Tutorials day 01

28 May

Tutorials day 02

29 May

Conference Day 01

30 May

Conference Day 02

31 May

9:00 am

Waianbah

Malware Traffic Analysis Workshop

Brad Duncan

Waianbah

Elston

Open Source Security Orchestration - Automating the Boring Stuff AT CAPACITY 

Hinterland 1

Malware Analysis When You're In A Hurry AT CAPACITY 

Dr Hinne Hettema

Hinterland 1

Terrace 2

MISP Training

Terrace 1

The Best TLS Training in the World - Day 1 of 2 AT CAPACITY 

Scott Helme

Terrace 1

Hinterland 2

Digital Forensics by CIRCL.LU - Day 1 of 2 AT CAPACITY 

Michael Hamm

Hinterland 2

Verandah

Social Engineering - Practical Lessons from the Field ** Join the Red Team **! AT CAPACITY 

Chris Gatford

Verandah

5:00 pm

End of Tutorials

Marriott

9:00 am

Waianbah

How to Think Like an Analyst

Elston

Cyber Security Risk Management Masterclass

Gary Gaskell

Elston

Hinterland 1

x86 Assembly Fundamentals with JollyFrogs AT CAPACITY 

Alex Penrose

Hinterland 1

Terrace 2

Bluetooth Low Energy hacking 101 AT CAPACITY 

Kevin Alcock

Terrace 2

Terrace 1

The Best TLS Training in the World - Day 2 of 2 AT CAPACITY 

Scott Helme

Terrace 1

Hinterland 2

Digital Forensics by CIRCL.LU - Day 2 of 2 AT CAPACITY 

Verandah

Practical Data Science, Machine Learning and AI for Cybersecurity AT CAPACITY 

1:30 pm

Citrique Restaurant

Cyber Security Awareness and Culture Roundtable (HALF-DAY SESSION)

Dr Mark Carey-Smith // Alex Webling

Citrique Restaurant

5:00 pm

AusCERT2019 Welcome Reception - Beers of the World (sponsored by AARNET)

Exhibition

9:00 am

Opening remarks: AusCERT

Ballroom

9:25 am

Keynote: Computer Security - Yesterday, Today and Tomorrow

Mikko Hypponen

Ballroom

10:05 am

The CISO and the Gunslinger

Michael McKinnon

Ballroom

10:25 am

Morning Tea

Exhibition

10:55 am

Waianbah

Running Your SOC Playbooks as Code

Kayne Naughton

Waianbah

Elston

Catch me if you can: the art of CTF

Heidi Winter

Elston

Verandah

Cyber security training for Whole of Victorian Government

Shane Moffitt

Verandah

Hinterland 1

Flipping the Cyberdefense Equation to Tip the Scales Back in Our Favor

Rick McElroy

Hinterland

11:40 am

Waianbah

Global Commons, or connected States? The contest for the soul of the internet.

Elston

Lessons learned in a Forensics Lab

Michael Hamm

Elston

Verandah

Cyber Security Survey Results

Leon Fouche // Mike Holm

Verandah

Hinterland 1

Does MSS actually make a difference

Bradley Anstis

Hinterland

12:20 pm

Lunch

Citrique Restaurant and Poolside

1:20 pm

Waianbah

Profiling and Clustering Internet-Wide Scans with FATT

Elston

Serverless Infections - Malware Just Found a New Home

Verandah

Cybercrime – why it requires a complete paradigm shift: We’ve got to stop playing the geographical card!

Brian Hay

Verandah

Hinterland 1

From the Hacker's Keyboard to the Protector's SOC

Gavin Reid

Hinterland

2:05 pm

Waianbah

The perceived perception of preparedness

Ashley Deuble

Waianbah

Elston

Nailing container security in highly regulated industries

David Grice

Elston

Verandah

Getting security into software development when the support just isn’t there: practical tips and suggestions

Hinterland 1

Marginalize the breach: A Zero Trust approach

Andrew Kay

Hinterland

2:50 pm

Waianbah

Integrating Threat Intelligence with CSIRT Procedure to Increase Efficiency of Incident Response: Malaysia CERT Experience

Elston

Catch Me If You Can: Exploring the Impact of Ephemeral Vulnerabilities

Verandah

Building your own WAF as a service and forgetting about false positives

Juan Berner

Verandah

Hinterland 1

The 5 Uncomfortable Truths

Nik Kalogirou

Hinterland

3:30 pm

Afternoon Tea

Exhibition

4:00 pm

Keynote: The Data Breach Pipeline - How Our Data is Stolen, Distributed and Abused

Troy Hunt

Ballroom

4:35 pm

Threat Intelligence & Automating Security Processes

Chris Adams

Ballroom

4:55 pm

Closing Remarks

Ballroom

6:30 pm

AusCERT2019 Gala Dinner Incorporating the Australian Information Security Awards (sponsored by Proofpoint and SANS Institute)

Crispin Kerr

Pre-dinner drinks Poolside

9:00 am

Opening Remarks: AusCERT

Ballroom

9:05 am

Keynote: How Security Teams Can Evolve to Win Friends and Influence People

Jessy Irwin

Ballroom

9:45 am

The Human Side of Cyber Resilience: Boards, Leaders and End Users

Garrett O’Hara

Ballroom

10:05 am

Morning Tea

Exhibition

10:35 am

Waianbah

Purple Packets: Effective Network Defense Against Real-World Attacks

Elston

OpenSSL 3.0 - Accelerating Forward

Verandah

Bon Appétit - Why your risk appetite is probably not what you think it is.

Eric Pinkerton

Verandah

Hinterland 1

The Great Escape – Containers in Chains

Lavi Lazarovitz

Hinterland

11:20 am

Waianbah

When Red Teams and Blue Teams Cross Paths

Elston

Practical Network Security Automation

Ali Bashivan

Elston

Verandah

Data Breach Notification Law Wrap Up: 12 months of the NDB Scheme and the GDPR

Hinterland 1

Defence Industry Security Program

Lachlan Murphy

Hinterland

12:05 pm

Waianbah

Compromising Enterprise Networks from their own SIEM

Yamila Levalle

Waianbah

Elston

Crash, Burn, Report

Scott Helme

Elston

Verandah

Come and join us at UQ Cyber Security

Prof. Ryan Ko

Verandah

Hinterland 1

Advance Intelligence Solutions

Laith Alkhouri

Hinterland

12:45 pm

Lunch

Citrique Restaurant and Poolside

1:45 pm

Waianbah

No EDR? No Money? No Worries!

Josh Fraser

Waianbah

Elston

MISP - Threat Sharing Platform: A platform for sharing, storing and correlating Indicators of Compromises of targeted attacks

Verandah

Lessons from neuroscience, positive psychology and behavioural economics

Hinterland 1

TBC

Hinterland

2:30 pm

Waianbah

The IDEs of March

Justin Steven

Waianbah

Elston

Strange things that lurk in your {supercomputer|cloud}

Verandah

Influencing security decisions

Gary Gaskell

Verandah

Hinterland 1

TBC

Hinterland

3:10 pm

Afternoon tea

Exhibition

3:45 pm

Speed Debate

Ballroom

4:45 pm

Closing Remarks: AusCERT

Ballroom