AtlSecCon 2016 April 7, 2016 to April 8, 2016, halifax,canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Day 1 Opening Keynote Speaker John Sileo identity was stolen by a business insider and used to embezzle $300,000 from his clients. ...
Day 1 Closing Keynote Speaker Kellman Meghu heads up a team of Security Architects for CheckPoint Software Technologies Inc., the worldwide leader ...
Day 2 Closing Keynote Speaker Matias Katz is a Penetration Tester who specializes in Web security analysis. He loves to build simple ...
REVERSING A POLYMORPHIC FILE-INFECTING RANSOMWARE Raul Alvarez Virlock is a polymorphic file-infecting ransomware. It is capable of infecting executable files and at ...
Browser and Environment Hardening Kurtis Armour In today's threat landscape, many corporate users are being compromised by exploit kits and phishing ...
The new wave of deserialization bugs Philippe Arteau Recently, there have been several deserialization bugs released. In 2015, many Java softwares - including ...
Internet of {Things,Threats} Olivier Bilodeau , Thomas Dupuy More and more devices are connected to the Internet. Under the moniker "Internet of Things" ...
Anonymous 3.0 - the Telecomix Derivation Jon Blanchard Following a year long hiatus to rejoin things Telecomix, Jon Blanchard returns to discuss Security ...
Emerging Threats - The State of Cyber Security Earl Carter Analyzing massive data feeds and working with teams of security experts, Cisco Talos has a ...
Enumerating PE File Structure Security Protections and Custom Base 64 Steganography Lilly Chalupowski This talked will be focused on the exploit development tool called badger and the steganography ...
Towards a multi-stakeholder approach to vulnerability disclosure for better security Vic Chung Did Venom, Ashley-Madison data leak, or OPM hack, teach us anything as security professionals? As ...
The Thin Line Between the Insider and the Outsider Michael L. Davis If you assume that attackers know our networks’ topology already, they may have the credentials ...
Defeating next gen firewalls Evan D'entremont This talk will look at next generation firewalls; what they try to solve, and why ...
The 7 Tenets of Successful Identity Access Management Tim Dickinson We have all seen data breaches increase steadily over the past several years, more devices ...
A Beginners Guide to OSINT Paul Halliday This presentation will cover the basics of threat intelligence with the hope of getting newcomers ...
Advanced Threats: Eliminating the Blind Spot Fahmy Kadiri Unfortunately, it’s a foregone conclusion that no organization is 100% safe from a breach. With ...
Now you See Me, Now You Don't Aamir Lakhani Your first impression is your only impression. However, your first impression may already have been ...
An Examination Of The Epistemology Of The Modern Botnet Dave Lewis This talk delves into the history of botnets up to present day. This talk looks ...
The Art of the Jedi Mind Trick Jeff Man The hacker/security community continues to struggle with how to get our message across to others. ...
Life is Short… Sue Everyone: Legal Perspectives on the Ashley Madison Hack Anna Manley The Ashley Madison Hack and the data dump that followed didn’t just fuel the gossip ...
Software Signoff – Engineering Better, Safer, More Secure Software Ofer Maor The concept of “Signoff” is common in almost any major engineering disciplinary. From computer hardware, ...
The State of Web Security Mike Milner Join me for a wild ride through the dizzying highs and terrifying lows of web ...
Attacks, Detection and Defense in the Resilient Datacenter: The Emerging Battlefield Dennis Moreau As business exigencies drive datacenters toward ever increasing scales, agility and levels of automation, the ...
Is Your Supply Chain Secure? Exposing and Understanding the Risks of Third Parties. Peter Morin With over 76% of all data breaches resulting from a third-party which introduced the security ...
Running a Bug Bounty Program David Nichols NCC Group's presentation entitled "Running a Bug Bounty Program" briefly explores the history of responsible ...
Real solutions from real incidents: save money and your job! Guillaume Ross , Jordan Rogers This talk will cover scenarios from real incidents and how simple solutions that are very ...
How to run a dark market (without getting caught) Julien Savoie Marketplaces on the “darkweb” have captured the imagination of journalists; with promises of illicit goods ...
New Techniques To Prepare For Next-Generation Corporate Insider Threats Eldon Sprickerhoff Preventing insider threats continues to be a difficult task. While malicious insider threats typically receive ...
Hide Yo' Kids: Hacking Your Family's Connected Things Mark Stanislav This presentation will cover security research on Internet-connected devices targeting usage by, or for, children. ...
Paper Trails: What are you leaving behind? Milos Stojadinovic Another one landed today, it's all over your monitor. Damn penetration test reports, they're all ...
Hardware Hacking - Lightbulbs & Hard Drives Colin O’flynn Can we trust hardware? This talk brings some examples of brand new hardware attacks against ...
FLOSS every day – automatically extracting obfuscated strings from malware Moritz Raabe The FireEye Labs Obfuscated String Solver (FLOSS) is an open source tool that automatically detects, ...
Medical Device (In-)Security Jeremy Richardsworks Hospitals are connecting medical devices to their wireless networks. Many of these devices are insecure, ...
No Time for REST: Web Services Security Sunny Wear This talk discusses the numerous security holes commonly found in web service calls, particularly in ...
Who owns this account? Reduce risk with Access Governance Michel Bluteau Many attacks and breaches start within the perimeter, and since valid credentials and permissions are ...
The unsexy practice of keeping your virtual windows and doors locked Sebastien Bigras The thing about enterprise security, from the outside at least, is it reads like a ...
Beyond SIEM: Collaborative Threat Defense with IBM's QRadar and App Exchange Rory Bray , Jason Keirstead Criminals and other bad actors organize and collaborate by sharing information, tools and resources. Our ...
Cloud Security – SaaS and the imperative to abandon your proxy approach Garry Coldwells I will base the talk on Aperture and will drive home the point that proxy ...
Protect Company Data from the Most Pervasive Cyber Security Threat! Yuan Nielsen To prevent cyber criminals from gaining access to corporate data and business critical systems, it ...
Building a Sophisticated Endpoint Defense Strategy with Full Security Lifecycle Protection Alon Sadeh Attackers are more sophisticated than they’ve ever been. They’re targeting our intellectual property, sensitive customer ...
Measuring Security: How Do I Know What a Valid Metric Looks Like? Ben Smith There is no universally accepted method to measure security. So how do we translate operational ...
Detect malware like a pro ! Xavier Trépanier The new generation of malware and APT evade any traditional system like IDS, IPS , ...