Jason Soroko

Jason Soroko

Timmins, Ontario, Canada
2K followers 500+ connections

Activity

Join now to see all activity

Experience

Volunteer Experience

  • Photographer

    Timmins Humane Society

    - Present 14 years

    Animal Welfare

    Providing promotional photographic services for animals in need. Also volunteering to photograph pets for fundraising activities.

Publications

  • Turning the Mobile Device Evolution in Your Favor

    SC Magazine

    Magazine Article

    See publication
  • The climate of North America and adjacent ocean waters ca. 6 ka

    Canadian Journal of Earth Sciences

    The climate of North America and the adjacent ocean at 6000 BP was estimated using five independent approaches. Using pollen data, the terrestrial climate was estimated by the movement of ecozone boundaries and by the method of modern analogues. Both analyses indicate warmer temperatures in the western Great Lakes area and the northern Great Plains. A model of Sphagnum-dominated peatland initiation, when forced by Canadian Climate Model 6 ka output projected a cooler and (or) wetter climate for…

    The climate of North America and the adjacent ocean at 6000 BP was estimated using five independent approaches. Using pollen data, the terrestrial climate was estimated by the movement of ecozone boundaries and by the method of modern analogues. Both analyses indicate warmer temperatures in the western Great Lakes area and the northern Great Plains. A model of Sphagnum-dominated peatland initiation, when forced by Canadian Climate Model 6 ka output projected a cooler and (or) wetter climate for continental western North America. Contrary to this, a reconstruction of the distribution of Sphagnum-dominated peatlands in western Canada indicates that they were located north of their modern distribution, suggesting warmer and (or) drier conditions at 6000 BP. This interpretation is strengthened by observations of lower lake levels at 6000 BP in western Canada. This drier climate may have been associated with warmer conditions as indicated by the quantitative climate reconstructions. In general, eastern North America was drier, while western North America was warmer and drier at 6 ka compared to the present. A model of vegetation and carbon storage, when forced using 6 ka Canadian Climate Model and pollen-based climate reconstructions, showed an increase in area covered by boreal forest, extending north and south of the present location. This was not, however, verified by the fossil data. Additionally, the model showed little total change in carbon storage at 6 ka in the terrestrial biosphere. Estimated sea surface temperatures off eastern Canada suggest warmer surface waters at 6 ka, in agreement with reconstructions based on terrestrial records from the eastern seaboard.

    See publication
  • Creation of a Fixed Route Scheduling Database by the Precision Merging of Schedule, Bus Stop and Base Map Data Sets to Support Scheduling Operations

    ESRI Proceedings

    The project objective was to successfully merge varied databases to support the Computerized Telephone Information System (CTIS) and other METRO Enterprise GIS applications. The design and development of a Microsoft® Visual Basic® program to convert schedule data from a commercially available software package into Oracle® will be explained. Special focus will be provided on the integration of schedule, bus stop and street base map databases that are maintained by individual METRO departments…

    The project objective was to successfully merge varied databases to support the Computerized Telephone Information System (CTIS) and other METRO Enterprise GIS applications. The design and development of a Microsoft® Visual Basic® program to convert schedule data from a commercially available software package into Oracle® will be explained. Special focus will be provided on the integration of schedule, bus stop and street base map databases that are maintained by individual METRO departments and other governmental entities. Discussion will include the resulting procedures, route model, turn table modifications and AML™ tools developed to create routes and sequence bus stops and turn points.

    See publication
Join now to see all publications

Patents

  • METHOD AND APPARATUS FOR PROVIDING VEHICLE SECURITY

    Issued US US2016012653 (A1)

    Apparatus, systems and methods are disclosed that utilize a vehicle user's input to provide logical context of legitimate vehicle usage through a remote access device to defend the vehicle from theft. As such, an additional level of security is employed and may be used in addition to other security and theft prevention technologies of the vehicle. In one example, a legitimate automobile operator signals the context of the vehicle's state to a hardware security module in the vehicle. The states…

    Apparatus, systems and methods are disclosed that utilize a vehicle user's input to provide logical context of legitimate vehicle usage through a remote access device to defend the vehicle from theft. As such, an additional level of security is employed and may be used in addition to other security and theft prevention technologies of the vehicle. In one example, a legitimate automobile operator signals the context of the vehicle's state to a hardware security module in the vehicle. The states include, for example, to disallow all diagnostic system access or to allow diagnostic access for servicing.

    See patent

Courses

  • Administration Essentials for Experienced Admins (SalesForce.com)

    ADM 211

  • Apex & Visualforce Controllers (SalesForce.com)

    DEV 501

  • Architecting Highly Secure Applications on Amazon AWS (Trend Micro)

    Amazon AWS re:invent 2013

  • Building Applications with Force.com (SalesForce.com)

    DEV 401

  • Designing Secure Protocols And Intercepting Secure Communication: Moxie Marlinspike

    Black Hat 2013

  • ESRI ArcGIS

    -

  • Hunting with Mandiant Incident Response: Mandiant

    MIRCon 2013

  • IBM Cognos Authoring Reports with Multidimentional Data

    -

  • IBM Cognos BI Administration

    -

  • IBM Cognos Design and Develop Models

    -

  • IBM Cognos Report Studio

    -

  • IBM Cognos TM1 Multidimentional

    -

  • Jailbreaking iOS: Jay Freeman - Saurik

    JailbreakCon 2013

  • Java

    -

  • Mandiant Incident Handling for the Enterprise: Mandiant

    Countermeasures 2012

  • Mobile Hacking II: HotWan

    Black Hat 2013

  • Modern Botnets: Ken Baylor

    Black Hat 2012

  • Powershell for Professionals: Carlos Perez

    DerbyCon 2012

  • SANS: Advanced Exploit Development

    SEC710

  • SANS: Hacker Techniques, Exploits & Incident Handling

    SEC 504

  • SANS: Law of Data Security and Investigations

    LEG523

  • SANS: Mobile Device Security and Ethical Hacking

    SEC575

  • SCADA Security Training: Red Tiger Security

    SANS Barcelona 2012

  • SQL Server BI

    -

  • Tactical Exploitation: Attack Research

    Black Hat 2012

Projects

  • Webinar - Ensuring a Trusted Internet of Things - Engineers Australia

    - Present

    We describe a security approach that unlocks business value by enabling secure access to IoT data. The intent is to ensure the right security level for every device, application, system and user. We ensure that data is usable only by authorized devices, applications and users. This allows you to create trusted IoT ecosystems and safeguard the flow of data across your infrastructure.

    See project
  • Speaker - InfoSec Netherlands

    - Present

  • Implications of Malware Series

    Series of 5 Webinars.

    All organizations, regardless of size, are at risk for a security breach or malware attack. State and local government entities are no exception. While there are tools that can prevent the wholesale destruction of data after an attack, the BEST defense for any organization is to proactively prevent intruders from gaining control over the network in the first place.

    The Implications of Malware Webinar Series is designed to help you prevent malware…

    Series of 5 Webinars.

    All organizations, regardless of size, are at risk for a security breach or malware attack. State and local government entities are no exception. While there are tools that can prevent the wholesale destruction of data after an attack, the BEST defense for any organization is to proactively prevent intruders from gaining control over the network in the first place.

    The Implications of Malware Webinar Series is designed to help you prevent malware infection/intrusion through education. Join us and discover how the most damaging forms of malware work, and how, by leveraging Entrust’s Government Solutions and Professional Services, you can protect yourself and your colleagues.

    See project
  • Speaker - 2nd Annual Technology & Innovation - The Future of Security in Financial Services

    Placing Identity at the Centre of Cyber Security
    • What are the fundamental weaknesses in desktop operating systems which are abused by attackers?
    • Leveraging mobile platforms to enhance security and increase user experience
    • Why mobile operating systems are more secure than desktop operating systems
    • Zeus Virus Demonstration: learn how key-logging malware and fundamental Windows functionality caught many unawares

    See project
  • Product Innovation

    - Present

    Product Innovation at Entrust Datacard

  • eCrime Europe - November 2013

    Speaker presentation on leveraging mobile devices. Explanation of malware techniques, multifactor authentication.

    See project
  • Customer Visit Demonstrations / Webinars

    - Present

    -Ongoing customer visits, globally.
    -Demonstrations of malware, and how to mitigate malware with Entrust products including mobile smart credential.

    Webinars have been presented for:
    SC Magazine
    BankInfoSecurity
    BrightTALK

    See project
  • Marketing and product management thought leadership - Security

    - Present

    Ongoing thought leadership for marketing and product management.

  • Mobile Security

    - Present

    iOS and Android platform security assessments. Supporting product management, marketing and R&D with information regarding mobile architectures, especially security.

  • London, UK Customer Roadshow 2013

    -

    The London Cybersecurity Forum was a great success. Attendees gained insight from the world's most trusted security experts, including Sir Dick Evans, former BAE chairman; Andrew Pinder, former government eEnvoy; and Entrust president and CEO Bill Conner.

    See project
  • Washington, DC Customer Roadshow

    -

    Join the World's Top Cybersecurity Experts to Explore Advanced Malware that Threatens Digital Identities
    Attend the private Washington DC Cybersecurity Forum to gain insight from Entrust's most trusted security experts, including President and CEO Bill Conner, Chief Operating Officer Bill Holtz and Director of Malware Research Jason Soroko. As part of a unique engagement for the Washington DC event, General Michael V. Hayden, Principal of The Chertoff Group and former Director of the Central…

    Join the World's Top Cybersecurity Experts to Explore Advanced Malware that Threatens Digital Identities
    Attend the private Washington DC Cybersecurity Forum to gain insight from Entrust's most trusted security experts, including President and CEO Bill Conner, Chief Operating Officer Bill Holtz and Director of Malware Research Jason Soroko. As part of a unique engagement for the Washington DC event, General Michael V. Hayden, Principal of The Chertoff Group and former Director of the Central Intelligence Agency, will deliver the keynote presentation, "Defining the Legal and Ethical Boundaries of the Cyber Frontier."

    This half-day event will explore real examples of the latest malware attacks — including session-riding, key-logging and more — and discuss how to properly combat highly targeted attacks.

    See project

More activity by Jason

View Jason’s full profile

  • See who you know in common
  • Get introduced
  • Contact Jason directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Jason Soroko

Add new skills with these courses