Joan Calvet The Sednit group has been relentlessly attacking various governmental institutions for the past five years, most notably in Eastern Europe. They primarily want to extract sensitive information from their targets’ computer
Michel Cusin Are you comfortable with the fact that Internet service providers, authorities, governments, intelligence agencies (NSA, CSIS, etc.) have the technological and legal means to spy on everything you do on the Internet? Why do they
Ray Boisvert Risk is unavoidable, whether your organization is operating domestically or is interconnected globally. Which threats—from cyber and foreign influence to terrorism and espionage—are most critical to Canadian interests?
Eddie Schwartz It sure seemed like a visionary idea in the mid-1990’s – cyber security would be taken seriously by inventing a C-suite position. Banks and government agencies cared about security so why not? The CISO was born, and
Mike Ahmadi The global expenditure of resources to manage cybersecurity issues continues to grow year over year, yet the cybersecurity challenges we are facing are rapidly outpacing our ability to get them under control. Consumers of software
Charlie Miller and Chris Valasek Although the hacking of automobiles is a topic often discussed, details regarding successful attacks, if ever made public, are non-comprehensive at best. The ambiguous nature of automotive security leads to
Richard Brisson Almost anyone who is knowledgeable on cryptology is typically aware of the WW2 German Enigma and its story in regards to the code-making and code-breaking accomplishments. This talk will cover two threads on Enigma with the first