KawaiiCon 2022 July 1, 2022 to July 2, 2022, Wellington, NZ

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Welcome Crüe N/A
Moonshots and Space Debris: A Cyberspace Retrospective on our Last Orbit Around the Sun Darren Bilby Cyberspace is a different place from what it was 18 months ago. Yes, there was ...
Positive Trends in Web App Development Pruby As pen-testers we spend all our time finding bugs. This leads us to focus on ...
Morning Tea Everyone N/A
Dylan, Frenchie & the Chamber of Secrets (Red Teaming in Zero Trust: No Malware Needed) Frenchie And Dylan In a zero trust network it’s becoming harder to attack endpoints, and move through traditional ...
IoT your Pet, Sure can. Peter Lambrechtsen (@plambrechtsen) Last year we added a puppy Wicket to our family to the ongoing excitement of ...
Keep calm and set SCE to AUX D.roc It is often said that a pocket calculator has more computing power than the computer ...
Lunch Everyone N/A
Malware Analysis when you don't have time for Malware Analaysis Adrian Hayes Something has been compromised, stress levels are at an all-time high, the CISO is quietly ...
Deep breaths and lean the f**k in. A user’s guide to Incident Response. Nadia Yousef 2020 was a whole vibe on its own, but 2021 has really bought its game ...
Kubernetes on Hard-Mode: Security in Hostile Multi-tenancy Clusters Ron Amosa K8s multi-tenancy is a commonly used architecture in companies yet true “hard multi-tenancy” in Kubernetes ...
Afternoon Tea Everyone N/A
Bug or Feature: The Audience is Participating Wade Winright We all like to poke fun at whether some feature in a product was was ...
Breaking Active Directory Using Publicly Documented Kerberos Features Andrew Bartlett In November 2021 both Samba and Windows released very similar security updates. By December 2021 ...
Hiding Malware in Docker Desktop's virtual machine @mangopdf I’ve gone and done it this time. I was looking for a way to “not ...
End of Day Crüe N/A
Movie Night - The Andromeda Strain Crüe Don’t really feel like going out after the con? Feeling social-ed out? Just feel like ...
Software Security in the Presence of Faults Peter Gutmann Software security is usually concerned with issues like buffer overflows, SQLI, integer overflows, format string ...
SaaS - Security as a Secondthought Jeremy Stott Software as a service companies move so fast that they sometimes forget about the security ...
The C word: What the coronavirus pandemic can teach us about cyber security incidents WHO: IZZI Izzi For a long time, we thought the great virus outbreak of our age would be ...
Modern SecOps should be SIEMple Asjad Athick This session explores how security teams can modernise and simplify their SIEM capabilities to tackle ...
Locking down NZ COVID Tracer Patrick Hindmarsh By now most people will know NZ COVID Tracer, the app designed by the Ministry ...
Security as a product - A different way of approaching building scalable security. systems and a progressive security culture within an organisation. Kandice Mclean As businesses grow, the traditional model of dedicated security professionals. working directly with Developers and ...
Getting Razer Burns from Android Phone-ies Kento On a lazy afternoon, I came across a Tweet that caught my attention. It was ...
Lockdowns, Writing and Kid Wrangling: How I Changed to Security Denise What do you get when you combine a global pandemic, loss of clients and doing ...
Help us help you be taken more seriously Anitsirk Monster Security researchers contact organisations letting them know of potential vulnerabilities. Have you ever wondered why ...
Trust Me (and my IOC's), I'm from the Government Mike Yargs The National Cyber Security Centre have joined the Threat Intelligence game through Malware Free Networks*. ...
The state of fuzzing in open source software Douglas Bagnall Fuzzing means giving software random input to see what makes it crash. But piping /dev/urandom ...
Making threat modelling easy and scalable using STRIDE Tarun Do you think it sucks to do threat modelling and risk assessments every time you ...
Nuget, Dependency confusion and you Nf Dependency confusion seems to be in the headlines this year…well if you are using NPM. ...
Hardware hacking without breaking stuff Ben Knight Hardware hacking doesn’t always have to be scary and destructive. What if you’re not confident ...
Application Security and Cheese Steve Esler Everyone loves cheese right? This talk will apply the swiss cheese model to Application Security, ...
From Bits to Burnouts - Practical Vehicle Reverse-Engineering Doi I like tuning engines. Manufacturers do not want to facilitate this. The solution? A standalone ...
Farewell Crüe N/A