Keynotes
|
|
|
|
“Welcome to SecTor 2016” – Brian Bourne |
|
|
|
Defense Against the Dark Arts: Examining, Fixing and Fighting for our Cyber Defenses – Edward Snowden |
|
|
|
It’s 2016: What can you do about gender balance in Information Security? – Laura Payne and Co., Alexis Lavi, Andrea Stapley, Julie Leo, Karen Nemani, Marilyn Blamire |
|
|
|
Retaking surrendered ground: making better decisions to fight cybercrime – Chris Pogue |
|
|
|
Securing Our Future – Mikko Hypponen |
|
|
|
|
|
|
|
Tech Track
|
|
|
|
[Ab]using TLS for defensive wins – Lee Brotherston |
|
|
|
AirBnBeware: short-term rentals, long-term pwnage – Jeremy Galloway |
|
|
|
CANtact: Open Source Automotive Tools – Eric Evenchick |
|
|
|
Control system security, are we living on luck? – Chris Sistrunk |
|
|
|
Crash Course in Kubernetes & Security – Matt Johansen |
|
|
|
EventID Field Hunter (EFH) – Looking for malicious activities in your Windows events – Rodrigo Montoro |
|
|
|
Hack Microsoft by using Microsoft signed binaries – Pierre-Alexandre Braeken |
|
|
|
Hiding in Plain Sight – Taking Control of Windows Patches – Travis Smith |
|
|
|
How to build a malware classifier [that doesn’t suck on real-world data] – John Seymour |
|
|
|
How To Secure Serverless Applications – Kellman Meghu |
|
|
|
Jihadism and Cryptography, from internet to softwares – Julie Gommes |
|
|
|
Lessons Learned Hunting IoT Malware – Olivier Bilodeau |
|
|
|
Making sense of a million samples per day: Behavior-based Methods for Automated, Scalable Malware Analysis – Stefano Zanero |
|
|
|
Open Source Malware Lab – Robert Simmons |
|
|
|
Practical Static Analysis for Continuous Application Security – Justin Collins |
|
|
|
Purple Teaming the Cyber Kill Chain: Practical Exercises for Management – Chris Gates, Haydn Johnson |
|
|
|
RTF Abuse: Exploitation, Evasion and Counter Measures – Devon Greene |
|
|
|
Securing Network Communications: An Investigation into Certificate Authorities on Mobile – Andrew Blaich |
|
|
|
The State of SCADA on the Internet – Kyle Wilhoit |
|
|
|
Utilizing Memory and Network Forensics for Scalable Threat Detection and Response – Andrew Case |
|
|
|
WiFi Exploitation: How passive interception leads to active exploitation – Solomon Sonya |
|
|
|
|
|
|
|
Management Track
|
|
|
|
Cybersecurity in an era with quantum computers: will we be ready? – Michele Mosca |
|
|
|
Data-Driven Computer Security Defense – Roger Grimes |
|
|
|
Getting Business Value from Penetration Testing – Mark Bassegio, Tim West |
|
|
|
How to Rob a Bank or The SWIFT and Easy Way to Grow Your Online Savings – Cheryl Biswas |
|
|
|
Introducing G.Tool – A batteries included framework for building awesome GRC tools without wasting money. – Ben Sapiro |
|
|
|
Safety Should be the Security Paradigm – Chris Wysopal |
|
|
|
Security by Consent, or Peel’s Principles of Security Operations – Brendan O’Connor |
|
|
|
|
|
|
|
SECurity FUNdamentals
|
|
|
|
All roads lead to domain admin, a part of a presentation series: From breach to C.D.E. Part I – Yannick Bedard |
|
|
|
Can massive data harvesting drive down the time to breach detection? – Sean Earhard |
|
|
|
Expanding Your Toolkit the DIY Way – Chris Maddalena |
|
|
|
IPv6 for the InfoSec Pro on the Go – Allan Stojanovic |
|
|
|
Lighting up the Canadian Darknet Financially – Milind Bhargava, Peter Desfigies, Philip Shin |
|
|
|
The Power of DNS: Gaining Security Insight Through DNS Analytics – Scott Penney |
|
|
|
The Security Problems of an Eleven Year Old and How To Solve Them – Jake Sethi-Reiner |
|
|
|
Fail Panel – James Arlen |
|
|
|
|
|
|
|
Sponsor Track
|
|
|
|
An Effective Approach to Automating Compliance Activities – Dave Millier |
|
|
|
Defending Against Phishing: Effective Phishing Incident Response Using Employees, Incident Responders, and Intelligence. – Mike Saurbaugh |
|
|
|
Eliminating the Automation and Integration Risks of the “Security Frankenstein” – Chris Pogue |
|
|
|
Exposing Ransomware: Intelligent cybersecurity for the real world. – Sean Earhard |
|
|
|
Global Encryption Usage is on the Rise! – Si Brantley |
|
|
|
Held for Ransom: Defending your Data Against Ransomware – James L. Antonakos |
|
|
|
Lessons from the Attack Chain: Bolster Your IR Program – Eric Sun |
|
|
|
Network virtualization to enhance context, visibility and containment – Bruno Germain |
|
|
|
Next-Gen Now, Outsmarting ransomware, exploits and zero-day attacks – Keir Humble |
|
|
|
Overwhelmed By Security Vulnerabilities? Learn How To Prioritize Remediation – Amol Sarwate |
|
|
|
Rethinking Threat Intelligence – Danny Pickens |
|
|
|
Securing a Cloud-Based Data Center – Peter Cresswell |
|
|
|
Stopping the Attacker You Know – Brian Read |
|
|
|
The Cyber Security Readiness of Canadian Organizations – Ryan Wilson |
|
|
|
The Emerging Era of Cognitive Security – Peter Allor |
|
|
|
The Industry Need for Cloud Generation Security – Ryan Leonard |
|
|
|
Understanding Ransomware: Clear and Present Danger – Raul Alvarez |
|
|
|
Threat Landscape, Technology in action – Robert Falzon |
|
|
|
Why Technology is Not the Answer to Cybersecurity – Sean Blenkhorn |
|
|
|
Career Track
|
|
|
|
Developing Your Career in IT Security – Panel |
|
|
|