AUScert 2009 May 18, 2009 to May 22, 2009, Gold Coast, Australia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The PCI Security Standards Council – Standards for Today and Tomorrow Bob Russo This session will be led by PCI Security Standards Council (PCI SSC) General Manager Bob ...
Security Performance Metric Development Matthew Brunckhorst , Andrew Collins With continuing budget cuts within the Federal Government, this presentation discusses replacing fear, uncertainty and ...
Fight Cyber Crime like we mean it Andy Purdy A key element of addressing the nation's cyber risk in a strategic fashion, is to ...
Information Security Management in difficult Economic Times John Harrison On occasion, information security professionals working in large organizations feel overwhelmed or unappreciated. This may ...
Macintosh Forensics Steve Whalen , Rob Spitler This two-day hands on training covers some of the most important topics found in Forward ...
Inside the biggest of the OWASP Top-10 Kenneth van Wyk , Ken Van Wyk N/A
IPv6 Security Considerations and Deployment Cecil Goldstein This tutorial will discuss security considerations when deploying IPv6 networks. It will discuss features that ...
Assurance 'Hands On' Wireless Services Auditing Neal Wise , Oliver Greiter Assurance 'Hands On' Wireless Services Auditing The intention of the tutorial is to equip attendees ...
Collaborative Security and the Internet Paul Twomey The Internet's security will be best achieved through multi-stakeholder collaboration in increasing the capacity of ...
Oops - Defending where the Enemy Isn't Peter Gutmann The computer security industry has sometimes been compared unfavourably to the fashion industry, putting up ...
Frank Lloyd Wright was Right! Dan Klein AusCERT has been holding conferences for quite a few years, and the CERTCC was founded ...
Thoughts on the Future of Internet Security Steven M. Bellovin Internet security has been a challenge for many years. Unfortunately, the situation is getting worse: ...
Speed-debating: Topics in information security Panel First introduced at AusCERT2008, this session comprises a series of fast-paced mini-debates where mixed teams ...
R&D panel chair Paul Bailes N/A
E&T panel chair Patrick Risky.biz N/A
R&D panel Andrew White , Paul Gampe , Colin Boyd , Taher Elgamal This interactive panel session will address issues concerning Reserach and Development for Security in the ...
E&T panel Peter Gutmann , Bill Caelli , Jeff Tendero , Mark Phillips This interactive panel session will address issues concerning Education and Training for Security in the ...
R&D session Keynote Eugene Spafford N/A
Education and Training for Security in the Digital Economy Bill Caelli Just what is the difference between education and training in relation to information assurance? But, ...
Recent Online Crime Case Studies Duncan Taylor , Dan Antonio This presentation will examine a recent case study involving the investigation into a data compromise ...
Is Disaster Recovery Dead? Alex Serrano Since 2000 there has been a progressive but marked shift away from traditional disaster recovery ...
Network Traffic Analysis of Point of Sale System Compromises Ryan E. Moore In response to point of sale system data losses observed nation-wide, an investigation was initiated ...
Recent developments in DDoS attacks originating in the Russian Internet Ruslan Stoyanov , Dimitry Levashev In recent months DDoS attacks originating in the Russian Internet have attracted international attention, but ...
Consumer Safety Online - Who's responsibility is it anyway? Alastair Macgibbon Governments and businesses want consumers to do more online. And consumers have benefited enormously by ...
Security for Multi-Enterprise Taher Elgamal Multi enterprise applications are one of the best examples of the most general in terms ...
Identifying Security Risks of Smart Meters and an Advanced Metering Infrastructure Gabriel D'eustachio The adaptation of Advanced Metering Infrastructure (AMI) will greatly improve the efficiency, functionality and robustness ...
SCADA: Exposed and on the Internet Daniel Grzelak SIFT recently conducted research and developed a toolkit for testing SCADA devices enabled with the ...
Cybercrime and the Legal Dimension Nigel Phair This presentation will appeal to law enforcement officers, but will be of equal interest to ...
Security Activisim and Vigilantism Alana Maurushat The role of security activism and vigilantism is not well documented. This presentation will present ...
Apple iPhone Forensics Steve Whalen The Apple iPhone is one of the fastest selling and most widely used communication device ...
Australia - We're not that special - A look at the methods, finding and analysis of malicious activity targeting Australia in 2008 Shaun Vlassis A look at the methods and findings of tracking malicious activity targeting Australian Online Interests ...
The Building Security In Maturity Model (BSIMM) Ken Van Wyk As a discipline, software security has made great progress over the last decade. There are ...
Exercising Information Assurance Education: Testing Security Knowledge at Full Speed Joe Adams Information Assurance (IA) training is widely recognized as important, but most current efforts consist of ...
VoIP fraud: Understanding incident response that costs real money. Scott Mcintyre As the world's telecoms companies shift away from traditional technologies and move towards an all-ip ...
Virtualisation: Pitfalls in Corporate VMware Implementations Jason Edelstein By introducing a layer of abstraction between the physical hardware and virtualised systems running IT ...
Threats and security control models for centralised wireless solutions Neal Wise , Oliver Greiter Enterprise wireless technology has been shifting to a centralised provisioning and management model. There are ...
Mobile Phone Forensics - History and the Future Andrew Rourke The presentation covers the history of the development of mobile phones. It leads into how ...
RFID security Melanie Rieback The RFID Guardian Project is an initiative to put practical open-source HW/SW tools for RFID ...
Experiences with Conficker C Sinkhole Operation and Analysis John T Kristoff The Internet operations and security community has come together like never before to help thwart ...
P0wning the programmable Web Stephan Chenette , Dan Hubbard With hundreds of new mashups and web API's being released weekly, the 'web as a ...
Open source intelligence Roelof ( RT ) Temmingh N/A
Evolution of Malware observed on the Customs Gateway Matthew Brunckhorst Audience - Technical and IT management. Lessons - Understanding of how malware and attacks are ...
Manipulating the media and black SEO techniques Patrick Gray The brave new world of social media has been lauded as the best thing since ...
The Need for Customer-centric Signaling in the Software Market David Rice Poorly written, insecure software is no longer a technology issue; it is a public policy ...
The future (and past) of web application security how to detect and protect against value attacks Andrew Stock 2008 was a bumper year for value attacks. Criminals are finally getting over the sophomoric ...
Expanding the Internet: The IPv4 to IPv6 transition Cecil Goldstein The availability of a global IP addressing mechanism with adequate address space is fundamental to ...
Bots and BotNets Richard Perlotto , David Watson Live Botnet Exercise and Honeywall Monitoring: This class will be a two-in one offering. A ...
Introduction to malware reverse engineering Andrew Collins , Matthew Brunckhorst One Day practical tutorial teaching participants the basic skills involved in reverse engineering malware or ...
A Business Model for Information Security Derek Oliver Business Model for Information Security The University of Southern California's Marshall School of Business created ...
Hacking Citrix Brett Moore Citrix Insecurities (or Hacking Citrix if you prefer) Citrix. The point and click remote desktop ...
Weaponry 2.0 Petko ( pdp ) D. Petkov We live in an age of continual and increasingly rapid technological change. Whilst past hacking ...
Ghost Recon: Subverting Local Networks Berne Campbell Networks are a crucial component of information systems and businesses. This presentation demonstrates both passive ...