Loading…
arrow_back View All Dates
Friday, April 11
 

8:00am ADT

Registration & Continental Breakfast
Friday April 11, 2025 8:00am - 9:00am ADT
Friday April 11, 2025 8:00am - 9:00am ADT
Ballroom Level: Salon

8:00am ADT

Sponsor Trade Show & Platinum Suites Open
Friday April 11, 2025 8:00am - 9:00am ADT
Friday April 11, 2025 8:00am - 9:00am ADT
Convention Hall Level

8:45am ADT

Opening Remarks
Friday April 11, 2025 8:45am - 9:00am ADT
Friday April 11, 2025 8:45am - 9:00am ADT
Ballroom

9:00am ADT

Transition To Tracks
Friday April 11, 2025 9:00am - 9:15am ADT
Friday April 11, 2025 9:00am - 9:15am ADT
Ballroom & Argyle Suites: A1, A2, A3, 201, 202

9:15am ADT

Cracking the Vault: Defending Against Modern Active Directory Exploits
Friday April 11, 2025 9:15am - 10:00am ADT
Active Directory (AD) is a cornerstone of enterprise IT environments, providing critical services such as authentication, authorization, and identity management. However, its pervasive use also makes it a prime target for cyber attackers. This paper explores the evolving landscape of Active Directory cyber attacks, focusing on the methods and techniques used by threat actors to compromise AD environments. We will analyze case studies of recent high-profile breaches, highlighting the common vulnerabilities exploited and the tactics employed to escalate privileges, maintain persistence, and exfiltrate sensitive data. The discussion will include an examination of the tools and strategies used in these attacks, such as pass-the-hash, golden and silve ticket, kerberosting, DCSync, Golden SAML and Azure AD Token Theft attacks. We will also cover the latest defensive measures and best practices for securing Active Directory and Azure Active Director, including monitoring, detection, and incident response strategies. The aim is to provide IT professionals and cybersecurity practitioners with actionable insights to fortify their AD environments against sophisticated threats and ensure the integrity and security of their networks.



Speakers
avatar for Peter Morin

Peter Morin

Director, OT Cybersecurity Consulting, PricewaterhouseCoopers LLP.
Peter Morin is a Senior Consultant specializing in OT/IoT cybersecurity, bringing over 25 years of industry experience to the table. With a robust background information technology and cybersecurity, Peter has become a trusted advisor to organizations navigating the complex and rapidly... Read More →
Friday April 11, 2025 9:15am - 10:00am ADT
Ballroom

9:15am ADT

Optimal Offensive Security Programs
Friday April 11, 2025 9:15am - 10:00am ADT
Offensive security plays a crucial role in cybersecurity by identifying and exploiting system vulnerabilities. However, current practices often contain gaps that diminish the effectiveness of these assessments. This presentation will examine these gaps and provide strategies to optimize offensive security efforts.



Speakers
avatar for Phillip Wylie

Phillip Wylie

xIoT Security Evangelist, Phosphorus
Phillip Wylie is a cybersecurity professional with over 27 years of industry experience in IT and cybersecurity. Phillip has a diverse range of experience in multiple cybersecurity disciplines, including network security, application security, and pentesting. As an offensive security... Read More →
Friday April 11, 2025 9:15am - 10:00am ADT
Argyle Suite 1

9:15am ADT

Reframing Cyber Defence: Are We Seeing the Full Picture?
Friday April 11, 2025 9:15am - 10:00am ADT
As cyber threats evolve and regulatory landscapes tighten (GDPR, NIS2, DORA, CMMC, CPCSC, and more), organizations are challenged to move beyond traditional security perimeters. While the industry has mastered visibility into infrastructure, applications, and even OT environments, have we truly unlocked the full potential of cyber defence? More specifically, how can we align security strategies with business processes, data flows, and evolving operational resilience requirements?

This session explores the art of the possible in cyber defence—rethinking our approach to visibility, control, and governance in the context of digital transformation. Can we move beyond system, network, and application logs to gain deeper insights into how data is classified, accessed, and protected across an enterprise? How do we operationalize consent management, data governance, and security controls in a way that enhances—not hinders—business agility?

Key Takeaways:
  • Reframing cyber defence to address regulatory, privacy, and operational resilience challenges
  • The role of data classification, consent management, and governance in a modern security strategy
  • How to move from reactive security controls to proactive, enterprise-wide security integration
  • Practical considerations for embedding security into digital transformation efforts
Speakers
JP

Jarett Parent

CEO and National Practice Lead, Canada, C3SA Cyber Security Audit
Jarett is CEO and Lead of C3SA Cyber Security Audit Corp. as well as Board Chair and Lead of Security BSides Ottawa – Canada's largest grassroots cybersecurity unconference. He brings more than 20 years of experience leading teams that deliver data privacy, cyber security, and resilience... Read More →
Friday April 11, 2025 9:15am - 10:00am ADT
Argyle Suite 2

9:15am ADT

Bringing Agility to Policy Management
Friday April 11, 2025 9:15am - 10:00am ADT
In an era where technology permeates every facet of organizational operations, the development and implementation of comprehensive policy is paramount. However, maintaining these policies becomes problematic when technology (especially Cyber Security) constantly changes, organization’s need a better approach. This session outlines the methodology and strategic approach to creating and implementing the Technology Use Manual (TUM), which encapsulates all policies, practices, and standards required for compliance with the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF).
Speakers
avatar for Kirk MacDonald

Kirk MacDonald

Cyber Security Project Manager, Halifax Water
Kirk MacDonald is a Senior Project Manager with over 20 years of experience in the IT industry.  His career has focused on delivering IT enabled change within organizations, both public and private. He is a strong supporter of the agile project management paradigm and has presented... Read More →
avatar for Stephanie LeBlanc

Stephanie LeBlanc

Sr. Manager Information & Technology Services, Halifax Water
Stephanie LeBlanc is the Senior Manager of Information & Technology Services at Halifax Water. With a robust portfolio, Stephanie oversees strategy and delivery through a project management office for an array of critical domains such as Cybersecurity, Architecture, Infrastructure... Read More →
Friday April 11, 2025 9:15am - 10:00am ADT
Argyle Suite 3

9:15am ADT

Agile Threat Modeling: a case study for machine learning pipelines
Friday April 11, 2025 9:15am - 10:00am ADT
201
Threat modeling is an essential part of the system development lifecycle and should be continuously updated whenever a system undergoes changes. Traditionally, security architects create an initial threat model and review it periodically, but this approach can leave critical risks undetected between review cycles. Agile threat modeling integrates developers into the process, allowing security concerns to be addressed as soon as changes are committed. This presentation explores threat modeling in the context of machine learning (ML) pipelines, demonstrating how application-specific risks can be combined with ML model risk cards. Key topics include the importance of threat modeling in ML development, different methodologies such as STRIDE, LINDDUN, and MITRE ATLAS, and how they work together. A hands-on example will showcase "Threat Modeling as Code" using ThreAgile, an open-source tool applied to a personal assistant GenAI project. The session will conclude with best practices and an overview of the limitations of various threat modeling approaches.
Speakers
avatar for Natalia Semenova

Natalia Semenova

Senior Security Architect, EPAM Canada
Natalia is a cybersecurity professional with 15+ years of international experience in the industry, including Finland, Germany, UK, New Zealand and Canada. She started her career in the academic environment as a PhD in mathematical statistics and cryptography, but later transitioned... Read More →
Friday April 11, 2025 9:15am - 10:00am ADT
201

9:15am ADT

What Security Professionals Need to Know about Backup Data & Processes
Friday April 11, 2025 9:15am - 10:00am ADT
202
Encrypt your data in the cloud, or someone else will do it for you. Here’s just one of the learnings we will share with you at ATLSECCON 2025. We’ve spent a ridiculous amount of time in the data protection and backup industry. In this session, we’ll share with you what we’ve learned so you won’t have any backdoors, surprises, mistakes or other unfortunate circumstances to put your data at risk. We will share common breakdowns in data protection strategies when it comes to ransomware recovery (and how to avoid them) as well as some practical advice for using backup data for analytics and cyber forensic purposes.
Speakers
avatar for Rick Vanover

Rick Vanover

Vice President, Product Strategy, Veeam Software
Rick Vanover is a Vice President, Product Strategy at Veeam. Rick leads and contributes to a global team to help drive resiliency-focused Veeam solutions to the market and bring the latest technology trends to all.
avatar for Kirsten Stoner

Kirsten Stoner

Global Technologist, Veeam Software
Kirsten Stoner is a Technologist on the Product Strategy team at Veeam Software. Kirsten has a specialized focus in all things data management including storage, cloud, IT Security and analytics.  Through her years working at Veeam, she leads the creation of technical content for... Read More →
Friday April 11, 2025 9:15am - 10:00am ADT
202

10:00am ADT

Sponsor Trade Show Connections
Friday April 11, 2025 10:00am - 11:00am ADT
Friday April 11, 2025 10:00am - 11:00am ADT
Convention Hall Level

11:00am ADT

Crypto currency and investigations
Friday April 11, 2025 11:00am - 11:45am ADT
A brief overview of crypto currency and investigations into offences involving crypto currency.
Speakers
KJ

Karren Jensen

Cybercrime Investigator, Royal Canadian Mounted Police
Police officer since 2004. Digital Forensic examiner with 8 years experience, recognized as an expert in digital forensics in Provincial Court and Court of Queen's Bench. Cybercrime investigator since June 2023.
Friday April 11, 2025 11:00am - 11:45am ADT
Ballroom

11:00am ADT

From Bed Bugs to Bad Actors: Planning for Compromise
Friday April 11, 2025 11:00am - 11:45am ADT
What do bedbugs and ransomware attacks have in common? Two things: they both sneak their way in, and they both need to be dealt with in a thought-out and methodical manner.

Fortunately, proper planning and remaining calm can go a long way to a successful recovery. In this session, we will draw parallels while covering the initial identification of the problem, the steps taken to quarantine and mitigate the spread, and the eventual remediation and recovery process.

By drawing similarities between data resiliency and a real-world bed bug infestation, we aim to provide a unique perspective on the importance of preparedness, quick response, and thorough recovery in both physical and digital environments. Attendees will gain insights into practical strategies for managing unexpected threats and ensuring resilience in the face of adversity.
Speakers
avatar for Alex Crandall

Alex Crandall

Systems Engineer, Veeam
Alex Crandall is a Systems Engineer based out of Atlantic Canada and is in his fourth year with Veeam. Prior to joining the Canadian SE team, he worked in professional services (Softchoice) with a focus on Microsoft technologies, at a local MSP supporting day to day client operations... Read More →
avatar for Matt Crape

Matt Crape

Senior Technical Product Marketer, Veeam Software
Matt Crape is a seasoned professional with over 20 years of experience in the tech industry, currently serving as a Senior Technical Product Marketer at Veeam. Before Veeam, his journey included time in frontline roles in tech support, system administration, and IT management. He... Read More →
Friday April 11, 2025 11:00am - 11:45am ADT
Argyle Suite 2

11:00am ADT

Maximizing the Potential of Cyber Risk Transfer
Friday April 11, 2025 11:00am - 11:45am ADT
As cyber threats like ransomware and data breaches continue to rise, understanding the role of cyber insurance is essential for CISOs and infosec specialists. This presentation will explore the critical intersection between cyber insurance and cybersecurity strategies, highlighting its importance in mitigating financial risks and enhancing organizational resilience. Attendees will gain insights into the current cyber threat landscape and learn how to integrate cyber insurance with proactive risk management. Participants will leave with actionable strategies to strengthen their organization’s defenses against evolving cyber threats.

As cyber threats like ransomware and data breaches continue to rise, understanding the role of cyber insurance is essential for CISOs and infosec specialists. This presentation will explore the critical intersection between cyber insurance and cybersecurity strategies, highlighting its importance in mitigating financial risks and enhancing organizational resilience. Attendees will gain insights into the current cyber threat landscape and learn how to integrate cyber insurance with proactive risk management. Participants will leave with actionable strategies to strengthen their organization’s defenses against evolving cyber threats.
Speakers
avatar for George Lambropoulos

George Lambropoulos

Senior Vice President, National Cyber Practice, Marsh Canada Ltd.
George Lambropoulos is a seasoned cybersecurity professional and Senior Vice President within the National Cyber Practice at Marsh. With over five years of experience as a dedicated cyber insurance broker, George specializes in helping organizations across various sectors, including... Read More →
Friday April 11, 2025 11:00am - 11:45am ADT
Argyle Suite 3

11:00am ADT

Beyond the Malware: Dissecting Information Stealers' Infection Vectors, Stolen Assets and Countermeasures
Friday April 11, 2025 11:00am - 11:45am ADT
202
Modern information stealers have evolved far beyond simple credential harvesters into sophisticated tools that capture complete digital fingerprints of their victims. In this technical deep-dive, we unveil groundbreaking research into stealer architecture, attack chains, and defensive countermeasures. Through analysis of real-world compromise scenarios, including desktop screenshots captured at infection moments, we reveal how threat actors leverage compromised ad networks and trojanized software for mass deployment. 
Building on hands-on experience with stealer log analysis, we detail how modern threats bypass multi-factor authentication, compromise (or not) password managers, and extract cryptocurrency wallets. We examine Chrome's application-bound encryption and why, although already circumvented, it creates new detection opportunities. The session concludes with practical defensive strategies and the release of two community resources: a PowerShell script for automated credential testing against Entra ID and a curated dataset of stealer logs for security research.
This presentation equips security practitioners with concrete insights and tools to defend against one of today's most consequential yet underexamined threats.
Speakers
avatar for Olivier Bilodeau

Olivier Bilodeau

Cybersecurity Researcher, Flare
Olivier Bilodeau, a principal researcher at Flare, brings 12+ years of cutting-edge infosec expertise in honeypot operations, binary reverse-engineering, and RDP interception. Passionate communicator, Olivier spoke at conferences like AtlSecCon, BlackHat, DEFCON, SecTor, Derbycon... Read More →
Friday April 11, 2025 11:00am - 11:45am ADT
202

11:45am ADT

Buffet Lunch Service & Sponsor Prize Draws
Friday April 11, 2025 11:45am - 1:00pm ADT
Friday April 11, 2025 11:45am - 1:00pm ADT
Ballroom

1:00pm ADT

Gen AI in SecOps: Hype vs Concrete, Practical Use Cases
Friday April 11, 2025 1:00pm - 1:45pm ADT
There is a lot of hype around LLMs and Generative AI in cybersecurity - enough to make one roll their eyes into the back of their head. However, there are also a lot of organizations that are getting real value. In this talk, we will unpack some of the hype - and share real world use cases you can deploy NOW, showing how generative AI is being used today in security operations centers to take an existing process that is bottlenecked by humans, and supercharge it, using AI and automation to do what humans used to have to do - using both open-source as well as commercial tools.
Speakers
avatar for Jason Keirstead

Jason Keirstead

VP Security Strategy, Simbian
Jason Keirstead is VP of Security Strategy at Simbian, where he is working to leverage generative AI to revolutionize cybersecurity. He has over 21 years experience in the industry, and is a subject-matter expert in topics such as threat intelligence, collective defense, SIEM, SOAR... Read More →
Friday April 11, 2025 1:00pm - 1:45pm ADT
Ballroom

1:00pm ADT

The Dangers of Free Wi-Fi - Phishing with the ESP32
Friday April 11, 2025 1:00pm - 1:45pm ADT
I recently wrote a phishing tool for the ESP32 to educate others on exactly how cheap and easy it would be to get a device like this running. All of the parts can be ordered for less than $15 online, and in less than a couple days a Phisher could be deployed. In my talk I am going to cover the dangers that this kind of technology poses, how easy it is to create and deploy, the worst threat cases, and most importantly how we can avoid and eventually put an end to them.

These are important topics to cover because it brings attention to the surprisingly low barrier to entry into the ever growing cyber crime industry and how malicious devices like these can be scattered around, causing a wide variety of damage. The obvious first step in stopping this kind of cyber attack is understanding how it works, after can start on the second step, locating the devices to physically shut down them down.

This talk offers insights from head to tail, analyzing every aspect of these micro cyber attacks which are becoming more and more prevalent in our modern age.
Speakers
avatar for Leonardo Lees

Leonardo Lees

High School Senior, Student
Hello, my name is Leonardo Lees, I am a grade 12 student, and I have been fascinated with technology since the day I laid my fingers on the keyboard. I find my biggest interests are in Embedded Software, Cryptography, and Blockchain Smart Contracts. I have been working hard on honing... Read More →
Friday April 11, 2025 1:00pm - 1:45pm ADT
Argyle Suite 1

1:00pm ADT

Redefining Success in Employee Awareness Training: Understanding & Enhancing the Employee Journey
Friday April 11, 2025 1:00pm - 1:45pm ADT
In the process of an employee awareness training campaign, employees undergo various stages, marking their journey from initial awareness to completion. Recognizing employee journey stages is pivotal in cultivating a security-first culture that acknowledges human behaviour. Each stage represents a step in the employee's progression, starting with becoming aware of the training, deciding to participate, and finally completing the program.

However, a gap exists in evaluating the success of such awareness training campaigns. Traditional metrics like completion rates tend to focus on the final stages, overlooking earlier stages that are crucial in understanding and enhancing user engagement to sign up for training willingly, and not by force!

To bridge this gap, there’s a need for redefining success criteria for awareness campaigns. A comprehensive evaluation should consider each employee's decision-making journey stages and employ diverse metrics tailored to assess the success of each stage. 

In this presentation learn about different stages of the employee journey stages, engagement strategies & diverse metrics to assess the success of the training campaign. 

By embracing this refined assessment methodology, organizations can delve deeper into employees' learning journeys. This approach aids in accurately evaluating the success of awareness training campaigns by identifying the stages at which employees disengage. Consequently, this allows planners to pinpoint gaps, plan effectively, and make informed decisions to enhance training campaigns. Ultimately, this ensures that employee awareness training campaigns engage employees collaboratively around their needs.



Speakers
avatar for Khatija Qureshi

Khatija Qureshi

Cybersecurity Awareness Specialist, Undisclosed in Insurance Industry
Khatija Qureshi is a cybersecurity professional, trained by SANS and holding three GIAC certifications, along with a Certified Incident Handler credential. With over a decade of experience in marketing, brand building, and communication, she is dedicated to humanizing the field of... Read More →
Friday April 11, 2025 1:00pm - 1:45pm ADT
Argyle Suite 2

1:00pm ADT

Hacking boards and hardening governance: Strengthening Information Security Governance
Friday April 11, 2025 1:00pm - 1:45pm ADT
In today’s ever changing digital landscape, higher education institutions continue to strive to protect their technology assets and data from cyber risks. As stewards of corporate governance - management and the board of trustees partner together to navigate through these enterprise risks and build a sustainable culture of cyber responsibility. 
 
In this informal conversation, Kevin Magee, Board of Trustee at Brock University and former Chief Security Officer for Microsoft Canada and Gemma Ahn, AVP and Head of ITS Brock University share practical insights on how to build a mutual understanding of cyber-related risk, foster accountability and ensure strategic alignment.
Speakers
avatar for Gemma Ahn

Gemma Ahn

Associate Vice-President & Head, Information Technology Services, Brock University
Gemma Ahn is a purpose driven, collaborative leader in technology enablement and business transformation. With a career rooted in both information technology and business strategy, she has led teams to deliver significant, large-scale initiatives, setting new standards for delivery... Read More →
avatar for Kevin Magee

Kevin Magee

Board Member, Brock University
As the Global Director of Cybersecurity Startups at Microsoft, Kevin leads the worldwide cybersecurity strategy, programs, and portfolio for Microsoft for Startups. Formerly the Chief Security Officer at Microsoft Canada, he is a recognized authority on emerging trends in cybersecurity... Read More →
Friday April 11, 2025 1:00pm - 1:45pm ADT
Argyle Suite 3

1:00pm ADT

Attack Vectors Behind the Wheel: Understanding Cybersecurity in Modern Vehicles
Friday April 11, 2025 1:00pm - 1:45pm ADT
201
Vehicles have come a long way and are no longer just mechanical moving parts. Modern vehicles function using more technology than ever, leaving them potentially vulnerable. This presentaion will cover the possible attack vectors affecting current generations of vehicles, looking at examples pulled from recent real world incidents. It will also explore some new potential vectors and threats that we may see presented in future generations of vehicles. Additionally, we will look at the way these systems can be tested and secured as well as the potential risks assosicated with these attack vectors. We will also take a look at what the industry is currently doing related to automotive security through the use of security standards. The goal of this presentation is to highlight the potential risks of modern vehicles and what can be done to secure them.
Speakers
avatar for Cole Baker

Cole Baker

Cybersecurity Consultant II, Bulletproof Solutions
I am an experienced Cybersecurity Consultant with Bulletproof Solutions out of Halifax, Nova Scotia. Focusing on penetration testing for the last 5 years and most recently branching into security auditing and automotive security. I am committed to advancing the course of the cybersecurity... Read More →
Friday April 11, 2025 1:00pm - 1:45pm ADT
201

1:00pm ADT

Intergenerational Relationship Building in Canadian Cybersecurity though CyberTitan
Friday April 11, 2025 1:00pm - 1:45pm ADT
202
Canada struggles to find and keep cyber-talent. If cybersecurity is addressed in schools at all it tends to be as a passive media marketing campaign, but cyber-skills are teachable and approaching them that way also develops mentorships. In 2025 the Global Forum for Cybersecurity Excellence published a cyberstory about CyberTitan, Canada's national student cyber competition and the importance of intergenerational relationship building in an industry so new that it has no mechanisms for this essential process.

Cybersecurity has an image problem which causes many young people to opt out of opportunities in the field. In addition, cyber struggles to retain talent even when it can find it because the discipline is relatively new and has yet to mature into a sustainable field of study where human connections are supported professionally. Until cyber nurtures these professional relationships (which are evident in established fields through apprenticeships and other mentoring mechanisms), it will struggle to sustain itself as the essential component of digital infrastructure that it is.

One of the most challenging aspects of anyone’s cyber journey is finding mentors to support their growth. The challenges implicit in this early stage of digital security are not only faced by younger people. Many senior cyber specialists leave due to overwork and frustration around a lack of resources, many of which are (ironically) related to an inability to hire new talent.

How do we nurture these intergenerational human aspects of cybersecurity to encourage a more sustainable approach to the discipline?

In developing CyberTitan, the Information & Communication Technology Council of Canada (ICTC-CTIC) has partnered with the Communications Security Establishment (CSE-CST – Canada’s cryptography agency) to develop a nationwide initiative to develop the real world cyberskills in Canadian students while also illuminating pathways into the field. To create a sustainable cyber future in Canada we must work together to build these intergenerational bridges. We have the tools, we can build the homegrown talent.


Speakers
avatar for Timothy King

Timothy King

Cyber Education & Emerging Technologies Specialist, ICTC-CTIC
A pioneering cyber-educator in Canada, Timothy was the first teacher in the country to become cyber operations instructor qualified, and the first with MITx's Quantum Computing certification. Winner of the Cisco Networking Academy alumni innovator and shooting star awards in 2023... Read More →
Friday April 11, 2025 1:00pm - 1:45pm ADT
202

1:45pm ADT

Networking Break / Transition to Tracks
Friday April 11, 2025 1:45pm - 2:00pm ADT
Friday April 11, 2025 1:45pm - 2:00pm ADT
Convention Hall Level

2:00pm ADT

Persōna Theory: Infiltration & Deception of Emerging Threat Groups
Friday April 11, 2025 2:00pm - 2:45pm ADT
Our personas are fabrications and constructions of our inner self that we project outwards.  We do this through various means and influences such as race, gender, sex, ability, age, culture, religion, norms,  class, and status. For the “real world” aka “irl” we do all this by expression in our clothing, makeup, hairstyling, our hobbies, our network of friends, colleagues, and acquaintances. We leverage all of these facets and we create masks, personas, that we think will best interact with the world around us. The same concepts apply when creating personas for infiltrating online communities. 

Online communities are built on trust, reputation, and currency which can take various forms such as data, crypto, intel and notoriety. This talk is an exploration of techniques; linguistics, OPSEC, OSINT, and SOCENG. Tactical operations and concepts like hours of online operation, timezone shifting, and using low ranking accounts as canon fodder for probing, and psychological models used in the infiltration of emerging threat actor groups.
Speakers
avatar for Tammy Harper

Tammy Harper

Senior Threat Intelligence Researcher, Flare
Tammy is a Senior Threat Intelligence Researcher and Certified Dark Web Investigator at Flare. She brings a unique approach to studying cybercrime, utilizing linguistic practices such as frequency and stylometric analyses, along with transliteration, to uncover patterns and behaviors... Read More →
Friday April 11, 2025 2:00pm - 2:45pm ADT
Ballroom

2:00pm ADT

Hacked Intelligence: The Art of Manipulating AI to Attack at Scale
Friday April 11, 2025 2:00pm - 2:45pm ADT
Artificial Intelligence (AI) has revolutionized industries, but its vulnerabilities have also opened a new frontier for sophisticated cyberattacks. Among these, AI data poisoning and AI-enabled offensive cyberattacks stand out as potent threats capable of undermining the very systems designed to protect us. In this session, we will unravel the dark art of exploiting AI systems, showcasing how attackers manipulate training datasets, deploy deceptive inputs, and weaponize generative AI to compromise security at an unprecedented scale.






Speakers
avatar for Aamir Lakhani

Aamir Lakhani

Senior Global Director of Threat Research, Fortinet
Aamir Lakhani (aka pro2c@ll) is a leading security researcher. His expertise includes cyber defense, mobile application threats, malware management, and Advanced Persistent Threat (APT) research. Mr. Lakhani creates technical security strategies and leads security implementation... Read More →
Friday April 11, 2025 2:00pm - 2:45pm ADT
Argyle Suite 1

2:00pm ADT

Reality Check from the C-Suite: Why Technical Skills Aren’t Enough to Land the CISO Role
Friday April 11, 2025 2:00pm - 2:45pm ADT
This session explores why many cybersecurity professionals are often overlooked for the Chief Information Security Officer (CISO) role despite their technical expertise and certifications. Drawing on C-Suite and board-level insights, this presentation highlights the essential executive soft skills, business acumen, and strategic vision needed to transition from technical expert to organizational leader. Attendees will better understand what executive leaders seek in their next security executive, equipping them with the insights to make this critical career leap.
Speakers
avatar for Darren Gallop

Darren Gallop

CEO, Carbide Secure
Darren Gallop is an accomplished CEO, board director, and cybersecurity leader with over two decades of leadership experience in technical environments. As the founding CEO of Marcato, Darren led the development of integrated technology solutions for some of the world’s largest... Read More →
Friday April 11, 2025 2:00pm - 2:45pm ADT
Argyle Suite 2

2:00pm ADT

Digital Risk - Metrics and Reporting Automation
Friday April 11, 2025 2:00pm - 2:45pm ADT
This presentation will cover digital risk measurement, monitoring and reporting digital risks by employing automation. The below topics will be covered:

1) Risk Appetite as a Foundation for Risk Metrics
2) The What, Why and How of Risk Metrics 
3) The Essence of Risk Reporting 
4) Making Risk Reporting Effective 
5) Automation Case Study

The Learning Objectives will be to:
1. Get familiar with Risk Appetite
2. Understand the what and why of Risk Measures / Metrics
3. Understand the Metric build process
Speakers
avatar for Priya Mouli

Priya Mouli

Head of Information Security & Compliance, Sheridan College
Priya is an accomplished Cybersecurity / Tech / Data professional, advisor and thought leader with close to 20 years of demonstrated experience in IT Strategy, Operational Resiliency & Risk Management with a focus on Cybersecurity, Privacy, Data / AI Governance & Compliance.She is... Read More →
Friday April 11, 2025 2:00pm - 2:45pm ADT
Argyle Suite 3

2:00pm ADT

SOAR Implementation Pain Points and How to Avoid Them
Friday April 11, 2025 2:00pm - 2:45pm ADT
201
As cybersecurity threats continue to escalate in complexity and frequency, organizations increasingly rely on automation to enhance their defenses. Security Orchestration, Automation, and Response (SOAR) platforms have emerged as powerful tools for streamlining operations and reducing the burden of repetitive tasks on security teams. However, implementing SOAR is not without its challenges. This presentation will explore the common challenges organizations encounter when deploying SOAR and provide actionable strategies to overcome them. By examining real-world scenarios and best practices, attendees will gain insights into managing expectations, developing effective playbooks, addressing training and adoption barriers, and ensuring seamless integration with existing tools such as Security Information and Event Management (SIEM) systems. The session will cover practical approaches to conducting readiness assessments, planning phased rollouts, and measuring success to ensure that SOAR implementations deliver tangible results. Additionally, lessons learned from successful deployments will be shared to help participants avoid common pitfalls and realize the full potential of SOAR in their security operations.


Speakers
avatar for Saikat Asaduzzaman

Saikat Asaduzzaman

Senior Manager, Cyber Security Operations, Bank of Montreal
Saikat Asaduzzaman is a seasoned cybersecurity professional with over six years of expertise in cybersecurity operations and SOAR automation at Bank of Montreal. Over the course of his career, he has held key leadership roles, including Senior Manager, Cybersecurity Operations - Financial... Read More →
Friday April 11, 2025 2:00pm - 2:45pm ADT
201

2:00pm ADT

Exploring OT Security - and How IT Can Help
Friday April 11, 2025 2:00pm - 2:45pm ADT
202
There have been a variety of global attacks that disrupted power distribution, fuel distribution, and shipments. The attacks were successful because they exploited vulnerabilities in Operational Technology (OT). Due to the nature of OT, these disruptions not only cause a loss in revenue but can cause a loss of life as well. However, the industry is changing, and as assets become exposed to the Internet, the fundamental technologies of IT can help secure them. The presentation focuses on understanding past OT attacks, the differences and similarities between securing IT and OT technologies, and how we can merge the two to be able to have safer critical infrastructure.
Speakers
avatar for Tremayne Durham

Tremayne Durham

Engineering Analyst II - Cybersecurity, WGD Consulting
Coming from the twin-island republic of Trinidad and Tobago, Tremayne brings over 10 years of professional experience. She has worked in engineering, cloud computing, customer service, and cybersecurity and is determined to use her knowledge to uplift others. She holds a BSc. in Electrical... Read More →
Friday April 11, 2025 2:00pm - 2:45pm ADT
202

2:45pm ADT

Networking Break / Transition to Plenary
Friday April 11, 2025 2:45pm - 3:00pm ADT
Friday April 11, 2025 2:45pm - 3:00pm ADT
Convention Hall Level

3:00pm ADT

Sponsor Tradeshow Closes
Friday April 11, 2025 3:00pm - 4:00pm ADT
Friday April 11, 2025 3:00pm - 4:00pm ADT
Convention Hall Level

3:00pm ADT

Closing Keynote - Inside the Mind of a Social Engineer: Real Attacks, Hard Truths, and What They Mean for Your Organization
Friday April 11, 2025 3:00pm - 4:00pm ADT
Social engineering isn’t just about tricking people—it’s about understanding how humans think, behave, and make decisions in the moment. As a professional social engineer, Snow has spent her career breaking into buildings, bypassing security measures, and convincing people into handing over sensitive information. Sometimes, she succeeds. Other times, she gets caught. Either way, every engagement can reveal critical security gaps that organizations overlook.

In this keynote, Snow will take you inside the mind of a social engineer, sharing real-world stories, the tactics that work (and why), and the moments where organizations fought back effectively. We’ll also examine a hard truth: traditional security awareness training is failing us. But this isn’t just about her stories - it’s about your security. Throughout the talk, Snow will leave you with critical questions to take back to your organization.




Speakers
avatar for Stephanie Carruthers

Stephanie Carruthers

Global Lead of Cyber Range and Cyber Crisis Management, X-Force, IBM
Stephanie "Snow" Carruthers holds a dual role at IBM X-Force as Chief People Hacker and Global Head of Cyber Range. An expert in social engineering, Snow has earned the distinction of winning three unique black badges for excelling in Social Engineering and Physical Security competitions... Read More →
Friday April 11, 2025 3:00pm - 4:00pm ADT
Ballroom

4:00pm ADT

Closing Remarks & Passport Grand Prize Draws
Friday April 11, 2025 4:00pm - 5:00pm ADT
Friday April 11, 2025 4:00pm - 5:00pm ADT
Ballroom

5:00pm ADT

Day 2 Ends
Friday April 11, 2025 5:00pm - 6:00pm ADT
Friday April 11, 2025 5:00pm - 6:00pm ADT
Convention Hall Level
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -