2021 SESSIONS At A Glance

SecTor Management and the Advisory Committee look forward to once again bringing the world’s best speakers in the field of IT Security to Toronto.

Some of your feedback requested a simple list of sessions where you could scan what’s happening at a glance, like the format in years past. Below you will find just that.

Please visit the schedule page for a complete breakdown of when each session will occur, along with a more comprehensive filtering feature.

Legend:
Full Conference Pass Expo Conference Pass

Tech
Adventures in the Underland: Uncommon Hacker’s Persistency Methods and Countermeasures - Paula Januszkiewicz
Food Production is Critical Infrastructure - Seth Hardy
GitHub Actions: Vulnerabilities, Attacks, and Counter-measures - Magno Logan
New Minimum Cybersecurity Requirements for Cyber Insurance - Danny Pehar
Purple RDP: Red and Blue Tradecraft Around Remote Desktop Protocol - Olivier Bilodeau, Lisandro Ubiedo
The COW (Container On Windows) Who Escaped the Silo - Eran Segal
The Development of a Completely Unsupervised Machine Learning Pipeline for Security Analytics – from Ingestion to Analytics - Jeff Schwartzentruber
Tokenizing the Dark Web: Applying NLP in the Context of Cyber Threat Intelligence - Olivier Michaud, Francois Masson
Management
A Transformation Blueprint for Developer-First Security - Larry Maccherone
Innovation and Evolution – How Medical Device and IoT Profiles Have Evolved – But So is Your Attack Surface - Mohammad Waqas
Trust or Dare: Supply Chain Risks in Aviation - Manon Gaudet
SECurity FUNdamentals
Advanced Bot Landscape - Yohann Sillam
AI in a Minefield: Learning from Poisoned Data - Johnathan Azaria
Build More Secure Apps by Harnessing the Power of OWASP SKF & ASVS on Kubernetes - Farshad Abasi-Jahromi, Kurt Hundeck
Bypassing Anti-Cheats & Hacking Competitive Games - Rohan Aggarwal
Evasive Manoeuvres: Analysing the Past to Predict the Future of Malware Evasion Techniques - Stefano Zanero
Tools
Extend Falco with Plugins, Detect and React to Security Incidents from Any Stream of Events - Thomas Labarussias, Michele Zuccala
Java Crypto: Don’t Just Get it Working, Use it Securely - Mansi Sheth
The Power of the Pico: Replacing Expensive Toys with the Raspberry Pi Pico - Tyler Reguly