GeekWeek 7.5

Transforming cyber security

GeekWeek 7.5, from April 26 to May 6, 2022.

This year it is a fully virtual event.

About GeekWeek

GeekWeek is an annual workshop organized by the Canadian Centre for Cyber Security (Cyber Centre) to bring together key players in the field of cyber security to generate solutions to vital problems facing the industry.

GeekWeek offers a unique opportunity for participants to focus time and resources to conduct intensive research and development in the prevention, analysis and mitigation of cyber threats. The event enables representatives from critical incident response teams (CIRTs), critical infrastructure partners (Government, Finance, Health, etc.), academia, and international cyber security partners to collaborate in new ways and improve the overall cyber security landscape.

GeekWeek has been held annually since 2014 and has delivered over 80 projects that have contributed to major innovations in the fields of malware analysis and detection, cyber health, network traffic and log analysis, and many more.

Note that because of the technical nature of the workshop, GeekWeek is an invitation-only event.

History

GeekWeek started when the Canadian Cyber Incident Response Centre (now part of the Cyber Centre) identified a need to foster stronger collaboration within the cyber security community. The solutions-oriented workshop was created to be an environment where participants work together on projects that drive innovation in cyber security.

With very modest aspirations, the first edition captured the attention and interest of both federal and industry organizations with triple the expected number of attendees. Since then, the event has grown from a 3-day workshop to an 8-day event. The 2020 event welcomed more than 200 participants who collectively worked 16,000 hours researching, developing and implementing new and innovative ideas. That’s the equivalent of 8.7 employees working full-time for a year.

Results

GeekWeek has produced innovations and advances in the following areas:

  • Malware detection
  • Spam and log analysis
  • Mobile malware analysis systems
  • Anti-ransomware
  • Tools and techniques to detect cyber threats
  • Information sharing technologies and standards
  • Cyber sovereignty/geographic data flows
  • Cyber health and forecasts
  • Botnet traffic analysis
  • Hardening of IoT devices
  • Industrial control systems assessment
  • Fly-away kit/laptops
  • Enforcement processes
  • Automated malware analysis
 

Why attend GeekWeek?

Participants attending GeekWeek virtually will benefit from:

  • A unique environment of knowledgeable cyber experts to address concerns and challenges within the community
  • Access to advanced tools, and millions of samples of spam emails, malware, and analysis reports
  • Increased awareness of resources and solutions currently available to cyber security professionals
  • Moving forward new ideas, innovative solutions and information sharing.
  • Increased collaboration and information sharing between partners
  • Networking with cyber security community of experts and development of professional relationships
  • Better understanding of challenges faced by peers in the industry

Participating organizations

Leaders

  • Area X.O
  • AWS
  • BinaryEdge
  • CICRL
  • DND (Department of National Defence)
  • Hatching
  • HYAS
  • IndroRobotics
  • Intezer
  • Kelvin Zero
  • Microsoft Azure
  • OpenPhish
  • Queen's School of Computing
  • RMDS
  • Shodan
  • Trellix
  • York University (Toronto)

Participants

  • Arctic Wolf
  • Bombardier
  • CDW
  • CERT-Bund
  • CISA
  • Cisco Secure
  • CSF (Cégep de Sainte-Foy)
  • City of Calgary
  • EY
  • Field Effect
  • Fortinet
  • Government of Alberta
  • KPMG Egyde
  • Kryptos Logic
  • Loblaw
  • Microsoft
  • NCC
  • NYIT
  • Open Analysis
  • PRIMECorpBC
  • SIEMonster
  • Sigma Loyalty Group
  • TELUS
  • The Ottawa Hospital
  • Treasury Board of Canada Secretariat
  • uOttawa
  • SaskTel

Learn more

To learn more about GeekWeek, please contact the Cyber Centre.

Date modified: