Contact     REGISTER NOW    Illuminating the Black Art of Security - October 20-22, 2014-Toronto   
Legend: Media File Video Presentation
Presentation File PDF of Presentation
Tools Tools

SecTor 2014 - Presentations 

We will be posting the presentations and videos for SecTor 2014 as they are processed and become available. Feel free to review the presentations from our previous years and see what makes SecTor a must attend event for every IT Professional.

 Past Presentations: SecTor 2013 / SecTor 2012 / SecTor 2011 / SecTor 2010 / SecTor 2009 / SecTor 2008 / SecTor 2007

Media File
Presentation File
Tools
"Welcome to SecTor 2014" - Brian Bourne


New Era Risk Management: Using Information to Predict, Understand and Mitigate Organizational Threats - Ray Boisvert
Media File
Presentation File

The Connected Car: Security Throwback - Chris Valasek
Media File
Presentation File

The Extinction of Trust - Felix 'FX' Lindner
Media File
Presentation File

$#!T My Industry Says. . . - Kellman Meghu
Media File
Presentation File





IT Security Experts Canada Toronto SecTor - Technical Track

Media File
Presentation File
Tools
ALL YOUR MACS ARE BELONG TO US - Christopher Elisan
Media File
Presentation File

Attrition Forensics, Digital Forensics For When the Going Gets Tough and the Stakes Are High - Troy Larson
Media File
Presentation File

Corporation in The Middle - Lee Brotherston
Media File
Presentation File

Demystifying the mobile network - Chuck McAuley
Media File
Presentation File

Document Tracking for Fun, Insight, and Profit - Roy Firestein
Media File
Presentation File

Elevator Hacking: From the Pit to the Penthouse - Deviant Ollam and Howard Payne
Media File
Presentation File

Cybercrime 101 - Christopher Pogue
Media File
Presentation File

Hide it with encryption, display it with performance - Brandon Niemczyk and Prasad Rao
Media File
Presentation File

How'd That End Up On Pastebin? - Ryan Linn
Media File
Presentation File

Hunting Malware on Linux Production Servers: The Windigo Backstory - Olivier Bilodeau
Media File
Presentation File

KickaaS Security with DevOps and Cloud - Rich Mogullsau Media File
Presentation File

Mobile Fail: Cracking Open “Secure” Android Containers - Chris John Riley Media File
Presentation File

Pentesting in SDN - Owning the controllers - Roberto Soares


Play Flappy Bird while you pentest Android in style - Chris Liu and Matthew Lionetti Media File
Presentation File

POS Malware Evolved - Josh Grunzweig Media File
Presentation File
Tools
Predictions Panel - Moderated by Bruce Cowper Media File
Presentation File

Reverse Engineering a Web Application - For Fun, Behavior & WAF Development - Rodrigo Montoro and Daniel Cid Media File
Presentation File

Stay Out of the Kitchen: A DLP Security Bake-off - Zach Lanier Media File
Presentation File

The Internet of Fails: Where IoT Has Gone Wrong and How We're Making It Right - Mark Stanislav and Zach Lanier Media File
Presentation File

The Latest Changes to SAP Security Landscape - Alexander Polyakov Media File
Presentation File

Unmasking Careto through Memory Analysis - Andrew Case Media File
Presentation File





IT Security Experts Canada Toronto SecTor - Management Track
Media File
Presentation File
Tools
Asymmetry in Network Attack and Defense - William Peteroy Media File
Presentation File

FAIL Panel Again! Third time’s the charm - Ben Sapiro, Dave Lewis, James Arlen
Media File


Human Metrics - Measuring Behavior - Lance Spitzner
Media File
Presentation File

Quantitative Risk Analysis and Information Security: An OpenFair Case Study from BMO - Laura Payne
Media File
Presentation File

Re-Thinking Security Operations - Dave Millier and Mike Lecky
Media File
Presentation File

Scaling Security in Agile Scrum - Chris Eng Media File
Presentation File

Security Awareness Has Failed: A Suggested New Approach! - Francois van Heerden
Presentation File





IT Security Experts Canada Toronto SecTor - Management Track Media File Presentation File Tools
Covering my IaaS: Security and Extending the Datacenter - Brian Bourne and Tadd Axon Media File
Presentation File

Identity in the Age of the Cloud - Madhu Mahadevan Media File
Presentation File

Pulling back the covers on credit card fraud: A detailed look at financial fraudware. - Chester Wisniewski Media File
Presentation File

So, you want to be a pentester? - Heather Pilkington Media File
Presentation File

Stupid H4x0r Tricks v2.0 - Stupid is as Stupid Does - Chris Pogue and Grayson Lenik Media File
Presentation File

The Things You See (and Application Scanners Won’t) - Chuck Ben-Tzur Media File


What's Behind "Big Data" and "Behavioral Analytics" - Stephan Jou Media File
Presentation File





IT Security Experts Canada Toronto SecTor - Sponsor Talk Track
Media File
Presentation File
Tools
4 Undeniable Truths about Advanced Threat Protection - Patrick Vandenberg
Media File
Presentation File

A New Way to Look at Endpoint Security - IT’s Job in a Connected World - Claudio Damaso and Alex Binotto
Media File
Presentation File

Anatomy of a Credit Card Stealing POS Malware - Amol Sarwate
Media File
Presentation File

Casting Light on a Dark Web - Aamir Lakhaniaaron
Media File
Presentation File

Check Point Compliance Software Solutions “Your Second Set of Eyes” - Scott Tripp
Media File
Presentation File

CYDBA: Protecting Your Applications’ Rear End - Josh Shaul Media File
Presentation File

Data protection and Identity Management at cloud scale - Jasbir Gill Media File
Presentation File

The Theory of Cyber Security Evolution: Adopting Continuous Active Threat Protection and Security as a Service - Mark Sangster
Media File
Presentation File

Getting Into Mobile Without Getting Into Trouble, A Guide for the Stodgy Old Enterprise - Greg Kliewer Media File
Presentation File

How Scalar is Providing Information Security Services to the TO2015 Pan Am and Parapan American Games - Frederic Dorré Media File

Introducing Recog, an open source project utilizing Sonar data for asset and service identification - Ross Barrett & Ryan Poppa
Media File
Presentation File

Next Generation SOC: Building a Learning Security Ecosystem Using HP ArcSight Technology - Matt Anthony
Media File
Presentation File

OS Legacy Systems - Alexander Rau
Media File
Presentation File

Phishers are Boring Party Guests: The Value of Analyzing Stale, Recycled Phishing Content - Aaron Higbee
Media File
Presentation File

Security for the People: End-User Authentication Security on the Internet - Mark Stanislav
Media File
Presentation File

SilverBlight - Craig Williams
Media File
Presentation File

The Rise of Threat Detection and Response - Lucas Zaichkowsky
Media File
Presentation File