Demystify Cyber Security
GeekWeek provides an opportunity for participants to take few days away from their day-to-day and work with public sector, industry, critical infrastructure and international partners to explore innovative ideas in the cyber security space.
Venue

Canadian Centre for Cyber Security
1625 Vanier Parkway, Ottawa, ON
K1L 7P1
Event date
May 28 to June 6, 2025
If you’re interested in future Geek events, reach out to contact@cyber.gc.ca.
Registration information
Given the technical nature of the workshop, GeekWeek is an invitation-only event.
Keynote speaker
To be confirmed.
Participating organizations
To be confirmed.
Topics and themes
The following topics and themes have been proposed for GeekWeek 10.
-
Physical cyber systems
- Preparing for a wireless future
- Industrial spectrum monitoring
- Industrial control systems - Operational technology security for energy
- Digital identity
- Security gateway for connected cars
- Hunting the hunters
- Firmware security
-
Cyber toolboxes and analytical environments
- Memory analysis
- Live sandboxes
- Industrial control systems honeypot
- Remote desktop protocol honeypot
- Home modems and routers protection
- Internet scanner
-
Cyber threat hunting
- Detecting and decoding advanced persistent threat malware
- Validation cyber threat infrastructure
- Cyber artifact crowdsourcing
- Malicious infrastructure and threat hunting
- Operationalize hunting malicious samples
- Cross-organization data harvesting and analytics
- It’s all about money
-
Cyber threat analytics
- Cyber security posture
- Cyber threat storytelling
- Protecting country-specific domains from phishing campaigns
- Advanced genetic malware analysis
- Malicious email identification and triage enhancement with large language models (LLMs)
- Cyber news aggregation ad summarization with LLMs
- Automated signature generation
-
Cyber protection, assessment and defence
- Building secure cloud applications
- Monitoring, analytics and scaling security in the cloud
- Hardened router operating system
- Analyze this!
- Feeding the dragon: Threat modeling and risk assessment made easy
- Evaluating software deployed through business networks
- Bridging the communication gap in cyber security
- Secure and private mobile operating system
-
Open-source solutions: Giving back to the cyber security community
- Cyber range development
- Cyber tools development: Kangooroo, Borealis, Chameleon/Beever, BeAVER, Assemblyline and BADGER
-
Cyber defence turnkey solutions
- Cyber defense Fly-Away kit
- Secure operations centre (SOC) in a box
- Platform
- Pipeline for data collection
- Analytics
- Machine learning-based analytics
For more general information about GeekWeek, visit the GeekWeek page.