BSidesPerth 2018 Sept. 15, 2018 to Sept. 16, 2018, Perth, Australia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
“London Calling, VoIP hacking for fun and profit… mostly profit” Kai Frost VoIP and its umbrella technology converged telecommunications is an area of InfoSec which even after ...
“SecDevSecOpsSec: let’s stop throwing around the buzzwords.” Sarah Young Everyone likes throwing the phrase “DevSecOps” out there at the moment, right? It’s a security ...
“Malware Meets Industrial Safety System and the Consequences” Paresh Kerai A Middle East Industrial Safety System was recently attacked with malicious malware designed specifically to ...
“Caring for our pen tester friends” Brendan Seerup Quality assurance teams are becoming more context driven and collaborative. QA Testers are now needed ...
“Secure SDLC Speed-run” Matt Jones Writing software comes with a lot of challenges – different industry trends and ways of ...
“Exploiting Steganography Image in MS Office Documents” Lordian Mosuela Dating back as far as ancient Greece, steganography involves concealing a message inside another message ...
“Not If but When?” Leveraging AI to jettison mantras of the Past: How AI will Liberate Security of the Future John Mcclurg John is working with the FBI to fix the problem of reactive security. For decades, ...
“Automating Arbitrage” C_sto Ever wanted to make free money? Me too! I wrote a program that automatically trades ...
“Double D! Diagnose | Detonate” Nicholas Cairns As defenders of devices, networks and systems we need to understand the threats we face! ...
“Security practice is broken. How can we fix it?” Jodie Siganto I’d like to look at the information security profession. As information security practitioners we think ...
“Subdomain Takeovers – Beginners to Advanced” Michael Skelton This talk aims to introduce hackers of all levels to subdomain takeovers. This talk will ...
“Bug Hunting in Open Source Software” Silvio Cesare In 2002 I performed a code review of the open source Operating System kernels. In ...
“Hardware Slashing, Smashing, Deconstructing and Reconstruction for Root access” Deral Heiland During this presentation I will be focusing on what is typically referred to as destructive ...
“What Your RF Signature Says About You” Stephen Invisible, inaudible, and ignored, your devices are currently screaming out large amounts of information about ...