If you're unable to attend an event but are interested in what TASK covered, as well as any resources that we introduced, provided or discussed, this is a great page to visit. Presentations (or partial presentations) are linked below where possible. Some TASK meetings are heavily demo focused, or information that can not be distributed is presented. For maximum value, be sure to join us every month! Thanks to all who attend our monthly meetings and make them such success!

Testing your network with BackTrack4 – April 29, 2009

Topic: Testing your network with BackTrack 4 Speaker: Jeremy Richards Backtrack 4 Beta was released at shmoocon this year… seven days later over 50,000 copies have been downloaded! If you’re not using Backtrack 4 yet come find out what you’re missing in this fast paced technical talk. Jeremy Richards from NCI will be providing demos […]

SQL Server Security & WhiteListing – March 25, 2009

Topic: SQL Server Security Speaker: Kevvie Fowler A regular speaker at such events as BlackHat and SecTor, Kevvie is a well recognized expert on all topics relating to SQL Security. Kevvie is also the author of “SQL Server Forensics”, and contributor to “The Best Damn Exchange, SQL and IIS Book Period” and “How to Cheat […]

ShmooCon Review & Acing a Vulnerability Assessment – February 25, 2009

Topic: Shmoocon Review Speaker: Brian Bourne Shmoocon is self-described as “an annual East coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software & hardware solutions, and open discussions of critical infosec issues.” We will be reviewing the best talks and new releases that happen at the […]

Privileged ID Management – January 28, 2009

Topic: Privileged ID management – are you really in control? Speakers: Vivek Khindria and Mike Bronson, CIBC Many organizations have embarked on strategies, technologies and processes to support the effective lifecycle management of user IDs, but what about the accounts that are used to manage the supporting infrastructure? These IDs frequently have the authority to […]

Computer Crime & Security Automation – October 29, 2008

Topic: Computer Fraud – Computer Crime Speaker: Jerrard B. Gaertner, Director of Technology Assurance Services at Soberman LLP The Criminal Code of Canada deals with some computer offences directly (theft of telecommunications) and with others indirectly (fraud, theft, electronic distribution of child pornography). However, many people believe the Code is out of date or ineffective […]

Virtualization Security – September 24, 2008

Topic: Virtualization Security Speaker: Robert Beggs Virtualization, which allows users to run multiple operating systems on a single physical box, can reduce costs and improve network manageability. From a security perspective, this simplified management can enhance system security, and virtualized systems are supporting security in roles such as secure software development, malware analysis, and disaster […]

BlackHat and Defcon Review – August 27, 2008

Topic: BlackHat and Defcon Review Speakers: Various Event Attendees In this presentation, we’ll cover the highlights of each conference. The new exploits and tool releases, new research and make sure you know what you missed out on! This is the MUST ATTEND TASK event of the year. If there is any specific topic you’d like […]

15min SpeedTalks – July 30, 2008

Topic: SpeedTalks! Presentations linked where available. Technical-focused content: New insecurities in Ipv6 (Tyler Reguly) Adventures in Remote Access (Chuck) Digital Watermarking (Paul Shields) The Canadian Honeynet Projet (Sami Kamel) Office Operations Model (Karsten Johansson) Kaminsky’s Revelation (Paul Wouters) Review of “Last Hope” (Leigh Honeywell) Management-focused content: Fixing the DNS Bug in Large Enterprise (Gord Taylor) […]