BEGIN:VCALENDAR
PRODID:-//GiftTool//Calendar MIMEDIR//EN
VERSION:2.0
METHOD:PUBLISH
BEGIN:VEVENT
DTSTAMP:20260402T170000Z
DTSTART:20260402T170000Z
DTEND:20260402T203000Z
LOCATION;ENCODING=QUOTED-PRINTABLE:5th Floor, 20 Wellington Street E, Toronto, ON
UID:support@isacatoronto.com
DESCRIPTION;ENCODING=QUOTED-PRINTABLE:  Session Summary/Abstract=0D=0A=0D=0A =0D=0A=0D=0AFrom external=0D=0A  reconnaissance to final containment. Alex and Brandon will walk=0D=0A  through a cyberattack from both the attackers and defenders? point of=0D=0A  view. Starting from an attacker analyzing a potential target to=0D=0A  execution of the attack, first detection, containment and more. A long=0D=0A  the way, they will share common pitfalls and gaps they have seen so=0D=0A  blue teams can be more prepared.  =0D=0A=0D=0A =0D=0A=0D=0A  Speaker Bio=0D=0A=0D=0A=0D=0A   =0D=0A=0D=0A=0D=0A  Brandon Norberto=0D=0A=0D=0ABrandon is a Senior=0D=0A  Manager in BDO?s Cybersecurity team and has over 10 years of=0D=0A  experience running threat management operations, cloud=0D=0A  security engineering and security process design. =0D=0A=0D=0ABefore joining BDO=0D=0A  Brandon led cyber security engineering teams in Big 4 firms driving a=0D=0A  technology first and automation approach to reduce inefficient process=0D=0A  and drive-up detection fidelity for high-profile Canadian clients=0D=0A  across industries including: retail, energy, transportation,=0D=0A  financial services and public sector. Brandon has a passion for=0D=0A  implementing automation and orchestration for clients to reduce mean=0D=0A  time to detect and mean time to respond and action security related=0D=0A  threats. His second passion is leveraging the data for insights and=0D=0A  developing custom reports and dashboards for the clients he serves. =0D=0A=0D=0A =0D=0A=0D=0A  Alex Phan=0D=0A=0D=0AAlex is=0D=0A  an offensive cybersecurity senior manager at BDO with more=0D=0A  than seven years of experience in offensive security. =0D=0A=0D=0AHe leads a team of=0D=0A  offensive security experts that helps business stay secure by=0D=0A  simulating cybersecurity attacks against organizations using the same=0D=0A  tactics and techniques used by threat actors today. He has seen=0D=0A  firsthand how difficult hackers are to contain remove once they gain a=0D=0A  foothold within an organization?s network. His offensive security=0D=0A  insights help blue teams think and understand threat actors helping=0D=0A  teams contain incidents faster. =0D=0A=0D=0A =0D=0A=0D=0A =0D=0A=0D=0ACPE:4.0 Hrs.=0D=0A=0D=0A =0D=0A=0D=0A  Refund &amp; Cancellation Policy in effect=0D=0A=0D=0A
SUMMARY:Closing the Gates: What Attackers Exploit and Defenders Miss
PRIORITY:3
END:VEVENT
END:VCALENDAR
