🎯 NorthSec 2026: Conférences annoncées + Nouvelle formation SDR + Villages et CTF

English version below 👇

📆 Édition 2026: Formations: 10, 11, 12, 13 mai • Conférences, ateliers, fête: 14 et 15 mai • CTF: 15 au 17 mai

Dans moins de 2 mois! Rejoins plus de 1400 personnes passionnées de cybersécurité pour le plus grand événement hacking au Canada du 10 au 17 mai 2026.

🎯 Ce mois-ci: Découvre les conférences sélectionnées, une nouvelle formation sur les radio-fréquences (SDR), les nouveautés des villages et bien plus!

🎫 RĂ©server tes billets maintenant et sois assurĂ© d’avoir ton chandail et ton badge →

🚨 EXCLUSIF: Badge 2026 révélé en primeur! 🚨

Un petit aperçu avant tout le monde… Une photo du badge de cette annĂ©e a mystĂ©rieusement fait surface! InspirĂ© par notre thème Solarpunk, ce design unique mĂŞle technologie et nature.

Badge NorthSec 2026

Conférences 2026: le programme est dévoilé! 🎯

Nous sommes fiers d’annoncer 17 confĂ©rences sĂ©lectionnĂ©es parmi des centaines de propositions! Des sujets de pointe couvrant notamment le cloud, l’IA, la dĂ©tection, l’offensive.

🎤 Keynote d’ouverture: Tim Medin (Red Siege) prĂ©sentera Hacking Dumberly

Conférences sélectionnées:

  1. Commit, Push, Compromise: Attacking Modern GitHub Orgs — Connor Laidlaw, Max CM, Andrew Buchanan (Figment)
  2. The OpenGraph diary: Attack path management applied to Ansible — Charl-alexandre Le Brun, Simon Lachkar (Desjardins)
  3. Doxxing-proof authentic digital media: trust the asset, protect the source — Christian Paquin (Microsoft Research)
  4. Researchers vs. Threat Actors in Cloud Attacks — Dirk-jan Mollema (Outsider Security), Sanne Maasakkers (Mandiant / Google Cloud)
  5. Increasing detection engineering maturity with detection as code — Émilio Gonzalez (Desjardins)
  6. A Needle in a Haystack: Identifying an Infostealer Attack Through Trillions of Events — François Labrèche (Sophos)
  7. Living Off The Pipeline: Defensive Research, Weaponized — François Proulx (Boost Security)
  8. Measuring AI Ability to Complete Long Cybersecurity Tasks — Jeremy Miller (OFFSEC)
  9. Mapping Deception Solutions with BloodHound OpenGraph — Joshua Prager (SpecterOps), Ben Schroeder
  10. A systematic approach to evading antivirus software — Philippe Pépos Petitclerc (UQAM)
  11. Stolen Laptops: Defeating DMA Countermeasures — Pierre-Nicolas Allard-Coutu (Bell Canada)
  12. Internet Blackout 2026 in Iran: Next-Level Internet Censorship — Reza Sharifi (CGI Deutschland)
  13. Adventures in Process Injection (How I Accidentally Built a Debugger - Again!) — Ron Bowes (GreyNoise Intelligence)
  14. Hacking 5G: From Radio Security to the APIs — Sébastien Dudek (Penthertz)
  15. Trust me, I’m a Shortcut - new LNK abuse methods — Wietze
  16. Hacking Browsers: The Easy Way — Robbe Van Roey (Toreon)
  17. Le futur s’invente avant-hier — Xavier FacĂ©lina (SECLAB)

🎙️ Voir toutes les conférences →

Concours Outreach 2026 🎓

Dernière chance! Date limite: 13 mars

Rendons notre communautĂ© plus inclusive! Tu fais partie d’un groupe sous-reprĂ©sentĂ© et tu rĂŞves de participer Ă  un CTF enivrant? NorthSec te donne ta chance!

Ce que tu peux gagner: 8 billets CTF pour former une équipe complète

Envoie ta lettre de motivation et ton CV avant le 13 mars. Partage cette initiative avec toutes les personnes qui pourraient être intéressées!

🎓 Candidater maintenant →

Formations: nouvelle formation SDR ajoutée! 📡

13 formations de pointe par des experts reconnus de l’industrie couvrant offensif, dĂ©fense, IA, cloud et maintenant… radio-frĂ©quence!

🆕 Nouvelle formation: Hacking the Invisible: SDR for Red Team Operations par Sébastien Dudek (Penthertz)

"La plupart des missions red team s’arrĂŞtent au pĂ©rimètre rĂ©seau, mais pas les ondes radio. Chaque bâtiment Ă©met des signaux: alarmes, portails, entrĂ©es sans clĂ©, claviers sans fil, capteurs IoT, drones, baby monitors… Pourtant, la plupart des professionnels offensifs n’ont aucune visibilitĂ© sur cette surface d’attaque invisible."

Toutes les formations 2026:

  1. Red Team Training – Charles F. Hamilton (Mr.Un1k0d3r) (CYPFER) • 12 et 13 mai • Présentiel
  2. Deconstructing Rust Binaries – Cindy Xiao (Decoder Loop) • Hybride
  3. Practical AI Security - Go Beyond Theory: Build, Break, and Defend – Harish Ramadoss • 11, 12 et 13 mai • Présentiel
  4. Attacking & Securing CI/CD Pipeline Certification – Raunak Parmar, Bobby Schwass (White Knight Labs) • 11, 12 et 13 mai • Hybride
  5. Offensive Development Practitioner Certification – Munaf Shariff (White Knight Labs) • 11, 12 et 13 mai • Hybride
  6. Offensive Active Directory Operations Certification – Evan Hosinski (White Knight Labs) • 11, 12 et 13 mai • Hybride
  7. Offensive GCP Operations & Tactics Certification – Chirag Savla, Jay Pandya (White Knight Labs) • 11, 12 et 13 mai • Hybride
  8. Advanced Detection Engineering in the Enterprise – Olaf Hartong, Rogier Boon (FalconForce) • 11, 12 et 13 mai • Présentiel
  9. Beyond Whiteboard Hacking: Master AI-Enhanced Threat Modeling – Steven Wierckx (Toreon) • 11 et 12 mai • Présentiel
  10. AI SecureOps: Attacking & Defending AI Applications & Agents – Abhinav Singh • 11 et 12 mai • Présentiel
  11. Reverse, Bypass, Exploit: Mobile Hacking Workshop – David Backer, Steven Smiley (Corellium) • 11 mai • Présentiel
  12. Adversary Perspectives: Azure – Hope Walker (SpecterOps) • 10, 11, 12 et 13 mai • Distanciel
  13. Hacking the Invisible: SDR for Red Team Operations – Sébastien Dudek (Penthertz) • 10, 11, 12 et 13 mai • Présentiel

📚 Découvrir toutes les formations →

Villages: des nouveautés! 🏕️

📡 Radio-FrĂ©quence (RF) Village: Joins-toi Ă  nos sĂ©ances Q&A gratuites en ligne pour te prĂ©parer Ă  l’examen d’obtention d’une certification de radioamateur qui aura lieu durant NorthSec. Cette certification reconnue par le gouvernement canadien te permettra d’opĂ©rer des Ă©quipements radio sur les bandes amateur. Reste Ă  l’affĂ»t sur Discord dans le canal #village-rf!

🛡️ Zone Pre-CTF: Apporte ton laptop les 14 et 15 mai et viens t’installer dans la zone Pre-CTF des villages! Cette annĂ©e, tu pourras te pratiquer sur des challenges avec le CTF 101, et un accès direct Ă  la plateforme Root-Me Pro. Aucune inscription nĂ©cessaire, tout se fait sur place. Nous pourrons mĂŞme t’aider Ă  configurer ton laptop, installer les outils de CTF communs et te donner des conseils pour rĂ©soudre des challenges.

Ateliers techniques annoncés Agentic AI for Threat Hunting par Faan Rossow et AWS Security - The Purple Team Way par Santiago Abastante

🏕️ Découvrir tous les villages →

CTF: Prépare-toi avec RingZer0 🛡️

Savais-tu que certains de nos défis CTF des éditions précédentes sont hébergés sur la plateforme RingZer0 CTF? De quoi bien te préparer pour notre compétition du 15 au 17 mai!

🛡️ S’entraĂ®ner sur RingZer0 →

Compétitions universitaires: NorthSec au @HackCTF (Concordia) + PolyPwn (Polytechnique) 🏆

L’esprit de compĂ©titions universitaires fait partie de l’ADN de NorthSec. Nous sommes fiers d’avoir appuyĂ© l’AtHackCTF par Hexploit Alliance (l’association Ă©tudiante de cyber de Concordia University) qui se tenait les 7 et 8 mars derniers! Notre Co-VP Communications, Yamlal, a donnĂ© un atelier sur la recherche d’emplois Ă©tudiants en cyber avec des outils d’IA.

Retrouve-nous également le 21 mars lors du PolyPwn CTF.

Les gagnant(e)s de ces compĂ©titions remporteront des billets combo (CTF + confĂ©rences) d’une valeur de près de 2000$ pour NorthSec 2026!

đź’™ Nos partenaires

Nous remercions chaleureusement nos commanditaires pour leur confiance et leur précieux soutien. Grâce à leur engagement, nous pouvons continuer à faire grandir notre communauté et à réaliser des projets porteurs de sens.

Fais rayonner ton organisation Ă  NorthSec Nous sommes fiers de pouvoir compter sur des partenaires qui partagent notre vision. Merci de contribuer Ă  notre succès collectif! Deviens partenaire de l’Ă©vĂ©nement de sĂ©curitĂ© le plus attendu au Canada ! Accès Ă  plus de 1400 professionnels qualifiĂ©s. Les forfaits les plus populaires partent rapidement.

NorthSec 2026 Sponsors

🤝 Devenir partenaire →

⏰ Réserve ton hébergement

Nuits Ă  l’hĂ´tel pour profiter Ă  fond de l’Ă©vĂ©nement? RĂ©serve Ă  l’hĂ´tel Zero1 avec notre lien promotionnel (tarif prĂ©fĂ©rentiel garanti)!

🏨 RĂ©server l’hĂ´tel →

BĂ©nĂ©volat: Rejoins l’Ă©quipe pour l’Ă©dition 2026! 🤝

À la recherche de bénévoles du 11 au 17 mai

Les bĂ©nĂ©voles sont au cĹ“ur de NorthSec depuis 2011. Toute l’organisation de l’Ă©vĂ©nement est portĂ©e par une Ă©quipe incroyable de bĂ©nĂ©voles passionnĂ©s. Nous sommes toujours Ă  la recherche de talents uniques et de personnes motivĂ©es de diffĂ©rents horizons.

Équipes qui recherchent des bénévoles: logistique, formations, inscriptions/accueil et villages.

Ce qui t’attend:

  • Accès gratuit Ă  la confĂ©rence et Ă  la compĂ©tition
  • T-shirt et tasse de bĂ©nĂ©vole NorthSec (et Ă©ditions spĂ©ciales pour les anciens!)
  • Nourriture et boissons pendant tes shifts
  • RĂ©seautage avec des professionnels de la cybersĂ©curitĂ©
  • Invitation Ă  la fĂŞte annuelle des bĂ©nĂ©voles (toujours très attendue!)

🤝 Devenir bénévole →

Suis-nous pour tout savoir!

Reste Ă  l’affĂ»t en nous suivant!

🔗 Mastodon • LinkedIn • Instagram • BlueSky • Discord • YouTube

💬 Partage cette infolettre avec tes collègues qui pourraient être intéressés!

— L’Ă©quipe NorthSec đź’™

NorthSec Team

🎯 NorthSec 2026: Talks Announced + New SDR Training + Villages and CTF

📆 2026 Edition: Training: May 10, 11, 12, 13 • Conference, workshops, party: May 14 and 15 • CTF: May 15 to 17

Less than 2 months away! Join 1,400+ cybersecurity enthusiasts for Canada’s largest hacking event from May 10 to 17, 2026.

🎯 This month: Discover the selected talks, a new radio-frequency (SDR) training, village updates, and much more!

🎫 Reserve your tickets now and secure your shirt and badge →

🚨 EXCLUSIVE: 2026 Badge Revealed First! 🚨

A sneak peek before everyone else… A photo of this year’s badge has mysteriously surfaced! Inspired by our Solarpunk theme, this unique design blends technology and nature.

NorthSec 2026 Badge

2026 Conference Talks: Schedule Revealed! 🎯

We’re proud to announce 17 talks selected from hundreds of proposals! Cutting-edge topics covering cloud, AI, detection, offensive, and more.

🎤 Opening Keynote: Tim Medin (Red Siege) will present Hacking Dumberly

Selected Talks:

  1. Commit, Push, Compromise: Attacking Modern GitHub Orgs — Connor Laidlaw, Max CM, Andrew Buchanan (Figment)
  2. The OpenGraph diary: Attack path management applied to Ansible — Charl-alexandre Le Brun, Simon Lachkar (Desjardins)
  3. Doxxing-proof authentic digital media: trust the asset, protect the source — Christian Paquin (Microsoft Research)
  4. Researchers vs. Threat Actors in Cloud Attacks — Dirk-jan Mollema (Outsider Security), Sanne Maasakkers (Mandiant / Google Cloud)
  5. Increasing detection engineering maturity with detection as code — Émilio Gonzalez (Desjardins)
  6. A Needle in a Haystack: Identifying an Infostealer Attack Through Trillions of Events — François Labrèche (Sophos)
  7. Living Off The Pipeline: Defensive Research, Weaponized — François Proulx (Boost Security)
  8. Measuring AI Ability to Complete Long Cybersecurity Tasks — Jeremy Miller (OFFSEC)
  9. Mapping Deception Solutions with BloodHound OpenGraph — Joshua Prager (SpecterOps), Ben Schroeder
  10. A systematic approach to evading antivirus software — Philippe Pépos Petitclerc (UQAM)
  11. Stolen Laptops: Defeating DMA Countermeasures — Pierre-Nicolas Allard-Coutu (Bell Canada)
  12. Internet Blackout 2026 in Iran: Next-Level Internet Censorship — Reza Sharifi (CGI Deutschland)
  13. Adventures in Process Injection (How I Accidentally Built a Debugger - Again!) — Ron Bowes (GreyNoise Intelligence)
  14. Hacking 5G: From Radio Security to the APIs — Sébastien Dudek (Penthertz)
  15. Trust me, I’m a Shortcut - new LNK abuse methods — Wietze
  16. Hacking Browsers: The Easy Way — Robbe Van Roey (Toreon)
  17. Le futur s’invente avant-hier — Xavier FacĂ©lina (SECLAB)

🎙️ View all talks →

2026 Outreach Contest 🎓

Last chance! Deadline: March 13

Let’s make our community more inclusive! Are you part of an underrepresented group and dream of participating in an exhilarating CTF? NorthSec is giving you a chance!

What you can win: 8 CTF tickets to form a complete team

Submit your cover letter and resume before March 13. Share this initiative with anyone who might be interested!

🎓 Apply now →

Training: New SDR Training Added! 📡

13 cutting-edge training sessions by industry-recognized experts covering offensive, defensive, AI, cloud, and now… radio-frequency!

🆕 New training: Hacking the Invisible: SDR for Red Team Operations by Sébastien Dudek (Penthertz)

"Most red team missions stop at the network perimeter, but not radio waves. Every building emits signals: alarms, gates, keyless entry, wireless keyboards, IoT sensors, drones, baby monitors… Yet most offensive professionals have no visibility on this invisible attack surface."

All 2026 Training Sessions:

  1. Red Team Training – Charles F. Hamilton (Mr.Un1k0d3r) (CYPFER) • May 12 and 13 • On-Site
  2. Deconstructing Rust Binaries – Cindy Xiao (Decoder Loop) • Hybrid
  3. Practical AI Security - Go Beyond Theory: Build, Break, and Defend – Harish Ramadoss • May 11, 12 and 13 • On-Site
  4. Attacking & Securing CI/CD Pipeline Certification – Raunak Parmar, Bobby Schwass (White Knight Labs) • May 11, 12 and 13 • Hybrid
  5. Offensive Development Practitioner Certification – Munaf Shariff (White Knight Labs) • May 11, 12 and 13 • Hybrid
  6. Offensive Active Directory Operations Certification – Evan Hosinski (White Knight Labs) • May 11, 12 and 13 • Hybrid
  7. Offensive GCP Operations & Tactics Certification – Chirag Savla, Jay Pandya (White Knight Labs) • May 11, 12 and 13 • Hybrid
  8. Advanced Detection Engineering in the Enterprise – Olaf Hartong, Rogier Boon (FalconForce) • May 11, 12 and 13 • On-Site
  9. Beyond Whiteboard Hacking: Master AI-Enhanced Threat Modeling – Steven Wierckx (Toreon) • May 11 and 12 • On-Site
  10. AI SecureOps: Attacking & Defending AI Applications & Agents – Abhinav Singh • May 11 and 12 • On-Site
  11. Reverse, Bypass, Exploit: Mobile Hacking Workshop – David Backer, Steven Smiley (Corellium) • May 11 • On-Site
  12. Adversary Perspectives: Azure – Hope Walker (SpecterOps) • May 10, 11, 12 and 13 • Remote
  13. Hacking the Invisible: SDR for Red Team Operations – Sébastien Dudek (Penthertz) • May 10, 11, 12 and 13 • On-Site

📚 Discover all training sessions →

Villages: What’s New! 🏕️

📡 Radio-Frequency (RF) Village: Join our free online Q&A sessions to prepare for the amateur radio certification exam that will take place during NorthSec. This certification recognized by the Canadian government allows you to operate radio equipment on amateur bands. Stay tuned on Discord in the #village-rf channel!

🛡️ Pre-CTF Zone: Bring your laptop on May 14 and 15 and set up in the villages’ Pre-CTF zone! This year, you can practice challenges with CTF 101, and get direct access to the Root-Me Pro platform. No registration needed, everything happens on-site. We can even help you configure your laptop, install common CTF tools, and give you tips to solve challenges.

Technical workshops announced Agentic AI for Threat Hunting by Faan Rossow and AWS Security - The Purple Team Way by Santiago Abastante

🏕️ Discover all villages →

CTF: Get Ready with RingZer0 🛡️

Did you know that some of our CTF challenges from previous editions are hosted on the RingZer0 CTF platform? A great way to prepare for our competition from May 15 to 17!

🛡️ Train on RingZer0 →

University Competitions: NorthSec at @HackCTF (Concordia) + PolyPwn (Polytechnique) 🏆

The spirit of university competitions is part of NorthSec’s DNA. We were proud to support AtHackCTF by Hexploit Alliance (Concordia University’s cybersecurity student association) which took place on March 7 and 8! Our Co-VP Communications, Yamlal, gave a workshop on finding student cyber jobs using AI tools.

Join us also on March 21 at the PolyPwn CTF.

Winners of these competitions will receive combo tickets (CTF + conference) valued at almost 2000$ for NorthSec 2026!

đź’™ Our Partners

We warmly thank our sponsors for their trust and invaluable support. Thanks to their commitment, we can continue to grow our community and realize meaningful projects.

Showcase your organization at NorthSec We’re proud to count on partners who share our vision. Thank you for contributing to our collective success! Become a partner at Canada’s most anticipated security event! Access to 1,400+ qualified professionals. The most popular packages go fast.

NorthSec 2026 Sponsors

🤝 Become a partner →

⏰ Reserve Your Accommodation

Hotel nights to fully enjoy the event? Book at Hotel Zero1 with our promotional link (preferred rate guaranteed)!

🏨 Book hotel →

Volunteering: Join the Team for the 2026 Edition! 🤝

Looking for volunteers from May 11 to 17

Volunteers have been at the heart of NorthSec since 2011. The entire event is powered by an incredible team of passionate volunteers. We’re always looking for unique talents and motivated people from different backgrounds.

Teams looking for volunteers: logistics, training, registration/welcome, and villages.

What awaits you:

  • Free access to the conference and competition
  • NorthSec volunteer t-shirt and mug (and special editions for veterans!)
  • Food and drinks during your shifts
  • Networking with cybersecurity professionals
  • Invitation to the annual volunteer party (always highly anticipated!)

🤝 Become a volunteer →

Follow Us to Stay Informed!

Stay tuned by following us!

🔗 Mastodon • LinkedIn • Instagram • BlueSky • Discord • YouTube

đź’¬ Share this newsletter with colleagues who might be interested!

— The NorthSec Team 💙

NorthSec Team