SCcongressToronto 2014 June 17, 2014 to June 18, 2014, Toronto,Canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
PCI Revisited Gregory T. Mcclean , Omkhar Arasaratnam In the wake of some of the most serious payment card industry breaches in history ...
Cutting through the hype - One size does not fit all - How to pick an MDM that's right for your organization Alan Mcdermott The mobile landscape continues to shift and a seemingly endless array of solutions claim to ...
A Day in the Life of a CISO (Or How I Learned To Stop Worrying and Embrace the Stress) Tim Mccreight The typical day (though few can be called 'typical') of a CISO should be spent ...
Top 3 Threats Bobby Singh , Phil Umrysh , Jeff Stark What are the top 3 threats according to our panel of experts - and what ...
Point of Sale Malware (POS) Manish Khera , Chris Henry 2014 started off with quite a bang as we ended 2013 with retailers getting hit ...
The State of Protecting North America's Critical Infrastructure Mark Fabro , Tim Roxey The US and Canada share an interest in protecting power facilities, water plants, etc. This ...
InfoSec Impact on Enterprise Strategic Goals Jamie Rees Translating security metrics to impacts on strategic measures.
Cyber Surveillance: The 2014 Recalibration of Western Intelligence Bonnie Butlin This session will highlight the convergence of IT security professionals and professionals in other disciplines ...
Fighting Next-Generation Adversaries with Shared Threat Intelligence Brian Hein Adversaries today are technically advanced, structured around an underground governed by market forces, and using ...
Check Point ThreatCloud – Complete Security Intelligence Infrastructure Charles Riordan This is a description of Check Point’s ‘Integrated Cyber Defense Strategy’ that involves the evolution ...
The Art of Cyber War Carl Herberger Is the world in the midst of a cyber-war? If so, what are the implications? ...
The Boardroom Discussion: Effective Methods for Engaging Boards of Directors about IT Security Joanne Martin Data security and IT risk have become some of the most significant issues for both ...
Innovation Theatre - BYOD: Why MDM is not enough Anis Hanna N/A
The "Inevitable" Cyber Attack: Are You Prepared? Mark Sangster We all know that cyber-attacks are a fact of life, but few fully appreciate the ...
Thinking Security Connected Doug Cooke This presentation will introduce a unique approach to integrate security tools that will allow organizations ...
Managing Security Intelligence: Effectively using Security Event and Information Management in organizations Paul Dwyer Security logs are the last line of defense in any organization. The logs represent the ...
TACIT Security - Institutionalizing Cyber Protection for Critical Assets Ron Ross The protection of critical infrastructure is a top priority for organizations today, both in the ...
21st Century Incident Response Vikas Bhatia Security and privacy incidents force companies to reassess the risk profile. Is their assessment accurate? ...
Canadian Privacy Legislation – Current Compliance Challenges Robin Gould-soil , Pamela Snively Whether discussing Personal Information Protection and Electronic Documents Act (PIPEDA), FIPPA, or PHIPA, there is ...
Innovation - It Takes a Village Aisha Umar Innovation has played a large role in cybersecurity along with many other industries - but ...
Internet of Things (IoT) - Now we need to secure what? Jim Nelms , Jeff Lewis From basic home appliances like a refrigerator or stove to the more obvious and regulated ...
Continuous Multi-Layered Threat Defense: Effective Incident Response through Actionable Threat Intelligence Richard Yan , Gary Sockrider How to leverage real-time and historical threat intelligence to bring context and real-time visibility to ...
The Rising Tide of Ransomware John Shier Ransomware has taken the place of fake anti-virus as the scam du jour for Eastern ...
Beating the Cybercriminals: Preventing Compromise in the Face of Advanced Attacks Andy Land Cybercriminals combine social engineering techniques with ongoing application vulnerabilities to install advanced malware on both ...
Tactical and Strategic Steps in Risk Definition and Mitigation Neils Johnson N/A
The Sky is Falling - How to make the most out of mainstream media reporting on security Stephen Weston Does mainstream media cybersecurty FUD help or hurt? Often inaccurate does such reporting put false ...
Security Metrics - Delivering the Message That Drives Change George Mcbride N/A