<?xml version='1.0' encoding='utf-8' ?>
<!-- Made with love by pretalx v2025.2.2. -->
<schedule>
    <generator name="pretalx" version="2025.2.2" />
    <version>0.3</version>
    <conference>
        <title>Le Tour Du Hack</title>
        <acronym>le-tour-du-hack-2026</acronym>
        <start>2026-05-16</start>
        <end>2026-05-17</end>
        <days>2</days>
        <timeslot_duration>00:05</timeslot_duration>
        <base_url>https://speak.enusec.org</base_url>
        
        <time_zone_name>UTC</time_zone_name>
        
        
    </conference>
    <day index='1' date='2026-05-16' start='2026-05-16T04:00:00+00:00' end='2026-05-17T03:59:00+00:00'>
        <room name='Track 1' guid='8f5bd460-577f-5f3b-9ab6-190193033ebd'>
            <event guid='495c7cfb-d474-54b4-b827-4fe703632b20' id='32'>
                <room>Track 1</room>
                <title>Registration opens</title>
                <subtitle></subtitle>
                <type>Normal Talk</type>
                <date>2026-05-16T09:00:00+00:00</date>
                <start>09:00</start>
                <duration>00:45</duration>
                <abstract>Registration opens at this time</abstract>
                <slug>le-tour-du-hack-2026-32-registration-opens</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/9W78TE/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/9W78TE/feedback/</feedback_url>
            </event>
            <event guid='f0d301fe-129c-59fa-a987-e571a8fdbf05' id='25'>
                <room>Track 1</room>
                <title>OPENING REMARKS</title>
                <subtitle></subtitle>
                <type>Lighting Talk</type>
                <date>2026-05-16T09:45:00+00:00</date>
                <start>09:45</start>
                <duration>00:15</duration>
                <abstract>Opening remarks, does what it says on the tin...</abstract>
                <slug>le-tour-du-hack-2026-25-opening-remarks</slug>
                <track></track>
                
                <persons>
                    <person id='29'>Team ENUSEC (Connor, Scott, Lewis, Xander &amp; Eden)</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/YS3HC9/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/YS3HC9/feedback/</feedback_url>
            </event>
            <event guid='f5e0d24a-9ba4-577a-9d9a-087a681d9cd4' id='27'>
                <room>Track 1</room>
                <title>KEYNOTE - History&#8217;s Blueprint for Cyber Resilience</title>
                <subtitle></subtitle>
                <type>Normal Talk</type>
                <date>2026-05-16T10:00:00+00:00</date>
                <start>10:00</start>
                <duration>00:30</duration>
                <abstract>How do you build cyber resilience when everything is moving fast? This keynote explores engineering thinking, human judgement and designing systems that can be trusted when the stakes are high.</abstract>
                <slug>le-tour-du-hack-2026-27-keynote-history-s-blueprint-for-cyber-resilience</slug>
                <track></track>
                
                <persons>
                    <person id='31'>Gemma Barrow</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/BDHGW8/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/BDHGW8/feedback/</feedback_url>
            </event>
            <event guid='56f79bee-4fa0-53f1-ba48-1ea5248b802b' id='5'>
                <room>Track 1</room>
                <title>Automating Chaos at Scale</title>
                <subtitle></subtitle>
                <type>Long Talk</type>
                <date>2026-05-16T10:30:00+00:00</date>
                <start>10:30</start>
                <duration>01:00</duration>
                <abstract>What happens when you stop treating AI like a chatbot and start treating it like an execution engine and give it access to untapped ADHD?</abstract>
                <slug>le-tour-du-hack-2026-5-automating-chaos-at-scale</slug>
                <track></track>
                
                <persons>
                    <person id='9'>Andy Gill</person>
                </persons>
                <language>en</language>
                <description>This talk explores how to weaponise AI for rapid idea-to-tool pipelines taking half-formed, borderline chaotic ideas and turning them into working tools, side projects, and offensive experiments at speed. Not polished SaaS. Not over-engineered platforms. Building chaos at scale.

I&#8217;ll walk through how AI can be used to:
	&#8226;	Break past the &#8220;I&#8217;ll build that someday&#8221; backlog
	&#8226;	Prototype tools in hours instead of weeks
	&#8226;	Explore unconventional or &#8220;bad&#8221; ideas safely and quickly
	&#8226;	Chain together automation, code generation, and testing loops
	&#8226;	Validate whether something is genuinely useful or just noise

Along the way, I&#8217;ll look at real examples of AI-assisted builds: from scrappy utilities to fully functional tooling that would never have existed without lowering the barrier to execution.

This isn&#8217;t about replacing developers. It&#8217;s about removing friction and what happens when that friction disappears.</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/S73CHT/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/S73CHT/feedback/</feedback_url>
            </event>
            <event guid='28027b77-d73a-59cb-bd03-ab397d5a4e0c' id='8'>
                <room>Track 1</room>
                <title>How does AI, Geopolitics impact on the cyber landscape ? What can you do to &#8220;hack&#8221; your brain for a resilient career !</title>
                <subtitle></subtitle>
                <type>Normal Talk</type>
                <date>2026-05-16T11:40:00+00:00</date>
                <start>11:40</start>
                <duration>00:30</duration>
                <abstract>We will explore the AI landscape, geopolitical challenges and how that impacts your career ! AI bubble (or not ?) will be contextualised in the face a continuous change to provide an opportunity to look at the horizon skills for the future (harder to predict than you think) !
 
James will demonstrate how he has pivoted his skills in a continuous learning path to ensure relevance to the market needs throughout his career.
We will explore the geopolitical situation and what it means for individuals and the challenges for a resilient cyber society
Learnings   
AI and the geopolitical landscape trends and the potential impact on your career.
How to develop and maintain your personal resilience in the new evolving landscape.</abstract>
                <slug>le-tour-du-hack-2026-8-how-does-ai-geopolitics-impact-on-the-cyber-landscape-what-can-you-do-to-hack-your-brain-for-a-resilient-career</slug>
                <track></track>
                
                <persons>
                    <person id='11'>James K.</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/BMXMF8/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/BMXMF8/feedback/</feedback_url>
            </event>
            <event guid='d8881e74-f8f5-5344-8c73-7e4d930f6e50' id='7'>
                <room>Track 1</room>
                <title>Panel Discussion - What it&#8217;s really like to work in cyber security in a large organisation?</title>
                <subtitle></subtitle>
                <type>Normal Talk</type>
                <date>2026-05-16T12:40:00+00:00</date>
                <start>12:40</start>
                <duration>00:30</duration>
                <abstract>Featuring panellists from Lloyds, this panel discussion will be on working in cyber in large organisations. What is it really like?</abstract>
                <slug>le-tour-du-hack-2026-7-panel-discussion-what-it-s-really-like-to-work-in-cyber-security-in-a-large-organisation</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/N3Z8CW/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/N3Z8CW/feedback/</feedback_url>
            </event>
            <event guid='4bc8afaf-edd2-587b-80ed-c15e49653f07' id='16'>
                <room>Track 1</room>
                <title>Securing ATMs: 101</title>
                <subtitle></subtitle>
                <type>Normal Talk</type>
                <date>2026-05-16T13:10:00+00:00</date>
                <start>13:10</start>
                <duration>00:30</duration>
                <abstract>Join Kerry Archibald for an enlightening talk on securing ATMs in the real world. Drawing on over a decade of experience, this session discusses 15 essential rules for ATM security, debunks persistent industry misconceptions, and examines how criminal groups actually attack machines in practice. Kerry also tackles one of the toughest problems defenders face: why proven protections so often go unapplied.</abstract>
                <slug>le-tour-du-hack-2026-16-securing-atms-101</slug>
                <track></track>
                <logo>/media/le-tour-du-hack-2026/submissions/Z9VD7V/work_photo_ykSGise_Lf3KQBG.webp</logo>
                <persons>
                    <person id='19'>Kerry Archibald</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/Z9VD7V/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/Z9VD7V/feedback/</feedback_url>
            </event>
            <event guid='73a4d24a-f01d-5a95-bcb4-8d6ee260c77a' id='21'>
                <room>Track 1</room>
                <title>Ghosts in the Cluster - Hiding in Kubernetes for Years</title>
                <subtitle></subtitle>
                <type>Normal Talk</type>
                <date>2026-05-16T13:40:00+00:00</date>
                <start>13:40</start>
                <duration>00:30</duration>
                <abstract>You&apos;ve popped a Kubernetes cluster. You&apos;ve got admin creds. Now the real question is how do you stay? Kubernetes abstracts away enormous complexity across multiple layers, from container runtimes to cluster APIs and each of those layers has dark corners where an attacker can set up shop and go unnoticed for months or even years.

This talk is a post-exploitation deep dive into Kubernetes persistence. We&apos;ll walk through a compromised cluster layer by layer, demonstrating how attackers can escape to cluster nodes, spin up containers invisible to kubectl, abuse the Kubelet API to dodge audit logging and admission control, and create phantom credentials that survive long after the initial breach is forgotten. If defenders aren&apos;t watching every layer of the stack, they won&apos;t see you coming, or going.</abstract>
                <slug>le-tour-du-hack-2026-21-ghosts-in-the-cluster-hiding-in-kubernetes-for-years</slug>
                <track></track>
                
                <persons>
                    <person id='24'>Rory McCune</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/EEMPKG/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/EEMPKG/feedback/</feedback_url>
            </event>
            <event guid='5fcfe59b-3875-5ff9-824c-088f3f8f28eb' id='20'>
                <room>Track 1</room>
                <title>The eCrime Ecosystem: How Cybercriminals Operate and How We Track Them</title>
                <subtitle></subtitle>
                <type>Normal Talk</type>
                <date>2026-05-16T14:20:00+00:00</date>
                <start>14:20</start>
                <duration>00:30</duration>
                <abstract>I would like to propose a talk exploring the broader cybercriminal ecosystem, drawing on my experience as an Intelligence Analyst at CrowdStrike. The talk will introduce key concepts in Cyber Threat Intelligence (CTI) and how analysts use it to track and understand adversary behaviour, before exploring how eCrime operates as a structured, business-like underground economy. During the session I will focus on real threat actors I track in my day-to-day work, offering attendees a rare, practitioner-level insight into how adversaries operate at scale. I believe CTI remains an underrepresented career path in the industry, and I hope this talk will inspire students &#8212; particularly those drawn to analytical rather than purely technical roles &#8212; to consider it as a rewarding and exciting avenue within cyber security.</abstract>
                <slug>le-tour-du-hack-2026-20-the-ecrime-ecosystem-how-cybercriminals-operate-and-how-we-track-them</slug>
                <track></track>
                
                <persons>
                    <person id='23'>David Rowney</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/DNQMKH/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/DNQMKH/feedback/</feedback_url>
            </event>
            <event guid='317e1c6d-b587-5cd0-8244-c6d6fd76b5e8' id='24'>
                <room>Track 1</room>
                <title>Meet the Fixers: How One Social Engineering Technique Spawned a Family  and How to Catch It</title>
                <subtitle></subtitle>
                <type>Long Talk</type>
                <date>2026-05-16T14:50:00+00:00</date>
                <start>14:50</start>
                <duration>01:00</duration>
                <abstract>Last year at LTDH I did a talk on ClickFix &#8212; the fake-CAPTCHA trick that gets users to paste malicious commands into the Run dialog. I thought I was done with the topic.

A year on, ClickFix has grown a family. FileFix moves the trick to File Explorer. ConsentFix (APT29) does it through OAuth and bypasses MFA and passkeys without ever touching the endpoint. CrashFix deliberately breaks your browser, then offers the fix. And a DPRK-nexus actor used a ClickFix-style fake job interview to compromise an Axios maintainer putting 100M weekly npm downloads in the blast radius.

Part one: how the family grew up. Part two: how we catch them &#8212; SIEM queries, Conditional Access, browser hardening, the lot. Part three: why none of this stays solved, because custom ClickFix GPTs and AI-generated lures are about to make the next variant cheaper than the last.</abstract>
                <slug>le-tour-du-hack-2026-24-meet-the-fixers-how-one-social-engineering-technique-spawned-a-family-and-how-to-catch-it</slug>
                <track></track>
                
                <persons>
                    <person id='28'>Cameron Cottam</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/VHZED7/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/VHZED7/feedback/</feedback_url>
            </event>
            <event guid='fafde251-b755-5966-b72b-0a5f3c517512' id='22'>
                <room>Track 1</room>
                <title>The Nightmare before Christmas</title>
                <subtitle></subtitle>
                <type>Normal Talk</type>
                <date>2026-05-16T15:50:00+00:00</date>
                <start>15:50</start>
                <duration>00:30</duration>
                <abstract>Do hackers take holidays? Join me as I discuss a real DFIR incident where a employees brand new device is compromised via SEO poisoning, and find out how Christmas saved a company from a full-scale ransomware attack!</abstract>
                <slug>le-tour-du-hack-2026-22-the-nightmare-before-christmas</slug>
                <track></track>
                
                <persons>
                    <person id='25'>Samantha Varley</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/NNBFMC/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/NNBFMC/feedback/</feedback_url>
            </event>
            <event guid='3cd89640-e55a-5900-ae4b-d9a3e7e3fe47' id='2'>
                <room>Track 1</room>
                <title>Hot Singles In Your Area Want Your Session Tokens</title>
                <subtitle></subtitle>
                <type>Long Talk</type>
                <date>2026-05-16T16:20:00+00:00</date>
                <start>16:20</start>
                <duration>01:00</duration>
                <abstract>A live demonstration of modern BEC attacks, MFA bypass, and how attackers monetise trust.</abstract>
                <slug>le-tour-du-hack-2026-2-hot-singles-in-your-area-want-your-session-tokens</slug>
                <track></track>
                
                <persons>
                    <person id='7'>Michael Varley</person>
                </persons>
                <language>en</language>
                <description>We&#8217;re going to log into someone else&#8217;s email account - and they&#8217;re going to help us do it! From phishing to MFA bypass to session hijacking, this session walks through a real-world BEC attack chain end-to-end.

Then we ruin the attacker&#8217;s day by showing exactly how to stop it.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/Z9MJ8X/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/Z9MJ8X/feedback/</feedback_url>
            </event>
            <event guid='f8d3f7d9-a0ef-5d46-ba10-d10c17a350d7' id='11'>
                <room>Track 1</room>
                <title>No Signature, No Problem: Detecting the Coming 0-Day Flood</title>
                <subtitle></subtitle>
                <type>Normal Talk</type>
                <date>2026-05-16T17:20:00+00:00</date>
                <start>17:20</start>
                <duration>00:30</duration>
                <abstract>AI models like Mythos are finding exploitable vulnerabilities faster than the industry can disclose, patch, or write signatures for them. The inevitable consequence: a flood of 0-days in the wild. Every signature-based detection you own is, by definition, blind to them. This talk makes the case that statistical anomaly detection is no longer an optional &quot;ML in security&quot; side quest. It&apos;s the only class of detection that can catch the exploitation of things nobody knows exist yet. Drawing on production experience building ML detection, we&apos;ll cover what works, what doesn&apos;t, and why your UEBA tab isn&apos;t going to save you.</abstract>
                <slug>le-tour-du-hack-2026-11-no-signature-no-problem-detecting-the-coming-0-day-flood</slug>
                <track></track>
                
                <persons>
                    <person id='14'>Aidan McLaughlin</person>
                </persons>
                <language>en</language>
                <description>Detection engineering has always been a race: find a vuln, reverse the exploit, write a signature, push it out, hope you beat the attackers. That race was losing even before automation. With AI-driven vulnerability discovery, the race is over. The discovery rate is about to dwarf the signature-authoring rate by orders of magnitude, and a meaningful fraction of those findings will be weaponised before any defender has them.
That leaves one brute mathematical fact: you cannot write a signature for something you don&apos;t know exists. The only detection strategy that survives this world is one that looks for the effects of exploitation rather than its fingerprints. Statistical anomaly detection.
In this talk we&apos;ll cover:

The supply-side economics of AI vuln discovery, and why 0-day proliferation is structurally inevitable rather than speculative
Why signature-based detection breaks down in this regime, with numbers
What &quot;anomaly detection&quot; actually means (time-series, graph, distribution-based), and the crucial distinctions most vendors blur
Real examples: detections that caught novel behaviour in production vs. the ones that generated 400 alerts a day
The analyst UX problem: explainability, triage, and why most ML detections die in the SOC
A pragmatic starting point for teams without a PhD on staff

This is a hardened follow-up to a talk given at Cyber Scotland Connect in 2025, updated for a world where vulnerability discovery itself has been automated.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/GBRHXN/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/GBRHXN/feedback/</feedback_url>
            </event>
            <event guid='538821fd-fa00-5f97-b840-89b9ae822e23' id='26'>
                <room>Track 1</room>
                <title>CLOSING REMARKS</title>
                <subtitle></subtitle>
                <type>Lighting Talk</type>
                <date>2026-05-16T17:50:00+00:00</date>
                <start>17:50</start>
                <duration>00:15</duration>
                <abstract>The remarks that close</abstract>
                <slug>le-tour-du-hack-2026-26-closing-remarks</slug>
                <track></track>
                
                <persons>
                    <person id='29'>Team ENUSEC (Connor, Scott, Lewis, Xander &amp; Eden)</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/JEDJGG/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/JEDJGG/feedback/</feedback_url>
            </event>
            <event guid='787bc84e-7844-5b36-9b13-85a7149a9a85' id='33'>
                <room>Track 1</room>
                <title>AFTERPARTY</title>
                <subtitle></subtitle>
                <type>Long Talk</type>
                <date>2026-05-16T18:30:00+00:00</date>
                <start>18:30</start>
                <duration>01:00</duration>
                <abstract>At this time, the afterparty at the Fountainbridge Fox will begin. 18+ only, have wristbands ready</abstract>
                <slug>le-tour-du-hack-2026-33-afterparty</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/T3RRT7/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/T3RRT7/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Track 2' guid='113a33f9-a656-5f72-a05f-94d90f37c5b4'>
            <event guid='4f04d3cb-1ce3-5cbf-b688-b0c8b28580e9' id='13'>
                <room>Track 2</room>
                <title>You&#8217;ve Been Ph0ned: How Attackers Compromise Organisations Via Telephone Social Engineering</title>
                <subtitle></subtitle>
                <type>Normal Talk</type>
                <date>2026-05-16T11:40:00+00:00</date>
                <start>11:40</start>
                <duration>00:30</duration>
                <abstract>While organizations spent years training users against email phishing, attackers quietly perfected vishing attacks that bypass MFA and turn helpful helpdesk staff into unwitting accomplices - causing billions in damages across retail, automotive, and gaming industries. This talk combines real red-team war stories with a live AI voice cloning demo to show how modern vishing works and what defences actually stop it.</abstract>
                <slug>le-tour-du-hack-2026-13-you-ve-been-ph0ned-how-attackers-compromise-organisations-via-telephone-social-engineering</slug>
                <track></track>
                
                <persons>
                    <person id='15'>Luiz S</person>
                </persons>
                <language>en</language>
                <description>While just about everyone has trained users not to click suspicious emails, attackers have quietly moved to the channel nobody prepared for: the phone. From retail giants and luxury brands to automotive manufacturers and casino operators - all have suffered massive financial damages from attacks that started with something as simple as a phone call.
Drawing from real world red teaming engagements, Luiz will walk through the modern vishing playbook: how attackers research targets, craft believable pretexts, pressure helpdesks into breaking their own security policies, and bypass multi factor authentication that was supposed to end credential theft.
The talk includes a live AI voice cloning demonstration, honest discussion of the ethical challenges in realistic social engineering testing, and practical defences that go beyond &quot;just be suspicious of phone calls&quot;.</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/FEEBJU/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/FEEBJU/feedback/</feedback_url>
            </event>
            <event guid='9bbd6ed0-2dcf-5c8d-8054-88f7e29d486b' id='4'>
                <room>Track 2</room>
                <title>The Dark Sorcery of Video Encoding</title>
                <subtitle></subtitle>
                <type>Normal Talk</type>
                <date>2026-05-16T13:10:00+00:00</date>
                <start>13:10</start>
                <duration>00:30</duration>
                <abstract>This is a story all about how video takes up WAY more data than you think, a bit of history, and a dive into how we play with quality, motion vectors and even how our eyes perceive colour to compress it.</abstract>
                <slug>le-tour-du-hack-2026-4-the-dark-sorcery-of-video-encoding</slug>
                <track></track>
                
                <persons>
                    <person id='8'>Del Angel Stormreul</person>
                </persons>
                <language>en</language>
                <description>Video takes up a LOT of data. Each pixel is 3 bytes if you&apos;re only using 8 bit colour and the numbers get wild as resolution, framerate and bit depth goes up.

How does video encoding work in general? What improvements have we seen throughout history? Could the planet&apos;s infrastructure survive a world without video compression? Should you maybe use GPU encoding for your video projects? (Spoiler: Yes)

Time to dig into one of those things we never even think about, let alone take for granted - Video encoding.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/FZX9DN/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/FZX9DN/feedback/</feedback_url>
            </event>
            <event guid='c3c7d148-426f-54a9-bbdb-0fefa976ca77' id='19'>
                <room>Track 2</room>
                <title>Not Just Tech: The People and Politics of Cyber</title>
                <subtitle></subtitle>
                <type>Lighting Talk</type>
                <date>2026-05-16T13:40:00+00:00</date>
                <start>13:40</start>
                <duration>00:15</duration>
                <abstract>Short overview of the importance of breaking out of a purely technical silo to examine the policy and human factors that play an increasing role in cybersecurity</abstract>
                <slug>le-tour-du-hack-2026-19-not-just-tech-the-people-and-politics-of-cyber</slug>
                <track></track>
                
                <persons>
                    <person id='22'>Imogen McCall</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/SAGKR7/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/SAGKR7/feedback/</feedback_url>
            </event>
            <event guid='4860c5af-d4b2-5e68-b188-4383e36856bf' id='15'>
                <room>Track 2</room>
                <title>Testing What the Scanner Missed: A Bug Bounty Perspective</title>
                <subtitle></subtitle>
                <type>Normal Talk</type>
                <date>2026-05-16T14:20:00+00:00</date>
                <start>14:20</start>
                <duration>00:30</duration>
                <abstract>I have been doing bug bounties for like 6 years now. I have seen most of the people use the scanners to find the issues however those scanners are not that much effective. As someone who has worked as a security expert for six years, I would say that the most interesting exploits are those that cannot be detected through any scanners. The subject of this lecture is manual testing where you go through the application to find the issues in it by yourself that where you find the most interesting stuff which the scanners can&apos;t</abstract>
                <slug>le-tour-du-hack-2026-15-testing-what-the-scanner-missed-a-bug-bounty-perspective</slug>
                <track></track>
                
                <persons>
                    <person id='16'>Suresh Aydi</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/TYSGCW/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/TYSGCW/feedback/</feedback_url>
            </event>
            <event guid='7e64b029-e060-5e68-b91e-2852f516b649' id='9'>
                <room>Track 2</room>
                <title>From Data to Defense: Real-World Cyber Threat Intelligence &amp; Threat Hunting</title>
                <subtitle></subtitle>
                <type>Long Talk</type>
                <date>2026-05-16T14:50:00+00:00</date>
                <start>14:50</start>
                <duration>01:00</duration>
                <abstract>Cyber attacks don&#8217;t start with alerts &#8212; they start long before, hidden in data.

This talk explores how Cyber Threat Intelligence (CTI) transforms raw data into actionable insights, enabling defenders to move from reactive to proactive security.

Through real-world examples, including large-scale event targeting scenarios, we&#8217;ll break down how attackers operate, how defenders detect them, and how you can start threat hunting effectively.</abstract>
                <slug>le-tour-du-hack-2026-9-from-data-to-defense-real-world-cyber-threat-intelligence-threat-hunting</slug>
                <track></track>
                
                <persons>
                    <person id='10'>Ayush Aggarwal</person>
                </persons>
                <language>en</language>
                <description>This session dives into the practical side of Cyber Threat Intelligence (CTI) and Threat Hunting, focusing on how defenders can anticipate, detect, and respond to modern cyber threats.

We will begin by understanding what threat intelligence really means beyond buzzwords, covering its lifecycle, types, and how it integrates into real security operations.

The session then explores attacker behavior using frameworks like MITRE ATT&amp;CK and the Cyber Kill Chain, helping attendees understand how adversaries think, move, and exploit systems.

A key part of the talk will focus on threat hunting &#8212; how to proactively search for threats using indicators of compromise (IOCs), behavioral patterns, and attacker TTPs.

We will also walk through a real-world inspired case study based on large-scale global events (such as international sporting events).

By the end of the session, attendees will:
Understand how to apply CTI in real environments
Learn how to identify high-value detection signals (TTPs vs IOCs)
Gain a beginner-friendly roadmap to start threat hunting
Be able to think like both an attacker and a defender

This talk is designed for students, beginners, and intermediate cybersecurity enthusiasts who want practical, actionable insights not just theory.</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/QS9WQH/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/QS9WQH/feedback/</feedback_url>
            </event>
            <event guid='9a99e207-5c47-5174-ab5e-9d420b4d3019' id='10'>
                <room>Track 2</room>
                <title>Burning the candle at all ends - a burnout talk</title>
                <subtitle></subtitle>
                <type>Normal Talk</type>
                <date>2026-05-16T15:50:00+00:00</date>
                <start>15:50</start>
                <duration>00:30</duration>
                <abstract>Life sucks. Between the chaos of work/uni life and personal life, it can be hard to make time for some R&amp;R. We will be discussing what you can do to better manage the chaos as well as activities you can do to unwind and disconnect from the world for a bit.</abstract>
                <slug>le-tour-du-hack-2026-10-burning-the-candle-at-all-ends-a-burnout-talk</slug>
                <track></track>
                
                <persons>
                    <person id='13'>Kit</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/T7937A/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/T7937A/feedback/</feedback_url>
            </event>
            <event guid='9a2c26a6-63e1-5507-b3f8-d79e19a16567' id='14'>
                <room>Track 2</room>
                <title>Dumb shit in history 3.0</title>
                <subtitle></subtitle>
                <type>Normal Talk</type>
                <date>2026-05-16T16:20:00+00:00</date>
                <start>16:20</start>
                <duration>00:30</duration>
                <abstract>History is full of people making terrible decisions with absolute confidence. &#8220;Dumb Shit in History Part 3&#8221; dives into absurd real-world events &#8212; including fake armies, corpse trials, poisoned aristocrats, and wars over almost nothing &#8212; before drawing uncomfortable parallels to modern cyber security. Equal parts comedy, history lesson, and cautionary tale.</abstract>
                <slug>le-tour-du-hack-2026-14-dumb-shit-in-history-3-0</slug>
                <track></track>
                
                <persons>
                    <person id='17'>Jon</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/QFVNJL/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/QFVNJL/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Track 3' guid='e5c71772-3e94-57cf-90af-d54d1b671dd0'>
            <event guid='aeb71d11-9617-52f3-8543-393b270efc46' id='28'>
                <room>Track 3</room>
                <title>Lockpicking &amp; Physical Security Village</title>
                <subtitle></subtitle>
                <type>Long Talk</type>
                <date>2026-05-16T10:00:00+00:00</date>
                <start>10:00</start>
                <duration>01:30</duration>
                <abstract>Come pick locks</abstract>
                <slug>le-tour-du-hack-2026-28-lockpicking-physical-security-village</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/7DSCQG/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/7DSCQG/feedback/</feedback_url>
            </event>
            <event guid='9b94141f-16f7-5792-a204-bf3b3b1a842f' id='17'>
                <room>Track 3</room>
                <title>Hiding in Plain Sight - OSINT CTF (workshop)</title>
                <subtitle></subtitle>
                <type>Long Talk</type>
                <date>2026-05-16T13:10:00+00:00</date>
                <start>13:10</start>
                <duration>01:00</duration>
                <abstract>Hiding in Plain Sight - OSINT CTF</abstract>
                <slug>le-tour-du-hack-2026-17-hiding-in-plain-sight-osint-ctf-workshop</slug>
                <track></track>
                
                <persons>
                    <person id='15'>Luiz S</person>
                </persons>
                <language>en</language>
                <description>Open Source Intelligence (OSINT) CTF</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/ZR3GKH/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/ZR3GKH/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    <day index='2' date='2026-05-17' start='2026-05-17T04:00:00+00:00' end='2026-05-18T03:59:00+00:00'>
        <room name='Track 1' guid='8f5bd460-577f-5f3b-9ab6-190193033ebd'>
            <event guid='5e17a5aa-e743-5a97-a79a-9c44f272087d' id='34'>
                <room>Track 1</room>
                <title>Doors Open - Day 2</title>
                <subtitle></subtitle>
                <type>Long Talk</type>
                <date>2026-05-17T09:30:00+00:00</date>
                <start>09:30</start>
                <duration>01:00</duration>
                <abstract>When we will admit attendees into the space for the CTF on day 2</abstract>
                <slug>le-tour-du-hack-2026-34-doors-open-day-2</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/RJMCQN/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/RJMCQN/feedback/</feedback_url>
            </event>
            <event guid='607e9caf-987a-5c1a-b898-bd94fd5c7559' id='30'>
                <room>Track 1</room>
                <title>Welcome</title>
                <subtitle></subtitle>
                <type>Lighting Talk</type>
                <date>2026-05-17T10:30:00+00:00</date>
                <start>10:30</start>
                <duration>00:15</duration>
                <abstract>Welcome and CTF Kickoff</abstract>
                <slug>le-tour-du-hack-2026-30-welcome</slug>
                <track></track>
                
                <persons>
                    <person id='29'>Team ENUSEC (Connor, Scott, Lewis, Xander &amp; Eden)</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/KEESQ9/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/KEESQ9/feedback/</feedback_url>
            </event>
            <event guid='1e312085-9166-52da-9ea7-15f614d55e0a' id='37'>
                <room>Track 1</room>
                <title>CTF - Morning</title>
                <subtitle></subtitle>
                <type>Long Talk</type>
                <date>2026-05-17T10:45:00+00:00</date>
                <start>10:45</start>
                <duration>01:15</duration>
                <abstract>CTF competition before lunch</abstract>
                <slug>le-tour-du-hack-2026-37-ctf-morning</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/EDFY3Z/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/EDFY3Z/feedback/</feedback_url>
            </event>
            <event guid='21dd83fb-7deb-5eeb-a806-123e48dfe52b' id='35'>
                <room>Track 1</room>
                <title>Lunch - Day 2</title>
                <subtitle></subtitle>
                <type>Long Talk</type>
                <date>2026-05-17T12:00:00+00:00</date>
                <start>12:00</start>
                <duration>01:00</duration>
                <abstract>Lunch break during the CTF</abstract>
                <slug>le-tour-du-hack-2026-35-lunch-day-2</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/89DEJE/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/89DEJE/feedback/</feedback_url>
            </event>
            <event guid='33c476e7-7184-5a99-acdb-02ab78b9ec5a' id='36'>
                <room>Track 1</room>
                <title>CTF resumes</title>
                <subtitle></subtitle>
                <type>Long Talk</type>
                <date>2026-05-17T13:00:00+00:00</date>
                <start>13:00</start>
                <duration>03:30</duration>
                <abstract>CTF resumes after lunch</abstract>
                <slug>le-tour-du-hack-2026-36-ctf-resumes</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/BCNJVW/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/BCNJVW/feedback/</feedback_url>
            </event>
            <event guid='9f9d5a97-1392-51be-b4ed-519f706c869e' id='38'>
                <room>Track 1</room>
                <title>CTF - Prizes and event ends</title>
                <subtitle></subtitle>
                <type>Lighting Talk</type>
                <date>2026-05-17T16:30:00+00:00</date>
                <start>16:30</start>
                <duration>00:10</duration>
                <abstract>CTF ends, we&apos;ll hand out the prizes</abstract>
                <slug>le-tour-du-hack-2026-38-ctf-prizes-and-event-ends</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://speak.enusec.org/le-tour-du-hack-2026/talk/MUEAY9/</url>
                <feedback_url>https://speak.enusec.org/le-tour-du-hack-2026/talk/MUEAY9/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    
</schedule>
