Speakers
|
Click on link to download
|
Marc Brouillard |
Government of Canada: The Journey to Zero Trust |
Alex Hemmati |
Cyber Ranges: Training your Cyber Warriors : Are you REALLY ready? |
John Pilon & Karl Galbraith |
How to Win in the Era of the 18 Minute Breach |
Saumil Udayan Shah |
Introducing ARM-X – The ARM IoT Firmware Emulation Framework |
David Pearson |
Shared Responsibility is not Shared Risk! Managing Risk in a Shared Responsibility Environment. |
James Smith |
Rethinking Vulnerability Prioritization in the Modern Threat Landscape |
Douglas Santos |
The Evolution of File-less Ransomware |
Nicholas Rowe |
Journey Through the Labyrinth of Microsegmentation |
Jamie Sanbower |
Demystifying Zero Trust Architecture |
Andrew Hay |
Be an Inspirational Coach, Not an Oppressive Security Executive |
Renee DiResta |
Disinformation as a Cybersecurity Problem |
Julian Cohen |
Adversary-Based Threat Modeling and Risk Analysis |
Roger Ofarril |
Threat Hunting Primer: Moving From a Reactive to a Proactive Mindset |
Diana Kelly |
Shifting Sands – Shoring up Cyber-defense in a Rapidly Changing Threat Landscape: Insights from the Microsoft Security Intelligence Report Volume 24 |
Eldar Marcussen |
Terminal Vertex – Attacking Network Monitoring |
Perri Adams & Sophia D’Antoine |
In Search of Lost Bytes, “Assurance Under Low Trust Conditions” |
Sophia D’Antoine |
The Secret Life of Supply Chains |
Jeremy Blackthorne |
Reverse-Engineering with NSA’s Ghidra |
Numaan Huq |
Exposed and Vulnerable Critical Infrastructure – Energy & Water Industries |
Costin G. Raiu & Vitaly Kamluk |
Insights from Supply Chain Attack Investigations |
John McCumber |
Cyber Supply Chain |
Zeshan Aziz |
How Political Bots influence Brexit – A new way of classifying bots |
Simon Zuckerbraun |
The Brave New World of JavaScript Engine Vulnerabilities |
Ryan Warns |
Unrestricted or improperly validated access to the privileged Model Specific Register (MSR) instructions |
Nicholas Palmer and Dmitri Volkov |
From Compromise to Monetize: An Investigation Into BriansClub |
Luc Dandurand |
Improving Preparedness Through Cyber Exercises |
Kellman Meghu |
What Did You Do So Wrong, You Thought You Needed a Firewall in the Cloud? |