Contact     REGISTER NOW    Illuminating the Black Art of Security - October 20-22, 2014-Toronto   
Legend: Media File Video Presentation
Presentation File PDF of Presentation
Tools Tools

SecTor 2013 - Presentations 

We will be posting the presentations and videos for SecTor 2013 as they are processed and become available. Feel free to review the presentations from our previous years and see what makes SecTor a must attend event for every IT Professional.

 Past Presentations: SecTor 2012 / SecTor 2011 / SecTor 2010 / SecTor 2009 / SecTor 2008 / SecTor 2007

 

Media File
Presentation File
Tools
"Welcome to SecTor 2013" - Brian Bourne Presentation File
"How the West was Pwned" - G. Mark Hardy
Media File
Presentation File
"Why We Need DevOps Now: A Fourteen Year Study Of High Performing IT Organizations" - Gene Kim Media File
"Crossing the line; career building in the IT security industry" - Keynote Panel Media File Presentation File
"Tech it out " - Marc Saltzman Media File

IT Security Experts Canada Toronto SecTor - Technical Track

Media File
Presentation File
Tools
"BIOS Chronomancy" - John Butterworth Media File Presentation File
"Big Data Security, Securing the insecurable" - Kevvie Fowler Media File Presentation File
"Malware Automation" - Christopher Elisan Media File Presentation File
"MILLION BROWSER BOTNET" - Matt Johansen Media File
"RATastrophe: Monitoring a Malware Menagerie" - Seth Hardy and Katie Kleemola Media File Presentation File Tools
"Software Refined Networking - The Path To Hell Is Paved With Good Abstraction" - Christofer Hoff Media File Presentation File
"Running at 99%, mitigating a layer 7 DoS" - Ryan Huber Media File Presentation File Tools
"Popping the Penguin: An Introduction to the Principles of Linux Persistence" - Mark Kikta Media File Presentation File
"Exploiting the Zero'th Hour: Developing your Advanced Persistent Threat to Pwn the Network" - Solomon Sonya and Nick Kulesza Media File Presentation File
"Swiping Cards At The Source: POS & Cash Machine Security" - Ryan Linn and John Hoopes Media File Presentation File
"Cryptographically Isolated Virtualized Networks – A Community of Interest Approach" - Robert Johnson Media File Presentation File
".NET Reversing: The Framework, The Myth, The Legend" - Kelly Lum Media File Presentation File
"CeilingCat IS Watching You" - Shane MacDougall Media File Presentation File
"Build Your Own Android Spy-Phone" - Kevin McNamee Media File Presentation File
"Weaponized Security" - Kellman Meghu Media File
"The World's Deadliest Malware" - Christopher Pogue Media File Presentation File
"Your own pentesting army complete with air support" - Philip Polstra Media File Presentation File
"BREACH: SSL, Gone in 30 seconds" - Angelo Prado and Yoel Gluck Media File Presentation File
"Pivoting in Amazon clouds" - Andrés Riancho Media File Presentation File
"Fiber Channel – Your OTHER Data Center Network" - Rob VandenBrink Media File Presentation File
"Needle in a Haystack - Harnessing Big Data for Security" - Dana Wolf Media File
IT Security Experts Canada Toronto SecTor - Management Track
Media File
Presentation File
Tools
"Return of the Half Schwartz FAIL Panel w/Tales from beyond the echo chamber" - James Arlen, Dave Lewis, Mike Rothman and Ben Sapiro Media File
"Building a Security Operations Center - Lessons Learned" - Yves Beretta Media File Presentation File
"Reacting to Cyber Crime: Preserving Crucial Evidence for Law Enforcement" - David Connors and Stéphane Turgeon Media File Presentation File
"SDN : Radically New Network Architecture, Same Old Cyber Security Protection " - Llewellyn Derry Media File Presentation File
"Data in the Cloud. Who owns it and how can you get it back?" - Dave Millier Media File Presentation File
"Microsoft Security Intelligence Report, Canadian Edition" - Tim Rains Media File Presentation File
"FUFW: 5 Steps to Re-architecting Your Perimeter" - Mike Rothman Media File Presentation File
IT Security Experts Canada Toronto SecTor - Management Track Media File Presentation File Tools
"CRYPTOGEDDON - Sector 2013 Edition: Online Cyber Security War Game " - Todd Dow Media File Presentation File Tools
"Watching the watchers: hacking wireless IP security cameras" - Artem Harutyunyan and Sergey Shekyan Media File Presentation File
"Threat Modeling 101" - Leigh Honeywell
"Appsec Tl;dr" - Gillis Jones Media File Presentation File
"Frayed Edges; Monitoring a perimeter that no longer exists" - Mark Nunnikhoven Presentation File
"Vulnerability analysis of 2013 SCADA issues" - Amol Sarwate Media File Presentation File
"How they get in and how they get caught" - Schuyler Towne Media File
IT Security Experts Canada Toronto SecTor - Sponsor Talk Track
Media File
Presentation File
Tools
"Beyond the Smokers Entrance – Physical Security Assessments in Hardened Environments" - Mark Baseggio and Jamie Gamble Media File
"Analyzing Exploit Packs: Tips & Tricks" - Mohamad AL-Bustami Media File
"It Takes a Village: Reducing the Threat Gap by Allying with Your Competition" - Michael A Barkett Media File Presentation File
"The Threat Landscape" - Ross Barrett and Ryan Poppa Media File
"Stopping Cross Contamination with Network Access Control…"The ULTIMATE PATCH" " - Toni Buhrke Media File
"Enterprise Forensics = new category that focuses on user activity and what drives the business (analytics + behavior) " - Gary Freeman Media File Presentation File
"How to Connect Security to the Business" - Jeanne Glass Media File
"Information & Risk Mitigation" - Neils Johnson Media File
"Trust No One: The New Security Model for Web APIs" - Greg Kliewer Media File Presentation File
"The US Department of Homeland Security's Software Assurance Enumerations" - David Maxwell Media File
"Enabling Access Assurance and Identity Intelligence for a multi-perimeter world " - Sridhar Muppidi Media File
"Vulnerability Management Programs and Lessons Learned from the Field" - Bill Olson Media File Presentation File
"Securing Enterprise Mobility beyond MDM" - Danny Pehar and Ali Afshari Media File
"The Bad Boys of Cybercrime" - Christopher Pogue Media File Presentation File
"Identity & Access Governance: Key to Security or Completely Useless?" - Jackson Shaw Media File Presentation File
"Modern Malware and APTs – What Current Controls Can't See" - Ajay Sood Media File
"Ending the information security arms race with end-to-end encryption" - Jill Walsh Media File Presentation File
"Fortifying Canada's Cyberspace: Together" - John Weigelt Media File Presentation File
"Today's Cyber Threat Landscape – Prevention is no cure" - Lucas Zaichkowsky Media File