SECTOR 2018 Oct. 2, 2018 to Oct. 3, 2018, Toronto, Canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: Collaborating for a Secure Canada Scott Jones Building a resilient cyber security ecosystem is crucial for levelling the playing field against adversaries. ...
Alexa, what did I do Last Summer? Vladimir Katalov Smart things are a big trend nowadays. In more than 47 million households, Alexa is ...
Deep Learning – Classifying Malicious Websites with Image Recognition Models Akbar Qureshi I will go over how transfer learning can be used to retrain a convolutional neural ...
Fail Panel: Revenge of the Sixth James Arlen , Ben Sapiro , Bruce Potter , Dave Lewis , Nick Johnston The Fails just keep on failing. We’re back for the 6th examination of the wide ...
Turning Your Cybersecurity Toddlers into Warriors Shira Shamban Simple lessons to teach you how you can fill the knowledge gap within your staff…today!Few ...
PCI for Pen Testers, Now with 100% More Cloud! Joe Pierini The Payment Card Industry Data Security Standard has a bad rap with the security community ...
Elytron: Next-Generation Security for Java Servers Farah Juma Elytron is a set of Java APIs and SPIs for application server security. Although it ...
The Human Firewall is on Fire – What Do You Do When the Smoke Clears? Mounil Patel Many enterprises are focused on prevention and are too busy with day-to-day firefights to look ...
Keyspace Reduction in Mechanical Locks Schuyler Towne This quick-moving talk will cover techniques for reducing the range of combinations or keys you ...
Internet of Things: Is Winter Coming? Robert Falzon The concept of the Internet of Things (IoT) truly represents a radical shift in how ...
Breach Readiness, Mandatory Reporting and You! Danny Pehar For a long time now, it has been widely known that a proactive cybersecurity plan ...
Security Powered by Big Data David Soto As the extraction of value from data becomes more critical to a company’s success, organizations ...
From Profit to Destruction: Analyzing Today’s Threat Landscape Earl Carter The security threat landscape is constantly in flux as attackers evolve their skills and tactics. ...
Developing and Implementing an Effective Endpoint Security Strategy Kurtis Armour Endpoint security is one of the most important aspects of a defence in depth strategy. ...
Cybersecurity Evolution/Cost Reduction Paradox Ajay Sood The shift from legacy data collection and storage models to cloud has resulted in new ...
The Future of Cyber Security – From a Friendly Hacker’s Perspective Keren Elazari Cyber security is no longer about protecting secrets. It’s about our way of life: from ...
HomeBrew: Developing Your Own (Threat) Intel Chris Brewer , Chris Woods We see “threat feeds” discussed online quite often, but what are these really and how ...
Unblockable Chains – Is Blockchain the Ultimate Malicious Infrastructure? Omer Zohar In this principal research, we investigate the possibilities blockchain technologies pose as an infrastructure for ...
Serverless Infections – Malware Just Found a New Home Shimi Eshkenazi With Lambda by Amazon, Cloud function by Google, and Azure functions by Microsoft, we will ...
Integrating Privacy Engineering into Your Security Practices John Wunderlich Privacy Engineering is an emerging discipline and this presentation will talk about privacy engineering in ...
A Peep into the Iron Triangle: IoT Purchasing in a ‘Me First’ Society Tyler Reguly With a plethora of IoT devices on the market, and consumer devices being used in ...
Heimdall: Vulnerable Host Discovery and Lifecycle Monitoring Toolkit Andrea Braschi Heimdall assumes that when a new vulnerability is disclosed, and an exploit goes public, criminals ...
Case Studies in Defending Your Digital Enterprise Matt Broda As more and more organizations undertake digital transformation they become increasingly dependent on their online ...
Developing Your Career in IT Security (2018) Dave Millier , Brian Bourne , Laura Payne , Stephan Jou , Maxwell Shuftan , Donald Messier Whether you are looking for industry insight, your first job, changing careers or professional development, ...
The New Paradigm of Security Controls John Lambert We are seeing a new approach to security that is rippling across network defenders, products, ...
Security is an Illusion: How I Rob Banks Fc Aka ‘freakyclown’ A light-hearted trip through security failures both physical and electronic that have enabled me over ...
ATT&CKing the Command Line and Hunting for More Evan Gaustad On the eve of quantum computing, the definitive need for crypto-agility is greater than ever. ...
How Identity Management is Transforming Modern Business Sarah Squire Identity innovations like zero-trust networks, zero login, and one identity initiatives are transforming today’s most ...
Building Bespoke Threat Intelligence Enrichment Platforms Sean Tierney The aggregation, normalization, enrichment, and contextualization of threat data and intelligence en masse necessitates a ...
How much Cyber Insurance Do You Need, or Do You Need it at All? Julien Ducloy Executives and the board face difficult decisions to determine whether cyber insurance is worth the ...
The Hunt is on! Advanced Memory Forensics Meets NextGen Actionable Threat Intelligence Solomon Sonya Cyber attacks continue to increase in severity and sophistication. A new era of attacks have ...
5G: Security Status and Opportunities Marc Kneppers The next evolution of the global mobile communications network is on the horizon and the ...
Exploiting Hardware Wallet’s Secure Element Sergei Volokitin Hardware wallets, as well as other kinds of secure devices, must be designed to stay ...
Ashley Madison: Cybersecurity in a World of Discretion Matthew Maglieri What does a targeted attack really look like? How can you effectively defend your organization? ...
Make Your Own Cloud Security Monitoring Solution John Ventura Established methodologies for monitoring cloud-based environments are less than ideal. They come with significant downsides, ...
Extending Your Incident Response Capabilities with Sysmon Peter Morin This presentation will introduce attendees to the free Sysinternals tool, Sysmon. Are you an incident ...
Encryption is More than a Button Alex Loo There is no one Golden Rule when it comes to email encryption. Every enterprise is ...
Are We Setup to Fail? Mark Nunnikhoven Criminals are winning the battle against security practitioners. Need proof? Look no further than the ...
Securing Robots at Scale Talha Tariq The International Federation of Robotics estimate that 2.6 million industrial robots will be installed in ...
How to Select your Future Hardware Security Module (HSM) Bruno Couillard Hardware Security Modules (HSMs) come in a variety of shapes, forms and sizes, and are ...
The Chrome Crusader Lilly Chalupowski Crusade into the wild world of malicious browser extensions. You will learn how to do ...
Who’s Watching the Watchers? Keeping Your Security Provider Honest Mark Sangster The 2017 M.E. Docs cyber-attack that crippled hundreds of companies crafted the blueprints for hijacking ...
Pragmatic Cloud Security: The Future is Now Mike Rothman Cloud is a new frontier that requires new architectures, higher velocity processes and crisper business-level ...
Angad: A Malware Detection Framework Using Multi-Dimensional Visualization Ankur Tyagi Angad is a framework to automate classification of an unlabeled malware dataset using multi-dimensional modelling. ...
The Real Deal About AI Josh Fu Artificial Intelligence(AI) is impacting our world in previously unimaginable ways. But how does it really ...
Achieving Secure Digital Transformation: Turning the Dream into Reality David Millar As we’ve talked with more and more of our clients about their digital transformations, it ...
Streamlining Compliance Programs for Operational Security Mark Holub Enterprises today face pressure to improve security posture while also satisfying growing compliance requirements. These ...
Everything or Nothing: Active Defense in the Corporate World? Aamir Lakhani How can a good offense be a great defense? The concept of Hack-Back is extremely ...
Minority Report: A Predictive “Pre-crime” Approach Requires a Human Focus Charles Keane In Philip K. Dick’s 1956 “The Minority Report,” murder ceased to occur due to the ...
Orchestrate. Automate. Accelerate. Jadon Montero As today’s digitally connected ecosystem continues to evolve, adapt and innovate, there has been a ...
Reinventing PC & Printer Security Kurt Lysy It’s no longer a matter of “if”, but “when”. As the world becomes more mobile ...
Crowd Sourced Security – Applying the Wisdom of the Crowd to Cyber Defences John “lex” Robinson Taking advantage of user provided intelligence improves your organization’s ability to recognize, report and respond ...
Translating a Lifetime of Learning into Cyber Risk Management Bruce Potter Everyone’s path is different. Maybe you’ve got a computer science, or even an information security ...
Why Memory Attacks are on the Rise and How to Stop Them Josh Fu Memory-based, fileless, or living-off-the-land attacks were one of the most prevalent types of attacks in ...
Smart Contract Vulnerabilities: The Most Interesting Transactions on the Ethereum Blockchain J. Maurelian , Sarah Friend Smart contract security is a brave, new, and sometimes terrible field. This presentation will take ...
Twisted Haystack: Protecting Industrial Systems with Dynamic Deception Lane Thames Deception techniques for cybersecurity are not new – honeypots have been used for many years. ...
ISO 27001 & The GDPR Andrew Clearwater ISO 27001 & The GDPR: A Research-Based Approach to Identifying Overlap and Streamlining EffortsTogether, security ...
Threat Hunting: From Platitudes to Practical Application Neil “grifter” Wyler Since its inception, the security industry has been inundated with trendy defense techniques, topics, terms, ...
Malboxes: Make Malware Analysis More Accessible Olivier Bilodeau Malware is everywhere. Every organization has been infected by malware to some extent. Yet, most ...
Standing Up to Cryptojacking – Best Practices for Fighting Back Matthew Hickey Cryptojacking has recently erupted onto the cybercrime scene, thanks to the surge in value in ...
Don’t @ Me Hunting Twitter Bots at Scale Olabode Anise Automated Twitter accounts have been making headlines for their ability to spread spam and malware ...
How to Spot a Fake: Improve Your Security Operations with Real-world AI Stephan Jou The potential of data science, artificial intelligence (AI), and analytics to support cybersecurity defense is ...
Conquering Complexity: Addressing Security Challenges of the Connected Vehicle Ted Shorter As vehicles around the world become more and more automated, ongoing security threats become an ...
Why Can’t We Build Secure Software? Tanya Janca A lot is expected of software developers these days; they are expected to be experts ...
25 Techniques to Gather Threat Intel and Track Actors Sun Huang , Wayne Huang In recent years, we have delivered many talks detailing threat actors, their operations, and their ...
Weapons of a Pentester – 2018 Edition Nick Aleks In this session Nick will demonstrate and review a list of physical and digital tools ...
Behavior Analytics and Model Driven Security Leslie K. Lambert Imagine using a risk score to determine whether to grant a user access to an ...