Tutorials day 01
29 May
Tutorials day 02
30 May
Conference Day 01
31 May
Conference Day 02
1 Jun
9:00 am
Cybercrime Scene Management and Evidence Preservation (HALF day session)
Graeme Edwards // Kris Steadman
Waianbah
Introduction to IoT Security Assessment and Penetration Testing
Elston
Docker for Cybersecurity Professionals
Alexi Chiotis // Edward Farrell
Terrace 1
FIRST Training (Malware Analysis When You're in a Hurry)
Terrace 2
MISP Training - Threat Intelligence - Extension and API hands-on
Hinterland 1
A Tangled Web - Navigating Mandatory Notification, the GDPR, Data Protection and Privacy Laws
Matthew Pokarier // Stefanie Luhrs // Reece Corbett-Wilkins
Hinterland 2
Hak5
Darren Kitchen // Sebastian Kinne
Verandah
5:00 pm
End of Tutorials
Marriott
9:00 am
Information Security Risk Management
Waianbah
Traffic Analysis Workshop
Elston
Digital Forensics and Incident Response in The Cloud
Terrace 1
Morning - AusCERT Incident Response
Afternoon - HOWTO: Integrating AusCERT into your Procedures
Lessons on Security Culture from a Japanese Master
Hinterland 1
The First 72 hours of Legal and Investigative Incident Response (HALF day session)
Nicole Murdoch // Graeme Edwards
Hinterland 2
Social Engineering - Practical Lessons from the Field
Chris Gatford // Michael McKinnon
Verandah
1:30 pm
How to Proactively Perform a CxO-targeted “Security Practices and Capability Review” based on ISO 27000 and the Capability Maturity Model
Verandah
9:00 am
Opening remarks: AusCERT
Ballroom
9:15 am
How To Scam Your Way Into Anything
Ballroom
9:55 am
The History & Evolution of Privileged Access Management (PAM)
Ballroom
10:15 am
Morning Tea
Exhibition
10:55 am
Mandatory Breach Notification: Are You Ready to Air Your Dirty Breaches?
Waianbah
California Cyberscurity Institute
Elston
New Thinking in Automatically Identifying Vulnerabilities During Software Development
Verandah
2018 Cybercrime: What’s Coming Your Way
Hinterland
11:40 am
Adventures in Bitcoin Surveillance: Mining the Blockchain and Hunting Miscreants
Waianbah
Paint by Numbers: Resilience in Security
Elston
Action Oriented Information Security Awareness Raising
Verandah
Analyzing the Kill Chain: How to Load Your Gun When You Can’t Buy a Silver Bullet
Hinterland
12:20 pm
Lunch
Citrique Restaurant and Poolside
1:20 pm
Panel: Data Security and IT Liability In The Age of Data Breach Mandatory Notification
Dr Vanessa Douglas-Savage // John Moran // Troy Hunt // Kay Lam-MacLeod // Nicole Murdoch // Wayne Tufek
Waianbah
Dragons Rise As Clouds Gather. The Coming of Age of China's Hacking Community
Elston
Reusing Breach Data for Attack and Defence
Verandah
Cyber Risk Insurance and Logging Requirements for Forensics - How to Reduce Your Brand and Reputational Risk by Taking Your Incident Response Maturity to the Next Level
Hinterland
2:05 pm
'Repudamaphobia' - An Irrational Fear of Reputational Damage
Waianbah
SAP Incident Response, How to Attack and Defend!
Elston
Closing the Governance Gap: Improving your Business Through Comprehensive Strategy
Verandah
5 Ways To Strengthen Your Phishing Defense Programme for 2018
Hinterland
2:50 pm
Who’s Who in a Cybercrime Gang
Waianbah
AusCERT, 25 Years and Beyond
Verandah
3:30 pm
Afternoon Tea
Exhibition
4:00 pm
Keynote Speaker: It's Not Incident Response If You Don't Do Anything About It
Ballroom
9:05 am
Keynote Speaker
Ballroom
9:45 am
Why A Cyber Resilience for Email Strategy Matters
Ballroom
10:05 am
Morning Tea
Exhibition
10:35 am
A Panel Discussion: Greater Possibilities, What Recent Trends in Cyber Insurance Means for Australian Organisations
Dean Carrigan // Matthew Pokarier // Patrick Beckett // David Gallagher
Waianbah
How to Bypass Authentication & Authorization
Elston
Tracking APT Lateral Movement with Audit Policy and Sysmon
Keisuke Muda // Shusei Tomonaga
Verandah
Today’s State of Vulnerability Response: Patch Work Requires Attention
Hinterland
11:20 am
Darknet Investigations and The Use of Crypto Currencies
Benjamin Johnson // Robert Thomson
Waianbah
Huntion: Threat Hunting in Real Time Using a Streaming First Approach
Jayendra Pathak // Fritz Venter
Elston
The Weakest Link - Managing Supplier and Third Party Risk
Verandah
The Essential 8 – Cyber Threat Mitigation Strategies That Work
Hinterland
12:05 pm
2nd annual AusCERT/BDO Cyber Survey: How resilient are Australian organisations
Waianbah
MISP - Threat Sharing Platform: A platform for Sharing, Storing and Correlating Indicators of Compromises of Targeted Attacks
Elston
Exploiting the Exploiters: Hunting Fraud in Telecom Networks
Verandah
Secure Your Data Center and Cloud with a Smart Micro-Segmentation Strategy
Hinterland
12:45 pm
Lunch
Citrique Restaurant and Poolside
1:45 pm
Mental Health Panel
Adam Broadbent // Simon Harvey // David Jorm
Waianbah
Cybersecurity Education in Australia - Where To For 2018?
The IoT Enterprise: Why Your Organisation Is Already IoT'd
Verandah
2:30 pm
Hollywood Hacking
Waianbah
Finding a Monster by its Shadow
Elston
Influencing the Board - A Fool’s Errand
Verandah
3:10 pm
Afternoon tea
Exhibition