Media File Presentation File Tools
“Welcome to SecTor 2015” – Brian Bourne      
Big Data Needs Big Privacy … Enter Privacy by Design – Dr. Ann Cavoukian  Media File Presentation File  
IT Security Operations: Successful Transformation – Kristin Lovejoy  Media File    
Globalization of Cybercrime – Jason Brown       
Maturing InfoSec: Lessons from Aviation on Information Sharing – Trey Ford  Media File  Presentation File  
       
IT Security Experts Canada Toronto SecTor - Technical Track Media File Presentation File Tools
Automation is your Friend: Embracing SkyNet to Scale Cloud Security – Mike Rothman  Media File    
Breaking Access Controls with BLEKey – Mark Bassegio and Eric Evenchick
Media File    
Breaking and Fixing Python Applications – Enrico Branca  Media File Presentation File Tools
Complete Application Ownage via Multi-POST XSRF – Adrien de Beaupré  Media File Presentation File  
Confessions of a Professional Cyber Stalker – Ken Westin  Media File Presentation File  
Cymon – An Open Threat Intelligence System – Roy Firestein  Media File Presentation File  
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing – Alex Pinto  Media File Presentation File  
DevOps For The Home – Kellman Meghu  Media File Presentation File  
Drug Pump and Medical Device Security – Jeremy Richards       
Exploitation Trends: From Potential Risk to Actual Risk – Tim Rains  Media File    
Hijacking Arbitrary .NET Application Control Flow – Topher Timzen  Media File Presentation File  
Incoming Threats At the Speed of Retail – Wendy Nather  Media File    
Learning To Love Your Attackers – Ryan Linn       
Making & Breaking Machine Learning Anomaly Detectors in Real Life – Clarence Chio  Media File    
Malware Activity in Mobile Networks – An Insider View – Kevin McNamee  Media File Presentation File  
Software Defined Networking / Attacker Defined Networking – Rob VandenBrink  Media File    
Stealth Attack From The Produce Aisle – Todd Dow and Keith Benedict    Presentation File  
Stealthier Attacks and Smarter Defending with TLS Fingerprinting – Lee Brotherston  Media File Presentation File  
UNMASKING MALWARE – Christopher Elisan  Media File    
What Google knows about you and your devices, and how to get it – Vladimir Katalov  Media File Presentation File  
Xenophobia is Hard on Data: Forced Localization, Data Storage, and Business Realities – Brendan O’Connor and James Arlen  Media File Presentation File  
       
IT Security Experts Canada Toronto SecTor - Management Track Media File Presentation File Tools
Bulletproofing Your Incident Response Plan: Effective Tabletops – Reg Harnish  Media File Presentation File  
CISO Survival Guide: How to thrive in the C-Suite and Boardroom – Chris Wysopal  Media File Presentation File  
Dolla Dolla Bill Y’all: Cybercrime Cashouts – Benjamin Brown  Media File Presentation File  
Make Metrics Matter – Jessica Ireland  Media File Presentation File  
The Effective Use of Cyber Ranges for Application Performance and Security Resilience – Train Like You Fight! – Bob DuCharme  Media File    
There’s no such thing as a coincidence – Discovering Novel Cyber Threats – Jim Penrose  Media File    
What does it take to deliver the most technologically advanced Games ever? – Enzo Sacco and Quang Tu    Presentation File  
       
IT Security Experts Canada Toronto SecTor - Management Track Media File Presentation File Tools
Agile Incident Management – Bringing the “Win” Back to Data and Privacy Breach Responses – Robert Beggs    Presentation File  
Building an Effective Vulnerability & Remediation Management Program – Dave Millier  Media File    
Ground Zero Financial Services: Targeted Attacks from the Darknet – Joe Pizzo  Media File    
Peeling The Layers Of Vawtrak – Raul Alvarez    Presentation File  
Preventing Home Automation Security Disasters – James Arlen  Media File Presentation File  
Run Faster, Continuously Harden – Embracing DevOps to Secure All The Things – Chayim Kirshen  Media File Presentation File  
Security for non-Unicorns – Ben Hughes  Media File    
The Internet of Bad Things and Securing the Software Defined Data Center – Ian Redden and Marc Edun  Media File    
       
IT Security Experts Canada Toronto SecTor - Sponsor Talk Track Media File Presentation File Tools
2015 State of Vulnerability Exploits – Amol Sarwate  Media File Presentation File  
Advanced Threat Analytics: Adapt as Fast as Your Enemies – Jasbir Gill and Lanny Cofman  Media File    
Advanced Threats: Eliminating the Blind Spot – Fahmy Kadiri       
Browser and Environment Hardening – Kurtis Armour  Media File    
Building Better Indicators: Crowdsourcing Malware IOCs – Sean Wilson  Media File Presentation File  
Business Backed CVEs – The Major Vulnerabilities of the Past Year – Atif Ghauri and Brad Antoniewicz       
Certifi-gate: Has your Android device been Pwned? – Shai Yanovski  Media File    
Changing the Game of Threat Hunting – Jim Penrose  Media File    
Detecting the Bear in Camp: How to Find Your True Vulnerabilities – Ryan Poppa  Media File    
Effective Ways to Tackle Vulnerability Remediation – Dave Millier  Media File    
Ensuring the Success of Your IAM Project – Jeremy Hanlon       
Exposing Advanced Threats: How big data analytics is changing the way advanced threat defense is deployed, managed and measured – Sean Earhard       
Insider Threat – The Soft Underbelly of CyberSecurity – Harold Byun       
Knowing what happened is only half the battle. – Grayson Lenik  Media File Presentation File  
Mitigating the Alert – Impact Prevention in a super active security battlefield – Brian Read  Media File    
One Ring to Rule Them All – Hardware isolation and the future of virtualization security – Simon Crosby  Media File Presentation File  
SIEM and the Art of Log Management – Jeff Pold and Ron Pettit  Media File Presentation File  
Taking back Endpoint Control! – John Beal  Media File Presentation File  
The State of Software Security – Chris Wysopal  Media File Presentation File  
       

   
Past Presentations: SecTor 2014 / SecTor 2013 / SecTor 2012 / SecTor 2011 / SecTor 2010 / SecTor 2009 / SecTor 2008 / SecTor 2007