The line-up
30,000 Years of Longing - Explorations of Human Desire and Technological Yearning
What started out as casual bantering in the ComfyCon AU Discord server regarding the lack of submissions in the field of teledildonics has led one of the community members on a side quest.
Read MoreA Comfy Introduction to Amateur Radio
Amateur radio is one of those things that most are vaguely aware of as well as totally clueless about.
Read MoreApplying First Nations Philosophy to Cyber Security Strategies.
My aim is to clearly apply three elements of Indigenous philosophy and how it corresponds with what is needed for a strong, robust, cyber security strategy.
Read MoreCode Graphology: How to study an exploit to identify developer habits and discover more
Writing exploits is a complex task that requires some experience to build a reliable proof of concept (POC).
Read MoreCyber Startup 101
Australia needs tech startups more than ever right now, and cybersecurity is vital to our national security.
Read MoreCyborg Security: The implications of human IoT devices
So you’re thinking about becoming a cyborg. It may or may not surprise you to learn that there are several of us around already, and while cybernetic enhancement can greatly improve our lives, it also has its downsides.
Read MoreDecoding infrastructure as code security
When was the last time you racked a server or installed a network switch?
Read MoreDIY Threat Hunting Program
I’ve seen countless posts on hunt forums from new practitioners asking how to establish a hunt program, with minimal useful published material floating around to send them in response.
Read MoreHack your (people) networks: Applying Red and Blue teaming to your career
This talk will bring familiar elements of approaches to Cyber Security, and attempt to view through the lens of your professional networks.
Read MoreHow to prevent women joining cyber, and keep other underrepresented identities out too (satire)
After a decade of work, feminists and pragmatists have increased the percentage of women in cyber from 11% to 24%.
Read MoreInside the mind of a con artist
Kristine Sihto has been making art for cybersecurity conferences since 2017 and doesn’t plan on stopping any time soon.
Read MoreLawyer up! How to translate tech speak to business speak
One of the highly valued skills in the cyber industry is the ability to effectively convey technical concepts and risks to non-technical stakeholders.
Read MoreTechnical development for people from non technical backgrounds (application/product security focus)
My career started in the User Experience space, I then moved into project management and scrum master roles then into security consulting and I am now fortunate enough to work in the product security space which has been my goal for some time.
Read MoreThe ISO on the cake: insights into getting 27001 certification
With an increasing focus on supply chains, getting those security certifications has never been more important for product companies.
Read MoreWhy You're (Probably) Doing CTI Wrong - And So Am I, Volume 1
Building a credible CTI capability is hard. No matter how you approach it, there’ll always be someone telling you that you’re doing it wrong because you’re not doing it their way.
Read MoreWomen's Stories from the Tech Trenches v2.0
In 2019, Jess presented about women’s stories from the tech trenches.
Read MoreXFS Deleted File Recovery
Unlike EXT file systems, substantial residue remains when files are deleted from an XFS file system.
Read More