Past Events



Sesssions


- Expo Theatre (Hall G) '

Agile Incident Management – Bringing the “Win” Back to Data and Privacy Breach Responses

Presently, managers and technical staff rely on a traditional reactive incident response process that starts when a security breach is identified – it allows the attacker to “seize the initiative”. DigitalDefence will present the Agile Incident Management (AIM) methodology, which stresses proactive planning in combination with a rapid and effective response to an attack. Using Canadian-specific […]

SECurity FUNdamentals
Robert Beggs
- Expo Theatre (Hall G) '

Knowing what happened is only half the battle.

This presentation will cover distinct advantages of Incident Response by working closely with Penetration Testers to provide a more holistic view of the threats to your network. We will also further explore how a breach like this happens.

Sponsor Track
Grayson Lenik
- Expo Theatre (Hall G) '

Drug Pump and Medical Device Security

Wifi connected drug infusion pumps known as ‘Smart Pumps” have been used in hospitals for over a decade. What could go wrong? Answer: Death. They have recently been the target of much interest in the hardware hacking community. In this talk we will tear down one of these pumps and identify a number of security […]

Tech
Jeremy Richards
- Expo Theatre (Hall G) '

Complete Application Ownage via Multi-POST XSRF

This talk will discuss the risk posed by Cross Site Request Forgery (CSRF or XSRF) which is also known as session riding, or transaction injection. Many applications are vulnerable to XSRF, mitigation is difficult as it often requires re-engineering the entire application, and the threat they pose is often misunderstood. A live demo of identifying […]

Tech
Adrien de Beaupré
- Expo Theatre (Hall G) '

The State of Software Security

According to Verizon’s 2015 Data Breach Investigations Report, one of the leading causes of data breaches over the past two years has been vulnerable applications. Yet, analytics collected by Veracode from more than 200,000 application risk assessments over the last 18 months found a wide disparity in how the problem is addressed across industries. In […]

Sponsor Track
Chris Wysopal
- Expo Theatre (Hall G) '

Taking back Endpoint Control!

When it comes to endpoint security, it has been said that the best way to keep an infected device from causing damage to the broader network is to keep it turned off once it is compromised. While this method of quarantining an endpoint may be a quick fix, for obvious reasons it is not very […]

Sponsor Track
John Beal
- Expo Theatre (Hall G) '

Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing

Tired of threat intelligence anecdotes? How vendors just keep selling the idea that “more data is better data”? Join Alex in a scientific animated-GIF-powered data-driven analysis of what makes for a good threat intelligence feed and sharing community that is relevant to your environment and defense needs!

Tech
Alex Pinto
- Expo Theatre (Hall G) '

Stealthier Attacks and Smarter Defending with TLS Fingerprinting

Ever been busted because your man in the middle software (which does TLS properly) alerted someone to your bad certificate?  No more! Want to detect certain types of connections leaving your network, but can’t keep the IP blacklist up to date?  This could be the answer. This talk includes an introduction to both TLS and […]

Tech
Lee Brotherston
- Expo Theatre (Hall G) '

Preventing Home Automation Security Disasters

Increasingly, our lives are becoming entangled with gadgets that require more than simple installation, they require WiFi and an IP address. As we move from upholstered caves to house-shaped machines that automagically know when to turn lights on or off, raise or lower the temperature, unlock the front door upon our approach – we might […]

SECurity FUNdamentals
James Arlen
- Expo Theatre (Hall G) '

Browser and Environment Hardening

In today’s threat landscape, many corporate users are being compromised by exploit kits and phishing campaigns. These offensive techniques are successful because they target outdated software and unsuspecting users. There are tools and configuration options to help prevent the execution of malicious binaries, the exploitation of web browsers, and the third party applications that are […]

Sponsor Track
Kurtis Armour
- Expo Theatre (Hall G) '

Cymon – An Open Threat Intelligence System

Threat Intelligence is a term frequently discussed within information security circles, with many firms offering commercial threat data feeds, using different frameworks and transport mechanisms detailed (including STIX and TAXII). Beyond the threat data generally offered, there are questions about exactly how useful and actionable such data can be. In this talk we will debut […]

Tech
Roy Firestein
- Expo Theatre (Hall G) '

Confessions of a Professional Cyber Stalker

For several years I developed and utilized various technologies and methods to track criminals leading to at least two dozen convictions. In the process of recovering stolen devices, larger crimes would be uncovered including drugs, theft rings, stolen cars, even a violent car jacking. Much of the evidence in these cases would be collected by […]

Tech
Ken Westin
- '

Exposing Advanced Threats: How big data analytics is changing the way advanced threat defense is deployed, managed and measured

Today’s advanced malware hides in plain sight, patiently waiting to strike, challenging security teams to track its progress across their network and endpoints. As attacks are gaining speed and sophistication, the security industry is by delivering advanced big data analytics—analyzing data about data to block breach attempts, improve security everywhere, and retroactively respond to new […]

- Expo Theatre (Hall G) '

Mitigating the Alert – Impact Prevention in a super active security battlefield

In this session we will demonstrate how to achieve continuous monitoring and mitigation capabilities that better leverage your infrastructure investments and optimize your IT resources. Most companies have deployed a number of technologies that make up the SANS Top 20, but the challenge is how to ensure these technologies integrate to provide the layers of […]

Sponsor Track
Brian Read
- Expo Theatre (Hall G) '

Making & Breaking Machine Learning Anomaly Detectors in Real Life

Machine learning-based (ML) techniques for network intrusion detection have gained notable traction in the web security industry over the past decade. Some Intrusion Detection Systems (IDS) successfully used these techniques to detect and deflect network intrusions before they could cause significant harm to network services. Simply put, IDS systems construct a signature model of how […]

Tech
Clarence Chio
- Expo Theatre (Hall G) '

Stealth Attack From The Produce Aisle

The proliferation of devices like the Raspberry Pi, Pineapple Express, PwnPi and more make it easier (and cheaper) than ever to obtain a complete stealth attack or defense arsenal. In this session, we’ll take a low-cost, credit-card sized ARM computer, add some freely available software and see what we get. We’ll learn: what options are […]

Tech
Todd Dow
Keith Benedict
- Expo Theatre (Hall G) '

Changing the Game of Threat Hunting

Cybercrime makes victims of all who are targeted. In today’s thriving hyper-connected, global marketplace threat actors ruthlessly find IT gateways and disconnected system-doorways to crawl through, rendering enterprises sitting ducks looking over their shoulder and bracing for an inevitable attack. Well, what if you could flip the script? What if your enterprise could hunt for […]

Sponsor Track
Jim Penrose
- Expo Theatre (Hall G) '

Certifi-gate: Has your Android device been Pwned?

Hundreds of millions of Android devices are at risk of being hijacked by a new and previously unknown threat. Certifi-gate is a set of vulnerabilities in the authorization methods between mobile Remote Support Tool (mRST) apps and system-level plugs used by virtually every Android device maker and network service provider. Exploitation gives malicious apps unrestricted […]

Sponsor Track
Shai Yanovski
- Keynote Hall '

Maturing InfoSec: Lessons from Aviation on Information Sharing

If we’re honest, we’re still making a lot of this security stuff up as we go, much like early pilots. The public was afraid of air travel and now it is a critical part of our lives. We wrestle with how to mature our profession. I believe information sharing will be one of the key […]

Keynote
Trey Ford
- Keynote Hall '

IT Security Operations: Successful Transformation

As technologies like Cloud and Mobility and processes like Agile Development have become mainstream, many enterprises large and small, have challenges not only keeping pace and leveraging these technologies to grow their business but also reducing risk to the business in an interconnected world. This session will provide best practices and experience from a CISO’s […]

Keynote
Kristin Lovejoy
- Expo Theatre (Hall G) '

Ensuring the Success of Your IAM Project

Identity and access management (IAM) projects are traditionally some of the most important (and most difficult) security activities that organizations must undertake. We hear of companies in the fifth year of their two-year IAM project, millions of dollars over budget and there is no end in sight. It’s a common occurrence. But it doesn’t have […]

Sponsor Track
Jeremy Hanlon
- Expo Theatre (Hall G) '

Building an Effective Vulnerability & Remediation Management Program

Vulnerability scanning is like flossing, some do it regularly, some only when they have an issue or having their annual checkup, and some not at all. The challenge is that like bacteria the bad guys don’t sit back and wait for you to get around to it, and like teeth your IT systems are never […]

SECurity FUNdamentals
Dave Millier
- Keynote Hall '

Big Data Needs Big Privacy … Enter Privacy by Design

While some believe that fundamental privacy protections will be challenged by the operation of Big Data analytics, Dr. Cavoukian dispels the notion that privacy acts as a barrier to analytics and the innovations they can spark. She argues that the limiting paradigm of “zero-sum” – that you can either have privacy or innovation, but not […]

Keynote
Dr. Ann Cavoukian
- Expo Theatre (Hall G) '

Breaking Access Controls with BLEKey

RFID access controls are broken. In this talk, we will demonstrate how to break into buildings using open-source hardware we’re releasing. Over the years we have seen research pointing to deficiencies in every aspect of access control systems: the cards, the readers, and the backend. Yet despite these revelations there has been no meaningful change […]

Tech
Mark Bassegio
Eric Evenchick
- Expo Theatre (Hall G) '

Security for non-Unicorns

Security is becoming quite the thing nowadays, everyone wants to have some. The mantra that things should be built with security in mind and can’t be plastered on later is a very important one, whether you are established or if you’re based in Silicon Valley and are about to write “the new hotness”. However, what […]

SECurity FUNdamentals
Ben Hughes
- Keynote Hall '

Globalization of Cybercrime

Cybercrime continues to evolve into a truly transnational phenomenon. Highly technical and organized individuals with clear financial motivation continue to target our financial, retail, and service sectors. Only by understanding the origin and motivation of these criminals can the problem be properly confronted. This presentation will also include a present-day case study on criminal actors […]

Keynote
Jason Brown
- Expo Theatre (Hall G) '

Advanced Threats: Eliminating the Blind Spot

Unfortunately, it’s a foregone conclusion that no organization is 100% safe from a breach. With 49% of security leaders believing zero day attacks against their network will be the most prevalent over the next three years and 65% saying attacks have evaded current preventative security controls, it’s all about mitigating risk and the potential impact […]

Sponsor Track
Fahmy Kadiri
- Expo Theatre (Hall G) '

What does it take to deliver the most technologically advanced Games ever?

This talk will discuss how the team prepared for the largest sporting event held in Canada, the TORONTO 2015 Pan Am / Parapan Am Games. The session will include how we created a Cyber Security Group, staff scheduling, contingency planning, and communications. I will also discuss how we managed the day to day security operations, offer a recap […]

Management
Enzo Sacco
Quang Tu
- Expo Theatre (Hall G) '

UNMASKING MALWARE

Malware comes in different shapes and sizes. They are even produced in a massive scale. But attackers know that this is not enough. Malware has to be protected. In this talk, I will present the different techniques attackers use to protect and mask malware to bypass security products and analysis. I will show how attackers […]

Tech
Christopher Elisan
- Expo Theatre (Hall G) '

Insider Threat – The Soft Underbelly of CyberSecurity

Security teams, both in the enterprise and at cloud service providers, spend untold resources attempting to keep cyber criminals from infiltrating mission-critical data systems. However, survey data from Cloud Security Alliance (CSA) shows that attacks from malicious insiders are 4 times more common than Security realizes – likely because they are so hard to detect. […]

Sponsor Track
Harold Byun
- Expo Theatre (Hall G) '

Dolla Dolla Bill Y’all: Cybercrime Cashouts

The hardest part of cybercrime is the cashout. The strategy for cashing out needs to be easy enough to make it worth your while and safe enough to stay out of the clink. With more and more focus on identifying and stopping credit card fraud, cybercrooks are diversifying their methods for cashing out. While criminals […]

Management
Benjamin Brown
- Expo Theatre (Hall G) '

Ground Zero Financial Services: Targeted Attacks from the Darknet

This will be an advanced level discussion covering attacks sourced from the Darknet that target the global financial services industry. We will detail what the Darknet is, how it operates, why it’s so elusive and why it’s a breeding ground for malicious activity. More specifically, we will focus on new and emerging threats stemming from […]

SECurity FUNdamentals
Joe Pizzo
- Expo Theatre (Hall G) '

2015 State of Vulnerability Exploits

More than 7000 new and unique vulnerabilities will be disclosed this year. CSOs, CISOs and security professionals in IT are expected to keep their organizations safe not only from these new flaws but also from a ton of older security issues. An effective way to prioritize and mitigate the most relevant issues is by analyzing […]

Sponsor Track
Amol Sarwate
- Expo Theatre (Hall G) '

Bulletproofing Your Incident Response Plan: Effective Tabletops

The pace of databreaches has reached epic proportions. Organizations large and small, in every industry are falling victim to hackers, hacktivists and nation states. Your intellectual property, data and bank accounts have never been at greater risk – it’s not if, but when your organization will be victimized. Testing and maintaining an effective Incident Response […]

Management
Reg Harnish
- Expo Theatre (Hall G) '

Peeling The Layers Of Vawtrak

Vawtrak, also called NeverQuest, is a banking malware that targets banks and other financial institutions all over the world. It is a sophisticated malware that challenges the likes of Zeus and other malevolent trojans. Vawtrak has been seen to bypass 2FA, captured video and screenshots, and also form part of a big botnet infrastructure. Vawtrak is a […]

SECurity FUNdamentals
Raul Alvarez
- Expo Theatre (Hall G) '

The Internet of Bad Things and Securing the Software Defined Data Center

This last minute session has no available abstract.

SECurity FUNdamentals
Ian Redden
Marc Edun
- Expo Theatre (Hall G) '

Business Backed CVEs – The Major Vulnerabilities of the Past Year

The past twelve months have seen an unprecedented number of vulnerabilities that strike at the core of the technologies that run our networks. This session will provide detailed demos of each of the major vulnerabilities released this year and discuss the impact for organizations. Attendees will hear from Brad Antoniewicz, Head of Research & Development […]

Sponsor Track
Atif Ghauri
Brad Antoniewicz
- Expo Theatre (Hall G) '

The Effective Use of Cyber Ranges for Application Performance and Security Resilience – Train Like You Fight!

Organizations worldwide face a dangerous shortage of Cyber Warriors with the skills required to defend against cyber terrorism. This urgent situation is made worse by the weaknesses and vulnerabilities that continue to pervade critical IT infrastructures – despite billions of dollars invested in cyber security measures. Answering these problems requires Internet-scale simulation environments, along with […]

Management
Bob DuCharme
- Expo Theatre (Hall G) '

Make Metrics Matter

Metrics needn’t be meddlesome (alliteration!), as long as you’re measuring something. Focus on the metrics that make the most impact instead of trying to do it all. Regardless of your maturity level, you can still implement a metrics program. It comes down to value over quantity.  Mix straightforward metrics like the overall reduction of incidents […]

Management
Jessica Ireland
- Expo Theatre (Hall G) '

Learning To Love Your Attackers

Opposing Forces (OPFOR) training is used by the military to help create realistic scenarios so that when they are deployed in battle they aren’t encountering situations for the first time. Whether it’s battle or incident response, that reaction time is critical to the success of a team. Most organizations have some degree of penetration testing […]

Tech
Ryan Linn
- Expo Theatre (Hall G) '

One Ring to Rule Them All – Hardware isolation and the future of virtualization security

The ring architecture of modern CPUs arose from the need to protect the OS kernel from malicious or buggy applications.  Unfortunately today’s OSes use only two of the four rings of the x86 architecture – and today’s security challenges are the result.  The complexity and large attack surface of a modern OS, together with trends […]

Sponsor Track
Simon Crosby
- Expo Theatre (Hall G) '

There’s no such thing as a coincidence – Discovering Novel Cyber Threats

Jim will provide an in-depth background of the changing cyber threat landscape, with specific focus on recent incidents including the cyber attack on Sony Pictures Entertainment, the massive data breach at Anthem Healthcare, and the compromise at the US Office of Personnel Management of nearly every US government employees’ personal information. Jim will share his […]

Management
Jim Penrose
- Expo Theatre (Hall G) '

Hijacking Arbitrary .NET Application Control Flow

This session will demonstrate attacking .NET applications at runtime. I will show how to modify running applications with advanced .NET and assembly level attacks that will give the ability to alter the control flow of any .NET application. New attack techniques and tools will be released to allow penetration testers to carry out advanced post […]

Tech
Topher Timzen
- Expo Theatre (Hall G) '

Xenophobia is Hard on Data: Forced Localization, Data Storage, and Business Realities

“Our data is only safe within our borders!” “(The US|China|New Zealand|Vanuatu) is spying on our citizens!” “Don’t ship our citizens’ data overseas!” These rallying cries are calling for the same solution: forced data localization laws, where a country requires that all its citizens’ and corporations’ data be kept within the territory of that country. What’s […]

Tech
Brendan O’Connor
James Arlen
- Expo Theatre (Hall G) '

Advanced Threat Analytics: Adapt as Fast as Your Enemies

Today, the topic of cyber-security has moved from IT and the datacenter to the highest levels of the boardroom. Attacks and threats have grown substantially more sophisticated in frequency and severity. Attackers reside within a network an average of eight months before they are even detected. In the vast majority of attacks, they compromise user […]

Sponsor Track
Jasbir Gill
Lanny Cofman
- Expo Theatre (Hall G) '

CISO Survival Guide: How to thrive in the C-Suite and Boardroom

The CISO lives with a target on his/her back, usually lasts a mere 12-18 months and takes the fall for security issues often out of their control. Yet, this is a strategic, C-level position and essential to the success of any organization. The disconnect lies in the CISO being able to elevate their worth with their […]

Management
Chris Wysopal
- Expo Theatre (Hall G) '

Exploitation Trends: From Potential Risk to Actual Risk

Microsoft researchers have studied some of the exploits discovered over the past several years and the vulnerabilities they targeted. Understanding which vulnerabilities get exploited, who exploits them, the timing of exploitation, and the root causes, all help security professionals more accurately assess risk. Development practices that help minimize vulnerabilities will be discussed.

Tech
Tim Rains
- Expo Theatre (Hall G) '

Run Faster, Continuously Harden – Embracing DevOps to Secure All The Things

Infrastructure and application deployments are easy, but as security professionals we have to be conscious of the security concerns. Enter DevOps: pro-actively secure, reduce the attack surface, and automate changes at scale. Through a security focussed lens, we look at how embracing DevOps can reduce information security leakages for application and infrastructure deployments. In this […]

SECurity FUNdamentals
Chayim Kirshen
- Expo Theatre (Hall G) '

Detecting the Bear in Camp: How to Find Your True Vulnerabilities

Is it possible to be successful in a vulnerability centric world? Once you have great vulnerability management data, what do you do with it? Join this session to learn how to find and focus on your true vulnerabilities to build stronger security. You will: Learn how to optimize your vulnerability management program Get best practices […]

Sponsor Track
Ryan Poppa
- Expo Theatre (Hall G) '

DevOps For The Home

This is the story one man’s personal trip to the cloud (and back) as he rebuilds his home network in a devops model, supported by virtual private cloud service. This presentation takes a micro look at cloud services, and the benefits and risks that come along with it for the average home user, as well […]

Tech
Kellman Meghu

Sponsors


No Sponsor found.

Speakers


Robert Beggs

Robert Beggs

Ethical Hacker


Robert Beggs breaks into computers and data networks. As an ethical hacker and incident responder, he identifies and closes the vulnerabilities that could be exploited to create a security breach. He has been responsible for the technical leadership and project management of multiple successful responses to data loss. His experience has driven the development of the AIM methodology, used to effectively respond to a breach. His clients range from banks and insurance companies to small and medium enterprises. Robert holds an MBA in Science and Technology from Queen's University and [...]

Grayson Lenik

Grayson Lenik


Grayson Lenik is Director of Digital Forensics and Incident Response, part of Nuix’s Cyber Threat Analysis Team. He has worked in information security and digital technology for more than 20 years. Grayson has researched and presented on anti-forensics, cybercrime operations, and incident response methodology at conferences including DEFCON, SecTor, NetDiligence Cyber Risk Forum, International Association of Financial Crimes Investigators, and Electronic Crimes Special Agent Program. Grayson regularly instructs law enforcement and private organizations in incident response and digital forensics. He was the primary instructor for the United States Secret Service [...]

Jeremy Richards

Jeremy Richards


Jeremy Richards is a Staff Security Researcher at Lookout. Jeremy’s hacking career started in 1995 at the age of 14 when he took on assembly to bypass Leisure Suit Larry age restrictions. Jeremy has taken his years of research experience to mobile and while studying active malware campaigns and searching for evasion techniques in the Lookout corpus has been mapping actors to campaigns through habits of operation, infrastructure characteristics, and opsec fails.

Adrien de Beaupré

Adrien de Beaupré

SANS Instructor


Adrien de Beaupré is a certified SANS instructor and works as an independent consultant in beautiful Ottawa, Ontario. His work experience includes technical instruction, vulnerability assessment, penetration testing, intrusion detection, incident response, and forensic analysis. He is a member of the SANS Internet Storm Center (isc.sans.edu). Adrien is actively involved with the information security community, and organizes the BSidesOttawa conference. When not geeking out and breaking stuff he can be found with his family, or at the dojo.

Chris Wysopal

Chris Wysopal

Co-Founder and CTO, Veracode


Chris Wysopal is Co-Founder, Chief Technology Officer at Veracode. Wysopal co-founded the company in 2006 and oversees technology strategy and information security. Prior to Veracode, Chris was vice president of research and development at security consultancy @stake, which was acquired by Symantec. In the 1990’s, Chris was one of the original vulnerability researchers at The L0pht, a hacker think tank, where he was one of the first to publicize the risks of insecure software. He has testified to the US Congress about government security and how vulnerabilities are discovered in software. [...]

John Beal

John Beal


John Beal is the National Security SaaS Leader for Canada. Previously he was the Sales Leader for Mobility and Endpoint Solutions across Canada and the Caribbean. He has 20 years of experience with IBM across both Hardware and Software.

Alex Pinto

Alex Pinto


Alex Pinto is the Chief Data Scientist of Niddel and the lead of MLSec Project. He is currently dedicating his waking hours to the development of machine learning algorithms and data science techniques to support the information security monitoring practice. So far, he has presented the results of his research at multiple conferences, including Black Hat USA, DEFCON, BSidesLV, ISC2 Security Congress and now SecTor! He has almost 15 years dedicated to all-things information security, and 3 years in Data Science-y related work. If you are into certifications, Alex is currently a [...]

Lee Brotherston

Lee Brotherston

Security Professional


Lee has worked within Information Security for over a decade. In that time he has held positions ranging from hands-on practitioner through to management across a number of industry verticals, he is currently the Director of Security at Wealthsimple in Toronto. He has spoken on topics ranging from malware analysis to network security and surveillance.

James Arlen

James Arlen


James Arlen is a member of Heroku’s security team assisting customers in understanding how Heroku enables security programs and reduces the impact of compliance and security operations allowing them to move fast and focus on their apps. Over the past twenty plus years, James has been delivering information security solutions to Fortune 500, TSE 100, and major public-sector organizations. In both consultant and staff member roles, James led business and technical teams of professionals in short-term projects as well as multi-year organizational change initiatives. James held key contributor roles as [...]

Kurtis Armour

Kurtis Armour

Security Systems Engineer, Scalar Decisions


Kurtis Armour is a Security Engineer at Scalar Decisions, where he works on securing client networks and regularly wears many security hats. He currently holds a Bachelor of Technology, with a specialty in Informatics and Security. As a regular conference speaker, Kurtis is inquisitive and dedicated to the industry and furthers research endeavors. His interests lie in securing client networks and research around building secure networks. He holds an OSCP certification which helps him understand the needs and requirements of organizations on the defensive side.

Roy Firestein

Roy Firestein

Research & Development, eSentire Inc.


Roy Firestein started his career as an independent infosec consultant and penetration tester, dabbling in malware analysis and forensic investigations. Over the years, he built many offensive and defensive security products for his employers, such as Cymon.io. His passions lie in entrepreneurship, AI, big-data and finding novel solutions to technical security problems using modern tools and techniques. Roy is currently leading the Research & Development efforts at eSentire Inc.

Ken Westin

Ken Westin


Ken Westin  is a security analyst and "creative technologist" with 15 years experience building and breaking things through the use/misuse of technology. His technology exploits and endeavors have been featured in Forbes, Good Morning America, Dateline, the New York Times and others. He has worked with law enforcement and journalists utilizing various technologies to unveil organized crime rings, recover stolen cars, even a car jacking amongst other crimes.  

Brian Read

Brian Read

Security Practice Manager


Mr. Read has over 20 years of experience in the IT industry and an extremely broad skill set when it comes to the security of an organization’s critical IT infrastructure.   Mr. Read has been in charge of IT Security  Professional Service Delivery for over  10 years and is primarily responsible for: Leading a Security resource team responsible for  vulnerability and risk assessments for some of Canada’s largest infrastructures; and Designing and deploying advanced security solutions from the SANs TOP 20 Critical Control list. By leading large projects in the areas [...]

Clarence Chio

Clarence Chio


Clarence recently graduated with a B.S. and M.S. in Computer Science from Stanford University, specializing in data mining and artificial intelligence. He currently works at Shape Security, a startup in Silicon Valley building a product that protects its customers from malicious bot intrusion. At Shape, he works on the system that tackles this problem from the angle of big data analysis. Clarence is a community speaker with Intel, traveling around the USA speaking about topics related to the Internet of Things and hardware hacking. He is also the organizer of [...]

Todd Dow

Todd Dow


Todd is an IT security specialist, author of Cryptogeddon & CF Fundraiser. Todd is an operational expert with extensive experience architecting, implementing and maintaining mission critical, secure, always-on internet based systems and processes. Todd is well versed in IT security, risk management and corporate governance. Todd has earned his Certified Information Systems Auditor (CISA) and Project Management Professional (PMP) designations. Todd has spoken at numerous local and national security events including Sector, TASK, Software Hamilton and the International Association of Privacy Professionals Privacy Symposium. Todd's wife & kids, faith, baseball, [...]

Keith Benedict

Keith Benedict


Keith started out in the early 80's developing programs to exchange data packets between bulletin board systems. Since then, he has crossed all domains from system administration, operations, databases and programming with extensive experience implementing and designing solutions on Microsoft and Linux platforms. Keith developed an interest in training, becoming a Microsoft Certified Trainer (MCT)  which drove a need to earn nearly every Microsoft certification, Keith prefers to call it his MC* designation. Keith is an undergraduate working towards a distant PhD in Computer Science, and when not studying or [...]

Jim Penrose

Jim Penrose


Jim Penrose is the EVP for Cyber Intelligence at Darktrace where he leads the firm¹s cyber operations team. A distinguished speaker, Jim has presented at the 2014 Cybersecurity Summit, the Gartner Security & Risk Management Summit, and the Suits and Spooks London 2014 meeting. Jim joins Darktrace following a distinguished 17 year career at NSA where he achieved the rank of Defense Intelligence Senior Level and was responsible for a variety of roles encompassing cyber threat analysis and counterterrorism. Most recently, as Chief of the Operational Discovery Center, Jim innovated [...]

Shai Yanovski

Shai Yanovski


Shai is a security industry expert with more than 12 years of experience in cyber security, data analytics and product management. He has a proven track record of turning cutting-edge research and technology into products that solve complex problems and is currently a product manager for Check Point Mobile Prevention. Prior to this role, he was a data scientist at Lacoon Mobile Secudity which was acquired by Check Point in April of 2015. As a member of the Tel-Aviv University’s Applied Machine Learning Group, he collaborated with a range of [...]

Trey Ford

Trey Ford


Trey Ford is the Global Security Strategist at Rapid7 where he serves as a customer resource, industry and community advocate. Over the last 15 years, Trey ran Black Hat events worldwide as General Manager, and served functions ranging from incident response, product management, PCI QSA and security engineer for a variety for industry leaders including Zynga, McAfee, FishNet Security and WhiteHat Security.

Kristin Lovejoy

Kristin Lovejoy


President of Acuity Solutions Kris Lovejoy is currently President of Acuity Solutions, provider of the BluVector Advanced Malware Detection and Analysis Platform. Before joining Acuity in Jun 2015, Kris spent +20 years running security businesses and managing security operations: As GM of IBM’s Security Services Division; IBM’s Global CISO; CTO of Consul Risk Management which was acquired by IBM in 2007; VP of Security Assurance Services for TruSecure. A recognized security expert, Kris has been granted numerous externals awards, including 2015 recognition in SC Magazine’s 25 Year Retrospective as one [...]

Jeremy Hanlon

Jeremy Hanlon


Jeremy Hanlon is a 15-year software industry veteran and currently responsible for evangelizing all Dell Software products with a specialty in Security for G500 customers across the United States and Canada. Prior to his current position, Jeremy served in various roles at Dell, including Mobility, Big Data and Virtualization/Cloud. He has more than 15 years of experience in Microsoft-focused corporate IT environments. Before joining Dell in 2011, Jeremy worked for PlateSpin (acquired by Novell) and SmartForce (acquired by SkillSoft). Jeremy brings hands-on experience in large scale server consolidation projects including [...]

Dave Millier

Dave Millier

CEO - UZADO


Dave Millier is a serial entrepreneur, off-road motorcycle rider and food lover. Dave has been involved in cybersecurity for almost 20 years. He founded the InfoSec company Sentry Metrics, one of Canada's most successful MSSPs. After the sale of Sentry Metrics, Dave's lifelong passion for reading led him to finally sit down and write his first book, Breached! In late 2014, Dave launched Uzado (http://www.uzado.com), a cloud-based InfoSec company focused on helping companies simplify cybersecurity by answering the questions "what now?" or "what next?" Dave is also the CSO of [...]

Dr. Ann Cavoukian

Dr. Ann Cavoukian


Dr. Ann Cavoukian is recognized as one of the world’s leading privacy experts. She is presently the Executive Director of the Privacy and Big Data Institute at Ryerson University. Appointed as the Information and Privacy Commissioner of Ontario, Canada in 1997, Dr. Cavoukian served an unprecedented three terms as Commissioner. There she created Privacy by Design (PbD), a framework that seeks to proactively embed privacy into the design specifications of information technologies, networked infrastructure and business practices, thereby achieving the strongest protection possible. In October 2010, regulators at the International [...]

Mark Bassegio

Mark Bassegio

Independent Security Consultant


Mark Bassegio is an offensive security expert that specializes in physical security and network security consulting. During his years in security, Mark has conducted and overseen hundreds of penetration tests all over the world in multiple industries and disciplines, for medium sized businesses to large Fortune 500 corporations. Mark has delivered presentations to audiences internationally and is the co-creator of the BLEKey, custom hardware designed to exploit weaknesses in proximity-based building access controls.

Eric Evenchick

Eric Evenchick

Embedded Systems Developer


For the past eight years, Eric has worked in development and reverse engineering roles for hardware and software companies. He has specialized in embedded devices, automotive systems, and bespoke tool development. He is currently a Senior Research Consultant at Atredis Partners. Eric’s work with embedded systems began with development of research vehicles at the University of Waterloo, in partnership with General Motors and the US Environmental Protection Agency. This experience lead to roles in developing automotive firmware and reverse engineering vehicle systems at companies including Tesla Motors and Faraday Future. [...]

Ben Hughes

Ben Hughes


Ben has worked in infrastructure and security for 15 years across 3 continents. He popped a shell once. Ben works on defensive security now, because he only has the hair for offensive research, not the skills.

Jason Brown

Jason Brown


Assistant to the Special Agent in Charge, Criminal Investigative Division, United States Secret Service Jason B. Brown is the Assistant to the Special Agent in Charge in the Secret Service’s Criminal Investigative Division. In this position, Mr. Brown manages the Cyber Intelligence Section which targets, identifies and apprehends the most prolific and profitable cyber criminals harming the United States. Additionally, he is responsible for overseeing the Secret Service’s network of 39 domestic and international Electronic Crimes Task Forces. From 2008-2009, Mr. Brown was detailed to the Executive Office of the [...]

Fahmy Kadiri

Fahmy Kadiri


Fahmy Kadiri has been providing complex security solutions to large, medium and small businesses across Canada for over 10 years. He has held various Analyst, Consulting, and Architect roles all with a detailed focus on the Cyber Security Industry. Fahmy is currently a Sr. Security Architect for Dell SecureWorks, supporting Large Enterprise clients in Canada and North Eastern United States.

Enzo Sacco

Enzo Sacco


Enzo Sacco is a senior information security leader with over 26 years of experience. He has worked in progressive, technical and management roles within the financial services industry. Over the course of his career, Enzo has held information security leadership roles in Information Technology with a focus on security development and automation, risk management, security standard and policy development, and security management. Most recently, Enzo has been involved with enterprise security operation management, vulnerability management, incident response and cyber threat management.

Quang Tu

Quang Tu


Quang Tu is a security professional who has been working in the industry for 4 years. A generalist through opportunity, he has experience with various security technologies from his roles as an administrator and as an analyst.  He is currently trying his hand at SIEM technology.

Christopher Elisan

Christopher Elisan


Christopher Elisan is a seasoned reverse engineer and malware researcher. He is currently the Principal Malware Scientist at RSA. He has a long history of digital threat and malware expertise, reversing, research and product development. He started his career at Trend Micro as one of the pioneers of TrendLabs. This is where he honed his skills in malware reversing. After Trend Micro, he built and established F-Secure's Asia R&D where he spearheaded multiple projects that include vulnerability discovery, web security, and mobile security. After F-Secure, he joined Damballa as their [...]

Harold Byun

Harold Byun


Harold Byun is currently Vice President of Product Management at Skyhigh Networks. Prior to Skyhigh, he worked at MobileIron, Zenprise (acquired by Citrix), and the Vontu/Symantec Data Loss Prevention group. His work in technology has focused on DLP, cloud and mobile application security, data containerization, and security intelligence. He is co-inventor on patented security risk visualization and scoring technology and holds an MBA from the Haas School of Business at UC Berkeley and a BA from Tufts.

Benjamin Brown

Benjamin Brown


Benjamin Brown currently works on incident response, systems architecture review, adversarial resilience, and threat intelligence at Akamai Technologies. He has degrees in both Anthropology and International Studies. Research interests include deepweb ethnographic studies, novel and side-channel attack vectors, radio systems, the psychology and anthropology of information security, metacognitive techniques for intelligence analysis, threat actor profiling, and thinking about security as an ecology of complex systems.

Joe Pizzo

Joe Pizzo


Joseph Pizzo, a veteran of the security industry with over 20 years of experience, currently serves proudly as part of the Norse Field Engineering Team. Prior to Norse, Joseph previously worked in varying engineering roles for RSA Security, AccessData, HBGary and Guidance Software. Joseph has spent significant time working with multiple global organizations to assist with their security infrastructure and is a valued and trusted resource for a large portion of Fortune 500 Corporations. Joseph's education includes Devry and Columbia University.

Amol Sarwate

Amol Sarwate


Amol heads Qualys' worldwide security engineering team responsible for vulnerability and compliance research. His team tracks emerging threats and develops software, which identifies new vulnerabilities and insecure posture for Qualys' VM, PC, PCI and QBC services. Amol is a veteran of the security industry and has devoted his career to protecting, securing and educating the community from security threats. Amol has presented his research on Vulnerability Trends, Security Axioms, SCADA security, Malware and other security topics at numerous security conferences, including RSA Conference, BlackHat, Hacker Halted, SecTor, BSides, InfoSec Europe, [...]

Reg Harnish

Reg Harnish


Reg Harnish (CISM, CISSP, CISA, ITIL) is an entrepreneur, speaker, security specialist and the CEO of GreyCastle Security. With nearly 15 years of security experience in Financial Services, Healthcare, Higher Education and other industries, Reg focuses on security solutions ranging from risk management, incident handling and regulatory compliance to network, application and physical security. Reg is a frequent speaker and has presented at prominent events, including the NYS Cyber Security Conference, US Cyber Crime, Symantec Vision, ISACA, ISSA, InfraGard and more. Reg's successes have been featured in several leading industry [...]

Raul Alvarez

Raul Alvarez

Senior Security Researcher


Raul Alvarez joined Fortinet in 2004, and is currently working as a Senior Security Researcher/ AV Team Lead.  He is also one of the Lead Trainers responsible for training the junior AV/IPS analysts in malware analysis and reverse engineering. Raul has presented in different conferences like BSidesVancouver, BSidesCapeBreton, OAS-First, BSidesOttawa, SecTor, and DefCamp. Raul has presented at the HASK security group and at the University of BC. He is a regular contributor to the Fortinet blog and also in the Virus Bulletin publication, where he has published 22 articles.

Ian Redden

Ian Redden


Bio for this speaker is unavailable at this time.

Marc Edun

Marc Edun


Bio for this speaker is unavailable at this time.

Atif Ghauri

Atif Ghauri


Atif Ghauri is the SVP of Channel Sales for Herjavec Group; developing strategic relationships to further our managed services practice. Atif has over 15 years of experience in technology strategy, implementation and business development from Comcast, IBM and Unisys. Prior to Herjavec Group, he spent four years at Comcast serving as the CISO for the advanced engineering group. He led all product and operational security work streams to launch next generation X1 Platform and Xfinity Home Security product and services. At Comcast, Atif invented and deployed a patent pending fraud [...]

Brad Antoniewicz

Brad Antoniewicz


Brad Antoniewicz works in Intel’s Foundstone's security research division to uncover flaws in popular technologies. He is a contributing author to both the "Hacking Exposed" and "Hacking Exposed: Wireless" series of books and has authored and contributed to various internal/external Foundstone tools, training courses, White Papers, and methodologies.

Bob DuCharme

Bob DuCharme


Bob DuCharme is a Principal Professional Services Engineer with Ixia. He was hired by BreakingPoint Systems in May 2012 and Ixia soon acquired BreakingPoint. In this position, Bob has responsibilities for training and professional services for all security related activities for customers of Ixia. Prior to working at Ixia, Bob was employed by Cisco Systems from June 1998 to July 2011. Bob held multiple positions while at Cisco, including training, security services, and working with higher education. Bob provided training for all of Cisco’s security products for thousands of customers and partners. [...]

Jessica Ireland

Jessica Ireland


Jessica Ireland has been an analyst with Info-Tech since 2011. She is a graduate of the Master of Arts in Journalism program at the University of Western Ontario, and also holds an Honours Specialization Bachelor of Arts in Political Science. She has delivered multiple client workshops on topics such as risk management, identity security services and PCI-DSS. During her time at Info-Tech, Ireland has become a resident subject matter expert in IT security and has been instrumental in creating the content for many security project blueprints on topics such as [...]

Ryan Linn

Ryan Linn


Ryan has more than 15 years of experience in Information Security. He has worked as a Technical Team Leader, Database Administrator, Windows and UNIX Systems administrator, Network Engineer, Web Application developer, Systems programmer, Information Security Engineer, and is currently a Principal Consultant doing network penetration testing. Ryan has delivered his research about ATM security, network protocol attacks, and penetration testing tactics at numerous conferences, including Black Hat, DefCon, DerbyCon, Shmoocon, and SecTor to name a few. He is also an open source project contributor for projects such as Metasploit, Ettercap, [...]

Simon Crosby

Simon Crosby


Simon Crosby is co–founder and CTO at Bromium. He has published more than 40 patents and papers in systems design, security and performance. He was founder and CTO of XenSource, acquired by Citrix, where he then served as CTO of the Virtualization & Management Division. Previously, Simon was a Principal Engineer at Intel where he led strategic research in distributed autonomic computing, platform security and trust. He was also the Founder of CPlane Inc., a SDN vendor. Prior to CPlane, Simon was a tenured faculty member at the University of [...]

Topher Timzen

Topher Timzen


Topher Timzen is a recent graduate of Southern Oregon University's Computer Science Security and Information Assurance program. He has focused on research in reverse engineering malware, incident response and exploitation development. In the Spring of 2015 he taught a course on Windows Memory Forensics and introduced students to Windows Kernel structures while using the Volatility framework.

Brendan O’Connor

Brendan O’Connor

Malice Afterthought, Inc.


Described by coworkers as "not the lawyer we need, but the lawyer we deserve," Brendan O’Connor is a security researcher, practitioner, and consultant based in Seattle, WA. He is admitted to the Montana bar, and serves as Vice-Chair of the ABA’s Information Security Committee; while he is a lawyer, he is not your lawyer. He was awarded two DARPA Cyber Fast Track contracts for his security research, which focuses primarily on enabling access to security and privacy through development of disposable computing and sensing tools. He has taught at an [...]

Jasbir Gill

Jasbir Gill


Jasbir Gill specializes in Identity and Access Management technologies and Mobility products and solutions. Jasbir has previously worked deploying these solutions as a part of Microsoft Consulting Services for over a decade, deploying solutions for customers around the world.

Lanny Cofman

Lanny Cofman


Hello, my name is Lanny Cofman. I’ve been with Microsoft for nearly 9 years in various roles. I spent 7 years in Services as a Premier Field Engineer (PFE), specializing in Identity and Active Directory. My last 2 years I’ve been a Technical Solutions Professional (TSP), also specializing in Identity within the Enterprise Mobility Suite (EMS) business. I’ve been in the IT industry for nearly 15 years as a technical subject matter expert, and have worked with hundreds of customers and partners throughout my tenure. I’ve delivered various services from [...]

Tim Rains

Tim Rains


Tim Rains is Chief Security Advisor of Microsoft’s Worldwide Cybersecurity & Data Protection group where he helps Microsoft’s enterprise customers with cybersecurity strategy and planning.  Formerly, Tim was Director Cybersecurity & Cloud Strategy in Trustworthy Computing at Microsoft, where he was responsible for managing marketing and corporate communications that span Microsoft’s products and cloud services as they relate to security, privacy and reliability.

Chayim Kirshen

Chayim Kirshen


Chayim is a veteran of the software industry with nearly twenty years of experience. He has helped release several operating systems, contributed to a variety of open-source projects, and built and maintained multiple datacenters and operations teams. With experience contributing at SGI, PlateSpin, Novell, Kobo, and Lyrical, Chayim has helped several organizations transition to Continuous Delivery, increasing both the speed and quality of software releases. Chayim established Lyrical Software, Canada's premier DevOps company in 2006, and has been working multiple cloud technologies ever since.

Ryan Poppa

Ryan Poppa


Ryan Poppa is a Lead Engineers at nCircle Network Security. They specialize in interrogating Applications and Services over the network. Their years of experience have been focused on the non invasive detection of vulnerabilities. Current Areas of research include; HTTP server analysis, graph theory, SSL library fingerprinting and unobfuscation techniques. Based in Toronto Ontario, they hold degrees from University of Guelph and the University of Waterloo. You can find their latest posts at blog.glaciertech.ca & numerophobe.com

Kellman Meghu

Kellman Meghu

Global Security Manager - Sycomp


Kellman Meghu is Global Security Manager at Sycomp, with a focus on infrastructure as code for public and private cloud. As part of his role he curates research, testing and development of public cloud infrastructure for Securing Labs. Past responsibilities have included day-to-day operational work in complex security networks, policy planning, management, and documentation responsibilities with various network, VoIP and security engineering companies. Kellman is an experienced speaker with original content, that has delivered security talks in private corporate focused events, at school internet safety classes for training students and [...]