HF 2022 - Call for Papers

?
  • Offensive
  • Defensive
  • Threat Intelligence / OSINT
  • Mental Health
  • Research
You are currently viewing an older schedule version. You can find the current version here.
You're currently viewing an offline version of the schedule, so it may be outdated. Refresh this page once you have an internet connection to see the current schedule.
Track 1
Track 2
09:00
10:00
11:00
12:00
13:00
14:00
15:00
16:00
17:00
18:00
19:00
20:00
Avoir les bleus dans un monde rouge (Jacques Sauve)
Purple Teaming - From Silos to Heroes (Martin Dubé, Dany Lafrenière)
Savoir négocier et se vendre (Karolynn Boulet)
Lunch
Pourquoi et comment financer une startup en cybersécurité via le capital de risque. (Gabriel Tremblay)
Office Under Siege: Understanding, Discovering, and Preventing Attacks Against M365 (Dmitriy Beryoza)
La SeQCulture du Service: Comment j’ai appris à ne plus m’en faire et aimer les produits. (Pierre-David Oriol)
Comment tirer avantage du MITRE ATT&CK Framework (Jean-Francois Brouillette)
Dinner
Podcast La French Connection - Épisode 0x0214 - LIVE (L'équipe de La French Connection)
Defrauding merchants like it’s Y2K (Yuk Fai Chan, Craig Barretto)
Mon cheminement vers la sécurité (mon père m'a forcé) (William H-P, Eric Hogue)
Certification 101 (Steve Lavoie)
Un Hacking Workflow? VsCode, Git, Terraform et Malware Dev (Félix Lehoux)
Lunch
8 stratégies efficaces pour rater sa gestion de CyberCrise (Fournier Alexandre)
Bypassing next generation implementations of 2FA and MFA in applications (Muhammad Shahmeer)
AWS sous attaque ! (Cédric Thibault)
Track 1
Track 2
09:00
10:00
11:00
12:00
13:00
14:00
15:00
16:00
Up Close & Personnel (Chris Carlis)
Purple RDP: Red and Blue Tradecraft around Remote Desktop Protocol (Olivier Bilodeau)
AppSec - The missing link (François Lajeunesse-Robert)
Lunch
The good, bad, and ugly of responsible disclosure (Craig Barretto)
You can CTF but can you Pentest (Stephen Hall)
Hackfest Closing Ceremony (Patrick)
NOTH1NG T0 HID3: The Armageddon Edition (Kirils Solovjovs)
Se fait hacker qui croyait hacker : L’analyse des mots de passe des pirates informatiques (Andreanne Bergeron)
EDR: Efficiently Defeating RedTeamers? (Mr.Un1k0d3r)
Lunch
BLACKHAT: Hacking Using USB Rubber Ducky (Kevin MONKAM)