So exactly what is zero trust? Buzzword, unicorn technology or a framework with meat on the bone? Well, yes on two counts. Zero trust is the realization that everything is on fire. In this talk I will endeavor to strip the idea of a zero trust program back to the bare metal. We will have […]
In this talk, we are going to review the LAN eXtensions for Instrumentation (LXI), a common protocol among testing and measuring devices. Most legacy wired protocols function on the assumption that they are interconnected in a closed, trusted, secure network. However, once connected to the internet this assumption is no longer true. LXI is one […]
Although times are unprecedented, for threat actors, it is business as usual. Even as times change, good threat intelligence will always be a bedrock of cybersecurity. Join Senior Security Research Consultant and Secureworks’ Threat Hunting lead Ryan Cobb, as he shares what’s on the threat horizon and how the Secureworks team is there to keep […]
MITRE ATT&CK has shifted the balance of power from attackers to defenders. For the past few years, defenders have been increasing their security tooling and are detecting more adversarial techniques than ever before. Detecting events in your environment is only the first step. Going forward the focus isn’t going to be on if you detect […]
All technologies and systems currently use cryptography and most use certificates at some point. Since their boom, internal PKI systems have not changed a lot nor have the problems that we observe during almost all pentests. It’s time to revise your knowledge about one of the cornerstones of enterprise security and learn a few tricks […]
As cars continue to become more connected and autonomous, the security of these systems grows in importance. We’re now a decade away from the first public research on automotive security, and since then the challenges of securing these vehicles has increased due to new features. connectivity, and automation. In this talk, we’ll provide an introduction […]
Containers offer speed, performance, and portability, but do they actually contain? While they try their best, the shared kernel is a disturbing attack surface: a mere kernel vulnerability may allow containerized processes to escape and compromise the host. This issue prompted a new wave of sandboxing tools that use either unikernels, lightweight VMs or userspace-kernels […]
Adversarial machine learning has hit the spotlight as a topic relevant to practically-minded security teams, but noise and hype have diluted the discourse to gradient-based comparisons of blueberry muffins and chihuahuas. This fails to reflect the attack landscape, making it difficult to adequately assess the risks. More concerning still, recommendations for mitigations are similarly lacking […]
The need to operate online has driven businesses toward a digital transformation with cloud adoption at its core. The pace of this transformation sped up drastically as COVID-19 dispersed entire workforces and business operations around the world. In a matter of days, operating a business with an entirely “at home” workforce became the norm. And […]
Information Security leaders face a problem: to prove the value equation of their security investments. Security efficacy is often brought up as a key challenge – not just how to leverage technology, but how to measure what results it delivers. Enumerating how many detections were surfaced by a malware defense platform or if a perimeter […]
Preceding the outbreak of COVID-19 was a trend across industries to transform the traditional IT stack into a new form of computing, one that was focused on enabling agility and innovation while also delivering cost reduction. This shift sought to leverage public cloud and cloud-like development methods as well as infrastructure design. The effort to […]
Cybersecurity software has evolved by leaps and bounds in the past decade. However, one domain was neglected and has fallen behind – security validation. Today, the measurement of a network’s cyber posture is done in a manual, non-scalable way, through costly 3rd-party pentesting service providers. As a result, a huge gap has been created between […]
Google Cloud’s security model in many ways is quite different from AWS. Spark jobs, Cloud Functions, Jupyter Notebooks, and more default to having administrative capabilities over cloud API’s. Instead of defaulting to no capabilities, permissions are granted to default identities. One default permission these identities have is called actAs, which allows a service by default […]
This talk will demystify the process of writing a rootkit, moving past theory and instead walking the audience through the process of going from a driver that says “”Hello World”” to a driver that abuses never-before-seen hooking methods to control the user-mode network stack. Analysis includes common patterns seen in malware and the drawbacks that […]
Today, with a few commands anyone can have containers running on their machine; at this point, they seem to be neither complex nor complicated to secure. However, the story dramatically changes when the ecosystem grows exponentially and now we have thousands of nodes that fulfill different roles, with different resources, running different applications, in different […]
Bad security data leads to bad security policies; better data enables better policies. That, in a nutshell, is the thesis of this talk. To back that up, we’ll share a FUD-free and data-driven analysis of the frequency and economic costs of tens of thousands of historical cyber incidents, with a special focus on events that […]
The security world is fraught with cases of mental health issues, burnout, substance abuse, and even suicide. We live in a world of threats and responses that trigger the deepest parts of our psyche; with the barriers between “”online”” and the physical world constantly crumbling. While some deal in theory, many of us deal with […]
As organizations increase their adoption of cloud services, we see attackers following them to the cloud. Microsoft Office 365 is becoming the most common email platform in enterprises across the world and it is also becoming an increasingly interesting target for threat actors. Office 365 encompasses not only Exchange, but also Teams, SharePoint, OneDrive, and […]
Windows access token manipulation attacks are well known and abused from an offensive perspective, but rely on an extensive body of arcane Windows security internals: logon sessions, access tokens, UAC, and network authentication protocols, such as Kerberos and NTLM, to name a few. Furthermore, some of this information is not easily found and can be […]
Recent studies have suggested various side-channel attacks for eavesdropping sound by analyzing the side effects of sound waves on nearby objects (e.g., a bag of chips and window) and devices (e.g., motion sensors). These methods pose a great threat to privacy, however they are limited in one of the following ways: they (1) cannot be […]
Cyberattacks are ever-evolving, increasingly using automation to morph and elude detection. Add to this an ever-expanding attack surface, the rapid growth of both cloud adoption and remote users, and a flood of new, hard-to-secure IoT devices. Clearly, the enterprise threat landscape has never been more challenging. Traditional manual and reactive security approaches are simply over-matched. […]
Threat intelligence chat bots are useful friends. They perform research for you and can even be note takers or central aggregators of information. However, it seems like most organizations want to design their own bot in isolation and keep it internal. To counter this trend, our goal was to create a repeatable process using an […]
In 2010, Stuxnet, the most powerful malware in the world revealed itself, causing physical damage to Iranian nuclear enrichment centrifuges. To reach Iran’s centrifuges, it exploited a vulnerability in the Windows Print Spooler service to gain code execution as NT AUTHORITY\SYSTEM. Due to the hype around this critical vulnerability, we (and probably everyone else) were […]
Threats have changed over the years and so have the targets. It’s not just your perimeter that is at risk, it’s your customers, your supply chain, your employees and your business reputation that could be easily tarnished with just one breach. In this session, we’ll discuss how and why you should consider an integrated approach […]
Many businesses are at a disadvantage when it comes to combating the bad guys. In cybersecurity today, there are too many threats, complex tools, and false positives– not to mention the lack of experienced security professionals – to defend your whole enterprise properly. Fortunately, technologies such as AI and analytics are here to help. However, […]
Threat actors have always played the game of emotions. Fear is the emotion they are using right now to lure users to click on an email or manipulate them to install an application. In the last four months, cyber criminals have used fear as their main weapon to compromise users by using pandemic-related themes to […]
While cybersecurity teams work to address operational and functional gaps, cybercriminals develop attacks targeting the top areas of risk for a company. Using the Forescout Device Cloud, the world’s largest repository of connected device data, Forescout Research Labs analyzed the risk posture of more than 8 million devices to uncover detailed information about the greatest […]
Non-traditional operating systems are driving even more complexity to the security landscape. Whether it’s an IPCamera at a parking lot, a sensor on a conveyer belt or a control system kickstarting a nuclear reactor, these facilities need to be recognized by security. Defining and discovering these assets sets a new perimeter…utilizing their data safely is […]
Okta has been supporting a remote workforce for years, but like many organizations we were not expecting a rapid shift to 100% remote work. Fortunately, our IT leaders had the secret sauce for a relatively seamless transition: a 100% cloud-based architecture. This session, featuring Okta’s IT leadership, will cover how Okta’s cloud-first IT strategy and […]
2020 has seen a significant shift in how businesses abruptly implemented remote working. With the massive surge of “Work From Anywhere” (WFA) and the information security challenges that came with it, there is a strong push to improve and modernize the security culture of organizations of all sizes, without compromising on collaboration and productivity. Join […]
XDR is an emerging industry approach that extends EDR’s insight to a broad range of sources (endpoint, servers, network, email, and more). Join Trend Micro Sales Engineer, Peter Cresswell, to learn how the XDR approach takes advantage of detailed activity telemetry (not just alerts) from its sources, enabling more meaningful correlation and enabling rapid detection […]
SASE converges network, web, data, and cloud app connectivity and security, but implementing a true SASE architecture is a daunting task and there is no one-size-fits-all approach. Join Forcepoint Global CTO Nicolas Fischbach for insights on Forcepoint’s approach to delivering the industry’s first true data-centric SASE as well as providing steps for a practical approach […]
Digital Transformation and the rapid need for supporting remote workers for digital business processes took every industry by storm. This change has presented new risks, unlike what companies have seen before, and has created the greatest loss of visibility for security, auditing, and quality control professionals since the emergence of the Internet. As companies continue […]
“I do have are a very particular set of skills, skills I have acquired over a very long career. Skills that make me a nightmare for people like you.” – Bryan Mills (Taken) Wouldn’t it be nice if we all had the skills required to send that message to cybercrime actors? Wouldn’t it be nice […]
Budgets are tighter than ever during the COVID-19 pandemic and threat actors have only increased their malicious activity. This makes it difficult to start a new threat intelligence program, but it doesn’t have to be this way. In this talk we will teach you how to start a threat intelligence team from scratch using repurposed […]
COVID-19 has already profoundly changed the way many of us work in security operations—including the necessary acceptance of BYOD (Bring Your Own Device). These devices make a tempting target for cybercriminals, and organizations are scrambling to beef up their perimeters. Learn the various solutions CIOs and CISOs are adopting to help address securing their remote […]
While advances continue to be made in InfoSec practices and tools, attackers still seem to outpace defenders. Why? There is a plethora of industry knowledge about what should go into a mature security program, yet organizations still seem to struggle with how to go about building and evolving theirs in ways that provide real, tangible […]
Cyber attacks and specifically Ransomware continue to evolve and change the way the world does business. Over the last several years, actors performing ransomware attacks have increased their capabilities and sophistication which has resulted in more refined targeting, but also additional revenue generation. Josh will share some the most recent Canadian and Global attacks, as […]
The Intelligence discipline has defined processes, analytical techniques, and procedures, but they are not only for Intel teams. The analytical techniques that have been cultivated, refined, and tested within the Intelligence cycle have been used for operational use to make teams more successful since they are adaptable. For example, Priority Intelligence Requirements (PIRs), are long […]
With the sudden shift of the global workforce from in-office to remote, IT teams quickly transformed their operations to accommodate the new realities of business — including large-scale adoption of work-from-home technologies, heightened activity on customer-facing networks, and greater use of online services. While these examples of agility allowed business to continue, they also greatly […]
We all know that the operating paradigm in which business is conducted changes on almost a daily basis, yet the way we defend the sensitive data within our business has remained static for nearly 3 decades. Perimeter security is not sufficient, and that’s why we have embraced the concept of Securing the Breach by protecting […]
Today’s attackers have abandoned the equivalent of sledgehammers for a quiver of custom arrows as they increasingly conduct extensive reconnaissance and choose weapons specifically tailored to exploit the defensive weaknesses they discover. Even worse, they have an ever-growing range of new or increasingly used vectors from which to choose. During this session, you will learn […]
Ransomware has been in the wild since 1983 but saw a steep rise with the advent of WannaCry in 2017 and is showing no signs of slowing down. In fact, we are seeing more breaches than ever before using this attack. It is important for everyone to understand how it works and how to avoid […]
In this session, we will dive into the shared responsibility model that exists within the world of cloud service providers (CSPs). While the service providers take over much of the responsibility traditionally owned by IT teams, they also introduce new responsibilities that may create blind spots. We’ll look at how the CIS Benchmarks for CSPs […]
In times of crisis, good security practices are often the first thing to go. Organizations are being forced to revisit their “temporary” remote working policies and tools. An expanding remote workforce can increase your security risk, especially if your IT and Support employees use non-secure remote access tools as temporary measures. Are temporary remote access […]
Threats to your organization can be overwhelming. Your Threat Intelligence shouldn’t be. Today, there is a huge and growing need for the simplification of threat intelligence. Security environments are already over-complicated and getting worse. In this session, you’ll learn how up-to-the-minute, relevant data can help you manage the risks associated with IT security threats, within […]
For the past six years, I’ve studied behaviors of 15,000 commercial development teams, 24,000 open source projects, and the community of adversaries attacking open source software supply chains. One thing is certain: when it comes to security, speed is king. In 2017, it took three days for adversaries to exploit new vulnerabilities discovered in open […]
Active Directory has been providing critical services and infrastructure to nearly every company, organization and even government agencies since Y2k. AD has grown with us, both in functionality and security but so have the attackers. Since AD contains information about all of our users – both standard and admins, touches and controls access to most […]
Some organizations have been embracing the “Zero Trust” security model, and others are still trying to decide what it means and whether it makes sense for them to try it. With the sudden need for more flexibility, scalability, and remote access, many of these enterprises have found themselves in unfamiliar territory without a map. In […]
Security analysts spend two-thirds of their time on triage and investigation. Why then do most security operations teams only automate response? In this presentation, Andy Skrei will share his experience automating the end-to-end security workflow while leading security investigations at one of the world’s largest online retailers and through working with many of the world’s […]
Global Security Advocate
Dave Lewis has twenty five years of industry experience. He has extensive experience in IT security operations and management including a decade dealing with critical infrastructure. Lewis is a Global Advisory CISO for Duo Security (now Cisco). He is the founder of the security site Liquidmatrix Security Digest and cohost of the Liquidmatrix podcast. Lewis serves on the advisory boards for Cortex Insight and Dateva Inc. Lewis writes columns for Forbes, Daily Swig and several other publications.
Senior Threat Researcher
Philippe is a senior threat researcher in Trend Micro. He is interested in data analysis, open source software, software defined radio, Arduino and amateur maker projects. He was a BIOS programmer, PBX engineer, and a good servant of tens of cats.
Shin Li graduated from National Cheng Kung University and has worked as a lecturer in several hardware-based associations and the cyber security community for many years. He is good at reviewing security issues from the perspective of hardware designers. He is currently working as a threat researcher at Trend Security Cyber Security Solution to study security issues related to IoT, Telecommunication, Chip level and automotive electronics.
Senior Information Security Researcher
Ryan is a senior information security researcher working in the Secureworks Counter Threat Unit (CTU) Special Operations team. Ryan is in a cross-functional role supporting threat hunting and incident response operations with bespoke automation, data analysis, and threat research. Ryan joined Secureworks in 2012 as a consultant on the Secureworks Incident Response team where he led complex intrusion investigations, including novel cyber-attacks from hostile state actors. Ryan is the author and instructor of several courses designed to train, advise, and assist analysts through advanced technical skill development. He is an [...]
Director, Malware Threat Research
Travis is the Director of Malware Threat Research at Qualys. He has spent the past 15 years in the security industry with a focus on digital forensics and incident response. He holds a wide array of certifications ranging from GIAC Certified Penetration Tester to the CISSP, as well as an MBA with a concentration in information security. Travis has presented his research at conferences worldwide at venues such as BlackHat, RSA, and SecTor.
CQURE Director of Consulting, Database and Machine Learning Architect, Cybersecurity Expert Dr. Mike is a solution architect, developer, data scientist and Security Expert with more than 15-years’ experience in the field. He designs and implements solutions for Databases, Network & Management area, mainly for Microsoft platform for medium to enterprise-level organizations. Dr. Mike holds multiple certifications, in particular security, database and software development related. He also holds a Ph.D. in Computer Science. Mike-Jankowski-Lorek is one of the core Experts at CQURE – worldwide known cybersecurity company.
Paula Januszkiewicz is an IT Security Auditor and Penetration Tester, Cloud and Datacenter Management MVP and trainer (MCT), and Microsoft Security Trusted Advisor. She is also a top speaker at many well-known conferences including TechEd North America, TechEd Europe, TechEd Middle East, RSA, TechDays, and CyberCrime. She is engaged as a keynote speaker for security related events and writes articles on Windows Security. She drives her own company, CQURE, working on security related issues and projects. Paula has conducted hundreds of IT security audits and penetration tests, some for governmental [...]
Embedded Systems Developer
Eric has worked in development and reverse engineering roles for hardware and software companies, specializing in embedded devices, automotive systems, and bespoke tool development. He is currently a Principal Research Consultant at Atredis Partners. Eric’s work with embedded systems began with development of research vehicles at the University of Waterloo, in partnership with General Motors and the US Environmental Protection Agency. This experience lead to roles in developing automotive firmware and reverse engineering vehicle systems at companies including Tesla Motors and Faraday Future. In 2014, Eric founded Linklayer Labs, which [...]
Senior Security Researcher, Palo Alto Networks
Yuval Avrahami is a Senior Security Researcher at Palo Alto Networks, dealing with hacking and securing anything related to containers. Yuval is a veteran of the Israeli Air Force, where he served in the role of a researcher.
Senior Research Scientist, OpenAI
Ariel Herbert-Voss is a Senior Research Scientist at OpenAI where she works on breaking machine learning systems at the algorithmic level and loves all things to do with malicious uses and abuses of AI. She is a PhD student at Harvard University and periodically conducts trainings on practical adversarial machine learning. She has spoken at DEF CON and NeurIPS and is co-founder and co-organizer of the DEF CON AI Village.
Geoff Roote has worked in the IT and IS industries for over 15 years in both red and blue team roles. In his current role as a Solutions Architect @ RiskIQ, Geoff’s focus is helping his clients from major Canadian banks achieve the best possible perimeter defenses. Based out of Toronto, he works closely alongside clients to identify unknowns, derive insights from external assets and support security teams to help them achieve their defensive goals. When not obsessing over the latest threats, Geoff enjoys drumming, travelling and playing with his [...]
Regional Solution Architect
A 25-year IT professional, Brian is a Regional Solution Architect at McAfee. Working with Enterprise customers and Service Providers in the Americas he is engaged to architect large scale deployments that align with business goals. He has been recognized as Pre-sales resource of the year in 2017 for Canada, and Solution Architect of the year for 2019 in the Americas. A member of ISACA and IASA Global, Brian often speaks at both industry and McAfee events about how to address business objectives with advanced security architecture in Security Operations and [...]
Vice President, Security Solutions
Avi Rembaum is Check Point’s Vice President, Security Solutions. In this role, Avi is responsible for the company's solution center, incident response team, strategic alliance program and security architecture function. In a previous role, he was responsible for the company’s business relationships with the Tier-1 Telcos in North America. Avi first began working in the information and network security industry in 1997, when he joined RADGUARD’s marketing team. He also held product management positions at RedCreek and SonicWALL and practice manager roles at RedCreek and Getronics, now CompuCom.
Aviv is a cybersecurity speaker, blogger, and influencer working closely with CISOs of fortune 500 companies globally to shape their cybersecurity strategies and technology stacks. Prior to joining Pcysys as CMO, Aviv served in marketing and product management roles with global companies as Mellanox (NASDAQ: MLNX) and Amdocs (NASDAQ: DOX). Aviv holds a B.Sc in Electronics Engineering and Computer Science from Tel Aviv University.
Dylan Ayrey is a Security Engineer. He has been heavily involved in the open source community for a few years, and he has been doing his best to bring security practices into the cloud/devsecops world.
Senior Infrastructure Security Engineer, Cruise
Allison Donovan is a security researcher who specializes in cloud-based platforms and devices. She is currently employed as a Senior Infrastructure Security Engineer at Cruise, where she secures cloud-based environments at scale, and previously she worked at Microsoft on mobile application security and site reliability engineering.
Independent Security Researcher
Bill Demirkapi is a student at the Rochester Institute of Technology with an intense passion for Windows Internals. Bill's interests include game hacking, reverse engineering malware, and exploit development. In his pursuit to make the world a better place, Bill constantly looks for the next big vulnerability following the motto "break anything and everything."
Head of Research, Dreamlab Technologies
Sheila A. Berta is an offensive security specialist who started at 12 years-old by learning on her own. At the age of 15, she wrote her first book about Web Hacking, published in several countries. Over the years, Sheila has discovered vulnerabilities in popular web applications and software, as well as given courses at universities and private institutes in Argentina. She specializes in offensive techniques, reverse engineering, and exploit writing and is also a developer in ASM (MCU and MPU x86/x64), C/C++, Python and Golang. As an international speaker, she [...]
Professor, Virginia Tech
Wade Baker is a professor at Virginia Tech, teaching cybersecurity courses within the Master of IT and MBA programs for the university. In addition to his academic role, Wade remains active in the cybersecurity field through the Cyentia Institute, a research services firm he co-founded in 2016. Prior to this, he held positions as the VP of Strategy and Analytics at ThreatConnect and the Managing Director and CTO for Security Solutions at Verizon. He created and led Verizon's annual Data Breach Investigations Report series, widely regarded across the industry for [...]
Senior Data Scientist, Cyentia Institute
David F. Severski is an information security data scientist, specializing in quantified risk management. He has provided risk management expertise across diverse industries -- retail, aerospace, finance, energy, and healthcare. David brings both broad and deep expertise in a number of technical areas with a special focus on cloud technologies and DevOps practices. He strives to combine rigorous methods, technical expertise, and a human-centered approach to advance the state of evidence-based information security risk management. David lives in Seattle, Washington with a low-maintenance spouse, a high-maintenance house, and a spiffy [...]
Analyst/Securosis, CISO/DisruptOps, Securosis, L.L.C.
Rich Mogull has twenty years experience in information security, physical security, and risk management. These days he specializes in cloud security and DevSecOps, having starting working hands-on in cloud nearly 10 years ago. He is also the principle course designer of the Cloud Security Alliance training class, primary author of the latest version of the CSA Security Guidance, and actively works on developing hands-on cloud security techniques. Prior to founding Securosis, Rich was a Research Vice President at Gartner on the security team. Prior to his seven years at Gartner, [...]
Principal Consultant, Mandiant
Doug Bienstock is a Principal Consultant at Mandiant helping to find evil and solve crime.
Josh Madeley is an IR Manager at Mandiant helping to find evil and solve crime.
Security Research Engineer, Elastic
William Burgess is a Security Research Engineer at Elastic, where he focuses on Windows internals, reverse engineering, and detection engineering.
PhD Student & Cyber Security Researcher
Ben Nassi is a PhD student at Ben-Gurion University of the Negev (BGU) and a former Google employee. His research interests are security and privacy of drones, advanced driving assistance systems, smart irrigation systems, wearable technology, and other cool topics. His research was presented at top conferences (S&P, Ubicomp, DEF CON) and published in journals (TIFS), and was also covered by international media (Wired, ArsTechnica, Motherboard, Washington Post, Bloomberg, Business Insider). Ben has spoken at prestigious venues including 40th IEEE Symposium on Security and Privacy, RSA Conference 2020, CyberTech TLV [...]
Director of Systems Engineering
Victor Tavares leads the Systems Engineering organization for Palo Alto Networks in Canada, where he is responsible for the customer and partner facing SE team. Victor has more than 20 years of experience in the networking and information security industry where he has worked with most of Canada's largest enterprise, service provider, and public sector organizations. Prior to joining Palo Alto Networks in 2014, Victor lead the Enterprise Systems Engineering team at Juniper Networks in Canada, which he joined through Juniper’s acquisition of network security pioneer NetScreen Technologies in 2004. [...]
VP, Global Services Technical Operations
Tony Lee, Vice President of BlackBerry Global Services Technical Operations, has more than fifteen years of professional research and consulting experience pursuing his passion in all areas of information security. As an avid educator, Tony has instructed thousands of students at many venues worldwide, including government, universities, corporations, and conferences such as Black Hat. He takes every opportunity to share knowledge as a contributing author to Hacking Exposed 7, and is also a frequent blogger, researcher, and author of white papers on topics ranging from Citrix Security, the China Chopper [...]
Tomer Bar is a security researcher and a research team leader with 15+ years of unique experience in the sec field. Currently, he leads the SafeBreach Labs research team. His experience involved vulnerability research, malware analysis, etc. Speaker at BlackHat and Defcon conferences.
Peleg Hadar (@peleghd) is a security researcher with over 8 of years of unique experience in the security field. Currently, he is doing research @SafeBreach Lab after serving in various security positions @IDF. His experience includes security from many angles: starting with network research, and now mostly software research. Peleg likes to investigate mostly Microsoft Windows components.
Senior Product Marketing Director
Thom Bailey leads the product marketing team at Mimecast. With 20+ years in product marketing and product management experience, Thom’s passion has been one of understanding the intersection of IT Operations and Security. A frequent speaker and security evangelist, Thom is responsible for the product marketing of Mimecast’s Email Security 3.0, Awareness Training, Threat Intelligence, Ecosystem Integration, and the overall Suite strategy.
Stephan Jou is CTO of Interset, a Micro Focus company, a leading-edge cybersecurity and In-Q-Tel portfolio company that uses machine learning and behavioral analytics. Jou currently leads both Interset and various analytics-related initiatives for Micro Focus’ security division. Previous to Interset, Jou has been at IBM and Cognos where he led the development of over 10 products in the areas of cloud computing, mobile, visualization, semantic search, data mining and neural networks. Jou holds a M.Sc. in Computational Neuroscience and Biomedical Engineering, and a dual B.Sc. in Computer Science and [...]
Lead Security Threat Researcher
Shyam Sundar Ramaswami is a Lead Threat Researcher with Cisco Umbrella. Shyam is a two-time TEDx speaker, GREM certified malware analyst, Cisco Security Ninja black belt and a teacher of cyber security. Shyam has delivered talks for several conferences such as Black Hat (Las Vegas), Qubit Forensics (Serbia), Nullcon 2020 (Goa), Cisco Live (Barcelona), and for several universities and IEEE forums in India. Shyam teaches "Advanced malware attacks and defenses" in Stanford University’s cyber security program and runs a mentoring program called “Being Robin” where he mentors students all over [...]
Sr. Director Systems Engineer
Shane Coleman is the Director of Systems Engineering for Forescout’s Central US and Canada Region. With 20 years of Network and Application Security experience from organizations including CCC Information Services, Checkpoint Software and F5 Networks, he brings an interesting perspective to the evolving landscape of Cybersecurity. Shane holds a Master’s of Science in Operations & Technology Management from the Illinois Institute of Technology, ISC2’s CISSP Certification and is based in Chicago, IL.
Practice Director – ICS & IOT
Sean Tufts is the Practice Director for the OT/IOT business at Optiv. He's a former NFL Linebacker turned Critical Infrastructure security leader. Post NFL, he worked for utility operators and O&G hardware suppliers. Prior to his current leadership position at Optiv, Sean was on the Digital transformation team for General Electric focusing on security services for the O&G market. In 2012 he was honored by Forbes as a "30 Under 30" recipient.”
Director, Product Marketing
Sami Laine is Director of Product Marketing for Security at Okta. Over the years, Sami has helped many of the world's largest enterprises and financial institutions fight fraud, malware, threats, and breaches at CyberSource, RSA and CloudPassage and now focuses on helping companies embrace identity as the new security perimeter.
As Senior Technical Specialist – Modern Workplace Security and Compliance, Rodney Buike specializes in identity, threat, and information protection focused on enhancing the security and compliance practices of Microsoft 365 clients worldwide. An expert in cloud technology, this award-winning technology evangelist works collaboratively with finance, insurance, and manufacturing clients to ensure their workforce can work securely on any device and in any location. Rodney is a gifted communicator and technician. Throughout a 20+-year career, his ability to analyze and resolve complex problems has benefited clients greatly. A passionate advocate for [...]
Peter Cresswell has over 25 years of IT Security experience, from a diverse background as an IT Manager, Security Solution Architect, Practice Manager, Security Instructor, Product Manager, and Security Auditor. With Trend Micro, Peter has focused on the big migration from perimeter to system-based security controls, across Physical, Virtual, and Cloud environments. Currently, Peter focuses on Canadian companies migrating to the Cloud, and the architectures, processes, and technologies that get them there safely. Peter is often called upon to speak to Security as it applies to Cloud and related Security [...]
Chief Technology Officer
Nicolas (Nico) Fischbach serves as Forcepoint’s global Chief Technology Officer, where he oversees technical direction and innovation. Before joining Forcepoint, he spent 17 years at Colt, a global B2B service provider, and was responsible for company-wide strategy, architecture and innovation. He ran global network security engineering and operations for eight years, building Colt’s first Security Operation Center and deploying the first DDoS mitigation solution in Europe. In 2009, he joined the Office of the CTO to build and lead the company-wide strategy and architecture groups covering infrastructure and product R&D [...]
Head of Enterprise Security Strategy
Nathan is a Cyber Security & Technology leader with over 18 years of experience across financial services, management consulting, executive search, insurance, and software industry verticals. Nathan is highly experienced in digital transformation, leadership enrichment, organizational development and the modernization of enterprise security programs and architectures, enabling businesses through consumable service-based delivery capabilities. Nathan maintains a contemporary view of technology and cyber security and is a strong believer in process and technology innovation to drive transformational change. Nathan currently serves as director on the enterprise strategy team at Netskope, the [...]
SR. Solution Engineer
Matthew Balcer is the Senior Solution Engineer for SentinelOne in Canada. Matthew has spent over a decade consulting customers on building networks, communication platforms, and cyber security. Prior to joining SentinelOne to support their innovative endpoint protection he worked for industry leaders such as Cisco and Kaspersky Lab. A passionate evangelist for cyber security, he is a frequent speaker and panel member helping customers understand the threat landscape and measures to defend against it.
TITAN Malware Research Lead
Lilly is a TITAN Malware Research Lead at GoSecure and started her journey being mostly self-taught making hacking tools in her spare time. Chameleon (custom base64 steganography), Badger (DLL Security Enumeration including ASLR Entropy), Dirty-Needle (DLL Injection Tool), The Chrome Crusader (Chrome Extension Malware POC) and more. She has presented at many conferences such as AtlSecCon, BSides Las Vegas, SecTor, BSides Fredericton, BSides St Johns, HASK, ISACA Atlantic, GoSec, Art into Science and more. Topics have included PE File Structure Security, Steganography, Chrome Extension Malware (Removing Security Headers), The History [...]
Director of Product Marketing, Security Operations
Karl is ServiceNow’s Senior Director of Product Marketing for Security and Risk and has over 15 years of experience in product positioning and marketing of enterprise security platforms, most recently from Product Marketing roles at RSA and McAfee, where he was responsible for the positioning of their security operations and automation platforms. While at RSA and McAfee he managed product positioning, launches, analyst relations and development and delivery of sales tools and online webinars. When not focusing on enterprise security, he can be found camping, hiking, and kayaking with his [...]
Senior Manager, Security Operations and Engineering
Justin leads and supports Rapid7's internal Security Operations & Engineering team, who drive vulnerability management and incident detection & response efforts company wide. They also partner closely with Rapid7's Corporate IT teams to continuously evolve and automate security controls that enable our business to securely advance.
Lead Global Technical Threat Advisor
Josh Burgess has over 10 years of cyber threat analysis and mitigation experience, holding multiple positions in the intelligence community, the U.S. Department of Defense and the financial sector. In the majority of his roles, he has served as the technical lead Threat Intelligence Officer for large security operations centers (SOCs), advising on the latest threats to ensure a sound security posture. As the Lead Technical Strategic Advisor at CrowdStrike, Josh applies his experience in actioning both short-term tactical and long-term strategic intelligence data and reporting for customers.
Senior Director of Customer Service
Jody Caldwell is the Senior Director of Customer Success for ThreatConnect. Previously, he spent time in both the DoD and the Intelligence Community working with Network Security Operations Centers (NSOC) and Computer Emergency Response Teams (CERTS) in a variety of positions that include cyber threat analysis and leading cyber threat hunt teams. Jody's passionate about working with customers to strengthen security programs and leverage cyber threat intelligence to enhance their awareness while mitigating risks. Jody lives in Charleston, SC and enjoys boating and golfing.
Chief Information Security Officer
As a security technologist and leader for over 20 years, Jeff’s deep experience securing information and technology assets as well as years of successful engineering leadership have resulted in secure product deployments to thousands of customers. As the Deputy CISO at ExtraHop Networks, Jeff leads the ExtraHop team towards groundbreaking security and privacy services in ExtraHop's best of breed network monitoring tool.
Senior Solutions Architect
Gina Scinta is a Senior Solutions Architect with the Thales, DIS, Cloud Protection and Licensing business line. She has over 30 years of experience in the information technology profession, encompassing pre/post sales engineering support for Commercial and Federal territories. For the past 10 years, she has focused on providing solutions for protecting data using world class encryption and key management for data at rest in data centers and cloud infrastructures.
Director, Security Technologists
Gary is an industry veteran bringing over 20 years of broad technology experience including routing and switching, data center, wireless, mobility and collaboration but always with a focus on security. His previous roles include security SME, consultancy, product management, IT and customer support. Gary seeks to understand and convey the constantly evolving threat landscape, as well as the techniques and solutions that address the challenges they present. Prior to joining Netscout in 2012, he spent 12 years at Cisco Systems and held previous positions with Avaya and Cable & Wireless.
Vice President of Research and Development
Dinah Davis has over 19 years of experience in the technology industry, with 16 years of it in security roles at Arctic Wolf, BlackBerry, Trustwave, and Communications Security Establishment Canada. Dinah holds a Masters of Mathematics and Cryptography from the University of Waterloo and over 15 patents in the cybersecurity space. As Vice President of Research & Development at Arctic Wolf, Dinah currently leads the team responsible for building the platform that Arctic Wolf uses to deliver its Security Operations as a Service (SOCaaS) to hundreds of organizations across North [...]
Threat Operation Engineer
Jonathan is a 10-year veteran of the cyber security industry, with a degree in Computational Mathematics and CISSP and GCIH security certifications. His interests lie in not just understanding how attackers get in, but also in understanding the market forces that drive their criminal activity.
David Lu splits his time as a Security Researcher at Tripwire and a computer science instructor at Portland State University. At Tripwire, he helps develop content for MITRE ATT&CK and is interested in threat hunting and incident response methodologies as well as understanding emerging security threats. At PSU, he teaches courses on problem solving through programming, discrete math, data structures and algorithms, and computing ethics. David received an MPhil in Philosophy from Syracuse University and previously taught analytic philosophy.
Christopher Hills has more than 15 years of experience as a Senior Security and Architecture Engineer operating in highly sensitive environments. Christopher is a military veteran of the United States Navy and started with BeyondTrust after his most recent role leading a Privileged Access Management (PAM) team as a Technical Director within a Fortune 500 organization. In his current position, he has responsibilities as a Senior Solutions Architect consulting on PAM implementations and reports to the Office of the CTO as an acting Deputy CTO. In his free time, he enjoys spending [...]
Senior Threat Intelligence Sales Engineer
Chris Davis works for Kaspersky as a Senior Threat Intelligence Sales Engineer where he helps customers leverage Kaspersky Threat Intelligence solutions and tradecraft to help define their Attack Surface and provide context around that Attack Surface and relevant threats. Prior to Kaspersky he worked at RiskIQ as a Solutions Architect helping customers identify their Attack Surface outside their firewalls and at Optiv Security where he directly supported Optiv’s Managed Security Service’s practices with threat intelligence analysis and onsite consultation to customers building/maturing their threat intelligence programs. With a background in [...]
After earning my Masters in Electrical Engineering, I spent over 20 years developing software applications to test hardware such as Torpedoes, Circuit Boards and Digital Subscriber Line (xDSL) modems. During that time, I was also able to contribute to the product development for both Embedded and Distributed Enterprise Applications. In 2015 I joined IBM Security as a Technical Pre-Sales Engineer focused on the AppScan tool suite for Static, Dynamic and Mobile Application Security Testing. After spending a few years in Application Security, I decided to expand my Cybersecurity proficiency and [...]
Principal Strategic Systems Consultant
Bryan Patton is a Principal Strategic Systems Consultant at Quest Software. For nearly 20 years he has helped customers shape their Microsoft environments. With particular emphasis on Active Directory and Office 365 environments, Bryan specializes in Identity and Access Management, Data Governance, Migration, and Security, including Certified Information Systems Security Professional (CISSP) certification.
Mr. Amin is a senior technology executive experienced in building and scaling businesses at software, networking, public and private companies. He has a broad background in enterprise security, identity and access management, identity proofing, authentication, privacy, and API security. He is a strong strategic thinker with operational execution, portfolio, and P&L management skills. At Ping Identity, Mr. Amin is currently CTO for West, helping customers with their IAM best practices, strategy execution, zero trust architecture, IoT Identity, and modeling for a privacy first approach. At Ping Identity he is also [...]
VP Worldwide Sales Engineering
Andy Skrei is the VP of worldwide sales engineering at Exabeam, a company that provides next-generation security intelligence and management solutions to help organizations protect their most valuable information. He previously worked as a lead security engineer at eBay, developing and deploying technologies for its global SOC.