Security Application Developer – Threat Intelligence, GoSecure
Talk: “The History and Analysis of Stuxnet”
Lilly works with GoSecure on Threat Intelligence and started her journey being mostly self-taught making hacking tools in her spare time. Chameleon (custom base64 steganography), Badger (DLL Security Enumeration including ASLR Entropy), Dirty-Needle (DLL Injection Tool) and more. She has presented at the Atlantic Security Conference on PE File Structure Security Enumeration and Custom Base64 Steganography, Hask (Halifax Area Security Klatch) on using file upload vulnerabilities to obtain shell access to a webserver using injection techniques, she has also presented at Digital Discovery Camp for kids on Phishing Awareness and SQLi with interactive demos helping children understand Cyber Security and how to keep an ethical approach, at the same time she is making Cyber Security a more attractive profession to young people.anography), Badger (DLL Security Enumeration including ASLR Entropy), Dirty-Needle (DLL Injection Tool) and more. She has presented at the Atlantic Security Conference on PE File Structure Security Enumeration and Custom Base64 Steganography, Hask (Halifax Area Security Klatch) on using file upload vulnerabilities to obtain shell access to a webserver using injection techniques, she has also presented at Digital Discovery Camp for kids on Phishing Awareness and SQLi with interactive demos helping children understand Cyber Security and how to keep an ethical approach, at the same time she is making Cyber Security a more attractive profession to young people.
Director Americas International Engineering, Checkpoint
Talk: “Internet of Things: Is Winter Coming?”
Robert Falzon is currently the Director Of Field Engineering, Americas International for Check Point Software Technologies Inc., worldwide leader in securing the internet.
Rob has provided his expertise and security training to private and public sector customers all over the world, with experience living and working in Canada, Europe and the Middle East and Latin America.
Robert has developed a friendly, often entertaining approach to engaging customers in security presentations and discussions, and is often sought for opportunities where presentation and delivery are key to developing customer relationships and winning business.
Wilco van Ginkel
CEO & Founder, a3i
Talk: “Trust or Not to Trust AI: That’s the Question…”
Wilco van Ginkel is a seasoned professional and entrepreneur with in-depth knowledge and extensive (international) working experience in the field of Cyber Security, Big Data, Cloud, and Artificial Intelligence (AI). He fulfilled various roles at strategic, tactical and operational levels within companies. He founded two Canadian organizations: a3i and Seculior. He also founded international organizations, such as the CSA Big Data Working Group and the CSA Dutch Chapter. He enjoys being a public speaker, author and lecturer. Wilco holds Master Degrees in Business Economics, Computer Science, Information Security, and Business Administration (MBA), as well as different certifications in AI and Cyber Security.
Systems Engineer, Palo Alto
Talk: “Winning Friends and Influencing People in Cyber Security, aka Passive Social Engineering”
David Ghosh is a Systems Engineer. He has been working in the cyber security field since 2007. In the Telecom space he led sec ops, managed security services, and Network Security Engineering.
Lead Architect, IBM Security
Talk: “A Gentle Introduction to MITRE ATT&CK”
Jason Keirstead is an IBM Senior Technical Staff Member and a senior product architect for IBM Security. He has over 15 years’ experience in security intelligence, and is also a co-chair of the OASIS Cyber Threat Intelligence Technical Committee. Jason has spoked on cybersecurity matters at events such as RSA, Borderless Cyber Europe, and IBM THINK.
Senior Solutions Architect, SentinelOne
Talk: “Advanced Attackers Hiding Inside Encrypted Traffic at the Endpoint”
Matthew Balcer is the Senior Solution Engineer for SentinelOne in Canada. Matthew has spent over a decade consulting customers on building networks, communication platforms, and cyber security. Prior to joining SentinelOne to support their innovative endpoint protection he worked for industry leaders such as Cisco and Kaspersky Lab. A passionate evangelist for cyber security, he is a frequent speaker and panel member helping customers understand the threat landscape and measures to defend against it.
OTSOC Engineer, Siemens
Talk: “Cyber Security on ICS Networks”
Dr. Mian Zhou received her Ph.D. in computer science from University of Central Florida, and she is currently employed with Siemen Canada Cyber Research Center as a OTSOC Engineer for ICS/OT. Her experience is primarily in information security for financial organizations such as banks and Fin-tech companies. She has over 14 years of experience in varies aspect of cyber security for IT, and her current priority is to adapt the cyber defense practices from IT field to ICS/OT field.
Solution Engineer, Aruba/HPE
Talk: “User Behaviour Analytics Compete with Traditional Security Detection Technologies”
Over 17 years of Information Security experience in various security domains like Threat Intelligence, User and Entity Behaviors Analytics (UEBA), Malware Analysis, Security Operation Centre(SOC), SIEM, Incident Management, Malware Analysis, Forensic Analysis, Security Architecture(Design & Review) & Security Consulting.
CISO, Halifax Regional Police
Talk: “From Boot to Root – Building Offensive Security Skills”
Andrew Kozma is the Chief Information Security Officer for the Halifax Regional Police. He works with the HRP Executive Management team providing strategic planning and risk management services around the use and adoption of digital technology supporting law enforcement. As Co-founder of Atlantic Canada’s largest security conference AtlSecCon and the Halifax Area Security Klatch Andrew is also heavily involved in improving the information security community. Prior to joining the Halifax Regional Police, Andrew was employed by a leading security company and has worked on several information security mandates that focus on cyber security architecture assessments and information security management reviews. Further, Andrew has assisted organizations in developing information security management systems, performing IT risk assessments and infrastructure analysis.
Founder, Kensho Security Labs
Talk: “Freelancer’s Guide to Operational Security”
A self-taught hacker and small-time developer and reverse engineer from right here in Fredericton. I have a broad base of knowledge in the security space, ranging from physical-side considerations to systems and even social engineering. Together with my good buddy GingerHat, I tried (semi-successfully) to start a New-Brunswick based DEFCON group. My day job is boring so I spend my spare time developing two equally-boring projects – a backup/recovery tool called Tapestry and Tarnished Tale, a “ruleset” module for a popular python-based mud Engine, Evennia.
Technical Lead – Security Operations
Talk: “An Arms Race in Security”
Reg MacWilliams is a New Brunswick based IT professional, with 19 years experience – with the last 10 focused in security. He has Information Security experience in multiple industries – retail, manufacturing, government, education, transportation to name a view. His certifications include CISSP, SANS GCIA and GWAPT.
Senior Sales Consultant, McAfee Canada
Talk: “Deepfakes and fake news…”
Mr. Dumas has over 30 years’ experience in the vendor IT community assisting Canada largest organizations deploy and secure effective business solutions across Eastern Canada. Mr. Dumas’s expertise at McAfee spans across endpoint, malicious code and data protection, advanced threat defense as well as data analytics and SIEM solutions. Sylvain often speaks at various events where his topics run the gamut of security effectiveness.
Security Analyst, Bulletproof
Talk: “Lies, Traps, and Other Fun Stuff”
Evans is a N.B. based Security Analyst. While relatively new to the industry he has managed to attain milestones rather quickly through rigorous study and practice routines. Having played roles from penetration tester to incident responder he has a wide variety of experiences to draw from .To blow off steam he works on boot2root challenges or uses his newfound skills to play pranks on his friends and family.
Senior Security Analyst, Bulletproof
Talk: “Closing the IoT, Wireless Security GAP”
Cyber Security Solutions Advocate, Security Technical Engagement Manager, Holistic Thinker, Threat Hunting Mindset & Team Leader focus on road-map & outcomes leveraging Enterprise Infrastructure, Multi-Tier Application & End-to-End Security Services. Identify Cloud & Security solutions in empowering technologies by providing leadership in consulting, design, integration, implementation, training and support. Strong focus on gaining visibility and protection to increase any organization security posture.
Michael Deschenes (Cyber Security/Cloud Advocate) has an incredible insight how critical technology is to any businesses. Michael has strong management skills in IT/Cloud Operations Management, Security Forensic & SIEM, Business/Digital Transformation Projects, Infrastructure, Private/Public/Local Hosting Services and can adapt to any complex business & technology systems. Able to wear multiple hats when required, swift use of technical skills & dealing with customer relations to quickly diagnose and resolve complex issues.
Provide IT Solutions in (Infrastructure & Application Services, Web & Cloud Operations, Application Performance Management, Security Platforms SIEM/IDS/IPS/URM/Endpoint, IT Service Management, Solution Architect Services, Content & Portal Management Systems, Analytics/Operational Intelligence, and Client Relations & Customer Support) emphasis in empowering technologies by providing leadership in consulting, design, integration, implementation and support.
Diverse background managing highly resilient cross-platform architectures from medium to large traditional IT Enterprise & Hybrid Cloud environments.
Industry designations & hands-on experience in all aspects of Cyber Security Solutions (NGAV+EDR Endpoint Protection, IDS, IPS, SIEM and NGFW+UTM), IT Services & Operations Management, Storage / Network / and ITIL methodologies.