Past Events



Sesssions


- Schedule Not Yet Finalized '

Threat Hunting Intelligently

Although times are unprecedented, for threat actors, it is business as usual. Even as times change, good threat intelligence will always be a bedrock of cybersecurity. Join Senior Security Research Consultant and Secureworks’ Threat Hunting lead Ryan Cobb, as he shares what’s on the threat horizon and how the Secureworks team is there to keep […]

Sponsor Track
Ryan Cobb
- Schedule Not Yet Finalized '

A Savvy Approach to Leveraging MITRE ATT&CK

MITRE ATT&CK has shifted the balance of power from attackers to defenders. For the past few years, defenders have been increasing their security tooling and are detecting more adversarial techniques than ever before. Detecting events in your environment is only the first step. Going forward the focus isn’t going to be on if you detect […]

Sponsor Track
Travis Smith
- Schedule Not Yet Finalized '

PKI Well Revised: Common Mistakes Which Lead to Huge Compromise of Identity

All technologies and systems currently use cryptography and most use certificates at some point. Since their boom, internal PKI systems have not changed a lot nor have the problems that we observe during almost all pentests. It’s time to revise your knowledge about one of the cornerstones of enterprise security and learn a few tricks […]

SECurity FUNdamentals
Mike Jankowski-Lorek
Paula Januszkiewicz
- Schedule Not Yet Finalized '

An Introduction to Automotive Security in 2020

As cars continue to become more connected and autonomous, the security of these systems grows in importance. We’re now a decade away from the first public research on automotive security, and since then the challenges of securing these vehicles has increased due to new features. connectivity, and automation. In this talk, we’ll provide an introduction […]

SECurity FUNdamentals
Eric Evenchick
- Schedule Not Yet Finalized '

Escaping Virtualized Containers

Containers offer speed, performance, and portability, but do they actually contain? While they try their best, the shared kernel is a disturbing attack surface: a mere kernel vulnerability may allow containerized processes to escape and compromise the host. This issue prompted a new wave of sandboxing tools that use either unikernels, lightweight VMs or userspace-kernels […]

Tech
Yuval Avrahami
- Schedule Not Yet Finalized '

Practical Defenses Against Adversarial Machine Learning

Adversarial machine learning has hit the spotlight as a topic relevant to practically-minded security teams, but noise and hype have diluted the discourse to gradient-based comparisons of blueberry muffins and chihuahuas. This fails to reflect the attack landscape, making it difficult to adequately assess the risks. More concerning still, recommendations for mitigations are similarly lacking […]

Tech
Ariel Herbert-Voss
- Schedule Not Yet Finalized '

Identifying and Defending the Perimeter With Attack Surface Management

The need to operate online has driven businesses toward a digital transformation with cloud adoption at its core. The pace of this transformation sped up drastically as COVID-19 dispersed entire workforces and business operations around the world. In a matter of days, operating a business with an entirely “at home” workforce became the norm. And […]

Sponsor Track
Geoffrey Roote
- Schedule Not Yet Finalized '

Using Threat Metrics for Better Information Security Program Efficacy – Leveraging MITRE ATT&CK

Information Security leaders face a problem: to prove the value equation of their security investments. Security efficacy is often brought up as a key challenge – not just how to leverage technology, but how to measure what results it delivers. Enumerating how many detections were surfaced by a malware defense platform or if a perimeter […]

Sponsor Track
Brian Brown
- Schedule Not Yet Finalized '

Security Transformed

Preceding the outbreak of COVID-19 was a trend across industries to transform the traditional IT stack into a new form of computing, one that was focused on enabling agility and innovation while also delivering cost reduction. This shift sought to leverage public cloud and cloud-like development methods as well as infrastructure design. The effort to […]

Sponsor Track
Avi Rembaum
- Schedule Not Yet Finalized '

How to Automate Security Validation and Reduce Enterprise Security Risk

Cybersecurity software has evolved by leaps and bounds in the past decade. However, one domain was neglected and has fallen behind – security validation. Today, the measurement of a network’s cyber posture is done in a manual, non-scalable way, through costly 3rd-party pentesting service providers. As a result, a huge gap has been created between […]

Sponsor Track
Aviv Cohen
- Schedule Not Yet Finalized '

Lateral Movement and Privilege Escalation in GCP; Compromise any Organization without Dropping an Implant

Google Cloud’s security model in many ways is quite different from AWS. Spark jobs, Cloud Functions, Jupyter Notebooks, and more default to having administrative capabilities over cloud API’s. Instead of defaulting to no capabilities, permissions are granted to default identities. One default permission these identities have is called actAs, which allows a service by default […]

Tech
Dylan Ayrey
Allison Donovan
- Schedule Not Yet Finalized '

Demystifying Modern Windows Rootkits

This talk will demystify the process of writing a rootkit, moving past theory and instead walking the audience through the process of going from a driver that says “”Hello World”” to a driver that abuses never-before-seen hooking methods to control the user-mode network stack. Analysis includes common patterns seen in malware and the drawbacks that […]

Tech
Bill Demirkapi
- Schedule Not Yet Finalized '

Defending Containers Like a Ninja: A Walk through the Advanced Security Features of Docker & Kubernetes

Today, with a few commands anyone can have containers running on their machine; at this point, they seem to be neither complex nor complicated to secure. However, the story dramatically changes when the ecosystem grows exponentially and now we have thousands of nodes that fulfill different roles, with different resources, running different applications, in different […]

Tech
Sheila Berta
- Schedule Not Yet Finalized '

Policy Implications of Faulty Cyber Risk Models and How to Fix Them

Bad security data leads to bad security policies; better data enables better policies. That, in a nutshell, is the thesis of this talk. To back that up, we’ll share a FUD-free and data-driven analysis of the frequency and economic costs of tens of thousands of historical cyber incidents, with a special focus on events that […]

Tech
Wade Baker
David Severski
- Schedule Not Yet Finalized '

The Paramedic’s Guide to Surviving Cybersecurity

The security world is fraught with cases of mental health issues, burnout, substance abuse, and even suicide. We live in a world of threats and responses that trigger the deepest parts of our psyche; with the barriers between “”online”” and the physical world constantly crumbling. While some deal in theory, many of us deal with […]

Tech
Rich Mogull
- Schedule Not Yet Finalized '

My Cloud is APT’s Cloud: Investigating and Defending Office 365

As organizations increase their adoption of cloud services, we see attackers following them to the cloud. Microsoft Office 365 is becoming the most common email platform in enterprises across the world and it is also becoming an increasingly interesting target for threat actors. Office 365 encompasses not only Exchange, but also Teams, SharePoint, OneDrive, and […]

Tech
Doug Bienstock
Josh Madeley
- Schedule Not Yet Finalized '

Detecting Access Token Manipulation

Windows access token manipulation attacks are well known and abused from an offensive perspective, but rely on an extensive body of arcane Windows security internals: logon sessions, access tokens, UAC, and network authentication protocols, such as Kerberos and NTLM, to name a few. Furthermore, some of this information is not easily found and can be […]

Tech
William Burgess
- Schedule Not Yet Finalized '

Lamphone: Real-Time Passive Reconstruction of Speech Using Light Emitted from Lamps

Recent studies have suggested various side-channel attacks for eavesdropping sound by analyzing the side effects of sound waves on nearby objects (e.g., a bag of chips and window) and devices (e.g., motion sensors). These methods pose a great threat to privacy, however they are limited in one of the following ways: they (1) cannot be […]

Tech
Ben Nassi
- Schedule Not Yet Finalized '

Intelligent Network Security: A Paradigm Shift in Cybersecurity!

Cyberattacks are ever-evolving, increasingly using automation to morph and elude detection. Add to this an ever-expanding attack surface, the rapid growth of both cloud adoption and remote users, and a flood of new, hard-to-secure IoT devices. Clearly, the enterprise threat landscape has never been more challenging. Traditional manual and reactive security approaches are simply over-matched. […]

Sponsor Track
Victor Tavares
- Schedule Not Yet Finalized '

Level Up Your SOC: Meet CyBot, Our Open Source Threat Intel Chat Bot

Threat intelligence chat bots are useful friends. They perform research for you and can even be note takers or central aggregators of information. However, it seems like most organizations want to design their own bot in isolation and keep it internal. To counter this trend, our goal was to create a repeatable process using an […]

Sponsor Track
Tony Lee
- Schedule Not Yet Finalized '

A Decade After Stuxnet’s Printer Vulnerability: Printing Is Still the Stairway to Heaven

In 2010, Stuxnet, the most powerful malware in the world revealed itself, causing physical damage to Iranian nuclear enrichment centrifuges. To reach Iran’s centrifuges, it exploited a vulnerability in the Windows Print Spooler service to gain code execution as NT AUTHORITY\SYSTEM. Due to the hype around this critical vulnerability, we (and probably everyone else) were […]

Sponsor Track
Tomer Bar
Peleg Hadar
- Schedule Not Yet Finalized '

Mitigate Organizational Risk With Integrated Cyber Resilience

Threats have changed over the years and so have the targets. It’s not just your perimeter that is at risk, it’s your customers, your supply chain, your employees and your business reputation that could be easily tarnished with just one breach. In this session, we’ll discuss how and why you should consider an integrated approach […]

Sponsor Track
Thom Bailey
- Schedule Not Yet Finalized '

From Security Operations to COVID-19: Security AI State of the Nation, 2020

Many businesses are at a disadvantage when it comes to combating the bad guys. In cybersecurity today, there are too many threats, complex tools, and false positives– not to mention the lack of experienced security professionals – to defend your whole enterprise properly. Fortunately, technologies such as AI and analytics are here to help. However, […]

Sponsor Track
Stephan Jou
- Schedule Not Yet Finalized '

Dissecting Pandemic-Themed Malware and Threat Tactics

Threat actors have always played the game of emotions. Fear is the emotion they are using right now to lure users to click on an email or manipulate them to install an application. In the last four months, cyber criminals have used fear as their main weapon to compromise users by using pandemic-related themes to […]

Sponsor Track
Shyam Sundar
- Schedule Not Yet Finalized '

Measuring Risk in 2020 – The Enterprise of Things Security Report

While cybersecurity teams work to address operational and functional gaps, cybercriminals develop attacks targeting the top areas of risk for a company. Using the Forescout Device Cloud, the world’s largest repository of connected device data, Forescout Research Labs analyzed the risk posture of more than 8 million devices to uncover detailed information about the greatest […]

Sponsor Track
Shane Coleman
- Schedule Not Yet Finalized '

Trends in IOT/OT/mIOT

Non-traditional operating systems are driving even more complexity to the security landscape. Whether it’s an IPCamera at a parking lot, a sensor on a conveyer belt or a control system kickstarting a nuclear reactor, these facilities need to be recognized by security. Defining and discovering these assets sets a new perimeter…utilizing their data safely is […]

Sponsor Track
Sean Tufts
- Schedule Not Yet Finalized '

From 30% to 100% Remote: How Okta’s Technology Teams Led the Rapid Shift to an Entirely Remote Workforce

Okta has been supporting a remote workforce for years, but like many organizations we were not expecting a rapid shift to 100% remote work. Fortunately, our IT leaders had the secret sauce for a relatively seamless transition: a 100% cloud-based architecture. This session, featuring Okta’s IT leadership, will cover how Okta’s cloud-first IT strategy and […]

Sponsor Track
Sami Laine
- Schedule Not Yet Finalized '

Evolving Your Security Culture

2020 has seen a significant shift in how businesses abruptly implemented remote working. With the massive surge of “Work From Anywhere” (WFA) and the information security challenges that came with it, there is a strong push to improve and modernize the security culture of organizations of all sizes, without compromising on collaboration and productivity. Join […]

Sponsor Track
Rodney Buike
- Schedule Not Yet Finalized '

How an XDR Approach Helps Speed Response & Improve MITRE ATT&CK Coverage

XDR is an emerging industry approach that extends EDR’s insight to a broad range of sources (endpoint, servers, network, email, and more). Join Trend Micro Sales Engineer, Peter Cresswell, to learn how the XDR approach takes advantage of detailed activity telemetry (not just alerts) from its sources, enabling more meaningful correlation and enabling rapid detection […]

Sponsor Track
Peter Cresswell
- Schedule Not Yet Finalized '

SASE Success Behind-The-Scenes

SASE converges network, web, data, and cloud app connectivity and security, but implementing a true SASE architecture is a daunting task and there is no one-size-fits-all approach. Join Forcepoint Global CTO Nicolas Fischbach for insights on Forcepoint’s approach to delivering the industry’s first true data-centric SASE as well as providing steps for a practical approach […]

Sponsor Track
Nicolas (Nico) Fischbach
- Schedule Not Yet Finalized '

The Impact of Digital Transformation in the Face of Today’s Threats

Digital Transformation and the rapid need for supporting remote workers for digital business processes took every industry by storm. This change has presented new risks, unlike what companies have seen before, and has created the greatest loss of visibility for security, auditing, and quality control professionals since the emergence of the Internet. As companies continue […]

Sponsor Track
Nathan Smolenski
- Schedule Not Yet Finalized '

The Hunt is On!

“I do have are a very particular set of skills, skills I have acquired over a very long career. Skills that make me a nightmare for people like you.” – Bryan Mills (Taken) Wouldn’t it be nice if we all had the skills required to send that message to cybercrime actors? Wouldn’t it be nice […]

Sponsor Track
Matthew Balcer
- Schedule Not Yet Finalized '

Building a Threat Intelligence Team From Scratch on a Budget

Budgets are tighter than ever during the COVID-19 pandemic and threat actors have only increased their malicious activity. This makes it difficult to start a new threat intelligence program, but it doesn’t have to be this way. In this talk we will teach you how to start a threat intelligence team from scratch using repurposed […]

Sponsor Track
Lilly Chalupowski
- Schedule Not Yet Finalized '

Using Automation to Secure Your Remote Workforce

COVID-19 has already profoundly changed the way many of us work in security operations—including the necessary acceptance of BYOD (Bring Your Own Device). These devices make a tempting target for cybercriminals, and organizations are scrambling to beef up their perimeters. Learn the various solutions CIOs and CISOs are adopting to help address securing their remote […]

Sponsor Track
Karl Klaessig
- Schedule Not Yet Finalized '

The Need for Speed: Collaborative Strategies for Accelerating Security Outcomes

While advances continue to be made in InfoSec practices and tools, attackers still seem to outpace defenders. Why? There is a plethora of industry knowledge about what should go into a mature security program, yet organizations still seem to struggle with how to go about building and evolving theirs in ways that provide real, tangible […]

Sponsor Track
Justin Pagano
- Schedule Not Yet Finalized '

Sophistication Advancements in Ransomware

Cyber attacks and specifically Ransomware continue to evolve and change the way the world does business. Over the last several years, actors performing ransomware attacks have increased their capabilities and sophistication which has resulted in more refined targeting, but also additional revenue generation. Josh will share some the most recent Canadian and Global attacks, as […]

Sponsor Track
Josh Burgess
- Schedule Not Yet Finalized '

Priority Intelligence Requirements (PIR) Are Not Just for Threat Intel Analysts

The Intelligence discipline has defined processes, analytical techniques, and procedures, but they are not only for Intel teams. The analytical techniques that have been cultivated, refined, and tested within the Intelligence cycle have been used for operational use to make teams more successful since they are adaptable. For example, Priority Intelligence Requirements (PIRs), are long […]

Sponsor Track
Jody Caldwell
- Schedule Not Yet Finalized '

Talking to the Board About the New Realities of IT Security

With the sudden shift of the global workforce from in-office to remote, IT teams quickly transformed their operations to accommodate the new realities of business — including large-scale adoption of work-from-home technologies, heightened activity on customer-facing networks, and greater use of online services. While these examples of agility allowed business to continue, they also greatly […]

Sponsor Track
Jeff Costlow
- Schedule Not Yet Finalized '

A New Security Reality: Data IS the Perimeter

We all know that the operating paradigm in which business is conducted changes on almost a daily basis, yet the way we defend the sensitive data within our business has remained static for nearly 3 decades. Perimeter security is not sufficient, and that’s why we have embraced the concept of Securing the Breach by protecting […]

Sponsor Track
Gina Scinta
- Schedule Not Yet Finalized '

NETSCOUT Threat Intelligence Report – H1 2020

Today’s attackers have abandoned the equivalent of sledgehammers for a quiver of custom arrows as they increasingly conduct extensive reconnaissance and choose weapons specifically tailored to exploit the defensive weaknesses they discover. Even worse, they have an ever-growing range of new or increasingly used vectors from which to choose. During this session, you will learn […]

Sponsor Track
Gary Sockrider
- Schedule Not Yet Finalized '

Could Your Business Survive a Ransomware Attack?

Ransomware has been in the wild since 1983 but saw a steep rise with the advent of WannaCry in 2017 and is showing no signs of slowing down. In fact, we are seeing more breaches than ever before using this attack. It is important for everyone to understand how it works and how to avoid […]

Sponsor Track
Dinah Davis
Jonathan Walsh
- Schedule Not Yet Finalized '

Knowing Is Half the battle: Shared Responsibility and Secure Configuration in the Cloud

In this session, we will dive into the shared responsibility model that exists within the world of cloud service providers (CSPs). While the service providers take over much of the responsibility traditionally owned by IT teams, they also introduce new responsibilities that may create blind spots. We’ll look at how the CIS Benchmarks for CSPs […]

Sponsor Track
David Lu
- Schedule Not Yet Finalized '

A Hackers Dream: Unmanaged Privileges

In times of crisis, good security practices are often the first thing to go. Organizations are being forced to revisit their “temporary” remote working policies and tools. An expanding remote workforce can increase your security risk, especially if your IT and Support employees use non-secure remote access tools as temporary measures. Are temporary remote access […]

Sponsor Track
Christopher Hills
- Schedule Not Yet Finalized '

Cyber Threat Intelligence and Today’s Complicated Cyber Security Environments

Threats to your organization can be overwhelming. Your Threat Intelligence shouldn’t be. Today, there is a huge and growing need for the simplification of threat intelligence. Security environments are already over-complicated and getting worse. In this session, you’ll learn how up-to-the-minute, relevant data can help you manage the risks associated with IT security threats, within […]

Sponsor Track
Chris Davis
- Schedule Not Yet Finalized '

Don’t Be Afraid to Upgrade: Lessons of Speed and Security From High Performance Open Source Development

For the past six years, I’ve studied behaviors of 15,000 commercial development teams, 24,000 open source projects, and the community of adversaries attacking open source software supply chains. One thing is certain: when it comes to security, speed is king. In 2017, it took three days for adversaries to exploit new vulnerabilities discovered in open […]

Sponsor Track
Bryan Whyte
- Schedule Not Yet Finalized '

AD Security vs Modern Attacks

Active Directory has been providing critical services and infrastructure to nearly every company, organization and even government agencies since Y2k. AD has grown with us, both in functionality and security but so have the attackers. Since AD contains information about all of our users – both standard and admins, touches and controls access to most […]

Sponsor Track
Bryan Patton
- Schedule Not Yet Finalized '

Zero Trust Security Starts With Identity

Some organizations have been embracing the “Zero Trust” security model, and others are still trying to decide what it means and whether it makes sense for them to try it. With the sudden need for more flexibility, scalability, and remote access, many of these enterprises have found themselves in unfamiliar territory without a map. In […]

Sponsor Track
Baber Amin
- Schedule Not Yet Finalized '

SOC Automation: Faster Decision Making and Response

Security analysts spend two-thirds of their time on triage and investigation. Why then do most security operations teams only automate response? In this presentation, Andy Skrei will share his experience automating the end-to-end security workflow while leading security investigations at one of the world’s largest online retailers and through working with many of the world’s […]

Sponsor Track
Andy Skrei
- Schedule Not Yet Finalized '

CryCryptor, the Fake COVID-19 Tracing App That Targeted Canadians

Cybercriminals regularly use major newsworthy events as an opportunity to lure targets into their trap. The COVID-19 pandemic probably constitutes one of the most prolific and advantageous settings for the bad actors to launch their attacks: an anxious population, a digital transformation movement that pushed everyone online, high demand for goods that are no longer […]

Sponsor Track
Alexis Dorais-Joncas
- Schedule Not Yet Finalized '

A Brave New World – Attacks in the Age of COVID

The COVID pandemic has allowed attackers to exploit users with phishing attacks, ransomware, and other scams. FortiGuard Labs has recorded over 600 unique campaigns related to COVID cyberattacks per day. We will examine some of the top attacks, understand how attackers are creating the attacks, and the platforms they are targeting. Learn how attackers have […]

Sponsor Track
Aamir Lakhani

Sponsors


Check Point

Diamond

Qualys

Diamond

BlackBerry

Gold

Cisco

Gold

CrowdStrike

Gold

Dell Technologies

Gold

ExtraHop Networks, Inc.

Gold

Forcepoint

Gold

Fortinet

Gold

GoSecure

Gold

Micro Focus

Gold

NETSCOUT

Gold

Optiv

Gold

Thales

Gold

Arctic Wolf

Silver

BeyondTrust

Silver

ESET

Silver

exabeam

Silver

Forescout

Silver

Kaspersky

Silver

McAfee

Silver

Microsoft

Silver

Mimecast

Silver

Netskope

Silver

Okta

Silver
Palo Alto

Palo Alto Networks

Silver

Pcysys

Silver

Ping Identity

Silver

Quest

Silver

Rapid7

Silver

Risk IQ

Silver
SafeBreach

SafeBreach

Silver

SentinelOne

Silver

ServiceNow

Silver

Sonatype

Silver

ThreatConnect

Silver

Trend Micro

Silver

Tripwire

Silver

(ISC)2

Bronze

Armis

Bronze

BitSight

Bronze

BSI Group Canada

Bronze
Charles River Associates

Charles River Associates

Bronze

CIRA

Bronze

CyberArk Software Inc.

Bronze

Detectify

Bronze

Devolutions

Bronze

DUO

Bronze

ForgeRock

Bronze

Ingram Micro Inc.

Bronze

Speakers


Ryan Cobb

Ryan Cobb

Senior Information Security Researcher


Ryan is a senior information security researcher working in the Secureworks Counter Threat Unit (CTU) Special Operations team. Ryan is in a cross-functional role supporting threat hunting and incident response operations with bespoke automation, data analysis, and threat research. Ryan joined Secureworks in 2012 as a consultant on the Secureworks Incident Response team where he led complex intrusion investigations, including novel cyber-attacks from hostile state actors. Ryan is the author and instructor of several courses designed to train, advise, and assist analysts through advanced technical skill development. He is an [...]

Travis Smith

Travis Smith

Director, Malware Threat Research


Travis is the Director of Malware Threat Research at Qualys. He has spent the past 15 years in the security industry with a focus on digital forensics and incident response. He holds a wide array of certifications ranging from GIAC Certified Penetration Tester to the CISSP, as well as an MBA with a concentration in information security. Travis has presented his research at conferences worldwide at venues such as BlackHat, RSA, and SecTor.

Mike Jankowski-Lorek

Mike Jankowski-Lorek


CQURE Director of Consulting, Database and Machine Learning Architect, Cybersecurity Expert Dr. Mike is a solution architect, developer, data scientist and Security Expert with more than 15-years’ experience in the field. He designs and implements solutions for Databases, Network & Management area, mainly for Microsoft platform for medium to enterprise-level organizations. Dr. Mike holds multiple certifications, in particular security, database and software development related. He also holds a Ph.D. in Computer Science. Mike-Jankowski-Lorek is one of the core Experts at CQURE – worldwide known cybersecurity company.

Eric Evenchick

Eric Evenchick

Embedded Systems Developer


Eric has worked in development and reverse engineering roles for hardware and software companies, specializing in embedded devices, automotive systems, and bespoke tool development. He is currently a Principal Research Consultant at Atredis Partners. Eric’s work with embedded systems began with development of research vehicles at the University of Waterloo, in partnership with General Motors and the US Environmental Protection Agency. This experience lead to roles in developing automotive firmware and reverse engineering vehicle systems at companies including Tesla Motors and Faraday Future. In 2014, Eric founded Linklayer Labs, which [...]

Yuval Avrahami

Yuval Avrahami

Senior Security Researcher, Palo Alto Networks


Yuval Avrahami is a Senior Security Researcher at Palo Alto Networks, dealing with hacking and securing anything related to containers. Yuval is a veteran of the Israeli Air Force, where he served in the role of a researcher.

Ariel Herbert-Voss

Ariel Herbert-Voss

Senior Research Scientist, OpenAI


Ariel Herbert-Voss is a Senior Research Scientist at OpenAI where she works on breaking machine learning systems at the algorithmic level and loves all things to do with malicious uses and abuses of AI. She is a PhD student at Harvard University and periodically conducts trainings on practical adversarial machine learning. She has spoken at DEF CON and NeurIPS and is co-founder and co-organizer of the DEF CON AI Village.

Geoffrey Roote

Geoffrey Roote

Solutions Architect


Geoff Roote has worked in the IT and IS industries for over 15 years in both red and blue team roles. In his current role as a Solutions Architect @ RiskIQ, Geoff’s focus is helping his clients from major Canadian banks achieve the best possible perimeter defenses. Based out of Toronto, he works closely alongside clients to identify unknowns, derive insights from external assets and support security teams to help them achieve their defensive goals. When not obsessing over the latest threats, Geoff enjoys drumming, travelling and playing with his [...]

Brian Brown

Brian Brown

Regional Solution Architect


A 25-year IT professional, Brian is a Regional Solution Architect at McAfee. Working with Enterprise customers and Service Providers in the Americas he is engaged to architect large scale deployments that align with business goals. He has been recognized as Pre-sales resource of the year in 2017 for Canada, and Solution Architect of the year for 2019 in the Americas. A member of ISACA and IASA Global, Brian often speaks at both industry and McAfee events about how to address business objectives with advanced security architecture in Security Operations and [...]

Avi Rembaum

Avi Rembaum

Vice President, Security Solutions


Avi Rembaum is Check Point’s Vice President, Security Solutions. In this role, Avi is responsible for the company's solution center, incident response team, strategic alliance program and security architecture function. In a previous role, he was responsible for the company’s business relationships with the Tier-1 Telcos in North America. Avi first began working in the information and network security industry in 1997, when he joined RADGUARD’s marketing team. He also held product management positions at RedCreek and SonicWALL and practice manager roles at RedCreek and Getronics, now CompuCom.

Aviv Cohen

Aviv Cohen

CMO


Aviv is a cybersecurity speaker, blogger, and influencer working closely with CISOs of fortune 500 companies globally to shape their cybersecurity strategies and technology stacks. Prior to joining Pcysys as CMO, Aviv served in marketing and product management roles with global companies as Mellanox (NASDAQ: MLNX) and Amdocs (NASDAQ: DOX). Aviv holds a B.Sc in Electronics Engineering and Computer Science from Tel Aviv University.

Dylan Ayrey

Dylan Ayrey

Security Engineer


Dylan Ayrey is a Security Engineer. He has been heavily involved in the open source community for a few years, and he has been doing his best to bring security practices into the cloud/devsecops world.

Allison Donovan

Allison Donovan

Senior Infrastructure Security Engineer, Cruise


Allison Donovan is a security researcher who specializes in cloud-based platforms and devices. She is currently employed as a Senior Infrastructure Security Engineer at Cruise, where she secures cloud-based environments at scale, and previously she worked at Microsoft on mobile application security and site reliability engineering.

Bill Demirkapi

Bill Demirkapi

Independent Security Researcher


Bill Demirkapi is a student at the Rochester Institute of Technology with an intense passion for Windows Internals. Bill's interests include game hacking, reverse engineering malware, and exploit development. In his pursuit to make the world a better place, Bill constantly looks for the next big vulnerability following the motto "break anything and everything."

Sheila Berta

Sheila Berta

Head of Research, Dreamlab Technologies


Sheila A. Berta is an offensive security specialist who started at 12 years-old by learning on her own. At the age of 15, she wrote her first book about Web Hacking, published in several countries. Over the years, Sheila has discovered vulnerabilities in popular web applications and software, as well as given courses at universities and private institutes in Argentina. She specializes in offensive techniques, reverse engineering, and exploit writing and is also a developer in ASM (MCU and MPU x86/x64), C/C++, Python and Golang. As an international speaker, she [...]

Wade Baker

Wade Baker

Professor, Virginia Tech


Wade Baker is a professor at Virginia Tech, teaching cybersecurity courses within the Master of IT and MBA programs for the university. In addition to his academic role, Wade remains active in the cybersecurity field through the Cyentia Institute, a research services firm he co-founded in 2016. Prior to this, he held positions as the VP of Strategy and Analytics at ThreatConnect and the Managing Director and CTO for Security Solutions at Verizon. He created and led Verizon's annual Data Breach Investigations Report series, widely regarded across the industry for [...]

David Severski

David Severski

Senior Data Scientist, Cyentia Institute


David F. Severski is an information security data scientist, specializing in quantified risk management. He has provided risk management expertise across diverse industries -- retail, aerospace, finance, energy, and healthcare. David brings both broad and deep expertise in a number of technical areas with a special focus on cloud technologies and DevOps practices. He strives to combine rigorous methods, technical expertise, and a human-centered approach to advance the state of evidence-based information security risk management. David lives in Seattle, Washington with a low-maintenance spouse, a high-maintenance house, and a spiffy [...]

Rich Mogull

Rich Mogull

Analyst/Securosis, CISO/DisruptOps, Securosis, L.L.C.


Rich Mogull has twenty years experience in information security, physical security, and risk management. These days he specializes in cloud security and DevSecOps, having starting working hands-on in cloud nearly 10 years ago. He is also the principle course designer of the Cloud Security Alliance training class, primary author of the latest version of the CSA Security Guidance, and actively works on developing hands-on cloud security techniques. Prior to founding Securosis, Rich was a Research Vice President at Gartner on the security team. Prior to his seven years at Gartner, [...]

Doug Bienstock

Doug Bienstock

Principal Consultant, Mandiant


Doug Bienstock is a Principal Consultant at Mandiant helping to find evil and solve crime.

Josh Madeley

Josh Madeley

Manager, Mandiant


Josh Madeley is an IR Manager at Mandiant helping to find evil and solve crime.

William Burgess

William Burgess

Security Research Engineer, Elastic


William Burgess is a Security Research Engineer at Elastic, where he focuses on Windows internals, reverse engineering, and detection engineering.

Ben Nassi

Ben Nassi

PhD Student & Cyber Security Researcher


Ben Nassi is a PhD student at Ben-Gurion University of the Negev (BGU) and a former Google employee. His research interests are security and privacy of drones, advanced driving assistance systems, smart irrigation systems, wearable technology, and other cool topics. His research was presented at top conferences (S&P, Ubicomp, DEF CON) and published in journals (TIFS), and was also covered by international media (Wired, ArsTechnica, Motherboard, Washington Post, Bloomberg, Business Insider). Ben has spoken at prestigious venues including 40th IEEE Symposium on Security and Privacy, RSA Conference 2020, CyberTech TLV [...]

Victor Tavares

Victor Tavares

Director of Systems Engineering


Victor Tavares leads the Systems Engineering organization for Palo Alto Networks in Canada, where he is responsible for the customer and partner facing SE team. Victor has more than 20 years of experience in the networking and information security industry where he has worked with most of Canada's largest enterprise, service provider, and public sector organizations. Prior to joining Palo Alto Networks in 2014, Victor lead the Enterprise Systems Engineering team at Juniper Networks in Canada, which he joined through Juniper’s acquisition of network security pioneer NetScreen Technologies in 2004. [...]

Tony Lee

Tony Lee

VP, Global Services Technical Operations


Tony Lee, Vice President of BlackBerry Global Services Technical Operations, has more than fifteen years of professional research and consulting experience pursuing his passion in all areas of information security. As an avid educator, Tony has instructed thousands of students at many venues worldwide, including government, universities, corporations, and conferences such as Black Hat. He takes every opportunity to share knowledge as a contributing author to Hacking Exposed 7, and is also a frequent blogger, researcher, and author of white papers on topics ranging from Citrix Security, the China Chopper [...]

Tomer Bar

Tomer Bar

Labs Manager


Tomer Bar is a security researcher and a research team leader with 15+ years of unique experience in the sec field. Currently, he leads the SafeBreach Labs research team. His experience involved vulnerability research, malware analysis, etc. Speaker at BlackHat and Defcon conferences.

Peleg Hadar

Peleg Hadar

Security Researcher


Peleg Hadar (@peleghd) is a security researcher with over 8 of years of unique experience in the security field. Currently, he is doing research @SafeBreach Lab after serving in various security positions @IDF. His experience includes security from many angles: starting with network research, and now mostly software research. Peleg likes to investigate mostly Microsoft Windows components.

Thom Bailey

Thom Bailey

Senior Product Marketing Director


Thom Bailey leads the product marketing team at Mimecast. With 20+ years in product marketing and product management experience, Thom’s passion has been one of understanding the intersection of IT Operations and Security. A frequent speaker and security evangelist, Thom is responsible for the product marketing of Mimecast’s Email Security 3.0, Awareness Training, Threat Intelligence, Ecosystem Integration, and the overall Suite strategy.

Stephan Jou

Stephan Jou

CTO Interset


Stephan Jou is CTO of Interset, a Micro Focus company, a leading-edge cybersecurity and In-Q-Tel portfolio company that uses machine learning and behavioral analytics. Jou currently leads both Interset and various analytics-related initiatives for Micro Focus’ security division. Previous to Interset, Jou has been at IBM and Cognos where he led the development of over 10 products in the areas of cloud computing, mobile, visualization, semantic search, data mining and neural networks. Jou holds a M.Sc. in Computational Neuroscience and Biomedical Engineering, and a dual B.Sc. in Computer Science and [...]

Shyam Sundar

Shyam Sundar

Lead Security Threat Researcher


Shyam Sundar Ramaswami is a Lead Threat Researcher with Cisco Umbrella. Shyam is a two-time TEDx speaker, GREM certified malware analyst, Cisco Security Ninja black belt and a teacher of cyber security. Shyam has delivered talks for several conferences such as Black Hat (Las Vegas), Qubit Forensics (Serbia), Nullcon 2020 (Goa), Cisco Live (Barcelona), and for several universities and IEEE forums in India. Shyam teaches "Advanced malware attacks and defenses" in Stanford University’s cyber security program and runs a mentoring program called “Being Robin” where he mentors students all over [...]

Shane Coleman

Shane Coleman

Sr. Director Systems Engineer


Shane Coleman is the Director of Systems Engineering for Forescout’s Central US and Canada Region. With 20 years of Network and Application Security experience from organizations including CCC Information Services, Checkpoint Software and F5 Networks, he brings an interesting perspective to the evolving landscape of Cybersecurity. Shane holds a Master’s of Science in Operations & Technology Management from the Illinois Institute of Technology, ISC2’s CISSP Certification and is based in Chicago, IL.

Sean Tufts

Sean Tufts

Practice Director – ICS & IOT


Sean Tufts is the Practice Director for the OT/IOT business at Optiv. He's a former NFL Linebacker turned Critical Infrastructure security leader. Post NFL, he worked for utility operators and O&G hardware suppliers. Prior to his current leadership position at Optiv, Sean was on the Digital transformation team for General Electric focusing on security services for the O&G market. In 2012 he was honored by Forbes as a "30 Under 30" recipient.”

Sami Laine

Sami Laine

Director, Product Marketing


Sami Laine is Director of Product Marketing for Security at Okta. Over the years, Sami has helped many of the world's largest enterprises and financial institutions fight fraud, malware, threats, and breaches at CyberSource, RSA and CloudPassage and now focuses on helping companies embrace identity as the new security perimeter.

Rodney Buike

Rodney Buike


As Senior Technical Specialist – Modern Workplace Security and Compliance, Rodney Buike specializes in identity, threat, and information protection focused on enhancing the security and compliance practices of Microsoft 365 clients worldwide. An expert in cloud technology, this award-winning technology evangelist works collaboratively with finance, insurance, and manufacturing clients to ensure their workforce can work securely on any device and in any location. Rodney is a gifted communicator and technician. Throughout a 20+-year career, his ability to analyze and resolve complex problems has benefited clients greatly. A passionate advocate for [...]

Peter Cresswell

Peter Cresswell

Sales Engineer


Peter Cresswell has over 25 years of IT Security experience, from a diverse background as an IT Manager, Security Solution Architect, Practice Manager, Security Instructor, Product Manager, and Security Auditor. With Trend Micro, Peter has focused on the big migration from perimeter to system-based security controls, across Physical, Virtual, and Cloud environments. Currently, Peter focuses on Canadian companies migrating to the Cloud, and the architectures, processes, and technologies that get them there safely. Peter is often called upon to speak to Security as it applies to Cloud and related Security [...]

Nicolas (Nico) Fischbach

Nicolas (Nico) Fischbach

Chief Technology Officer


Nicolas (Nico) Fischbach serves as Forcepoint’s global Chief Technology Officer, where he oversees technical direction and innovation. Before joining Forcepoint, he spent 17 years at Colt, a global B2B service provider, and was responsible for company-wide strategy, architecture and innovation. He ran global network security engineering and operations for eight years, building Colt’s first Security Operation Center and deploying the first DDoS mitigation solution in Europe. In 2009, he joined the Office of the CTO to build and lead the company-wide strategy and architecture groups covering infrastructure and product R&D [...]

Nathan Smolenski

Nathan Smolenski

Head of Enterprise Security Strategy


Nathan is a Cyber Security & Technology leader with over 18 years of experience across financial services, management consulting, executive search, insurance, and software industry verticals. Nathan is highly experienced in digital transformation, leadership enrichment, organizational development and the modernization of enterprise security programs and architectures, enabling businesses through consumable service-based delivery capabilities. Nathan maintains a contemporary view of technology and cyber security and is a strong believer in process and technology innovation to drive transformational change. Nathan currently serves as director on the enterprise strategy team at Netskope, the [...]

Matthew Balcer

Matthew Balcer

SR. Solution Engineer


Matthew Balcer is the Senior Solution Engineer for SentinelOne in Canada. Matthew has spent over a decade consulting customers on building networks, communication platforms, and cyber security. Prior to joining SentinelOne to support their innovative endpoint protection he worked for industry leaders such as Cisco and Kaspersky Lab. A passionate evangelist for cyber security, he is a frequent speaker and panel member helping customers understand the threat landscape and measures to defend against it.

Lilly Chalupowski

Lilly Chalupowski

TITAN Malware Research Lead


Lilly is a TITAN Malware Research Lead at GoSecure and started her journey being mostly self-taught making hacking tools in her spare time. Chameleon (custom base64 steganography), Badger (DLL Security Enumeration including ASLR Entropy), Dirty-Needle (DLL Injection Tool), The Chrome Crusader (Chrome Extension Malware POC) and more. She has presented at many conferences such as AtlSecCon, BSides Las Vegas, SecTor, BSides Fredericton, BSides St Johns, HASK, ISACA Atlantic, GoSec, Art into Science and more. Topics have included PE File Structure Security, Steganography, Chrome Extension Malware (Removing Security Headers), The History [...]

Karl Klaessig

Karl Klaessig

Director of Product Marketing, Security Operations


Karl is ServiceNow’s Senior Director of Product Marketing for Security and Risk and has over 15 years of experience in product positioning and marketing of enterprise security platforms, most recently from Product Marketing roles at RSA and McAfee, where he was responsible for the positioning of their security operations and automation platforms. While at RSA and McAfee he managed product positioning, launches, analyst relations and development and delivery of sales tools and online webinars. When not focusing on enterprise security, he can be found camping, hiking, and kayaking with his [...]

Justin Pagano

Justin Pagano

Senior Manager, Security Operations and Engineering


Justin leads and supports Rapid7's internal Security Operations & Engineering team, who drive vulnerability management and incident detection & response efforts company wide. They also partner closely with Rapid7's Corporate IT teams to continuously evolve and automate security controls that enable our business to securely advance.

Josh Burgess

Josh Burgess

Lead Global Technical Threat Advisor


Josh Burgess has over 10 years of cyber threat analysis and mitigation experience, holding multiple positions in the intelligence community, the U.S. Department of Defense and the financial sector. In the majority of his roles, he has served as the technical lead Threat Intelligence Officer for large security operations centers (SOCs), advising on the latest threats to ensure a sound security posture. As the Lead Technical Strategic Advisor at CrowdStrike, Josh applies his experience in actioning both short-term tactical and long-term strategic intelligence data and reporting for customers.

Jody Caldwell

Jody Caldwell

Senior Director of Customer Service


Jody Caldwell is the Senior Director of Customer Success for ThreatConnect. Previously, he spent time in both the DoD and the Intelligence Community working with Network Security Operations Centers (NSOC) and Computer Emergency Response Teams (CERTS) in a variety of positions that include cyber threat analysis and leading cyber threat hunt teams. Jody's passionate about working with customers to strengthen security programs and leverage cyber threat intelligence to enhance their awareness while mitigating risks. Jody lives in Charleston, SC and enjoys boating and golfing.

Jeff Costlow

Jeff Costlow

Chief Information Security Officer


As a security technologist and leader for over 20 years, Jeff’s deep experience securing information and technology assets as well as years of successful engineering leadership have resulted in secure product deployments to thousands of customers. As the Deputy CISO at ExtraHop Networks, Jeff leads the ExtraHop team towards groundbreaking security and privacy services in ExtraHop's best of breed network monitoring tool.

Gina Scinta

Gina Scinta

Senior Solutions Architect


Gina Scinta is a Senior Solutions Architect with the Thales, DIS, Cloud Protection and Licensing business line. She has over 30 years of experience in the information technology profession, encompassing pre/post sales engineering support for Commercial and Federal territories. For the past 10 years, she has focused on providing solutions for protecting data using world class encryption and key management for data at rest in data centers and cloud infrastructures.

Gary Sockrider

Gary Sockrider

Director, Security Technologists


Gary is an industry veteran bringing over 20 years of broad technology experience including routing and switching, data center, wireless, mobility and collaboration but always with a focus on security. His previous roles include security SME, consultancy, product management, IT and customer support. Gary seeks to understand and convey the constantly evolving threat landscape, as well as the techniques and solutions that address the challenges they present. Prior to joining Netscout in 2012, he spent 12 years at Cisco Systems and held previous positions with Avaya and Cable & Wireless.

Dinah Davis

Dinah Davis

Vice President of Research and Development


Dinah Davis has over 19 years of experience in the technology industry, with 16 years of it in security roles at Arctic Wolf, BlackBerry, Trustwave, and Communications Security Establishment Canada. Dinah holds a Masters of Mathematics and Cryptography from the University of Waterloo and over 15 patents in the cybersecurity space. As Vice President of Research & Development at Arctic Wolf, Dinah currently leads the team responsible for building the platform that Arctic Wolf uses to deliver its Security Operations as a Service (SOCaaS) to hundreds of organizations across North [...]

Jonathan Walsh

Jonathan Walsh

Threat Operation Engineer


Jonathan is a 10-year veteran of the cyber security industry, with a degree in Computational Mathematics and CISSP and GCIH security certifications. His interests lie in not just understanding how attackers get in, but also in understanding the market forces that drive their criminal activity.

David Lu

David Lu

Security Researcher


David Lu splits his time as a Security Researcher at Tripwire and a computer science instructor at Portland State University. At Tripwire, he helps develop content for MITRE ATT&CK and is interested in threat hunting and incident response methodologies as well as understanding emerging security threats. At PSU, he teaches courses on problem solving through programming, discrete math, data structures and algorithms, and computing ethics. David received an MPhil in Philosophy from Syracuse University and previously taught analytic philosophy.

Christopher Hills

Christopher Hills

Deputy CTO


Christopher Hills has more than 15 years of experience as a Senior Security and Architecture Engineer operating in highly sensitive environments. Christopher is a military veteran of the United States Navy and started with BeyondTrust after his most recent role leading a Privileged Access Management (PAM) team as a Technical Director within a Fortune 500 organization. In his current position, he has responsibilities as a Senior Solutions Architect consulting on PAM implementations and reports to the Office of the CTO as an acting Deputy CTO. In his free time, he enjoys spending [...]

Chris Davis

Chris Davis

Senior Threat Intelligence Sales Engineer


Chris Davis works for Kaspersky as a Senior Threat Intelligence Sales Engineer where he helps customers leverage Kaspersky Threat Intelligence solutions and tradecraft to help define their Attack Surface and provide context around that Attack Surface and relevant threats. Prior to Kaspersky he worked at RiskIQ as a Solutions Architect helping customers identify their Attack Surface outside their firewalls and at Optiv Security where he directly supported Optiv’s Managed Security Service’s practices with threat intelligence analysis and onsite consultation to customers building/maturing their threat intelligence programs. With a background in [...]

Bryan Whyte

Bryan Whyte

Solutions Architect


After earning my Masters in Electrical Engineering, I spent over 20 years developing software applications to test hardware such as Torpedoes, Circuit Boards and Digital Subscriber Line (xDSL) modems. During that time, I was also able to contribute to the product development for both Embedded and Distributed Enterprise Applications. In 2015 I joined IBM Security as a Technical Pre-Sales Engineer focused on the AppScan tool suite for Static, Dynamic and Mobile Application Security Testing. After spending a few years in Application Security, I decided to expand my Cybersecurity proficiency and [...]

Bryan Patton

Bryan Patton

Principal Strategic Systems Consultant


Bryan Patton is a Principal Strategic Systems Consultant at Quest Software. For nearly 20 years he has helped customers shape their Microsoft environments. With particular emphasis on Active Directory and Office 365 environments, Bryan specializes in Identity and Access Management, Data Governance, Migration, and Security, including Certified Information Systems Security Professional (CISSP) certification.

Baber Amin

Baber Amin

Field CTO


Mr. Amin is a senior technology executive experienced in building and scaling businesses at software, networking, public and private companies. He has a broad background in enterprise security, identity and access management, identity proofing, authentication, privacy, and API security. He is a strong strategic thinker with operational execution, portfolio, and P&L management skills. At Ping Identity, Mr. Amin is currently CTO for West, helping customers with their IAM best practices, strategy execution, zero trust architecture, IoT Identity, and modeling for a privacy first approach. At Ping Identity he is also [...]

Andy Skrei

Andy Skrei

VP Worldwide Sales Engineering


Andy Skrei is the VP of worldwide sales engineering at Exabeam, a company that provides next-generation security intelligence and management solutions to help organizations protect their most valuable information. He previously worked as a lead security engineer at eBay, developing and deploying technologies for its global SOC.

Alexis Dorais-Joncas

Alexis Dorais-Joncas

Security Intelligence Team Lead


Alexis Dorais-Joncas started his career in cybersecurity in 2010, when he was hired by ESET as a malware researcher. In 2015, Alexis was appointed head of ESET’s R&D branch office located in downtown Montreal, where he and his team focus on cutting edge malware research, network security, and targeted attack tracking. Their goal: shed light on the latest trends and developments in the malware ecosystem and implement efficient and innovative countermeasures to allow ESET customers to be safe online. Alexis is an established speaker on current cyber threats, having spoken [...]

Aamir Lakhani

Aamir Lakhani

Senior Security Strategist


Aamir Lakhani is a leading senior security strategist on the FortiGuard Labs team at Fortinet. He is responsible for providing IT security solutions to major enterprises and government organizations. Mr. Lakhani creates technical security strategies and leads security implementation projects for Fortune 500 companies. Industries of focus include healthcare providers, educational institutions, financial institutions, and government organizations. Aamir has designed offensive counter-defense measures for the Department of Defense and national intelligence agencies.