AusCERT2015

Connect with us   ​  

 

Monday, 23rd May 2016

All day tutorials – 9:00 to 5:00

Morning tea – 10:00 to 10:30

Lunch – 12:30 to 1:30

Afternoon tea – 3:00 to 3:30

Evening at Leisure

 

Tuesday, 24th May 2016

All day tutorials – 9:00 to 5:00

Morning tea – 10:00 to 10:30

Lunch – 12:30 to 1:30

Afternoon tea – 3:00 to 3:30

Welcome Reception – 18:00 to 20:00

 

Wednesday, 25th May 2016

09:00

Opening remarks: Thomas King, AusCERT General Manager

MC: Adam Spencer

09:15

Keynote speaker: Christopher Soghoian, American Civil Liberties Union
The Next Crypto Wars

09:55

Plenary: Nick Savvides, Symantec

Be the 1%, Beat the 1%

10:15 – 10:55

Morning tea

 

Industry

Technical

Ubiquitous

10:55 - 11:35

Ben Adamson, Mimecast

3 Key Strategies to Help You Prevent the Next Big Data Breach

John Bambenek, Bambenek Consulting

Data Mining Malware: Using Historical Information for Current Investigations

Farah Magrabi, Macquarie University

Securing our health information from cyber threats as the world goes digital

11:40 - 12:20

Michael Sutton, Zscaler
Criminals don’t wear orange jumpsuits in public

David Jorm, Console

CVE is logjammed, CNVD is nearly as bad, and my heart bleeds for the whole mess

Andrew Jamieson, UL

IOT Security: It's in the Stars!

12:20 - 13:50

Lunch

13:50 - 14:30

Mike Smith, Akamai

My Other Purchase is Your Purchase: Account Takeover and Cashout Schemes

Justin Clacherty, Future Wise

Building Automation: How secure is your home or workplace

Pedram Hayati, elttam

The trade-off between UX vs Security, it is not easy to get them both right

14:35 - 15:15

Andrew Souter and Shane Wescott, Landesk

Catch, Patch and Match – Practical ways to Mitigate the risk of cyber threats

Hinne Hettema, The University of Auckland

Welcome to the after-hack party: Detecting and mitigating the pivot

Hemamali Tennakoon, Sri Lanka CERT|CC

The psychological impact of Online versus offline victimization and victim support

15:15 - 15:55

Afternoon tea

15:55 -16:35

Eric Johansen, FireMon
Security Analytics for Data Discovery - Closing the SIEM Gap

Mark Carey-Smith, CITEC

Maximizing Efficiency in Security Operations

David Lacey, iDcare

Identity Aftermath - Australia & New Zealand's National Identity Support Service 18 Months On

16:40 – 17:20

 

Fraser Tweedale, Red Hat

Network-bound encryption with Tang and Clevis

Ashley Deuble, Griffith University

The 6 stages of incident response

17:30

Birds of Feather Sessions (BOFs)

Evening at Leisure – Opportunity for Sponsors to entertain Delegates

 

Thursday, 26th May 2016

09:00

Opening remarks: AusCERT

MC: Adam Spencer

09:15

Keynote speaker: Darren Kitchen, Hak5
The Curse of Convenience: How Plug and Play became Plug and Pwned

09:55

Plenary: Aamir Lakhani, Fortinet

Spies, Geeks, and Tracking: using Threat Intelligence to hunt for data

10:15 – 10:55

Morning tea

 

Industry

Technical

Ubiquitous

10:55 - 11:35

Mick Stephens, FireMon

Effective management of Information Security

Hanno Böck

The burden of faulty TLS implementations

Steve Wilson, Lockstep Technologies

Blockchain - The Hype Machine

11:40 - 12:20

Sanjay Aurora, Darktrace
Gaining real-time intelligence: understand your threat environment through the Enterprise Immune System

Fatih Ozavci, Context Information Security

Hardware Hacking Chronicles: IoT Hacking for Offence and Defence

Chris Horsley, Cosive

Maturing your security team: haste makes waste

12:20 - 13:50

Lunch

13:50 - 14:30

 

Zoltan Balazs, MRG Effitas

Sandbox Detection: Leak, Abuse, Test

Donald ‘Mac’ McCarthy, myNetWatchman

Business Email Compromise: The New Billion Dollar Problem

14:35 - 15:15

 

Bradley Schatz, Schatz Forensic

Accelerating your forensic & incident response workflow: the case for a new standard in forensic imaging

Edward Farrell, Mercury Information Security Services

Cyber(war) what is it good for?

15:15 - 15:55

Afternoon tea

15:55

Keynote speaker: Bill Duane, RSA
What breaches teach, and education the hard way!

16:35

Closing Remarks

19:00

AusCERT2016 Gala Dinner incorporating the Australian Information Security Awards

MC: Adam Spencer

 

Friday, 27th May 2016

09:00

Opening remarks: AusCERT

MC: Adam Spencer

09:05

Keynote speaker: Kayne Naughton, Cosive

The Sorcerer's Apprentice: AI as an amplifier of human failings

9:45

Plenary: Kent Shuart, Dell

10:05 – 10:35

Morning tea

 

Technical

Technical

Ubiquitous

10:35 - 11:15

Troy Hunt, troyhunt.com

Lessons from a quarter of a billion breached records

Tim Hudson, Cryptsoft

OpenSSL after HeartBleed

Neal Wise, Assurance

Threat modelling in higher education

11:20 - 12:00

Zoltan Balazs, MRG Effitas

Hacking highly secured enterpise environments

William Caelli, International Information Security Consultants

Cryptowars Redux

Ben Di Marco and Matthew Pokarier, Clyde & Co.

Emerging Legal and Regulatory Risks for Data Breaches

12:05 -12:45

Wayne Huang and Sun Huang, Proofpoint

Witness the Russian attack: Live demos of their steps, tools, techniques

David Litchfield, Google

Hackproofing Oracle eBusiness Suite

Nik Cubrilovic

Stock Hacks: Applying Information Leakage to Profitably Trade Stocks

12:45 – 13:45

Lunch

13:45

Speed Debate. Chair: Adam Spencer, Mathematician, Comedian and Australian Media Personality

14:45

Closing Remarks: AusCERT

15:00 and 15:30

Buses depart to Coolangatta and Brisbane airports