SECTOR 2025
Wednesday | 8:00am
Briefings Continental Breakfast
Track
:
Location
: Keynote Hall, Level 800
Wednesday | 9:00am
Keynote: Agentic AI and Identity: The Biggest Problem We're Not Solving
Speaker:
Cristin Flynn Goodwin
Track
: Keynote
Format
: Keynote
Location
: Hall F, Level 800
Wednesday | 10:15am
Hackers Dropping Mid-Heist Selfies: LLM Identifies Information Stealer Infection Vector and Extracts IoCs
Speaker:
Estelle Ruellan
,
Speaker:
Olivier Bilodeau
Tracks
: Malware & Human Factors, AI, ML, & Data Science
Format
: 45-Minute Briefings
Location
: Room 801B
Hack_Canada.exe --v 4 --scan "Measuring Government Cybersecurity Posture: 5 Years of Attack Surface Analysis in Canada"
Speaker:
Patrick Roy
,
Speaker:
Patrick Mathieu
,
Contributor:
Capt(ret) Steve Waterhouse
Tracks
: Security Essentials & Lessons Learned, Exploit Development & Vulnerability Discovery
Format
: 45-Minute Briefings
Location
: Room 801A
Invitation Is All You Need! Invoking Gemini for Workspace Agents with a Simple Google Calendar Invite
Speaker:
Or Yair
,
Speaker:
Stav Cohen
,
Contributor:
Ben Nassi
Track
: AI, ML, & Data Science
Format
: 45-Minute Briefings
Location
: Room 718AB
Scaling the AppSec Program Without Scaling Security Headcount
Speaker:
Mario Lauande Lacroix
,
Speaker:
Will Yeager
Track
: Application Security
Format
: 45-Minute Briefings
Location
: Room 716A
The (Un)Rightful Heir: My dMSA Is Your New Domain Admin
Speaker:
Yuval Gordon
Tracks
: Exploit Development & Vulnerability Discovery, Identity & Access Management (IAM)
Format
: 45-Minute Briefings
Location
: Room 716B
Wednesday | 11:45am
Briefings Lunch
Track
:
Location
: Keynote Hall, Level 800
Wednesday | 1:15pm
Fail Panel
Moderator:
Jamie Arlen
Track
: Security Essentials & Lessons Learned
Format
: 45-Minute Briefings
Location
: Room 718AB
From Days to Hours: Accelerating Cyber Threat Response with AI Agents
Speaker:
Yuval Zacharia
Tracks
: Threat Hunting & Incident Response, AI, ML, & Data Science
Format
: 45-Minute Briefings
Location
: Room 801B
Leading Across the Generations
Speaker:
Randy Raw
Track
: Management, Career & Community
Format
: 45-Minute Briefings
Location
: Room 716A
Signature of Destruction: Outlook RCE Strikes Again
Speaker:
Michael Gorelik
,
Contributor:
Arnold Osipov
Tracks
: Exploit Development & Vulnerability Discovery, Application Security
Format
: 45-Minute Briefings
Location
: Room 801A
Unmasking a North Korean IT Farm: Exposing the Tradecraft Behind Their Global Disguise
Speaker:
Avi Sambira
Track
: Threat Hunting & Incident Response
Format
: 45-Minute Briefings
Location
: Room 716B
Wednesday | 2:15pm
DriveThru Hacking: Now with Delivery
Speaker:
George Chen
,
Contributor:
Alina Tan
,
Speaker:
Chee Peng Tan
,
Speaker:
Benjamin Cao
Track
: Cyber-physical & Embedded Security
Format
: 45-Minute Briefings
Location
: Room 716A
Evading in Plain Sight: How Adversaries Beat User-Mode Protection Engines for Over a Decade
Speaker:
Omri Misgav
Tracks
: Malware & Human Factors, Threat Hunting & Incident Response
Format
: 45-Minute Briefings
Location
: Room 716B
QuickShell: Sharing Is Caring About an RCE Attack Chain on Quick Share
Speaker:
Or Yair
Tracks
: Application Security, Network & Endpoint Security
Format
: 45-Minute Briefings
Location
: Room 801B
Security is Easier Before PCB Assembly: Easy Threat Modeling for Hardware
Speaker:
Eric Evenchick
,
Speaker:
Joe FitzPatrick
,
Contributor:
Adam Shostack
Tracks
: Security Essentials & Lessons Learned, Cyber-physical & Embedded Security
Format
: 45-Minute Briefings
Location
: Room 718AB
What Happens When Your Digital Voice Clone Goes Rogue
Speaker:
Andrey Markovytch
Tracks
: AI, ML, & Data Science, Application Security
Format
: 45-Minute Briefings
Location
: Room 801A
Wednesday | 3:00pm
Briefings Refreshment Break
Track
:
Location
: Keynote Hall, Level 800
Wednesday | 3:15pm
Deceptive Lures to Trap 'Meaty Chickens'
Speaker:
Joel Snape
,
Speaker:
Mao Sui
Track
: Malware & Human Factors
Format
: 45-Minute Briefings
Location
: Room 801B
How Secure is Your Base Image? A Live Security Test of Popular OSS Containers
Speaker:
John Amaral
Tracks
: Cloud Security, Application Security
Format
: 45-Minute Briefings
Location
: Room 716A
HyTrack: Tracking You Across Apps and the Web Hydra-Style
Speaker:
Malte Wessels
Track
: Policy & Privacy
Format
: 45-Minute Briefings
Location
: Room 716B
One Agent to Rule Them All: How One Malicious Agent Hijacks A2A System
Speaker:
Adar Peleg
,
Speaker:
Stav Cohen
,
Contributor:
Shaked Adi
,
Contributor:
Dvir Alsheich
,
Contributor:
Rom Himelstein
,
Contributor:
Amit LeVi
,
Contributor:
Avi Mendelson
Tracks
: AI, ML, & Data Science, Emerging Tech
Format
: 45-Minute Briefings
Location
: Room 801A
The Good, the Bad, and the Ugly: Hacking 3 Cloud Providers with 1 Vulnerability
Speaker:
Hillai Ben-Sasson
,
Speaker:
Nir Ohfeld
Tracks
: Exploit Development & Vulnerability Discovery, Cloud Security
Format
: 45-Minute Briefings
Location
: Room 718AB
Wednesday | 4:15pm
Agentic Edge AI: Threat Architecture, Attack Surfaces & Real-World Risk
Speaker:
Numaan Huq
Tracks
: Emerging Tech, AI, ML, & Data Science
Format
: 45-Minute Briefings
Location
: Room 716A
Chasing Shadows: Chronicles of Counter-Intelligence from the Citizen Lab
Speaker:
Ron Deibert
Track
: Policy & Privacy
Format
: 45-Minute Briefings
Location
: Room 718AB
Pay No Attention to the Device Behind the Curtain: Detecting Forbidden White Labeled and Counterfeit Devices
Speaker:
Rob King
Tracks
: Cyber-physical & Embedded Security, Network & Endpoint Security
Format
: 45-Minute Briefings
Location
: Room 716B
Tinker Tailor LLM Spy: Investigate & Respond to Attacks on GenAI Chatbots
Speaker:
Allyn Stott
Tracks
: AI, ML, & Data Science, Threat Hunting & Incident Response
Format
: 45-Minute Briefings
Location
: Room 801A
Why Phish if it Doesn't Work? A No BS Take on Why We Need to Phish
Speaker:
David Shipley
Tracks
: Malware & Human Factors, Security Essentials & Lessons Learned
Format
: 45-Minute Briefings
Location
: Room 801B
Thursday | 8:00am
Briefings Continental Breakfast
Track
:
Location
: Keynote Hall, Level 800
Thursday | 9:00am
Keynote: The Once and Future Rules of Cybersecurity
Speaker:
HD Moore
Track
: Keynote
Format
: Keynote
Location
: Hall F, Level 800
Thursday | 10:15am
Behind Closed Doors - Bypassing RFID Readers & Physical Access Controls
Speaker:
Julia Zduñczyk
Track
: Cyber-physical & Embedded Security
Format
: 45-Minute Briefings
Location
: Room 716B
Corporate National Security: Quantifying Cyber Risk as a National Defense Imperative
Speaker:
Zachary Schmidt
,
Speaker:
Kellman Meghu
,
Speaker:
Chris Storey
Tracks
: Management, Career & Community, AI, ML, & Data Science
Format
: 45-Minute Briefings
Location
: Room 718AB
Not-So-Secret Agents: Deploying AI to Optimize Security Operations
Speaker:
Jimmy Astle
Tracks
: AI, ML, & Data Science, Emerging Tech
Format
: 45-Minute Briefings
Location
: Room 716A
Proof of Personhood? AI, Deepfakes, and the Next Evolution of Digital Identity Verification
Speaker:
Christine Dewhurst
,
Speaker:
Shelly Jafry-Biggs
Track
: Identity & Access Management (IAM)
Format
: 45-Minute Briefings
Location
: Room 801A
Secure Code Is Critical Infrastructure: Hacking Policy for the Public Good
Speaker:
Tanya Janca
Tracks
: Policy & Privacy, Application Security
Format
: 45-Minute Briefings
Location
: Room 801B
Thursday | 11:45am
Briefings Lunch
Track
:
Location
: Keynote Hall, Level 800
Thursday | 1:15pm
CAN Bus for Car Nerds and Security People Who Should Know Better
Speaker:
Brian Bourne
Tracks
: Cyber-physical & Embedded Security, Reverse Engineering
Format
: 45-Minute Briefings
Location
: Room 718AB
Foreign Information Manipulation and Interference (FIMI) (Disinformation 2.0) - How Patterns of Behaviour in the Information Environment Threaten or Attack Organizations' Values, Procedures and Political Processes
Speaker:
Franky Saegerman
Track
: Policy & Privacy
Format
: 45-Minute Briefings
Location
: Room 801B
From Prompts to Plans: Security and Safety Testing for Agentic AI
Speaker:
Jason Stanley
Tracks
: AI, ML, & Data Science, Application Security
Format
: 45-Minute Briefings
Location
: Room 801A
Ghost SIM Attack: Hacking Mobile Network Authentication Policies
Speaker:
Pedro Cabrera
,
Speaker:
Miguel Gallego
Tracks
: Exploit Development & Vulnerability Discovery, Network & Endpoint Security
Format
: 45-Minute Briefings
Location
: Room 716A
What If We Caught SUNBURST in CI/CD? Rewriting the SolarWinds Playbook with AI-Augmented DevSecOps
Speaker:
Aleksandr Krasnov
Tracks
: Application Security, Threat Hunting & Incident Response
Format
: 45-Minute Briefings
Location
: Room 716B
Thursday | 2:00pm
Briefings Refreshment Break
Track
:
Location
: Keynote Hall, Level 800
Thursday | 2:15pm
Cyber-Physical Exploitation: Tracing Adversary Steps through Cyber-Physical Attack Lifecycle
Speaker:
Marina Krotofil
Tracks
: Cyber-physical & Embedded Security, Security Essentials & Lessons Learned
Format
: 45-Minute Briefings
Location
: Room 716B
EDR Bypass Testing: A Systematic Approach to Validating Endpoint Defenses
Speaker:
Jacob Gajek
,
Speaker:
Ryan Hasmatali
Tracks
: Network & Endpoint Security, Exploit Development & Vulnerability Discovery
Format
: 45-Minute Briefings
Location
: Room 716A
Is Your Data Canadian Yet? (And Other Existential Cloud Sovereignty Questions)
Speaker:
Kevin Fox
,
Speaker:
Jamie Arlen
Tracks
: Cloud Security, Policy & Privacy
Format
: 45-Minute Briefings
Location
: Room 718AB
Poison in the Wires: Interactive Network Visualization of Data Poisoning Attacks
Speaker:
Maria Khodak
Tracks
: AI, ML, & Data Science, Emerging Tech
Format
: 45-Minute Briefings
Location
: Room 801B
The Apex Adversary: Deconstructing a Meta-Adversary Forged from Offensive AI
Speaker:
Jeff Sims
Tracks
: AI, ML, & Data Science, Emerging Tech
Format
: 45-Minute Briefings
Location
: Room 801A
Thursday | 3:15pm
Exploiting Multi Agent Systems: How Prompt Injection Turns Collaboration into Compromise
Speaker:
Jeremy Richards
Tracks
: AI, ML, & Data Science, Application Security
Format
: 45-Minute Briefings
Location
: Room 801B
Resilience to Manipulation: Rethinking Phishing Detection in the Age of AI and Disinformation
Speaker:
Michel Hebert
Tracks
: AI, ML, & Data Science, Malware & Human Factors
Format
: 45-Minute Briefings
Location
: Room 716A
SecTor 2025 Grand Finale: Cutting Through the Cyber Noise
Moderator:
Opheliar Chan
,
Panelist:
Dave Millier
,
Panelist:
Maryna Neprosta
,
Panelist:
Tom Tran
Track
: Security Essentials & Lessons Learned
Format
: 45-Minute Briefings
Location
: Room 718AB
Taking a Product from Napkin to SOC2 Certified & TSA Trusted: How a Mobile Drivers License App Became a Boarding Pass
Speaker:
John Duffy
Tracks
: Security Essentials & Lessons Learned, Management, Career & Community
Format
: 45-Minute Briefings
Location
: Room 716B
When Hackers Meet Burglars: Red Teaming the Smart Building
Speaker:
Amir Hosseinpour
Tracks
: Cyber-physical & Embedded Security, Emerging Tech
Format
: 45-Minute Briefings
Location
: Room 801A