If you're unable to attend an event but are interested in what TASK covered, as well as any resources that we introduced, provided or discussed, this is a great page to visit. Presentations (or partial presentations) are linked below where possible. Some TASK meetings are heavily demo focused, or information that can not be distributed is presented. For maximum value, be sure to join us every month! Thanks to all who attend our monthly meetings and make them such success!
Topic: Payment Card (Skimming) Compromises and Trends. Technical Level: Non-Technical to Intermediate Speaker: Kelly Anderson, Detective Sergeant, OPP, e-Crime Section The advent of the payment card reduced complaints of NSF Cheque frauds. However the payment card system is under attack from criminals who find that the technology yields a greater payoff than cheque fraud ever […]
Location: Health Sciences Building, 155 College St., Auditorium Technical Level: Highly Technical Speaker: Nish Bhalla and Rohit Sethi, Security Compass Web application security continues to be one of the most pressing issues facing enterprises today. While many security experts understand the need for application threat modeling, few have actually implemented them successfully in practice. In […]
Topic: Recon 2 Root Speaker: Jeremy Richards Jeremy will demonstrate the usage of BackTrack 2.0 (a live linux penetration testing distribution) to perform a staged penetration test from initial recon and knowledge gathering, to identification of logical and software vulnerabilities and, finally, the tools used to exploit these vulnerabilities. Jeremy has been performing network and […]
Technical Level: All Levels (Mostly technical) Topic: Introductions Presentation: Click here for PPT Speaker: Fred Hopper Topic: PCI DSS 101 An introduction to the Payment Card Industry (PCI) Security Standards Council’s Data Security Standard – what it is, where it came from and why your shop may find it useful, even if you do not […]
Technical Level: Intermediate Speaker: Seth Hardy Key and Identity Management With PGP There are many introductory tutorials out there on PGP (and its open source equivalents), but few seem to touch on one of the most important aspects of it, why many people choose to use it: key and identity management. It’s been said that […]
Technical Level: Intermediate to Advanced Speaker: Bruce Cowper, Rodney Buike With launch of Windows Vista, there is much speculation about the new approach to securing Windows and the numerous security features in the operating system. This session will be hosted by Microsoft and provides an opportunity to see and discuss ‘the most Secure version of […]