UBC Cybersecurity Summit was held on May 11, 2018, at UBC Robson Square, in Vancouver Downtown. It showcased research by UBC faculty and graduate students in Cybersecurity.
It was a full day event, with outstanding keynotes by BC CISO Gary Perkins and CMU Prof. Lujo Bauer, 12 project presentations by PhD and Masters students, and 20+ posters on recent and ongoing research at UBC. The summit attracted 177 participants from 55 organizations. The summit was collocated with a meeting of the Vancouver Security Special Interest Group.
Most of the summit presentations can be watched below
View pictures from the summit
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/Cybersecurity-Summit-2018_8351.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/Cybersecurity-Summit-2018_3.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8378.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8438.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8371.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/Cybersecurity-Summit-2018_8353.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/Cybersecurity-Summit-2018_8334.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8604.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/Cybersecurity-Summit-2018_8370.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/Cybersecurity-Summit-2018_8355.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/Cybersecurity-Summit-2018_8410-1.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/Cybersecurity-Summit-2018_8354.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/Cybersecurity-Summit-2018_8350.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/Cybersecurity-Summit-2018_8348.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/Cybersecurity-Summit-2018_8359.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/Cybersecurity-Summit-2018_8341.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/Cybersecurity-Summit-2018_8339.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/Cybersecurity-Summit-2018_8338.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/Cybersecurity-Summit-2018_8337.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/Cybersecurity-Summit-2018_8349.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/Cybersecurity-Summit-2018_8332.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/Cybersecurity-Summit-2018_8347.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/Cybersecurity-Summit-2018_8330.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/Cybersecurity-Summit-2018_2.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/Cybersecurity-Summit-1_8617-1.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/Cybersecurity-Summit-2018_8410.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/Cybersecurity-Summit-1_8617.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8616.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8615.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8613.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8612.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8611.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8609.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8606.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8603.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8602.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8601.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8599.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8598.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8596.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8592.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8591.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8588.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8587.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8586.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8585.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8584.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8581.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8580.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8575.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8569.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8567.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8564.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8561.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8560.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8557.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8552.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8551.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8549.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8548.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8547.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8546.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8542.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8541.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8539.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8531.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8530.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8527.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8519.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8517.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8514.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8511.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8504.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8493.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8486.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8485.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8484.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8481.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8480.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8477.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8476.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8475.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8474.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8466.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8465.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8462.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8460.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8453.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8440.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8435.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8434.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8425.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8421.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8420.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8419.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8418.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8414.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8410.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8406.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8405.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8404.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8403.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8402.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8393.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8392.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8388.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8387.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8385.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8384.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8383.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8381.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8380.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8379.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8376.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8374.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8359.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8355.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8354.jpg)
![](https://blogs.ubc.ca/cybersecuritysummit/files/2018/05/JDO_8353.jpg)