Block threats. Build solutions.
GeekWeek provides an opportunity for participants to take a few days away from their day-to-day and work with public sector, industry, critical infrastructure and international partners to explore innovative ideas in the cyber security space.
Venue
Canadian Centre for Cyber Security
1625 Vanier Parkway, Ottawa
ON K1L 7P1
Contact us
Email: contact@cyber.gc.ca
Event date
July 5 to 14, 2023
Registration information
Given the technical nature of the workshop, GeekWeek is an invitation-only event.
Participating organizations
- Amazon
- Bell Canada
- Bruce Power
- CADSI (Canadian Association of Defence and Security Industries)
- Canadian Internet Registration Authority
- CANARIE
- CIRCL
- City of Hamilton
- Cogeco
- Communications Research Centre
- Concert Properties
- Department of National Defence
- EWA-Canada Intertek
- Field Effect
- Fortinet
- Freelance
- General Dynamics Land Systems – Canada
- Global Affairs Canada
- Gouvernement du Québec
- GrayHat Analytics
- Hawkesbury General Hospital
- HYAS
- Kelvin Zero
- Logisphère
- McGill University
- Microsoft
- Ministère de la Cybersécurité et du Numérique, Quebec
- Northland Power Inc.
- ORION
- Penfield.AI Inc.
- PRIMECorp
- Province of British Columbia
- Public Safety Canada
- Queen's University
- RCMP
- Regional Municipality of Durham
- RioTinto
- RMDS Innovation
- Sandia National Laboratories
- SaskTel
- SecurityScorecard
- Student - Carleton University
- Telus
- The Municipal Region of York
- The Ottawa Hospital
- Trend Micro
- Tutte Institute
- Université de Sherbrooke
- University of Waterloo
- York University
Keynote speaker
Vinton G. Cerf is vice president and Chief Internet Evangelist for Google. He is the co-designer of the TCP/IP protocols and the architecture of the Internet. He has served in executive positions at ICANN, the Internet Society, MCI, the Corporation for National Research Initiatives and the Defense Advanced Research Projects Agency. A former Stanford Professor and former member of the US National Science Board, he is also the past President of the Association for Computing Machinery and serves in advisory capacities at NIST, DOE, NSF, NRO and NASA. He earned his B.S. in mathematics at Stanford and M.S. and Ph.D. degrees in computer science at UCLA. He is a member of both the US National Academies of Science and Engineering, the Worshipful Company of Information Technologists and the Worshipful Company of Stationers.
Vinton G. Cerf is a recipient of numerous awards for his work, including the US Presidential Medal of Freedom, US National Medal of Technology, the Queen Elizabeth Prize for Engineering, the Prince of Asturias Award, the Japan Prize, the Charles Stark Draper award, the ACM Turing Award, the Marconi Prize, the IEEE Medal of Honor, the Legion d’Honneur, the VinFutures Grand Prize and the Franklin Medal. He is a Foreign Member of the British Royal Society and Swedish Academy of Engineering and holds 29 honorary degrees.
Topics and themes
The following topics and themes have been proposed for GeekWeek 8.
The future of the cyberspace is now
- Preparing for a wireless future
- Autonomous vehicles
- Industrial control systems and Internet of Things (IoT)
- Digital identity and multi-factor authentication
- Automated trading
- Firmware security
- Radio-frequency identification (RFID) experimentation
Contributing to the cyber community
- Contributing to open-source projects (MISP, SuperSet, DataHub, OpenCTI, Malpedia)
Cyber threat reversing and automation
- Detecting and decoding advanced persistent threat malware
- Memory analysis
- Live sandboxes
- Spark the retro-hunting
- Automated signature generation
Cyber threat tooling
- Honeypots
- Validating cyber threat infrastructure
- Cyber security posture
- Building secure cloud applications
- Cyber threat storytelling
- Large language models threats
Cyber threat analysis and analytics
- Cyber artifact crowdsourcing
- Malicious infrastructure and threat hunting
- Monitoring, analytics and scaling security in the cloud
- Advanced genetic malware analysis
- Image processing and natural language processing for brand protection
- Cyber sovereignty
- Protecting .ca domains from phishing campaigns
- Automated smishing cyber intelligence gathering
Cyber operation
- Operationalize hunting malicious samples
- Cross-organizational data harvesting and analytics
- Taxonomy for risk assessment of cyber incidents on critical infrastructures
For more general information about GeekWeek, visit the GeekWeek page.