A partner at @elttam, Matt has over a decade of industry experience in both offensive and defensive roles. He enjoys problem solving, data-based analysis, and trying to come up with ways to incorporate whisky into cooking.
A historical analysis of the security maturity of OpenSSH
Mitch Kelly aka Evilmonkey
Mitch is an InfoSec and Radio Communications engineer with Vast experience in IT Security, Radio Communications, RF, Software Defined radio and Jamming. He is from Perth Western Australia and has a nack for all things blinky, shiny and things that emit RF.
433Mhz And the World An Introduction to Jamming
Fergal Conner & Gordon Erasmos
Fergal & Gordon are recognised thought leaders and pivotal members of the information security community. Since their debut talk at WAHCKon  they have engaged with the community to inform, guide, and foster development of capability within the spheres cyber security. They claim joint credit for all advancement within the field since its inception.
Synergising The Internet of Everything And Fog Computing To Actualise The Cyber Perl Harbor: A Cross-silo Byod Approach to Dynamically Mitigating Next-Generation Watering Holes
Adam Foster aka Evildaemond
Adam Foster (evildaemond) is a Cyber Security undergrad at Edith Cowan University with a massive draw towards Physical Security, Well known collector of random junk, that he will eventually get around to messing with, and hopeful security researcher.
Bypass Techniques, because I am lazy
Peter Yorke aka Sneaky
Sneaky (@pete12601) is an Information Security Manager @ Kinetic IT. Prior to this he was a Police Sergeant at Technology Crime Services, WA Police’s specialist squad charged with investigating technology enabled crime. He is also a co-organiser of BSides Perth.
The snake that took down a child exploitation ring
Alex has more than 20 years’ experience within Defence ICT, primarily serving as a Special Forces officer within the Special Air Service Regiment. Alex led teams of Special Forces ICT specialists to develop, secure and deploy a complex and diverse array of high-readiness global telecommunications systems, capable of high-reliability communication within extreme Information Security threat environments. Alex developed and employed offensive and defensive cyber security capabilities in support of complex, high risk and strategically-sensitive Special Operation activities within both global and domestic contexts. Alex is an executive director and co-founder of Diamond Cyber Security.
Full Mission Profiles – Intelligence-lead, scenario bound penetration testing
Duncan Blandford aka Axelodtl
Axelodtl is a mature age cyber security student at ECU with a background in teaching sports people to sports better. His dream is to live in a world where people love their work, and where excellence is the new normal.
Becoming Securicon Valley: A Proposal for a State-wide Development Framework
Ricki Burke is the founder of CyberSec People. With 10 years recruitment industry experience, he was fed up with the way standard recruitment was disconnected to both the people and skills required for proper placement within an organisation. As such, Ricki set up his own company. He supports organisations across ANZ and has strong ties to his local Melbourne InfoSec community, and often supports meetups, events and students on their journey to working within the industry.
The cyber security “skills shortage” and what does it mean for you
Chester is a Principal Research Scientist in the Office of the CTO at Sophos in Vancouver, Canada. His primary role is to perform research on how the threat landscape is changing and provide advice to customers and the public on how to adjust policy and tactics to keep pace with the criminals.
Deep Dive on the Dark Web
Aaron hires people way smarter than he is and watches them do great things. He also spends his days promoting business excellence, building knowledge scaffolds and jackknifing off burning platforms into untapped data lakes.
117 projects later…
Ospray is a recent OSCP and long time infosec enthusiast. In his spare time Ospray loves researching new and emerging vulnerabilities and threats.
In search of remote root
Sajeeb is a final year Software Engineering student at Monash. He’s the founder of the Monash Cyber Security Club and a Penetration Tester at Hivint. He loves testing security of open source projects and teaching what he knows to others!
Beauty and the Beast: Burp and its Extender
Gareth is a long time sys admin, perenial trouble maker and security nerd, he has a special interest in tying disparate fields into InfoSec to construct a grand metanarritive.
Do you even Cyber bro? Tales of InfoSec, Devops, and sobering lessons from cognitive science
Cyber Security Architect, dreamer of a better future, rider of the wall, a flame bearer for the southern factions, and just a guy that watches too much Netflix.
Think like a Khan, build like a Qin.
Kai is an IT professional with 20 years of experience in national scale networks. Apart from his usual job of shifting bits around the country at ridiculous speeds, Kai has an unhealthy interest in encryption and data security. He has spoken previously at WAhckon on VoIP security and hacking as it effects modern voice providers.
Protecting your at-rest data from a surprisingly motivated adversary, or, why you’re not paranoid enough about your disk encryption
Sam is a penetration tester at Hivint Perth who has a particular interest in web application security. He is also one of the lead organisers for WACTF, Perth’s first community driven CTF event which is being played opposite the BSides speaking theatre!
Google Chrome – Your newest best friend in the field
Maxwell is a penetration tester and independent security researcher based in Singapore. He had spent a decade hacking for living. His research area includes Two-Factor authentication, cryptography, forensics, and others.
2FAssassin: Bypass 2FA, Stealing Private Keys, Abusing Client Certificates, Make Illegal Profits, Have Fun, and Much More.