Ray Boisvert Risk is unavoidable, whether your organization is operating domestically or is interconnected globally. Which threats—from cyber and foreign influence to terrorism and espionage—are most critical to Canadian interests?
Eddie Schwartz It sure seemed like a visionary idea in the mid-1990’s – cyber security would be taken seriously by inventing a C-suite position. Banks and government agencies cared about security so why not? The CISO was born, and
Mike Ahmadi The global expenditure of resources to manage cybersecurity issues continues to grow year over year, yet the cybersecurity challenges we are facing are rapidly outpacing our ability to get them under control. Consumers of software
Charlie Miller and Chris Valasek Although the hacking of automobiles is a topic often discussed, details regarding successful attacks, if ever made public, are non-comprehensive at best. The ambiguous nature of automotive security leads to
Richard Brisson Almost anyone who is knowledgeable on cryptology is typically aware of the WW2 German Enigma and its story in regards to the code-making and code-breaking accomplishments. This talk will cover two threads on Enigma with the first
Jeffrey Carr This presentation will focus on the active and passive exploitation of the victim company’s supply chain. Real use cases in the areas of aerospace, telecommunications, and government sectors will be presented and discussed.