SPEAKERS

Keynote

The Right Honourable Stephen J. Harper

The Right Honourable Stephen J. Harper

22nd Prime Minister of Canada, Chairman and CEO of Harper & Associates, Co-founder and Chairman of Vision One

For nearly a decade The Right Honourable Stephen J. Harper led Canada through the world’s most complex geopolitical, economic and security challenges as the country’s 22nd Prime Minister.

Since leaving office in 2016, Mr. Harper founded and is Chairman and CEO of Harper & Associates, a global strategic advisory firm, and the co-founder and Chairman of Vision One, a Miami-based investment fund. Mr. Harper is also the author of “Right Here, Right Now: Politics and Leadership in the Age of Disruption”, and a frequent speaker on geopolitical trends, technology, and business.

Fireside Chat hosted by Gary Smith – Executive Vice President, Operations and Innovation at Fortis Inc.

Daniel Wiley

Daniel Wiley

Head of Threat Management and Chief Security Advisor at Check Point Software Technologies

Daniel Wiley, Head of Threat Management and Chief Security Advisor, manages Check Point’s advanced security operations including Check Point Incident Response Service. His core responsibility is to bridge the gap between product and operational security and to provide actionable intelligence to Check Point customers. Daniel is an experienced cybersecurity leader with over 25 years of experience in the Cybersecurity industry, including government, civilian and service provider environments.

Keynote: Lessons and Observations from Incident Response and MDR teams

Alain Sanchez

Alain Sanchez

EMEA CISO at Fortinet

Alain Sanchez has more than twenty years of experience in networking and telecommunications. Alain joins Fortinet’s EMEA Field CISO office from Accenture, Huawei, Alcatel-Lucent, BT Global Services and Nortel, where he held senior management positions advising leading enterprises and operators on their digital transformation.   As Fortinet’s EMEA Field CISO, his role enables him to keep abreast of key developments in cybersecurity solutions, best implementation practices and pragmatic approaches to making our hyper-connected world a safer place.  Alain holds an engineering degree from the Université de Technologie de Compiègne and a Diplôme d’études approfondies in Industrial Process Analysis.

Keynote: The Future of Cybersecurity

Kristopher Russo

Kristopher Russo

Consultant at Palo Alto Networks

With a career spanning more than 15 years in information security, Kristopher Russo has a deep understanding of how cybersecurity essentials are applied across a range of industries. As a consultant at Unit 42, he brings to client engagements an extensive knowledge of incident response, threat hunting, forensics, and risk management, as well as a deep understanding of threat actors’ tactics and of how to identify and deploy countermeasures that fit an organization’s unique risk profile

    Keynote: Evolution of Threats: Analyzing Pre-Mortem Retrospective Lessons


    Daniel Couillard

    Daniel Couillard

    Director General of Partnerships and Risk Mitigation (PRM) at Canadian Centre for Cyber Security (Cyber Centre)

    Daniel was previously Director General of Program Evolution at the Cyber Centre. He was responsible for leading strategic business change and enabling agile decision-making in the context of the complex and dynamic cyber security ecosystem. 

    Daniel previously worked as a military officer with the Canadian Armed Forces, where he held appointments in the operational and technological domains, including overseas deployments. After spending 20 years with the military, he joined CSE’s Cyber Defence team in 2006 to oversee the management of its Technical Threat and Analysis capability. He holds a bachelor’s degree in Engineering from the Royal Military College of Canada and a Master’s in
    Science from the Université du Québec à Montréal.

    Dr. Andréanne Bergeron

    Dr. Andréanne Bergeron

    Cybersecurity Researcher at GoSecure

    Andréanne Bergeron has a Ph.D. in Criminology from the University of Montreal and works as a cybersecurity researcher at GoSecure. Acting as the social and data scientist of the team, she is interested in online attackers’ behaviors. She is involved in the infosec community as the VP engagement and outreach for Northsec. Her experience as a speaker includes BlackHat USA, DefCon, BSides Montreal, NorthSec, CypherCon and Human Factor in Cybercrime among others.

    Keynote: Unparalleled RDP Monitoring Reveal Attackers’ Tradecraft

    Olivier Bilodeau

    Olivier Bilodeau

    Cybersecurity Research Director at GoSecure

    Olivier Bilodeau leads the Cybersecurity Research team at GoSecure. With more than 12 years of infosec experience, he enjoys luring malware operators into his traps and writing tools for malware research. Olivier is a passionate communicator having spoken at several conferences including BlackHat USA/Europe, Defcon, Botconf, Derbycon, and HackFest. Invested in his community, he co-founded MontréHack, is the President of NorthSec and host its Hacker Jeopardy.

    Keynote: Unparalleled RDP Monitoring Reveal Attackers’ Tradecraft

    Speakers

    Rick Vanover

    Rick Vanover

    Platinum Sponsor Speaker - Senior Director of Product Strategy at Veeam Software

    Rick Vanover (Microsoft MVP, Cisco Champion, VMware vExpert) is Senior Director of Product Strategy for Veeam Software based in Columbus, Ohio. Rick’s experience includes system administration and IT management; with virtualization, cloud and storage technologies being the central theme of his career recently. In his role at Veeam, Rick sits at the crossroads of many types of storage. Whether it is storage systems, critical application data, data in the cloud or data anywhere in between; Rick has experience in the data management practice as IT practices change with new technologies.

    Session: Practical Tips for Data Security and Data Protection Alignment

    Patrick Blais

    Patrick Blais

    Platinum Sponsor Speaker - Principal Solutions Engineer at NetScout Systems, Inc.

    Patrick is a Principal Solutions Engineer for NETSCOUT and lives in Ontario, Canada. He earned his Bachelor of Science in Computer Engineering and holds multiple certifications such as AWS Certified Solutions Architect Professional, AWS Certified Security Specialty, Azure Certified Solutions Architect Expert, Certified Cloud Security Professional (CCSP), Splunk Certified Architect and Project Management Professional (PMP). Patrick has been helping customers solve problems at NETSCOUT for over 10 years and has been involved in multiple successful deployments of solution components across all the NETSCOUT product portfolio.

    Session: A Convenient Truth

    Jonathan Ha-Tran

    Jonathan Ha-Tran

    Platinum Sponsor Speaker - Sales Engineer at Zscaler

    Jonathan Ha-Tran is a seasoned cybersecurity professional with a wealth of experience in the field, specializing in risk management and cloud security. With a notable career at Deloitte, Ernst & Young and Zscaler, Jonathan has made significant contributions to the cybersecurity landscape. He excelled in conducting thorough risk assessments, identifying vulnerabilities, and delivering strategic recommendations to enhance clients’ security frameworks.

    Jonathan’s journey led him to join Zscaler, a renowned cloud security company, where he continued to expand his expertise in safeguarding organizations against advanced cyber threats. As a member of the Zscaler team, he actively contributed to the development and implementation of cutting-edge cloud security solutions. Jonathan’s dedication to assisting clients in adopting Zero Trust architectures and embracing secure digital transformation has been instrumental in their success.

    Session: The Elements of a Zero Trust Architecture

    Bryan Whyte

    Bryan Whyte

    Platinum Sponsor Speaker - Director Sales Engineering at Sonatype

    Bryan Whyte, CISSP holds a Masters in Electrical Engineering and has spent over 20 years developing software applications to test hardware such as Torpedoes, Circuit Boards and Digital Subscriber Line (xDSL) modems. He has contributed to product development for Embedded and Distributed Enterprise Applications. He joined IBM Security in 2015 as a Technical Pre-Sales Engineer focused on the AppScan tool suite for Static, Dynamic and Mobile Application Security Testing. He joined Sonatype in 2019 because the growth of Open Source Software has made Software Composition Analysis critical to Application Security.

    Session: Maximizing the Potential of Software Supply Chain Security with Better Consumption

    John Engates

    John Engates

    Platinum Sponsor Speaker - Field Chief Technology Officer at Cloudflare, Inc.

    John Engates joined Cloudflare in September of 2021 as Field Chief Technology Officer and is responsible for leading the Field CTO organization globally. Prior to Cloudflare, John was Client CTO at NTT Global Networks and Global CTO at Rackspace Technology, Inc. Earlier in his career, John helped launch one of the first Internet service providers in his hometown of San Antonio, Texas.

    John is a graduate of the University of Texas at San Antonio and lives in Texas with his wife and
    two daughters. He is passionate about technology and enjoys mountain biking, snowboarding,
    and spending time traveling with his family

    Session: Internet Threat Radar – The Current Cyber Threat Landscape

    Valentin Bourneuf

    Valentin Bourneuf

    Platinum Sponsor Speaker - Sr. Customer Success Manager at OKTA

    With over a decade of experience in the cybersecurity domain across France and Canada, Valentin established his roots in network telecommunication. His ensuing roles in consulting firms at Deloitte and Onepoint enriched his expertise, from comprehensive cybersecurity assessments to crafting strategic roadmaps and implementing robust security solutions in various industries. Recently, Valentin’s focus has shifted towards cloud security, underscoring the critical importance of identity. This transition led him to Okta, the leading independent Identity provider, where he serves as a trusted advisor, helping customers refine and enhance their identity practices.

    Session: Identity Powered Zero Trust

    Keith Lax

    Keith Lax

    Platinum Sponsor Speaker - Senior Manager, Sales Engineering at ForgeRock

    Keith is an Identity Enthusiast and has over sixteen years experience in the cybersecurity space spread across roles in development, deployment, and sales engineering. He is a results-driven leader, managing teams of sales engineers focused on strategic accounts including government, financial, and retail verticals across the US and Canada. Keith has an extensive knowledge of security related applications with a focus on identity management, access management, governance, public-key infrastructure (PKI), and consumer identity. Prior to ForgeRock, Keith also held technical positions at Symantec and Entrust.

    Session: Protect Your Customers Against Identity Fraud

     

    Marc-André Bélair

    Marc-André Bélair

    Platinum Sponsor Speaker - Cybersecurity Specialist at Rubrik

    With over two decades of dedicated experience in the field of IT infrastructure and cybersecurity, Marc-André has consistently demonstrated an understanding of cutting-edge technology solutions and a commitment to safeguarding digital assets. As a trusted industry professional, Marc-André has played a pivotal role in assisting organizations of all sizes in fortifying their IT landscapes while aligning technology investments with strategic business goals. Over the past 5 years, Marc-André has been instrumental in helping organizations secure and manage their most critical data at Rubrik.

    Session: Backup ≠ Cyber Recovery

     

    Mick Leach

    Mick Leach

    Gold Sponsor Speaker - Head of Security Operations at Abnormal Security

    Mick Leach is Head of Security Operations at Abnormal Security, where he is responsible for threat monitoring and detection, incident response and handling, vulnerability management, and identity and access management. A cornerstone to his mission is ensuring that Abnormal employees stay safe from email attacks using, you guessed it—Abnormal. Prior to joining Abnormal, he led security operations and engineering teams at Alliance Data and Nationwide Insurance, and previously spent more than 8 years serving in the US Army’s famed Cavalry Regiments.

    He is a passionate information security practitioner with 7 active certifications from SANS/GIAC. When not digging through logs or discussing operational metrics, Mick can typically be found on a soccer field, coaching one of his 13 kids.

    Session: Stop Phishing for Needles in a Haystack: How Phish are Crushing Your SOC

    Nathan Wenzler

    Nathan Wenzler

    Gold Sponsor Speaker - Chief Security Strategist at Tenable

    Nathan Wenzler is the Chief Security Strategist at Tenable, the Exposure Management company. Nathan has nearly 25 years of experience both in the trenches of and as executive management of Information Security programs for government agencies and private sector firms alike, often building them from scratch. He has served as an executive management consultant and vCISO for C-suite execs across a wide array of Fortune 1000, nonprofit and government organizations looking to optimize and improve their security programs focusing on process, program and personnel improvements to mature and accelerate their Information Security and risk management efforts.

    Nathan’s focus areas include vulnerability management, privileged access management, incident response, process and workflow improvements, executive level program management and the human-focused aspects of InfoSec. Nathan has 25 years of experience in the trenches of and as CISO of InfoSec programs for government agencies and private sector firms alike, often building them from scratch. He has served as a management consultant and vCISO for C-suite execs looking to optimize and improve their security programs.

    Session: Master the 3 Levels of Risk Decision-Making

    Nadir Izrael

    Nadir Izrael

    Gold Sponsor Speaker - Founder of Armis

    Nadir Izrael guides the technology vision for Armis. Drawing from his deep programming and software engineering expertise, he has overseen the rapid evolution of the Armis platform to provide complete asset visibility and security for every enterprise asset. Nadir co-founded Armis in 2015 with his friend and army colleague, Yevgeny Dibrov, after the two started looking for new and interesting problems to solve in technology.

    Prior to founding Armis, Nadir spent four years as a senior software manager at Google, working on Google Maps and Google Autocomplete. He began his career in the Israel Defense Forces in the elite Unit 8200 intelligence corps where he served first as a software developer and then as a team leader, ultimately achieving the rank of captain. Beyond helping to solve visibility and security challenges for connected assets, he is adept at creating simulations of particle systems and cosmological models, and is very experienced with machine learning algorithms and statistical models. Nadir holds Bachelor of Science degrees in computer science and physics from the Technion, the Israel Institute of Technology, finishing summa cum laude.

    Session: Security in a hyper-connected, asset-driven world & the real world attacks that follow

    Maurice Côté

    Maurice Côté

    Gold Sponsor Speaker - Vice-President of Products at Devolutions

    Maurice Côté, Vice-President of Products at Devolutions, brings over 15 years of IT experience to the company’s team. For 12 years, he served in the Canadian Forces as an avionics technician and instructor, acquiring solid technical and pedagogical experience. Maurice Côté has held positions as system, network and database administrator, solutions architect and team manager. Thanks to his versatile expertise, he has successfully completed a number of projects for world-renowned companies in the medical industry and online marketing.

    Session: Managing passwords is obsolete, manage privilege instead!

    Moshe Toledano

    Moshe Toledano

    Gold Sponsor Speaker - Partner - Cybersecurity, Privacy & Financial Crime at PwC Canada

    Moshe is a Partner at PwC Canada and leads their Quebec Cybersecurity, Privacy and Financial crime practice which includes practitioners specialized in cybersecurity, privacy, fraud, anti-money laundering, sanctions, forensics and crisis management. Moshe has over 20 years of cybersecurity experience and has worked with organizations across multiple industries in North America and Europe. Moshe has also had the privilege of being the Chief Information Security Officer for several prominent Quebec organizations which provides him with a firsthand perspective of the cybersecurity challenges faced by organizations.

    Shawn McCabe

    Shawn McCabe

    Gold Sponsor Speaker - Engineering Director at Delinea

    Shawn McCabe is The Director of Engineering for US Public Sector and Canada at Delinea, a Privileged Access Management industry leader that focuses on the challenges of securing privilege in today’s complex Enterprise environments. Previously, Shawn has led engineering teams and has held various roles in the Security, Identity and Access Management sector. These roles also included a long stint at the U.S. Department of Defense.

    Session: Reduce liability with a Zero Standing Privileges Approach

    Tracy Walker

    Tracy Walker

    Gold Sponsor Speaker - Sr. Security Engineer at Gologic

    Tracy Walker is a Sr. Security Engineer with 30 years in internal I.T. delivering software and technology projects from start-ups to Fortune 100. As a NeuVector specialist, Mr. Walker assists organizations automating zero-trust security layers within their container and Kubernetes environments.

    Session: Zero Effort Zero Trust for blocking Zero Day attacks in Kubernetes

    Kacey Maher

    Kacey Maher

    Gold Sponsor Speaker - Senior Solutions Consultant at Sailpoint

    Jack-of-all-trades IT professional with 24+ years of industry experience. 17+ years experience in IAM & Identity Security. Kacey a technical resource with exceptional social skills who’s worked the entire line of the professional services & consulting field. As an in-house IAM vendor analyst and architect Kacey has designed, delivered, upgraded, re-built and supported complex large scale IAM solutions for industry leaders in the Healthcare, Finance, Insurance, Retail, Education and Government spaces.

    The first part of his IT career was spent as a Windows/Unix Network Admin and consultant. The remainder has been dedicated to developing, selling, delivering, supporting and teaching IAM. 
    MSCE certified since ’99
    Bachelor of Computer Science: Software Systems from Concordia ’06
    IAM integration specialist and trainer since ’06

    Session: Building a successful identity program – where to start your identity journey

    Guillaume Ross

    Guillaume Ross

    Deputy CISO - JupiterOne

    Guillaume Ross is a seasoned cybersecurity professional with over a decade of experience, specializing in building blue teams, cloud security, and wielding ridiculously old but amazingly still useful Active Directory security skills. As a veritable relic in the field, Guillaume once held a CISSP certification but chose to part ways with ISC2 due to disagreements.

    Guillaume’s passion for cybersecurity is both contagious and hilarious. He actively participates in the security community, presenting at conferences, contributing to open-source projects, and mentoring aspiring professionals. His ability to break down complex concepts into easily digestible and humorous content has made him a sought-after speaker at events like BsidesLV.

    Session: Using the Cyber Defence Matrix (CDM) to Understand Security (pre-recorded)

    Mathieu Saulnier

    Mathieu Saulnier

    Mathieu Saulnier is a security enthusiast and Core Mentor for Defcon’s Blue Team Village. While leading Sumo Logic’s Threat Labs, he focused on research, hunting & detecting adversaries. With 2 decades now in the security space, he’s had the opportunity to work for amazing organizations and make an impact in cyber defense. He shared his passion at Derbycon, SANS Summits and RSA, amongst others.

    Session: Password Audit Cracking in AD: The Fun Part of Compliance

    Michael Goetzman

    Michael Goetzman

    Hacker & Cybersecurity Leader at Solano

    Michael Goetzman, Hacker & Cybersecurity Leader, enjoys experimenting with cloud security applications, genetics/bio-hacking, hacking connected devices, and examining the confidentiality of critically sensitive connected products, medical devices, and electronic medical records.

    He holds a Masters of Science (M.Sc) in Business Management involving international healthcare studies in Havana, Cuba along with earning his CISSP. and 10+ other certifications. In his free time, Michael enjoys exotic rides in zeppelins, soaring in experimental planes, and piloting colorful hot air balloons around rural Wisconsin.

    Michael believes in freedom of non-harmful information, equality before the law, the advancement of scientific fringe research by the way of individual imperatives.

    Session: Evolving from Cyberpunk to Solarpunk: Actionable Guidance from a hacker for hope into the future

    Vicky Desjardins

    Vicky Desjardins

    Ph. D. candidate and Cyber threat intelligence analyst at Hitachi Systems Security

    Vicky Desjardins is a criminology PhD candidate and a cyber threat intelligence analyst at Hitachi Systems Security. Her PhD dissertation is on the coevolution of ransomware attacks from a game theory perspective.

    Her master’s degree was on the prioritization of risk of offline sexual contacts against minors in online sex solicitations. Vicky’s expertise focuses on understanding criminal behaviours and viewing risk from a criminal opportunity perspective.

    Her curiosity of criminal behaviours is at the heart of all her research projects and work. Her experience as a researcher help build the methodology skills needed to perform multiple types of research that have the goal to make the world a better place.

    Session: Hackers, threats & vulnerability management – Stealerlogs: The doggy door to your organisation

    Victor De Luca

    Victor De Luca

    Sales Engineer at Zscaler

    Having started his career in the Canadian Armed Forces, Victor has worked in the security field for the past 10 years and specialized in information security for the last 6. He holds a B.Sc. and a M.Eng. in cyber security. In the private sector, he has assisted numerous organizations to recover from information breaches and improve their internal controls to reduce information leakage.

    Victor is primarily focused on helping organizations protect critical systems and sensitive information from attackers. In his spare time, Victor enjoys writing blog posts on his Medium and studying to obtain his MBA in business management.

    Session: The 5 obstacles organizations forget when designing their cybersecurity program

    Paul Figura

    Paul Figura

    Chief Architect at Indigo Consulting

    Paul Figura is a Chief Architect at Indigo Consulting with nearly two decades of Identity and Access Management (IAM) expertise, Paul has developed a robust skillset and deep IAM expertise across a wide variety of product suites and deployment environments. Paul’s IAM career first started in 2008, and since then he has continuously demonstrated his deep understanding of the many critical aspects of Authentication, Authorization, and Identity Management and Governance.

    Session: How to Design Single Page Apps with a BFF to make API calls Securely and Prevent Token Hijacking

    Anna Sarnek

    Anna Sarnek

    Head of Strategic Alliances - Valence Security

    Anna Sarnek is a highly experienced strategic business development professional, launching innovative product lines and driving growth through strategic partnerships. With over 10 years of experience in the field, Anna has a technical background and a macro-level perspective on technology problems, allowing her to identify unique joint development and go-to-market opportunities.

    Her background in cybersecurity, international relations, and economics positions her to provide a unique perspective on how cybersecurity is a financial sustainability risk to the business and the economy, as well as how it ties into ESG. Anna is the former Head of Technology Alliances at RSA and the Head of Risk Solutions and Strategic Alliances at SecurityScorecard. She is currently the Head of Strategic Alliances at Valence Security where she’s helping to automate the SaaS security implementation and remediation. She also volunteers as a content contributor for Women in Identity where she drives the conversation around equity and inclusivity in identity security.

    Session: Two steps forward for SaaS Adoption, One Step Back for SaaS Security

    Dr. Ahmed Refaey Hussein

    Dr. Ahmed Refaey Hussein

    Professor in the School of Engineering at the University of Guelph

    Dr. Ahmed Refaey Hussein is a renowned cybersecurity expert specializing in cloud security and large-scale distributed denial of service attacks. He holds a Ph.D. from Laval University and currently serves as an Assistant Professor at the University of Guelph and an Adjunct Research Professor at Western University in Canada. Before his academic career, he excelled in the telecom industry, leading teams at prominent companies like Fujitsu, Vodafone, and Alcatel-Lucent in Egypt. His research has led to significant advancements in wireless communications hardware implementations.

    Throughout his illustrious career, Dr. Hussein has been instrumental in developing an open-source version of the software-defined perimeter reference architecture, addressing large-scale distributed denial of service attacks. He has made notable contributions to cloud security standards, collaborating with organizations like the US National Institute of Standards and Technology (NIST) and the Cloud Security Alliance. His current research focuses on key management challenges in the blackened cloud, exploring control authentication and encryption keys in the context of the zero-trust concept. With over 80 technical articles, one granted patent, and three patent applications to his name, Dr. Ahmed Refaey Hussein continues to shape and elevate the field of cybersecurity.

    Session: Zero-Trust Architecture: Securing Next-Generation Networks

    Steve Waterhouse

    Steve Waterhouse

    It was during his military career with the Royal 22nd Regiment that Capt(ret) Steve Waterhouse swapped his gun for a keyboard and became one of the first cyber-soldiers in Canada. After working on the training of soldiers and officers in combat arms, Steve then worked on the establishment of the first military administrative networks at QGSQFT, at the Montreal base and at the Royal Military College Saint-Jean with the Canadian Armed Forces, as well as the implementation of modern cybersecurity practices as the first Information Systems Security Officer (OSSI).

    He continues to share his passion and his experience as a lecturer at the University of Sherbrooke as part of the master’s microprogram in information security – prevention component. He is invited
    to bring his experience and expertise to the committees of the House of Commons of Canada and to the National Assembly of Quebec and is frequently asked by the Canadian media to comment on cybersecurity issues. Steve also served as the first Assistant Deputy Minister for Government Security and Cybersecurity in Quebec’s Ministry of Cybersecurity and Digital Affairs until early 2023.

    Session: Have we improved our resilience to technological change in 25 years?

    Gary Givental

    Gary Givental

    Chief Architect, X-Force Platform, Security Services at IBM

    Gary Givental, is known for his comprehensive expertise in security analytics and automation. His career journey, commencing in 1998 with Netrex, advancing through ISS, and ultimately leading him to IBM, exemplifies his enduring commitment to innovation and technical excellence. Equipped with a Bachelor’s degree in Computer Engineering from the University of Michigan and a Master’s degree in Software Engineering from Lawrence Technological University, Gary’s robust academic credentials underpin his profound technical skills. From 2014-2018, he served as an Adjunct Faculty at Lawrence Technological University, imparting his wisdom in Software Engineering and Artificial Intelligence. Gary’s unique ability to amalgamate technology and operational efficiency is evident in his co-creation of the Advanced Threat Disposition System (ATDS), a key threat triage and automation capability for IBM’s X-Force Protection Platform. Furthermore, his architectural acumen was key to the development of the Advanced Ticket Routing platform, leading to significant process automation. Recently, he has been delving into the groundbreaking realms of Generative Pretrained Transformers (GPT) and Large Language Models (LLMs), further demonstrating his foresight and adaptability. Receiving the 2020 People’s Choice Culture Award, Gary epitomizes a balanced blend of personal and professional excellence, contributing to the software industry as a seasoned technologist, a committed mentor, an inventor with over a dozen patents and a driven leader.

    Session: Pragmatic and Trustworthy AI in Cybersecurity

    Evgeniy Kharam

    Evgeniy Kharam

    Cybersecurity Architect and Advisor, Podcaster at Security Architecture

    Evgeniy Kharam is a seasoned cybersecurity expert with over 20 years of experience, boasting 40,000 hours of pre and post-sales support as an architect and principal consultant for medium to large enterprises. His technical expertise spans Endpoint and Network Security, SIEM/SOC/SOAR, SASE/SEE, VMS, and Cloud Security. Evgeniy spent 15 years at the Herjavec Group as the VP of Security Architecture. In addition to running his own cybersecurity consulting service and media company, Evgeniy has produced over 200 episodes of podcasts, live shows, panel moderations, webinars, and technical training, becoming a prominent figure in the cybersecurity media landscape. He currently provides cybersecurity guidance to vendors, VARs, and MSSPs

    Session: Mastering Vendor Engagement in Cybersecurity

    Thomas Veynachter

    Thomas Veynachter

    CEO at Neotrust Canada

    Thomas is a seasoned cybersecurity expert with 15 years’ experience in the banking sector. Passionate about business transformation, he is recognized for his advanced technical skills in cryptography. After starting out as an information systems security administrator, he quickly rose through the ranks to become head of the secret management team at a major financial institution.

    This experience led him to set up encryption and key management service offerings, offering a high level of availability for crucial issues such as data protection and the prevention of cyber-attacks. Thanks to his leadership, Thomas has played a key role in the organizational transformation of the bank’s cybersecurity teams, encouraging a proactive approach to security.

    His passion for continuous improvement was reflected in his work with the teams, guiding them towards greater maturity in their daily deliveries. Today, as head of Neotrust’s Canadian office, Thomas has built up a team of cybersecurity experts capable of supporting their customers on two distinct levels.

    Session: Why a proactive security approach is link to a constant cyber transformation and what is the benefits for companies?

    Michel Juneau Katsuya

    Michel Juneau Katsuya

    Expert in Threat Assessments and Security Intelligence

    Well-known Canadian expert, author, and commentator at home and abroad, Michel has gained recognition for his direct and practice-oriented approach to threat and security assessment. With more than 40 years of service in the fields of counterintelligence and security intelligence assessments, he served in the Royal Canadian Mounted Police (RCMP) and subsequently in Canadian Security Intelligence Service (CSIS) as a senior manager and field intelligence officer. Since returning to civilian life, he has served on missions in more than 50 countries where he has led various security projects. Michel did his post-grad studies in political philosophy and now teaches criminology at various universities. He is regularly requested as analyst/commentator by various national and international media on public and national security issues. Michel is often requested to testify as an Expert-Witness at various parliamentary and senate committees on national security and intelligence as well in some Court of Justice. He has published books on intelligence and espionage activities in Canada as well as being the author and host of a TV series on Historia about espionage cases in Canada.

      Laure Bonnave

      Laure Bonnave

      Senior Counsel at Clyde & Co Canada s.e.n.c.r.l.

      As a Senior Counsel at Clyde & Co Canada, Laure Bonnave serves as a “breach coach” in cases involving cybersecurity incidents, including data breaches or privacy breaches. In the scope of her practice, she has advised clients on numerous cyber incidents, both locally and internationally.

      In her role, Laure regularly provides her clients with expertise in managing cyber incidents, which includes:

      Overall management of responses to incidents and coordination with service providers.
      Responses to ransomware attacks and data recovery.
      Analysis and reporting of data protection breaches.
      Handling cases of payment diversion fraud, locating funds, and recovering them.
      Developing a communication strategy and managing stakeholders.
      Preparing reports for regulatory authorities.
      Managing risks related to class actions following a privacy breach.

      Session: How to minimize legal risks in the event of a security incident?

      Mathieu Roy

      Mathieu Roy

      Client Delivery Executive at Indigo Consulting

      Mathieu Roy is a Client Delivery Executive at Indigo Consulting, and has been working in the IT security field for 20 years, including 15 years in identity and access management (IAM). Over the past few years, Mathieu has held a number of management positions in the field of identity and access management, enabling him to gain valuable experience in this area, particularly in terms of strategy deployment and program management. Always striving for team cohesion and accountability, Mathieu has also held a number of management positions, giving him an enriching and diversified experience.

      Session: Strategic deployment in GIA: How to get through?

      François Lepire

      François Lepire

      Solutions Architecture Advisor at iA Financial Group

      A long-time contributor to IAM, François has worked in various roles in IAM teams. From technician, to analyst, to consultant, to product owner and today, as principal architect, François has tangible experience of what the reality of each position entails. This gives him an unparalleled perspective and experience allowing him to brilliantly measure the impacts of governance decisions relating to the normative framework.

      Whether for optimizations, product management, detailed or reference architectures, François is an undeniable asset that can allow you to benefit from a trusted actor committed to your success. Finally, he specializes in roadmap development, detailed and reference architecture, as well as the deployment of IGA, CIAM and PAM solutions.

      Session: Strategic deployment in GIA: How to get through?

      Research Speakers

      François Proulx

      François Proulx

      Senior Product Security Engineer at BoostSecurity

      François is a Senior Product Security Engineer for BoostSecurity, where he leads the Supply Chain research team. With over 10 years of experience in building AppSec programs for large corporations (such as Intel) and small startups he has been in the heat of the action as the DevSecOps movement took shape. François is one of founders of NorthSec and was a challenge designer for the NorthSec CTF.

      Session: Broken Links: Behind the Scenes of Supply Chain Breaches

      Dr. Andréanne Bergeron

      Dr. Andréanne Bergeron

      GoSecure

      Andréanne Bergeron has a Ph.D. in Criminology from the University of Montreal and works as a cybersecurity researcher at GoSecure. Acting as the social and data scientist of the team, she is interested in online attackers’ behaviors. She is involved in the infosec community as the VP engagement and outreach for Northsec. Her experience as a speaker includes BlackHat USA, DefCon, BSides Montreal, NorthSec, CypherCon and Human Factor in Cybercrime among others.

      Session: The Clash of Experts: How good of a solution are password managers?

      Olivier Bilodeau

      Olivier Bilodeau

      GoSecure

      Olivier Bilodeau leads the Cybersecurity Research team at GoSecure. With more than 12 years of infosec experience, he enjoys luring malware operators into his traps and writing tools for malware research. Olivier is a passionate communicator having spoken at several conferences including BlackHat USA/Europe, Defcon, Botconf, Derbycon, and HackFest. Invested in his community, he co-founded MontréHack, is the President of NorthSec and host its Hacker Jeopardy.

      Session: The Clash of Experts: How good of a solution are password managers?

      Alexandre Côté Cyr

      Alexandre Côté Cyr

      Malware Researcher at ESET

      Alexandre is a malware researcher at ESET since 2021. Working with the Montreal team, his research is focused on tracking APT groups and their toolsets. He has previously presented about APTs and attribution at Botconf, Sleuthcon, Hackfest, and BSidesMTL. He is also involved in mentoring students getting started in infosec. His interests include operating systems fundamentals and writing shell scripts to automate tasks that don’t always need to be automated.

      Session: Life on a Crooked RedLine : Analyzing the Infamous InfoStealer’s Back End

      Mathieu Lavoie

      Mathieu Lavoie

      CTO & Co-Founder of Flare

      Mathieu Lavoie is co-founder and CTO of Flare. He obtained his B.Eng. from the ÉTS. After being a malware researcher for a few years, he worked as a pentester and then as a security team lead in a large financial institution. He was also a strategic advisor for senior executives regarding cybersecurity and blockchain initiatives. He has spoken at security conferences such as HOPE, BotConf, Sleuthcon and NorthSec

        Session: Life on a Crooked RedLine : Analyzing the Infamous InfoStealer’s Back End

        Workshop Leaders

        Simon Drapeau

        Simon Drapeau

        Security Engineering Manager at Check Point Software Technologies

         Simon Drapeau is currently the Security Engineering Manager at Check Point Software Technologies Ltd for Eastern Canada, one of the leading global providers of cybersecurity solutions. Simon has over 25 years of experience in large-scale security architecture, design, and deployment projects for government and private organizations in the province of Quebec. The engineering team assists organizations in better managing security risks related to cyber threats. They provide information, guidance, and act as trusted advisors, staying on top of the technical and operational challenges that many organizations face and how Check Point solutions can help. An expert in the field of cybersecurity, his first experience with Check Point solutions dates back to 1997. His hands-on experience with Check Point solutions is his key asset.

        Workshop: Check Point Solutions for Quantum, focusing on Quantum Maestro (hyperscale) and Quantum Spark (SD-WAN and ruggedized SMB appliances).

        Xavier Bensemhoun

        Xavier Bensemhoun

        Security Specialist at Check Point Software Technologies

        With 20 years of experience in cybersecurity, Xavier has developed practical and recognized expertise. He is certified CISSP and CCSP. He joined Check Point’s team nearly two and a half years ago and is responsible for major and strategic accounts in Eastern Canada.

          Workshop: Check Point Solutions for Quantum, focusing on Quantum Maestro (hyperscale) and Quantum Spark (SD-WAN and ruggedized SMB appliances).

          Maxime Nadeau

          Maxime Nadeau

          Director Ethical Hacking at GoSecure

          Maxime is currently the Director of Ethical Hacking at GoSecure. Jack of all trades, master of some, he does have a pronounced interest in adversary simulation and physical security. Originally a software engineer, he is now conducting intrusion tests and built service offerings that include physical security intrusion and testing. He is a returning presenter at the GoSec conference, cybersecurity competition winner and NorthSec challenge designer.

            Workshop: The Art of Lock Picking

            Temuujin Darkhan

            Temuujin Darkhan

            Security Analyst at GoSecure

            Temuujin is an intrusion tester at GoSecure specializing in embedded systems testing. His expertise intertwined with his drive for security research have made him a cybersecurity resource hub for his team. Previous winner of major cybersecurity competitions, he is now highly involved in creating challenges for the NorthSec event and improving the security landscape via his implication within the cybersecurity community.

              Workshop: The Art of Lock Picking

              Julien Pineault

              Julien Pineault

              Security Analyst at GoSecure

              Julien is a team lead and red teamer in the Ethical Hacking team at GoSecure, His areas of expertise are internal and external intrusion, web application testing and OpSec infrastructure. He specializes in getting the initial foothold in red team engagements and setting the stage for the rest of the intrusion team to perform their work. His interest in security sparked from Capture The Flag competitions, and he continues to be active in the Montréal infosec community, competing at a high caliber in CTF events. When not competing or on engagements, Julien spends his time volunteering for community events like MontréHack.

                Workshop: The Art of Lock Picking