From mobile fraud to synthetic ID to cross-border schemes, what are the most common fraud schemes afflicting Canadian enterprises, and what are the most effective solutions to enhance detection and mitigation? Our expert panelists weigh in with their unique insights.
Google's Android is the most popular mobile operating system in the world, powering over 2.5 billion devices.
In this exclusive session, Mike Burr of Google outlines Android's multi-layered security strategy, which includes hardware and software protections, as well as utilizing the power of machine-learning that...
The new 5G mobile networks are coming, and with them comes the promise of people, industries and things connecting on an unprecedented scale. And also with 5G come significant security concerns about secure infrastructure, connected devices and a new multifaceted attack surface. Telecommunications giant Huawei is one...
Canadian organizations were barely GDPR compliant in mid-2018, and then new PIPEDA changes went into effect in November. Yet, this are but just two of the privacy regulations Canadians have to deal with when doing business globally, and they pose many questions about the role of security to enable privacy - and the...
DevOps is a cultural movement that was started in order to remove silos and enhance how teams collaborate and the role people, process and tech plays in this space. But now we are in the era of DevSecOps, which inserts cybersecurity smack in the middle of this culture - and natural tensions emerge. In this exclusive...
The global shortage of cybersecurity professionals is growing challenge, with millions of positions begging to be filled. And one factor that is hindering Canadian organizations: They cannot import cybersecurity talent. In order to trust individuals to work on critical infrastructure, they must have a traceable...
Join us as we first examine the current state of bot automation and the different attack modalities currently conducted through machine automation. We will dive into attacker tools, their infrastructure, and compromised credentials to demonstrate how they were used against a major retailer in a real-world attack. This...
Canada has taken an aggressive cybersecurity stance in the past few years, with the creation of the Cyber Centre and passage of the Personal Information Protection and Electronic Documents Act (PIPEDA). While these are strong steps to defend Canadians from cyber threats, the threat actors are evolving just as...
When it comes to cybersecurity, the past twelve months have been busy in Canada. With the coming into force of mandatory breach reporting, major court decisions in the Casino Rama and Rouge Valley Hospital cases and headline-grabbing breaches, such as Desjardins and Air Canada, there has been no shortage of lessons...
Cybersecurity tool sprawl has reached unsustainable levels, and research shows 66% of businesses are striving to consolidate their security portfolio. But over-consolidating to a few platform solutions risks creating a vulnerable, innovation-stifling monoculture. If every organization uses a nearly identical set of...
In her role as technology and privacy law specialist, Lisa R. Lifshitz has consulted on contractual discussions for cloud user-organizations of various complexities. As co-editor of the recent book Cloud 3.0: Drafting and Negotiating Cloud Computing Agreements, comes this exclusive session discussing:
Due Diligence...
Asking the right questions is the first critical step in implementing appropriate cyber hygiene and minimizing exposure to regulatory scrutiny and litigation. Too often, organizations fail to ask those questions. Typically, this is because the C-Suite executives, who are expected to engage and oversee cybersecurity,...
The old adage "You cannot protect what you do not know you have" should be updated to say "You cannot protect what you do not know you have and understand its value to your business."
The fundamental gap many organizations face is the ability to identify their critical technology assets and the acknowledgement it is...
The CERT Insider Threat Center at Carnegie Mellon University is one of the world's leading authorities on detecting insider fraud, and it has just released Version 6 of its Best Practices to Mitigating Insider Threats. As part of this research, the center addresses how to detect and prevent insider fraud, as well as...
This session provides an introduction to deception detection, and body language in the world we live in. The presentation begins with a look at micro-expressions and then moves onto verbal and para-verbal indicators of deception, as well and non-verbal indicators of deception. Practical exercises and examples are...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.