2022 HTCIA Canada Cyber Summit
2022 HTCIA Canada Cyber Summit
Tuesday, May 3, 2022 11:00 AM - Friday, May 6, 2022 5:00 PM (EDT)
Description
Join us for the Fourth Annual HTCIA Canada Cyber Summit! This year's event will be hosted online from May 3 through 6 on the HTCIA Conference Hub!
Agenda
This is the most up-to-date version of the agenda. We will continue to update as more information is confirmed.
Tuesday May 3, 2022 | Session Title | Speaker |
11:00-11:45 AM | Cyber Security in Your Hands In this talk, cybersecurity expert, David Shipley, will explore how the meanings of the words "cyber" and "technology" plant the clues for the importance of people and the choices they as individuals and/or as leaders make as the best first line of defense against cyber risks. Shipley will use examples taken from the headlines over the last decade to talk about real examples of real people making all the difference. This presentation will also give practical advice that anyone can use to help protect themselves now and into the future. | David Shipley CEO Beauceron Security Inc. |
12:00-12:45 PM | Vendor Showcase | |
1:00-1:45 PM | QuickHash-GUI - Cross-Platform Data Hashing Made Easy QuickHash-GUI has been a personal open-source project of Teds since 2011. Celebrating its 10th year in 2021, Ted will spend a little time reflecting and talking about how it came to be, what it does, some unique and powerful features, how it can be helpful in DF environments, and what might be next for it, as it approaches its 1 million’th download. | Ted Smith HMRC (Her Majesty's Revenue & Customs) |
3:00-3:45 PM | Key OSINT Skills for New and Emerging Technologies There are several key OSINT skills for understanding how to explore, search, and archive emerging technology. Patterns of app development and social media architecture determine some of the ways investigators can discover the functions and capabilities of new social networks. | Kirby Plessas Plessas Experts Network, Inc. |
4:00-4:45 PM | Current Trends in Cybercrime Presentation on why current trends in cybercrime are occurring and what we might expect for the future. We will also look at cybersecurity recommendations from the point of view of Russian Hacker who was arrested and extradited to the United States. | Steve Gemperle Magnet Forensics |
5:00-5:45 PM | Networking Social | |
Wednesday May 4, 2022 | ||
11:00-11:45 AM | It’s not all Cyber: Exposing Target Behaviours and Motives Over the past few years, funding and executive attention has been directed to cyber and digital concerns, and while those threats are real, the threats of espionage (including surveillance) and sabotage through traditional human and physical means remain. Neal will introduce the domains of security. He will then perform a deep-dive walk-through of a real-world example where he applied his knowledge and experience to capture information about a specific organisation, their people, their behaviours, their actions, and what they may be up-to using public or open sources and other human resources. Regardless of your experience with OSINT, you do not want to miss this intro to intel gathering, all-source research and analysis (reviewing, evaluating, correlating, reporting, and briefing) using a real-world example session of mixing HUMINT, SIGINT, IMINT/GEOINT, FININT and more. | Neal KUSHWAHA IMPENDO |
12:00-12:45 PM | Windows 11, Registry Tips for Forensic Analysts An overview of basic registry tips in the Windows 11 operating system, which always includes fun technical details on topics such as USB and wifi connections. | Greg Bembridge, CET, CCE, CFCE |
1:00-1:45 PM | Non Fungible Token (NFT) Investigation - An Overview The presentation will give an overview of NFT related sources of intelligence as well as investigative techniques. The focus will be on Ethereum ERC721 tokens and the OpenSea platform. | Eric Rowe Criminal Investigations Directorate of Canada Revenue Agency |
2:00-2:45 PM | Forensic Data recovery - Media Cache: A Hidden Vault of Evidence in SMR Hard Drives, and forensic data recovery using PC3000 The Media Cache area of Seagate hard drives may contain a hidden data vault, sometimes up to 90GB. The presentation will outline the theoretical and practical side of accessing this data using PC3000. The speaker will also provide a brief tour of PC3000 along with a quick demo. | Ilia Lvovski Bell Canada |
3:00-3:45 PM | Fight Against Illegal Fishing - Canada's Use of Remote Sensing Technologies Dark Vessel Detection project - Canada’s use of satellite remote sensing & the fight against international illegal fishing. | Sean Wheeler Chief of International Programs @ DFO |
4:00-4:45 PM | A Case of Stolen Research and Development Former FBI Director Louis Freeh once said “Economic Espionage is the greatest threat to our national security since the cold war.” Theft of trade secrets or intellectual property in specific industries have been on the rise since 2016. State sponsored actors target data on research and development, business plans, source code, manufacturing processes, and marketing plans. Today presentation covers an APT case that involves the loss of intellectual property and how organizations can detect and mitigate risks to protect themselves. | Claire Feltrin Deloitte Legal Privacy and Cybersecurity Team Member Neumann Lim Senior Manager, Deloitte |
5:00-5:45 PM | Networking Social | |
Thursday May 5, 2022 | ||
11:00-11:45 AM | Playing Nicely With Lawyers to Provide More Value in Your Engagements Confidentiality and legal privilege are often important to clients, both at the risk management stage and particularly in the aftermath of an incident. This presentation will discuss legal privilege, how it works and how you can collaborate with legal counsel to provide this protection to your clients. | David Fraser McInnes Cooper |
12:00-12:45 PM | Vendor Showcase | |
1:00-1:45 PM | Customising Digital Forensic Capability using the X-Ways Forensics API The X-Ways Forensics API is perhaps one of the most powerful forensic tooling API’s available to us. It can help us create and add bespoke capability to X-Ways Forensics in a very powerful, and fast, way. The API documentation can take some effort to understand though and stops some people even getting started. This talk hopes to help you grasp the fundamentals, from which you can go on to achieve more. | Ted Smith HMRC (Her Majesty's Revenue & Customs) |
2:00-2:45 PM | Digital Forensics & Incident Response + Philosophy = DFIRosopy What do we do? How do we do it? And most importantly, why do we do it? In this talk we will examine what philosophy has to say regarding our work and how this knowledge can inform our actions into the future. Let's take a moment to reconnect to the purpose that brought us to this mission and appreciate that what we do and who we are matters. | Alexis Brignoni abrignoni.com |
3:00-3:45 PM | Building a Critical Infrastructure Security Operations Center Addressing OT and IT Cybersecurity Challenges through Collaboration and Educational Initiatives: NBCC’s Journey in Building a CI-SOC. | Ben McHarg & Scott Henwood, New Brunswick Community College |
4:00-4:45 PM | Remote Imaging PCs and Mobile Devices on a Budget There are great remote solutions on the market. But for technical or financial reasons, that may not be an option. With a bit of help at the other end from a non-forensics person, you can achieve comparable results on a shoestring budget. | Jacques Boucher HTCIA Member |
5:00-5:45 PM | Networking Social | |
Friday May 6, 2022 | ||
11:00-11:45 AM | Future of Digital Evidence Rapidly Changing and Expanding Digital Evidence Sources; Future Challenges and Prospects for Access… | Jim Emerson Vice President NW3C |
12:00-12:45 PM | Vendor Showcase | |
1:00-1:45 PM | The Intersection Between Cybersecurity and eDiscovery The worlds of cybersecurity, digital forensics and eDiscovery have never been more connected with practitioners and organizations often struggling to understand the nature of the information that was accessed or exfiltrated in the context of a cybersecurity incident. In this session, attendees will gain an understanding of eDiscovery principles applicable to cybersecurity investigations and gain an understanding of eDiscovery tools, techniques and workflows that can help to address these challenges. | Chris Walker Senior Manager, KPMG |
2:00-2:45 PM | Python Coding and Parsing Artifacts with LEAPPs Case knowledge indicates an app contains key evidence in your case. Third party tools are invisible to it. A piece of evidence is given to you and particular items of interest are needed immediately. Your regular tooling will take hours to parse it. What can we do in these cases? In this talk we will learn how to use Python to solve the critical issues. We will also show how to leverage the open-source and community driven LEAPP platforms in your digital forensics workflow. | Alexis Brignoni abrignoni.com |
3:00-3:45 PM | HTCIA Presidential Officer Panel | Warren Kruse Denis Roussel Jessica Hyde |
Special HTCIA member pricing is available! Make sure to register using the email associated with your HTCIA member account.
New this year - group registrations can be processed directly in the registration form!
Type | Price |
Professional Member (Members Only) | $175 |
Student Member (Members Only) | $40 |
Non-Member | $275 |
Virtual Event
,
Program will run over four half days from 11:00 AM-5:00 PM ET each day.
130