SECTOR 2024
Wednesday | 8:00am
Briefings Breakfast
Track
:
Location
: Hall D, Level 800
Wednesday | 9:00am
Keynote: Protecting Canadian Democracy - What Security Professionals Can Do
Keynote:
Leigh Honeywell
Track
: Keynote
Format
: 60-Minute Keynote
Location
: Hall F, Level 800
Wednesday | 10:15am
Beyond Metrics: Cultivating a Culture of Continuous Improvement in Detection & Response
Speaker:
Zach Zeid
Tracks
: Security Essentials & Lessons Learned, Defense & Enterprise Security
Format
: 45-Minute Briefings
Location
: Room: 718B
Fortifying Authentication: Technical Dive into Phishing-Resistant MFA
Speaker:
Julien Richard
Tracks
: Defense & Enterprise Security, Network & Platform Security
Format
: 45-Minute Briefings
Location
: Room: 801B
Hacking Deepfake Image Detection System with White and Black Box Attacks
Speaker:
Sagar Bhure
Tracks
: Emerging Tech, AI, ML, & Data Science
Format
: 45-Minute Briefings
Location
: Room: 718A
To Brake or to Break: The Game of Intrusion, Detection and Evasion on CAN
Speaker:
Stefano Zanero
Tracks
: Cyber-Physical Systems & IoT, AI, ML, & Data Science
Format
: 45-Minute Briefings
Location
: Room: 714
Unmasking Cyber Threats: Command Line Data Meets Small Language Models
Speaker:
Hari Manassery Koduvely
,
Speaker:
Maria Pospelova
Tracks
: AI, ML, & Data Science, Threat Hunting & Incident Response
Format
: 45-Minute Briefings
Location
: Room: 801A
Wednesday | 11:45am
Briefings Lunch
Track
:
Location
: Hall D, Level 800
Wednesday | 1:15pm
FAIL by the Dozen
Speaker:
James Arlen
Track
: Security Essentials & Lessons Learned
Format
: 45-Minute Briefings
Location
: Room: 714
Guardians of the OAuth Galaxy: Defending Your Organization from OAuth Application Attacks
Speaker:
Mangatas Tondang
,
Speaker:
Shruti Ranjit
Tracks
: Defense & Enterprise Security, Cloud Security
Format
: 45-Minute Briefings
Location
: Room: 718B
Harnessing the Power of Velociraptor: Taking Investigations to the Next Level
Speaker:
Julian Pileggi
Tracks
: Threat Hunting & Incident Response, Emerging Tech
Format
: 45-Minute Briefings
Location
: Room: 801A
Simplified Malware Evasion - Entropy and Other Techniques
Speaker:
Will Summerhill
Track
: Malware & Human Factors
Format
: 45-Minute Briefings
Location
: Room: 801B
TPMs and the Linux Kernel: Unlocking a Better Path to Hardware Security
Speaker:
Ignat Korchagin
Tracks
: Hardware / Embedded, Network & Platform Security
Format
: 45-Minute Briefings
Location
: Room: 718A
Wednesday | 2:00pm
Briefings Coffee & Tea Break
Track
:
Location
: Hall D, Level 800
Wednesday | 2:15pm
AI Apocalypse Prevention 101: Meet AIBOM, Your New Best Friend!
Speaker:
Helen Oakley
,
Speaker:
Larry Pesce
Tracks
: Emerging Tech, AI, ML, & Data Science
Format
: 45-Minute Briefings
Location
: Room: 714
A New People-Centric Approach to Determining an Organization's Exposure to a Third-Party Data Breach
Speaker:
Christine Dewhurst
,
Speaker:
Dr Thomas Lee
Tracks
: Management, Career & Community, Policy & Privacy
Format
: 45-Minute Briefings
Location
: Room: 801B
BOLABuster: Harnessing LLMs for Automating BOLA Detection
Speaker:
Ravid Mazon
,
Speaker:
Jay Chen
Tracks
: Application Security, AI, ML, & Data Science
Format
: 45-Minute Briefings
Location
: Room: 718A
Practical Artificial Intelligence: Machine Learning for Enhanced Malware Detection, Analysis, & Classification
Speaker:
Solomon Sonya
Tracks
: AI, ML, & Data Science, Reverse Engineering
Format
: 45-Minute Briefings
Location
: Room: 718B
The GCP Jenga Tower: Hacking Millions of Google Servers with a Single Package (and More)
Speaker:
Liv Matan
Tracks
: Cloud Security, Application Security
Format
: 45-Minute Briefings
Location
: Room: 801A
Wednesday | 3:15pm
Career Campaigns: How to Re-Spec Your Professional Class for an InfoSec Role
Speaker:
- Stryker
Track
: Management, Career & Community
Format
: 45-Minute Briefings
Location
: Room: 801B
Guardians of the Load Balancing
Speaker:
Stav Ochakovski
,
Speaker:
Doron Karmi
Tracks
: Cloud Security, Network & Platform Security
Format
: 45-Minute Briefings
Location
: Room: 801A
HookChain: A New Perspective for Bypassing EDR Solutions
Speaker:
Helvio Carvalho Junior
Tracks
: Exploit Development & Vulnerability Discovery, Malware & Human Factors
Format
: 45-Minute Briefings
Location
: Room: 718B
How Manifest Files Are Lying to You, and Why eBPF Is Your Best Lie Detector?
Speaker:
Aleksandr Krasnov
Tracks
: Application Security, Network & Platform Security
Format
: 45-Minute Briefings
Location
: Room: 718A
Isolation or Hallucination? Hacking AI Infrastructure Providers for Fun and Weights
Speaker:
Hillai Ben-Sasson
,
Speaker:
Sagi Tzadik
Tracks
: AI, ML, & Data Science, Cloud Security
Format
: 45-Minute Briefings
Location
: Room: 714
Wednesday | 4:15pm
Creative Command and Control: It Reads, It Writes, It C2s
Speaker:
Ignatius Michael
Tracks
: Malware & Human Factors, Security Essentials & Lessons Learned
Format
: 45-Minute Briefings
Location
: Room: 801B
From HAL to HALT: Thwarting Skynet's Siblings in the GenAI Coding Era
Speaker:
Chris Wysopal
Tracks
: Application Security, AI, ML, & Data Science
Format
: 45-Minute Briefings
Location
: Room: 714
Hello From the Dumpster Fire: Real Examples of Artificially Generated Malware, Disinformation and Scam Campaigns
Speaker:
Ashley Jess
Tracks
: AI, ML, & Data Science, Malware & Human Factors
Format
: 45-Minute Briefings
Location
: Room: 718A
Hunting Certified Imposters
Speaker:
Spence Hutchinson
Tracks
: Threat Hunting & Incident Response, Malware & Human Factors
Format
: 45-Minute Briefings
Location
: Room: 801A
The Pentest Before the Pentest: Using APIs and Free Tools for Infrastructure Reconnaissance
Speaker:
Rob VandenBrink
Tracks
: Security Essentials & Lessons Learned, Defense & Enterprise Security
Format
: 45-Minute Briefings
Location
: Room: 718B
Thursday | 8:00am
Briefings Breakfast
Track
:
Location
: Hall D, Level 800
Thursday | 9:00am
Keynote: The XZ-Utils Backdoor: A Case Study in Software Supply Chain Security and Social Engineering
Keynote:
Omkhar Arasaratnam
Track
: Keynote
Format
: 60-Minute Keynote
Location
: Hall F, Level 800
Thursday | 10:15am
EDR Reloaded = Erase Data Remotely
Speaker:
Shmuel Cohen
,
Contributor:
Tomer Bar
Tracks
: Defense & Enterprise Security, Network & Platform Security
Format
: 45-Minute Briefings
Location
: Room: 801A
Measuring Burnout with Data in a High-Output Team
Speaker:
Joshua Carter
Track
: Management, Career & Community
Format
: 45-Minute Briefings
Location
: Room: 801B
Password Managers: A Band-Aid to Cure a Headache?
Speaker:
Olivier Bilodeau
,
Speaker:
Andréanne Bergeron
Tracks
: Security Essentials & Lessons Learned, Policy & Privacy
Format
: 45-Minute Briefings
Location
: Room: 714
Red Teaming AI: Proactive Security in the Age of Artificial Intelligence
Speaker:
Jeremy Richards
Track
: AI, ML, & Data Science
Format
: 45-Minute Briefings
Location
: Room: 718A
UnOAuthorized: Privilege Escalation to Global Administrator Through Microsoft Applications
Speaker:
Eric Woodruff
Tracks
: Cloud Security, Defense & Enterprise Security
Format
: 45-Minute Briefings
Location
: Room: 718B
Thursday | 11:45am
Briefings Lunch
Track
:
Location
: Hall D, Level 800
Thursday | 1:15pm
15 Ways to Break Your Copilot
Speaker:
Avishai Efrat
,
Contributor:
Michael Bargury
Tracks
: Application Security, Cloud Security
Format
: 45-Minute Briefings
Location
: Room: 718A
Breaching AWS Accounts Through Shadow Resources
Speaker:
Yakir Kadkoda
,
Speaker:
Ofek Itach
,
Contributor:
Michael Katchinskiy
Tracks
: Cloud Security, Defense & Enterprise Security
Format
: 45-Minute Briefings
Location
: Room: 801A
Can You Keep a Secret? Uncovering the Hidden Dangers of Leaked Credentials
Speaker:
Dominik Penner
Tracks
: Security Essentials & Lessons Learned, Application Security
Format
: 45-Minute Briefings
Location
: Room: 718B
Navigating the Evolving Landscape of Cyber Insurance
Speaker:
Danny Pehar
,
Speaker:
Tristan Kim
Track
: Defense & Enterprise Security
Format
: 45-Minute Briefings
Location
: Room: 714
What You Should Know for Your Salesforce Hunt: Navigating Logs, Detecting Threats, and Enhancing CRM Security
Speaker:
Doron Karmi
,
Contributor:
Ariel Szarf
Tracks
: Threat Hunting & Incident Response, Cloud Security
Format
: 45-Minute Briefings
Location
: Room: 801B
Thursday | 2:00pm
Briefings Coffee & Tea Break
Track
:
Location
: Hall D, Level 800
Thursday | 2:15pm
Hiding Payloads in Plain .text
Speaker:
Moritz Thomas
Tracks
: Reverse Engineering, Security Essentials & Lessons Learned
Format
: 45-Minute Briefings
Location
: Room: 718A
Investigate Alerts with EASE (Explain and Suggest Ensemble)
Speaker:
Jane Hung
,
Speaker:
Christina Kim
Tracks
: Security Essentials & Lessons Learned, Emerging Tech
Format
: 45-Minute Briefings
Location
: Room: 801B
Performing DFIR and Threat Hunting with Yamato Security OSS Tools and Community-Driven Knowledge
Speaker:
Fukusuke Takahashi
,
Speaker:
Akira Nishikawa
Tracks
: Defense & Enterprise Security, Threat Hunting & Incident Response
Format
: 45-Minute Briefings
Location
: Room: 718B
Secure and Ethical Implementation of AI
Speaker:
Junior Williams
Tracks
: AI, ML, & Data Science, Emerging Tech
Format
: 45-Minute Briefings
Location
: Room: 801A
SkyScalpel: Making & Breaking {"Policy": "Obf\u0075scA**Tion"} in the Cloud
Speaker:
Daniel Bohannon
,
Speaker:
Abian Morina
Tracks
: Cloud Security, Malware & Human Factors
Format
: 45-Minute Briefings
Location
: Room: 714
Thursday | 3:15pm
A Practical Approach to Post-Quantum Cryptography
Speaker:
Chris Hickman
Track
: Cryptography
Format
: 45-Minute Briefings
Location
: Room: 718B
Integrating AI with Retro Hardware: A Commodore 64 LLM Module
Speaker:
Konrad Jedrzejczyk
,
Speaker:
Marek Zmys³owski
Tracks
: Hardware / Embedded, AI, ML, & Data Science
Format
: 45-Minute Briefings
Location
: Room: 801A
Microsoft at Your BEC and (API) Call: Auditing Mailbox Item Access for Incident Response
Speaker:
Richard Smith
Tracks
: Defense & Enterprise Security, Threat Hunting & Incident Response
Format
: 45-Minute Briefings
Location
: Room: 718A
Russian Cyber: Here and There, Not Everywhere
Speaker:
Ian Litschko
Track
: Malware & Human Factors
Format
: 45-Minute Briefings
Location
: Room: 801B
SecTor 2024: Cutting Through the Cyber Noise - Threats & Trends
Moderator:
Bruce Cowper
,
Panelist:
Vicky Laurens
,
Panelist:
Kellman Meghu
,
Panelist:
Afeerah Waqar
Tracks
: Emerging Tech, Defense & Enterprise Security
Format
: 45-Minute Briefings
Location
: Room: 714