Draft Agenda - Subject to Change

Day 1 – November 7, 2019

Times:

Track 1 

Track 2 

Track 3 

7:30 – 8:30

Registration

8:30 – 9:30

Keynote: Renee DiResta

9:30 – 10:30

Costin Raiu and Vitaly Kamluk:

Insights from Supply Chain Attack Investigations

10:30–11:00 a.m.

Coffee Break

11:00 – 12:00

Marc Brouillard – CTO Government of Canada Cisco Jeremy Blackthorne:

Reverse-Engineering with NSA’s Ghidra

12:00–1:15 p.m.

Lunch

1:15–2:15 p.m.

Zeshan Aziz:

How Political Bots influence Brexit – A new way of classifying bots

Crowdstrike

Ryan Warns:

Unrestricted or improperly validated access to the privileged Model Specific Register (MSR) instructions

2:15–3:15 p.m.

Nick Palmer:

Financially Motivated Threat Actors: Their TTP and Interests in Conducting Targeted Attacks Against Canadian Businesses

Fortinet

Simon Zuckerbraun:

The Brave New World of JavaScript Engine Vulnerabilities

3:15–3:30 p.m.

Coffee Break

3:30–4:30 p.m.

Keynote: Diana Kelley – Microsoft

4:30–6:15 p.m.

Network Reception – Sponsored by 2Keys

6:45 p.m.

After-Party – Sponsored by Armis

Day 2 – November 8, 2019

Times:

Track 1

Track 2

Track 3

8:30–9:30 a.m.

Keynote:  John McCumber: (ISC)2

Workforce Survey to Cyber Supply Chain

9:30–10:30 a.m.

Sophia D’Antoine:

The Secret Life of Supply Chains

Cyberbit

Luc Dandurand: 

Improving Preparedness Through Cyber Exercises

10:30–11:00 a.m.

Coffee Break

11:00–12:00 p.m.

Nuuman Huq: 

Exposed and Vulnerable Critical Infrastructure – Energy & Water Industries

BriteSky  TBC

12:00–12:45 p.m.

Lunch

12:45–1:45 p.m.

Kellman Meghu:

What Did You Do So Wrong, You Thought You Needed a Firewall in the Cloud?

RSA

 Eldar Marcussen:

Terminal Vertex: Attacking Network Monitoring

1:45–2:45 p.m.

Sophia D’Antoine, & Perri Adams:

In Search of Lost Bytes, “Assurance Under Low Trust Conditions”

 TBC Tenable

2:45–3:00 p.m.

Coffee Break

3:00–4:00 p.m.

 TBC