Conference program

Click on a session under the program below to view the presentation slides and video..

Please note: slides and videos have only been shared if we’ve received permission to do so by the presenter.  

09:00AM

Opening Remarks - Adam Spencer (MC)

Ballroom

09:00AM

Opening Remarks - Adam Spencer (MC)

Ballroom

09:05AM

The Less Hacked Path - Samy Kamkar

Ballroom

09:15AM

Of Hardware and Humans – Exploiting the Universal Attack Vector - Darren Kitchen, Shannon Morse

Ballroom

09:45AM

BDO and AusCERT’s 2016 Cyber Security Survey - Leon Fouche

Ballroom

09:55AM

Identity is the new perimeter – but getting IAM right is no easy thing - Todd Peterson

Ballroom

10:05AM

Morning tea

Exhibition Area

10:15AM

Morning tea

Exhibition Area

10:35AM

From 2600 to 1600 Pennsylvania Ave: Reflections on 15 years of infosec reporting - Patrick Gray

Waianbah

Developing Secure iOS Applications - Michael Gianarakis

Elston

Changes to the law require a holistic approach to cyber security - Robert Kerr

Verandah

Leveraging Global Datasets to Improve Your Cyber Investigations - Stephen Ginty

Hinterland

10:55AM

Hamstrung: Reports and Recommendations from Both Sides of a Cyber Intelligence Border - Mary Ann Blair, David Thompson

Waianbah

Preparing for Australia’s Mandatory Breach Notification Law – What does it mean for business - Ben Di Marco, Matthew Pokarier

Elston

Don’t Get Caught Em-bed: Finding and Preventing Vulns at its Lowest Level - Aaron Guzman

Verandah

Launch, Detect, Evolve: The Mutation of Malware - Frank Walsh

Hinterland

11:20AM

Russian threats – beyond the hype - Tim Bobak

Waianbah

No True Security Person – Balkanization of the Security Community - Kate Pearce

Elston

Cyber Heroes: Winning Hearts and Minds - Peter Vanheck

Verandah

Northrop Grumman Support to the Department of Homeland Security National Cybersecurity & Communications Integration Center. - Dix Dallas

Hinterland

11:40AM

Information Sharing and CyberSecurity: Fitting the Puzzle Together - Mark Bruhn

Waianbah

The Nihilist’s Guide to Wrecking Humans and Systems - Christina Camilleri

Elston

Abusing voice biometric solutions - Jakub Kaluzny

Verandah

Partnering To Deliver Six Weeks To Security Operations The AMP Story - Brian Spring, Marilyn Nelson

Hinterland

12:05PM

Incident Response for the 21st Century Luddite - Craig Searle

Waianbah

Penetration testing android applications and embedded devices - David Jorm

Elston

Security Awareness at scale - Brett Winterford

Verandah

The Myths and Truths to Building a World-Class Cyber Defence - Chris Coryea

Hinterland

12:20PM

Lunch

Restaurant/Lagoon area

12:45PM

Lunch

Restaurant/Lagoon area

01:20PM

The CyberGreen Initiative: a global Internet health check - Chris Horsley

Waianbah

United We Stand – Women and Diversity in Cybersecurity Panel Discussion - Rhea Naidoo, Kate Pearce, Shannon Morse, Mandy Turner, Kylie Hunt

Elston

Biohazard!: Biometric Security - Andrew Jamieson

Verandah

Your Partner for Superior Cybersecurity - Chris Goettl

Hinterland

01:45PM

An Unlikely Romance: The Current State of Bug Bounties - Casey Ellis

Waianbah

Mastering Mr Robot – Real world hacking like a TV star - Kirk Jackson, Andy Prow

Elston

Look who’s talking - Eric Pinkerton

Verandah

02:05PM

Managing Cyber Risk, Governance and Compliance: What is the role of Insurance?: - Meena Wahi

Waianbah

The Responsibility of Disclosure: Playing Nice and Staying Out of Prison - Troy Hunt

Elston

Reporting to the Board – improving knowledge, increasing understanding - Nigel Phair

Verandah

Cyber Resiliency that starts with email - Garrett O'Hara

Hinterland

02:30PM

When penetration testing turns into incident response - Edward Farrell

Waianbah

Seamless threat intel sharing and automation using MISP - Andras Iklody, Michael Hamm

Elston

Gaps in the Agreement – the things outsourcing services hide from you - Christian Unger, Zeke Vogts

Verandah

ASD Top 4 Compliance and what auditors look for - Daniel Schell

Hinterland

02:50PM

Red Teaming “You Must Go Beyond The Limits” - Wayne Ronaldson

Waianbah

Focusing security monitoring with TTPs - Kayne Naughton

Elston

Cyber Security Defence Preparation for High Profile International Events - John Harrison

Verandah

The Dark Arts of Privacy - Paul Cooney

Hinterland

03:10PM

Afternoon tea

Exhibition Area

03:30PM

Afternoon tea

Exhibition Area

03:45PM

Speed Debate - Adam Spencer (MC), Gary Gaskell, David Jorm, Casey Ellis, Nick Savvides, Chris Gatford, Darren Kitchen, Patrick Gray, Christina Camilleri

Ballroom

04:00PM

Lessons Learned by the US financial sector in evolving information sharing and collaboration - Byron Collie

Ballroom

04:40PM

Combatting Advanced Cybersecurity Threats with Artificial Intelligence and Machine Learning - Nick Savvides

Ballroom

04:45PM

Closing Remarks

Ballroom

05:00PM

Closing Remarks

Ballroom | Closing Remarks

06:30PM

AusCERT2017 Gala Dinner incorporating the Australian Information Security Awards

Ballroom