2018 SESSIONS At A Glance

SecTor Management and the Advisory Committee look forward to once again bringing the world’s best speakers in the field of IT Security to Toronto.

Some of your feedback requested a simple list of sessions where you could scan what’s happening at a glance, like the format in years past. Below you will find just that.

Please visit the schedule page for a complete breakdown of when each session will occur, along with a more comprehensive filtering feature.

Please note Expo Attendees are limited to the Sponsor, Tools and Career tracks. Find out more at our Expo Page.

Legend:
Full Conference Pass Expo Conference Pass

Keynote
Keynote: Radia Perlman - Radia Perlman
Tech
Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware - Olivier Bilodeau, Masarah Paquet-Clouston
BLE Exploitation: Story of “SMART” devices - Yogesh Ojha
Cloud Native Security Explained - Tanya Janca
FLAIR (Fuzzy simiLArIty fRamework) - Hossein Jazi
Fuzzing for your Offensive and Defensive Teams - Roy Firestein
Internet-Scale Analysis of AWS Cognito Security - Andrés Riancho
One-Person Army – A playbook on how to be the first Security Engineer at a company - Kashish Mittal
Use the Tools You Have: Threat Detection and Hunting in Azure - Daryl Novak
Your phone is using TOR and leaking your PII - Milind Bhargava, Adam Podgorski
Management
Quantifying Unknown Risks: Data-Driven Ways to Estimate First-Time Hacks, Emerging Risks, and Rare Incidents - Dr. Marshall Kuypers
The Year of Privacy and Its Effect on Cyber Security - Stanislav Bodrov
SECurity FUNdamentals
It’s Never DNS…. It Was DNS: How Adversaries Are Abusing Network Blind Spots - Edmund Brumaghin, Earl Carter
OAuth – Everything You Wanted to Know but Not Really! - Elaheh Samani, Kevin Watkins
Serverless Security Top 10 Risks - Tal Melamed
Surviving a Ransomware Attack – Lessons from the Field - Peter Morin
Sponsor Track
Introduction to Advanced Persistent Threats - Jill Sopko