Incident Response Fundamentals – Dealing with Attacker Evolution (Full Day)
Taz Wake
10/05/2022 9:00 am
Tutorial – Day 1
An introduction to running your own honeypot (Half Day)
Colby Prior, Rameez Agnew
Conducting Cyber Tabletops – A Practice Guide on how to deliver your own cyber risk scenario (Full Day)
Benjamin Di Marco
REsponse | Incident Response Framework, Zero to Hero (Full Day)
JP Haywood
Digital Forensics Fundamentals (Full Day)
Shanna Daly, Bex Nitert
Standard Mental Health First Aid (SMHFA) Two Day Course - Day 1
Simon Harvey
Leading Cyber Security Assurance (Full Day)
Dr Mark Carey-Smith, Alex Webling
Penetration testing of .NET client applications (Full Day)
Clinton Kerrison
10/05/2022 12:30 pm
10/05/2022 1:30 pm
Introduction to threat modelling (Half Day)
Edward Farrell, Elias Ennebt
Threat Hunting an APT (Half Day)
James Young, Simon O'Brien
11/05/2022 9:00 am
Tutorial – Day 2
Cyber Security Risk Management (Full Day)
Gary Gaskell
Social Engineering - Practical Red Teaming Lessons from the Field ** Join the Red Team **! (Full Day)
Chris Gatford, Jesse Keen
Design Thinking for Cybersecurity: How to Engage Disengaged Employees (Full Day)
Ivano Bongiovanni
Standard Mental Health First Aid (SMHFA) Two Day Course - Day 2
Modern Threat Hunting (Full Day)
Vicente Diaz
11/05/2022 12:30 pm
Digging Deeper with Velociraptor (Half Day)
Dr Michael Cohen, Matt Green
11/05/2022 1:30 pm
Welcome Reception
11/05/2022 5:00 pm
Opening Remarks
Adam Spencer
12/05/2022 9:00 am
Conference – Day 1
One Small Act
Kath Koschel
12/05/2022 9:20 am
Lessons learned from LAPSUS$
Brett Winterford
12/05/2022 10:00 am
12/05/2022 10:20 am
Leadership through chaos
Brian Hay
12/05/2022 10:50 am
Vulnerability Reporting Program on a Shoestring Budget
Jamie Gillespie
The Continuing Criminal Enterprise
Alex Tilley
I can see you! - Improving detection efficiency on the endpoint…
Dr Michael Cohen
Ransomware - The Technical Debt Collector
Chris Gatford
12/05/2022 11:35 am
Helping secure customers by disclosing more
Kyle Jackson
The Australian Data Privacy Act: Big Changes Are on The Way! Yet 70% of Organisations Still Don’t Know Where Their Data Resides
Chris Allen, Stephen Cavey
Rethinking training & Certification: Experiences from the front line
Edward Farrell
12/05/2022 12:15 pm
A practical approach to implementing the ACSC Strategies to Mitigate Cyber Security Incidents using risk management
Ian Kennedy
12/05/2022 1:15 pm
Building a fake company for threat intelligence
Colby Prior
Rethink your Identity Strategy in the Modern Era
Jonathan Neal
Rethinking Your Capabilities: How Imposter Syndrome Might Be Impacting You
Managing privacy risks proactively: what can we learn from Privacy by Design Award winners?
David Batch
12/05/2022 2:00 pm
Decoding "Zero Trust" - what does it actually *mean*?
Jess Dodson
What the bad guys are looking for: Cloud Misconfigurations
Ken Mizota
Applying Indigenous (Australian) Philosophy to Cyber Security Strategies
Jasmine Woolley
Can you still get cyber insurance? Should you? What you need to know about the market
Benjamin Di Marco, David Rudduck
12/05/2022 2:45 pm
Pwning Compromised Passwords with the FBI and NCA
Troy Hunt
Loki’s Guide to Rethinking Security & Chasing His Tail
Dave Lewis
Running Linux in a Windows World: Neurodiversity as Infosec's Magic Bullet
Steph Jensen
12/05/2022 3:25 pm
Beyond the Breach: From Legacy to Zero Trust
Liz West
12/05/2022 3:55 pm
From Threat Hunting to Actionable Threat Intel
12/05/2022 4:15 pm
The integrated security model: Security beyond just cyber
David Fairman
12/05/2022 4:35 pm
Birds of a Feather sessions
12/05/2022 5:00 pm
Pre-dinner drinks - AUSCERT2022 Gala Dinner
12/05/2022 6:30 pm
13/05/2022 9:00 am
Conference – Day 2
Uncovering the Invisible World of ICS Cybersecurity
Lesley Carhart
13/05/2022 9:05 am
Finishing your Essential 8 program: Being successful with allowlisting
Josh Schwarz
13/05/2022 9:45 am
13/05/2022 10:05 am
The Illicit Economy and Outsourced Crime Providers
Bex Nitert
13/05/2022 10:35 am
Application Security Posture Throughout DevOps Cycle and Rapid Innovation
Stephen Gillies
SecOPS best practices for thwarting Software Supply Chain attacks
Deepak Naik
Transforming into a data-centric and secure organisation
Sasenka Abeysooriya
Using machine learning, computer vision and text mining to detect and understand the online trafficking of human remains
Damien Huffer
13/05/2022 11:20 am
Lean approach to device posture check – A journey towards zero trust
Dushyant Sattiraju
5 ways to optimize your SOC
Jamie Zajac
Demand side cyber security threats to Australia’s renewable energy transformation
Dave Bradshaw
Cybercrime fighting 2022 - the reboot
Mandy Turner
13/05/2022 12:05 pm
log4shell: a brief history of java deserialization vectors
David Jorm
The hallmarks of a high-performing SOC
Mickey Perre
How to build your Medical Device Security Program
Simon Cowley
13/05/2022 12:45 pm
Software is your colleague: A new perspective for developers to reduce the attack surface
Pieter Danhieux
13/05/2022 1:45 pm
Securing the Games: a Cybersecurity Journey to Brisbane 2032
The Age Of Cyber Resilience: Preparing Your Business For The Unknown
Ryan Hosken
Overcoming cognitive bias
Shanna Daly
Pandemic polemic
Eric Pinkerton
13/05/2022 2:30 pm
Attacked - By Threat Actors and The Media
Anthony Caruana, Chris Gatford
True or false positives? Introducing the WAF efficacy framework
Mandy Scott
No. Ostriches are not great strategists!
Virginia Calegare
13/05/2022 3:10 pm
Speed Debate
13/05/2022 3:45 pm
Closing Remarks
13/05/2022 4:45 pm