Schedule

The organizing committee would like to thank all of our volunteer speakers!
Expand All +
  • Day 1 - Thursday


  • Canada once united its vast geography with steel and vision — today, we face a new kind of nation-building challenge. In this session, Francois Guay, Founder of the Canadian Cybersecurity Network, explores a critical weakness hiding in plain sight: our fragmented approach to cybersecurity. While cyber threats grow more sophisticated, our defences remain disconnected. Can Canada truly protect its digital future without a cohesive national strategy? This talk will reveal the critical disconnect between regional advancements and national readiness — and why what comes next may define not just our infrastructure, but our identity.

  • For years, we tested forms. Then we tested APIs. Now we're testing the brains inside your apps. In this fast-paced, practical talk, we'll walk through the emerging art of hacking AI chatbots from the perspective of a penetration tester. You'll see how prompt injection works (and the many forms it can take), why indirect manipulation is especially dangerous, and what developers get wrong when embedding AI assistants into apps, especially when those assistants act as logic engines, personal coaches, or API middlemen. We'll break down the anatomy of a typical chatbot-powered feature, explore real-world examples, and walk step-by-step through how to bypass filters, extract sensitive data, and hijack intent. As automated tools and AI begin to catch traditional bugs, this emerging attack surface demands a new skillset. We'll see how chatbot security isn't just about filtering obvious words, it's about detecting intent, even when that intent is buried or disguised. If you're testing modern apps and ignoring the chatbot, you're leaving the brain unguarded.

  • The rapid evolution of software engineering has transformed Application Security (AppSec) into a constantly shifting battlefield. Traditional security approaches are no longer enough—modern pipelines demand a strategic, multi-layered defense. In this talk, we'll explore how AppSec practitioners must adapt to stay ahead of emerging threats. I'll introduce the three essential disciplines of AppSec: Security In the Pipeline (SIP): Protecting the code, dependencies, and infrastructure as they move through the development lifecycle. Security Of the Pipeline (SOP): Securing the CI/CD tooling, environments, and processes to prevent supply chain compromises. Security Around the Pipeline (SAP): Addressing external threats, insider risks, and adversarial attacks targeting the entire ecosystem. Drawing from real-world adversarial security research, I'll highlight the biggest challenges in each domain and present practical mitigation techniques that security, DevOps, and engineering teams can apply immediately. Attendees will gain insights into common attack vectors, best practices for securing CI/CD workflows, and emerging trends shaping the future of AppSec. By the end of this session, you'll walk away with a holistic security framework that ensures your pipelines remain secure, resilient, and future-proof. Whether you're an AppSec engineer, security beginner, or interested in DevSecOps practitioner, this talk will provide actionable strategies to help you navigate the ever-evolving AppSec landscape. Don't just secure your code—secure your entire pipeline!

  • What happens when a late-night napkin sketch turns into a mobile app that must pass TSA checkpoints and government audits? This is the real-world story of how we partnered with an ambitious state government to transform the physical driver's license into a Digital ID — a mobile identity platform trusted by police, retailers, and airport security. Built from the ground up, the app enables users to prove identity, purchase age-restricted items, and even board flights — all from their phone. But this wasn't just an app launch. It was a high-stakes journey where security was the product — and there was no playbook to follow. In this 45-minute talk, we'll walk through the technical and organizational gauntlet we faced, and share real artifacts, patterns, and missteps from taking a net-new product through: - SOC2 certification (including the app, cloud stack, and even manufacturing plants), - biometric verification challenges, - evolving privacy regulations, - and eventual TSA acceptance. Updated in this version of the talk: We'll highlight lessons learned post-launch — what worked, what didn't, and how real-world usage patterns forced critical design changes. We'll explore how some well-meaning security decisions, like one-time tokens or strict expiration windows, backfired by confusing users or blocking adoption — and how we course-corrected under pressure. You'll walk away with: - A reusable blueprint for building certification-ready products from scratch. - A DevSecOps pipeline pattern that enforces security, triages defects, and feeds directly back to developer queues. - A proven threat modeling approach that builds cross-team trust fast. - Tactics for executive risk scoring that move audits and legislation forward. - Lessons from breaking (and fixing) facial recognition, blockchain-based claims, and 3rd-party identity verifiers. - How to detect and resolve security features that hurt usability or adoption, including warning signs from live telemetry, user support channels, and conflicting 3rd-party expectations. We'll unpack key stories: - How digital identity actually works — and how to test what can go wrong. - Where real-world standards failed us — and how we adapted. - The surprising ways 3rd-party assurance almost derailed launch. - What happens when a production endpoint is stolen and taken to a dark alley. - Getting TSA sign-off (and how our users helped us get there). If you've ever been told "make it secure and ship it fast" with no roadmap and public scrutiny looming — this talk is your playbook

  • Let's be real. If you work in risk or compliance, your days probably involve spreadsheets, folders full of screenshots, chasing down evidence, and sitting through way too many status meetings. It's how most of us manage risk registers, audits, and policies. And while that might work for a while, it quickly becomes messy and exhausting, especially as your organization grows and expectations increase. At some point, someone will say, "We should automate this." The problem? Most of us didn't get into GRC to become engineers. We're great at managing policies, audits, and frameworks, but not everyone is comfortable with terms like "APIs" or "policy-as-code." It can feel like automation is only for developers, and the rest of us have to keep clicking through spreadsheets. This talk is here to change that. "From Risk to Real-Time: Automating GRC Without Losing Your Mind" is a beginner-friendly introduction to automating your GRC work. No coding experience is required. Whether you're a risk analyst, compliance lead, or internal auditor, this talk will help you understand what GRC automation actually looks like and how you can start small without feeling lost. You'll learn: What GRC automation really means in plain language Simple starter projects like checking if MFA is enabled or sending reminders in Slack Easy-to-use tools for non-developers like Python, YAML, Zapier, and GitHub Actions How to bring an automation mindset into your work without losing your risk focus You don't need to be technical to benefit from automation. You need a path to follow. This talk is based on real experience from someone who learned by doing. You'll leave with tips, examples, and realistic ways to bring automation into your work, one small step at a time. Whether you're just curious or ready to improve your day-to-day tasks, this session will show you how to move from manual chaos to real-time clarity — all while keeping your brain (and your spreadsheets) intact.

  • Laptops have become ubiquitous in modern times. An all but guaranteed organizational asset that quite literally holds keys to the kingdom, in every employee's hands. For an attacker, what's not to love? From large government organizations to fortune 500 companies, these assets are constantly on the move and often poorly secured against advanced threat actors seeking to extract their secrets. Encryption at rest is NOT enough in 2025! And I can show you why. This talk will showcase methodologies used by our offensive security team to penetrate well-hardened, modern laptops during engagements we call "stolen laptop scenarios". No power? No credentials? No problem! We push the envelope to the limit of what can be realistically expected of next-generation adversaries. We begin by exploring the potential impact that a compromised laptop can have on an organization, briefly discussing potential lateral movement through extracted domain credentials, tickets, certificates, cookies, and sensitive data. After exposing the audience to the value obtained through physical compromise, we will discuss real attack vectors, with examples and video demos. We will explore together direct-memory access attacks, the physical and logical implementations of these techniques, defenses, bypasses, and more. On the menu is an overview of PCI Express technology, DMA hardware including FPGA boards and what we do with them, practical demonstrations of attacks against modern laptops, countermeasures introduced by hardware vendors to protect against these attacks, and ways that attackers circumvent these protection mechanisms. Naturally, we will discuss BIOS/UEFI security, how it relates to DMA, and how we exploit pre-boot environments to gain access to a stolen computer. This includes showcasing physical attacks against BIOS EEPROM chips using a universal programmer. Finally, we will talk about encryption at rest, specifically BitLocker, TPM implementation, and the potential implications of using these technologies for attackers, with a focus on why these are not sufficient for preventing attackers with physical access from compromising a PC. This section will culminate with an exploit demonstration compromising windows OS from UEFI via DMA when all modern countermeasures are enabled. Of course, we will discuss proper configuration that can limit or eliminate these attack vectors as well! We will discuss open-source tooling such as PCILeech, MemProcFS, UEFITool, etc, and some closed source tooling including XGPro.

  • This panel features senior cybersecurity leaders and covers real security issues and priorities facing both private and public sector organizations. Topics covered will range from Quantum to compliance to AI with an emphasis on what's needed to make implementations successful.

  • Day 2 - Friday


  • Managing hardware and software risks in the post-quantum computing era primarily involves proactively assessing current cryptographic systems, identifying vulnerabilities to quantum attacks, and implementing "post-quantum cryptography" (PQC) algorithms to update software and hardware, ensuring data remains secure even when quantum computers become powerful enough to crack current encryption methods; this requires a comprehensive strategy including risk assessments, technology upgrades, employee training, and ongoing monitoring of emerging quantum computing developments.

  • Feeling overwhelmed by alerts? Ever want to "hack back" the Hackers, but don't want to break laws? Well here's a revolutionary new strategy that will get you going! Defend by deceiving, and overwhelm anyone persistent enough to keep looking. Based on nearly a decade of R&D and fieldwork, we are ready to premier a revolutionary new strategy for network defence. This talk will take a few moments to understand the current state of affairs, how it came to be, and turn it all upside down. We will discuss increasing your security posture by overwhelming your adversaries with everything they think they want and more. Join us, while we present a revolutionary new network defence strategy that will leave your adversaries confused, overwhelmed, and unmotivated to come back for more. What had started as a funny joke-turned-side-project, has taken on a whole new meaning when the long-term results were analyzed. Surprising results lead to deeper research and more in-depth analysis on strategies of both the Blue and Read Team perspectives. Exploratory Purple Team research at it's finest! If you're looking for something unique, something that laughs at the idea of existing within a box, then this is it. Presented with the beginners in mind, but an enticing enough of an idea that even long-time veterans will be interested. Sprinkled with just enough memes and shenanigans, this is a presentation sure to keep a wide audience on the edge of their seats with intrigue. "All warfare is based on deception." -Sun Tzu

  • The presentation examines how different OS architectures, particularly Linux and BSD, shape the techniques used in binary exploitation. It begins by highlighting the foundational systems and standards—System V, POSIX, BSD, UNIX, and Linux—that influence an OS's behavior and security mechanisms like memory management, calling conventions, and stack management. Key topics include the System V application binary interface (ABI), which governs function calls and stack management, and POSIX standards, which ensure cross-platform exploit portability. The presentation explores UNIX philosophy's emphasis on simplicity and modularity, showing how patterns can help us think about vulnerabilities. The section about BSD's influence focuses on advanced memory management techniques that impact exploit strategies. The presentation also covers OS security features (e.g., ASLR, Write XOR Execute (W^X), and stack canaries), and how to bypass them. It delves into exploiting system calls for privilege escalation, using a case study surrounding Shellshock (CVE-2014-6271) and how it relates to recent memory corruption issues. A comparison of SysV and BSD mechanics shows differences in calling conventions, stack management, and system calls—all of which affect exploit development. In conclusion, the presentation displays why an OS's architecture can make or break successful binary exploitation, even if techniques themselves are theoretically viable.

  • The cyber battlefield is undergoing a profound transformation. As nation-states and advanced threat actors adopt generative AI and other sophisticated technologies, traditional human-led operations will give way to autonomous, machine-driven tactics. This talk will explore this near-horizon evolution of machine-on-machine conflict, where AI systems simulate and plan attacks through swarm intelligence and wargaming frameworks, and how they may actively engage in dynamic offensive and defensive cyber operations against one another. This talk will provide a cutting-edge overview of this paradigm shift, exploring the multifaceted dimensions of machine-on-machine warfare. One of the most significant advancements lies in how sophisticated agent paradigms and their underlying models can simulate cyber war games and attack pathway planning. This allows for a rapid iterative process of planning and refinement, where potential attack vectors are explored and optimized without needing any real-world deployment. The ability for agents to simulate complex, multi-stage cyberattacks, disinformation operations and espionage campaigns can radically enhance downstream operationalization. Furthermore, the audience will explore how agents can employ adversarial AI techniques against other agents. This involves a sophisticated form of cyber warfare where one AI system is specifically designed to attack the alignment and/or decision boundaries of another AI system. The objective is to degrade, deceive, or disable an opposing AI, creating vulnerabilities or misjudgments that can be exploited for strategic advantage. This introduces a new layer of complexity to cyber defense, as protective AI systems must not only guard against human-initiated attacks but also against the deliberate and intelligent subversion attempts of hostile AI. Beyond direct conflict, machine-driven espionage and surveillance at scale represent another critical frontier. The use of autonomous AI agents for large-scale OSINT harvesting and passive surveillance is already becoming prevalent. These systems can autonomously scour the internet for information, identify patterns, and construct detailed profiles of targets or adversaries without human intervention. Crucially, these systems may also deploy defensive disinformation to counter their adversarial agentic counterparts, creating a fog of war in the informational domain. This includes the generation of synthetic data, misleading narratives, or even fabricating digital footprints to misdirect or confuse enemy intelligence gathering agents. Finally, the audience will be introduced to the weaponized fine-tuning of open-source models. This involves taking publicly available AI models and enhancing them through specialized training data to improve both strategic planning capabilities and domain-specific, tactical execution. By fine-tuning these models nation-states and sophisticated actors can rapidly develop highly potent and specialized AI capabilities which align with their goals. Open source models democratizes access to advanced AI tools while simultaneously raising the stakes, as the very foundations of AI are repurposed for offensive or defensive cyber operations. The convergence of these capabilities paints a clear picture: the future of cyber warfare, espionage, and simulation will be dominated by machines, fighting against and learning from one another in an ever-accelerating digital arms race.

  • Breaking into cybersecurity can feel overwhelming. Threats and technologies are constantly evolving, so it's easy to feel like you're always behind. However, we don't have to navigate this journey alone. This talk explores how AI can be a powerful, accessible tool for learning cybersecurity, helping newcomers get hands-on experience and enabling others to accelerate their growth and stay current in a fast-moving industry. Drawing from our diverse backgrounds, we'll share how AI supported our growth and how it can help others do the same. Whether you're new to the field, expanding your skillset, or mentoring others, this talk will give you actionable ways to integrate AI into your cybersecurity journey.

  • As a former member of the Canadian Forces, I learned how to define security by conducting aggressive security testing. Transitioning these skills to cybersecurity testing of the corporate world has identified consistent mistakes - on the part of the target networks, and by the red team itself. Using real world "war stories", the talk will review the set-up and operation of red team tests against Canadian-specific targets. What works in setting up a successful team? How do you manage test up-front with the target organization? Most importantly, what are the mistakes we have seen over and over in the past? (And it's not just a lack of patching!). And when it comes to the testers, are they making mistakes that contribute to poor or ineffective testing? The goal of the talk is to understand how to effectively test a network's security and make the most of this type of testing. There has been a reluctance to do red team testing in Canadian networks, but now it's time to move beyond "scans and pokes", and treat a network the way the hackers do!