Event Schedule

We will be posting our 2019 event schedule following our first round of call-for-papers selections.

  • Day 1 November 4, 2019
  • Day 2 November 5, 2019
  • Track 1
  • Track 2
07:45 AMOnsite Registration

Onsite Registration and Coffee and Exhibit Area Open

08:30 AM - 08:45 AMWelcome and Review of Conference Organization By MC
08:45 AM - 09:30 AMOpening Keynote By Brandon WebbFormer US SNavy SEAL

Brandon Webb is a former US Navy SEAL sniper, Entrepreneur, New York Times bestselling author, and Avid Pilot. He’s the founder of Hurricane Group, a Men’s lifestyle company with digital publishing and e-commerce brands that reach over 50 Million monthly. He is also a co-founder at GSD Logistics, a third party fulfillment (3PL) company focused on global e-commerce fulfillment. Brandon is a member of the New York YPO (Young Presidents Organization) chapter, and was proud to serve as an appointed board member on the Veterans Advisory committee to the U.S. Small Business Administration

09:45 AM - 10:45 AMSecurity in Azure: Who, What, and Why By Matt JoyBulletproof

Microsoft provides many options for securing the Azure public cloud, but it’s still your responsibility to secure your applications and data. We’ll look at what tools are available for securing your Azure environment, as well as new and upcoming security features, and why security is more important than ever.

Key Takeaways:

  • Discover how Microsoft secures the Azure platform
  • Review security best practices in Azure
  • Introduce advanced security tools and features
  • Implement governance and compliance policies in your Azure environment

About the Speaker

Matt assists the Bulletproof Sales team to design and build solutions which help our customers grow and secure their IT footprint. With over 10 years industry experience, Matt has a diverse background including a mix of consultation and delivery expertise.

He brings a deep background in traditional infrastructure and virtualization technologies with a focus on security best practices, as well as a forward-looking perspective on cloud enablement and hybrid cloud deployments.

10:45 AM - 11:00 AMMorning Break /Vendor Booths / Networking
11:00 AM - 12:00 PMThe Race Against the Adversary: How to Win in the Era of the 18 Minute Breach By John PilonCrowdStrike

This exclusive session delves into the details of some of CrowdStrike’s most eye opening breach investigations of the past year and highlights the need for speed in modern security operations centers. See new research on “breakout time” and learn how you can use the 1-10-60 Rule to benchmark your organization and see if you have what it takes to uncover and respond to adversary activity, before it manifests into a full blown breach.

About the Speaker

John has worked for organizations such as Microsoft and HPE prior to joining Crowdstrike.

12:00 PM - 01:00 PMLunch (Presentation) By Trevor FlynnBulletproof

Lunch Presentation

Security Operations in the Cloud, Trevor Flynn, VP Managed Services

Launch of the new Bulletproof 365E Managed Security Service Offering – Powered by Microsoft 365 and Azure Sentinel

About the Speaker

As VP of Managed Services, Trevor’s job one is maintaining Bulletproof’s position as a leading provider of world-class secure and productive business solutions. He has extensive experience working with the Microsoft solution stack on all levels; individually as well as leading teams through the implementation of complex and enterprise-level services leveraging technologies such as Exchange, Lync/Skype for Business, SharePoint, SQL Server, Windows Server, Windows Desktop and the System Center Suite.

Trevor was a chief architect in the development of Bulletproof 365 – a comprehensive SMB productivity and security solution that earned the company the 2019 Microsoft Canada Modern Workplace Innovation Partner of the Year IMPACT Award – and the recently launched, Bulletproof 365 Enterprise. He is a proponent of cloud technologies that both enable advanced security and assurance as well as delightful user experiences.

.

01:00 PM - 02:00 PMRotten supplies: Winnti supply chain attacks case study By Mathieu TartareESET

Compromising legitimate software from trusted vendors is a highly effective technique to massively spread malware while remaining undetected. Our team is one of the few who discovered and analyzed supply chain attacks and, over the past few years, we have seen an increase of this kind of attacks against the software industry.

This presentation is the result of a long-term research uncovering new unpublished details on the arsenal of the Winnti umbrella. The Winnti umbrella consists in multiple threat actors having in common the use of a custom backdoor for their operations, the Winnti malware. It is active since at least 2009 and is mostly targeting the video-game industry even though it is also known to have compromised other high-profile targets such as the pharmaceutical industry and the healthcare sector.

At the beginning of the year, we uncovered new supply chain attacks targeting the video-game industry in Asia. Two games and one gaming platform application were compromised to include a new and previously undocumented backdoor leading to the compromise of thousands of players, allowing not only to spy on them, but also leveraging this large compromise by installing miners.

This presentation will focus on presenting new findings and details on the Winnti arsenal, including new undocumented backdoors as well as elements linking this campaign to the CCleaner, NetSarang and Asus compromise.

02:00 PM - 02:30 PMAfternoon Bacon Break (Sponsored by Bulletproof)
02:30 PM - 03:30 PMFinders Keepers (KPot Stealers) By Lilly ChalupowskiGoSecure

Learn how to begin reverse engineering malware by discussing CPU registers, the stack, calling conventions, and more. After being introduced basic concepts we will cover different injection techniques used by malware to hide its functionality including process hollowing, DLL injection, PE Injection and Atom Bombing. There will be a demo of unpacking KPot v2.0 including techniques to resolve APIs by disabling ASLR to uncover this stealers malicious behavior.

About the Speaker

Lilly is a TITAN Malware Research Lead at GoSecure and started her journey being mostly self-taught making hacking tools in her spare time. Chameleon (custom base64 steganography), Badger (DLL Security Enumeration including ASLR Entropy), Dirty-Needle (DLL Injection Tool), The Chrome Crusader (Chrome Extension Malware POC) and more. She has presented at many conferences such as AtlSecCon, BSides Las Vegas, Sector, BSides Fredericton, BSides St Johns, Hask, ISACA Atlantic, GoSec and more. Topics have included PE File Structure Security, Steganography, Chrome Extension Malware and Header Insecurities, The History and Analysis of Stuxnet, Malware Analysis of Remote Administration Tools, Malware Unpacking, Reverse Engineering and more. Lilly has been on The Register for her work with Chrome Extensions as well as on CTV to comment on phishing campaigns. She has volunteered for Girls Power Tech, Techsploration, Digital Nova Scotia and many other programs to inspire children to consider cyber security as a profession in the future.

03:30 PM - 04:30 PMA.I. Applications in Cyber Security By Ron McLeodNSCC

Many of our measures used in cyber security are based on Boolean logic applied to directly observable data. A thing, or set of things, is either present or not and thus a condition may be classified as true or false. For example, in the presence of a certain protocol, port number and contents of a packet payload, network traffic may be classified as malicious or benign.

The challenge is that much of this data may be obfuscated, may be present in a polymorphic form or, in many cases, may have only come into existence today. What is needed is a fuzzy approach to classification of threats; one in which there are degrees of truth.

In this talk, I introduce the concept of the “Ripple in the Pond”. With this metaphor, what is of interest is a change in recognized behavioural patterns of a system; the ripple in the surface of a calm pond.

The presence of a change in the behaviour of any system is this “Ripple”. Previous attempts at behaviour classifications have fallen into the trap on relying, once again, on directly observable data and therefore tend to be rule-based. The problem with this approach is that much of this data may be under the control of the threat actor and may be manipulated.

The approaches that will be discussed use data that are longitudinally derived and abstracted such that they are not easily manipulated or obfuscated. Examples are proposed with application to classification as well as behavioural and predictive analytics.

05:30 PM - 07:30 PMSocial Event (Sponsored by NTT)
07:45 AMOnsite Registration

Onsite Registration and Coffee and Exhibit Area Open

08:30 AM - 08:45 AMWelcome and Review of Conference Organization By MC
08:45 AM - 09:30 AMOpening Keynote By Brandon WebbFormer US SNavy SEAL

Brandon Webb is a former US Navy SEAL sniper, Entrepreneur, New York Times bestselling author, and Avid Pilot. He’s the founder of Hurricane Group, a Men’s lifestyle company with digital publishing and e-commerce brands that reach over 50 Million monthly. He is also a co-founder at GSD Logistics, a third party fulfillment (3PL) company focused on global e-commerce fulfillment. Brandon is a member of the New York YPO (Young Presidents Organization) chapter, and was proud to serve as an appointed board member on the Veterans Advisory committee to the U.S. Small Business Administration

09:45 AM - 10:45 AMShodan in the Atlantic By Grant Boudreau & Sunny JamwalMNP & EY

Shodan began as a pet project of John Matherly to scan the internet for specific ports and gather data related to these ports. Since its launch in 2009 Shodan has gained notoriety in the recent years. Shodan crawls the internet and stores data gathered for analysis by researchers, whitehats and blackhats. Shodan has made it very easy for anyone to gather reconnaissance data without actually doing any reconnaissance. By using this information an attacker can easily create a profile for the target and launched targeted attacks on the target without a trace.

The Authors wanted to explore the risk associated with information exposed over the internet and readily available on Shodan for Atlantic Canada. We hope that this presentation informs our audience, businesses and governments across the four provinces on risks associated with exposing critical ports and running unsupported software over the internet.

The research was focused on specific ports which were used in high profile data breaches, ransomware attacks, and operating system specifically scheduled to have met the end of life or will be end of life soon. The research focused on gathering data related to:

  • Ports: 21,22,23,25, 53, 80, 110,161,143, 445, 3389, 8080,
  • OS: Windows XP, Windows 2003, Windows 7, Windows 2008
  • Database Servers: MongoDB, MySQL
  • Webcam

The motivation behind this CFP lies with the fact that the authors have strong connection to Atlantic Canada while Grant is a born and bred Cape Bretoner, Sunny calls Atlantic Canada as its second home after moving to Halifax to pursue higher education at Dalhousie university.

About the Speakers

Grant Boudreau is a Cyber Security Consultant for MNP LLP. He holds a bachelor degree in Information Technology – Network Management from Cape Breton University, is an OSCP and OSWP graduate from Offensive Security, and has several other industry certifications. Grant has a passion for security and loves to learn new things. He also loves helping and sharing security tips with others

Sunny Jamwal is a Manager for EY Cyber Security team. With over 10 years of experience, Sunny has extensive knowledge of information security, networking, and related information technologies allowing him to quickly and knowledgeably inspect system architectures, identify vulnerabilities, assess risks and recommend safeguards to reduce and mitigate risk to information assets. Sunny has acted as the primary technical lead and subject matter expert on numerous Cyber Security Assessments for various private and public organizations in government and industries such as retail, finance, insurance, manufacturing, computer, communication, utilities, healthcare, and business services.

10:45 AM - 11:00 AMMorning Break /Vendor Booths / Networking
11:00 AM - 12:00 PMCounterhacking Websites By Michel WylieRichey May Technology Solutions

Anything on the world wide web is already being poked and prodded by attackers. Directory traversals, brute force attempts, and vulnerability scans are just some of the abuse your website is taking on a daily basis. This talk will discuss modern reconnaissance techniques and how to see attacks coming before they start.  With a little setup, reconnaissance, scanning, and enumeration are all detectable pre-exploitation phases. Wouldn’t it be nice to gain more insight into who’s interested in hacking you? Setting up a defensible counterhacking website provide early warning signs of an emanate attack giving your security team time to prepare. If you’re not already performing reverse-recon on your adversaries, you’ll want to add these techniques to your threat intel program.

About the Speaker

Prior to joining Richey May, Michael co-founded Corporate Blue, an Information Systems and Security consulting firm that served clients in their pursuit of mitigating cyber threats. In his role, Michael was responsible for delivering information assurance by means of vulnerability assessments, risk management, project management, secure network design, and training. Michael has developed and taught numerous courses for the Department of Defense, Moorpark College, California State Universities, and clients around the world.

Additionally, in his role as a Senior Project manager, Michael has fulfilled technology and security projects for large organizations such as Dollar Shave Club, U.S. Navy, JPMorgan Chase, Oxnard School District, and more. Michael is also a skilled security professional identifying zero-day vulnerabilities in Fortune 1000 programs such as Intuit tax preparation software (CVE-2018-11338).

12:00 PM - 01:00 PMLunch (Presentation) By Trevor FlynnBulletproof

Lunch Presentation

Security Operations in the Cloud, Trevor Flynn, VP Managed Services

Launch of the new Bulletproof 365E Managed Security Service Offering – Powered by Microsoft 365 and Azure Sentinel

About the Speaker

As VP of Managed Services, Trevor’s job one is maintaining Bulletproof’s position as a leading provider of world-class secure and productive business solutions. He has extensive experience working with the Microsoft solution stack on all levels; individually as well as leading teams through the implementation of complex and enterprise-level services leveraging technologies such as Exchange, Lync/Skype for Business, SharePoint, SQL Server, Windows Server, Windows Desktop and the System Center Suite.

Trevor was a chief architect in the development of Bulletproof 365 – a comprehensive SMB productivity and security solution that earned the company the 2019 Microsoft Canada Modern Workplace Innovation Partner of the Year IMPACT Award – and the recently launched, Bulletproof 365 Enterprise. He is a proponent of cloud technologies that both enable advanced security and assurance as well as delightful user experiences.

.

01:00 PM - 02:00 PMFrom The Trenches: Building and Maintaining a Modern SaaS Information Security Program By Darryl MacLeodSecuricy

For many SaaS-based companies (especially startups), information security isn’t a priority. Security teams and budgets can be small, if they even exist. Getting a product or service to market in the shortest amount of time is priority number one.

Building and implementing an effective information security program often delays the process, but it doesn’t have to.

Darryl has spent several years in the industry as both an advisor for, and implementer of information security programs. Having seen and experienced the challenges from both sides of the fence, he will provide actionable steps and advice for building or improving your information security program (including people, processes, infrastructure, and more).

Presentation outline:

  • What is a security program and why do you need it?\
  • A tale of two perspectives: the user and the assessor.
  • Employees: What should they do and how can they do it?
  • Processes and Infrastructure: What should be in place and why do you need it?
  • Users: Don’t forget about them!

I hope that attendees will realize that implementing an information security program doesn’t have to be a chore, as I will give them a unique perspective on what really needs to be done. I’ve been down both roads many times. While I focus on SaaS-based security, even well-established organizations can benefit from the advice I will present.

About the Speaker

Darryl is an Information Security Manager with Securicy and has been involved in the IT security industry for the last 18 years, most recently working as a QSA and risk assessment specialist. He has presented at the Atlantic HTCIA IT Security Conference, Halifax Area Security Klatch (HASK), Security B-Sides St. John’s, and the ISACA Atlantic Provinces Chapter Information Security & Risk Conference. He also sits on the Board of Directors for the Atlantic Security Conference (AtlSecCon) and is the former Lead Organizer for the Security B-Sides Cape Breton conference. He currently holds CISSP, CISA, and CCSK certifications.

02:00 PM - 02:30 PMAfternoon Bacon Break (Sponsored by Bulletproof)
02:30 PM - 03:30 PMData Governance for Risk Reduction & Value Creation By Neil CorreaMicroFocus

In this session, we will explore how organizations can adopt a single data governance framework to discover and protect sensitive data while mitigating cyber risks, reducing storage costs and addressing global privacy regulations.

About the Speaker

Neil Correa is a Security Strategist at Micro Focus, where he is responsible for driving strategic initiatives and providing thought leadership and insight into the ever changing threat landscape. Mr. Correa’s experience includes many areas of cyber security including: Security Operations, SIEM engineering, audit and compliance assessments/remediation.

03:30 PM - 04:30 PMPeople-Centric Cybersecurity Model By Chris RichmondProofpoint

As the landscape shifts from attacking the application to attacking the user, how do we shift the approach to a more people centric security model? Join us as we evaluate the current landscape dynamic and discuss what are some key components of how to evaluate and protect your people as the modernization of attacks continues.

About the Speaker

Chris Richmond is the Sales Engineering Leader for Canada and the Northeast US at Proofpoint, Inc. Chris’ focus is on the evolving cybersecurity landscape and how customers can leverage
their cybersecurity stack to improve protection, while at the same time ensuring the protection of critical data and the reduction of privacy risks for organizations. Chris previously led groups
focused on Advanced Malware, Forensics Architecture and Planning. Chris also helped bring to market some of the first cloud security solutions. Throughout his career in cybersecurity, his
interactions around informational risk and privacy have allowed him an in-depth understanding of the complexities of protecting data while ensuring privacy and maintaining risk.

05:30 PM - 07:30 PMSocial Event (Sponsored by NTT)
  • Track 1
  • Track 2
07:45 AMOnsite Registration
Anna Manley
08:30 AM - 09:30 AMOpening Keynote By Anna ManleyInternet and privacy lawyer

Anna Manley is an Internet and privacy lawyer based in Sydney, NS. She is the principal lawyer at Manley Law Inc. and founder and CEO of Advocate Cognitive Technologies Inc. Anna advises companies and individuals on all things law and tech related.

09:45 AM - 10:45 AMBear Trap: The Disruption of a GRU Close Access Cyber Operation By Ryan S.Undisclosed

This presentation describes an unclassified, yet little known, Russian GRU close access cyber operation against an international organization.  The presentation follows the actors as they arrive in theatre, conduct reconnaissance, prepare their attack, and most importantly, get busted.  The presentation also covers the motives of the foiled attack, the equipment used, and opsec mistakes made by the actors.

10:45 AM - 11:00 AMMorning Break /Vendor Booths / Networking
11:00 AM - 12:00 PM3rd Party Risk Primer, the A, B, Cs of 3rd party risk programs By Chris PattesonRSA

3rd party risk is not a new topic in the Security industry, but as organizations have shored up their defense’s our adversaries are looking for softer targets to exploit our networks and assets. We have witnessed more and more activity moving to the Cloud, and the increased dissolving of “the perimeter”. Our organizations have to
give additional attention to the security posture of partner’s and in some cases their “partner’s partner”. Chris Patteson from RSA’s Risk Transformation Office will cover the basics of 3rd party risk management and how to more towards maturing your program.

About the Speaker

Chris Patteson has more than two decades experience as a practitioner, leader, and innovator within Governance Risk and Compliance and Integrated Risk Management in the manufacturing, technology, and logistics sectors. Prior to joining RSA, he managed a team of data scientists and application developers to build new methods, models, and architectures for managing fraud and cargo security for a global logistics organization. Chris continues to drive innovation in advanced data modeling techniques and creating actionable intelligence for managing risk.

Chris is an Industrial Engineer and holds an MBA in Strategic Management. His current research lies in security architectures related to risk systems and risk data science. His work in the domain led to a patent for Methods, Systems, and Devices for Detecting and Isolating Device Posing Security Threats.

12:00 PM - 12:45 PMLunch (Presentation) By Pierre RoyESET

During this presentation, ESET will review the complete solution offerings, including EDR, mobile protection, backup, encryption, and a unique Rip & Replace service.  Attendees will be given the opportunity to see the ESET management console in action and will walk away with a better understanding as to why ESET is the only Challenger in the Gartner Magic Quadrant.

 

12:45 PM - 01:45 PMManipulating Mr. Black By Tien PhanGoSecure

Modern malware employs many different techniques and strategies to bypass antiviruses and remain stealthy. Techniques such as packing, process hollowing, payload encryption, and steganography are widely used by malware authors to slow malware researchers down (effectively against reverse engineering) to buy time and infect more victims. Malware manipulation can quickly reveal malicious behaviours of malware for mitigation and, in return, buy time for more in-depth analysis. Malware manipulation can sometimes be used to take-over the malware and prevent spreading or malicious use.

This talk will introduce the malware manipulation techniques, walk the audiences though the process of reverse engineering and manipulating the Mr. Black backdoor with a demo.

About the Speaker

Tien Phan holds a Master of Computer Science degree from Dalhousie University, Halifax. Tien is a TITAN Malware Researcher at GoSecure and he works on malware analysis and threat intelligence. His research interests include, but are not limited to, maldoc and malware analysis, threat intelligence, reverse engineering, vulnerability research and machine learning. He has published/presented his research at prestigious conferences, such as GoSec on malware manipulation, NOMS (Network Operations and Management Symposium) on botnet detection systems, ARES (International Conference on Availability, Reliability and Security) on the elliptic curve cryptosystem authentication scheme, HCI (Human-Computer Interaction) on three factor authentication scheme, and the International Journal of Network Management on machine learning models for compromised user analysis.

02:00 PM - 03:00 PMTBD By Kent StevensTrend Micro

About the Speaker

Kent Stevens is Security Solutions Engineer based out of Halifax, NS. He has a passion for cybersecurity through enablement, education and driving awareness. He has experience in a wide area of security and network related technologies across the Small, Medium and Large Enterprises. This experience has given him a broad technical background and understanding of the security requirements of businesses as well as an excellent understanding of the threat landscape. Before coming to Trend Micro, Kent spent time at a Trend Micro client and partner gaining valuable experience by providing security solutions to meet his and his client’s needs.

03:15 PM - 04:15 PMClosing Keynote By Tyler ParrottSenior Cyber Security Advisor, CSE
04:15 PM - 04:30 PMMaster of Ceremonies – Event Closure
07:45 AMOnsite Registration
Anna Manley
08:30 AM - 09:30 AMOpening Keynote By Anna ManleyInternet and privacy lawyer

Anna Manley is an Internet and privacy lawyer based in Sydney, NS. She is the principal lawyer at Manley Law Inc. and founder and CEO of Advocate Cognitive Technologies Inc. Anna advises companies and individuals on all things law and tech related.

09:45 AM - 10:45 AMZero Trust: Vendor Hype, or the Ultimate Solution to Cyber Risk By Jon GreenAruba

The phrase “Zero Trust” ranks as one of 2019’s most hyped-up security technologies.  Unfortunately, determining exactly what this technology is, and what it can do, remains extremely challenging for IT and security professionals due to market and message confusion, and this results in a misunderstood risk profile.  This session will present a look at what Zero Trust is, what it can do, what it cannot do, and how long it will take us to reach the promised land.

About the Speaker

Jon Green is VP and Chief Technologist for Security at Aruba, a Hewlett Packard Enterprise Company. He is responsible for providing technology guidance and leadership for all security solutions including authentication and network access control, UEBA, encryption, firewall, and VPN. He also manages Aruba’s Product Security Incident Response Team (PSIRT) and Aruba Threat Labs, an internal security research group. Jon joined Aruba in 2003 and helped it grow from a small startup to today’s position as a leading provider of network mobility solutions. Prior to Aruba, Jon held product management, marketing, and sales positions with Foundry Networks, Atrica, Nortel Networks, and Bay Networks. Jon holds a B.S. in Information Security from Western Governor’s University, a M.S. in Computer Science/Information Security from James Madison University, and CISSP, CISM, and CCSP certifications. When not playing with technology, he enjoys flying airplanes, learning to play the banjo, and cooking competition barbecue.

10:45 AM - 11:00 AMMorning Break /Vendor Booths / Networking
11:00 AM - 12:00 PMContinuous Cloud Security Monitoring By Michel WylieRichey May Technology Solutions

When I first started working with AWS, there were a handful of core services. Since then, AWS has been announcing hundreds of new services per year in dozens of regions around the world. With a rapidly changing landscape, relevant documentation, tutorials, and how-to’s can be difficult to come by. AWS is its own beast and traditional Incident Response and Forensics techniques don’t work. Try to perform full packet inspection between EC2 instances in the same VPC or use a write blocker while analyzing an EBS. Better yet, try to build a timeline with default log settings. Organizations are desperately looking for tools available to them to detect and respond to threats. This talk will provide a much needed summary of Continuous Cloud Security Monitoring (CCSM) strategies, techniques, and best practices so you don’t have to spend the next 12 months reading AWS white papers. Takeaways from this presentation will be methods to immediately apply logging, monitoring, alerting, and Honey[Things] that can be applied in any AWS environment.

About the Speaker

Prior to joining Richey May, Michael co-founded Corporate Blue, an Information Systems and Security consulting firm that served clients in their pursuit of mitigating cyber threats. In his role, Michael was responsible for delivering information assurance by means of vulnerability assessments, risk management, project management, secure network design, and training. Michael has developed and taught numerous courses for the Department of Defense, Moorpark College, California State Universities, and clients around the world.

Additionally, in his role as a Senior Project manager, Michael has fulfilled technology and security projects for large organizations such as Dollar Shave Club, U.S. Navy, JPMorgan Chase, Oxnard School District, and more. Michael is also a skilled security professional identifying zero-day vulnerabilities in Fortune 1000 programs such as Intuit tax preparation software (CVE-2018-11338).

12:00 PM - 12:45 PMLunch (Presentation) By Pierre RoyESET

During this presentation, ESET will review the complete solution offerings, including EDR, mobile protection, backup, encryption, and a unique Rip & Replace service.  Attendees will be given the opportunity to see the ESET management console in action and will walk away with a better understanding as to why ESET is the only Challenger in the Gartner Magic Quadrant.

 

12:45 PM - 01:45 PMThe Wisdom of the Crowd: Security Awareness lessons from tens of thousands of user By David ShipleyBeauceron

One of the best ways to learn and improve is to listen.

When it comes to cybersecurity awareness, many organizations don’t have the people, resources or time to engage their users in cybersecurity and to understand how the perceive security issues and how much they know about how to defend themselves.

During this presentation, David Shipley will demonstrate the power of learning from your team by sharing aggregate insights gained from tens of thousands of users from more than 100 different companies and dozens of different verticals. He’ll demonstrate a methodology security practitioners can apply to listen and learn from their own employees. Most importantly, he’ll discuss how to turn insights into metrics that you can action, tangibly reducing your organization’s cyber risk.

Shipley will also share insights from hundreds of thousands of phishing exercises, tackling questions such as does branded phishing make a difference? and what emotions are most effective to tap into with a phishing campaign.

About the Speaker

David is a recognized Canadian leader in cybersecurity, frequently appearing in local, regional and national media and speaking at public and private events across North America. He helped build and refine the security awareness and incident response practice at the University of New Brunswick. Beauceron was born from that work. David is a Certified Information Security Manager (CISM) and holds a Bachelor of Arts in Information and Communications Studies as well as a Master of Business Administration from the University of New Brunswick.

02:00 PM - 03:00 PMBoard Cyber Business Risk Reporting: A Quantitative Approach By Robert FritzEmera

Boards have a duty to understand the business risks that face their companies and to ensure that those risks are well managed. As cyber security risks become more prominent, boards are increasingly requesting more detail. One challenge for management teams in responding to those requests, is ensuring board products are objective, timely, and accurate. This is more challenging with complex companies or holdings, especially with a topic as complex as cyber security.

One way to meet the need is with a risk reporting framework and dashboard driven with operational security metrics. These are combined with external threat and risk factors to produce business-centric risk data. By using a model that is objective, there is less opportunity for variance amongst reporting groups, and cleaner traceability from any board-level flags, to underlying root cause.

Finally, we start with a modest initial metrics set, and then use a formalized system of priorities and criteria for adopting new metrics, and for adjusting the factors that measure external threat. This ensures the program grows in a way that keeps the board product accurate and provides continued incentive to reporting groups to focus on the broader program, beyond what is currently reported.

About the Speaker

Robert Fritz, Director of Cyber Security for Emera, Inc., has been implementing and managing security his entire career. Robert started as a US Air Force lieutenant at Langley AFB and later moved to the Pentagon in Washington DC, where he built and managed classified networks. Upon leaving the military and joining Hewlett Packard, he co-authored HP’s Commercial Application Threat Analysis (CATA) methodology, building an internal consulting practice at HP. He served as editor for the Center for Internet Security’s HP-UX Benchmark, and Android Benchmarks. Moving to the finance sector, Robert joined Morgan Stanley, as Morgan Stanley Canada’s security architecture lead, before being asked to serve as the CISO for Canada. While there, he established industry leading security-controls and practices which supported the firm’s aggressive use of cloud technology and social media. At Emera, he published a security policy and set of security standards for all Emera’s affiliate companies. He then instituted a cross-affiliate risk metrics program, which provides the Emera and affiliate boards an objective view of their cyber security risk. Robert is a frequent speaker and has recently spoken at several security forums including those offered by the Canadian Electricity Association, NIST, OWASP, and E-ISAC, and regularly contributes content to the CISSP and CISSLP certification bodies of knowledge, offered by ISC2.

03:15 PM - 04:15 PMClosing Keynote By Tyler ParrottSenior Cyber Security Advisor, CSE
04:15 PM - 04:30 PMMaster of Ceremonies – Event Closure