2020 Agenda

September 23

09.15 AM (EDT)

Session

Michael Joyce

Michael Joyce

Serene
45MINS I EN

Digestible Cybersecurity Knowledge, with ten times the science

10.45 AM (EDT)

Max Laroche

Maxime Laroche

Directeur des poursuites criminelles et pénales
45MINS I FR

Le droit à l’expectative de vie privée en matière criminelle et technologies de l’information : enjeux et état de la situation en 2020

Ashwath Murthy

Ashwath Murthy

Palo Alto
45MINS I EN

A Paradigm Shift in Cybersecurity…Intelligent Network Security

Ashwath Murthy

Kevin Magee & >Stan Lowe

Zscaler
45MINS I EN

Security in the age of Advanced Persistent Transformation: Fireside Chat

12.15 PM (EDT)

Keynote

Chloe Messdagh

Chloé Messdaghi

Point3 Security
45MINS I EN

Ethical Hackers and the Amygdala

01.45 PM (EDT)

Sabine Lainer

Sabine Lainer

GoSecure
45MINS I EN

No Privacy without Security

Jon Rohrich

Jon Rohrich

Microsoft
45MINS I EN

The Cloud: Security Threat or opportunity? <Spoiler, it’s both!>

Marc Bourget & Michael Katz

Marc Bourget & Michael Katz

Infoblox
45MINS I EN

Threat Intelligence and DNS for Rapid Cybersecurity Incident Response

03.15 PM (EDT)

Keynote

Chloe Messdagh

Chris Roberts

45MINS I EN

Let us have a VERY frank conversation…

04.15 PM (EDT)

Greg Young

Greg Young

Trend Micro
45MINS I EN

A Crash Course in Getting Your Cybersecurity Right in 2021

Maurice Cote

Maurice Cote

Devolutions
45MINS I EN

Demystifying Privileged Access Management for SMBs

Christian Have & Jake McCabe

Jake McCabe

LogPoint
45MINS I EN

Taking a behavioral approach to security- how to stay one step ahead of your adversaries

05.30 PM (EDT)

Philippe Arteau

Philippe Arteau

GoSecure
45MINS I EN

Unicode vulnerabilities that could byte you

Maurice Cote

Nathan Wenzler

Tenable
45MINS I EN

Scanning Isn’t Enough: Measuring true risk with a Risk-Based Vulnerability Management program

David Carver

David Carver

Recorded Future
45MINS I EN

Vulnerabilities in 2020: More to Review, Less Time to Patch

September 24

09.15 AM (EDT)

Keynote

Chloe Messdagh

James G. Stavridis

45MINS I EN

Geopolitics and Leadership in the Time of Coronavirus

10.45 AM (EDT)

Francis Nadeau

Francis Nadeau

HydraLab
45MINS I FR

L’identité numérique, un pilier de l’écosystème intelligent blockchain

Christopher Hills

Christopher Hills

BeyondTrust
45MINS I EN

A Hackers Dream: Unmanaged Privileges

Nico Popp

Nico Popp

Forcepoint
45MINS I EN

SASE: New reality and cloud security

12.15 PM (EDT)

Keynote

Miju Han

Miju Han

HackerOne
45MINS I EN

Hacker-Powered Data:
The Most Common Security Weaknesses and How to Avoid Them

01.45 PM (EDT)

Nadeau Carnus Novis

Maxime Nadeau, Romain Carnus & Mathieu Novis

GoSecure
45MINS I EN

On the Shoulder of Giants: Reviving WSUS Attacks

Andy Srei

Andy Skrei

Exabeam
45MINS I EN

SOC Automation: Faster Decision Making and Response

Nathan Smolenski

Nathan Smolenski

Netskope
45MINS I EN

The Impact of Digital Transformation in the Face of Today’s Threats

03.15 PM (EDT)

Keynote

Daniel Wiley

Daniel Wiley

Check Point
45MINS I EN

Incident Response Lessons Learned From the Front Lines

Session

Jean-Frederic Gauron & Julien Pineault

Jean-Frédéric Gauron &
Julien Pineault

GoSecure
45MINS I EN

Forget your Perimeter: From Phishing Email to Full VPN Compromise

04.15 PM (EDT)

Mathieu Hinse

Mathieu Hinse

Intact Financial Corporation
45MINS I FR

Blue team 101 – analyses, procédures et astuces pour débuter

Jonathan Ehret

Jonathan Ehret

RiskRecon
45MINS I EN

The Neighborhood Watch: Using Continuous Monitoring to Increase Visibility and Effectiveness of TPRM programs

Tod Bearsley & BobRudis

Tod Bearsley & Bob Rudis

Rapid7
45MINS I EN

A Hitchhiker’s Guide to the 2020 National • Industry • Cloud Exposure Report (NICER)

05.30 PM (EDT)

Michael Harlev

Michael Harlev

CyberArk
45MINS I EN

Guidance to a well defined Privileged Access Management Program

Derek Manky

Derek Manky

Fortinet
45MINS I EN

Lighting it Up – Building Playbook Heat Maps

Bryan Whyte

Bryan Whyte

Sonatype
45MINS I EN

2020 State of the Software Supply Chain