Contact     REGISTER NOW    Illuminating the Black Art of Security - October 20-22, 2014-Toronto   
Legend: Media File Video Presentation
Presentation File PDF of Presentation
Tools Tools

SecTor 2014 - Presentations 

We will be posting the presentations and videos for SecTor 2014 as they are processed and become available. Feel free to review the presentations from our previous years and see what makes SecTor a must attend event for every IT Professional.

 Past Presentations: SecTor 2013 / SecTor 2012 / SecTor 2011 / SecTor 2010 / SecTor 2009 / SecTor 2008 / SecTor 2007

 

Media File
Presentation File
Tools
"Welcome to SecTor 2014" - Brian Bourne
New Era Risk Management: Using Information to Predict, Understand and Mitigate Organizational Threats - Ray Boisvert
The Connected Car: Security Throwback - Chris Valasek
Presentation File
The Extinction of Trust - Felix 'FX' Lindner
Presentation File
$#!T My Industry Says. . . - Kellman Meghu

IT Security Experts Canada Toronto SecTor - Technical Track

Media File
Presentation File
Tools
ALL YOUR MACS ARE BELONG TO US - Christopher Elisan
Attrition Forensics, Digital Forensics For When the Going Gets Tough and the Stakes Are High - Troy Larson
Presentation File
Corporation in The Middle - Lee Brotherston
Presentation File
Demystifying the mobile network - Chuck McAuley
Presentation File
Document Tracking for Fun, Insight, and Profit - Roy Firestein
Presentation File
Elevator Hacking: From the Pit to the Penthouse - Deviant Ollam and Howard Payne
Presentation File
Cybercrime 101 - Christopher Pogue
Presentation File
Hide it with encryption, display it with performance - Brandon Niemczyk and Prasad Rao
Presentation File
How'd That End Up On Pastebin? - Ryan Linn
Presentation File
Hunting Malware on Linux Production Servers: The Windigo Backstory - Olivier Bilodeau
Presentation File
KickaaS Security with DevOps and Cloud - Rich Mogull
Mobile Fail: Cracking Open “Secure” Android Containers - Chris John Riley
Presentation File
Pentesting in SDN - Owning the controllers - Roberto Soares
Play Flappy Bird while you pentest Android in style - Chris Liu and Matthew Lionetti
Presentation File
POS Malware Evolved - Josh Grunzweig
Presentation File
Tools
Predictions Panel - Moderated by Bruce Cowper
Reverse Engineering a Web Application - For Fun, Behavior & WAF Development - Rodrigo Montoro and Daniel Cid
Presentation File
Stay Out of the Kitchen: A DLP Security Bake-off - Zach Lanier
The Internet of Fails: Where IoT Has Gone Wrong and How We're Making It Right - Mark Stanislav and Zach Lanier
Presentation File
The Latest Changes to SAP Security Landscape - Alexander Polyakov
Presentation File
Unmasking Careto through Memory Analysis - Andrew Case
IT Security Experts Canada Toronto SecTor - Management Track
Media File
Presentation File
Tools
Asymmetry in Network Attack and Defense - William Peteroy
Presentation File
FAIL Panel Again! Third time’s the charm - Ben Sapiro, Dave Lewis, James Arlen
Human Metrics - Measuring Behavior - Lance Spitzner
Quantitative Risk Analysis and Information Security: An OpenFair Case Study from BMO - Laura Payne
Re-Thinking Security Operations - Dave Millier and Mike Lecky
Presentation File
Scaling Security in Agile Scrum - Chris Eng
Security Awareness Has Failed: A Suggested New Approach! - Francois van Heerden
Presentation File
IT Security Experts Canada Toronto SecTor - Management Track Media File Presentation File Tools
Covering my IaaS: Security and Extending the Datacenter - Brian Bourne and Tadd Axon
Presentation File
Identity in the Age of the Cloud - Madhu Mahadevan
Pulling back the covers on credit card fraud: A detailed look at financial fraudware. - Chester Wisniewski
Presentation File
So, you want to be a pentester? - Heather Pilkington
Presentation File
Stupid H4x0r Tricks v2.0 - Stupid is as Stupid Does - Chris Pogue and Grayson Lenik
Presentation File
The Things You See (and Application Scanners Won’t) - Chuck Ben-Tzur
What's Behind "Big Data" and "Behavioral Analytics" - Stephan Jou
Presentation File
IT Security Experts Canada Toronto SecTor - Sponsor Talk Track
Media File
Presentation File
Tools
4 Undeniable Truths about Advanced Threat Protection - Patrick Vandenberg
Presentation File
A New Way to Look at Endpoint Security - IT’s Job in a Connected World - Claudio Damaso and Alex Binotto
Anatomy of a Credit Card Stealing POS Malware - Amol Sarwate
Presentation File
Casting Light on a Dark Web - Aamir Lakhaniaaron
Presentation File
Check Point Compliance Software Solutions “Your Second Set of Eyes” - Scott Tripp
CYDBA: Protecting Your Applications’ Rear End - Josh Shaul
Data protection and Identity Management at cloud scale - Jasbir Gill
Fighting Next-Generation Adversaries with Shared Threat Intelligence - Brian Hein
Getting Into Mobile Without Getting Into Trouble, A Guide for the Stodgy Old Enterprise - Greg Kliewer
How Scalar is Providing Information Security Services to the TO2015 Pan Am and Parapan American Games - Frederic Dorré
Introducing Recog, an open source project utilizing Sonar data for asset and service identification - Ross Barrett & Ryan Poppa
Presentation File
Next Generation SOC: Building a Learning Security Ecosystem Using HP ArcSight Technology - Matt Anthony
Presentation File
OS Legacy Systems - Alexander Rau
Phishers are Boring Party Guests: The Value of Analyzing Stale, Recycled Phishing Content - Aaron Higbee
Presentation File
Security for the People: End-User Authentication Security on the Internet - Mark Stanislav
Presentation File
SilverBlight - Craig Williams
Presentation File
The Rise of Threat Detection and Response - Lucas Zaichkowsky
The Theory of Cyber Security Evolution: Adopting Continuous Active Threat Protection and Security as a Service - Eldon Sprickerhoff