June 7th, 2019
IT Connect is a conference organized yearly by Champlain College Saint-Lambert. In 2019, the theme will revolve around Cybersecurity. The conference presents a great opportunity to see speakers from many high-profile organizations, while also presenting valuable networking opportunities throughout. As a public college, Champlain offers a multitude of IT-related programs and courses, and is both a Cisco Networking Academy as well as an AWS Academy. The IT Connect conference series is thus one of many aspects of Champlain's commitment to IT - and has more than doubled in size in nearly all categories from the first year it was offered.
New technologies are appearing faster than ever before, and as they do, new hacks and cyber-attack opportunities inevitably follow. It is thus important to have a strong understanding of the security efforts taken by organizations, including the latest standards, frameworks, and best practices.
Topics at IT Connect 2019 will include:
|• Threat Intelligence/Management||• General Data Protection Regulation (GDPR)||• Vulnerability Management|
|• IoT Related Threats||• Cloud Security||• Blockchain|
|• Data Protection||• Artificial Intelligence||• Employee Monitoring & Surveillance|
|• Governance, Risk & Compliance||• Security Awareness & Capacity Building|
|Early Bird (online tickets before May 7th) : $50||Day of the event (at the door) : $90|
|Online ticket sales between May 8th – June 6th : $75|
Tickets will be available for sale as of January 2019.
- Terry Cutler - Founder & Ethical Hacker, Cyology Labs
Terry Cutler is a government-cleared cybersecurity expert and the founder and CEO of Cyology Labs in Montréal, Canada. He specializes in the anticipation, assessment, and prevention of security breaches for governments, corporations, businesses, and consumers, as well as Internet Safety for Children.
As an award-winning information security strategist for almost 20 years and was recently named #1 most influential cybersecurity expert by IFSEC Global.
Mr. Cutler has advised some of Canada’s largest companies on how to prevent and remedy internal and external security penetration. For the general public, he developed an effective online learning program arranged in modules and updated regularly to keep up with the rapidly changing digital landscape in which “wild-west” internet bandits constantly seek and find ways to break into our lives.
Terry Cutler is a frequent contributor to media reportage about cyber-crime, spying, security failures, internet scams, and the real social network dangers that families and individuals face every day.
Terry Cutler has coined the term Cyologist™ to describe what he does. His mission is to “help individuals and corporations protect themselves from data breaches and other online cyber threats through his videos, media appearances, coaching products and consulting services.”
- Benoit Dupont - Professor, Canada Research Chair in Cybersecurity and the Research Chair for the Prevention of Cybercrime, Université de Montréal
Benoit Dupont is professor of criminology at the Université de Montréal, where he holds the Canada Research Chair in Cybersecurity and the Research Chair for the Prevention of Cybercrime. He is also the Scientific Director of the Smart Cybersecurity Network (SERENE-RISC), one of Canada’s Networks of Centres of Excellence (NCE). SERENE-RISC brings together government, industry, and academic partners in order to facilitate the mobilization and uptake of evidence-based cybersecurity knowledge. His research interests focus on the governance of security and the use of networked initiatives to enhance offline and online safety, as well as the coevolution of crime and technology, and in particular the social organization of the hacking ecosystem, as well as the evaluation of effective and efficient cybersecurity policies.
- Martin Lemay - Chief Security Officer, Devolutions Inc.
Martin Lemay is the Chief Security Officer at Devolutions Inc. leading security initiatives from risk management to product security controls. For the past years, he acquired a solid technical background as a security professional specialized in penetration testing and operated in most industry sectors from banking, financial and insurance to energy, healthcare, airlines and telecommunications. He also contributed to some open source projects including the most advanced password cracking software “Hashcat” where he implemented GPU attacks on Blake2b and Chacha20. He also spoke at various local events and schools in Canada with a focus on offensive security topics.
- Martin M. Samson - Vice President, Cyberswat
Professional in information security, CGEIT, CISM, CRISC and ISO 27001 lead auditor, Mr. Samson has extensive experience in project management related to information security and resource management. As an information security professional, he is involved at various levels in risk management projects related to the security of information. He demonstrates a good team spirit and ability to communicate effectively with a wide variety of audiences in different situations and contexts. He also provides strategic guidance on compliance and information security, in compliance with industry laws, regulations and best practices.
- Classification and Information Security - Martin M. Samson, Vice President, Cyberswat
Classification and Information Security
IT and OT security must be efficient. To do so companies must invest wisely. Classification must be the corner stone of Security. In this session we will look at the existing Cyber Threats, view a top 10 of data breaches and how classification can help minimize the risk of a Cyber attack as well as help focus your Security budget.
Martin M. Samson
Martin M. Samson, Vice President, Cyberswat
- “Insider Secrets” to How Hackers Are Getting In - Terry Cutler, Founder & Ethical Hacker, Cyology Labs
“Insider Secrets” to How Hackers Are Getting In
This particular session will show attendees a “behind the scenes look” at how hackers harvest as much information on you before launching a targeted attack. At the end of this talk, the audience will be more alert as to what they’re posting online and how it can be used against them. Topics include:
- The problem with modern day security
- Threat agents
- Essential terminology
- The phases hackers use to target you
- Social Engineering awareness
- Real-World hacking demonstration
- Defensive tools
- Much more…
Founder & Ethical Hacker, Cyology Labs
- Lessons in Cyber-resilience - Benoit Dupont, Professor, Canada Research Chair in Cybersecurity and the Research Chair for the Prevention of Cybercrime, Université de Montréal
Lessons in Cyber-resilience
Resilience is generally defined as the ability of an organization to cope with and recover after a major shock. It has become very trendy in the cybersecurity field but remains an elusive concept. This presentation will discuss how this concept applies to the practices of cyber-risk managers and incident response teams: why is it becoming so central in their toolbox? What are its origins and components? How is it implemented and what lessons have been learned by those who have had to overcome shocks such as major hacks and massive data breaches? In a world where cyber-risks have become unavoidable, and to a certain extend unpreventable, while posing an existential threat to the survival of digitally-dependent organizations, this presentation will offer some preliminary insights on a research project that examines how the technical and cultural dimensions of cyber-resilience interact in large complex organizations in general and in financial institutions in particular. It will introduce the existing standards, methodologies, practices and metrics advocated to enhance an organization’s cyber-resilience, and will share some of the preliminary results obtained from interviews conducted with the CISOs, CROs, and incident response professionals of major financial institutions, as well as their service providers and regulatory authorities. A core issue will be to identify how organizations can prepare to deal with uncertainty in a highly connected environment where they engage with a sprawling network of partners, competitors, service and security providers.
Professor, Canada Research Chair in Cybersecurity and the Research Chair for the Prevention of Cybercrime, Université de Montréal
- Breaking AES like a Bowss! - Martin Lemay, Chief Security Officer, Devolution Inc.
Breaking AES like a Bowss!
The objective of the workshop is to give attendees a solid and practical understanding on how the most popular encryption standard used today (AES) can be misused and expose applications to data breaches. Examples based on my own experience on various engagements will be used to show multiple attacks on this block cipher including chosen plaintext attacks, chosen ciphertext attacks and padding oracles. Attendees will receive a proper background on AES internals and AES modes of operation from ECB to GCM (including CBC and CTR) before diving into attack concepts and exercices. The following specific topics should fit in 1h50:
- AES internals
- AES ECB vulnerabilities and attacks
- AES CBC vulnerabilities and attacks
- AES CTR vulnerabilities and attacks
- AES authenticated HMAC/GCM solutions and limitations
Chief Security Officer, Devolution Inc.
Submit your proposal to be a speaker or workshop facilitator in one of the following areas mentioned above.
Speaker submissions will be reviewed by the conference committee.
- Your presentation may not contain sales pitches.