- Tracking Ghosts: A Deep Dive into Nation-State Cyber Threats and Their Relevance to Canada
- DFIR à la vitesse d’un Velociraptor
- DFIR à la vitesse d’un Velociraptor
ARCADES, c'est le projet du producteur/compositeur/guitariste Francis Duchesne (connu pour son travail avec Les Deuxluxes, Sons of Arrakis, Sophia Bel, K-Maro) et du puissant batteur Mathieu Rompré (Men I Trust, Claudia Bouvette, Sophia Bel). Ensemble, ils nous offrent un voyage instrumental épique vers la « 11e Dimension ».
Ce qui distingue véritablement ARCADES, c'est leur scénographie : un spectacle de lumières époustouflant et pré-programmé et accompagné d'art vidéo !
- ARCADES - Music Show
Avec 10 ans d’expérience dans le domaine de l’informatique, je me suis spécialisé depuis plus de 5 ans dans l’Incident Response. En tant que Senior Incident Responder, mon rôle consiste à analyser les incidents de sécurité afin de déterminer les vecteurs d’intrusion utilisés par les attaquants et les actions qu’ils ont menées. J’interviens également dans des missions de Threat Hunting auprès d’entreprises matures afin de les accompagner dans le renforcement et l’évolution de leur cybersécurit
- DFIR à la vitesse d’un Velociraptor
- PANEL : Hunting Bears With Your Friends: How Latvia and Canada Joined Forces in Cyberspace
https://bb.computer
- BlackSheepWall: Contextually Expanded Intelligence Collection
Consultant senior, Bruno possède plus de 23 ans d'expérience en technologies de l'information, avec une expertise approfondie dans les systèmes Unix/Linux/Windows, dont 5 ans spécifiquement consacrés à la sécurité des systèmes. Son parcours lui a permis de développer une expertise pluridisciplinaire, allant de la conception d'architectures à l'analyse de code de logiciels malveillants.
- Réponse aux Incidents Cyber : Démystification des Mythes et Réalités
- PANEL : Hunting Bears With Your Friends: How Latvia and Canada Joined Forces in Cyberspace
- PANEL : Hunting Bears With Your Friends: How Latvia and Canada Joined Forces in Cyberspace
Cheryl Biswas is a strategic Cyber Threat Intelligence analyst with experience in the financial, consulting, managed services, and transportation sectors. She delivered actionable reports to leadership that informed decisions and budgets, engaged in privacy and security assessments, consulted on disaster recovery and business continuity, and helped develop and conduct tabletop exercises. Cheryl is a founding member of The Diana Initiative, supporting women and diversity.
- Do You Want to Play a Game? How About Disabling Civilization?
Chris Carlis is an unrepentant penetration tester with an extensive background in network, wireless and physical testing. Across his career, Chris has worked to expand the value offensive testing provided via open communication and goal driven engagements. Additionally, Chris has presented at a variety of conferences, including Thotcon, Hushcon, Hackfest, ShowMeCon, DeepSec, CypherCon and helps to organize “BurbSec”, the best attended Information Security monthly gatherings in the US.
- Building Penetration Testing Dropboxes
- Secs and the City: Hacking the Perfect Meetup
- Efficient Web Hacking with Caido
As a Cybersecurity Solution Consultant at Palo Alto Networks, Clément Cruchet is backed by experience in offensive security, network security, and incident response. This provides a holistic view of the full attack lifecycle. In this talk, he applies this expertise to GCP to show how to attack the platform and how to build a modern defense.
- The Overlooked Playground: An Attacker's Journey Through GCP
- Harnessing DistilDIRE and Apple's Metal Performance Shaders (MPS) for Real-Time Browser Based Deepfake Detection.
Enseignante en francisation aux adultes de formation, j'ai récemment découvert le grand et fabuleux monde de la cybersécurité.
Curieuse de nature, je me suis plonger dans ce monde qui fait parti de notre train train quotidien.
C'est en faisant quelques formations de base en cybersécurité que j'ai découvert le monde de l'ingénierie sociale et le côté humain qui rend la sécurité difficile à implanter et fragile à garder.
- CSI Linux : Ça mange quoi en hiver?
- Ingénierie sociale : Attention au côté obscur
Dana Ludviga is a cybersecurity analyst at CERT.LV, Latvia’s national CSIRT, where she safeguards the country’s digital space, engages with stakeholders, and represents Latvia internationally. She has worked as a project manager at the .LV registry NIC.LV, focusing on domain security, and as a researcher at the University of Latvia on EU-funded IT projects. Dana also serves on the CyberChess program committee and holds an MSc in Computer Science from the University of Latvia.
- The Rise and Impact of DNS Firewall in Latvia - from idea to mandatory measure
- Mon Ghost est-il un imposteur ?
David Schwartzberg is a cybersecurity expert with nearly 30 years of experience in data protection, ethical hacking, and threat defense. He founded Hak4Kidz, a nonprofit teaching cybersecurity to kids, and speaks at top conferences like Black Hat Arsenal, GrrCON, and Shmoocon. Known for his technical depth and mentorship, David is a leader in the infosec community, passionate about inspiring the next generation of ethical hackers. He likes warm hugs.
- Meshtastic Attacktastic
- Secs and the City: Hacking the Perfect Meetup
David Girard est le directeur principal de la gestion des produits pour la sécurité IA et les alliances IA chez Trend Micro, où il occupe un rôle clé depuis 15 ans. Avec plus de 30 ans d'expérience en cybersécurité et en développement logiciel, David a contribué à la recherche, au renseignement sur les menaces, à l’automatisation et à la sécurité basée sur l’IA. Il a participé aux comités techniques OASIS OpenC2 et CTI, et il est membre du Comité de gouvernance du CoSAI (Coalition for Secure AI)
- Fine Tuning de petits LLM spécialisés en cybersécurité avec Unsloth & LoRA… sans expertise IA! ou presque.
Directeur Sécurité et Gouvernance pour PINQ2. Veille à la sécurité d'une infrastructure de calcul classique et d'une infrastructure de calcul Quantique, les 2 étant localisées au Québec.
N'a pas d'expérience de survie en forêt. Ne campe pas (sauf si c'est un MobilHome). Juste la tranquilité d'esprit d'être prêt.
- Zéro à TOP500 en 500$
- L’Intelligence Artificielle au service des plateformes Pro-code
- OT (Operational technology) challenge and best practice
Dominique, (v)CISO chez Neotrust, travaille pour aider les entreprises à améliorer leur posture en matière de cybersécurité. Grâce à ses 25 ans de passion et d'expertise technique dans le domaine informatique pour divers clients prestigieux à travers le monde, il offre des conseils adaptés pour une meilleure posture face aux menaces.
Au-delà de ses compétences techniques, ses expériences lui ont apporté une richesse culturelle et une connaissance diversifiée du monde des affaires.
- Nos meilleures erreurs de sécurité
Dominique Gagnon est Directeur TI dans une PME manufacturière en transformation numérique. Comptable de formation, étudiant au MBA, il allie gouvernance, terrain et gros bon sens. Il partage une vision humaine de la cybersécurité, là où la convivialité devient un vecteur d’attaque. Pas de jargon, juste du vécu, des ratés, et des leçons applicables dès lundi matin.
- Et si notre culture d’entreprise bienveillante était notre pire faille de sécurité ?
Don Mallory has over 30 years of experience in enterprise IT, primarily in critical infrastructure, specializing in operations, data storage, disaster recovery, and security for critical infrastructure. Professionally, Don is a Senior Security Analyst in the healthcare sector. He is a co-author of “Applied Data Security Strategy - A Leader’s Guide”, and has been involved in various volunteer activities including C3X, Hak4Kidz Toronto, and the Latow Photographer's Guild.
- Hunting the Ghost in the Shell - Case studies of Insider Risk
Elysee Franchuk is a cybersecurity consultant and researcher with MOBIA Technology Innovations. He specializes in uncovering weaknesses across systems ranging from web applications and networks to hardware interfaces and firmware. Drawing on his experience in enterprise networks, penetration testing, programming, and vulnerability research, Elysee identifies emerging attack methods and translates those insights into actionable defense strategies for organizations.
- Attacking Home Automation: Consumer-Grade Vulnerabilities
Emile was a freelance devops & backend developer for many years prior to starting Caido.
He always had a passion for security and working on Caido is the perfect combinaison of both!
- Efficient Web Hacking with Caido
Eric Parent œuvre en cybersécurité et TI depuis plus de 30 ans, tant au Canada qu’à l’international. PDG d’EVA-Technologies (fondée en 1996), il enseigne à Polytechnique et HEC Montréal, et mène divers projets de recherche. Conférencier et invité régulier aux médias, il détient plusieurs certifications (CISSP-ISSAP, CGEIT, CRISC, CISM) et a reçu en 2009 le prix Outstanding Industry Contribution de l’ISC2. Ancien militaire et pilote, il illustre la cybersécurité par des exemples concrets.
- Plongée au cœur d’un désastre annoncé : pourquoi nos projets gouvernementaux échouent (encore)
My name is Eric Zyvith, CISSP, I have spent over 15 years in the cybersecurity industry graduating from Penn State University with a B.S. in Security and Risk Analysis (covering the NSTISSI-4011 INFOSEC curriculum). I have worked in various fields including NERC Critical Infrastructure Protection focusing on cybersecurity of ICS, performing cybersecurity audits for the financial industry, P2P cyberintelligence with a focus on online criminal activity, and for the last 8 years, as an SE and Human
- Operationalizing Your Human Risk Management Program - The Artist Formally Known As Yearly Compliance Training
EvilMog otherwise known as Dustin Heywood is an Executive Managing Hacker and Senior Technical Staff Member at IBM X-Force. He is a member of "Team Hashcat", a Bishop of the Church of Wifi, a black badge collector, and has been performing Identity and Access Management Research for the better part of 2 decades.
- Backdooring OpenSSH
J'ai commencé ma carrière en actuariat avant de faire un virage vers la science des données, le sysadmin, le dev backend et la cybersécurité comme consultant avec jevalide.ca. Je participe au milieu du logiciel libre et des données ouvertes. Mon expérience dans le domaine de l'assurance et au travers diverses situations en lien avec la cybersécurité et la vie privée, combiné avec ma pensée mathématique et mon militantisme, m'ont amené à l'intéresser aux impacts sociaux des technologies.
- Oui, mais je LLM !
- Hacker Charlatan
- Surprise Activity - Do not miss!
Ishaan is a Security Consulting Analyst based in Calgary with a background in Computing Science and Business. He brings experience in cybersecurity, software development, and data science, along with certifications in cloud, security, and data. Focused on threat detection, incident response, and PEN Testing Ishaan is dedicated to continuous learning and contributing to effective, resilient teams.
- Harnessing DistilDIRE and Apple's Metal Performance Shaders (MPS) for Real-Time Browser Based Deepfake Detection.
Jacques Sauvé est consultant en cybersécurité chez Trilogiam, fort de plus de 30 ans d’expérience en TI. Ancien dirigeant d’une firme spécialisée dans les solutions Novell, il aide aujourd’hui les PME à se protéger contre les cyberattaques. Basé en Estrie, il est reconnu pour sa capacité à vulgariser les enjeux de sécurité et à conseiller sur les meilleures pratiques.
- Entre épée et bouclier : la voie stoïcienne du cyberdéfenseur
James Troutman is a technology consultant and entrepreneur with 30+ years in Internet infrastructure, cybersecurity, and IT leadership. He has served as a fractional CIO, CISO, and network architect, aligning technology with business goals while ensuring resilience. He co-authored Maine’s 530-mile MOOSE Net fiber project. James is Co-founder/Director of NNENIX (https://nnenix.net) and lead organizer of SkyTalks (https://skytalks.info).
- Do You Want to Play a Game? How About Disabling Civilization?
A Seasoned Full-Stack Software Developer, specialist in cybersecurity and DevOps, Jean-François is also CEO and Co-Founder of BrightOnLABS, a company which will soon market a range of agentless cybersecurity software powered by AI to protect your cloud infrastructure.
- Navigating AI Risks : The Critical Role of NIST's AI Risk Management Framework
Dédié à l'industrie manufacturière depuis le début de sa carrière, Jean-François participe activement à l'évolution de la culture de sécurité de l'information dans ce secteur spécifique. Dans le domaine des technologies de l'information depuis plus de 25 ans avec plus de 10 années de focus sur la sécurité de l'information, la conformité et le légal, Jean-François est actuellement RSSI et RPRP pour les entreprises Soucy comptant 1600 employés dans le monde.
- Comment rédiger une BONNE politique sur l'IA?
Senior Red Team expert with 5+ years in cybersecurity and 10+ former SysAdmin. Leads advanced adversary simulations, former CTO at Cyberguard, and instructor in Ethical Hacking and Red Team at universities such as UPC in Barcelona. Creator of darkbyte.net and speaker at events such as DEF CON and Black Hat USA/EU. Developer of hacking tools like AutoRDPwn, Cloudtopolis, EvilnoVNC or PSRansom.
- AIkido: Unleashed power in your Command & Control
An experienced Embedded Systems Engineer and Security Research Engineer specializing in FPGAs, BSPs, Side-Channel Analysis, Reverse Engineering of hardware and software - mostly for the United States Government including most recently the US Navy, US Marine Corps and DARPA. I currently work for a startup creating secure hypervisor technology solutions for Department of Defense Embedded Systems Avionics programs. Most of my free time is spent training for Ironman Triathlons.
- Electromagnetic Fault Injection: A Low-Cost, Touch-less Method of Manipulating Hardware.
Johnny has been a dedicated contributor to the public forum, sharing his extensive research and knowledge to the public since 2002. Most notably recognized for his pivotal role in exposing the American TSA Master Key leaks (2014-2018), uncovering Venmo stalking vulnerabilities (2018), and being an overall nuisance. Currently, he is the Global Head of Offensive Security for A Fortune 100 food and beverage manufacturer.
- Secs and the City: Hacking the Perfect Meetup
Jonathan est Conseiller Expert en Sécurité Applicative chez Cybereco où il appuie les partenaires d’innovations et anime des communautés de pratiques. Il est passionné par la sécurité applicative et apprécie l'analyse d'architecture, la revue de code, les défis CTF, la modélisation des menaces et la démystification des outils de sécurité. Jonathan détient un baccalauréat en génie logiciel de l'ÉTS Montréal et cumule plus de 20 ans d'expérience en technologies de l'information et en sécurité.
- Sécurité des APIs : Tactiques défensives
- Proofpoint Discovery Lab: Strengthen Identity Security
- Réponse aux Incidents Cyber : Démystification des Mythes et Réalités
- Table Ronde - Femmes en sécurité de l'information / Round Table - Women in cybersecurity
Kevin Awad is a dynamic Leadership, Executive, and High Performance Coach on a mission to empower and unlock the hidden potential in the cybersecurity community through his practice @The Hyper Coach. Aside from his immense passion for leadership, strategy, and human performance, he is distinguished as a SOC builder with over a decade of hands-on experience in the field and a few SOC teams later. Currently, he serves at the SOC Manager at Genetec where his focus is on leading his team to success!
- Paradigm Lens: Ready Incident Responder!
Kirils Solovjovs is Latvia's top white-hat hacker and IT policy activist, known for exposing major security flaws. An expert in penetration testing, reverse engineering, and network analysis, he started coding at 7 and was writing machine code by grade 9. A command-line enthusiast, he uses bash daily for hacking, automation, and data tasks, and reviews bash exams for top e-learning platforms. He is currently the lead researcher at Possible Security.
- Mastering Bash for Hackers: Extreme Command-Line Power
- Breaking both wires: Reverse engineering builiding access control system for MITM attacks and spoofing
- The AI Wild West: Bring Law and Order to the Agent Frontier
Marc-andre Labonte was a system administrator for more than a decade at the McGill Genome Center while it was known as the McGill University and Genome Quebec Innovation Center.
Then, he joined the ETTIC team at Desjardins in 2016 as infrastructure penetration tester. Currently doing vulnerability research on IOT devices, he also presented "Automated contact tracing experiment on ESP Vroom32" workshop at NSEC in 2021. His work is motivated by curiosity and a strong sense of personal privacy.
- Baremetal emulation
Marco Estrela is a cybersecurity consultant with a passion for social engineering and physical security. After realizing he was better at “talking his way in” than hacking code, he moved from phishing and vishing into full-scale penetration testing. Today, he helps organizations uncover and fix their weakest entry points—whether they’re digital or locked behind a security badge. Marco is also the host of the Behind the Shield cybersecurity podcast, where he and his team break down security trend
- Physical Pentesting: Breaching the Human Perimeter
Mickael Nadeau est le cofondateur de CYBERDEFENSE.AI. Sa passion pour la sécurité et la technologie l'a conduit à suivre de nombreuses formations techniques. Il a également dirigé des recherches sur le piratage de jeux vidéo, ce qui a donné lieu à de nombreuses conférences et ateliers ces dernières années. Il fait partie des survivants de Corelan et a obtenu le titre CertifiedBrute de Brutelogic. Blague à part, il est également connu comme le magicien en matière d'architecture de sécurité cloud.
- Sécurité des APIs : Tactiques défensives
My career has taken me through a diverse journey, spanning roles that include full-stack developer, business analyst, IT manager, and now thriving in cybersecurity. Throughout this journey, my deep passion for technology has remained a constant driving force.
For me, security resembles solving a 10,000-piece puzzle that's been turned upside down. You understand the end goal, yet you're uncertain about where each piece belongs. Achieving this requires close collaboration with developers, busines
- Becoming the Godfather of Threat Modeling
Mina Movahedi Shakib is a seasoned cybersecurity professional with over a decade of experience in the tech industry. She is a Cyber Threat Investigator at Bell Canada's Security Operations Center and a speaker at various cybersecurity conferences. Mina is passionate about AI-driven solutions and believes in their transformative potential to enhance security and efficiency.
- Securing the Digital Frontier: Proactive Bias Mitigation Against AI's Unseen Vulnerabilities in Cybersecurity
Je suis pentester offensif spécialisé en reconnaissance réseau furtive. J’ai développé Zandoli, un outil open-source en Go qui permet de cartographier un réseau sans déclencher d’alerte. Mon objectif : reproduire fidèlement ce qu’un attaquant voit dès les premières minutes d’une compromission. J’ai présenté à BSides sur les jeux vidéo et la cybersécurité. En dehors des audits et du code, je m’entraîne comme si chaque mission comptait vraiment.
- Zandoli : cartographier un réseau d’entreprise sans alerter personne (Red Team, furtivité et réalité terrain)
Olivier Bilodeau, a principal researcher at Flare, brings 15+ years of cutting-edge infosec expertise in honeypot operations, binary reverse-engineering, and RDP interception. Passionate communicator, Olivier spoke at conferences like AtlSecCon, BlackHat, DEFCON, SecTor, Derbycon, and more. Invested in his community, he co-organizes MontréHack, is NorthSec’s President, and runs its Hacker Jeopardy.
- Hackers Dropping Mid-Heist Selfies: LLM Identifies Information Stealer Infection Vector and Extracts IoCs
- La French Connection – Retour explosif sur 2025
- Cérémonie de Clôture / Closing Ceremony
Co-fondateur de l'agence de détectives cyber-enquêteurs Sarx, Philippe travaille depuis 11 ans pour les milieux d'affaires au Canada et à l'étranger. Il faut aussi agent d'exploitation du renseignement et militaire (dans un autre siècle) .
Il participe à de nombreux podcast et conférences sur les sujets du renseignement d'affaires, cyber-fraudes et contre espionnage industriel.
- 4 000 ans de hacks stupéfiants pour votre sandbox: Les meilleurs hack des Egyptiens, Grecs, Romains, Moyen age et qui inspireront votre VM
[email protected]
Passionné de sécurité logique et physique, étant un membre actif de la communauté du Hackfest depuis plusieurs années. Travaillant dans le secteur TI municipal, depuis plus de 21 ans et plus précisément près de 18 ans d’expérience en sécurité de l’information. Fière membre de l'église de Coats, je prône une approche unifiée et centralisé de la sécurité.
- La sécurité physique et logique, une ressemblante dichotomie
Je cumule plus de 20 ans d’expérience en technologies de l’information, dont plus de 16 ans spécifiquement en cybersécurité. Actuellement Vice-président Conseil en Management et co-leader national de la pratique cybersécurité au Canada, je dirige une équipe de plus de 85 experts (350 au Canada) et pilote le développement de l’offre de services dans des domaines clés tels que le cyber advisory, la gouvernance, le risque et la conformité (GRC), la cyberdéfense, la gestion des identités (IAM), la s
- Nos meilleures erreurs de sécurité
Pierre-Nicolas Allard-Coutu is a senior penetration tester and offensive security R&D lead at Bell Canada's Security Testing and Incident Response team (STIRT). He is a seasoned red team operator with many years of experience specialized in the development of malware payloads and payload delivery systems. Recently, he has spearheaded development of the physical penetration test service offering at STIRT, and lead development of novel methodologies and tooling. Finally, ">alert(1);<!--
-->
- Stolen Laptops - A brief overview of modern physical access attacks
Robert Wagner is an Advisory CISO and highly respected security
practitioner, advisor and strategist with over 20 years of experience.
His security experience ranges from defending everything from Fortune
500 companies to government agencies, major universities, and
financial institutions. He is a co-founder of the not-for-profit
organization Hak4Kidz, serves on the board of the Chicago ISSA
chapter, and regularly volunteers for various hacker cons including
Bsides312, BlueTeamCon, and others.
- The Importance of Being in Third Place
- Secs and the City: Hacking the Perfect Meetup
- Social Engineering Contest - Night Edition
At Corelight, I am passionate about empowering our customers and security teams with high-fidelity, real-time cutting edge network evidence. I thrive on helping organizations reduce detection time, accelerate triage, and achieve 95% faster incident response through open and extensible detection and response capabilities. I value collaboration, curiosity, and integrity—and I’m always eager to share knowledge, exchange ideas, and support innovation in the cybersecurity community.
- Corelight CTF - With ZEEK
- Initiation à ZEEK pour le CTF avec Corelight à 19h
N/A
- Hackfest 101
Will Summerhill is a Senior Consultant with Mandiant Canada (part of Google Cloud) on the Red Team. Will frequently performs red teams, purple teams, and penetration testing assessments and is a practice lead at Mandiant for purple teaming. Will has been in offensive security consulting for over 8 years and has 10 years of information security experience combined. He's taught a penetration testing course at the college level and teaches an internal red teaming course to clients.
- Beyond Red vs. Blue: Elevating Your Security with Practical Purple Teaming
- Présentation du plan de rehaussement en cybersécurité du Gouvernement du Québec
I'm a pentester & security researcher, so I'm mostly focus on offensive security. Outside penetration tests (where I enjoy web the most), I spent a lot of time in R&D, where a majority of this time investment was spent on one topic: Unicode. So Unicode is, by far, the topic I know best.
Some people may know me for my Github activity: writing tools, contributing to open-source software a lot as well as security resources, maintaining packages at BlackArch, etc.
- Unicode comme primitive d'attaque de bas niveau
Spyros has over 15 years of experience in the security world. Since the beginning of his career he has been an avid supporter and contributor of open source software and an OWASP volunteer. Currently he is interested in the harmonization of security tools and information and is currently helping Fintechs setup and automate large parts of their AppSec programmes. He also maintains several Open Source projects including the security automation framework Smithy, and opencre.org, the worlds largest
- Smithy, the Open-Source SOAR You’d Actually Use