May 26, 10:40-11:30
Zero Trust in a Post-Truth World: Defending Against Misinformation & Cyber Threats
In an era where misinformation spreads faster than truth and trust is constantly exploited, traditional security models are no longer sufficient. The Zero Trust framework—built on the principle of "never trust, always verify"—offers a resilient approach to securing organizations against evolving cyber threats.
This session explores how misinformation campaigns, social engineering, and insider threats challenge conventional security postures, making Zero Trust not just a strategy but a necessity. Attendees will gain insights into the core principles of Zero Trust, real-world case studies of its implementation, and practical steps to build a security-first culture within their organizations.
Join me in navigating the misinformation minefield and uncovering how Zero Trust can be the key to defending against cyber deception in today’s digital age.
Femi is a seasoned Information Security Consultant, passionate about cybersecurity and career growth. With over 15 years of industry experience, I've been on the front lines of developing and implementing robust technology and information security strategies.
I am particularly interested in Identity & Access Management, and an avid evangelist of a Zero-trust architecture as a way to help reduce and mitigate identity threats. I also have experience, expertise, and interests in GRC and Privacy. I also host a cybersecurity-focused podcast and YouTube channel, leveraging my experience to not only secure information but also to educate and empower a global audience. I also serve as an industry mentor with several organizations, including ISACA Vancouver, where I'm dedicated to sharing insights, fostering growth, and helping individuals navigate the dynamic landscape of information and cybersecurity. Connect with me for guidance on technology strategy, cybersecurity, or risk management. In addition to my practical experience, I hold certifications from ISACA, Microsoft, ITIL, ISC2, and CompTIA including CISSP, CISM & CCSP among others.
I also host a cybersecurity-focused podcast and YouTube channel, leveraging my experience to not only secure information but also to educate and empower a global audience. Dive into the world of cybersecurity with me on my podcast - The CyberSec Migrant, where I discuss experiences in the cybersecurity industry from an immigrant lens. On my YouTube channel, I break down complex concepts into digestible insights, offering a visual journey into the ever-evolving landscape of cybersecurity.
In my free time, I work on my podcast - "The CyberSec Migrant", tinker with cars, spend time in the great outdoors of Beautiful British Columbia, or watch European soccer on a digital stream.
May 26, 11:40-12:30
When All Else Fails: Recovery, Resilience, and the Power of Adaptability
Prevention isn’t 100% effective — and never will be. That’s why cyber resilience, and specifically the ability to recover quickly and confidently, is essential to ensuring your organization never suffers a business-ending event. Recovery is the last — and most critical — line of defense.
Zero Trust doesn’t end with identity or network controls — it must extend to how your organization protects and recovers data. In today’s evolving threat landscape, true cyber resilience means assuming breach and ensuring you can recover — cleanly, quickly, and without being locked into a single vendor ecosystem. This session explores why open, portable, and immutable backups are essential to maintaining flexibility, and how to align recovery strategies with least-privilege access, clean-room testing, and Zero Trust principles.
Join cybersecurity veterans Derran Guinan and Jeremy Carr as they present on cyber resiliency, modern recovery strategies, and debate the merits of software-defined architectures versus closed, all-in-one solutions. Walk away with practical guidance and a fresh perspective on how to strengthen your organization’s ability to bounce back — no matter what.
Derran Guinan is a seasoned IT Security Specialist dedicated to educating and advising clients across Canada on cutting-edge data protection and security solutions. With over twenty-five years in the IT industry, Derran has managed networks, architected innovative solutions, and provided strategic advice to clients, always with a focus on collaboration and customer-oriented service.
At Veeam, Derran leverages his extensive education and experience to assist clients in designing robust data protection solutions with a security-first approach across the enterprise. His tenure at globally trusted security giants like Palo Alto Networks and Crowdstrike involved daily advisement on both security incidents and proactive security measures, ensuring clients stayed ahead of potential threats.
Derran's journey began at NAIT, where he pursued a Telecommunications Engineering program. He has since enhanced his expertise through continued education with SANS, ISC2, ISACA, and PMP certifications. His commitment to professional growth is further evidenced by his participation in prestigious conferences such as WCISC 2015, Bsides Edmonton 2019, 2022, and 2023, 2024, Bsides Calgary 2023, the Vancouver International Privacy & Security Summit in 2021, and BTEX Toronto in 2023.
Jeremy Carr is a seasoned IT professional with over 18 years of experience designing and implementing enterprise technology solutions across British Columbia. With a strong foundation in systems architecture, datacenter operations, and network security, Jeremy has worked on the front lines as a Systems Administrator, Solutions Architect, and Systems Engineer—helping organizations modernize their environments and embrace hybrid cloud technologies.
Currently serving as a Senior Systems Engineer at Veeam Software, Jeremy partners with customers to deliver innovative data protection, backup, and ransomware recovery strategies. His consultative approach ensures organizations can confidently protect their critical systems while embracing digital transformation.
Before rejoining Veeam, Jeremy spent nearly four years at Nutanix, where he supported the adoption of hybrid cloud and hyperconverged infrastructure platforms. He has also held technical leadership roles at Think Communications and the BC Maritime Employers Association, where he specialized in datacenter migrations, network architecture, and unified communications.
Jeremy is a frequent presenter at conferences and customer events—including VeeamON 2017 in New Orleans—and is passionate about sharing practical, real-world guidance to help IT teams strengthen resiliency and security posture.
May 26, 1:30-1:50
KEYNOTE: One Community, Many Voices: Advancing Cybersecurity Through Collaboration
One Community, Many Voices” means that while we are united by a common mission, to protect our digital assets, we each bring unique perspectives and skills that strengthen our collective defense. Whether you're writing policy or code, your voice matters. Cybersecurity isn’t the job of one team or one title, it’s a shared mission. As threats become more complex and fast-moving, the strongest defenses come from collaboration across disciplines. That’s why, for the first time, BSides has launched a GRC (Governance, Risk, and Compliance) track to recognize the critical role that GRC professionals, risk leaders, and policy makers play in protecting what matters most. Let’s explore how developers, auditors, security engineers, and GRC teams can work together to tackle real-world challenges, from securing applications to managing third-party risk and responding to zero-day threats. By breaking down silos and elevating new voices leads to smarter decisions, faster responses, and security that works.
Mary Carmichael is the Managing Director of Risk Advisory at Momentum Technology, with over 15 years of experience in technology risk management. Her expertise spans multiple sectors, including higher education, government, and critical infrastructure, with a strong focus on third-party risk management. Mary is a member of the ISACA Global CRISC Committee and the Emerging Trends Working Group, where she offers insights on AI's implications for governance, risk, and compliance (GRC) functions. A published author and global speaker, Mary also serves as President of ISACA's Vancouver Chapter which received ISACA Global's 2025 Outstanding Chapter Achievement award.
May 26, 2:00-2:50
How to Avoid Potholes When Scaling Your Application Security Program
Have you ever wondered what it is like to build an Application Security program at a very large organization? Or an organization that had experienced hyper-growth and the security team’s growth was not at the same pace as Engineering? What about an organization that had acquired a lot of different companies with vastly different tech stacks?
This talk will go through where you need to focus your energy to build a scaled Application Security program and how to avoid pitfalls along the way. It will deep dive into topics such as:
• The different levels of maturities for Application Security programs
• How to hire the right individuals for a scaled program
• How to best leverage your tools to bring out the value of them
• And how to build a democratized vulnerability management program, so that Engineering is responsible for vulnerabilities
Jeevan Singh is the Director of Security Engineering at Rippling, where he is embedding security into all aspects of the software development process. Jeevan enjoys building security culture within organizations and educating staff on security best practices. Jeevan is responsible for a wide variety of tasks including architecting security solutions, working with development teams to resolve security vulnerabilities and building out security features. Before life in the security space, Jeevan had a wide variety of development and leadership roles over the past 20 years.
May 26, 3:00-3:20
A Methodology for Quantifying Cyber Risk: The 'R' in the GRC Most are Still Struggling to Define
One recurring challenge I’ve seen as a cybersecurity consultant across organizations of all sizes is that “risk” is still treated as an abstract concept rather than a measurable input to decision-making; even the GRC tooling out there today is still not quite hitting the mark. Security programs often begin by adopting a control framework such as NIST CSF, ISO 27001, CIS, etc. and pursue coverage without a clear understanding of which controls align with the organization’s actual risk exposure or their risk tolerance.
In this session, we’ll cut through the ambiguity surrounding risk in cybersecurity governance by demonstrating a practical approach to quantifying risk that works no matter which framework you adopt. We’ll examine how to move beyond checklist-based compliance by using concepts like asset types and inherent impact to establish a baseline for risk-informed control selection. We'll also show how this method covers a common blind spot: how to determine what “enough” security looks like, avoiding both over-engineering and under-protection.
Finally, we’ll look at why well-executed GRC efforts often go unnoticed—and how to communicate the value of controls and risk reduction even when no incidents occur and its value is hidden.
If you're looking to mature your risk management practices, operationalize security as a business function, or refine how to quantify cyber risk, this session will give you a grounded and practical model to build from.
I have been working as an Operational Technology (OT) & Governance, Risk and Compliance (GRC) Cybersecurity Consultant since 2021 with Mirai Security. During my time in this field, I've acquired comprehensive experience leading the implementation of various cybersecurity frameworks. I have also conducted the development of custom security frameworks, created novel quantitative cyber risk evaluation methodologies, maturity models, cyber security toolsets, and implementation plans that are tailored to the specific needs of 40+ organizations of various sizes across various industries.
Prior to making the jump into cybersecurity consulting, I spent 7 years as an Electrical, Instrumentation & Controls Engineer working in the Oil & Gas industry. That jump might seem no-so-typical, and it's true. But this has landed me in a somewhat unique position where I have been able to offer a fresh perspective of cybersecurity consulting, one that includes a practical, quantitative engineered approach to cyber risk management.
Though there are some parallels between cybersecurity and engineering, there are some glaring differences, especially with regards to motivation. In engineering, solutions must be strictly designed against well-defined codes of practice as efficiently as possible within defined safety factors. On the contrary, the implementation of cybersecurity is driven by various motivators unique to each organization. Some do coincide with engineering principles such as a strict need for implementating specific controls dictated by a given standard, but many do not. Some organizations are looking for ways to ease their uncertaincy about their system's exposure, to proactively harden their organization, or to call us after an incident to make sure that whatever happened never happens again.
In this space, "one-size-fits-all" does not apply, and it drives my desire to continually evolve as an always-growing and passionately curious professional.
May 26, 3:30-3:50
Lets be Honest About Vendor Risk Management: Achieving Real Resilience in Vendor Engagements
Lengthy questionnaires and “rubber stamp” approvals give vendor risk management a bad reputation. And frankly, they seldom mitigate risk. In this presentation, I will aim to challenge the prevailing approach to vendor risk management and suggest an alternative methodology that puts vendor engagements in context and mitigates real risk through informed recommendations and partnerships with both business owners and vendors.
The methodology sounds simple: spend time where impact is material, understand how the business will use the vendor, and assume breach. With this context, we can then work with the both the vendor and the business to identify ways to a) reduce the impact of a breach b) lower the likelihood of compromised data and c) build resilience into key third party engagements.
Paulo is the Director of Security GRC at Diligent Corporation, known for his strategic vision and ability to turn complex security challenges into tangible improvements. He has a foundation in Cyber Risk Management and has built and and scaled critical risk management programs, including Third Party Risk Management and Cyber Risk. As a subject matter expert (SME), Paulo has also matured compliance automation, continuous monitoring, and security awareness programs. When he's not focused on security posture, Paulo enjoys the balance of family life, the outdoors on his bike, and the creativity of playing his guitar.
May 26, 4:00-4:20
Beyond Algorithms: Human Reasoning in Cybersecurity Compliance
As the Director of Cybersecurity Services at D3 Security, I talk to MSSPs and SOC teams every day about how they automate and orchestrate their way through complex security challenges. MSSPs represent an interesting and unique market, in that they cater to a wide variety of clients, each with unique security needs, and operate on an expansive scale. This introduces both opportunities and challenges when it comes to automating security operations.
In this session, I'll talk about:
How MSSPs are using automation to manage increasingly large volumes of security alerts through playbooks and integrations.
How MSSPs deliver services, often in ways that aren't visible to end users but are critical to ensuring secure operations
How SOAR helps MSSPs improve incident response by automating repetitive tasks, such as threat detection, analysis, and response.
How effective automation can translate into faster Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR), as well as best practices for MSSP automation.
How AI can assist MSSPs in threat hunting and incident response, and how AI helps MSSPs easily scale operations.
Peter Skaronis heads up Techimpossible Security Inc., leveraging 15+ years of cybersecurity expertise to help over 200 clients across retail, finance, and tech. As a hands-on vCISO who also teaches cybersecurity at Vancouver Community College, Peter specializes in compliance frameworks and risk management with a practical approach that businesses value.
May 26, 4:30-5:20
From Evidence to Assurance: A Framework for Cybersecurity Through Structured Doubt
Cybersecurity assurance remains a significant challenge for organizations, due to its resource-intensive nature and complexity. While existing standards and checklists provide valuable guidance, they are predominantly employed to audit a company’s cybersecurity practices at a given point in time. A major limitation with these methods is that they are generally static; they lack mechanisms for doubting an organization’s current approach to managing cybersecurity risk, which can help identify hidden vulnerabilities and foster continuous improvement. Furthermore, checklists or questionnaires often fail to explain why a specific mitigation strategy or artifact is important to the underlying security objectives, which can lead to confusion and miscommunication. In this presentation, we propose a framework that combines the benefits of these template resources with the Eliminative Argumentation (EA) methodology to offer a more dynamic approach to cybersecurity assurance. The framework generates a hierarchical model, where active cybersecurity mitigations are presented as evidence linked to source documentation, which facilitates traceability to requirements, security goals, and existing measures. Additionally, defeaters (or doubts) are incorporated to challenge a given cybersecurity posture against potential attack paths or vulnerabilities. This not only tests the robustness of cybersecurity measures but also enables the identification of further weaknesses or security gaps. Ultimately, our framework provides a practical, systematic approach to strengthening cybersecurity while ensuring continuous validation and improvement within a live model.
Laure is the Vice President Research at Critial Systems Labs Inc. Her professional activities have focused on the development, and verification of high hazard software intensive systems in technical domains like aerospace, automotive, or defense. She works on client projects and research activities that focus on system engineering and safety engineering methodology for compliance with safety-related standards including EN50126, IEC 61508, DO-178C and ISO 26262. Her work ranges from proposing practical solutions to meet the standards requirements, developing prototypes, writing functional and technical requirements, developing artifacts for certification and applying new verification methods that include the use of formal methods; thus, ensuring the systems correctness at an early design phase. Most of her recents projects involve unique challenges in managing safety risk associated with emergent technology such as the use of Machine Learning in autonomous vehicles. She is also a member of CSL’s product development team for the Socrates Assurance Case Editor.