Search
  • Videos
  • Windows 10
  • 5G
  • Best VPNs
  • Cloud
  • Security
  • AI
  • more
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Windows 10
    • 5G
    • Best VPNs
    • Cloud
    • Security
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

AusCERT 2013 Day 1

1 of 20 NEXT PREV
  • 0img8110alblake-v1.jpg

    Al Blake, chief information officer of the Department of Sustainability, Environment, Water, Population and Communities gave an informative and entertaining presentation on managing mobile device security in a government environment.

    Published: May 23, 2013 -- 05:55 GMT (22:55 PDT)

    Photo by: Zennith Geisler/ZDNet

    Caption by: Zennith Geisler

  • 0img8171eugenekaspersky-v1.jpg

    Eugene Kaspersky's presentation on how to protect business and critical infrastructure gave us an insight into his vision for new approaches to combating threats, although he wasn't keen to be quoted on the vulnerabilities of mobile networks. In fact, his advice for protecting telecommunications networks from cyberthreats is to pray.

    Published: May 23, 2013 -- 05:55 GMT (22:55 PDT)

    Photo by: Zennith Geisler/ZDNet

    Caption by: Zennith Geisler

  • 0img8227china-v1.jpg

    The session China Challenges: Target — Australia: People's Republic of China use of Computers & Networks as a Strategic Weapon by Lt Col Hagestad was possibly the busiest session we've attended at the conference so far.

    Published: May 23, 2013 -- 05:55 GMT (22:55 PDT)

    Photo by: Zennith Geisler/ZDNet

    Caption by: Zennith Geisler

  • 0img8244brianhay-v1.jpg

    In his presentation on surviving the cyberfraud nightmare, Brian Hay introduced us to Jill, a survivor of fraud who was brave enough to share her heartbreaking story.

    Published: May 23, 2013 -- 05:55 GMT (22:55 PDT)

    Photo by: Zennith Geisler/ZDNet

    Caption by: Zennith Geisler

  • 0img8298jill-v1.jpg

    The victim of Nigerian scammers, Jill lost over AU$300,000, and the ordeal contributed to the breakdown of her marriage.

    Published: May 23, 2013 -- 05:55 GMT (22:55 PDT)

    Photo by: Zennith Geisler/ZDNet

    Caption by: Zennith Geisler

  • 0img8603michealtjonesipad-v1.jpg

    Chief technology advocate at Google, Michael T Jones spoke about security's greatest risk: how society's ever-increasing dependence on computers and communication has raised issues of privacy and security to the level of National threats.

    Published: May 23, 2013 -- 05:55 GMT (22:55 PDT)

    Photo by: Zennith Geisler/ZDNet

    Caption by: Zennith Geisler

  • img7811stormtroopers-v1.jpg

    The Storm Troopers and other Star Wars characters were so popular at last year's conference that they made a welcome return. These guys provide entertainment at AusCERT for free, and are given a donation that goes to charity. Approve of this, we do.

    Published: May 23, 2013 -- 05:55 GMT (22:55 PDT)

    Photo by: Zennith Geisler/ZDNet

    Caption by: Zennith Geisler

  • img7812bobafett-v1.jpg

    The Storm Troopers might dominate in numbers, but we wouldn't mess with Boba Fett! He definitely makes us feel secure, and could probably give the conference security guards a run for their money.

    Published: May 23, 2013 -- 05:55 GMT (22:55 PDT)

    Photo by: Zennith Geisler/ZDNet

    Caption by: Zennith Geisler

  • img7814emperorsroyalguide-v1.jpg

    The Emperor's Imperial Guard also showed up to make sure everyone was protected.

    Published: May 23, 2013 -- 05:55 GMT (22:55 PDT)

    Photo by: Zennith Geisler/ZDNet

    Caption by: Zennith Geisler

  • img7817sophosvspatbeer-v1.jpg

    Risky Business' Patrick Gray stopped by the Sophos stand to chat to their team, or were they just debating whether XXXX or VB is the best beer? Pat may hail from Victoria, but when in Rome (or Queensland, in this case)...

    Published: May 23, 2013 -- 05:55 GMT (22:55 PDT)

    Photo by: Zennith Geisler/ZDNet

    Caption by: Zennith Geisler

  • img7822watchguard-v1.jpg

    Delegates ponder how many security experts it takes to set up an EAL+ Certified Smart Firewall.

    Published: May 23, 2013 -- 05:55 GMT (22:55 PDT)

    Photo by: Zennith Geisler/ZDNet

    Caption by: Zennith Geisler

  • img7831sophostshirtback-v1.jpg

    This year, Sophos chose the theme "Transform security", complete with Transformers cartoons playing at its stand and giveaways of Transformers-building kits and Optimus Prime masks.

    Published: May 23, 2013 -- 05:55 GMT (22:55 PDT)

    Photo by: Zennith Geisler/ZDNet

    Caption by: Zennith Geisler

  • img7832welcomedrinks.jpg

    The conference kicked off on Tuesday night, with welcome drinks sponsored by the organisers.

    Published: May 23, 2013 -- 05:55 GMT (22:55 PDT)

    Photo by: Zennith Geisler/ZDNet

    Caption by: Zennith Geisler

  • img7837brianhaymunirkotadia-v1.jpg

    Detective Superintendent Brian Hay, head of the Queensland Police Fraud Squad, recognises a familiar face in AusCERT veteran Munir Kotadia.

    Published: May 23, 2013 -- 05:55 GMT (22:55 PDT)

    Photo by: Zennith Geisler/ZDNet

    Caption by: Zennith Geisler

  • img8098robotman-v1.jpg

    FireEye may just have the most entertaining attraction at this year's conference, with its robot man, who turned out to be extremely friendly and playful, despite his menacing appearance.

    Published: May 23, 2013 -- 05:55 GMT (22:55 PDT)

    Photo by: Zennith Geisler/ZDNet

    Caption by: Zennith Geisler

  • img8151tokenisation-v1.jpg

    Founding member of AusCERT and senior security architect with CSC Peter Nikitser spoke about tokenisation for PCI DSS Compliance, and the issues that businesses face when managing card payment information. In this photo, he's expressing his victory at finally getting his team to stop using Telnet. Telnet is bad, mmmkay?

    Published: May 23, 2013 -- 05:55 GMT (22:55 PDT)

    Photo by: Zennith Geisler/ZDNet

    Caption by: Zennith Geisler

  • img8216trendmicroadambiviano-v1.jpg

    In his presentation on the rise of the targeted attack, Trend Micro's Adam Biviano gave us some practical steps to keep ahead of various issues from advanced persistent threats and targeted attacks to the cloud and BYOD.

    Published: May 23, 2013 -- 05:55 GMT (22:55 PDT)

    Photo by: Zennith Geisler/ZDNet

    Caption by: Zennith Geisler

  • img8309jillhands-v1.jpg

    Now a driving force within the Victims of Fraud Support Group, Jill helped us understand that being scammed doesn't happen because you are stupid or greedy. "You're so convinced you're not being conned, you just do anything," she said.

    Published: May 23, 2013 -- 05:55 GMT (22:55 PDT)

    Photo by: Zennith Geisler/ZDNet

    Caption by: Zennith Geisler

  • img8648fireeyerobot-v1.jpg

    The FireEye robot just wanted to fit in and have fun — visiting all the stands in the exhibition hall and making friends with the delegates.

    Published: May 23, 2013 -- 05:55 GMT (22:55 PDT)

    Photo by: Zennith Geisler/ZDNet

    Caption by: Zennith Geisler

  • img8663trustwavecoffee-v1.jpg

    Trustwave embraced the Star Wars theme, decking out their stand with an espresso machine that reminded us of an R2D2/C3PO combination. Or could this be a misplaced gold-plated coffee machine from NBN Co?

    Published: May 23, 2013 -- 05:55 GMT (22:55 PDT)

    Photo by: Zennith Geisler/ZDNet

    Caption by: Zennith Geisler

1 of 20 NEXT PREV
Zennith Geisler

By Zennith Geisler | May 23, 2013 -- 05:55 GMT (22:55 PDT) | Topic: AUSCERT

  • 0img8110alblake-v1.jpg
  • 0img8171eugenekaspersky-v1.jpg
  • 0img8227china-v1.jpg
  • 0img8244brianhay-v1.jpg
  • 0img8298jill-v1.jpg
  • 0img8603michealtjonesipad-v1.jpg
  • img7811stormtroopers-v1.jpg
  • img7812bobafett-v1.jpg
  • img7814emperorsroyalguide-v1.jpg
  • img7817sophosvspatbeer-v1.jpg
  • img7822watchguard-v1.jpg
  • img7831sophostshirtback-v1.jpg
  • img7832welcomedrinks.jpg
  • img7837brianhaymunirkotadia-v1.jpg
  • img8098robotman-v1.jpg
  • img8151tokenisation-v1.jpg
  • img8216trendmicroadambiviano-v1.jpg
  • img8309jillhands-v1.jpg
  • img8648fireeyerobot-v1.jpg
  • img8663trustwavecoffee-v1.jpg

AusCERT has returned to the Gold Coast for another year, and ZDNet was there to bring you all the highlights.

Read More Read Less

Al Blake, chief information officer of the Department of Sustainability, Environment, Water, Population and Communities gave an informative and entertaining presentation on managing mobile device security in a government environment.

Published: May 23, 2013 -- 05:55 GMT (22:55 PDT)

Caption by: Zennith Geisler

1 of 20 NEXT PREV

Related Topics:

AUSCERT Security Government - AU Australia
Zennith Geisler

By Zennith Geisler | May 23, 2013 -- 05:55 GMT (22:55 PDT) | Topic: AUSCERT

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 2
  • AusCERT 2012 pics: Vaders and Terminators

    The 2012 AusCERT conference continues with Star Wars, censorship, cyber attacks and machines becoming self-aware.

  • AusCERT 2012 kicks off: photos

    The 11th annual AusCERT information security conference kicked off this morning, with the theme "Security on the move".

  • AusCERT 2011, booth babes and all: pics

    The 10th annual Australian Computer Emergency Response Team (AusCERT) conference started today. The exhibition floor seemed unusually roomy, and regular attendees agreed that ...

  • AusCERT 2009: Photo gallery

    Australia's largest annual security conference, AusCERT, is underway for another year, and continues the tradition of bringing security gurus, vendors and members of government ...

  • Photos: AusCERT 2008

    The AusCERT 2008 security conference takes place in the Gold Coast this week. If you couldn't make it, here's what you're missing.

ZDNet
Connect with us

© 2021 ZDNET, A RED VENTURES COMPANY. ALL RIGHTS RESERVED. Privacy Policy | Cookie Settings | Advertise | Terms of Use

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • Do Not Sell My Information
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums