REcon 2026 Speakers


Conference Dates:  June 19-21, 2026
Location:  Hilton DoubleTree Montreal


Confirmed Conference Speakers


Current speakers from the CFP featured sessions:





Sina Kheirkhah

Sina Kheirkhah

Basics of .NET Exploitation

Workshop (3hrs)





Mathieu Farrell

Mathieu Farrell

Breaking the Backbone of Global ISP Networks

Talk (60 minutes)





Joshua Reynolds

Joshua Reynolds

C++ Symbol and Type Recovery in Binary Ninja

Workshop (3hrs)



Nicolò Altamura

Nicolò Altamura

Deobfuscation in the Age of Agentic Reverse Engineering

Short Talk (30 minutes)



Tim Blazytko

Tim Blazytko

Deobfuscation in the Age of Agentic Reverse Engineering

Short Talk (30 minutes)






bryce case, jr. / ytcracker

bryce case, jr. / ytcracker

FAT Chungus: CVE-2025-24857 - A Journey Through U-Boot Exploitation

Talk (60 minutes)



Florent TARDIF

Florent TARDIF

Forgotten TEE keys in plain sight

Talk (60 minutes)





Holger Unterbrink

Holger Unterbrink

How real-world malware disables EDR systems

Talk (60 minutes)



Philippe Laulheret

Philippe Laulheret

I have to use AI, so what now? A skeptic guide to vibing RE/VR

Short Talk (30 minutes)



Erik Egsgard

Erik Egsgard

IRON GIANT: When The Vault Becomes The Victim

Short Talk (30 minutes)



Marion Marschalek

Marion Marschalek

MIPS Malware Reverse Engineering

Workshop (2hrs)











Andy

Andy

SmallWorld

Talk (60 minutes)



William Janelle

William Janelle

SmallWorld

Talk (60 minutes)




View source list on CFP | View sessions


Trainers


Our 2026 training instructors include world-class security researchers and practitioners:


Sina Kheirkhah

Sina Kheirkhah

Advanced .NET Exploitation

Full-time vulnerability researcher specializing in low-level exploitation. Pwn2Own "Master of Pwn" 2025.



Olivier Thomas

Olivier Thomas

Advanced IC Reverse Engineering & Data Extraction

Expert in integrated circuit reverse engineering and hardware security.



Marion Marschalek

Marion Marschalek

Advanced Malware Reverse Engineering

Renowned malware researcher and reverse engineer.



Keith Ramphal

Keith Ramphal

Advanced Malware Reverse Engineering

Security researcher focusing on nation-state malware and distributed system security



Richard Johnson

Richard Johnson

AI Agents for Cybersecurity

Expert in applying AI and machine learning to security research.



Tim Blazytko

Tim Blazytko

Software Deobfuscation Techniques

Co-founder of emproof, expert in code deobfuscation and fuzzing.



Yarden Shafir

Yarden Shafir

Windows Internals for Reverse Engineers

Vulnerability researcher at Vigilant Labs, Windows internals expert.



Andrey Konovalov

Andrey Konovalov

Exploiting the Linux Kernel

Linux kernel security researcher and exploit developer.



Cristofaro Mune

Cristofaro Mune

The Art of Fault Injection

Co-founder of Raelize, 25+ years in security, expert in hardware attacks.



Niek Timmers

Niek Timmers

The Art of Fault Injection

Co-founder of Raelize, device security expert specializing in fault injection and secure boot bypass.



Julien Cohen-Scali

Julien Cohen-Scali

Attacking Real World IoT

Cybersecurity Researcher at FuzzingLabs, specializing in IoT and embedded security research.



Lucas Van Haaren

Lucas Van Haaren

Attacking Real World IoT

Security researcher at FuzzingLabs focused on IoT vulnerability research and embedded systems.



Kyle Martin

Kyle Martin

Automated Reverse Engineering with Binary Ninja

Cyber security software engineer, leads Binary Ninja trainings and develops advanced analysis tools.



Malachi Jones

Dr. Malachi Jones

Automating RE with AI/ML

Principal Cybersecurity AI/LLM Researcher at Microsoft, leads research on red team agent autonomy.



Joe Mansour

Joe Mansour

Automating RE with AI/ML

Security Researcher at Microsoft specializing in reverse engineering malware.



Corentin Bayet

Corentin Bayet

Bug Hunting in Hypervisors

CTO of REverse Tactics, Pwn2Own VM escape expert and hypervisor security researcher.



Bruno Pujos

Bruno Pujos

Bug Hunting in Hypervisors

CEO of REverse Tactics, expert in firmware and UEFI reverse engineering.



John McIntosh

John McIntosh

Building Agentic Reverse Engineering Tools

Security researcher at Clearseclabs, Ghidra tooling expert and automation specialist.



Caleb Davis

Caleb Davis

Embedded and Shredded

Founding member of SolaSec, specialist in embedded hardware security and PCB analysis.



The Flare Team

The FLARE Team

FLARE Team Guide to RE Malware

The FLARE team at Google Cloud (Mandiant) is comprised of veteran reverse engineers.



Silvio La Porta

Silvio La Porta

Modern Malware OPSEC

CEO of RETooling, malware reverse engineering expert with extensive threat analysis experience.



Antonio Villani

Antonio Villani

Modern Malware OPSEC

Co-Founder of RETooling, specializes in threat actor analysis and malware research.



Kai

Kai

Modular Implant Design for Windows

PhD at Northeastern University, specializes in implant development and offensive security.



Daniel Frederic

Daniel Frederic

Reversing Modern Binaries

Expert in reverse engineering Rust and Go binaries, malware analysis specialist.



Mathieu Hoste

Mathieu Hoste

Reversing Modern Binaries

Security engineer at FuzzingLabs, Rust and blockchain security expert.



Tanguy Duhamel

Tanguy Duhamel

Rust Development for Cyber Security

Lead Developer at FuzzingLabs, specializes in distributed fuzzing and Rust tooling.



Tristan Ferreira

Tristan Ferreira

Rust Development for Cyber Security

Cybersecurity Expert at FuzzingLabs, developer of FuzzForge fuzzing infrastructure.



View all training courses →



Hex-Rays Magnet Forensics Trail of Bits