ComfyCon AU, November 2022

The line-up

30,000 Years of Longing - Explorations of Human Desire and Technological Yearning

What started out as casual bantering in the ComfyCon AU Discord server regarding the lack of submissions in the field of teledildonics has led one of the community members on a side quest.

Read More

A Comfy Introduction to Amateur Radio

Amateur radio is one of those things that most are vaguely aware of as well as totally clueless about.

Read More

Applying First Nations Philosophy to Cyber Security Strategies.

My aim is to clearly apply three elements of Indigenous philosophy and how it corresponds with what is needed for a strong, robust, cyber security strategy.

Read More

Code Graphology: How to study an exploit to identify developer habits and discover more

Writing exploits is a complex task that requires some experience to build a reliable proof of concept (POC).

Read More

Cyber Startup 101

Australia needs tech startups more than ever right now, and cybersecurity is vital to our national security.

Read More

Cyborg Security: The implications of human IoT devices

So you’re thinking about becoming a cyborg. It may or may not surprise you to learn that there are several of us around already, and while cybernetic enhancement can greatly improve our lives, it also has its downsides.

Read More

Decoding infrastructure as code security

When was the last time you racked a server or installed a network switch?

Read More

DIY Threat Hunting Program

I’ve seen countless posts on hunt forums from new practitioners asking how to establish a hunt program, with minimal useful published material floating around to send them in response.

Read More

Hack your (people) networks: Applying Red and Blue teaming to your career

This talk will bring familiar elements of approaches to Cyber Security, and attempt to view through the lens of your professional networks.

Read More

How to prevent women joining cyber, and keep other underrepresented identities out too (satire)

After a decade of work, feminists and pragmatists have increased the percentage of women in cyber from 11% to 24%.

Read More

Inside the mind of a con artist

Kristine Sihto has been making art for cybersecurity conferences since 2017 and doesn’t plan on stopping any time soon.

Read More

Lawyer up! How to translate tech speak to business speak

One of the highly valued skills in the cyber industry is the ability to effectively convey technical concepts and risks to non-technical stakeholders.

Read More

Technical development for people from non technical backgrounds (application/product security focus)

My career started in the User Experience space, I then moved into project management and scrum master roles then into security consulting and I am now fortunate enough to work in the product security space which has been my goal for some time.

Read More

The ISO on the cake: insights into getting 27001 certification

With an increasing focus on supply chains, getting those security certifications has never been more important for product companies.

Read More

Why You're (Probably) Doing CTI Wrong - And So Am I, Volume 1

Building a credible CTI capability is hard. No matter how you approach it, there’ll always be someone telling you that you’re doing it wrong because you’re not doing it their way.

Read More

Women's Stories from the Tech Trenches v2.0

In 2019, Jess presented about women’s stories from the tech trenches.

Read More

XFS Deleted File Recovery

Unlike EXT file systems, substantial residue remains when files are deleted from an XFS file system.

Read More