BSidesOttawa 2019 Nov. 28, 2019 to Nov. 28, 2019, Ottawa, Canada
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Opening Keynote - Machine Learning applied to Cyber Security … This time it’s different? | Major James Lindsay | Machine learning has gained a lot of hype and has become a buzz word in ... | |
Maintaining (or Regaining) the High Ground | Steve Bowers | One of the main advantages that cyber defenders have over attackers is inside knowledge of ... | |
Securing the Tactical Edge | Dr. Lawrence Dobranski | The tactical edge is an emerging domain in our new borderless computing environment. With the ... | |
Keys Under Doormats: Problems and Solutions for Storing Credentials in Web Applications Securely | Dmitriy Beryoza | Encryption keys and passwords are truly "keys to the kingdom." Acquiring them allows attacker to ... | |
Continuous Compromise: How Attackers are Targeting Cloud-Based CI/CD Pipelines and Deployments | Jamie Baxter | As DevOps continues to transform organizations and the use of cloud services becomes ubiquitous, it’s ... | |
Legal and ITSec: Working Together | Gerald Batten | Most medium to large organizations have a Legal department as well as an IT, and ... | |
Incident Response & Threat Hunting Using Bro/Zeek Data | Mayur Mohan Kaura | Talk includes Advance Attack Lifecycle and How Zeek/Bro data (open source) can help organizations quickly ... | |
Implementing and Analysis of JA3 data for TLS Fingerprinting using Bro/Zeek Data | Ahmed Techini | I was implementing JA3 (open source from salesforce) for a complex environment to show the ... | |
How did you get in my car? A fireside chat covering all the basics of cybersecurity and your automobile | Coreen Leale | It is a herculean task to protect yourself from unknown cyber threats and your car ... | |
Discovery Protocols Put Smart Homes at Risk | Itzael Jimenez | The proliferation of IoT devices deployed in homes is increasing because of the utility they ... | |
The What, Who, Whom and Why about a Vulnerability Management Program | Dennis Chaupis , Barry Tsang | Traditional vulnerability management is not about pentesting network, apps, or even red/blue/purple team. In today’s ... | |
Hack the Business Procedure! | Austin Reid Hunter , Todd Schertzing | Can I speak to the employee base that completes this task? Assessments performed may often ... | |
Shodan in Ottawa | Sunny Jamwal | Shodan began as a pet project of John Matherly to scan the internet for specific ... | |
Security Groups Speak a Common Language: MITRE ATT&CK | Suraj Kinger | In a SOC, triaging alerts generated by Deployed Security products is a tier 1 job ... | |
Chaining Web Exploits: Pwning the Kingdom | Michael Gervais | It doesn't take one exploit to hack the kingdom. This is a true story about ... | |
You Are Here: Leading your Security Program with Wardley Maps | John Duffy | If you're responsible for a security program or are expected to lead the last line ... | |
Coexisting with Vulnerabilities | Dennis Chaupis | Ever wonder why some vulnerabilities are never fixed? Ever had the thought of "how come ... | |
Closing Keynote - “Insider Secrets” to HOW hackers are getting in, and WHY | Terry Cutler | This session will show attendees a “behind the scenes look” at how hackers harvest as ... |