Before we go any further, I do have something to confess. I am one of the organizers of the conference. I wasn’t when it started five years ago, but I saw the potential even then.
The conference has grown steadily over the past five years, with this year being particularly notable with attendance at an all-time high and increased sponsorship from companies such as Dell. We also had world-class speakers like Mkit CEO Matias Katz, who came all the way from Argentina for the third year in a row.
Here are three future-ready takeaways from AtlSecCon:
1. The future is bright: Since its inception, student attendance has normally been low at AtlSecCon. This is most likely due to the fact that it happens over the span of two weekdays. It wasn’t the case this year. There were record numbers of student attendees from well-known educational institutions such as Dalhousie University and the Nova Scotia Community College (NSCC). This goes to show that institutions like these realize that best place to learn isn’t necessarily in a lecture hall. Networking with industry professionals can go a long way in helping to guarantee a bright future.
2. The future is female: AtlSecCon had an amazing volunteer crew this year, and they were all female NSCC students enrolled in various IT programs. As we all know, the “lack of women in tech” issue has been around for more than a few years. We at AtlSecCon have always recruited women to attend and speak at our conference. This year was no exception:
- Well-known TED speaker Keren Elazari, Research Fellow at Tel Aviv University, spoke about the good that hackers can do.
- Ksenia Dmitrieva, senior security consultant at Cigital, showed attendees how to use Content Security Policy to protect Web applications.
- Anna Manley (a fellow Cape Bretoner), an articled clerk at Sampson McDougall, asked the audience, “Can the police legally compel you to provide the encryption key for your encrypted laptop?”
3. The future is local: While we had no shortage of come from away* speakers, our crop of local speakers grows every year.
- Ben Goodspeed, principal at Goodspeed IT Consulting, discussed formal mathematical methods in security research.
- Paul Halliday, senior software developer at Critical Stack, talked about squert, a widely-used open source Web interface for network/enterprise security monitoring that Halliday built, in Nova Scotia.
- Daniel Merritt, software development consultant at Merritt Consulting, introduced us to traffic logging in network forensics.
- Peter Morin, senior specialist — IS Response at Bell, showed us how to take a forensic approach to incident response.
- Colin O’Flynn, electrical engineering consultant, not only showed us the technical workings of side-channel power analysis and glitching attacks, but also how they apply to real systems, and what this means to those designing those systems.
- Julien Savoie, network administrator at Universite Sainte-Anne, cut through the hype and answered some basic questions about Tor and how well it stands up in a post-security breach world.
- David Shipley, director, Strategic Initiatives, Information Technology Services, showed us how the University of New Brunswick is using policy, practice and technology to enhance cybersecurity.
Do you think Atlantic Canada is future-ready now?
*Atlantic Canada slang
This post was written as part of the Dell Insight Partners program, which provides news and analysis about the evolving world of tech. For more on these topics, visit Dell’s thought leadership site Power More. Dell sponsored this article, but the opinions are my own and don’t necessarily represent Dell’s positions or strategies.