CounterMeasure 2014 Oct. 16, 2014 to Oct. 17, 2014, ottawa,canada
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Anatomy of a VoIP Hack and How to Prevent Them | Eric Jacksch | As the popularity of VoIP continues to increase, individuals and businesses continue to suffer financial ... | IncludeThinkstScapes |
The Changing Landscape for Retail Payments in Canada: From Money to E-Money | Ben Fung | The retail payment landscape in Canada and elsewhere is changing rapidly as new technology and ... | |
Cyber Threat: Wireless APT | John Pavelich | Malicious cyber activities are growing both in number and in complexity. Many advanced cyber attacks ... | |
Don’t Spill Your Candy in the Lobby: Managing the Corporate Infosec Risks From Open Source Intelligence (OSINT) | Scott Wright | In the reconnaissance phase of an attack, the attackers will use tools to gather information ... | |
Evolution of Penetration Testers vs Attackers | Russ Gideon | Penetration testing came about because of real world attacks. The industry quickly realized that we ... | |
Improving Scalable, Automated Baremetal Malware Analysis | Paul Royal , Adam Allred | The detection of virtualized malware analysis environments has become increasingly popular and commoditized. Sophisticated virtualization ... | |
Investigating PowerShell Attacks | Ryan Kazanciyan , Matt Hastings | Over the past two years, we've seen targeted attackers increasingly make use of PowerShell to ... | IncludeThinkstScapes |
Lost in Translation: Effective Communications for Information Security | Kristen Hill | As Information Security professionals, communications often take a back seat when our priorities range from ... | |
Me Code Pretty One Day: .NET Bug Hunting and Exploitation | Kelly Lum | Java isn't the only managed language with bugs. This talk will cover the current state ... | |
Microsoft Internet Explorer UAF Exploitation: Past, Present and Future | Abdul Aziz Hariri | Over the last couple of years we’ve seen a rise of use-after-free zero day vulnerabilities ... | |
Open-source Security in the Era of Heartbleed | Sherif Koussa , Nelson Ko | Recent zero-days in popular open-source software have led to a lot of controversy, an old ... | |
The Privacy Dilemma: Social Responsibility in the Age of Big Data | Erin Kelly | There has been a lot of conversation in Canada about how to protect privacy rights ... | |
Rebuilding the Credibility of a Security Team | Paul Davis | Many CISOs/CSO and Directors of Security Operations are facing the challenge of increased expectations, misplaced ... | |
Satirists, Supporters and the Real Deal: Identifying Extremists in a Sea of Social Media | Justin Seitz | With the widespread adoption of social media, in particular Twitter, by extremists around the globe ... | |
SMASH the Status Quo to Increase National Cybersecurity | John Weigelt | While security guidelines, frameworks, certifications, evaluations and other documentation often provides comprehensive direction of safeguards ... | |
Two years of Applying ITSG-33: Report from the Trenches | François Marinier | As an IT security analyst, I have spent most of the past two years applying ... |