Tutorials day 01

29 May

Tutorials day 02

30 May

Conference Day 01

31 May

Conference Day 02

1 Jun

9:00 am

Waianbah

Cybercrime Scene Management and Evidence Preservation (HALF day session)

Elston

Introduction to IoT Security Assessment and Penetration Testing

Terrace 1

Docker for Cybersecurity Professionals

Terrace 2

FIRST Training (Malware Analysis When You're in a Hurry)

Dr Hinne Hettema

Terrace 2

Hinterland 1

MISP Training - Threat Intelligence - Extension and API hands-on

Michael Hamm // Steve Clement

Hinterland 1

Hinterland 2

A Tangled Web - Navigating Mandatory Notification, the GDPR, Data Protection and Privacy Laws

Verandah

Hak5

5:00 pm

End of Tutorials

Marriott

9:00 am

Waianbah

Information Security Risk Management

Gary Gaskell

Waianbah

Elston

Traffic Analysis Workshop

Brad Duncan

Elston

Terrace 1

Digital Forensics and Incident Response in The Cloud

Dr Michael Cohen

Terrace 1

Terrace 2

Morning - AusCERT Incident Response

Afternoon - HOWTO: Integrating AusCERT into your Procedures

Phil Cole // Mike Holm

Terrace 2

Hinterland 1

Lessons on Security Culture from a Japanese Master

Melissa Misuraca

Hinterland 1

Hinterland 2

The First 72 hours of Legal and Investigative Incident Response (HALF day session)

Nicole Murdoch // Graeme Edwards

Hinterland 2

Verandah

Social Engineering - Practical Lessons from the Field

1:30 pm

Hinterland 2

How to Proactively Perform a CxO-targeted “Security Practices and Capability Review” based on ISO 27000 and the Capability Maturity Model

Zak Siddiqui

Verandah

5:00 pm

AusCERT2018 Welcome Reception - Beers of the World

Exhibition

9:00 am

Opening remarks: AusCERT

Darren Kitchen

Ballroom

9:15 am

How To Scam Your Way Into Anything

Brian Brushwood

Ballroom

9:55 am

The History & Evolution of Privileged Access Management (PAM)

Jeff Zupan

Ballroom

10:15 am

Morning Tea

Exhibition

10:55 am

Waianbah

Mandatory Breach Notification: Are You Ready to Air Your Dirty Breaches?

Kay Lam-MacLeod

Waianbah

Elston

California Cyberscurity Institute

Verandah

New Thinking in Automatically Identifying Vulnerabilities During Software Development

Hinterland 1

2018 Cybercrime: What’s Coming Your Way

Brett Callaughan

Hinterland

11:40 am

Waianbah

Adventures in Bitcoin Surveillance: Mining the Blockchain and Hunting Miscreants

John Bambenek

Waianbah

Elston

Paint by Numbers: Resilience in Security

Verandah

Action Oriented Information Security Awareness Raising

Hinterland 1

Analyzing the Kill Chain: How to Load Your Gun When You Can’t Buy a Silver Bullet

Dr Jim Treinen

Hinterland

12:20 pm

Lunch

Citrique Restaurant and Poolside

1:20 pm

Waianbah

Panel: Data Security and IT Liability In The Age of Data Breach Mandatory Notification

Elston

Dragons Rise As Clouds Gather. The Coming of Age of China's Hacking Community

Peter Wesley

Elston

Verandah

Reusing Breach Data for Attack and Defence

Edward Farrell

Verandah

Hinterland 1

Cyber Risk Insurance and Logging Requirements for Forensics - How to Reduce Your Brand and Reputational Risk by Taking Your Incident Response Maturity to the Next Level

Fergus Brooks // Zak Siddiqui

Hinterland

2:05 pm

Waianbah

'Repudamaphobia' - An Irrational Fear of Reputational Damage

Eric Pinkerton

Waianbah

Elston

SAP Incident Response, How to Attack and Defend!

Verandah

Closing the Governance Gap: Improving your Business Through Comprehensive Strategy

Garry Barnes

Verandah

Hinterland 1

5 Ways To Strengthen Your Phishing Defense Programme for 2018

Nik Kalogirou

Hinterland

2:50 pm

Waianbah

Who’s Who in a Cybercrime Gang

Alex Tilley

Waianbah

Elston

Elston

Elston

Verandah

AusCERT, 25 Years and Beyond

Mike Holm

Verandah

Hinterland 1

Hinterland

Hinterland

3:30 pm

Afternoon Tea

Exhibition

4:00 pm

Keynote Speaker: It's Not Incident Response If You Don't Do Anything About It

Kayne Naughton

Ballroom

4:55 pm

Closing Remarks

Ballroom

6:30 pm

AusCERT2018 Gala Dinner Incorporating the Australian Information Security Awards

Pre-dinner drinks Poolside

9:00 am

Opening Remarks: AusCERT

Ballroom

9:05 am

Keynote Speaker

Katie Moussouris

Ballroom

9:45 am

Why A Cyber Resilience for Email Strategy Matters

Alison O’Hare

Ballroom

10:05 am

Morning Tea

Exhibition

10:35 am

Waianbah

A Panel Discussion: Greater Possibilities, What Recent Trends in Cyber Insurance Means for Australian Organisations

Elston

How to Bypass Authentication & Authorization

Verandah

Tracking APT Lateral Movement with Audit Policy and Sysmon

Hinterland 1

Today’s State of Vulnerability Response: Patch Work Requires Attention

Piero DePaoli

Hinterland

11:20 am

Waianbah

Darknet Investigations and The Use of Crypto Currencies

Elston

Huntion: Threat Hunting in Real Time Using a Streaming First Approach

Verandah

The Weakest Link - Managing Supplier and Third Party Risk

Wayne Tufek

Verandah

Hinterland 1

The Essential 8 – Cyber Threat Mitigation Strategies That Work

David Cottingham

Hinterland

12:05 pm

Waianbah

2nd annual AusCERT/BDO Cyber Survey: How resilient are Australian organisations

Leon Fouche

Waianbah

Elston

MISP - Threat Sharing Platform: A platform for Sharing, Storing and Correlating Indicators of Compromises of Targeted Attacks

Verandah

Exploiting the Exploiters: Hunting Fraud in Telecom Networks

Hinterland 1

Secure Your Data Center and Cloud with a Smart Micro-Segmentation Strategy

Todd Truitt

Hinterland

12:45 pm

Lunch

Citrique Restaurant and Poolside

1:45 pm

Waianbah

Mental Health Panel

Elston

Cybersecurity Education in Australia - Where To For 2018?

Verandah

The IoT Enterprise: Why Your Organisation Is Already IoT'd

Nick Savvides

Verandah

Hinterland 1

Hinterland

Hinterland

2:30 pm

Waianbah

Hollywood Hacking

Andy Prow // Kirk Jackson

Waianbah

Elston

Finding a Monster by its Shadow

Verandah

Influencing the Board - A Fool’s Errand

Craig Searle

Verandah

Hinterland 1

Hinterland

Hinterland

3:10 pm

Afternoon tea

Exhibition

3:45 pm

Speed Debate

Ballroom

4:45 pm

Closing Remarks: AusCERT

Ballroom