Please see below the presentation slides for each of the sessions.
Conference Day 1 | |||
---|---|---|---|
8:45 – 9:30 | Keynote #1 – Patrick Gray, Former FBI Supervisory Special Agent | ||
9:45 – 10:45 | RSA Hunting Methodology: A Key to the Labyrinth of Network Forensics | Digital Defence Making Incident Response Effective Again | NMP Are you hackable or uncrackable? |
11:00 – 12:00 | iovation Inc. Will Your FitBit Replace Your Password? How the ‘IDentity of Things’ Will Usher in the Next Wave of Multifactor Authentication | KPMG Enterprise Risk Management for Cloud Computing | NB Power Cybersecurity Risk: from Server Room to Boardroom |
12:30 – 13:15 | Keynote #2 – Melissa Sariffodeen - Ladies Learning Code | ||
13:45 – 14:45 | McAfee What is Machine Learning? | Province of Nova Scotia Expanding Advisory Services in your Internal Audit Practice | Beauceron Security Patching your people: building a technology to support going beyond user awareness and towards accountability |
15:15 - 16:15 | Duo Security Realizing Software Security Maturity: The Growing Pains & Gains | Mariner Security Solutions IoT - Standards, Risks and Why we Need to Address Both | Securicy Hacking InfoSec Policies: Cutting Through The Jargon |
16:30 - 17:30 | Rogers Trends in Breach incident management | Bulletproof Importance of a Cohesive Information Security Program (C-ISP) | Watchguard What is made of 8 billion parts and vulnerable to 2000’s era Wi-Fi attacks? Every Wi-Fi radio on the planet |
Conference Day 2 | |||
---|---|---|---|
8:45 – 9:30 | Keynote #1 – Sean McGurk, ICS-ISAC | ||
9:45 – 10:45 | Symantec Turning a Trillion Rows of Security Threat Data into Gold | Province of New Brunswick A Plan to Implement Enterprise Risk Management | KPMG Critical Security Controls: Planning, Implementing, and Auditing |
11:15 – 12:15 | Information in Bloom Management Services Managing the Chaos: Disaster Recovery for Your Data | PwC Canada Data Assurance and Analytics within Risk Assurance | Forcepoint Cloudy with a Chance of Visibility, Accountability and Security |
12:45 – 13:30 | Keynote #2 – Frank Schettini, ISACA Chief Innovation Officer | ||
14:00 – 15:00 | Dalhousie University From Visualization to Visual Analytics: Making Information More Accessible | Nehemiah Security You can measure anything...but what if it’s not the RIGHT thing? | Watchguard The Power of Network AND Endpoint Threat Correlation |
15:30 – 16:30 | Darktrace The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense | GoSecure On the Prowl: Practical Threat Hunting | Carbon Black Does Your Security Posture Stand Up to Tomorrow’s New Threat? |