Fwd: TASK April Event / SecTor 2010 Registration

Colin McGregor colin.mc151-Re5JQEeQqe8AvxtiuMwx3w at public.gmane.org
Thu Apr 22 15:51:14 UTC 2010


For those interested in IT security...

Colin McGregor

---------- Forwarded message ----------
From: TASK Steering Committee <info-xmqwG2hw2hQ at public.gmane.org>
Date: Thu, Apr 22, 2010 at 11:19 AM
Subject: TASK April Event / SecTor 2010 Registration


================================================
April TASK Meeting
Health Sciences Building,
155 College Street, HS 610
28 April 2010,  6:00 PM - 9:00 PM
================================================


Presentation 0.5 - Conference Overview
Robert Beggs, DigitalDefence
The Trilateral Security Conference (Calgary) and the Canadian
Technical Security Conference (Cornwall) will be reviewed.  The
Trilateral Conference highlighted security in Western Canada, and some
of the special issues in this energy-focused market.  The CTSC was an
annual conference focused on technical security - "bugs", and "bug
sweeping".

Presentation 1 - Covert Use of Data Resources Robert Beggs, DigitalDefence
A data system (laptop, iPhone) can not only be hacked, but it can be
used to conduct covert surveillance on a target.  Keyloggers and
compromised cameras and microphones extend surveillance capabilities.
This talk will provide an overview and practical examples on how
systems are compromised, as well as how to rapidly detect and respond
to the compromise.

Presentation 2 - An Examination of Two Recent Attacks + "Hacking" Certifications
Terry Cutler, Security Researcher
The Aurora breach that targeted Google and 34 other companies, and the
kneber botnet variant that managed to infiltrate nearly 2,500
corporate networks, are targeted attacks.  During the first half of
our talks, we will use cutting-edge tools such as CORE IMPACT to
demonstrate how there worked (and why they were so  effective), and
how to detect and mitigate their effects. The attack will also
demonstrate getting access to a corporate using a spear-phishing
attack via Linkedin.

During the second half of the talk, we'll switch gears to talk about
the practice of certifying ethical hackers/penetration testers.  Which
certification is "the best one", and how is the market accepting these
certifications?  Come prepared for a lively discussion!

================================================
The Security Education Conference in Toronto, SecTor 2010 early bird
registration is open!  Pricing goes up from $499 to $750 in May, so be
sure to buy your tickets now!  Use TASK member discount code
IND-TASK-2010 to save an additional 10%.  There will never be a higher
value in training than buying your ticket now.  New this year is a
management track in addition to the 3 deeply technical tracks SecTor
has become known for.  With content for everyone, its the event you
won't want to miss.  Go to http://www.sector.ca to register.
================================================
--
The Toronto Linux Users Group.      Meetings: http://gtalug.org/
TLUG requests: Linux topics, No HTML, wrap text below 80 columns
How to UNSUBSCRIBE: http://gtalug.org/wiki/Mailing_lists





More information about the Legacy mailing list