Talk Schedule

May 16 2024

Day 1
(EDT)
Conference Introduction
(EDT)
Technical Analysis Past, Present, and Future - Insights from a Reverse Engineering Perspective
  • Sergei Frankoff OpenAnalysis Inc

(EDT)
API: Alternate Pathway to Injection
  • Fennix

With Great gAIn Comes Greater Security Issues - When ML Frameworks' Scale for Growth Incorporates Security Risks to Users' Cloud Accounts
  • Berenice Flores Bishop Fox

(EDT)
Under the Radar: How we found 0-days in the Build Pipeline of OSS Packages
  • François Proulx BoostSecurity.io

  • Benoit Cote-Jodoin BoostSecurity.io

What's New is Old - Parallels of OWASP's Top 10 for LLMs and Web Applications
  • Logan MacLaren GitHub

(EDT)
Discussion: AppSec Q&A
  • Philippe Arteau

  • François Proulx BoostSecurity.io

  • Benoit Cote-Jodoin BoostSecurity.io

  • Fennix

Discussion: Machine Learning Q&A
  • Logan MacLaren GitHub

  • Berenice Flores Bishop Fox

  • François Labrèche

(EDT)
Ebury, 10 years in: The evolution of a sophisticated Linux server threat
  • Marc-Etienne M.Léveillé ESET

Hardware Hacking Curiosity
  • Adrien Lasalle

(EDT)
Will the real attribution please stand up?
  • Alexis Dorais-Joncas Proofpoint

  • Greg Lesnewich

Insert coin: Hacking arcades for fun
  • Ignacio Navarro N/A

(EDT)
Reverse-Engineering Nim Malware: Or a brief tale of analyzing the compiler for a language I had never used
  • Alexandre Côté ESET

Scrutiny Debugger - Debug, test and configure embedded softwares through instrumentation
  • Pier-Yves Lessard

(EDT)
Discussion: Malware Q&A
  • Sergei Frankoff OpenAnalysis Inc

  • Alexandre Côté ESET

  • Marc-Etienne M.Léveillé ESET

  • Alexis Dorais-Joncas Proofpoint

  • Greg Lesnewich

  • Pierre-Marc Bureau

Discussion: Hardware Q&A
  • Marc-André Labonté

  • Pier-Yves Lessard

  • Adrien Lasalle

  • Ignacio Navarro N/A

(EDT)
Unveiling the OT Threat Landscape
  • Camille Felx Leduc Mandiant

  • Thomas Poinsignon Clavel

Crowdsourced DDoS Attacks Amid Geopolitical Events
  • Zaid Osta Flare

(EDT)
UnRegister Me - Advanced Techniques for hunting and securing user registration vulnerabilities.
  • Priyank

Cyber Incident Command System: A Firefighter's Approach to Managing Cyber Incidents
  • AJ Jarrett DTCC

May 17 2024

Day 2
(EDT)
BEWARE of Infosec Influencers
  • W. Garrett Myler Enclave Defense

Heartbleed, ten years later
  • Louis Melançon

(EDT)
Real or fake? Tools to fight online disinformation
  • Christian Paquin Microsoft

GraphRunner and Defending Your Microsoft Tenant
  • John Stoner Google Cloud

(EDT)
I will look for you and I will find you: OSINT on publicly shared pictures
  • Patricia Gagnon-Renaud GoSecure

Jupyter Jetpack: Automating Cloud Threat Hunting
  • Kai Iyer EY Canada

(EDT)
Discussion: Human in the Middle Q&A
  • Christian Paquin Microsoft

  • Patricia Gagnon-Renaud GoSecure

  • W. Garrett Myler Enclave Defense

  • Octavia Hexe

Double Trouble: Unmasking Twin Phishing Campaigns Targeting E-commerce and Travel Sites
  • Mangatas Tondang (@tas_kmanager) Microsoft / Curated Intelligence

(EDT)
Browser is the new LSASS
  • Charles F. Hamilton (Mr.Un1k0d3r) KPMG Canada

(EDT)
Simplified Malware Evasion - Entropy and other Techniques
  • Will Summerhill Mandiant

(EDT)
Discussion: Red Team Q&A
  • Charles F. Hamilton (Mr.Un1k0d3r) KPMG Canada

  • Laurent Desaulniers

  • Will Summerhill Mandiant

(EDT)
Finding signals in the noise: Why write exploits when attackers share them for free?
  • Ron Bowes GreyNoise Intelligenc

(EDT)
Redefining Digital Security: A New Approach for IPV Victims
  • Corinne Pulgar Lab2038

(EDT)
Discussion: Lightning Talks