BSides Toronto 2020

To see our schedule with full functionality, like timezone conversion and personal scheduling, please enable JavaScript and go here.
06:45
06:45
55min
Twitch
09:30
09:30
30min
Opening Remarks
Max Cizauskas

Opening remarks and house keeping to kick off the day

Twitch
10:00
10:00
40min
From hardware to zero-day
Pietro Oliva

IoT devices are changing the world in both good and bad ways. It is exciting and fascinating to see how technology keeps improving our lives, but it is also worth considering the security impact and the vulnerabilities being introduced in our lives by such connected devices.

Twitch
11:00
11:00
20min
Asking Questions and Writing Effectively
Christopher Lopez

This talk is all about the investigative method and how it aligns with the scientific method to drive our investigations as analysts. Each important question is emphasized and examples are given to help with the framing of these questions from an analytical perspective. At the end an example is given showing how to put your answers together into an effective report.

Twitch
11:30
11:30
20min
Breaking the Habit with Continuous Security
Dolev Farhi

Growth is often a positive indication a business is thriving, which often leads to security complications: increased attack surface, growth in assets, aggressive time to market objectives and new opportunities for security to go wrong.

This talk will provide you with a deep technical insight into how we built a continuous security platform to reduce our attack surface, while keeping the signal to noise ratio as the prime objective, the lessons we learnt, and how you can do it too.

Twitch
12:00
12:00
60min
Saturday Lunch break
Max Cizauskas

Before we break to talk about sponsorship

Twitch
13:00
13:00
20min
Redefining the Security Perimeter for the remote workforce
Jon Rohrich

Attendees will learn about the prevalence of identity based attacks, the history and current state of Zero Trust and how they can protect their users by applying modern security principles around their identities and data. Topics covered in this session are especially important as more organizations have shifted to a work from home model due to the recent Covid-19 pandemic

Twitch
13:30
13:30
20min
Connecting the Dots: How Threat Intelligence Protects the Applications
Catalin Curelaru

Today we can see that the digital technologies are the core of every business. The automation and the connections achieved with these technologies have revolutionized the world’s economic and cultural institutions but they have brought additional risk in the form of cyber attacks.
What is Cyber Threat Intelligence and how you can implement it properly to protect your business?
In this presentation you will find how to integrate it into you Application Security Program but also solutions that automate data collection and processing, integrate with other solutions or services, take in unstructured data from disparate sources, and then connect the dots by providing context on indicators of compromise (IoCs) and the tactics, techniques, and procedures (TTPs) of threat actors. To put it short, Threat intelligence is knowledge that allows you to prevent or mitigate those attacks

Twitch
14:00
14:00
40min
Automating Threat Hunting on the Dark Web and other nitty-gritty things
Apurv Singh Gautam

What's the hype with the dark web? Why are security researchers focusing more on the dark web? How to perform threat hunting on the dark web? Can it be automated? If you are curious about the answers to these questions, then this talk is for you.

Twitch
15:00
15:00
20min
Getting people out your automation
Adam Winnington

Automation Cannot Think, help it.
CAB meetings think too much, avoid them.
Check (Audit) your work
Keep “everything in its place” automatically.

Twitch
15:30
15:30
40min
Navigating DevOps security journey at scale with OWASP SAMM 2.0
Hardik Parekh

In today’s agile environment, it’s important to know maturity of your software assurance program. In this talk, we will introduce OWASP SAMMv2 - an effective and measurable way to analyze and improve software assurance posture in 3 levels of maturity - thus creating a step-by-step navigation plan.

Twitch
16:20
16:20
40min
Securing your Snowflake Cloud Data Warehouse
Ben Herzberg

In this session I will go through the security controls in snowflake as well as some of their limitations, along with hands-on walk-throughs of the permission structure of snowflake and how to set up column and row based access controls from within Snowflake. I will also discuss setting up monitoring of authentication and authorization for snowflake with a few useful tips.

Twitch
17:00
17:00
20min
Saturday Closing Remarks
Max Cizauskas

End of day closing remarks

Twitch
09:30
09:30
30min
Opening Remarks
Max Cizauskas

Opening remarks and house keeping to kick off the day

Twitch
10:00
10:00
40min
Profiling Bad USB Attacks
Anitha A, Payal R K

As of April 2020, 59 percent of the global population uses the Internet and a very small fraction of these people know that BadUSBs aren't restricted to mass storage devices with infected files on them. Today, there are normal-looking USBs that are capable of running malicious programs to exfiltrate most critical data on a computer without a single mouse click. All that needs to be done in order to achieve this is, be connected to a USB port. In this paper we will talk about the capability of a device called WHID (Wi-Fi injector) and what can be done to detect and investigate it.

Twitch
11:00
11:00
20min
The Great Hotel Hack: Adventures in attacking hospitality industry
Etizaz Mohsin

Ever wondered your presence exposed to an unknown entity even when you are promised for full security and discretion in a hotel? Well, it would be scary to know that the hospitality industry is a prime board nowadays for cyber threats as hotels offer many opportunities for hackers and other cybercriminals to target them and therefore resulting in data breaches. Not just important credit card details are a prime reason, but also an overload of guest data, including emails, passport details, home addresses and more. Marriot International where 500 million guests' private information was compromised sets for one of the best examples. Besides data compromise, surgical strikes have been conducted by threat actors against targeted guests at luxury hotels in Asia and the United States. The advanced persistent threat campaign called Darkhotel infected wifi-networks at luxury hotels, prompted the victim to download the malware and thus, succeeded in specifically targeting traveling business executives in a variety of industries and all its prevalence seems to have no end yet.

For a broader look, this time a popular internet gateway device for visitor based networks commonly installed in hotels, malls and other places that provides guests temporary access to Wi-Fi was examined. To see, how the guests and the hotels both have a serious stake in this, we will discourse about the working of guest Wi-Fi systems, different use cases and their attack surfaces: device exploitation, network traffic hi-jacking, accessing guest's details and more. Common attacks and their corresponding defenses will be discussed. This talk will contain demos of attacks to reveal how the remote exploitation of such a device puts millions of guests at risk.

Twitch
11:30
11:30
20min
Subdomain takeovers and how to prevent them
Matthew Marji

Did you know that taking over a subdomain is a pretty easy thing to do if you know what you're looking for?
Did you know that these types of attacks have caused millions of dollars in damage?
How do they happen, and how can we prevent them?

Twitch
12:00
12:00
60min
Sunday Lunch break
Max Cizauskas

Sunday lunch break

Twitch
13:00
13:00
40min
Digital Cinema Security
Tim Dafoe

Film is a cultural asset, but a new blockbuster, sitting "in the can" the day before release, is a business asset. How do big league studios, and the theatres that screen their nine-figure budget "tent-pole" features, protect digital content? Follow the (encrypted) path of modern film in this talk, right from the post house to the tamper-resistant boards inside the laser projectors lighting today's silver screens.

Twitch
14:00
14:00
20min
Windows Defender Exploit Guard v Unpatched Software and Zero Day exploits
Chad Duffey

We'll use a a handful of demonstrations to show how Windows Defender Exploit Guard can be can be quickly configured to protect otherwise vulnerable applications against exploits and common adversary techniques. We'll talk about how to set things up quickly in an enterprise environment and discuss the mistakes we made in our exploit guard journey so that you can avoid them for your company.

Twitch
14:30
14:30
40min
Emulate.Go
Haydn Johnson

Emulate.Go - A tool released at DEF CON Red Team Village 2020 to help abstract the complexity away from running adversary emulation exercises through focusing on command line execution for initial access.

This talk will
- demonstrate how to use the tool within a lab environment
- dive deep into how to use the tool and lab 2 environments to build skills that are valuable in the industry

Twitch
15:30
15:30
20min
Detection Mastery - War Stories From The Hunters Side!
Ilya kolmanovich, Felix Kurmish

Threat Hunting is a rapidly evolving topic in cyber security. Armed with more than 20 years of enterprise and military experience, being on both red and blue sides - we plan to determine the approach to next generation detection.

Twitch
16:00
16:00
40min
New Era in Telecom Hacking
Ali Abdollahi

his talk focus on the implementation of new security hardening in mobile networks as well as detecting techniques and bypassing methods. The scope of the illustration include both radio and signaling core network.
One of the most complicated network is mobile telecom network. There are some segments
include signaling, charging, packet data, Radio etc. Still there are many security holes that
allow attackers to compromise the network and however telecom companies enable
security mechanisms and put some security devices. In this talk, I will cover common
high-tech security solutions used by telecom operators and and all ways to detect and after that bypass it as well as security recommendations to prevent theses activities.

Twitch
16:40
16:40
20min
Sunday Closing Remarks
Max Cizauskas

Conference closing remarks

Twitch