As a Security Technical Specialist, Eric Ivankovich helps enterprise organizations understand and respond to the modern threat landscape with up-to-date security and compliance solutions. The Canadian subject matter expert in Business Email Compromise, Eric leverages his 20 years of messaging experience to help customers understand how to protect themselves against the most leverage attack vector. He has been Microsoft certified since 1999, holds 9 active certifications, and has achieved the prestigious Microsoft Certified Masters in Messaging.
Email Security 101
An overview of the technologies that prevent a threat actor from reaching your inbox.
Calling all current Canadian post-secondary students!
ISSessions is proud to announce our annual CTF this year will take place on March 5th to March 6th! In addition, we have sponsor workshops running from February 28th to March 4th, which include these sponsors: Lares Consulting, Bell, Deloitte, KPMG, Mandiant, Trend Micro, and Sinn Development!
Why should I attend?
CTFs are a great way to practice your technical skills, look fantastic on resumes and on top of that, you get a chance to take a bite out of our massive $3000+ PRIZE POOL! Additionally, this CTF features from people at all skill levels, so it’s a great opportunity to network and hone your hacking skills!
How does it work?
If you’re a Canadian post-secondary student, you can register over at https://ctf.issessions.ca/ ! Teams can comprise of up to 4 people, and there is no limit on the number of teams a school can send. Additionally, the event will be running in the CTF discord server as well, which you can join over at https://discord.gg/uRKTptegps. Make sure to use your student email! If your institution’s email is not on our whitelist, let us know and we’ll add it ASAP!
Hope to see you there! If you have any questions, feel free to ask me or any of the other ISSessions admins.
Jake Munro graduated from Fleming College’s Computer Security & Investigations course in April of 2021. He is now currently a cyber security mentor & technical recruiter for Lighthouse Labs. Jake loves helping others learn about the cyber security world and the many aspects to it, which lead him to Lighthouse Labs. It also lead him to helping with the CSI club in any way possible. Jake also loves participating in CTF challenges alone, or with groups of people. Outside of work, you can find him on Spotify, gaming or breaking his computers.
Exploitation of WebApp Flaws
Web application flaws have been around for many years, mostly due to developers not ‘sanitizing’ input forms or design flaws. They can be used to gain access to a website or server which can lead to information leaks. There are so many web application flaws that a lot of companies seem to only protect against the most commonly used ones. Cross site scripting, SQL injection and broken access control are some of the attacks used widely in today’s world. In this week’s ISSessions meeting we learn more about how some of these attacks work and see a live demo of a few of these attacks.