If you're unable to attend an event but are interested in what TASK covered, as well as any resources that we introduced, provided or discussed, this is a great page to visit. Presentations (or partial presentations) are linked below where possible. Some TASK meetings are heavily demo focused, or information that can not be distributed is presented. For maximum value, be sure to join us every month! Thanks to all who attend our monthly meetings and make them such success!

Forensics Evening – February 22, 2010

Topic:”Building an Information Security Startup in Canada” – Richard Reiner, Enomaly Richard, former Chief Security and Technology Officer at Telus Canada, is one of Canada’s most seasoned entrepeneurs specializing in Information Security.  A member of multiple advisory and venture capital groups, he has gained a unique perspective on the trials, tribulations, and successes of security […]

Direct Access – November 25, 2009

Topic: Lifting the Lid: DirectAccess in Windows 7 Speaker: Pat Telford A new remote access strategy is taking form with the release of Windows 7 and Windows Server 2008 R2. DirectAccess uses IPv6, IPsec, and some DNS frigonometry to allow clients roaming the internet to get secure access to internal resources without a VPN. It […]

SecTor Talks – October 28, 2009

Hacking the Privacy Legislation – Tracy Ann Kosa In today’s environment of particularly scarce resources, privacy can be easily buried under its sexier older sister – security. But the need to balance the two is an ongoing concern when it comes to any system that collects, uses and discloses personal information. This session will focus […]

15min SpeedTalks – September 30, 2009

Topic: SpeedTalks. Ms. Mary-Lynn Manton and several students will be presenting a brief overview of the information security program at Seneca College, and some of the research that they have been conducting. Mr. Eldon Sprickerhoff, will be presenting: The Rumours of My Death Have Been Greatly Exaggerated – Redeeming NIDS in the Corporate Environment Mr. […]

BlackHat and Defcon Review – August 26, 2009

Topic: BlackHat and Defcon Review Speaker: Various Attendees In this presentation, we’ll cover the highlights of each conference. The new exploits and tool releases, new research and make sure you know what you missed out on! This is the MUST ATTEND TASK event of the year. If there is any specific topic you’d like covered, […]

Security-in-Agile – June 24, 2009

Topic: Security-in-Agile Speaker: Tatiana Outkina, PhD, CISSP, CSSLP, TOGAF Agile development methodology affects the framework of SecSDLC. While the concept of SecSDLC remains the same, the approach and the solutions must provide the ability to develop secure systems within the agile development framework. A certain number of contradictions must be resolved to ensure the appropriate […]

Corporate Espionage & Windows 7 Security – May 27, 2009

Topic: Understanding & Preventing Insider Threat/Corporate Espionage. Speaker: Kai Axford Many analysts have stated that the Number One issue facing corporate customers today is the threat of targeted corporate espionage coming from within the organization. Join Kai Axford, a security strategist from the Microsoft Trustworthy Computing team for an entertaining and engaging session, as he […]

Testing your network with BackTrack4 – April 29, 2009

Topic: Testing your network with BackTrack 4 Speaker: Jeremy Richards Backtrack 4 Beta was released at shmoocon this year… seven days later over 50,000 copies have been downloaded! If you’re not using Backtrack 4 yet come find out what you’re missing in this fast paced technical talk. Jeremy Richards from NCI will be providing demos […]

SQL Server Security & WhiteListing – March 25, 2009

Topic: SQL Server Security Speaker: Kevvie Fowler A regular speaker at such events as BlackHat and SecTor, Kevvie is a well recognized expert on all topics relating to SQL Security. Kevvie is also the author of “SQL Server Forensics”, and contributor to “The Best Damn Exchange, SQL and IIS Book Period” and “How to Cheat […]

ShmooCon Review & Acing a Vulnerability Assessment – February 25, 2009

Topic: Shmoocon Review Speaker: Brian Bourne Shmoocon is self-described as “an annual East coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software & hardware solutions, and open discussions of critical infosec issues.” We will be reviewing the best talks and new releases that happen at the […]