{"id":57639,"date":"2019-06-20T11:24:34","date_gmt":"2019-06-20T15:24:34","guid":{"rendered":"https:\/\/newsroom.carleton.ca\/?post_type=cu_story&#038;p=57639"},"modified":"2025-09-30T11:40:04","modified_gmt":"2025-09-30T15:40:04","slug":"ihack-attracts-hacking-talent","status":"publish","type":"cu_story","link":"https:\/\/carleton.ca\/news\/story\/ihack-attracts-hacking-talent\/","title":{"rendered":"Carleton Hosts iHack and Attracts Local Computing Hacking Talent"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-max  md:space-y-10 cu-prose-first-last\">\n\n        \n                    \n                    \n            \n    <div class=\"cu-wideimage relative flex items-center justify-center mx-auto px-8 overflow-hidden md:px-16 rounded-xl not-prose  my-6 md:my-12 first:mt-0 bg-opacity-50 bg-cover bg-cu-black-50 pt-24 pb-32 md:pt-28 md:pb-44 lg:pt-36 lg:pb-60 xl:pt-48 xl:pb-72\" style=\"background-image: url(https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-banner1-1200x900.jpg); background-position: 50% 50%;\">\n\n                    <div class=\"absolute top-0 w-full h-screen\" style=\"background-color:rgba(0,0,0,0.600);\"><\/div>\n        \n        <div class=\"relative z-[2] max-w-4xl w-full flex flex-col items-center gap-2 cu-wideimage-image cu-zero-first-last\">\n            <header class=\"mx-auto mb-6 text-center text-white cu-pageheader cu-component-updated cu-pageheader--center md:mb-12\">\n\n                                    <h1 class=\"cu-prose-first-last font-semibold mb-2 text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] cu-pageheader--center text-center mx-auto after:left-px\">\n                        Carleton Hosts iHack and Attracts Local Computing Hacking Talent\n                    <\/h1>\n                \n                            <\/header>\n        <\/div>\n\n                    <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"absolute bottom-0 w-full z-[1]\" fill=\"none\" viewbox=\"0 0 1280 312\">\n                <path fill=\"#fff\" d=\"M26.412 315.608c-.602-.268-6.655-2.412-13.524-4.769a1943.84 1943.84 0 0 1-14.682-5.144l-2.276-.858v-5.358c0-4.876.086-5.358.773-5.09 1.674.643 21.38 5.84 34.646 9.109 14.682 3.59 28.935 6.858 45.936 10.449l9.874 2.089H57.322c-16.4 0-30.31-.16-30.91-.428ZM460.019 315.233c42.974-10.074 75.602-19.88 132.443-39.867 76.16-26.791 152.063-57.709 222.385-90.663 16.7-7.823 21.336-10.074 44.262-21.273 85.004-41.688 134.719-64.193 195.291-88.413 66.55-26.577 145.2-53.584 194.27-66.765C1258.5 5.626 1281.34 0 1282.24 0c.17 0 .34 27.596.34 61.3v61.299l-2.23.375c-84.7 13.718-165.93 35.955-310.736 84.931-46.494 15.753-65.427 22.076-96.166 32.15-9.102 3-24.814 8.198-34.989 11.574-107.543 35.954-153.008 50.422-196.626 62.639l-6.74 1.876-89.126-.054c-78.135-.054-88.782-.161-85.948-.857ZM729.628 312.875c33.229-10.985 69.248-23.523 127.506-44.207 118.705-42.223 164.596-57.709 217.446-73.302 2.62-.75 8.29-2.465 12.67-3.751 56.19-16.772 126.94-33.597 184.17-43.671 5.07-.91 9.66-1.768 10.22-1.875l.94-.161v170.236l-281.28-.054H719.968l9.66-3.215ZM246.864 313.411c-65.041-2.251-143.047-12.11-208.432-26.256-18.375-3.965-41.73-9.538-42.202-10.074-.171-.214-.257-21.38-.214-47.046l.129-46.618 6.654 3.697c57.313 32.043 118.491 56.531 197.699 79.143 40.313 11.521 83.459 18.058 138.669 21.059 15.584.857 65.685.857 81.14 0 33.744-1.876 61.306-4.93 88.396-9.806 6.396-1.126 11.634-1.983 11.722-1.929.255.375-20.48 7.769-30.999 11.038-28.592 8.948-59.288 15.646-91.873 20.147-26.36 3.59-50.015 5.627-78.35 6.698-15.584.59-55.209.59-72.339-.053Z\"><\/path>\n                <path fill=\"#fff\" d=\"M-3.066 295.067 32.06 304.1v9.033H-3.066v-18.066Z\"><\/path>\n            <\/svg>\n            <\/div>\n\n    \n\n    <\/div>\n<\/section>\n\n<p>More than 500 participants registered for <a href=\"https:\/\/newsroom.carleton.ca\/2019\/carleton-to-host-ihack-ottawa-cybersecurity-and-hacking-conference\/\">iHack Ottawa<\/a> at Carleton University on June 15 to 16, 2019, taking part in hours of cybersecurity sessions and an international &#8220;capture the flag\u201d event where teams in different cities competed to solve cybersecurity challenges.<\/p>\n\n\n<div class=\"not-prose cu-quote cu-component-spacing\">\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cFor entrepreneurs to grow their companies early, rapidly, and securely \u2013 and for designers to produce more secure products and services \u2013 they need to know about cybersecurity,\u201d said Steven Muegge, an Associate Professor at Carleton\u2019s <a href=\"https:\/\/timprogram.ca\/\" target=\"_blank\" rel=\"noopener\">Technology Innovation Management (TIM)<\/a> program<\/p>\n<\/blockquote>\n<\/div>\n\n\n<p>Demand for cybersecurity expertise is growing so quickly that there is already a global shortage of millions of positions, said Nadeem Douba, founder and Chief Technical Officer of Ottawa information security company <a href=\"https:\/\/www.redcanari.com\/\" target=\"_blank\" rel=\"noopener\">Red Canari<\/a>, and one of the iHack Ottawa organizers. iHack aims to address this gap by making cybersecurity accessible to everyone, said Douba, especially beginners, women, and people from ethnic minorities.<\/p>\n\n\n\n<p>Carleton\u2019s TIM program was a major backer of this year&#8217;s iHack Ottawa conference.&nbsp;TIM is a unique master\u2019s program that teaches entrepreneurship and innovation to engineers, scientists, and business professionals.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"680\" src=\"https:\/\/newsroom.carleton.ca\/wp-content\/uploads\/iHack-speaking-1200x680.jpg\" alt=\"Attendees listen as a presenter speaks at the podium during the iHack event.\" class=\"wp-image-57650\" srcset=\"https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-speaking-1200x680.jpg 1200w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-speaking-1200x680-300x170.jpg 300w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-speaking-1200x680-400x227.jpg 400w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-speaking-1200x680-768x435.jpg 768w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-speaking-1200x680-700x397.jpg 700w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-speaking-1200x680-200x113.jpg 200w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>&#8220;Cybersecurity is not purely a technical issue, although that is important, but it&#8217;s multidisciplinary,&#8221; said Dan Craigen, Carleton&#8217;s <a href=\"https:\/\/cugcr.ca\/\" target=\"_blank\" rel=\"noopener\">Global Cybersecurity Resource<\/a> director, who spoke about TIM at the opening session of the conference.&nbsp;Companies initially incubated from TIM now generate more than $20 million annually from their ventures, he said, and the demand for cybersecurity continues to skyrocket because &#8220;everybody has a cybersecurity problem&#8221; in keeping their systems safe from hacking.<\/p>\n\n\n\n<p>&#8220;I get a lot of people who ask me about my progress in the security field,&#8221; said Jean-Marc Le Blanc, an independent security researcher and one of the iHack Ottawa speakers, adding that skills development not only comes through practice, but from participating in events such as iHack to learn from experts and hone your skills in competition.<\/p>\n\n\n<figure class=\"wp-block-image alignfull wp-image-57655 size-full w-screen ml-offset-center cu-max-w-child-max px-4 md:px-6 lg:px-12\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"680\" src=\"https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-laptop-1200x900.jpg\" alt=\"An competitor types on a laptop during the iHack event.\" class=\"wp-image-57655\" srcset=\"https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-laptop-1200x900.jpg 1200w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-laptop-1200x900-300x170.jpg 300w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-laptop-1200x900-400x227.jpg 400w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-laptop-1200x900-768x435.jpg 768w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-laptop-1200x900-700x397.jpg 700w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-laptop-1200x900-200x113.jpg 200w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n\n\n<h2 id=\"learning-to-think-like-a-hacker\" class=\"wp-block-heading\">Learning to Think Like a Hacker<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<p>Other speakers at iHack Ottawa included Tanya Janca, a senior advocate for Microsoft, Ben Gardiner, founder and Director of Yellow Tag Security, Chris Pawlowicz, Director of Research and Development for TecInisghts, and Neal Kushwaha, CEO of Impendo.<\/p>\n\n\n\n<p>Participants moved back and forth throughout the day between speaker sessions in a large central theatre, to the villages and workshops located in nearby rooms.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter wp-image-57642 size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"680\" src=\"https:\/\/newsroom.carleton.ca\/wp-content\/uploads\/iHack-volunteers-1200x680.jpg\" alt=\"iHack Volunteers in blue T-shirts pose together in Richcraft Hall.\" class=\"wp-image-57642\" srcset=\"https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-volunteers-1200x680.jpg 1200w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-volunteers-1200x680-300x170.jpg 300w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-volunteers-1200x680-400x227.jpg 400w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-volunteers-1200x680-768x435.jpg 768w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-volunteers-1200x680-700x397.jpg 700w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-volunteers-1200x680-200x113.jpg 200w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><figcaption class=\"wp-element-caption\">Volunteers assisting with iHack Ottawa 2019 included Abdirahman Ohmed Osman (a recent TIM graduate, with a company operating transnationally in both Canada and Somalia), Zixun Wang (an MBA intern working with the TIM program), Ali Nazari (a recent TIM graduate, now pursuing a PhD in Management), Ahmed Shaw (a recent TIM graduate, now Director of Security R&amp;D for Red Canari), and Vishal Ramkrishna (a current TIM student, with a research project on machine learning and cybersecurity). Also in the photograph: Prof. Michael Weiss and Prof. Steven Muegge.<\/figcaption><\/figure>\n\n\n\n<p>iHack Villages were interactive hands-on areas where participants worked directly with security technologies.&nbsp;An &#8220;Internet of Things&#8221; village demonstrated security weaknesses in consumer products commonly found in many homes, and invited participants to try out what they learned by hacking a set of off-the-shelf products with known vulnerabilities. A lock-picking village taught the operation of physical locks and circumvention techniques that exploited weaknesses in the lock designs \u2013 a skillset and mindset in physical security that is analogous to the skillset and mindset required for cybersecurity. An RFID village examined the Radio-Frequency Identification (RFID) cards and card-reader technology commonly used in access control and payment\/ticketing systems. By examining the vulnerabilities in these systems, participants learned to \u201cthink like a hacker\u201d \u2013 an essential perspective for developing more secure systems and to anticipate potential vulnerabilities before they are found and exploited by others.<\/p>\n\n\n\n<p>iHack Workshops were instructor-led sessions on a particular technology or skill.&nbsp;A car-hacking workshop used open-source software tools to reverse-engineer the information exchanged between automotive systems within a vehicle.&nbsp;A \u201cGentle Introduction to Fuzzing\u201d workshop introduced testing methods to discover vulnerabilities in systems.<\/p>\n\n\n<figure class=\"wp-block-image alignfull wp-image-57657 size-full w-screen ml-offset-center cu-max-w-child-max px-4 md:px-6 lg:px-12\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"680\" src=\"https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-speaking2-1200x680.jpg\" alt=\"Attendees listen as a presenter speaks at the podium during the iHack event.\" class=\"wp-image-57657\" srcset=\"https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-speaking2-1200x680.jpg 1200w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-speaking2-1200x680-300x170.jpg 300w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-speaking2-1200x680-400x227.jpg 400w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-speaking2-1200x680-768x435.jpg 768w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-speaking2-1200x680-700x397.jpg 700w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-speaking2-1200x680-200x113.jpg 200w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n\n\n<h2 id=\"learning-cybersecurity-skills-in-a-practical-setting\" class=\"wp-block-heading\">Learning Cybersecurity Skills in a Practical Setting<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<p>In the evening, the action shifted to the hacking competition. Teams in Ottawa competed with teams in three other cities \u2013 Quebec City, Sherbrooke Quebec, and Cali Columbia \u2013 to \u201ccapture flags\u201d and score points by solving more than 75 security challenges of widely varying complexity and point values.&nbsp;An entry-level \u201cbeginner\u201d problem scored 2 points, while the most difficult problems scored 300 points.&nbsp;After 2 a.m. on Sunday when the competition ended, the top three teams had each scored more than four thousand points, and four Ottawa teams had placed in the top-ten.<\/p>\n\n\n<div class=\"not-prose cu-quote cu-component-spacing\">\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;It was an exciting day, with things always happening,&#8221; said Muegge, pointing out that the day ran for more than 14 hours between opening speeches and the closing of the capture the flag competition early Sunday morning. &#8220;The workshops were full to capacity, and there were often people waiting outside the villages for chairs to open up,&#8221; he added.<\/p>\n<\/blockquote>\n<\/div>\n\n\n<p>Muegge cited several benefits for Carleton\u2019s TIM Program in hosting the iHack event, which the organizers intend to grow in future years with more villages and more participants. Students and recent graduates learned cybersecurity skills in a practical setting, interacted with experienced professionals, and made connections that could lead to good jobs and business opportunities. Organizations recruiting at iHack included the Communication Security Establishment (CSE), one of Canada\u2019s key security and intelligence organizations, and In-TAC, an organization matching talent with opportunities at Canadian companies.<\/p>\n\n\n\n<p>For students and faculty in the TIM program, cybersecurity is an important aspect of an interdisciplinary entrepreneurship research program on growing companies early, rapidly, and securely.<\/p>\n\n\n<figure class=\"wp-block-image alignfull wp-image-57661 size-full w-screen ml-offset-center cu-max-w-child-max px-4 md:px-6 lg:px-12\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"680\" src=\"https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-competition-1200x680.jpg\" alt=\"Two competitors type on a laptop while laughing during the iHack event.\" class=\"wp-image-57661\" srcset=\"https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-competition-1200x680.jpg 1200w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-competition-1200x680-300x170.jpg 300w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-competition-1200x680-400x227.jpg 400w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-competition-1200x680-768x435.jpg 768w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-competition-1200x680-700x397.jpg 700w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/iHack-competition-1200x680-200x113.jpg 200w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>","protected":false},"excerpt":{"rendered":"<p>More than 500 participants registered for iHack Ottawa at Carleton University on June 15 to 16, 2019, taking part in hours of cybersecurity sessions and an international &#8220;capture the flag\u201d event where teams in different cities competed to solve cybersecurity challenges. \u201cFor entrepreneurs to grow their companies early, rapidly, and securely \u2013 and for designers [&hellip;]<\/p>\n","protected":false},"author":410,"featured_media":57664,"template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"cu_story_type":[28,25],"cu_story_tag":[1918,1922],"class_list":["post-57639","cu_story","type-cu_story","status-publish","has-post-thumbnail","hentry","cu_story_type-community-partnerships","cu_story_type-student-experience","cu_story_tag-faculty-of-engineering-and-design","cu_story_tag-sprott-school-of-business"],"acf":{"cu_post_thumbnail":"blueprint"},"_links":{"self":[{"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/cu_story\/57639","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/cu_story"}],"about":[{"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/types\/cu_story"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/users\/410"}],"version-history":[{"count":4,"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/cu_story\/57639\/revisions"}],"predecessor-version":[{"id":97316,"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/cu_story\/57639\/revisions\/97316"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/media\/57664"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/media?parent=57639"}],"wp:term":[{"taxonomy":"cu_story_type","embeddable":true,"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/cu_story_type?post=57639"},{"taxonomy":"cu_story_tag","embeddable":true,"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/cu_story_tag?post=57639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}