APT Threat to Canadian Businesses

Eric Lauzier APT: Advanced Persistent Threats (APTs) actors, once solely engaged in intelligence gathering activities against government institutions for strategic purposes, are now targeting legitimate businesses to gather sensitive information for financial, intellectual, reputational and intelligence objectives. These same state-sponsored

Read more

A Data-Centric Approach to Security

Sol Cates As we make our way into 2016, data security on a federal level will continue to be a concern. Government must be up to the task to amplify efforts to protect our nation’s data from both insider threats and nation-state attacks. For too long the focus has been on defending network boundaries and 

Read more

Get off My Lawn OSX Malware

Russ Nolen As OSX systems become more and more prevalent through the enterprise landscape, knowing what OSX malware does to a well-manicured system becomes increasingly more important. This talk is based around providing the audience with some very practical knowledge for approaching OSX malware, the trends that were observed in an OSX malware

Read more

What about Canada (Data) Eh?

Natasha (Sasha) Hellberg Canada has some of the best IT Security professionals in the world yet we often have to look to US-based reports to uncover statistics about threats in Canada. Even companies with a Canadian presence who produce numerous reports, such as Trend Micro, tend to focus on regions other than Canada. Yet

Read more

Open Source

Andrew Phillips This session will provide a brief overview of the three types of open source material, the need for timeliness in making inquiries, a brief review of a structured methodology and some of the pitfalls you can face when making inquiries. We will also investigate solutions to acquire data that you can leverage into 

Read more

Cybercrime: Indiscriminate Nuisance or Targeted Threat

Nart Villeneuve Is a simple, indiscriminate malware infection a noteworthy incident? Or will it pass largely unnoticed … only to transform into a significant data breach? Often dismissed as “commodity” malware, cybercrime is typically assessed to be indiscriminate and in direct contrast with Advanced Persistent Threat (APT)

Read more

Me and 37 Million of My Friends

Justin Seitz The Ashley Madison breach has been widely covered: maps of the cities with the most cheaters (congratulations Ottawa), anecdotal stories of careers lost, hand wringing over weak passwords and a lot more. But what does it look like when an attacker makes a concerted effort to begin mining this data against a particular 
Read more

Adaptive Security for an Evolving Landscape

Paul Da Silva The recent high-profile data theft news stories send an unmistakable message to CISOs and security team leaders across all industries—no business is safe from a data breach. As security leaders, we have to completely re-think the way we do business and look at the new realities of cybersecurity. Join us for a 

Read more

JavaScript 6 – Hackers Dream or Developers Haven

Jeremy Buis and Sherif Koussa ECMAScript 6 specs are out and include a lot of new features making Javascript a language that combines browser friendliness and enterprise powerhouse. Caution is required with these new features. This technical presentation will go over the new attack vectors in JavaScript 6, as well as the old attack

Read more

The Sednit Group: “Cyber” Espionage in Eastern Europe

Joan Calvet The Sednit group has been relentlessly attacking various governmental institutions for the past five years, most notably in Eastern Europe. They primarily want to extract sensitive information from their targets’ computer networks. For that purpose, they developed their own tool set, from simple droppers to complex backdoors

Read more