Pre-conference
Leadership dinner and social Wednesday, January 21, 2026 (by invitation only)
More information to come.
Conference
10th annual privacy & security conference Thursday, January 22, 2026
7:45am
Registration and breakfast
8:45am – 9am
Opening Remarks (Grand Hall)
9am – 9:10am
Elder’s Blessing and Territorial Acknowledgement (Grand Hall)
9:10am – 9:25am
President Welcome (Grand Hall)
9:25am – 10:10am
Keynote – Micheal Harvey (Grand Hall)
10:10am – 10:40am
Keynote – Hugh Burley (Grand Hall)
10:40am - 11:20am
Gold Sponsor 1 (Grand Hall)
11:20am – 11:40am
Break & Transition (Sponsor Hall)
11:45am - 12:20pm
Breakout Session 1
11:45am - 12:20pm
Breakout Session 1
SCION: A Resilient Internet Architecture for the Insecure World of IoT/OT
Presented by: Dr. Sina Keshvadi (Assistant Professor, Department of Software Engineering, TRU)
Audience: Network Engineers, Security Professionals, and Researchers
Location: Summit Room
The proliferation of IoT devices has exposed deep-rooted vulnerabilities in our current Internet infrastructure. Foundational protocols like BGP, designed for a different era, lack the security guarantees necessary to protect the critical systems they now support. This presentation introduces SCION (Scalability, Control, and Isolation on Next-Generation Networks), a zero-state next-generation Internet architecture built to provide robust security and reliability. In this talk, we will explore how SCION’s path-aware networking fundamentally redefines the Internet’s security model. Unlike today’s hop-by-hop routing, SCION enables end-to-end path control, allowing applications and networks to choose their own data paths. We will demonstrate how this architecture offers built-in immunity to routing attacks like BGP hijacking, strong defenses against DDoS attacks through multi-pathing and hidden paths, and support for verifiable geofencing to ensure data sovereignty and regulatory compliance.
12:30pm - 1:10pm
Lunch (Grand Hall)
1:15pm - 1:55pm
Gold Sponsor 2 (Grand Hall)
2:05pm - 2:40pm
Breakout Session 2
2:05pm - 2:40pm
Breakout Session 2
Securing IT/OT Convergence
Presented by: Sunny Jassal (Chief Security Information Officer, BCIT)
Audience: CISOs, Senior Security Leaders, IT & OT Practioners
Location: Summit Room
Our institutions operate much like mini-municipalities - well-versed in IT (Information Technology) but often lacking visibility into OT (Operational Technology). Cybersecurity is no longer an IT-only challenge; CISOs are increasingly tasked with securing the entire digital landscape, from corporate networks to industrial control systems - essentially, all things connected to the internet. As IT and OT environments become more interconnected, they significantly expand the attack surface for cyber threats targeting critical infrastructure. Traditional perimeter-based security models can no longer provide the necessary protection against sophisticated, targeted attacks. This session will explore the unique risks associated with IT/OT convergence, introduce a Zero Trust security approach tailored for industrial environments, and provide actionable strategies to safeguard converged networks without compromising operational efficiency.
2:50pm – 3:25pm
Breakout Session 3
2:50pm – 3:25pm
Breakout Session 3
Information coming soon.
3:35pm – 4:10pm
Breakout Session 4
3:35pm – 4:10pm
Breakout Session 4
Information coming soon.
4:20pm - 5:00pm
Closing Keynote (Grand Hall) - privacy
5:00pm
Closing Remarks (Grand Hall)
Post-conference
Demonstrations and workshops Friday, January 23, 2026
(*) All attendees wishing to attend must purchase a workshop pass
(**) No pass needed for post-secondary students - free admission
9:30am – 12pm
Stack Attack! DIY Buffer Overflow
Presented by: John Cuzzola (Director of Information Security, TRU)
Location: Mountain Room
Audience: All welcome but highly technical presentation. Those familiar with C programming, and assembly language would benefit the most and/or enrolled in a computer science, software engineering, or related engineering academic program.
Ready to get your geek on? Buffer overflows—one of the most notorious bugs in programming—have been undermining system security for decades. Even with modern hardware and software defenses, they still persist, especially across IoT. In this session, we’ll unpack the anatomy of a buffer overflow step by step: what it is, how to find it, and—best of all—how to craft an exploit to take control of a vulnerable system.
1pm – 3:30pm
Hacking Everyday IoT with Flipper Zero
Presented by: James Duff (BCNET Cybersecurity Analyst)
Location: Mountain Room
Audience: Everyone
This session demonstrates real-world attacks against common IoT devices found in education environments using the Flipper Zero. From smart lighting and door access systems to cameras and more, attendees will see how these devices can be scanned, jammed, cloned, or otherwise exploited. The session includes a live scoring-based audience challenge, a video walkthrough of staged attacks, and hands-on access to tools. Mitigation strategies and monitoring tips will also be discussed.