GeekWeek 10

geekweek banner

GeekWeek provides an opportunity for participants to take few days away from their day-to-day and work with public sector, industry, critical infrastructure Critical infrastructureProcesses, systems, facilities, technologies, networks, assets, and services essential to the health, safety, security, or economic well-being of Canadians and the effective functioning of government. Critical infrastructure can be stand-alone or interconnected and interdependent within and across provinces, territories, and national borders. Disruptions of critical infrastructure could result in catastrophic loss of life, adverse economic effects, and significant harm to public confidence. and international partners to explore innovative ideas in the cyber security Cyber securityThe protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information. More specifically, cyber security includes the body of technologies, processes, practices and response and mitigation measures designed to protect networks, computers, programs and data from attack, damage or unauthorized access so as to ensure confidentiality, integrity and availability. space.

Venue

Photo of Vanier Facility

Canadian Centre for Cyber Security
1625 Vanier Parkway, Ottawa, ON
K1L 7P1

May 28 to June 6, 2025

If you’re interested in future Geek events, reach out to contact@cyber.gc.ca.

Given the technical nature of the workshop, GeekWeek is an invitation-only event.

To be confirmed.

To be confirmed.

The following topics and themes have been proposed for GeekWeek 10.

  • Physical cyber systems
    • Preparing for a wireless future
    • Industrial spectrum monitoring
    • Industrial control systems - Operational technology security for energy
    • Digital identity
    • Security gateway for connected cars
    • Hunting the hunters
    • Firmware security
  • Cyber toolboxes and analytical environments
    • Memory analysis
    • Live sandboxes
    • Industrial control systems honeypot
    • Remote desktop protocol honeypot
    • Home modems and routers protection
    • Internet scanner
  • Cyber threat hunting
    • Detecting and decoding advanced persistent threat malware
    • Validation cyber threat infrastructure
    • Cyber artifact crowdsourcing
    • Malicious infrastructure and threat hunting
    • Operationalize hunting malicious samples
    • Cross-organization data harvesting and analytics
    • It’s all about money
  • Cyber threat analytics
    • Cyber security posture
    • Cyber threat storytelling
    • Protecting country-specific domains from phishing campaigns
    • Advanced genetic malware analysis
    • Malicious email identification and triage enhancement with large language models (LLMs)
    • Cyber news aggregation ad summarization with LLMs
    • Automated signature generation
  • Cyber protection, assessment and defence
    • Building secure cloud applications
    • Monitoring, analytics and scaling security in the cloud
    • Hardened router operating system
    • Analyze this!
    • Feeding the dragon: Threat modeling and risk assessment made easy
    • Evaluating software deployed through business networks
    • Bridging the communication gap in cyber security
    • Secure and private mobile operating system
  • Open-source solutions: Giving back to the cyber security community
    • Cyber range development
    • Cyber tools development: Kangooroo, Borealis, Chameleon/Beever, BeAVER, Assemblyline and BADGER
  • Cyber defence turnkey solutions
    • Cyber defense Fly-Away kit
    • Secure operations centre (SOC) in a box
      • Platform
      • Pipeline for data collection
      • Analytics
      • Machine learning-based analytics
 

For more general information about GeekWeek, visit the GeekWeek page.

Date modified: