Past Events



Sesssions


13:55 - 14:24 Expo Theatre (Hall G) '

FAIL Panel

Join James Arlen and co. as they reflect on their careers and discuss the challenges (and failures) of being an InfoSec professional.

Sponsor Track
James Arlen
14:55 - 17:00 Keynote Hall '

Developing your Career in IT Security

2:55 to 3pm: Introduction (Brian Bourne) 3 to 4pm: Career Panel Panel Session: Developing Your Career in IT Security The IT security industry continues to rapidly evolve.  With this rate of change comes both opportunity and challenges.  There are more areas of specialization and more types of employers to apply them to.  Come to what […]

Career
Adrien de Beaupré
Brian Bourne
Laura Payne
Mike Murray
14:40 - 15:10 Expo Theatre (Hall G) '

Defending Against Phishing: Effective Phishing Incident Response Using Employees, Incident Responders, and Intelligence.

As the security industry has continued to under invest in the human element of security, phishing has become the top attack vector for cyber criminals. Breaches continue to occur in record numbers, identification takes an exorbitantly long time, and the most preferred target is an organization’s people. Effective phishing defense and incident response involves empowering […]

Sponsor Track
Mike Saurbaugh
10:15 - 11:15 Tech1 (718A) '

Securing Network Communications: An Investigation into Certificate Authorities on Mobile

This talk will take an in-depth look at the certificate authorities (CAs) found on mobile devices today. The CAs included in our mobile devices make up the roots of trust that our secure network transactions rely on to validate that the servers we are talking to are who they say they are. Focusing specifically on […]

Tech
Andrew Blaich
10:15 - 11:15 Tech 2 (801A) '

Control system security, are we living on luck?

Control systems are all around us, working in the background of our lives providing us light, water, heat, transportation, and many good things. These systems are becoming more digital and more connected than ever before, so we must consider control system security just like we do with IT systems. We certainly have seen a jump […]

Tech
Chris Sistrunk
11:30 - 12:00 Management (718B) '

Held for Ransom: Defending your Data Against Ransomware

This session will detail the evolution of ransomware, its methods of infection, and ways an organization can help protect itself and avoid having to pay a ransom. Hear from a Trustwave SpiderLabs forensic expert analyze a ransomware infection and its actions on a compromised system. Ransomware requires that we reassess our access control, intrusion detection, […]

Sponsor Track
James L. Antonakos
11:30 - 12:00 Tech 2 (801A) '

Lessons from the Attack Chain: Bolster Your IR Program

It’s challenging to build out your Incident Detection & Response program when you’re wading in alerts and expected to cover cloud services, contractors, and remote workers, as well as your core infrastructure. In this session, Eric Sun will cover best practices from Rapid7’s Incident Response and Penetration Testing teams, and share the top gaps in […]

Sponsor Track
Eric Sun
11:30 - 12:00 Expo Theatre (Hall G) '

Network virtualization to enhance context, visibility and containment

Looking at the assumptions underlying threat analysis tools in general, this session will examine how network virtualization, micro-segmentation and automation of policies are improving fundamental security properties such as context, visibility and threat containment, improving significantly the efficiency of these tools We will first look at the assumptions underlying threat modeling in general, the biggest […]

Sponsor Track
Bruno Germain
13:25 - 13:55 Expo Theatre (Hall G) '

Securing a Cloud-Based Data Center

Interest in Cloud Computing continues to gain traction in Canada as evidenced by both Microsoft Azure and Amazon AWS opening Canadian based datacenters in 2016.  Trend Micro is helping deliver security controls in these environments by enabling automated deployment, management and reporting through standard devop configuration management tools such as CHEF, Puppet and Ansible.  Join […]

Sponsor Track
Peter Cresswell
11:30 - 12:00 Expo Theatre (Hall G) '

Global Encryption Usage is on the Rise!

In this session, Thales e-Security will discuss the global use of encryption – from backups to big data, from the data center to the cloud, and much more. Focusing on an independent research study conducted by the Ponemon Institute on behalf of Thales e-Security, we will address features of encryption solutions users find the most valuable […]

Sponsor Track
Si Brantley
15:55 - 16:25 Expo Theatre (Hall G) '

Next-Gen Now, Outsmarting ransomware, exploits and zero-day attacks

From rootkits to ransomware, old school security tools and strategies can’t keep pace with today’s advanced attacks. To be effective, you need to thwart the attack methods of advance persistent threats, leverage next-generation endpoint and network security intelligence to detect and isolate attacks, and address critical alerts with contextual security intelligence.  Join us to learn […]

Sponsor Track
Keir Humble
10:15 - 10:45 Expo Theatre (Hall G) '

Overwhelmed By Security Vulnerabilities? Learn How To Prioritize Remediation

IT departments are expected to protect their organizations from existing vulnerabilities and from the thousands of new ones disclosed every year. Unfortunately, when it comes to vulnerability remediation, many organizations face an excess of cyber-threats and a shortage of infosec professionals. To weather this storm, IT departments must prioritize remediation, so that they can promptly […]

Sponsor Track
Amol Sarwate
10:15 - 10:45 Expo Theatre (Hall G) '

Understanding Ransomware: Clear and Present Danger

Ransomware is a family of malware that ranks as one of the most dangerous of modern times. It is not a matter of how you will be infected, but a matter of when. In this presentation, we will look at some of the ransomwares in the wild and how they propagate and infect machines. We […]

Sponsor Track
Raul Alvarez
14:40 - 15:10 Expo Theatre (Hall G) '

Exposing Ransomware: Intelligent cybersecurity for the real world.

Ransomware has become a global plague costing organizations billions worldwide. It has moved from a single user-infection model to a network-wide infection model, recently bringing many sophisticated organizations to their knees. In the first half of this interactive discussion we will dive deep into the ransomware attack chain, examining how attackers leverage blind spots in […]

Sponsor Track
Sean Earhard
13:25 - 13:55 Expo Theatre (Hall G) '

The Industry Need for Cloud Generation Security

The unprecedented power of cloud applications has opened up amazing new possibilities for IT organizations, lines-of-business, and users to empower work needs. Whether sanctioned or not, these cloud applications can have a dark side. The rapid pace of adoption has left most security and compliance teams behind. Users, devices and data are now interacting with a variety of […]

Sponsor Track
Ryan Leonard
11:30 - 12:00 Tech 3 (801B) '

An Effective Approach to Automating Compliance Activities

It seems that every day another company is breached, and a new standard or framework is proposed to help us handle this cybersecurity crisis. What most companies realize, although the regulators don’t seem to, is that we’re already overwhelmed performing our day-to-day tasks; adding these additional compliance activities onto our workload simply doesn’t work, at least […]

Sponsor Track
Dave Millier
11:30 - 12:00 Management (718B) '

The Cyber Security Readiness of Canadian Organizations

We surveyed 654 IT and IT security practitioners in Canada to answer the following questions: Do organizations feel more or less prepared to deal with attacks than last year? How have cyber attacks targeting Canadian organizations changed in the past year? What is the average cost of cyber attacks for Canadian organizations? What cyber security […]

Sponsor Track
Ryan Wilson
11:30 - 12:00 Security Fundamentals (803) '

Rethinking Threat Intelligence

Optiv research has identified that one of the key challenges to Cyber Threat Intelligence providing impact is that the term “threat intelligence” has become heavily diluted and attached to a very diverse array of products, services and capabilities which are not easily adopted across the various enterprise security use cases. Our experience has shown that […]

Sponsor Track
Danny Pickens
11:30 - 12:00 Tech1 (718A) '

Eliminating the Automation and Integration Risks of the “Security Frankenstein”

The solution workflow of today’s Security Operations Center (SOC) can be described as a “Security Frankenstein”—where each “limb” is a disparate solution that has been cobbled together in hopes of “orchestrating” the steps in the security kill chain. The result is an ineffective, costly, and cumbersome approach to the security workflow that increases risk and […]

Sponsor Track
Chris Pogue
11:30 - 12:00 Tech 2 (801A) '

The Emerging Era of Cognitive Security

Today, businesses and data security leaders are looking for ways to better anticipate and even predict threats before they happen. Companies have a huge amount of data to process and very little time to do it, and new forms of targeted attacks have evolved. These new threats require new thinking, and that’s where the latest […]

Sponsor Track
Peter Allor
11:30 - 12:00 Tech1 (718A) '

Why Technology is Not the Answer to Cybersecurity

Protecting yourself from a cyberattack is no longer about technology. While technology is inherently important to any cybersecurity solution, it’s only one piece of the puzzle. And more often than not, the other two pieces are overlooked: people and process. Before adopting the next security technology trend, it’s important to understand what you’re trying to […]

Sponsor Track
Sean Blenkhorn
11:30 - 12:00 Tech 3 (801B) '

Stopping the Attacker You Know

One of the most challenging threats to mitigate is the “trusted employee”.   They have a position on the inside of your network, they have ownership of a trusted computer and they have basic knowledge of the information assets available. This presentation uses data from our penetration testing team to describe the specific techniques any employee […]

Sponsor Track
Brian Read
11:30 - 12:00 Security Fundamentals (803) '

When ‘Oops’ Isn’t An Acceptable Answer

You probably have an IT budget which includes security to some extent. You realize security is important but just don’t have the amount of people that you need to handle the influx of new exploits as well as manage day to day operations. Learning from others is always a good practice, however with most companies, […]

Sponsor Track
Greg Pepper
09:00 - 10:00 Keynote Hall '

Defense Against the Dark Arts: Examining, Fixing and Fighting for our Cyber Defenses

We live in an age where spies have weakened our security in the wake of 9/11, while hackers and digital security breaches ensure compromised data is made instantly available to billions of eyes. So what should we know, and what can we do to protect ourselves and our interests, and how can we defend our […]

Keynote
Edward Snowden
12:00 - 13:10 Keynote Hall '

Securing Our Future

Technology around us is changing faster than ever. We’ve already become dependent of our digital devices, and this is just the beginning. As connected devices open new opportunities for imagination, they also open up new opportunities for online criminals. Where are we today? Where are we going? And how are we ever going to secure […]

Keynote
Mikko Hypponen
14:40 - 15:40 Tech1 (718A) '

Lessons Learned Hunting IoT Malware

Permeating the entire spectrum of computing devices, malware can be found anywhere code is executed. Embedded devices, of which many are a part of the Internet of Things (IoT), are no exception. With their proliferation, a new strain of malware and tactics have emerged. This presentation will discuss our lessons learned from reverse-engineering and hunting […]

Tech
Olivier Bilodeau
15:55 - 16:55 Tech1 (718A) '

Crash Course in Kubernetes & Security

Kubernetes is Google’s answer to container orchestration and some of the tools it provides developers are indistinguishable from black magic. However, with the power that it provides it also can let you fall into some security holes that are hard to climb out of. In this presentation we’ll go through those pitfalls, along with some […]

Tech
Matt Johansen
13:25 - 14:25 Tech1 (718A) '

AirBnBeware: short-term rentals, long-term pwnage

What’s scarier, letting HD Moore rent your house and use your home network for day or being the very next renter that uses that network? With the colossal growth of the vacation rental market over the last five years (AirBnb, HomeAway), travellers are now more vulnerable than ever to network based attacks targeted at stealing […]

Tech
Jeremy Galloway
13:25 - 14:25 Security Fundamentals (803) '

Can massive data harvesting drive down the time to breach detection?

With the time to breach detection remaining at 100-200 days and the 100’s of millions of dollars that will be lost to ransomware this year, it is safe to say that modern, relentless attackers have revealed a fundamental flaw in the traditional layered defense model. Any individual layer, when it receives updated security intelligence, does […]

SECurity FUNdamentals
Sean Earhard
14:40 - 15:40 Management (718B) '

Safety Should be the Security Paradigm

The main government approach to cybersecurity has been to think of it through the lens of the military and intelligence community. After all that is where the most expertise lies today. This lens is problematic going forward. We should instead be looking to the way the government thinks of safety: for transportation, disease, consumer products, […]

Management
Chris Wysopal
14:40 - 15:40 Management (718B) '

How to Rob a Bank or The SWIFT and Easy Way to Grow Your Online Savings

Bank heists make great stories.  This year, we’ve got some really good stories to tell courtesy of a trusted network known as SWIFT, and some banks that believed they were inherently protected by virtue of being connected – except they weren’t. Hundreds of millions of dollars have revealed some ugly truths and dangerous assumptions.  In […]

Management
Cheryl Biswas
10:15 - 11:15 Security Fundamentals (803) '

Lighting up the Canadian Darknet Financially

Most are familiar with the term Darknet. Many have ventured a few times out of curiosity. For us, Darknet is an untapped source of Threat Intelligence and in some cases amusement. The news you see online about things being sold on the Darknet generally focuses on the United States, Russians, credit cards and drugs. While those are […]

SECurity FUNdamentals
Milind Bhargava
Peter Desfigies
14:40 - 15:40 Security Fundamentals (803) '

The Power of DNS: Gaining Security Insight Through DNS Analytics

DNS is a critical component to all technology running on an enterprise network. Whether it is IT infrastructure, a corporate server, a desktop, a laptop, a POS system, external devices connected to a guest network or even unmanaged devices, such as smart phones or any other connected “thing,” they all use DNS to communicate internally and […]

SECurity FUNdamentals
Scott Penney
13:25 - 14:25 Management (718B) '

Getting Business Value from Penetration Testing

Penetration tests rarely improve a client’s security. We know this because last year’s test feels horribly close to this year’s. In terms of value to the business, they fall flat in most ways – they are misunderstood from the start, during the test, and at the report. We want to dispel the confusion and tie […]

Management
Mark Bassegio
Tim West
14:40 - 15:40 Tech 2 (801A) '

Hiding in Plain Sight – Taking Control of Windows Patches

On the second Tuesday of every month, Windows administrators stand ready to deploy the swarm of patches issues by Microsoft addressing new vulnerabilities found on mission-critical systems.  Although this patch management routing may have system admins feeling overwhelmed, Patch Tuesdays are expected, allowing them to plan accordingly for the maintenance windows. But IT organizations are […]

Tech
Travis Smith
15:55 - 16:55 Tech 3 (801B) '

Hack Microsoft by using Microsoft signed binaries

PowerMemory is a PowerShell post-exploitation tool. It uses Microsoft binaries and as such is able to execute on a machine, even after the Device Guard Policies have been set. In the same way, it will bypass antivirus detection. PowerMemory can retrieve credentials information and manipulate memory. It can execute shellcode and modify process in memory (in userland […]

Tech
Pierre-Alexandre Braeken
14:40 - 15:40 Tech 3 (801B) '

Open Source Malware Lab

The landscape of open source malware analysis tools improves everyday. A malware analysis lab can be thought of as a set of entry points into a tool chain. The main entry points are a file, a URL, a network traffic capture, and a memory image. This talk is an examination of the major open source […]

Tech
Robert Simmons
13:25 - 14:25 Tech1 (718A) '

WiFi Exploitation: How passive interception leads to active exploitation

When was the last time you thought to yourself, hmm, I wonder if an attacker is exploiting my smart phone and laptop as a result of merely leaving my WiFi enabled? Or, when did you think: I wonder if a person can create a profile about me and possibly determine where I live, work, and […]

Tech
Solomon Sonya
10:15 - 11:15 Tech1 (718A) '

How To Secure Serverless Applications

Serverless applications offer a number of fantastic benefits that let you focus almost exclusively on solving your user’s problems. Relieved of the daily operations burden of traditional deployments, teams often think that security is taken care of inherently in the design. Nothing could be further from the truth. In this talk, we’ll explore how to […]

Tech
Kellman Meghu
15:55 - 16:55 Security Fundamentals (803) '

The Security Problems of an Eleven Year Old and How To Solve Them

This presentation explains the problems a child can encounter in the digital world. It covers subjects including siblings gaining control of your devices and online accounts, outside attackers doing those same two things, and your parents restricting what you can access on the internet. Kids face a unique set of problems that have not yet […]

SECurity FUNdamentals
Jake Sethi-Reiner
12:00 - 13:10 Keynote Hall '

Retaking surrendered ground: making better decisions to fight cybercrime

Every organisation that stores, processes or transmits valuable data will fall victim to a cybersecurity breach. But why? If we know the enemy is coming, and how they’re going to attack, why can’t we stop them?  Or even put up a good fight?  New research makes it clear that for the past 15 years we […]

Keynote
Chris Pogue
10:15 - 11:15 Management (718B) '

Data-Driven Computer Security Defense

This talk is focused on some of the biggest problems associated with computer security defenses. Main topics include: Misaligned defenses Lack of focus on root-causes Lack of focus on local current and historical exploits Lack of data in driving computer security defense decisions Roger will discuss how things got this way and how to fix […]

Management
Roger Grimes
10:15 - 11:15 Management (718B) '

Introducing G.Tool – A batteries included framework for building awesome GRC tools without wasting money.

Do you need a GRC tool but can’t afford the cost of one? Let’s use a batteries included automation first framework to rapidly assemble our own tools that work in the way you want. We won’t create anything with a web interface but we will be able to manage large amounts of information using existing […]

Management
Ben Sapiro
15:55 - 16:55 Management (718B) '

Security by Consent, or Peel’s Principles of Security Operations

Are you tired of knowing everything, having people ignore “the security person” because “reasons,” and then having “I told you so” as your only comfort? Sick of the hostile relationship between security and development, security and operations, security and HR, and/or security and everyone not wearing a black t-shirt? There’s a better way. Faced with […]

Management
Brendan O’Connor
09:00 - 10:00 Keynote Hall '

It’s 2016: What can you do about gender balance in Information Security?

Successfully defending against modern threats requires information security teams to possess the right balance of hard and soft skills for engaging business and technology groups to secure an organization. This is creating more opportunities for women from a variety of backgrounds to join this industry, make positive contributions in a variety of ways and to […]

Keynote
Laura Payne and Co.
Alexis Lavi
Andrea Stapley
Julie Leo
Karen Nemani
Marilyn Blamire
13:25 - 14:25 Management (718B) '

Cybersecurity in an era with quantum computers: will we be ready?

Quantum computers will break currently deployed public-key cryptography (RSA, ECC, Diffie-Hellman, etc.) which is one of the pillars of modern-day cybersecurity. Thus we need to migrate our systems and practices to ones that cannot be broken by quantum computers before large-scale quantum computers are built. There are viable options for quantum-proofing our cryptographic infrastructure, but […]

Management
Michele Mosca
10:15 - 11:15 Tech 2 (801A) '

CANtact: Open Source Automotive Tools

Car hacking really came to light in 2015. We saw Jeeps getting attacked over the air, BMWs being remotely unlocked, and attacks on Tesla’s Model S. Yes, today’s cars are computers, and they going to have vulnerabilities. While cars have had in-vehicle networking for the last 25 years, only recently have we seen public attacks […]

Tech
Eric Evenchick
13:25 - 14:25 Tech 3 (801B) '

Purple Teaming the Cyber Kill Chain: Practical Exercises for Management

Purple Teaming is conducting focused Red Teams with clear training objectives for the Blue Team for the ultimate goal of improving the organization’s overall security posture. The popular opinion is that Purple Teaming requires a big undertaking. This is not true and we will show practical exercises for Purple Teaming for varying levels of organizational […]

Tech
Chris Gates
Haydn Johnson
10:15 - 11:15 Tech 3 (801B) '

Utilizing Memory and Network Forensics for Scalable Threat Detection and Response

Modern threats necessitate active hunting for malware and attackers throughout an organization’s environment.  Unfortunately, traditional approaches to detection of this malicious activity are now inadequate as advanced malware and skilled attackers easily mislead them.  During this presentation attendees will learn how malware and attackers evade these traditional methods as well as how memory and network […]

Tech
Andrew Case
10:15 - 11:15 Tech 3 (801B) '

How to build a malware classifier [that doesn’t suck on real-world data]

Machine learning is the latest trend in malware classification. It’s easy enough that everyone can now spin up a malware crawler, extract some features from the files, build some machine learning models, and publish their research in a reputable journal. However, many of these models have issues with overfitting – they have significant accuracy reductions […]

Tech
John Seymour

Sponsors


Check Point

Gold

Conexsys

Gold

Forcepoint

Gold

IBM

Gold

Lyrical Security

Gold

Optiv

Gold

Qualys

Gold Networking Reception

Rapid7

Gold Networking Reception

Scalar

Gold

Uzado

Gold

Blue Coat

Silver

Centrify

Silver

Cisco

Silver

esentire

Silver

Gurucul

Silver

New Signature

Silver

PhishMe

Silver

Thales

Silver

Venafi

Silver

VMWare

Silver

(ISC)2

Bronze

Alert Logic

Bronze

Arbor Networks

Bronze Lunch

Aruba

Bronze

Bomgar

Bronze

Carbon Black

Bronze

Checkmarx

Bronze

Cobalt Strike

Bronze

CompTIA

Bronze

CrowdStrike

Bronze

CSE

Bronze

CTC TrainCanada

Bronze

Cylance

Bronze

Darktrace

Bronze

Defence Intelligence

Bronze

Echoworx

Bronze

Entrust Datacard

Bronze

ESET

Bronze Networking Reception

Fidelis

Bronze

FireEye

Bronze

Fortinet

Bronze

Gemalto

Bronze

Global Knowledge

Bronze

GoSecure

Bronze

Guidance Software

Bronze

HP Inc.

Bronze

Imperva

Bronze

Intercast Staffing

Bronze

ISA

Bronze

Layer 8 Solutions

Bronze

Speakers


James Arlen

James Arlen


James Arlen is a member of Heroku’s security team assisting customers in understanding how Heroku enables security programs and reduces the impact of compliance and security operations allowing them to move fast and focus on their apps. Over the past twenty plus years, James has been delivering information security solutions to Fortune 500, TSE 100, and major public-sector organizations. In both consultant and staff member roles, James led business and technical teams of professionals in short-term projects as well as multi-year organizational change initiatives. James held key contributor roles as [...]

Adrien de Beaupré

Adrien de Beaupré

SANS Instructor


Adrien de Beaupré is a certified SANS instructor and works as an independent consultant in beautiful Ottawa, Ontario. His work experience includes technical instruction, vulnerability assessment, penetration testing, intrusion detection, incident response, and forensic analysis. He is a member of the SANS Internet Storm Center (isc.sans.edu). Adrien is actively involved with the information security community, and organizes the BSidesOttawa conference. When not geeking out and breaking stuff he can be found with his family, or at the dojo.

Brian Bourne

Brian Bourne

Director and Co-Founder, Black Arts Illuminated


Brian has a passion for security and has been an active member of the IT security community for over 20 years. Being part of the IT community has always been important to Brian and his entrepreneurial spirit and industry experiences are what helped establish TASK and SecTor as part of Black Arts Illuminated. When he’s not running conferences and events, Brian maintains his technical edge as Executive Vice President, Products, New Signature, a Microsoft National Solution Provider headquartered in Washington DC. In June 2015, New Signature acquired Microsoft technology consultancy [...]

Laura Payne

Laura Payne

Senior Information Security Advisor


Laura Payne is a Senior Information Security Advisor at the Bank of Montreal. She has over 10 years of experience in the financial services industry covering a variety of roles in IT operations and information security. Laura holds a degree in Systems Design Engineering from the University of Waterloo. When not at work, she enjoys spending time with her family, volunteering in the community, and wilderness camping.

Mike Murray

Mike Murray


Mike Murray is the VP of Security Intelligence at Lookout. For nearly two decades, Mike has focused on high-end security research, first as a researcher and penetration tester and then building and leading teams of highly skilled security professionals. He previously lead Product Development Security at GE Healthcare, where he built a global team to secure the Healthcare Internet of Things. Prior to that, he co-founded The Hacker Academy and MAD Security, and has held leadership positions at companies including nCircle Network Security, Liberty Mutual Insurance and Neohapsis.

Mike Saurbaugh

Mike Saurbaugh

Director, Technical Alliances, PhishMe


Mike Saurbaugh is the director of technical alliances with PhishMe. Prior to PhishMe, Mike spent nearly two decades in financial services and was the head of information security for 12-years. Mike is a Faculty member with IANS Research was involved from the onset with Security Current when it launched and served as the research director leading a number of strategic projects for global security vendors. Recently, Mike was added to the faculty at Excelsior College in their information security program as a course developer and adjunct. Mike started a security [...]

Andrew Blaich

Andrew Blaich

Manager of Vulnerability Research / Lookout


Andrew Blaich is a staff security engineer and researcher at Lookout where he is focused on the securing, responding to, and defending all things mobile. Prior to Lookout, Andrew was the Lead Security Analyst at Bluebox Security. He holds a Ph.D. in computer science and engineering from the University of Notre Dame in enterprise security and wireless networking. In the past, Andrew has worked at both Samsung and Qualcomm Research. Andrew has presented at conferences including RSA, Interop, and SANS DFIR. In his free time, he loves to research the [...]

Chris Sistrunk

Chris Sistrunk

Senior Consultant


Chris Sistrunk is a Senior Consultant at Mandiant, focusing on cyber security for industrial control systems (ICS) and critical infrastructure. Prior to joining Mandiant, Chris was a Senior Engineer at Entergy (over 11 years) where he was the Subject Matter Expert (SME) for Transmission & Distribution SCADA systems. Chris helped organize the first ICS Village, which debuted at DEF CON 22 and was featured at RSAC and SANS ICS Summit. He is a Senior Member of IEEE, member of the DNP Users Group, President of Mississippi Infragard, and also is [...]

James L. Antonakos

James L. Antonakos

Incident Response Consultant


James L. Antonakos is an Incident Response Consultant for Trustwave and a former SUNY Distinguished Teaching Professor of Computer Science at Broome Community College, in Binghamton, NY. James is an online instructor in electronics, computer science, and information security and has extensive industrial work experience as well in electronic manufacturing for both commercial and military products, particularly in flight control computer technology for Navy aircraft. James is the author or co-author of over 40 books on computers, networking, electronics, and technology, as well as numerous magazine articles, and has presented [...]

Eric Sun

Eric Sun


Eric Sun is Solutions Marketing Manager for Rapid7’s Incident Detection & Response offerings. In security, Eric works closely with Rapid7's penetration testers and managed SOC to help security teams model their programs after the intruder attack chain. He also brings an understanding of behavior analytics and risk management from his many years in Asia as a professional poker player. Previously, Eric was at custom mobile app developer, Zco Corporation, based in New Hampshire.

Bruno Germain

Bruno Germain

Systems Engineer


Bruno Germain is a staff systems engineer in the network and security business unit at VMware. As early as 2008, he worked on virtualized network architectures for data centres as part of the team working on the MiM / SPB standards for which he shares patents for his work on the integration of virtual routers to this technology.  He has been designing, implementing and securing networking infrastructures for the last 30 years holding positions with service providers, financial institutions and telecomm manufacturers.

Peter Cresswell

Peter Cresswell


Peter Cresswell has been working in IT and Security for over 25 years, joining Trend Micro seven years ago.  Peter works with Trend Micro’s largest customers to help design and deliver reliable, secure infrastructure in support of their business goals.  The past few years have seen a focus on taking advantage of virtual and abstracted (cloud) environments to achieve security objectives in new and dynamic ways.   With Trend this has especially focused on the Canadian built Deep Security solution.  Peter holds several security certifications including CISSP, ISSAP, CISA and CISM.

Si Brantley

Si Brantley


Si Brantley has been a veteran in the technology industry for more than 35 years. He has held various roles, including head of sales at Thales e-Security, a leading global data protection and digital trust management company, as well as VP of Sales-Product Division at Racal Datacom. His clientele includes some of the world’s largest retail and financial companies, as well as other verticals. Mr. Brantley is integrally involved in developing security strategies to enable companies to compete confidently and quickly by securing data at-rest, in-motion, and in-use to effectively [...]

Keir Humble

Keir Humble

Network Security Expert


Keir Humble is a recognized network security expert with over 20 years of hands-on experience providing in-depth timely perspective on the state of enterprise security and emerging trends. Prior to joining Sophos, Keir worked for a number of security vendors including; Symantec, ArcSight (HP), Kaspersky Lab, and Q1 Labs (IBM). Prior to venturing into the world of IT Security Technology, Keir worked for BMO Bank of Montreal as an Incident Handler, Intrusion Detection Analyst, and Network Security Analyst, implementing a variety of security technologies and processes.

Amol Sarwate

Amol Sarwate


Amol heads Qualys' worldwide security engineering team responsible for vulnerability and compliance research. His team tracks emerging threats and develops software, which identifies new vulnerabilities and insecure posture for Qualys' VM, PC, PCI and QBC services. Amol is a veteran of the security industry and has devoted his career to protecting, securing and educating the community from security threats. Amol has presented his research on Vulnerability Trends, Security Axioms, SCADA security, Malware and other security topics at numerous security conferences, including RSA Conference, BlackHat, Hacker Halted, SecTor, BSides, InfoSec Europe, [...]

Raul Alvarez

Raul Alvarez

Senior Security Researcher


Raul Alvarez joined Fortinet in 2004, and is currently working as a Senior Security Researcher/ AV Team Lead.  He is also one of the Lead Trainers responsible for training the junior AV/IPS analysts in malware analysis and reverse engineering. Raul has presented in different conferences like BSidesVancouver, BSidesCapeBreton, OAS-First, BSidesOttawa, SecTor, and DefCamp. Raul has presented at the HASK security group and at the University of BC. He is a regular contributor to the Fortinet blog and also in the Virus Bulletin publication, where he has published 22 articles.

Sean Earhard

Sean Earhard

Advanced Threat Solutions, Cisco Canada


Sean Earhard heads Cisco’s Advanced Threat Solutions team for Canada, working with organizations to design and build strategies to secure their networks and users from today’s most Advanced Threats. Prior to Cisco, Sean worked with large accounts for Symantec in Toronto and Sophos in Chicago, helping to secure some of the largest organizations in North America over the last 11 years.

Ryan Leonard

Ryan Leonard


Ryan Leonard is a Technical Marketing Engineer for Symantec.  Symantec’s recent acquisition of Blue Coat Systems combined the market leader in endpoint, email, and data center security with the market leader in web security and cloud generation intelligence to create the world’s leading pure play security company: the new Symantec Corporation. Mr. Leonard has over 15 years of internet security experience.  Prior to joining Symantec, Mr. Leonard was a Sales Engineer for both large enterprises like Palo Alto Networks and Intel Security as well as start-up ventures like Agari and [...]

Dave Millier

Dave Millier

CEO - UZADO


Dave Millier is a serial entrepreneur, off-road motorcycle rider and food lover. Dave has been involved in cybersecurity for almost 20 years. He founded the InfoSec company Sentry Metrics, one of Canada's most successful MSSPs. After the sale of Sentry Metrics, Dave's lifelong passion for reading led him to finally sit down and write his first book, Breached! In late 2014, Dave launched Uzado (http://www.uzado.com), a cloud-based InfoSec company focused on helping companies simplify cybersecurity by answering the questions "what now?" or "what next?" Dave is also the CSO of [...]

Ryan Wilson

Ryan Wilson

Chief Technology Officer, Scalar


Ryan is an experienced security practitioner and leader with over 20 years of IT experience and 12 years of information security consulting experience. At Scalar, Ryan holds the position of Chief Technology Officer - Security, responsible for driving the company's customer facing security strategy. Prior to assuming his role at Scalar, Ryan was Director of Security Architecture and Engineering at TELUS Security Solutions, and has worked for companies such as McAfee/Intel, MTS Allstream and Q9 Networks.

Danny Pickens

Danny Pickens

Director of Threat Intelligence, Optiv


Danny Pickens has over six years of experience within cyber security in the areas of intrusion detection, incident handling and management, and cyber threat analysis. He has fifteen years’ experience as an all-source intelligence analyst covering conventional, asymmetric, and counterterrorism intelligence analysis. Mr. Pickens is currently the Director of Threat Intelligence at Optiv, managing a staff of Cyber Threat Intelligence analysts and consultants charged with conducting research and analysis to support clients with strategic advisement and consulting in the area of intelligence for business alignment and decision advantage. Mr. Pickens [...]

Peter Allor

Peter Allor

Security Strategist


Peter Allor is a Security Strategist on cyber incident and vulnerability handling with IBM where he assists in guiding the company’s overall security initiatives and participation in enterprise and government implementation strategies. He assists the IBM X-Force research and development team with the collection, analysis and dissemination of information regarding cyber vulnerabilities, exploits, incidents, threats and early warning and coordinates for X-Force and IBM products.

Sean Blenkhorn

Sean Blenkhorn


As a seasoned security leader, Sean Blenkhorn has spent much of his nearly 20-year career consulting with leading global (FORTUNE 50, 100, 500 and 1000) companies around security and compliance solutions. In his role as Senior Director of Solutions Engineering at eSentire, Sean leads his team globally as they provide guidance, consultation, and technical perspective to new customers as they evaluate and adopt eSentire’s award winning services to address their security and compliance requirements. Sean has an Associate’s Degree in Software Engineering from Georgian College.

Brian Read

Brian Read

Security Practice Manager


Mr. Read has over 20 years of experience in the IT industry and an extremely broad skill set when it comes to the security of an organization’s critical IT infrastructure.   Mr. Read has been in charge of IT Security  Professional Service Delivery for over  10 years and is primarily responsible for: Leading a Security resource team responsible for  vulnerability and risk assessments for some of Canada’s largest infrastructures; and Designing and deploying advanced security solutions from the SANs TOP 20 Critical Control list. By leading large projects in the areas [...]

Greg Pepper

Greg Pepper


Greg Pepper has been an IT professional for 15+ years with expertise in Security, Networking & Cloud Computing.  Initially working for Sony Online Entertainment, PriceWaterhouse Coopers & Organic, Greg has spent the last 15 years working for Cisco & Check Point helping customers to design, plan and implement secure networks throughout the Internet Edge, Campus Backbone, Data Center and Cloud Environments.  Currently a Security Architect for Check Point, Greg focuses on Software Defined Data Centers working with customers across the Western United States & Canada across verticals and customer segments.

Olivier Bilodeau

Olivier Bilodeau

Cybersecurity Research, GoSecure


Olivier Bilodeau currently leads the Cybersecurity Research team at GoSecure. With more than 10 years of infosec experience, Olivier has managed large networks and server farms, wrote open source network access control software and recently worked as a Malware Researcher. A passionate communicator, he has spoken at several conferences such as Defcon, Botconf, SecTor, and Derbycon. Invested in his community, Olivier co-organizes MontréHack—a monthly workshop focused on applied information security through capture-the-flag challenges. He is also in charge of NorthSec’s training sessions and is hosting NorthSec’s Hacker Jeopardy. His primary research interests include reverse-engineering tools, [...]

Matt Johansen

Matt Johansen

Director of Security, Honest Dollar


Matt Johansen is the Director of Security at Honest Dollar, a Financial Tech company in Austin, Texas where he is charged with building an Information Security program from the ground up. Previously he was the Director of Services and Research at WhiteHat Security where he oversaw the development and execution of their service related product lines. In addition to these services, Matt also performs research on application security topics that he discusses on the corporate blog and is often invited to present at conferences around the world.

Jeremy Galloway

Jeremy Galloway

Security Intelligence, Atlassian


I've been serious about hacking and security since 2002. Since discovering my first issue of Phrack (0x0b, 0x3b) I knew that security was for me. Before long, I was consuming text files from former hacker generations at a feverish and insatiable rate. I began driving 2+ hours to the Houston 2600 meeting every month, and a new world was revealed. I've worked in IT for over 12 years, doing everything you can imagine - crawling in ceilings to run Ethernet, automation scripting with Python and Bash, virtualizing datacenters, analyzing malware, scouring pcaps, [...]

Chris Wysopal

Chris Wysopal

Co-Founder and CTO, Veracode


Chris Wysopal is Co-Founder, Chief Technology Officer at Veracode. Wysopal co-founded the company in 2006 and oversees technology strategy and information security. Prior to Veracode, Chris was vice president of research and development at security consultancy @stake, which was acquired by Symantec. In the 1990’s, Chris was one of the original vulnerability researchers at The L0pht, a hacker think tank, where he was one of the first to publicize the risks of insecure software. He has testified to the US Congress about government security and how vulnerabilities are discovered in software. [...]

Cheryl Biswas

Cheryl Biswas

Cyber Security Consultant - Threat Intel, KPMG


Cheryl Biswas began her IT career with CP Rail’s helpdesk over 20 years ago, with further roles in vendor management and change management. Her previous position was with JIG Technologies as an InfoSec Researcher/Analyst, where she initiated the security role within JIG, did weekly threat intel updates, and advised her team and clients on security matters. She recently joined KPMG Canada as a Cyber Security Consultant, Threat Intel. Cheryl builds bridges to connect people within Information Security, and to connect end users. She actively shares her passion for learning and [...]

Milind Bhargava

Milind Bhargava

Senior Security Consultant, TELUS


Milind Bhargava is a Security Consultant with TELUS Communications Inc. He works with a team of operations analysts to proactively investigate and analyze customer traffic, while also providing threat intelligence on attacks, campaigns, and zero-days in order to protect customer’s environment and enhance their security posture. He is also a part time faculty member at George Brown College in Toronto where he teaches Cryptography, Forensics and Network Auditing in the Network and System Security Analysis (NaSSA) Post Grad program.

Peter Desfigies

Peter Desfigies

Security Consultant, TELUS


Peter Desfigies is a Security Consultant at TELUS Communications Inc. He works with a team of operations analysts to proactively investigate and analyze customer traffic, while also providing threat intelligence on attacks, campaigns, and zero-days in order to protect customer’s environment and enhance their security posture. During his time at TELUS, he has worked with a variety of teams providing LAN, WAN, telco, security and hardware break/fix support, and now security analysis for government and corporate customers. Prior to TELUS, he worked for 12 years in IT operation roles to [...]

Scott Penney

Scott Penney

Dir of Cyber Security Solution, BlueCat Networks


Scott Penney has been immersed in security technologies and strategies for the last 20 years. His focus has always been on balancing the needs of a dynamic business with the realities of risk mitigation in our connected world. Over his career, Scott has worked with some of the largest companies in the world, such as AT&T, to help define security architectures that make sense – delivering real improvements in overall security posture without over-committing resources. Scott’s current focus is driving new and innovative security solutions for BlueCat, using the power [...]

Mark Bassegio

Mark Bassegio

Independent Security Consultant


Mark Bassegio is an offensive security expert that specializes in physical security and network security consulting. During his years in security, Mark has conducted and overseen hundreds of penetration tests all over the world in multiple industries and disciplines, for medium sized businesses to large Fortune 500 corporations. Mark has delivered presentations to audiences internationally and is the co-creator of the BLEKey, custom hardware designed to exploit weaknesses in proximity-based building access controls.

Tim West

Tim West

Chief Risk Officer, Atredis Partners


Tim West has extensive experience in security leadership. He has worked as a security practitioner and as a successful security consultant. As a consultant, Tim has delivered significant projects rebooting security programs in billion-dollar organizations and engaging in high-profile projects including US federal corrective action plans. As a practitioner and leader, Tim has lead teams at a Fortune 25 healthcare organizations responsible for governance, threat and vulnerability management as well as risk and compliance. Tim has spoken nationally on topics of compliance and technical security, medical devices, and other research areas such as cyber [...]

Travis Smith

Travis Smith

Security Researcher, Tripwire


Travis is a security researcher at Tripwire. With over 10 years of experience in information security, he specializes in defensive counter-measures with a passion for forensics and security analytics.

Pierre-Alexandre Braeken

Pierre-Alexandre Braeken

Security Architect, Deloitte Canada


Pierre-Alexandre Braeken is an accomplished and highly experienced Manager at Deloitte Canada with nearly 15 years of experience in security and system architecture. He has an excellent command and understanding of information technology, security architecture and secure application development, as well as strong analytical skills pertaining to enterprise situations, risk and contingency plans. He's focused on assisting organizations internationally and across Canada with leading effective threat detection, response capabilities and red teaming activities. He has created cutting edge tools in the field of offensive and defensive security and regularly speaks [...]

Robert Simmons

Robert Simmons

Director of Research Innovation, ThreatConnect


Robert Simmons is the Director of Research Innovation at ThreatConnect, Inc. With an expertise in building automated malware analysis systems based on open source tools, he has been tracking malware and phishing attacks and picking them apart for years. Robert is also the author of PlagueScanner, an open source virus scanner framework. Robert, also known as Utkonos, has a background in biology, linguistics, and Russian area studies. He has lived extensively in Russia and Ukraine and has been known to swear profusely and constantly in Russian.

Solomon Sonya

Solomon Sonya

Asst. Prof. of Computer Science, USAF Academy


Solomon Sonya (@Carpenter1010) is an Assistant Professor of Computer Science at the United States Air Force Academy. He has a background in software development, malware analysis, covert channels, steganography, distributed computing, computer hacking, and information protection paradigms. He received his Undergraduate Degree in Computer Science and has Master’s degrees in Computer Science and Information System Engineering. Solomon’s current research includes computer system exploitation, threat intelligence, digital forensics, and data protection. Previous conferences Solomon has spoken at include: HackCon Norway, BlackHat USA, SecTor Canada, Shmoocon DC, DerbyCon Kentucky, SkyDogCon Tennessee, HackerHalted [...]

Kellman Meghu

Kellman Meghu

Global Security Manager - Sycomp


Kellman Meghu is Global Security Manager at Sycomp, with a focus on infrastructure as code for public and private cloud. As part of his role he curates research, testing and development of public cloud infrastructure for Securing Labs. Past responsibilities have included day-to-day operational work in complex security networks, policy planning, management, and documentation responsibilities with various network, VoIP and security engineering companies. Kellman is an experienced speaker with original content, that has delivered security talks in private corporate focused events, at school internet safety classes for training students and [...]

Jake Sethi-Reiner

Jake Sethi-Reiner

Student


Jake Sethi-Reiner is eleven years old. He has presented at NorthSec 2016, at Pycon Canada 2015 (goo.gl/aZXLzZ) and at the Montreal Python group. Jake has also completed online university courses in computer networking (Stanford), Python programming (Rice University), economics (Stanford), symbolic logic (Carnegie Melon) and Linux administration (Linux foundation). His father, Richard Reiner, delivered a keynote at SecTor 2007.

Roger Grimes

Roger Grimes

Principal Security Architect


Roger Grimes currently works for Microsoft as a Principal Security Architect. He specializes in general computer security, identity management, PKI, Windows computer security, host security, honeypots, APT, and defending against hackers. Grimes has been working in the computer security industry for nearly three decades, has written eight books and nearly 1000 magazine articles. For the last 10 years Roger has been the computer security columnist for InfoWorld magazine.

Ben Sapiro

Ben Sapiro


Ben Sapiro is the Senior Director of Security, Privacy and Compliance at Vision Critical (a SaaS company) and has worked in both InfoSec consulting and operations since he somehow managed to graduate from b-school. Other than that, he’s a typical middle-aged Canadian who has worked at $companies doing $work to earn Canadian pesos. Ben is a regular contributor on LiquidMatrix Podcast (whenever we get around to recording it) and helps run BSidesTO.  

Brendan O’Connor

Brendan O’Connor

Malice Afterthought, Inc.


Described by coworkers as "not the lawyer we need, but the lawyer we deserve," Brendan O’Connor is a security researcher, practitioner, and consultant based in Seattle, WA. He is admitted to the Montana bar, and serves as Vice-Chair of the ABA’s Information Security Committee; while he is a lawyer, he is not your lawyer. He was awarded two DARPA Cyber Fast Track contracts for his security research, which focuses primarily on enabling access to security and privacy through development of disposable computing and sensing tools. He has taught at an [...]

Michele Mosca

Michele Mosca


Michele Mosca obtained his doctorate in Mathematics in 1999 from the University of Oxford on the topic of Quantum Computer Algorithms. He joined the Waterloo faculty in 1999. He is co-founder of the Institute for Quantum Computing at the University of Waterloo, a Professor in the Department of Combinatorics & Optimization of the Faculty of Mathematics, and a founding member of Waterloo’s Perimeter Institute for Theoretical Physics. Mosca is also the co-founder and Director of CryptoWorks21, an NSERC-funded training program in quantum-safe cryptography. In 2015, he cofounded evolutionQ Inc., where [...]

Eric Evenchick

Eric Evenchick

Embedded Systems Developer


For the past eight years, Eric has worked in development and reverse engineering roles for hardware and software companies. He has specialized in embedded devices, automotive systems, and bespoke tool development. He is currently a Senior Research Consultant at Atredis Partners. Eric’s work with embedded systems began with development of research vehicles at the University of Waterloo, in partnership with General Motors and the US Environmental Protection Agency. This experience lead to roles in developing automotive firmware and reverse engineering vehicle systems at companies including Tesla Motors and Faraday Future. [...]

Chris Gates

Chris Gates

Sr. Incident Response Engineer, Uber


Chris Gates has extensive experience in network and web application penetration testing, Red Teaming and Purple Teaming. Chris is currently learning to be a part-time fixer instead of full-time breaker. He has spoken at numerous events such as the United States Military Academy, BlackHat, DefCon, Toorcon, Brucon, Troopers, SOURCE Boston, Derbycon, LasCon, HashDays, HackCon, Bsides ATL, IT Defense, OWASP AppSec DC, and Devops Days. Chris is also a cofounder of NoVAHackers.

Haydn Johnson

Haydn Johnson

Security Researcher


Haydn Johnson has over 3 years of information security experience, including network/web penetration testing, vulnerability assessments, identity and access management, and cyber threat intelligence. He has a Masters in Information Technology and holds the OSCP certificate. Haydn regularly contributes to the InfoSec community primarily via Twitter and has spoken at BSides Toronto. Most recently, he has created a walkthrough for using the persistence module of PowerSploit.

Andrew Case

Andrew Case

Director of Research, Volexity


Andrew Case is the Director of Research at Volexity LLC, and a member of the Board of Directors for the Volatility Foundation. Prior to joining Volexity, he held positions as a senior incident response handler and malware analyst at Terremark Worldwide and Verizon Enterprise Solutions, where he frequently led large-scale investigations. Andrew's previous experience also includes penetration tests, source code audits, and binary analysis. Andrew is the co-developer of Registry Decoder, a National Institute of Justice funded forensics application, as well as a core developer on the Volatility memory analysis [...]

John Seymour

John Seymour

Data Scientist, ZeroFOX, Inc.


John Seymour is a Data Scientist at ZeroFOX, Inc. by day, and Ph.D. student at University of Maryland, Baltimore County by night. He researches the intersection of machine learning and InfoSec in both roles. He's mostly interested in avoiding, and also helping others avoid, some of the major pitfalls in machine learning, especially in dataset preparation (seriously, do people still use malware datasets from 1998?). He has spoken at both DEFCON and BSides, and aims to add BlackHat to the list in the near future.