post view

Meeting Location

TASK meets the last Wednesday of Every Month 6:00 pm to 9:00 pm (with a few exceptions). Our next meeting is located at 55 John Street, Toronto, ON. Meeting room is the Rotunda (On main floor, just past elevators).

[sc_events_calendar]

May TASK | Toolkits for Better Security, Without Technology

Wednesday 25-May-2022 // 6:00 – 7:30 PM
Meeting Location: Virtual – Register


May TASK (Virtual)

Speakers: Fernando Montenegro & Peter Maddison
Topic: Toolkits for Better Security, Without Technology

Security is a frustrating field of constant change where it’s difficult to wrap our arms around security operations let alone all the other aspects of this vast profession. In this session, you’ll learn about key frameworks to help contextualize security challenges and solve problems more effectively. We won’t cover the usual CIS, NIST, ISO and other security frameworks. Instead the focus will be on showing you how to apply frameworks from outside of security to our field.

This talk will introduce different mental models and frameworks that can be useful to a security practitioner in multiple scenarios. This is where thinking about models such as Four Eyes, Cynefin Framework and Wardley Mapping can assist. In this session we’ll begin to address:

  • How we can frame the larger picture so that we can map out a security strategy (or a career strategy)
  • How to diagnose what kinds of problems we’re dealing with and the scope of them
  • How to more consistently deliver the outcomes we’re trying to achieve – and understand why things aren’t working / how to approach fixing them

Let’s arm ourselves with the ability to understand problems in order to solve them faster. We’ll present several frameworks during this month’s TASK with the offer that if you would like a deeper dive, we can setup knowledge sharing sessions outside of this TASK meeting.


Fernando Montenegro is a security technologist, currently an industry analyst at Omdia, the industry research arm of Informa Tech. He focuses on analyzing market trends and providing strategic advice on topics related to modern security markets: cloud security, endpoint security and others. His previous experience includes pre- and post-sales technical roles and consulting roles with vendors in enterprise security. He has worked with organizations in Canada, Latin America, and the US. His areas of interest include security economics – particularly behaviour economics – data science, including machine learning, and cybercrime. He holds a bachelor’s degree in Computer Science and industry certifications. He is based in the Greater Toronto Area.

Peter Maddison has been in the business of building high-performance teams and automating everything worth automating for the past couple of decades. A technologist, he has worked in a variety of disciplines, from operations to architecture to program management. With a career emphasis within financial services he has helped multiple large banks design and implement DevOps strategies with specific attention to the cultural challenges that can arise. Engagements include introducing models to align risk and control practices with the pipeline to production and identifying meaningful and appropriate measures. Peter works closely with compliance, audit, security, and architecture teams to build alignment and design processes to reinforce change.


This months TASK is proudly sponsored by Optiv

Optiv is a security solutions integrator, delivering end-to-end cybersecurity solutions that transform the way security is approached and consumed. Optiv develops an in-depth understanding of our clients’ environments, leverages the efficiencies of cloud economics for modernized on-demand security services, and creates business-aligned solutions that are designed to deliver the clarity and assurance our clients need to effectively manage organizational risk. Optiv’s approach optimizes and rationalizes existing infrastructure and operations to ensure the right balance of tools, processes and compliance and reporting capabilities. This enables clients to build a sustainable risk-centric foundation for implementing proactive and measurable security programs.

For more information about Optiv, please visit us at www.optiv.com.

Enter to win a $150 Amazon Gift Card: https://taskmay2022meeting.splashthat.com/


Don’t forget to register for the webinar now (free) to ensure you get access on the night: https://us06web.zoom.us/webinar/register/7216528588139/WN_bqM6p88FTeaFzhnoLlXYCw

We look forward to see you all then,
The TASK Steering Committee

Posted in Events.

April TASK: Global Impact of Cyber Ops/Hacking Vendor Security Reports

Wednesday 27-April-2022 // 6:00 – 7:30 PM
Meeting Location: Virtual – Register


April TASK (Virtual)

Speakers: Robert Beggs, Larry Gagnon, Dave McMahon
Topic: The Global Impact of Cyber Ops between Ukraine and Russia

Panelists Robert Beggs (Digital Defence), Larry Gagnon (eSentire) and Dave McMahon (Sapper Labs) will approach the evening with the perspective of military and police specialists, and will provide an overview of new developments in cyber warfare that have emerged in the recent invasion of Ukraine by Russia. An overview of “in theatre” events will be provided to overview the actions of the belligerents and their allies directly against each other, and then will discuss how these actions have “spilled over” in the cyber world, where the conflict has grown in new and unexpected ways.


Speaker: Dr. Wade Baker
Topic: Hacking Vendor Security Reports: When and How to use them

There is a treasure-trove of security research we can use tactically in our daily work and strategically to advance our security programs. Let’s walk through key findings from several new security reports – and even an overarching report that analyzes multiple threat reports. Dr. Wade Baker, the man behind security report greatest hits such as the Verizon DBIR and many others will take us behind the scenes to show how to effectively use these reports in our work. Get good at really understanding what the data is telling us in order to use the flurry of vendor security reports with greater literacy. Here are several reports we’ll have a look at:

  • The “state of the state of” threats (rollup of findings from myriad threat reports)
  • Vulnerabilities and measuring exploitability (deep analysis of actual live assets and vulnerabilities)
  • Security outcomes and success (unique analysis across several thousand organizations

Dr. Wade Baker is a Co-Founder of the Cyentia Institute, which focuses on improving cybersecurity knowledge and practice through data-driven research. He’s also a professor in Virginia Tech’s College of Business, working to prepare the next generation of industry leaders. Prior to this, Wade held positions as the VP of Strategy at ThreatConnect and was the CTO of Security Solutions at Verizon, where he had the great privilege of leading Verizon’s Data Breach Investigations Report (DBIR) research team for 8 years.


Don’t forget to register for the webinar now (free) to ensure you get access on the night: https://us06web.zoom.us/webinar/register/1216504728816/WN_fs7_Uif5QnqQtAtgdOjtzQ

We look forward to see you all then,
The TASK Steering Committee

Posted in Events.

March TASK: Let’s get physical: Breaking in like a pro to take security beyond cyber

Wednesday 30-March-2022 // 6:00 – 7:30 PM
Meeting Location: Virtual – Register


March TASK (Virtual)

Speakers: Karen Ng & Bill Graydon
Topic: Let’s get physical: Breaking in like a pro to take security beyond cyber

Physical security is a critical set of skills cybersecurity pros need to learn. Let’s discover how to break into physical offices, industrial sites and so on in order to identify vulnerabilities. This talk will show tools and techniques to defend in the real world. Particularly as offices across Canada open back up, we need to spot and remediate physical security gaps. What you’ll learn during this talk:

  • Threat modelling in the physical world, and cyber mindsets you need to ditch to do it properly
  • The spectrum of physical vulnerability assessment techniques, culminating in a full red teaming
  • How-to for a “DIY” physical vulnerability assessment / pen test
  • The full process a professional pen test involves, from scoping and intelligence gathering through to execution and follow up
  • Trends in the industry and how COVID has impacted physical security.

Speakers:
Karen Ng
Karen is an analyst at GGR Security, and is one of GGR’s entry team for physical penetration tests. She has a strong interest in physical security, delivering trainings on physical security vulnerabilities to a wide range of audiences. Karen comes from a background in engineering and has extensive experience in major event logistics. She is one of the Village Leads at the Physical Security Village, and works with the rest of the PSV team to teach how to recognize and fix security exploits to the community.

Bill Graydon
Bill is a principal at GGR Security, where he is involved in the full spectrum of client risk analysis, testing and remediation. He’s passionate about advancing the security field through research, teaching numerous courses, giving talks, and running the Physical Security Village at various cons. He’s received various degrees in computer engineering, security, and forensics and comes from a broad background of experience in physical and cyber security, anti-money laundering, and infectious disease detection.


Don’t forget to register for the webinar now (free) to ensure you get access on the night: https://us06web.zoom.us/webinar/register/4016424420104/WN_lvKIpWPSQrShlJqBmOAfRA

We look forward to see you all then,
The TASK Steering Committee

Posted in Events.

February TASK: Rethinking Vulnerability Management

Wednesday 23-February-2022 // 6:00 – 7:30 PM
Meeting Location: Virtual – Register


February TASK (Virtual)

Panelist Speakers: Stewart Cawthray, Jerry Gamblin, Bryan Whyte, Patrick McNeil
Topic: Rethinking vulnerability management: Expert panel offers new insight on building a better program

There are countless new vulnerabilities that sidetrack security, IT and developer teams. Microsoft alone kept teams busy all year – let alone Log4Shell and tens of thousands of new and existing CVEs. With rapidly expanding attack surface of devices, cloud services and network equipment, there are no shortage of vulnerabilities to chase. On top of this, the software supply chain continues to grow with more dependencies – it’s too easy to grab free packages off GitHub, NPM, Maven Central and so on. Software has eaten the world. Now we deal with the indigestion.

This session is designed to help you put together a program to more easily manage vulnerabilities at your organization.

We’ve invited four experts from different coverage areas to weigh in on this discussion and answer your questions:

Stewart Cawthray, Executive Security Architect, IBM Security Services

Stewart has over 20 years of experience in cybersecurity. Helping many of Canada’s biggest companies tackle cybersecurity issues from Securing their journey to Cloud to responding to incident and minimizing their impact. Stewart blends an understanding of business goals and motivation with architecture and technical skills to find innovative and efficient solutions to technology and cybersecurity challenges.

Jerry Gambin, Director Security Research, Kenna / Cisco

Jerry Gamblin is an influential security researcher and analyst focusing on enterprise network and application security with over 15 years of experience. His research has been presented on numerous blogs, podcasts, and security conferences. When not at work, his personal research focuses on IoT & embedded automotive systems. Check out his talk now available from SecTor 2021 online providing an intro to Risk-based Vulnerability Management: https://sector.ca/sessions/an-introduction-to-risk-based-vulnerability-management/

Patrick McNeil, Director of Solutions Architecture, Rumble.run

Patrick helps his customers discover all the unmanaged and unknown assets on their networks. Prior to Rumble, he developed first party and open source software application security testing programs for large Veracode customers. From his diverse background, Patrick understands the challenges and intersections of software development, networking, operations, and asset management. He has shared his knowledge at a number of conferences, including DEFCON, DerbyCon, BSidesLV, CarolinaCon, CackalackyCon, regional OWASP meetings, and various telecom industry and fraud prevention forums. Patrick enjoys growing his local security community by serving as an organizer, mentor, and speaker wrangler at local conferences. Patrick is also a physical security pentesting consultant and runs a local lockpicking club called Oak City Locksport.

(Patrick’s real bio: Old school full-stack COBOL programmer, original networking gangsta, physical security consultant, #telephreak to the core, Patrick has been slinging code, evaluating product security, finding hidden artifacts, and architecting people out of difficult jams “equalizer style” for over twenty-five years.)

Bryan Whyte, CISSP, Technical Presales Manager, Sonatype

After earning my Masters in Electrical Engineering, I spent over 20 years developing software applications to test hardware such as Torpedoes, Circuit Boards and Digital Subscriber Line (xDSL) modems. During that time I was also able to contribute to the product development for both Embedded and Distributed Enterprise Applications.

In 2015 I joined IBM Security as a Technical Pre-Sales Engineer focused on the AppScan tool suite for Static, Dynamic and Mobile Application Security Testing. After spending a few years in Application Security I decided to expand my Cybersecurity proficiency and became a Certified Information Systems Security Professional (CISSP).

I joined Sonatype in 2019 because the explosive growth of Open Source Software has made Software Composition Analysis a critical aspect of Application Security.

In my free time I enjoy spending time with my wife and two daughters, traveling, sampling craft beers and golfing (poorly).


Don’t forget to register for the webinar now (free) to ensure you get access on the night: https://us06web.zoom.us/webinar/register/4016424420104/WN_lvKIpWPSQrShlJqBmOAfRA

We look forward to see you all then,
The TASK Steering Committee

Posted in Events.

January TASK: Ethical AI for Security pros: Why it’s important, Why it’s hard, How to do it

Wednesday 26-January-2022 // 6:00 – 7:30 PM
Meeting Location: Virtual – Register


January TASK (Virtual)

Speaker: Stephan Jou
Topic: Ethical AI for Security pros: Why it’s important, Why it’s hard, How to do it

The use of artificial intelligence (AI) for cybersecurity, such as to detect insider threats and advanced attacks, is now an accepted and important tool for our industry. However, at the same time as we are realizing the power of AI, we need to become increasingly aware of its ethical challenges. As security professionals, we are increasingly called on to advise and implement solutions relating to privacy of customers and employees. To illustrate the importance of ethical AI, in June 2021, the Office of the Privacy Commissioner of Canada recently found the RCMP’s use of Clearview AI, a facial recognition company, illegal and a violation of the Privacy Act.

In this session, you will learn:

  • Why It’s Important: Why responsible and ethical AI is critical, including its business advantages
  • Why It’s Hard: The technical challenges associated with responsible AI, including the limitations of standard anonymization techniques
  • How to Do It: Best practices and techniques to implement responsible and ethical AI

Stephan Jou is CTO of Interset, a Micro Focus company, a leading-edge cybersecurity and In-Q-Tel portfolio company that uses machine learning and behavioral analytics. Jou currently leads both Interset and various analytics-related initiatives for Micro Focus’ security division. Previous to Interset, Jou has been at IBM and Cognos where he led the development of over 10 products in the areas of cloud computing, mobile, visualization, semantic search, data mining and neural networks. Jou holds a M.Sc. in Computational Neuroscience and Biomedical Engineering, and a dual B.Sc. in Computer Science and Human Physiology, all from the University of Toronto. He has held advisory positions on NSERC Strategic Networks and is involved in setting goals for NSERC Strategic Research Grant research topics in the areas of analytics and security for Canada, and was an invited participant to represent Canadian industry in 2018’s G7 Multistakeholder Conference on Artificial Intelligence and in 2020’s consultation with the Privacy Commissioner of Canada on regulation of AI for data privacy.


View Stephan’s Slides Here: 2022-01-26 Ethical AI for Security Pros


Don’t forget to register for the webinar now (free) to ensure you get access on the night: https://us06web.zoom.us/webinar/register/4016424420104/WN_lvKIpWPSQrShlJqBmOAfRA

We look forward to see you all then,
The TASK Steering Committee

Posted in Events.

November TASK: Cloud Security Step-by-Step Guide: Updating Your Security Practice

Wednesday 24-November-2021 // 6:00 – 7:30 PM
Meeting Location: Virtual – Register


November TASK (Virtual)

Speaker: Mark Nunnikhoven
Topic: Cloud Security Step-by-Step Guide: Updating Your Security Practice

While the rest of the business has jumped into the push towards cloud, how should your security practice adjust? Architectures, visibility requirements, and data protection needs, among others, are different in the cloud. It can be hard to know where to focus. How can you identify and manage different risks and exposures? There are so many changes, what steps should you take?

In this session, we’ll look at different areas of your security practice, how they shift, and how to prioritize them as your organization moves to the cloud. The goal is to provide a map of your next steps and to highlight what resources can help you not just move your practice to the cloud but improve it at the same time.

Mark Nunnikhoven (@marknca) is a Distinguished Cloud Strategist at Lacework. Mark works with teams to modernize their security practices and to get the most out of the cloud. With a strong focus on automation, he helps bridge the gap between DevOps and security through coaching, writing, speaking, and engaging with the cloud community.


Don’t forget to register for the webinar now (free) to ensure you get access on the night: https://us06web.zoom.us/webinar/register/8916370032671/WN_AnLz9FraTdeQRz6nwh9KpA

We look forward to see you all then,
The TASK Steering Committee

Posted in Events.

October TASK: Security for Businesses on a Budget

Wednesday 27-October-2021 // 6:00 – 7:30 PM
Meeting Location: Virtual – Register


October TASK (Virtual)

Speaker: Michael Argast, CEO of Kobalt.io
Topic: Security for Businesses on a Budget

Tough choices need to be made by many small and mid-sized Canadian organizations that have very limited security budgets – and often little or no full-time security staff. How should limited resources be allocated? The CIS 20 Controls and other frameworks provide some guidance on where to focus attention, but costs can add up quickly. However, there are a series of strategies that SMBs can take to dramatically reduce risk and improve security, while keeping within their budget. In this talk, Michael Argast, CEO of Kobalt.io will cover specific strategies and low hanging fruit to help get security programs moving in the right direction. From his work with hundreds of organizations, Michael will explain:

  • Where organizations tend to overinvest and where the gaps tend to emerge
  • Which skills to consider hiring for as you grow over time
  • How to use key strategies and frameworks despite limited resources

Michael is an experienced cybersecurity professional with over 20 years of industry experience. He is the Co-Founder and CEO of Kobalt.io, a rapidly growing cloud-focused security services provider. Kobalt.io works with over 100 cloud-focused technology companies to help develop their cyber security programs and ensure the security of their organization.

Register


This month’s TASK is proudly sponsored by Optiv.

Optiv Security is the cyber advisory and solutions leader, delivering strategic and technical expertise to more than 7,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential. For more information, visit www.optiv.com.

Win a $300 Amazon gift card, thanks to Optiv: https://events.optiv.com/taskoctobermeeting


Don’t forget to register for the webinar now (free) to ensure you get access on the night: https://us06web.zoom.us/webinar/register/8116345830203/WN_uozqQrPGTIGiQBk0Rgug_g

We look forward to see you all then,
The TASK Steering Committee

Posted in Events.

September TASK: Top 10 steps to better incident response

Wednesday 29-September-2021 // 6:00 – 7:00 PM
Meeting Location: Virtual – Register


September TASK (Virtual)

Speaker: Wadeed Mian, Vice President, Digital Forensics and Incident Response, ISA Cybersecurity
Topic: Top 10 steps to better incident response
 

Rapid and effective incident response requires you to take the right steps, at the right time and in the right order to reduce the impact of a breach. Wadeed Mian presents his top ten lessons learned in successfully managing a cyber incident. He will answer your questions as he shares real-life experiences. He’ll cover the tactics, techniques, tools, and technology used by attackers to help you better understand the adversary. He’ll explain how his team identifies IOCs in the race against time to block, contain and eradicate cyber threats. And most importantly, he will pinpoint key areas of improvement for your organization to consider to avoid critical IR mistakes.

Wadeed is an incredibly passionate cybersecurity professional with more than 20 years of experience in IT management, IT security management, and IT enterprise architecture. Throughout his career, he has implemented large information security programs and practices. Wadeed is highly effective at risk and operational management, confident and successful at making critical decisions to protect the availability, integrity, and confidentiality of critical business information and information systems. But as much as Wadeed is recognized for his technical experience and knowledge, he is the epitome of a “people leader,” who’s always there for his team, setting aside time and space to focus on the person standing right in front of him. In his spare time, he loves spending time with his family, eating Chinese cuisine with his friends, and taking on the video gaming world.

Register


This month’s TASK is proudly sponsored by ISA Cybersecurity.

Today’s reliance on complex and interconnected networks, coupled with the sophistication and relentlessness of threat actors, has made cyber incidents a matter of “when”, not “if”. Companies must have an incident response procedure prepared in advance or face the substantial – and potentially existential – financial and reputational risks that come with being unprepared. Do your incident response procedures measure up? Download ISA Cybersecurity’s complimentary whitepaper “The Six Stages of a Successful Incident Response” to find out. It’s packed with expert tips and thought-provoking insights that will help improve your readiness to face a cyber incident. Download our whitepaper by Sept. 30, 2021 and you’ll be entered into a draw to win a $100 Canadian Tire gift card.

ISA Cybersecurity is Canada’s leading cybersecurity-focused company, with nearly three decades of experience delivering cybersecurity services and people you can trust. Our vision is to help create a world in which everyone is safe from cyber threats. We provide a host of incident response services. Contact us today to learn more.


Don’t forget to register for the webinar now (free) to ensure you get access on the night: https://us06web.zoom.us/webinar/register/4316317215267/WN_cbfkVuBlQzOAcSYzwjS4fQ

We look forward to see you all then,
The TASK Steering Committee

Posted in Events.

August TASK: Black Hat / Defcon Recap Special

Wednesday 25-August-2021 // 6:00 – 7:00 PM
Meeting Location: Virtual – Register


August TASK (Virtual)

August is our ever-popular Black Hat / Defcon recap special featuring your fellow TASKers presenting a summary of what they learnt at this year’s events.

This month’s TASK Speakers include: 

Helen Oakley

  • Software Supply Chain 101
  • Software Supply Chain 201

Olivier Bilodeau

  • Symbexcel: Bringing the Power of Symbolic Execution to the Fight Against Malicious Excel 4 Macros
  • Cloudy with a Chance of APT: Novel Microsoft 365 Attacks in the Wild
  • PyRDP: Remote Desktop Protocol Monster-in-the-Middle (MITM)

Braveenth Rasanayagam

  • You’re Doing IoT RNG

Bill Graydon

  • Defeating Physical Intrusion Detection Alarm Wires
  • Putting the EICAR virus signature test string onto a QR code
  • Hacking shopping cart immobilisation systems
  • Phishing with OAuth2

Karen Ng

    • Bypassing Locks 101

 

Register


This month’s TASK is proudly sponsored by Scope Security.

Scope Security stops ransomware, data breaches and other cyberattacks at hospitals, clinics and large provider systems with its managed detection and response solution. We have custom-built our integrated technology and service platform to enable us to detect the complex attacks that healthcare organizations are facing across their entire technology landscape.

Sign up to learn more.


Don’t forget to register for the webinar now (free) to ensure you get access on the night: https://us06web.zoom.us/webinar/register/2616288915636/WN_nsaAKkG_R4S9vCExDnDH_A

We look forward to see you all then,
The TASK Steering Committee

Posted in Events.

July TASK: Beyond just Ransomware: The Challenge of Securing Clinical Technologies

Wednesday 28-July-2021 // 6:00 – 7:00 PM
Meeting Location: Virtual – Register


July TASK (Virtual)

Speaker: Mike Murray
Topic: Beyond just Ransomware: The Challenge of Securing Clinical Technologies

While ransomware is the main story on the news, modern healthcare delivery organizations have unique security challenges across their environment. One of the most difficult for most of them is the wide diversity of Clinical Technologies that are required on a daily basis to deliver care. From large devices like CT scanners to small infusion pumps, nearly every medical device these days is connected to the network and provides a fertile attack surface.

In this talk, Scope Security CEO Mike Murray will walk through the common security challenges around medical devices and help understand not only why these medical technologies present so many security risks, but also walk through many of the technical, political and regulatory challenges that the clinical environment provides, and how to secure them.

Register


This month’s TASK is proudly sponsored by Scope Security.

Scope Security stops ransomware, data breaches and other cyberattacks at hospitals, clinics and large provider systems with its managed detection and response solution. We have custom-built our integrated technology and service platform to enable us to detect the complex attacks that healthcare organizations are facing across their entire technology landscape.

Sign up to learn more.


Don’t forget to register for the webinar now (free) to ensure you get access on the night: https://us06web.zoom.us/webinar/register/3116268817688/WN_ekJ9XhZ7SOugx-JoukQzPQ

We look forward to see you all then,
The TASK Steering Committee

Posted in Events.

Our Sponsors