July TASK: Hands on with Physical Security / Deciphering ZTNA, SASE, and SSE Marketspeak

Join us for our next TASK live and in-person on Wednesday, July 26!
Time: Doors open at 5:30 PM, Talks start at 6:00 PM - 8:30 PM
Location: Trend Micro, 1 Snooker St. Toronto, ON M6K 1G1
Register: to attend now at https://www.eventbrite.com/e/july-task-in-liberty-village-tickets-681693793487

With thanks to our sponsor for providing the food and for being our host as well this month, Trend Micro


Speaker: Bill Graydon

Topic: Hands on with Physical Security: Overview of Recon Techniques and Defence

You've heard of burglars "casing the joint" before making entry - but how do they do it, how do they choose what to target, and how to make the entry? In this talk, you'll learn all of this from a professional (ethical) burglar - we'll also make use of the amazing space the talk is hosted in to let you observe first hand all of the little details that can give away critical information about a facility's layout, security and defences. This talk will cover:

  • How to deduce the floorplan of a building from observing its external envelope, which is the result of years of experience in penetration testing and research into thousands of architectural plans for a wide range of facilities.

  • Loads of techniques for situational awareness and intelligence gathering when navigating through a building.

  • Implications for physical red teams, and for facilities to harden against these techniques being used by bad actors, including using Crime Prevention Through Environmental Design (CPTED).

This talk focusses on low-tech techniques, most involving only the human senses: you'll come away from the talk with a new perspective on the built world around you, and will be able to apply it in all urban aspects of your day to day life.

Bill is a founder & principal at GGR Security, where he breaks into buildings professionally to identify weaknesses in their physical security. He's passionate about advancing the security field through research, teaching numerous courses, giving talks, and running the Physical Security Village at various cons. He's received various degrees in engineering, security, and forensics and comes from a broad background of experience in physical and cyber security, anti-money laundering, and infectious disease detection.


Speaker: Paul Wilson

Topic: Deciphering ZTNA, SASE, and SSE Marketspeak, Plus a Transformation Journey

It seems that every security vendor has a "Zero Trust" story, whether it's Zero Trust Network Access (ZTNA), Secure Access Service Edge (SASE), or something else. But, what do these terms mean? What things are important to look for? What's relevant to you and your needs? Most networks follow a common, well understood security approach consisting of a UTM or assembly of devices at the perimeter. This is how things have been done for a decade or more. It's tried, and true. However, there are always new trends, and in Internet and Access security a few specific “marketspeak” terms seem to be everywhere.

In this talk, Paul will help you understand what these terms mean, get past the marketing hype and understand the technology. He will also walk you through a recent implementation he's been a part of with a client that made a complete transformation from legacy WAN with DC to fully Cloud and Cloud Security. Tips, tricks, and practical explanations will be part of this vendor-neutral presentation.

 Paul Wilson is the owner of CISOmojo Inc, a Toronto-based consulting firm, and has 7+ years of SASE, SSE, and ZTNA industry experience, both in Pre-Sales Engineering and Implementation, with 35+ years overall in Telecoms, Internet, and Security. You can reach him at paul@cisomojo.com

This July TASK will be live and in-person only. No recording or live stream will take place.

In-person Attendees: Please register now at https://www.eventbrite.com/e/july-task-in-liberty-village-tickets-681693793487 to secure your seat!

We look forward to see you all then,
The TASK Steering Committee

Previous
Previous

August TASK: Black Hat / Defcon recap

Next
Next

May TASK: A Blueprint for Developer-First Security