item
René-Sylvain Bédard

René-Sylvain Bédard

What if... #Microsoft gave you everything you needed to create a #SECURE architecture?

// Wednesday February 26, 2025 - 09:00
item
Vanessa Deschênes

Vanessa Deschênes

Did you say AI? What about HI? An ex-CPO's story

// Wednesday February 26, 2025 - 14:15
item
Dominique Derrier

Dominique Derrier

Stories Of Mistakes

// Wednesday February 26, 2025 - 14:45
item
Pierre LeCalvez

Pierre LeCalvez

Stories Of Mistakes

// Wednesday February 26, 2025 - 14:45
item
Guillaume Ross

Guillaume Ross

FUDBusters!

// Wednesday February 26, 2025 - 15:30
item
Nicolas Bédard

Nicolas Bédard

From Training to Inference, Protecting LLM Models against Cyberthreats

// Thursday February 27, 2025 - 09:00
item
Steve Lavoie

Steve Lavoie

Incident response in SMEs

// Thursday February 27, 2025 - 10:30
item
Olivier Bilodeau

Olivier Bilodeau

Beyond infostealer malware: infection vectors, unusual stolen assets and countermeasures

// Thursday February 27, 2025 - 13:15
item
Alexandre Roy

Alexandre Roy

Inspire, influence, secure: Strengthening information security through communication

// Thursday February 27, 2025 - 14:45
item
Cédric Thibault

Cédric Thibault

Analysis and lessons learned from attacks on the Cloud

// Thursday February 27, 2025 - 15:30