2018 SESSIONS At A Glance

SecTor Management and the Advisory Committee look forward to once again bringing the world’s best speakers in the field of IT Security to Toronto.

Some of your feedback requested a simple list of sessions where you could scan what’s happening at a glance, like the format in years past. Below you will find just that.

Please visit the schedule page for a complete breakdown of when each session will occur, along with a more comprehensive filtering feature.

Please note Expo Attendees are limited to the Sponsor, Tools and Career tracks. Find out more at our Expo Page.

Full Conference Pass Expo Conference Pass

Keynote: Radia Perlman - Radia Perlman
Keynote: Solomon Sonya - Solomon Sonya
Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware - Olivier Bilodeau, Masarah Paquet-Clouston
BLE Exploitation: Story of “SMART” devices - Yogesh Ojha
Cloud Native Security Explained - Tanya Janca
FLAIR (Fuzzy simiLArIty fRamework) - Hossein Jazi
Fuzzing for your Offensive and Defensive Teams - Roy Firestein
Hashes, hashes everywhere, but all I see is plaintext - Will Hunt
Internet-Scale Analysis of AWS Cognito Security - Andrés Riancho
Into the Fog – The Return of ICEFOG APT - Chi-en Shen (Ashley)
Major Pitfalls to Avoid in Performing Incident Response in AWS - Jonathon Poling
Malware in Google Play: Latest tactics used to penetrate the official app store - Corneliu Nitu
One-Person Army – A playbook on how to be the first Security Engineer at a company - Kashish Mittal
Post-Quantum Manifesto - Philippe Lamontagne
The SOC Counter ATT&CK - Mathieu Saulnier
Threat hunting in the cloud - Kurtis Armour, Jacob Grant
Use the Tools You Have: Threat Detection and Hunting in Azure - Daryl Novak
Your phone is using TOR and leaking your PII - Milind Bhargava, Adam Podgorski
Quantifying Unknown Risks: Data-Driven Ways to Estimate First-Time Hacks, Emerging Risks, and Rare Incidents - Dr. Marshall Kuypers
Securing pipes with TACOs - Peter Maddison
The Year of Privacy and Its Effect on Cyber Security - Stanislav Bodrov
SECurity FUNdamentals
A Few Things Right: Insights from Live and Simulated Incident Response Failures - Chad Calease
It’s Never DNS…. It Was DNS: How Adversaries Are Abusing Network Blind Spots - Edmund Brumaghin, Earl Carter
OAuth – Everything You Wanted to Know but Not Really! - Elaheh Samani, Kevin Watkins
Serverless Security Top 10 Risks - Tal Melamed
Surviving a Ransomware Attack – Lessons from the Field - Peter Morin
The CIS Critical Controls for Free – Defend all the Things! - Rob VandenBrink
Sponsor Track
Advanced security automation made simple - Albert Kramer
AI, Intelligently. A Current Look into AI in Cyber Security. - Robert Falzon
ARUBA + ZSCALER = Better Together Network Transformation - Bil Harmer, Raja Sundarrajan
Beyond the Ones and Zeros: Aligning Effective Infosec and People Leadership Principles - Michael Cole
Chaos, order and the road forward – perspectives on evolving cybersecurity - Gary Miller
Code Signing: What You Don’t Secure Can Hurt You - Chris Hickman
Data Governance for Risk Reduction and Value Creation - Neil Correa
Embracing a Risk Adaptive Approach to Data Protection - Angelica Torres-Corral
Expand your cybersecurity program with complete visibility! - Mark Holub
How Artificial Intelligence is Enabling Cyber Resilience - Josh Fu
How to Apply a Zero Trust Model to Cloud, Data and Identity - Kevin Reardon
Identity – the Foundation of your Zero Trust Architecture - Robin Wilson, Madhu Mahadevan
Introduction to Advanced Persistent Threats - Jill Sopko
Key elements to prioritizing security vulnerabilities and risks - Darren Chin, Benjamin Li
Modern MDR and Machine-Accelerated Human Response - Karl Ackerman
Phishing Defense: The Art of Human Intuitive Repulsion - Jason Meurer
Revitalizing the Scotiabank SOC with Big Data Security Analytics and Automation - Rob Knoblauch
The Race Against the Adversary: How to Win in the Era of the 18 Minute Breach - Serge Bertini
The Value of Threat Intelligence - David Empringham
Threats and Trends of 2019 - Austin McBride
Tony Stark and Cybersecurity - Aamir Lakhani
Your Tools are Protecting the Network but What is Protecting the Tools? - Matthew Adams
Career Panel and Career Fair 2019 - Nick Aleks, Joe Cummins, Inna Danilevich, Kevvie Fowler, Andrea Stapley, Tom Tran
Car Hacking on Simulation - Rohan Aggarwal
Detecting 3rd Party App Security Characteristics and Changes Made to the Attack Surface - Guy Acosta
OWASP Find Security Bugs: The community static code analyzer - Philippe Arteau
Step by step AWS Cloud Hacking - Andrés Riancho