Why was my SecTor talk declined

Why Wasn’t My SecTor Talk Accepted?

A message from Brian Bourne, director and co-founder of Black Arts Illuminated. For every proposed talk that makes it into the SecTor conference, there are many others that don’t make the cut. We decided to share this blog post to help those people understand why their talk may have been declined. Hopefully, it will also […]

Read more

Rebooting Canada’s Cybersecurity Strategy

What should Canada’s next cybersecurity strategy look like? The federal government is asking the country how it should the harden private and public sector against attack. Public services minister Ralph Goodale announced the three-month consultation in late August, after voicing the need for an update. Items on the government’s agenda include certification schemes for business […]

Read more
How to find your biggest security threats

How to find your biggest security threats

Roger Grimes gets angry when stories like this one, about Microsoft’s UEFI security snafu, emerge – and not just because he works for Microsoft. “It’s so complicated to pull off, it’s going to be fixed with a patch, but they’re not patching Java, or Acrobat, or the things that are actually being exploited,” said Grimes, […]

Read more

Security Pros: Do Your Users Hate You?

What have modern policing and cybersecurity got in common? Both sometimes suffer from a lack of perspective and alienate the public that they’re supposed to serve, according to Brendan O’Connor. As a lawyer working in the cybersecurity space, the SecTor 2016 speaker sees a lot of opportunity for both cops and security pros to improve their […]

Read more

Why Only One In Ten Cybersecurity Pros Is A Woman

Why are most cybersecurity professionals men? Laura Payne has an idea or two to share, and she’ll be presenting them at SecTor this October. Payne, a senior information security advisor at BMO, will be addressing this topic in a keynote session at the conference. Gathered together with a panel of female cybersecurity experts, she’ll explore […]

Read more
programming

How To Build Your Own Hacking Toolkit

Chris Maddalena’s programming skills have come a long way in the past year. An information security consultant at eSentire, he relies heavily on other peoples’ open source ethical hacking tools for his practice, but recently decided to start developing his own. In his talk at SecTor this October, he’ll describe how creating your own set of […]

Read more
Edward Snowden

Snowden: Three Years On

Last month saw an important anniversary for Edward Snowden. In June 2013, he broke the biggest state surveillance scandal in history. Where has it left us three years on, and what have we learned? Snowden left the country that May without telling anyone where he was going. A little later he was in Hong Kong, […]

Read more
Tracking Terror

Tracking Terror Online

The commercial Internet has always been a diverse dangerous neighbourhood, with its fair share of malicious actors and dangerous characters. In recent years, though, it has gained a new voice – an anti-western version of the jihadi movement. To vast numbers of peaceful muslims, jihad means ‘exerted effort’ and can be interpreted simply as a […]

Read more
Michele Mosca: Big Threats From Small Things

Big Threats From Small Things

What would happen if cryptography stopped working tomorrow? For one thing, the Internet would effectively stop working. Signed software updates would no longer be possible. No one would be able to prove their identities online. A trustless Internet makes it hard to exchange any kind of sensitive information, which is where much of the value […]

Read more

Finding Flaws in IoT Devices

That Internet-connected Barbie that listens to your kid is hackable. Your ex could stalk you in your car even if it wasn’t designed to be a connected vehicle, and someone could alter your medical dose remotely while you’re in hospital. No wonder the NSA is both excited by IoT and worried about it, in equal measure. […]

Read more
How Machines Will Classify Malware

How Machines Will Classify Our Malware

John Seymour believes that machines can do a better job of classifying an ocean of malware – if we can just teach them properly. Seymour, a data scientist at social media threat intelligence firm ZeroFOX, wants to turn computers into sorting tools that can help antivirus researchers. He has devoted his PHD studies to the […]

Read more
Subscribe to the Sector Blog
Enter your contact information below to have future blog posts delivered directly to your inbox!
Fields marked with an * are required