ComfyCon AU 2020 Winter
Access your social media archives!
You can download archives of a lot of your history on social media sites as a result of the GDPR requirements being brought into play.
Read MoreAn Introduction to Drone Security
Drones are literally flying laptops. There are a lot of attack vectors that exist but also a number of key things you need to be aware of in the physical and kinetic space; it’s no longer a case of simply compromisable IoT.
Read MoreAutomating the Boring
Cyber is schmick! It’s pretty! It lets me hunt down bad guys and nuke ’em from orbit!
Read MoreCode that gets you pwn(s|'d)
In this talk, Louis will cover examples of vulnerabilities that are not necessarily obvious.
Read MoreCV Workshop
Ricki runs through his top tips for developing a CV, what you should and shouldn’t do, and what industry hiring representatives look for.
Read MoreDependencies: Barely Managing
Colloquially, infosec and developers don’t share a unified definition for concepts like “dependency management”.
Read MoreDigging Deeper with Velociraptor - DFIR Beast Mode…
The old way of performing in-depth forensic analysis and incident response with your existing tools is clearly not adequate or scalable to many endpoints.
Read MoreDisclose.io - Vulnerability Disclosure and Hacker Safeharbor in 2020
After 40 years of hard-fought battles, the Internet has finally reached a place where it knows that hackers aren’t always burglars… Many of us are locksmiths.
Read MoreFireside chat with Tilley
Interesting stories and insights into the world of cybercrime from someone with a unique understanding from a long history.
Read MoreGood Incident Response; More Than Just Tech Stuff
Looking back at some of of the previous Incident Response operations he led, Ryan will give an overview into some of the critical functions and skills required of Incident Response personnel.
Read MoreHanging on the Telephone: Hacking VoIP
Before security, Sarah spent a decent amount of her career deploying VoIP systems.
Read MoreHow to Fight a Virus with a Spreadsheet
Reporting is an important part of Infosec but reports often get ignored.
Read MoreHow to keep kickass women in tech - take a lesson from snowboarding
What’s the point of hiring kickass women if you don’t have an environment that supports their growth and desire to stay with your company?
Read MoreHow to sort your sabotage plans
There’s a lot of work in maintaining documentation for systems to ensure they are effective for use by someone other than the creator.
Read MoreIntroduction to Lockpicking
An introduction to Lockpicking from some of the youngest members of our community!
Read MoreIs there anyone on board who can fly a DevSecOps plane?!
We are three years into our Enterprise Secure Code program, and last year we embarked on DevSecOps at scale.
Read MoreLies, Deception and Fantasy
We, the defenders, play in a highly adversarial game. The game is played in the open and the rules require us to hand our adversaries all the information required to defeat us.
Read MoreMeditation for Crisis Professionals
For both crisis professionals and professionals in crisis, this session examines the effects of long term stressors, and provides a practical framework on how to manage them.
Read MoreOSINT, A learning journey
OSINT is any sort of intelligence gained through any publicly available source.
Read MoreOvercoming Cyber Performance Anxiety: The Continuous Cyber Maturity Model
Unending data breaches, outages and compromises can leave security senior leadership with “cyber performance anxiety” and organisations asking the question; does our security program REALLY deliver the outcomes we need?
Read MorePwnagotchi your new digital pet!
Do you remember Tamagotchi? Learn about Pwnagotchi your open source, digital pet based on Raspberry Pi Zero W.
Read MoreSecurity at the speed of DevOps
Today, Speed to market is everything. But speed and security can both be achieved at the same time.
Read MoreThe CIA Triad: Staying Sane in Crazy Times
We’re all familiar with the CIA triad since it’s the model that is used to guide policies for information security in an organisational setting.
Read MoreThings to do with a Faraday Cage
I recently bought a commercial desktop Faraday Cage/Box. It has USB, POE, and SMA pass through.
Read MoreUsing Interlace for organising tests, and multithreading over targets
A quick primer on how Interlace can be used for “on the fly” pentesting or bug bounty tests over large targets, CIDR or glob ranges as well as useful tricks for how it can be deployed to organise and store the results of tests.
Read MoreVulnerability research as a lifestyle
Have you been on twitter recently and seen tweets about people finding vulnerabilities in <insert_software_name_here>?
Read MoreWhy you should go get it…
This talk is about why people should back themselves and go out on their own, start a company, build things that they want to build, work for people they want to work with.
Read MoreZero Trust ... it is not just about infrastructure
Zero Trust is probably the most overused buzzword in the industry, and probably the least understood.
Read More