Risk analysis – nobody wants to do it, but everybody wants the answer when it’s done. Business today is full of qualitative methods for assessing risk, but these tend to fall short of giving Information Security professionals the tools to express risk in a meaningful way. FAIR (Factor Analysis of Information Risk) was recently adopted […]
The concept of defense in depth has attracted a lot of attention over the past decade. Several organizations have invested heavily in a broad collection of technologies in an effort to better secure their information. The objective of defense in depth is to use complementary technologies to cover the gaps and limitations of each other […]
Throughout the history of hacker culture, elevators have played a key role. From the mystique of students at MIT taking late-night rides upon car tops (don’t do that, please!) to the work of modern pen testers who use elevators to bypass building security systems (it’s easier than you think!) these devices are often misunderstood and […]
William will dive in to the fundamental tools and resources needed by network attackers and defenders and look at basic adversary methodology and scaling effects in network attack and defense. After laying this foundation, he will dive deeper into asymmetrical advantages for defenders and how to implement them in your network from an architecture and […]
Are you prepared for the next attack targeting your organization? Multi-faceted, persistent threats continue to increase and evolve, evading traditional stand-alone security technologies and forcing a critical need for an integrated, multi-dimensional approach. Today’s targeted attacks require the ability to disrupt the attack lifecycle in order to prevent further compromise. This session will discuss the […]
Screening HTTP traffic can be something really tricky and attacks to applications are becoming increasingly complex day by day. By analyzing thousands upon thousands of infections, we noticed that regular blacklisting is increasingly failing so we started research on a new approach to mitigate the problem. We started with reverse engineering the most popular CMS applications such […]
Over the past decade, point of sale (PoS) systems have been plagued by both attacks and targeted malware. During this time, we’ve seen a dramatic shift by this targeted malware in both the techniques used and the capabilities it has. This talk will discuss the shifts the security and research community has witnessed by PoS […]
The web continues to be a constant threat for most users. The security industry has become very good at detecting Java, Flash, and PDF exploits over the last few years, now attackers are seeking new vectors. In this talk we will examine the growing trend in Silverlight exploitation Talos has observed over the last several […]
For over 30 years, the security community mantra has been to deliver annual or regular security awareness education sessions to staff. And for over 30 years, the “big stick” approach has failed to produce any appreciable results. For the most part security awareness training has become ” a corporate check box” and is used to […]
Despite a plethora of data security and protection standards and certifications, companies and their systems are still leaking information like a sieve. Data Loss Prevention (DLP) solutions have often been touted as the “silver bullet” that will keep corporations from becoming the next headline. With deployment models ranging from a fat agent on an endpoint, […]
No one in the Security Industry wants to talk compliance and most of us think of it as a burden. Since almost all organizations today have to comply with some regulations, it has become important for us to discuss. The session will explore how compliance and network security are tied together and by simply improving […]
The ugly bastard child of the ugly bastard child of FAIL Panel, in its 3rd year running, a discussion on the cybers and other general observations on infosec. We’ll disagree, agree, talk over each other, ramble until cut-off, throw things, contradict each other (and ourselves), have no clue what Jamie is asking us and generally […]
Operation Windigo is a large server-side malware campaign that targets Unix systems (BSD, Linux, etc.). Its operators control more than 25,000 compromised servers. Every day, they use this infrastructure to redirect more than 500,000 end-users to malicious content and send more than 35M spam messages. This talk will cover what we have done and what […]
Legacy operating systems in an unsecure world. Many organizations are still running applications on legacy operating systems for one reason or another. Be it their applications do not run on newer operating systems or hardware or simply a matter of cost. In April 2014 Microsoft stopped patch support for Windows XP and in July 2015 […]
Attackers have already set their sights on Mac. They have been thinking of and finding ways to cash out. This talk shows one of those ways. In this presentation, I will show and demonstrate live how attackers pwn Macs using browsers running in Mac and hold the system hostage until the user posts a “ransom.” […]
Credit card theft has dominated the information security headlines recently and for good reason. This talk will demonstrate (with both Chip & PIN and magnetic stripe credit cards) how malware is able to steal the most critical details. It will also delve into the underground economy and explore how the stolen data is stolen, used […]
Microsoft Office documents are ubiquitous in the corporate environment. We have found that being able to track the spread of Microsoft Office documents has proven to have great value for security practitioners and managers – diverse uses including creating a “honey document” for tracking email scammers, stocking a honeypot (internal or external), or tracking documents […]
Businesses have a long way to go in protecting their applications but even farther to go in securing those applications’ rear end—databases. While insecure applications provide a conduit for attack, the confidential data sought by thieves resides in the database. To illustrate why databases deserve the same security scrutiny as their more visible application front […]
Organizations have traditionally enforced access to various services, applications, resources by establishing a person’s identity. Identity Management encompasses a number of processes such as authentication, authorization, provisioning, deprovisioning throughout a person’s life-cycle in the context of the organization. As employees bring their own devices and applications move beyond the firewall to the cloud, how should […]
Ever wonder what the next big information security threat will be? So do we… and let’s face it, if we knew for certain, we would be keeping quiet and likely very rich. However, this panel session brings together a group with their collective finger on the pulse of information security in Canada and beyond, who […]
We’ve known for some time that physical access to a device means game over. In response, we’ve begun to rely more and more on “secure” container applications to keep our private and company data secured. Whether you use LastPass to secure your passwords, or GOOD for Enterprise to make sure your company emails are locked […]
Credit card payment processing and point-of-sale (POS) systems are like a black box for most people without knowledge of its internal working. Recent data breaches of thousands of credit cards have shown that determined attackers have mastered ways to steal old fashioned magnetic stripe cards and are now targeting EMV card data (chip-and-PIN, chip-and-signature, chip-and-choice). […]
Investigating a suspected computer compromise or intrusion can be difficult. In a sense, that is by design. Malicious actors can go to great lengths to hide their activities and tools. Attrition Forensics attempts to outline how to investigate a compromise or intrusion involving modern Windows systems when the attacker is particularly good and the investigation […]
In early 2014 Kaspersky Labs reported on an extremely advanced malware sample that was used in a sophisticated espionage campaign (http://bit.ly/1bl4L0e). As with many samples seen in these types of campaigns (Stuxnet, Duqu, etc.), Careto went undetected for a long period of time, even on systems with updated AV and HIPs products installed. In this […]
A network protocol has performance requirements. In order to address these requirements, many implementations will leak some side-channel information, indicating how a tunnel is being used. Particularly approximate packet sizes and timing can be tied to a particular use of an encrypted tunnel. Pacumen is an open-source tool which can learn what a specific application […]
What, the car got hacked – how? We all take for granted technology we use every day and especially items that have been around for a while, such as the car. Many of us think about the physical security of cars in terms of locks and immobilizers, but as technology innovation moves forward, so should […]
It might still be “early days”, but cloud based infrastructure-as-a-service (IaaS) offerings are maturing fast and becoming financially compelling. If you haven’t started to look at these services, you’ll need to sooner than later. Of course, extending your datacenter outside of your datacenter has just a couple of security implications (that was sarcasm). This talk […]
How Hackers get caught Everyone sees the daily stories about hackers stealing personal data and credit cards but the media moves on to the newest breach the next week. What happens to these cases and the criminals behind them? This presentation will cover Law Enforcement (the good), criminals and their motives (the bad) and the […]
Agile Scrum is here to stay, and security teams aren’t adapting quickly enough. “Best-practice” Agile SDL models aren’t very helpful because they assume a simplified, idealized model of how software is built. In the real world, software development often involves multiple Scrum teams working on various components of a larger product. As a result, application […]
Nation State Actors in the so-called “cyber domain” are nothing new. But what a little while ago was considered talk from people wearing hats made from kitchen supply, recently became the concern of many, even some who should care about it. Unfortunately, selectively revealed bits and pieces of data don’t answer the questions of “what” […]
We all have smart phones in our pockets these days allowing high speed network access just about anywhere. But few of us consider what is between the phone+tower and the Internet. There is a magical jungle called the Evolved Packet Core (EPC) which is full of byzantine, arcane, and strange acronyms full of juicy attack […]
We’re all aware that the cyber threat landscape continues to shift and evolve at a staggering pace. Attacks are becoming more sophisticated and let’s face it – the notion that signatures are dead is an exaggeration. Cyber security is continuing to shift too, as industry experts begin to prescribe continuous monitoring over incident response. Recognizing […]
Adversaries today are technically advanced, structured around an underground governed by market forces, and using paradigm shifts in technology to compromise more victims. Through specialization and collaboration, attackers are becoming more effective and continue to cause widespread damage, even as systems become more secure. However, recent advances in technology provide the foundation for a new […]
The Security Industry says a lot of ‘stuff’ about a lot of things, and most of the time it just feels like noise. What does an Internet of Things really mean? Is SDN (Software Defined Networking) something you should care about, or should we just wait for the next networking buzzword? This session explores the […]
The world of SAP deployments continues to evolve and certainly one of the big additions is the deployment of SAP HANA. This talk will review the current SAP security landscape, what attacks are currently prevalent and which ones are possible. The talk will then take a deeper look specifically at HANA as a rich target […]
Defenders are at a huge disadvantage, often investigating compromise with educated guesses based on theoretical knowledge of kill chains, anomaly detection, and IOCs. Experience adds the benefit of recognizing what has been done before, but few blue team members understand how attacks work and how attackers move or escalate during attacks. This talk will explore […]
Despite the continued success by attackers to brute-force accounts, phish credentials, and otherwise impact the online security of consumers, a large portion of the sites and services consumers utilize still don’t take authentication security seriously enough. This presentation will review recent research into the state of end-user-facing authentication security as it relates to strong authentication, […]
Application scanners are a very common tool often used by security professionals to identify vulnerabilities and weaknesses in (mostly) web applications. However, due to the “developer factor”, applications often include weakness and vulnerabilities that are simply not “detectable” by scanners, and relying on these results often means ignoring significant security risks that are still presented […]
“Big Data” and “Behavioral Analytics” are the latest hot terms in threat detection, but what do they mean and how do they work when applied to security? This presentation will uncover the math behind behavioral analytics explaining the principles and mathematics that make accurate threat detection based on anomalous behavior possible. It will explain why […]
This presentation is designed to provide practical career advice to aspiring penetration testers, or those who want more insight into what the actual day to day life of a penetration tester is like. This presentation examines social, psychological, and physical issues surrounding a career in one of information security’s most popular fields. October 21, 2014 […]
Mobile platforms have taken the world by storm. Smart phones and tablets, connected watches, thermostats, light fixtures and alarm systems, connected cars, even remote control drones – whether it’s our clients, customers, or employees – everyone’s got them. And they are going to use them. What this means for those of us who work in […]
The human element is one of the weakest links, as a result your employees are now the primary attack vector. From phishing and infected USB drives to lost mobile devices and weak passwords, people represent the greatest risk to most organizations. Many organizations are now rolling out security awareness programs with the intent of changing […]
Cybercrime continues to rise. While many businesses are improving their overall security posture using GRC regimes like PCI, HIPAA-HITECH, and SOX, and technologies such as Web Application Firewalls, Network Access Control devices, and SIEM solutions, attackers are making adjustments to avoid detection, becoming more creative in their approach to the attacks, and leveraging more complex […]
This presentation will dive into research, outcomes, and recommendations regarding information security for the “Internet of Things”. Mark and Zach will discuss IoT security failures both from their own research as well as the work of people they admire. Attendees are invited to laugh/cringe at concerning examples of improper access control, a complete lack of […]
Session 1: The Evolving Adversary Calls for a New Way to Look at Endpoint Security An organization’s employees are a threat actor’s most desirable and easily exploited target, ultimately gaining access to your entire network. Visibility into the by-products from keystrokes, contextualized with intelligence, is critical to pinpoint exactly where you are compromised and who […]
Doesn’t it bother you that you have to give up all your mobility when penetration testing Android applications and spend the majority of your time sitting in front of another device that has a running proxy? That will now be history. In this talk we will present a fully interactive proxy that runs as an […]
Risk is unavoidable, whether your organization is operating domestically or is interconnected globally. Which threats—from cyber and foreign influence to terrorism and espionage—are most critical to Canadian interests? How do Canadian firms or entities operate effectively and securely abroad? In this unique and enlightening talk, Ray Boisvert goes beyond the typical “security” speech to explore […]
Security of corporate resources has never been as important as it is in todays mobile first cloud first world. The proliferation of remote access, mobile access and various cloud storage solutions, among other things, has led to the erosion of the classic enterprise security moat. We need to look at security under the context of […]
Scalar Decisions was recently awarded the bid to become the Official Supplier of Information Security to the TO2015 Pan Am and Parapan American Games. Scalar is responsible for providing security services, data centre integration and managed storage services. This extensive project has taken place within a very limited time span, and for a very fluid […]
Think DevOps and cloud reduce your security? Think again. In this session we will dive into the world of DevOps and show how it can dramatically improve security through consistency, resiliency, and standardization. We will demonstrate specific technical techniques for integrating security into DevOps, including automating security policy compliance through injection of security baselines, and […]
Director, Cybersecurity Advisory Services
Laura has built a career spanning nearly 20 years at one of Canada’s largest financial institutions, including over a decade working in information security. Her experience covers a variety of domains, including information security governance and risk, security operations and engineering, and security leadership. Laura is passionate about bringing people together to solve problems in today’s increasingly complex technical landscape. Outside of work, Laura is actively engaged in mentoring professionals seeking to join the Information Security field, while also volunteering on the advisory board of SecTor, Canada’s largest security conference. [...]
Matt Anthony is the VP for Security Remediation Services at The Herjavec Group. Prior to joining The Herjavec Group, Matt held numerous leadership positions focused in enterprise security programs, most recently at Alberta Health Services, a $14 billion, 115 seat enterprise. Matt has been at the forefront of the information security practice for many years, building and implementing effective programs to govern and manage risk. He has developed and operated Security Operations Centres, led security incident response practices, created policy and governance frameworks, and implemented and operated digital investigation teams. [...]
While paying the bills as a security auditor and penetration testing consultant with his company, The CORE Group, Deviant Ollam is also member of the Board of Directors of the US division of TOOOL, The Open Organisation Of Lockpickers. Deviant runs the Lockpicking Village with TOOOL at HOPE, DEFCON, ShmooCon, etc, and he has conducted physical security training sessions for Black Hat, DeepSec, ToorCon, HackCon, ShakaCon, HackInTheBox, ekoparty, AusCERT, GovCERT, CONFidence, the United States Military Academy at West Point, and the United States Naval Academy at Annapolis. His favorite Amendments [...]
Howard Payne is an elevator consultant from New York specializing in code compliance and accident investigations. He has logged over 9,000 hours examining car-tops, motor rooms, and hoistways in cases ranging from minor injuries to highly-publicized fatalities, and has contributed to forensic investigations that have been recognized by local, State, and Federal courts. Howard has appeared on national broadcast television making elevators do things they never should. When he's not riding up and down high-rise hoistways, he moonlights as a drum and bass DJ and semi-professional gambler. His favorite direction [...]
William Peteroy, co-founder of Icebrg Inc., has lead diverse technical and strategic efforts in network and product security for government agencies and fortune 50 enterprises. William specializes in security architecture, adversary emulation, network analysis, attack methodologies, incident response, threat intelligence and product security. He has spoken at numerous conferences including RECON, DerbyCon, BSides PDX, BSides Vancouver and BSides Seattle. Icebrg was formed in large part because of William’s passions for “solving the whole problem, not just part of it” and sees it as his responsibility to leverage his unique set [...]
Patrick is responsible for segment marketing for IBM Security covering mobile, cloud, security intelligence and infrastructure security. Patrick came to IBM through the acquisition of Watchfire in 2007. He brings 20 years of experience across product management, product marketing, software development and sales, along with 15 years in various domains of IT Security. Patrick holds a degree in Systems & Computer Engineering.
Rodrigo "Sp0oKeR'' Montoro has 20 years of experience deploying open-source security software (firewalls, IDS, IPS, HIDS, log management) and hardening systems. Currently, he is a Senior Researcher at Tempest Security. His prior experience includes Cloud Researcher at Tenchi Security, Head of Research and Development at Apura Cyber Intelligence, SOC/Researcher at Clavis, Senior Security Administrator at Sucuri, and Spiderlabs Researcher, where he focused on IDS/IPS Signatures, Modsecurity rules, and new detection research. He is the author of 2 patented technologies involving the discovery of malicious digital documents and analyzing malicious HTTP [...]
Daniel B. Cid is the lead developer/founder of the open source OSSEC HIDS and the CTO of Sucuri. His interests range from intrusion detection, log analysis (log-based intrusion detection), web-based malware research and secure development. He is an active member of the open source community, specially known for creating the OSSEC HIDS (Intrusion detection system). He is also the co-writer of the Host-Based Intrusion Detection book. In the past, he worked at Trend Micro, Q1 Labs, Sourcefire and on his own ventures
As a malware researcher, Josh has spent the past 4 years investigating, and oftentimes battling Point of Sale malware. He has tracked malware families, made attempts at uncovering the authors behind malicious campaigns, and has had more than a few sleepless nights attempting to gain further insight and understanding behind a particular PoS malware sample. In short, Josh loves reversing malware, and PoS malware is his favorite. When he is not lost in assembly, or attempting to identify and subsequently replicate some cryptographic routine, Josh will often find himself throwing [...]
Craig Williams has always had a passion for learning how things operate and circumvent security measures. His deep interest in security technology led to a career at Cisco, which began with research into vulnerabilities, threats, and network detection techniques. His research over the past decade has included running the Cisco malware lab and trying to outwit the very security products he has helped Cisco to design. Among Mr. Williams’ significant contributions to Cisco is an issued patent, “enhanced server to client session inspection,” which involves obfuscated traffic inspection. He is [...]
Francois van Heerden is a veteran of over 30 years in the world of IT. Having worked in both the public and private sector, he has constantly tried to educate staff on the "real world" threats and mitigations. His experience has shown unequivocally that the old "tried and true" methods produce minimal results. Using a new approach, he is already seeing both real and anecdotal evidence of change.
Zach Lanier is a Senior Security Researcher with Duo Security, specializing in various bits of network, mobile, and application security. Prior to joining Duo, Zach most recently served as a Senior Research Scientist with Accuvant LABS. He has spoken at a variety of security conferences, such as Black Hat, CanSecWest, INFILTRATE, ShmooCon, and SecTor, and is a co-author of the recently published "Android Hacker's Handbook".
Scott is a graduate of the University of Georgia and has worked in both Washington DC and New York City. He has over 15 years of sales experience with the last 8 years being in technology sales. He has worked for Fortune 500 companies as well as start-ups before coming to Check Point.
Ben Sapiro is the Global CISO of Great West LifeCo and has worked in both InfoSec consulting and operations since he somehow managed to graduate from b-school; he’s even done privacy and compliance work to pay the bills. Other than that, he’s a typical middle-aged Canadian security professional who has worked in several verticals including SaaS, natural resources and telecom. Ben is a contributor to the Liquidmatrix Podcast (whenever we get around to recording it) and used to help with other stuff like BSidesTO until he realized he should not test his wife’s [...]
Global Security Advocate
Dave Lewis has twenty five years of industry experience. He has extensive experience in IT security operations and management including a decade dealing with critical infrastructure. Lewis is a Global Advisory CISO for Duo Security (now Cisco). He is the founder of the security site Liquidmatrix Security Digest and cohost of the Liquidmatrix podcast. Lewis serves on the advisory boards for Cortex Insight and Dateva Inc. Lewis writes columns for Forbes, Daily Swig and several other publications.
James Arlen is Aiven.io’s CISO bringing a mix of security and engineering background to DBaaS (database as a service). Over the past twenty plus years, James has been delivering information security solutions to Fortune 500, TSE 100, and major public-sector organizations. James is best described as: “Infosec geek, hacker, social activist, author, speaker, and parent.” His areas of interest include organizational change, social engineering, blinky lights and shiny things. In addition to his work at Aiven.io, James is a Contributing Analyst at the research firm Securosis, blogger/podcaster with Liquidmatrix Security [...]
Cybersecurity Research Lead
Olivier Bilodeau is leading the Cybersecurity Research team at GoSecure. With more than 10 years of infosec experience, he enjoys luring malware operators into his traps, writing tools for malware research, reverse-engineering all-the-things and vulnerability research. Olivier is passionate communicator having spoken at several conferences inlcluding Black Hat, Defcon, Botconf, SecTor, Derbycon, and HackFest. Invested in his community, he co-organizes MontrÃ©Hack, a monthly workshop focused on hands-on CTF problem solving, and NorthSec, a large non-profit conference and CTF based in Montreal.
Alexander is a National Information Security Strategist with Symantec Canada. With over 15 years’ experience in IT specializing in security, Alexander holds CISSP and CISM certifications and has consulted with many large public and private sector organizations on how to address their security challenges. Prior to joining Symantec, he held a Sr. IT Security consulting role with IBM and was the Manager of IT for a small manufacturing company. Since 2008, Alexander has also been a part-time faculty member at Georgian College in Barrie, ON, teaching computer and network systems [...]
Christopher Elisan is a seasoned reverse engineer and malware researcher. He is currently the Principal Malware Scientist at RSA. He has a long history of digital threat and malware expertise, reversing, research and product development. He started his career at Trend Micro as one of the pioneers of TrendLabs. This is where he honed his skills in malware reversing. After Trend Micro, he built and established F-Secure's Asia R&D where he spearheaded multiple projects that include vulnerability discovery, web security, and mobile security. After F-Secure, he joined Damballa as their [...]
Chester "Chet" Wisniewski is a Senior Security Advisor at Sophos with more than 15 years experience in the security industry. In his current role Chester conducts research into computer security and online privacy with the goal of making security information more accessible to the public, media and IT professionals. Chester frequently writes articles for the award winning Naked Security blog, produces the weekly podcast "Sophos Security Chet Chat" and is a frequent speaker at conferences and in the press.
CEO at Autohost.ai
Roy is a strategist, seasoned hacker and expert in cyber security, business development and project management. He has a background in security, programming, research, management, marketing and sales with a unique ability to manage multi-disciplinary projects while navigating complex cyber challenges. Roy’s passion lies in Big Data and Machine Learning, especially when applied to cyber security. As a multi-linguist of technology-driven business, he speaks fluent geek, marketer, designer, salesperson and investor.
Josh Shaul’s nearly two decades of experience in the information security industry has included implementing embedded cryptographic systems; designing, developing and enhancing embedded and mobile security solutions; and providing technical direction for award-winning database security products and services and a renowned database security research team. Currently, Josh serves as Director of Product Management at Trustwave. His responsibilities include direction and strategy for Trustwave’s security testing product portfolio including vulnerability scanning and penetration testing for networks, applications and databases. Josh is the author of the acclaimed “Practical Oracle Security: Your Unauthorized [...]
Sr. Manager, Strategic Alliances
Madhu Mahadevan manages the SailPoint partnership at Okta. As a part of the Strategic Alliances team, he helps any organization to use any technology and enables their people to securely connect to the tools they need. Follow him on Twitter at @mmaha
A self-proclaimed IT security and privacy geek, Bruce is the co-founder of SecTor. He is also a founding member of the Toronto Area Security Klatch (TASK), and an active member of numerous other security and privacy related organizations across North America. Bruce co-founded SecTor because of his passion to bring IT, security and privacy awareness and knowledge sharing to the community. When he isn’t organizing events with Brian, you’ll usually find him at Microsoft’s Redmond, WA headquarters where today he manages Microsoft’s security policies and standards program. Aside from his [...]
Chris John Riley is a senior penetration tester and part-time security researcher working in the Austrian financial sector. With over 15 years of experience in various aspects of Information Technology, Chris now focuses full time on Information Security with an eye for the often overlooked edge-case scenario. Chris is one of the founding members of the PTES (Penetration Testing Execution Standard), regular conference attendee, avid blogger/podcaster (blog.c22.cc / eurotrashsecurity.eu), as well as being a frequent contributor to the open-source Metasploit project and generally getting in trouble in some way or another. [...]
Amol heads Qualys' worldwide security engineering team responsible for vulnerability and compliance research. His team tracks emerging threats and develops software, which identifies new vulnerabilities and insecure posture for Qualys' VM, PC, PCI and QBC services. Amol is a veteran of the security industry and has devoted his career to protecting, securing and educating the community from security threats. Amol has presented his research on Vulnerability Trends, Security Axioms, SCADA security, Malware and other security topics at numerous security conferences, including RSA Conference, BlackHat, Hacker Halted, SecTor, BSides, InfoSec Europe, [...]
Troy Larson is the Senior Forensic Investigator in Microsoft's IT Security Group. Prior to joining Microsoft, Mr. Larson worked as a private computer forensics consultant, including two years with the Ernst & Young National Computer Forensics and Incident Response Team. Mr. Larson is a graduate of the University of California, Berkeley, and Boalt Hall School of Law.
Director of Research, Volexity
Andrew Case is the Director of Research at Volexity LLC, and a member of the Board of Directors for the Volatility Foundation. Prior to joining Volexity, he held positions as a senior incident response handler and malware analyst at Terremark Worldwide and Verizon Enterprise Solutions, where he frequently led large-scale investigations. Andrew's previous experience also includes penetration tests, source code audits, and binary analysis. Andrew is the co-developer of Registry Decoder, a National Institute of Justice funded forensics application, as well as a core developer on the Volatility memory analysis [...]
Brandon Niemczyk was born in Chicago. He has been writing code since he was a child with his first 386 modifying the QBASIC game gorillas.bas. He later moved on to write GIS software in Orlando, FL and then wandered into information security after a brief stint writing accounting software. His interests are machine learning, mathematics, motorcycles, games, reverse engineering, and family. Brandon has previously spoken at multiple conferences on machine learning and information security.
Prasad Rao is a member of the Cloud and Security Labs (a part of HP Labs) with a focus on Security and Privacy. He develops graph algorithms, machine learning techniques and big data analytics techniques for security logs. Previously, he designed and implemented perimeter security analyzers for systems of firewalls. He is the principal designer of the rule engine for the HP Privacy Advisor. Prior to HP Labs he worked at Telcordia Technologies on perimeter security enforcement and scheduling algorithms for dispatching technicians. As a PhD student, Prasad built the core [...]
Christopher Valasek serves as Director Vehicle Security Research at IOActive, an industry leader in comprehensive computer security services. In this role, Valasek is responsible for guiding IOActive’s vehicle security research efforts. He is also heavily involved in bleeding-edge automotive security research. Valasek specializes in offensive research methodologies with a focus on reverse engineering and exploitation. Known for his extensive automotive field research, Valasek was one of the first researchers to discuss automotive security issues in detail. His release of a library to physically control vehicles through the CAN bus garnered [...]
Brian has a passion for security and has been an active member of the IT security community for over 25 years. Being part of the IT community has always been important to Brian and his entrepreneurial spirit and industry experiences are what helped establish TASK and SecTor. Brian was the founder of CMS Consulting Inc. and Infrastructure Guardian Inc. which became part of New Signature. The two organizations (professional services and managed services respectively) provided deep Microsoft expertise working with mid to large enterprise customers. After handing over the reins, [...]
Tadd Axon is an experienced technology consultant and information security professional. His main focus is on the architecture and delivery of information technology solutions for the enterprise and mid market. Tadd has designed, implemented, secured, managed, and created process and technical documentation of information systems for clients in many different industries, including provincial government, healthcare, defense, finance, construction and retail. This involvement includes Bill 198 compliance initiatives, both as a contributor to policy documentation and in implementing technical solutions for policy enforcement. He is currently a Solutions Architect with Softchoice [...]
Chief Information Security Officer, Nuix
Chris Pogue is the Chief Information Security Officer, Nuix, and a member of the US Secret Service Electronic Crimes Task Force. Chris is responsible for the company’s security services organization; he oversees critical investigations and contracts, and key markets throughout the United States. His team focuses on incident response, breach preparedness, penetration testing, and malware reverse engineering. Over his career, Chris has led multiple professional security services organizations and corporate security initiatives to investigate thousands of security breaches worldwide. His extensive experience is drawn from careers as a cybercrimes investigator, [...]
Grayson Lenik is Director of Digital Forensics and Incident Response, part of Nuix’s Cyber Threat Analysis Team. He has worked in information security and digital technology for more than 20 years. Grayson has researched and presented on anti-forensics, cybercrime operations, and incident response methodology at conferences including DEFCON, SecTor, NetDiligence Cyber Risk Forum, International Association of Financial Crimes Investigators, and Electronic Crimes Special Agent Program. Grayson regularly instructs law enforcement and private organizations in incident response and digital forensics. He was the primary instructor for the United States Secret Service [...]
Chris Eng has over 15 years of experience in the security industry. As vice president of Research at Veracode, he leads the team responsible for integrating security expertise into Veracode’s technology. Throughout his career, he has led projects breaking, building and defending web applications and commercial software for Fortune 100 companies. Chris is a sought after speaker at industry conferences, and has presented at events such as BlackHat, RSA, OWASP, and CanSecWest. In addition to presenting on a diverse set of application security topics, including cryptographic attacks, testing methodologies, mobile [...]
Felix 'FX' Lindner is the founder as well as the technical and research lead of Recurity Labs GmbH, a high-end security consulting and research team, specializing in code analysis and design of secure systems and protocols. Well known within the computer security community, he has presented his research for over a decade at conferences worldwide. Felix holds a title as German State-Certified Technical Assistant for Informatics and Information Technology as well as Certified Information Systems Security Professional, is highly specialized in digital attack technologies, but recently changed the direction of [...]
Chuck has been working in network security for 15+ years. He currently is a Security Researcher at Ixia Communications, focused on Threat Intelligence and Exploit Research. In the past, he has performed vulnerability research, created DDoS attacks, and studied LTE's mobile packet core. He has spoken at numerous security conferences about these topics and many others.
Founder and Chief Innovation Officer, eSentire
Eldon Sprickerhoff is the Chief Innovation Officer and Founder of eSentire, a Managed Detection and Response cybersecurity services firm started in 2001 with headquarters in Waterloo.
Brian Hein is a Senior Analyst at HP. Brian has worked at HP since 2004, initially at the acquired TippingPoint. Brian’s past experience includes helping build Fortinet in Central Europe. He also has experience in pre-sales, building relationships with central EMEA and Eastern Europe and supporting high profile Middle Eastern customers. He has authored and published over twelve books.
Global Security Manager - Sycomp
Kellman Meghu is Global Security Manager at Sycomp, with a focus on infrastructure as code for public and private cloud. As part of his role he curates research, testing and development of public cloud infrastructure for Securing Labs. Past responsibilities have included day-to-day operational work in complex security networks, policy planning, management, and documentation responsibilities with various network, VoIP and security engineering companies. Kellman is an experienced speaker with original content, that has delivered security talks in private corporate focused events, at school internet safety classes for training students and [...]
A father of ERPScan. Organizer of ZeroNights deep-technical security conference. His expertise covers security of enterprise business-critical software like ERP, CRM, SRM, banking and processing software. He is the manager of OWASP-EAS, a well-known security expert of the enterprise applications of such vendors as SAP and Oracle, who published a significant number of the vulnerabilities found in the applications of these vendors with acknowledgements from SAP. He is the writer of multiple whitepapers and surveys devoted to information security research in SAP like award-winning "SAP Security in figures". Alexander were [...]
Ryan has more than 15 years of experience in Information Security. He has worked as a Technical Team Leader, Database Administrator, Windows and UNIX Systems administrator, Network Engineer, Web Application developer, Systems programmer, Information Security Engineer, and is currently a Principal Consultant doing network penetration testing. Ryan has delivered his research about ATM security, network protocol attacks, and penetration testing tactics at numerous conferences, including Black Hat, DefCon, DerbyCon, Shmoocon, and SecTor to name a few. He is also an open source project contributor for projects such as Metasploit, Ettercap, [...]
Mark Stanislav is the Security Evangelist for Duo Security, an Ann Arbor, Michigan-based startup focused on two-factor authentication and mobile security. With a career spanning over a decade, Mark has worked within small business, academia, startup, and corporate environments, primarily focused on Linux architecture, information security, and web application development. Mark has spoken internationally at over 75 events including RSA, DEF CON, ShmooCon, SOURCE Boston, and THOTCON. Mark’s security research and initiatives have been featured by news outlets such as the Wall Street Journal, The Register, The Guardian, CSO Online, [...]
Chuck Ben-Tzur is an IT Security professional with over 15 years of experience as a consultant and a senior manager. Chuck has helped leading Canadian and international organizations to build their corporate security program, assess and implement effective security controls and maintain ongoing compliance. To keep his technical knowledge fresh and up-to-date, Chuck likes to “keep his hands dirty” by researching the security of new technologies and is continuously performing hands-on penetration testing, vulnerability assessments and threat risk analysis. Chuck has presented at many conferences and in front of professional [...]
Stephan Jou is CTO of Interset, a Micro Focus company, a leading-edge cybersecurity and In-Q-Tel portfolio company that uses machine learning and behavioral analytics. Jou currently leads both Interset and various analytics-related initiatives for Micro Focus’ security division. Previous to Interset, Jou has been at IBM and Cognos where he led the development of over 10 products in the areas of cloud computing, mobile, visualization, semantic search, data mining and neural networks. Jou holds a M.Sc. in Computational Neuroscience and Biomedical Engineering, and a dual B.Sc. in Computer Science and [...]
Heather Pilkington is a penetration tester with prior experience inside Threat and Vulnerability Management, and more than 10 years in Information Security overall. In her spare time, she is a curator of cute animal photos, a technical editor, and a fiction writer. Heather is known for a fast-paced and humorous presentation style.
Greg Kliewer is the Senior Principal Consultant for Layer 7 Technologies in Canada. In this role, Greg consults on the architecture, design, and delivery of strategic API Management platforms for key CA Technologies accounts nationwide. Greg joined CA when Layer 7 was acquired in 2013. With over 15 years of experience delivering secure web services and APIs for Canadian banks, insurance companies, and government ministries and agencies, Greg understands what it takes to effect comprehensive change in large organizations.
Mr. Lance Spitzner is an internationally recognized leader in the field of cyber threat research and security training and awareness. He has helped develop and implement numerous multi-cultural security awareness programs around the world for organizations as small as 50 employees and as large as 100,000. He invented and developed the concept of honeynets, is the author of several books, and has published over thirty security whitepapers. Mr. Spitzner started his security career with Sun Microsystems as a senior security architect, helping secure Sun's customers around the world. He is [...]
Claudio Damaso has been providing complex security solutions to large, medium and small businesses across Canada for over 18 years. He has held senior account executive roles, management and leadership titles, all with a detailed focus on the internet security industry for some of the largest security companies in Canada and the US. Claudio is currently a Security Specialist for Dell SecureWorks, responsible for Canada’s Large Enterprise business.
Alex Binotto is a Senior Product Manager in the Identity and Access Management Solutions group at Dell Software. He has more than 15 years’ experience across the IT industry, having worked in many areas including Network and Exchange Administration, Pre-Sales Engineering and Exchange Migration Consulting. In the last 8 years Alex has shifted focus to Identity and Access Management to help Quest, now Dell Software, prioritizes its initiatives around this space.
Chris Liu is a member of the security team at Rakuten, Inc., a Tokyo based e-commerce company. His passion is in reverse engineering and malware analysis, but is currently conducting security assessment for web and mobile applications. He is currently involved in making automated tools for both web and Android vulnerability assessment and sometimes does malware analysis for Japanese banks. Mr. Liu will soon be a guest researcher at a Japanese university.
Matthew Lionetti is also a member of the security team at Rakuten, Inc. Although being an experienced web application penetration tester and an office playboy, Mr. Lionetti is currently in charge of implementing Android vulnerability assessment automation into the development lifecycle at Rakuten. Off work, Mr. Lionetti enjoys playing lead guitar for his metal band and bug hunting while drinking beer.
Following a series of senior management positions leading key sectors of CSIS activities, Ray Boisvert was appointed to the critical position of Assistant Director, Intelligence. In this role, his teams were responsible for agenda setting in the intelligence collection, assessment and dissemination functions at CSIS. He worked intimately in specialized areas of security intelligence, from Technology,to all facets of Operations, including as the head of Counter Terrorism, as well as Data Exploitation, Risk Management, and Finance sectors, among others. Reporting directly to the Director (or Head of Service), Boisvert was [...]
Jasbir Gill specializes in Identity and Access Management technologies and Mobility products and solutions. Jasbir has previously worked deploying these solutions as a part of Microsoft Consulting Services for over a decade, deploying solutions for customers around the world.
Frederic has over fifteen years of experience in the Information Technology industry. Frederic has worked to develop his career from the ground up starting in internet technology before developing into a highly respected and accomplished information security expert having worked in roles such as Security Specialist and Security Engineer in the finance and insurance industries prior to joining Scalar in early 2014.
Analyst/Securosis, CISO/DisruptOps, Securosis, L.L.C.
Rich Mogull has twenty years experience in information security, physical security, and risk management. These days he specializes in cloud security and DevSecOps, having starting working hands-on in cloud nearly 10 years ago. He is also the principle course designer of the Cloud Security Alliance training class, primary author of the latest version of the CSA Security Guidance, and actively works on developing hands-on cloud security techniques. Prior to founding Securosis, Rich was a Research Vice President at Gartner on the security team. Prior to his seven years at Gartner, [...]