Event Details
Saturday, 13th July 2024
Time left:
Schedule
This year we will be putting on two separate tracks of content across the day. Each session and track can be viewed below. More details available by hovering over the talk title.
Please note this schedule is still in a draft state and is subject to change.
Track 1 Sessions
Time | Speaker | Talk Title | Duration |
---|---|---|---|
08:00 | Doors and Check In Open | All day | |
08:45 | Josh & Brodie | Welcome to BSides Brisbane 2024 | 15 mins |
09:00 | Cristina Cifuentes | Keynote: From Student of Compilation to Mother of Decompilation -- 30 years edition In this keynote presentation, Cristina will give a retrospective on her decompilation PhD work, the growing interest on this technology throughout the past three decades, examples of commercial uses of decompilation, and conclude with an application of decompilation to develop a malware analysis tool. | 60 mins |
10:00 | Brendan Scarvell | Hacking the Netcomm NF20MESH Router ..again This presentation follows on from research performed on the Netcomm NF20 Mesh router presented at BSides Brisbane 2023. Brendan will walk through the methodology used to identify the vendor's fixes for the previous vulnerabilities, and how a bypass was identified which resulted in unauthenticated remote code execution. | 30 mins |
10:30 | Morning Tea Break Grab a free coffee from the Cafe thanks to Ricki and the CyberSec People team! | 15 mins | |
10:45 | Ryan Williams | Simboxes & Scams - The Long Road to SS7 Ryan joins us to discussed the unauthorised utilisation of sim boxes (SIM banks), which are known to circumvent established telecommunication protocols, leading to substantial revenue deficits for telecom operators. These are the long-line trawlers of smishing campaigns globally and those we see arrested for sim box crime are just the tip of a very well organised and technically capable iceberg. Join Ryan, as he takes us back stage for a better look at the who, what and how of a little know global industry. | 30 mins |
11:15 | John Uhlmann | Kernel ETW is the best ETW When Microsoft introduced Kernel Patch Protection, security vendors were constrained in their ability to monitor the kernel. Given the limited number of kernel extension points provided by Microsoft they were increasingly compelled to rely on asynchronous Event Tracing for Windows (ETW) events for after-the-fact visibility of kernel actions on behalf of malware. Given this reliance, the documentation of these telemetry sources is unfortunately somewhat sparse. To compensate I’ve needed to write or modify tools to overcome these limitations and uncover useful ETW events. With a focus on kernel telemetry, this talk will cover this multi-year journey and my open-source contributions to making ETW knowledge more accessible for security practitioners. | 45 mins |
12:00 | Lunch Time Break A number of lunch options are open around the campus. | 60 mins | |
13:00 | Cameron Fairbairn | From Past to Present: The Evolution of Command and Control During this presentation, Cameron will explore the evolution of Command and Control (C2) traffic in cybersecurity through the lens of the MITRE ATT&CK framework and the evolution of adversary techniques. Attendees will gain insights into the historical context, current strategies, and how understanding the MITRE ATT&CK framework enhances our ability to identify and mitigate C2 traffic, equipping them with a deeper understanding of this critical cybersecurity topic. | 45 mins |
13:45 | Warren James | Detection Engineering, the why's, what's and how it fits into the bigger picture What is detection engineering and why should I care? Ever wonder how those SOC alerts are created? This session will look into the topic of detection engineering, what it is comprised of and how it fits into the cyber landscape. Take a look at the basics of detection engineering and then follow a worked example from creation through to adversary simulation to production deployment. | 60 mins |
14:45 | Andy Yang | A Journey from Pentest to Red Team Operation The increasing recognition of the effectiveness of red teaming in mitigating security vulnerabilities and building resilience has led to a trend towards it in cybersecurity. This presentation provides a comprehensive exploration of the transition from traditional penetration testing to advanced Red Team Operations. It will offer insights to cybersecurity professionals who wish to move into the red team space and teach them how to prepare for the career path. The real-world story will also tell you how to build your red team capability. | 45 mins |
15:30 | Afternoon Tea Break Don't forget to hydrate! | 15 mins | |
15:45 | Jess 'GirlGerms' Dodson | When it SIEMs like you're doing it all wrong… Are you a blue-teamer? Do you see yourself as working in SecOps or being a security analyst or engineer? Do you spend a lot of time in your SIEM and assorted security tools? Do you often think that you could be doing things better... or that your tools could be doing things better? If you answered yes to any of the above, this is the talk for you. | 45 mins |
16:30 | Kaif Ahsan & Kumar Soorya | Live Hacking Marathon: Breaking The Supply Chain Kaif and Soorya will be playing the characters of two hackers who are out to make a quick buck. They will perform 3 exploit demos on a fictional company "Everything Cyber", who’s supply chain is everything but secure. They will showcase how from a vulnerable open source library, to dependency confusion attacks, to misconfigured build pipelines, an attacker can compromise an application and gain access to the underlying environments infrastructure and production secrets. Each of the demos is representative of a type of supply chain attack and is inspired by real-life incidents. | 60 mins |
17:30 | nomad | CTF Close Out Final results presented for the CTF. | 15 mins |
17:45 | Brodie & Josh | Conference Close Out | 15 mins |
Track 2 Sessions
Time | Speaker | Talk Title | Duration |
---|---|---|---|
08:00 | |||
08:45 | |||
09:00 | |||
10:00 | Kelsey-Lee Stay | There's a 'U' in security team Viewing everyone in the organisation as part of the security team is one of the most important approaches we can take in mitigating security risks. | 30 mins |
10:30 | Morning Tea Break Grab a free coffee from the Cafe thanks to Ricki and the CyberSec People team! | 15 mins | |
10:45 | Jim Burger | Is the future really "passwordless"? Exploring WebAuthN and Passkeys In this presentation, we'll take a down-to-earth exploration of the concept of a "passwordless" future, focusing on the practical realities of technologies like WebAuthN and passkeys. We'll discuss the motivations behind moving away from traditional passwords and the potential benefits for both users and organizations. Through a balanced examination of the strengths and limitations of WebAuthn and passkeys, we'll aim to provide a clearer understanding of whether a passwordless future is achievable and what challenges lie ahead. | 45 mins |
11:30 | Ben Gittins | Getting Comfortable in the Grey: an argument for generalists in cyber security This talk seeks to examine the unique advantages of teams of security generalists working alongside those of specialists. It will take attendees on a journey following the lifecycle and processes of generalist teams. It aims to promote an industry made up of people with diverse and unique backgrounds. | 30 mins |
12:00 | Lunch Time Break A number of lunch options are open around the campus. | 60 mins | |
13:00 | Cole Cornford | AppSec Tales and Fails Cole will tell tales about heroes and villains in the appsec discipline. Anyone who has worked in the space will see these people in their everyday roles. This talk is equal parts narrative and fun, as well as practical lessons so that you too don't fall into these tropes! | 30 mins |
13:30 | Nick Young | Cyber Security Strategy: A 3 Step Guide Cyber Security Strategy exists as the lesser-known sibling of red/blue team, GRC, and architecture. This session aims to simplify the process of building a security strategy by outlining a methodical approach to crafting a cyber security strategy in three straightforward steps. | 30 mins |
14:00 | Bec Caldwell | Ecosystems of Safety: Pollen, Perspectives, and Predicting Cyber Threats This talk explores the diversity of risk in decision-making through a case study of an urban planning error that led to health issues for residents due to a lack of diversity. The same principle applies to cybersecurity, where a homogeneous approach can lead to vulnerabilities. The session emphasises the importance of diverse experiences and backgrounds in strengthening our security landscape. Just as a single type of tree caused city-wide health issues, a lack of diversity in cybersecurity can expose us to risks. Understanding how diversity can fortify the human aspect of security is key to improving security awareness. | 30 mins |
14:30 | Paul McCarty | The "Holy Trinity" of Offensive Security Practices: How bug bounty, penetration testing and red teaming can work together to deliver security "Nirvana" for your organisation Offensive security, a proactive approach to identifying IT vulnerabilities, involves different ways to essentially "hack yourself". Offensive security is becoming more prevalent as cyberattacks increase and organizations look for ways to stay ahead of the bad guys. It includes three major practices: penetration testing, bug bounty programs, and red teaming. Penetration testing uncovers vulnerabilities in a system over a set period, while red teaming emulates real-world attacks on specific systems. Bug bounty programs involve external researchers identifying vulnerabilities for cash rewards. These three practices, can be leveraged by organizations together to deliver some really amazing results. When done right, I call this ecosystem the "holy trinity of offensive security," as it provides valuable insights and help secure systems against potential threats. | 30 mins |
15:00 | Kristine Sihto | Clash of the Jargon - Simplify for understanding Jargon. It's bad. And it's everywhere. Not just cybersecurity - every sector, every industry, every business has its own brand of jargon. And sometimes, they war. Specialised terminology may be holding you back from real communication. Sometimes, cybersecurity people can't even understand other cybersecurity people! Kristine will dive into the great abyss of ever-expanding acronyms and terms and explain how to build connection with real people. | 30 mins |
15:30 | Afternoon Tea Break Don't forget to hydrate! | 15 mins | |
15:45 | Andrew Rooke | Alternative Cyber Careers - Solution and Enterprise Security Architecture Solutions and Enterprise Architecture make up two critical areas for effective cyber security control and management within an Organisation. During this presentation, Andrew will provide the audience with perspective on architecture based cyber security career pathways, their value, and why they may be of interest. | 45 mins |
16:30 | Nicole Murdoch | Where Inventors Need to Start We aim to answer the first question asked by every entrepreneur with an idea, business, invention, product, expansion plan, or start-up - where to start. | 60 mins |
Workshop Sessions
Time | Tutor | Workshop Title | Duration |
---|---|---|---|
08:00 | All day | ||
08:45 | 15 mins | ||
09:00 | Warren Finch (APNIC) | Open Lawful Intercept - Session 1a Are you interested how law enforcement and government are implementing lawful intercept technology? This hands-on tutorial is an overview of Lawful Interception, and how to deploy open-source software called OpenLI in an Internet Service Providers (ISP) network. | 90 mins |
10:30 | Break | 15 mins | |
10:45 | Warren Finch (APNIC) | Open Lawful Intercept - Session 1b Are you interested how law enforcement and government are implementing lawful intercept technology? This hands-on tutorial is an overview of Lawful Interception, and how to deploy open-source software called OpenLI in an Internet Service Providers (ISP) network. | 75 mins |
12:00 | Lunch Time Break A number of lunch options are open around the campus. | 60 mins | |
13:00 | Warren Finch (APNIC) | Security Monitoring with Wazuh - Session 1a Security is a broad topic that affects many aspects relating to end-users, applications, and infrastructure. The objective of this tutorial is to give a snapshot of one of the hands-on labs that is part of the 3- or 5-day network security workshops. On completion, you will be able to install Wazuh, the security platform that provides unified XDR and SIEM protection for endpoints and cloud workloads. | 150 mins |
15:30 | Break | 15 mins | |
15:45 | Warren Finch (APNIC) | Security Monitoring with Wazuh - Session 1b Security is a broad topic that affects many aspects relating to end-users, applications, and infrastructure. The objective of this tutorial is to give a snapshot of one of the hands-on labs that is part of the 3- or 5-day network security workshops. On completion, you will be able to install Wazuh, the security platform that provides unified XDR and SIEM protection for endpoints and cloud workloads. | 45 mins |