Canadian Technical Security Conference (CTSC)

Canadian Technical Security Conference (CTSC) Canadian Technical Security Conference (CTSC) Canadian Technical Security Conference (CTSC) Canadian Technical Security Conference (CTSC) Canadian Technical Security Conference (CTSC)
 
Home
Media Release
Contact Us - Canada
 
VENUE
Conference Venue
Accommodation
 
EVENT DETAILS
Schedule of Events
Competitive "Bug-Off"
Technical Workshop
Discussion Panel
Awards and Recognition
 
CTSC PARTICIPANT REGISTRATION
Conference Venue
Accommodation
 
CTSC EXHIBITOR OPPORTUNITIES
Exhibitor Opportunities
 Exhibitor Profiles
 
SPEAKERS AND PRESENTERS
Call for Presentations
Confirmed Presenters
 
ADVERTISING OPPORTUNITIES
Advertising Opportunity
 
CTSC SPONSORSHIP OPPORTUNITIES
Corporate Sponsorship
Corporate Sponsors
 
CANADIAN TECHNICAL SECURITY PROFESSIONAL ASSOCIATION (CTSPA)
CTSPA

 

 

Schedule of Events | CTSC 2019

UPDATED: Monday March 25, 2019

Please note that the CTSC 2019 posted "Schedule of Events" is subject to amendment and change without notice as event planning progresses, and various exhibitors, presenters and events are confirmed.

 

Travel Day | Monday April 01, 2019

 

Time / Session

 

Event Description

Location

Monday

1600 - 2100

 

Exhibitor Setup Opportunity (Optional)

Registered CTSC 2019 exhibitors may setup display booths between 1600 - 2100 hours. The exhibit hall will be locked down at 2100 hours.

Please note that the accommodations check-in time is 1600 hours for those arriving the day before the conference.

 

Lecture Theatre

Monday

1730 - 2000

 

Dinner at NAV CENTRE

Reservations for CTSC 2019 accommodations, must be booked directly with the venue NAV CENTRE, and dinner is not part of the conference registration package.

 

Propeller
Restaurant

 

Day 1 | Tuesday April 02, 2019

 

Time / Session

 

Event Description

Location

Tuesday

Day 1

0645 - 0800

 

Breakfast

Breakfast is available for registered guests at NAV CENTER as part of your overnight guest package.

Reservations for CTSC 2019 accommodations, must be booked directly with the venue NAV CENTRE and is not part of the conference registration package.

 

Propeller
Restaurant

Tuesday

Day 1

0700 - 0800

 

Exhibitor Setup

Exhibitors are required to arrive and setup exhibit booths displays between 0730 and 0800 hours.

The CTSC 2019 registration booth and the exhibit area will open to conference participants at 0800 hours sharp.

 

D214

Tuesday

Day 1

0800 - 0830

 

Participant | Exhibitor | Presenter Registration

Please attend the CTSC 2019 registration booth to pick-up your conference identification and participant package.

 

D214

Tuesday

Day 1

0830 - 0835

 

Opening Remarks | CTSC 2019

Paul D Turner, TSS TSI | BIO

Professional Development TSCM Group Inc. | CTSC 2019 Moderator Mark Hrabowsky | EM Shield Guard | D214 |

 

D214

Tuesday

Day 1

Session 1A

0835 - 0945

 

The Human Dimension of Cyber Threats

Andrew Chester, JD, CSyP | BIO

Juno Risk Solutions Inc.

Cyber, physical and personnel security threats are at their core the work of people and organizations seeking to exploit access to steal money, exploit access to information or to disrupt operations.

This presentation will critically examine the nature of the threat actors active within Canadian government and industry.

Leveraging court documents and other primary sources, the topic will address the nature of organized criminal and foreign state espionage threats, the tradecraft employed to gain access to networks and key individuals, and the critical steps necessary to mitigate those threats.

D214

 

Tuesday

Day 1

0945 - 1000

 

 

CTSC 2019 | Refreshment Break Sponsor

PRICE LANGEVIN 

 

D214

Tuesday

Day 1

Session 2A

1000 - 1100

 

Shifting Security: The Blockchain

Diana Elkin | BIO

Method Intelligence Ltd.

Shifting Security: The Blockchain explores key security-focused themes and concepts of blockchain innovation and implementation.

It will cover an array of security vectors common to most blockchain technologies and crypto currency-centric services.

Real exploitation methods, investigations and cases will be discussed in relation to issues revolving around data integrity, end-user security, reliability, encryption and data-mining.

At the end of the presentation, participants will be familiar with core concepts and equipped to recognize security gaps and opportunities pertaining to the blockchain.

 

D214


Tuesday

Day 1

Session 3A

1100 - 1200

 

5G | Surveillance Threat Focus Update

John B. Minor, SMA | BIO

Communication Expert

As the 5th Generation (5G) Mobile Network arrives the TSCM community must be aware, informed and ready to protect client interests.

This presentation provides an update on the 5G NR rollout timeline and the surveillance threat landscape and will focus on emerging surveillance threats including data, location and identity privacy attacks.
D214


Tuesday

Day 1

Working Lunch

1200 - 1245

 

 

CTSC 2019 | Working Lunch

Sponsored by JD LeaSure at COMSEC LLc.

COMSEC LLCA working lunch will be served for CTSC 2019 participants, exhibitors, presenters and guests in the lower lounge exhibit area.

Please take this opportunity to view the exhibits and network with other conference participants over a casual working lunch.

 

 

D214

Tuesday

Day 1

Session 4A

1245 - 1345

 

Security of IoT Systems - Challenges and Opportunities

Corneliu Nitu | BIO

Nokia

This presentation focuses on attacks on IoT systems and methods of detecting and preventing the attacks. Attendees will learn about the current state of IoT attacks and infections, based on the aggregated results from field deployments in major mobile carriers.

The material provides an in-depth analysis on how intelligent technologies apply in the domain of IoT security, with concrete examples of techniques used by attackers and by the defenders.

 The presented material will help security professionals better understand the topic of IoT security and help make informed choices regarding improving security of IoT systems.

The presentation targets a wide audience by providing good overviews of the subject matter, contributing to a deeper understanding of IoT security.

At the same time, the presentation provides meaningful technical details and actionable recommendations to improve IoT security.

 

D214

 

Tuesday

Day 1

 1345 - 1400

 

 

CTSC 2019 | Refreshment Break Sponsor

PRICE LANGEVIN 

 

D214

Tuesday

Day 1

Session 5A

1400 - 1500

 

Making Sense of a Complex and Ever Changing Threat Environment

Robert Inkol | BIO

Consultant

The security threat environment continues to increase in complexity and sophistication. Sophisticated, but surprisingly inexpensive surveillance technologies have become widely available. Furthermore, there are possibilities for exploiting elements of the security and information technology infrastructure.

An understanding of the threat environment and the relevant technology trends is essential if current and future threats are to be successfully countered. This talk provides an overview of the threat environment and presents a comprehensive approach for monitoring and understanding future developments.

 

D214

 

Tuesday

Day 1

 1500 - 1515

 

 

CTSC 2019 | Refreshment Break Sponsor

PRICE LANGEVIN 

 

D214

Tuesday

Day 1

Session 6A

1515 - 1615

 

Fog of War: Improving Situational Awareness Through Digital Risk

Brian Roy, Sales Engineer | BIO

Digital Shadows

For years, organizations have focused on protecting their networks by implementing several security tools: EDR, IDS\IPS, Firewalls, SIEM, etc. These solutions are all based on the internal detection of malicious activity.

The downside is that these have left a huge gap in coverage and visibility: external threats targeting your organization or industry.

Most organizations have a 50% view of the threats they face. In order to get a thorough understanding of their threats and risks, organizations require both internal and external visibility.

Through Digital Risk Protection, we can cut through the Fog of War and gain a more complete view into an organization’s threat landscape.

Understand external digital risks to your organization

Define your battlefield

View your organization from an adversarial point of view

 

D214


Tuesday

Day 1

Session 7A

1615 - 1715

 

Cyber-Security | Enhanced Role in Enterprise Risk Management

Fritz Y. Jean-Louis, CISSP, CRISCA | BIO

Info-Tech Research Group

Traditional risk management does not fully incorporate cyber security as a key risk area.

Typically, cyber or information security, when considered, was delegated to a sub-section under Information Technology or Technology Risk.

As we reflect on recent incidents and breaches and recent compliance requirements (GDPR), Information/Cyber Security deserves consideration as a primary and distinct risk category.
D214

Tuesday

Day 1

1730 - 2000

 

CTSC 2019 | Hospitality Night Sponsor

Kestrel TSCM | Paul D Turner, TSS TSI | CTSC 2018

Please join friends and business associates for a casual evening, and networking event following the first day of the conference. Enjoy our hospitality night with a selection of good food prepared by the NAV CENTRE staff.

A cash bar is available

 

D214

 

Day 2 | Wednesday April 03, 2019

 

Time / Session

 

Event Description

Location

Wednesday

Day 2

0645 - 0800

 

Breakfast

Breakfast is available for registered guests at NAV CENTRE as part of your overnight guest package.

Reservations for CTSC 2019 accommodations, must be booked directly with the venue NAV CENTRE and is not part of the conference registration package.

 

Propeller
Restaurant

Wednesday

Day 2

0700 - 0800

 

Exhibitor Setup

Exhibitors are required to arrive and setup exhibit booths displays between 0730 and 0800 hours.

The CTSC 2019 registration booth and the exhibit area will open to conference participants at 0800 hours sharp.

 

D214

Wednesday

Day 2

0800 - 0830

 

Participant | Exhibitor | Presenter Registration

Please attend the CTSC 2019 registration booth to pick-up your conference identification and participant package.

 

D214

Wednesday

Day 2

Session 8A

0830 - 0930

 

Agile Quantum-Safe Security: Start Protecting Now

Paul Lucier, VP of Sales & Business Development | BIO

ISARA Corporation

When it comes to revolutionary technologies, quantum computing tops the list. However, with great positive potential, there can be an equally negative disruption.

A large-scale quantum computer will break modern public key cryptography, leaving confidential data exposed to adversaries.

In this presentation, Paul Lucier, VP of Sales and Business Development of ISARA Corporation - the leading provider of quantum-safe security solutions – will discuss the ubiquity of public key cryptography in our daily ‘digital lives’, why agile quantum-safe technology needs to be implemented today to begin to protect against quantum’s unprecedented threat and how quantum-safe security is a strategic enabler.

 

D214

 

Wednesday

Day 2

 0930 - 0945

 

 

CTSC 2019 | Refreshment Break Sponsor

PRICE LANGEVIN 

 

D214

Wednesday

Day 2

Session 9A

0945 - 1045

 

Technical Advances in Spectrum Analysis and Their Relevance to TSCM

Robert Inkol | BIO

Consultant

Spectrum analyzers are important tools for the detection and characterization of communications and other signals.

The large market for test and measurement instrumentation and other applications has motivated the industry players improve the performance and functionality of their products, in part by leveraging technical advances.

This presentation discusses the various trade-offs and design choices involved, the various technology trends and their impact with emphasis on their applications in TSCM.

 

D214

 

Wednesday

Day 2

1045 - 1100

 

 

CTSC 2019 | Refreshment Break Sponsor

PRICE LANGEVIN 

 

D214



Wednesday

Day 2

Session 10A

1100 - 1200

 

 

The Technology Shift

John A. Price, CPP CRM | BIO

Price Langevin & Associates Inc.

The emergence of high technology consumer electronics and the technology we all utilize personally, and in business and government environments has created an environment that is providing continuous and ongoing opportunity for surveillance and both lawful and unlawful surveillance opportunities.

This presentation will look at recent examples of intercepts, including audio, video and network that have occurred, the methods and the technologies. This presentation will discuss the new norm, and the steps forward to protect our organizations and clients.

D214

Wednesday

Day 2

Working
Lunch

1200 - 1245

 

CTSC 2019 | Working Lunch

Sponsored by JD LeaSure at COMSEC LLc.

COMSEC LLCA working lunch will be served for CTSC 2019 participants, exhibitors, presenters and guests in the lower lounge exhibit area.

Please take this opportunity to view the exhibits and network with other conference participants over a casual working lunch.

 

 

D214

Wednesday

Day 2

Session 11A

1245 - 1345

 

14th Annual | CTSC 2019 "Bug-Off" | Expert Level |

Andrzej WolczanskiAndrzej Wolczanski, TSS | BIO

Professional Development TSCM Group Inc.

Although this session is open to all CTSC participants, it is designed for more advanced participants that understand the equipment resources, methods and techniques.

Participating in our competitive “Bug-Off” is an excellent way to extend your networking opportunity and perhaps gain valuable in-sight from other like-minded professional TSCM practitioners while enjoying a mildly entertaining and practical component of the conference, now 14 years in the running.

Our TSCM “Bug-off” provides a light-hearted competitive spirit and the opportunity to evaluate, and most importantly learn more about the professional level TSCM equipment resources supplied by various exhibitors and sponsoring participants.

The CTSC “Bug-off” is open to all conference participants for a chance to win prizes and personal recognition for elite standing.

Prizes, Awards, Peer Recognition, and Bragging Rights are just a few of the benefits for the participants of our TSCM competitive “Bug-off”.

The Office of Evil Intent, aka Paul D Turner, TSS TSI and Andrzej Wolczanski, TSS have spent the previous year plotting and planning challenging methods and real-world compromises for this year's event.

 

Sponsored by the Office of
Evil Intent (OEI)

D216

 

Wednesday

Day 2

1345 - 1400

 

 

CTSC 2019 | Refreshment Break Sponsor

PRICE LANGEVIN 

 

D214

Wednesday

Day 2

Session 12A

1400 - 1500

 

14th Annual CTSC 2019 "Bug-Off" | Introductory Level |

Andrzej WolczanskiAndrzej Wolczanski, TSS | BIO

Professional Development TSCM Group Inc.

This session is open to all CTSC participants, but is designed for less experienced participants that perhaps do not understand the equipment resources, methods and techniques.

Participating in our competitive “Bug-Off” is an excellent way to extend your networking opportunity and perhaps gain valuable in-sight from other like-minded professional TSCM practitioners while enjoying a mildly entertaining and practical component of the conference, now 13 years in the running.

Our TSCM “Bug-off” provides a light-hearted competitive spirit and the opportunity to evaluate, and most importantly learn more about the professional level TSCM equipment resources supplied by various exhibitors and sponsoring participants.

The CTSC “Bug-off” is open to all conference participants for a chance to win prizes and personal recognition for elite standing.

Prizes, Awards, Peer Recognition, and Bragging Rights are just a few of the benefits for the participants of our TSCM competitive “Bug-off”.

The Office of Evil Intent, aka Paul D Turner, TSS TSI and Andrzej Wolczanski, TSS have spent the previous year plotting and planning challenging methods and real-world compromises for this year's event.

 

Sponsored by the Office of
Evil Intent (OEI)

D216

 

Wednesday

Day 2

1500 - 1515

 

 

CTSC 2019 | Refreshment Break Sponsor

PRICE LANGEVIN 

 

D214



Wednesday

Day 2

Session 13A

1515 - 1615

 

 

How Terrorists' Use of Technology is Making it Harder to Stop Them

Phil Gurski | BIO

Borealis Threat and Risk Consulting

Technological advances solve some problems but make others harder to solve.

In this presentation a former CSIS analyst and author will discuss what needs to be done to keep up with the terrorist threat.

D214

 

Wednesday

Day 2

1615 - 1630

 

 

CTSC 2019 | Refreshment Break Sponsor

PRICE LANGEVIN 

 

D214

Wednesday

Day 2

Session 14A

1630 - 1730

 

The Technical Security Brain | An In-Depth Analysis of the Industry State of Mind

Paul D Turner, TSS TSI | BIO

President | CEO
Professional Development TSCM Group Inc.

This presentation takes a light-hearted look at the the technical security industry based on the mindset and perspective of individual stake-holders.

This presentation brings focus to the challenges that need to be overcome in delivering a competent and ethical technical security program in the reality of hostile competitive ambitions, and out right quackery in the quest for the all mighty dollar.

 

D214

Wednesday

Day 2

1800 - 2200

 

CTSC 2019 | Casual Dinner & Awards Night Sponsor

Kestrel TSCM | Paul D Turner, TSS TSI | CTSC 2018

Join us for a casual, relaxing, and always entertaining Dinner and Awards Night event. Dinner will be served at 1800 hours. Enjoy a catered dinner prepared by the chef and staff of the NAV CENTRE. The evening rounds out with our Keynote speaker and a networking opportunity, with like-minded industry leaders in TSCM and Cyber-Security disciplines.

A cash bar is available.

 

Banquet Room

Wednesday

Day 2

Session

Keynote

1900 - 2030

 

Keynote Presentation | Global, Terrorism, Espionage and Cyber Threats: (GTEC) in Review

David Major | BIO

CI Centre and SPYPEDIA ®

Espionage, terrorism and cyber-attacks dominated the world of security in both information protection, personnel protection and facility integrity for the public and private sector.

Just how serious are these threats? How is the west doing in identifying and neutralizing these modern-day realities?

The various threats will be reviews with facts, figures, charts and details not reported in the media to crystallize the reality of security requirements now and in going forward.

The goal of this presentation will be to help the professional in the room because the “smartest person in the room” to know the truth of what the west is facing in the future.”

 

Banquet Room

 

Wednesday

Day 2

2030 - 2100

 

Industry Awards | Bug-Off Awards | Door Prizes

Banquet Room

Wednesday

Day 2

2100 - 2200

 

Networking Opportunity

Upon completion of the CTSC 2019 Dinner & Awards night festivities there will be an informal networking opportunity rounding our the evening.

This is an excellent opportunity for exhibitors, sponsors and participants and CTSC 2018 guests to socialize and network.

 

Banquet Room

 

Day 3 | Thursday April 04, 2019

 

Time / Session

 

Event Description

Location

Thursday

Day 3

0645 - 0800

 

Breakfast

Breakfast is available for registered guests at NAV CENTRE as part of your overnight guest package.

Reservations for CTSC 2019 accommodations, must be booked directly with the venue NAV CENTRE and is not part of the conference registration package.

 

Propeller
Restaurant

Thursday

Day 3

0700 - 0800

 

Exhibitor Setup

Exhibitors are required to arrive and setup exhibit booths displays between 0730 and 0800 hours.

The CTSC 2019 registration booth and the exhibit area will open to conference participants at 0800 hours sharp.

 

D214

Thursday

Day 3

0800 - 0830

 

Participant | Exhibitor | Presenter Registration

Please attend the CTSC 2019 registration booth to pick-up your conference identification and participant package.

 

D214

Thursday

Day 3

Session 15A

0830 - 0930

 

Phoenix 101: Introduction to the Phoenix Malware Analysis Platform

Gregory Olmstead | BIO | Justin Borland | BIO |

SparkIT Solutions Inc.

Phoenix is the first and only standalone open source malware analysis appliance. Integrating Cuckoo, MISP, and Moloch with users, groups and TLP; it's the workbench you enjoy punching miscreants from.

This talk will be a general overview of the Phoenix appliance, which will get you and your teams off detonating, identifying, and relating families of malware in no time.

D214

 

Thursday

Day 3

0930 - 0945

 

 

CTSC 2019 | Refreshment Break Sponsor

PRICE LANGEVIN 

 

D214

Thursday

Day 3

Session 16A

0945 - 1045

 

Phoenix 201: Advanced control development with the Phoenix malware analysis platform

Gregory Olmstead | BIO | Justin Borland | BIO |

SparkIT Solutions Inc.

One of the core tenets of Phoenix is to make better use of sandbox data with the intention of creating more effective controls.

Phoenix offers a free, open source platform which generates rich data, has an intuitive UI, and is built to share indicators and context with peers.

This talk will go through ways to use this data to build effective controls in depth.

D214

 

Thursday

Day 3

 1045 - 1100

 

 

CTSC 2019 | Refreshment Break Sponsor

PRICE LANGEVIN 

 

D214

Thursday

Day 3

Session 17A

1100 - 1200

 

TSCM Technical Workshop | Part I

Developments in Software Defined Radio (SDR) Hardware and System Platforms

Paul D Turner, TSS TSI | BIO

Professional Development TSCM Group Inc.

Recent developments in advanced high-speed Software Defined Radio hardware has transformed and shaped the TSCM industry with a focus on Probability of Intercept (POI) and Probability of Detection (POD) based on a Modern Moving Target Threat Model that is understood by few manufacturers and technical operators alike.

This presentation will review the core concepts of recent hardware developments and introduce the latest TSCM | SIGINT tactical deployment platforms.

 

D214

Thursday

Day 3

Working
Lunch

1200 - 1245

 

CTSC 2019 | Working Lunch

Sponsored by JD LeaSure at COMSEC LLc.

COMSEC LLCA working lunch will be served for CTSC 2019 participants, exhibitors, presenters and guests in the lower lounge exhibit area.

Please take this opportunity to view the exhibits and network with other conference participants over a casual working lunch.

 

 

D214

Thursday

Day 3

Session 18A

1245 - 1345

 

Technical Workshop | Part II

Conducting an Operator Assisted TSCM RF Inspection Protocol

Paul D Turner, TSS TSI | BIO

Professional Development TSCM Group Inc.

This presentation takes the participant through the process of conducting a typical TSCM RF inspection protocol within an operator defined target area. We are often asked how to best deploy the software in a variety of unique environments, best capture the ambient RF spectrum, and complete an analytical review of the data.

The ability to deploy, capture, analyze and report are considered essential activities to protect your organization against liability in the event something is missed, over-looked, or was simply not present during the inspection, or was not physically discovered due to inactivity or physical inspection limitations imposed by the client, budget, or practical search limitations.

Join us for a scenario based walk-though of a beginning to end RF inspection from deployment to report generation.

 

D214

 

Thursday

Day 3

1345 - 1400

 

 

CTSC 2019 | Refreshment Break Sponsor

PRICE LANGEVIN 

 

D214

Thursday

Day 3

Session 19A

1400 - 1515

 

Technical Workshop | Part III

Conducting Unattended Remote Spectrum Surveillance and Monitoring (RSSM) TM and RF Spectrum Characterization

Paul D Turner, TSS TSI | BIO

Professional Development TSCM Group Inc.

This presentation introduces the advanced concepts and supplemental benefits of targeted and managed Remote Spectrum Surveillance and Monitoring (RSSM) TM and the benefits of Geo-Location based Heat-Mapping at the facility level.

The Kestrel TSCM ® Professional Software has implemented several powerful heat mapping algorithms to facilitate environmental RF monitoring at the facility level and local geographical area surrounding the defined target area.

Gain an understanding of how common signal events can be captured over time to build an analytical characterization of the ambient RF spectrum environment at the signal level.

 

D214

 

Thursday

Day 3

1515 - 1530

 

 

CTSC 2019 | Refreshment Break Sponsor

PRICE LANGEVIN 

 

D214

Thursday

Day 3

Session 20A

1530 - 1615

 

Advanced Power Line Analytics in a Modern Moving Target Threat Model

Paul D Turner, TSS TSI | BIO

Professional Development TSCM Group Inc.

The importance of completing an examination of the target area electrical power grid can not be overstated as an essential analytical practice within a TSCM role.

This protocol is generally over-looked as too complex, or simply not practical for many reasons including electrical safety concerns by technical operators, as well as a lack of realistic equipment resources and a general lack of understanding as to the significance and threat present relative to unintentional radiators and by design Technical Surveillance Devices (TSD) connected to the electrical power grid and other conductive wiring paths.

 

D214

Thursday

Day 3

1615 - 1630

 

Closing Remarks

Paul D Turner, TSS TSI

Professional Development TSCM Group Inc.

 

D214

 

 

Extend Your Professional Credibility | Canadian Technical Security Conference (CTSC) TM

Canada & USA: 1-888-293-7384 | Toronto: (647) 293-7384 | Calgary: (403) 812-0737 | Ottawa: (613) 903-7577

Copyright © 2019 | All Rights Reserved

Last Revised: Monday March 25, 2019 09:38:26

| Webmaster | Copyright | Legal Notice | Privacy |