Sign up or log in to bookmark your favorites and sync them to your phone or calendar.
Registration 08:00 - 08:15
Networking Break 10:45 - 11:00
Lunch 11:45 - 13:00
Networking Break 13:45 - 14:00
Networking Break 14:45 - 15:00
Networking Break 15:45 - 16:00
Social Networking Event 17:00 - 19:00
Speakers Dinner 19:00 - 22:00
Opening Keynote - Day 1 - Cliff Stoll 09:30 - 10:45
Build it Once, Build it Right: Architecting for... 11:00 - 11:45
Tracing Ransomware Payments in the Bitcoin Ecosy... 13:00 - 13:45
What Are We Doing Here? Rethinking Security 14:00 - 14:45
MINimum Failure: Breaking a Bitcoin Wallet with... 15:00 - 15:45
Closing Keynote - Day 1 - Cory Doctorow 16:00 - 17:00
People-Centric Security: 2019 Cyber Threat Lands... 11:00 - 11:45
Avoiding Common Mistakes in Breach Detection and... 13:00 - 13:45
Supply Chain Risk Management and Early Stage Sta... 14:00 - 14:45
The New Privacy and Cybersecurity Legal Risk Lan... 15:00 - 15:45
Don't let backup data, administrators or storage... 11:00 - 11:45
Improving Cloud Security through Automation 13:00 - 13:45
The Modern State of Insecurity 14:00 - 14:45
Malicious PowerShell and WMI 15:00 - 15:45
Avoiding Defeat - Building a Playbook to Survive... 11:00 - 11:45
Leveraging AI and Data Analytics to win the Cybe... 13:00 - 13:45
To become a Cyber Security Leader, Canada must i... 14:00 - 14:45
One Man Army - Playbook on how to be the first S... 15:00 - 15:45
The Skills Gap: Thoughts on Hiring and Retention 11:00 - 11:45
Securing credentials for in-depth scans and cond... 13:00 - 13:45
AP-ocalypse: Release the KRACKen 14:00 - 14:45
Network Visibility and Anomaly Detection in Zero... 15:00 - 15:45
Defending Democracy: Confronting Cyber-Threats t... 11:00 - 11:45
Cyber Security Research at Dalhousie: Bots, Comp... 13:00 - 13:45
Registration 08:00 - 09:15
Networking Break 10:00 - 10:15
Networking Break 11:00 - 11:15
Lunch 12:00 - 13:00
Opening Keynote - Day 2 - Jean-Michel (JM) Blais 09:15 - 10:00
Curiosity Killed the Cat: Legal Implications of... 10:15 - 11:00
Zero Trust and the Flaming Sword of Justice 11:15 - 12:00
Lessons learned from over a decade of bug huntin... 13:00 - 13:45
Don't Bring Me Down: Weaponized Botnets 14:00 - 14:45
Schrodinger's Pentest: Scoping Entanglement 15:00 - 15:45
Closing Keynote - Day 2 - Tanya Janca 16:00 - 17:00
Your People Your Digital 10:15 - 11:00
Data Access Rights Exploits under New Privacy La... 11:15 - 12:00
Mirror Mirror on the Wall, Is Facial Recognition... 13:00 - 13:45
What Did You Do So Wrong (you think you need a f... 14:00 - 14:45
Panel Discussion with InfoSec RockStars 15:00 - 15:45
Insight into the attack techniques used in recen... 10:15 - 11:00
Advanced Persistent Protection 11:15 - 12:00
The Art of Cybersecurity: Protecting Physical, V... 13:00 - 13:45
Context Is King: Creating Security Awareness Con... 14:00 - 14:45
Attacks against Lesser Known Nations – Tracking... 15:00 - 15:45
The Payments Ecosystem: Security Challenges in t... 10:15 - 11:00
Automation Without Exposure - Securing Your DevO... 11:15 - 12:00
I've Looked At Cloud From Both Sides Now 13:00 - 13:45
4 Steps to a Secure Data Center 14:00 - 14:45
Monitoring our Minimum Viable Security on Window... 15:00 - 15:45
Threat Decluttering: Baselining to Spark Joy in... 10:15 - 11:00
Deserialization: RCE for the modern web applicat... 11:15 - 12:00
Pentesting War Stories 13:00 - 13:45
Intro to Software Defined Radio (SDR) and why yo... 14:00 - 14:45
DNS – The Hidden Threat Vector 15:00 - 15:45