Final Conference Agenda

Day 1 – November 7, 2019


Track 1

Track 2

Track 3

7:30 – 8:30 am


8:30 – 9:30 am

Keynote: Renee DiResta

Disinformation as a Cybersecurity Problem

9:30 – 10:30 am

Costin Raiu and Vitaly Kamluk:

Insights from Supply Chain Attack Investigations

10:30–11:00 am

Coffee Break

11:00 am – 12:00 pm

Marc Brouillard – CTO Government of Canada

Government of Canada: The Journey to Zero Trust

Jamie Sanbower – Cisco:

Demystifying Zero Trust Architecture

Saumil Udayan Shah

Introducing ARM-X – The ARM IoT Firmware Emulation Framework


12:00–1:15 pm


1:15–2:15 pm

Zeshan Aziz:

How Political Bots influence Brexit – A new way of classifying bots

John Pilon & Karl Galbraith – Crowdstrike

How to Win in the Era of the 18 Minute Breach

Jeremy Blackthorne:

Reverse-Engineering with NSA’s Ghidra

2:15 – 3:15 pm

Nick Palmer:

From Compromise to Monetize: An Investigation Into BriansClub

Douglas Santos – Fortinet

The Evolution of File-less Ransomware

Simon Zuckerbraun:

The Brave New World of JavaScript Engine Vulnerabilities

3:15–3:30 pm

Coffee Break

3:30–4:30 pm

Keynote: Diana Kelley – Microsoft

Shifting Sands – Shoring up Cyber-defense in a Rapidly Changing Threat Landscape: Insights from the Microsoft Security Intelligence Report Volume 24

4:30–6:15 pm

Network Reception – Sponsored by 2Keys

6:45 pm

After-Party – Sponsored by Armis

Day 2 – November 8, 2019


Track 1

Track 2

Track 3

8:30–9:30 am

Keynote: John McCumber: (ISC)2

Cyber Supply Chain

9:30–10:30 am

Sophia D’Antoine:

The Secret Life of Supply Chains

David Pearson – Iceberg Networks

Shared Responsibility is not Shared Risk! Managing Risk in a Shared Responsibility Environment

Luc Dandurand:

Improving Preparedness Through Cyber Exercises

10:30–11:00 am

Coffee Break

11:00 am –12:00 pm

Nuuman Huq:

Exposed and Vulnerable Critical Infrastructure – Energy & Water Industries

Nicholas Rowe – BriteSky

Journey Through the Labyrinth of Microsegmentation

Ryan Warns:

Unrestricted or improperly validated access to the privileged Model Specific Register (MSR) instructions

12:00–12:45 pm


12:45–1:45 pm

Kellman Meghu:

What Did You Do So Wrong, You Thought You Needed a Firewall in the Cloud?

Alex Hemmati – Cyberbit

Cyber Ranges: Training your Cyber Warriors : Are you REALLY ready?

Eldar Marcussen:

Terminal Vertex: Attacking Network Monitoring

1:45–2:45 pm

Andrew Hay

Be an Inspirational Coach, Not an Oppressive Security Executive

Roger Ofarril

Threat Hunting Primer: Moving From a Reactive to a Proactive Mindset

James Smith – Tenable

Rethinking Vulnerability Prioritization in the Modern Threat Landscape

2:45–3:00 pm

Coffee Break

3:00–4:00 pm

Sophia D’Antoine, & Perri Adams:

In Search of Lost Bytes, “Assurance Under Low Trust Conditions”