2018 SESSIONS At A Glance

SecTor Management and the Advisory Committee look forward to once again bringing the world’s best speakers in the field of IT Security to Toronto.

Some of your feedback requested a simple list of sessions where you could scan what’s happening at a glance, like the format in years past. Below you will find just that.

Please visit the schedule page for a complete breakdown of when each session will occur, along with a more comprehensive filtering feature.

Please note Expo Attendees are limited to the Sponsor, Tools and Career tracks. Find out more at our Expo Page.

Full Conference Pass Expo Conference Pass

Creating a Culture to Foster Collaboration, Creativity, and Critical Thinking - Radia Perlman
Do you trust or fear technology? - Jeff Moss
Made in Canada – the Significance of Canadian Security Technology - Brian O’Higgins, Stephan Jou, Leo Lax, Leah MacMillan, Michele Mosca
Navigating Cyberspace: Identifying a New Path to Defeating Tomorrow’s Attacks - Solomon Sonya
Toronto Communities Keynote - Brian Bourne, Nick Aleks, Opheliar Chan, Max Cizauskas, Lee Kagan, Helen Oakley
Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware - Olivier Bilodeau, Masarah Paquet-Clouston
Chip.Fail – Glitching the Silicon of the Connected World - Thomas Roth
Cloud Adoption – Trends and Recommendations for Security Teams - Fernando Montenegro
Cloud Native Security Explained - Tanya Janca
FAIL Panel: I Quit Securi7y - James Arlen, Rich Mogull, Nick Johnston, Dave Lewis
FLAIR (Fuzzy simiLArIty fRamework) - Hossein Jazi
Fuzzing for your Offensive and Defensive Teams - Roy Firestein
Hashes, hashes everywhere, but all I see is plaintext - Will Hunt
Internet-Scale Analysis of AWS Cognito Security - Andrés Riancho
Into the Fog – The Return of ICEFOG APT - Chi-en Shen (Ashley)
IoT Security: An Insiders Perspective - Lee Brotherston
Major Pitfalls to Avoid in Performing Incident Response in AWS - Jonathon Poling
Malware in Google Play: Latest tactics used to penetrate the official app store - Corneliu Nitu
One-Person Army – A playbook on how to be the first Security Engineer at a company - Kashish Mittal
Poisoned RDP Offense and Defense - Dana Baril
Post-Quantum Manifesto - Philippe Lamontagne
Powershell is Dead. Long Live C# - Lee Kagan
Profiling Fraudsters from the Darknet to ICQ - Mathieu Lavoie
The SOC Counter ATT&CK - Mathieu Saulnier
Threat hunting in the cloud - Kurtis Armour, Jacob Grant
Your phone is using TOR and leaking your PII - Milind Bhargava, Adam Podgorski
Beyond Spam: Using CASL to Stop the Spread of Malware in Canada - Neil Barratt
Outrunning the Avalanche of Unmanaged, Un-agentable Devices - Nadir Izrael
Pentesting for Success – Critical Success Factors - Robert Beggs
Quantifying Unknown Risks: Data-Driven Ways to Estimate First-Time Hacks, Emerging Risks, and Rare Incidents - Dr. Marshall Kuypers
Securing pipes with TACOs - Peter Maddison
The Year in Cybersecurity Law - David Fewer
The Year of Privacy and Its Effect on Cyber Security - Stanislav Bodrov
SECurity FUNdamentals
A Few Things Right: Insights from Live and Simulated Incident Response Failures - Chad Calease
How to Build an Insecure System out of Perfectly Good Cryptography - Radia Perlman
It’s Never DNS…. It Was DNS: How Adversaries Are Abusing Network Blind Spots - Edmund Brumaghin, Earl Carter
OAuth – Everything You Wanted to Know but Not Really! - Elaheh Samani, Kevin Watkins
Serverless Security Top 10 Risks - Tal Melamed
Surviving a Ransomware Attack – Lessons from the Field - Wilfred Farias, Thomas Poinsignon-Clavel
The CIS Critical Controls for Free – Defend all the Things! - Rob VandenBrink
Sponsor Track
Advanced security automation made simple - Albert Kramer
AI, Intelligently. A Current Look into AI in Cyber Security. - Robert Falzon
ARUBA + ZSCALER = Better Together Network Transformation - Bil Harmer, Raja Sundarrajan
Beyond the Ones and Zeros: Aligning Effective Infosec and People Leadership Principles - Michael Cole
Catching and Cleaning Phish (for O365) - Jim Banach
Chaos, order and the road forward – perspectives on evolving cybersecurity - Gary Miller
Code Signing: What You Don’t Secure Can Hurt You - Ryan Sanders, Jack Palivoda
Data Governance for Risk Reduction and Value Creation - Neil Correa
Embracing a Risk Adaptive Approach to Data Protection - Charles Keane
Enabling Zero Trust with Artificial Intelligence - Chris Pittman
Expand your cybersecurity program with complete visibility! - Mark Holub
Got DA? - Hamza Gondal
Identity – the Foundation of your Zero Trust Architecture - Robin Wilson, Madhu Mahadevan
Introduction to Advanced Persistent Threats - Jill Sopko
Key elements to prioritizing security vulnerabilities and risks - Darren Chin, Benjamin Li
Modern MDR and Machine-Accelerated Human Response - Karl Ackerman
Phishing Defense: The Art of Human Intuitive Repulsion - Jason Meurer
Revitalizing the Scotiabank SOC with Big Data Security Analytics and Automation - Rob Knoblauch
Risk Transformation: Plan-Build-Run in a World Without Time - Chris Gray
The Race Against the Adversary: How to Win in the Era of the 18 Minute Breach - Serge Bertini
The Value of Threat Intelligence - David Empringham
Threats and Trends of 2019 - Austin McBride
Tony Stark and Cybersecurity - Aamir Lakhani
Your Tools are Protecting the Network but What is Protecting the Tools? - Matthew Adams
Career Panel and Career Fair 2019 - Nick Aleks, Joe Cummins, Inna Danilevich, Kevvie Fowler, Andrea Stapley, Tom Tran
Car Hacking on Simulation - Rohan Aggarwal
OWASP Find Security Bugs: The community static code analyzer - Philippe Arteau
Step by step AWS Cloud Hacking - Andrés Riancho
The Tools of a Web App Pentester - Chuck Ben-Tzur
Use the Tools You Have: Threat Detection and Hunting in Azure - Daryl Novak
Using Static and Runtime Analysis to Understand Third-Party Applications - Guy Acosta
Visualizing Your Security Posture from Link, to Gateway, and Beyond - Joe Cummins