08:00 AM - 08:45 AM


Ticket and merch collection at the front desk, ready for keynote at 0900. Pre-paid coffee for all attendees courtesy of Equate Technologies.

Sponsor: Equate Technologies

08:45 AM - 09:00 AM

Welcome to BSides Brisbane 2020

What an interesting year 2020 has been. Welcome back to those who return, and hello to those of which this is your first BSides.

Speaker: Bruce Large

09:00 AM - 10:00 AM

Collaboration - the secret of criminal success

Join Brian Hay (former Operational Commander, Fraud and Cyber Crime, QPS), Ret. Lt Colonel Bill Hagestad II (expert in Chinese Cyber Espionage), and Professor Jonathan Rusch (former US Dept of Justice and Chair of the Presidential Identity Theft Committee and Chair of the International Mass Marketing Fraud Working Group), for our keynote presentation on the secret of criminal success.

Presenters: Brian Hay, Ret. Lt Colonel Bill Hagestad II, Professor Jonathan Rusch

10:00 AM - 10:45 AM

Importance of Threat Modeling in ICS

Threat modeling in digital space, finds its roots in 1970s, and since then it has matured in to well known frameworks such as STRIDE, PASTA, CVSS, attack trees and more. During this session, Bhojraj will explore ways to make it easier for OT operators and security professionals to priortise threat modeling activities to identify threats and vulnerabilities proactively.

Presenter: Bhojraj Parmar (Mandiant)

10:45 AM - 11:00 AM

Morning Tea Break

Short bio and refreshments break.

11:00 AM - 11:45 AM

Quick wins or great losses; preventing and preparing for incident response

Luke will showcase some "quick wins" businesses of all sizes can implement to harden their environments against attackers and to better prepare for investigation should compromise occur. These recommendations are drawn from front-line experience, and come complete with real world examples to demonstrate why you should consider implementing them today.

Presenter: Luke Pearson (Mandiant)

11:45 AM - 12:30 PM

The Gap in Australia's Defence

Between the work of Intelligence Services and the Defence Force, can Australia be considered secure? We all know the answer is no, but what can we do about that? Let's start a discussion that addresses this problem.

Presenter: John Powell (Telstra Purple)

12:30 PM - 13:30 PM

Lunch Break

An hour to run around, stretch the legs, and grab a snack from nearby food venues.

13:30 PM - 14:15 PM

From the vest to the flak jacket: How cyber security architecture and architects need to support SecOps

In this presentation Bruce will share his understanding and thoughts regarding cyber security architecture and how architects need to support security operations to secure their environments. As a security architect with operational support experience Bruce will discuss how to do the right things and how to do things right. This session will discuss concepts from SABSA and System Engineering and how to integrate them with current security standards and control frameworks. This session will also touch on how we can better develop the relationships between security architecture and security operations.

Presenter: Bruce Large

14:15 PM - 14:45 PM

Researching Critical Infrastructure Security

This talk will overview what comprises a control system, the journey of building a research environment for control systems security in the ACSC and concludes with a brief summary of the ongoing priority of control system security for Australian Government.

Presenter: Kylie McDevitt

14:45 PM - 15:15 PM

Scaled security from scratch for a global startup

Many security professionals start our careers in large organisations. Whether it's a bank, the government, or a telco, most of these businesses have well established and resourced security functions. But joining a startup can be a very different environment, especially as the first security hire.

As a Staff Security Engineer at, Cole is managing both organisational risk as well as technical controls across the company. This talk will discuss what you need to consider when joining a small organisation (especially technology companies) as a team of one, and his lessons from implementing these practices at

Presenter: Cole Cornford (

15:15 AM - 15:30 PM

Afternoon Tea Break

Short bio and refreshments break.

15:30 PM - 16:15 PM

Bug Bounties - What really makes a successful hunter?

Plenty of people have taken this on - why re-cover old ground? For Michael, this is largely because he feels the advice offered is often misguided, and too focussed on "you should hunt for this technical bugclass", or, "you should do recon with xyz datasource", or even"you should start out with kudos". He doesn't believe any of this advice is necessarily bad, but also believes it may set people on a path to missing the fundamentals of what makes a truly good bug hunter. The intention of this presentation is to correct those ideas, in some small way.

Presenter: Michael Skelton (Bugcrowd)

16:15 PM - 16:45 PM

WTF is running on your network?

This talk will cover some of the realised risks from 3rd party software components, the need for software component transparency, and what you can do about it today to enhance your security posture.

Presenter: Patrick Dwyer

16:45 PM - 17:30 PM

BGP hijacking and secure internet routing

BGP mishaps are very common and frighteningly very easy – malicious route hijacking, mis-origination (fat fingers), and route leaks (bad filters). We need better mechanism(s) to ensure no one can inject false information into the global routing system that easily. Warren will use this presentation to look at current tools/techniques, how RPKI is just a piece in the puzzle, and what we should all do to secure Internet routing.

Presenter: Warren Finch, Tashi Phuntsho (APNIC)

17:30 PM - 17:45 PM

CTF close out and prizes

Jake (Nomad) will present the CTF winners for this year with prizes as donated by


17:45 PM - 18:00 PM

Conference close out and thank you

Close out and thank you for a fantastic event. Details of the after party to be provided.

Speaker: Bruce Large, Josh, Brodie