Material de la conferencia SecTor 2015

SecTor es probablemente la conferencia anual de seguridad más importante de Canadá. Curiosamente sus fundadores fueron TASK, uno de los grupos de usuarios de seguridad TI más grande y de mayor éxito de América del Norte, que decidió llevar este evento a dicho país.
Después de un tiempo, SecTor se ha ganado una gran reputación reuniendo expertos de todo el mundo para compartir sus últimas investigaciones y técnicas. Por eso, año a año, conviene no perder de vista el contenido de sus charlas y presentaciones:


Media File
Presentation File
Tools
"Welcome to SecTor 2015" - Brian Bourne


Big Data Needs Big Privacy ... Enter Privacy by Design - Dr. Ann Cavoukian Media File Presentation File
IT Security Operations: Successful Transformation - Kristin Lovejoy Media File
Globalization of Cybercrime - Jason Brown
Maturing InfoSec: Lessons from Aviation on Information Sharing - Trey Ford Media File  Presentation File




IT Security Experts Canada Toronto SecTor - Technical Track
Media File
Presentation File
Tools
Automation is your Friend: Embracing SkyNet to Scale Cloud Security - Mike Rothman Media File
Breaking Access Controls with BLEKey - Mark Bassegio and Eric Evenchick
Media File
Breaking and Fixing Python Applications - Enrico Branca Media File Presentation File Tools
Complete Application Ownage via Multi-POST XSRF - Adrien de Beaupré Media File Presentation File
Confessions of a Professional Cyber Stalker - Ken Westin Media File
Presentation File
Cymon - An Open Threat Intelligence System - Roy Firestein Media File
Presentation File
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing - Alex Pinto
Media File
Presentation File
DevOps For The Home - Kellman Meghu
Media File
Presentation File
Drug Pump and Medical Device Security - Jeremy Richards
Exploitation Trends: From Potential Risk to Actual Risk - Tim Rains
Media File
Hijacking Arbitrary .NET Application Control Flow - Topher Timzen Media File Presentation File
Incoming Threats At the Speed of Retail - Wendy Nather
Media File
Learning To Love Your Attackers - Ryan Linn
Making & Breaking Machine Learning Anomaly Detectors in Real Life - Clarence Chio Media File
Malware Activity in Mobile Networks – An Insider View - Kevin McNamee Media File Presentation File
Software Defined Networking / Attacker Defined Networking - Rob VandenBrink Media File
Stealth Attack From The Produce Aisle - Todd Dow and Keith Benedict Presentation File
Stealthier Attacks and Smarter Defending with TLS Fingerprinting - Lee Brotherston Media File Presentation File
UNMASKING MALWARE - Christopher Elisan Media File
What Google knows about you and your devices, and how to get it - Vladimir Katalov
Media File
Presentation File
Xenophobia is Hard on Data: Forced Localization, Data Storage, and Business Realities - Brendan O'Connor and James Arlen Media File
Presentation File




IT Security Experts Canada Toronto SecTor - Management Track
Media File
Presentation File
Tools
Bulletproofing Your Incident Response Plan: Effective Tabletops - Reg Harnish Media File
Presentation File
CISO Survival Guide: How to thrive in the C-Suite and Boardroom - Chris Wysopal
Media File
Presentation File
Dolla Dolla Bill Y'all: Cybercrime Cashouts - Benjamin Brown Media File
Presentation File
Make Metrics Matter - Jessica Ireland
Media File
Presentation File
The Effective Use of Cyber Ranges for Application Performance and Security Resilience – Train Like You Fight! - Bob DuCharme Media File
There’s no such thing as a coincidence - Discovering Novel Cyber Threats - Jim Penrose Media File
What does it take to deliver the most technologically advanced Games ever? - Enzo Sacco and Quang Tu Presentation File




IT Security Experts Canada Toronto SecTor - Management Track Media File Presentation File Tools
Agile Incident Management - Bringing the "Win" Back to Data and Privacy Breach Responses - Robert Beggs
Presentation File
Building an Effective Vulnerability & Remediation Management Program - Dave Millier Media File
Ground Zero Financial Services: Targeted Attacks from the Darknet - Joe Pizzo Media File
Peeling The Layers Of Vawtrak - Raul Alvarez Presentation File
Preventing Home Automation Security Disasters - James Arlen Media File Presentation File
Run Faster, Continuously Harden - Embracing DevOps to Secure All The Things - Chayim Kirshen Media File
Presentation File
Security for non-Unicorns - Ben Hughes Media File
The Internet of Bad Things and Securing the Software Defined Data Center - Ian Redden and Marc Edun
Media File




IT Security Experts Canada Toronto SecTor - Sponsor Talk Track
Media File
Presentation File
Tools
2015 State of Vulnerability Exploits - Amol Sarwate Media File Presentation File
Advanced Threat Analytics: Adapt as Fast as Your Enemies - Jasbir Gill and Lanny Cofman
Media File
Advanced Threats: Eliminating the Blind Spot - Fahmy Kadiri
Browser and Environment Hardening - Kurtis Armour
Media File
Building Better Indicators: Crowdsourcing Malware IOCs - Sean Wilson Media File Presentation File
Business Backed CVEs - The Major Vulnerabilities of the Past Year - Atif Ghauri and Brad Antoniewicz
Certifi-gate: Has your Android device been Pwned? - Shai Yanovski Media File
Changing the Game of Threat Hunting - Jim Penrose Media File
Detecting the Bear in Camp: How to Find Your True Vulnerabilities - Ryan Poppa
Media File
Effective Ways to Tackle Vulnerability Remediation - Dave Millier Media File
Ensuring the Success of Your IAM Project - Jeremy Hanlon
Exposing Advanced Threats: How big data analytics is changing the way advanced threat defense is deployed, managed and measured - Sean Earhard
Insider Threat – The Soft Underbelly of CyberSecurity - Harold Byun
Knowing what happened is only half the battle. - Grayson Lenik Media File
Presentation File
Mitigating the Alert - Impact Prevention in a super active security battlefield - Brian Read
Media File
One Ring to Rule Them All - Hardware isolation and the future of virtualization security - Simon Crosby Media File Presentation File
SIEM and the Art of Log Management - Jeff Pold and Ron Pettit Media File Presentation File
Taking back Endpoint Control! - John Beal
Media File
Presentation File
The State of Software Security - Chris Wysopal Media File Presentation File




 
Past Presentations: SecTor 2014 / SecTor 2013 / SecTor 2012 / SecTor 2011 / SecTor 2010 / SecTor 2009 / SecTor 2008 / SecTor 2007

Fuente: http://sector.ca/presentations

Comentarios

Publicar un comentario