Training

Free training is available to attendees of the ACSC Conference 2018. Please note that places are limited and will be available on a first come, first served basis. A waitlist will be in operation.

Bookings for workshops are ESSENTIAL and can be made through the conference registration process. NB: to secure a place on the training you must pre-register prior to attending the Conference to avoid disappointment.

Tuesday 10 April 2018

8.00am-
10.00am

Torrens Room

Incident Response Training
Jason Pang & Mitchell Clarke, CERT Australia
A workshop that works through one of the technical challenges (used normally as a recruitment tool) to provide attendees with insights into the process for conducting an incident response activity, covering incident response tools and threat actor tradecraft.
Whole Day
20 max

Swan Room

AWS Security Immersion Day
John Hildebrandt, Amazon Web Services
Come and learn how to secure your workloads in the cloud and adopt security best practices. Learn how to move quickly and stay secure.
Whole Day
40 max

10.00am-
10.15am
 Morning Tea
10.15am-
12.15pm

Incident Response Training

Continued

AWS Security Immersion Day

Continued

12.15pm-
1.00pm
 Lunch
1.00pm-
3.00pm

Incident Response Training

Continued

AWS Security Immersion Day

Continued

Derwent Room

How to build a mature Cyber Threat Intelligence Program
Mark Arena, Intel471
This workshop will train participants on how to implement traditional intelligence tradecraft and methodologies into a cyber threat intelligence program that supports multiple areas and levels of an organisation.
Two Hours
25 max

 3.00pm-
3.15pm
 Afternoon Tea
 3.15pm-
5.15pm

Incident Response Training

Continued

AWS Security Immersion Day

Continued

VMWare NSX Hands on Lab
Trevor Gerdes, VMWare
In this hands-on lab on SDN and micro-segmentation, you will learn how to deliver highly-resilient networks that can handle today’s sophisticated cyberthreats, including control of east-west traffic.
Two hours
30 max

Friday 13 April 2018

8.00am-
10.00am

Torrens Room

Information Security Risk management for IT Security Technologists
Gary Gaskell, Infosec Services
IT security risk management for IT security people – its more than just vulnerabilities.
Whole Day
60 max

Swan Room

The art of hacking IoT
Chris Archimandritis, Sense of Security
IoT devices have a bad security wrap. Learn how to attack and secure these devices supported with hands on labs and exercises.
Whole Day
40 max

Fitzroy Room

Securing Office 365 for the Australian Government
Aaron Dinnage, Microsoft
Learn how to secure Office 365 for use within Australian Government.
Four Hours
30 max

Derwent Room

Develop a successful and resilient cyber security education program
Bianca Wirth, IAG
Join Bianca Wirth to learn how to develop a security education strategy, campaign plan and creative ideas for the ultimate goal of changing employee security behaviour.
Four Hours
30 max

Murray Room

Security Automation for DevOps Environments
Murray Goldschmidt, Sense of Security
Tutorial on Active Defences for a Cyber Attack against AWS Cloud. Red Team – Blue Team Interaction.
Four Hours
80 max

10.00am-
10.15am
 Morning Tea
10.15am-
12.15pm

Information Security Risk management for IT Security Technologists

Continued

The art of hacking IoT

Continued

Securing Office 365 for the Australian Government

Continued

Develop a successful and resilient cyber security education program

Continued

Security Automation for DevOps Environments

Continued

12.15pm-
1.00pm
 Lunch
1.00pm-
3.00pm

Information Security Risk management for IT Security Technologists

Continued

The art of hacking IoT

Continued

Are you a secure code warrior?
Jaap Singh, Secure Code Warrior
This tech lab will offer students a hands-on, gamified training environment where they compete against each other to become the ultimate ‘Secure Code Warrior.’
Two Hours
50 max
Hands on threat hunting with Splunk
Jon Harris, Mickey Perre & Mike Crozier, Splunk
This training session will begin by discussing the collection, configuration and analysis of data in enterprise environments and finishing with threat hunting in Splunk.
Four Hours
40 max
 3.00pm-
3.15pm
 Afternoon Tea
 3.15pm-
5.15pm

Information Security Risk management for IT Security Technologists

Continued

The art of hacking IoT

Continued

Where the Bad Guys are: Practical Threat Hunting
Chris Saltys, Recorded Future
Criminals use the internet just like we do, to access, store, and share information. Want to stop them? We’ll help you uncover their tools, tactics, and tasks.
Two Hours
25 max

Hands on threat hunting with Splunk

Continued

Bookings for workshops are ESSENTIAL and can be made through the conference registration process. NB: to secure a place on the training you must pre-register prior to attending the Conference to avoid disappointment.