ComfyCon AU, April 2024

Saturday 6th April

Time (UTC+11)TalkLengthSpeaker
12:00Welcome to #ComfyConAU 202400:10icd + shanna
12:15Profit from Misery00:20Aaron
12:40Retrospect Labs Competition00:10icd + shanna
12:55Influencing Security with no authority - Lessons from the field00:30Sam Hitchiner
13:30Supply Chain Security: Eating SLSA for Breakfast00:20Ben Gittins
13:55Thinking of starting your own company? Do it! But maybe listen to this first00:20Ryan Mclaren
14:20So you wanna be a freelancer?00:30Corch
14:55Break (15 minutes)00:15
15:15Embracing the power of Neurodiversity in Cybersecurity00:30Emily Holyoake
15:50Introduction to Threat modelling00:30Matt Belvedere
16:25Why Security Initiatives Are Doomed to Fail and What You Can Do About It00:30Josh Armitage
17:00What do you really need to authenticate?00:20Matt Strahan
17:25Dinner Break (30 minutes)00:30
18:00GRC is for everyone: demystifying the what, where and why of Governance, Risk & Compliance in Australia00:30Cam La
18:35To Insert, Swipe or Touch: A Credit Card Dilemma00:20Chloe Pang
19:00Biohacking wellness: physical and mental00:30Danarchi
19:35Close out and thank you00:10icd + shanna

Sunday 7th April

Time (UTC+10)TalkLengthSpeaker
12:00Welcome to #ComfyConAU 202400:10icd + shanna
12:152013-2023 in Cyber: Why are you still banging your head against a brick wall?00:30icd
12:50Securing layoffs without being an a**hole00:30Kane Narraway
13:25Backing up your tech career: building redundancy in the face of redundancy00:30Cairo
14:00Green Fields for a Green Analyst: My first 90 days in cyber, with no experience and no security program00:30RedPandaDoge
14:35Securing REST API Endpoints Against Data Leaks: Or, How to Avoid Another Optus00:20James Cooper
15:00From Pollen to Protocols: Diversifying the Landscape of Cyber Risk.00:30Bec Caldwell
15:35Break (15 minutes)00:15
15:55Know your Avatar: mods, energy drinks and the vibrant, contested world of online gaming00:30Steve Coomber
16:30ComfyCon Intermission00:10thequietlife
16:45The Bonzi Chip: The Pitfalls of Success00:30swarley and kronicd
17:20Dinner Break (30 minutes)00:30
17:55Retrospect Wrap up00:30icd + shanna + Ryan Mclaren
18:30Why Prefetch Artefacts are Like Ducks00:30Claire Carpenter
19:05Hacking Humanity: Ethical Strategies for Influence and Connection00:40Jill Taylor
19:50Close out and thank you00:10icd + shanna

The line-up

Backing up your tech career: building redundancy in the face of redundancy

Another day, another big company making layoffs. It’s terrifying isn’t it?

Read More

Biohacking wellness: physical and mental

As a casual biohacker I want to do a talk on how technology is helping in data driven insights, and how these insights can be used to optimise stress management, mental health and wellness.

Read More

ComfyCon Intermission

A run through of a weird project I found online that is ComfyCon flavoured.

Read More

Embracing the power of Neurodiversity in Cybersecurity

This talk explores the importance of fostering equity in recruitment and building a culture of inclusivity across an organisation, with a specific focus on the benefits of embracing neurodiversity in the field of cybersecurity.

Read More

From Pollen to Protocols: Diversifying the Landscape of Cyber Risk.

I’ll be exploring risk assessment and management through a rather unique lens - the urban planning blunder of a city that solely planted male trees 40 years ago, leading to widespread asthma and hayfever in its inhabitants.

Read More

GRC is for everyone: demystifying the what, where and why of Governance, Risk & Compliance in Australia

Born from a challenge to make Governance, Risk and Compliance (GRC) more interesting than watching paint dry, this talk explores the what, where, why of GRC and how as security professionals, we all can have a part to play.

Read More

Green Fields for a Green Analyst: My first 90 days in cyber, with no experience and no security program

We all hear people talking about how you need to do your part for the “skills gap” and hire new, inexperienced staff, but could a green analyst really do the job if you can’t find anyone experienced?

Read More

Hacking Humanity: Ethical Strategies for Influence and Connection

This presentation is designed to teach attendees about the ethical application of social engineering skills for creating positive outcomes in both personal and professional contexts.

Read More

Influencing Security with no authority - Lessons from the field

Navigating the ultimate challenge of influencing change to a resistant or outwardly hostile audience, practical examples and guidance for all experience levels.

Read More

Introduction to Threat modelling

Good quality penetration tests have two things; a deep understanding of the target, and an idea of a threat model - formalised or otherwise.

Read More

Know your Avatar: mods, energy drinks and the vibrant, contested world of online gaming

Overview Controversy over the potential impact of video games on users has come and gone since the first games came on to the market.

Read More

Profit from misery

Can we profit from the market’s fear from what the breach will do the company’s share price?

Read More

Securing layoffs without being an a**hole

Layoffs are hard. It’s hardest on the employees who get let go.

Read More

Securing REST API Endpoints Against Data Leaks: Or, How to Avoid Another Optus

Optus and their customers had a very bad time in 2022, with a massive data breach resulting in customer PII released into the wild.

Read More

So you wanna be a freelancer?

For the hordes of people trying to break into the cybersecurity industry, or the folks who have just managed to get a foot in the door, the idea of one day becoming an “Independent cybersecurity consultant” probably sounds pretty kick-ass.

Read More

Supply Chain Security: Eating SLSA for Breakfast

This talk dives into the SLSA framework following the journey of an organisation from 0 to 4.

Read More

The Bonzi Chip: The Pitfalls of Success

Recently the hardware modification scene for a current generation console was blown wide open.

Read More

Thinking of starting your own company? Do it! But maybe listen to this first

Having run my own cyber security startup for a few years now (since the start of 2020!

Read More

To Insert, Swipe or Touch: A Credit Card Dilemma

If you have ever bought anything with a credit or debit card (and who hasn’t?

Read More

What do you really need to authenticate?

To login to your account you need a username and password and maybe an MFA token if they feel like being secure.

Read More

Why Prefetch Artefacts are Like Ducks

This talk will provide an introductory guide to prefetch examination, focusing on potential applications for forensic analysis.

Read More

Why Security Initiatives Are Doomed to Fail and What You Can Do About It

Have you ever found that every security initiative fails despite the best of intentions?

Read More