On Tuesday November 21st I had the opportunity to speak at the first annual BSides at Fredericton NB. BSides is a annual Cybersecurity conference, this particular one was run by Curtis Slade, an employee at Bulletproof aka the company that is doing the virtual Co-op. This event had multiple speakers from many companies, all with the goal of sharing the latest In Cybersecurity. In my case I was sharing educational experiences in cybersecurity.
Because this event was far away from where I live Mr. Kelly and I drove in the night before, and got a hotel. We had some pizza, ran over my presentation once or twice, but the best part of the evening was when we went down to the ballroom that BSides was held in and had the opportunity to meet Curtis Slade and Peter MacPherson. Peter MacPherson is the director of the security operations centre (SOC) at Bulletproof. Meeting him was amazing, he spoke about his different experiences, his hobbies relating to cybersecurity, and some of his tech. Hearing him talk about his experiences really energized me and it was inspiring me to try out some hacking.
The next day was BSides. I went down in the morning before Mr. Kelly, I found this frightening as I didn't know anyone there, I was the youngest person there and I have no real experience in cybersecurity. I had no idea how to talk to the people and I was really under dressed. I showed up wearing a Black T-Shirt and jeans and the room I walked into was full of men in suits and ties. I learned later that the way someone dresses doesn't necessarily represent the role they play in an organization.
After what felt like forever the Opening remarks started, then it was time for the speakers. First up was Rick Roulette, to be honest i don't overly remember what he was talking about, I was pretty nervous as I was scheduled after him. Once he was done I was up, I was pretty nervous. Of the 20 minutes i had available to me I probably only spent ten.
Next up was Peter Morin, and his presentation was about honey pots. Honey pots are essentially fake servers you mix in with your real ones, but they are left vulnerable. They are used to lure a malicious hacker in. They help alert the security team of their presence and will allow the security team to watch to see how they are attacking. This information can then be used to further security in the other servers. It's like having a second house meant for someone to break into so you know there's a bugler, and you can figure out the best way to prevent them from entering your real house.
. After Peter there was a lunch, It was soup and sandwiches, with cakes for dessert, however the bonding with the people there was much more valuable than the food. I got to meet more people in the cybersecurity profession, and grow my knowledge. After lunch they started to pull for prizes, there was Penetration testing tools made by hak5, and a few Raspberry Pi's, and a drone. I think there was more but I wasn't around for when they got drawn. I never actually won anything, but Mr.Kelly did, he won a Bash Bunny (more info here -www.hak5.org/gear/bash-bunny- ). Before I left we also listened to Sylvain Dumas, he spoke about machine learning, but we didn't have time to listen to the last one, and went home instead. It was a great experience, and if you are into cyber security I definitely recommend Bsides.