Home Events 2021 Virtual Canada Cyber Summit

Date

May 04 - 07 2021

Time

EDT
11:00 am - 5:30 pm

2021 Virtual Canada Cyber Summit

Overview

Who should attend?

  • High technology or cybercrime investigators from private industry, government, local, state, country and federal law enforcement agencies.
  • Companies offering products or services in the field of high technology crimes or cybercrime.
  • Educators who are interested in the field of high technology crimes or cybercrimes.

The High Technology Crime Investigation Association (HTCIA) is one of the oldest, largest and most prestigious high technology crimes non-profit organizations in existence today. HTCIA’s primary focus is to encourage, promote, aid and effect the voluntary interchange of data, information, experience, ideas, and knowledge about methods, processes, and techniques relating to high technology crime and cybercrime.  We offer 16 distinct lectures over 4 days with social and professional networking amongst industry experts.  Our exhibitors will also have an opportunity to “show off” their industry-best tools during the Vendor Showcase.

Email us at canadacybersummit@htcia.org if you have questions or concerns. 

Attendee Registration Fees

2021 Individual Registration Fees

  • HTCIA Member Early Bird Rate  – $200 USD
  • Non-member Early Bird  – $250 USD
  • HTCIA Member Regular Rate – $250 USD
  • Non-member Regular Rate – $300 USD
  • Student Rate –  $50 USD
 
Additional Information
 
Early bird registration fees must be received by 4/1/2021. Non-member registration includes 1 year of HTCIA Membership (member approval still required). Discounted rates are available for groups of 5 or more!

Hourly Schedule

Day 1 - May 4, 2021

11:00 - 11:45 ET
The Ever-Evolving Privacy and Cybersecurity Legal Risk Landscape
This presentation will cover the ever-evolving legal environment in which high technology investigations take place, focusing on legal obligations, seeking evidence from third parties, managing privilege and how to add value for your clients or employer by working well with lawyers. Presented by David T. S. Fraser, Partner - McInnes Cooper.
12:00 - 12:45 ET
Vendor Showcases
1:00 - 1:45 ET
Cyberspace, Terrorist Organizations, and Lone Wolves
The presentation will cover the usage of modern technologies by terrorist groups and lone wolves to perform physical terrorist attacks and will analyze the cyber capabilities of those organizations to perform influential cyber attacks that may harm critical infrastructure of a modern state. Presented by Dr. Tal Pavel, Head of Cybersecurity Studies in the Information Systems Program at The Academic College of Tel Aviv-Yaffo.
2:00 - 2:45 ET
The Power of International Engagement - Cybercrime Investigations
Retired FBI ALAT Melissa McRae will discuss her experience working with Canadian law enforcement and private sector partners on various Cyber crime related investigations, such as Ransomware, Business Email Compromises, Corporate Breaches/Extortions, Botnets, Swatting, and Darknet site investigations. She will convey the power and benefits of working together, understanding each others legal processes, tool sharing, and proactive planning. Through the lessons learned over her twenty plus years as an investigator, she will provide guidance on working international cases, and obtaining buy-in and assistance from partners. Presented by Melissa McRae (Retired FBI Agent), Charted Risk LLC, Global Head of Cyber Risk and Resilience.
3:00 - 3:45 ET
Expanding Your Investigations From Marketplace Listings
Skopenow shows you manual investigation techniques for discovering fraudulent product listings and seller accounts. Learn how to expand your investigation and discover locations, phone numbers, email addresses, and other social media accounts from marketplace listings. Presented by Jake Creps, Product Manager of Skopenow.
4:00 - 4:45 ET
Open Source Intelligence for Security and Law Enforcement
How do you pinpoint a hotel room somewhere in the world just by looking at a photograph? How did a tattoo and a t-shirt lead to a protester's arrest? This presentation offers a review of some interesting real life case studies where OSINT helped investigators and law enforcement to uncover hidden information and solve crimes. Presented by Sami Khoury, Founder and OSINT specialist at TRADECRAFT.
5:00 - 5:30 ET
Networking
Support your local still! Bring a local beverage, snack, or meal to share and enjoy at the end of Day 1. One attendee to the networking session will win a Skip the Dishes or Door Dash gift certificate to use at their favorite local spot.

Day 2 - May 5, 2021

11:00 - 11:45 ET
Opening Keynote - Security From a Telecommunication's Point of View
The backbone of the Internet. Sounds a little ominous eh? And yet many people think telcos operate just the same as any other organization. One common question we get is – how is security different at a Telecommunications organization than your average organization. Please join me so I can tell you how! Presented by Natasha Hellberg, Senior Manager of Threat Intelligence Bell Canada.
12:00 - 12:45 ET
Vendor Showcases
1:00 - 1:45 ET
Panel: Latest Developments in Criminal Law and Tech
Practical thoughts to establish possession and control for the Computer Forensics Analyst: Three scenarios. 1. The Marakah case: Where we are at? 2. Password cases 3. Why are you looking where you are looking? Presented by: Susheel Gupta, Senior Strategic Operations Advisor with the RCMP working on counter-terrorism and national security matters; Lynda Morgan, Addario Law Group, Assistant Crown Attorney with the Guns & Gangs Unit of the Ministry of the Attorney General; Steve Johnston, Assistant Executive Director at Specialized Prosecutions Alberta Justice (Calgary).
2:00 - 2:45 ET
Using Python for OSInt investigations with Twitter
This talk focuses on using Python to acquire LIVE open-source intelligence from tweets and the associated images, videos, and translated emojis from geographically bounded areas anywhere in the world. Twitter routinely removes tweets and images from their platform based on policy violations and other influences. By acquiring them as they occur provides both timely access to live events, as well as the ability to preserve future redacted information. Chet will provide details of the approach including examples of Python code along with a live demonstration. Presented by Chet Hosmer, Assistant Professor of Practice at the University of Arizona.
3:00 - 3:45 ET
Remote Forensics + Dealing With Encrypted Mobile Devices
In this presentation we will discuss various ways of remote acquisition of digital devices including computer hard drives and mobile devices. We will also discuss the question of analyzing mobile devices in case of encryption. Presented by Jared Luebbert, Forensic Sales Engineer, Belkasoft.
4:00 - 4:45 ET
Session 10
5:00 - 5:30 ET
Networking!
It's Whiskey Wednesday! Join this networking session with your favorite whiskey on the rocks, neat, or in a cocktail. One networking attendee this day will receive an HTCIA Challenge Coin and Lapel Pin.

Day 3 - May 6, 2021

11:00 - 11:45 ET
International Law and Cyberspace
This presentation will discuss cybercrime, cyber espionage, and cyber sabotage scenarios. He will walk through cases that involve more than one country, describing domestic and international law likely treatment. He will describe some of the State's positions on the applicability of International Law in cyberspace. Neal leans on his over 25 years of industry experience and his recent PhD research which has been peer reviewed and published by the European Conference on Cyber Warfare and Security (ECCWS), the International Conference on Cyber Warfare and Security (ICCWS), and CyCon 2020 (NATO's flagship conference on Cyber Conflict). Presented by Neal Kushwaha, CEO, Impendo Inc.
12:00 - 12:45 ET
Vendor Showcases
1:00 - 1:45 ET
The Art of Negotiating Ransoms
We will be discussing the details, and the strategy that goes into negotiating ransom payments with threat actors during ransomware investigations. Presented by Stephanie Corvese and Jaycee Roth of Arete Advisors.
2:00 - 2:45 ET
Privacy Tokens: The Next Frontier of Cryptocurrency Forensics
Privacy coins such as Zcash and Monero, often used on darknets, present unique challenges. What strategies could we adopt to improve our response to them? Presented by Patrick McLaughlin, Founder & Chief Innovation Officer, Brane.
3:00 - 3:45 ET
Digital Transformation (Dx) and Cybercrime Landscape
In this presentation we are going to discuss the rapid increase in digital transformation (Dx) over the past year due to COVID-19 and why cybersecurity still continues to be an afterthought. We will then review a recent case study, lessons learned over the past year and suggest some best practices to consider for your own digital transformation as we continue to transition to a new normal, post COVID-19. Presented by Steve Wilson, Centre for Digital Transformation, British Columbia Institute of Technology.
4:00 - 4:45 ET
Digital Forensics of Embedded and IOT devices – Case Studies
Case Studies – Elder will discuss recent forensics cases where valuable evidence was gleamed from devices like a vehicle infotainment system; Amazon Alexa; Smart watch; and a Smart TV to assist investigators with their cases. Presented by Bob Elder, Retired D/Cst VICPD – CEO: Teel Technologies Tech Canada.
5:00 - 5:30 ET
Networking!

Day 4 - May 7, 2021

11:00 - 11:45 ET
Opening Keynote - Session 16
12:00 - 12:45 ET
Vendor Showcases
1:00 - 1:45 ET
How Digital Transformation Goes Wrong: Cautionary Tails from Chernobyl
On April 26th, 1986 at 1:23:40 AM, Aleksandr Akimo, shift supervisor at reactor 4’s control room at Chernobyl, pressed the AZ-5 button. A button designed as a fail-safe and intended to immediately shutdown a nuclear reactor, instead became a detonator leading to the world’s worst nuclear disaster. This talk will reflect on the series of events that led up to the disaster, explore the parallels within cyber security and discuss opportunities to apply these lessons learned within our digital futures. Presented by Alex Dow, Chief Technology Officer of Mirai Security.
2:00 - 2:45 ET
Operational Threat Hunting for the Enterprise
According to IBM’s 2020 Cost of a Data Breach Report, security automation solutions — including AI, analytics and orchestration — and incident response (IR) preparedness, including formation of IR teams and testing IR plans, showed the greatest reduction in data breach costs. Threat hunting is a key component in security operations and incident response. Presented by Neumann Lim.
3:00 - 3:45 ET
Session 19
4:00 - 4:45 ET
Panel: Digital Forensic and Cyber Investigation Techniques and Tools
HTCIA International’s Presidents (Past, Present, Future) will host a panel discussion on current views in the foundation of investigations as it relates to Cyber and Digital Forensics. Presented by Todd Shipley (International President), Brandt Watkins (International First Vice President), and Tony Reyes (President Emeritus).
5:00 - 5:30 ET
Networking!
T-G-I-F!