Sessions 2016

2016 SESSIONS At A Glance

SecTor Management and the Advisory Committee look forward to once again bringing the world’s best speakers in the field of IT Security to Toronto.

Some of your feedback requested a simple list of sessions where you could scan what’s happening at a glance, similar to the format in years past.  Below you will find just that.

Please visit the schedule page for a complete breakdown of when each session will occur, along with a more comprehensive filtering feature.

The Expo Hall is open to attendees between the hours 8am to 5pm Tuesday October 18th, and 8am to 4pm Wednesday October 19th. Please note Expo Only Attendees are limited to the Sponsor and Career tracks (see below).

Keynote
Defense Against the Dark Arts: Examining, Fixing and Fighting for our Cyber DefensesEdward Snowden
It’s 2016: What can you do about gender balance in Information Security?Laura Payne and Co., Alexis Lavi, Andrea Stapley, Julie Leo, Karen Nemani, Marilyn Blamire
Retaking surrendered ground: making better decisions to fight cybercrimeChris Pogue
Securing Our FutureMikko Hypponen
Tech
[Ab]using TLS for defensive winsLee Brotherston
AirBnBeware: short-term rentals, long-term pwnageJeremy Galloway
CANtact: Open Source Automotive ToolsEric Evenchick
Control system security, are we living on luck?Chris Sistrunk
Crash Course in Kubernetes & SecurityMatt Johansen
EventID Field Hunter (EFH) – Looking for malicious activities in your Windows eventsRodrigo Montoro
Hack Microsoft by using Microsoft signed binariesPierre-Alexandre Braeken
Hiding in Plain Sight – Taking Control of Windows PatchesTravis Smith
How to build a malware classifier [that doesn’t suck on real-world data]John Seymour
How To Secure Serverless ApplicationsKellman Meghu
Jihadism and Cryptography, from internet to softwaresJulie Gommes
Lessons Learned Hunting IoT MalwareOlivier Bilodeau
Making sense of a million samples per day: Behavior-based Methods for Automated, Scalable Malware AnalysisStefano Zanero
Open Source Malware LabRobert Simmons
Practical Static Analysis for Continuous Application SecurityJustin Collins
Purple Teaming the Cyber Kill Chain: Practical Exercises for ManagementChris Gates, Haydn Johnson
RTF Abuse: Exploitation, Evasion and Counter MeasuresDevon Greene
Securing Network Communications: An Investigation into Certificate Authorities on MobileAndrew Blaich
The State of SCADA on the InternetKyle Wilhoit
Utilizing Memory and Network Forensics for Scalable Threat Detection and ResponseAndrew Case
WiFi Exploitation: How passive interception leads to active exploitationSolomon Sonya
Management
Cybersecurity in an era with quantum computers: will we be ready?Michele Mosca
Data-Driven Computer Security DefenseRoger Grimes
Getting Business Value from Penetration TestingMark Bassegio, Tim West
How to Rob a Bank or The SWIFT and Easy Way to Grow Your Online SavingsCheryl Biswas
Introducing G.Tool – A batteries included framework for building awesome GRC tools without wasting money.Ben Sapiro
Safety Should be the Security ParadigmChris Wysopal
Security by Consent, or Peel’s Principles of Security OperationsBrendan O’Connor
SECurity FUNdamentals
All roads lead to domain admin, a part of a presentation series: From breach to C.D.E. Part IYannick Bedard
Can massive data harvesting drive down the time to breach detection?Sean Earhard
Expanding Your Toolkit the DIY WayChris Maddalena
IPv6 for the InfoSec Pro on the GoAllan Stojanovic
Lighting up the Canadian Darknet FinanciallyMilind Bhargava, Peter Desfigies
The Power of DNS: Gaining Security Insight Through DNS AnalyticsScott Penney
The Security Problems of an Eleven Year Old and How To Solve ThemJake Sethi-Reiner
Sponsor Track
An Effective Approach to Automating Compliance ActivitiesDave Millier
Defending Against Phishing: Effective Phishing Incident Response Using Employees, Incident Responders, and Intelligence.Mike Saurbaugh
Eliminating the Automation and Integration Risks of the “Security Frankenstein”Chris Pogue
Exposing Ransomware: Intelligent cybersecurity for the real world.Sean Earhard
FAIL PanelJames Arlen
Global Encryption Usage is on the Rise!Si Brantley
Held for Ransom: Defending your Data Against RansomwareJames L. Antonakos
Lessons from the Attack Chain: Bolster Your IR ProgramEric Sun
Network virtualization to enhance context, visibility and containmentBruno Germain
Next-Gen Now, Outsmarting ransomware, exploits and zero-day attacksKeir Humble
Overwhelmed By Security Vulnerabilities? Learn How To Prioritize RemediationAmol Sarwate
Rethinking Threat IntelligenceDanny Pickens
Securing a Cloud-Based Data CenterPeter Cresswell
Stopping the Attacker You KnowBrian Read
The Cyber Security Readiness of Canadian OrganizationsRyan Wilson
The Emerging Era of Cognitive SecurityPeter Allor
The Industry Need for Cloud Generation SecurityRyan Leonard
Understanding Ransomware: Clear and Present DangerRaul Alvarez
When ‘Oops’ Isn’t An Acceptable AnswerGreg Pepper
Why Technology is Not the Answer to CybersecuritySean Blenkhorn
Career

Developing your Career in IT SecurityAdrien de Beaupré, Brian Bourne, Laura Payne, Mike Murray