Horaire des conférences

May 14 2026

Day 1
(EDT)
Hacking Dumberly
  • Tim Medin

Débutant
(EDT)
Private Key Leaks in the Wild: Insights from Certificate Transparency
  • Guillaume Valadon GitGuardian

  • Gaetan GitGuardian

Moyen
A systematic approach to evading antivirus software
  • Philippe Pépos Petitclerc Université du Québec à Montréal

Moyen
(EDT)
Doxxing-proof authentic digital media: trust the asset, protect the source
  • Christian Paquin Microsoft Research

Débutant
Sold to the highest bidder : the escalation of ADINT from geolocation tracking to intrusion vector
  • Maxime ARQUILLIERE Sekoia.io

  • Coline C Sekoia.io

Moyen
(EDT)
Living Off The Pipeline: Defensive Research, Weaponized
  • François Proulx BoostSecurity.io

Saignage de nez
Hacking 5G: From Radio Security to the APIs
  • Sébastien Dudek Penthertz

Moyen
(EDT)
Hacking Browsers: The Easy Way
  • Robbe Van Roey Toreon

Moyen
Stolen Laptops : Defeating DMA Countermeasures
  • Pierre-Nicolas Allard-Coutu Bell Canada

Moyen
(EDT)
From Experts to Everyone: Democratizing Threat Modeling at Ubisoft
  • Kristine Barbará Ubisoft Entertainment

Moyen
Increasing detection engineering maturity with detection as code
  • Émilio Gonzalez

Moyen
(EDT)
Adventures in Process Injection (How I Accidentally Built a Debugger - Again!)
  • Ron Bowes GreyNoise Intelligence

Moyen
Mapping Deception Solutions with BloodHound OpenGraph
  • Joshua Prager SpecterOps Inc.

  • Ben Schroeder

Moyen
(EDT)
Researchers vs. Threat Actors in Cloud Attacks
  • Dirk-jan Mollema Outsider Security

  • Sanne Maasakkers Mandiant (part of Google Cloud)

Moyen
The OpenGraph diary: Attack path management applied to Ansible
  • Charl-alexandre Le Brun Desjardins

  • Simon Lachkar Desjardins Group

Moyen
(EDT)
Podcast PolySécure

Podcast live sur la scène!

(EDT)
Lightning Talks

Short 5 minute talks by the community!

May 15 2026

Day 2
(EDT)
Lost in the AI Woods: Why the Future Still Needs You -- A Dual Keynote
  • Varsha Dwarakanathan Bloomberg

  • Salini Mishra Bloomberg

Débutant
(EDT)
Commit, Push, Compromise: Attacking Modern GitHub Orgs
  • Andrew Buchanan Figment

  • Max CM Figment

Moyen
Internet Blackout 2026 in Iran — Next-Level Internet Censorship: A Technical Breakdown of Techniques and Tactics.
  • Reza Sharifi CGI Deutschland

Moyen
(EDT)
Trust me, I'm a Shortcut - new LNK abuse methods
  • Wietze

Moyen
Cybermenaces géopolitiques au Canada : État des lieux et perspectives stratégiques
  • Philippe Marchand Chaire Raoul-Dandurand

Débutant
(EDT)
The Merchant of Venice: Trading Latency for Security at Scale
  • Manu Jose LinkedIn

Débutant
Le futur s'invente avant-hier
  • Xavier Facélina SECLAB

Débutant
(EDT)
A Needle in a Haystack: Identifying an Infostealer Attack Through Trillions of Events in a Large-scale Modern SOC
  • François Labrèche Sophos

Moyen
(EDT)
APTL: An Open Source Agentic Purple Team Lab
  • Brad Edwards Palo Alto Networks

Moyen
(EDT)
Measuring AI Ability to Complete Long Cybersecurity Tasks
  • Jeremy Miller OffSec

Débutant
(EDT)
Teaching AI to Secure Code: How LLMs Deploy Security Frameworks at Scale
  • tanu jain Meta

Débutant