2022 SESSIONS At A Glance
SecTor Management and the Advisory Committee look forward to once again bringing the world’s best speakers in the field of IT Security to Toronto.
Some of your feedback requested a simple list of sessions where you could scan what’s happening at a glance, like the format in years past. Below you will find just that.
Please visit the schedule page for a complete breakdown of when each session will occur, along with a more comprehensive filtering feature.
Full Conference Pass Expo Conference Pass
A Diamond is an Analyst’s Best Friend: The Diamond Model for Influence Operations Analysis - Charity Wright
Adventures in the Underland: Uncommon Hacker’s Persistency Methods and Countermeasures - Paula Januszkiewicz
The Development of a Completely Unsupervised Machine Learning Pipeline for Security Analytics – from Ingestion to Analytics - Jeff Schwartzentruber
Tokenizing the Dark Web: Applying NLP in the Context of Cyber Threat Intelligence - Olivier Michaud, Francois Masson
“What do you Mean Moose Meat?” Advancing Resilience Through Preparing for the Unexpected. - Kevin Sandschafer
Innovation and Evolution – How Medical Device and IoT Profiles Have Evolved – But So is Your Attack Surface - Mohammad Waqas
Build More Secure Apps by Harnessing the Power of OWASP SKF & ASVS on Kubernetes - Farshad Abasi-Jahromi, Kurt Hundeck
Evasive Manoeuvres: Analysing the Past to Predict the Future of Malware Evasion Techniques - Stefano Zanero
Security Architecture Review for Cloud-based Applications – Where to Start and How to Shift Left? - Bernardo Wernesback
Calculating Risk in the Era of Obscurity: Reading Between the Lines of Security Advisories - Dustin Childs
Preparing SRM Leaders to Communicate the Relationship Between the Cyber Risks and Physical and Human Systems - David Ortega
Report: Protecting Customer Identity and Access Management (CIAM) Services Against Online Threats - Matt Duench
Seize the Breach: Protect Your Organization With Behavior-based Security Intelligence - Steven Flowers
The (Hard) Key to Stop Phishing: How Cloudflare Stopped a Targeted Attack and You Can Too - John Engates
The Compelling Case for Zero Trust: Bridge the Gap Between Cybersecurity and Business - Ram Vaidyanathan
The Unsung Hero of Cybersecurity: Taking Your Vulnerability Management Program (VMP) from Good to Great - Kim Schreader
Two Years of Accelerated Cybersecurity and the Demands Being Placed on Cyber Defenders - Tony Anscombe
Extend Falco with Plugins, Detect and React to Security Incidents from Any Stream of Events - Michele Zuccala