BsidesOttawa 2016 Sept. 29, 2016 to Sept. 30, 2016, ottawa,canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening Remarks Adrien de Beaupre N/A
Platinum Sponsor - RSA Marcus Lecuyer N/A
Visiting The Bear Den - A Journey in the Land of (Cyber-)Espionage Jessy Campos Sednit, a.k.a Fancy Bear/APT28/Sofacy, is a group of attackers operating since at least 2004 and ...
Introducing Security Earlier into the SDLC: How to ‘hack your own apps’ Tanya Janca Fixing bugs earlier in the software development life cycle is always faster and less expensive ...
Cybersecurity is Everyone's Business Steve Bowers Businesses run on various processes, with variable inputs and outputs, leveraging a multitude of tools ...
LUNCH TALK - Introduction to Ransomware: Variants, Entry Points, Combating the Threat Ben Smith Ransomware is this year’s “malware of the moment” with heavy press coverage reflecting a significant ...
RANSOMWARE YourFilesAreEncrypted.talky Eric Lauzier , Chad Mcnamara CCIRC continues to receive reports of ransomware affecting organizations across Canadian critical infrastructure sectors. As ...
Patching Human Vulnerabilities in Cyber Security Randy Purse We can patch operating systems and software, segregate networks, and implement security policies. However, various ...
OWASP Top 10: Effectiveness of Web Application Firewalls David Caissy Web Application Firewalls (WAF) are essential components of a secure web application deployment. Capable of ...
Reversing A Polymorphic File-Infecting Ransomware Raul Alvarez Virlock is a polymorphic file-infecting ransomware. It is capable of infecting executable files and at ...
Day's Closing Remarks Adrien de Beaupre N/A
Coordinating and Leading an Advanced Red Cell during a Cyber Defence Exercise Yves Morvan The one yearly hosted Cyber Defence Exercise (CDX) challenges teams of students from American and ...
"Innovation in ICS CyberSecurity” – Leading from the front on threat to Critical Cyber Infrastructure Joe Cummins SCADA Control System Operators and their Asset Owners face ever-growing challenges of discovering and managing ...
Using Data Identification and Behavioral Analytics to Tackle Insider Threats Scott Masson There are many ways that sensitive information can be leaked from organizations, however the insider ...
LUNCH TALK - Advanced Threat Actors Finally Sharing The Love With The Rest of Us Paul Kivikink Remember (last year) when I told you everything would be fine? I lied. We read ...
Agile Incident Response - A Faster and More Effective Answer to Cyber Breaches Robert Beggs Most organizations begin their response to a cyber breach when it is discovered; because they ...
Covert Red Team PowerShell Attacks: How to PS without powershell.exe Tiago De Jesus Powershell is quickly becoming red teamers and penetration testers favourite post-exploitation language for Windows. It ...
Building A Cyber Defense and Response Team Alan J. White Organizations must spend time understanding how they will task organize once faced with a cyber-incident. ...
System Security Engineering From Compliance to Risk Management Drew Smeaton Over the last two decades, we have taken a bottom up approach to securing our ...