Adam Allred and Paul Royal The detection of virtualized malware analysis environments has become increasingly popular and commoditized. Sophisticated virtualization detection techniques are now available to any novice cyber criminal. As a result, multiple analysis environments have been crafted that attempt to address
François Marinier As an IT security analyst, I have spent most of the past two years applying key processes and activities of ITSG-33 to real-life IT projects. From new infrastructure services to mission-critical business applications to changes to existing information systems, I had many opportunities to put ITSG-33 guidance to the test and
Paul Davis Many CISOs/CSO and Directors of Security Operations are facing the challenge of increased expectations, misplaced assumptions of responsibility and limited resources to deliver success. This leads to increased frustration within the security teams who are striving to protect their organizations. The
John Weigelt While security guidelines, frameworks, certifications, evaluations and other documentation often provides comprehensive direction of safeguards and controls, getting the guidance implemented by organizations at a national scale is difficult. Despite the availability of security guidance since the 80s, even large technology
Ben Fung The retail payment landscape in Canada and elsewhere is changing rapidly as new technology and new business models are changing the way people pay for their purchases. In particular, people are substituting from cheques and cash to electronic means of payment as well as e-money and even cryptocurrencies. This presentation will discuss
Erin Kelly There has been a lot of conversation in Canada about how to protect privacy rights in an era of big data. Marketing companies, loyalty card providers and individual businesses are collecting personal information about their clients every day, and sometimes selling that information to third parties. Erin Kelly explores the
Scott Donnelly WEBINT analysis can identify the targeting trends and methodologies of both cyber state actors and hacktivists. Recent Recorded Future analysis identified multiple instances where hacktivist operations have opened the door for state directed attacks. This presentation will discuss how APTs can leverage exposed
Kristen Hill As Information Security professionals, communications often take a back seat when our priorities range from keeping the lights on to delivering cutting-edge security technologies to protect our businesses. Not only is communicating with the non-technical something that many in Information Security and IT in general cringe at the
Nelson Ko and Sherif Koussa Recent zero-days in popular open-source software have led to a lot of controversy, an old debate fueled by the Heartbleed bug. The old question was: Is open-source software really more secure than closed-source? However, with open-source adoption rates on the rise in the enterprise especially in the Government
Ryan Kazanciyan and Matt Hastings Over the past two years, we’ve seen targeted attackers increasingly make use of PowerShell to conduct command-and-control in compromised Windows environments. If your organization is running Windows 7 or Server 2008 R2, you’ve got PowerShell 2.0 installed (and on Server 2012, remoting is enabled by