about the conference

BSides Vancouver is a not-for-profit, independently run,
community supported cyber security conference and part of the
worldwide Security BSides movement.

〰〰〰

TICKETS Are SOLD OUT!

〰〰

LOCATION

SFU Harbour Centre
515 W Hastings Street
Vancouver, BC V6B 5K3

See map
 

 
 
 

ACCOMMODATIONS

Are you joining us at BSides and need accommodations? The Delta Marriott Hotel Downtown Vancouver is conveniently located immediately across from the venue.

DELTA MARRIOTT HOTEL DOWNTOWN VANCOUVER

550 West Hastings Street, Vancouver, BC


SUNDAY SCHEDULE

Time: 9:00am | Sunday Workshop
Amiran Alavidze & Guru Shiva
Hack the Gibson with Metasploit

Time: 9:00am | Sunday Workshop
Brad Duncan
Malware Traffic Analysis Workshop

Time: 9:00am | Sunday Workshop
Jeevan Singh
Hunting for Web Application Vulnerabilities

Time: 1:05pm | Sunday Workshop
Tanya Janca
Azure Cloud Security Workshop

Time: 3:10pm | Sunday Workshop
Ken Westin
Insider Threat Hands-On Investigation Workshop


MONDAY SCHEDULE

ROOM 1400-1430 | TERABYTE

Time: 9:15am | Day: 1 | KEYNOTE
ELITES (first come, first served)

Rob Fry
Security Operations as a Video Game

Time: 10:15am | Day: 1
Shelly Giesbrecht
Sandwiches or Pizza? Incident Response Isn’t Just Technical…

Time: 11:15am | Day: 1
Chester Wisniewski
A Safer Way to Pay: Comparing the Security and Integrity of 21st Century Payment Systems

Time: 12:10pm | Day: 1
Danielle Cheng, Duha Younes, Heidi Martin, and Jake King
Male Allies: To be, or not to be: that is the question!

Time: 1:15pm | Day: 1
Carl Willis-Ford
The 3rd Face of Insider Threat

Time: 2:15pm | Day: 1
Teri Radichel
Are You Ready For a Cloud Pen Test?

Time: 3:15pm | Day: 1
Benjamin Wiley
FIN7: A Case Study on Shim Database Persistence

Time: 4:15pm | Day: 1
Hudson Bush
Missing the Forest for the Trees: When Server Hardening Isn’t Enough

ROOM 1900 | GIGABYTE

Time: 9:15am | Day: 1 |
KEYNOTE STREAMING

Rob Fry
Security Operations as a Video Game

Time: 10:15am | Day: 1
Greg Foss
Breaking Blockchain

Time: 11:15am | Day: 1
Geoff McDonald
Windows 10 AMSI Script Behavior Instrumentation with Machine Learning to Block Malicious Attacks

Time: 1:15pm | Day: 1
Matt Carolan
How to Secure Serverless

Time: 2:15pm | Day: 1
Tim Liu & Kevin Sahota
Building an Enterprise Threat Hunting Program

Time: 3:15pm | Day: 1
Pongolyn
Swarm Intelligence and Human Systems

Time: 4:15pm | Day: 1
Maleena Singh
Cyber Policing Landscape in BC

ROOM 1600 | MEGABYTE

Time: 9:15am | Day: 1 |
KEYNOTE STREAMING

Rob Fry
Security Operations as a Video Game

Time: 10:15am | Day: 1
Wesley Wineberg
Mobile Application Hacking

Time: 11:15am | Day: 1
Brodie McRae
Cryptography 101

Time: 1:15pm | Day: 1
Kevin2600
Hacking Hardware Through Side-Channel

Time: 2:15pm | Day: 1
Scott Baker
Information Security in the Health/Academic Research Context

Time: 3:15pm | Day: 1
George Pajari
How to Survive a SOC 2 Audit (and Why You Ought to Try)

Time: 4:15pm | Day: 1
Boris Reitman
Website Switcheroo: Links opening in tabs are dangerous

ROOM 1415 | INDUSTRY

Time: 10:15am | Day: 1
Matt Rose
How to Put the Sec in DevOps (Checkmarx Sponsored Talk)

Time: 11:15am | Day: 1
Chris Richmond
2019 Cyber Threat Landscape & People-Centric Security (Proofpoint Sponsored Talk)

Time: 1:15pm | Day: 1
Dhruv Majumdar
Intelligent Threat Hunting (Elevated Prompt Sponsored Talk)

Time: 2:15pm | Day: 1
Aamir Lakhani
AI vs Malware - Machine Learning Cage Match (Fortinet Sponsored Talk)

Time: 3:15pm | Day: 1
Speaker TBD
CMD Sponsored TalK

Time: 4:15pm | Day: 1
Peter Scheffler
Using Threat Research to take back the Internet (Scalar/F5 Sponsored Talk)


TUESDAY SCHEDULE

ROOM 1400-1430 | TERABYTE

Time: 9:15am | Day: 2 | KEYNOTE
ELITES (first come, first served)

Tanya Janca
Security is Everybody’s Job…Literally

Time: 10:15am | Day: 2
Shira Shamban
Your internet is down? It’s cyber warfare, stupid

Time: 11:15am | Day: 2
Isaiah Sarju
How Online Dating Made Me Better At Threat Modeling

Time: 1:15pm | Day: 2
David Balcar
Security is a Mission Not an Intermission

Time: 2:15pm | Day: 2
Josh Sokol
Architecting for Security in the Cloud

Time: 3:15pm | Day: 2
Jugal
Protecting the Protector - Hardening Machine Learning Defenses Against Adversarial Attacks

Time: 4:15pm | Day: 2
Masarah Paquet-Clouston
Tracing Ransomware Payments in the Bitcoin Ecosystem

ROOM 1600 | MEGABYTE

Time: 9:15am | Day: 2 |
KEYNOTE STREAMING

Tanya Janca
Security is Everybody’s Job…Literally

Time: 10:15am | Day: 2
Joe Kirwin
The Emperor’s Old Clothes: Visualizing ssdeep

Time: 10:45am | Day: 2
Deepali Arora
High-value Approaches to ML in Computer Security

Time: 11:15am | Day: 2
Geoff McDonald
Tangling with Malware Adversaries: A Few Short War Stories

Time: 11:45am | Day: 2
Golnaz Elahi
The Journey from Flat to Bumpy: Network Segmentation While Business Applications Live Their Normal Life

Time: 1:15pm | Day: 2
Julius Musseau
To Patch Or Not To Patch

Time: 2:10pm | Day: 2
Julius Musseau
Startup Demo - Mergebase - Securing software supply chains

Time: 2:45pm | Day: 2
Oleksiy Gayda
Threat Hunting OpSec

Time: 3:15pm | Day: 2
Tierney Wisniewski & Chester Wisniewski
An Apple a Day Keeps the Cybercriminals Away? Taking Lessons from Medicine to Motivate Good Cyberhealth Habits

Time: 4:15pm | Day: 2
Michael Thelander
SSH Keys: Security Asset or Liability?

ROOM 1415 | INDUSTRY

Time: 10:15am | Day: 2
Dan Ward
The importance of SOC automation tools (Palo Alto Sponsored Talk)

Time: 10:45am | Day: 2
Ian Redden
Threat Hunting Demystified
(RSA Sponsored Talk)

Time: 11:15am | Day: 2
Matteo Rebeschini
End-to-End Security Analytics with the Elastic Stack (Elastic Sponsored Talk)

Time: 11:45am | Day: 2
Stan Engelbrecht
Improving the Speed and Quality of Your Investigations Through Security Orchestration (D3 Security Sponsored Talk)

Time: 1:15pm | Day: 2
Dale Hobbs
Windows User Enumeration, Living off the land (SANS Sponsored Talk)

Time: 1:45pm | Day: 2
Jamie McMurray
OSInt, shoe laces and bubble gum: How to use OSInt with limited time and budget to better understand how attackers see your organization (Kobalt Sponsored Talk)

Time: 2:15pm | Day: 2
Rob Williamson
Why are my users visiting a Russian domain served from Nigeria...OR...Leveraging DNS as a layer of defense and a lens on the threat landscape. (CIRA Sponsored Talk)

Time: 2:45pm | Day: 2
Matt Eidelberg
Vibing Your Way Through Enterprise: How Attackers are Becoming More Sneaky (Optiv Sponsored Talk)

Time: 3:15pm | Day: 2
Dan Wolff
When you are the target of attacks, what’s your response? (BitDefender Sponsored Talk)

Time: 3:45pm | Day: 2
Speaker TBD
One Login Sponsored Talk

ROOM 1500 | KILOBYTE

Time: 10:15am - 12:15pm | Day 2
George Pajari
Security Architecture 101

Time: 12:30pm - 4:30pm| Day: 2
Kenneth G. Hartman
Amazon Linux EC2 Digital Forensics Workshop

2018BSides-bgv3.png