Month: October 2010

If only such a magical word existed….

xkcd

Dark Reading Post: Dragging Physical Security Monitoring into 2010

drCheck out my latest blog post on Dark Reading’s Security Monitoring Tech Center entitled ““:

It is fairly common to see router, firewall and intrusion-detection system logs in addition to server, workstation and application logs consolidated within an enterprise security information management (ESIM) system. Logs generated from network-based devices are generally responsible for the bulk of logs monitored by an ESIM, with the remainder consisting of logs from the various endpoints and software deployed throughout the infrastructure. Perhaps one of the most overlooked sources of data to monitor, however, is that of the physical security controls deployed within an enterprise organization.

Read the full blog entry here: http://www.darkreading.com/security_monitoring/blog/archives/2010/10/dragging_physic.html

BSidesOttawa Schedule Confirmed!

B-Sides Ottawa is fast approaching and today we can share the schedule of superb talks that cover a broad spectrum of Information Security subjects. We had an amazing set of talk submissions from speakers, both local and from around North America. Narowing the over 25 talks to fit the two day event was no easy task!

If you are interested in attending B-Sides Ottawa, the event is filling up fast, so please register (it's free!) by visiting the official site.

We are still looking for sponsors to support the event, if you know someone who may be interested, please have them contact bsidesottawa@gmail.com.

Day 1 – Friday, November 12th

9:00am – 9:20am Day 1 Opening Remarks
9:30am – 10:20amMy Life on the Information Security D-List – Andrew Hay, Senior Analyst, The 451 Group, @andrewsmhay
10:30am – 11:20amUsing ISO 27005 for Risk Assessment – Benoît H. Dicaire, InfoSec Strategist, INFRAX, @BDicaire
11:30am – 12:20pmVendor Sponsored Lunch
12:30pm – 1:20pmMyths, Mistakes and Outright Lies (when it comes to your computer security) – Kellman Meghu, Security Engineering Manager Check Point Canada @kellman
1:30pm – 2:20pmSo I've adopted an EMR; What's the worst that can happen? – Peter Hillier, CISO MD Physician Services Inc. (A CMA Company), @DeathwishDuck
2:30pm – 2:50pmBreak 
3:00pm – 3:50pmThe Evolving Authentication Landscape – Eric Skinner, CTO, Entrust @EricSkinner
4:00pm – 4:50pmInfoSec Speed Debates – Jack Daniel and panelists TBD
5:00pm onwardsVendor Sponsored Dinner, drinks, and shenanigans

Day 2 – Saturday, November 13th

8:00am – 8:50amVendor Sponsored Breakfast
9:00am – 9:20am Day 2 Opening Remarks 
9:30am – 10:20amA new approach to preventing injection attacks on the Web Application Stack – Ahmed Masud CEO/ CTO Trustifier Inc.
10:30am – 11:20amFuzzing Cows – Karim Nathoo & Mike Sues
11:30am – 12:20pmVendor Sponsored Lunch
12:30pm – 1:20pmInto the Rabbithole Evolved Web Application Security Testing – Rafal Los @rafallos
1:30pm – 2:20pmThe Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform – Ben Tomhave @falconsview
2:30pm – 2:50pmBreak 
3:00pm – 3:50pmCERTs or CIRTs in Canada – Adrien de Beaupré, EWA-Canada, isc.sans.edu
4:00pm – 4:50pmThe Nmap Scripting Engine: Making Nmap work for you! – Ron Bowes @iagox86
4:50pm – 5:00PMClosing Remarks – Andrew Hay & Justin Foster
5:00pm onwardsDinner and drinks downtown

More information here.

Scroll to top