Red Team Block

Back to the list of Speakers and Sessions
Watch the stream
Hosted panel discussion and Q&A.

Hosted panel discussion and Q&A.

Olivier Bilodeau Cybersecurity Research Lead, GoSecure

Olivier Bilodeau is leading the Cybersecurity Research team at GoSecure. With more than 10 years of infosec experience, he enjoys luring malware operators into his traps, writing tools for malware research and vulnerability research. Olivier is a passionate communicator having spoken at several conferences including BlackHat, Defcon, Botconf, NorthSec, Derbycon, and HackFest. Invested in his community, he co-organizes MontréHack, a monthly workshop focused on hands-on CTF problem solving, and NorthSec, a large non-profit conference and CTF based in Montreal.

Lisandro Ubiedo Security Researcher, GoSecure

Lisandro Ubiedo is part of the Cybersecurity Research team at GoSecure. Passionate about all things malware – from reverse-engineering to catching them on-the-go – and doing DevOps to keep attackers entertained. Lisandro also works on programming tools to aid malware analysis and cybersecurity research. He was part of the Aposemat team at Stratosphere Labs doing IoT malware research and as a DevSecOps engineer in multiple companies, while also enjoying CTF challenge solving.

Rolland Winters Cyber Operator (Canadian Forces) & SOC Analyst (Commissionnaires), Canadian Armed Forces & Commissionnaires du Quebec

Rolland Winters is an army reservist and team lead for the cyber protection team at 34 Signal Regiment in Montreal. He is also a full-time SOC analyst for the Commissionnaires du Québec in their cyber security department (VYGL). He has a diverse background, with professional experience in military radio and satellite systems, IOT, smart home automation, CCT/security systems, web application development, and information security. He is currently working on his OSCP and GCIA certifications.

Martin Dubé ,

Passionate about hacking for 15 years, Martin has developed a strong interest in technical challenges: development of malware, evasion of defense controls and process automation. For seven years he was involved as a designer of capture the flag challenges for Hackfest and for one year for the NorthSec (Remember Neurosoft Windows track?). During the day, Martin lead a large team of ethical hackers, one meeting at a time. His goal? Follow the innovation path so that offensive security talents are better used in businesses.