<?xml version='1.0' encoding='utf-8' ?>
<iCalendar xmlns:pentabarf='http://pentabarf.org' xmlns:xCal='urn:ietf:params:xml:ns:xcal'>
    <vcalendar>
        <version>2.0</version>
        <prodid>-//Pentabarf//Schedule//EN</prodid>
        <x-wr-caldesc></x-wr-caldesc>
        <x-wr-calname></x-wr-calname>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>9W78TE@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-9W78TE</pentabarf:event-slug>
            <pentabarf:title>Registration opens</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260516T090000</dtstart>
            <dtend>20260516T094500</dtend>
            <duration>0.04500</duration>
            <summary>Registration opens</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Normal Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/9W78TE/</url>
            <location>Track 1</location>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>YS3HC9@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-YS3HC9</pentabarf:event-slug>
            <pentabarf:title>OPENING REMARKS</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260516T094500</dtstart>
            <dtend>20260516T100000</dtend>
            <duration>0.01500</duration>
            <summary>OPENING REMARKS</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Lighting Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/YS3HC9/</url>
            <location>Track 1</location>
            
            <attendee>Team ENUSEC (Connor, Scott, Lewis, Xander &amp; Eden)</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>BDHGW8@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-BDHGW8</pentabarf:event-slug>
            <pentabarf:title>KEYNOTE - History’s Blueprint for Cyber Resilience</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260516T100000</dtstart>
            <dtend>20260516T103000</dtend>
            <duration>0.03000</duration>
            <summary>KEYNOTE - History’s Blueprint for Cyber Resilience</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Normal Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/BDHGW8/</url>
            <location>Track 1</location>
            
            <attendee>Gemma Barrow</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>S73CHT@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-S73CHT</pentabarf:event-slug>
            <pentabarf:title>Automating Chaos at Scale</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260516T103000</dtstart>
            <dtend>20260516T113000</dtend>
            <duration>1.00000</duration>
            <summary>Automating Chaos at Scale</summary>
            <description>This talk explores how to weaponise AI for rapid idea-to-tool pipelines taking half-formed, borderline chaotic ideas and turning them into working tools, side projects, and offensive experiments at speed. Not polished SaaS. Not over-engineered platforms. Building chaos at scale.

I’ll walk through how AI can be used to:
	•	Break past the “I’ll build that someday” backlog
	•	Prototype tools in hours instead of weeks
	•	Explore unconventional or “bad” ideas safely and quickly
	•	Chain together automation, code generation, and testing loops
	•	Validate whether something is genuinely useful or just noise

Along the way, I’ll look at real examples of AI-assisted builds: from scrappy utilities to fully functional tooling that would never have existed without lowering the barrier to execution.

This isn’t about replacing developers. It’s about removing friction and what happens when that friction disappears.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Long Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/S73CHT/</url>
            <location>Track 1</location>
            
            <attendee>Andy Gill</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>BMXMF8@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-BMXMF8</pentabarf:event-slug>
            <pentabarf:title>How does AI, Geopolitics impact on the cyber landscape ? What can you do to “hack” your brain for a resilient career !</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260516T114000</dtstart>
            <dtend>20260516T121000</dtend>
            <duration>0.03000</duration>
            <summary>How does AI, Geopolitics impact on the cyber landscape ? What can you do to “hack” your brain for a resilient career !</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Normal Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/BMXMF8/</url>
            <location>Track 1</location>
            
            <attendee>James K.</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>N3Z8CW@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-N3Z8CW</pentabarf:event-slug>
            <pentabarf:title>Panel Discussion - What it’s really like to work in cyber security in a large organisation?</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260516T124000</dtstart>
            <dtend>20260516T131000</dtend>
            <duration>0.03000</duration>
            <summary>Panel Discussion - What it’s really like to work in cyber security in a large organisation?</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Normal Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/N3Z8CW/</url>
            <location>Track 1</location>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>Z9VD7V@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-Z9VD7V</pentabarf:event-slug>
            <pentabarf:title>Securing ATMs: 101</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260516T131000</dtstart>
            <dtend>20260516T134000</dtend>
            <duration>0.03000</duration>
            <summary>Securing ATMs: 101</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Normal Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/Z9VD7V/</url>
            <location>Track 1</location>
            
            <attendee>Kerry Archibald</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>EEMPKG@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-EEMPKG</pentabarf:event-slug>
            <pentabarf:title>Ghosts in the Cluster - Hiding in Kubernetes for Years</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260516T134000</dtstart>
            <dtend>20260516T141000</dtend>
            <duration>0.03000</duration>
            <summary>Ghosts in the Cluster - Hiding in Kubernetes for Years</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Normal Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/EEMPKG/</url>
            <location>Track 1</location>
            
            <attendee>Rory McCune</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>DNQMKH@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-DNQMKH</pentabarf:event-slug>
            <pentabarf:title>The eCrime Ecosystem: How Cybercriminals Operate and How We Track Them</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260516T142000</dtstart>
            <dtend>20260516T145000</dtend>
            <duration>0.03000</duration>
            <summary>The eCrime Ecosystem: How Cybercriminals Operate and How We Track Them</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Normal Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/DNQMKH/</url>
            <location>Track 1</location>
            
            <attendee>David Rowney</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>VHZED7@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-VHZED7</pentabarf:event-slug>
            <pentabarf:title>Meet the Fixers: How One Social Engineering Technique Spawned a Family  and How to Catch It</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260516T145000</dtstart>
            <dtend>20260516T155000</dtend>
            <duration>1.00000</duration>
            <summary>Meet the Fixers: How One Social Engineering Technique Spawned a Family  and How to Catch It</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Long Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/VHZED7/</url>
            <location>Track 1</location>
            
            <attendee>Cameron Cottam</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>NNBFMC@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-NNBFMC</pentabarf:event-slug>
            <pentabarf:title>The Nightmare before Christmas</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260516T155000</dtstart>
            <dtend>20260516T162000</dtend>
            <duration>0.03000</duration>
            <summary>The Nightmare before Christmas</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Normal Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/NNBFMC/</url>
            <location>Track 1</location>
            
            <attendee>Samantha Varley</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>Z9MJ8X@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-Z9MJ8X</pentabarf:event-slug>
            <pentabarf:title>Hot Singles In Your Area Want Your Session Tokens</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260516T162000</dtstart>
            <dtend>20260516T172000</dtend>
            <duration>1.00000</duration>
            <summary>Hot Singles In Your Area Want Your Session Tokens</summary>
            <description>We’re going to log into someone else’s email account - and they’re going to help us do it! From phishing to MFA bypass to session hijacking, this session walks through a real-world BEC attack chain end-to-end.

Then we ruin the attacker’s day by showing exactly how to stop it.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Long Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/Z9MJ8X/</url>
            <location>Track 1</location>
            
            <attendee>Michael Varley</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>GBRHXN@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-GBRHXN</pentabarf:event-slug>
            <pentabarf:title>No Signature, No Problem: Detecting the Coming 0-Day Flood</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260516T172000</dtstart>
            <dtend>20260516T175000</dtend>
            <duration>0.03000</duration>
            <summary>No Signature, No Problem: Detecting the Coming 0-Day Flood</summary>
            <description>Detection engineering has always been a race: find a vuln, reverse the exploit, write a signature, push it out, hope you beat the attackers. That race was losing even before automation. With AI-driven vulnerability discovery, the race is over. The discovery rate is about to dwarf the signature-authoring rate by orders of magnitude, and a meaningful fraction of those findings will be weaponised before any defender has them.
That leaves one brute mathematical fact: you cannot write a signature for something you don&#x27;t know exists. The only detection strategy that survives this world is one that looks for the effects of exploitation rather than its fingerprints. Statistical anomaly detection.
In this talk we&#x27;ll cover:

The supply-side economics of AI vuln discovery, and why 0-day proliferation is structurally inevitable rather than speculative
Why signature-based detection breaks down in this regime, with numbers
What &quot;anomaly detection&quot; actually means (time-series, graph, distribution-based), and the crucial distinctions most vendors blur
Real examples: detections that caught novel behaviour in production vs. the ones that generated 400 alerts a day
The analyst UX problem: explainability, triage, and why most ML detections die in the SOC
A pragmatic starting point for teams without a PhD on staff

This is a hardened follow-up to a talk given at Cyber Scotland Connect in 2025, updated for a world where vulnerability discovery itself has been automated.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Normal Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/GBRHXN/</url>
            <location>Track 1</location>
            
            <attendee>Aidan McLaughlin</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>JEDJGG@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-JEDJGG</pentabarf:event-slug>
            <pentabarf:title>CLOSING REMARKS</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260516T175000</dtstart>
            <dtend>20260516T180500</dtend>
            <duration>0.01500</duration>
            <summary>CLOSING REMARKS</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Lighting Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/JEDJGG/</url>
            <location>Track 1</location>
            
            <attendee>Team ENUSEC (Connor, Scott, Lewis, Xander &amp; Eden)</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>T3RRT7@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-T3RRT7</pentabarf:event-slug>
            <pentabarf:title>AFTERPARTY</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260516T183000</dtstart>
            <dtend>20260516T193000</dtend>
            <duration>1.00000</duration>
            <summary>AFTERPARTY</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Long Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/T3RRT7/</url>
            <location>Track 1</location>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>FEEBJU@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-FEEBJU</pentabarf:event-slug>
            <pentabarf:title>You’ve Been Ph0ned: How Attackers Compromise Organisations Via Telephone Social Engineering</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260516T114000</dtstart>
            <dtend>20260516T121000</dtend>
            <duration>0.03000</duration>
            <summary>You’ve Been Ph0ned: How Attackers Compromise Organisations Via Telephone Social Engineering</summary>
            <description>While just about everyone has trained users not to click suspicious emails, attackers have quietly moved to the channel nobody prepared for: the phone. From retail giants and luxury brands to automotive manufacturers and casino operators - all have suffered massive financial damages from attacks that started with something as simple as a phone call.
Drawing from real world red teaming engagements, Luiz will walk through the modern vishing playbook: how attackers research targets, craft believable pretexts, pressure helpdesks into breaking their own security policies, and bypass multi factor authentication that was supposed to end credential theft.
The talk includes a live AI voice cloning demonstration, honest discussion of the ethical challenges in realistic social engineering testing, and practical defences that go beyond &quot;just be suspicious of phone calls&quot;.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Normal Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/FEEBJU/</url>
            <location>Track 2</location>
            
            <attendee>Luiz S</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>FZX9DN@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-FZX9DN</pentabarf:event-slug>
            <pentabarf:title>The Dark Sorcery of Video Encoding</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260516T131000</dtstart>
            <dtend>20260516T134000</dtend>
            <duration>0.03000</duration>
            <summary>The Dark Sorcery of Video Encoding</summary>
            <description>Video takes up a LOT of data. Each pixel is 3 bytes if you&#x27;re only using 8 bit colour and the numbers get wild as resolution, framerate and bit depth goes up.

How does video encoding work in general? What improvements have we seen throughout history? Could the planet&#x27;s infrastructure survive a world without video compression? Should you maybe use GPU encoding for your video projects? (Spoiler: Yes)

Time to dig into one of those things we never even think about, let alone take for granted - Video encoding.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Normal Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/FZX9DN/</url>
            <location>Track 2</location>
            
            <attendee>Del Angel Stormreul</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>SAGKR7@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-SAGKR7</pentabarf:event-slug>
            <pentabarf:title>Not Just Tech: The People and Politics of Cyber</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260516T134000</dtstart>
            <dtend>20260516T135500</dtend>
            <duration>0.01500</duration>
            <summary>Not Just Tech: The People and Politics of Cyber</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Lighting Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/SAGKR7/</url>
            <location>Track 2</location>
            
            <attendee>Imogen McCall</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>TYSGCW@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-TYSGCW</pentabarf:event-slug>
            <pentabarf:title>Testing What the Scanner Missed: A Bug Bounty Perspective</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260516T142000</dtstart>
            <dtend>20260516T145000</dtend>
            <duration>0.03000</duration>
            <summary>Testing What the Scanner Missed: A Bug Bounty Perspective</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Normal Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/TYSGCW/</url>
            <location>Track 2</location>
            
            <attendee>Suresh Aydi</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>QS9WQH@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-QS9WQH</pentabarf:event-slug>
            <pentabarf:title>From Data to Defense: Real-World Cyber Threat Intelligence &amp; Threat Hunting</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260516T145000</dtstart>
            <dtend>20260516T155000</dtend>
            <duration>1.00000</duration>
            <summary>From Data to Defense: Real-World Cyber Threat Intelligence &amp; Threat Hunting</summary>
            <description>This session dives into the practical side of Cyber Threat Intelligence (CTI) and Threat Hunting, focusing on how defenders can anticipate, detect, and respond to modern cyber threats.

We will begin by understanding what threat intelligence really means beyond buzzwords, covering its lifecycle, types, and how it integrates into real security operations.

The session then explores attacker behavior using frameworks like MITRE ATT&amp;CK and the Cyber Kill Chain, helping attendees understand how adversaries think, move, and exploit systems.

A key part of the talk will focus on threat hunting — how to proactively search for threats using indicators of compromise (IOCs), behavioral patterns, and attacker TTPs.

We will also walk through a real-world inspired case study based on large-scale global events (such as international sporting events).

By the end of the session, attendees will:
Understand how to apply CTI in real environments
Learn how to identify high-value detection signals (TTPs vs IOCs)
Gain a beginner-friendly roadmap to start threat hunting
Be able to think like both an attacker and a defender

This talk is designed for students, beginners, and intermediate cybersecurity enthusiasts who want practical, actionable insights not just theory.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Long Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/QS9WQH/</url>
            <location>Track 2</location>
            
            <attendee>Ayush Aggarwal</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>T7937A@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-T7937A</pentabarf:event-slug>
            <pentabarf:title>Burning the candle at all ends - a burnout talk</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260516T155000</dtstart>
            <dtend>20260516T162000</dtend>
            <duration>0.03000</duration>
            <summary>Burning the candle at all ends - a burnout talk</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Normal Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/T7937A/</url>
            <location>Track 2</location>
            
            <attendee>Kit</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>QFVNJL@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-QFVNJL</pentabarf:event-slug>
            <pentabarf:title>Dumb shit in history 3.0</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260516T162000</dtstart>
            <dtend>20260516T165000</dtend>
            <duration>0.03000</duration>
            <summary>Dumb shit in history 3.0</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Normal Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/QFVNJL/</url>
            <location>Track 2</location>
            
            <attendee>Jon</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>7DSCQG@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-7DSCQG</pentabarf:event-slug>
            <pentabarf:title>Lockpicking &amp; Physical Security Village</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260516T100000</dtstart>
            <dtend>20260516T113000</dtend>
            <duration>1.03000</duration>
            <summary>Lockpicking &amp; Physical Security Village</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Long Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/7DSCQG/</url>
            <location>Track 3</location>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>ZR3GKH@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-ZR3GKH</pentabarf:event-slug>
            <pentabarf:title>Hiding in Plain Sight - OSINT CTF (workshop)</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260516T131000</dtstart>
            <dtend>20260516T141000</dtend>
            <duration>1.00000</duration>
            <summary>Hiding in Plain Sight - OSINT CTF (workshop)</summary>
            <description>Open Source Intelligence (OSINT) CTF</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Long Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/ZR3GKH/</url>
            <location>Track 3</location>
            
            <attendee>Luiz S</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>RJMCQN@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-RJMCQN</pentabarf:event-slug>
            <pentabarf:title>Doors Open - Day 2</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260517T093000</dtstart>
            <dtend>20260517T103000</dtend>
            <duration>1.00000</duration>
            <summary>Doors Open - Day 2</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Long Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/RJMCQN/</url>
            <location>Track 1</location>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>KEESQ9@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-KEESQ9</pentabarf:event-slug>
            <pentabarf:title>Welcome</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260517T103000</dtstart>
            <dtend>20260517T104500</dtend>
            <duration>0.01500</duration>
            <summary>Welcome</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Lighting Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/KEESQ9/</url>
            <location>Track 1</location>
            
            <attendee>Team ENUSEC (Connor, Scott, Lewis, Xander &amp; Eden)</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>EDFY3Z@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-EDFY3Z</pentabarf:event-slug>
            <pentabarf:title>CTF - Morning</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260517T104500</dtstart>
            <dtend>20260517T120000</dtend>
            <duration>1.01500</duration>
            <summary>CTF - Morning</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Long Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/EDFY3Z/</url>
            <location>Track 1</location>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>89DEJE@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-89DEJE</pentabarf:event-slug>
            <pentabarf:title>Lunch - Day 2</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260517T120000</dtstart>
            <dtend>20260517T130000</dtend>
            <duration>1.00000</duration>
            <summary>Lunch - Day 2</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Long Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/89DEJE/</url>
            <location>Track 1</location>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>BCNJVW@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-BCNJVW</pentabarf:event-slug>
            <pentabarf:title>CTF resumes</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260517T130000</dtstart>
            <dtend>20260517T163000</dtend>
            <duration>3.03000</duration>
            <summary>CTF resumes</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Long Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/BCNJVW/</url>
            <location>Track 1</location>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>MUEAY9@@speak.enusec.org</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-MUEAY9</pentabarf:event-slug>
            <pentabarf:title>CTF - Prizes and event ends</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260517T163000</dtstart>
            <dtend>20260517T164000</dtend>
            <duration>0.01000</duration>
            <summary>CTF - Prizes and event ends</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Lighting Talk</category>
            <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/MUEAY9/</url>
            <location>Track 1</location>
            
        </vevent>
        
    </vcalendar>
</iCalendar>
