EDT)
Discussion: Lightning Talks
(EDT)
Fermeture Conference Closing

Closing conference remarks // Fermeture de la conférence