2019 SESSIONS At A Glance

SecTor Management and the Advisory Committee look forward to once again bringing the world’s best speakers in the field of IT Security to Toronto.

Some of your feedback requested a simple list of sessions where you could scan what’s happening at a glance, like the format in years past. Below you will find just that.

Please visit the schedule page for a complete breakdown of when each session will occur, along with a more comprehensive filtering feature.

Full Conference Pass Expo Conference Pass

Creating a Culture to Foster Collaboration, Creativity, and Critical Thinking - Radia Perlman
Do you trust or fear technology? - Jeff Moss
Made in Canada – the Significance of Canadian Security Technology - Brian O’Higgins, Stephan Jou, Leo Lax, Leah MacMillan, Michele Mosca
Navigating Cyberspace: Identifying a New Path to Defeating Tomorrow’s Attacks - Solomon Sonya
Toronto Communities Keynote - Brian Bourne, Nick Aleks, Opheliar Chan, Max Cizauskas, Lee Kagan, Helen Oakley
Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware - Olivier Bilodeau, Masarah Paquet-Clouston
Chip.Fail – Glitching the Silicon of the Connected World - Thomas Roth
Cloud Adoption – Trends and Recommendations for Security Teams - Fernando Montenegro
Cloud Native Security Explained - Tanya Janca
FAIL Panel: I Quit Securi7y - James Arlen, Rich Mogull, Nick Johnston, Dave Lewis
FLAIR (Fuzzy simiLArIty fRamework) - Hossein Jazi
Fuzzing for your Offensive and Defensive Teams - Roy Firestein
Hashes, hashes everywhere, but all I see is plaintext - Will Hunt
Internet-Scale Analysis of AWS Cognito Security - Andrés Riancho
Into the Fog – The Return of ICEFOG APT - Chi-en Shen (Ashley)
IoT Security: An Insiders Perspective - Lee Brotherston
Major Pitfalls to Avoid in Performing Incident Response in AWS - Jonathon Poling
Malware in Google Play: Latest tactics used to penetrate the official app store - Corneliu Nitu
One-Person Army – A playbook on how to be the first Security Engineer at a company - Kashish Mittal
Poisoned RDP Offense and Defense - Dana Baril
Post-Quantum Manifesto - Philippe Lamontagne
Powershell is Dead. Long Live C# - Lee Kagan
Profiling Fraudsters from the Darknet to ICQ - Mathieu Lavoie
The SOC Counter ATT&CK - Mathieu Saulnier
Threat hunting in the cloud - Kurtis Armour, Jacob Grant
Your phone is using TOR and leaking your PII - Milind Bhargava, Adam Podgorski
Beyond Spam: Using CASL to Stop the Spread of Malware in Canada - Neil Barratt
Outrunning the Avalanche of Unmanaged, Un-agentable Devices - Nadir Izrael
Pentesting for Success – Critical Success Factors - Robert Beggs
Quantifying Unknown Risks: Data-Driven Ways to Estimate First-Time Hacks, Emerging Risks, and Rare Incidents - Dr. Marshall Kuypers
Securing pipes with TACOs - Peter Maddison
The Year in Cybersecurity Law - David Fewer
The Year of Privacy and Its Effect on Cyber Security - Stanislav Bodrov
SECurity FUNdamentals
A Few Things Right: Insights from Live and Simulated Incident Response Failures - Chad Calease
How to Build an Insecure System out of Perfectly Good Cryptography - Radia Perlman
It’s Never DNS…. It Was DNS: How Adversaries Are Abusing Network Blind Spots - Edmund Brumaghin, Earl Carter
OAuth – Everything You Wanted to Know but Not Really! - Elaheh Samani, Kevin Watkins
Serverless Security Top 10 Risks - Tal Melamed
Surviving a Ransomware Attack – Lessons from the Field - Wilfred Farias, Thomas Poinsignon-Clavel
The CIS Critical Controls for Free – Defend all the Things! - Rob VandenBrink
Sponsor Track
Advanced security automation made simple - Albert Kramer
AI, Intelligently. A Current Look into AI in Cyber Security. - Robert Falzon
ARUBA + ZSCALER = Better Together Network Transformation - Bil Harmer, Raja Sundarrajan
Beyond the Ones and Zeros: Aligning Effective Infosec and People Leadership Principles - Michael Cole
Catching and Cleaning Phish (for O365) - Jim Banach
Chaos, order and the road forward – perspectives on evolving cybersecurity - Gary Miller
Code Signing: What You Don’t Secure Can Hurt You - Ryan Sanders, Jack Palivoda
Data Governance for Risk Reduction and Value Creation - Neil Correa
Embracing a Risk Adaptive Approach to Data Protection - Charles Keane
Enabling Zero Trust with Artificial Intelligence - Chris Pittman
Expand your cybersecurity program with complete visibility! - Mark Holub
Got DA? - Hamza Gondal
Identity – the Foundation of your Zero Trust Architecture - Robin Wilson, Madhu Mahadevan
Introduction to Advanced Persistent Threats - Jill Sopko
Key elements to prioritizing security vulnerabilities and risks - Darren Chin, Benjamin Li
Modern MDR and Machine-Accelerated Human Response - Karl Ackerman
Phishing Defense: The Art of Human Intuitive Repulsion - Jason Meurer
Revitalizing the Scotiabank SOC with Big Data Security Analytics and Automation - Rob Knoblauch
Risk Transformation: Plan-Build-Run in a World Without Time - Chris Gray
The Race Against the Adversary: How to Win in the Era of the 18 Minute Breach - Serge Bertini
The Value of Threat Intelligence - David Empringham
Threats and Trends of 2019 - Austin McBride
Tony Stark and Cybersecurity - Aamir Lakhani
Your Tools are Protecting the Network but What is Protecting the Tools? - Matthew Adams
Career Panel and Career Fair 2019 - Nick Aleks, Joe Cummins, Inna Danilevich, Kevvie Fowler, Andrea Stapley, Tom Tran
Car Hacking on Simulation - Rohan Aggarwal
OWASP Find Security Bugs: The community static code analyzer - Philippe Arteau
Step by step AWS Cloud Hacking - Andrés Riancho
The Tools of a Web App Pentester - Chuck Ben-Tzur
Use the Tools You Have: Threat Detection and Hunting in Azure - Daryl Novak
Using Static and Runtime Analysis to Understand Third-Party Applications - Guy Acosta
Visualizing Your Security Posture from Link, to Gateway, and Beyond - Joe Cummins