Horaire des conférences

May 18 2023

Day 1
(EDT)
Welcome to NorthSec 2023!
  • Florencia Herra-Vega

  • Hugo Genesse

(EDT)
Empowering Security with Generative AI: Fundamentals and Applications of GPT models
  • Roberto Rodriguez

(EDT)
Willy Wonka and the Detection Factory: Detection Engineering without Alert Fatigue
  • Émilio Gonzalez

  • Rémi Langevin

Practical exploitation of cryptographic flaws in Windows
  • Yolan Romailler Protocol Labs

  • Sylvain Pelissier Kudelski Security

(EDT)
Infrastructure as Code, Automation, and Testing: The Key to Unlocking the Power of Detection Engineering
  • Olaf Hartong FalconForce

The quantum clock is ticking… get ready!
  • Christian Paquin Microsoft Research

(EDT)
Discussion: Q&A Detection
  • Jared Atkinson SpecterOps

  • Mathieu Saulnier Sumo Logic

  • Émilio Gonzalez

  • Olaf Hartong FalconForce

  • Rémi Langevin

(EDT)
Thwarting Malware Analysis: Integrating Established and Novel Techniques
  • Guillaume Caillé OKIOK

Tracking Bumblebee’s Development
  • Suweera De Souza CrowdStrike

(EDT)
Evasion as a Red Teamer
  • Charles F. Hamilton (Mr.Un1k0d3r) KPMG Canada

Asylum Ambuscade: Crimeware or cyberespionage?
  • Matthieu Faou ESET

(EDT)
Deception for pentesters
  • Laurent Desaulniers GoSecure

Discussion: Q&A Malware
  • Matthieu Faou ESET

  • Suweera De Souza CrowdStrike

  • Pierre-Marc Bureau

(EDT)
Discussion: Q&A Red Team
  • Charles F. Hamilton (Mr.Un1k0d3r) KPMG Canada

  • Laurent Desaulniers GoSecure

  • Martin Dubé

  • Guillaume Caillé OKIOK

Democratizing (cyber) warfare and the battle for Ukraine. Tactics, techniques and methods for effective offensive cyber operations.
  • Sarah Kraynick

(EDT)
gRPC security with less effort
  • Ashley Manraj Pvotal Technologies Inc.

Privacy through the lens of code
  • Suchakra Sharma Privado Inc.

(EDT)
Burp Suite Pro tips and tricks, the sequel
  • Nicolas Grégoire AGARRI

From On-Premises to Cloud: A Comprehensive Analysis of SAP Security Issues
  • Vahagn RedRays

  • Arpine Maghakyan RedRays

(EDT)
10 years of NorthSec if you count from 0
  • Olivier Bilodeau GoSecure

(EDT)
10 years anniversary cocktail sponsored by GoSecure & Checkpoint
(EDT)
10 years anniversary Party with One More Time Daft Punk Tribute

May 19 2023

Day 2
(EDT)
Scams: a generative AI use case
  • Jeff Yates

(EDT)
(Windows) Hello from the other side
  • Dirk-jan Mollema Outsider Security

Vulnérabilités des réseaux overlays VxLan dans les datacenters.
  • mdovero

(EDT)
To the moon and back: How we found and exploited a series of critical vulns in an RPC server
  • Ron Bowes Rapid7

Roses are red, violets are blue, S4U bamboozles me, U2U too
  • Charlie Bromberg (Shutdown) Capgemini

(EDT)
Discussion: Q&A Vulnerability Research
  • Ron Bowes Rapid7

  • Dirk-jan Mollema Outsider Security

  • Philippe Pépos Petitclerc

Password Audit Cracking in AD: The Fun Part of Compliance
  • Mathieu Saulnier Sumo Logic

(EDT)
Checkmate: using game theory to study the evolution of ransomware
  • Vicky Desjardins Hitachi systems security and University of Montreal

Profiling Risky Code using Machine Learning
  • zunaira zaman Synopsys Inc

(EDT)
Human versus Machine: The Level of Human Interaction in Automated Attacks Targeting the Remote Desktop Protocol
  • Andreanne Bergeron GoSecure

Roll for Stealth: Evading AV/EDR Entropy Checks
  • Mike Saunders Red Siege

(EDT)
Too Anonymous To Prosecute? Survey And Interviews on Shadow Phones
  • David Décary-Hétu Université de Montréal

  • Melanie Théorêt

(EDT)
Discussion: Q&A Criminology
  • Andreanne Bergeron GoSecure

  • Vicky Desjardins Hitachi systems security and University of Montreal

  • David Décary-Hétu Université de Montréal

  • Masarah Paquet-Clouston Université de Montréal

(EDT)
Abusing GitHub for fun and profit: Actions and Codespaces Security
  • Magno Logan Trend Micro

(EDT)
Behind the Scenes in GitHub Bug Bounty
  • Logan MacLaren GitHub