Katie Moussouris Plagued with decades of watching the Internet, security threats, and threat actors evolve. Join one woman’s security journey from the pleasures of the flesh (hacking), to asceticism and rules (ISO standards & export controls), to that state of “betwixt and between” where balance is the goal for an
Erin Kelly Erin will discuss the latest AI advancement in cyber security to come out of of ASI’s lab: an AI that can learn to detect IOCs and anomalies without reyling on labeled training data or large databases.
Nikolaos Vasiloglou In the past years, machine learning has advanced significantly making it possible for machines to outperform humans in several cognitive tasks, such as recognizing images, playing computer games even creating art. Those results are attributed to the breakthroughs in Deep Learning that resurrected the dreams for AI. Cyber
Yves Morvan Most organizations with a mature IT security program understand the requirement to perform vulnerability assessments and penetration tests. A good penetration test will attempt to exploit the vulnerabilities identified in a vulnerability assessment. These observations can then be prioritized and presented to the client for
Clayton Smith So what’s it like to run a public bug bounty program? Shopify first launched its program in 2013, and since then we’ve received thousands of submissions and paid hundreds of bounties. In this presentation we’ll give you an inside look into our White Hat program. We’ll share some of the best (and
Tyler Shields Innovation has changed how technology operates and how business is run. Why haven’t we adapted how security matches this new world vision? This keynote speech will focus on what has changed in the world and what we as security professionals can do to keep up with the shifting threat landscape.
Sandra Liepkalns & Graham Bignell In this session, Sandra and Graham will explore the challenges of integrating a Security practice across independently operating teams of engineers, building positive relationships between developers, administrators and stakeholders. Starting from a deficit and building an effective security
Jessica Bair This presentation discuss the latest ransomware trends, as well as how to defend your enterprise against this threat. Attendees to understand what is ransomware, what are the attack vectors, what are the commonalities between variants, how to track ransomware with dynamic analysis of behavior, and what is the sophistication of the
Steve Bowers Let’s outline the conception, development, and evolution of cybersecurity operations, starting with business objectives. A cyber operation built arbitrarily or with vague goals in mind cannot succeed. We will examine a high-level framework that can be used to develop a cyber operation from the ground up, or add focus and
Pierre Roberge Starting from a quick introduction to Blockchains, we will cover the concepts behind Bitcoin and Ethereum to understand the DAO exploitation hack. We will explore how Bitcoin Decentralized Blockchain using Proof of Work as resilience to double-spending is influencing current research. How it is inspiring ideas in Cyber Security