SECtor 2013 Oct. 7, 2013 to Oct. 9, 2013, Toronto,Canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Data in the Cloud. Who owns it and how can you get it back? Dave Millier With the rush to take advantage of all "the Cloud" has to offer, many companies ...
CRYPTOGEDDON Sector 2013 Edition: Online Cyber Security War Game Todd Dow A CSEC cybersecurity analyst has gone rogue. He has taken a large cache of top ...
SDN : Radically New Network Architecture, Same Old Cyber Security Protection Llewellyn Derry As Virtual Machines (VM's) were the disruptive technology at the end of last century for ...
Popping the Penguin: An Introduction to the Principles of Linux Persistence Mark Kikta Breaking in is half the battle. I've talked to so many people whose only objective ...
.NET Reversing: The Framework, The Myth, The Legend Kelly Lum This talk will cover the current state of the art in .NET reversing, down from ...
The World's Deadliest Malware Christopher E. Pogue This silent threat infects more than 1,000 victims annually. It shows no prejudice, it has ...
Why We Need DevOps Now: A Fourteen Year Study Of High Performing IT Organizations Gene H. Kim Gene Kim has been studying high-performing IT organizations since 1999. He is the author of ...
Today's Cyber Threat Landscape – Prevention is no cure Lucas Zaichkowsky AccessData will talk about Today's Cyber Threat Landscape - The traditional cyber security infrastructure is ...
Vulnerability Management Programs and Lessons Learned from the Field Bill Olson Often Vulnerability Management program managers are missing the mark by focusing on the wrong information, ...
Securing Enterprise Mobility beyond MDM Danny Pehar , Ali Afshari Enterprise Mobility offers great challenges and great opportunities. There are a plethora of technologies that ...
Analyzing Exploit Packs: Tips & Tricks Mohamad Albustami In this 30 minute session, we will look at tips and techniques that can help ...
Information & Risk Mitigation Neils Johnson Information is the lifeblood of today's connected world. It plays a critical role in our ...
The Bad Boys of Cybercrime Christopher E. Pogue These silent attackers hit more than 1,000 victims annually. They shows no prejudice, have no ...
Enabling Access Assurance and Identity Intelligence for a multiperimeter world Sridhar Muppidi In today's increasing open and interconnected enterprise, traditional perimeters are quickly being extended to multi-perimeters ...
Frayed Edges; Monitoring a perimeter that no longer exists Mark Nunnikhoven The foundations of traditional network security are crumbling in the public cloud. Old assumptions will ...
Building a Security Operations Center Lessons Learned Yves Beretta This presentation will go through the various steps required to craft a Security Operations Center; ...
Cryptographically Isolated Virtualized Networks – A Community of Interest Approach Robert Johnson Two ongoing industry trends are in conflict with each other. On the one hand, networks ...
Exploiting the Zero'th Hour: Developing your Advanced Persistent Threat to Pwn the Network Solomon Sonya , Nick Kulesza Advanced Persistent Threats (APT) and Botnets represent one of the largest security concerns with regards ...
BIOS Chronomancy John Butterworth In 2011 the National Institute of Standard and Technology (NIST) released a draft of special ...
Keynote: "How the West was Pwned" G. Mark Hardy Can you hear it? The giant sucking sound to the East? With it are going ...
Opening Remarks Brian Bourne N/A
Needle in a Haystack Harnessing Big Data for Security Dana Wolf The polymorphic nature of malware, failure of signature-based security tools and massive amounts of data ...
CeilingCat IS Watching You Shane Macdougall It shouldn't be news to anyone that people share too much information online. In fact, ...
Million Browser Botnet Matt Johansen Online advertising networks can be a web hacker's best friend. For mere pennies per thousand ...
How to Connect Security to the Business Jeanne Glass When CISOs are briefing their executive teams or boards on the organization's security (usually only ...
Appsec Tl;dr Gillis Jones Have you ever wondered what it takes to get one of those "Elusive" bug bounties ...
Microsoft Security Intelligence Report, Canadian Edition Tim Rains Threats have changed in dramatic and unexpected ways around the world over the past year ...
Swiping Cards At The Source: POS & Cash Machine Security Ryan Linn , John Hoopes You put your credit card in, I take your cash out. Point of Sale systems ...
BREACH: SSL, Gone in 30 seconds Angelo Prado , Yoel Gluck In this hands-on talk, we will introduce new targeted techniques and research that enable an ...
Big Data Security, Securing the insecurable Kevvie Fowler Big data is one of the fastest growing areas within IT. The benefits of big ...
Keynote: "Tech it out" Marc Saltzman If you thought today's tech was cool, to quote '70s rocks Bachman-Turner Overdrive, "baby you ...
Identity & Access Governance: Key to Security or Completely Useless? Jackson Shaw Jackson Shaw will take the audience thru the state of Identity & Access Governance and ...
The US Department of Homeland Security's Software Assurance Enumerations David Maxwell The benefits of CVE, CWE, MAEC, CWSS, CAPEC, STIX and TAXII can often be at ...
It Takes a Village: Reducing the Threat Gap by Allying with Your Competition Michael A Barkett With the maturation of IPS and other threat prevention technologies, security vendors have significantly narrowed ...
The Threat Landscape Ryan Poppa , Ross Barrett The Rapid7 Labs team vigilantly scans the horizon to discover new tactics being used by ...
Enterprise Forensics = new category that focuses on user activity and what drives the business (analytics + behavior) Gary Freeman Many Security Analysts are tasked with assisting in Corporate Governance. This session explores the concept ...
Fortifying Canada's Cyberspace: Together John Weigelt The foundation of Canada's economy is increasingly dependent of the digital infrastructure that supports all ...
Ending the information security arms race with endtoend encryption Jill Walsh Information security today has evolved into a big data arms race. As vendors create ever ...
How they get in and how they get caught. Schuyler Towne This talk will take you through the basics of how to pick, rake, bump, impression ...
Malware Automation Christopher Elisan Automation is key when it comes to production. The same is true for malware. Malware ...
FUFW: 5 Steps to Rearchitecting Your Perimeter Mike Rothman The hype train around next-generation firewalls (NGFW) continues to race forward, but replacing one device ...
Your own pentesting army complete with air support Philip Polstra This talk will discuss pentesting with an army of low-powered devices running a custom Linux ...
Weaponized Security Kellman Meghu How dangerous can you get with just the security tools you have today? Do you ...
Stopping Cross Contamination with Network Access Control…"The ULTIMATE PATCH" Toni Buhrke This session will highlight how Network Access Control is the ultimate patch checking system. By ...
Watching the watchers: hacking wireless IP security cameras Artem Harutyunyan Low cost commodity IP surveillance cameras are becoming increasingly popular among households and small businesses. ...
Return of the Half Schwartz FAIL Panel w/Tales from beyond the echo chamber James Arlen , Mike Rothman , Ben Sapiro , Dave Lewis The ugly bastard child of FAIL Panel, in its 2nd year running, a discussion on ...
Build Your Own Android SpyPhone Kevin Mcnamee Know your enemy! Attendees will see a live demonstration of how we built a proof-of-concept ...
Running at 99%, mitigating a layer 7 DoS Ryan Huber Application-Level Denial of Service (DoS) attacks are a threat to nearly everyone hosting content on ...
Software Refined Networking The Path To Hell Is Paved With Good Abstraction Christofer ( Hoff ) Hoff New application architectures, programmatic languages and frameworks, the (un)availability of exposed platform security capabilities combined ...
Trust No One: The New Security Model for Web APIs Greg Kliewer There are many great things about the new world of mobile and cloud applications. They ...
Threat Modeling 101 Leigh ( Hypatiadotca ) Honeywell Threat modeling allows developers and security professionals to collaborate and catch vulns before they ship ...
Reacting to Cyber Crime: Preserving Crucial Evidence for Law Enforcement Stephane Turgeon , David Connors Evidence handling is of primary importance for the RCMP Tech Crime Unit Members when called ...
RATastrophe: Monitoring a Malware Menagerie Seth Hardy , Katie Kleemola Over the last three years, our visibility into the threat landscape of civil society organizations ...
Pivoting in Amazon clouds Andrès Pablo Riancho From no access at all, to the company Amazon's root account, this talk will teach ...
Fiber Channel – Your OTHER Data Center Network Rob Vandenbrink The majority of large datacenter storage architectures in the world are currently based on Fiber ...
Modern Malware and APTs – What Current Controls Can't See Ajay Sood In this seminar, Ajay K. Sood will: Discuss the motivation and nature of APT and ...
Vulnerability analysis of 2013 SCADA issues Amol Sarwate This session is result of a yearlong study of the most recent SCADA vulnerabilities and ...