2020 Toronto Virtual
Information Security Forum

#IANSToronto #IANSEvents

Thursday, October 29, 2020 | 9:00 AM - 3:00 PM ET
Web Conference, Toronto, ON

Already Registered? Please continue to the event lobby to log in.

The Toronto Forum is designed for information security practitioners across all industries to dive deep on specific topics, share insights, and network with peers in a virtual environment. This one-day event will feature keynote speeches, IANS Faculty presentations, ‘Ask Me Anything’ topic lounges, and ‘Technology Spotlight’ sessions to engage with solution providers.

IANS Forum content spans the depth and breadth of the entire security function. Attendees include but are not limited to CISOs, VPs and Managing Directors of Information Security, Information Security Architects, and Information Security Engineers.

Please note: This virtual event is intended for practitioners from the Toronto metro area. For people outside of the region who wish to join, attendance is subject to capacity. We will inform out-of-metro registrants on the status of their registration one week in advance of the event.

 

Let your colleagues know you're coming!

This event has ended.

Check out our other upcoming events!

View All Events
*Receive 1 CPE credit for every hour of attendance at our events.

Agenda

John Scott-Railton

Senior Researcher, Citizen Lab

John Scott-Railton is a Senior Researcher at Citizen Lab (at The University of Toronto). His work focuses on targeted malware operations and online disinformation. His greatest hits include a collaboration that uncovered the first iPhone zero-day in the wild, as well as the abuse of government-grade spyware like NSO's Pegasus, FinFisher and Hacking Team around the globe. Other investigations include exposing Dark Basin, an Indian mercenary hacking operation, the discovery ISIS-led malware operations, and China's "Great Cannon," the Government of China's nation-scale DDoS tool. John also tracks Russian and Iranian disinformation campaigns, and the manipulation of news aggregators. John has been a fellow at Google Ideas and Jigsaw at Alphabet, and he consults on cybersecurity and operations in high risk and denied environments.

9:00 AM - 9:30 AM

Trick and Breach: When Mercenary Hackers Come Knocking

with John Scott-Railton

There’s a business dispute. Or a lawsuit. Maybe the CEO is divorcing. Now, someone has commissioned a mercenary operation, and your people and their spouses are the targets. Would you have spotted the signs? John Scott-Railton gives a behind-the-scenes look into Dark Basin, a massive mercenary hacking operation to:

  • Expose the mercenary hacking lifecycle, from the players to tactics, targeting to exfiltration
  • Show how mercenary operations manipulate & leverage stolen data to damage reputations & fight dirty
  • Give examples of how real targets identified and mitigated mercenary attacks

You will come away with a better understanding of the threat and some tricks of your own to spot mercenary hackers before your enterprise winds up in an embarrassing headline.

9:30 AM - 10:15 AM

Sponsor Tabletops & Technology Spotlight Demos

Check out the Sponsors, enter to win prizes, and gather materials from their tabletops. Visit the Demo Lounge to join topic-specific Technology Spotlight Demos.

jake-williams

Jake Williams

IANS Faculty

Jake is the Founder, President, and Principal Analyst of Rendition Infosec, an information security consultancy. He also sits on the Vulnerability Review Board at Peerlyst, a startup social networking platform exclusively for security professionals. Jake is a prolific speaker and instructor on a variety of information security topics such as reverse engineering malware, memory forensics, threat intelligence, and advanced exploit development.

10:15 AM - 11:00 AM Security Operations

Incident Response: Fixing What’s Wrong with Crisis Management

with Jake Williams

Security teams are getting better at the technical side of incident response, but crisis management is still a pain point. This session details how to quickly and efficiently manage a crisis when the crush is on. This session explores:

  • Tips to help first responders take charge, including the art of speaking in short sentences and keeping a journal
  • Case study: What we can learn from the SEAL team approach
  • How integrating OODA (observe, orient, decide and act) Loop principals across the culture results in a faster, more effective crisis response
  • How agreed-on values and beliefs guide decision-making when pressure is extreme
  • How leaders’ character, substance and style impact those around them
john-strand

John Strand

IANS Faculty

John is the Owner of Black Hills Information Security (BHIS) where he leads the Hunt Teaming, Command & Control (C2)/Data Exfiltration and Pivot testing development. He is also a SANS Institute Senior Instructor. In these roles, John has both consulted and taught hundreds of organizations in the areas of security, regulatory compliance, and penetration testing.

Threats & Vulnerabilities

Ransomware: Defense and Recovery Tactics for 2020

with John Strand

Ransomware continues to be a significant problem for many organizations, and it has shown a ferocious ability to evolve. This session explores:

  • Case studies from the news: What victims did wrong and what they did right
  • Tools and techniques to use if an initial attack is successful
  • A look at how tactics differ for small teams vs. large teams
  • How to account for ransomware attacks in your incident response plan
mike-rothman

Mike Rothman

IANS Faculty

Mike is the President of Securosis, an information security research and advisory firm, as well as Co-Founder and President of DisruptOps, a cloud detection and response company. His breadth of experience in the information security space and bold perspectives are invaluable as companies determine effective strategies to grapple with the dynamic security threatscape. Mike started practicing and advising on security topics over 25 years ago, and he’s been trying to get out of the business ever since…to no avail.

Security Architecture

Advancing Cloud Security: A Roadmap

with Mike Rothman

Small teams are stuck at the ground level for cloud security and need to mature. Large teams continue to struggle when designing cloud architecture, managing apps and configuring systems. Both need to know what they’re doing wrong and how to do it right. This session begins with a brief overview of the IANS/Securosis Cloud Security Maturity Model and then explores fresh guidance to improve SecOps and DevOps in the cloud, including:

  • How to build an automation framework for SecOps in the cloud
  • How to build a library of design patterns that development teams can use to develop stronger code in the cloud
  • How to know when you’ve reached the point within cloud security where you don’t actually have to be involved because everything is being built into code and infrastructure
11:05 AM - 11:50 AM

Sponsor Tabletops & Technology Spotlight Demos

Check out the Sponsors, enter to win prizes, and gather materials from their tabletops. Visit the Demo Lounge to join topic-specific Technology Spotlight Demos.

Tanya Janca

Tanya Janca

IANS Faculty

Tanya Janca, also known as SheHacksPurple, is the author of ‘Alice and Bob Learn Application Security’. She is also the founder of We Hack Purple, an online learning academy, community and podcast that revolves around teaching everyone to create secure software. Tanya has been coding and working in IT for over twenty years, won numerous awards, and has been everywhere from startups to public service to tech giants (Microsoft, Adobe, & Nokia). She has worn many hats; startup founder, pentester, CISO, AppSec Engineer, and software developer. She is an award-winning public speaker, active blogger & streamer and has delivered hundreds of talks and trainings on 6 continents. She values diversity, inclusion and kindness, which shines through in her countless initiatives.

11:50 AM - 12:20 PM Security Architecture

Ask Me Anything: The Latest in AppSec Tools

with Tanya Janca In this topic lounge, ask IANS Faculty member Tanya Janca questions about the most cutting-edge tools available for Application Security.
mike-rothman

Mike Rothman

IANS Faculty

Mike is the President of Securosis, an information security research and advisory firm, as well as Co-Founder and President of DisruptOps, a cloud detection and response company. His breadth of experience in the information security space and bold perspectives are invaluable as companies determine effective strategies to grapple with the dynamic security threatscape. Mike started practicing and advising on security topics over 25 years ago, and he’s been trying to get out of the business ever since…to no avail.

Leadership

Ask Me Anything: Maintaining Security in a Pandemic and Downturn

with Mike Rothman In this topic lounge, ask IANS Faculty member Mike Rothman questions about your challenges around maintaining security amid the shift to remote work and the economic pressure that is forcing many companies to do more with less.
jake-williams

Jake Williams

IANS Faculty

Jake is the Founder, President, and Principal Analyst of Rendition Infosec, an information security consultancy. He also sits on the Vulnerability Review Board at Peerlyst, a startup social networking platform exclusively for security professionals. Jake is a prolific speaker and instructor on a variety of information security topics such as reverse engineering malware, memory forensics, threat intelligence, and advanced exploit development.

Security Operations

Ask Me Anything: Reducing Security's Cost Responsibilities

with Jake Williams In this topic lounge, ask IANS Faculty member Jake Williams questions about creative ways to find savings amid the economic downturn – whether it’s through tech licensing, storage or de-duplication of vendors.
12:20 PM - 12:45 PM

Networking Lunch

Tanya Janca

Tanya Janca

IANS Faculty

Tanya Janca, also known as SheHacksPurple, is the author of ‘Alice and Bob Learn Application Security’. She is also the founder of We Hack Purple, an online learning academy, community and podcast that revolves around teaching everyone to create secure software. Tanya has been coding and working in IT for over twenty years, won numerous awards, and has been everywhere from startups to public service to tech giants (Microsoft, Adobe, & Nokia). She has worn many hats; startup founder, pentester, CISO, AppSec Engineer, and software developer. She is an award-winning public speaker, active blogger & streamer and has delivered hundreds of talks and trainings on 6 continents. She values diversity, inclusion and kindness, which shines through in her countless initiatives.

12:45 PM - 1:30 PM Security Architecture

Successful DevSecOps: Understanding the Business Cases

with Tanya Janca

Companies still struggle to get developers and security on the same page. It’s time to learn from those who’ve notched DevSecOps successes. This session explores:

  • Case studies of DevSecOps done right
  • How to measure your maturity for DevSecOps (Phase 1 to Phase 5)
  • Putting the “Shift Left” DevSecOps workflow in place
  • How DevSecOps creates secure cloud deployments
  • How to use DevSecOps to improve internet-of-things (IoT) security at the development stage
john-strand

John Strand

IANS Faculty

John is the Owner of Black Hills Information Security (BHIS) where he leads the Hunt Teaming, Command & Control (C2)/Data Exfiltration and Pivot testing development. He is also a SANS Institute Senior Instructor. In these roles, John has both consulted and taught hundreds of organizations in the areas of security, regulatory compliance, and penetration testing.

Threats & Vulnerabilities

Building and Optimizing a Threat Intel Program

with John Strand

Less mature security teams need step-by-step guidance to take their threat intelligence tactics to a more advanced level. This session explores:

  • Getting more out of open source threat intelligence sources such as LinkedIn, Twitter and news feeds
  • How to think critically and develop analytical judgments you can then communicate to leaders who have to make decisions
  • Data quality vs. quantity
  • Native language analysis
  • Getting access to source data and knowing how to use it
mike-rothman

Mike Rothman

IANS Faculty

Mike is the President of Securosis, an information security research and advisory firm, as well as Co-Founder and President of DisruptOps, a cloud detection and response company. His breadth of experience in the information security space and bold perspectives are invaluable as companies determine effective strategies to grapple with the dynamic security threatscape. Mike started practicing and advising on security topics over 25 years ago, and he’s been trying to get out of the business ever since…to no avail.

Security Operations

Using AI/ML to Optimize SecOps

with Mike Rothman

AI/ML technology can help them make more accurate decisions, but only if security teams feed the right data into the machine. This session explains how to grab and input the right data from five primary log data sources:

  • Network (traffic flows)
  • Infrastructure (servers)
  • Database
  • Applications
  • Identity and access management (IAM)/people

From there, we explore what clean, relevant, actionable and business-driven data truly looks like.

1:30 PM - 2:15 PM

Sponsor Tabletops & Technology Spotlight Demos

Check out the Sponsors, enter to win prizes, and gather materials from their tabletops. Visit the Demo Lounge to join topic-specific Technology Spotlight Demos.

jake-williams

Jake Williams

IANS Faculty

Jake is the Founder, President, and Principal Analyst of Rendition Infosec, an information security consultancy. He also sits on the Vulnerability Review Board at Peerlyst, a startup social networking platform exclusively for security professionals. Jake is a prolific speaker and instructor on a variety of information security topics such as reverse engineering malware, memory forensics, threat intelligence, and advanced exploit development.

2:15 PM - 3:00 PM Security Architecture

Zero Trust Principles: Making Them Work for You

with Jake Williams

Security teams need to understand both what zero trust principals are and how to properly implement them across the organization. This session starts with the nuts and bolts that make up zero trust, then delves into:

  • How zero trust architecture lowers the risk of common attacks, including account takeovers, insider threats, web and cloud app risks, and IoT and device compromises
  • Real-world examples of successful zero trust in action
  • Legacy tech that doesn’t play well with zero trust and what to do about it
Tanya Janca

Tanya Janca

IANS Faculty

Tanya Janca, also known as SheHacksPurple, is the author of ‘Alice and Bob Learn Application Security’. She is also the founder of We Hack Purple, an online learning academy, community and podcast that revolves around teaching everyone to create secure software. Tanya has been coding and working in IT for over twenty years, won numerous awards, and has been everywhere from startups to public service to tech giants (Microsoft, Adobe, & Nokia). She has worn many hats; startup founder, pentester, CISO, AppSec Engineer, and software developer. She is an award-winning public speaker, active blogger & streamer and has delivered hundreds of talks and trainings on 6 continents. She values diversity, inclusion and kindness, which shines through in her countless initiatives.

Threats & Vulnerabilities

Application Security: Fixing the Legacy App Problem

with Tanya Janca

Large companies – especially post-M&A – tend to ignore legacy apps in favor of implementing new technology. This results in old apps sitting on the network with vulnerabilities attackers easily exploit. This session explores how to:

  • Protect legacy apps long enough to either come up with a graceful transition or update them
  • Design a more effective, advanced and automated inventory process
  • Get a better sense for how to triage the most troublesome apps
  • Better optimize unused features in older apps before rushing to new apps
john-strand

John Strand

IANS Faculty

John is the Owner of Black Hills Information Security (BHIS) where he leads the Hunt Teaming, Command & Control (C2)/Data Exfiltration and Pivot testing development. He is also a SANS Institute Senior Instructor. In these roles, John has both consulted and taught hundreds of organizations in the areas of security, regulatory compliance, and penetration testing.

Security Operations

Reduce Malware False Positives and Hold Vendors More Accountable

with John Strand

Endpoint tools are notorious for drowning security teams in false positives. Teams must be able to both better tune the tools and hold vendors more accountable for deficiencies in their products. This session explores:

  • Questions to ask to keep endpoint security vendors’ feet to the fire
  • How to more quickly recognize false positives
  • How to ensure the same false positives don’t crop up over and over

2020 Toronto Virtual Speakers

Tanya Janca

Tanya Janca

IANS Faculty

Tanya Janca, also known as SheHacksPurple, is the author of ‘Alice and Bob Learn Application Security’. She is also the founder of We Hack Purple, an online learning academy, community and podcast that revolves around teaching everyone to create secure software. Tanya has been coding and working in IT for over twenty years, won numerous awards, and has been everywhere from startups to public service to tech giants (Microsoft, Adobe, & Nokia). She has worn many hats; startup founder, pentester, CISO, AppSec Engineer, and software developer. She is an award-winning public speaker, active blogger & streamer and has delivered hundreds of talks and trainings on 6 continents. She values diversity, inclusion and kindness, which shines through in her countless initiatives.

Presentations
  • Ask Me Anything: The Latest in AppSec ToolsAgenda11:50 AM - 12:20 PM
  • Successful DevSecOps: Understanding the Business CasesAgenda12:45 PM - 1:30 PM
  • Application Security: Fixing the Legacy App ProblemAgenda2:15 PM - 3:00 PM
mike-rothman

Mike Rothman

IANS Faculty

Mike is the President of Securosis, an information security research and advisory firm, as well as Co-Founder and President of DisruptOps, a cloud detection and response company. His breadth of experience in the information security space and bold perspectives are invaluable as companies determine effective strategies to grapple with the dynamic security threatscape. Mike started practicing and advising on security topics over 25 years ago, and he’s been trying to get out of the business ever since…to no avail.

Presentations
  • Advancing Cloud Security: A RoadmapAgenda10:15 AM - 11:00 AM
  • Ask Me Anything: Maintaining Security in a Pandemic and DownturnAgenda11:50 AM - 12:20 PM
  • Using AI/ML to Optimize SecOpsAgenda12:45 PM - 1:30 PM

John Scott-Railton

Senior Researcher, Citizen Lab

John Scott-Railton is a Senior Researcher at Citizen Lab (at The University of Toronto). His work focuses on targeted malware operations and online disinformation. His greatest hits include a collaboration that uncovered the first iPhone zero-day in the wild, as well as the abuse of government-grade spyware like NSO's Pegasus, FinFisher and Hacking Team around the globe. Other investigations include exposing Dark Basin, an Indian mercenary hacking operation, the discovery ISIS-led malware operations, and China's "Great Cannon," the Government of China's nation-scale DDoS tool. John also tracks Russian and Iranian disinformation campaigns, and the manipulation of news aggregators. John has been a fellow at Google Ideas and Jigsaw at Alphabet, and he consults on cybersecurity and operations in high risk and denied environments.

Presentations
  • Trick and Breach: When Mercenary Hackers Come KnockingAgenda9:00 AM - 9:30 AM
john-strand

John Strand

IANS Faculty

John is the Owner of Black Hills Information Security (BHIS) where he leads the Hunt Teaming, Command & Control (C2)/Data Exfiltration and Pivot testing development. He is also a SANS Institute Senior Instructor. In these roles, John has both consulted and taught hundreds of organizations in the areas of security, regulatory compliance, and penetration testing.

Presentations
  • Ransomware: Defense and Recovery Tactics for 2020Agenda10:15 AM - 11:00 AM
  • Building and Optimizing a Threat Intel ProgramAgenda12:45 PM - 1:30 PM
  • Reduce Malware False Positives and Hold Vendors More AccountableAgenda2:15 PM - 3:00 PM
jake-williams

Jake Williams

IANS Faculty

Jake is the Founder, President, and Principal Analyst of Rendition Infosec, an information security consultancy. He also sits on the Vulnerability Review Board at Peerlyst, a startup social networking platform exclusively for security professionals. Jake is a prolific speaker and instructor on a variety of information security topics such as reverse engineering malware, memory forensics, threat intelligence, and advanced exploit development.

Presentations
  • Incident Response: Fixing What’s Wrong with Crisis ManagementAgenda10:15 AM - 11:00 AM
  • Ask Me Anything: Reducing Security's Cost ResponsibilitiesAgenda11:50 AM - 12:20 PM
  • Zero Trust Principles: Making Them Work for YouAgenda2:15 PM - 3:00 PM

Web Conference

Registrants will receive a logistics email with web conference meeting information one day prior to the event.

Registration Questions

Can I earn continuing education credits for attending the forum?

Attendees may earn up to 16 credits through our partnership with (ISC)2. Attendees must check in at registration each morning to receive their 8 credits for Day 1 and Day 2. Attendees will receive a Certificate of Completion one week after the forum concludes for any other certification needs. If you have provided IANS with your CISSP # during the registration process then we will automatically submit to (ISC)2.

What is the registration fee?

The Forum is complimentary and open to active Information Security Professionals from private and public sector corporations and organizations.

What's the registration deadline?
You can register for and IANS event up to the day of the event.

Day-of Questions

Are the presentations available for viewing after the Forum?

All roundtable sessions will be available after the Forum. Many presentations are uploaded to the Mobile App prior to the Forum.

Does IANS provide a Mobile App?

The IANS Information Security Forum App will be available 1 week prior to the event. To download the Mobile App go to the App Store or Google Play Store on your device and search IANS.

How can I promote my involvement with the event?

Please share your thoughts and excitement using our event hashtags found at the top of this page.

What can I expect when I attend an IANS event?

When attending an IANS Information Security Forum, you will have the opportunity to take part in technical and strategic Roundtable sessions that discuss the latest issues and trends found in the market. These Roundtable discussions are led by IANS Faculty who are also long-time information security practitioners. You will also have the chance to network with industry peers and learn about the newest technologies and services during any one of our Technology Spotlight sessions.

What is the best way to stay updated before and during the Forum?

For all updates please download the IANS Mobile App or follow us on Twitter.

Will there be opportunities to network with peers and sponsors?

There will be chances to network with your peers during the lunches, breaks and the networking reception at the end of day one.

General Information

Cancellations

IANS requests that cancellations please be submitted two weeks prior to a Forum. Reserved seats are limited.

Terms and Conditions

This Forum is produced by IANS, which reserves the right, in its sole discretion, to limit or deny access to the Forum to any entity or individual. Attendance to the Forum is complimentary and open to active information security professionals from private and public-sector corporations and organizations.

Individuals from information security solution providers (software, hardware, and consulting companies) are not eligible to attend unless affiliated with a sponsoring organization.

IANS reserves the right to share attendee contact information with event sponsors and other attendees. IANS will provide on-site opt-out forms that enable you to remove your contact information from being shared as described herein. No contact information will be shared prior to the event.

Photography, Audio & Video Recording

IANS Forums are held in a public venue; therefore, IANS does not prohibit participants, sponsors, or other companies from photographing or taking videos. IANS reserves the right to use images taken at IANS Forums with your photograph and/or likeness in marketing materials.

IANS Code of Conduct

IANS is committed to providing a harassment-free conference experience for all attendees, sponsors, speakers and staff regardless of gender, sexual orientation, disability, physical appearance, national origin, ethnicity, political affliction or religion.

IANS expects all participants to behave in a professional manner. IANS will not condone any form of sexual language and imagery, verbal threats or demands, offensive comments, intimidation, stalking, sustained disruption of session or events, inappropriate physical contract, and unwelcomed sexual attention.

If any form of written, social media, verbal, or physical harassment is reported, participant will be asked to stop and expected to comply immediately. Offender will be subject to expulsion from the conference.

If you are being harassed or notice someone being harassed, please contact the event staff. In the event of an emergency situation, please contact local authorities immediately.

We expect participants to follow these rules at all event venues and event-related social activities.

Attendee Contact

ians@iansresearch.com

Who Should Attend?

IANS Forum content is designed for information security practitioners across all industries. Attendees include CISOs, VPs and Managing Directors of Information Security, Information Security Architects, and Information Security Engineers.

Interested in Forum Sponsorship? Learn More.

Check out IANS other upcoming events