More than 7000 new and unique vulnerabilities will be disclosed this year. CSOs, CISOs and security professionals in IT are expected to keep their organizations safe not only from these new flaws but also from a ton of older security issues. An effective way to prioritize and mitigate the most relevant issues is by analyzing […]
The pace of databreaches has reached epic proportions. Organizations large and small, in every industry are falling victim to hackers, hacktivists and nation states. Your intellectual property, data and bank accounts have never been at greater risk – it’s not if, but when your organization will be victimized. Testing and maintaining an effective Incident Response […]
Vawtrak, also called NeverQuest, is a banking malware that targets banks and other financial institutions all over the world. It is a sophisticated malware that challenges the likes of Zeus and other malevolent trojans. Vawtrak has been seen to bypass 2FA, captured video and screenshots, and also form part of a big botnet infrastructure. Vawtrak is a […]
This last minute session has no available abstract.
The past twelve months have seen an unprecedented number of vulnerabilities that strike at the core of the technologies that run our networks. This session will provide detailed demos of each of the major vulnerabilities released this year and discuss the impact for organizations. Attendees will hear from Brad Antoniewicz, Head of Research & Development […]
Organizations worldwide face a dangerous shortage of Cyber Warriors with the skills required to defend against cyber terrorism. This urgent situation is made worse by the weaknesses and vulnerabilities that continue to pervade critical IT infrastructures – despite billions of dollars invested in cyber security measures. Answering these problems requires Internet-scale simulation environments, along with […]
Metrics needn’t be meddlesome (alliteration!), as long as you’re measuring something. Focus on the metrics that make the most impact instead of trying to do it all. Regardless of your maturity level, you can still implement a metrics program. It comes down to value over quantity. Mix straightforward metrics like the overall reduction of incidents […]
Opposing Forces (OPFOR) training is used by the military to help create realistic scenarios so that when they are deployed in battle they aren’t encountering situations for the first time. Whether it’s battle or incident response, that reaction time is critical to the success of a team. Most organizations have some degree of penetration testing […]
The ring architecture of modern CPUs arose from the need to protect the OS kernel from malicious or buggy applications. Unfortunately today’s OSes use only two of the four rings of the x86 architecture – and today’s security challenges are the result. The complexity and large attack surface of a modern OS, together with trends […]
Jim will provide an in-depth background of the changing cyber threat landscape, with specific focus on recent incidents including the cyber attack on Sony Pictures Entertainment, the massive data breach at Anthem Healthcare, and the compromise at the US Office of Personnel Management of nearly every US government employees’ personal information. Jim will share his […]
This session will demonstrate attacking .NET applications at runtime. I will show how to modify running applications with advanced .NET and assembly level attacks that will give the ability to alter the control flow of any .NET application. New attack techniques and tools will be released to allow penetration testers to carry out advanced post […]
“Our data is only safe within our borders!” “(The US|China|New Zealand|Vanuatu) is spying on our citizens!” “Don’t ship our citizens’ data overseas!” These rallying cries are calling for the same solution: forced data localization laws, where a country requires that all its citizens’ and corporations’ data be kept within the territory of that country. What’s […]
Today, the topic of cyber-security has moved from IT and the datacenter to the highest levels of the boardroom. Attacks and threats have grown substantially more sophisticated in frequency and severity. Attackers reside within a network an average of eight months before they are even detected. In the vast majority of attacks, they compromise user […]
The CISO lives with a target on his/her back, usually lasts a mere 12-18 months and takes the fall for security issues often out of their control. Yet, this is a strategic, C-level position and essential to the success of any organization. The disconnect lies in the CISO being able to elevate their worth with their […]
Microsoft researchers have studied some of the exploits discovered over the past several years and the vulnerabilities they targeted. Understanding which vulnerabilities get exploited, who exploits them, the timing of exploitation, and the root causes, all help security professionals more accurately assess risk. Development practices that help minimize vulnerabilities will be discussed.
Infrastructure and application deployments are easy, but as security professionals we have to be conscious of the security concerns. Enter DevOps: pro-actively secure, reduce the attack surface, and automate changes at scale. Through a security focussed lens, we look at how embracing DevOps can reduce information security leakages for application and infrastructure deployments. In this […]
Is it possible to be successful in a vulnerability centric world? Once you have great vulnerability management data, what do you do with it? Join this session to learn how to find and focus on your true vulnerabilities to build stronger security. You will: Learn how to optimize your vulnerability management program Get best practices […]
This is the story one man’s personal trip to the cloud (and back) as he rebuilds his home network in a devops model, supported by virtual private cloud service. This presentation takes a micro look at cloud services, and the benefits and risks that come along with it for the average home user, as well […]
In this session, the topic of Software Defined Networking (SDN) will be explored from a security perspective. What SDN means today will be covered, using a lab setup using an OpenDaylight controller with networking gear from multiple vendors. Openflow, Netconf and Yang protocols will all be discussed, explored and exploited! Security and reliability issues that […]
Over the past couple of years, malware naming from Major AV companies has been collapsing into more generic signatures. Although this may speed up detection and maintenance for AV companies, it can impact small teams which use AV detections as one of the indicators to quantify events during malware triage. This talk will cover a […]
In this presentation, Dave will walk the attendees through the challenges facing most companies around dealing with vulnerabilities in their environments. Many companies are running tools or having scans performed against their network, and are being presented with a sea of information on discovered vulnerabilities along with information on how to address them. But most […]
Mobile devices are becoming the target of choice for cybercriminals. This presentation will provide an in-depth view of the mobile malware that is currently active on the Internet. It will describe the infection rates, what the malware does, how it is monetized and the impact it has on network resources and the user experience. The […]
Most network and security operations people hate automation. They like to press buttons themselves and maintain “control” of the processes. Cloud computing is going to be very disruptive as they realize their time tested processes go the way of the dodo bird. What they don’t realize is that the cloud actually increases the control they […]
It’s hard out there for a retailer. For one thing, there are particular challenges to securing a retail business, starting with thin margins and widely distributed environments, and ending with the overriding need to keep customers happy. For another, retailers are the targets of attacks both from criminals around the world and from those same […]
Every business needs to monitor their systems. As a combined view of all network activity, a SIEM can be a powerful tool when managed properly. However, deciding whether to manage network security in-house or off-loading your data to a third party can be a difficult decision. Discover the costs and benefits of in-house vs third-party […]
With cloud forensics picking up, Google has become one of the most important sources of information about anyone who uses one or more Android devices – or doesn’t use Android at all. Google Account aggregates information about the user’s online behavior and offline activities, analyzes their communication, recommending places to visit and things to read. […]
As the popularity of the Python programming language increases and consolidates its position as one of the most popular languages of its genre, only a few attempts have been made to assess how resistant it may be to attacks. We will review and test with practical examples some of the most common attack and defense mechanisms, by […]
Presently, managers and technical staff rely on a traditional reactive incident response process that starts when a security breach is identified – it allows the attacker to “seize the initiative”. DigitalDefence will present the Agile Incident Management (AIM) methodology, which stresses proactive planning in combination with a rapid and effective response to an attack. Using Canadian-specific […]
This presentation will cover distinct advantages of Incident Response by working closely with Penetration Testers to provide a more holistic view of the threats to your network. We will also further explore how a breach like this happens.
Wifi connected drug infusion pumps known as ‘Smart Pumps” have been used in hospitals for over a decade. What could go wrong? Answer: Death. They have recently been the target of much interest in the hardware hacking community. In this talk we will tear down one of these pumps and identify a number of security […]
This talk will discuss the risk posed by Cross Site Request Forgery (CSRF or XSRF) which is also known as session riding, or transaction injection. Many applications are vulnerable to XSRF, mitigation is difficult as it often requires re-engineering the entire application, and the threat they pose is often misunderstood. A live demo of identifying […]
According to Verizon’s 2015 Data Breach Investigations Report, one of the leading causes of data breaches over the past two years has been vulnerable applications. Yet, analytics collected by Veracode from more than 200,000 application risk assessments over the last 18 months found a wide disparity in how the problem is addressed across industries. In […]
When it comes to endpoint security, it has been said that the best way to keep an infected device from causing damage to the broader network is to keep it turned off once it is compromised. While this method of quarantining an endpoint may be a quick fix, for obvious reasons it is not very […]
Tired of threat intelligence anecdotes? How vendors just keep selling the idea that “more data is better data”? Join Alex in a scientific animated-GIF-powered data-driven analysis of what makes for a good threat intelligence feed and sharing community that is relevant to your environment and defense needs!
Ever been busted because your man in the middle software (which does TLS properly) alerted someone to your bad certificate? No more! Want to detect certain types of connections leaving your network, but can’t keep the IP blacklist up to date? This could be the answer. This talk includes an introduction to both TLS and […]
Increasingly, our lives are becoming entangled with gadgets that require more than simple installation, they require WiFi and an IP address. As we move from upholstered caves to house-shaped machines that automagically know when to turn lights on or off, raise or lower the temperature, unlock the front door upon our approach – we might […]
In today’s threat landscape, many corporate users are being compromised by exploit kits and phishing campaigns. These offensive techniques are successful because they target outdated software and unsuspecting users. There are tools and configuration options to help prevent the execution of malicious binaries, the exploitation of web browsers, and the third party applications that are […]
Threat Intelligence is a term frequently discussed within information security circles, with many firms offering commercial threat data feeds, using different frameworks and transport mechanisms detailed (including STIX and TAXII). Beyond the threat data generally offered, there are questions about exactly how useful and actionable such data can be. In this talk we will debut […]
For several years I developed and utilized various technologies and methods to track criminals leading to at least two dozen convictions. In the process of recovering stolen devices, larger crimes would be uncovered including drugs, theft rings, stolen cars, even a violent car jacking. Much of the evidence in these cases would be collected by […]
Today’s advanced malware hides in plain sight, patiently waiting to strike, challenging security teams to track its progress across their network and endpoints. As attacks are gaining speed and sophistication, the security industry is by delivering advanced big data analytics—analyzing data about data to block breach attempts, improve security everywhere, and retroactively respond to new […]
In this session we will demonstrate how to achieve continuous monitoring and mitigation capabilities that better leverage your infrastructure investments and optimize your IT resources. Most companies have deployed a number of technologies that make up the SANS Top 20, but the challenge is how to ensure these technologies integrate to provide the layers of […]
Machine learning-based (ML) techniques for network intrusion detection have gained notable traction in the web security industry over the past decade. Some Intrusion Detection Systems (IDS) successfully used these techniques to detect and deflect network intrusions before they could cause significant harm to network services. Simply put, IDS systems construct a signature model of how […]
The proliferation of devices like the Raspberry Pi, Pineapple Express, PwnPi and more make it easier (and cheaper) than ever to obtain a complete stealth attack or defense arsenal. In this session, we’ll take a low-cost, credit-card sized ARM computer, add some freely available software and see what we get. We’ll learn: what options are […]
Cybercrime makes victims of all who are targeted. In today’s thriving hyper-connected, global marketplace threat actors ruthlessly find IT gateways and disconnected system-doorways to crawl through, rendering enterprises sitting ducks looking over their shoulder and bracing for an inevitable attack. Well, what if you could flip the script? What if your enterprise could hunt for […]
Hundreds of millions of Android devices are at risk of being hijacked by a new and previously unknown threat. Certifi-gate is a set of vulnerabilities in the authorization methods between mobile Remote Support Tool (mRST) apps and system-level plugs used by virtually every Android device maker and network service provider. Exploitation gives malicious apps unrestricted […]
If we’re honest, we’re still making a lot of this security stuff up as we go, much like early pilots. The public was afraid of air travel and now it is a critical part of our lives. We wrestle with how to mature our profession. I believe information sharing will be one of the key […]
As technologies like Cloud and Mobility and processes like Agile Development have become mainstream, many enterprises large and small, have challenges not only keeping pace and leveraging these technologies to grow their business but also reducing risk to the business in an interconnected world. This session will provide best practices and experience from a CISO’s […]
Identity and access management (IAM) projects are traditionally some of the most important (and most difficult) security activities that organizations must undertake. We hear of companies in the fifth year of their two-year IAM project, millions of dollars over budget and there is no end in sight. It’s a common occurrence. But it doesn’t have […]
Vulnerability scanning is like flossing, some do it regularly, some only when they have an issue or having their annual checkup, and some not at all. The challenge is that like bacteria the bad guys don’t sit back and wait for you to get around to it, and like teeth your IT systems are never […]
While some believe that fundamental privacy protections will be challenged by the operation of Big Data analytics, Dr. Cavoukian dispels the notion that privacy acts as a barrier to analytics and the innovations they can spark. She argues that the limiting paradigm of “zero-sum” – that you can either have privacy or innovation, but not […]
Amol heads Qualys' worldwide security engineering team responsible for vulnerability and compliance research. His team tracks emerging threats and develops software, which identifies new vulnerabilities and insecure posture for Qualys' VM, PC, PCI and QBC services. Amol is a veteran of the security industry and has devoted his career to protecting, securing and educating the community from security threats. Amol has presented his research on Vulnerability Trends, Security Axioms, SCADA security, Malware and other security topics at numerous security conferences, including RSA Conference, BlackHat, Hacker Halted, SecTor, BSides, InfoSec Europe, [...]
Reg Harnish (CISM, CISSP, CISA, ITIL) is an entrepreneur, speaker, security specialist and the CEO of GreyCastle Security. With nearly 15 years of security experience in Financial Services, Healthcare, Higher Education and other industries, Reg focuses on security solutions ranging from risk management, incident handling and regulatory compliance to network, application and physical security. Reg is a frequent speaker and has presented at prominent events, including the NYS Cyber Security Conference, US Cyber Crime, Symantec Vision, ISACA, ISSA, InfraGard and more. Reg's successes have been featured in several leading industry [...]
Senior Security Researcher
Raul Alvarez joined Fortinet in 2004, and is currently working as a Senior Security Researcher/ AV Team Lead. He is also one of the Lead Trainers responsible for training the junior AV/IPS analysts in malware analysis and reverse engineering. Raul has presented in different conferences like BSidesVancouver, BSidesCapeBreton, OAS-First, BSidesOttawa, SecTor, and DefCamp. Raul has presented at the HASK security group and at the University of BC. He is a regular contributor to the Fortinet blog and also in the Virus Bulletin publication, where he has published 22 articles.
Bio for this speaker is unavailable at this time.
Bio for this speaker is unavailable at this time.
Atif Ghauri is the SVP of Channel Sales for Herjavec Group; developing strategic relationships to further our managed services practice. Atif has over 15 years of experience in technology strategy, implementation and business development from Comcast, IBM and Unisys. Prior to Herjavec Group, he spent four years at Comcast serving as the CISO for the advanced engineering group. He led all product and operational security work streams to launch next generation X1 Platform and Xfinity Home Security product and services. At Comcast, Atif invented and deployed a patent pending fraud [...]
Brad Antoniewicz works in Intel’s Foundstone's security research division to uncover flaws in popular technologies. He is a contributing author to both the "Hacking Exposed" and "Hacking Exposed: Wireless" series of books and has authored and contributed to various internal/external Foundstone tools, training courses, White Papers, and methodologies.
Bob DuCharme is a Principal Professional Services Engineer with Ixia. He was hired by BreakingPoint Systems in May 2012 and Ixia soon acquired BreakingPoint. In this position, Bob has responsibilities for training and professional services for all security related activities for customers of Ixia. Prior to working at Ixia, Bob was employed by Cisco Systems from June 1998 to July 2011. Bob held multiple positions while at Cisco, including training, security services, and working with higher education. Bob provided training for all of Cisco’s security products for thousands of customers and partners. [...]
Operational Security Manager
Jessica Ireland manages the operational security team for the City of London. Prior to her time in the public sector, she worked as a research lead for Info-Tech Research Group where she managed projects around critical information security processes such as security strategies, risk management governance, policies and technology selection decisions for organizations around the world.
Ryan has more than 15 years of experience in Information Security. He has worked as a Technical Team Leader, Database Administrator, Windows and UNIX Systems administrator, Network Engineer, Web Application developer, Systems programmer, Information Security Engineer, and is currently a Principal Consultant doing network penetration testing. Ryan has delivered his research about ATM security, network protocol attacks, and penetration testing tactics at numerous conferences, including Black Hat, DefCon, DerbyCon, Shmoocon, and SecTor to name a few. He is also an open source project contributor for projects such as Metasploit, Ettercap, [...]
Simon Crosby is co–founder and CTO at Bromium. He has published more than 40 patents and papers in systems design, security and performance. He was founder and CTO of XenSource, acquired by Citrix, where he then served as CTO of the Virtualization & Management Division. Previously, Simon was a Principal Engineer at Intel where he led strategic research in distributed autonomic computing, platform security and trust. He was also the Founder of CPlane Inc., a SDN vendor. Prior to CPlane, Simon was a tenured faculty member at the University of [...]
Jim Penrose is the EVP for Cyber Intelligence at Darktrace where he leads the firm¹s cyber operations team. A distinguished speaker, Jim has presented at the 2014 Cybersecurity Summit, the Gartner Security & Risk Management Summit, and the Suits and Spooks London 2014 meeting. Jim joins Darktrace following a distinguished 17 year career at NSA where he achieved the rank of Defense Intelligence Senior Level and was responsible for a variety of roles encompassing cyber threat analysis and counterterrorism. Most recently, as Chief of the Operational Discovery Center, Jim innovated [...]
Topher Timzen is a recent graduate of Southern Oregon University's Computer Science Security and Information Assurance program. He has focused on research in reverse engineering malware, incident response and exploitation development. In the Spring of 2015 he taught a course on Windows Memory Forensics and introduced students to Windows Kernel structures while using the Volatility framework.
Malice Afterthought, Inc.
Described by coworkers as "not the lawyer we need, but the lawyer we deserve," Brendan O’Connor is a security researcher, practitioner, and consultant based in Seattle, WA. He is admitted to the Montana bar, and serves as Vice-Chair of the ABA’s Information Security Committee; while he is a lawyer, he is not your lawyer. He was awarded two DARPA Cyber Fast Track contracts for his security research, which focuses primarily on enabling access to security and privacy through development of disposable computing and sensing tools. He has taught at an [...]
James Arlen is Aiven.io’s CISO bringing a mix of security and engineering background to DBaaS (database as a service). Over the past twenty plus years, James has been delivering information security solutions to Fortune 500, TSE 100, and major public-sector organizations. James is best described as: “Infosec geek, hacker, social activist, author, speaker, and parent.” His areas of interest include organizational change, social engineering, blinky lights and shiny things. In addition to his work at Aiven.io, James is a Contributing Analyst at the research firm Securosis, blogger/podcaster with Liquidmatrix Security [...]
Jasbir Gill specializes in Identity and Access Management technologies and Mobility products and solutions. Jasbir has previously worked deploying these solutions as a part of Microsoft Consulting Services for over a decade, deploying solutions for customers around the world.
Hello, my name is Lanny Cofman. I’ve been with Microsoft for nearly 9 years in various roles. I spent 7 years in Services as a Premier Field Engineer (PFE), specializing in Identity and Active Directory. My last 2 years I’ve been a Technical Solutions Professional (TSP), also specializing in Identity within the Enterprise Mobility Suite (EMS) business. I’ve been in the IT industry for nearly 15 years as a technical subject matter expert, and have worked with hundreds of customers and partners throughout my tenure. I’ve delivered various services from [...]
Co-Founder and CTO, Veracode
Chris Wysopal is Co-Founder, Chief Technology Officer at Veracode. Wysopal co-founded the company in 2006 and oversees technology strategy and information security. Prior to Veracode, Chris was vice president of research and development at security consultancy @stake, which was acquired by Symantec. In the 1990’s, Chris was one of the original vulnerability researchers at The L0pht, a hacker think tank, where he was one of the first to publicize the risks of insecure software. He has testified to the US Congress about government security and how vulnerabilities are discovered in software. [...]
Tim Rains is Chief Security Advisor of Microsoft’s Worldwide Cybersecurity & Data Protection group where he helps Microsoft’s enterprise customers with cybersecurity strategy and planning. Formerly, Tim was Director Cybersecurity & Cloud Strategy in Trustworthy Computing at Microsoft, where he was responsible for managing marketing and corporate communications that span Microsoft’s products and cloud services as they relate to security, privacy and reliability.
Chayim is a veteran of the software industry with nearly twenty years of experience. He has helped release several operating systems, contributed to a variety of open-source projects, and built and maintained multiple datacenters and operations teams. With experience contributing at SGI, PlateSpin, Novell, Kobo, and Lyrical, Chayim has helped several organizations transition to Continuous Delivery, increasing both the speed and quality of software releases. Chayim established Lyrical Software, Canada's premier DevOps company in 2006, and has been working multiple cloud technologies ever since.
Ryan Poppa is a Lead Engineers at nCircle Network Security. They specialize in interrogating Applications and Services over the network. Their years of experience have been focused on the non invasive detection of vulnerabilities. Current Areas of research include; HTTP server analysis, graph theory, SSL library fingerprinting and unobfuscation techniques. Based in Toronto Ontario, they hold degrees from University of Guelph and the University of Waterloo. You can find their latest posts at blog.glaciertech.ca & numerophobe.com
Global Security Manager - Sycomp
Kellman Meghu is Global Security Manager at Sycomp, with a focus on infrastructure as code for public and private cloud. As part of his role he curates research, testing and development of public cloud infrastructure for Securing Labs. Past responsibilities have included day-to-day operational work in complex security networks, policy planning, management, and documentation responsibilities with various network, VoIP and security engineering companies. Kellman is an experienced speaker with original content, that has delivered security talks in private corporate focused events, at school internet safety classes for training students and [...]
Rob VandenBrink is a consultant with Coherent Security in Ontario, Canada. He is also a volunteer with the Internet Storm Center (https://isc.sans.edu), a site that posts daily blogs on information security and related stories. His areas of specialization include all facets of Information Security, Network Infrastructure, Network and Datacentre Design, Automation, Orchestration and Virtualization. Rob has developed tools for ensuring policy compliance for VPN Access users, a variety of networking tools native to Cisco IOS, as well as security audit/assessment tools for both Palo Alto Networks Firewalls and VMware vSphere. [...]
Sean is a researcher and incident responder with experience in malware analysis and reverse engineering. He is also an active contributor to open source security tools focused on incident response and analysis. Prior to PhishMe, Sean worked in a number of incident response and application security roles with a focus on security testing and threat modeling. He also loves fly fishing.
CSO of Quick Intelligence
Dave Millier is a serial entrepreneur, off-road motorcycle rider and food lover. Dave has been involved in cybersecurity for almost 25 years. He founded the InfoSec company Sentry Metrics, one of Canada’s most successful MSSPs. After the sale of Sentry Metrics, Dave’s lifelong passion for reading led him to finally sit down and write his first book, Breached! In late 2014, Dave launched Uzado (http://www.uzado.com), a cloud-based InfoSec company focused on helping companies simplify cybersecurity by answering the questions “what now?” or “what next?” Dave sold Uzado in 2019. Dave [...]
Kevin McNamee is a seasoned IT security professional with over 30 years of experience in product development and security research. As director of Alcatel-Lucent’s Motive Security Labs he is responsible for the security research team that does the malware analysis and research to support Alcatel-Lucent’s cloud based malware detection system. Previously he was director of security research at Alcatel-Lucent’s Bell Labs specializing in the analysis of malware propagation and malware detection. He has recently presented at RSA, BlackHat, SECTOR, Virus Bulletin and BSides conferences.
Mike Rothman is a 25-year security veteran. He specializes in the sexy aspects of security, like protecting networks and endpoints, security management, compliance, and helping clients navigate a secure evolution to the cloud. He’s a busy guy, serving both as President of DisruptOPS, as well as Analyst & President of Securosis. This is a good thing since Mike gets into trouble when he’s not busy enough.
Wendy Nather leads the Advisory CISO team at Cisco. She was previously the Research Director at the Retail ISAC, and Research Director of the Information Security Practice at 451 Research. Wendy led IT security for the EMEA region of the investment banking division of Swiss Bank Corporation (now UBS), and served as CISO of the Texas Education Agency. She was inducted into the Infosecurity Europe Hall of Fame in 2021. Wendy serves on the advisory board for Sightline Security, and is a Senior Cybersecurity Fellow at the Robert Strauss Center [...]
Jeff Pold is Director of Security Information Services, SpiderLabs Research at Trustwave. He manages the SIS teams in Canada and Poland, which focus on supplying parsing support and reporting content for the various Trustwave SIEM product lines, as well as Trustwave MSS. Jeff started working with SIEM in 2004 at Intellitactics, which was then acquired by Trustwave in 2010.
Ron Pettit is a Senior Security Information Specialist with Spiderlabs Research at Trustwave. Ron is based out of the Cambridge, Ontario Trustwave office, and spends his time working across various SIEM platforms, delivering content and assisting in SIEM R&D. Ron’s career at Trustwave began five years ago, in 2010, following a five-year stint in online advertising.
CEO, ElcomSoft Co.Ltd
Vladimir Katalov is CEO, co-owner and co-founder of ElcomSoft Co.Ltd. He studied Applied Mathematics at the Moscow Engineering-Physics Institute (State University). Vladimir manages all technical research and product development for the company. He regularly presents at events and runs IT security and computer forensics training both for foreign and domestic computer investigative committees and other organizations.
Independent Security Consultant
Mark Bassegio is an offensive security expert that specializes in physical security and network security consulting. During his years in security, Mark has conducted and overseen hundreds of penetration tests all over the world in multiple industries and disciplines, for medium sized businesses to large Fortune 500 corporations. Mark has delivered presentations to audiences internationally and is the co-creator of the BLEKey, custom hardware designed to exploit weaknesses in proximity-based building access controls.
Embedded Systems Developer
Eric has worked in development and reverse engineering roles for hardware and software companies, specializing in embedded devices, automotive systems, and bespoke tool development. He is currently a Principal Research Consultant at Atredis Partners. Eric’s work with embedded systems began with development of research vehicles at the University of Waterloo, in partnership with General Motors and the US Environmental Protection Agency. This experience lead to roles in developing automotive firmware and reverse engineering vehicle systems at companies including Tesla Motors and Faraday Future. In 2014, Eric founded Linklayer Labs, which [...]
Robert Beggs breaks into computers and data networks. As an ethical hacker and incident responder, he identifies and closes the vulnerabilities that could be exploited to create a security breach. He has been responsible for the technical leadership and project management of multiple successful responses to data loss. His experience has driven the development of the AIM methodology, used to effectively respond to a breach. His clients range from banks and insurance companies to small and medium enterprises. Robert holds an MBA in Science and Technology from Queen's University and [...]
Grayson Lenik is Director of Digital Forensics and Incident Response, part of Nuix’s Cyber Threat Analysis Team. He has worked in information security and digital technology for more than 20 years. Grayson has researched and presented on anti-forensics, cybercrime operations, and incident response methodology at conferences including DEFCON, SecTor, NetDiligence Cyber Risk Forum, International Association of Financial Crimes Investigators, and Electronic Crimes Special Agent Program. Grayson regularly instructs law enforcement and private organizations in incident response and digital forensics. He was the primary instructor for the United States Secret Service [...]
Jeremy has spent the last two decades becoming an expert in both exploitation and detection and AI technologies. Most recently, he was a Principal Security Intelligence Engineer at Lookout, where he created the machine learning models behind Lookout’s PhishingAI and assisted in discovering APT threats on mobile globally. Previously, he was a senior security research engineer at Saint, Digital Defense, and nCircle. Jeremy is passionate about AI and machine learning, feature engineering for anti-malware, and anomaly detection.
Adrien de Beaupré is a certified SANS instructor and works as an independent consultant in beautiful Ottawa, Ontario. His work experience includes technical instruction, vulnerability assessment, penetration testing, intrusion detection, incident response, and forensic analysis. He is a member of the SANS Internet Storm Center (isc.sans.edu). Adrien is actively involved with the information security community, and organizes the BSidesOttawa conference. When not geeking out and breaking stuff he can be found with his family, or at the dojo.
John Beal is the National Security SaaS Leader for Canada. Previously he was the Sales Leader for Mobility and Endpoint Solutions across Canada and the Caribbean. He has 20 years of experience with IBM across both Hardware and Software.
Alex Pinto is the Chief Data Scientist of Niddel and the lead of MLSec Project. He is currently dedicating his waking hours to the development of machine learning algorithms and data science techniques to support the information security monitoring practice. So far, he has presented the results of his research at multiple conferences, including Black Hat USA, DEFCON, BSidesLV, ISC2 Security Congress and now SecTor! He has almost 15 years dedicated to all-things information security, and 3 years in Data Science-y related work. If you are into certifications, Alex is currently a [...]
Director of Security, Ecobee
Lee has worked within Information Security for over a decade. In that time he has held positions ranging from hands-on practitioner through to management across a number of industry verticals, he is currently the Director of Security at Ecobee. He has spoken on topics ranging from malware analysis to network security and surveillance.
Director of Product Management
I help architect and deploy solutions to prevent, detect and respond to security incidents. I work on the Field CTO Team at eSentire Inc.
CEO at Autohost.ai
Roy is a strategist, seasoned hacker and expert in cyber security, business development and project management. He has a background in security, programming, research, management, marketing and sales with a unique ability to manage multi-disciplinary projects while navigating complex cyber challenges. Roy’s passion lies in Big Data and Machine Learning, especially when applied to cyber security. As a multi-linguist of technology-driven business, he speaks fluent geek, marketer, designer, salesperson and investor.
Ken Westin is a security analyst and "creative technologist" with 15 years experience building and breaking things through the use/misuse of technology. His technology exploits and endeavors have been featured in Forbes, Good Morning America, Dateline, the New York Times and others. He has worked with law enforcement and journalists utilizing various technologies to unveil organized crime rings, recover stolen cars, even a car jacking amongst other crimes.
Security Practice Manager
Mr. Read has over 20 years of experience in the IT industry and an extremely broad skill set when it comes to the security of an organization’s critical IT infrastructure. Mr. Read has been in charge of IT Security Professional Service Delivery for over 10 years and is primarily responsible for: Leading a Security resource team responsible for vulnerability and risk assessments for some of Canada’s largest infrastructures; and Designing and deploying advanced security solutions from the SANs TOP 20 Critical Control list. By leading large projects in the areas [...]
Clarence recently graduated with a B.S. and M.S. in Computer Science from Stanford University, specializing in data mining and artificial intelligence. He currently works at Shape Security, a startup in Silicon Valley building a product that protects its customers from malicious bot intrusion. At Shape, he works on the system that tackles this problem from the angle of big data analysis. Clarence is a community speaker with Intel, traveling around the USA speaking about topics related to the Internet of Things and hardware hacking. He is also the organizer of [...]
Todd is an IT security specialist, author of Cryptogeddon & CF Fundraiser. Todd is an operational expert with extensive experience architecting, implementing and maintaining mission critical, secure, always-on internet based systems and processes. Todd is well versed in IT security, risk management and corporate governance. Todd has earned his Certified Information Systems Auditor (CISA) and Project Management Professional (PMP) designations. Todd has spoken at numerous local and national security events including Sector, TASK, Software Hamilton and the International Association of Privacy Professionals Privacy Symposium. Todd's wife & kids, faith, baseball, [...]
Keith started out in the early 80's developing programs to exchange data packets between bulletin board systems. Since then, he has crossed all domains from system administration, operations, databases and programming with extensive experience implementing and designing solutions on Microsoft and Linux platforms. Keith developed an interest in training, becoming a Microsoft Certified Trainer (MCT) which drove a need to earn nearly every Microsoft certification, Keith prefers to call it his MC* designation. Keith is an undergraduate working towards a distant PhD in Computer Science, and when not studying or [...]
Shai is a security industry expert with more than 12 years of experience in cyber security, data analytics and product management. He has a proven track record of turning cutting-edge research and technology into products that solve complex problems and is currently a product manager for Check Point Mobile Prevention. Prior to this role, he was a data scientist at Lacoon Mobile Secudity which was acquired by Check Point in April of 2015. As a member of the Tel-Aviv University’s Applied Machine Learning Group, he collaborated with a range of [...]
Trey Ford is the Global Security Strategist at Rapid7 where he serves as a customer resource, industry and community advocate. Over the last 15 years, Trey ran Black Hat events worldwide as General Manager, and served functions ranging from incident response, product management, PCI QSA and security engineer for a variety for industry leaders including Zynga, McAfee, FishNet Security and WhiteHat Security.
President of Acuity Solutions Kris Lovejoy is currently President of Acuity Solutions, provider of the BluVector Advanced Malware Detection and Analysis Platform. Before joining Acuity in Jun 2015, Kris spent +20 years running security businesses and managing security operations: As GM of IBM’s Security Services Division; IBM’s Global CISO; CTO of Consul Risk Management which was acquired by IBM in 2007; VP of Security Assurance Services for TruSecure. A recognized security expert, Kris has been granted numerous externals awards, including 2015 recognition in SC Magazine’s 25 Year Retrospective as one [...]
Jeremy Hanlon is a 15-year software industry veteran and currently responsible for evangelizing all Dell Software products with a specialty in Security for G500 customers across the United States and Canada. Prior to his current position, Jeremy served in various roles at Dell, including Mobility, Big Data and Virtualization/Cloud. He has more than 15 years of experience in Microsoft-focused corporate IT environments. Before joining Dell in 2011, Jeremy worked for PlateSpin (acquired by Novell) and SmartForce (acquired by SkillSoft). Jeremy brings hands-on experience in large scale server consolidation projects including [...]
Dr. Ann Cavoukian is recognized as one of the world’s leading privacy experts. She is presently the Executive Director of the Privacy and Big Data Institute at Ryerson University. Appointed as the Information and Privacy Commissioner of Ontario, Canada in 1997, Dr. Cavoukian served an unprecedented three terms as Commissioner. There she created Privacy by Design (PbD), a framework that seeks to proactively embed privacy into the design specifications of information technologies, networked infrastructure and business practices, thereby achieving the strongest protection possible. In October 2010, regulators at the International [...]