about the conference

BSides Vancouver is a not-for-profit, independently run,
community supported cyber security conference and part of the
worldwide Security BSides movement.

〰〰〰

TICKETS Are SOLD OUT!

 

$50.00

$75.00

$150.00

〰〰

LOCATION

SFU Harbour Centre
515 W Hastings Street
Vancouver, BC V6B 5K3

See map
 

 
 
 

ACCOMMODATIONS

Are you joining us at BSides and need accommodations? We’ve teamed up with the Delta hotel right across from our venue.

DELTA MARRIOTT HOTEL DOWNTOWN VANCOUVER

550 West Hastings Street, Vancouver, BC

DETAILS:

Group rate is available from Sunday March 17th until Wednesday March 20th.

Delta Hotels Vancouver Downtown Suites for 209 CAD per night

*Please note that the last day to book with our discounted rate is Tuesday February 19th (pending availability)*

Book your group rate for BSides Conference


 

〰〰〰

SCHEDULE

** CONFIRMED DATES & TIMES COMING SOON ** 


Time: TBD | Track: TBD
Kenneth G. Hartman
Amazon Linux EC2 Digital Forensics Workshop

Time: TBD | Track: TBD
Kevin2600
Hacking Hardware Through Side-Channel

Time: TBD | Track: TBD
Pongolyn
Swarm Intelligence and Human Systems

Time: TBD | Track: TBD
Amiran Alavidze & Guru Shiva
Hack the Gibson with Metasploit

Time: TBD | Track: TBD
Shelly Giesbrecht
Sandwiches or Pizza? Incident Response Isn’t Just Technical…

Time: TBD | Track: TBD
Oleksiy Gayda
Threat Hunting OpSec

Time: TBD | Track: TBD
Carl Willis-Ford
The 3rd Face of Insider Threat

Time: TBD | Track: TBD
Teri Radichel
Are You Ready For a Cloud Pen Test?

Time: TBD | Track: TBD
Maleena Singh
Cyber Policing Landscape in BC

Time: TBD | Track: TBD
Brad Duncan
Malware Traffic Analysis Workshop

Time: TBD | Track: TBD
Matt Carolan
How to Secure Serverless

Time: TBD | Room: TBD
IOTVillage
IOT Village

Time: TBD | Track: TBD
Renzon
Forensicating Windows Artifacts: Investigation w/out Event Logs!

Time: TBD | Track: TBD
Benjamin Wiley
FIN7: A Case Study on Shim Database Persistence

Time: TBD | Track: TBD
Shira Shamban
Your internet is down? It’s cyber warfare, stupid

Time: TBD | Track: TBD
Julius Musseau
To Patch or Not to Patch 

Time: TBD | Track: TBD
Hudson Bush
Missing the Forest for the Trees: When Server Hardening Isn’t Enough

Time: TBD | Track: TBD
George Pajari
Security Architecture 101

Time: TBD | Track: TBD
George Pajari
How to Survive a SOC 2 Audit (and Why You Ought to Try)

Time: TBD | Track: TBD
Tierney Wisniewski
An Apple a Day Keeps the Cybercriminals Away? Taking Lessons from Medicine to Motivate Good Cyberhealth Habits

Time: TBD | Track: TBD
Joe Kirwin
The Emperor’s Old Clothes: Visualizing ssdeep


Time: TBD | Track: TBD
Wesley Wineberg
Mobile Application Hacking

Time: TBD | Room: TBD
Josh Sokol
Architecting for Security in the Cloud

Time: TBD | Track: TBD
John Rauser
Don't Let Cultural Debt Bring Down Your Security Program

Time: TBD | Track: TBD
Greg Foss
Breaking Blockchain

Time: TBD | Track: TBD
Masarah Paquet-Clouston
Tracing Ransomware Payments in the Bitcoin Ecosystem

Time: TBD | Room: TBD
Tim Liu
Building an Enterprise Threat Hunting Program

Time: TBD | Track: TBD
Brodie McRae
Cryptography 101

Time: TBD | Track: TBD
Jeevan Singh
Hunting for Web Application Vulnerabilities

Time: TBD | Track: TBD
David Balcar
Security is a Mission Not an Intermission

Time: TBD | Track: TBD
Deepali Arora
High-value Approaches to ML in Computer Security

Time: TBD | Track: TBD
Boris Reitman
Tabnapping: Dangers Lurking Behind Links, Tabs, Popups, and Iframes

Time: TBD | Track: TBD
th3CyF0x
Becoming a Human nMAP! Cultivating a Renaissance Approach for the Social Engineer

Time: TBD | Track: TBD
Geoff McDonald
Tangling with Malware Adversaries: A Few Short War Stories

Time: TBD | Track: TBD
Isaiah Sarju
How Online Dating Made Me Better At Threat Modeling

Time: TBD | Track: TBD
Scott Baker
Information Security in the Health/Academic Research Context

Time: TBD | Track: TBD
Michael Thelander
SSH Keys: Security Asset or Liability?

Time: TBD | Track: TBD
Chester Wusbuewsju
A Safer Way to Pay: Comparing the Security and Integrity of 21st Century Payment Systems

Time: TBD | Track: TBD
Jugal
Protecting the Protector - Hardening Machine Learning Defenses Against Adversarial Attacks

Time: TBD | Track: TBD
Geoff McDonald
Windows 10 AMSI Script Behavior Instrumentation with Machine Learning to Block Malicious Attacks

Time: TBD | Track: TBD
Ken Westin
Insider Threat Hands-On Investigation Workshop

Time: TBD | Track: TBD
Tanya Janca
Azure Cloud Security Workshop

2018BSides-bgv3.png