Cloud Computing – Risks and Reality

Sandra Liepkalns Tight budgets and few staff cause many IT teams to be lured by the promises of low cost services and less to support. With the proliferation of services with 24/7 support and the ability to decrease your data centre footprint and power draw who wouldn’t feel the business case is there? Is your 

Read more

APT Threat to Canadian Businesses

Eric Lauzier APT: Advanced Persistent Threats (APTs) actors, once solely engaged in intelligence gathering activities against government institutions for strategic purposes, are now targeting legitimate businesses to gather sensitive information for financial, intellectual, reputational and intelligence objectives. These same state-sponsored

Read more

A Data-Centric Approach to Security

Sol Cates As we make our way into 2016, data security on a federal level will continue to be a concern. Government must be up to the task to amplify efforts to protect our nation’s data from both insider threats and nation-state attacks. For too long the focus has been on defending network boundaries and 

Read more

Get off My Lawn OSX Malware

Russ Nolen As OSX systems become more and more prevalent through the enterprise landscape, knowing what OSX malware does to a well-manicured system becomes increasingly more important. This talk is based around providing the audience with some very practical knowledge for approaching OSX malware, the trends that were observed in an OSX malware

Read more

What about Canada (Data) Eh?

Natasha (Sasha) Hellberg Canada has some of the best IT Security professionals in the world yet we often have to look to US-based reports to uncover statistics about threats in Canada. Even companies with a Canadian presence who produce numerous reports, such as Trend Micro, tend to focus on regions other than Canada. Yet

Read more

Open Source

Andrew Phillips This session will provide a brief overview of the three types of open source material, the need for timeliness in making inquiries, a brief review of a structured methodology and some of the pitfalls you can face when making inquiries. We will also investigate solutions to acquire data that you can leverage into 

Read more

Cybercrime: Indiscriminate Nuisance or Targeted Threat

Nart Villeneuve Is a simple, indiscriminate malware infection a noteworthy incident? Or will it pass largely unnoticed … only to transform into a significant data breach? Often dismissed as “commodity” malware, cybercrime is typically assessed to be indiscriminate and in direct contrast with Advanced Persistent Threat (APT)

Read more

Me and 37 Million of My Friends

Justin Seitz The Ashley Madison breach has been widely covered: maps of the cities with the most cheaters (congratulations Ottawa), anecdotal stories of careers lost, hand wringing over weak passwords and a lot more. But what does it look like when an attacker makes a concerted effort to begin mining this data against a particular 
Read more

Adaptive Security for an Evolving Landscape

Paul Da Silva The recent high-profile data theft news stories send an unmistakable message to CISOs and security team leaders across all industries—no business is safe from a data breach. As security leaders, we have to completely re-think the way we do business and look at the new realities of cybersecurity. Join us for a 

Read more