Tutorials day 01
28 May
Tutorials day 02
29 May
Conference Day 01
30 May
Conference Day 02
31 May
9:00 am
Malware Traffic Analysis Workshop
Waianbah
Open Source Security Orchestration - Automating the Boring Stuff AT CAPACITY
Kayne Naughton // Terry MacDonald
Elston
Malware Analysis When You're In A Hurry AT CAPACITY
Hinterland 1
MISP Training
Steve Clement // Christian Studer
Terrace 2
The Best TLS Training in the World - Day 1 of 2 AT CAPACITY
Terrace 1
Digital Forensics by CIRCL.LU - Day 1 of 2 AT CAPACITY
Hinterland 2
Social Engineering - Practical Lessons from the Field ** Join the Red Team **! AT CAPACITY
Verandah
5:00 pm
End of Tutorials
Marriott
9:00 am
How to Think Like an Analyst
Waianbah
Cyber Security Risk Management Masterclass
Elston
x86 Assembly Fundamentals with JollyFrogs AT CAPACITY
Hinterland 1
Bluetooth Low Energy hacking 101 AT CAPACITY
Terrace 2
The Best TLS Training in the World - Day 2 of 2 AT CAPACITY
Terrace 1
Digital Forensics by CIRCL.LU - Day 2 of 2 AT CAPACITY
Christian Studer // Michael Hamm // Steve Clement
Hinterland 2
Practical Data Science, Machine Learning and AI for Cybersecurity AT CAPACITY
Verandah
1:30 pm
Cyber Security Awareness and Culture Roundtable (HALF-DAY SESSION)
Dr Mark Carey-Smith // Alex Webling
Citrique Restaurant
9:25 am
Keynote: Computer Security - Yesterday, Today and Tomorrow
Ballroom
10:05 am
The CISO and the Gunslinger
Ballroom
10:25 am
Morning Tea
Exhibition
10:55 am
Running Your SOC Playbooks as Code
Waianbah
Catch me if you can: the art of CTF
Elston
Cyber security training for Whole of Victorian Government
Verandah
Flipping the Cyberdefense Equation to Tip the Scales Back in Our Favor
Hinterland
11:40 am
Global Commons, or connected States? The contest for the soul of the internet.
Waianbah
Lessons learned in a Forensics Lab
Elston
Cyber Security Survey Results
Verandah
Does MSS actually make a difference
Hinterland
12:20 pm
Lunch
Citrique Restaurant and Poolside
1:20 pm
Profiling and Clustering Internet-Wide Scans with FATT
Waianbah
Serverless Infections - Malware Just Found a New Home
Elston
Cybercrime – why it requires a complete paradigm shift: We’ve got to stop playing the geographical card!
Verandah
From the Hacker's Keyboard to the Protector's SOC
Hinterland
2:05 pm
The perceived perception of preparedness
Waianbah
Nailing container security in highly regulated industries
Elston
Getting security into software development when the support just isn’t there: practical tips and suggestions
Verandah
Marginalize the breach: A Zero Trust approach
Hinterland
2:50 pm
Integrating Threat Intelligence with CSIRT Procedure to Increase Efficiency of Incident Response: Malaysia CERT Experience
Waianbah
Catch Me If You Can: Exploring the Impact of Ephemeral Vulnerabilities
Michael Gianarakis // Shubham Shah
Elston
Building your own WAF as a service and forgetting about false positives
Verandah
The 5 Uncomfortable Truths
Hinterland
3:30 pm
Afternoon Tea
Exhibition
4:00 pm
Keynote: The Data Breach Pipeline - How Our Data is Stolen, Distributed and Abused
Ballroom
4:35 pm
Threat Intelligence & Automating Security Processes
Ballroom
6:30 pm
AusCERT2019 Gala Dinner Incorporating the Australian Information Security Awards (sponsored by Proofpoint and SANS Institute)
Pre-dinner drinks Poolside
9:05 am
Keynote: How Security Teams Can Evolve to Win Friends and Influence People
Ballroom
9:45 am
The Human Side of Cyber Resilience: Boards, Leaders and End Users
Ballroom
10:05 am
Morning Tea
Exhibition
10:35 am
Purple Packets: Effective Network Defense Against Real-World Attacks
Waianbah
OpenSSL 3.0 - Accelerating Forward
Elston
Bon Appétit - Why your risk appetite is probably not what you think it is.
Verandah
The Great Escape – Containers in Chains
Hinterland
11:20 am
When Red Teams and Blue Teams Cross Paths
Waianbah
Practical Network Security Automation
Elston
Data Breach Notification Law Wrap Up: 12 months of the NDB Scheme and the GDPR
Matthew Pokarier // Stefanie Luhrs
Verandah
Defence Industry Security Program
Hinterland
12:05 pm
Compromising Enterprise Networks from their own SIEM
Waianbah
Crash, Burn, Report
Elston
Come and join us at UQ Cyber Security
Verandah
Advance Intelligence Solutions
Hinterland
12:45 pm
Lunch
Citrique Restaurant and Poolside
1:45 pm
No EDR? No Money? No Worries!
Waianbah
MISP - Threat Sharing Platform: A platform for sharing, storing and correlating Indicators of Compromises of targeted attacks
Steve Clement // Christian Studer
Elston
Lessons from neuroscience, positive psychology and behavioural economics
Verandah
2:30 pm
The IDEs of March
Waianbah
Strange things that lurk in your {supercomputer|cloud}
Christian Unger // Jake Carroll
Elston
Influencing security decisions
Verandah
3:10 pm
Afternoon tea
Exhibition