• 09:00
  • It’s 2016: What can you do about gender balance in Information Security?

    Marilyn Blamire, Alexis Lavi, Julie Leo, Karen Nemani, Laura Payne, Andrea Stapley
    Wed, 09:00 - 10:00
    Keynote Hall - Keynote
  • 10:15
  • How To Secure Serverless Applications

    Mark Nunnikhoven
    Wed, 10:15 - 11:15
    701A - Tech
  • Data-Driven Computer Security Defense

    Roger Grimes
    Wed, 10:15 - 11:15
    701B - Management
  • Control system security, are we living on luck?

    Chris Sistrunk
    Wed, 10:15 - 11:15
    801A - Tech
  • Utilizing Memory and Network Forensics for Scalable Threat Detection and Response

    Andrew Case
    Wed, 10:15 - 11:15
    801B - Tech
  • Lighting up the Canadian Darknet Financially

    Milind Bhargava, Peter Desfigies, Philip Shin
    Wed, 10:15 - 11:15
    803 - Security Fundamentals
  • Overwhelmed By Security Vulnerabilities? Learn How To Prioritize Remediation

    Amol Sarwate
    Wed, 10:15 - 10:45
    Hall G - Sponsor Track
  • 11:30
  • Why Technology is Not the Answer to Cybersecurity

    Sean Blenkhorn
    Wed, 11:30 - 12:00
    701A - Sponsor Track
  • The Cyber Security Readiness of Canadian Organizations

    Ryan Wilson
    Wed, 11:30 - 12:00
    701B - Sponsor Track
  • Lessons from the Attack Chain: Bolster Your IR Program

    Eric Sun
    Wed, 11:30 - 12:00
    801A - Sponsor Track
  • Stopping the Attacker You Know

    Brian Read
    Wed, 11:30 - 12:00
    801B - Sponsor Track
  • Rethinking Threat Intelligence

    Danny Pickens
    Wed, 11:30 - 12:00
    803 - Sponsor Track
  • Global Encryption Usage is on the Rise!

    Si Brantley
    Wed, 11:30 - 12:00
    Hall G - Sponsor Track
  • 12:00
  • Retaking surrendered ground: making better decisions to fight cybercrime

    Christopher E. Pogue
    Wed, 12:00 - 13:10
    Keynote Hall - Keynote
  • 13:25
  • AirBnBeware: short-term rentals, long-term pwnage

    Jeremy Galloway
    Wed, 13:25 - 14:25
    701A - Tech
  • Cybersecurity in an era with quantum computers: will we be ready?

    Michele Mosca
    Wed, 13:25 - 14:25
    701B - Management
  • RTF Abuse: Exploitation, Evasion and Counter Measures

    Devon Greene
    Wed, 13:25 - 14:25
    801A - Tech
  • Purple Teaming the Cyber Kill Chain: Practical Exercises for Management

    Chris Gates, Haydn Johnson
    Wed, 13:25 - 14:25
    801B - Tech
  • Expanding Your Toolkit the DIY Way

    Chris Maddalena
    Wed, 13:25 - 14:25
    803 - Security Fundamentals
  • Securing a Cloud-Based Data Center

    Peter Cresswell
    Wed, 13:25 - 13:55
    Hall G - Sponsor Track
  • 14:40
  • Lessons Learned Hunting IoT Malware

    Oliver Bilodeau
    Wed, 14:40 - 15:40
    701A - Tech
  • How to Rob a Bank or The SWIFT and Easy Way to Grow Your Online Savings

    Cheryl Biswas
    Wed, 14:40 - 15:40
    701B - Management
  • Hiding in Plain Sight – Taking Control of Windows Patches

    Travis Smith
    Wed, 14:40 - 15:40
    801A - Tech
  • Open Source Malware Lab

    Robert Simmons
    Wed, 14:40 - 15:40
    801B - Tech
  • The Power of DNS: Gaining Security Insight Through DNS Analytics

    Scott Penney
    Wed, 14:40 - 15:40
    803 - Security Fundamentals
  • Defending Against Phishing: Effective Phishing Incident Response Using Employees, Incident Responders, and Intelligence.

    Mike Saurbaugh
    Wed, 14:40 - 15:10
    Hall G - Sponsor Track