In-Person Attendees

It’s great to be heading back to the MTCC in downtown Toronto! At SecTor 2021, you can expect a lot of the amazing networking, engaging, learning and knowledge sharing activities you’ve been missing, not to mention an abundance of live speakers presenting their engaging sessions in-person!

In addition to our Swapcard Hybrid Event platform providing access to over 80 sessions, this year’s in-person highlights include:

  • Over 50 Speakers presenting their sessions live in-person
  • The Lock Pick Village: Get hands-on learning about physical security engineering
  • The IoT Hack Lab: Learn how to navigate the world of device hacking
  • Career Fair: Meet with hiring managers to discuss career opportunities during the Career Fair hour from 4pm on Wednesday, November 3
  • The Expo Hall: Home to Canada’s Largest Security Vendor Expo – engage with reps from the world’s leading security organizations and learn about the latest products and solutions

Bonus: The first 1,000 conference attendees will get their own Lock Pick kit, and the first 2,000 will walk away with this year’s special 15-year Conference Bag (to fit in all your swag)!

Curious about health and safety? Review our FAQ page

Access to Content:

SecTor 2021 is a hybrid event, giving Full Conference Pass holders access to every conference session live and on-demand for 90 days after the event on our virtual platform: Swapcard. In additional to all of that, in-person Full Conference attendees also have unrestricted access to the following in-person sessions at SecTor:

Jump to Wednesday. Jump to Thursday

Wednesday, November 3, 2021

Time Session
09:00
09:50
The Evolution of HackingJeff Moss
10:10
10:50
Attacker Techniques: Data ExfiltrationJulian Pileggi
10:10
10:50
Towards Developing the Human Risk Assessment PlatformMaria Bada
10:10
10:50
Ghost Misdetection Attacks Against Tesla Model X & Mobileye 630 PROBen Nassi
10:10
10:50
Secure and Scalable Development with Microsoft 365 and Azure ADPeter Carson
10:20
10:50
Opening XDR to More InsightPeter Cresswell
10:20
10:50
An Introduction to Risk-Based Vulnerability ManagementJerry Gamblin
10:20
10:50
A Unified Approach to Discover, Protect and Control Your Sensitive DataStephen Kingston
11:10
11:40
Where is Cybercrime Really Coming From?Luis Carvajal Kim
11:10
11:40
Exposing Ransomware-As-a-Service and Where It’s Going NextJamison Utter
11:10
11:40
How to Maximize ROI with Frictionless Zero TrustStephane Asselin
11:10
11:40
Reducing Ransomware at Scale: Exploring the Ransomware Task Force’s RecommendationsJen Ellis
11:10
11:40
Coverage: How to Get Results from Threat Detection and Response SolutionsAugusto Barros
12:00
12:40
Best practices for Open-Source ManagementPete Chestna
13:00
12:40
Large-Scale Security Analysis of IoT FirmwareDaniel Nussko
13:00
13:40
Many Stunts, One Design: A Crash Course in Dissecting Native IIS MalwareZuzana Hromcová
13:00
13:40
Automating Threat Detection and Response with Azure SentinelKurtis Armour, Matthew Blacklock
13:00
13:40
The Quantum Threat: Where Are We Today?Michele Mosca
13:00
13:30
XDR and SIEM on a Collision Course: What Remains When the Dust Settles?Corey Still
13:00
13:30
Tackling Developer Security TrainingRey Bango
13:00
13:30
SOARing to New Heights with TheHive and CortexGeoffrey Roote
13:50
14:20
Why an Integrated Approach to Cybersecurity Is No Longer a ChoiceAndrew Williams
13:50
14:20
Transforming Cloud Security with SASEJay Reddy
13:50
14:20
Security for Mortals: Think like a Hacker and Protect Your AssetsLaura Payne, Raheel Qureshi
14:00
14:40
Behavioral Biometrics – Attack of the HumanoidJustin Macorin, Iain Paterson
14:00
14:40
Epic journey of an enterprise cloud transformationHelen Oakley
14:00
14:40
Sandboxing in Linux with Zero Lines of CodeIgnat Korchagin
14:00
14:40
Bot Shops and Info Stealers – Exploring the Dark Web’s Newest FrontierBryan Oliver
14:40
15:10
Get it Right, Get It Savvy – Remote Workforce EnablementDiana John
14:40
15:10
Responsible and Ethical AI for Cyber: Why It’s Important, Why It’s Hard, How to Do ItStephan Jou
14:40
15:10
Intelligence-Driven SOARChris Adams
15:00
15:14
The Call Is Coming from Inside the House-The Truth About Linux and Cloud SecurityEll Marquez
15:00
15:40
Speeding Up AWS IAM Least Privileges with CloudSplaining & Elastic StackRodrigo Montoro
15:00
15:40
Harder, Better, Faster, Stronger – Privacy Laws and the Anatomy of a Breach ResponseStanislav Bodrov
15:00
15:40
An Anatomy of a DevOps Tool Chain AttackAlex Dow
15:30
16:00
3 Essentials for Automating Security Across Hybrid CloudSattwik Gavli
15:30
16:00
Triple Extortion Attacks on the Rise from Ransomware GangsGary Sockrider
15:30
16:00
A Unified Approach to Discover, Protect and Control Your Sensitive DataStephen Kingston

Thursday, November 4, 2021

Time Session
09:10
09:50
Infosec Halloween 2021: Unmasking the Scary CharactersWendy Nather
10:10
10:50
Common NGINX Misconfigurations That Leave Your Web Server Open to AttackSpencer Pearlman
10:10
10:50
Detecting Illicit Drone FilmingBen Nassi
10:10
10:50
Building Security ChampionsTanya Janca
10:10
10:50
Software Composition Analysis 101: Knowing What’s Inside Your AppsMagno Logan
10:20
10:50
Best Practices: PAM Security & Data PrivacyChristopher Hills
10:20
10:50
Defending Against Ransomware – Building a Future-Proof ArchitectureBrian Brown
10:20
10:50
Breaking Down Silos Between Security and InfrastructureChad Reaney
10:20
10:50
Building an Active Defence Program – Why a Traditional SOC Alerting Service Isn’t Good EnoughBill Dunnion
11:10
11:40
The PrestigeAamir Lakhani
11:10
11:40
Getting Started With SASE: Connect, Control and Converge with ConfidenceNajib Hatahet
11:10
11:40
Building a Response Strategy to Advanced ThreatsJeff Costlow
11:10
11:40
Data-First SASE Using Behavior Intelligence and Risk AnalyticsBenoît H. Dicaire
11:10
11:40
For the Greater Good: Challenging the Vulnerability Disclosure Status-QuoLaurent Desaulniers, Olivier Bilodeau
12:00
12:40
Walking the Cybersecurity Data TightropeTravis Smith
12:00
12:40
Introducing a New Construct for Advanced Interactive Volatile Memory AnalysisSolomon Sonya
13:00
13:40
Maturing your toolkit with mental modelsFernando Montenegro
13:00
13:40
FAIL – Notorious* Number 9James Arlen
13:00
13:40
The Cross-Disciplinary Challenges of Data Governance PoliciesAlexander Rasin
13:00
13:30
Security Operations and the End of Cyber RiskMatthew Trushinski
13:00
13:30
Is Your Defensive Stack Ready for a Targeted Attack?Nelson Santos
13:00
13:30
Poking Around at Scale: One Year of Scanning the InternetMarc-Etienne Léveillé
13:50
14:20
What Elon Musk and SpaceX Can Teach Us About Ransomware and CybersecurityMorgan Wright
13:50
14:20
Global Privacy: Keeping Up and Staying AheadLiam McLaughlin
13:50
14:20
Faster and Smarter Response to Cyber Threats in a Hybrid Cloud EnvironmentDan Jezerinac
14:00
14:40
Breaking the Laws of Robotics: Attacking Automated Manufacturing SystemsStefano Zanero
14:00
14:40
Full Circle Detection: From Hunting to Actionable DetectionMathieu Saulnier
14:00
14:40
Moving Upstream, Securing the GitOps WorkflowYoni Leitersdorf
14:00
14:40
BioHackers: The Invisible ThreatLen Noe
* Where possible, sessions will be delivered live and in-person.
Conference Features Expo Full Conference
Access to the Expo to Engage with Exhibitors and Network with Attendees (In-Person & Virtual)
Stream Keynotes Live + Virtual Q&A or watch telecast in SecTor Theatres
Access to Sponsor Sessions
Add Black Hat Trainings to Registration (additional cost)
Access to Technical Sessions
Access to Management Sessions
Access to Security Fundamentals Sessions
Access to Tools Sessions
Immediate on-demand access to all content after the conference for 90 Days
Earn CPE Credits
1 per conference day & 1 per hour
for Black Hat Trainings

1 per conference hour & 1 per hour
for Black Hat Trainings

Sponsors