2018 SESSIONS At A Glance – Coming Soon

SecTor Management and the Advisory Committee look forward to once again bringing the world’s best speakers in the field of IT Security to Toronto.

Some of your feedback requested a simple list of sessions where you could scan what’s happening at a glance, like the format in years past. Below you will find just that.

Please visit the schedule page for a complete breakdown of when each session will occur, along with a more comprehensive filtering feature. The schedule is also available in timetable format.

The Expo Hall is open to attendees between the hours 8am to 5pm Tuesday, October 2, and 8am to 4pm Wednesday, October 3. Please note Expo Only Attendees are limited to the Sponsor, Tools and Career tracks. Find out more at our new Expo Page.

Full Conference Pass Expo Conference Pass

Are We Setup To Fail? - Mark Nunnikhoven
Keynote Bruce Potter – Title TBA - Bruce Potter
Deep Learning – Classifying malicious websites with image recognition models - Akbar Qureshi
Exploiting hardware wallet’s secure element - Sergei Volokitin
HomeBrew: Developing your own (threat) intel - Chris Brewer, Harlan Carvey
How to Spot a Fake: Improve your Security Operations with Real-world AI - Stephan Jou
The Hunt is On! Advanced Memory Forensics meets NextGen Actionable Threat Intelligence - Solomon Sonya
Unblockable Chains – Is Blockchain the ultimate malicious infrastructure? - Omer Zohar
Why Memory Attacks are on the Rise and How to Stop Them - Josh Fu
How identity management is transforming modern business - Sarah Squire
ISO 27001 & The GDPR - Andrew Clearwater
Why can’t we build secure software? - Tanya Janca
SECurity FUNdamentals
25 Techniques to Gather Threat Intel and Track Actors - Sun Huang, Wayne Huang
Building Bespoke Threat Intelligence Enrichment Platforms - Sean Tierney
Pragmatic Cloud Security: The future is now. - Mike Rothman
Sponsor Track
Breach Readiness, Mandatory Reporting and You! - Danny Pehar
Case Studies in Defending Your Digital Enterprise - Matt Broda
Crowd Sourced Security – Applying the Wisdom of the Crowd to Cyber Defences - John “Lex” Robinson
Developing and Implementing an Effective Endpoint Security Strategy - Kurtis Armour
Encryption is More than a Button - Steve Davis
Everything or Nothing: Active Defense in the Corporate World? - Aamir Lakhani
From Profit to Destruction: Analyzing Today’s Threat Landscape - Earl Carter
One the Eve of Quantum Computing: The Definitive Need for Crypto Agility - Chris Hickman
Security Powered by Big Data - David Soto
The Real Deal About AI - Josh Fu
Elytron: Next-generation security for Java servers - Farah Juma
Malboxes: Make Malware Analysis More Accessible - Olivier Bilodeau