CounterMeasure 2014 Oct. 16, 2014 to Oct. 17, 2014, ottawa,canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Anatomy of a VoIP Hack and How to Prevent Them Eric Jacksch As the popularity of VoIP continues to increase, individuals and businesses continue to suffer financial ... IncludeThinkstScapes
The Changing Landscape for Retail Payments in Canada: From Money to E-Money Ben Fung The retail payment landscape in Canada and elsewhere is changing rapidly as new technology and ...
Cyber Threat: Wireless APT John Pavelich Malicious cyber activities are growing both in number and in complexity. Many advanced cyber attacks ...
Don’t Spill Your Candy in the Lobby: Managing the Corporate Infosec Risks From Open Source Intelligence (OSINT) Scott Wright In the reconnaissance phase of an attack, the attackers will use tools to gather information ...
Evolution of Penetration Testers vs Attackers Russ Gideon Penetration testing came about because of real world attacks. The industry quickly realized that we ...
Improving Scalable, Automated Baremetal Malware Analysis Paul Royal , Adam Allred The detection of virtualized malware analysis environments has become increasingly popular and commoditized. Sophisticated virtualization ...
Investigating PowerShell Attacks Ryan Kazanciyan , Matt Hastings Over the past two years, we've seen targeted attackers increasingly make use of PowerShell to ... IncludeThinkstScapes
Lost in Translation: Effective Communications for Information Security Kristen Hill As Information Security professionals, communications often take a back seat when our priorities range from ...
Me Code Pretty One Day: .NET Bug Hunting and Exploitation Kelly Lum Java isn't the only managed language with bugs. This talk will cover the current state ...
Microsoft Internet Explorer UAF Exploitation: Past, Present and Future Abdul Aziz Hariri Over the last couple of years we’ve seen a rise of use-after-free zero day vulnerabilities ...
Open-source Security in the Era of Heartbleed Sherif Koussa , Nelson Ko Recent zero-days in popular open-source software have led to a lot of controversy, an old ...
The Privacy Dilemma: Social Responsibility in the Age of Big Data Erin Kelly There has been a lot of conversation in Canada about how to protect privacy rights ...
Rebuilding the Credibility of a Security Team Paul Davis Many CISOs/CSO and Directors of Security Operations are facing the challenge of increased expectations, misplaced ...
Satirists, Supporters and the Real Deal: Identifying Extremists in a Sea of Social Media Justin Seitz With the widespread adoption of social media, in particular Twitter, by extremists around the globe ...
SMASH the Status Quo to Increase National Cybersecurity John Weigelt While security guidelines, frameworks, certifications, evaluations and other documentation often provides comprehensive direction of safeguards ...
Two years of Applying ITSG-33: Report from the Trenches François Marinier As an IT security analyst, I have spent most of the past two years applying ...