SC Congress Toronto Brings Answers to Critical IT Security Problems

Share Article

From Hacktivists to Supply Chain Risk to Mobile Security - Premier IT Security Event Tackles Rapidly Changing Security Threat Landscape

News Image
We designed SC Congress Toronto to provide solutions and tactics for the risks Canadian IT professionals are facing right now... the problems that require the most attention and the answers that will protect from the most sophisticated attacks.”

SC Congress Toronto 2013, Canada’s premier information security event, announces its fourth annual conference and expo at the Metro Convention Center in Toronto on June 11 - 12, 2013. The event brings industry thought leaders together to provide the answers IT professionals need to secure today’s enterprise networks against increasingly sophisticated and targeted attacks.

The headlines of today underscore the reality that everyone from companies to NGOs to governments is a target for a cyber attack. SC Congress Toronto has a jam-packed schedule with the latest information on security threats and solutions - including live demos showcasing the tricks hackers use to breach networks. Attending security professionals will gain the most up-to-date information to take back to the office and implement to protect their sensitive information. They will also see the latest innovations, technology services and solutions from all the leading vendors on the bustling expo show floor.

“Cyber threats are constantly evolving and targeting organizations of all sizes and industries,” said Illena Armstrong, Vice President of Editorial, SC Magazine. “We designed SC Congress Toronto to provide solutions and tactics for the risks Canadian IT professionals are facing right now. The event will focus on the problems that require the most attention from security professionals and the answers that will protect today’s enterprise networks from the most sophisticated attacks.”

The 2013 SC Congress Toronto Keynotes include:

Supply Chain + Cyber Intelligence + (insert bad country) = Risk
IT security has attempted to harden network perimeters, improve anti-virus/malware tools and encrypt everything. All this, and the cyber supply chain has gone completely unchecked. Cyber supply chains are one of the most deadly vulnerabilities and they are rarely evaluated. Levinson discusses what supply chains really are, so IT professionals can fully understand their functionality and investigate ways to protecting them.

  •     Curtis KS Levinson, United States cyber defense advisor, NATO

How Hackers Really Hack - Live demonstrations of current methods of breaching networks and stealing information
We've all heard about attacks that bypass firewalls, intrusion detection and antivirus, but have you ever actually seen it done? Webber discusses the methods attackers are currently using to breach networks, then use the same tools and techniques to actually create malicious backdoors, spoofed websites and phishing email campaigns that go undetected by firewalls, IDS and antivirus. But don’t worry; he also explores effective ways to combat these threats and safeguard information.

  •     Derrick Webber, penetration testing and digital forensics team Lead, CGI

SC Congress Toronto will feature timely breakout sessions, where Canadian subject matter experts will address the most critical IT security questions and challenges. The sessions will follow three tracks, Emerging Threats/Management, Technical, and Editor’s Choice and include topics like:

  •     Profile of today's adversaries

Organized crime, hacktivists and state-sponsored actors are responsible for a good deal of exfiltrated information, defaced websites and many other intrusions and related acts. So what do these individuals and groups have in common, and how does one best thwart their actions? We'll take a deep dive to deliver actionable answers.

  •     Information security adaptation: Survival in an evolving threat landscape

We will share a breakdown of the anatomy of an attack and demonstrate how the threat landscape has evolved. Hear first-hand stories and analysis of recent attacks and what organizations can do to mitigate them. Most importantly, learn how one should be securing tomorrow’s perimeter.

  •     Big data

Businesses are producing terabytes of data, much of which needs to be stored for long periods of time – either for regulatory reasons or otherwise. But, what are the most pressing security issues with Big Data? We will unearth the latest intelligence on this burgeoning topic.

  •     Cloudy with a chance of data breaches

Technology often evolves quicker than the security needed to protect it. While cloud computing tools and services proliferate, the security required to protect the environment is still a work in progress. Meanwhile, criminals are, as usual, a few steps ahead: Why bother attacking a company's systems when one can – with one attack – gain access to the networks of a hundred? So what's being done to defend data being stored on offsite servers? We've got the answers.

Additional must-attend sessions include: “DDoS Revisited,” “Supply chain risk management,” “Facebook, New York Times, Evernote, Twitter: A look at some of this year's most notorious attacks,” “Canadian privacy laws,” “Data sprawl: It's not just networks storage anymore,” “Social media and the enterprise,” and much, much more!

A full list of speakers, a conference agenda, media partners, sponsors and participant registration can be found at,

Registration for the conference is currently open. To register for the conference, please visit,

About SC Magazine
SC Magazine provides IT security professionals with in-depth and unbiased information through timely news, comprehensive analysis, cutting-edge features, contributions from thought leaders and the best, most extensive collection of product reviews in the business. By offering a consolidated view of IT security through independent product tests and well-researched editorial content that provides the contextual backdrop for how these IT security tools will address larger demands put on businesses today, SC Magazine enables IT security pros to make the right security decisions for their companies. The brand’s portfolio includes the SC World Conference and Expo, SC Congress Toronto, SC Magazine Awards, SC Directory, SC Magazine Newswire and SC Magazine IT Security Executives Forums.

Fan us on Facebook!
Follow us on Twitter:

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Hally Wax
MIX Public Relations
(206) 353-0888
Email >
Visit website