Speakers 2019

The CFP is open! See our call for papers.

Keynotes

Eva
Galperin

Electronic Frontier Foundation

  • Where Do We Go From Here? Stalkerware, Spouseware, and What We Should Do About It

Matt
Mitchell

Tactical Tech

  • Cybersecurity vs the world

Talks

Apurva
Kumar

Lookout

  • xRAT: Monitoring Chinese Interests Abroad With Mobile Surveillance-ware

Arezou
Hosseinzad-Amirkhizi

  • xRAT: Monitoring Chinese Interests Abroad With Mobile Surveillance-ware

Chloé
Messdaghi

BugCrowd

  • Fixing the Internet's Auto-Immune Problem: Bilateral Safe Harbor for Good-Faith Hackers

Christian
Paquin

Microsoft

  • Post-Quantum Cryptography: today's defense against tomorrow's quantum hackers

Elissa
Shevinsky

Faster Than Light

  • What is our Ethical Obligation to Ship Secure Code?

Emilien
Le Jamtel

CERT-EU

  • Trick or treat? Unveil the “stratum” of the mining pools

Ioana-Andrada
Todirica

CERT-EU

  • Trick or treat? Unveil the “stratum” of the mining pools

Émilio
Gonzalez

Université de Sherbrooke

  • Welcome to the Jumble: Improving RDP Tooling for Malware Analysis and Pentesting

Francis
Labelle

  • Welcome to the Jumble: Improving RDP Tooling for Malware Analysis and Pentesting

Erica
Portnoy

Electronic Frontier Foundation

  • Making it easier for everyone to get Let's Encrypt certificates with Certbot

Hugo
Porcher

ESET

  • Wajam: From a Start-up to Massive Spread Adware

Jacob
Grant

eSentire

  • Threat hunting in the cloud

Kurtis
Armour

eSentire

  • Threat hunting in the cloud

Joan
Calvet

  • The (Long) Journey To A Multi-Architecture Disassembler

Kelley
Robinson

Twilio

  • Call Center Authentication

Kelly
Villanueva

SpecterOps

  • Hacking Heuristics: Exploiting the Narrative

Kristin
Del Rosso

Lookout

  • Using Geopolitical Conflicts for Threat Hunting - How Global Awareness Can Enable New Surveillanceware Discoveries

Laurent
Desaulniers

  • A good list of bad ideas

Louis
Dion-Marcil

Mandiant

  • Cache Me If You Can: Messing with Web Caching

Mathieu
Saulnier

Bell Canada

  • The SOC Counter ATT&CK

Norman
Shamas

  • Safer Online Sex: Harm Reduction and Queer Dating Apps

Paul
Rascagnères

Talos

  • DNS On Fire

Warren
Mercer

Talos

  • DNS On Fire

Philip
Young

  • Mainframe Hacking in 2019

Philippe
Lamontagne

NRC

  • Post-Quantum Manifesto

Thomas
Pornin

  • T1: Secure Programming For Embedded Systems

Yamila
Vanesa Levalle

ElevenPaths

  • M33tfinder: Disclosing Corporate Secrets via Videoconferences

Yolan
Romailler

  • One Key To Rule Them All - ECC Math Tricks

Workshops

Alexander
Druffel

Fraunhofer-Institute

  • Using angr to augment binary analysis workflow

Florian
Magin

ERNW Research GmbH

  • Using angr to augment binary analysis workflow

Charles
F. Hamilton

  • Red Teaming Workshop

Jonathan
Marcil

Twitch

  • Threat Modeling

Lisa
Aichele

  • Introduction to Return Oriented Programming

Marc-andre
Labonte

Desjardins

  • Leveraging UART, SPI and JTAG for firmware extraction

Marc-Etienne
M.Léveillé

ESET

  • Hunting Linux Malware for Fun and Flags

Martin
Lebel

  • Intro to badge soldering

Masarah
Paquet-Clouston

GoSecure

  • From Bitcoins Amateurs to Experts: Fundamentals, grouping, tracing and extracting bulk information with open-source tools

Maurelian

ConsenSys Diligence

  • Breaking smart contracts

Shayan
Eskandari

ConsenSys

  • Breaking smart contracts

Olivier
Arteau

Desjardins

  • Introduction to appliance reverse engineering

Olivier
Bilodeau

GoSecure

  • Capture-The-Flag 101

Patrick
Ventuzelo

  • Reversing WebAssembly Module 101

Philippe
Arteau

GoSecure

  • Deserialization: RCE for modern web applications

Silvia
Väli

Clarified Security

  • 64-bit shellcoding and introduction to buffer overflow exploitation on Linux

Yashvier
Kosaraju

Twilio

  • Container Security Deep Dive

Trainings

Ashfaq
Ansari

Payatu Software Labs LLP.

  • Windows Kernel Exploitation

Dawid
Czagan

Silesia Security Lab

  • Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation

John
Atrache

FireEye Mandiant

  • Windows Enterprise Incident Response

Lovell
Smith

FireEye Mandiant

  • Windows Enterprise Incident Response

Jess
Hays

FireEye Mandiant

  • Windows Enterprise Incident Response

Martin
Tremblay

FireEye Mandiant

  • Windows Enterprise Incident Response

Nicolas
Gregoire

Agarri

  • Mastering Burp Suite Pro 100% Hands-On

Philip
Young

  • Evil Mainframe Hacking

Chad
Rikansrud

RSM Partners

  • Evil Mainframe Hacking

Ryan
Cobb

SpecterOps

  • Adversary Tactics: Red Team Ops

Brian
Reitz

SpecterOps

  • Adversary Tactics: Red Team Ops

Calvin
Hedler

SpecterOps

  • Adversary Tactics: Red Team Ops

Lee
Christensen

SpecterOps

  • Adversary Tactics: Red Team Ops
Become a speaker