BSidesVancouver 2017 March 13, 2017 to March 14, 2017, vancouver,canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Speaker Raffael Marty , Ali Aresteh We are writing the year 2017. Cyber security has been a discipline for many years ...
In search of a silver bullet… Dmitry Samosseiko In this talk, we’ll review the current state of mass malware attacks from a protection ...
Excuse Me, I Think Your Dark Web is Leaking! Sarah Jamie Lewis The Dark Web has developed an ominous reputation within the security landscape. Misunderstood by both ...
Continuous Integration, Continuous Compromise Wes Wineberg If you work in the software industry, chances are you're familiar with build systems. Modern ...
Cyberstalking Criminals for Fun and Profit Ken Westin For several years Ken Westin developed and utilized various technologies and methods to track criminals ...
Don't blow-up the safe! Use software silly... An in-depth study of ATM Malware Numaan Huq An overly simplistic yet accurate description of an Automated Teller Machine (ATM) is: a computer ...
Power shell hacking for fun and profit Guy Rosario Ever wonder what damage could be done by someone using nothing more than “native tools” ...
Two-Factor Auth - Demand Bidirectional Joe Kirwin Two-factor authentication has become almost commonplace in defending against ubiquitous credential brute-forcing and has reduced ...
Do Containers fully ‘contain’ security issues? A closer look at Warden/Garden, and Docker Farshad Abasi Container technology has been around in various shapes or forms for sometime; however, the recent ...
Stop the Bleeding, Start Cleaning: Four Steps for Evolving Your Privileged Account Security Program Chris Cochrane The average enterprise environment contains 3-4x more privileged accounts than employees. The sheer numbers and ...
Hunting Methodology: A key to the labyrinth of network forensics Matthew Tharp Proactive hunting is the newest cybersecurity strategy and promises great potential. But where is one ...
The Evolution of a True Threat Intelligence Platform David Empringham Enable the collection & management of intelligence about malicious indicators and actors, but they can ...
Weaning the World Off Passwords Garland Sharratt Everyone says they hate passwords, so why is the use of passwords still so entrenched ...
Around the World in 80 Gigs: What Really Happens When a Device is Stolen? Richard Henderson Company-owned electronics that show up on the other side of the world. Stolen laptops that ...
Is the cloud more Secure? Matt Carolan "Cloud computing is often far more secure than traditional computing, because companies like Google and ...
Healthcare Insecurity: What are we going to do about it? Bob Fruth After many years in the trenches at Microsoft, long time software industry veteran Bob Fruth ...
A Wolf in Sheep's Clothing Roberto Salgado It is well known that humans are the weakest link in Information Security. So why ...
EKFiddle: a framework to study Exploit Kits Jerome Segura Exploit kits are one of the top vectors to distribute malware on a large scale. ...
Reverse engineering & hijacking toy quadcopters Yannick Formaggio This talk will describe my journey into RF and hardware hacking of mini drones: starting ...
Incident Response Automation Ram Dulam Demonstration of inexpensive, the best, and customized Linux/Windows tools with their automation scenarios to deal ...
Enhance Your SIEM Capabilities with Advanced Breach Analytics David Empringham Anomali Enterprise is a breach analytics and intelligence model that aims to unify and integrate ...