IT Connect

IT Connect is a conference organized yearly by Champlain College Saint-Lambert. In 2019, the theme will revolve around Cybersecurity. The conference presents a great opportunity to see speakers from many high-profile organizations, while also presenting valuable networking opportunities throughout. As a public college, Champlain offers a multitude of IT-related programs and courses, and is both a Cisco Networking Academy as well as an AWS Academy. The IT Connect conference series is thus one of many aspects of Champlain's commitment to IT - and has more than doubled in size in nearly all categories from the first year it was offered.

New technologies are appearing faster than ever before, and as they do, new hacks and cyber-attack opportunities inevitably follow. It is thus important to have a strong understanding of the security efforts taken by organizations, including the latest standards, frameworks, and best practices. 

Topics at IT Connect 2019 will include:

• Threat Intelligence/Management • General Data Protection Regulation (GDPR) • Vulnerability Management
• IoT Related Threats • Cloud Security • Blockchain
• Data Protection • Artificial Intelligence • Employee Monitoring & Surveillance
• Governance, Risk & Compliance • Security Awareness & Capacity Building  

IT Connect 2019 Has Wrapped Up

IT Connect 2019 "Cybersecurity" (June 7th) has wrapped up for another year and garnered the presence of 260 attendees who enjoyed a wide range of presentations, workshops and panels. This annual conference is an extraordinary opportunity to hear from and connect with tech experts, IT vanguards and business leaders to learn more about new industry developments, surprising innovations and trending IT solutions.

At the conference, participants interact with a broad range of professionals and students from diverse fields (banking, engineering, academia, etc.) They also get to network with each other during the group lunch hour and a special post-conference cocktail party. That’s why we call it IT Connect!

For news about current or future IT Connect conferences, please see our Events or News sections, as well as our LinkedIn, and Twitter feeds.

If you'd like to collaborate with us in 2020 please email us at: itconnectconference@crcmail.net 

Presentations
Data Center Security: The Ins and Outs of Keeping Your Data Safe and Sound - Eric Charpentier, Enterprise Architect, eStruxture Data Centers

Data Center Security: The Ins and Outs of Keeping Your Data Safe and Sound

eStruxture Data Centers In this session, you will learn about how a data center is secured from the moment a construction project starts all the way to how your data is safely stored. You will learn about safety standards, policies and rigorous audits they have to go through as well as how physical security plays a big part of the cyber security strategy. You will learn through anecdotes and battle scars from someone who has been in the trenches for over 20 years.

Technical Difficulty: ★ (easy for all to follow)

Eric Charpentier

Eric Charpentier


Enterprise Architect, eStruxture Data Centers
GDPR - La naissance d'une conformite européenne a l'avenir internationale - David Krzesiak, Presales Security Expert, Fortinet

GDPR - La naissance d'une conformite européenne a l'avenir internationale

Fortinet Depuis 10 ans, les lois se succèdent dans les différents pays européens afin d'accroitre le niveau de sécurité. De la loi informatiques et libertés, en passant par la loi anti-terroriste jusqu'à la naissance de GDPR en 2018, de nombreuses facettes de la sécurité doivent maintenant être considérées dans les entreprises européennes, mais pas que...

Et en ce sens, en réponse à l'augmentation mondiale des risques de sécurité, pourquoi ne pas voir un avenir international a GDPR?

Après une vision globale sur GDPR, ses apports et ses contraintes, nous verrons en quoi son déploiement grande échelle pourrait être bénéfique, en particulier sur le territoire canadien.

Technical Difficulty: ★ ★ (intermediate knowledge required in area discussed)

David Krzesiak

David Krzesiak


Presales Security Expert, Fortinet
Machine Learning for Cyber Security - Steve Como, Cyber Security Specialist, Cisco

Machine Learning for Cyber Security

Cisco If every security vendor is claiming the use of machine learning, how do you separate the marketing from the technical value these products deliver? You should not have to become a data scientist to perform this evaluation. Join me as I debunk the hype, define machine learning and outline how it can deliver more effective security and not just hype.

Technical Difficulty: ★ (easy for all to follow)

Steve Como

Steve Como


Cyber Security Specialist, Cisco
Privacy in the Workplace and Threat Monitoring - Marc-Andre Frigon, Information Security Director, Genetec

Privacy in the Workplace and Threat Monitoring

Genetec Security risks to organizations are pretty common, but privacy expectations in the workplace vary across the globe. The challenge is how to properly secure a global organization while not crossing the thin line between protecting the organization while not demoralizing employees. Not only would some expect a form of privacy at work, but things like end-to-end encryption have led to new methods that will ensure that security incidents are promptly detected.

Technical Difficulty: ★ ★ (intermediate knowledge required in area discussed)

Presentation: Download

Marc-Andre Frigon

Marc-Andre Frigon


Information Security Director, Genetec
Classification and Information Security - Martin M. Samson, Senior Vice-President Cybersecurity, Groupe CCI

Classification and Information Security

Groupe CCI IT and OT security must be efficient. To do so companies must invest wisely. Classification must be the corner stone of Security. In this session we will look at the existing Cyber Threats, view a top 10 of data breaches and how classification can help minimize the risk of a Cyber attack as well as help focus your Security budget.

Technical Difficulty: ★ ★ (intermediate knowledge required in area discussed)

Presentation: Download

Martin M. Samson

Martin M. Samson


Martin M. Samson, Senior Vice-President Cybersecurity, Groupe CCI
Cybersecurity - from Its Humble Beginnings to Current and Future Importance - Oliver Wloch, Managing Director, IT-synapse

Cybersecurity - from Its Humble Beginnings to Current and Future Importance

IT synapseComputing has come a long way. In the very beginning, people were excited about its possibilities and Cybersecurity did not play big role, yet. It was not missed much, either. However, the more computers were used in everyday life, the more was to be gained from manipulation and theft. Considering the importance computing plays in our daily lifes, even its very foundations are still too fragile.

This talk will give an overview of how Cybersecurity started, what is considered state of the art and which structural weaknesses we can already observe that are going to become tomorrow's challenges

Technical Difficulty: ★ (easy for all to follow)

 

Oliver Wloch

Oliver Wloch


Global Chief Information Security Officer, IT-synapse
“Insider Secrets” to How Hackers Are Getting In - Terry Cutler, Founder & Ethical Hacker, Cyology Labs

“Insider Secrets” to How Hackers Are Getting In

Cryology LabsThis particular session will show attendees a “behind the scenes look” at how hackers harvest as much information on you before launching a targeted attack. At the end of this talk, the audience will be more alert as to what they’re posting online and how it can be used against them. Topics include:

  • The problem with modern day security
  • Threat agents
  • Essential terminology
  • The phases hackers use to target you
  • Social Engineering awareness
  • Real-world hacking demonstration
  • Defensive tools
  • Much more…

Technical Difficulty: ★ (easy for all to follow)

Terry Cutler

Terry Cutler


Founder & Ethical Hacker, Cyology Labs
Canadian Cybersecurity Strategy - Véronique Ménard, Centre canadien de cybersécurité

Canadian Cybersecurity Strategy

CCCSLast year the federal government launched a new national strategy for cybersecurity and committed to investing $500 million over five years in cybersecurity. Our session will cover the main themes and areas of impacts of the strategy. We will talk about the Canadian Center for Cybersecurity (CCCS), which was an outcome of the strategy, and of its activities. Lastly, we will take a look at the national cyberthreat landscape.

Technical Difficulty: ★ (easy for all to follow)

Presentation: Download

L'an dernier le gouvernement fédéral a lancé sa nouvelle stratégie nationale de cybersécurité et a annoncé des investissement de 500$ millions sur cinq ans pour la cybersécurité. Notre présentation abordera les thèmes principaux de la stratégie ainsi que les domaines sur lesquels elle se concentre. Nous parlerons du nouveau Centre canadien pour la cybersécurité (CCC), résultat de la stratégie, et de ses activités. Et finalement, nous explorerons le panorama des cyber menaces au Canada.

Difficulté technique: ★ (facile à suivre pour tous)

Presentation: Télécharger

Véronique Ménard

Véronique Ménard


Centre canadien de cybersécurité
Lessons in Cyber-resilience - Benoit Dupont, Professor, Canada Research Chair in Cybersecurity and the Research Chair for the Prevention of Cybercrime, Université de Montréal

Lessons in Cyber-resilience

Université de MontréalResilience is generally defined as the ability of an organization to cope with and recover after a major shock. It has become very trendy in the cybersecurity field but remains an elusive concept. This presentation will discuss how this concept applies to the practices of cyber-risk managers and incident response teams: why is it becoming so central in their toolbox? What are its origins and components? How is it implemented and what lessons have been learned by those who have had to overcome shocks such as major hacks and massive data breaches? In a world where cyber-risks have become unavoidable, and to a certain extend unpreventable, while posing an existential threat to the survival of digitally-dependent organizations, this presentation will offer some preliminary insights on a research project that examines how the technical and cultural dimensions of cyber-resilience interact in large complex organizations in general and in financial institutions in particular. It will introduce the existing standards, methodologies, practices and metrics advocated to enhance an organization’s cyber-resilience, and will share some of the preliminary results obtained from interviews conducted with the CISOs, CROs, and incident response professionals of major financial institutions, as well as their service providers and regulatory authorities. A core issue will be to identify how organizations can prepare to deal with uncertainty in a highly connected environment where they engage with a sprawling network of partners, competitors, service and security providers.

Technical Difficulty: ★ (easy for all to follow)

Benoit Dupont

Benoit Dupont


Professor, Canada Research Chair in Cybersecurity and the Research Chair for the Prevention of Cybercrime, Université de Montréal
Using Threat Intelligence to Secure IoT - Steve Skoronski, National Security Architect, Check Point Software

Using Threat Intelligence to Secure IoT

Check PointThis session will focus on real-world examples of threats and their impact on organizations and individuals. Countermeasures and strategies for architecting security controls will be explored in the context of comparing observed behaviors with real-time threat intelligence feeds from many sources.

Technical Difficulty: ★ ★ (intermediate knowledge required in area discussed)

Presentation: Download

Steve Skoronski

Steve Skoronski


National Security Architect, Check Point Software
Les données...les diamants des entreprises - Jean Dion, Senior Consultant IT Architecture, Zones-Info

Les données...les diamants des entreprises

Zones-InfoDans le contexte actuel de l'informatique, les données des applications représentent la plus grande valeur des entreprises. Google, Facebook, Amazon, Apple et autres utilisent les données pour dominer leurs marchés respectifs. Au fil du temps, les technologies changent rapidement mes les données demeures la source de toutes décisions. Comment les protéger, les rendre disponibles tout en demeurant conforme aux lois.

Technical Difficulty: ★ ★ (intermediate knowledge required in area discussed)

Jean Dion

Jean Dion


Senior Consultant IT Architecture, Zones-Info
Why Automation is Significant in Securing our Digital Way of Life - Garry Coldwells, SE Manager, Palo Alto Networks

Why Automation is Significant in Securing our Digital Way of Life

Palo Alto NetworksThe role automation plays in many aspects of life will be related to the role it plays in cybersecurity. We have a skills gap that is enormous and automation can help us bridge a part of this.

My intent is to highlight the benefits of automation but also reinforce the need for trained, skilled people in cybersecurity.

Technical Difficulty: ★ ★ (intermediate knowledge required in area discussed)

Presentation: Download

Garry Coldwells

Garry Coldwells


SE Manager, Palo Alto Networks
Demos
How Malware Defends Against the Industry - Suweera De Souza, Independent Malware Researcher

How Malware Defends Against the Industry

Over to the dark side. Just as in cybersecurity, malware authors too need to adapt to mitigate AV industry defense strategies in an unending arms race. This session will demonstrate some of the techniques used by malware authors to counter attempts at detection and analysis.

Technical Difficulty: ★ ★ (intermediate knowledge required in area discussed)

Suweera De Souza

Suweera De Souza


Independent Malware Researcher
Workshops
Breaking AES like a Bowss! - Martin Lemay, Chief Security Officer, Devolutions.

Breaking AES like a Bowss!

DevolutionsThe objective of the workshop is to give attendees a solid and practical understanding on how the most popular encryption standard used today (AES) can be misused and expose applications to data breaches. Examples based on my own experience on various engagements will be used to show multiple attacks on this block cipher including chosen plaintext attacks, chosen ciphertext attacks and padding oracles. Attendees will receive a proper background on AES internals and AES modes of operation from ECB to GCM (including CBC and CTR) before diving into attack concepts and exercices. The following specific topics should fit in 1h50:

  • AES internals
  • AES ECB vulnerabilities and attacks
  • AES CBC vulnerabilities and attacks
  • AES CTR vulnerabilities and attacks
  • AES authenticated HMAC/GCM solutions and limitations
Martin Lemay

Martin Lemay


Chief Security Officer, Devolutions.
Hacking et sécurité à la sauce Hackfest! - Patrick Mathieu, Hackfest

Hacking et sécurité à la sauce Hackfest!

HackfestLe comité du Hackfest vous présente un Workshop technique assessible à tous sur une variété de sujets intéressants. Nous ferons des démonstration de SDR, de copie de carte de sécurité vis l'outil de proxmark, une introduction à la formation par concours de hacking (CTF) et un survol du virus Emotet présent dans plusieurs écosystèmes québécois!

Ce workshop/conférence ce veut interactif et parfait pour discuter d'approches et de vecteurs d'attaques connue mais rarement mis de l'avant.

Technical Difficulty: ★ (easy for all to follow)

 

Biographies

Patrick Mathieu:

Patrick is co-founder of Hackfest.ca and has been involved in information security for more than 20 years and currently works as an Offensive Security Lead at Duo Security. Patrick has a Bachelor. and a DEC in computer science. He always been active in the community and in security events around Quebec province. He was also a speaker and offered workshops at Def Con, Blackhat, DerbyCon and several other security events.

Vincent Tremblay:

Vincent gravite dans l’univers et la communauté de sécurité informatique depuis près de 15 ans et l’expérience lui amène cette piqûre voulant instaurer le gros bon sens en matière de [sécurité] TI. Ayant un DEC en technique informatique de réseau, Il travaille en tant qu'analyste en sécurité.

Franck Desert:

Franck Desert (alias Phenix pour les CTFs) 30 ans déjà dans le développement et la sécurité. Analyste en sécurité et architecte organique le jour et de soir il investi son temps dans le Cloud et dans toutes les nouvelles bebels afin de jouer, casser et apprendre pour essayer de vous concocter des Prez et des Ctfs, qu’il espère, vous plaîront. Sinon venez parler avec lui c’est plus simple et autour d’une bonne bière c’est encore mieux. Stay tuned.

Bruno Ouellet:

Bruno travaille dans le domaine de l’informatique judiciaire pour un organisme gouvernemental depuis plus de 15 ans. Il détient un DEC en informatique de gestion, un certificat en cyberenquête et bientôt en cyberfraude. Il s’intéresse donc au vaste domaine du forensic et du eDiscovery, mais aussi au scripting et à la sécurité informatique en général.

Panels
Blockchain

Blockchain

BlockchainWill Blockchain become the defacto way of transferring data across the globe? Being in such an early stage and presenting business challenges and technology gaps, we wonder if this is finally what is coming to revolutionize the data world and how we all perform daily tasks or do business.

What are its benefits, challenges, drawbacks? How can a company jump on this blockchain bandwagon?

Join our panel at IT Connect to get a deeper understanding of Blockchain and what the future behind it holds.

 

 

Participants:

  • Mahsa Moosavi
  • Louis Roy
  • John Shannon
  • Sean Stapley

Moderator:

  • Oliver Wloch

 

Mahsa Moosavi

Mahsa Moosavi


PhD student, Concordia Institute for Information Systems Engineering (CIISE)
Louis Roy

Louis Roy


Partner and Blockchain Leader at Raymond Chabot Grant Thornton
Sean Stapley

Sean Stapley


Director of Business Development, MLG Blockchain
John Shannon

John Shannon


Acting Director General, Digital Technologies Research Centre at the National Research Council of Canada
Oliver Wloch

Oliver Wloch


Managing Director at IT-synapse, Consultant, Trainer
IoT CyberSecurity – A fragmented challenge

IoT CyberSecurity – A fragmented challenge

IoT CanadaNine out of ten consumers today have concerns about IoT security, with the most common being that: a) a hacker gaining control of devices, or b) personal customer data being leaked through IoT devices. These are understandable and prevalent concerns given the large amount of recent media coverage on large-scale hacks and data leaks.

But is it the same thing from an industrial perspective? IoT security is complex and very fragmented along the full IoT stack. Spending on IoT security should always be split between securing the data, the connectivity, the device and the application access.

As a consumer or as a professional involved in the rise of IoT, join this panel to hear the opinions of our experts and learn about the best practices to implement “IoT Security by Design”.

Participants:

  • Paul Berthier, Cybersecurity Advisor, Rhea inc. Canada
  • Dr. Mourad Debbabi, Associate Dean of Research and Graduate studies and leading experts in Cyber Security at Concordia University
  • Walter Knitl, IoT expert, founder of Praxiem and the IoT613 event
  • Fehmi Jafar, Researcher, Centre de recherche en Informatique de Montréal (CRIM) and Adjunct Professor, Concordia University in Edmonton

Moderator:

  • René Breyel, Founder, IoT Canada

 

Paul Berthier

Paul Berthier


RHEA Group

René Breyel

René Breyel


Founder, IoT Canada

Dr. Mourad Debbabi

Dr. Mourad Debbabi


Associate Dean of Research and Graduate studies and leading experts in Cyber Security at Concordia University

Fehmi Jaafar

Fehmi Jaafar


Researcher, Centre de recherche en Informatique de Montréal (CRIM) and Adjunct Professor, Concordia University in Edmonton

Walter Knitl

Walter Knitl


CEO, Praxiem
Presenters
Eric Charpentier - Enterprise Architect, eStruxture Data Centers

Biography:

Eric CharpentierEric Charpentier is a senior industry leader with over 20 years of experience in Telecom and IT. His career spans the fields of development, systems architecture, business intelligence, NOC management & Cyber security. A proponent of design thinking, Eric blends a deep understanding of technology with the expertise required for business success. A seasoned Agile and DevOps practitioner, Eric fosters a culture of collaboration and continuous improvement, helping businesses through their digital transformation journey.

 

 

 

Garry Coldwells - SE Manager, Palo Alto Networks

Biography:

Garry ColdwellsGarry has over 25 years of IT security experience. His experience covers regional, national and global projects of significance in telecomms, financials and government.

With diverse experience in architecting, delivering and evangelizing cybersecurity projects, Garry has spoken at significant events on a variety of security topics.

 

 

 

Steve Como - Cyber Security Specialist, Cisco

Biography:

Steve ComoSteve Como is an IT professional who has covered multiples roles over his young career. Holder of two CCIE certifications, Steve has a technical background in enterprise networking, data center fabrics, and network security. Prior to joining Cisco Montreal as a Cyber Security Specialist, he was a data center and security pre-sales engineer for Cisco Manhattan. Interesting fact: Steve is a graduate of the Champlain College CCNA program!

 

 

 

Terry Cutler - Founder & Ethical Hacker, Cyology Labs

Biography:

Terry CutlerTerry Cutler is a government-cleared cybersecurity expert and the founder and CEO of Cyology Labs in Montréal, Canada. He specializes in the anticipation, assessment, and prevention of security breaches for governments, corporations, businesses, and consumers, as well as Internet Safety for Children.

As an award-winning information security strategist for almost 20 years and was recently named #1 most influential cybersecurity expert by IFSEC Global.

Mr. Cutler has advised some of Canada’s largest companies on how to prevent and remedy internal and external security penetration. For the general public, he developed an effective online learning program arranged in modules and updated regularly to keep up with the rapidly changing digital landscape in which “wild-west” internet bandits constantly seek and find ways to break into our lives.

Terry Cutler is a frequent contributor to media reportage about cyber-crime, spying, security failures, internet scams, and the real social network dangers that families and individuals face every day.

Terry Cutler has coined the term Cyologist™ to describe what he does. His mission is to “help individuals and corporations protect themselves from data breaches and other online cyber threats through his videos, media appearances, coaching products and consulting services.”

Jean Dion - Senior Consultant IT Architecture, Zones-Info

Biography:

Jean DionJean Dion started as customer service engineer for StorageTek in 1983, where he was responsible for the installation and maintenance of large mainframe types of devices including tape drives, tape automation robots, disk storage, SSD storage and printers. He then moved to a presales solutions architect position working with the accounts directors at StorageTek, Sun Microsystems, ESI Technologies and Commvault, with a focus on data management and business continuity. Jean was part of Sun Microsystems as a Data Management Ambassador with a focus on short and long term data retention projects such as government archives, National Libraries, TV broadcasters, manufacturing, financial and medical data retention and governance.

 

 

Benoit Dupont - Professor, Canada Research Chair in Cybersecurity and the Research Chair for the Prevention of Cybercrime, Université de Montréal

Biography:

Benoit DupontBenoit Dupont is professor of criminology at the Université de Montréal, where he holds the Canada Research Chair in Cybersecurity and the Research Chair for the Prevention of Cybercrime. He is also the Scientific Director of the Smart Cybersecurity Network (SERENE-RISC), one of Canada’s Networks of Centres of Excellence (NCE). SERENE-RISC brings together government, industry, and academic partners in order to facilitate the mobilization and uptake of evidence-based cybersecurity knowledge. His research interests focus on the governance of security and the use of networked initiatives to enhance offline and online safety, as well as the coevolution of crime and technology, and in particular the social organization of the hacking ecosystem, as well as the evaluation of effective and efficient cybersecurity policies.

 

Marc-Andre Frigon - Information Security Director, Genetec

Biography:

Marc-Andre FrigonLeader chevronné en sécurité de l'information, reconnu pour s'adapter aux objectifs d’affaires et au contexte organisationnel. Ayant un parcours professionnel ponctué de multiples solutions et stratégies efficaces ainsi qu'une saine gestion de la sécurité. Ayant une formation mixe entre divers élément technologiques, la sécurité de l'information et la gestion. Ayant contribuer à l'amélioration de la sécurité de grandes organisations dans différentes industries (services publiques, financier, aérospatial, télécommunication, logiciel, etc.) par la mise en place de programmes sécurité et des solutions technologiques. Création de centres de sécurité opérationel et de surveillance/détection d'incidents dans plusieurs organisations.

 

David Krzesiak - Presales Security Expert, Fortinet

Biography:

David KrzesiakDavid est expert Sécurité préventes au sein de la société Fortinet pour l'Est du Canada. Un parcours très technique qui l'a ensuite emmené vers des fonctions préventes. Sa grande expérience dans plusieurs secteurs d'activités, dont la majeure partie en Europe, lui permet d'avoir une visibilité 360 degré sur les sujets sécurité, que ce soit dans le domaine de l'architecture, de la conformité ou des services manages.

 

 

 

Véronique Ménard - Centre canadien de cybersécurité

Biography:

Véronique MénardLiaison officer at the Communications Security Establishment (CSE) and the Canadian Center for Cybersecurity (CCCS), Veronique generates partnerships with cybersecurity stakeholders in the province of Quebec. Partnerships with industry, academia and not-for-profit cybersecurity stakeholders are essential in implementing Canada's cybersecurity strategy and raising the bar in cybersecurity across the country.

 

 

 

Oliver Wloch - Managing Director at IT-synapse, Consultant, Trainer

Biography:

Oliver WlochOliver is a former military officer. He served in IT operations, the elite Cyberattack Unit and the in-house consultancy of the federal armed forces of Germany. After his service time, he founded his own consultancy focusing on cyber security. While making complex systems more secure is his specialty, he understands that there is no truly secure system unless it "is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards" (Gene Spafford).

 

 

 

Martin M. Samson - Senior Vice-President Cybersecurity, Groupe CCI

Biography:

Martin M. SamsonProfessional in information security, CGEIT, CISM, CRISC and ISO 27001 lead auditor, Mr. Samson has extensive experience in project management related to information security and resource management. As an information security professional, he is involved at various levels in risk management projects related to the security of information. He demonstrates a good team spirit and ability to communicate effectively with a wide variety of audiences in different situations and contexts. He also provides strategic guidance on compliance and information security, in compliance with industry laws, regulations and best practices.

 

 

Steve Skoronski - National Security Architect, Check Point Software

Biography:

Steve Skoronski Steve Skoronski is an Information Security Professional. He has 19 years of industry experience, focused on: Assessment and Audit, Security Program Development, Critical Infrastructure Security and Threat Intelligence Management. Steve is also active in security associations such as Information Systems Security Association (ISSA) and is a Certified Information Systems Security Professional (CISSP).

His understanding of business security requirements helps him implement solutions that effectively lower and control information security risks in a real business environment. Steve’s professional certifications and industry experience allowed him to develop expertise in these areas: Cloud security (AWS, Azure, VMware, ACI) ethical hacking, penetration testing, controls implementation, evasion, tuning, monitoring, information reconnaissance, cryptography, vulnerability research and discovery, incident response, He has performed successful penetration tests against networked commodity exchange systems, financial securities companies, enterprise environments and industrial facilities. Steve leverages this experience to elevate the complete understanding of security risks, and the most effective ways of mitigating and responding to an ever moving risk landscape.

Suweera De Souza - Independent Malware Researcher

Biography:

Suweera De SouzaSuweera De Souza is a Reverse Engineer specializing in Malware Analysis. She enjoys immersing herself in assembly code, taking part in CTFs and talking malware over beers.

 

 

 

 

Workshop Leaders
Martin Lemay - Chief Security Officer, Devolutions Inc.

Biography:

Martin LemayMartin Lemay is the Chief Security Officer at Devolutions Inc. leading security initiatives from risk management to product security controls. For the past years, he acquired a solid technical background as a security professional specialized in penetration testing and operated in most industry sectors from banking, financial and insurance to energy, healthcare, airlines and telecommunications. He also contributed to some open source projects including the most advanced password cracking software “Hashcat” where he implemented GPU attacks on Blake2b and Chacha20. He also spoke at various local events and schools in Canada with a focus on offensive security topics.

 

 

Patrick Mathieu, Hackfest

Biography:

HackfestPatrick is co-founder of Hackfest.ca and has been involved in information security for more than 20 years and currently works as an Offensive Security Lead at Duo Security. Patrick has a Bachelor. and a DEC in computer science. He always been active in the community and in security events around Quebec province. He was also a speaker and offered workshops at Def Con, Blackhat, DerbyCon and several other security events.

 

 

Panelists
Paul Berthier - Cybersecurity Advisor, Rhea inc. Canada

Biography:

Paul BerthierPaul Berthier is a cybersecurity advisor for Rhea inc. Canada, specialized in the security of critical infrastructures. He holds a French engineering degree in the field of telecommunication from Telecom ParisTech, Paris and Eurecom, Sophia Antipolis. Paul also attended Polytechnique Montreal, where he developed a secure version of ADS-B, a protocol used by aircraft to broadcast their position. He received his Master of Applied Sciences in Computer Engineering, and spent two years as a research associate in the cybersecurity lab, where he led a research group focused on the security of aviation and Air Traffic Management (ATM).

 

 

Dr. Mourad Debbabi, Associate Dean of Research and Graduate studies and leading experts in Cyber Security at Concordia University

Biography:

Dr. Mourad DebbabiMourad Debbabi is a Full Professor at the Concordia Institute for Information Systems Engineering and Associate Dean Research and Graduate Studies at the Gina Cody School of Engineering and Computer Science. He holds the NSERC/Hydro-Quebec Thales Senior Industrial Research Chair in Smart Grid Security and the Concordia Research Chair Tier I in Information Systems Security. He is also the President of the National Cyber Forensics and Training Alliance (NCFTA) Canada. He is also a member of CATAAlliance's Cybercrime Advisory Council. He serves on the bords of the Canadian Police College, PROMPT Quebec and Calcul Quebec. He is the founder and one of the leaders of the Security Research Centre at Concordia University. In the past, he was the Specification Lead of four Standard JAIN (Java Intelligent Networks) Java Specification Requests dedicated to the elaboration of standard specification for presence and instant messaging. Dr. Debbabi holds Ph.D. and M.Sc. degrees in computer science from Paris-XI Orsay, University, France. He published 3 books and more than 300 peer-reviewed research articles in high-impact peer-reviewed international journals and conferences on cyber security, cyber forensics, privacy, cryptographic protocols, threat intelligence generation, malware analysis, reverse engineering, smart grid security, programming languages and type theory, and specification and verification of safety-critical systems. He supervised to successful completion 30 Ph.D. students, 72 Master students and 13 Postdoctoral Fellows. He served as a Senior Scientist at the Panasonic Information and Network Technologies Laboratory, Princeton, New Jersey, USA; Associate Professor at the Computer Science Department of Laval University, Canada; Senior Scientist at General Electric Research Centre, New York, USA; Research Associate at the Computer Science Department of Stanford University, California, USA; and Permanent Researcher at the Bull Corporate Research Centre, Paris, France.

Fehmi Jaafar - Researcher at the Centre de recherche en Informatique de Montréal (CRIM) and adjunct professor at Concordia University in Edmonton

Biography:

Fehmi JaafarFehmi Jaafar is a researcher at the Centre de recherche en Informatique de Montréal (CRIM) and an adjunct professor at Concordia University in Edmonton. Dr. Jaafar holds a PhD in computer science from the Department of Computer Science and Operational Research at the Université de Montréal. He is specialized in cybersecurity research, notably at Queens University and Polytechnique Montréal. He is interested in cybersecurity in the Internet of Things, in the evolution, security and quality of software, and in the application of machine learning techniques in cybersecurity.

 

 

Mahsa Moosavi - PhD student, Concordia Institute for Information Systems Engineering (CIISE)

Biography:

Mahsa MoosaviMahsa is a PhD student at the Concordia Institute for Information Systems Engineering (CIISE). She has a strong research professional with a Master’s Degree focused in information systems engineering from Concordia University. During Summer 2018, she worked as a research intern at autorité des marchés financiers, Montreal, QC, where she was involved in the project that applied blockchain technologies to build decentralized exchange systems. Her research interests include blockchain technologies, Fin-Tech, and TLS and the CA trust model. Mahsa has also given many tutorials to the broader blockchain community.

 

 

Louis Roy - Partner and Blockchain Leader at Raymond Chabot Grant Thornton

Biography:

Louis Roy Louis Roy has over 25 years of audit experience. He is in charge of carrying out large-scale engagements and has extensive experience with financial institutions, public companies, and regulated and governmental entities. He is a National Assurance Director and is in charge of the Firm’s work methods and tools group.

 

 

 

 

John Shannon - Acting Director General, Digital Technologies Research Centre at the National Research Council of Canada

Biography:

John Shannon John Shannon is the acting Director General, Digital Technologies Research Centre at the National Research Council of Canada, where he leads world-class researchers advancing the leading edge of artificial intelligence, blockchain, cybersecurity and data analytics.

Previously, John spent over four years as an Industrial Technology Advisor (ITA) with NRC’s Industrial Research Assistance Program. Prior to joining the National Research Council, John held a variety of executive leadership roles in both small and large organizations in the private sector. He spent almost a decade as an entrepreneur and angel investor, and his most successful start-up was acquired by PayPal for $1B in 2008. Before that, he spent almost two decades at Bell Northern Research and Nortel, ending as VP, Technology, of the business venture that was spun out to become Bill Me Later, where he held the position of CTO.

Sean Stapley - Director of Business Development, MLG Blockchain

Biography:

Sean StapleySean is Director of Business Development at MLG Blockchain, a global venture creation and advisory firm that focuses on blockchain technology development and investor relations services. He and his team lead client acquisition, risk analysis and strategic partnerships across each of MLG’s lines of business.

Prior to MLG, Sean worked at several disruptive Canadian Fintech firms in roles within operations, sales and venture capital, and he has a keen interest in emerging technologies that aim to have a positive social impact.

 

Walter Knitl - CEO, Praxiem

Biography:

Walter KnitlWalter is CEO at Praxiem helping clients to discover and deliver their technology innovations through market research, product management, and business development. Also, as Co-Founder and Chief of Business Development at IoT613 he co-produces an annual Internet of Things conference, helping IoT actors learn, interact and connect with each other.

He advocates IoT as a lever for economic growth and social good through Praxiem IoT workshops and talks and the IoT613 conference.

Walter has a record of successful ICT product introductions at Ericsson, Nortel, Mitel, Ontario Centre for Microelectronics and Bell-Northern Research. His extensive experience consists of business roles including Product Management, Account Management, and Commercial Management, as well as technical roles in hardware and software R&D and telecommunication standards development

 

Submit your proposal to be a speaker or workshop facilitator in one of the following areas mentioned above.

Speaker submissions will be reviewed by the conference committee.

Please note:

  • Your presentation may not contain sales pitches.
  • The application deadline is February 1st, 2019.

View Sponsorship Options

Title

Cisco

Gold

BDH Collective Ungava
CBCI
 

Silver

Devolutions Check Point

Friends

Fibrenoire Dritt Hackfest


 
See the Conférence Cisco NetAcad 2019 event page.