BsidesCa 2017 Nov. 12, 2017 to Nov. 12, 2017, toronto,canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
CLOUD ACCESS SECURITY BROKERS. EXTENDING YOUR PERIMETER Michael Ball More and more of your corporate data is being moved outside of your perimeter to ...
RED AND BLUE PING PONG Lee Kagan , Anton Ovrutsky This talk will demonstrate, live and in real-time, a defender and attacker playing a game ...
MOBILE SPYWARE - FROM NOSY ADS TO NATION-STATE ESPIONAGE Adam Bauer , Christoph T. Hebeisen Mobile devices hold a plethora of sensitive personal and corporate data. While most of us ...
ASSESSING NODE.JS WEB APPLICATION SECURITY Vince Marcovecchio This talk covers a number of techniques and tools for performing white-box security assessments of ...
REDUCE YOUR ACTIVE DIRECTORY ATTACK SURFACE: SECURING THE FOREST THROUGH THE TREES Cheryl Biswas , Joe Bate Most information security breaches start with the compromise of small pieces of an organization's infrastructure ...
FROM GOOD TO EXCELLENT: AN OVERVIEW ON THE UPCOMING RELEASE OF LIBMODSECURITY Victor Hora , Felipe Costa This is an exciting release for the whole opensource WAF community with over 900 commits ...
YOU'RE TESTING IT WRONG - ADVENTURES IN IPS AND FIREWALL TESTING METHODOLOGIES Chuck Mcauley Firewall vendors all claim the same thing. They block 100% of malicious attacks, never false ...
RISK-BASED SECURITY INCIDENT RESPONSE (SIR); AND AN INTRODUCTION TO SICON Keith Jonah , Kevin Pietersma An alternative method to design and implement a kick-ass Security Incident Management life cycle (distilled ...
PRACTICAL STATISTICS FOR THREAT INTELLIGENCE Nir Yosha Threat Intelligence providers share millions of IOCs (indicator of compromise) to help security teams identify ...
FRUGAL WEB APPLICATION TESTING - CAN IN-HOUSE PENETRATION TESTING ACHIEVE INDUSTRY STANDARD RESULTS WHILE SAVING YOU MONEY? Harshal Chandorkar , Natalia Wadden We live in a time where web applications play crucial roles in our society. To ...