Based on the book No-Tech Hacking, this presentation shows life through the eyes of today’s hacker. I’ll show what kinds of tactics a hacker will employ and the perspective they have that allows them to stay one step ahead of the good guys. I’ll focus on the hacker mind, showing in a compelling way the […]Read more
Known by most by his email name, ‘Stepto’, Stephen Toulouse was involved in some of the most fundamental security incidents and decisions made at Microsoft over the past several years. In 2007 Stepto moved from Microsoft’s Trustworthy Computing division to pursue his lifelong dream of being paid to play video games and work for the […]Read more
The bad guys just keep getting better! They’re constantly changing their tactics and inventing new techniques to cause you harm, damage your data, and make your resources unavailable. Why do they do this? What motivates someone to — let’s call it what it is — commit computer-related crimes? How have they changed and improved? What […]Read more
Today, more than ever, law enforcement must work closely with various partners to identify and develop strategies to address the challenges posed by the diversity and speed of crime on the internet. The fact that a significant percentage of Canada’s critical infrastructure is owned and operated by the private sector and that the diversity of […]Read more
As the field of information security matures, several significant barriers to progress that exist today will have to be removed if our capability to manage security risks is to improve. This presentation focuses on several of these, including the lack of truly effective channels to convey current knowledge to front-line practitioners; the division of the […]Read more
Enter your contact information below to have future blog posts delivered directly to your inbox!