We are mid-way through the 11th annual SecTor conference in Toronto, Canada. As Canada’s premiere IT security conference, SecTor has built a reputation of bringing together experts from around the world to share their latest research and techniques involving underground threats and corporate defenses. The conference provides an unmatched opportunity for IT professionals and managers to connect with peers and learn from mentors. New Signature employees Ezekiel and Vlad. This year, the conference theme is “Illuminating the Black Art of Security”, and features expert speakers, including Allison Miller, Product Manager of Security and Privacy at Google; Bruce Schneier, Special Advisor to IBM Security; Colleen Merchant, Director General for Canadian National Cyber Security; and David Shrier, Founder and CEO of Distilled Analytics. In the IT world, Black Arts, also known as voodoo programming, are defined as a collection of arcane, unpublished, and mostly ad-hoc techniques developed for a particular application or systems area. The huge proliferation of formal and informal channels for spreading around new computer-related technologies during the last twenty years has made both the term black art and what it describes. It’s a technique that works, though nobody really understands why. New Signature is a continued sponsor of the quality content brought forth at the SecTor event, and our sponsorship allows us to attend the function and also offer some of our clients to attend at no cost to them. About SecTor SecTor was created by founders of TASK, North America’s largest and most successful IT security user group. After many years of attending IT Security events in the United States, and being disappointed that no similar event existed in central Canada, the decision was made to fill the void. SecTor has built a reputation of bringing together experts from around the world to share their latest research and techniques. In a non-threatening and productive way, SecTor sheds light on the underground threats and mischief that threaten corporate and personal IT systems. Through identifying, discussing, dissecting and debating these digital threats, the strongest defenses can be mounted.