Contact     REGISTER NOW    Illuminating the Black Art of Security - October 20-22, 2014-Toronto   
Legend: Media File Video Presentation
Presentation File PDF of Presentation
Tools Tools

SecTor 2014 - Presentations 

We will be posting the presentations and videos for SecTor 2014 as they are processed and become available. Feel free to review the presentations from our previous years and see what makes SecTor a must attend event for every IT Professional.

 Past Presentations: SecTor 2013 / SecTor 2012 / SecTor 2011 / SecTor 2010 / SecTor 2009 / SecTor 2008 / SecTor 2007

 

Media File
Presentation File
Tools
"Welcome to SecTor 2014" - Brian Bourne
New Era Risk Management: Using Information to Predict, Understand and Mitigate Organizational Threats - Ray Boisvert
Presentation File
The Connected Car: Security Throwback - Chris Valasek
Presentation File
The Extinction of Trust - Felix 'FX' Lindner
Presentation File
$#!T My Industry Says. . . - Kellman Meghu

IT Security Experts Canada Toronto SecTor - Technical Track

Media File
Presentation File
Tools
ALL YOUR MACS ARE BELONG TO US - Christopher Elisan
Media File
Attrition Forensics, Digital Forensics For When the Going Gets Tough and the Stakes Are High - Troy Larson
Media File
Presentation File
Corporation in The Middle - Lee Brotherston
Media File
Presentation File
Demystifying the mobile network - Chuck McAuley
Media File
Presentation File
Document Tracking for Fun, Insight, and Profit - Roy Firestein
Media File
Presentation File
Elevator Hacking: From the Pit to the Penthouse - Deviant Ollam and Howard Payne
Media File
Presentation File
Cybercrime 101 - Christopher Pogue
Media File
Presentation File
Hide it with encryption, display it with performance - Brandon Niemczyk and Prasad Rao
Media File
Presentation File
How'd That End Up On Pastebin? - Ryan Linn
Media File
Presentation File
Hunting Malware on Linux Production Servers: The Windigo Backstory - Olivier Bilodeau
Media File
Presentation File
KickaaS Security with DevOps and Cloud - Rich Mogullsau Media File
Mobile Fail: Cracking Open “Secure” Android Containers - Chris John Riley Media File
Presentation File
Pentesting in SDN - Owning the controllers - Roberto Soares
Play Flappy Bird while you pentest Android in style - Chris Liu and Matthew Lionetti Media File
Presentation File
POS Malware Evolved - Josh Grunzweig Media File
Presentation File
Tools
Predictions Panel - Moderated by Bruce Cowper Media File
Presentation File
Reverse Engineering a Web Application - For Fun, Behavior & WAF Development - Rodrigo Montoro and Daniel Cid Media File
Presentation File
Stay Out of the Kitchen: A DLP Security Bake-off - Zach Lanier Media File
Presentation File
The Internet of Fails: Where IoT Has Gone Wrong and How We're Making It Right - Mark Stanislav and Zach Lanier Media File
Presentation File
The Latest Changes to SAP Security Landscape - Alexander Polyakov Media File
Presentation File
Unmasking Careto through Memory Analysis - Andrew Case Media File
Presentation File
IT Security Experts Canada Toronto SecTor - Management Track
Media File
Presentation File
Tools
Asymmetry in Network Attack and Defense - William Peteroy Media File
Presentation File
FAIL Panel Again! Third time’s the charm - Ben Sapiro, Dave Lewis, James Arlen
Media File
Human Metrics - Measuring Behavior - Lance Spitzner
Media File
Quantitative Risk Analysis and Information Security: An OpenFair Case Study from BMO - Laura Payne
Presentation File
Re-Thinking Security Operations - Dave Millier and Mike Lecky
Media File
Presentation File
Scaling Security in Agile Scrum - Chris Eng Media File
Security Awareness Has Failed: A Suggested New Approach! - Francois van Heerden
Presentation File
IT Security Experts Canada Toronto SecTor - Management Track Media File Presentation File Tools
Covering my IaaS: Security and Extending the Datacenter - Brian Bourne and Tadd Axon
Presentation File
Identity in the Age of the Cloud - Madhu Mahadevan
Pulling back the covers on credit card fraud: A detailed look at financial fraudware. - Chester Wisniewski
Presentation File
So, you want to be a pentester? - Heather Pilkington
Presentation File
Stupid H4x0r Tricks v2.0 - Stupid is as Stupid Does - Chris Pogue and Grayson Lenik
Presentation File
The Things You See (and Application Scanners Won’t) - Chuck Ben-Tzur
What's Behind "Big Data" and "Behavioral Analytics" - Stephan Jou
Presentation File
IT Security Experts Canada Toronto SecTor - Sponsor Talk Track
Media File
Presentation File
Tools
4 Undeniable Truths about Advanced Threat Protection - Patrick Vandenberg
Media File
Presentation File
A New Way to Look at Endpoint Security - IT’s Job in a Connected World - Claudio Damaso and Alex Binotto
Anatomy of a Credit Card Stealing POS Malware - Amol Sarwate
Media File
Presentation File
Casting Light on a Dark Web - Aamir Lakhaniaaron
Presentation File
Check Point Compliance Software Solutions “Your Second Set of Eyes” - Scott Tripp
Media File
CYDBA: Protecting Your Applications’ Rear End - Josh Shaul Media File
Data protection and Identity Management at cloud scale - Jasbir Gill Media File
Fighting Next-Generation Adversaries with Shared Threat Intelligence - Brian Hein
Getting Into Mobile Without Getting Into Trouble, A Guide for the Stodgy Old Enterprise - Greg Kliewer
How Scalar is Providing Information Security Services to the TO2015 Pan Am and Parapan American Games - Frederic Dorré Media File
Introducing Recog, an open source project utilizing Sonar data for asset and service identification - Ross Barrett & Ryan Poppa
Media File
Presentation File
Next Generation SOC: Building a Learning Security Ecosystem Using HP ArcSight Technology - Matt Anthony
Media File
Presentation File
OS Legacy Systems - Alexander Rau
Phishers are Boring Party Guests: The Value of Analyzing Stale, Recycled Phishing Content - Aaron Higbee
Presentation File
Security for the People: End-User Authentication Security on the Internet - Mark Stanislav
Presentation File
SilverBlight - Craig Williams
Media File
Presentation File
The Rise of Threat Detection and Response - Lucas Zaichkowsky
Presentation File
The Theory of Cyber Security Evolution: Adopting Continuous Active Threat Protection and Security as a Service - Eldon Sprickerhoff
Media File