• [
  • [Ab]using TLS for defensive wins

    Lee Brotherston
    Tue, 14:40 - 15:40
    701A - Tech
  • A
  • AirBnBeware: short-term rentals, long-term pwnage

    Jeremy Galloway
    Wed, 13:25 - 14:25
    701A - Tech
  • All roads lead to domain admin, a part of a presentation series: From breach to C.D.E. Part I

    Yannick Bedard
    Tue, 10:15 - 11:15
    803 - Security Fundamentals
  • An Effective Approach to Automating Compliance Activities

    Dave Miller
    Tue, 11:30 - 12:00
    801B - Sponsor Track
  • C
  • Can massive data harvesting drive down the time to breach detection?

    Sean Earhard
    Tue, 13:25 - 14:25
    803 - Security Fundamentals
  • CANtact: Open Source Automotive Tools

    Eric Evenchick
    Tue, 10:15 - 11:15
    801A - Tech
  • Control system security, are we living on luck?

    Chris Sistrunk
    Wed, 10:15 - 11:15
    801A - Tech
  • Crash Course in Kubernetes & Security

    Matt Johansen
    Tue, 15:55 - 16:55
    701A - Tech
  • Cybersecurity in an era with quantum computers: will we be ready?

    Michele Mosca
    Wed, 13:25 - 14:25
    701B - Management
  • D
  • Data-Driven Computer Security Defense

    Roger Grimes
    Wed, 10:15 - 11:15
    701B - Management
  • Defending Against Phishing: Effective Phishing Incident Response Using Employees, Incident Responders, and Intelligence.

    Mike Saurbaugh
    Wed, 14:40 - 15:10
    Hall G - Sponsor Track
  • Defense Against the Dark Arts: Examining, Fixing and Fighting for our Cyber Defenses

    Edward Snowden
    Tue, 09:00 - 10:00
    Keynote Hall - Keynote
  • Developing your Career in IT Security

    Adrien de Beaupre, Brian Bourne, Mike Murray, Laura Payne
    Tue, 14:55 - 17:00
    Keynote Hall - Career
  • E
  • Eliminating the Automation and Integration Risks of the “Security Frankenstein”

    Christopher E. Pogue
    Tue, 11:30 - 12:00
    701A - Sponsor Track
  • EventID Field Hunter (EFH) – Looking for malicious activities in your Windows events

    Rodrigo Montoro
    Tue, 15:55 - 16:55
    801A - Tech
  • Expanding Your Toolkit the DIY Way

    Chris Maddalena
    Wed, 13:25 - 14:25
    803 - Security Fundamentals
  • Exposing Ransomware: Intelligent cybersecurity for the real world.

    Sean Earhard
    Tue, 14:40 - 15:10
    Hall G - Sponsor Track
  • G
  • Getting Business Value from Penetration Testing

    Mark Bassegio, Tim West
    Tue, 13:25 - 14:25
    701B - Management
  • Global Encryption Usage is on the Rise!

    Si Brantley
    Wed, 11:30 - 12:00
    Hall G - Sponsor Track
  • H
  • Hack Microsoft by using Microsoft signed binaries

    Pierre-Alexandre Braeken
    Tue, 15:55 - 16:55
    801B - Tech
  • Held for Ransom: Defending your Data Against Ransomware

    James L. Antonakos
    Tue, 11:30 - 12:00
    701B - Sponsor Track
  • Hiding in Plain Sight – Taking Control of Windows Patches

    Travis Smith
    Wed, 14:40 - 15:40
    801A - Tech
  • How to build a malware classifier [that doesn’t suck on real-world data]

    John Seymour
    Tue, 10:15 - 11:15
    801B - Tech
  • How to Rob a Bank or The SWIFT and Easy Way to Grow Your Online Savings

    Cheryl Biswas
    Wed, 14:40 - 15:40
    701B - Management
  • How To Secure Serverless Applications

    Mark Nunnikhoven
    Wed, 10:15 - 11:15
    701A - Tech
  • I
  • Introducing G.Tool – A batteries included framework for building awesome GRC tools without wasting money.

    Ben Sapiro
    Tue, 10:15 - 11:15
    701B - Management
  • IPv6 for the InfoSec Pro on the Go

    Allan Stojanovic
    Tue, 14:40 - 15:40
    803 - Security Fundamentals
  • It’s 2016: What can you do about gender balance in Information Security?

    Marilyn Blamire, Alexis Lavi, Julie Leo, Karen Nemani, Laura Payne, Andrea Stapley
    Wed, 09:00 - 10:00
    Keynote Hall - Keynote
  • J
  • Jihadism and Cryptography, from internet to softwares

    Julie Gommes
    Tue, 14:40 - 15:40
    801A - Tech
  • L
  • Lessons from the Attack Chain: Bolster Your IR Program

    Eric Sun
    Wed, 11:30 - 12:00
    801A - Sponsor Track
  • Lessons Learned Hunting IoT Malware

    Oliver Bilodeau
    Wed, 14:40 - 15:40
    701A - Tech
  • Lighting up the Canadian Darknet Financially

    Milind Bhargava, Peter Desfigies, Philip Shin
    Wed, 10:15 - 11:15
    803 - Security Fundamentals
  • M
  • Making sense of a million samples per day: Behavior-based Methods for Automated, Scalable Malware Analysis

    Stefano Zanero
    Tue, 13:25 - 14:25
    801B - Tech
  • N
  • Network virtualization to enhance context, visibility and containment

    Bruno Germain
    Tue, 11:30 - 12:00
    Hall G - Sponsor Track
  • Next-Gen Now, Outsmarting ransomware, exploits and zero-day attacks

    Keir Humble
    Tue, 15:55 - 16:25
    Hall G - Sponsor Track
  • O
  • Open Source Malware Lab

    Robert Simmons
    Wed, 14:40 - 15:40
    801B - Tech
  • Overwhelmed By Security Vulnerabilities? Learn How To Prioritize Remediation

    Amol Sarwate
    Wed, 10:15 - 10:45
    Hall G - Sponsor Track
  • P
  • Practical Static Analysis for Continuous Application Security

    Justin Collins
    Tue, 14:40 - 15:40
    801B - Tech
  • Purple Teaming the Cyber Kill Chain: Practical Exercises for Management

    Chris Gates, Haydn Johnson
    Wed, 13:25 - 14:25
    801B - Tech
  • R
  • Retaking surrendered ground: making better decisions to fight cybercrime

    Christopher E. Pogue
    Wed, 12:00 - 13:10
    Keynote Hall - Keynote
  • Rethinking Threat Intelligence

    Danny Pickens
    Wed, 11:30 - 12:00
    803 - Sponsor Track
  • RTF Abuse: Exploitation, Evasion and Counter Measures

    Devon Greene
    Wed, 13:25 - 14:25
    801A - Tech
  • S
  • Safety Should be the Security Paradigm

    Chris Wysopal
    Tue, 14:40 - 15:40
    701B - Management
  • Securing a Cloud-Based Data Center

    Peter Cresswell
    Wed, 13:25 - 13:55
    Hall G - Sponsor Track
  • Securing Network Communications: An Investigation into Certificate Authorities on Mobile

    Andrew Blaich
    Tue, 10:15 - 11:15
    701A - Tech
  • Securing Our Future

    Mikko Hypponen
    Tue, 12:00 - 13:10
    Keynote Hall - Keynote
  • Security by Consent, or Peel’s Principles of Security Operations

    Brendan O'Connor
    Tue, 15:55 - 16:55
    701B - Management
  • Stopping the Attacker You Know

    Brian Read
    Wed, 11:30 - 12:00
    801B - Sponsor Track
  • T
  • The Cyber Security Readiness of Canadian Organizations

    Ryan Wilson
    Wed, 11:30 - 12:00
    701B - Sponsor Track
  • The Emerging Era of Cognitive Security

    Peter Allor
    Tue, 11:30 - 12:00
    801A - Sponsor Track
  • The Industry Need for Cloud Generation Security

    Ryan Leonard
    Tue, 13:25 - 13:55
    Hall G - Sponsor Track
  • The Power of DNS: Gaining Security Insight Through DNS Analytics

    Scott Penney
    Wed, 14:40 - 15:40
    803 - Security Fundamentals
  • The Security Problems of an Eleven Year Old and How To Solve Them

    Jake Sethi-Reiner
    Tue, 15:55 - 16:55
    803 - Security Fundamentals
  • The State of SCADA on the Internet

    Kyle Wilhoit
    Tue, 13:25 - 14:25
    801A - Tech
  • U
  • Understanding Ransomware: Clear and Present Danger

    Raul Alvarez
    Tue, 10:15 - 10:45
    Hall G - Sponsor Track
  • Utilizing Memory and Network Forensics for Scalable Threat Detection and Response

    Andrew Case
    Wed, 10:15 - 11:15
    801B - Tech
  • W
  • When ‘Oops’ Isn’t An Acceptable Answer

    Greg Pepper
    Tue, 11:30 - 12:00
    803 - Sponsor Track
  • Why Technology is Not the Answer to Cybersecurity

    Sean Blenkhorn
    Wed, 11:30 - 12:00
    701A - Sponsor Track
  • WiFi Exploitation: How passive interception leads to active exploitation

    Solomon Sonya
    Tue, 13:25 - 14:25
    701A - Tech