SUNDAY SCHEDULE

Time: 9:00am | Sunday Workshop
Amiran Alavidze & Guru Shiva
Hack the Gibson with Metasploit

Time: 9:00am | Sunday Workshop
Brad Duncan
Malware Traffic Analysis Workshop

Time: 9:00am | Sunday Workshop
Jeevan Singh
Hunting for Web Application Vulnerabilities

Time: 1:05pm | Sunday Workshop
Tanya Janca
Azure Cloud Security Workshop

Time: 3:10pm | Sunday Workshop
Ken Westin
Insider Threat Hands-On Investigation Workshop


MONDAY SCHEDULE

ROOM 1400-1430 | TERABYTE

Time: 9:15am | Day: 1 | KEYNOTE
ELITES (first come, first served)

Rob Fry
Security Operations as a Video Game

Time: 10:15am | Day: 1
Shelly Giesbrecht
Sandwiches or Pizza? Incident Response Isn’t Just Technical…

Time: 11:15am | Day: 1
Chester Wisniewski
A Safer Way to Pay: Comparing the Security and Integrity of 21st Century Payment Systems

Time: 12:10pm | Day: 1
Danielle Cheng, Duha Younes, Heidi Martin, and Jake King
Male Allies: To be, or not to be: that is the question!

Time: 1:15pm | Day: 1
Carl Willis-Ford
The 3rd Face of Insider Threat

Time: 2:15pm | Day: 1
Teri Radichel
Are You Ready For a Cloud Pen Test?

Time: 3:15pm | Day: 1
Benjamin Wiley
FIN7: A Case Study on Shim Database Persistence

Time: 4:15pm | Day: 1
Hudson Bush
Missing the Forest for the Trees: When Server Hardening Isn’t Enough

ROOM 1900 | GIGABYTE

Time: 9:15am | Day: 1 |
KEYNOTE STREAMING

Rob Fry
Security Operations as a Video Game

Time: 10:15am | Day: 1
Greg Foss
Breaking Blockchain

Time: 11:15am | Day: 1
Geoff McDonald
Windows 10 AMSI Script Behavior Instrumentation with Machine Learning to Block Malicious Attacks

Time: 1:15pm | Day: 1
Matt Carolan
How to Secure Serverless

Time: 2:15pm | Day: 1
Tim Liu & Kevin Sahota
Building an Enterprise Threat Hunting Program

Time: 3:15pm | Day: 1
Pongolyn
Swarm Intelligence and Human Systems

Time: 4:15pm | Day: 1
Maleena Singh
Cyber Policing Landscape in BC

ROOM 1600 | MEGABYTE

Time: 9:15am | Day: 1 |
KEYNOTE STREAMING

Rob Fry
Security Operations as a Video Game

Time: 10:15am | Day: 1
Wesley Wineberg
Mobile Application Hacking

Time: 11:15am | Day: 1
Brodie McRae
Cryptography 101

Time: 1:15pm | Day: 1
Kevin2600
Hacking Hardware Through Side-Channel

Time: 2:15pm | Day: 1
Scott Baker
Information Security in the Health/Academic Research Context

Time: 3:15pm | Day: 1
George Pajari
How to Survive a SOC 2 Audit (and Why You Ought to Try)

Time: 4:15pm | Day: 1
Boris Reitman
Website Switcheroo: Links opening in tabs are dangerous

ROOM 1415 | INDUSTRY

Time: 10:15am | Day: 1
Matt Rose
How to Put the Sec in DevOps (Checkmarx Sponsored Talk)

Time: 11:15am | Day: 1
Chris Richmond
2019 Cyber Threat Landscape & People-Centric Security (Proofpoint Sponsored Talk)

Time: 1:15pm | Day: 1
Dhruv Majumdar
Intelligent Threat Hunting (Elevated Prompt Sponsored Talk)

Time: 2:15pm | Day: 1
Aamir Lakhani
AI vs Malware - Machine Learning Cage Match (Fortinet Sponsored Talk)

Time: 3:15pm | Day: 1
Speaker TBD
CMD Sponsored TalK

Time: 4:15pm | Day: 1
Peter Scheffler
Using Threat Research to take back the Internet (Scalar/F5 Sponsored Talk)


TUESDAY SCHEDULE

ROOM 1400-1430 | TERABYTE

Time: 9:15am | Day: 2 | KEYNOTE
ELITES (first come, first served)

Tanya Janca
Security is Everybody’s Job…Literally

Time: 10:15am | Day: 2
Shira Shamban
Your internet is down? It’s cyber warfare, stupid

Time: 11:15am | Day: 2
Isaiah Sarju
How Online Dating Made Me Better At Threat Modeling

Time: 1:15pm | Day: 2
David Balcar
Security is a Mission Not an Intermission

Time: 2:15pm | Day: 2
Josh Sokol
Architecting for Security in the Cloud

Time: 3:15pm | Day: 2
Jugal
Protecting the Protector - Hardening Machine Learning Defenses Against Adversarial Attacks

Time: 4:15pm | Day: 2
Masarah Paquet-Clouston
Tracing Ransomware Payments in the Bitcoin Ecosystem

ROOM 1600 | MEGABYTE

Time: 9:15am | Day: 2 |
KEYNOTE STREAMING

Tanya Janca
Security is Everybody’s Job…Literally

Time: 10:15am | Day: 2
Joe Kirwin
The Emperor’s Old Clothes: Visualizing ssdeep

Time: 10:45am | Day: 2
Deepali Arora
High-value Approaches to ML in Computer Security

Time: 11:15am | Day: 2
Geoff McDonald
Tangling with Malware Adversaries: A Few Short War Stories

Time: 11:45am | Day: 2
Golnaz Elahi
The Journey from Flat to Bumpy: Network Segmentation While Business Applications Live Their Normal Life

Time: 1:15pm | Day: 2
Julius Musseau
To Patch Or Not To Patch

Time: 2:10pm | Day: 2
Julius Musseau
Startup Demo - Mergebase - Securing software supply chains

Time: 2:45pm | Day: 2
Oleksiy Gayda
Threat Hunting OpSec

Time: 3:15pm | Day: 2
Tierney Wisniewski & Chester Wisniewski
An Apple a Day Keeps the Cybercriminals Away? Taking Lessons from Medicine to Motivate Good Cyberhealth Habits

Time: 4:15pm | Day: 2
Michael Thelander
SSH Keys: Security Asset or Liability?

ROOM 1415 | INDUSTRY

Time: 10:15am | Day: 2
Dan Ward
The importance of SOC automation tools (Palo Alto Sponsored Talk)

Time: 10:45am | Day: 2
Ian Redden
Threat Hunting Demystified
(RSA Sponsored Talk)

Time: 11:15am | Day: 2
Matteo Rebeschini
End-to-End Security Analytics with the Elastic Stack (Elastic Sponsored Talk)

Time: 11:45am | Day: 2
Stan Engelbrecht
Improving the Speed and Quality of Your Investigations Through Security Orchestration (D3 Security Sponsored Talk)

Time: 1:15pm | Day: 2
Dale Hobbs
Windows User Enumeration, Living off the land (SANS Sponsored Talk)

Time: 1:45pm | Day: 2
Jamie McMurray
OSInt, shoe laces and bubble gum: How to use OSInt with limited time and budget to better understand how attackers see your organization (Kobalt Sponsored Talk)

Time: 2:15pm | Day: 2
Rob Williamson
Why are my users visiting a Russian domain served from Nigeria...OR...Leveraging DNS as a layer of defense and a lens on the threat landscape. (CIRA Sponsored Talk)

Time: 2:45pm | Day: 2
Matt Eidelberg
Vibing Your Way Through Enterprise: How Attackers are Becoming More Sneaky (Optiv Sponsored Talk)

Time: 3:15pm | Day: 2
Dan Wolff
When you are the target of attacks, what’s your response? (BitDefender Sponsored Talk)

Time: 3:45pm | Day: 2
Speaker TBD
One Login Sponsored Talk

ROOM 1500 | KILOBYTE

Time: 10:15am - 12:15pm | Day 2
George Pajari
Security Architecture 101

Time: 12:30pm - 4:30pm| Day: 2
Kenneth G. Hartman
Amazon Linux EC2 Digital Forensics Workshop