Video Presentation

Machine Learning – The panacea for cybersecurity threats? Thoughts from the industry

Presented at the SERENE-RISC Workshop, 2017 October by Nabil Seddigh, President, Solana Networks Machine Learning an Artificial Intelligence is often presented as the cure all for cybersecurity issues. Nabil Seddigh provides some perspective on the development of this new technology and the place it will likely occupy in the security landscape.   Run Time < …

Anonymous and the Politics of Leaking

Presented at the SERENE-RISC Workshop 2017, April. In this talk Dr. Gabriella Coleman will provide a history of Anonymous’ crucial role in establishing a novel style of hacking-for-leaking: public disclosure hacks. In contrast to traditional whistle-blowing—instigated by insiders who possess intimate awareness of wrongdoing and access to documents that can prove it—a public disclosure hack …

Cryptocurrencies in Canada: Legal status and public policy considerations

Presented at the SERENE-RISC Workshop 2017, April. Bitcoin (BTC) has often been referred to as “nerd money”. However, since the first BTC transaction in 2009, the decentralized cryptocurrency has become more popular and is becoming widely available with more users and merchants adopting the cryptocurrency every day. This presentation will provide a high-level taxonomy of …

Assessing the Money Laundering and Terrorist Financing Risks of Emerging Payment Technologies

Rapid advancements in financial technology – or “fintech” – are quickly changing the way we use and think about money. This includes both the use of technologies outside of the traditional regulated financial system, such as cryptocurrencies, and the financial innovations developed by banks, such as mobile wallets. This talk will provide a high level …

Security in virtualized infrastructures: A networking perspective

Presented by Dr. Ashraf Matrawy at the SERENE-RISC workshop 2017, April. For economic, technical, and environmental reasons, there is a very strong trend towards virtualizing computing infrastructures and relying less on private computing infrastructures. This trend utilizes information infrastructures that are built using virtualization techniques while taking advantage of very rapid advances in networking technologies. In …

Pedophile hunting and scambaiting

Tom Sorell from Warwick University Presentation from the CICC 2017-2018 Scientific Launch on the Subject of ‘Watchful Citizens:Policing from Below and Digital Vigilantism held the 2nd and 3rd November 2017 at the Université de Montreal. A comparison of vigilante activities directed at different criminal groups.  What are the differences between “pedophile hunting” and “scam baiting”? …

Science, Security, and the Elusive Goal of Security as a Scientific Pursuit

Cormac Herley presents work done with Paul van Oorshot on some historic ideas that might help us work towards a common science for information security.  This is something that we all need in order to progress the field. “Claims that uniques aspects of security exempt it from a scientific approach are unhelpful.”  There has been …

Cybersecurity Career Development Presentations

The IISP (Institute of Information Security Professionals) and our friends the Cyberacademy at Napier College, Edinburgh, Scotland recently (2017/11/23) held an event for those looking to start or continue a career in cybersecurity.   The event had a number of great presenters and fortunately for us was streamed to youtube. The full video is over 5 …

Do I know you? Evaluating Human-Human Authentication via Conversational Interfaces

Nour Dabbour from Carleton University presented a 2 minute rapid-fire of her poster at the SERENE-RISC workshop October, 2017. Rapid fire presentations are limited to 2 minutes and 1 slide. Nour was voted as the winner of the student poster presentations at this event by the SERENE-RISC membership in attendance.   Do I know you? …