BSidesOttawa 2019 Nov. 28, 2019 to Nov. 28, 2019, Ottawa, Canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening Keynote - Machine Learning applied to Cyber Security … This time it’s different? Major James Lindsay Machine learning has gained a lot of hype and has become a buzz word in ...
Maintaining (or Regaining) the High Ground Steve Bowers One of the main advantages that cyber defenders have over attackers is inside knowledge of ...
Securing the Tactical Edge Dr. Lawrence Dobranski The tactical edge is an emerging domain in our new borderless computing environment. With the ...
Keys Under Doormats: Problems and Solutions for Storing Credentials in Web Applications Securely Dmitriy Beryoza Encryption keys and passwords are truly "keys to the kingdom." Acquiring them allows attacker to ...
Continuous Compromise: How Attackers are Targeting Cloud-Based CI/CD Pipelines and Deployments Jamie Baxter As DevOps continues to transform organizations and the use of cloud services becomes ubiquitous, it’s ...
Legal and ITSec: Working Together Gerald Batten Most medium to large organizations have a Legal department as well as an IT, and ...
Incident Response & Threat Hunting Using Bro/Zeek Data Mayur Mohan Kaura Talk includes Advance Attack Lifecycle and How Zeek/Bro data (open source) can help organizations quickly ...
Implementing and Analysis of JA3 data for TLS Fingerprinting using Bro/Zeek Data Ahmed Techini I was implementing JA3 (open source from salesforce) for a complex environment to show the ...
How did you get in my car? A fireside chat covering all the basics of cybersecurity and your automobile Coreen Leale It is a herculean task to protect yourself from unknown cyber threats and your car ...
Discovery Protocols Put Smart Homes at Risk Itzael Jimenez The proliferation of IoT devices deployed in homes is increasing because of the utility they ...
The What, Who, Whom and Why about a Vulnerability Management Program Dennis Chaupis , Barry Tsang Traditional vulnerability management is not about pentesting network, apps, or even red/blue/purple team. In today’s ...
Hack the Business Procedure! Austin Reid Hunter , Todd Schertzing Can I speak to the employee base that completes this task? Assessments performed may often ...
Shodan in Ottawa Sunny Jamwal Shodan began as a pet project of John Matherly to scan the internet for specific ...
Security Groups Speak a Common Language: MITRE ATT&CK Suraj Kinger In a SOC, triaging alerts generated by Deployed Security products is a tier 1 job ...
Chaining Web Exploits: Pwning the Kingdom Michael Gervais It doesn't take one exploit to hack the kingdom. This is a true story about ...
You Are Here: Leading your Security Program with Wardley Maps John Duffy If you're responsible for a security program or are expected to lead the last line ...
Coexisting with Vulnerabilities Dennis Chaupis Ever wonder why some vulnerabilities are never fixed? Ever had the thought of "how come ...
Closing Keynote - “Insider Secrets” to HOW hackers are getting in, and WHY Terry Cutler This session will show attendees a “behind the scenes look” at how hackers harvest as ...