2017 SESSIONS At A Glance

SecTor Management and the Advisory Committee look forward to once again bringing the world’s best speakers in the field of IT Security to Toronto.

Some of your feedback requested a simple list of sessions where you could scan what’s happening at a glance, like the format in years past.  Below you will find just that.

Please visit the schedule page for a complete breakdown of when each session will occur, along with a more comprehensive filtering feature. The schedule is also available in timetable format.

The Expo Hall is open to attendees between the hours 8am to 5pm Tuesday, November 14, and 8am to 4pm Wednesday, November 15. Please note Expo Only Attendees are limited to the Sponsor, Tools and Career tracks. Find out more at our new Expo Page.

Legend:
Full Conference Pass Expo Conference Pass

Keynote
Keynote Bruce Potter – Title TBA - Bruce Potter
Keynote Mark Nunnikhoven – Title TBA - Mark Nunnikhoven
Tech
Deep Learning – Classifying malicious websites with image recognition models - Akbar Qureshi
Exploiting hardware wallet’s secure element - Sergei Volokitin
HomeBrew: Developing your own (threat) intel - Chris Brewer, Harlan Carvey
How to Spot a Fake: Improve your Security Operations with Real-world AI - Stephan Jou
The Hunt is On! Advanced Memory Forensics meets NextGen Actionable Threat Intelligence - Solomon Sonya
Unblockable Chains – Is Blockchain the ultimate malicious infrastructure? - Omer Zohar
Why Memory Attacks are on the Rise and How to Stop Them - Josh Fu
Management
How identity management is transforming modern business - Sarah Squire
Why can’t we build secure software? - Tanya Janca
SECurity FUNdamentals
25 Techniques to Gather Threat Intel and Track Actors - Sun Huang, Wayne Huang
Building Bespoke Threat Intelligence Enrichment Platforms - Sean Tierney
Pragmatic Cloud Security: The future is now. - Mike Rothman
Sponsor Track
Crowd Sourced Security – Applying the Wisdom of the Crowd to Cyber Defences - John “Lex” Robinson
Tools
Elytron: Next-generation security for Java servers - Farah Juma
Malboxes: Make Malware Analysis More Accessible - Olivier Bilodeau