Recent Sense of Security Public Presentations

2019

7-3-19

Sense of Security together with Redwolf presented How to design and operate a DDoS program at RSA USA 2019

Sense of Security’s COO Murray Goldschmidt presented Securely Deploying Micro Services, Containers & Serverless PaaS Web Apps at RSA USA 2019

2018

14-11-18

Making Sense of Office 365 Email (In)Security Presented by Jason Edelstein

 19-10-18

Sense-of-Security-Outsourcing-IT-Services-and-Managed-Services–Are-you-secure? Presented at the Australian Professional Indemnity Group (APIG) NSW – Cyber in Focus Seminar

10-10-18

Murray-Goldschmidt-Sense-of-Security-Container-Security-AISA-National-Conference-V1.0-10Oct18 Presented at the Australian Cyber Conference 2018

26-7-18

Murray-Goldschmidt-Sense-of-Security-DevOps-Cyber-Attack-Kill-Chain-V1.0-26Jul18 – Presented at the Australian Cyber Innovation Executive Lunch

26-3-18

Sense of Security – Ad Recon tool – Presented at BlackHat Asia 2018

12-3-18

Sense-of-Security-Effective-Container-Security-for-Security-and-Compliance-ACSC2018-V1.1-12Apr18 –  Presented at ACSC Conference 2018

22-3-18

Data-Breach-Compliance-and-Preparedness-v0.1-24Apr18-ITC

2017

11-10-17

AISA 2017 – DevOps Cyber Attack Kill Chain with Automated Security Response and Visibility

1-8-17

RSA 2017 presentation – Overcoming the Challenges of Security Automation in DevOps

20-3-17

Advanced Security Automation for DevOps – presented at ACSC 2017

2016

14-4-16

ACSC Conference 2016 – DevOps, a How To for Agility with Security

2015

22-9-15

AusCERT 2014 – Pierre Tagle – Sense of Security – PCIDSS The Trilogy – Adapting Compliance to Version 3

2014

10-12-14

Kiwicon 2014 Practical-VoIP-Hacking-with-Viproy

15-10-14

AusCERT 2014 – Pierre Tagle – Sense of Security – Privacy Act II (The Sequel) – Considerations for the Tech Sector

15-10-14

AusCERT 2014 – Joshua Cavalier – Shawn Thompson – In Crypto We Trust, or do we – Dragging privacy back to the 90s

25-5-14

Hack-In-The-Box Amsterdam 2014 – Cross-Site Scripting Your Way to Shell

2013

10-11-13

Botnets-of-the-Web-How-to-Hijack-One

2012

17-5-12

AusCERT2012 – Mobility Security: Help! My Mobile Device Is Spying on Me

11-4-12

Security in the Cloud: Visibility & Control of your Cloud Service Providers

2011

25-10-11

Cyber Security for Government Conference: Penetration Testing – How Government Can Achieve Better Outcomes

22-6-11

Smart Electricity World Conference – Securing the Smart Grid

19-5-11

SCADA CoI – Virtualisation Security for Regulated Environments (IACS)

18-5-11

AusCERT 2011: Virtualisation Security for Regulated Environments

24-3-11

iPhone Security

2010

30-10-10

Smart Phone Security

20-10-10

Virtualisation Security for PCI Environments

16-8-10

Mobility and Application Security

27-7-10

Virtualisation Security; Focus on the Fundamentals

2009

3-12-09

Achieving PCI Compliance – Long and Short Term Strategies

11-8-09

PCI Compliance – A Business Issue – ISACA Keynote Session

23-7-09

Addressing the security challenges of two emerging technologies: Mobility and Web2.0 – Public Sector Information Security Conference

10-5-09

Virtualisation: Pitfalls in Corporate VMware Implementations – AusCERT2009

15-4-09

Where PCI stands today: Who needs to do What, by When – AISA

4-3-09

Managing and Securing Web 2.0