• If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • Stop wasting time looking for files and revisions. Connect your Gmail, DriveDropbox, and Slack accounts and in less than 2 minutes, Dokkio will automatically organize all your file attachments. Learn more and claim your free account.

View
 

BSidesCapeBreton

Security B-Sides Cape Breton

When:
Friday September 5, 2014
9:00am – 5:00pm


Where:

Cape Breton Centre for Heritage & Science
225 George Street
Sydney, Nova Scotia
Canada


Cost:

FREE *


* We do ask that attendees consider a small cash donation for the Cape Breton Centre for Heritage & Science. There will be a collection box at the door. Please note that this is not mandatory!


Schedule

9:00 - 9:30 AM
CHECK-IN, NETWORKING, AND OPENING REMARKS
9:30 - 10:30 AM
Opening Keynote
Dave Lewis, Global Security Advocate - Akamai Technologies
"Elephants On The Lawn"
10:30 - 11:15 AM
Andrew Kozma 
"Hacking Countermeasures"
11:15 - 11:30 AM
Morning Break
11:30 - 12:15 PM
Arved Sandström
"Importance of Basic Security Profiles"
12:15 PM - 1:30 PM
Lunch
1:30 - 2:15 PM
Frank Breil
"Advanced Malware: Do We Need To Add New Layers"
2:15 - 3:00 PM
Paul Halliday
"Squert - An Open Source Web Interface For Network Security Monitoring (NSM) Data"
3:00 - 3:15 PM
Afternoon Break
3:15 - 4:00 PM
Benjamin Brown
"Cognitive Bias and Critical Thinking in Open Source Intelligence (OSINT)"
4:00 - 4:45 PM
Travis Barlow 
"So You Want To Be An InfoSec Rockstar Do Ya?"


Speakers:

KEYNOTE SPEAKER – DAVE LEWIS

Dave is a Global Security Advocate for Akamai Technologies. He has almost two decades of industry experience with extensive experience in IT operations and management. Dave is the founder of the security site Liquidmatrix Security Digest and co-host of the Liquidmatrix podcast. As well, he also serve on the (ISC)2 Board of Directors. Prior to his current role, he worked in the finance, healthcare, entertainment, manufacturing and critical infrastructure verticals. Dave has worked for a defense contractor as a security consultant to clients such as the FBI, US Navy, Social Security Administration, US Postal Service and the US Department of Defense to name a few. When not at work he can be found spending time with his family, playing bass guitar and polishing his brick of enlightenment.
 

ABSTRACT: ELEPHANTS ON THE LAWN

COMING SOON


ANDREW KOZMA

Andrew Kozma is currently employed as the Sr. Security Analyst for Capital District Health Authority, Nova Scotia’s largest healthcare district. He is responsible for the development of information security policies, standards, procedures, and their management and implementation across the district. He is also trained to look for weaknesses and vulnerabilities in target systems and to use his offensive computer security skills to identify, report and mitigate risk. Andrew is also the co-founder of Atlantic Canada’s largest infosec conference AtlSecCon and the Halifax Area Security Klatch (HASK).


ABSTRACT: HACKING COUNTERMEASURES

In order to adequately defend I.T infrastructure it is important to understand how the attacks against it are performed. In this presentation we will be looking at common attack vectors and why they are successful. Today’s info sec professional needs to have a balanced skill set that includes both offensive and defensive capabilities. The goal is to apply this knowledge to design and implement security controls that have been tested and validated to support the overall security posture of your organization. This talk includes demonstrations on AV Evasion, Cross Site Scripting and Phishing.


ARVED SANDSTROM

Arved Sandstrom has extensive government and industry experience in application security. His security interests encompass application (software implementation) security, SOA security, and web application security.


ABSTRACT:  IMPORTANCE OF BASIC SECURITY PROFILES

Implementors of security software are often challenged by overly complex security specifications. Users of the specifications – and of the software – are equally challenged by the same complexity. Specification writers and security practitioners are aware of this. Use of so-called basic profiles, and knowledge gained by experience, reduces a seeming morass to manageable materials.

Correct selection is important. Proper implementation of a subset of potential security mechanisms is vastly better than shoddily applying almost all.

This presentation discusses the problem in brief, and illustrates a solution using WS-* specifications.


FRANK BREIL

Frank has a bachelor of Commerce with Distinction from Concordia University. He has been involved in technology sales and positioning, as well as sales management, for over 25 years, in area such as hardware, application software, 4gl programming languages and CASE tools, Business intelligence and security.

Frank has been in network security for the past 7 ½ years, formerly Regional manager at Fortinet, now with INSA since 2011. Frank is a recognized speaker in different security conferences and has a great variety of knowledge in the world of network security.


ABSTRACT: ADVANCED MALWARE: DO WE NEED TO ADD NEW LAYERS

In the past year or so, there has been much talk about advanced persistent threats, custom malware and targeted attacks. Not surprisingly, many vendors in firewall, antivirus, SIEM, IPS and other market segments are claiming they can block such attacks. The question is: Are they? In Mandiant’s APT1 Report, the average breach duration was 356 days and according the latest Verizon Breach Study, 69% of breached organizations were not aware of the breach until thus informed by an external party. These studies seem to indicate that the entire life cycle of next generation attacks from exploitation of a host, to infection, to ex-filtration are not only bypassing conventional security layers, they appear to be going unnoticed entirely.

Frank will describe some next generation threats and the relative ability (or inability) of conventional technologies to block them. We will also quote industry analysts, government organisations and studies describing next generation of threats and ways in which they try to breach victim organisations and navigate inside victim networks with the ultimate goal of ex-filtrating data.


PAUL HALLIDAY

Paul works as a Security Analyst for a Community College in Nova Scotia, Canada. At work he builds stuff to help himself, technical support staff and management answer questions.

He is an open source author (he writes software and gives it away for free) and staunch OSS supporter. He doesn’t believe that people should have to pay to be safe while online; or anywhere else for that matter.


ABSTRACT: SQUERT – AN OPEN SOURCE WEB INTERFACE FOR NETWORK SECURITY MONITORING (NSM) DATA

Paul began work on squert in 2006; the first incarnation a quick hack so that he could access IDS alert data via a web browser.

While initially intended as a simple event viewer it has slowly evolved into a usable and feature rich event driven console for the Suricata (or Snort) Intrusion Detection system and the Bro Network security Monitor. It is available for free on Github and can also be found on the popular Security Onion Linux distribution. It has been featured in Richard Bejtlich’s book “The Practice of Network Security Monitoring” and is also covered in most talks on Security Onion.

This session will introduce squert and it’s capabilities and future path.


BENJAMIN BROWN

Benjamin Brown currently works on systems safety, adversarial resilience, and threat intelligence at Akamai Technologies. He has experience in Non-profit, Academia, and the corporate world as well as degrees in both Anthropology and International Studies. Research interests include the psychology, anthropology, and sociology of information security, threat actor profiling, and thinking about security as an ecology of complex systems.


ABSTRACT: COGNITIVE BIAS AND CRITICAL THINKING IN OPEN SOURCE INTELLIGENCE (OSINT)

When gathering open source data and transforming it into actionable intelligence, it is critical to recognize that humans are not objective observers. Conscious and unconscious assumptions drive analysts’ choices about which data to analyze and how much importance to ascribe to each resource. Furthermore, analysts’ personal conceptual frameworks about reality and how the world works can undermine the process of objectively translating data into intelligence. These implicit assumptions, otherwise known as cognitive biases, can lead to missed data, skewed intelligence, illogical conclusions, and poor decision making. In this presentation I will illustrate some of the cognitive biases relevant to OSINT and what can be done about them.


TRAVIS BARLOW

Consultant and CEO of a Nova Scotia based stealth start-up focused on penetration testing, data exfiltration, and incident response mainly for the Fortune 500. 16 Year Veteran of the Security Industry.

Founder of…
Atlantic Security Conference (AtlSecCon)
Halifax Area Security Klatch (HASK)
Halifax Hack Labs (HHL)
No BullShit Labs (NBLS)

Weekend redneck, Lover of beer, Hunter/Fisher/Trapper, Philosopher and all round Hell raiser .


ABSTRACT: SO YOU WANT TO BE AN INFOSEC ROCKSTAR DO YA?

Interested in InfoSec?  Want to be a rockstar?  Check out this talk and understand what it means to fully commit to a career in InfoSec that is not vendor sponsored or “con” driven.  It is a hard road and Mr. Barlow will share the mistakes  he made thus far in his career.  This is meant to be a light-hearted look at InfoSec as a whole, how you make it, what metrics you use to determine success and how you can improve you chances of success.


Sponsors:

PLATINUM
 

CP_horz

 

GOLD
 

GoSecure Logo

Fortinet_Logo_lrg-1024x170


Travis Barlow

 

SILVER
 

insa-logo


BRONZE


trendmicro.com_

Innovacorp


COMMUNITY

OldSydneySociety

AltSecCon-Maple-Logo3

SignSource

clouda

EDUCATIONAL
 

Offensive Security








BlackHackerAcademyLong

 

 

 



INDUSTRY
 

nci

maritect-colour-transparent-hi|

HeimdallNetworks



Organizers:

 

Comments (0)

You don't have permission to comment on this page.