Schedule

The organizing committee would like to thank all of our volunteer speakers!
Expand All +
  • Day 1 - Thursday


  • Just graduated but can't land that first job in cybersecurity? You're not alone. This talk is for those frustrated with the endless cycle of job applications and rejections. Learn how to break through the noise, leverage networking, build a personal brand, and land a cybersecurity job fast.

  • AI is transforming cybersecurity‚Äîenhancing threat detection, reducing workloads, and speeding up response times. But it's not all smooth sailing! In this session, discover how to leverage AI‚Äôs potential while balancing its risks and ensuring human expertise remains at the core of security.

  • Inspired by the book "The Five People You Meet in Heaven", we explore five personas one might encounter in digital transformation from a cyber lens, highlighting the challenges of people, process and technology at scale and the need to strengthen cybersecurity in healthcare and other sectors.

  • The shocking DOJ indictments alleging RT paid Canadian social media influencers to promote Russian talking points in the US confirmed what many disinfo experts had identified OSINT & disinfo expertise. What can we learn from them to protect ourselves from disinfo & foreign influence?

  • "Random Access Memories" is an interactive talk where entertaining, real-life stories are randomly drawn from a raffle box by the audience. Each story dives into areas like penetration testing and social engineering. This is an engaging and entertaining session filled with memorable lessons.

  • Canadian companies produce products or services for the DoD and DND. Starting in 2025 they will need to achieve CMMC Level 1 certification to be able to continue to participate in military contracts. The CPCSC program will be started soon after. This presentation will set you up for success.

  • Come join this interactive Fireside Chat with local CISO's as we explore the most pressing challenges facing security leaders today. AI - Risks vs Rewards, Governance - Making a difference to your organization and Compliance are just a couple of topics to be debated during this engaging session

  • Day 2 - Friday


  • After working with over 300 companies on their application security programs the most common question I receive is “what’s next?”. They want to know how to mature their programs, and when they look at the maturity models available, they find them intimidating and so far beyond their current maturity level that they feel impossible. In this talk I will take you through 3 common AppSec program maturity levels I have encountered over the years, with practical and actionable next steps you could take immediately to improve your security posture.

  • There is a lot of hype around LLMs in cybersecurity - enough to make one roll their eyes into the back of their head - but there are also a lot of organizations that are getting real value. In this talk, we will unpack some of the hype and share real world use cases you can deploy NOW, some for FREE

  • "Data Breaches and Dark Secrets," where I share my journey as a security researcher tracking cybercriminals and ransomware gangs. We'll discuss the challenges of helping organizations and victims, the need for accountability, and the aggressive tactics used to silence ethical hackers.

  • Discover how the Canadian Armed Forces transformed its cyber capabilities from an overlooked tool to a strategic command. This talk explores the historical challenges, technological advancements, and political pressures that shaped CAF Cyber Command, highlighting its pivotal role in National Defence

  • The purpose of this talk is to draw attention to the importance of cyber threat intelligence as a key component to effective network defence and (cyber) security operations. As a capability, an effective CTI program enables organizations with both executive and technical operations guidance.

  • Commercial surveillance vendors lead in sophisticated malware, threatening cybersecurity. This talk focuses on spyware, its impact on end-to-end encryption, and a demonstration of extracting encrypted Signal messages.

  • Data breaches are more than just financial threats. Adversaries use stolen personal and professional information to compromise national security. Learn how they target intelligence and security professionals, recruit insiders, and exploit weaknesses in both public and private sectors.

  • Chances are good that you will face a cyber attack in your lifetime. Focusing solely on prevention is not the way; building resilience into your business is. Let‚Äôs examine a framework of goals, people, processes, and tools to help the business keep on running, even when the bad guys come knocking.