Talk Schedule

May 15 2025

Day 1
(EDT)
A Pirate's Guide to Snake Oil and Security
  • HD Moore

(EDT)
Living Off the Pipeline: From Supply Chain 0-Days to Predicting the next XZ-like attacks
  • François Proulx

Nice to meet you! That will be 20 million please
  • David Décary-Hétu Université de Montréal

(EDT)
Salesforce Snafus: Unveiling and Exploiting Security Misconfigurations Using Commonly Used Widgets
  • Jessa Riley Gegax Surescripts LLC

Exploring MSIX Threat Landscape​
  • Teruki Yoshikawa NTT Security Holdings

(EDT)
Discussion: AppSec Q&A
  • HD Moore

  • François Proulx

  • Jessa Riley Gegax Surescripts LLC

UNO Reverse Card: Exposing C2 Operators Through Their Own Logs
  • Estelle Ruellan Flare

(EDT)
Red Team Road Rage: Weaponizing Vulnerable Drivers to Blind EDR
  • Jake Mayhew White Knight Labs

One certificate to rule them all: the story of a Chinese-nexus botnet
  • Amaury-Jacques Garçon Sekoia.io

(EDT)
Executing shellcode without changing memory permission in .NET
  • Charles F. Hamilton (Mr.Un1k0d3r)

Weaponizing XSS: Cyberespionage tactics in webmail exploitation
  • Matthieu Faou ESET

(EDT)
Social Engineering for Physical Pentesting Assignments
  • Dorota Kozlowska Black Hills Information Security

Linux and IoT malware analysis with r2ai
  • Axelle Apvrille Fortinet

(EDT)
From Security to Safety: Navigating the Ethics of AI as Red Teamers and Penetration Testers
  • Jeremy Miller OffSec (Offensive Security)

Discussion: Malware Q&A
  • Axelle Apvrille Fortinet

  • Matthieu Faou ESET

  • Amaury-Jacques Garçon Sekoia.io

(EDT)
Discussion: Red Team Q&A
  • Jake Mayhew White Knight Labs

  • Charles F. Hamilton (Mr.Un1k0d3r)

  • Dorota Kozlowska Black Hills Information Security

  • Jeremy Miller OffSec (Offensive Security)

The Evolution of Malware Distribution Through Ghost Networks
  • Antonis Terefos Check Point Software Technologies

(EDT)
Stolen Laptops - A brief overview of modern physical access attacks
  • Pierre-Nicolas Allard-Coutu Bell Canada

Persōna Theory: Infiltration and Deception of Emerging Threat Groups
  • Tammy Harper Flare

May 16 2025

Day 2
(EDT)
A Tabletop As Big As the World
  • Wendy Nather 1Password

(EDT)
Why preventing phishing is so difficult, and what we can do about it
  • Michael Joyce

Noise Pollution is Damaging Your SOC: Prevent IoCs From Turning Into Indication of Cacophony
  • Joey D Canadian Centre for Cyber Security (Cyber Centre)

(EDT)
When the threat actor lives under your roof: Fighting Technological Violence in Domestic Abuse Cases
  • CatherineDG Cyber Citoyen

Oops, I Hacked It Again: Tales and disclosures
  • Ignacio Navarro N/A

(EDT)
Vulnerability Haruspicy: Using Woo To Confirm Your Biases
  • Tod Beardsley runZero

Exploring Azure Logic Apps and Turning Misconfigurations into Attack Opportunities
  • Chirag Savla White Knight Labs

(EDT)
Enhancing Identity Credential Privacy with Zero-Knowledge Proofs
  • Christian Paquin Microsoft Research

(EDT)
Exploiting the not so misuse-resistant AES-GCM API of OpenSSL
  • Félix Charette

(EDT)
How not to do ML: Showing the Negative Impact of Improper CVE Feature Selection in a Live Exploit Prediction Model
  • François Labrèche Sophos

(EDT)
Uplevel your security program with AI
  • Aditi Bhatnagar Offgrid Security

(EDT)
Discussion: ML Q&A
  • Aditi Bhatnagar Offgrid Security

  • François Labrèche Sophos