BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:US/Pacific
BEGIN:DAYLIGHT
DTSTART:20240310T030000
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:PDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20241103T010000
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:PST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20240809T045208Z
UID:15F7F6BB-F85D-4C71-A60F-8A7B2DF1649A
DTSTART;TZID=US/Pacific:20240807T090000
DTEND;TZID=US/Pacific:20240807T170000
DESCRIPTION:Abstract:\n\nWith the ever-increasing rate of cyber-attacks and
  data breaches\, it has become essential for everyone to be aware of at le
 ast the basics of cybersecurity to safeguard themselves from harm. With th
 is workshop\, we aim to equip people with knowledge of techniques used by 
 attackers and ways to defend against them\, along with best practices for 
 working with sensitive data. The workshop will include sessions by industr
 y experts and demonstrations for practical applications of cybersecurity c
 oncepts and tools. Students will demonstrate cybersecurity-related topics 
 (TBA).\n\nOur invited speakers and demonstrations will cover the following
  topics:\n\n- Best practices for safeguarding against cyber attacks\n- Imp
 ortance of good policies for cyber security at organizations\n- Online Pri
 vacy\n- Data encryption and decryption techniques\n- Data anonymization an
 d deanonymization for researchers\n- Impact of cyber-criminal organization
 s on businesses and governments\n- Penetration testing for vulnerability m
 itigation\n\nCo-sponsored by: IEEE Okanagan College Student Branch and Oka
 nagan College\n\nSpeaker(s): Sergii Baibara Director of IBA Regional Offic
 e\, part of IBA Group\, Ajitesh Parihar\, Troy\n\nAgenda: \nThe Workshop A
 genda:\n\n- Welcome and Opening Remarks (9:00 am – 9:15 am)\n- David Bir
 ch\, IT Services/Security Manager\, Okanagan College: General Security Iss
 ues and How That Relates to Research Problems (9:15 am – 10:00 am)\n- Co
 ffee Break (10:00 am – 10:15 am)\n- An Invited Speaker from Industry —
  IBA Group: Security Testing: The Cost of Inaction\n(10:15 am – 11:00 am
 )\n\n- CIA triad and its essential components: confidentiality\, integrity
 \, and availability\n- All types of Security Testing\, namely penetration 
 testing\, vulnerability assessment\, compliance testing\, code review\, ri
 sk assessment\, and social engineering\n- Different Security Testing metho
 ds\, including black box\, white box\, and gray box\n- OWASP Top 10 and ho
 w these vulnerabilities can be identified and remediated\n- Flow of Securi
 ty Testing: from onboarding and scoping the project to reporting and analy
 zing test results and providing further support.\n- We’ll also analyze r
 eal-life incidents in software development involving famous big brands\, d
 iscussing the cost of these cases and the lessons learned from them.\n\n- 
 Coffee Break (11:00 am – 11:15 am)\n- Demonstration from Industry (IBA G
 roup): Implementation of best practices to prevent vulnerabilities in prod
 uction (11:15 pm – 12:30 pm)\n- Data leaks and reputational losses worth
  millions of dollars\n- Unexpected fines and compensation as a result of i
 dentified security vulnerabilities\n- Closing of a service/product/busines
 s\n- Loss of customers and their trust\n\n- Lunch Break (12:30 pm – 1:15
  pm – on your own)\n- An Invited Speaker from Academia. Troy Berg (ICT\,
  OC): Human Issues in Cybersecurity: Challenging Faulty Assumptions and Co
 gnitive Biases (1:15 am – 2:15 pm)\n- Coffee break (2:15 pm – 2:35 pm)
 \n- Ajitesh Parihar: AWS Academy Platform for education and DRI for resear
 ch requirements (2:35 pm – 3:00 pm)\n- Kristina Cormier &amp; Ajitesh Pariha
 r: Platform security practices demonstrated through Oracle Cloud (3:00 pm 
 – 3:25 pm)\n- Ajitesh Parihar: Data breach exploration and password crac
 king (3:25 pm – 4:00 pm)\n- Round Table (4:15 pm – 5 pm)\n\nRoom: 101\
 , Bldg: HS\, 1000 K.L.O. Rd.\, Kelowna\, British Columbia\, Canada\, V1Y 4
 X8\, Virtual: https://events.vtools.ieee.org/m/424539
LOCATION:Room: 101\, Bldg: HS\, 1000 K.L.O. Rd.\, Kelowna\, British Columbi
 a\, Canada\, V1Y 4X8\, Virtual: https://events.vtools.ieee.org/m/424539
ORGANIZER:youry@ieee.org
SEQUENCE:20
SUMMARY:Cybersecurity Workshop at Okanagan College
URL;VALUE=URI:https://events.vtools.ieee.org/m/424539
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;&lt;strong&gt;&lt;span data-preserver-spaces=&quot;true&quot;
 &gt;Abstract:&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;\n&lt;p&gt;With the ever-increasing rate of cyber-
 attacks and data breaches\, it has become essential for everyone to be awa
 re of at least the basics of cybersecurity to safeguard themselves from ha
 rm. With this workshop\, we aim to equip people with knowledge of techniqu
 es used by attackers and ways to defend against them\, along with best pra
 ctices for working with sensitive data. The workshop will include sessions
  by industry experts and demonstrations for practical applications of cybe
 rsecurity concepts and tools. Students will demonstrate cybersecurity-rela
 ted topics (TBA).&amp;nbsp\;&amp;nbsp\;&lt;/p&gt;\n&lt;p&gt;Our invited speakers and demonstra
 tions will cover the following topics:&amp;nbsp\;&lt;/p&gt;\n&lt;ul&gt;\n&lt;li&gt;Best practice
 s for safeguarding against cyber attacks&amp;nbsp\;&lt;/li&gt;\n&lt;li&gt;Importance of go
 od policies for cyber security at organizations&amp;nbsp\;&lt;/li&gt;\n&lt;li&gt;Online Pr
 ivacy&amp;nbsp\;&lt;/li&gt;\n&lt;li&gt;Data encryption and decryption techniques&amp;nbsp\;&lt;/l
 i&gt;\n&lt;li&gt;Data anonymization and deanonymization for researchers&amp;nbsp\;&lt;/li&gt;
 \n&lt;li&gt;Impact of cyber-criminal organizations on businesses and governments
 &amp;nbsp\;&lt;/li&gt;\n&lt;li&gt;Penetration testing for vulnerability mitigation&lt;/li&gt;\n&lt;
 /ul&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;Agenda: &lt;br /&gt;&lt;p&gt;&lt;strong&gt;The Workshop Agen
 da:&lt;/strong&gt;&lt;/p&gt;\n&lt;ol&gt;\n&lt;li&gt;Welcome and Opening Remarks (9:00 am &amp;ndash\; 
 9:15 am)&lt;/li&gt;\n&lt;li&gt;David Birch\, IT Services/Security Manager\, Okanagan C
 ollege: General Security Issues and How That Relates to Research Problems 
 (9:15 am &amp;ndash\; 10:00 am)&lt;/li&gt;\n&lt;li&gt;Coffee Break (10:00 am &amp;ndash\; 10:1
 5 am)&lt;/li&gt;\n&lt;li&gt;An Invited Speaker from Industry &amp;mdash\; IBA Group: Secur
 ity Testing: The Cost of Inaction&lt;br&gt;(10:15 am &amp;ndash\; 11:00 am)\n&lt;p&gt;&amp;nbs
 p\;&lt;/p&gt;\n&lt;ol&gt;\n&lt;li&gt;CIA triad and its essential components: confidentiality
 \, integrity\, and availability&lt;/li&gt;\n&lt;li&gt;All types of Security Testing\, 
 namely penetration testing\, vulnerability assessment\, compliance testing
 \, code review\, risk assessment\, and social engineering&lt;/li&gt;\n&lt;li&gt;Differ
 ent Security Testing methods\, including black box\, white box\, and gray 
 box&lt;/li&gt;\n&lt;li&gt;OWASP Top 10 and how these vulnerabilities can be identified
  and remediated&lt;/li&gt;\n&lt;li&gt;Flow of Security Testing: from onboarding and sc
 oping the project to reporting and analyzing test results and providing fu
 rther support.&lt;/li&gt;\n&lt;li&gt;We&amp;rsquo\;ll also analyze real-life incidents in 
 software development involving famous big brands\, discussing the cost of 
 these cases and the lessons learned from them.&lt;/li&gt;\n&lt;/ol&gt;\n&lt;/li&gt;\n&lt;li&gt;Cof
 fee Break (11:00 am &amp;ndash\; 11:15 am)&lt;/li&gt;\n&lt;li&gt;Demonstration from Indust
 ry (IBA Group): Implementation of best practices to prevent vulnerabilitie
 s in production (11:15 pm &amp;ndash\; 12:30 pm)\n&lt;ol&gt;\n&lt;li&gt;Data leaks and rep
 utational losses worth millions of dollars&lt;/li&gt;\n&lt;li&gt;Unexpected fines and 
 compensation as a result of identified security vulnerabilities&lt;/li&gt;\n&lt;li&gt;
 Closing of a service/product/business&lt;/li&gt;\n&lt;li&gt;Loss of customers and thei
 r trust&lt;/li&gt;\n&lt;/ol&gt;\n&lt;/li&gt;\n&lt;li&gt;Lunch Break (12:30 pm &amp;ndash\; 1:15 pm &amp;nd
 ash\; on your own)&lt;/li&gt;\n&lt;li&gt;An Invited Speaker from Academia. Troy Berg (
 ICT\, OC): Human Issues in Cybersecurity: Challenging Faulty Assumptions a
 nd Cognitive Biases (1:15 am &amp;ndash\; 2:15 pm)&lt;/li&gt;\n&lt;li&gt;Coffee break (2:1
 5 pm &amp;ndash\; 2:35 pm)&lt;/li&gt;\n&lt;li&gt;Ajitesh Parihar: AWS Academy Platform for
  education and DRI for research requirements (2:35 pm &amp;ndash\; 3:00 pm)&lt;/l
 i&gt;\n&lt;li&gt;Kristina Cormier &amp;amp\; Ajitesh Parihar: Platform security practic
 es demonstrated through Oracle Cloud (3:00 pm &amp;ndash\; 3:25 pm)&lt;/li&gt;\n&lt;li&gt;
 Ajitesh Parihar: Data breach exploration and password cracking (3:25 pm &amp;n
 dash\; 4:00 pm)&lt;/li&gt;\n&lt;li&gt;Round Table (4:15 pm &amp;ndash\; 5 pm)&lt;/li&gt;\n&lt;/ol&gt;
END:VEVENT
END:VCALENDAR

