DC416 — AI Fight Club: Talk + Workshop
Details
Everyone is shipping "AI-powered" security. Almost no one is honest about where it works and where it guesses.
This month, two DC416 organizers run the same fight from opposite corners. The Thursday talk frames it. The Friday workshop puts it in your hands.
THE TALK
Amir Hosseinpour covers offense. A year of pointing AI at real production code, plus everything DC416 has tried as a community. Where it actually finds bugs, where it just burns tokens and lies to you about it, and the scaffolding that gets any frontier model behaving the same way regardless of vendor. Cost numbers. The kind that make you reconsider whether that last scan was worth it. And an honest answer to when you should put the LLM down and read the code yourself.
KC Udonsi covers defense. Most blue-team tooling was built assuming a human reads every alert. AI breaks that assumption in ways that are not obvious until something goes wrong. KC built his own AI-native breach detector and is running it live, in the room, against real attack data from a Wizard Spider emulation. Not a vendor demo. His own code, real data, in front of the audience.
THE SPEAKERS
Amir Hosseinpour — DC416 Co-Organizer
Drives DC416's offensive AI experiments. Spends his weeks pointing frontier models at real production code, real CVEs, and real bug bounty surface, and writing down what actually moves the needle versus what just burns money.
KC Udonsi — DC416 Co-Organizer
CISSP. University of Toronto Computer Science. Co-creator of OpenSecurityTraining2's Vulnerabilities 1001 class. Inventor on a TD Bank patent for continuous verification and response platforms. Current focus: AI-native application security and where automation earns its keep on defense.
DETAILS
Date: Thursday, May 21, 2026
Doors open: 6:15 PM
Talk starts: 6:45 PM
Location: downtown Toronto, hosted by Stan
**Cost: Free RSVP Here: https://events.defcontoronto.ca**
WORKSHOP FOLLOW-UP
Friday, May 22 — hands-on workshop, 10 AM to 3 PM, hosted by Palo Alto Networks downtown Toronto. Five hours, three mentors (Amir, KC, and Jeet). Build a red-teaming agent from scratch in the offense half, then flip sides and build the core of an AI-native breach detector in the defense half. Bring a laptop. AI access is provided.
Only 50 spots available.
**Cost: Free RSVP Here: https://events.defcontoronto.ca**
SPONSORS
Huge thank you to Stan, Palo Alto Networks, and White Tuque for making this possible.
