Erin Kelly There has been a lot of conversation in Canada about how to protect privacy rights in an era of big data. Marketing companies, loyalty card providers and individual businesses are collecting personal information about their clients
Scott Donnelly WEBINT analysis can identify the targeting trends and methodologies of both cyber state actors and hacktivists. Recent Recorded Future analysis identified multiple instances where hacktivist operations have opened the door
Kristen Hill As Information Security professionals, communications often take a back seat when our priorities range from keeping the lights on to delivering cutting-edge security technologies to protect our businesses. Not only is communicating
Russ Gideon Penetration testing came about because of real world attacks. The industry quickly realized that we need to behave like the attackers to learn how to defend against them, and thus the penetration testing industry was born. Back then
Kelly Lum Java isn’t the only managed language with bugs. This talk will cover the current state of .NET reverse engineering and exploitation, including practical examples of both application-level and framework vulnerabilities.
AbdulAziz Hariri Over the last couple of years we’ve seen a rise of use-after-free zero day vulnerabilities being exploited in Microsoft Internet Explorer. Internet Explorer has a rich attack surface that allows attackers to maximize their