• If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

BSidesAustralia2011

Security Bsides Australia

 

When:     Sunday, 15th of May 2011

Where:    Gold Coast, Queensland 

Cost:       Free

 

Venue:      Gardenia Room, Royal Pines (same level as RACV reception)

http://maps.google.com.au/maps?f=q&source=s_q&hl=en&geocode=&q=royal+pines+resort,+gold+coast&aq=&sll=-25.335448,135.745076&sspn=45.660664,80.068359&ie=UTF8&hq=royal+pines+resort,&hnear=Gold+Coast+Queensland&ll=-27.998873,153.399525&spn=0.042591,0.078192&z=14&iwloc=A

 

 

Invite your friends by posting this hashtag on Twitter: "#BSidesAU" (or follow @bsidesau) May, 15th,2011: Discover the next big thing!"

 

The biggest Security conference in Australia each year is AusCERT and we love it so much we thought we'd try fit in some extra sessions for the folks who think that too much security is never enough!!!!  Don't worry, we aren't conflicting with AusCERT, you'll still make it in time for registration Sunday afternoon.  Also a special thank you to the AusCERT team for letting us hold the first BSides at Royal Pines itself, so its even easier to come along and check it out if you not already busy doing golf!!!

 

Event Photo's

https://picasaweb.google.com/lh/sredir?uname=103844922012998215463&target=ALBUM&id=5607176709406409553&authkey=Gv1sRgCKupscbDlL_4lQE&feat=email

Thanks to Dave for the great work on the day to help out with some photo's

 

 

Participants

 

  • Please take 30seconds to register at http://bit.ly/BSidesAURegGC2011.  This is purely so we can get an idea of numbers for catering on the day.
  • PlanB to above, either email securitybsidesau@gmail.com or tweet us on @bsidesau that you'll be there on the day.

 

Schedule 

 

In will be running between 11-3:40pm on Sunday the 15th of May  as we want to make sure you get to AusCERT registration on time!!!!  We've put a more complete synopsis of each topic below the schedule 

 

[Day] - [Date] Track 1
   

11:00 AM - 11:20 am

Coffee / Tea / h20
11:20 PM - 12:00 PM
Name:  Andrew Jamieson
Talk:    Encryption vs Tokenisation: Fight! 
 

12:00 PM - 12:40 PM

Name:   Michael Baker
Talk:      Roaring Laser Beams of Power and Doom
12:40 PM - 1:00 PM LUNCH!!!
1:00 PM - 1:40 PM

Name:  Christian Heinrich

Talk:     For God Your Soul... For Me Your Flesh

1:40 PM - 2:20 PM Name:  Eddie Schwartz
Talk:     Zero-Day Malware Hunting – Putting Aside the Obvious and Getting Down to Business
2:20 PM - 3:00 PM 

Name:  John Pirc

Talk:      Next Generation Cyber Threat’s (Shining the Light on the Industries' Best KeptSecret)

3:00 PM - 3:40 PM 

Name:  Will Gragido

Talk:     Sight Beyond Sight: Visualizing and Acting Upon Threat Intelligence

 

Speakers

 

 

Andrew Jamieson
Title:
Encryption vs Tokenisation: Fight!

Abstract:

 

Merchants, service providers, and financial institutions are examining the possibilities of using either encryption or tokenisation, or both, to reduce the scope of their PCI DSS validation requirements - but many businesses still have difficulty understanding the pros and cons of each  , and indeed the point at which one effectively becomes the other.  This presentation will provide information on how tokenisation and encryption can be used to protect cardholder data, and how PCI SSC is working towards formalising this in standards such as PTS v3 SRED, and through the work of Special Interest Groups.  Details will  be provided on the workings of 'format preserving encryption', and how different vendors are implementing this to provide both encryption and tokenisation at the same time.   An Australian perspective will be  provided on how developments in these areas impact or compliment  existing standards such as AS2805.9, and what QSAs should be aware of when auditing such systems.   The presentation will not focus on, endorse, or condem any particular solution.  It is designed to provide information to a technical
audience who are familiar with the requirements of PCI DSS, and have a passing knowledge of encryption.
Author:
The presentation will be made by Andrew Jamieson, the Technical Manager of Witham Laboratories.  Andrew has worked in payments security for over 15 years,  and has authored a number of patents in this field.  Andrew manages all technical work of Witham Laboratories, which is only one of two companies in the world to be accredited to evaluate systems against all PCI standards (PCI DSS,  PA DSS, and PCI PTS).  Andrew represents Witham Laboratories at PCI PTS lab meetings,  where developments in the standards are discussed and new FAQs are developed.  Witham  Laboratories is a member of the PCI SSC encryption and tokenisation Special Interest Groups, Secure POS Vendor Alliance, ATM Industry Association, and contributes to the development of Australian POS message and security standards. Witham Laboratories works with all of the major banks within Australia, as well as vendors of security products such as HSMs, PINPads, and security processors, worldwide.

 

 

Michael Baker - BlackFoundry (http://au.linkedin.com/pub/michael-baker/1/718/644)

Roaring Laser Beams of Power and Doom

This presention will cover research done on the correlation over time between CVE's / Metasploit weaponisation, IPS protection and vendor patches. With maybe some supporting video's of the 'IPS evasion'  and other techniques within metasploit.

 

 

Christian Heinrich, @cmlh

Title

For God Your Soul... For Me Your Flesh

Abstract

Disclosure of two vulnerabilities with exploits which circumvent the privacy controls of both MySpace and Facebook.

Biography
cmlh has presented at ToorCon (USA), Shmoocon (USA), SecTor (Canada), CONFidence (Europe), Hack In The Box (Europe), SyScan (Singapore), RUXCON (Australia), AusCERT (Australia) and the OWASP Conferences in USA, Australia and Europe and OWASP Chapters in the Netherlands, 
London and Sydney and Melbourne, Australia.

Further information is available from
http://www.linkedin.com/in/ChristianHeinrich

 

 

Eddie Schwartz, CSO NetWitness

Title

Zero-Day Malware Hunting – Putting Aside the Obvious and Getting Down to Business

Abstract:  

The hallowed ground of kick-ass, targeted and zero-day malware hunting previously has been reserved for the few security researchers who either were lucky enough to  stumble upon something truly unique, or those who spend their time collecting and reversing large amounts of samples from lots of fed up public and private
enterprises whose useless anti-malware solutions had completely failed.  In a world where incident response team members responsible
for finding bad juju on enterprise networks are fighting a seriously uphill battle, we can’t spend anywhere from 2 to 4 hours analyzing each piece of suspect malware.  Real-time / runtime analysis on suspect binaries on the host is challenging due to injection, hooking, and other adversarial subversion techniques. Static analysis on the host is equally a pain because static traits of packed and obfuscated malware too closely matches those of legitimate binaries.  Looking up all kinds of information across the global security community is valuable – but what really matters?  And what about sandboxing? – what are the pros and cons and dos and don’ts?  This technical session will show B-Sides Australia attendees how to up their game and dramatically shrink the time required to identify and prioritize zero-day and targeted malware using a combination of four automated techniques: file (static) analysis, network forensics, community reputation and sand-boxing. 

 

John Pirc, @jopirc (HP TippingPoint) 
Title:
Next Generation Cyber Threat’s (Shining the Light on the Industries' Best Kept Secret) 
Abstract:
In this presentation John Pirc will be discussing the next generation of cyber threats and the significant challenges facing most industries in dealing with these specific  attack vectors.  In addition to    Join John Pirc, Sr.Product Line Manager, of HP TippingPoint’s Network Security Product Lines , and co-Author of Cybercrime and Espionage: Analysis of the Subversive Multi-vector Threat as he explores the dynamic shift in the threat landscape and uncovers critical gaps in current security technologies and advanced concepts for sophisticated attacks.
 
Will Gragido, @wgragido (HP DVLabs)

 Title:

Sight Beyond Sight: Visualizing and Acting Upon Threat Intelligence  

Abstract:

A new era is upon us.  It is an era  which requires the ability to qualify and quantify potential and imminent threats; there are no awards for ‘second’ place in this forum.  The analysis is crucial  and the quality of intelligence must be beyond reproach.  The media demonstrate this by the scores of examples that seemingly as though in some bizarre succession, manifest one by one underscoring the soft underbellies of those exploited; victimized by a wide array of attacks and actors.  Whether it is the decline and resurrection of an indiscriminate worm such as Sapphire (SQL Slammer), the mayhem and uncertainty invoked by botnets such as Waldec, SpyEye or Zeus, the extraordinary sense of expectation rather surprise at targeted attacks –whether the target is a global multi-national corporation or a nation state (APT, APA, SMT), sound intelligence and the ability of the well trained analyst to collect, digest and act upon it is paramount perhaps now more so than ever before. Regardless of your belief or feelings toward taxonomic terminology, the era of the Subversive Multi-vector Threat has arrived and the realities therein are, for many, only now being realized.  

Join Will Gragido, Sr.Product Line Manager, of HP TippingPoint’s DVLabs , and co-Author of Cybercrime and Espionage: Analysis of the Subversive Multi-vector Threat as he explores the Global Threat Visualization as an operational function, a tactical element and strategic initiative for combating new and advanced categories of threat while applying reason in their qualification and quantification.

 

 

Call for Papers (now closed unless something super awesome comes through)

 

Please submit your presentation topic to securitybsidesau@gmail.com and we'll be updating this page with further information in the coming weeks.  We have a soft deadline of Wednesday the 4th of May for papers to give us some time to review and post whose presenting when on the day.  We hope to announce the full agenda on Friday the 6th of May to at least give folks a week to plan.

 

 

Sponsors

 

Sponsors confirmed to date are:

 

http://www.hp.com/networking/TippingPoint

 

HP TippingPoint sponsoring:

  • Room
  • Projector

 

Syngress are helping outsponsoring with some book giveaways and discounts on book purchases.  Check out their range of books at www.syngress.com

 

 

Assurance.com.au is helping out by sponsoring BsidesAU with some wifi fu.  Should be a hoot, as they will be bringing their ruxcon rig for folks to use.

 

 

Please let us know if you'd like to help out and sponsor

 

 

Planners (in no particular order)

 

  • Craig Lawson (@craiglawson)
  • Stephen MacDonald
  • Drazen Drazic (@DDrazic)
  • Clinton Smith
  • Neal Wise (@y011)

 

Volunteers

 

  • Mark Dowd aka @mdowd will be assisting as a guest presentation paper reviewer
  • Dave Matthews has offered to come along and be the celebrity photographer, thanks Dave!!

 

Task List

(please -cross out- when it's done)

 

Tech

 

 

Photo (done)

Video

Audio

Streaming or Stickam or Skype or Ustream or Livestream (TBD)

 

Non-tech

 

Breakfast

Lunch

Coffee/Tea

Tables and chairs

 

 

Tags for flickr, twitter, blog, etc.

 

Please use the tag #BsidesAU for content related to this event

 

Follow us on twitter @bsidesau

 

Comments (0)

You don't have permission to comment on this page.