GeekWeek 9

geekweek banner

GeekWeek provides an opportunity for participants to take few days away from their day-to-day and work with public sector, industry, critical infrastructure and international partners to explore innovative ideas in the cyber security space.


Photo of Vanier Facility

Canadian Centre for Cyber Security
1625 Vanier Parkway, Ottawa
ON K1L 7P1

May 29 to June 7, 2024

If you’re interested in future Geek events, reach out to


Given the technical nature of the workshop, GeekWeek is an invitation-only event.



The following topics and themes have been proposed for GeekWeek 9.

  • Physical cyber systems
    • Preparing for a wireless future
    • Industrial spectrum monitoring
    • Industrial control systems - Operational technology security for energy
    • Digital identity
    • Security gateway for connected cars
    • Hunting the hunters
    • Firmware security
  • Cyber toolboxes and analytical environments
    • Memory analysis
    • Live sandboxes
    • Industrial control systems honeypot
    • Remote desktop protocol honeypot
    • Home modems and routers protection
    • Internet scanner
  • Cyber threat hunting
    • Detecting and decoding advanced persistent threat malware
    • Validation cyber threat infrastructure
    • Cyber artifact crowdsourcing
    • Malicious infrastructure and threat hunting
    • Operationalize hunting malicious samples
    • Cross-organization data harvesting and analytics
    • It’s all about money
  • Cyber threat analytics
    • Cyber security posture
    • Cyber threat storytelling
    • Protecting country-specific domains from phishing campaigns
    • Advanced genetic malware analysis
    • Malicious email identification and triage enhancement with large language models (LLMs)
    • Cyber news aggregation ad summarization with LLMs
    • Automated signature generation
  • Cyber protection, assessment and defence
    • Building secure cloud applications
    • Monitoring, analytics and scaling security in the cloud
    • Hardened router operating system
    • Analyze this!
    • Feeding the dragon: Threat modeling and risk assessment made easy
    • Evaluating software deployed through business networks
    • Bridging the communication gap in cyber security
    • Secure and private mobile operating system
  • Open-source solutions: Giving back to the cyber security community
    • Cyber range development
    • Cyber tools development: Kangooroo, Borealis, Chameleon/Beever, BeAVER, Assemblyline and BADGER
  • Cyber defence turnkey solutions
    • Cyber defense Fly-Away kit
    • Secure operations centre (SOC) in a box
      • Platform
      • Pipeline for data collection
      • Analytics
      • Machine learning-based analytics

 For more general information about GeekWeek, visit the GeekWeek page.

Report a problem on this page

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Please select all that apply:

Thank you for your help!

You will not receive a reply. For enquiries, please contact us.

Date modified: