Happy New Year!
Welcome to 2017! This months sponsor is Trend Micro and I am looking forward to seeing Marc Gorelick (Trend Micro Global Security Expert) and Rob Burke (Territory Manager ATLANTIC Canada). The first presentation of the year will be “The Next Tier – 8 Security Predictions for 2017”. I cannot think of a better way to start things and expect another fantastic year for our local community.
Update your calendars with April 27-28th for AtlSecCon 2017! The board has been very active with speaker selection and all things related to the conference. Get ready for some fantatstic talks, the submissions this year are phenomenal and 1st round speakers have already been announced via social media.
Conference and speakers dinner tickets are avialable for purchase online. There are a limited number of speakers dinner tickets so grab one before they sell out, we have some amazing things planned for the evening.
Thank you,
Travis and the AtlSecCon Board.
January Meeting Sponsor:
Trend Micro provides layered content security with interconnected solutions that share data so you can protect your users, network, data center, and cloud resources from data breaches and targeted attacks.
Venue:
Historic Properties
1887 Upper Water St
3rd Floor (Above Lower Deck)
Halifax, NS
Agenda:
6:00-7:00 pm Complimentary apps and drinks from our sponsor Trend Micro
7:00-7:45 pm Trend Micro: Marc Gorelick, The Next Tier – 8 Security Predictions for 2017
7:45-8:30 pm Community: LIlly Chalupowski – Intro to Reverse Engineering
8:30-9:00 pm AtlSecCon 2017 news, Updates and Happenings
Presentations:
Sponsored:
Marc Gorelick (Solutions Architect Trend Micro Tiger team) – As part of Trend’s “Tiger Team,” Marc’s role assists Trend Micro and TippingPoint customers with the integration of Trend’s ATA and TippingPoint IPS products.
The Next Tier – 8 Security Predictions for 2017
People waking up to the threat landscape of 2017 will say it is both familiar and unchartered terrain. After all, while our predictions for 2016 have become reality, they only opened doors for more seasoned attackers to explore an even broader attack surface. In 2016, online extortion exploded, a smart device failure indeed caused damage, the need for Data Protection Officers (DPOs) became ever more pressing, and data breaches became as commonplace as ever.
Community:
Lily Chalupowski – Introduction to Reverse Engineering
A talk introducing the tools and concepts to get started in reverse engineering binary files including a demo of cracking and patching an executable.