Home Events 2021 Virtual Canada Cyber Summit

Date

May 04 - 07 2021
Expired!

Time

EDT
11:00 am - 5:30 pm

2021 Virtual Canada Cyber Summit

Overview

Who should attend?

  • High technology or cybercrime investigators from private industry, government, local, state, country and federal law enforcement agencies.
  • Companies offering products or services in the field of high technology crimes or cybercrime.
  • Educators who are interested in the field of high technology crimes or cybercrimes.

The High Technology Crime Investigation Association (HTCIA) is one of the oldest, largest and most prestigious high technology crimes non-profit organizations in existence today. HTCIA’s primary focus is to encourage, promote, aid and effect the voluntary interchange of data, information, experience, ideas, and knowledge about methods, processes, and techniques relating to high technology crime and cybercrime.  We offer 16 distinct lectures over 4 days with social and professional networking amongst industry experts.  Our exhibitors will also have an opportunity to “show off” their industry-best tools during the Vendor Showcase.

Email us at canadacybersummit@htcia.org if you have questions or concerns. 

Attendee Registration Fees

2021 Individual Registration Fees

  • HTCIA Member Early Bird Rate  – $160 USD/$200 CAD
  • Non-member Early Bird  – $220 USD/$275 CAD
  • HTCIA Member Regular Rate – $200 USD/$250 CAD
  • Non-member Regular Rate – $260 USD/$325 CAD
  • Student Rate –  $40 USD/$50 CAD
**An average currency conversion rate was set at .8 to determine pricing this year. Your credit card statement charge may vary slightly based on daily currency exchange fluctuations.** 
 
Additional Information
 
Early bird registration fees must be received by 4/1/2021. Non-member registration includes 1 year of HTCIA Membership (member approval still required). Discounted rates are available for groups of 5 or more!

Hourly Schedule

Day 1 - May 4, 2021

11:00 - 11:45 ET
The Ever-Evolving Privacy and Cybersecurity Legal Risk Landscape
This presentation will cover the ever-evolving legal environment in which high technology investigations take place, focusing on legal obligations, seeking evidence from third parties, managing privilege and how to add value for your clients or employer by working well with lawyers. Presented by David T. S. Fraser, Partner - McInnes Cooper.
12:00 - 12:45 ET
Vendor Showcase - Belkasoft
Join Platinum Annual Sponsor Belkasoft.
1:00 - 1:45 ET
Cyberspace, Terrorist Organizations, and Lone Wolves
The presentation will cover the usage of modern technologies by terrorist groups and lone wolves to perform physical terrorist attacks and will analyze the cyber capabilities of those organizations to perform influential cyber attacks that may harm critical infrastructure of a modern state. Presented by Dr. Tal Pavel, Head of Cybersecurity Studies in the Information Systems Program at The Academic College of Tel Aviv-Yaffo.
2:00 - 2:45 ET
The Power of International Engagement - Cybercrime Investigations
Retired FBI ALAT Melissa McRae will discuss her experience working with Canadian law enforcement and private sector partners on various Cyber crime related investigations, such as Ransomware, Business Email Compromises, Corporate Breaches/Extortions, Botnets, Swatting, and Darknet site investigations. She will convey the power and benefits of working together, understanding each others legal processes, tool sharing, and proactive planning. Through the lessons learned over her twenty plus years as an investigator, she will provide guidance on working international cases, and obtaining buy-in and assistance from partners. Presented by Melissa McRae (Retired FBI Agent), Charted Risk LLC, Global Head of Cyber Risk and Resilience.
3:00 - 3:45 ET
Expanding Your Investigations From Marketplace Listings
Skopenow shows you manual investigation techniques for discovering fraudulent product listings and seller accounts. Learn how to expand your investigation and discover locations, phone numbers, email addresses, and other social media accounts from marketplace listings. Presented by Jake Creps, Product Manager of Skopenow.
4:00 - 4:45 ET
Open Source Intelligence for Security and Law Enforcement
How do you pinpoint a hotel room somewhere in the world just by looking at a photograph? How did a tattoo and a t-shirt lead to a protester's arrest? This presentation offers a review of some interesting real life case studies where OSINT helped investigators and law enforcement to uncover hidden information and solve crimes. Presented by Sami Khoury, Founder and OSINT specialist at TRADECRAFT.
5:00 - 5:30 ET
Networking
Support your local still! Bring a local beverage, snack, or meal to share and enjoy at the end of Day 1. One attendee to the networking session will win a Skip the Dishes or Door Dash gift certificate to use at their favorite local spot.

Day 2 - May 5, 2021

11:00 - 11:45 ET
Opening Keynote - LumFile.com: Technical challenges investigating a massive File Host
LumFile.com was a big undertaking, with 1,000 TB of evidence, and time never on our side. We’ll highlight how we tackled some significant technical challenges, from simply preserving so much evidence, to figuring out what it all meant, ultimately ending in some never-before-seen charges. Presented by Detective Inspector Matt Watson, OPP Criminal Investigations Branch and Special Constable Trevor Fairchild, OPP Digital Forensics.
12:00 - 12:45 ET
Vendor Showcase: Exploring 100x Faster Digital Triage of Computers and Smartphones With Cyan Forensics
Join Patron Sponsor Cyan Forensics for a 30-minute demo!. Presented by Graham Little, Head of Business Development, Cyan Forensics.
1:00 - 1:45 ET
Panel: Latest Developments in Criminal Law and Tech
Practical thoughts to establish possession and control for the Computer Forensics Analyst: Three scenarios. 1. The Marakah case: Where we are at? 2. Password cases 3. Why are you looking where you are looking? Presented by: Susheel Gupta, Senior Strategic Operations Advisor with the RCMP working on counter-terrorism and national security matters; Lynda Morgan, Addario Law Group, Assistant Crown Attorney with the Guns & Gangs Unit of the Ministry of the Attorney General; Steve Johnston, Assistant Executive Director at Specialized Prosecutions Alberta Justice (Calgary).
2:00 - 2:45 ET
Using Python for OSInt investigations with Twitter
This talk focuses on using Python to acquire LIVE open-source intelligence from tweets and the associated images, videos, and translated emojis from geographically bounded areas anywhere in the world. Twitter routinely removes tweets and images from their platform based on policy violations and other influences. By acquiring them as they occur provides both timely access to live events, as well as the ability to preserve future redacted information. Chet will provide details of the approach including examples of Python code along with a live demonstration. Presented by Chet Hosmer, Assistant Professor of Practice at the University of Arizona.
3:00 - 3:45 ET
Remote Forensics + Dealing With Encrypted Mobile Devices
In this presentation we will discuss various ways of remote acquisition of digital devices including computer hard drives and mobile devices. We will also discuss the question of analyzing mobile devices in case of encryption. Presented by Jared Luebbert, Forensic Sales Engineer, Belkasoft.
4:00 - 4:45 ET
Att&cking Back: Challenges and Opportunities Using MITRE ATT&CK for Threat Detection
The MITRE ATT&CK framework offers the promise of durable indicators of cyber attacks. Unlike threat intelligence, which tends to have a short shelf life, many of the TTPs in ATT&CK are difficult for attackers to avoid. The value of these indicators was demonstrated in the SolarWinds and Hafnium attacks, but they apparently did not play a key role in initial discovery. Presentation will examine the ATT&CK framework from the perspective of using it for real time detection and alerting, describe associated challenges, and reveal capabilities that can help defenders successfully apply the framework to detect advanced threats. Presented by Hoke Smith, Vice President, Cybersecurity, NUIX.
5:00 - 5:30 ET
Networking!
It's Whiskey Wednesday! Join this networking session with your favorite whiskey on the rocks, neat, or in a cocktail. One networking attendee this day will receive an HTCIA Challenge Coin and Lapel Pin.

Day 3 - May 6, 2021

11:00 - 11:45 ET
International Law and Cyberspace
This presentation will discuss cybercrime, cyber espionage, and cyber sabotage scenarios. He will walk through cases that involve more than one country, describing domestic and international law likely treatment. He will describe some of the State's positions on the applicability of International Law in cyberspace. Neal leans on his over 25 years of industry experience and his recent PhD research which has been peer reviewed and published by the European Conference on Cyber Warfare and Security (ECCWS), the International Conference on Cyber Warfare and Security (ICCWS), and CyCon 2020 (NATO's flagship conference on Cyber Conflict). Presented by Neal Kushwaha, CEO, Impendo Inc.
12:00 - 12:45 ET
Vendor Showcases
1:00 - 1:45 ET
The Art of Negotiating Ransoms
We will be discussing the details, and the strategy that goes into negotiating ransom payments with threat actors during ransomware investigations. Presented by Stephanie Corvese and Jaycee Roth of Arete Advisors.
2:00 - 2:45 ET
Privacy Tokens: The Next Frontier of Cryptocurrency Forensics
Privacy coins such as Zcash and Monero, often used on darknets, present unique challenges. What strategies could we adopt to improve our response to them? Presented by Patrick McLaughlin, Founder & Chief Innovation Officer, Brane.
3:00 - 3:45 ET
Digital Transformation (Dx) and Cybercrime Landscape
In this presentation we are going to discuss the rapid increase in digital transformation (Dx) over the past year due to COVID-19 and why cybersecurity still continues to be an afterthought. We will then review a recent case study, lessons learned over the past year and suggest some best practices to consider for your own digital transformation as we continue to transition to a new normal, post COVID-19. Presented by Steve Wilson, Centre for Digital Transformation, British Columbia Institute of Technology.
4:00 - 4:45 ET
Digital Forensics of Embedded and IOT devices – Case Studies
Case Studies – Elder will discuss recent forensics cases where valuable evidence was gleamed from devices like a vehicle infotainment system; Amazon Alexa; Smart watch; and a Smart TV to assist investigators with their cases. Presented by Bob Elder, Retired D/Cst VICPD – CEO: Teel Technologies Tech Canada.
5:00 - 5:45 ET
Expanding Your Investigations From Marketplace Listings
Skopenow shows you manual investigation techniques for discovering fraudulent product listings and seller accounts. Learn how to expand your investigation and discover locations, phone numbers, email addresses, and other social media accounts from marketplace listings. Presented by Jake Creps, Product Manager of Skopenow.
6:00 - 6:30 ET
Networking!
Join for TGIF-eve for the final networking event of the Summit! The winner of the Scavenger Hunt will be announced.

Day 4 - May 7, 2021

11:00 - 11:45 ET
Dealing with Extremely Damaged and Biohazardous Electronic Devices.
When digital forensic examiners receive devices that have been damaged, they turn to colleagues or the internet to determine what to do. Watson takes a different approach. He has investigated these devices from the approach of other scientific disciplines. What does materials science, infectious diseases and physics have to do with damaged and biohazardous devices? EVERYTHING. Come hear this fascinating topic with stories that will keep you entertained and information you can put into your digital forensics practice. Presented by Steve Watson, CEO, VTO Labs.
12:00 - 12:45 ET
Vendor Showcases
1:00 - 1:45 ET
How Digital Transformation Goes Wrong: Cautionary Tails from Chernobyl
On April 26th, 1986 at 1:23:40 AM, Aleksandr Akimo, shift supervisor at reactor 4’s control room at Chernobyl, pressed the AZ-5 button. A button designed as a fail-safe and intended to immediately shutdown a nuclear reactor, instead became a detonator leading to the world’s worst nuclear disaster. This talk will reflect on the series of events that led up to the disaster, explore the parallels within cyber security and discuss opportunities to apply these lessons learned within our digital futures. Presented by Alex Dow, Chief Technology Officer of Mirai Security.
2:00 - 2:45 ET
Operational Threat Hunting for the Enterprise
According to IBM’s 2020 Cost of a Data Breach Report, security automation solutions — including AI, analytics and orchestration — and incident response (IR) preparedness, including formation of IR teams and testing IR plans, showed the greatest reduction in data breach costs. Threat hunting is a key component in security operations and incident response. Presented by Neumann Lim and Jay Hankins of Deloitte Canada.
3:00 - 3:45 ET
Panel: Digital Forensic and Cyber Investigation Techniques and Tools
HTCIA International’s Presidents (Past, Present, Future) will host a panel discussion on current views in the foundation of investigations as it relates to Cyber and Digital Forensics. Presented by Todd Shipley (International President), Brandt Watkins (International First Vice President), and Tony Reyes (President Emeritus).