Keynotes

“Welcome to SecTor 2016” – Brian Bourne

Defense Against the Dark Arts: Examining, Fixing and Fighting for our Cyber Defenses – Edward Snowden

It’s 2016: What can you do about gender balance in Information Security? – Laura Payne and Co., Alexis Lavi, Andrea Stapley, Julie Leo, Karen Nemani, Marilyn Blamire

Retaking surrendered ground: making better decisions to fight cybercrime – Chris Pogue

Securing Our Future – Mikko Hypponen

Tech Track

[Ab]using TLS for defensive wins – Lee Brotherston

AirBnBeware: short-term rentals, long-term pwnage – Jeremy Galloway

CANtact: Open Source Automotive Tools – Eric Evenchick

Control system security, are we living on luck? – Chris Sistrunk

Crash Course in Kubernetes & Security – Matt Johansen

EventID Field Hunter (EFH) – Looking for malicious activities in your Windows events – Rodrigo Montoro

Hack Microsoft by using Microsoft signed binaries – Pierre-Alexandre Braeken

Hiding in Plain Sight – Taking Control of Windows Patches – Travis Smith

How to build a malware classifier [that doesn’t suck on real-world data] – John Seymour

How To Secure Serverless Applications – Kellman Meghu

Jihadism and Cryptography, from internet to softwares – Julie Gommes

Lessons Learned Hunting IoT Malware – Olivier Bilodeau

Making sense of a million samples per day: Behavior-based Methods for Automated, Scalable Malware Analysis – Stefano Zanero

Open Source Malware Lab – Robert Simmons

Practical Static Analysis for Continuous Application Security – Justin Collins

Purple Teaming the Cyber Kill Chain: Practical Exercises for Management – Chris Gates, Haydn Johnson

RTF Abuse: Exploitation, Evasion and Counter Measures – Devon Greene

Securing Network Communications: An Investigation into Certificate Authorities on Mobile – Andrew Blaich

The State of SCADA on the Internet – Kyle Wilhoit

Utilizing Memory and Network Forensics for Scalable Threat Detection and Response – Andrew Case

WiFi Exploitation: How passive interception leads to active exploitation – Solomon Sonya

Management Track

Cybersecurity in an era with quantum computers: will we be ready? – Michele Mosca

Data-Driven Computer Security Defense – Roger Grimes

Getting Business Value from Penetration Testing – Mark Bassegio, Tim West

How to Rob a Bank or The SWIFT and Easy Way to Grow Your Online Savings – Cheryl Biswas

Introducing G.Tool – A batteries included framework for building awesome GRC tools without wasting money. – Ben Sapiro

Safety Should be the Security Paradigm – Chris Wysopal

Security by Consent, or Peel’s Principles of Security Operations – Brendan O’Connor

SECurity FUNdamentals

All roads lead to domain admin, a part of a presentation series: From breach to C.D.E. Part I – Yannick Bedard

Can massive data harvesting drive down the time to breach detection? – Sean Earhard

Expanding Your Toolkit the DIY Way – Chris Maddalena

IPv6 for the InfoSec Pro on the Go – Allan Stojanovic

Lighting up the Canadian Darknet Financially – Milind Bhargava, Peter Desfigies, Philip Shin

The Power of DNS: Gaining Security Insight Through DNS Analytics – Scott Penney

The Security Problems of an Eleven Year Old and How To Solve Them – Jake Sethi-Reiner

Fail Panel – James Arlen

Sponsor Track

An Effective Approach to Automating Compliance Activities – Dave Millier

Defending Against Phishing: Effective Phishing Incident Response Using Employees, Incident Responders, and Intelligence. – Mike Saurbaugh

Eliminating the Automation and Integration Risks of the “Security Frankenstein” – Chris Pogue

Exposing Ransomware: Intelligent cybersecurity for the real world. – Sean Earhard

Global Encryption Usage is on the Rise! – Si Brantley

Held for Ransom: Defending your Data Against Ransomware – James L. Antonakos

Lessons from the Attack Chain: Bolster Your IR Program – Eric Sun

Network virtualization to enhance context, visibility and containment – Bruno Germain

Next-Gen Now, Outsmarting ransomware, exploits and zero-day attacks – Keir Humble

Overwhelmed By Security Vulnerabilities? Learn How To Prioritize Remediation – Amol Sarwate

Rethinking Threat Intelligence – Danny Pickens

Securing a Cloud-Based Data Center – Peter Cresswell

Stopping the Attacker You Know – Brian Read

The Cyber Security Readiness of Canadian Organizations – Ryan Wilson

The Emerging Era of Cognitive Security – Peter Allor

The Industry Need for Cloud Generation Security – Ryan Leonard

Understanding Ransomware: Clear and Present Danger – Raul Alvarez

Threat Landscape, Technology in action – Robert Falzon

Why Technology is Not the Answer to Cybersecurity – Sean Blenkhorn

Career Track