Skip to content

2022 HTCIA Canada Cyber Summit

2022 HTCIA Canada Cyber Summit

Tuesday, May 3, 2022 11:00 AM - Friday, May 6, 2022 5:00 PM (EDT)


Join us for the Fourth Annual HTCIA Canada Cyber Summit! This year's event will be hosted online from May 3 through 6 on the HTCIA Conference Hub!


This is the most up-to-date version of the agenda. We will continue to update as more information is confirmed.

May 3, 2022
Session TitleSpeaker
11:00-11:45 AM
Cyber Security in Your Hands

In this talk, cybersecurity expert, David Shipley, will explore how the meanings of the words "cyber" and "technology" plant the clues for the importance of people and the choices they as individuals and/or as leaders make as the best first line of defense against cyber risks. Shipley will use examples taken from the headlines over the last decade to talk about real examples of real people making all the difference. This presentation will also give practical advice that anyone can use to help protect themselves now and into the future.

David Shipley
Beauceron Security Inc.
12:00-12:45 PMVendor Showcase
1:00-1:45 PMQuickHash-GUI - Cross-Platform Data Hashing Made Easy
QuickHash-GUI has been a personal open-source project of Teds since 2011. Celebrating its 10th year in 2021, Ted will spend a little time reflecting and talking about how it came to be, what it does, some unique and powerful features, how it can be helpful in DF environments, and what might be next for it, as it approaches its 1 million’th download.
Ted Smith
HMRC (Her Majesty's Revenue & Customs)
3:00-3:45 PMKey OSINT Skills for New and Emerging Technologies
There are several key OSINT skills for understanding how to explore, search, and archive emerging technology. Patterns of app development and social media architecture determine some of the ways investigators can discover the functions and capabilities of new social networks.
Kirby Plessas
Plessas Experts Network, Inc.
4:00-4:45 PMCurrent Trends in Cybercrime
Presentation on why current trends in cybercrime are occurring and what we might expect for the future.  We will also look at cybersecurity recommendations from the point of view of Russian Hacker who was arrested and extradited to the United States.
Steve Gemperle
Magnet Forensics
5:00-5:45 PMNetworking Social
May 4, 2022

11:00-11:45 AMIt’s not all Cyber: Exposing Target Behaviours and Motives
Over the past few years, funding and executive attention has been directed to cyber and digital concerns, and while those threats are real, the threats of espionage (including surveillance) and sabotage through traditional human and physical means remain.

Neal will introduce the domains of security. He will then perform a deep-dive walk-through of a real-world example where he applied his knowledge and experience to capture information about a specific organisation, their people, their behaviours, their actions, and what they may be up-to using public or open sources and other human resources.

Regardless of your experience with OSINT, you do not want to miss this intro to intel gathering, all-source research and analysis (reviewing, evaluating, correlating, reporting, and briefing) using a real-world example session of mixing HUMINT, SIGINT, IMINT/GEOINT, FININT and more.
12:00-12:45 PMWindows 11, Registry Tips for Forensic Analysts
An overview of basic registry tips in the Windows 11 operating system, which always includes fun technical details on topics such as USB and wifi connections.
Greg Bembridge, CET, CCE, CFCE
1:00-1:45 PMNon Fungible Token (NFT) Investigation - An Overview
The presentation will give an overview of NFT related sources of intelligence as well as investigative techniques.  The focus will be on Ethereum ERC721 tokens and the OpenSea platform.
Eric Rowe
Criminal Investigations Directorate of Canada Revenue Agency
2:00-2:45 PMForensic Data recovery - Media Cache: A Hidden Vault of Evidence in SMR Hard Drives, and forensic data recovery using PC3000
The Media Cache area of Seagate hard drives may contain a hidden data vault, sometimes up to 90GB. The presentation will outline the theoretical and practical side of accessing this data using PC3000. The speaker will also provide a brief tour of PC3000 along with a quick demo.
Ilia Lvovski
Bell Canada
3:00-3:45 PMFight Against Illegal Fishing - Canada's Use of Remote Sensing Technologies
Dark Vessel Detection project - Canada’s use of satellite remote sensing & the fight against international illegal fishing.
Sean Wheeler
Chief of International Programs @ DFO
4:00-4:45 PMA Case of Stolen Research and Development
 Former FBI Director Louis Freeh once said “Economic Espionage is the greatest threat to our national security since the cold war.” Theft of trade secrets or intellectual property in specific industries have been on the rise since 2016. State sponsored actors target data on research and development, business plans, source code, manufacturing processes, and marketing plans. Today presentation covers an APT case that involves the loss of intellectual property and how organizations can detect and mitigate risks to protect themselves.  
Claire Feltrin
Deloitte Legal Privacy and Cybersecurity Team Member

Neumann Lim
Senior Manager, Deloitte
5:00-5:45 PMNetworking Social
May 5, 2022

11:00-11:45 AMPlaying Nicely With Lawyers to Provide More Value in Your Engagements
Confidentiality and legal privilege are often important to clients, both at the risk management stage and particularly in the aftermath of an incident. This presentation will discuss legal privilege, how it works and how you can collaborate with legal counsel to provide this protection to your clients.
David Fraser
McInnes Cooper
12:00-12:45 PMVendor Showcase
1:00-1:45 PMCustomising Digital Forensic Capability using the X-Ways Forensics API
The X-Ways Forensics API is perhaps one of the most powerful forensic tooling API’s available to us. It can help us create and add bespoke capability to X-Ways Forensics in a very powerful, and fast, way. The API documentation can take some effort to understand though and stops some people even getting started. This talk hopes to help you grasp the fundamentals, from which you can go on to achieve more.
Ted Smith
HMRC (Her Majesty's Revenue & Customs)
2:00-2:45 PMDigital Forensics & Incident Response + Philosophy = DFIRosopy
What do we do? How do we do it? And most importantly, why do we do it?
In this talk we will examine what philosophy has to say regarding our work and how this knowledge can inform our actions into the future.
Let's take a moment to reconnect to the purpose that brought us to this mission and appreciate that what we do and who we are matters.
Alexis Brignoni
3:00-3:45 PMBuilding a Critical Infrastructure Security Operations Center
Addressing OT and IT Cybersecurity Challenges through Collaboration and Educational Initiatives:  NBCC’s Journey in Building a CI-SOC.
Ben McHarg & Scott Henwood, New Brunswick Community College
4:00-4:45 PMRemote Imaging PCs and Mobile Devices on a Budget
There are great remote solutions on the market. But for technical or financial reasons, that may not be an option. With a bit of help at the other end from a non-forensics person, you can achieve comparable results on a shoestring budget.
Jacques Boucher
HTCIA Member
5:00-5:45 PMNetworking Social
May 6, 2022

11:00-11:45 AMFuture of Digital Evidence
Rapidly Changing and Expanding Digital Evidence Sources; Future Challenges and Prospects for Access…
Jim Emerson
Vice President
12:00-12:45 PMVendor Showcase
1:00-1:45 PMThe Intersection Between Cybersecurity and eDiscovery
The worlds of cybersecurity, digital forensics and eDiscovery have never been more connected with practitioners and organizations often struggling to understand the nature of the information that was accessed or exfiltrated in the context of a cybersecurity incident. In this session, attendees will gain an understanding of eDiscovery principles applicable to cybersecurity investigations and gain an understanding of eDiscovery tools, techniques and workflows that can help to address these challenges.
Chris Walker
Senior Manager, KPMG
2:00-2:45 PMPython Coding and Parsing Artifacts with LEAPPs
Case knowledge indicates an app contains key evidence in your case. Third party tools are invisible to it.
A piece of evidence is given to you and particular items of interest are needed immediately. Your regular tooling will take hours to parse it.
What can we do in these cases? In this talk we will learn how to use Python to solve the critical issues.
We will also show how to leverage the open-source and community driven LEAPP platforms in your digital forensics workflow.
Alexis Brignoni
3:00-3:45 PMHTCIA Presidential Officer Panel
Warren Kruse
Denis Roussel
Jessica Hyde


Special HTCIA member pricing is available! Make sure to register using the email associated with your HTCIA member account. 

New this year - group registrations can be processed directly in the registration form!

Professional Member (Members Only)
Student Member (Members Only)$40
HTCIA Conference Hub -
Virtual Event
Tuesday, May 3, 2022 11:00 AM - Friday, May 6, 2022 5:00 PM (EDT)

Program will run over four half days from 11:00 AM-5:00 PM ET each day. 

HTCIA Conferences
Registered Guests
Powered By GrowthZone