If you're unable to attend an event but are interested in what TASK covered, as well as any resources that we introduced, provided or discussed, this is a great page to visit. Presentations (or partial presentations) are linked below where possible. Some TASK meetings are heavily demo focused, or information that can not be distributed is presented. For maximum value, be sure to join us every month! Thanks to all who attend our monthly meetings and make them such success!

Blackhat 2007 and Defcon 15 Review! – August 29, 2007

Speakers: Various Conference Attendees In this presentation, we’ll cover the highlights of each conference. The new exploits and tool releases, new research and make sure you know what you missed out on! This is the MUST ATTEND TASK event of the year. If there is any specific topic you’d like covered, be sure to contact […]

Understanding Heuristics for Virus Detection / An Objective Look at Vista Security – July 25, 2007

Topic: The Catahoula Leopard Dog – A Study in Heuristics for Virus Detection Technical Level: Non-Technical Speaker: Randy Abrams, Director of Technical Education at ESET This presentation explains what heuristics are in manner that is easily understood by non-technical users while providing information that is often new to experienced professionals as well. Users who already […]

Card Crimes – June 27, 2007

Topic: Payment Card (Skimming) Compromises and Trends. Technical Level: Non-Technical to Intermediate Speaker: Kelly Anderson, Detective Sergeant, OPP, e-Crime Section The advent of the payment card reduced complaints of NSF Cheque frauds. However the payment card system is under attack from criminals who find that the technology yields a greater payoff than cheque fraud ever […]

Securing Against Web Application Attacks – May 30, 2007

Location: Health Sciences Building, 155 College St., Auditorium Technical Level: Highly Technical Speaker: Nish Bhalla and Rohit Sethi, Security Compass Web application security continues to be one of the most pressing issues facing enterprises today. While many security experts understand the need for application threat modeling, few have actually implemented them successfully in practice. In […]

Penetration Testing Tools – April 25, 2007

Topic: Recon 2 Root Speaker: Jeremy Richards Jeremy will demonstrate the usage of BackTrack 2.0 (a live linux penetration testing distribution) to perform a staged penetration test from initial recon and knowledge gathering, to identification of logical and software vulnerabilities and, finally, the tools used to exploit these vulnerabilities. Jeremy has been performing network and […]

15min Speed Talks – Tuesday March 27, 2007

Technical Level: All Levels (Mostly technical) Topic: Introductions Presentation: Click here for PPT Speaker: Fred Hopper Topic: PCI DSS 101 An introduction to the Payment Card Industry (PCI) Security Standards Council’s Data Security Standard – what it is, where it came from and why your shop may find it useful, even if you do not […]

Vista Security: A Deep Dive Discussion – January 31, 2007

Technical Level: Intermediate to Advanced Speaker: Bruce Cowper, Rodney Buike With launch of Windows Vista, there is much speculation about the new approach to securing Windows and the numerous security features in the operating system. This session will be hosted by Microsoft and provides an opportunity to see and discuss ‘the most Secure version of […]