Medical Device Security

Alex Illiadis MedSec The focus of this presentation is on the security of medical devices. Anything from enterprise hospital equipment to embedded gadgets that are available for patients. We will walk through all the layers of security starting from the hardware, firmware and RF. This talk is a story of our experiences and struggles

Read more

If I Had a Million Dollars

Olivier Henchiri Privy Council Office If you had a million dollars to spend on your IT security program, what would you invest in? In today’s fast-paced digital world, it can be challenging to know where to focus your priorities. IT security industry trends, recent headlines and the latest gadgets and tools can provide some

Read more

The Wrong Kind of DevOps Talk

Bobby Kuzma DevOps seems to be where all the cool kids in IT are hanging out these days. While not all of us get to work in DevOps shops, we can steal some of the toolset to up our game for lab and skills development purposes. In this talk, you’ll not only learn about DevOps-y 

Read more

Cyber Warfare in the CAF

Master Warrant Officer Alex Arndt Canadian Armed Forces The Canadian Armed Forces, as a result of the Defence Policy Review, is investing heavily in Cyber warfare. This includes the creation of a new occupation, developing new doctrine and establishing a new command structure to help the military take on this challenging battlespace. Master

Read more

Russians, Chinese and whoever comes

Luciano Martins Espionage, theft of source code, violation of intellectual property, leaking personal information, extortion and critical infrastructure, are just some of the incidents that were reported (many too late) in the first half of the year. The source of these attacks are not isolated people with a computer and good Internet

Read more

Infrastructure Security 2.0

Jonathan Pulsifer Shopify Shopify has leveraged Kubernetes through Google Container Engine (GKE) to build its new cloud platform. This PaaS is currently serving the majority of the company’s internal tools as well as business-critical production workloads. Moving to Kubernetes and a public cloud is no easy task, especially for a security

Read more

Facilitating Fluffy Forensics 3.0

Andrew Hay LEO Cyber Security Cloud computing enables the rapid deployment of servers and applications, dynamic scalability of system resources, and helps businesses get products to market faster than ever before. Most organizations are aware of the benefits of adopting cloud architectures and many are becoming aware of the potential security

Read more

IoT (Internet of Things) Security

John Pavelich Spectral Guard Inc Threats are becoming more complex as Threat Agents look for new ways to use technology in their quest for valuable data. As the number of connected devices grows to more than 20 billion by 2020, the Internet of Things (IoT) will likely provide an unprecedented expansion of new threat vectors 

Read more

War in the Internet-of-Everything

Dave McMahon Clairvoyance Cyber Corp Astract Consider that the largest mobile device you will soon own will be your car. Picture an aircraft as software with wings, a spaceship as a rocket-propelled supercomputer and navy ships as floating data-centres. Look at augmented reality gaming on our sidewalks, autonomous drones in the sky, bitcoins

Read more