B|Sides Edmonton 2023
2023 Speakers
Day 1 Opening Keynote
September 25, 2023 at 3:15:00 p.m.
(PIC 120/122)
Alissa Knight
Day 2 Opening Keynote
September 26, 2023 at 3:15:00 p.m.
(PIC 120/122)
Honourable Nate Glubish
The Crushing Chaos of Corporate Crisis: Bringing Our Best to Incident Response
September 25, 2023 at 9:15:00 p.m.
(PIC 120/122)
Adam McMath
There's two types of technology practitioners, those who have lived through a major incident, and those who haven’t lived through a major incident yet. Whether it’s ransomware, a fire in a datacenter, the collapse of a cloud provider, the discovery of a vulnerability in a popular product two days before a holiday... we’ll never run out a ways for incident response to push adrenaline and cortisol into our blood streams, and the timing is never convenient.
In this session we’ll tell stories and explore lessons from Adam’s decades of participating in major incident response across a multitude of companies. We’ll explore how to manage conflict, how to ask the right questions at the right times, and how to deliver our best selves under pressure.
Start Hacking APIs
September 26, 2023 at 3:50:00 p.m.
(PIC 120/122)
Corey Ball
I’ll discuss why APIs are a leading attack vector for data breaches against well protected organizations. The API economy continues to explode in growth, organizations diligently believe they are safe from attack, yet a flaw is present that continues to lead towards data breaches. You’ll learn why APIs require specific tools and techniques to successfully find vulnerabilities so that they can be protected.
The Million Dollar CEO Fraud: Anatomy of a Business Email Compromise
September 25, 2023 at 5:15:00 p.m.
PIC - 232
Damien Miller-McAndrews
In 2021, Business Email Compromise (BEC) scams led to roughly $2.4 billion in global cyber losses, compared to $49.2 million from ransomware. Yet, many still believe that ransomware is the biggest threat facing their business. This talk details a real incident I handled where a BEC culminated in a small business losing almost 1 million dollars. I will tie the incident to the MITRE ATT&CK Cloud Matrix, detail common indicators of compromise for BECs, and provide technical and administrative controls to manage risk around BECs. This talk will provide you with the motivation and tools to convince your organization to better protect itself against this increasingly common and severe attack
Beyond Prevention: The Vital Importance of Data Protection in Cybersecurity
September 26, 2023 at 7:00:00 p.m.
PIC - 232
Derran Guinan
While preventative cybersecurity tools play a crucial role in safeguarding our systems, we must recognize the indispensability of data protection as the ultimate fallback when these measures fail. Effective data protection practices not only mitigate the potential impact of a breach but also ensure compliance with regulations, build customer trust, and safeguard the confidentiality, integrity, and availability of data. By embracing data protection as the foundation of cybersecurity, organizations can fortify their defenses against evolving cyber threats and position themselves as responsible custodians of sensitive information.
Let us explore why data protection is the foundation of cybersecurity and why it deserves our utmost attention.
What You Need to Know About Bill C-26
September 26, 2023 at 4:30:00 p.m.
(PIC 120/122)
Eric Jensen
Bill C-26 creates a legal framework for Federal oversight of cybersecurity planning by critical infrastructure operators. This presentation will cover the proposed bill, ramifications, and how maturing security operations capabilities will support compliance.
Pentesting Android Apps
September 26, 2023 at 8:30:00 p.m.
(PIC 120/122)
Harsh Modi
The talk will cover basics and some advanced concepts of attacking an android application and how in real world an android application is tested for vulnerabilities and exploited out in the wild.
Navigating the Cyber Risk Landscape with Optiv and Zscaler
September 26, 2023 at 7:00:00 p.m.
(PIC 120/122)
Ian Lee and Michael Doucet
The presentation will commence with a brief introduction outlining the diverse range of cyber risks the organization is currently facing. We will then transition into a discussion on building a cyber program founded on risk, emphasizing the integration of Zscaler's comprehensive security solutions, aligning with Zero Trust principles. Following this, we will delve into understanding how the organization life cycle effectively manages the program and establishes robust reporting mechanisms to gauge and mitigate risks.
Red and Blue Teaming and the Powers Gained! Adversarial Emulation
September 25, 2023 at 5:15:00 p.m.
(PIC 120/122)
Jason Maynard
In this session we will learn about adversarial emulation and how both red and blue teams can benefit from it use. We learn about the tools available to us and then build out an operation leveraging Open Source and Commercial tools without preventive capabilities. We will then review the adversarial outcomes which includes reviewing the outcomes on our passively deployed Security portfolio. The knowledge gained ensures defensive teams understand the opportunity to increase our defenses. We will then turn on our preventive capabilies across a variety of security technologies and perform the test again reviewing the results. Understanding how the adversarial approaches their victim and defenders’ ability to layer defense is a recipe for success.
Building Cyber Resilience in the Face of Cyber Attacks
September 25, 2023 at 8:30:00 p.m.
PIC - 232
Jason Proctor
#CyberIsTheNewDisaster - with the increase in the quantity and sophistication of cyber events it is more important than ever to ensure you are not only doing everything you can to find the problem before it becomes on but, should the worst happen, enable yourself to recover from the event in a timely manner. This session will focus on the three pillars of Cyber Resilience: Information Security, Data Protection & Cyber Recovery and cover not only best practices but also lessons learned.
Minimizing financial and reputational loss from Cyber Breaches/Ransomware attacks
September 26, 2023 at 4:30:00 p.m.
PIC - 232
KPMG Panel
Cyber breaches, such as ransomware, can have devastating financial and reputational impacts for organizations. These financial and reputational risks for CFOs, and other financial and executive leaders in the organization, should raise questions regarding the preparedness of their organization on how to respond to a cyber breach. KPMG (Incident Response and Forensics), have assisted numerous clients from all sectors and sizes in the response to and recovery from cyber breaches. The learnings from these breaches are valuable to organizations to improve cyber maturity and ready incident response practices to be better prepared to respond to and manage the inevitable cyber breach. The panelists will be able to share lessons learned, best practices and current trends. The panel will also be able to comment on questions, such as when to pay or not to pay ransom demands, changes to privacy legislation, the challenges of obtaining and maintaining cyber insurance, and more.
Cyber breaches, such as ransomware, can have devastating financial and reputational impacts for organizations. These financial and reputational risks for CFOs, and other financial and executive leaders in the organization, should raise questions regarding the preparedness of their organization on how to respond to a cyber breach. KPMG (Incident Response and Forensics), have assisted numerous clients from all sectors and sizes in the response to and recovery from cyber breaches. The learnings from these breaches are valuable to organizations to improve cyber maturity and ready incident response practices to be better prepared to respond to and manage the inevitable cyber breach. The panelists will be able to share lessons learned, best practices and current trends. The panel will also be able to comment on questions, such as when to pay or not to pay ransom demands, changes to privacy legislation, the challenges of obtaining and maintaining cyber insurance, and more.
From Ticketmaster to global elections: A fireside chat on the rise of bots in ruling our world with Dan Woods and Martin Dinel.
September 26, 2023 at 5:15:00 p.m.
(PIC 120/122)
Martin Dinel and Dan Woods
Join Martin Dinel and Dan Woods for this Fireside chat.
Securing Your Sanity: Mental Health Strategies for Cybersecurity Experts
September 25, 2023 at 4:30:00 p.m.
(PIC 120/122)
Mental Health Panel
Mental health in the cybersecurity industry is becoming an important topic of concern. Many of us struggle to cope with the demands of our jobs, long hours, and ambiguity of our decisions, to name a few. Our relationships begin to suffer, stress, anxiety, and symptoms of depression begin to appear, and we don't know where to turn. To help as many people as possible, a diverse group of panellists will share multiple perspectives, thoughts and actions around their journeys navigating their mental health. By the end of the panel, the panellists will equip you to start exploring ways to help yourself and help those around you.
A look to the past for the future of Cyber Security for Cyber Physical Systems
September 25, 2023 at 7:50:00 p.m.
PIC - 232
Michelle Balderson
In this presentation, Michelle will take us on a journey through time from 1784 right up to today and what Security Controls have been put in place to protect our Physical systems, now interconnected: Cyber-Physical. She will paint a picture that will logically demonstrate that focusing on Risk, and then creating mitigations by having contextual understanding of the physical environments with OT is the next step in Security Evolution.
Michelle will leave the audience with Top 5 Actions to ensure Operational Security with an emphasis of building an OT Risk and Security Program.
12 things to consider when implementing EDR
September 26, 2023 at 7:50:00 p.m.
PIC - 232
Nick Jaldevi
Endpoint detection and response (EDR) is a key part of any security program. But with so many choices out there, it can be confusing to choose a solution. This is true for new implementations, and when you're evaluating whether it's time to replace or upgrade your legacy solution.
Join cybersecurity expert Nick Jaldevi for a practical, vendor-agnostic look at issues to consider and questions to ask before you invest in an EDR or XDR solution. The tips you pick up here will save you time, effort, and even money down the road!
What exactly is Supply-chain Levels for Software Artifacts (SLSA)?
September 25, 2023 at 3:50:00 p.m.
(PIC 120/122)
Nicole Schwartz
Have you heard mention of Supply-chain Levels for Software Artifacts (SLSA)? If you have, but you are unsure what exactly they are asking for, this talk is for you.
I’ll explain what the SLSA framework is, how it fits into your development process, and a variety of tools you can use to attest your desired level of SLSA.
In addition I’ll go over the changes from SLSA version 0 to SLSA version 1.0, most notably that instead of one SLSA Level (1-4), there are now separate tracks (Build 1-3, Build 4, Source)
Untangling APIs: Addressing Sprawl and Securing Your Modern Digital Ecosystem
September 25, 2023 at 7:00:00 p.m.
(PIC 120/122)
Peter Scheffler
As organizations increasingly adopt hybrid architectures and microservices, the number of APIs utilized within their ecosystems continues to grow at an exponential rate. This
phenomenon, known as API sprawl, poses significant challenges in terms of security, governance, and efficiency. But of them all, API security might require the most urgent response.
For organizations trying to secure their APIs, multi-cloud complexity and difficulty enforcing consistent security top the list of challenges according to F5’s State of Application
Strategy Report (2023). To address the security challenges of API sprawl, organizations need to adopt a more holistic app and API security strategy for their organization including components that deliver runtime protection, posture management, and help integrate security and code testing earlier in the software development lifecycle.
Join this session to hear from Peter Scheffler, Sr. Solutions Architect at F5 and learn:
· What makes APIs such a target
· What makes protecting APIs so difficult
· Elements of a good API security practices
· How to augment existing app security infrastructure to protect APIs
· Capabilities organizations should be considering for comprehensive API security
· The role of AI/ML in API security today
Balancing AI Innovation with Data Protection: Risks and Controls
September 25, 2023 at 8:30:00 p.m.
(PIC 120/122)
Pooja Shah and Atilade Ayanbadejo
This presentation explores widespread usage of AI platforms and the rising concerns of personal data exposure. We analyze some of the statistics related to these, and examine the current state protection and limitations provided by the data privacy laws and the end-user agreements. Also, we will briefly discuss how data privacy laws are adapting to the AI era. We also offer practical best practices for users and organizations to secure data while utilizing AI platforms responsibly. Attendees will gain insights into data exposure, legal frameworks, and actionable strategies to navigate the AI-data privacy intersection confidently.
Lets Make Fun of Cyber Security
September 25, 2023 at 9:15:00 p.m.
PIC - 232
Prashant Prashant
My talk is based on cartoons in cyber security and sharing core and important cyber security concepts from people, process, technology perspective to the audience in that fashion. I have leveraged famous themes/cartoons to share the life of a cyber professional, how risk management is done, what are the threats facing the world today, the world of geeky nerds, privacy, cyber warfare, cyber political satire in an all in one presentation. This is my attempt to go little off beat from serious cyber talks and pave the way for learning by laughing and also a humble attempt to become a cyber comedian.
Unveiling the Hidden Gem: Pre-Sales Engineering
September 26, 2023 at 3:50:00 p.m.
PIC - 232
Rick Byrne
In the fast-paced world of technology sales, a critical yet often overlooked role exists: pre-sales engineering. This presentation aims to uncover the hidden potential of pre-sales engineering, providing valuable insights into how to enter this domain, why it stands as an exceptional career choice, and the essential attributes required to excel in this often underappreciated field.
Keeping Ahead of the Threat Landscape with AI Powered Security
September 25, 2023 at 7:00:00 p.m.
PIC - 232
Sheik Sahib
As cyberattacks grow in volume and complexity, artificial intelligence (AI) is helping under-resourced SecOps analysts to stay ahead of threats by leveraging machine learning and natural language processing to curate threat intelligence from millions of research papers, blogs and news stories to cut through the noise of daily alerts and drastically reduce response times. AI is also used to model the attacker modus operandi –reconnaissance of your digital presence followed by attacks on areas of weakness.
Please join as we share how IBM Security is employing AI technologies to identify, protect, detect, and respond to rapid escalation of cybersecurity threats that threaten businesses, organizations, and governments across Canada.
BYOD, CYOD, COPE, COBO, COSU: Ethical Challenges
September 26, 2023 at 5:15:00 p.m.
PIC - 232
Sourabh Aggarwal
Anyone researching enterprise mobility will eventually come across the terms BYOD, CYOD, COPE, COSU and COBO (and a few more). The acronyms themselves are simple: BYOD is Bring Your Own Device; CYOD is all about choosing your own device; COPE is corporately owned/personally managed; COBO is a company owned/only business; COSU is a company owned/disposable company. Beyond that, there is little agreement about their meaning.
De-mystifying Zero Trust in Industrial Control System Environments
September 25, 2023 at 7:50:00 p.m.
(PIC 120/122)
Stephen Mathezer
Next to AI, "Zero Trust" and OT/ICS Security continue to be among the hottest topics in cybersecurity. It seems like everyday there is a new offering or recommendation around "Zero Trust" for OT. But what exactly is "Zero Trust" in OT and how do we apply modern "Zero Trust" principles in an environment that is often change averse and many years behind the cybersecurity curve? Let's define "Zero Trust" and talk about what it *really* means in an OT context, what is already in place to support it, and how we can practically and meaningfully improve security in these environments. There is no magic bullet, but it isn't an all or nothing proposition either, I will discuss ways that we can both leverage existing architecture and technology and set ourselves up for future success.
AI – Be Afraid – Be Very Afraid – NOT
September 25, 2023 at 3:50:00 p.m.
PIC - 232
Vincent Chiew
Just the mention of AI (Artificial Intelligence) may conjure up fears for some security professionals. How about the rest of us who are new to security and just heard of AI? This talk will try to provide a peace of mind basic understanding of AI and how we can handle and control it. Then, we can turn on the light and see the bright side of AI. Finally, be one with AI to harvest its Power.
AI, ML, and Quantum computing: Transforming Cybersecurity Landscape & Bridging the gap
September 26, 2023 at 7:50:00 p.m.
(PIC 120/122)
WiCyS Western Canada Affiliate Panel
Moderator:
Nickkisha Farrell-Myles
Panelists:
Celia Wanderley
Prashant Prashant
Pooja Shah
Mashhood Ahmed
Organized by: WiCyS Western Canada Affiliate