Contact     REGISTER NOW    Illuminating the Black Art of Security - October 17-19, 2016-Toronto   
Legend: Media File Video Presentation
Presentation File PDF of Presentation
Tools Tools

SecTor 2015 - Presentations 

We will be posting the presentations and videos for SecTor 2015 as they are processed and become available. Feel free to review the presentations from our previous years and see what makes SecTor a must attend event for every IT Professional.

 Past Presentations: SecTor 2014 / SecTor 2013 / SecTor 2012 / SecTor 2011 / SecTor 2010 / SecTor 2009 / SecTor 2008 / SecTor 2007

Media File
Presentation File
Tools
"Welcome to SecTor 2015" - Brian Bourne


Big Data Needs Big Privacy ... Enter Privacy by Design - Dr. Ann Cavoukian Media File Presentation File  
IT Security Operations: Successful Transformation - Kristin Lovejoy Media File    
Globalization of Cybercrime - Jason Brown      
Maturing InfoSec: Lessons from Aviation on Information Sharing - Trey Ford Media File  Presentation File
 




IT Security Experts Canada Toronto SecTor - Technical Track

Media File
Presentation File
Tools
Automation is your Friend: Embracing SkyNet to Scale Cloud Security - Mike Rothman Media File    
Breaking Access Controls with BLEKey - Mark Bassegio and Eric Evenchick Media File    
Breaking and Fixing Python Applications - Enrico Branca Media File Presentation File Tools
Complete Application Ownage via Multi-POST XSRF - Adrien de Beaupré Media File Presentation File  
Confessions of a Professional Cyber Stalker - Ken Westin Media File
Presentation File
 
Cymon - An Open Threat Intelligence System - Roy Firestein Media File
Presentation File
 
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing - Alex Pinto
Media File
Presentation File  
DevOps For The Home - Kellman Meghu
Media File
Presentation File
 
Drug Pump and Medical Device Security - Jeremy Richards
   
Exploitation Trends: From Potential Risk to Actual Risk - Tim Rains
Media File
   
Hijacking Arbitrary .NET Application Control Flow - Topher Timzen Media File Presentation File  
Incoming Threats At the Speed of Retail - Wendy Nather
Media File
   
Learning To Love Your Attackers - Ryan Linn      
Making & Breaking Machine Learning Anomaly Detectors in Real Life - Clarence Chio Media File    
Malware Activity in Mobile Networks – An Insider View - Kevin McNamee Media File Presentation File  
Software Defined Networking / Attacker Defined Networking - Rob VandenBrink Media File    
Stealth Attack From The Produce Aisle - Todd Dow and Keith Benedict   Presentation File  
Stealthier Attacks and Smarter Defending with TLS Fingerprinting - Lee Brotherston Media File Presentation File  
UNMASKING MALWARE - Christopher Elisan Media File    
What Google knows about you and your devices, and how to get it - Vladimir Katalov
Media File
Presentation File  
Xenophobia is Hard on Data: Forced Localization, Data Storage, and Business Realities - Brendan O'Connor and James Arlen Media File
Presentation File
 




IT Security Experts Canada Toronto SecTor - Management Track
Media File
Presentation File
Tools
Bulletproofing Your Incident Response Plan: Effective Tabletops - Reg Harnish Media File
Presentation File
 
CISO Survival Guide: How to thrive in the C-Suite and Boardroom - Chris Wysopal
Media File
Presentation File  
Dolla Dolla Bill Y'all: Cybercrime Cashouts - Benjamin Brown Media File
Presentation File
 
Make Metrics Matter - Jessica Ireland
Media File
Presentation File  
The Effective Use of Cyber Ranges for Application Performance and Security Resilience – Train Like You Fight! - Bob DuCharme Media File    
There’s no such thing as a coincidence - Discovering Novel Cyber Threats - Jim Penrose Media File    
What does it take to deliver the most technologically advanced Games ever? - Enzo Sacco and Quang Tu   Presentation File  




IT Security Experts Canada Toronto SecTor - Management Track Media File Presentation File Tools
Agile Incident Management - Bringing the "Win" Back to Data and Privacy Breach Responses - Robert Beggs  
Presentation File
 
Building an Effective Vulnerability & Remediation Management Program - Dave Millier Media File    
Ground Zero Financial Services: Targeted Attacks from the Darknet - Joe Pizzo Media File
   
Peeling The Layers Of Vawtrak - Raul Alvarez   Presentation File  
Preventing Home Automation Security Disasters - James Arlen Media File Presentation File  
Run Faster, Continuously Harden - Embracing DevOps to Secure All The Things - Chayim Kirshen Media File
Presentation File
 
Security for non-Unicorns - Ben Hughes Media File    
The Internet of Bad Things and Securing the Software Defined Data Center - Ian Redden and Marc Edun
Media File
   




IT Security Experts Canada Toronto SecTor - Sponsor Talk Track
Media File
Presentation File
Tools
2015 State of Vulnerability Exploits - Amol Sarwate Media File Presentation File  
Advanced Threat Analytics: Adapt as Fast as Your Enemies - Jasbir Gill and Lanny Cofman
Media File
   
Advanced Threats: Eliminating the Blind Spot - Fahmy Kadiri Media File    
Browser and Environment Hardening - Kurtis Armour
Media File
   
Building Better Indicators: Crowdsourcing Malware IOCs - Sean Wilson Media File Presentation File  
Business Backed CVEs - The Major Vulnerabilities of the Past Year - Atif Ghauri and Brad Antoniewicz Media File    
Certifi-gate: Has your Android device been Pwned? - Shai Yanovski Media File    
Changing the Game of Threat Hunting - Jim Penrose Media File    
Detecting the Bear in Camp: How to Find Your True Vulnerabilities - Ryan Poppa
Media File
   
Effective Ways to Tackle Vulnerability Remediation - Dave Millier Media File    
Ensuring the Success of Your IAM Project - Jeremy Hanlon      
Exposing Advanced Threats: How big data analytics is changing the way advanced threat defense is deployed, managed and measured - Sean Earhard Media File    
Insider Threat – The Soft Underbelly of CyberSecurity - Harold Byun Media File    
Knowing what happened is only half the battle. - Grayson Lenik Media File
Presentation File
 
Mitigating the Alert - Impact Prevention in a super active security battlefield - Brian Read
Media File
   
One Ring to Rule Them All - Hardware isolation and the future of virtualization security - Simon Crosby Media File Presentation File  
SIEM and the Art of Log Management - Jeff Pold and Ron Pettit Media File Presentation File  
Taking back Endpoint Control! - John Beal
Media File
Presentation File  
The State of Software Security - Chris Wysopal Media File Presentation File