Peering into the Cybersecurity Crystal Ball

We revisit our predictions from SecTor 2014 to find out how they are unfolding. It has been over six months since the last SecTor security conference. At that event, there was a Predictions panel, in which five cybersecurity luminaries talked about key trends in the coming year. Half a year on, how are those predictions […]

Read more

The Four Secrets Of APTs

Advanced Persistent Threats (APTs) are in the news again, as security researchers track the Naikon APT, a sustained cyberattack on geopolitical targets in Asia. These persistent, sophisticated attacks keep CISOs awake the world over. After all, no one wants their organisation to be a headline in tomorrow’s paper. But do we really understand APTs? We […]

Read more

IBM’s Chief Information Security Officer Kris Lovejoy to open SecTor 2015, the 9th annual Security Education Conference Toronto

  TORONTO, ON, MAY 14, 2015 – SecTor, Canada’s premier conference on IT security, will kick off this October with a keynote presentation by Kris Lovejoy, IBM’s Chief Information Security Officer. Now entering its ninth year, SecTor brings together IT professionals and managers with security experts from around the world to share the latest research […]

Read more

When Data Breach Reports Collide

58 cents or $200 – how much does a lost record cost? Just how accurate can you be when estimating the cost of a lost record in a data breach? A spat between Verizon and data breach expert Larry Ponemon has thrown the question into sharp focus. This figure is important to CISOs. They have […]

Read more

Redefining Privacy in the Internet of Things

Should IoT devices tell you how they’re messing with your privacy? Or is privacy an illusion anyway? IBM has formed an entire business unit around it, Cisco says that there will be 50 billion devices connected to it, and governments are quietly grumbling about the privacy implications of it. Welcome to the Internet of Things. […]

Read more

Why Cybersecurity Awareness is Failing

When SecTor opens its doors this October, it will once again be cybersecurity awareness month, as dictated by the Canadian government. Cybersecurity awareness is certainly a serious issue, but are we getting it right? And if not, why not? Not only is cybersecurity awareness failing as a concept, but the entire concept may be a […]

Read more

The Gnarly Problem of Bug Disclosure

We’re getting more vulnerabilities these days, but are we disclosing them responsibly? And what does that mean, anyway? The National Vulnerability Database – a NIST site that documents security flaws as they emerge – added 7,903 software security flaws last year, compared to 5,186 in 2013. That’s a 52% increase. And Secunia, which publishes a […]

Read more

Ten Years of TASK

A decade on, TASK is more important to its members than ever. It has been ten years since the Toronto Area Security Klatch (TASK) first started. We formed it because we wanted to create a community of security practitioners in the Toronto area. A year later, we created SecTor, a small, high-quality security conference that […]

Read more

Canada’s Slow Creep Towards Data Breach Notification

Canada has no shortage of data breaches. Last year, it suffered 276,000 record breaches across 57 incidents – and that number is artificially low, claim some, because these are only the publicly reported breaches. Companies probably aren’t reporting a lot of them. Today, there is no federal law that mandates it, and precious few provincial […]

Read more

Registration Opens March 11, 2015

Held at the Metro Toronto Convention Centre in downtown Toronto, the SecTor conference runs two full days, October 20th and 21st, with an optional training day October 19th. Featuring Keynotes from North America’s most respected and trusted experts, our speakers are true security professionals with depth of understanding on topics that matter. SecTor is a […]

Read more

Interview With our Keynote

Do not miss this exclusive interview with our Keynote Collaboratively administrate empowered markets via plug-and-play networks. Dynamically procrastinate B2C users after installed base benefits. Dramatically visualize customer directed convergence without revolutionary ROI. Efficiently unleash cross-media information without cross-media value. Quickly maximize timely deliverables for real-time schemas. Dramatically maintain clicks-and-mortar solutions without functional solutions. Completely synergize […]

Read more
Subscribe to the Sector Blog
Enter your contact information below to have future blog posts delivered directly to your inbox!