CSECcon III Has Multiple Talks Over The Day! There Are 2 Streams With Different Topics Covered In Each.
Talks - Room 1 (401)
From P3 to P1: May the Exploits Be Ever in Your Favor
Sajeeb Lohani
How to Find Your First CVE - A Different Perspective.
Eddie Zhang
Using VPN overlays to access internal systems
Matthew Strahan
Who are you Really? Weaknesses in Internet Identities
Harrison Mitchell
Least privilege, impossible!?!
Michael Smith
Red Teaming in the Cloud
Gareth Batchelor and Taylor Li
Microsoft Security at Era of AI
Henry Yang
While cybersecurity; Do software
Ben Gittins
Talks - Room 2 (100)
Lazy Man's Seasonal bugbounty hunting techniques
Abartan Dhakal
Cyber Job Ready
Montii Abid
Data Breach Fatigue: Why Your Privacy Still Matters
Jae Kim
From Psychology to Cyber Security: Making the Transition to Blue Team Roles
Vhal Estacio
What is it like to work in a Managed Security Service Provider company?
Ka Shing Ng
Speedrunning Cybersecurity: How to break into the industry ASAP!!!
James Webb
Email Security Retrospective
Sean Burford
Quantum Computing and the Future of Digital Privacy: A Cybersecurity Perspective
Ric Centellas
Ctrl+Alt+Secure: Breaking into Cybersecurity
Dr. Queen Aigbefo, Tonee Marqus, Jamie McPherson
Capture the Flag Competition
All Day CTF!
UTS:CSEC CTF Team
CSECcon II includes a mix of Talks, Workshops, and ends the day off with a Career Panel.
Talks
From uniform policing to cyber security - decisions at 20 do not need to determine your life's career journey!
James Spalding
Achieving Supply Chain Security on a Budget
Sajeeb Lohani, Ben Christian
Dreaming of auto-magical dependency updates
Andy Vermeulen
Bridging the Gap for Future Professionals
Montii Abid
GRC - An Intro to Governance, Risk and Compliance
Cam La
Rabbit holes into privacy
Jenny Yang
Getting into and excelling within cybersecurity!
UTS:CSEC
Workshops
Unravelling Lumma Stealer: Hands-on Malware Analysis
Sharath Shamachar
Dashboards and Duct Tape: An Industry Introduction to Incident Response
Jamie McPherson, Queen Aigbefo, Tai Tran
Fuzzing: automated edge case searching
UTS Programmers' Society
Capture the Flag Competition
All Day CTF!
UTS:CSEC CTF Team
CSECcon I spanned over two days featuring a wide selection of talks from industry professionals.
Day 1
Event Opening
CSECcon MCs
Alex's security journey: a cautionary tale
"Alex"
Using malware to destabilise a country
Santiago
Active Directory Hacking Speedrun!
Alexei Doudkine
The mind is the battleground - Human cognition in cyber security
Dan Conway
Introduction to Capture The Flag (CTF)
Max Caminer + DUCTF Crew
Practical RSA Cryptanalysis
Kris Hunt
Incident Response: A practical beginners guide to phishing
Ian Szklinski
What to do once you compromise a developer's account
Alex Hill
Day 2
Easy(-to-break) Anti-Cheat
George Dan
Introduction to Web3 hacking: hunt, reverse engineer and fix a smart contract vulnerability
Pedram Hayati
The Art of Threat Detection: Literally the last line of defence.
Darsh Shah
The kids are not alright: How some Millennials and Gen Zers are cybersecurity liabilities
Laura-Rose Carbone
Embedded Device Hacking 101: A story of 2 root shells with Nokia' s 5G router
Victoria Cheng, Tiara Wong, Eddie Zhang
Getting into AppSec
Cole Cornford
The Journey to The Self-Driving SOC
Sean Duca