Welcome to Canada’s Largest IT Security Expo!

Expo Attendees

A SecTor Expo Pass is your ticket to engage, network and discuss the latest in IT security with professionals from top Canadian and international security organizations.

In registering for a SecTor Expo Pass you have access to:

  • The Expo
  • Watch Keynotes Telecast in the Room 801A
  • All Sponsor Sessions
  • Add a Black Hat Trainings or Cloud Security Summit to your registration
  • Earn CPE credits
Conference Features Expo Full Conference
Access to the Expo to Engage with Exhibitors and Network with Attendees
Watch Keynotes telecast in room 801A
Access to Sponsor Sessions
Add Black Hat Trainings or Cloud Summit to Registration (additional cost)
Watch Keynotes Live in the Keynote Hall
Access to Technical Sessions
Access to Management Sessions
Access to Security Fundamentals Sessions
Access to Tools Sessions
On-demand access to all content after the conference
Earn CPE Credits
1 per conference day & 1 per hour
for Black Hat Trainings

1 per conference hour & 1 per hour
for Black Hat Trainings

At SecTor 2022, Expo Attendees have access to over 45 different conference sessions!

Wednesday, October 5, 2022

Time Session
9:10
9:50
Morning Keynote The Future of CryptographyDr. Whitfield Diffie
10:15
10:35
What Log4Shell Taught Us About the Software Supply Chain, that Other Vulns Didn’tJobert Abma
10:15
10:35
The Compelling Case for Zero Trust: Bridge the Gap Between Cybersecurity and BusinessRam Vaidyanathan
11:00
11:20
Defending Ukraine: Early Lessons from the Cyber WarJohn Hewie
11:00
11:20
Two Years of Accelerated Cybersecurity and the Demands Being Placed on Cyber DefendersTony Anscombe
11:30
12:00
State of Cloud Security in Canada: How Does Your Organization Measure Up?Dave Senf
11:30
12:00
Why Do We Accept Gaps in Our Data Protection Practices?Terry Ray
11:30
12:00
Securing Your Operational TechnologiesGaétan Houle
11:30
12:00
Calculating Risk in the Era of Obscurity: Reading Between the Lines of Security AdvisoriesDustin Childs
11:30
12:00
Indicators Everywhere! How SOCs Can Maintain Efficiency Against Any AttackAndrew Mundell
11:45
12:05
Top 10 Cyber Security Actions for CanadaVictor De Luca
11:45
12:05
The Agent of InfluenceCharity Wright
11:45
12:05
Leave No Stone Unturned: The Elements of Security VisibilityChristopher Fielder
12:10
12:40
Researching Risk: The Qualys Approach to Identifying and Reducing RiskTravis Smith
12:50
1:20
Mobile Security – The Hackers Next FrontierRobert Falzon
13:15
13:35
Neither Pointless nor Boring: Pop it and Lock it Down with CIS ControlsMatt Jerzewski
13:15
13:35
The (Hard) Key to Stop Phishing: How Cloudflare Stopped a Targeted Attack and You Can TooJohn Engates
14:00
14:20
Ransomware IR Playbook to Remember & an Art of Building ResilienceRaheel Qureshi
14:00
14:20
Smarter XDR Demands Email SecurityNeil Clauson, Andrew Williams
14:45
15:05
The Unsung Hero of Cybersecurity: Taking Your Vulnerability Management Program (VMP) from Good to GreatKim Schreader
14:45
15:05
How AI Can Think Like an AttackerDavid Masson
15:30
15:50
A Data Product Approach to Reducing Security DebtCarson Pickens
16:15
16:35
Will Your Backups Help You Recover from Ransomware?Nyron Samaroo
16:15
16:35
How 2FA is CircumventedAhmad Alsabagh

Thursday, October 6, 2022

Time Session
9:10
9:50
Morning Keynote Security Lessons from Canada’s Payment Modernization JourneyMonika Tamber
10:15
10:35
Effective Response in the Face of Zero Day Threats and VulnerabilitiesKarl Klaessig
10:15
10:35
Seize the Breach: Protect Your Organization With Behavior-based Security IntelligenceSteven Flowers
11:00
11:20
Is Your Defensive Stack Ready for a Targeted Attack?Stephen Tutterow
11:00
11:20
Cybersecurity Insurance: Where to Start & How to QualifyChristopher Hills
11:30
12:00
Decision Making in Uncertain Times: Key teachings from Executive ExchangesRafi Wanounou
11:30
12:00
Protecting Your Critical Data and Enhancing Cyber RecoveryJessica Hetrick
11:30
12:00
Preparing SRM Leaders to Communicate the Relationship Between the Cyber Risks and Physical and Human SystemsDavid Ortega
11:30
12:00
Software Supply Chain Security: Knowing What You Don’t KnowMallory Woods
11:30
12:00
Master of Audits – Vulnerability and Risk Management in 2022Ajay Sood
11:30
12:00
Scaling Security Operations: The Answer To The Challenge of Threat InflationAugusto Barros
11:45
12:05
How Safe is Your Cloud? Deciphering Cloud Threats and Security ModelsJames Spiteri
11:45
12:05
Correctly Configure All the CloudsSteve Riley
12:10
12:40
Into the Abyss: Cybersecurity Tool Selection, Rationalization, and DecommissioningJeff Schmidt
12:50
13:20
Time to Re-evaluate Your Security LayersElie Nasrallah
13:15
13:35
Operationalizing Cyber Threat Intelligence for Modern Security OperationsMike Summers
13:15
13:35
Navigating Enterprise Security in a Post-Compromise RealityKanen Clement
14:00
14:20
Report: Protecting Customer Identity and Access Management (CIAM) Services Against Online ThreatsMatt Duench
14:00
14:20
BlackBerry XDR: Even the OddsAnthony Toric
14:45
15:05
From the Field – Stories of Successfully Detecting Cyber AttacksStephan Jou, Umang Handa
14:45
15:05
Impact of the Russia – Ukraine Conflict on Your CybersecurityDavid Poellhuber

Sponsors