Presenter – Marc Brouillard – CTO, Government of Canada As the Government of Canada (GC) transforms its IT environment, it must enable more effective collaboration and interoperability, using modern technologies and approaches. The traditional approach to establishing a security perimeter around a network has changed over the last
Presenter: Alex Hemmati Join Cyberbit’s Head of North America Federal Sales and Operations, Alex Hemmati,as he demistifies the “cyber-range” concept and works through what it takes to ensure today’s cyber warriors have the skills and experience needed to combat zero day events for both IT and OT networks.
Presenter: John Pilon & Karl Galbraith This exclusive session delves into the details of some of CrowdStrike’s most eye opening breach investigations of the past year and highlights the need for speed in modern security operations centers. Understand a CISO’s view of these occurrences in Canada. Learn about the meaning of “breakout time”
Presenter: Saumil Udayan Shah Don’t you wish you had a VM for testing IoT devices? I created ARM-X IoT Firmware Emulation Framework initially as a testing platform for my own research and development needs. Over the years what started as a clumsy Linux-on-ARM QEMU image has now turned into a tried-and-tested framework which has led
Presenter: David Pearson In this presentation we will examine how the Security Assessment & Authorization (SA&A) activities can deal with control implementations in multiple places and arrive at a consolidated view of risk and how GRC tools can provide the support. For example, when adopting cloud services, it is tempting to try to
Presenter: James Smith The Common Vulnerability Scoring System has been the defacto standard for vulnerability scoring. In 2015 when CVSS 3.0 was released, the previous year had a total of almost 8,000 vulnerabilities. In 2017 the annual vulnerability rate skyrocketed, and 2018 had 16,000 vulnerabilities released with 4000 of those being
Presenter: Douglas Santos Today’s reality is: despite the growing number of technologies, products and services and the overall growth and acceptance of the cybersecurity mindset, businesses still get hacked. Mostly because they fail to properly understand, deploy, configure and manage their security controls and procedures. Ransomware remains
Presenter: Nicholas Rowe The advent of microsegmentation capabilities in the public and private cloud environments is a game changer….however few are prepared to handle it. Microsegmentation brings with it application of tighter network security policies, significantly more visibility, and sadly more complexity….without forethought. In this
Presenter: Jamie Sanbower The buzz is there. Zero Trust, Gartner’s CARTA, Forrester’s Zero Trust Extended, Cisco Zero Trust, etc; but what does any of this really mean to the security practitioner? In this session, we will provide clarity to all this noise, and discuss how a pure Zero Trust model was always intended to be,
Read more
Read more
Presenter: Andrew Hay Security executives are often seen by employees as oppressive heavy-handed dictators that demand strict and uncompromising adherence with the organization’s security program. In amateur and professional sports, this “coaching style” is referred to as autocratic coaching. Often seen in football, baseball, and hockey,