Event Calender

WiCyS Windsor 2019-2020 Schedule

**** All workshops and event are subjected to change as per our Cyber Lancers recommendation and interest ****

Winter 2020 (tentative)


3 Workshops

3 Cybersecurity Talks

3 Learning Series

**** For Event Timings and Location click on the registration button ****

Date(s)EventDescriptionNo. of AttendeesFeedback
January 17thCyber Security InfoSec Cybersecurity in 2020?
February 1stCybersecurity Talk“Cybersecurity: Then and Now”

with Sarbjeet Johal, Principal Advisor,

The Batchery,
San Francisco Bay Area
February 8thWorkshopPython in Cybersecurity
February 28thLearning Series“Data Security” with Dr. Saeed Samet
March 6, 7Workshop“Cybersecurity VR Exploration and Ethical Hacking”

with Mahdi Raza,
Ice-VR
March 21st Cyberpreneurship
Workshop
“Cyberpreneurship: Building your Billion $$$ Cybersecurity Startup”

with AJ Khan,
Cybersecurity Innovation Leader,
Toronto, Canada
March 28thCybersecurity InfoSecCyber collaboration with WinHacks

Keynotes and Workshops Individual Biography

Fall 2019

3 Social Gatherings

4 Cybersecurity Breakfast Talks

2 Learning Series

Date(s)EventDescriptionNo. of Attendees
September 6th Fun/Social GatheringDiscussion (Social, Cyber Bingo)
(CS Commons/Java Lounge – 2 PM to 4 PM)
33
September 14thLearning SeriesHow to Start a Career in Cybersecurity by Dr. Sherif Saad
(Erie Hall 3123 – 10 AM to 11:30 AM)
55
September 20thFun/Social GatheringMovie Night
(CS Commons/Java Lounge – 5 PM to 7:30 PM)
50
September 27thCybersecurity Breakfast TalkElaheh Samani, Senior Security Researcher at Symantec
(Workshop Room in Joyce Entrepreneurship Center – 10 AM to 11:30 AM)
34
October 4thLearning SeriesInternet Privacy 101 by Ikjot Saini, PhD Candidate
(Erie Hall 3123 – 4 PM to 5 PM)
23
October 11thCybersecurity Breakfast TalkMasarah Paquet-Clouston, security researcher at GoSecure
(Essex Hall 122 – 10:30 AM to 12 PM)
40
October 18thCybersecurity Breakfast TalkMert D. Pesé, Intern at Harman International
(Essex Hall 122 – 10:30 AM to 12 PM)
16
November 22nd Cybersecurity Breakfast Talk Andrea Stapley, Assistant VP of the Globally Security Operations, Sun Life Financial
(Essex Hall 122 – 1:30 AM to 12 PM)
20
December 19th Fun/Social Gathering Movie Night 10

Date: Sep 27, Friday, 2019
Title: OAUTH2 for mobile apps, what could go wrong? 
Abstract: OAuth is a popular authorization schema used by many iOS and Android apps to delegate user authentication and authorization to a known third-party entity such as Google, Facebook or LinkedIn. When users grant an app to access their Gmail account or GDrive, they normally only expect limited access. But there are several functionalities one can do with the access even when the user is not using the app, which often comes as a surprise to the user. It is mostly because users are not aware of the amount of data that an application can access while they are offline, as well as the consequences of sharing that data with the application. Depending on the requested permissions and access type, an app can essentially keep the user authenticated forever and access their protected resources such as Gmail, Gdrive, or Calendar. With no built-in security in OAuth, it is mostly the app developer’s responsibility to prevent unauthorized access or authorization misuse by adding state-based parameters to requests, validating access tokens before making API calls, revoking access tokens, etc.

Fun Activities/Social Gathering

Debate Competition
Essay Competition
Pictionary
Movie Night
Discussion (academic/casual)

Learning Series

Password Security
Malware/Ransomware/Spyware
Data: Breaches, Security, privacy and control
Scams: online, emails, and etc.
Mobile: protection, privacy, and security
Online Security: Identity thefts, and social media