SEE LIVE: Western Canada Information Security Conference May 16, 2017

ISACA® Winnipeg Chapter is proud to announce the 2017 Western Canada Information Security Conference (WCISC), the only Information Security and Control Conference in Manitoba!

Now in its fifteenth year, the Western Canada Information Security Conference brings together Information Security and IT Audit and Control professionals from across western Canada to expand their Information Security knowledge and skills and to encourage and foster the free exchange of information, techniques, and best security practices.

In conjunction with the WCISC, the ISACA Winnipeg Chapter is offering a two-day  CSX Fundamentals Workshop after the conference on May 17th and 18th, 2017 at the RBC Winnipeg Convention Centre.

Early-bird and package pricing with WCISC attendance is available, but seats are limited – if you are interested in attending the workshop, please register early.

See (CSX Fundamentals workshop link on WCISC website) for workshop details and pricing information.

This year’s conference will be held on Tuesday May 16th, 2017 at the RBC Convention Centre Winnipeg, 375 York Avenue, Winnipeg, MB Canada R3C 3J3. Please check back frequently for more information!

The ISACA® Winnipeg Chapter is proud to sponsor Manitoba’s premiere Information Security Conference.

2017 WCISC Lunch Keynote Speaker

Kevin Mitnick

The World’s Most Famous Hacker

There is no one like Kevin

Once one of the FBI’s Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide.

Kevin and The Global Ghost Team™ now maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering.

As CEO and chief “white hat” hacker at one of the most advanced boutique security firms in the world, Kevin mentors leaders, executives and staff on both the theory and practice of social engineering, topics in which he is the leading global authority.

Kevin’s presentations are akin to technology magic shows which include the latest hacking techniques that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness”.

Kevin is a major viral channel for Cybersecurity, and his thinking goes globally viral instantly. Kevin’s own social media continues to be a powerhouse: For example, his growing 180,000 “real” twitter followers (@kevinmitnick) consists of just about the entire world’s press, security professionals, governments, the key security thought leaders, and a legion of fans from around the globe.

For more information about Kevin Mitnick, follow this link Mitnick Security Consulting.

Register here.

Source: WCISC

Topics: Social Engineering, Speaking Engagements, Fortune 500, Western Canada, cyber security, security consultant, Kevin Mitnick Security Awareness Training, technology magic shows, The Global Ghost Team, white hat hacker, CSX Fundamentals Workshop, RBC Winnipeg Convention Centre, Information Security Conference, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

The Growth of Third-Party Software Supply Chain Cyber Attacks

When testing your employees' social engineering readiness, your teams need simulated attacks that feel as if they’re coming from a nefarious engineer...

Read more ›

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›