2019 SESSIONS At A Glance

SecTor Management and the Advisory Committee look forward to once again bringing the world’s best speakers in the field of IT Security to Toronto.

Some of your feedback requested a simple list of sessions where you could scan what’s happening at a glance, like the format in years past. Below you will find just that.

Please visit the schedule page for a complete breakdown of when each session will occur, along with a more comprehensive filtering feature. The schedule will also available in timetable format closer to the conference dates.

The Expo Hall is open to attendees between the hours 8am to 5pm Wednesday, October 9, and 8am to 4pm Thursday, 10. Please note Expo Only Attendees are limited to the Sponsor, Tools and Career tracks. Find out more at our new Expo Page.

Legend:
Full Conference Pass Expo Conference Pass

Keynote
Keynote: Radia Perlman - Radia Perlman
Tech
Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware - Olivier Bilodeau, Masarah Paquet-Clouston
BLE Exploitation: Story of “SMART” devices - Yogesh Ojha
Cloud Native Security Explained - Tanya Janca
FLAIR (Fuzzy simiLArIty fRamework) - Hossein Jazi
Fuzzing for your Offensive and Defensive Teams - Roy Firestein
Internet-Scale Analysis of AWS Cognito Security - Andrés Riancho
One-Person Army – A playbook on how to be the first Security Engineer at a company - Kashish Mittal
Use the Tools You Have: Threat Detection and Hunting in Azure - Daryl Novak
Your phone is using TOR and leaking your PII - Milind Bhargava, Adam Podgorski
Management
Quantifying Unknown Risks: Data-Driven Ways to Estimate First-Time Hacks, Emerging Risks, and Rare Incidents - Dr. Marshall Kuypers
The Year of Privacy and Its Effect on Cyber Security - Stanislav Bodrov
SECurity FUNdamentals
It’s Never DNS…. It Was DNS: How Adversaries Are Abusing Network Blind Spots - Edmund Brumaghin, Earl Carter
OAuth – Everything You Wanted to Know but Not Really! - Elaheh Samani, Kevin Watkins
Serverless Security Top 10 Risks - Tal Melamed
Surviving a Ransomware Attack – Lessons from the Field - Peter Morin
Sponsor Track
Introduction to Advanced Persistent Threats - Jill Sopko