This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Toronto"

From OWASP
Jump to: navigation, search
(Adding Google Group link)
(Updated the OWASP Toronto Chapter page to include details of upcoming meetups, and uploaded previous meetup's slides.)
Line 17: Line 17:
 
==== Gold Local Chapter Supporter ====
 
==== Gold Local Chapter Supporter ====
  
<br/>
+
<br />
 
[[Image:OWASP-Toronto-Local-Chapter-Supporter-HPE.png|150px|Hewlett Packard Enterprise|link=https://www.hpe.com/us/en/solutions/protect-digital.html]]
 
[[Image:OWASP-Toronto-Local-Chapter-Supporter-HPE.png|150px|Hewlett Packard Enterprise|link=https://www.hpe.com/us/en/solutions/protect-digital.html]]
  
Line 23: Line 23:
 
==== Global Contributing Corporate Member & Silver Local Chapter Supporter ====
 
==== Global Contributing Corporate Member & Silver Local Chapter Supporter ====
  
<br/>
+
<br />
 
[[Image:OWASP-Toronto-Local-Chapter-Supporter-Checkmarx.png|150px|Checkmarx|link=https://www.checkmarx.com]]
 
[[Image:OWASP-Toronto-Local-Chapter-Supporter-Checkmarx.png|150px|Checkmarx|link=https://www.checkmarx.com]]
  
Line 29: Line 29:
 
==== Global Contributing Corporate Member & Local Event Supporter ====
 
==== Global Contributing Corporate Member & Local Event Supporter ====
  
<br/>
+
<br />
 
[[Image:Securitycompass-stacked_%281%29.jpg|150px|Security Compass|link=http://www.securitycompass.com]]
 
[[Image:Securitycompass-stacked_%281%29.jpg|150px|Security Compass|link=http://www.securitycompass.com]]
  
Line 42: Line 42:
 
==== Local Event Supporter ====
 
==== Local Event Supporter ====
  
<br/>
+
<br />
 
[[Image:OWASP-Toronto-Local-Chapter-Supporter-Amazon.png|150px|Amazon|link=https://www.amazon.com]]
 
[[Image:OWASP-Toronto-Local-Chapter-Supporter-Amazon.png|150px|Amazon|link=https://www.amazon.com]]
  
Line 49: Line 49:
  
  
<br/>
+
<br />
<br/>
+
<br />
  
 
= Upcoming Sessions =
 
= Upcoming Sessions =
 +
 +
'''Date/Time: May 15, 2019, 6:30 PM to 8:30 PM EDT'''
 +
 +
'''Location: Room 128 (on the first floor near the library), St. James Campus - Building A, George Brown College, 200 King Street East, Toronto, ON, M5A 3W8'''
 +
 +
'''Presentation summary:'''
 +
 +
'''Building a CTF: A Student's Perspective'''
 +
 +
CTFs are fun, educational events that have become a staple in the information security community. But have you ever considered what actually goes on behind the scenes to make one happen?
 +
 +
In this talk Cameron Novina will reflect on his experience organizing the first and second annual Sheridan CTFs. This year, a custom CTF platform was implemented, as well as an even larger selection of challenges; including cryptography, stenography and of course, application security. He will cover the obstacles he and the team overcame while implementing challenges that were designed to be attacked by budding information security professionals, using modern infrastructure and development practices on a tight budget.
 +
 +
This talk is aimed at those who have enjoyed a CTF (or many) in their time, and want to know what goes into organizing these events, both from a technical and event planning perspective.
 +
 +
'''Presenter bio:'''
 +
 +
Cameron Novina
 +
 +
Cameron is a Consultant with Deloitte’s Cyber Risk Advisory practice and is currently the Vice President of Sheridan College's Information Security Sessions Club. Cam has helped formulate and execute a variety of information security simulations for organizations in the National Capital Region and previously served as the club's president.
 +
 +
While not at work or school, Cam wrecks n00bs in overwatch (Highest SR: 3440!) and enjoys tabletop games such as D&D as both a player and a Dungeon Master.
 +
 +
 +
----
 +
 +
= Previous Sessions =
 +
 +
'''Date/Time: April 17, 2019, 6:30 PM to 9:00 PM EST'''
 +
 +
'''Location: Room 128 (on the first floor near the library), St. James Campus - Building A, George Brown College, 200 King Street East, Toronto, ON, M5A 3W8'''
 +
 +
'''De-identification!'''
 +
 +
De-identification is a way to make data sets containing personal information statistically safe for release. It is fundamentally a risk management solution designed to help companies comply with privacy legislation. This talk will go over:
 +
 +
- The Data Problem: the raison d’être for de-identification
 +
 +
- Implementation Overview: How it is done
 +
 +
- Methodologies: 4 ways to secure personal data
 +
 +
'''Speaker bio:'''
 +
 +
Erik Service
 +
 +
Erik Service is a data scientist working with Security Compass as a management consultant. Prior to this role, he was a technical lead at Privacy Analytics where he contributed to the commercialization of a de-identification methodology for pharmaceutical research.
 +
 +
His professional interests lie at the intersection of technology and privacy law, with a focus on how people create and consume technology. He is a columnist for Mindthis magazine and plans to launch a blog looking at ways to inject privacy and security into the software development lifecycle.
 +
 +
Erik holds a Master of Science from McGill University. He completed a B.A at the University of Ottawa and is credited as an author on 6 peer-reviewed science publications.
 +
 +
----
  
 
'''Date/Time: March 20, 2019, 6:30 PM to 9:00 PM EST'''
 
'''Date/Time: March 20, 2019, 6:30 PM to 9:00 PM EST'''
Line 88: Line 141:
  
 
Security Innovation is a pioneer in software security and trusted advisor to its clients. Since 2002, organizations have relied on our assessment and training solutions to make the use of software systems safer in the most challenging environments – whether in Web applications, IoT devices, or the cloud. The company’s flagship product, CMD+CTRL Cyber Range, is the industry’s only simulated Web site environment designed to build the skills teams need to protect the enterprise where it is most vulnerable – at the application layer. Security Innovation is privately held and headquartered in Wilmington, MA USA. For more information, visit www.securityinnovation.com or connect with us on LinkedIn or Twitter.
 
Security Innovation is a pioneer in software security and trusted advisor to its clients. Since 2002, organizations have relied on our assessment and training solutions to make the use of software systems safer in the most challenging environments – whether in Web applications, IoT devices, or the cloud. The company’s flagship product, CMD+CTRL Cyber Range, is the industry’s only simulated Web site environment designed to build the skills teams need to protect the enterprise where it is most vulnerable – at the application layer. Security Innovation is privately held and headquartered in Wilmington, MA USA. For more information, visit www.securityinnovation.com or connect with us on LinkedIn or Twitter.
 
  
 
----
 
----
 
= Previous Sessions =
 
  
 
'''Date/Time: February 20, 2019, 6:30 PM to 8:30 PM EST'''
 
'''Date/Time: February 20, 2019, 6:30 PM to 8:30 PM EST'''
Line 129: Line 179:
  
 
Lisa is a consultant in Deloitte’s Risk Advisory practice. Her specialties include trust considerations of Public Key Infrastructure, Cyber Security, Enterprise Risk, Internal Controls, Third Party Service Auditor Reporting, Data Quality, Confidentiality and Privacy. Furthermore, she is involved in the development and delivery of training courses within the practice, and internal innovation initiatives.
 
Lisa is a consultant in Deloitte’s Risk Advisory practice. Her specialties include trust considerations of Public Key Infrastructure, Cyber Security, Enterprise Risk, Internal Controls, Third Party Service Auditor Reporting, Data Quality, Confidentiality and Privacy. Furthermore, she is involved in the development and delivery of training courses within the practice, and internal innovation initiatives.
 
  
  
Line 167: Line 216:
  
 
When not on an engagement, he can be found competing in and building CTFs or exploring the world of distributed ledger technology security.
 
When not on an engagement, he can be found competing in and building CTFs or exploring the world of distributed ledger technology security.
 
  
  
Line 270: Line 318:
  
  
''Tanya Janca is a senior cloud developer advocate for Microsoft, specializing in application security; evangelizing software security and advocating for developers through public speaking, her open source project OWASP DevSlop, and various forms of teaching via workshops, blogs and community events. As an ethical hacker, OWASP Project and Chapter Leader, software developer and professional computer geek of 20+ years, she is a person who is truly fascinated by the ‘science’ of computer science.
+
''Tanya Janca is a senior cloud developer advocate for Microsoft, specializing in application security; evangelizing software security and advocating for developers through public speaking, her open source project OWASP DevSlop, and various forms of teaching via workshops, blogs and community events. As an ethical hacker, OWASP Project and Chapter Leader, software developer and professional computer geek of 20+ years, she is a person who is truly fascinated by the ‘science’ of computer science.''
  
  
Line 285: Line 333:
 
https://www.youtube.com/channel/UCyxbNw11fMUgoR3XpVYVPIQ
 
https://www.youtube.com/channel/UCyxbNw11fMUgoR3XpVYVPIQ
  
https://www.twitch.tv/shehackspurple''
+
https://www.twitch.tv/shehackspurple
  
  
Line 454: Line 502:
  
 
''This session will introduce you to the basics of application threat modeling using the OWASP Cornucopia and Microsoft Elevation of Privileges games. We will provide an introduction to the game concepts, and then attendees will join groups where they will get hands on game experience threat modeling a sample application. Come prepared to participate!''
 
''This session will introduce you to the basics of application threat modeling using the OWASP Cornucopia and Microsoft Elevation of Privileges games. We will provide an introduction to the game concepts, and then attendees will join groups where they will get hands on game experience threat modeling a sample application. Come prepared to participate!''
 
  
  
Line 472: Line 519:
  
  
''Intro by OWASP Toronto:
+
''Intro by OWASP Toronto:''
 
As AppSec and information security professionals, we work in a field where technical knowledge is key, while networking and communications skills, which are just as important, are often overlooked. Marcel's insights on effective networking will help you be more successful in your roles within your organizations, or help you be better prepared to enter the security workforce."
 
As AppSec and information security professionals, we work in a field where technical knowledge is key, while networking and communications skills, which are just as important, are often overlooked. Marcel's insights on effective networking will help you be more successful in your roles within your organizations, or help you be better prepared to enter the security workforce."
  
Line 519: Line 566:
  
 
This will be a guided discussion about entering the world of application security, or information security in general. We will cover topics such as OWASP resources, tools, secure SDLC, agile, secure DevOps, training and certifications. We will also have some real life stories from folks in the industry about their path. Come prepared to participate!
 
This will be a guided discussion about entering the world of application security, or information security in general. We will cover topics such as OWASP resources, tools, secure SDLC, agile, secure DevOps, training and certifications. We will also have some real life stories from folks in the industry about their path. Come prepared to participate!
 
  
  
Line 614: Line 660:
  
 
She was previously a product manager and solution engineer with Codiscope, now part of Synopsys.
 
She was previously a product manager and solution engineer with Codiscope, now part of Synopsys.
 
  
  
Line 781: Line 826:
 
'''Speaker: Michael Bennet'''
 
'''Speaker: Michael Bennet'''
  
''Lead DDoS Strike Developer, Security Compass
+
''Lead DDoS Strike Developer, Security Compass''
  
 
'''Is your Application DDoS Ready?'''
 
'''Is your Application DDoS Ready?'''
Line 984: Line 1,029:
 
'''Location: PwC Tower, 18 York Street, Suite 2600, Toronto ON M5J 0B2'''
 
'''Location: PwC Tower, 18 York Street, Suite 2600, Toronto ON M5J 0B2'''
  
''Due to fire and building regulations, there is a maximum occupancy allowed in the venue, so if you would like to attend it is very important that you RSVP at yuk.fai.chan@owasp.org to confirm your presence!
+
''Due to fire and building regulations, there is a maximum occupancy allowed in the venue, so if you would like to attend it is very important that you RSVP at yuk.fai.chan@owasp.org to confirm your presence!''
  
 
[https://www.owasp.org/images/3/38/NFC_Threat_Landscape_OWASP_Toronto_March_2013.pdf NFC Threat Landscape]
 
[https://www.owasp.org/images/3/38/NFC_Threat_Landscape_OWASP_Toronto_March_2013.pdf NFC Threat Landscape]
Line 993: Line 1,038:
  
 
----
 
----
'''Wednesday, July 11th 2012, 6:30-8:00 PM EDT''' - ''Security Community Engagement
+
'''Wednesday, July 11th 2012, 6:30-8:00 PM EDT''' - ''Security Community Engagement''
  
 
'''Location: [http://maps.google.com/maps?f=q&source=s_q&hl=en&geocode=&q=425+Adelaide+Street+West,+Toronto,+Ontario,+Canada, Suite 201, 425 Adelaide Street West, Toronto, ON M5V 3C1]'''
 
'''Location: [http://maps.google.com/maps?f=q&source=s_q&hl=en&geocode=&q=425+Adelaide+Street+West,+Toronto,+Ontario,+Canada, Suite 201, 425 Adelaide Street West, Toronto, ON M5V 3C1]'''
Line 1,007: Line 1,052:
  
 
----
 
----
'''Thursday, May 10th 2012, 6:30-8:00 PM EDT''' - ''[https://www.owasp.org/images/6/64/ISO_27034_review_%28OWASP_Toronto_May_10%2C_2012%29.pdf Application Security ISO]
+
'''Thursday, May 10th 2012, 6:30-8:00 PM EDT''' - ''[https://www.owasp.org/images/6/64/ISO_27034_review_%28OWASP_Toronto_May_10%2C_2012%29.pdf Application Security ISO]''
  
'''Location: [http://maps.google.com/maps?f=q&source=s_q&hl=en&geocode=&q=315+Front+Street+West,+Toronto,+Ontario,+Canada, RBC Auditorium C, 315 Front Street West, Toronto, ON M5V 3A4]
+
'''Location: [http://maps.google.com/maps?f=q&source=s_q&hl=en&geocode=&q=315+Front+Street+West,+Toronto,+Ontario,+Canada, RBC Auditorium C, 315 Front Street West, Toronto, ON M5V 3A4]'''
  
 
Please RSVP to '''yuk.fai.chan@owasp.org''' to confirm your presence.
 
Please RSVP to '''yuk.fai.chan@owasp.org''' to confirm your presence.
Line 1,022: Line 1,067:
  
 
----
 
----
'''Wednesday, September 14th 2011, 6:30-8:00 PM EDT ''' - ''Introducing Vega, a New Open Source Web Vulnerability Scanner
+
'''Wednesday, September 14th 2011, 6:30-8:00 PM EDT ''' - ''Introducing Vega, a New Open Source Web Vulnerability Scanner''
  
 
'''Location: [http://maps.google.com/maps?f=q&source=s_q&hl=en&geocode=&q=425+Adelaide+Street+West,+Toronto,+Ontario,+Canada, Suite 201, 425 Adelaide Street West, Toronto, ON M5V 3C1]'''
 
'''Location: [http://maps.google.com/maps?f=q&source=s_q&hl=en&geocode=&q=425+Adelaide+Street+West,+Toronto,+Ontario,+Canada, Suite 201, 425 Adelaide Street West, Toronto, ON M5V 3C1]'''
Line 1,243: Line 1,288:
 
----
 
----
 
''' May 13th 2008 Meeting '''
 
''' May 13th 2008 Meeting '''
<br/>
+
<br />
The next chapter meeting will be held on May 13th at a <B>Different Location</B> Delta Meadowvale Resort & Conference Center, 6750 Mississauga Road, Mississauga, ON CA, Phone: 905-821-1981  [http://maps.google.com/maps?f=q&hl=en&geocode=&q=6750+Mississauga+Road,+Mississauga&sll=37.0625,-95.677068&sspn=34.724817,82.265625&ie=UTF8&ll=43.602708,-79.742246&spn=0.015507,0.040169&t=h&z=15 Directions to the meetings]<br/><br/>
+
The next chapter meeting will be held on May 13th at a <B>Different Location</B> Delta Meadowvale Resort & Conference Center, 6750 Mississauga Road, Mississauga, ON CA, Phone: 905-821-1981  [http://maps.google.com/maps?f=q&hl=en&geocode=&q=6750+Mississauga+Road,+Mississauga&sll=37.0625,-95.677068&sspn=34.724817,82.265625&ie=UTF8&ll=43.602708,-79.742246&spn=0.015507,0.040169&t=h&z=15 Directions to the meetings]<br /><br />
  
<B>Topic: </B> A Distributed Web Application Honeypot <br/><br/>
+
<B>Topic: </B> A Distributed Web Application Honeypot <br /><br />
<B>Date/Time:</B> May 13th 2008, 6:00-7:00 PM EST <br/><br/>
+
<B>Date/Time:</B> May 13th 2008, 6:00-7:00 PM EST <br /><br />
 
<B>Description:</B>
 
<B>Description:</B>
 
DShield.org has been extremely helpful in understanding network based attacks. However, over the last few years many interesting attacks target specific web application flaws which are not detected by DShield's sensor system. Collecting similar data for web applications has been challenging for a number of reasons. First of all, the data needed to understand a web application attack is much richer and a simple efficient data model as the one used by DShield will not provide sufficient details. If more detailed data, like complete requests, are collected, data privacy issues become more of a problem. Simple obfuscation or pattern replacement techniques are usually not sufficient to safeguard this information, or they will make it impossible to understand the attack. Lastly, many web application attacks use search engines to find vulnerable systems, instead of just attacking random servers. Over the next few months we plan to roll out a distributed web application honeypot. We will describe how this honeypot will be implemented to address these issues.
 
DShield.org has been extremely helpful in understanding network based attacks. However, over the last few years many interesting attacks target specific web application flaws which are not detected by DShield's sensor system. Collecting similar data for web applications has been challenging for a number of reasons. First of all, the data needed to understand a web application attack is much richer and a simple efficient data model as the one used by DShield will not provide sufficient details. If more detailed data, like complete requests, are collected, data privacy issues become more of a problem. Simple obfuscation or pattern replacement techniques are usually not sufficient to safeguard this information, or they will make it impossible to understand the attack. Lastly, many web application attacks use search engines to find vulnerable systems, instead of just attacking random servers. Over the next few months we plan to roll out a distributed web application honeypot. We will describe how this honeypot will be implemented to address these issues.
Line 1,265: Line 1,310:
 
The next chapter meeting will be held on Jan 22nd at <B>20the floor, 79 Wellington Street West, Toronto, ON M5K 1B9 </B>. [http://maps.google.com/maps?q=79+Wellington+St+W,+Toronto,+ON,+Canada&spn=0.006033,0.020385&t=h&iwloc=A&hl=en Directions to the meetings]
 
The next chapter meeting will be held on Jan 22nd at <B>20the floor, 79 Wellington Street West, Toronto, ON M5K 1B9 </B>. [http://maps.google.com/maps?q=79+Wellington+St+W,+Toronto,+ON,+Canada&spn=0.006033,0.020385&t=h&iwloc=A&hl=en Directions to the meetings]
  
<B>Topic: </B>Modern Trends in Network Fingerprinting<br/><br/>
+
<B>Topic: </B>Modern Trends in Network Fingerprinting<br /><br />
<br/>
+
<br />
 
<B>Description:</B>
 
<B>Description:</B>
  
Line 1,328: Line 1,373:
 
The past presentations are available for download from here. If you have any comments on the presentations please send them to us.
 
The past presentations are available for download from here. If you have any comments on the presentations please send them to us.
  
 
+
[https://drive.google.com/open?id=1t94O1tLXbSujW94UK4EmqtdBtOXEiA7b De-identification] by Erik Service, April 2019
 
[https://www.owasp.org/images/0/08/OWASP-Toronto-Feb-2019-In_Root_we_Trust.pdf In Root we trust (no this is not a DNS talk)] by Pavan Chander and Lisa Bui, February 2019
 
[https://www.owasp.org/images/0/08/OWASP-Toronto-Feb-2019-In_Root_we_Trust.pdf In Root we trust (no this is not a DNS talk)] by Pavan Chander and Lisa Bui, February 2019
  
Line 1,351: Line 1,396:
 
[http://www.owasp.org/images/0/06/SecurityCompassPresentation.pdf Basic Web Application Testing Methodology] by Nish Bhalla [http://www.securitycompass.com Security Compass]
 
[http://www.owasp.org/images/0/06/SecurityCompassPresentation.pdf Basic Web Application Testing Methodology] by Nish Bhalla [http://www.securitycompass.com Security Compass]
  
[http://www.owasp.org/images/5/50/SecurityCompass_Web_Services.pdf Basic Web Services Security ] by Rohit Sethi [http://www.securitycompass.com Security Compass]
+
[http://www.owasp.org/images/5/50/SecurityCompass_Web_Services.pdf Basic Web Services Security] by Rohit Sethi [http://www.securitycompass.com Security Compass]
  
 
[http://www.owasp.org/images/d/d0/Authentication_security.pdf Authentication Security] by Hui Zhu
 
[http://www.owasp.org/images/d/d0/Authentication_security.pdf Authentication Security] by Hui Zhu
Line 1,361: Line 1,406:
 
[http://www.owasp.org/images/c/c2/ALaughRIAt.pdf A Laugh RIAt – Rich Internet Application Security] by Rafal M. Los  
 
[http://www.owasp.org/images/c/c2/ALaughRIAt.pdf A Laugh RIAt – Rich Internet Application Security] by Rafal M. Los  
  
[http://www.owasp.org/images/1/18/MichaelDSa-OWASP_Aug_09.pdf Will you be PCI DSS Compliant by September 2010? ] by Michael D'Sa
+
[http://www.owasp.org/images/1/18/MichaelDSa-OWASP_Aug_09.pdf Will you be PCI DSS Compliant by September 2010?] by Michael D'Sa
  
 
[https://www.owasp.org/images/5/5b/2011_mobile_security_forgetful.pdf Mobile Security for the Forgetful] by Max Veytsman, Security Compass, May 2011  
 
[https://www.owasp.org/images/5/5b/2011_mobile_security_forgetful.pdf Mobile Security for the Forgetful] by Max Veytsman, Security Compass, May 2011  
Line 1,379: Line 1,424:
 
[https://www.owasp.org/images/e/ee/OWASP_TORONTO_SEP_2014_Ryan_Berg.pdf What's Hiding in Your Software Components? Hidden Risks of Component-Based Software Development – Seeing the Forest Through the Trees] by Ryan Berg, Sonatype, September 2014
 
[https://www.owasp.org/images/e/ee/OWASP_TORONTO_SEP_2014_Ryan_Berg.pdf What's Hiding in Your Software Components? Hidden Risks of Component-Based Software Development – Seeing the Forest Through the Trees] by Ryan Berg, Sonatype, September 2014
  
<headertabs/>  
+
<headertabs />  
 
[[Category:Ontario]]
 
[[Category:Ontario]]
 
[[Category:Canada]]
 
[[Category:Canada]]

Revision as of 19:46, 28 April 2019

OWASP Toronto Chapter.jpg


OWASP Toronto

Welcome to the Toronto chapter homepage. The chapter is managed by Yuk Fai Chan and Opheliar Chan.


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


Our chapter's Google Group can be found here.

The mailing list archive can be accessed from here.

Our chapter's Meetup.com page is can be accessed here.

Chapter Supporters

We would like to thank the following organizations for their support and contribution to the local Toronto chapter!

Gold Local Chapter Supporter


Hewlett Packard Enterprise


Global Contributing Corporate Member & Silver Local Chapter Supporter


Checkmarx


Global Contributing Corporate Member & Local Event Supporter


Security Compass


Sonatype


Security Innovation


Local Event Supporter


Amazon


Shopify




Date/Time: May 15, 2019, 6:30 PM to 8:30 PM EDT

Location: Room 128 (on the first floor near the library), St. James Campus - Building A, George Brown College, 200 King Street East, Toronto, ON, M5A 3W8

Presentation summary:

Building a CTF: A Student's Perspective

CTFs are fun, educational events that have become a staple in the information security community. But have you ever considered what actually goes on behind the scenes to make one happen?

In this talk Cameron Novina will reflect on his experience organizing the first and second annual Sheridan CTFs. This year, a custom CTF platform was implemented, as well as an even larger selection of challenges; including cryptography, stenography and of course, application security. He will cover the obstacles he and the team overcame while implementing challenges that were designed to be attacked by budding information security professionals, using modern infrastructure and development practices on a tight budget.

This talk is aimed at those who have enjoyed a CTF (or many) in their time, and want to know what goes into organizing these events, both from a technical and event planning perspective.

Presenter bio:

Cameron Novina

Cameron is a Consultant with Deloitte’s Cyber Risk Advisory practice and is currently the Vice President of Sheridan College's Information Security Sessions Club. Cam has helped formulate and execute a variety of information security simulations for organizations in the National Capital Region and previously served as the club's president.

While not at work or school, Cam wrecks n00bs in overwatch (Highest SR: 3440!) and enjoys tabletop games such as D&D as both a player and a Dungeon Master.