Categories
technology

SC Congress – Day 2 – 9:00am – “Extending to mobility platforms”

Day 2 – Wed June 12 2013: 9am – “Extending to mobility platforms”, hosted by Daniel Legault, senior IAM/security advisor and architect, IBM Canada & Mike Balneaves, director, infrastructure engineering, OMERS. This session offered a high level policy overview of mobility deployment concerns. I found this session to be a great survey of the landscape. […]

Categories
technology

SC Congress – Day 1 – 3:30pm – “Keynote: How hackers operate”

Day 1 – Tues June 11 2013: 3:30pm – “Keynote: How hackers operate: Live demonstrations of current methods of breaching networks and stealing information”, by Derrick Webber, penetration testing and digital forensics team lead, CGI Derrick demonstrated some practical applications of the Social Engineering Toolkit (SET). He demonstrated how to conduct a phishing attack to […]

Categories
technology

SC Congress – Day 1 – 12:55pm – “Keynote: Changing landscape of risk”

Day 1 – Tues June 11 2013: 12:55pm – “Keynote: Changing landscape of risk” This presentation offered a high level survey of the changing risk landscape. I didn’t take many notes at this session. There was plenty of good discussion, but nothing noteworthy.

Categories
technology

SC Congress – Day 1 – 11:45am – “Big Data”

Day 1 – Tues June 11 2013: 11:45am – “Big Data” This presentation was a panel discussion discussing big data I didn’t take many notes at this session. There was plenty of good discussion, but nothing noteworthy. One funny quote from the session: “NSA’s Prism = the best data backup program ever.”

Categories
technology

SC Congress – Day 1 – 10:55am – “Information security adaptation: Survival in an evolving threat landscape”

Day 1 – Tues June 11 2013: 10:55am – “Information security adaptation: Survival in an evolving threat landscape”, Carl Herberger, VP of security solutions, Radware This presentation (I couldn’t find his exact slides, but I found this alternate copy from this location) provided a great overview of the current threat landscape. The presentation offered great statistics […]