Software developers like to write the best code they can. However, they do not like to jump through hoops. Static Application Security Testing can provide valuable advice, but it needs to be well integrated into the pipeline and support scaling. Luckily, today’s technologies make this very easy.
This presentation will discuss three novel R&D projects focused on leveraging LLMs for cyber incident response. Most notably, we will be discussing a cyber-security focused LlaMa 2 model, that was fine-tuned on over 10,000 human investigated cyber incidents and its implementation within the SOC.
The sobering truth is that your mobile applications security fa√ßade is an illusion. Join me as we dive into the reality of mobile security using real world examples. Whether you’re a penetration tester seeking valuable insights or a developer looking for actionable fixes, this talk is for you.
This talk will review the Bill-C26 and its implications for critical service providers, as well as Canadian businesses, broadly, and explore how security operations enables compliance (and reduces friction to providing services to in-scope organisations).
This talk highlights how core computer science algorithms can guide life decisions and enhance cybersecurity operations. Through real-world examples, we’ll examine three key algorithms, illustrating their value in counterintuitive yet effective cybersecurity practices.
Unfortunately, organizations have become ‘nose blind’ to cyber and IT project schedules. It’s almost like everyone expects a project to be late or to fail entirely. BUT, this shoudn’t be the case! We will explore common pitfalls and what can be done to avoid them, setting you up for success!
Internet, DNS, supply chain, crypto, cloud, … these sound like things we need to keep up and running (while everything else gets hacked into oblivion). Leaving up to just government or just industry is a bad idea. Here’s how our digital economy is actually being helped, by an acronym called CFDIR.