Atlseccon 2015 April 16, 2015 to April 17, 2015, Halifax,Canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Day 1 Opening Keynote Speaker Keren Elazari Keren holds a CISSP security certification, a BA in History and Philosophy of Science and ...
Day 1 Closing Keynote Speaker Kellman Meghu Kellman has delivered security talks in private corporate focused events, at school internet safety classes ...
Day 2 Closing Keynote Speaker Matias Katz N/A
Why don't they care ? well.. until it's too late.. Marc-andre Belanger Every day, the news is making headline with Cyber Security incident and every now and ...
Operation Oil Tanker Luis Corrons In the latest years we have seen how Advanced Persistent Threats (APTs) work, targeting high ...
How to use Content Security Policy the right way Ksenia Dmitrieva Content Security Policy is a new HTML5 technology that provides a novel approach to fixing ...
Gods and Monsters: A tale of the of the dark side of the web Aamir Lakhani Researcher and Security strategist, Aamir Lakhani (known as Doctor Chaos) will dive in the hidden ...
SCADA Security: Stories From The Trenches Dave Lewis A discussion about SCADA security and critical infrastructure with stories pulled from personal experience.
Losing Battles, Winning Wars -- Frustrating Adversaries with Threat Intelligence Rafal wh1t3rabbit Los When it comes to intrusions and breaches, most companies take a short-game view. This means ...
Formal Methods in Computer Security Ben Goodspeed How have we used formal mathematical methods in security research? The idea of bringing the ... IncludeThinkstScapes
Squert - An open source web interface for Network/Enterprise Security Monitoring Paul Halliday This session will introduce squert and its capabilities and future path. It will also describe ...
Mandatory Key Disclosure and Self Incrimination in Canada Anna Manley You’ve been lawfully arrested. The police have lawfully seized your computers. You’ve encrypted some or ...
Planning for Failure: An Introduction to Traffic Logging in Network Forensics Daniel Merritt Sound network security practices can significantly reduce the risk of compromised hardware, but 0-Day Attacks, ...
“Where are the bad guys hiding?” – A Forensic Approach to Incident Response Peter Morin Our networks and systems are under siege by attackers more now than ever. What a ...
Security Best Practices – Cloud Based Network Function Virtualisation Winston Morton With the advent of self-service cloud stacks, a tremendous amount of flexibility has been derived ...
Whodunit? : The mechanics of attack attribution Mark Nunnikhoven With all the press around attacks and the hype about North Korea in the Sony ...
In Hardware We Trust Colin O’flynn Attacking hardware devices might be easier than you expect – this presentation details some attacks ...
Firmware Vulnerability Analysis Jeremy Richards Bad code is everywhere and the tools to dig it up are maturing at an ...
Take Charge of Your Infosec Career! Glen Roberts You spent $5,000, a plane trip, a hotel and a full workweek on your last ...
iOS App Analytics VS Privacy: An analysis of the use of analytics Guillaume K Ross As developers attempt to tailor their applications to customers, obtain more information about how they ...
Attacking The Onion Router Julien Savoie With much talk about “the darkweb” in the media of late, we attempt to cut ...
How UNB is using policy, practice and technology to enhance cyber security David Shipley Universities are among the highest risk targets for cyber threats due to their nature as ...
More Data, Less Voodoo Milos Stojadinovic The infosec industry is maturing, and with it, the old school reliance on ‘common knowledge’ ...
Homemade vulnerabilities : How your most trusted resources will bring havoc to your digital dream Gabriel Tremblay While most high profile security bugs such as Heartbleed and Apple's famous dual goto can ...
Protect What Matters: Guarding Against The Data Breach Henry Anzarouth Perimeter security and physical security are ineffective during advanced persistent threats, especially when your data ...
Targeted Attacks: From Visibility to Action Russ Doucet , Frank Breil Gartner has predicted that we will soon live ‘in a state of constant compromise’ and ...
Logs, Logs and more Logs Patrick Laroche Today's tools and platforms for logging and log analysis have come a long way since ...
The Two Sides of Mobile Identity Paul Madsen Mobile identity refers both to using devices to access applications as well as using devices ...
Datacenter Security Improvements through Aggressive Network Virtualization Dennis Posture , System Analytics , Model-based Analytics , Application Centered Policy , Moving Instrumentation , To Visibility , Remains Capabilities , In Datacenters , Is Promises. This session will demonstrate, with concrete examples, how aggressively micro-segmenting a datacenter network topology, using ...
Data protection and security: Don’t make this the back door Rick Vanover When it comes to data protection, the risks are high. Too many times companies take ...