That's a wrap!


We want to give a huge shoutout to all attendees, sponsors, and presenters for attending CSECcon II. We had a blast and hope you did too.
Stay tuned on our socials for the talk and workshop recordings!

Schedule

CSECcon III Has Multiple Talks Over The Day! There Are 2 Streams With Different Topics Covered In Each.

Talks - Room 1 (401)

10:15am - 10:45am
From P3 to P1: May the Exploits Be Ever in Your Favor
Sajeeb Lohani
Sajeeb Lohani
10:45am - 11:30am
How to Find Your First CVE - A Different Perspective.
Eddie Zhang
Eddie Zhang
11:30am - 12:00pm
Using VPN overlays to access internal systems
Matthew Strahan
Matthew Strahan
12:00pm - 12:30pm
Who are you Really? Weaknesses in Internet Identities
Harrison Mitchell
Harrison Mitchell
1:30pm - 2:15pm
Least privilege, impossible!?!
Michael Smith
Michael Smith
2:15pm - 3:15pm
Red Teaming in the Cloud
Gareth Batchelor and Taylor Li
Gareth Batchelor and Taylor Li
3:15pm - 4:15pm
Microsoft Security at Era of AI
Henry Yang
Henry Yang
4:15pm - 4:45pm
While cybersecurity; Do software
Ben Gittins
Ben Gittins

Talks - Room 2 (100)

10:30am - 11:00am
Lazy Man's Seasonal bugbounty hunting techniques
Abartan Dhakal
Abartan Dhakal
11:00am - 11:40am
Cyber Job Ready
Montii Abid
Montii Abid
11:40am - 11:55am
Data Breach Fatigue: Why Your Privacy Still Matters
Jae Kim
Jae Kim
11:55am - 12:10pm
From Psychology to Cyber Security: Making the Transition to Blue Team Roles
Vhal Estacio
Vhal Estacio
1:30pm - 2:00pm
What is it like to work in a Managed Security Service Provider company?
Ka Shing Ng
Ka Shing Ng
2:00pm - 2:45pm
Speedrunning Cybersecurity: How to break into the industry ASAP!!!
James Webb
James Webb
2:45pm - 3:15pm
Email Security Retrospective
Sean Burford
Sean Burford
3:15pm - 4:00pm
Quantum Computing and the Future of Digital Privacy: A Cybersecurity Perspective
Ric Centellas
Ric Centellas
4:00pm - 4:45pm
Ctrl+Alt+Secure: Breaking into Cybersecurity
Dr. Queen Aigbefo, Tonee Marqus, Jamie McPherson
Dr. Queen Aigbefo, Tonee Marqus, Jamie McPherson

Capture the Flag Competition

10:30am - 5:00pm
All Day CTF!
UTS:CSEC CTF Team
UTS:CSEC CTF Team

CSECcon II includes a mix of Talks, Workshops, and ends the day off with a Career Panel.

Talks

10:15am
Welcome
CSECcon MCs
CSECcon MCs
10:45am - 11:15am
From uniform policing to cyber security - decisions at 20 do not need to determine your life's career journey!
James Spalding
James Spalding
11:15am - 12:00pm
Achieving Supply Chain Security on a Budget
Sajeeb Lohani, Ben Christian
Sajeeb Lohani, Ben Christian
12:15pm - 12:45pm
Dreaming of auto-magical dependency updates
Andy Vermeulen
Andy Vermeulen
12:45pm - 1:15pm
Bridging the Gap for Future Professionals
Montii Abid
Montii Abid
1:15pm - 2:15pm
Break
2:15pm - 2:45pm
GRC - An Intro to Governance, Risk and Compliance
Cam La
Cam La
2:45pm - 3:15pm
Rabbit holes into privacy
Jenny Yang
Jenny Yang
4:15pm - 5:15pm
Getting into and excelling within cybersecurity!
UTS:CSEC
UTS:CSEC
5:15pm
Close
CSECcon MCs
CSECcon MCs

Workshops

11:00am - 1:00pm
Unravelling Lumma Stealer: Hands-on Malware Analysis
Sharath Shamachar
Sharath Shamachar
2:00pm - 3:00pm
Dashboards and Duct Tape: An Industry Introduction to Incident Response
Jamie McPherson, Queen Aigbefo, Tai Tran
Jamie McPherson, Queen Aigbefo, Tai Tran
3:00 - 3:45pm
Fuzzing: automated edge case searching
UTS Programmers' Society
UTS Programmers' Society

Capture the Flag Competition

10:30am - 5:00pm
All Day CTF!
UTS:CSEC CTF Team
UTS:CSEC CTF Team

CSECcon I spanned over two days featuring a wide selection of talks from industry professionals.

Day 1

9:00am
Event Opening
CSECcon MCs
CSECcon MCs
09:30am
Alex's security journey: a cautionary tale
"Alex"
10:00am
Using malware to destabilise a country
Santiago
Santiago
11:30am
Active Directory Hacking Speedrun!
Alexei Doudkine
Alexei Doudkine
12:00pm
The mind is the battleground - Human cognition in cyber security
Dan Conway
Dan Conway
1:30pm
Introduction to Capture The Flag (CTF)
Max Caminer + DUCTF Crew
Max Caminer + DUCTF Crew
2:30pm
Practical RSA Cryptanalysis
Kris Hunt
Kris Hunt
3:30pm
Incident Response: A practical beginners guide to phishing
Ian Szklinski
Ian Szklinski
4:00pm
What to do once you compromise a developer's account
Alex Hill
Alex Hill

Day 2

09:30am
Easy(-to-break) Anti-Cheat
George Dan
George Dan
10:00am
Introduction to Web3 hacking: hunt, reverse engineer and fix a smart contract vulnerability
Pedram Hayati
Pedram Hayati
11:30am
The Art of Threat Detection: Literally the last line of defence.
Darsh Shah
Darsh Shah
12:00pm
The kids are not alright: How some Millennials and Gen Zers are cybersecurity liabilities
Laura-Rose Carbone
Laura-Rose Carbone
1:30pm
Embedded Device Hacking 101: A story of 2 root shells with Nokia' s 5G router
Victoria Cheng, Tiara Wong, Eddie Zhang
Victoria Cheng, Tiara Wong, Eddie Zhang
2:15pm
Getting into AppSec
Cole Cornford
Cole Cornford
2:45pm
The Journey to The Self-Driving SOC
Sean Duca
Sean Duca
3:00pm
Event Close
CSECcon MCs
CSECcon MCs