AusCERT 2014 May 12, 2014 to May 16, 2014, Gold Coast,Austrailia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Conference Opening Auscert N/A
Keynote presentation: We Came In Peace - They Don't Felix "fx" Lindner Nation State Actors in the so-called "cyber domain" are nothing new.But what was considered the ...
Plenary- Security in a Surveilled World Edward W. Felten Today we face an unprecedented level of surveillance, both online and offline, and traditional approaches ...
Foreign- Government Data Intercepts as Active Persistent Threat Jay Wulf The perfect storm of 'Known unknowns' and 'Unknown knowns' of the information available in the ...
BladeRunner: Adventures in Tracking Botnets Marc Eisenbarth , Jason Jones The problem of tracking botnets is not a new one, but still proves to be ...
Cybersecurity.. the final frontier. Seek out advanced threats, detonate and resolve them by developing a Next Generation security program. Rich Costanzo With 70% of malware signatures only seen once, attackers are more sophisticated and evasive than ...
Malware Whack-a-Mole: Time to change the game and speed up malware response Jay Tecksingani Time to change the game and speed up malware response You receive an email with ...
Privacy Act II (The Sequel) – Considerations for the Tech Sector Pierre Tagle Come 12 March 2014, Australia’s Privacy Amendment (Enhancing Privacy Protection) Act 2012 will take effect. ...
Microsoft Vulnerability Research: How to be a finder as a Vendor Jeremy Brown , David Seidman You may think of Microsoft as a company that fixes vulnerabilities, but we frequently find ...
Automated Technologies for Improved Security Efficiencies Peter Woollacott In this presentation Peter will eliminate some of the noise that surrounds security monitoring and ...
Incident Response lessons learnt from 100 compromises Mike Wilkinson Each day seems to bring with it reports of yet another compromise. Whether it is ...
Cyber analytics: Valuable insights or “smoke and mirrors”? Mike Cerny “Big data” and “security analytics” are buzz words grabbing the attention of business professionals and ...
User identity management from the network layer through to the application layer Mark Stuart Being able to identify users across multiple OSI layers is a great enabler for better ...
Can FIDO bring biometrics to consumers? Nick Savvides It’s been long recognised that passwords are broken in the Internet era. They don’t scale, ...
Easy Ways to Bypass Anti-Virus Systems Attila Marosi All IT security professionals know that antivirus systems can be avoided. But few of them ...
Hiding in Plain Sight: The Relationship Between Cyber Attacks and Applications. Matt Keil With recent high profile security incidents as a backdrop, this session will discuss how today’s ...
Ethics and the AV industry in the surveillance age Andrew Lee "The events of the last few years from Chelsea Manning to Edward Snowden have brought ...
Security isn't secure Steve Wilson This lively and timely talk will challenge almost every precept of orthodox information security, and ...
PC Firmware attacks, Copernicus, and You Xeno Kovah Over the past two years, MITRE researchers have been exploring PC firmware security. This has ...
Demand More: Protecting your Network with McAfee Next Generation Firewall Sean Duca A next generation firewall is not just a collection of the last generation’s answers. It ...
Cyber War, Cyber Espionage & the Law - Easy or Hard? Robert Clark This presentation examines the legal regime surrounding cyberspace operations. The analysis looks at the legal ...
Falling off a cloud: What does a Bitcoin robbery look like? Kayne Naughton Over the last year the digital currency Bitcoin has increased in value by a hundredfold ...
Pulling back the covers on credit card fraud: A detailed look at financial fraudware. Sean Richmond Credit card theft has rated highly in the information security headlines recently and for good ...
Securing your Business in a Mobile World Matt Bennett As tablets and smartphones outpace PCs as the device of choice in the enterprise, CIOs ...
FBI Case Study: The Rise and Fall of SpyEye Special Agent Track the epic journey of the SpyEye botnet's rise and fall through the eyes of ...
Information wants to be free - the collapse of the North Korean information cordon David Jorm , Olivia Maree North Korea is a famously secretive country, tightly controlling both the information coming into and ...
Whose Cloud is it Anyway? Exploring Data Security, Ownership and Control David Etue This discussion will tackle the complex issues around data ownership and control. If data is ...
Keynote- Verizon: Changing the Rules Marcus Sachs A professional gambler knows that averaged over enough time and with lots of players the ...
Plenary- Crypto Won't Save You Either Peter Gutmann Cryptographer Adi Shamir, the 'S' in RSA, once said that "cryptography is bypassed, not penetrated". ...
Eliminate tokens! Minimize risk and gain efficiencies with trusted authentication Nick Savvides While authentication solutions are necessary for confidential information security, they can be costly and time ...
Security in a Post NSA era? Stefan Schumacher Edward Snowden's NSA leaks have removed any lingering doubts about a totalitarian surveillance of the ...
Hacking The Gibson: Threats facing High Performance Computing (HPC) Solutions Neal Wise Scalable parallel computing solutions have existed for decades. And so have those who seek to ...
Network Security Metrics – Which Matter, Which Can Be Measured? Roger Whitely Successful organizations run on key metrics and IT security should be no different. But which ...
Why the Information Super Highway is just like the M1 Brian Hay Are we looking for a new security model in the wrong place? Does history have ...
Being Good Neighbours: sharing security information at home and away James Davis Sharing security intelligence is incredibly important to how Janet CSIRT works to secure the UK's ...
Open Source Enterprise Two-Factor Authentication Richard Monk , Ivan Stojmirov Open source software is now being extensively used by enterprises at the operating system, virtualization ...
Data Breach Investigations Report - Lessons Learnt John Karabin With 10 years of forensic data, Verizon’s Data Breach Investigations Report (DBIR) is an ongoing ...
Internet-Scale Security Marc Eisenbarth Arbor Networks is a member of an elite group of institutions that might be referred ...
Locking Down the Privileged Pathway Sam Ghebranious Saudi Aramco. Stuxnet. The Flame virus. Red October. Subway Restaurants. Global Payments. Utah and South ...
Should Directors be Interested in Trusting Security Jason Masters There is a perception of a disconnect between Boards and Technology and Information Security in ...
Do You Really Know Who is Doing What on Your Servers? Sean Ofir The financial costs of data breaches and system downtime can be staggering to a business, ...
Moving Towards a Non-Hierarchical Security Model Raoul Strackx Cloud services enable corporations to outsource many IT tasks. They guarantee that data is always ...
Work is no longer a destination Kieran Cook The way we do business is rapidly changing, with a greater number of organisations now ...
PCI DSS the Trilogy – Adapting Compliance Strategies to Version 3 Pierre Tagle With version 3.0 of the PCI Data Security Standard (PCI DSS) now released, companies are ...
Can you trust your security if you overlook the basics? Peter Sandilands If you read the trade press and follow the analysts you would think that security ...
Accelerate Your Security Operations With Human Guided, Machine Speed Responses to Cyber Attacks - Before, During, and After Bernie Thomas For many organizations, after knowledge of an attack comes in, it takes hours, sometimes days ...
Big Data, Big Breaches, Big Headaches Scott Mcintyre Four words guaranteed to attract attention at the moment are "big data" and "privacy breach" ...
Security Capabilities 101 – Pervasive Network Visibility Ian Farquhar Security is no longer an issue of designing a secure infrastructure, but also of monitoring ...
ICANN and Identifier SSR John Crain ICANN recently formed a new group under John’s Leadership John will talk about the role ...
Lean Hacking: How Attackers Are Doing More with Less and How to Stop Them Paul Judge Lean is a popular approach in building startups. Hackers are learning to be lean as ...
In Crypto We Trust, or do we? Dragging privacy back to the 90s Joshua Cavalier , Shawn Thompson This presentation aims to bring awareness to the progress of quantum computing with a focus ...
Identity is the New Perimeter: Real Case Studies on How to Secure your Business in the World of Cloud, Mobility and Collaboration Trevor Iverach Business demands are changing. The proliferation of mobile devices and mobile workers. The pressure for ...
Tracking and analysing security trends Matt Jones This presentation will take a look at the latest innovations in performing data-mining of social ...
Keynote presentation- Making Clever Happen Jason Fox In this insightful presentation, motivation design expert and author Dr Jason Fox will show you ...
Plenary-Security, Music, and the Three Laws of Thermodynamics Dan Klein The fight for computer security seems inexorably bound to the three laws of thermodynamics: "you ...
Actionable Big Data Tyson Garrett This presentation will discuss that in the long run prevention fails and how a greater ...
A history of database insecurity (and why the future's actually looking better) David Litchfield This presentation will take a look back at the history of database security, or rather ...
Two dimensional security thinking in a four dimensional world Peter Benson New Zealand’s leading security expert and founder of security-assessment.com Peter Benson will discuss how the ...
Cybersecurity in Healthcare Peter Nikitser Historically, the healthcare sector has not been targeted by cyber criminals. Emerging trends in the ...
Cyberoam NGFW Offers Actionable Intelligence & Controls for Future-ready Security in Enterprises Leon Friend Enterprise networks are evolving rapidly with trends like workforce mobilization, increasing number of users (employees/partners/customers) ...
Meterpreter Internals Oj Reeves Everyone has heard of Metasploit, the Open Source exploitation framework, and most have probably come ...
Incorporating Security Provisions into the New ISO/IEC Cloud SLA Standards David Ross The cloud is offering businesses opportunities like never before. All the world is rushing out ...
Weaponizing Trust Lydia Grobler Weaponizing trust is the process of using one’s knowledge of social influence and the predictability ...
Strategic Threat Intelligence Approach to e-voting in NSW 2015 election Clinton Firth NSW Electoral Commission (NSWEC) is an e-voting leader in Australia, and one of the few ...
Trusting the Wireless Network: Understanding Wireless Threats and How to Defend Against Them Mark Krischer The proliferation of mobile devices and the rise of BYOD has raised the profile of ...
Who’s Securing the Worlds Wild West (WWW) aka the ‘Fifth Domain’ or ‘Cyber Space’? Bevan Jones What is important to you? What makes it important and how do we get IT? ...
Your hypervisor is showing! Shanon Olsson As both x86 virtualization and the consumption of cloud services continue apace there is yet ...