2018 SESSIONS At A Glance

SecTor Management and the Advisory Committee look forward to once again bringing the world’s best speakers in the field of IT Security to Toronto.

Some of your feedback requested a simple list of sessions where you could scan what’s happening at a glance, like the format in years past. Below you will find just that.

Please visit the schedule page for a complete breakdown of when each session will occur, along with a more comprehensive filtering feature.

Please note Expo Attendees are limited to the Sponsor, Tools and Career tracks. Find out more at our Expo Page.

Legend:
Full Conference Pass Expo Conference Pass

Keynote
Keynote: Radia Perlman - Radia Perlman
Keynote: Solomon Sonya - Solomon Sonya
Tech
Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware - Olivier Bilodeau, Masarah Paquet-Clouston
BLE Exploitation: Story of “SMART” devices - Yogesh Ojha
Cloud Native Security Explained - Tanya Janca
FLAIR (Fuzzy simiLArIty fRamework) - Hossein Jazi
Fuzzing for your Offensive and Defensive Teams - Roy Firestein
Hashes, hashes everywhere, but all I see is plaintext - Will Hunt
Internet-Scale Analysis of AWS Cognito Security - Andrés Riancho
Into the Fog – The Return of ICEFOG APT - Chi-en Shen (Ashley)
Major Pitfalls to Avoid in Performing Incident Response in AWS - Jonathon Poling
Malware in Google Play: Latest tactics used to penetrate the official app store - Corneliu Nitu
One-Person Army – A playbook on how to be the first Security Engineer at a company - Kashish Mittal
Post-Quantum Manifesto - Philippe Lamontagne
The SOC Counter ATT&CK - Mathieu Saulnier
Threat hunting in the cloud - Kurtis Armour, Jacob Grant
Use the Tools You Have: Threat Detection and Hunting in Azure - Daryl Novak
Your phone is using TOR and leaking your PII - Milind Bhargava, Adam Podgorski
Management
Quantifying Unknown Risks: Data-Driven Ways to Estimate First-Time Hacks, Emerging Risks, and Rare Incidents - Dr. Marshall Kuypers
Securing pipes with TACOs - Peter Maddison
The Year of Privacy and Its Effect on Cyber Security - Stanislav Bodrov
SECurity FUNdamentals
A Few Things Right: Insights from Live and Simulated Incident Response Failures - Chad Calease
It’s Never DNS…. It Was DNS: How Adversaries Are Abusing Network Blind Spots - Edmund Brumaghin, Earl Carter
OAuth – Everything You Wanted to Know but Not Really! - Elaheh Samani, Kevin Watkins
Serverless Security Top 10 Risks - Tal Melamed
Surviving a Ransomware Attack – Lessons from the Field - Peter Morin
The CIS Critical Controls for Free – Defend all the Things! - Rob VandenBrink
Sponsor Track
Advanced security automation made simple - Albert Kramer
AI, Intelligently. A Current Look into AI in Cyber Security. - Robert Falzon
ARUBA + ZSCALER = Better Together Network Transformation - Bil Harmer, Raja Sundarrajan
Beyond the Ones and Zeros: Aligning Effective Infosec and People Leadership Principles - Michael Cole
Chaos, order and the road forward – perspectives on evolving cybersecurity - Gary Miller
Code Signing: What You Don’t Secure Can Hurt You - Chris Hickman
Data Governance for Risk Reduction and Value Creation - Neil Correa
Embracing a Risk Adaptive Approach to Data Protection - Angelica Torres-Corral
Expand your cybersecurity program with complete visibility! - Mark Holub
How Artificial Intelligence is Enabling Cyber Resilience - Josh Fu
How to Apply a Zero Trust Model to Cloud, Data and Identity - Kevin Reardon
Identity – the Foundation of your Zero Trust Architecture - Robin Wilson, Madhu Mahadevan
Introduction to Advanced Persistent Threats - Jill Sopko
Key elements to prioritizing security vulnerabilities and risks - Darren Chin, Benjamin Li
Modern MDR and Machine-Accelerated Human Response - Karl Ackerman
Phishing Defense: The Art of Human Intuitive Repulsion - Jason Meurer
Revitalizing the Scotiabank SOC with Big Data Security Analytics and Automation - Rob Knoblauch
The Race Against the Adversary: How to Win in the Era of the 18 Minute Breach - Serge Bertini
The Value of Threat Intelligence - David Empringham
Threats and Trends of 2019 - Austin McBride
Tony Stark and Cybersecurity - Aamir Lakhani
Your Tools are Protecting the Network but What is Protecting the Tools? - Matthew Adams
Career
Career Panel and Career Fair 2019 - Nick Aleks, Joe Cummins, Inna Danilevich, Kevvie Fowler, Andrea Stapley, Tom Tran
Tools
Car Hacking on Simulation - Rohan Aggarwal
Detecting 3rd Party App Security Characteristics and Changes Made to the Attack Surface - Guy Acosta
OWASP Find Security Bugs: The community static code analyzer - Philippe Arteau
Step by step AWS Cloud Hacking - Andrés Riancho