Please see below the presentation slides for each of the sessions.

Conference Day 1
8:45 – 9:30Keynote #1 – Patrick Gray, Former FBI Supervisory Special Agent
9:45 – 10:45
Matt Tharp

Hunting Methodology: A Key to the Labyrinth of Network Forensics
Robert Beggs
Digital Defence

Making Incident Response Effective Again
Eugene Ng

Are you hackable or uncrackable?
11:00 – 12:00
Dwayne Melancon
iovation Inc.

Will Your FitBit Replace Your Password? How the ‘IDentity of Things’ Will Usher in the Next Wave of Multifactor Authentication
Darren Jones

Enterprise Risk Management for Cloud Computing
Jamie Rees
NB Power

Cybersecurity Risk: from Server Room to Boardroom
12:30 – 13:15Keynote #2 – Melissa Sariffodeen - Ladies Learning Code
13:45 – 14:45
Sylvain Dumas

What is Machine Learning?
Amy Yung
Province of Nova Scotia

Expanding Advisory Services in your Internal Audit Practice
David Shipley
Beauceron Security

Patching your people: building a technology to support going beyond user awareness and towards accountability
15:15 - 16:15
Mark Stanislav
Duo Security

Realizing Software Security Maturity: The Growing Pains & Gains
Anthony English
Mariner Security Solutions

IoT - Standards, Risks and Why we Need to Address Both
Darryl MacLeod

Hacking InfoSec Policies: Cutting Through The Jargon
16:30 - 17:30
Greg Murray

Trends in Breach incident management
Peter Macpherson

Importance of a Cohesive Information Security Program (C-ISP)
Ryan J. Orsi

What is made of 8 billion parts and vulnerable to 2000’s era Wi-Fi attacks? Every Wi-Fi radio on the planet

Conference Day 2
8:45 – 9:30Keynote #1 – Sean McGurk, ICS-ISAC
9:45 – 10:45
Ajay Sood

Turning a Trillion Rows of Security Threat Data into Gold
Rick Ouellette
Province of New Brunswick

A Plan to Implement Enterprise Risk Management
Peter Morin

Critical Security Controls: Planning, Implementing, and Auditing
11:15 – 12:15
Victoria McIntosh
Information in Bloom Management Services

Managing the Chaos: Disaster Recovery for Your Data
Courtney Brown
PwC Canada

Data Assurance and Analytics within Risk Assurance
Paul DaSilva

Cloudy with a Chance of Visibility, Accountability and Security
12:45 – 13:30Keynote #2 – Frank Schettini, ISACA Chief Innovation Officer
14:00 – 15:00
Fernando Vieira Paulovich
Dalhousie University

From Visualization to Visual Analytics: Making Information More Accessible
Gerald Caponera
Nehemiah Security

You can measure anything...but what if it’s not the RIGHT thing?
Danny Banks

The Power of Network AND Endpoint Threat Correlation
15:30 – 16:30
Nabil Zoldjalali

The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense
Andrew Kozma

On the Prowl: Practical Threat Hunting

Chris Strand
Carbon Black

Does Your Security Posture Stand Up to Tomorrow’s New Threat?