| Registration | |
| Breakfast | |
| Capture-the-Flag | |
| Opening Remarks | Conference Hall (PIC 120/122) |
| Threat Hunting with Jupyter Notebooks | |
| Threat Hunting with Jupyter Notebooks | |
| Keynote | Conference Hall (PIC 120/122) |
| Improving Cyber Risk Management with Threat Modeling | Conference Hall (PIC 120/122) |
| Beyond the Buzz: Assessing AI's Authentic Role in Enhancing Cybersecurity Measures | |
| AppSec From the Ground Up | |
| Hacking SCADAs for fun and Profit: Hacking ICS, Oil Rigs and Vessels | Conference Hall (PIC 120/122) |
| Stand-out Strategies for Young Professionals: Five Effective Habits For Getting You Hired | |
| Security Architecture, An Adventure? | |
| Lunch | |
| Stories from the trenches - How a red team exercise gained full control of a client network | Conference Hall (PIC 120/122) |
| Evolution of Risk Management in Software | |
| Revolutionizing Cyber Defense: The NIST CSF 2.0 Advantage | |
| All Thriller, No Filler: Crisis Communications Workshop | |
| Differences Between European And Canadian Approach For Cybersecurity | Conference Hall (PIC 120/122) |
| Guardians of the Code: Securing Enterprise Software Supply Chains | |
| Streamlining Threat Hunting in Cloud Environments with Jupyter | |
| Developing Cybersecurity - How do you make Staff Know Security. | Conference Hall (PIC 120/122) |
| Discover the Unseen: Azure Vulnerability Exploitation [Pending] | |
| MITRE Attack Flow: Laying Foundations for Predictive Intelligence | |
| Closing Remarks | Conference Hall (PIC 120/122) |