DataConnectorsVancouver 2020 July 15, 2020 to July 16, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Your CEO is Not Your CEO! How to defend against email fraud Denis Ryan Email fraud leads to two main threats- one is Business Email Compromise (BEC) where attackers ...
How To Enable and Secure Your Remote Workforce Christopher Hills In times of crisis, good security practices are often the first thing to go. Organizations ...
A Modern Approach to Deception Jonathan Randall Modern threat deception does not rely upon signatures nor behavioral patterns. It flips the paradigm ...
Shifting PAM into High Gear with Zero Standing Privilege (ZSP) Paul Lanzi Zero Standing Privilege (PAM) was a new term introduced in 2019 and might just be ...
Panel: IoT – Security at the Edge Jeff Horne , Rob Falzon , Mark Bastin The Internet of Things (IoT) poses entirely new challenges. With 35 billion IoT devices expected ...
Keynote: Public Safety – Cyber Resilience Assessment Team : Introduction to program and resilience assessments tools. Hugo Desrochers Since 2016, Public Safety Canada has been offering cyber resilience assessment reviews to critical infrastructure ...
The EDR you need vs. the EDR you want Andrew Namisi When evaluating and choosing an EDR solution, how can you be confident that the solution ...
Shift Left – Building Security into the Application Development Lifecycle Rob Arago By building security into your application development lifecycle you not only help reduce your attack ...
Data-Driven Cyber Risk Management in 2020 Jonathan Ehret This presentation will discuss some of the challenges faced by third-party risk practitioners, the inherent ...
A Centralized Identity Strategy Using Standards Helps Minimize Threats. Carlos Mostek Modern architectures continue to become more distributed and fractured. How can developers can continue to ...
Panel: Users as the Attack Vector – People and Security Ben Smith , Michael Landewe , Christopher Hills , Ash Valesk Users, those carbon-based life forms usually roaming the halls of your buildings, are the last ...
Developing Your Identity Strategy Rob Wilson Remember when identity management meant creating new accounts and resetting user’s passwords? Over the years, ...
Risk Management – Insights in a World Gone Crazy Phil Richards Join Phil Richards, CISO for Ivanti, as we discuss key concepts and strategies for Risk ...
The IoT storm … Will we survive the coming deluge? Robert Falzon IoT devices permeate the most intimate aspects of our everyday lives. Now more than ever ...
Managing Digital Risk Amid Disruption Ben Smith Digital transformation is not only changing how companies think about business. It is changing how ...
Panel: Ransomware – To Pay, or not to pay? Joshua , Carlo Beronio , Andrew Masson Ransomware has been a hot topic of 2020, as bad actors show there is no ...
Keynote Maleena Singh The talk provides insight on policing structure within Canada, and cyber initiatives being implemented at ...
Cyber Resilience: Rethinking your data protection strategy in the age of ransomware. Andy Fernandez Ransomware threats increased by 300% last year, and the industry is expecting it to get ...
Rise of the Machines: Best Practices for Securing Unmanaged and IoT devices Jeff Horne For many years now, enterprise networks have seen an explosive rise in devices that are ...
Credential Harvesting As a Service: How this Darkweb Organization Steals Your Microsoft Credentials Michael Landewe In this presentation, we will analyze the attack methods of a single advanced persistent threat ...
Offensive AI vs. Defensive AI: Battle of the Algorithms David Masson Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more ...
Identity: the new perimeter? Carlos Mostek , Rob Wilson , Neil Lanzi The 2000’s view of “perimeter” in terms of security conjures up an analogy about castles ...
Keynote: Confessions of a Rogue FBI Agent Ej Hilbert 1999 – the early days of cybercrime. Identity theft was a new idea, and the ...