Keynote

The Right Honourable Stephen J. Harper
22nd Prime Minister of Canada, Chairman and CEO of Harper & Associates, Co-founder and Chairman of Vision One
For nearly a decade The Right Honourable Stephen J. Harper led Canada through the world’s most complex geopolitical, economic and security challenges as the country’s 22nd Prime Minister.
Since leaving office in 2016, Mr. Harper founded and is Chairman and CEO of Harper & Associates, a global strategic advisory firm, and the co-founder and Chairman of Vision One, a Miami-based investment fund. Mr. Harper is also the author of “Right Here, Right Now: Politics and Leadership in the Age of Disruption”, and a frequent speaker on geopolitical trends, technology, and business.
Fireside Chat hosted by Gary Smith – Executive Vice President, Operations and Innovation at Fortis Inc.

Daniel Wiley
Head of Threat Management and Chief Security Advisor at Check Point Software Technologies
Daniel Wiley, Head of Threat Management and Chief Security Advisor, manages Check Point’s advanced security operations including Check Point Incident Response Service. His core responsibility is to bridge the gap between product and operational security and to provide actionable intelligence to Check Point customers. Daniel is an experienced cybersecurity leader with over 25 years of experience in the Cybersecurity industry, including government, civilian and service provider environments.
Keynote: Lessons and Observations from Incident Response and MDR teams

Alain Sanchez
EMEA CISO at Fortinet
Alain Sanchez has more than twenty years of experience in networking and telecommunications. Alain joins Fortinet’s EMEA Field CISO office from Accenture, Huawei, Alcatel-Lucent, BT Global Services and Nortel, where he held senior management positions advising leading enterprises and operators on their digital transformation. As Fortinet’s EMEA Field CISO, his role enables him to keep abreast of key developments in cybersecurity solutions, best implementation practices and pragmatic approaches to making our hyper-connected world a safer place. Alain holds an engineering degree from the Université de Technologie de Compiègne and a Diplôme d’études approfondies in Industrial Process Analysis.
Keynote: The Future of Cybersecurity

Kristopher Russo
Consultant at Palo Alto Networks
With a career spanning more than 15 years in information security, Kristopher Russo has a deep understanding of how cybersecurity essentials are applied across a range of industries. As a consultant at Unit 42, he brings to client engagements an extensive knowledge of incident response, threat hunting, forensics, and risk management, as well as a deep understanding of threat actors’ tactics and of how to identify and deploy countermeasures that fit an organization’s unique risk profile
Keynote: Evolution of Threats: Analyzing Pre-Mortem Retrospective Lessons

Daniel Couillard
Director General of Partnerships and Risk Mitigation (PRM) at Canadian Centre for Cyber Security (Cyber Centre)
Daniel was previously Director General of Program Evolution at the Cyber Centre. He was responsible for leading strategic business change and enabling agile decision-making in the context of the complex and dynamic cyber security ecosystem.
Daniel previously worked as a military officer with the Canadian Armed Forces, where he held appointments in the operational and technological domains, including overseas deployments. After spending 20 years with the military, he joined CSE’s Cyber Defence team in 2006 to oversee the management of its Technical Threat and Analysis capability. He holds a bachelor’s degree in Engineering from the Royal Military College of Canada and a Master’s in
Science from the Université du Québec à Montréal.

Dr. Andréanne Bergeron
Cybersecurity Researcher at GoSecure
Andréanne Bergeron has a Ph.D. in Criminology from the University of Montreal and works as a cybersecurity researcher at GoSecure. Acting as the social and data scientist of the team, she is interested in online attackers’ behaviors. She is involved in the infosec community as the VP engagement and outreach for Northsec. Her experience as a speaker includes BlackHat USA, DefCon, BSides Montreal, NorthSec, CypherCon and Human Factor in Cybercrime among others.
Keynote: Unparalleled RDP Monitoring Reveal Attackers’ Tradecraft

Olivier Bilodeau
Cybersecurity Research Director at GoSecure
Olivier Bilodeau leads the Cybersecurity Research team at GoSecure. With more than 12 years of infosec experience, he enjoys luring malware operators into his traps and writing tools for malware research. Olivier is a passionate communicator having spoken at several conferences including BlackHat USA/Europe, Defcon, Botconf, Derbycon, and HackFest. Invested in his community, he co-founded MontréHack, is the President of NorthSec and host its Hacker Jeopardy.
Keynote: Unparalleled RDP Monitoring Reveal Attackers’ Tradecraft
Speakers

Rick Vanover
Platinum Sponsor Speaker - Senior Director of Product Strategy at Veeam Software
Rick Vanover (Microsoft MVP, Cisco Champion, VMware vExpert) is Senior Director of Product Strategy for Veeam Software based in Columbus, Ohio. Rick’s experience includes system administration and IT management; with virtualization, cloud and storage technologies being the central theme of his career recently. In his role at Veeam, Rick sits at the crossroads of many types of storage. Whether it is storage systems, critical application data, data in the cloud or data anywhere in between; Rick has experience in the data management practice as IT practices change with new technologies.
Session: Practical Tips for Data Security and Data Protection Alignment

Patrick Blais
Platinum Sponsor Speaker - Principal Solutions Engineer at NetScout Systems, Inc.
Patrick is a Principal Solutions Engineer for NETSCOUT and lives in Ontario, Canada. He earned his Bachelor of Science in Computer Engineering and holds multiple certifications such as AWS Certified Solutions Architect Professional, AWS Certified Security Specialty, Azure Certified Solutions Architect Expert, Certified Cloud Security Professional (CCSP), Splunk Certified Architect and Project Management Professional (PMP). Patrick has been helping customers solve problems at NETSCOUT for over 10 years and has been involved in multiple successful deployments of solution components across all the NETSCOUT product portfolio.
Session: A Convenient Truth

Jonathan Ha-Tran
Platinum Sponsor Speaker - Sales Engineer at Zscaler
Jonathan Ha-Tran is a seasoned cybersecurity professional with a wealth of experience in the field, specializing in risk management and cloud security. With a notable career at Deloitte, Ernst & Young and Zscaler, Jonathan has made significant contributions to the cybersecurity landscape. He excelled in conducting thorough risk assessments, identifying vulnerabilities, and delivering strategic recommendations to enhance clients’ security frameworks.
Jonathan’s journey led him to join Zscaler, a renowned cloud security company, where he continued to expand his expertise in safeguarding organizations against advanced cyber threats. As a member of the Zscaler team, he actively contributed to the development and implementation of cutting-edge cloud security solutions. Jonathan’s dedication to assisting clients in adopting Zero Trust architectures and embracing secure digital transformation has been instrumental in their success.
Session: The Elements of a Zero Trust Architecture

Bryan Whyte
Platinum Sponsor Speaker - Director Sales Engineering at Sonatype
Bryan Whyte, CISSP holds a Masters in Electrical Engineering and has spent over 20 years developing software applications to test hardware such as Torpedoes, Circuit Boards and Digital Subscriber Line (xDSL) modems. He has contributed to product development for Embedded and Distributed Enterprise Applications. He joined IBM Security in 2015 as a Technical Pre-Sales Engineer focused on the AppScan tool suite for Static, Dynamic and Mobile Application Security Testing. He joined Sonatype in 2019 because the growth of Open Source Software has made Software Composition Analysis critical to Application Security.
Session: Maximizing the Potential of Software Supply Chain Security with Better Consumption

John Engates
Platinum Sponsor Speaker - Field Chief Technology Officer at Cloudflare, Inc.
John Engates joined Cloudflare in September of 2021 as Field Chief Technology Officer and is responsible for leading the Field CTO organization globally. Prior to Cloudflare, John was Client CTO at NTT Global Networks and Global CTO at Rackspace Technology, Inc. Earlier in his career, John helped launch one of the first Internet service providers in his hometown of San Antonio, Texas.
John is a graduate of the University of Texas at San Antonio and lives in Texas with his wife and
two daughters. He is passionate about technology and enjoys mountain biking, snowboarding,
and spending time traveling with his family
Session: Internet Threat Radar – The Current Cyber Threat Landscape

Valentin Bourneuf
Platinum Sponsor Speaker - Sr. Customer Success Manager at OKTA
With over a decade of experience in the cybersecurity domain across France and Canada, Valentin established his roots in network telecommunication. His ensuing roles in consulting firms at Deloitte and Onepoint enriched his expertise, from comprehensive cybersecurity assessments to crafting strategic roadmaps and implementing robust security solutions in various industries. Recently, Valentin’s focus has shifted towards cloud security, underscoring the critical importance of identity. This transition led him to Okta, the leading independent Identity provider, where he serves as a trusted advisor, helping customers refine and enhance their identity practices.
Session: Identity Powered Zero Trust

Keith Lax
Platinum Sponsor Speaker - Senior Manager, Sales Engineering at ForgeRock
Keith is an Identity Enthusiast and has over sixteen years experience in the cybersecurity space spread across roles in development, deployment, and sales engineering. He is a results-driven leader, managing teams of sales engineers focused on strategic accounts including government, financial, and retail verticals across the US and Canada. Keith has an extensive knowledge of security related applications with a focus on identity management, access management, governance, public-key infrastructure (PKI), and consumer identity. Prior to ForgeRock, Keith also held technical positions at Symantec and Entrust.
Session: Protect Your Customers Against Identity Fraud

Marc-André Bélair
Platinum Sponsor Speaker - Cybersecurity Specialist at Rubrik
With over two decades of dedicated experience in the field of IT infrastructure and cybersecurity, Marc-André has consistently demonstrated an understanding of cutting-edge technology solutions and a commitment to safeguarding digital assets. As a trusted industry professional, Marc-André has played a pivotal role in assisting organizations of all sizes in fortifying their IT landscapes while aligning technology investments with strategic business goals. Over the past 5 years, Marc-André has been instrumental in helping organizations secure and manage their most critical data at Rubrik.
Session: Backup ≠ Cyber Recovery

Mick Leach
Gold Sponsor Speaker - Head of Security Operations at Abnormal Security
Mick Leach is Head of Security Operations at Abnormal Security, where he is responsible for threat monitoring and detection, incident response and handling, vulnerability management, and identity and access management. A cornerstone to his mission is ensuring that Abnormal employees stay safe from email attacks using, you guessed it—Abnormal. Prior to joining Abnormal, he led security operations and engineering teams at Alliance Data and Nationwide Insurance, and previously spent more than 8 years serving in the US Army’s famed Cavalry Regiments.
He is a passionate information security practitioner with 7 active certifications from SANS/GIAC. When not digging through logs or discussing operational metrics, Mick can typically be found on a soccer field, coaching one of his 13 kids.
Session: Stop Phishing for Needles in a Haystack: How Phish are Crushing Your SOC

Nathan Wenzler
Gold Sponsor Speaker - Chief Security Strategist at Tenable
Nathan Wenzler is the Chief Security Strategist at Tenable, the Exposure Management company. Nathan has nearly 25 years of experience both in the trenches of and as executive management of Information Security programs for government agencies and private sector firms alike, often building them from scratch. He has served as an executive management consultant and vCISO for C-suite execs across a wide array of Fortune 1000, nonprofit and government organizations looking to optimize and improve their security programs focusing on process, program and personnel improvements to mature and accelerate their Information Security and risk management efforts.
Nathan’s focus areas include vulnerability management, privileged access management, incident response, process and workflow improvements, executive level program management and the human-focused aspects of InfoSec. Nathan has 25 years of experience in the trenches of and as CISO of InfoSec programs for government agencies and private sector firms alike, often building them from scratch. He has served as a management consultant and vCISO for C-suite execs looking to optimize and improve their security programs.
Session: Master the 3 Levels of Risk Decision-Making

Nadir Izrael
Gold Sponsor Speaker - Founder of Armis
Nadir Izrael guides the technology vision for Armis. Drawing from his deep programming and software engineering expertise, he has overseen the rapid evolution of the Armis platform to provide complete asset visibility and security for every enterprise asset. Nadir co-founded Armis in 2015 with his friend and army colleague, Yevgeny Dibrov, after the two started looking for new and interesting problems to solve in technology.
Prior to founding Armis, Nadir spent four years as a senior software manager at Google, working on Google Maps and Google Autocomplete. He began his career in the Israel Defense Forces in the elite Unit 8200 intelligence corps where he served first as a software developer and then as a team leader, ultimately achieving the rank of captain. Beyond helping to solve visibility and security challenges for connected assets, he is adept at creating simulations of particle systems and cosmological models, and is very experienced with machine learning algorithms and statistical models. Nadir holds Bachelor of Science degrees in computer science and physics from the Technion, the Israel Institute of Technology, finishing summa cum laude.
Session: Security in a hyper-connected, asset-driven world & the real world attacks that follow

Maurice Côté
Gold Sponsor Speaker - Vice-President of Products at Devolutions
Maurice Côté, Vice-President of Products at Devolutions, brings over 15 years of IT experience to the company’s team. For 12 years, he served in the Canadian Forces as an avionics technician and instructor, acquiring solid technical and pedagogical experience. Maurice Côté has held positions as system, network and database administrator, solutions architect and team manager. Thanks to his versatile expertise, he has successfully completed a number of projects for world-renowned companies in the medical industry and online marketing.
Session: Managing passwords is obsolete, manage privilege instead!

Moshe Toledano
Gold Sponsor Speaker - Partner - Cybersecurity, Privacy & Financial Crime at PwC Canada
Moshe is a Partner at PwC Canada and leads their Quebec Cybersecurity, Privacy and Financial crime practice which includes practitioners specialized in cybersecurity, privacy, fraud, anti-money laundering, sanctions, forensics and crisis management. Moshe has over 20 years of cybersecurity experience and has worked with organizations across multiple industries in North America and Europe. Moshe has also had the privilege of being the Chief Information Security Officer for several prominent Quebec organizations which provides him with a firsthand perspective of the cybersecurity challenges faced by organizations.

Shawn McCabe
Gold Sponsor Speaker - Engineering Director at Delinea
Shawn McCabe is The Director of Engineering for US Public Sector and Canada at Delinea, a Privileged Access Management industry leader that focuses on the challenges of securing privilege in today’s complex Enterprise environments. Previously, Shawn has led engineering teams and has held various roles in the Security, Identity and Access Management sector. These roles also included a long stint at the U.S. Department of Defense.
Session: Reduce liability with a Zero Standing Privileges Approach

Tracy Walker
Gold Sponsor Speaker - Sr. Security Engineer at Gologic
Tracy Walker is a Sr. Security Engineer with 30 years in internal I.T. delivering software and technology projects from start-ups to Fortune 100. As a NeuVector specialist, Mr. Walker assists organizations automating zero-trust security layers within their container and Kubernetes environments.
Session: Zero Effort Zero Trust for blocking Zero Day attacks in Kubernetes

Kacey Maher
Gold Sponsor Speaker - Senior Solutions Consultant at Sailpoint
Jack-of-all-trades IT professional with 24+ years of industry experience. 17+ years experience in IAM & Identity Security. Kacey a technical resource with exceptional social skills who’s worked the entire line of the professional services & consulting field. As an in-house IAM vendor analyst and architect Kacey has designed, delivered, upgraded, re-built and supported complex large scale IAM solutions for industry leaders in the Healthcare, Finance, Insurance, Retail, Education and Government spaces.
The first part of his IT career was spent as a Windows/Unix Network Admin and consultant. The remainder has been dedicated to developing, selling, delivering, supporting and teaching IAM.
MSCE certified since ’99
Bachelor of Computer Science: Software Systems from Concordia ’06
IAM integration specialist and trainer since ’06
Session: Building a successful identity program – where to start your identity journey

Guillaume Ross
Deputy CISO - JupiterOne
Guillaume Ross is a seasoned cybersecurity professional with over a decade of experience, specializing in building blue teams, cloud security, and wielding ridiculously old but amazingly still useful Active Directory security skills. As a veritable relic in the field, Guillaume once held a CISSP certification but chose to part ways with ISC2 due to disagreements.
Guillaume’s passion for cybersecurity is both contagious and hilarious. He actively participates in the security community, presenting at conferences, contributing to open-source projects, and mentoring aspiring professionals. His ability to break down complex concepts into easily digestible and humorous content has made him a sought-after speaker at events like BsidesLV.
Session: Using the Cyber Defence Matrix (CDM) to Understand Security (pre-recorded)

Mathieu Saulnier
Mathieu Saulnier is a security enthusiast and Core Mentor for Defcon’s Blue Team Village. While leading Sumo Logic’s Threat Labs, he focused on research, hunting & detecting adversaries. With 2 decades now in the security space, he’s had the opportunity to work for amazing organizations and make an impact in cyber defense. He shared his passion at Derbycon, SANS Summits and RSA, amongst others.
Session: Password Audit Cracking in AD: The Fun Part of Compliance

Michael Goetzman
Hacker & Cybersecurity Leader at Solano
Michael Goetzman, Hacker & Cybersecurity Leader, enjoys experimenting with cloud security applications, genetics/bio-hacking, hacking connected devices, and examining the confidentiality of critically sensitive connected products, medical devices, and electronic medical records.
He holds a Masters of Science (M.Sc) in Business Management involving international healthcare studies in Havana, Cuba along with earning his CISSP. and 10+ other certifications. In his free time, Michael enjoys exotic rides in zeppelins, soaring in experimental planes, and piloting colorful hot air balloons around rural Wisconsin.
Michael believes in freedom of non-harmful information, equality before the law, the advancement of scientific fringe research by the way of individual imperatives.
Session: Evolving from Cyberpunk to Solarpunk: Actionable Guidance from a hacker for hope into the future

Vicky Desjardins
Ph. D. candidate and Cyber threat intelligence analyst at Hitachi Systems Security
Vicky Desjardins is a criminology PhD candidate and a cyber threat intelligence analyst at Hitachi Systems Security. Her PhD dissertation is on the coevolution of ransomware attacks from a game theory perspective.
Her master’s degree was on the prioritization of risk of offline sexual contacts against minors in online sex solicitations. Vicky’s expertise focuses on understanding criminal behaviours and viewing risk from a criminal opportunity perspective.
Her curiosity of criminal behaviours is at the heart of all her research projects and work. Her experience as a researcher help build the methodology skills needed to perform multiple types of research that have the goal to make the world a better place.
Session: Hackers, threats & vulnerability management – Stealerlogs: The doggy door to your organisation

Victor De Luca
Sales Engineer at Zscaler
Having started his career in the Canadian Armed Forces, Victor has worked in the security field for the past 10 years and specialized in information security for the last 6. He holds a B.Sc. and a M.Eng. in cyber security. In the private sector, he has assisted numerous organizations to recover from information breaches and improve their internal controls to reduce information leakage.
Victor is primarily focused on helping organizations protect critical systems and sensitive information from attackers. In his spare time, Victor enjoys writing blog posts on his Medium and studying to obtain his MBA in business management.
Session: The 5 obstacles organizations forget when designing their cybersecurity program

Paul Figura
Chief Architect at Indigo Consulting
Paul Figura is a Chief Architect at Indigo Consulting with nearly two decades of Identity and Access Management (IAM) expertise, Paul has developed a robust skillset and deep IAM expertise across a wide variety of product suites and deployment environments. Paul’s IAM career first started in 2008, and since then he has continuously demonstrated his deep understanding of the many critical aspects of Authentication, Authorization, and Identity Management and Governance.
Session: How to Design Single Page Apps with a BFF to make API calls Securely and Prevent Token Hijacking

Anna Sarnek
Head of Strategic Alliances - Valence Security
Anna Sarnek is a highly experienced strategic business development professional, launching innovative product lines and driving growth through strategic partnerships. With over 10 years of experience in the field, Anna has a technical background and a macro-level perspective on technology problems, allowing her to identify unique joint development and go-to-market opportunities.
Her background in cybersecurity, international relations, and economics positions her to provide a unique perspective on how cybersecurity is a financial sustainability risk to the business and the economy, as well as how it ties into ESG. Anna is the former Head of Technology Alliances at RSA and the Head of Risk Solutions and Strategic Alliances at SecurityScorecard. She is currently the Head of Strategic Alliances at Valence Security where she’s helping to automate the SaaS security implementation and remediation. She also volunteers as a content contributor for Women in Identity where she drives the conversation around equity and inclusivity in identity security.
Session: Two steps forward for SaaS Adoption, One Step Back for SaaS Security

Dr. Ahmed Refaey Hussein
Professor in the School of Engineering at the University of Guelph
Dr. Ahmed Refaey Hussein is a renowned cybersecurity expert specializing in cloud security and large-scale distributed denial of service attacks. He holds a Ph.D. from Laval University and currently serves as an Assistant Professor at the University of Guelph and an Adjunct Research Professor at Western University in Canada. Before his academic career, he excelled in the telecom industry, leading teams at prominent companies like Fujitsu, Vodafone, and Alcatel-Lucent in Egypt. His research has led to significant advancements in wireless communications hardware implementations.
Throughout his illustrious career, Dr. Hussein has been instrumental in developing an open-source version of the software-defined perimeter reference architecture, addressing large-scale distributed denial of service attacks. He has made notable contributions to cloud security standards, collaborating with organizations like the US National Institute of Standards and Technology (NIST) and the Cloud Security Alliance. His current research focuses on key management challenges in the blackened cloud, exploring control authentication and encryption keys in the context of the zero-trust concept. With over 80 technical articles, one granted patent, and three patent applications to his name, Dr. Ahmed Refaey Hussein continues to shape and elevate the field of cybersecurity.
Session: Zero-Trust Architecture: Securing Next-Generation Networks

Steve Waterhouse
It was during his military career with the Royal 22nd Regiment that Capt(ret) Steve Waterhouse swapped his gun for a keyboard and became one of the first cyber-soldiers in Canada. After working on the training of soldiers and officers in combat arms, Steve then worked on the establishment of the first military administrative networks at QGSQFT, at the Montreal base and at the Royal Military College Saint-Jean with the Canadian Armed Forces, as well as the implementation of modern cybersecurity practices as the first Information Systems Security Officer (OSSI).
He continues to share his passion and his experience as a lecturer at the University of Sherbrooke as part of the master’s microprogram in information security – prevention component. He is invited
to bring his experience and expertise to the committees of the House of Commons of Canada and to the National Assembly of Quebec and is frequently asked by the Canadian media to comment on cybersecurity issues. Steve also served as the first Assistant Deputy Minister for Government Security and Cybersecurity in Quebec’s Ministry of Cybersecurity and Digital Affairs until early 2023.
Session: Have we improved our resilience to technological change in 25 years?

Gary Givental
Chief Architect, X-Force Platform, Security Services at IBM
Gary Givental, is known for his comprehensive expertise in security analytics and automation. His career journey, commencing in 1998 with Netrex, advancing through ISS, and ultimately leading him to IBM, exemplifies his enduring commitment to innovation and technical excellence. Equipped with a Bachelor’s degree in Computer Engineering from the University of Michigan and a Master’s degree in Software Engineering from Lawrence Technological University, Gary’s robust academic credentials underpin his profound technical skills. From 2014-2018, he served as an Adjunct Faculty at Lawrence Technological University, imparting his wisdom in Software Engineering and Artificial Intelligence. Gary’s unique ability to amalgamate technology and operational efficiency is evident in his co-creation of the Advanced Threat Disposition System (ATDS), a key threat triage and automation capability for IBM’s X-Force Protection Platform. Furthermore, his architectural acumen was key to the development of the Advanced Ticket Routing platform, leading to significant process automation. Recently, he has been delving into the groundbreaking realms of Generative Pretrained Transformers (GPT) and Large Language Models (LLMs), further demonstrating his foresight and adaptability. Receiving the 2020 People’s Choice Culture Award, Gary epitomizes a balanced blend of personal and professional excellence, contributing to the software industry as a seasoned technologist, a committed mentor, an inventor with over a dozen patents and a driven leader.
Session: Pragmatic and Trustworthy AI in Cybersecurity

Evgeniy Kharam
Cybersecurity Architect and Advisor, Podcaster at Security Architecture
Evgeniy Kharam is a seasoned cybersecurity expert with over 20 years of experience, boasting 40,000 hours of pre and post-sales support as an architect and principal consultant for medium to large enterprises. His technical expertise spans Endpoint and Network Security, SIEM/SOC/SOAR, SASE/SEE, VMS, and Cloud Security. Evgeniy spent 15 years at the Herjavec Group as the VP of Security Architecture. In addition to running his own cybersecurity consulting service and media company, Evgeniy has produced over 200 episodes of podcasts, live shows, panel moderations, webinars, and technical training, becoming a prominent figure in the cybersecurity media landscape. He currently provides cybersecurity guidance to vendors, VARs, and MSSPs
Session: Mastering Vendor Engagement in Cybersecurity

Thomas Veynachter
CEO at Neotrust Canada
Thomas is a seasoned cybersecurity expert with 15 years’ experience in the banking sector. Passionate about business transformation, he is recognized for his advanced technical skills in cryptography. After starting out as an information systems security administrator, he quickly rose through the ranks to become head of the secret management team at a major financial institution.
This experience led him to set up encryption and key management service offerings, offering a high level of availability for crucial issues such as data protection and the prevention of cyber-attacks. Thanks to his leadership, Thomas has played a key role in the organizational transformation of the bank’s cybersecurity teams, encouraging a proactive approach to security.
His passion for continuous improvement was reflected in his work with the teams, guiding them towards greater maturity in their daily deliveries. Today, as head of Neotrust’s Canadian office, Thomas has built up a team of cybersecurity experts capable of supporting their customers on two distinct levels.
Session: Why a proactive security approach is link to a constant cyber transformation and what is the benefits for companies?

Michel Juneau Katsuya
Expert in Threat Assessments and Security Intelligence
Well-known Canadian expert, author, and commentator at home and abroad, Michel has gained recognition for his direct and practice-oriented approach to threat and security assessment. With more than 40 years of service in the fields of counterintelligence and security intelligence assessments, he served in the Royal Canadian Mounted Police (RCMP) and subsequently in Canadian Security Intelligence Service (CSIS) as a senior manager and field intelligence officer. Since returning to civilian life, he has served on missions in more than 50 countries where he has led various security projects. Michel did his post-grad studies in political philosophy and now teaches criminology at various universities. He is regularly requested as analyst/commentator by various national and international media on public and national security issues. Michel is often requested to testify as an Expert-Witness at various parliamentary and senate committees on national security and intelligence as well in some Court of Justice. He has published books on intelligence and espionage activities in Canada as well as being the author and host of a TV series on Historia about espionage cases in Canada.

Laure Bonnave
Senior Counsel at Clyde & Co Canada s.e.n.c.r.l.
As a Senior Counsel at Clyde & Co Canada, Laure Bonnave serves as a “breach coach” in cases involving cybersecurity incidents, including data breaches or privacy breaches. In the scope of her practice, she has advised clients on numerous cyber incidents, both locally and internationally.
In her role, Laure regularly provides her clients with expertise in managing cyber incidents, which includes:
Overall management of responses to incidents and coordination with service providers.
Responses to ransomware attacks and data recovery.
Analysis and reporting of data protection breaches.
Handling cases of payment diversion fraud, locating funds, and recovering them.
Developing a communication strategy and managing stakeholders.
Preparing reports for regulatory authorities.
Managing risks related to class actions following a privacy breach.
Session: How to minimize legal risks in the event of a security incident?

Mathieu Roy
Client Delivery Executive at Indigo Consulting
Session: Strategic deployment in GIA: How to get through?

François Lepire
Solutions Architecture Advisor at iA Financial Group
A long-time contributor to IAM, François has worked in various roles in IAM teams. From technician, to analyst, to consultant, to product owner and today, as principal architect, François has tangible experience of what the reality of each position entails. This gives him an unparalleled perspective and experience allowing him to brilliantly measure the impacts of governance decisions relating to the normative framework.
Whether for optimizations, product management, detailed or reference architectures, François is an undeniable asset that can allow you to benefit from a trusted actor committed to your success. Finally, he specializes in roadmap development, detailed and reference architecture, as well as the deployment of IGA, CIAM and PAM solutions.
Session: Strategic deployment in GIA: How to get through?
Research Speakers

François Proulx
Senior Product Security Engineer at BoostSecurity
François is a Senior Product Security Engineer for BoostSecurity, where he leads the Supply Chain research team. With over 10 years of experience in building AppSec programs for large corporations (such as Intel) and small startups he has been in the heat of the action as the DevSecOps movement took shape. François is one of founders of NorthSec and was a challenge designer for the NorthSec CTF.
Session: Broken Links: Behind the Scenes of Supply Chain Breaches

Dr. Andréanne Bergeron
GoSecure
Andréanne Bergeron has a Ph.D. in Criminology from the University of Montreal and works as a cybersecurity researcher at GoSecure. Acting as the social and data scientist of the team, she is interested in online attackers’ behaviors. She is involved in the infosec community as the VP engagement and outreach for Northsec. Her experience as a speaker includes BlackHat USA, DefCon, BSides Montreal, NorthSec, CypherCon and Human Factor in Cybercrime among others.
Session: The Clash of Experts: How good of a solution are password managers?

Olivier Bilodeau
GoSecure
Olivier Bilodeau leads the Cybersecurity Research team at GoSecure. With more than 12 years of infosec experience, he enjoys luring malware operators into his traps and writing tools for malware research. Olivier is a passionate communicator having spoken at several conferences including BlackHat USA/Europe, Defcon, Botconf, Derbycon, and HackFest. Invested in his community, he co-founded MontréHack, is the President of NorthSec and host its Hacker Jeopardy.
Session: The Clash of Experts: How good of a solution are password managers?

Alexandre Côté Cyr
Malware Researcher at ESET
Alexandre is a malware researcher at ESET since 2021. Working with the Montreal team, his research is focused on tracking APT groups and their toolsets. He has previously presented about APTs and attribution at Botconf, Sleuthcon, Hackfest, and BSidesMTL. He is also involved in mentoring students getting started in infosec. His interests include operating systems fundamentals and writing shell scripts to automate tasks that don’t always need to be automated.
Session: Life on a Crooked RedLine : Analyzing the Infamous InfoStealer’s Back End

Mathieu Lavoie
CTO & Co-Founder of Flare
Mathieu Lavoie is co-founder and CTO of Flare. He obtained his B.Eng. from the ÉTS. After being a malware researcher for a few years, he worked as a pentester and then as a security team lead in a large financial institution. He was also a strategic advisor for senior executives regarding cybersecurity and blockchain initiatives. He has spoken at security conferences such as HOPE, BotConf, Sleuthcon and NorthSec
Session: Life on a Crooked RedLine : Analyzing the Infamous InfoStealer’s Back End
Workshop Leaders

Simon Drapeau
Security Engineering Manager at Check Point Software Technologies
Simon Drapeau is currently the Security Engineering Manager at Check Point Software Technologies Ltd for Eastern Canada, one of the leading global providers of cybersecurity solutions. Simon has over 25 years of experience in large-scale security architecture, design, and deployment projects for government and private organizations in the province of Quebec. The engineering team assists organizations in better managing security risks related to cyber threats. They provide information, guidance, and act as trusted advisors, staying on top of the technical and operational challenges that many organizations face and how Check Point solutions can help. An expert in the field of cybersecurity, his first experience with Check Point solutions dates back to 1997. His hands-on experience with Check Point solutions is his key asset.
Workshop: Check Point Solutions for Quantum, focusing on Quantum Maestro (hyperscale) and Quantum Spark (SD-WAN and ruggedized SMB appliances).

Xavier Bensemhoun
Security Specialist at Check Point Software Technologies
With 20 years of experience in cybersecurity, Xavier has developed practical and recognized expertise. He is certified CISSP and CCSP. He joined Check Point’s team nearly two and a half years ago and is responsible for major and strategic accounts in Eastern Canada.
Workshop: Check Point Solutions for Quantum, focusing on Quantum Maestro (hyperscale) and Quantum Spark (SD-WAN and ruggedized SMB appliances).

Maxime Nadeau
Director Ethical Hacking at GoSecure
Maxime is currently the Director of Ethical Hacking at GoSecure. Jack of all trades, master of some, he does have a pronounced interest in adversary simulation and physical security. Originally a software engineer, he is now conducting intrusion tests and built service offerings that include physical security intrusion and testing. He is a returning presenter at the GoSec conference, cybersecurity competition winner and NorthSec challenge designer.
Workshop: The Art of Lock Picking

Temuujin Darkhan
Security Analyst at GoSecure
Temuujin is an intrusion tester at GoSecure specializing in embedded systems testing. His expertise intertwined with his drive for security research have made him a cybersecurity resource hub for his team. Previous winner of major cybersecurity competitions, he is now highly involved in creating challenges for the NorthSec event and improving the security landscape via his implication within the cybersecurity community.
Workshop: The Art of Lock Picking

Julien Pineault
Security Analyst at GoSecure
Julien is a team lead and red teamer in the Ethical Hacking team at GoSecure, His areas of expertise are internal and external intrusion, web application testing and OpSec infrastructure. He specializes in getting the initial foothold in red team engagements and setting the stage for the rest of the intrusion team to perform their work. His interest in security sparked from Capture The Flag competitions, and he continues to be active in the Montréal infosec community, competing at a high caliber in CTF events. When not competing or on engagements, Julien spends his time volunteering for community events like MontréHack.
Workshop: The Art of Lock Picking