[Skip navigation links]

Conference caption

13th Annual AusCERT Information Security Conference: 12th - 16th May 2014

AusCERT2014 Program

Monday 12th May 2014

09:00-17:00 Tutorials- half day and full day

 

Tuesday 13th May 2014

09:00-17:00 Tutorials- half day and full day
15:00- 20:00 Registration open
17:00-18:00 Birds of Feather Session (BOF)- AARNet: Boardroom
18:00-19:30 Welcome Cocktail Evening- all delegates welcome

 

Wednesday, 14th May 2014 (Day 1)

08:00-18:30

Registration open

08:00-09:00

Coffee and tea

08:30-09:00

Conference Opening: AusCERT

09:00-09:40

Keynote presentation- Felix Lindner, Recurity Labs: We Came In Peace - They Don't

09:40-10:20

Plenary- Edward Felten, Princeton University: Security in a Surveilled World

10:20-10:40

Morning tea

 

Norfolk Room

Prince Room

Monarch Room

Marquis Room

10:40-11:20 Jay Wulf, Nomeonastiq.com: (Foreign) Government Data Intercepts as Active Persistent Threat Jason Jones and Marc Eisenbarth, Arbor Networks ASERT: BladeRunner: Adventures in Tracking Botnets Rich Costanzo, FireEye: Cybersecurity.. the final frontier. Seek out advanced threats, detonate and resolve them by developing a Next Generation security program.  Jay Tecksingani, Sourcefire: 

Malware Whack-a-Mole: Time to change the game and speed up malware response 

11:25-12:05 Pierre Tagle, Sense of Security: Privacy Act II (The Sequel) – Considerations for the Tech Sector Jeremy Brown and David Seidman, Microsoft: Microsoft Vulnerability Research: How to be a finder as a Vendor Peter Woollacott,Tier-3: Automated Technologies for Improved Security Efficiencies Mike Wilkinson, Trustwave: Incident Response lessons learnt from 100 compromises
12:05-13:40

Lunch

13:40-14:20 Mike Cerny, PwC Australia: Cyber analytics: Valuable insights or “smoke and mirrors”? Mark Stuart, Dell Software: User identity management from the network layer through to the application layer Nick Savvides, Symantec: Can FIDO bring biometrics to consumers? Attila Marosi, GovCERT-Hungary: Easy Ways to Bypass Anti-Virus Systems
14:25-15:05 Matt Keil, Palo Alto Networks: Hiding in Plain Sight: The Relationship Between Cyber Attacks and Applications. Andrew Lee, ESET: Ethics and the AV industry in the surveillance age Steve Wilson, Constellation Research: Security isn't secure Xeno Kovah, The MITRE Corporation: PC Firmware attacks, Copernicus, and You
15:05-15:35

Afternoon tea

15:35-16:15 Sean Duca, McAfee: Demand More: Protecting your Network with McAfee Next Generation Firewall Robert Clark, United States Naval Academy, Center for Cyber Security Studies: Cyber War, Cyber Espionage & the Law - Easy or Hard? Kayne Naughton, Asymmetric Security: Falling off a cloud: What does a Bitcoin robbery look like? Sean Richmond, Sophos: Pulling back the covers on credit card fraud: A detailed look at financial fraudware.
16:20-17:00 Matt Bennett, Zscaler: Securing your Business in a Mobile World Special Agent, FBI: FBI Case Study: The Rise and Fall of SpyEye David Jorm and Olivia Maree: Information wants to be free - the collapse of the North Korean information cordon David Etue, SafeNet: Whose Cloud is it Anyway? Exploring Data Security, Ownership and Control
17:00-18:00 Birds of Feather Sessions (BOFs) - ISACA: Marquis Room, CREST: Norfolk Room
18:00 Buses depart for Sea World (Buses return approximately 9:30 pm)

Thursday, 15th May 2014 (Day 2)

08:00-17:00

Registration open

08:00-09:00

Coffee and tea

09:00-09:15

Opening remarks: AusCERT

09:15-09:55

Keynote- Marcus Sachs, Verizon: Changing the Rules

09:55-10:35

Plenary- Peter Gutmann, University of Auckland: Crypto Won't Save You Either

10:35-11:05

Morning tea

 

Norfolk Room

Prince Room

Monarch Room

Marquis Room

11:05-11:45 Nick Savvides, Symantec: Eliminate tokens! Minimize risk and gain efficiencies with trusted authentication Stefan Schumacher, Magdeburger Institut für Sicherheitsforschung: Security in a Post NSA era? Neal Wise, Assurance: Hacking The Gibson: Threats facing High Performance Computing (HPC) Solutions Roger Whitely, FireMon: Network Security Metrics – Which Matter, Which Can Be Measured?
11:50-12:30 Brian Hay, Qld Police: Why the Information Super Highway is just like the M1 James Davis, Janet CSIRT: Being Good Neighbours: sharing security information at home and away Richard Monk and Ivan Stojmirov, Red Hat: Open Source Enterprise Two-Factor Authentication John Karabin, Verizon Enterprise Solutions – Aust & NZ: Data Breach Investigations Report - Lessons Learnt
12:30-13:30

Lunch

Birds of Feather Session (BOF) - AISA: Norfolk Room

13:30 14:10 Marc Eisenbarth, Arbor Networks ASERT: Internet-Scale Security Sam Ghebranious, CyberArk: Locking Down the Privileged Pathway Jason Masters: Should Directors be Interested in Trusting Security Sean Ofir, ObserveIT: Do You Really Know Who is Doing What on Your Servers?
14:15-14:55

Raoul Strackx, KU Leuven: Moving Towards a Non-Hierarchical Security Model

Kieran Cook, Kaspersky Lab: Work is no longer a destination
Pierre Tagle, Sense of Security: PCI DSS the Trilogy – Adapting Compliance Strategies to Version 3 Peter Sandilands, Tripwire: Can you trust your security if you overlook the basics?

14:55-15:25

Afternoon tea

15:25-16:05 Bernie Thomas, CSG Invotas: Accelerate Your Security Operations With Human Guided, Machine Speed Responses to Cyber Attacks - Before, During, and After Scott McIntyre, Telstra: Big Data, Big Breaches, Big Headaches Ian Farquhar, Gigamon: Security Capabilities 101 – Pervasive Network Visibility John Crain, ICANN: ICANN and Identifier SSR
16:10-16:50 Paul Judge, Barracuda Networks: Lean Hacking: How Attackers Are Doing More with Less and How to Stop Them Joshua Cavalier and Shawn Thompson, Sense of Security: In Crypto We Trust, or do we? Dragging privacy back to the 90s Trevor Iverach, CA: Identity is the New Perimeter: Real Case Studies on How to Secure your Business in the World of Cloud, Mobility and Collaboration   Matt Jones, Volvent: Tracking and analysing security trends
19:00 AusCERT2014 Gala Dinner incorporating the Australian Information Security Awards

Friday, 16th May 2014 (Day 3)

08:00-17:00  Registration open
08:30-9:30  Coffee and tea
09:15-09:20  Opening remarks: AusCERT
09:20-10:10  Keynote presentation-  Jason Fox: Making Clever Happen
10:10-10:50  Plenary- Dan Klein: Security, Music, and the Three Laws of Thermodynamics
10:50-11:20

 Morning tea

Book signing at conference bookshop- Dr Jason Fox

 

Norfolk Room

Prince Room

Monarch Room

Marquis Room

11:20-12:00 Tyson Garrett, Arbor Netwoks: Actionable Big Data David Litchfield, Datacom TSS: A history of database insecurity (and why the future's actually looking better) Peter Benson, Trend Micro: Two dimensional security thinking in a four dimensional world

Peter Nikitser, CSC: Cybersecurity in Healthcare

12:05-12:45 Leon Friend,  Cyberoam: Cyberoam NGFW Offers Actionable Intelligence & Controls for Future-ready Security in Enterprises OJ Reeves: Meterpreter Internals
David Ross, Bridge Point Communications: Incorporating Security Provisions into the New ISO/IEC Cloud SLA Standards Lydia Grobler, Risk Offensive: Weaponizing Trust
12:50-13:30 Clinton Firth, CSC & Ian Brightwell, NSW Electoral Commission: Strategic Threat Intelligence Approach to e-voting in NSW 2015 election Mark Krischer, Cisco: Trusting the Wireless Network: Understanding Wireless Threats and How to Defend Against Them Bevan Jones, NBNCo: 

Who’s Securing the Worlds Wild West (WWW) aka the ‘Fifth Domain’ or ‘Cyber Space’?

Shanon Olsson, Technology Solutions Australia: Your hypervisor is showing!
13:30-14:30 Lunch
14:30-15:30 Speed Debate. Chair: Adam Spencer, Mathematician, Comedian and Australian Media Personality 

15:30-15:45

     Closing remarks:  AusCERT