Cyber Security: from signatures to Deep Learning and AI

Nikolaos Vasiloglou In the past years, machine learning has advanced significantly making it possible for machines to outperform humans in several cognitive tasks, such as recognizing images, playing computer games even creating art. Those results are attributed to the breakthroughs in Deep Learning that resurrected the dreams for AI. Cyber

Read more

Red Team Operations. Train as you fight.

Yves Morvan Most organizations with a mature IT security program understand the requirement to perform vulnerability assessments and penetration tests. A good penetration test will attempt to exploit the vulnerabilities identified in a vulnerability assessment. These observations can then be prioritized and presented to the client for

Read more

An Inside Look at a Bug Bounty Program

Clayton Smith So what’s it like to run a public bug bounty program? Shopify first launched its program in 2013, and since then we’ve received thousands of submissions and paid hundreds of bounties. In this presentation we’ll give you an inside look into our White Hat program. We’ll share some of the best (and

Read more

The Security + Agile + DevOps Journey

Sandra Liepkalns & Graham Bignell In this session, Sandra and Graham will explore the challenges of integrating a Security practice across independently operating teams of engineers, building positive relationships between developers, administrators and stakeholders.   Starting from a deficit and building an effective security

Read more

Tracking Ransomware – Using Behavior to Find New Threats

Jessica Bair This presentation discuss the latest ransomware trends, as well as how to defend your enterprise against this threat. Attendees to understand what is ransomware, what are the attack vectors, what are the commonalities between variants, how to track ransomware with dynamic analysis of behavior, and what is the sophistication of the

Read more

Cultivating your cybersecurity operations

Steve Bowers Let’s outline the conception, development, and evolution of cybersecurity operations, starting with business objectives. A cyber operation built arbitrarily or with vague goals in mind cannot succeed. We will examine a high-level framework that can be used to develop a cyber operation from the ground up, or add focus and

Read more

Blockchain-Based Cyber Security

Pierre Roberge Starting from a quick introduction to Blockchains, we will cover the concepts behind Bitcoin and Ethereum to understand the DAO exploitation hack. We will explore how Bitcoin Decentralized Blockchain using Proof of Work as resilience to double-spending is influencing current research. How it is inspiring ideas in Cyber Security

Read more