DataConnectorsVancouver 2020 July 15, 2020 to July 16, 2020, Virtual, Virtual
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Your CEO is Not Your CEO! How to defend against email fraud | Denis Ryan | Email fraud leads to two main threats- one is Business Email Compromise (BEC) where attackers ... | |
How To Enable and Secure Your Remote Workforce | Christopher Hills | In times of crisis, good security practices are often the first thing to go. Organizations ... | |
A Modern Approach to Deception | Jonathan Randall | Modern threat deception does not rely upon signatures nor behavioral patterns. It flips the paradigm ... | |
Shifting PAM into High Gear with Zero Standing Privilege (ZSP) | Paul Lanzi | Zero Standing Privilege (PAM) was a new term introduced in 2019 and might just be ... | |
Panel: IoT – Security at the Edge | Jeff Horne , Rob Falzon , Mark Bastin | The Internet of Things (IoT) poses entirely new challenges. With 35 billion IoT devices expected ... | |
Keynote: Public Safety – Cyber Resilience Assessment Team : Introduction to program and resilience assessments tools. | Hugo Desrochers | Since 2016, Public Safety Canada has been offering cyber resilience assessment reviews to critical infrastructure ... | |
The EDR you need vs. the EDR you want | Andrew Namisi | When evaluating and choosing an EDR solution, how can you be confident that the solution ... | |
Shift Left – Building Security into the Application Development Lifecycle | Rob Arago | By building security into your application development lifecycle you not only help reduce your attack ... | |
Data-Driven Cyber Risk Management in 2020 | Jonathan Ehret | This presentation will discuss some of the challenges faced by third-party risk practitioners, the inherent ... | |
A Centralized Identity Strategy Using Standards Helps Minimize Threats. | Carlos Mostek | Modern architectures continue to become more distributed and fractured. How can developers can continue to ... | |
Panel: Users as the Attack Vector – People and Security | Ben Smith , Michael Landewe , Christopher Hills , Ash Valesk | Users, those carbon-based life forms usually roaming the halls of your buildings, are the last ... | |
Developing Your Identity Strategy | Rob Wilson | Remember when identity management meant creating new accounts and resetting user’s passwords? Over the years, ... | |
Risk Management – Insights in a World Gone Crazy | Phil Richards | Join Phil Richards, CISO for Ivanti, as we discuss key concepts and strategies for Risk ... | |
The IoT storm … Will we survive the coming deluge? | Robert Falzon | IoT devices permeate the most intimate aspects of our everyday lives. Now more than ever ... | |
Managing Digital Risk Amid Disruption | Ben Smith | Digital transformation is not only changing how companies think about business. It is changing how ... | |
Panel: Ransomware – To Pay, or not to pay? | Joshua , Carlo Beronio , Andrew Masson | Ransomware has been a hot topic of 2020, as bad actors show there is no ... | |
Keynote | Maleena Singh | The talk provides insight on policing structure within Canada, and cyber initiatives being implemented at ... | |
Cyber Resilience: Rethinking your data protection strategy in the age of ransomware. | Andy Fernandez | Ransomware threats increased by 300% last year, and the industry is expecting it to get ... | |
Rise of the Machines: Best Practices for Securing Unmanaged and IoT devices | Jeff Horne | For many years now, enterprise networks have seen an explosive rise in devices that are ... | |
Credential Harvesting As a Service: How this Darkweb Organization Steals Your Microsoft Credentials | Michael Landewe | In this presentation, we will analyze the attack methods of a single advanced persistent threat ... | |
Offensive AI vs. Defensive AI: Battle of the Algorithms | David Masson | Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more ... | |
Identity: the new perimeter? | Carlos Mostek , Rob Wilson , Neil Lanzi | The 2000’s view of “perimeter” in terms of security conjures up an analogy about castles ... | |
Keynote: Confessions of a Rogue FBI Agent | Ej Hilbert | 1999 – the early days of cybercrime. Identity theft was a new idea, and the ... |