Tutorials day 01
15 Sep
Tutorials day 02
16 Sep
Conference Day 01
17 Sep
Conference Day 02
18 Sep
9:00am
Part 1: Linux Privilege Escalation (AT CAPACITY)
Lukasz Gogolkiewicz // Troy Defty
Stream 4
1:30pm
Attacks on GSM-alarms, smart homes, and smartwatches for kids (AT CAPACITY)
Stream 2
Conducting Cyber Tabletops: A Practical Guide on How to Develop a Scenario Exercise
Ben Di Marco // Stefanie Luhrs // Darren Hopkins
Stream 3
Getting to "Yes": Influence and how to get it (AT CAPACITY)
Dr Mark Carey-Smith // Alex Webling
Stream 4
5:30pm
End of PM Tutorials
Virtual platform
9:00am
Social Engineering - Practical Lessons from the Field ** Join the Red Team **! (AT CAPACITY)
Stream 2
Analysing and reverse engineering the most common exploits in the wild (AT CAPACITY)
Negar Shabab // Noushin Shabab
Stream 3
Part 2: Linux Privilege Escalation (AT CAPACITY)
Lukasz Gogolkiewicz // Troy Defty
Stream 5
1:30pm
6:30pm
9:00am
9:20am
The woman who launched the hacker conference. Connecting people across borders.
Plenary
10:00am
10:40am
The Sea Change - How 2020 changed the data security and privacy risks landscape
Stefanie Luhrs // Ben Di Marco
Stream 1
Other People’s Platforms: Defeating Online Fraud Outside Your Virtual Jurisdiction
Stream 4
11:20am
"Sworn to protect a world that hates & fears them" - Australia's first Information Security Regulator
Anthony Corso // Laurencia Dimelow
Stream 1
Australian Red Cross Blood Service data breach case study
Stream 2
Environmental Cyber-Terrorism: Climate change inspired Hacktivism against the aviation industry
Stream 3
12:30pm
Using data and machine learning to improve your phishing resilience and education program
Stream 1
Kryptonite: What is it to Indigenous ICT security diversity and inclusion?
Stream 2
Managing technical security teams: desperation, deadlines, and desk flips
Stream 3
1:10pm
Cybersecurity in Education: Threats, Challenges and Opportunity!
Billy Hunter // Goran Mitrovic
Stream 2
Zero to P0wn3d & no 0Days - a Critical Infrastructure Red Team Case Study
Stream 3
The Insider’s Motive - The Threat Landscape in a Pandemic
Damian Skeeles // Nick Forster
Stream 4
1:50pm
How To Prepare Your Small To Mid-Sized Business For A Data Breach On A Budget
Stream 3
Essential ACSC Controls – Protecting against PowerShell attacks and malicious insiders
Stream 4
2:45pm
3:20pm
3:40pm
Securing our communities – introducing CCX Digger, a new tool for detecting evidence of compromise by a foreign APT
Jay Banerji // Dr Mike Cohen // Nick Klein
Plenary
9:00am
9:05am
9:45am
10:05am
Morning Tea
10:20am
Not Just Another Acronym - IAST: a modern approach to application security testing
Stream 4
11:00am
11:40am
Achieving Least Privileged Access for your Structured and Unstructured Data Systems
Stream 4
12:20pm
Lunch
12:50pm
Cyber Exposure & Risk Mitigation: a Regional Bank Perspective
Stream 1
1:30pm
Summon the information heroes: Architecture, Governance and Security to bring evil info foes to justice!
Stream 1
2:10pm
Afternoon tea
2:25pm
Speed Debate
Plenary
3:25pm
Closing remarks: AusCERT
Plenary