$ ls -la | grep "SCHEDULE 2026"
Closing remarks + Happy Hour
Lunch
Happy Hour
Lunch
Coffee Break
Opening remarks
$ ls -la | grep "CONFERENCE 2026"
Yvan Fournier
Current cybersecurity initiatives of the Government of Québec
Alexis Dorais-Joncas
Stop Hacklore: when bad advice overshadows good advice
Fanny Tan
Stop Hacklore: when bad advice overshadows good advice
Jean-Philippe Décarie-Mathieu
Stop Hacklore: when bad advice overshadows good advice
Yan Bellerose
Applied security for AI practitioners
Vincent Groleau
Do you have a “GIA” sector in place? So does the Auditor... and he's taking notes.
René-Sylvain Bédard
Digital Sovereignty: The reality, beyond fear campaigns
“Dominique Derrier & Thomas Veynachter”
“Do you have to wear a toga to truly protect a secret?”
Eric M. Gagnon
Purple Team: The Art of Offensive-Defensive Collaboration in Cybersecurity
Martin Dubé
Purple Team: The Art of Offensive-Defensive Collaboration in Cybersecurity
Nicholas Milot
Purple Team: The Art of Offensive-Defensive Collaboration in Cybersecurity
Didier Cotton
Quantum - The opportunities of risk, the risks of opportunity
Francois Detroio
OT and convergence towards the cloud: security, governance, and data monetization
Arnaud Landry
🛡️ Mastering DNS: Security and Privacy in the Cloud Era
$ ls -la | grep "‘CONFERENCE 2026’"
Jean-Philippe Racine
Bankruptcy and reconstruction : Rational decisions in a changing market
$ ls -la | grep "SCHEDULE 2025"
Closing remarks
Official closing of SéQCure 2025 conference
Lunch
Lunch & networking
Opening remarks
Official opening of SéQCure 2025 conference
Podcast & Festivities
Open discussion around a glass
Lunch
Lunch networking
Coffee Break
Break
Opening remarks
Official opening of SéQCure 2025 conference
$ ls -la | grep "CONFERENCE 2025"
René-Sylvain Bédard
What if... #Microsoft gave you everything you needed to create a #SECURE architecture?
Vanessa Deschênes
Did you say AI? What about HI? An ex-CPO's story
Dominique Derrier
Stories Of Mistakes
Pierre LeCalvez
Stories Of Mistakes
Guillaume Ross
FUDBusters!
Nicolas Bédard
From Training to Inference, Protecting LLM Models against Cyberthreats
Steve Lavoie
Incident response in SMEs
Olivier Bilodeau
Beyond infostealer malware: infection vectors, unusual stolen assets and countermeasures
Alexandre Roy
Inspire, influence, secure: Strengthening information security through communication
Cédric Thibault
Analysis and lessons learned from attacks on the Cloud
$ ls -la | grep "CONFERENCE 2024"
Camille Felx Leduc
Industrial cybersecurity and its challenges
Nicolas Bédard
Securing AI like Google, with SAIF
Martin Dubé
The phenomenon of decision fatigue in cybersecurity
Mat(t)hieux
Overview of digital threats linked to China
Franck Desert
Technology, weapon of mass destruction!!
Nadhir Khayati
Cybersecurity and Compliance, links and nuances
Andréanne Bergeron
The dark side of science: Confronting the quick conclusions and shortcuts of cybersecurity "researchers"
Mickael Nadeau
Code name: "Korean story gone wrong"
David Girard
Generative Artificial Intelligence in Cybersecurity: Challenges, Strategies and Perspectives for 2024
Pierre Le Calvez
When the Subcontractor Becomes Over-Stressful
Matthew Joseff
Ensuring security through rapid data analysis
René-Sylvain Bédard
Rethinking IT architecture for cybersecurity "IT architecture needs to rethink itself"
$ ls -la | grep "CONFÉRENCE"
Cédric Thibault
AWS under attack !
Alexandre Fournier
How to get your crisis management right
Alexis Dorais-Joncas
Where does the Threat Intel you consume every day really come from?
Dimitri McKay
Topic to discover live! (In english)
Andréanne Bergeron
When the remote login tool is the target of attacks
Olivier Bilodeau
When the remote login tool is the target of attacks
Franck Desert
Bitcoin "crap" or gold in bar!!! :)
Alex Bédard
Cyberattack - Feedback from 2 years after day 0!
Kevin C-Dubois
DevSecOps, the common toolbox for developers and security operations
Bruno Germain
ZTaaS (Zero Trust as a Service): Enabling your transition to a Zero Trust Architecture (ZTA)
Mathieu Tartare
Ukraine: highlights of the digital war, and a look back at previous cyberattacks.
Matthieu Faou
Ukraine: highlights of the digital war, and a look back at previous cyberattacks.
$ ls -la | grep "0-DAY"
Splunk
0-Day Sponsor
Splunk
0-Day Sponsor
In-Sec-M
Sponsor 0-Day
$ ls -la | grep "2023"
$ ls -la | grep "2024 SPONSORS"
Crise et Résilience
Malware Sponsor
GoSecure
Darkweb Sponsor
Cyberswat
Darkweb Sponsor
Fortinet
Malware Sponsor
Hackers Without Borders
Youth Sponsor
PolySécure
Media Sponsor
Prompt
Media Sponsor
Cyber Eco
Media Sponsor
PolySécure
Media Sponsor
$ ls -la | grep "2024 WORKSHOPS"
Trip to the DNS Center and more!
Presented by Franck Desert
$ ls -la | grep "2025 SPONSORS"
Intrasecure Inc.
Malware Sponsor
Cyber Citoyen
Youth Sponsor
Flare
Defacing Sponsor
Cyber Eco
Media Sponsor
Isaca - Quebec Chapter
Media Sponsor
PolySécure
Media Sponsor
Gravure Boréal
Media Sponsor
Alain Photo
Media Sponsor
Halexia Event
Media Sponsor
$ ls -la | grep "2026 SPONSORS"
$ ls -la | grep "CONFERENCES"
$ ls -la | grep "DARK WEB"
Alithya
Sponsor Dark Web
$ ls -la | grep "DARKWEB"
GoSecure
Darkweb Sponsor
Cyberswat
Darkweb Sponsor
$ ls -la | grep "DEFACING"
Flare
Defacing Sponsor
$ ls -la | grep "MALWARE"
KPMG
Malware Sponsor
Crise et Résilience
Malware Sponsor
Intrasecure Inc.
Malware Sponsor
Intrasecure Inc.
Malware Sponsor
Fortinet
Malware Sponsor
$ ls -la | grep "MEDIA"
Cyber Citoyen
Youth Sponsor
Cyber Citoyen
Youth Sponsor
PolySécure
Media Sponsor
Prompt
Media Sponsor
Cyber Eco
Media Sponsor
PolySécure
Media Sponsor
Crise et Résilience
Media Sponsor
Cyber Eco
Media Sponsor
Isaca - Quebec Chapter
Media Sponsor
Isaca - Quebec Chapter
Media Sponsor
PolySécure
Media Sponsor
PolySécure
Media Sponsor
Gravure Boréal
Media Sponsor
Gravure Boréal
Media Sponsor
Alain Photo
Media Sponsor
Halexia Event
Media Sponsor
$ ls -la | grep "SPONSOR"
Splunk
0-Day Sponsor
Splunk
0-Day Sponsor
In-Sec-M
Sponsor 0-Day
Alithya
Sponsor Dark Web
$ ls -la | grep "TEST"
$ ls -la | grep "YOUTH"
Hackers Without Borders
Youth Sponsor