Loading…
Venue: 202 clear filter
Thursday, April 10
 

11:00am ADT

Modern IT disaster recovery: ensuring continuity in the age of cyber-attacks
Thursday April 10, 2025 11:00am - 11:45am ADT
202
As the digital landscape continues to evolve, so do the threats and challenges that businesses face. IT disaster recovery (DR) has traditionally focused on scenarios such as fires and loss of network connectivity, yet the majority of disruptions are happening as a result of cyber-attacks that deliberately target your backups and secondary hosting sites to cause maximum damage. Further compounding this challenge is the fact that most organizations have a mix of systems hosted on-premise, systems managed by third parties and SaaS solutions that need different recovery approaches.
This presentation will explore modern approaches to IT DR using both cloud and no-cloud options, with automation where possible. We will also discuss the typical causes of delays during recovery from cyber-attacks, and solutions for speeding up recovery in situations where incident response teams need time to do their forensics work but business operations need to resume.
Speakers
avatar for Tarek Habib

Tarek Habib

Sr. Manager, KPMG LLP
Tarek is a Senior Manager in KPMG’s Advisory practice and specializes in business resilience and information security. Supporting business leaders and CISOs in various organizations and industries, including manufacturing, financial services, consumer goods, law enforcement, government... Read More →
Thursday April 10, 2025 11:00am - 11:45am ADT
202

1:00pm ADT

2025: The year of Right of Boom
Thursday April 10, 2025 1:00pm - 1:45pm ADT
202
Join Nick Scozzaro, Founder and CEO of ShadowHQ and former Head of Enterprise Mobility Engineering at BlackBerry, and George Plytas, Head of Information Security at Canadian Automobile Club (CAA ) as they explore emerging trends and best practices that enhance how organizations respond after a breach. Discover how Business Continuity, Cyber Response, Disaster Recovery, Crisis Management, and Executive Leadership are converging around the CISO and how they can better support all efforts of a response.

Attendees will gain critical insights to emerging trends, see where traditional IR plans are failing and learn best practices to help improve their security program, enabling a faster, cohesive and effective recovery plan
Speakers
avatar for George Plytas

George Plytas

Head of Information Security, Canadian Automobile Club, CAA Club Group
George Plytas is a seasoned cybersecurity leader with 25 years of experience in Security Operations and Regulatory Compliance. As the Head of Information Security at Canadian Automobile Club, CAA Club Group, he is responsible for safeguarding critical assets and ensuring the organization's... Read More →
avatar for Nick Scozzaro

Nick Scozzaro

Founder & CEO, ShadowHQ
Nick Scozzaro is the Founder and CEO of ShadowHQ, specializing in cybersecurity response and recovery. Previously, he served as Head of Enterprise Mobility Engineering at BlackBerry, where he spent 15 years supporting major technical projects for government and private sector across... Read More →
Thursday April 10, 2025 1:00pm - 1:45pm ADT
202

2:00pm ADT

Solving Secrets Sprawl Takes More Than Security: Why Machine Identity Is Everyone's Problem
Thursday April 10, 2025 2:00pm - 2:45pm ADT
202
When a security event occurs, most teams tend to jump into a circle of blame. Everyone takes their turn saying, "It can't be my fault. If only that user had not clicked on that link," or "If that developer had not hardcoded that credential, then none of this would have happened." Unfortunately, for many companies, the Security team is ultimately seen as at fault when a breach happens; after all, it is a security incident. 

Long-lived credential leaks, aka secrets sprawl, are possibly the single largest security risk every organization is currently facing. The reality is that no security team can solve this growing issue on its own. This is going to take a full team effort and rethinking some of the relationships and silos we have become accustomed to in the tech world. There has never been a better time to rethink how we build complex applications and how they interact with the world. 

In this talk, you will:
- Get an update on the latest secrets security research 
- Ask who really owns security and identity
- Map possible routes for a secrets-free future
- Rethink git and pull requests workflows and see why that is more involved than you think
Speakers
avatar for Dwayne McDaniel

Dwayne McDaniel

Senior Developer Advocate, GitGuardian
Dwayne has been working as a Developer Advocate since 2014 and has been involved in tech communities since 2005. His entire mission is to “help people figure stuff out.” He loves sharing his knowledge, and he has done so by giving talks at hundreds of events worldwide. He has... Read More →
Thursday April 10, 2025 2:00pm - 2:45pm ADT
202
  Track 6
  • global Y

3:00pm ADT

The Horrors of the Modern Software Supply Chain
Thursday April 10, 2025 3:00pm - 3:45pm ADT
202
Modern software is complex and developers heavily rely upon third party code. Securing the software supply chain gained a lot of attention following the Solar Winds compromise. However in the years following this compromise, very little has effectively moved the needle to reduce risk related to third party code and the software supply chain.

This talk will walk through the following problems with securing the software supply chain and propose some solutions to help companies:
  1. Walk through example tech stack
  2. Break down each of the compoennts of the stack
  3. Highlight the scope of third party software and services used
  4. Discuss the academic vs reality in approching securing the supply chain
  5. Talk about how companies are approaching the problem
  6. Understanding software composition analysis and problems with these tools
  7. Vulnerability reporting is broken and the state of NVD
  8. Problems with software bill of materials (SBOMs)
  9. Walk through of ecosystems for third party code - Homebrew, Operating systems package managers, PyPI, NPM, etc
  10. Examples of attackers abusing these ecosystems to compromise organizations
  11. Walk through containers and Kubernetes
  12. Walk through AI supply chain and new Chinese AI models
  13. Examples of how security professionals are being targetted
  14. Approaches for securing the software supply chain that are working
  15. Descriptions of the challenges
  16. Open source options - OpenSSF Scorecard
  17. Startups and commercial solutions with unique solutions
  18. Options to cache or proxy third party code
  19. How ecosystem maintainers are trying to protect against attackers
  20. Options to secure the CI/CD and developer endpoints
Speakers
avatar for Jared Perry

Jared Perry

Cloud Security Practice Lead, Stratum Security
Jared Perry is the Cloud Security Practice Lead at Stratum Security where he focuses on helping improve cloud security and security programs for start-ups to Fortune 500 companies. Prior to joining Stratum Security, Jared was an IT Security Administrator at Memorial University where... Read More →
Thursday April 10, 2025 3:00pm - 3:45pm ADT
202

4:00pm ADT

Detection Engineering 101 for OT/ICS Environment
Thursday April 10, 2025 4:00pm - 4:45pm ADT
202
In the complex world of OT/ICS environments, traditional approaches to threat hunting often fall short when handling vast datasets and detecting sophisticated threats. This talk introduces practical Jupyter Notebooks designed for large-scale threat hunting, with a focus on graph-based visualizations to uncover anomalies. Using APT Volt Typhoon’s tactics, techniques, and procedures (TTPs) as a case study, attendees will explore scalable methods for anomaly detection and detection engineering. The session emphasizes actionable strategies to build alerts for OT protocols like DNP3, BACnet, and Modbus, arming SOC teams to proactively safeguard critical infrastructure.
Speakers
avatar for Kai Iyer

Kai Iyer

Security Engineer II, Amazon
Security Engineer at Amazon's Enterprise Protection Program and a GIAC Certified Security Professional with expertise in web application development, devsecops, applied machine learning, threat hunting, purple teaming, and incident response. Passionate about leveraging advanced technologies... Read More →
Thursday April 10, 2025 4:00pm - 4:45pm ADT
202
 
Friday, April 11
 

9:15am ADT

What Security Professionals Need to Know about Backup Data & Processes
Friday April 11, 2025 9:15am - 10:00am ADT
202
Encrypt your data in the cloud, or someone else will do it for you. Here’s just one of the learnings we will share with you at ATLSECCON 2025. We’ve spent a ridiculous amount of time in the data protection and backup industry. In this session, we’ll share with you what we’ve learned so you won’t have any backdoors, surprises, mistakes or other unfortunate circumstances to put your data at risk. We will share common breakdowns in data protection strategies when it comes to ransomware recovery (and how to avoid them) as well as some practical advice for using backup data for analytics and cyber forensic purposes.
Speakers
avatar for Rick Vanover

Rick Vanover

Vice President, Product Strategy, Veeam Software
Rick Vanover is a Vice President, Product Strategy at Veeam. Rick leads and contributes to a global team to help drive resiliency-focused Veeam solutions to the market and bring the latest technology trends to all.
avatar for Kirsten Stoner

Kirsten Stoner

Global Technologist, Veeam Software
Kirsten Stoner is a Technologist on the Product Strategy team at Veeam Software. Kirsten has a specialized focus in all things data management including storage, cloud, IT Security and analytics.  Through her years working at Veeam, she leads the creation of technical content for... Read More →
Friday April 11, 2025 9:15am - 10:00am ADT
202

11:00am ADT

Beyond the Malware: Dissecting Information Stealers' Infection Vectors, Stolen Assets and Countermeasures
Friday April 11, 2025 11:00am - 11:45am ADT
202
Modern information stealers have evolved far beyond simple credential harvesters into sophisticated tools that capture complete digital fingerprints of their victims. In this technical deep-dive, we unveil groundbreaking research into stealer architecture, attack chains, and defensive countermeasures. Through analysis of real-world compromise scenarios, including desktop screenshots captured at infection moments, we reveal how threat actors leverage compromised ad networks and trojanized software for mass deployment. 
Building on hands-on experience with stealer log analysis, we detail how modern threats bypass multi-factor authentication, compromise (or not) password managers, and extract cryptocurrency wallets. We examine Chrome's application-bound encryption and why, although already circumvented, it creates new detection opportunities. The session concludes with practical defensive strategies and the release of two community resources: a PowerShell script for automated credential testing against Entra ID and a curated dataset of stealer logs for security research.
This presentation equips security practitioners with concrete insights and tools to defend against one of today's most consequential yet underexamined threats.
Speakers
avatar for Olivier Bilodeau

Olivier Bilodeau

Cybersecurity Researcher, Flare
Olivier Bilodeau, a principal researcher at Flare, brings 12+ years of cutting-edge infosec expertise in honeypot operations, binary reverse-engineering, and RDP interception. Passionate communicator, Olivier spoke at conferences like AtlSecCon, BlackHat, DEFCON, SecTor, Derbycon... Read More →
Friday April 11, 2025 11:00am - 11:45am ADT
202

1:00pm ADT

Intergenerational Relationship Building in Canadian Cybersecurity though CyberTitan
Friday April 11, 2025 1:00pm - 1:45pm ADT
202
Canada struggles to find and keep cyber-talent. If cybersecurity is addressed in schools at all it tends to be as a passive media marketing campaign, but cyber-skills are teachable and approaching them that way also develops mentorships. In 2025 the Global Forum for Cybersecurity Excellence published a cyberstory about CyberTitan, Canada's national student cyber competition and the importance of intergenerational relationship building in an industry so new that it has no mechanisms for this essential process.

Cybersecurity has an image problem which causes many young people to opt out of opportunities in the field. In addition, cyber struggles to retain talent even when it can find it because the discipline is relatively new and has yet to mature into a sustainable field of study where human connections are supported professionally. Until cyber nurtures these professional relationships (which are evident in established fields through apprenticeships and other mentoring mechanisms), it will struggle to sustain itself as the essential component of digital infrastructure that it is.

One of the most challenging aspects of anyone’s cyber journey is finding mentors to support their growth. The challenges implicit in this early stage of digital security are not only faced by younger people. Many senior cyber specialists leave due to overwork and frustration around a lack of resources, many of which are (ironically) related to an inability to hire new talent.

How do we nurture these intergenerational human aspects of cybersecurity to encourage a more sustainable approach to the discipline?

In developing CyberTitan, the Information & Communication Technology Council of Canada (ICTC-CTIC) has partnered with the Communications Security Establishment (CSE-CST – Canada’s cryptography agency) to develop a nationwide initiative to develop the real world cyberskills in Canadian students while also illuminating pathways into the field. To create a sustainable cyber future in Canada we must work together to build these intergenerational bridges. We have the tools, we can build the homegrown talent.


Speakers
avatar for Timothy King

Timothy King

Cyber Education & Emerging Technologies Specialist, ICTC-CTIC
A pioneering cyber-educator in Canada, Timothy was the first teacher in the country to become cyber operations instructor qualified, and the first with MITx's Quantum Computing certification. Winner of the Cisco Networking Academy alumni innovator and shooting star awards in 2023... Read More →
Friday April 11, 2025 1:00pm - 1:45pm ADT
202

2:00pm ADT

Exploring OT Security - and How IT Can Help
Friday April 11, 2025 2:00pm - 2:45pm ADT
202
There have been a variety of global attacks that disrupted power distribution, fuel distribution, and shipments. The attacks were successful because they exploited vulnerabilities in Operational Technology (OT). Due to the nature of OT, these disruptions not only cause a loss in revenue but can cause a loss of life as well. However, the industry is changing, and as assets become exposed to the Internet, the fundamental technologies of IT can help secure them. The presentation focuses on understanding past OT attacks, the differences and similarities between securing IT and OT technologies, and how we can merge the two to be able to have safer critical infrastructure.
Speakers
avatar for Tremayne Durham

Tremayne Durham

Engineering Analyst II - Cybersecurity, WGD Consulting
Coming from the twin-island republic of Trinidad and Tobago, Tremayne brings over 10 years of professional experience. She has worked in engineering, cloud computing, customer service, and cybersecurity and is determined to use her knowledge to uplift others. She holds a BSc. in Electrical... Read More →
Friday April 11, 2025 2:00pm - 2:45pm ADT
202
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.