Presenter: Masarah Paquet-Clouston & Laurent Desaulniers Statistics are speaking loudly! There is a disconnection between defenders’ perceptions of the value of the security controls they implement, and the most common attack vectors leveraged by penetration testers acting as potential attackers. This presentation highlights the key
2020 has seen one of the largest shifts to remote work in history, bringing with it a new set of security challenges. A workforce largely shifted to virtual environments, coupled with rapid cloud adoption, drastically increases need for data visibility and control. This new working model has pivoted the threat landscape, and security teams
Presenter: Scott Jones
This presentation/demo will be on OBSERVATIONDECK (aka ODeck). ODeck is currently a tailored service provided by the Canadian Center for Cyber Security (CCCS) for Government of Canada (GC) partner departments aimed to assist them in patching operating systems and applications. ODeck provides detailed visibility of a GC security practitioners
The Canadian Centre for Cyber Security (CCCS) plays a key role in providing an additional layer of security to the Government of Canada’s infrastructure. With the growing migration from Government owned data centers to various Cloud Service Providers, CCCS was faced with the new challenge of securing the Government of Canada in the cloud.
Automation is a key principle of continuous integration. Software dependencies can introduce risk when blindly integrated. How might a team reduce the risk of integrating dependencies with automation? Assemblyline is a tool developed by the Canadian Centre for Cyber Security (CCCS) for malware detection and analysis. We explore Assemblyline
Modern application development revolves around DevOps workflows that have development teams always churning out new application features, automating unit and functional testing of applications, and deploying to production in the shortest time frame possible. The newer technologies that enable this level of automation and speed create new risks
We all have seen the statistics about the growth of unmanaged devices, sometimes called the “Enterprise of Things”. This includes building management systems (lighting, cooling), security systems (cameras, badge readers), office equipment (smart TVs, headsets, printers), and specialized devices used in environments such as retail,
Turning into the final leg of 2020, Canadians must now engage with an environment of unprecedented transformation and increasing global-level hyper-competitiveness. Admired by many, but loathed by some for its principled approach to democratic governance, along with the conduct of business and world affairs, Canada will steadily incur targeted
The COVID pandemic has allowed attackers to exploit users with phishing attacks, ransomware, and other scams. FortiGuard Labs has recorded over 600 unique campaigns related to COVID cyberattacks per day. We will; examine some of the top attacks, understand how attackers are creating those attacks, and the platforms they are targeting. Learn