RiskSecToronto 2017 June 12, 2017 to June 13, 2017, toronto,canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
OPENING KEYNOTE:SHARED SERVICES CANADA – ON THE FRONT LINE OF THE GOVERNMENT OF CANADA’S CYBER DEFENCE Eric Green , John Glowacki John A. Glowacki Jr. will discuss how Shared Services Canada safeguards government networks and systems ...
INTERNET OF THINGS INFO/CYBERSECURITY JOBS, SKILLS, AND STAFFING: WHAT YOU NEED TO KNOW NOW Bradley Barth , David Foote IoT is growing at a 32.6% annual rate through 2020 but a 6 million shortfall ...
MANAGING 3RD PARTY RISK Teri Robinson , John Proctor Increasingly security pro’s in Canada are faced with having 3rd parties managing risk for them ...
SECURITY AWARENESS TRAINING AND COMPLIANCE Bobby Singh , Doug Olenick , Graham Westbrook The fact remains that the most popular point of entry to your network by bad ...
TRUSTWAVE TECH SESSION Nathan Lafollette N/A
CONTAINER SECURITY - BE READY FOR NEXT-GEN VIRTUALIZATION James Smith Containers are the new virtualization platform. Containers allow application deployments faster than ever. Container life ...
GOING BEYOND NEXT-GENERATION ENDPOINT SECURITY John Beal Endpoints are at the centre of the universe of advanced attacks. They’re the most vulnerable, ...
THE ENDPOINT IS JUST THE STARTING POINT Ryan Brander In today’s perpetually evolving technological landscape, security has never been more important in every facet ...
MIND THE GAP: GOING BEYOND PENETRATION TESTING Caspian Kilkelly Subjects like IT security management, threat modelling, incident response and security architecture improvement aren't usually ...
DATA ANALYTICS VS. PRIVACY Kris Klein , Bradley Barth , Rick Doten It’s one thing to capture customer and employee data on a day-to-day basis, but what ...
LIVE RANSOMWARE DEMO – YOU’LL WANNA’ CRY Tom Levasseur , Eric Green Witness a short, punchy demo of the WannaCrypt/WannaCry ransomware doing it’s damage. Demo will be ...
CYBERDEFENSE FOR THE REST OF US Tony Sager , Bradley Barth Today’s cyber defenders are trapped in a dense “Fog of More” – more threats, tools, ...
ELEPHANTS ON THE LAWN Eric Green , Dave Lewis There is an ever building rush to innovate and bring the newest technology to the ...
CYBER 360 CLINIC: AUTOMATING THREAT INTELLIGENCE Tony Sager , Eric Green , Priscilla Moriuchi Hear practical areas to consider when building and managing your threat intel strategy. Gain an ...
CYBER 360 CLINIC: RANSOMEVERYWARE Walt Williams , Bradley Barth , Angus Macdonald Learn key methods for detection and remediation for ransomware through this hands-on workshop.
THE LAST LINE OF DEFENSE IN A RISK STRATEGY Cameron Macleod Financial institutions, healthcare providers, pharmaceutical manufacturers, and organizations across other industries struggle with optimizing regulatory ...
IS BUSINESS INTELLIGENCE POISED TO TRANSFORM CYBER SECURITY OPERATIONS? Casey Corcoran Security Operations Analysis and Reporting (SOAR) is the new Business Intelligence (BI) for Cyber Security. ...
UNSUPERVISED MACHINE LEARNING: A NEW APPROACH TO CYBER DEFENSE Alisha Lee , Mathew Beechener From insiders to sophisticated external attackers, the reality of cyber security is that the threat ...
EDITORIAL SPOTLIGHT SESSION: BUILDING A SUCCESSFUL GRC PROGRAM Walt Williams , Doug Olenick How to build a successful GRC program that even a small organization can afford and ...
THE CANADIAN CYBER THREAT EXCHANGE (CCTX) Robert Gordon , Teri Robinson , Steven Hurley , Vivek Khindria The CCTX is operational. It has just completed it’s first year. Hear from Executive Director ...