Video Presentation

Dmitry Samosseiko – Ransomware: the great equalizer

Presented at the SERENE-RISC Workshop – 2016 Spring The cyber-attacks targeting individuals and businesses worldwide continue to grow and wreak havoc. But one particular threat type clearly stands out from everything else we see today or had faced before. The file-encrypting ransomware has taken its victims by storm recently. It’s dominating the current threat landscape …

Jessica Gunson – Understanding Fraud and How to Protect Against It

Presented at GoSec 2017 Jessica is an intelligence researcher/analyst with the Royal Canadian Mounted Police (RCMP). She has been with the Canadian Anti-Fraud Centre (CAFC) since 1998 and joined the Operational Support Unit in 2006. Jessica has previously been involved in most aspects of the CAFC disruption program. Along with providing tactical support to law …

Jonathon Hodge (Toronto Public Library) Advocating for digital privacy: the centrality of public libraries in a uniquely 21st century struggle

What can you learn from Tom, Thelma and Ed about privacy and the possible role of libraries in advocacy? Jonathon Hodge  from the Toronto Public Library presents “Advocating for digital privacy: the centrality of public libraries in a uniquely 21st century struggle” at 2017 Access (http://accessconference.ca/2017program/).  Presents the work happening at the Toronto Public Library …

Mick Bhinder – Reinventing Identity Access Management

Presented at the SERENE-RISC Workshop Spring 2016 The discussion of cybersecurity is highly complex and struggles with the ever increasing rate of sophisticated cyberattacks and digital exploitation. Cybersecurity continues to fall low in prioritization amongst executive management where there is a denial for a need of protection against such attacks. The discussion in today’s technological …

Benjamin Fung – Kam1n0 Assembly Clone Search for Reverse Engineering

Presented at the Spring 2016 SERENE-RISC Workshop. Assembly code analysis is one of the critical processes for mitigating the exponentially increasing threats from malicious software. It is also a common practice for detecting and justifying software plagiarism and software patent infringements when the source code is unavailable. However, it is a manually intensive and time-consuming …

Critical Infrastructure Threat Landscape: Understanding and Reacting

    Francesca Bosco – UNICRI, Presented at the 2016 Spring SERENE-RISC Workshop. Advances in the field of global technology have transformed the way in which societies function, affecting governments, businesses, and individuals alike, evoking a wide array of societal benefits, while also subjecting populations to varying degrees of cyber risk. Critical infrastructure serves as …