Talk Schedule

May 16 2024

Day 1
(EDT)
Conference Introduction
(EDT)
Sergei Frankoff
  • Sergei Frankoff

(EDT)
API: Alternate Pathway to Injection
  • Fennix

With Great gAIn Comes Greater Security Issues - When ML Frameworks' Scale for Growth Incorporates Security Risks to Users' Cloud Accounts
  • Berenice Flores

(EDT)
Under the Radar: How we found 0-days in the Build Pipeline of OSS Packages
  • François Proulx

  • Benoit Cote-Jodoin

What's New is Old - Parallels of OWASP's Top 10 for LLMs and Web Applications
  • Logan MacLaren

(EDT)
Discussion: AppSec Q&A
Discussion: Machine Learning Q&A
(EDT)
Ebury, 10 years in: The evolution of a sophisticated Linux server threat
  • Marc-Etienne M.Léveillé

Hardware Hacking Curiosity
  • Adrien Lasalle

(EDT)
Will the real attribution please stand up?
  • Alexis Dorais-Joncas

Insert coin: Hacking arcades for fun
  • Ignacio Navarro

(EDT)
Reverse-Engineering Nim Malware: Or a brief tale of analyzing the compiler for a language I had never used
  • Alexandre Côté

Scrutiny Debugger - Debug, test and configure embedded softwares through instrumentation
  • Pier-Yves Lessard

(EDT)
Discussion: Malware Q&A
Discussion: Hardware Q&A
(EDT)
Unveiling the OT Threat Landscape
  • Camille Felx Leduc Mandiant

Crowdsourced DDoS Attacks Amid Geopolitical Events
  • Zaid Osta

(EDT)
UnRegister Me - Advanced Techniques for hunting and securing user registration vulnerabilities.
  • Priyank

Cyber Incident Command System: A Firefighter's Approach to Managing Cyber Incidents
  • AJ Jarrett

May 17 2024

Day 2
(EDT)
BEWARE of Infosec Influencers
  • W. Garrett Myler

Heartbleed, ten years later
  • Louis Melançon

(EDT)
Real or fake? Tools to fight online disinformation
  • Christian Paquin

GraphRunner and Defending Your Microsoft Tenant
  • John Stoner

(EDT)
I will look for you and I will find you: OSINT on publicly shared pictures
  • Patricia Gagnon-Renaud

Jupyter Jetpack: Automating Cloud Threat Hunting
  • Kai Iyer

(EDT)
Discussion: Human in the Middle Q&A
Double Trouble: Unmasking Twin Phishing Campaigns Targeting E-commerce and Travel Sites
  • Mangatas Tondang (@tas_kmanager)

(EDT)
Browser is the new LSASS
  • Charles F. Hamilton (Mr.Un1k0d3r) KPMG Canada

(EDT)
Simplified Malware Evasion - Entropy and other Techniques
  • Will Summerhill

(EDT)
Discussion: Red Team Q&A
(EDT)
Finding signals in the noise: Why write exploits when attackers share them for free?
  • Ron Bowes

(EDT)
Redefining Digital Security: A New Approach for IPV Victims
  • Corinne Pulgar

(EDT)
Discussion: Lightning Talks