Schedule

The organizing committee would like to thank all of our volunteer speakers!
Expand All +
  • Day 1 (Thursday) - Main Track


  • As Canada's geopolitical challenges evolve, so too must our approach to defending our national digital supply chains. This keynote is a call to arms for practitioners and personnel across Canadian cyber to truly put "Canada First".

  • In this presentation, François Guay, CEO and Founder of the Canadian Cybersecurity Network (CCN), will share why cybersecurity communities are entering a new era where AI is reshaping how we connect, learn, and grow. He will outline CCN’s vision to move beyond networking — building a dynamic community where members and companies accelerate knowledge, forge trusted partnerships, and unlock opportunities faster than ever before. And just beneath the surface, he will hint at a bold next step that could redefine what a cybersecurity community can achieve.

  • For years, we tested forms. Then we tested APIs. Now we're testing the brains inside your apps. In this fast-paced, practical talk, we'll walk through the emerging art of hacking AI chatbots from the perspective of a penetration tester. You'll see how prompt injection works (and the many forms it can take), why indirect manipulation is especially dangerous, and what developers get wrong when embedding AI assistants into apps, especially when those assistants act as logic engines, personal coaches, or API middlemen. We'll break down the anatomy of a typical chatbot-powered feature, explore real-world examples, and walk step-by-step through how to bypass filters, extract sensitive data, and hijack intent. As automated tools and AI begin to catch traditional bugs, this emerging attack surface demands a new skillset. We'll see how chatbot security isn't just about filtering obvious words, it's about detecting intent, even when that intent is buried or disguised. If you're testing modern apps and ignoring the chatbot, you're leaving the brain unguarded.

  • The rapid evolution of software engineering has transformed Application Security (AppSec) into a constantly shifting battlefield. Traditional security approaches are no longer enough—modern pipelines demand a strategic, multi-layered defense. In this talk, we'll explore how AppSec practitioners must adapt to stay ahead of emerging threats. I'll introduce the three essential disciplines of AppSec: Security In the Pipeline (SIP): Protecting the code, dependencies, and infrastructure as they move through the development lifecycle. Security Of the Pipeline (SOP): Securing the CI/CD tooling, environments, and processes to prevent supply chain compromises. Security Around the Pipeline (SAP): Addressing external threats, insider risks, and adversarial attacks targeting the entire ecosystem. Drawing from real-world adversarial security research, I'll highlight the biggest challenges in each domain and present practical mitigation techniques that security, DevOps, and engineering teams can apply immediately. Attendees will gain insights into common attack vectors, best practices for securing CI/CD workflows, and emerging trends shaping the future of AppSec. By the end of this session, you'll walk away with a holistic security framework that ensures your pipelines remain secure, resilient, and future-proof. Whether you're an AppSec engineer, security beginner, or interested in DevSecOps practitioner, this talk will provide actionable strategies to help you navigate the ever-evolving AppSec landscape. Don't just secure your code—secure your entire pipeline!

  • What happens when a late-night napkin sketch turns into a mobile app that must pass TSA checkpoints and government audits? This is the real-world story of how we partnered with an ambitious state government to transform the physical driver's license into a Digital ID — a mobile identity platform trusted by police, retailers, and airport security. Built from the ground up, the app enables users to prove identity, purchase age-restricted items, and even board flights — all from their phone. But this wasn't just an app launch. It was a high-stakes journey where security was the product — and there was no playbook to follow. In this 45-minute talk, we'll walk through the technical and organizational gauntlet we faced, and share real artifacts, patterns, and missteps from taking a net-new product through: - SOC2 certification (including the app, cloud stack, and even manufacturing plants), - biometric verification challenges, - evolving privacy regulations, - and eventual TSA acceptance. Updated in this version of the talk: We'll highlight lessons learned post-launch — what worked, what didn't, and how real-world usage patterns forced critical design changes. We'll explore how some well-meaning security decisions, like one-time tokens or strict expiration windows, backfired by confusing users or blocking adoption — and how we course-corrected under pressure. You'll walk away with: - A reusable blueprint for building certification-ready products from scratch. - A DevSecOps pipeline pattern that enforces security, triages defects, and feeds directly back to developer queues. - A proven threat modeling approach that builds cross-team trust fast. - Tactics for executive risk scoring that move audits and legislation forward. - Lessons from breaking (and fixing) facial recognition, blockchain-based claims, and 3rd-party identity verifiers. - How to detect and resolve security features that hurt usability or adoption, including warning signs from live telemetry, user support channels, and conflicting 3rd-party expectations. We'll unpack key stories: - How digital identity actually works — and how to test what can go wrong. - Where real-world standards failed us — and how we adapted. - The surprising ways 3rd-party assurance almost derailed launch. - What happens when a production endpoint is stolen and taken to a dark alley. - Getting TSA sign-off (and how our users helped us get there). If you've ever been told "make it secure and ship it fast" with no roadmap and public scrutiny looming — this talk is your playbook

  • Cyber defenders wage daily battles against increasingly sophisticated threat actors. In many cases the tools defenders use remain unchanged for decades. If defenders are to gain the upper hand, we need to take new approaches and evolve the rules. After all, those who write the rules, win (leges qui scribit, imperat). Join John Weigelt, CTO Microsoft Canada, as he provides a backdrop of the controls and rules that guide cyber, discusses the gaps and explores opportunities for change.

  • Laptops have become ubiquitous in modern times. An all but guaranteed organizational asset that quite literally holds keys to the kingdom, in every employee's hands. For an attacker, what's not to love? From large government organizations to fortune 500 companies, these assets are constantly on the move and often poorly secured against advanced threat actors seeking to extract their secrets. Encryption at rest is NOT enough in 2025! And I can show you why. This talk will showcase methodologies used by our offensive security team to penetrate well-hardened, modern laptops during engagements we call "stolen laptop scenarios". No power? No credentials? No problem! We push the envelope to the limit of what can be realistically expected of next-generation adversaries. We begin by exploring the potential impact that a compromised laptop can have on an organization, briefly discussing potential lateral movement through extracted domain credentials, tickets, certificates, cookies, and sensitive data. After exposing the audience to the value obtained through physical compromise, we will discuss real attack vectors, with examples and video demos. We will explore together direct-memory access attacks, the physical and logical implementations of these techniques, defenses, bypasses, and more. On the menu is an overview of PCI Express technology, DMA hardware including FPGA boards and what we do with them, practical demonstrations of attacks against modern laptops, countermeasures introduced by hardware vendors to protect against these attacks, and ways that attackers circumvent these protection mechanisms. Naturally, we will discuss BIOS/UEFI security, how it relates to DMA, and how we exploit pre-boot environments to gain access to a stolen computer. This includes showcasing physical attacks against BIOS EEPROM chips using a universal programmer. Finally, we will talk about encryption at rest, specifically BitLocker, TPM implementation, and the potential implications of using these technologies for attackers, with a focus on why these are not sufficient for preventing attackers with physical access from compromising a PC. This section will culminate with an exploit demonstration compromising windows OS from UEFI via DMA when all modern countermeasures are enabled. Of course, we will discuss proper configuration that can limit or eliminate these attack vectors as well! We will discuss open-source tooling such as PCILeech, MemProcFS, UEFITool, etc, and some closed source tooling including XGPro.

  • This panel features senior cybersecurity leaders and covers real security issues and priorities facing both private and public sector organizations. Topics covered will range from Quantum to compliance to AI with an emphasis on what's needed to make implementations successful.

  • Day 2 (Friday) - Main Track


  • While events like FIFA and the Olympics bring together our global community in a celebration of sport and national pride, they also attract threat actors who target every aspect of the games. FIFA 2026 will be the first games to host forty-eight national teams across three countries and have the additional challenge of defending against an unprecedented hybrid landscape. This session will explore layered security considerations and how to coordinate our efforts to combat evolving threats.

  • Feeling overwhelmed by alerts? Ever want to "hack back" the Hackers, but don't want to break laws? Well here's a revolutionary new strategy that will get you going! Defend by deceiving, and overwhelm anyone persistent enough to keep looking. Based on nearly a decade of R&D and fieldwork, we are ready to premier a revolutionary new strategy for network defence. This talk will take a few moments to understand the current state of affairs, how it came to be, and turn it all upside down. We will discuss increasing your security posture by overwhelming your adversaries with everything they think they want and more. Join us, while we present a revolutionary new network defence strategy that will leave your adversaries confused, overwhelmed, and unmotivated to come back for more. What had started as a funny joke-turned-side-project, has taken on a whole new meaning when the long-term results were analyzed. Surprising results lead to deeper research and more in-depth analysis on strategies of both the Blue and Read Team perspectives. Exploratory Purple Team research at it's finest! If you're looking for something unique, something that laughs at the idea of existing within a box, then this is it. Presented with the beginners in mind, but an enticing enough of an idea that even long-time veterans will be interested. Sprinkled with just enough memes and shenanigans, this is a presentation sure to keep a wide audience on the edge of their seats with intrigue. "All warfare is based on deception." -Sun Tzu

  • Spotlight Panel: “Resilience Through Community” Presented by Women in Defence and Security (WiDS) In cybersecurity, resilience depends on connection and on the strength of our communities to share knowledge, support one another, and adapt together. Join us on for this special WiDS-produced Spotlight Panel at BSides Ottawa 2025, bringing together leaders from across Canada’s defence and security ecosystem to explore how collaboration, mentorship, and diverse voices strengthen resilience across our industry. Expect real stories, practical insights, and candid conversation about how strong networks, allyship, and inclusive leadership help individuals and organizations adapt, recover, and thrive in the face of today’s complex challenges. Moderator: Amy Yee, Chief Digital Transformation Officer, C3SA Cyber Security & Audit Panelists: Kelly Bradshaw, Senior Manager, Policing and Public Safety, @Accenture and VP, Industry Relations, WiDS Executive Committee Amélie Degagné, Team Lead, Enterprise Security Monitoring, Shared Services Canada Ulrike Bahr-Gedalia, Strategic, Global Technology, Business & Public Policy Executive Dan Doran, Vice President, Business Development & Marketing, @ADGA Group With opening comments provided by: Erika Coghill, Director, Marketing & Communications, ADGA Group and VP, Community Relations, WiDS Executive Committee

  • The presentation examines how different OS architectures, particularly Linux and BSD, shape the techniques used in binary exploitation. It begins by highlighting the foundational systems and standards—System V, POSIX, BSD, UNIX, and Linux—that influence an OS's behavior and security mechanisms like memory management, calling conventions, and stack management. Key topics include the System V application binary interface (ABI), which governs function calls and stack management, and POSIX standards, which ensure cross-platform exploit portability. The presentation explores UNIX philosophy's emphasis on simplicity and modularity, showing how patterns can help us think about vulnerabilities. The section about BSD's influence focuses on advanced memory management techniques that impact exploit strategies. The presentation also covers OS security features (e.g., ASLR, Write XOR Execute (W^X), and stack canaries), and how to bypass them. It delves into exploiting system calls for privilege escalation, using a case study surrounding Shellshock (CVE-2014-6271) and how it relates to recent memory corruption issues. A comparison of SysV and BSD mechanics shows differences in calling conventions, stack management, and system calls—all of which affect exploit development. In conclusion, the presentation displays why an OS's architecture can make or break successful binary exploitation, even if techniques themselves are theoretically viable.

  • For everyone who’s idly thought about hanging out their own shingle as a “lone wolf cybersecurity consultant” or getting together with a few friends to start a startup to be your own boss, this is a session for you. In addition to founding eSentire, a Canadian Managed Detection and Response (MDR) company that achieved a unicorn valuation in 2022, Eldon Sprickerhoff has mentored dozens of cybersecurity startups through the Rogers Cybersecurity Catalyst programs over the last five years and released a book titled “Committed: Startup Survival Tips and Uncommon Sense for First-Time Tech Founders” that achieved bestseller status in two formats on Amazon in October 2024 (Hardcover #1, Kindle #3) in the “Starting a Business” category. He'll walk through the realities of starting a cybersecurity company in 2025: the pros and cons, what it takes to differentiate yourself, what mistakes are commonly made, and how to improve your odds of survival in an increasingly chaotic world.

  • Breaking into cybersecurity can feel overwhelming. Threats and technologies are constantly evolving, so it's easy to feel like you're always behind. However, we don't have to navigate this journey alone. This talk explores how AI can be a powerful, accessible tool for learning cybersecurity, helping newcomers get hands-on experience and enabling others to accelerate their growth and stay current in a fast-moving industry. Drawing from our diverse backgrounds, we'll share how AI supported our growth and how it can help others do the same. Whether you're new to the field, expanding your skillset, or mentoring others, this talk will give you actionable ways to integrate AI into your cybersecurity journey.

  • As a former member of the Canadian Forces, I learned how to define security by conducting aggressive security testing. Transitioning these skills to cybersecurity testing of the corporate world has identified consistent mistakes - on the part of the target networks, and by the red team itself. Using real world "war stories", the talk will review the set-up and operation of red team tests against Canadian-specific targets. What works in setting up a successful team? How do you manage test up-front with the target organization? Most importantly, what are the mistakes we have seen over and over in the past? (And it's not just a lack of patching!). And when it comes to the testers, are they making mistakes that contribute to poor or ineffective testing? The goal of the talk is to understand how to effectively test a network's security and make the most of this type of testing. There has been a reluctance to do red team testing in Canadian networks, but now it's time to move beyond "scans and pokes", and treat a network the way the hackers do!