Bsidesottawa 2015 Oct. 2, 2015 to Oct. 3, 2015, ottawa,canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening Remarks Adrien de Beaupre N/A
Top 10 IT Security Actions - Focused Mitigation for Maximum Return Greg Hills The Communications Security Establishment (CSE) has selected and prioritized the Top 10 Security Actions based ...
Running an Application Security Program Paul Ionescu The goal of the presentation is to show how securing applications is not just a ...
Hunting Down Enemy Nation States Within Your Organization Robert Masse For the last 10 years, we have seen major growth of attacks from Advanced Persistent ...
Building an Advanced Threat Defence Eco-System Chris Ellis The problem: Hackers continue their ever increasingly sophisticated attacks; Zero-day malware continues to get through ...
What were they thinking?: Interpreting The Honey Stick Project Results from 2007 to 2014… and Beyond Scott Wright What will you do (or what have you done) when you find an unattended information ...
Threat and Risk Assessment based on Intelligence Assessment Michel Juneau-katsuya Good security specialist must keep their eyes on the horizon and been able to detect ...
Thrill Chain – Using TTP Knowledge to Crash the Party Paul Kivikink Is your organization party grounds for advanced attackers? Do you only find out once the ...
Closing Remarks Adrien de Beaupre N/A
Integrating Static Code Analysis, with Fortify SCA, into your Agile SDLC Paul Kitor Static Code Analysis is the fundamental best practice for identifying and remediating security vulnerabilities in ...
Ingraining Situational Awareness Into Your Defensive Cyber Operation Steve Bowers Observe, orient, decide, act, repeat. The OODA Loop, created by Colonel John Boyd of the ...
Stories from the Trenches - The Security Experience of an Ottawa based SME Jon Whittington , Mathew Pearce Ever wonder what it's actually like on the other side of that fence? Is the ...
IBM Ameen Sait N/A
Are we Boiling the Cybersecurity Frog? John Weigelt Internet legend has it that if you place a frog in a pot of water ...
Security in Industrial Control Systems/ SCADA Environments Joe Cummins SCADA Control System Operators and their Asset Owners face ever-growing challenges of discovering and managing ...
Cyber Medical Terrorism: Hacking DNA for a Brave New World Greg Carpenter For years, science fiction has portrayed different forms of Bio-Infotization, the most promising portrayal being ...
Defense Mechanism of a Banking Malware Raul Alvarez Vawtrak, also called NeverQuest, is a banking malware that targets banks and other financial institutions ...