Event Schedule (2017)

May 18 2017

Day 1
Conference Registration

This is the moment to pickup your badge. Make sure your have your Eventbrite ticket printed or your mobile.

Playing Through the Pain: The Impact of Dark Knowledge and Secrets on Security and Intelligence Professionals
EN
  • Richard Thieme

Attacking Linux/Moose Unraveled an Ego Market
EN
  • Olivier Bilodeau GoSecure

  • Masarah Paquet-Clouston GoSecure

Introduction to Assembly Language and Shellcoding
EN
  • Charles F. Hamilton Mandiant a FireEye company

  • Peter Heppenstall

Backslash Powered Scanning: Implementing Human Intuition
EN
  • James Kettle PortSwigger

Introduction to Assembly Language and Shellcoding
EN
  • Charles F. Hamilton Mandiant a FireEye company

  • Peter Heppenstall

Lunch Break
Deep Dive into Tor Onion Services
EN
  • David Goulet Tor Project

BearSSL: SSL For all Things
EN
  • Thomas Pornin NCC Group

Automating Detection, Investigation and Mitigation with LimaCharlie
EN
  • Maxime Lamothe-Brassard Google

Data Science Tools and Techniques for the Blue Team
EN
  • Shawn Marriott Tanium

Automating Detection, Investigation and Mitigation with LimaCharlie
EN
  • Maxime Lamothe-Brassard Google

Murder Mystery – How Vulnerability Intelligence is Poisoning your Information Security Program
EN
  • Gordon MacKay Digital Defense, Inc

Automating Detection, Investigation and Mitigation with LimaCharlie
EN
  • Maxime Lamothe-Brassard Google

Diner Break
NorthSec Conference Party

May 19 2017

Day 2
Door Open
How Surveillance Law was Expanded in Canada, What the Media has Reported, and What’s Next
EN
  • Chris Prince Office de la Protection du Consommateur (OPC)

Creating an Internet of (Private) Things—Some Things for Your Smart Toaster to Think About
EN
  • Ian Douglas Office of the Privacy Commissioner of Canada

Cracking Custom Encryption – An Intuitive Approach to Uncovering Malware’s Protected Data
EN
  • Pavel Asinovsky IBM Trusteer

  • Magal Baz IBM Trusteer

Don’t Kill My Cat
EN
  • Charles F. Hamilton Mandiant a FireEye company

Cracking Custom Encryption – An Intuitive Approach to Uncovering Malware’s Protected Data
EN
  • Pavel Asinovsky IBM Trusteer

  • Magal Baz IBM Trusteer

Modern Reconnaissance Phase by APT – Protection Layer
EN
  • Paul Rascagneres Cisco

Cracking Custom Encryption – An Intuitive Approach to Uncovering Malware’s Protected Data
EN
  • Pavel Asinovsky IBM Trusteer

  • Magal Baz IBM Trusteer

Lunch Break
Don’t Kill My Cat
EN
  • Charles F. Hamilton Mandiant a FireEye company

Stupid RedTeamer Tricks
EN
  • Laurent Desaulniers

Pentesting: Lessons from Star Wars
EN
  • Adam Shostack

Script Engine Hacking For Fun And Profit
EN
  • Jean-Marc Le Blanc

  • Israël Hallé

Hacking POS PoS Systems
EN
  • Jackson Thuraisamy Security Compass

  • Jason Tran Security Compass

Script Engine Hacking For Fun And Profit
EN
  • Jean-Marc Le Blanc

  • Israël Hallé

Hack Microsoft Using Microsoft Signed Binaries
EN
  • Pierre-Alexandre Braeken Office of the Privacy Commissioner of Canada

Script Engine Hacking For Fun And Profit
EN
  • Jean-Marc Le Blanc

  • Israël Hallé