/
|
AusCERT logo.jpg
|
22.1 KB
|
AusCERT thank you.txt
|
0.8 KB
|
/AusCERT 2016/
|
Andrew Jamieson, UL IOT Security - It's in the Stars.eng.srt
|
85.4 KB
|
Andrew Jamieson, UL IOT Security - It's in the Stars.mp4
|
128.8 MB
|
Ashley Deuble, Griffith University The 6 stages of incident response.eng.srt
|
84.4 KB
|
Ashley Deuble, Griffith University The 6 stages of incident response.mp4
|
132.7 MB
|
AusCERT2016 GALA DINNER.eng.srt
|
75.3 KB
|
AusCERT2016 GALA DINNER.mp4
|
200.5 MB
|
Chris Horsley, Cosive Maturing your security team - haste makes waste.mp4
|
150.6 MB
|
David Lacey, iDcare Identity Aftermath.eng.srt
|
67.8 KB
|
David Lacey, iDcare Identity Aftermath.mp4
|
100.1 MB
|
David Litchfield, Google Hackproofing Oracle eBusiness Suite.eng.srt
|
86.5 KB
|
David Litchfield, Google Hackproofing Oracle eBusiness Suite.mp4
|
110.9 MB
|
Edward Farrell, Mercury Information Security Services.eng.srt
|
78.7 KB
|
Edward Farrell, Mercury Information Security Services.mp4
|
115.7 MB
|
Eric Johansen, FireMon Security Analytics for Data Discovery.eng.srt
|
58.1 KB
|
Eric Johansen, FireMon Security Analytics for Data Discovery.mp4
|
77.2 MB
|
Farah Magrabi, Macquarie University.eng.srt
|
85.2 KB
|
Farah Magrabi, Macquarie University.mp4
|
108.9 MB
|
Fatih Ozavci, Context Information Security Hardware Hacking Chronicles.eng.srt
|
85.1 KB
|
Fatih Ozavci, Context Information Security Hardware Hacking Chronicles.mp4
|
135.1 MB
|
Fraser Tweedale, Red Hat Network-bound encryption with Tang and Clevis.eng.srt
|
97.8 KB
|
Fraser Tweedale, Red Hat Network-bound encryption with Tang and Clevis.mp4
|
109.8 MB
|
Hanno Böck The burden of faulty TLS implementations.eng.srt
|
93.8 KB
|
Hanno Böck The burden of faulty TLS implementations.mp4
|
114.4 MB
|
Keynote speaker - Bill Duane, RSA What breaches teach, and education the hard way.eng.srt
|
144.2 KB
|
Keynote speaker - Bill Duane, RSA What breaches teach, and education the hard way.mp4
|
159.4 MB
|
Keynote speaker - Darren Kitchen, Hak5.eng.srt
|
101.4 KB
|
Keynote speaker - Darren Kitchen, Hak5.mp4
|
149.2 MB
|
Keynote speaker - Kayne Naughton, Cosive The Sorcerer's Apprentice.eng.srt
|
119.7 KB
|
Keynote speaker - Kayne Naughton, Cosive The Sorcerer's Apprentice.mp4
|
150.3 MB
|
Mick Stephens, FireMon Effective management of Information Security.eng.srt
|
61.9 KB
|
Mick Stephens, FireMon Effective management of Information Security.mp4
|
82.6 MB
|
Neal Wise, Assurance Threat modelling in higher education.eng.srt
|
94.3 KB
|
Neal Wise, Assurance Threat modelling in higher education.mp4
|
136.7 MB
|
Nik Cubrilovic Stock Hacks.eng.srt
|
105.8 KB
|
Nik Cubrilovic Stock Hacks.mp4
|
120.2 MB
|
Plenary - Aamir Lakhani, Fortinet Spies, Geeks, and Tracking.eng.srt
|
53.7 KB
|
Plenary - Aamir Lakhani, Fortinet Spies, Geeks, and Tracking.mp4
|
73.5 MB
|
Plenary - Kent Shuart, Dell.eng.srt
|
36.4 KB
|
Plenary - Kent Shuart, Dell.mp4
|
49.7 MB
|
Sanjay Aurora, Darktrace Gaining real-time intelligence.eng.srt
|
116.6 KB
|
Sanjay Aurora, Darktrace Gaining real-time intelligence.mp4
|
91.7 MB
|
Speed Debate & Closing Remarks.eng.srt
|
117.2 KB
|
Speed Debate & Closing Remarks.mp4
|
172.2 MB
|
Steve Wilson, Lockstep Technologies Blockchain - The Hype Machine.eng.srt
|
92.7 KB
|
Steve Wilson, Lockstep Technologies Blockchain - The Hype Machine.mp4
|
125.1 MB
|
Tim Hudson, Cryptsoft OpenSSL after HeartBleed.eng.srt
|
106.8 KB
|
Tim Hudson, Cryptsoft OpenSSL after HeartBleed.mp4
|
91.6 MB
|
Troy Hunt, troyhunt.com Lessons from a quarter of a billion breached records.eng.srt
|
121.6 KB
|
Troy Hunt, troyhunt.com Lessons from a quarter of a billion breached records.mp4
|
106.8 MB
|
William Caelli, International Information Security Consultants Cryptowars Redux.eng.srt
|
84.1 KB
|
William Caelli, International Information Security Consultants Cryptowars Redux.mp4
|
103.8 MB
|
Zoltan Balazs, MRG Effitas Sandbox Detection - Leak, Abuse, Test.eng.srt
|
55.9 KB
|
Zoltan Balazs, MRG Effitas Sandbox Detection - Leak, Abuse, Test.mp4
|
104.2 MB
|
/AusCERT 2017/
|
Aaron Guzman - Don't Get Caught Em-Bed.eng.srt
|
122.1 KB
|
Aaron Guzman - Don't Get Caught Em-Bed.mp4
|
65.4 MB
|
Andras Iklody & Michael Hamm - Threat Intel Sharing and Automation using MISP.eng.srt
|
98.4 KB
|
Andras Iklody & Michael Hamm - Threat Intel Sharing and Automation using MISP.mp4
|
70.1 MB
|
Andrew Jamieson - Biohazard Biometric Security.eng.srt
|
100.8 KB
|
Andrew Jamieson - Biohazard Biometric Security.mp4
|
47.7 MB
|
Andy Prow, Kirk Jackson - Mastering Mr. Robot.eng.srt
|
107.6 KB
|
Andy Prow, Kirk Jackson - Mastering Mr. Robot.mp4
|
85.3 MB
|
Ben Di Marco, Matthew Pokarier - Preparing for Mandatory Breach Notification Law.eng.srt
|
111.5 KB
|
Ben Di Marco, Matthew Pokarier - Preparing for Mandatory Breach Notification Law.mp4
|
67.0 MB
|
Brian Spring, Marilyn Nelson - The AMP story.eng.srt
|
104.6 KB
|
Brian Spring, Marilyn Nelson - The AMP story.mp4
|
75.8 MB
|
Chris Coryea - The Myths and Truths to Building a World Class Cyber Defence.eng.srt
|
88.3 KB
|
Chris Coryea - The Myths and Truths to Building a World Class Cyber Defence.mp4
|
53.8 MB
|
Chris Goettl - Your Partner for Superior Cybersecurity.eng.srt
|
126.0 KB
|
Chris Goettl - Your Partner for Superior Cybersecurity.mp4
|
89.1 MB
|
Craig Searle - Incident Response for the 21st Century Luddite.eng.srt
|
119.5 KB
|
Craig Searle - Incident Response for the 21st Century Luddite.mp4
|
66.8 MB
|
Daniel Schell - ASD Top 4 Compliance and what auditors look for.eng.srt
|
106.9 KB
|
Daniel Schell - ASD Top 4 Compliance and what auditors look for.mp4
|
62.2 MB
|
Darren Kitchen, Shannon Morse - Of Hardware and Humans.eng.srt
|
151.4 KB
|
Darren Kitchen, Shannon Morse - Of Hardware and Humans.mp4
|
118.6 MB
|
David Jorm - Penetration Testing Android Applications and Embedded Devices.eng.srt
|
88.8 KB
|
David Jorm - Penetration Testing Android Applications and Embedded Devices.mp4
|
56.6 MB
|
Dix Dallas - Northrop Grumman Support to the Department of Homeland Security.eng.srt
|
98.7 KB
|
Dix Dallas - Northrop Grumman Support to the Department of Homeland Security.mp4
|
70.6 MB
|
Eric Pinkerton - Look Who's Talking.eng.srt
|
124.1 KB
|
Eric Pinkerton - Look Who's Talking.mp4
|
32.4 MB
|
Frank Walsh - Launch, Detect, Evolve.eng.srt
|
114.5 KB
|
Frank Walsh - Launch, Detect, Evolve.mp4
|
91.4 MB
|
Garrett O'Hara - Cyber Resiliency That Starts With Email.eng.srt
|
107.3 KB
|
Garrett O'Hara - Cyber Resiliency That Starts With Email.mp4
|
69.1 MB
|
Jakub Kaluzny - Abusing Voice Biometric Solutions.eng.srt
|
101.0 KB
|
Jakub Kaluzny - Abusing Voice Biometric Solutions.mp4
|
46.9 MB
|
Kate Pearce - No True Security Person.eng.srt
|
105.3 KB
|
Kate Pearce - No True Security Person.mp4
|
81.2 MB
|
Kayne Naughton - Focusing Security Monitoring With TTPs.eng.srt
|
107.0 KB
|
Kayne Naughton - Focusing Security Monitoring With TTPs.mp4
|
41.3 MB
|
Leon Fouche - BDO and AusCERT's 2016 Cyber Security Survey.eng.srt
|
51.8 KB
|
Leon Fouche - BDO and AusCERT's 2016 Cyber Security Survey.mp4
|
45.7 MB
|
Mark Bruhn - Information Sharing and CyberSecurity.eng.srt
|
119.9 KB
|
Mark Bruhn - Information Sharing and CyberSecurity.mp4
|
58.2 MB
|
Meena Wahi Managing Cyber Risk, Governance and Compliance.eng.srt
|
98.4 KB
|
Meena Wahi Managing Cyber Risk, Governance and Compliance.mp4
|
61.9 MB
|
Michael Gianarakis - Developing Secure iOS Applications.eng.srt
|
121.6 KB
|
Michael Gianarakis - Developing Secure iOS Applications.mp4
|
76.4 MB
|
Nick Savvides - Combating Advanced Cybersecurity Threats with AI.eng.srt
|
60.6 KB
|
Nick Savvides - Combating Advanced Cybersecurity Threats with AI.mp4
|
56.0 MB
|
Nigel Phair - Reporting to the Board.eng.srt
|
111.7 KB
|
Nigel Phair - Reporting to the Board.mp4
|
52.1 MB
|
Paul Cooney - The Dark Arts of Privacy.eng.srt
|
93.1 KB
|
Paul Cooney - The Dark Arts of Privacy.mp4
|
60.3 MB
|
Peter Vanheck - Cyber Heroes, Winning Hearts and Minds.eng.srt
|
89.6 KB
|
Peter Vanheck - Cyber Heroes, Winning Hearts and Minds.mp4
|
62.1 MB
|
Rhea Naidoo - United We Stand - Women and Diversity in Cybersecurity Panel.eng.srt
|
117.5 KB
|
Rhea Naidoo - United We Stand - Women and Diversity in Cybersecurity Panel.mp4
|
67.7 MB
|
Samy Kamkar - The Less Hacked Path.eng.srt
|
135.9 KB
|
Samy Kamkar - The Less Hacked Path.mp4
|
112.2 MB
|
Speed Debate.eng.srt
|
157.3 KB
|
Speed Debate.mp4
|
148.7 MB
|
Stephen Ginty - Leveraging Global Datasets to Improve your Cyber Investigations.eng.srt
|
87.2 KB
|
Stephen Ginty - Leveraging Global Datasets to Improve your Cyber Investigations.mp4
|
73.2 MB
|
Todd Peterson - Identity is the New Perimeter.eng.srt
|
51.8 KB
|
Todd Peterson - Identity is the New Perimeter.mp4
|
36.9 MB
|
Troy Hunt - The Responsibility of Disclosure.eng.srt
|
121.5 KB
|
Troy Hunt - The Responsibility of Disclosure.mp4
|
75.1 MB
|
Zeke Vogts, Christian Unger - Gaps in the Agreement.eng.srt
|
79.6 KB
|
Zeke Vogts, Christian Unger - Gaps in the Agreement.mp4
|
22.7 MB
|
/AusCERT 2018/
|
Alison O'Hare - Why a Cyber Resilience for Email Strategy Matters.eng.srt
|
68.4 KB
|
Alison O'Hare - Why a Cyber Resilience for Email Strategy Matters.mp4
|
50.1 MB
|
Bill Britton - California Cybersecurity Institute.eng.srt
|
121.8 KB
|
Bill Britton - California Cybersecurity Institute.mp4
|
71.3 MB
|
Bill Caelli - Cybersecurity Education in Australia.eng.srt
|
115.6 KB
|
Bill Caelli - Cybersecurity Education in Australia.mp4
|
85.3 MB
|
Brett Callaughan - Cybercrime - Whats Coming Your Way.eng.srt
|
97.4 KB
|
Brett Callaughan - Cybercrime - Whats Coming Your Way.mp4
|
46.8 MB
|
BRIAN BRUSHWOOD (DARREN KITCHEN WELCOME).eng.srt
|
227.9 KB
|
BRIAN BRUSHWOOD (DARREN KITCHEN WELCOME).mp4
|
195.5 MB
|
Craig Searle - Influencing the Board A Fools Errand.eng.srt
|
109.0 KB
|
Craig Searle - Influencing the Board A Fools Errand.mp4
|
70.9 MB
|
David Cottingham - The Essential 8 - Cyber Threat Mitigation Strategies that Work.eng.srt
|
120.7 KB
|
David Cottingham - The Essential 8 - Cyber Threat Mitigation Strategies that Work.mp4
|
51.6 MB
|
Edward Farrell - Reusing Breach Data for Attack and Defence.eng.srt
|
93.8 KB
|
Edward Farrell - Reusing Breach Data for Attack and Defence.mp4
|
49.0 MB
|
Eric Pinkerton - Repudamaphobia - An Irrational Fear of Reputational Damage.eng.srt
|
92.2 KB
|
Eric Pinkerton - Repudamaphobia - An Irrational Fear of Reputational Damage.mp4
|
59.2 MB
|
Jayendra Pathak - Huntion - Threat Hunting in Real Time (3).eng.srt
|
105.6 KB
|
Jayendra Pathak - Huntion - Threat Hunting in Real Time (3).mp4
|
77.6 MB
|
Jeff Zupan - The History & Evolution of Privileged Access Management.eng.srt
|
58.0 KB
|
Jeff Zupan - The History & Evolution of Privileged Access Management.mp4
|
63.4 MB
|
Jim Treinen - Analyzing the Kill Chain.eng.srt
|
119.2 KB
|
Jim Treinen - Analyzing the Kill Chain.mp4
|
50.3 MB
|
John Bambanek - Adventures in BitCoin Surveillance.eng.srt
|
115.0 KB
|
John Bambanek - Adventures in BitCoin Surveillance.mp4
|
94.0 MB
|
Jordan Santarsieri - SAP Incident Response, How to Attack and Defend.eng.srt
|
109.2 KB
|
Jordan Santarsieri - SAP Incident Response, How to Attack and Defend.mp4
|
71.4 MB
|
Katie Moussouris - Resilience and the Art of Bug Bounty Maintenance.eng.srt
|
196.5 KB
|
Katie Moussouris - Resilience and the Art of Bug Bounty Maintenance.mp4
|
175.1 MB
|
Kay Lam-Macleod - Mandatory Breach Notification.eng.srt
|
90.0 KB
|
Kay Lam-Macleod - Mandatory Breach Notification.mp4
|
81.0 MB
|
Kayne Naughton - It's Not Incident Response If You Don't Do Anything About It.eng.srt
|
131.5 KB
|
Kayne Naughton - It's Not Incident Response If You Don't Do Anything About It.mp4
|
91.4 MB
|
Keisuke Muda - Tracking APT Lateral Movement with Audit Policy and Sysmon.eng.srt
|
73.5 KB
|
Keisuke Muda - Tracking APT Lateral Movement with Audit Policy and Sysmon.mp4
|
63.1 MB
|
Kelly Shortridge - Security Scorecard - Resilience in Security.eng.srt
|
125.9 KB
|
Kelly Shortridge - Security Scorecard - Resilience in Security.mp4
|
55.3 MB
|
Mark Carey-Smith - Action Oriented Information Security Awareness Raising.eng.srt
|
113.4 KB
|
Mark Carey-Smith - Action Oriented Information Security Awareness Raising.mp4
|
56.1 MB
|
Michael Hamm & Steve Clement - MISP Threat Sharing Platform.eng.srt
|
96.7 KB
|
Michael Hamm & Steve Clement - MISP Threat Sharing Platform.mp4
|
84.7 MB
|
Mike Holm - AusCERT, 25 Years and Beyond.eng.srt
|
117.0 KB
|
Mike Holm - AusCERT, 25 Years and Beyond.mp4
|
63.6 MB
|
Nick Savvides - The IoT Enterprise Why Your Organisation is Already IoTd.eng.srt
|
109.2 KB
|
Nick Savvides - The IoT Enterprise Why Your Organisation is Already IoTd.mp4
|
82.1 MB
|
Nik Kalogirou - 5 Ways to Strengthen your Phishing Defense Programme for 2018.eng.srt
|
91.1 KB
|
Nik Kalogirou - 5 Ways to Strengthen your Phishing Defense Programme for 2018.mp4
|
81.4 MB
|
Noushin Shabab - Finding a Monster by its Shadow.eng.srt
|
66.3 KB
|
Noushin Shabab - Finding a Monster by its Shadow.mp4
|
58.1 MB
|
Panel - Data Security and IT Liability in the Age of Mandatory Notification.eng.srt
|
119.6 KB
|
Panel - Data Security and IT Liability in the Age of Mandatory Notification.mp4
|
77.0 MB
|
Panel - Greater Possibilities, What Recent Trends in Cyber Insurance Mean.eng.srt
|
112.2 KB
|
Panel - Greater Possibilities, What Recent Trends in Cyber Insurance Mean.mp4
|
77.0 MB
|
Peter Wesley - Dragons Rise as Clouds Gather.eng.srt
|
101.0 KB
|
Peter Wesley - Dragons Rise as Clouds Gather.mp4
|
66.6 MB
|
Piero DePaoli - Todays State of Vulnerability Response.eng.srt
|
109.9 KB
|
Piero DePaoli - Todays State of Vulnerability Response.mp4
|
50.5 MB
|
Sarwar Jahan Munna - How to Bypass Authentication and Authorization.mp4
|
82.5 MB
|
Secure your Data Center and Cloud with a Smart Micro-Segmentation Strategy.eng.srt
|
92.4 KB
|
Secure your Data Center and Cloud with a Smart Micro-Segmentation Strategy.mp4
|
54.9 MB
|
Speed Debate.eng.srt
|
163.9 KB
|
Speed Debate.mp4
|
136.2 MB
|
Tennessee Leeuwenburg - New Thinking in Auto Identifying Vulns.eng.srt
|
140.5 KB
|
Tennessee Leeuwenburg - New Thinking in Auto Identifying Vulns.mp4
|
70.5 MB
|
Wayne Tufek - The Weakest Link Managaing Supplier and Third Party Risk.eng.srt
|
115.8 KB
|
Wayne Tufek - The Weakest Link Managaing Supplier and Third Party Risk.mp4
|
52.5 MB
|
Zak Siddiqui - Cyber Risk Insurance and Logging Requirements for Forensics.eng.srt
|
70.2 KB
|
Zak Siddiqui - Cyber Risk Insurance and Logging Requirements for Forensics.mp4
|
39.2 MB
|
/AusCERT 2019/
|
Aaron Soto & Matt Bromiley.eng.srt
|
95.2 KB
|
Aaron Soto & Matt Bromiley.mp4
|
86.3 MB
|
Adel Karimishiraz.eng.srt
|
53.8 KB
|
Adel Karimishiraz.mp4
|
63.5 MB
|
Ali Bashivan.eng.srt
|
56.1 KB
|
Ali Bashivan.mp4
|
57.8 MB
|
AM Keynote by Mikko Hypponen.eng.srt
|
68.7 KB
|
AM Keynote by Mikko Hypponen.mp4
|
117.6 MB
|
AM Plenary by Michael McKinnon.eng.srt
|
24.3 KB
|
AM Plenary by Michael McKinnon.mp4
|
42.0 MB
|
Andrew Kay.eng.srt
|
86.1 KB
|
Andrew Kay.mp4
|
34.0 MB
|
Ash Deuble.eng.srt
|
56.0 KB
|
Ash Deuble.mp4
|
72.4 MB
|
Bradley Anstis.eng.srt
|
66.6 KB
|
Bradley Anstis.mp4
|
55.3 MB
|
Christian Unger & Jake Carroll.eng.srt
|
52.0 KB
|
Christian Unger & Jake Carroll.mp4
|
40.3 MB
|
David Grice.eng.srt
|
65.6 KB
|
David Grice.mp4
|
77.4 MB
|
Dr Mark Carey-Smith.eng.srt
|
75.1 KB
|
Dr Mark Carey-Smith.mp4
|
62.8 MB
|
Eric Pinkerton.eng.srt
|
67.5 KB
|
Eric Pinkerton.mp4
|
32.0 MB
|
Gala Dinner - Brad Blaze & Awards.mp4
|
198.7 MB
|
Gary Gaskell.eng.srt
|
76.3 KB
|
Gary Gaskell.mp4
|
40.2 MB
|
Gavin Reid.eng.srt
|
67.1 KB
|
Gavin Reid.mp4
|
43.7 MB
|
Heidi Winter.eng.srt
|
25.6 KB
|
Heidi Winter.mp4
|
24.3 MB
|
Josh Fraser.eng.srt
|
71.3 KB
|
Josh Fraser.mp4
|
55.6 MB
|
Juan Berner.eng.srt
|
71.2 KB
|
Juan Berner.mp4
|
44.8 MB
|
Justin Steven.eng.srt
|
71.0 KB
|
Justin Steven.mp4
|
56.9 MB
|
Kayne Naughton.eng.srt
|
90.0 KB
|
Kayne Naughton.mp4
|
56.4 MB
|
Keynote and plenary.eng.srt
|
129.1 KB
|
Keynote and plenary.mp4
|
213.2 MB
|
Keynote by Jessy Irwin.eng.srt
|
81.4 KB
|
Keynote by Jessy Irwin.mp4
|
137.7 MB
|
Lachlan Murphy.eng.srt
|
37.4 KB
|
Lachlan Murphy.mp4
|
32.7 MB
|
Laith Alkhouri.eng.srt
|
56.2 KB
|
Laith Alkhouri.mp4
|
47.3 MB
|
Lavi Lazarovitz.eng.srt
|
53.5 KB
|
Lavi Lazarovitz.mp4
|
28.6 MB
|
Leon Fouche & Mike Holm.eng.srt
|
44.4 KB
|
Leon Fouche & Mike Holm.mp4
|
46.2 MB
|
Maarten Van Horenbeeck.eng.srt
|
79.2 KB
|
Maarten Van Horenbeeck.mp4
|
79.3 MB
|
Matthew Pokarier & Stefanie Luhrs.eng.srt
|
78.2 KB
|
Matthew Pokarier & Stefanie Luhrs.mp4
|
70.0 MB
|
Michael Gianarakis & Shubham Shah.eng.srt
|
47.2 KB
|
Michael Gianarakis & Shubham Shah.mp4
|
50.6 MB
|
Michael Hamm.mp4
|
78.1 MB
|
Michael Pogrebisky.eng.srt
|
60.3 KB
|
Michael Pogrebisky.mp4
|
59.7 MB
|
Nik Kalogirou.eng.srt
|
63.4 KB
|
Nik Kalogirou.mp4
|
45.6 MB
|
Opening.eng.srt
|
138.7 KB
|
Opening.mp4
|
216.5 MB
|
Plenary by Garrett O'Hara.eng.srt
|
42.3 KB
|
Plenary by Garrett O'Hara.mp4
|
68.0 MB
|
PM keynote and plenary sessions.eng.srt
|
115.1 KB
|
PM keynote and plenary sessions.mp4
|
176.1 MB
|
PM Keynote by Troy Hunt.eng.srt
|
75.7 KB
|
PM Keynote by Troy Hunt.mp4
|
111.5 MB
|
PM Plenary by Chris Adams.eng.srt
|
33.4 KB
|
PM Plenary by Chris Adams.mp4
|
55.2 MB
|
Prof. Ryan Ko.eng.srt
|
53.8 KB
|
Prof. Ryan Ko.mp4
|
60.0 MB
|
Rick McElroy.eng.srt
|
67.1 KB
|
Rick McElroy.mp4
|
45.1 MB
|
Scott Helme.eng.srt
|
78.3 KB
|
Scott Helme.mp4
|
53.1 MB
|
Shane Moffitt.eng.srt
|
64.1 KB
|
Shane Moffitt.mp4
|
70.8 MB
|
Speed Debate.eng.srt
|
90.6 KB
|
Speed Debate.mp4
|
17.0 MB
|
Steve Clement & Christian Studer.eng.srt
|
57.5 KB
|
Steve Clement & Christian Studer.mp4
|
44.0 MB
|
Tennessee Leeuwenburg.eng.srt
|
79.0 KB
|
Tennessee Leeuwenburg.mp4
|
57.1 MB
|
Tim Hudson & Dr Paul Dale.eng.srt
|
64.0 KB
|
Tim Hudson & Dr Paul Dale.mp4
|
55.5 MB
|
Welcome by AusCERT.eng.srt
|
43.2 KB
|
Welcome by AusCERT.mp4
|
28.9 MB
|
Yamila Levalle.eng.srt
|
37.3 KB
|
Yamila Levalle.mp4
|
47.8 MB
|
/AusCERT 2020/
|
Adam Rosen.eng.srt
|
78.5 KB
|
Adam Rosen.mp4
|
38.1 MB
|
AM Keynote - Kana Shinoda.eng.srt
|
45.0 KB
|
AM Keynote - Kana Shinoda.mp4
|
30.9 MB
|
and BDO.eng.srt
|
75.6 KB
|
and BDO.mp4
|
25.2 MB
|
Anthony Caruana.eng.srt
|
66.3 KB
|
Anthony Caruana.mp4
|
36.4 MB
|
AusCERT202 - Nick Ellsmore.eng.srt
|
79.2 KB
|
AusCERT202 - Nick Ellsmore.mp4
|
43.9 MB
|
Ayman Sagy and Willem Mouton.eng.srt
|
60.3 KB
|
Ayman Sagy and Willem Mouton.mp4
|
21.7 MB
|
Barry McMahon.eng.srt
|
60.2 KB
|
Barry McMahon.mp4
|
15.6 MB
|
Bianca Wirth and Dr Yenni Tim.eng.srt
|
81.8 KB
|
Bianca Wirth and Dr Yenni Tim.mp4
|
41.8 MB
|
Brian Hay and Laurie Joyce.eng.srt
|
79.1 KB
|
Brian Hay and Laurie Joyce.mp4
|
44.8 MB
|
Christian Studer and Andras Iklody (Team CIRCL.LU).eng.srt
|
62.1 KB
|
Christian Studer and Andras Iklody (Team CIRCL.LU).mp4
|
24.9 MB
|
Damian Skeeles and - Nick Forster.eng.srt
|
96.4 KB
|
Damian Skeeles and - Nick Forster.mp4
|
53.6 MB
|
Dani Goland and Mohsan Farid.eng.srt
|
69.6 KB
|
Dani Goland and Mohsan Farid.mp4
|
45.7 MB
|
Dave Lewis.eng.srt
|
65.6 KB
|
Dave Lewis.mp4
|
33.2 MB
|
David Jorm.mp4
|
40.8 MB
|
David Rudduck.eng.srt
|
62.5 KB
|
David Rudduck.mp4
|
36.3 MB
|
Edward Farrell.eng.srt
|
85.4 KB
|
Edward Farrell.mp4
|
50.1 MB
|
Eric Pinkerton.eng.srt
|
84.5 KB
|
Eric Pinkerton.mp4
|
48.4 MB
|
Fatih Ozavci.eng.srt
|
78.4 KB
|
Fatih Ozavci.mp4
|
47.5 MB
|
Garrett OHara.eng.srt
|
99.5 KB
|
Garrett OHara.mp4
|
50.2 MB
|
Geoff Thonon.eng.srt
|
86.3 KB
|
Geoff Thonon.mp4
|
48.1 MB
|
James Ley and Shane Wescott.eng.srt
|
83.9 KB
|
James Ley and Shane Wescott.mp4
|
31.2 MB
|
Jay Banerji, Dr Mike Cohen, Nick Klein.eng.srt
|
32.0 KB
|
Jay Banerji, Dr Mike Cohen, Nick Klein.mp4
|
16.8 MB
|
John Bambenek.eng.srt
|
85.7 KB
|
John Bambenek.mp4
|
46.4 MB
|
Jon-Peter (JP) Haywood.eng.srt
|
85.1 KB
|
Jon-Peter (JP) Haywood.mp4
|
49.6 MB
|
Keynote - Julie Inman-Grant.eng.srt
|
83.4 KB
|
Keynote - Julie Inman-Grant.mp4
|
48.9 MB
|
Kushal Shah.mp4
|
44.4 MB
|
Mandy Turner.eng.srt
|
72.1 KB
|
Mandy Turner.mp4
|
27.9 MB
|
Marc Rogers.eng.srt
|
40.5 KB
|
Marc Rogers.mp4
|
14.8 MB
|
Mark Krischer.eng.srt
|
90.9 KB
|
Mark Krischer.mp4
|
57.3 MB
|
Martin Dart.eng.srt
|
82.0 KB
|
Martin Dart.mp4
|
20.8 MB
|
Maty Siman.eng.srt
|
49.0 KB
|
Maty Siman.mp4
|
19.3 MB
|
Michael Marriott.eng.srt
|
70.8 KB
|
Michael Marriott.mp4
|
41.9 MB
|
Mickey Perre.eng.srt
|
58.5 KB
|
Mickey Perre.mp4
|
17.1 MB
|
Murray Goldschmidt.eng.srt
|
84.0 KB
|
Murray Goldschmidt.mp4
|
24.2 MB
|
Neal Wise.eng.srt
|
40.0 KB
|
Neal Wise.mp4
|
22.7 MB
|
Phillip Jenkinson.eng.srt
|
82.1 KB
|
Phillip Jenkinson.mp4
|
48.8 MB
|
PM Keynote - Lukasz Gogolkiewicz.eng.srt
|
73.6 KB
|
PM Keynote - Lukasz Gogolkiewicz.mp4
|
38.0 MB
|
Prateek Gianchandani.eng.srt
|
81.7 KB
|
Prateek Gianchandani.mp4
|
23.7 MB
|
Ronald Michael.eng.srt
|
51.7 KB
|
Ronald Michael.mp4
|
20.2 MB
|
Simon Stahn.eng.srt
|
76.1 KB
|
Simon Stahn.mp4
|
40.8 MB
|
Speed Debate.eng.srt
|
111.5 KB
|
Speed Debate.mp4
|
65.4 MB
|
Stefanie Luhrs and Ben Di Marco.eng.srt
|
82.3 KB
|
Stefanie Luhrs and Ben Di Marco.mp4
|
41.8 MB
|
UWA.eng.srt
|
73.1 KB
|
UWA.mp4
|
39.5 MB
|
Virginia Calegare.eng.srt
|
70.3 KB
|
Virginia Calegare.mp4
|
37.4 MB
|
Virtual AusCERT2020 Gala Dinner Incorporating the Australian Information Security Awards - Part 1.mp4
|
8.2 MB
|
Virtual AusCERT2020 Gala Dinner Incorporating the Australian Information Security Awards - Part 2.mp4
|
77.7 MB
|
Welcome To Country - AusCERT2020.mp4
|
5.3 MB
|
/AusCERT 2021/
|
A Data Centric Approach to Zero Trust.eng.srt
|
91.5 KB
|
A Data Centric Approach to Zero Trust.mp4
|
45.2 MB
|
Active Directory Defense Lessons Learned.eng.srt
|
64.8 KB
|
Active Directory Defense Lessons Learned.mp4
|
34.6 MB
|
An Update on the Cloud Security Alliance for Australia.mp4
|
47.5 MB
|
Automation and radical simplicity Setting up cyber security practices for succes.mp4
|
29.9 MB
|
Back to Basics - Why Can't We Get This Stuff Right.eng.srt
|
77.3 KB
|
Back to Basics - Why Can't We Get This Stuff Right.mp4
|
39.2 MB
|
BDO and AusCERT’s 2020 Cyber Security Survey Results.eng.srt
|
64.5 KB
|
BDO and AusCERT’s 2020 Cyber Security Survey Results.mp4
|
30.6 MB
|
Before You Leave The Nest - Preparing to SOAR.mp4
|
39.3 MB
|
Better living through security intelligence.mp4
|
64.4 MB
|
Building Your Active Defence with MITRE Shield.eng.srt
|
77.2 KB
|
Building Your Active Defence with MITRE Shield.mp4
|
41.5 MB
|
Closing Keynote by Maddie Stone.mp4
|
50.8 MB
|
Day 1 Afternoon Keynote by Ciaran Martin.eng.srt
|
74.8 KB
|
Day 1 Afternoon Keynote by Ciaran Martin.mp4
|
40.3 MB
|
Day 1 Afternoon Plenary by Troy Hunt.eng.srt
|
64.9 KB
|
Day 1 Afternoon Plenary by Troy Hunt.mp4
|
30.6 MB
|
Day 1 AM Plenary by Alvin Lung (VirusTotal).eng.srt
|
52.5 KB
|
Day 1 AM Plenary by Alvin Lung (VirusTotal).mp4
|
30.0 MB
|
Day 2 AM Plenary by Mark Smith (OKTA).eng.srt
|
41.8 KB
|
Day 2 AM Plenary by Mark Smith (OKTA).mp4
|
25.6 MB
|
Don't be a SOAR loser Key strategies to reduce the cost of a data breach.eng.srt
|
73.5 KB
|
Don't be a SOAR loser Key strategies to reduce the cost of a data breach.mp4
|
37.4 MB
|
EthicsFIRST Considering Ethics for Incident Response and Security Teams.eng.srt
|
80.8 KB
|
EthicsFIRST Considering Ethics for Incident Response and Security Teams.mp4
|
37.6 MB
|
Hack for Hire Defending Against The Fake Empire.eng.srt
|
71.8 KB
|
Hack for Hire Defending Against The Fake Empire.mp4
|
35.2 MB
|
Highlights Reel.eng.srt
|
0.2 KB
|
Highlights Reel.mp4
|
2.0 MB
|
How NOT to run a SOC.eng.srt
|
69.0 KB
|
How NOT to run a SOC.mp4
|
30.2 MB
|
How Resilient Are We Understanding the Psychology of Cyber Conflict and Its Impacts State& Personal.mp4
|
37.1 MB
|
How To Hack A Hospital.mp4
|
26.2 MB
|
I Was Promised A Jetpack.eng.srt
|
84.1 KB
|
I Was Promised A Jetpack.mp4
|
38.7 MB
|
Inside The Unlikely Romance - Crowdsourced Security from a Financial Services Perspective.eng.srt
|
103.5 KB
|
Inside The Unlikely Romance - Crowdsourced Security from a Financial Services Perspective.mp4
|
54.3 MB
|
Keeping SOAR lean, simple and effective.eng.srt
|
69.9 KB
|
Keeping SOAR lean, simple and effective.mp4
|
30.6 MB
|
Leading Cyber Security Assurance.eng.srt
|
73.3 KB
|
Leading Cyber Security Assurance.mp4
|
47.2 MB
|
Lessons Learned From A Year of Security Podcast Interviews.eng.srt
|
91.4 KB
|
Lessons Learned From A Year of Security Podcast Interviews.mp4
|
48.0 MB
|
Malware Traffic Generation to Improve Security Incident Detections.mp4
|
39.4 MB
|
Manufacturing ICS Security Operations Strategies.eng.srt
|
86.3 KB
|
Manufacturing ICS Security Operations Strategies.mp4
|
42.2 MB
|
Medical Device Security Challenges and Practical Solutions.eng.srt
|
82.5 KB
|
Medical Device Security Challenges and Practical Solutions.mp4
|
31.4 MB
|
Modern Risk Management Locating, Prioritizing, and Minimizing Risks to Your Business.mp4
|
21.8 MB
|
Moving Target Defences Recent Advances and Challenges.eng.srt
|
69.3 KB
|
Moving Target Defences Recent Advances and Challenges.mp4
|
39.3 MB
|
Opening Keynote panel by James Young, Tony Kitzelmann, Casey Ellis and Jess Dodson.eng.srt
|
91.8 KB
|
Opening Keynote panel by James Young, Tony Kitzelmann, Casey Ellis and Jess Dodson.mp4
|
47.8 MB
|
Out of the Shadows - Into the Digital Crosshairs.eng.srt
|
84.9 KB
|
Out of the Shadows - Into the Digital Crosshairs.mp4
|
27.9 MB
|
Preventing Ransomware Spreading with Simplified Segmentation.eng.srt
|
81.7 KB
|
Preventing Ransomware Spreading with Simplified Segmentation.mp4
|
43.1 MB
|
Project Enigma Detecting Indicators of Compromise through RAM Analysis, Event Logs and Malware Machi.eng.srt
|
69.1 KB
|
Project Enigma Detecting Indicators of Compromise through RAM Analysis, Event Logs and Malware Machi.mp4
|
37.4 MB
|
Security Implications of the Hybrid Workplace.eng.srt
|
84.9 KB
|
Security Implications of the Hybrid Workplace.mp4
|
51.1 MB
|
Speed Debate and Closing Remarks.mp4
|
57.3 MB
|
Speed Debate.mp4
|
103.2 MB
|
Stop calling my baby ugly Taking a Different Approach with Developers for DevSecOps Success.mp4
|
42.3 MB
|
Supercharge your SOC processes with SOAR.eng.srt
|
68.2 KB
|
Supercharge your SOC processes with SOAR.mp4
|
32.7 MB
|
Surviving A Crisis - A View from The Trenches.eng.srt
|
100.3 KB
|
Surviving A Crisis - A View from The Trenches.mp4
|
36.0 MB
|
Take Me to Cuba.eng.srt
|
68.6 KB
|
Take Me to Cuba.mp4
|
31.0 MB
|
The Human Firewall A Journey into the Unknown.eng.srt
|
100.8 KB
|
The Human Firewall A Journey into the Unknown.mp4
|
50.4 MB
|
The Risk of Vendor Based Attacks Against Active Directory.mp4
|
35.5 MB
|
To the Ultimately Liable SOAR for Compliance.mp4
|
29.2 MB
|
Vegemite - Is it the Solution to Software Supply Chain Risk.mp4
|
34.8 MB
|
Welcome to Country and Opening Remarks by team AusCERT.eng.srt
|
53.5 KB
|
Welcome to Country and Opening Remarks by team AusCERT.mp4
|
31.9 MB
|
/AusCERT2022/
|
5 WAYS TO OPTIMIZE YOUR SOC.mp4
|
68.7 MB
|
5 WAYS TO OPTIMIZE YOUR SOC.srt
|
97.5 KB
|
A PRACTICAL APPROACH TO IMPLEMENTING THE ACSC STRATEGIES.mp4
|
60.9 MB
|
A PRACTICAL APPROACH TO IMPLEMENTING THE ACSC STRATEGIES.srt
|
64.9 KB
|
AFTERNOON PLENARY.mp4
|
107.5 MB
|
AFTERNOON PLENARY.srt
|
142.7 KB
|
AN YOU STILL GET CYBER INSURANCE SHOULD YOU.mp4
|
61.6 MB
|
AN YOU STILL GET CYBER INSURANCE SHOULD YOU.srt
|
99.0 KB
|
APPLICATION SECURITY POSTURE THROUGHOUT DEVOPSOPS & RAPID INNOVATION.mp4
|
33.2 MB
|
APPLYING INDIGENOUS - PHILOSOPHY TO CYBER SECURITY STRATEGIES.mp4
|
65.7 MB
|
APPLYING INDIGENOUS - PHILOSOPHY TO CYBER SECURITY STRATEGIES.srt
|
74.4 KB
|
ARE WE WINNING THE MARCH OF CYBERCRIME.mp4
|
50.3 MB
|
ARE WE WINNING THE MARCH OF CYBERCRIME.srt
|
69.4 KB
|
ATTACKED - BY THREAT ACTORS AND THE MEDIA.mp4
|
57.6 MB
|
AusCERT2022 Conference Highlights.mp4
|
2.4 MB
|
BUILDING A FAKE COMPANY FOR THREAT INTELLIGENCE.mp4
|
63.5 MB
|
BUILDING A FAKE COMPANY FOR THREAT INTELLIGENCE.srt
|
70.3 KB
|
CYBERCRIME FIGHTING - THE REBOOT.mp4
|
49.4 MB
|
DECODING - ZERO TRUST - WHAT DOES IT ACTUALLY - MEAN.mp4
|
53.0 MB
|
DECODING - ZERO TRUST - WHAT DOES IT ACTUALLY - MEAN.srt
|
74.5 KB
|
DEMAND SIDE CYBER SECURITY THREATS TO AUSTRALIA'S RENEWABLE ENERGY.mp4
|
61.2 MB
|
DEMAND SIDE CYBER SECURITY THREATS TO AUSTRALIA'S RENEWABLE ENERGY.srt
|
81.2 KB
|
HELPING SECURE CUSTOMERS BY DISCLOSING MORE.mp4
|
35.4 MB
|
HELPING SECURE CUSTOMERS BY DISCLOSING MORE.srt
|
55.9 KB
|
HOW TO BUILD YOUR MEDICAL DEVICE SECURITY PROGRAM.mp4
|
65.0 MB
|
I CAN SEE YOU IMPROVING DETECTION EFFICIENCY ON THE ENDPOINT.mp4
|
52.2 MB
|
KEYNOTE SPEAKER AND MORNING PLENARY.mp4
|
106.5 MB
|
KEYNOTE SPEAKER AND MORNING PLENARY.srt
|
140.0 KB
|
LEADERSHIP THROUGH CHAOS.mp4
|
52.5 MB
|
LEADERSHIP THROUGH CHAOS.srt
|
74.5 KB
|
LEAN APPROACH TO DEVICE POSTURE CHECK - A JOURNEY TOWARDS ZERO TRUST.mp4
|
59.3 MB
|
LEAN APPROACH TO DEVICE POSTURE CHECK - A JOURNEY TOWARDS ZERO TRUST.srt
|
72.8 KB
|
LOG4SHELL A BRIEF HISTORY OF JAVA DESERIALIZATION VECTORS.mp4
|
40.7 MB
|
LOG4SHELL A BRIEF HISTORY OF JAVA DESERIALIZATION VECTORS.srt
|
53.9 KB
|
LOKI'S GUIDE TO RETHINKING SECURITY AND CHASING HIS TAIL.mp4
|
57.0 MB
|
MANAGING PRIVACY RISKS PROACTIVELY.mp4
|
71.9 MB
|
MORNING PLENARY.mp4
|
174.3 MB
|
NO. OSTRICHES ARE NOT GREAT STRATEGISTS.mp4
|
48.0 MB
|
OVERCOMING COGNITIVE BIAS.mp4
|
59.8 MB
|
OVERCOMING COGNITIVE BIAS.srt
|
73.9 KB
|
PANDEMIC POLEMIC.mp4
|
51.4 MB
|
PWNING COMPROMISED PASSWORDS WITH THE FBI AND NCA.mp4
|
60.7 MB
|
PWNING COMPROMISED PASSWORDS WITH THE FBI AND NCA.srt
|
77.0 KB
|
RANSOMWARE - THE TECHNICAL DEBT COLLECTOR.mp4
|
60.0 MB
|
RANSOMWARE - THE TECHNICAL DEBT COLLECTOR.srt
|
80.2 KB
|
RETHINK YOUR CAPABILITIES IMPOSTER SYNDROME MIGHT BE IMPACTING YOU.mp4
|
66.3 MB
|
RETHINK YOUR IDENTITY STRATEGY IN THE MODERN ERA.mp4
|
41.9 MB
|
RETHINK YOUR IDENTITY STRATEGY IN THE MODERN ERA.srt
|
55.6 KB
|
RETHINKING TRAINING & CERTIFICATION EXPERIENCES FROM THE FRONT LINE.mp4
|
78.0 MB
|
SECOPS BEST PRACTICES FOR THWARTING SOFTWARE SUPPLY CHAIN ATTACKS.mp4
|
74.1 MB
|
SECURING THE GAMES A CYBERSECURITY JOURNEY TO BRISBANE 2032.mp4
|
67.8 MB
|
SECURING THE GAMES A CYBERSECURITY JOURNEY TO BRISBANE 2032.srt
|
79.0 KB
|
SOFTWARE IS YOUR COLLEAGUE A NEW PERSPECTIVE FOR DEVELOPERS.mp4
|
55.9 MB
|
SPEED DEBATE.mp4
|
87.0 MB
|
THE AGE OF CYBER RESILIENCE PREPARING YOUR BUSINESS FOR THE UNKNOWN.mp4
|
54.4 MB
|
THE AUSTRALIAN DATA PRIVACY ACT BIG CHANGES ARE ON THE WAY.mp4
|
66.5 MB
|
THE AUSTRALIAN DATA PRIVACY ACT BIG CHANGES ARE ON THE WAY.srt
|
85.0 KB
|
THE HALLMARKS OF A HIGH-PERFORMING SOC.mp4
|
63.1 MB
|
THE ILLICIT ECONOMY AND OUTSOURCED CRIME PROVIDERS.mp4
|
57.5 MB
|
THE ILLICIT ECONOMY AND OUTSOURCED CRIME PROVIDERS.srt
|
68.7 KB
|
TRUE OR FALSE POSITIVES INTRODUCING THE WAF EFFICACY FRAMEWORK.mp4
|
29.0 MB
|
USING MACHINE LEARNING, COMPUTER VISION AND TEXT MINING.mp4
|
58.3 MB
|
USING MACHINE LEARNING, COMPUTER VISION AND TEXT MINING.srt
|
73.0 KB
|
VULNERABILITY REPORTING ON A SHOESTRING BUDGET.mp4
|
54.4 MB
|
VULNERABILITY REPORTING ON A SHOESTRING BUDGET.srt
|
69.1 KB
|
WHAT BAD GUYS ARE LOOKING FOR CLOUD MISCONFIGURATIONS.mp4
|
67.1 MB
|
Total files 518
|