Presenter: Masarah Paquet-Clouston & Laurent Desaulniers Statistics are speaking loudly! There is a disconnection between defenders’ perceptions of the value of the security controls they implement, and the most common attack vectors leveraged by penetration testers acting as potential attackers. This presentation highlights the key
This presentation/demo will be on OBSERVATIONDECK (aka ODeck). ODeck is currently a tailored service provided by the Canadian Center for Cyber Security (CCCS) for Government of Canada (GC) partner departments aimed to assist them in patching operating systems and applications. ODeck provides detailed visibility of a GC security practitioners
Source code security audit is the process of reviewing source code with the intent of discovering security bugs. My preferred tool for finding vulnerabilities in code is the humble unix tool grep. Come along and learn why I generally rate it above expensive static code analysis solutions and how I have been using grep to
In this age of exploration, we have finally established a growing colony in Planet Cyberspace. The landscape is vastly different than what we are built for. This keynote, while keeping user centric cybersecurity as the central focus, explores four areas – Evolution, Asymmetry, Laws of Planet Cyberspace and Trust. I shall be sharing my
Our Call for Papers process is now open. If you have a hot topic on computer security that you would like to present and feel that your subject will be of interest to our audience, we want to hear from you. Whether you are associated with academia, government or the private sector, we invite you
COUNTERMEASURE 2020 is offering four 3-day training courses that run September 14th to the 16th in Ottawa. All content is delivered by some of the world’s most knowledgeable and influential IT security experts in private, public, and research sectors. These courses include: Hunting APTs with Yara Instructors: Costin G. Raiu Director, Global
Presenter – Marc Brouillard – CTO, Government of Canada As the Government of Canada (GC) transforms its IT environment, it must enable more effective collaboration and interoperability, using modern technologies and approaches. The traditional approach to establishing a security perimeter around a network has changed over the last
Presenter: Alex Hemmati Join Cyberbit’s Head of North America Federal Sales and Operations, Alex Hemmati,as he demistifies the “cyber-range” concept and works through what it takes to ensure today’s cyber warriors have the skills and experience needed to combat zero day events for both IT and OT networks.