2017 SESSIONS At A Glance

SecTor Management and the Advisory Committee look forward to once again bringing the world’s best speakers in the field of IT Security to Toronto.

Some of your feedback requested a simple list of sessions where you could scan what’s happening at a glance, like the format in years past.  Below you will find just that.

Please visit the schedule page for a complete breakdown of when each session will occur, along with a more comprehensive filtering feature.

The Expo Hall is open to attendees between the hours 8am to 5pm Tuesday, November 14, and 8am to 4pm Wednesday, November 15. Please note Expo Only Attendees are limited to the Sponsor, Tools and Career tracks. Find out more at our new Expo Page.

Colleen Merchant Keynote TBA - Colleen Merchant
Security and Privacy in a Hyper-connected World - Bruce Schneier
Winning Defense - Allison Miller
Attacking Modern SaaS Companies - Sean Cassidy
Exploiting IoT Devices Over Software Defined Radio, ZigBee, WiFi and BLE - Swaroop Yermalkar
Incident Response and Forensics in AWS - Jonathon Poling
MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need to Adapt) - Chris Thompson
Pwning a Smart Home in Under 10 Minutes - Aditya Gupta
When Two-Factor Authentication is a Foe: Breaking the iCloud Keychain - Vladimir Katalov
Establishing the CSIRT Team for The Rio 2016 Olympic Games - Rômulo Rocha
Leveraging Best Practices to Determine Your Cyber Insurance Needs - Dave Millier, Russ Cohen
Your Chance to Get It Right: 5 Keys to Building AppSec Into DevOps - Chris Wysopal
SECurity FUNdamentals
Building Your Own Open-source Android Penetration Testing Platform - Amadeus Konopko, Jean-Paul Mitri
Common Attacks Against Active Directory and How to Protect your Organization Against Them - Kevin McBride
Frugal Web Application Testing – Can in-house penetration testing achieve industry standard results while saving you money? - Harshal Chandorkar, Natalia Wadden
Top SIEM Use Cases You Should Implement Today - Julian Pileggi
Sponsor Track
Boosting Canada’s Cyber Immune System for Internet Health - Matt Broda
Building a Secure Foundation for the Internet of Things (IoT) - John Grimm
Building Your Own Automated Malware Analysis Lab for Insights on Active Threats. - Kurtis Armour
Cloud Security is Application Security – Securing the Cloud as a Team - John Turner
Cyber Crime and Financial Crime: different sides of the same coin - Tyson Macaulay
Decoding Cyberespionage from Insider Mistakes - Brandon Swafford
Hunting Ransomware: Automate protection to get ahead of the next global outbreak - Sean Earhard
Insider Threat Analytics & Anomalous Behaviors - Carl Miller
Moving Up the Security Maturity Curve – The Sisyphean Task - Jamie Hari
Prioritizing Vulnerability Remediation From an Attacker’s Perspective - Bharat Jogi
Security Automation and Orchestration That Won’t Get You Fired - Syra Arif
Security consideration for Microservices using Container Technology - Ralph Janke
Skin​ ​in​ ​the​ ​Game:​ ​How​ ​Security​ ​Teams​ ​are​ ​Scaling​ ​Through​ ​IT​ ​Orchestration - Jen​ ​Andre
Take Best Practices to the Next Level - Ken Muir
The Power Of Integration - Brian Read
The Spy in Your Pocket - Ricardo Panez
The State of the Phish and Response - Mike Saurbaugh
Chkrootkit: Eating APTs at Breakfast Since 1997 - Nelson Murilo
Extending BloodHound for Red Teamers - Tom Porter