BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.nsec.io//EVUEEM
BEGIN:VTIMEZONE
TZID:EST
BEGIN:STANDARD
DTSTART:20001029T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10;UNTIL=20061029T070000Z
TZNAME:EST
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
END:STANDARD
BEGIN:STANDARD
DTSTART:20071104T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000402T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=4;UNTIL=20060402T080000Z
TZNAME:EDT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
END:DAYLIGHT
BEGIN:DAYLIGHT
DTSTART:20070311T030000
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-2026-EVUEEM@cfp.nsec.io
DTSTART;TZID=EST:20260514T154500
DTEND;TZID=EST:20260514T161500
DESCRIPTION:Offensive Security and Threat Modeling are two worlds that rare
 ly intersect even in the most mature and security minded organizations. Ho
 wever\, they both can be about the same subject\, a given system\, and the
  same overarching goal: to improve the security posture of that system.\n\
 nThis talk is the fruition of an unlikely team up of two specialists: one 
 in offensive security\, who  engages organizations with external pentestin
 g and one in application security\, who performs threat modeling as part o
 f the internal software development process.\n\nBoth could be working on a
 ctivities of the same security program\, but are they often put in the sam
 e room the way they will be put on stage here? Will they fight or end up s
 haking their heads in unison for consternation? What are the actual gains 
 of having them work to bring together offensive security and threat modeli
 ng?\n\nTo answer that\, we will introduce the foundations for both crafts 
 with obligatory definitions\, but also give opinionated takes on goals and
  value for effectiveness and productive engagements.\n\nBy the end of this
  talk\, you’ll see how pentesting can evolve from opportunistic to strat
 egic\, and how threat modeling assumptions can be validated\, confirmed an
 d prioritized. All that aligned with business needs\, and with some much n
 eeded collaboration between the two disciplines.
DTSTAMP:20260507T212018Z
LOCATION:Ville-Marie
SUMMARY:Offensive Security and Threat Modeling\, an unlikely collaboration 
 - Jonathan Marcil\, Martin Dubé
URL:https://cfp.nsec.io/2026/talk/EVUEEM/
END:VEVENT
END:VCALENDAR
