Training at Kiwicon has a twist; there's training classes available on Wednesday the 14th and Thursday the 15th; half the spots are paid, half are free. Some classes are mixed paid/free, some run one instance of paid and one of free. Paid places are straightforward; just buy what you want. Free ones are allocated on a "most-benefit" basis; you'll provide some reasons why you might want to go on the application form.
Why would you pay for something that you can get for free? Well, consider the abridged Kiwicon Code Of Conduct:
"Don't be a shitweasel"
If you work in the industry, or your work is paying for you to be at the Con, or if you have some other kind of fat cash paying gig, then we think it'd be swell of you to pay your way, and leave the free classes for those who can't afford it. In particular, we'll give priority to those with student tickets or jobs outside the relatively-well paid IT sector. If you try and sign up for the free classes from your fancy-pants dr.contractor.mr.the.plague.sir@fatcash.govt.nz, you're a jerk.
Kiwicon's about sharing the knowledge, so by paying your way, you're helping those who cant yet afford to.
Title | Red Team Master Class (Day 1) |
Abstract | Training Details |
Location | Tue 13 0900 @ Auldhouse |
Duration | 480 mins |
Name | Mubix |
Origin | US |
Bio | Mubix (Rob Fuller) is a Senior Red Teamer. His professional experience starts from his time on active duty as United States Marine. He has worked with devices and software that run gambit in the security realm. He has a few certifications, but the titles that he holds above the rest is FATHER, HUSBAND and United States Marine. |
Title | Defensive DevOps (Paid) |
Abstract | Training Details |
Location | Tue 13 0900 @ Auldhouse |
Duration | 480 mins |
Name | Aurynn Shaw |
Origin | Wellington |
Bio | aurynn is the founder of Eiara, a DevOps consultancy based in Wellington. She focuses on improving reliability and security by ensuring that everything falls over far more often than it used to, and convincing you that that’s actually a good thing. When she’s not building deployment processes, she can often be found participating in the internet’s second-longest-running argument, Twitter, or telling beautiful lies about how computers are here to help. |
Title | Applied Physical Attacks on Embedded and IoT Systems (Day 1) |
Abstract | Training Details |
Location | Tue 13 0900 @ Auldhouse |
Duration | 480 mins |
Name | Joe FitzPatrick |
Origin | US |
Bio | Joe FitzPatrick (@securelyfitz) is an Instructor and Researcher at SecuringHardware.com. Joe has spent over a decade working on low-level silicon debug, security validation, and penetration testing of CPUS, SOCs, and microcontrollers. He has spent the past 5 years developing and leading hardware security-related training, instructing hundreds of security researchers, pen-testers, hardware validators worldwide. When not teaching classes on applied physical attacks, Joe is busy developing new course content or working on misdirected hardware projects, which he regularly presents at all sorts of fun conferences. |
Title | Textile Hacking |
Abstract | Training Details |
Location | Wed 14 0900 @ Auldhouse |
Duration | 480 mins |
Name | E. Dunham |
Origin | USA |
Bio | so |
Title | Red Team Master Class (Day 2) |
Abstract | Training Details |
Location | Wed 14 0900 @ Auldhouse |
Duration | 480 mins |
Name | Mubix |
Origin | US |
Bio | Mubix (Rob Fuller) is a Senior Red Teamer. His professional experience starts from his time on active duty as United States Marine. He has worked with devices and software that run gambit in the security realm. He has a few certifications, but the titles that he holds above the rest is FATHER, HUSBAND and United States Marine. |
Title | Defensive DevOps (Free) |
Abstract | Training Details |
Location | Wed 14 0900 @ Auldhouse |
Duration | 480 mins |
Name | Aurynn Shaw |
Origin | Wellington |
Bio | aurynn is the founder of Eiara, a DevOps consultancy based in Wellington. She focuses on improving reliability and security by ensuring that everything falls over far more often than it used to, and convincing you that that’s actually a good thing. When she’s not building deployment processes, she can often be found participating in the internet’s second-longest-running argument, Twitter, or telling beautiful lies about how computers are here to help. |
Title | A Cat, a Dog, and a Roast Turkey: Whats in your Threat Model? (Paid) |
Abstract | Training Details |
Location | Wed 14 0900 @ Auldhouse |
Duration | 480 mins |
Name | Mark "pipes" Piper and Wade Winright |
Origin | New Zealand / London |
Bio | pipes is a Principal Security Consultant for Insomnia Security and one time Kiwicon co-founder. Threat Modeling has been as accidental by-product of building and hacking on stuff for a looooong time. Wade is the Director of Public Cloud Platform Security at Salesforce/Heroku with a drive to make this series of tubes we call home a safer place for all, and has been modeling threats for far more years than he'd care to admit." |
Title | Bluetooth Low Energy hacking 101 |
Abstract | Training Details |
Location | Wed 14 0900 @ Unconfirmed Location |
Duration | 480 mins |
Name | Kevin Alcock |
Origin | NZ |
Bio | Kevin resides in the baaaaadlands of Christchurch, NZ. where he helps organise the local Information Security Interest Group and CHCon. He has been programming for a living since 1986 (yes, longer than most of you have been alive). That makes him a fairly old dog, although he can still learn new tricks and obtained his OSCP in mid 2016. Now he is the founder and principal consultant at Katipo Information Security. |
Title | Intro to Badge Hacking |
Abstract | Training Details |
Location | Wed 14 0900 @ Auldhouse |
Duration | 480 mins |
Name | Jerome van Rooijen |
Origin | NZ |
Bio | In his day job Jerome works at Quantum Security as Principal Security Consultant. In his night job, Jerome works to further his understanding of blinky LEDs (generally via #badgelife) and turn old washing machines into shiny new wind turbines. |
Title | Let's be bad people! (Day 1) |
Abstract | Training Details |
Location | Wed 14 0900 @ Auldhouse |
Duration | 480 mins |
Name | Viss |
Origin | San Diego, USA |
Bio | Dan Tentler is the executive founder and offensive security practice director of The Phobos Group. Dan has an established reputation in the industry for his innovative risk surface discovery projects and numerous speaking engagements. Dan and his team have conducted unique targeted attack simulations for companies in sectors including financial, energy, manufacturing and industrials, and varied platform service providers. Dan routinely appears in the press on new security risks and security industry development. |
Title | Information Security Incident Handling Exercise |
Abstract | Training Details |
Location | Wed 14 0900 @ Unconfirmed Location |
Duration | 480 mins |
Name | Ahmed ElAshmawy |
Origin | Wellington |
Bio | Ahmed is a Principal Consultant at Axenic Ltd. He has significant experience as a trainer, as well as being a hands-on practitioner. He is a CERT-Certified Computer Security Incident Handler (CSIH) and a SEI-Authorised Instructor. He has been previously a member of the technical team of Q-CERT, Qatar’s national Computer Emergency Response Team. He developed and conducted a number of incident response tabletop exercises, using real-world scenarios, in addition to incident management frameworks and processes for several organisations. |
Title | Applied Physical Attacks on Embedded and IoT Systems (Day 2) |
Abstract | Training Details |
Location | Wed 14 0900 @ Auldhouse |
Duration | 480 mins |
Name | Joe FitzPatrick |
Origin | US |
Bio | Joe FitzPatrick (@securelyfitz) is an Instructor and Researcher at SecuringHardware.com. Joe has spent over a decade working on low-level silicon debug, security validation, and penetration testing of CPUS, SOCs, and microcontrollers. He has spent the past 5 years developing and leading hardware security-related training, instructing hundreds of security researchers, pen-testers, hardware validators worldwide. When not teaching classes on applied physical attacks, Joe is busy developing new course content or working on misdirected hardware projects, which he regularly presents at all sorts of fun conferences. |
Title | Red Team Master Class (Day 3) |
Abstract | Training Details |
Location | Thu 15 0900 @ Auldhouse |
Duration | 480 mins |
Name | Mubix |
Origin | US |
Bio | Mubix (Rob Fuller) is a Senior Red Teamer. His professional experience starts from his time on active duty as United States Marine. He has worked with devices and software that run gambit in the security realm. He has a few certifications, but the titles that he holds above the rest is FATHER, HUSBAND and United States Marine. |
Title | Let's be bad people! (Day 2) |
Abstract | Training Details |
Location | Thu 15 0900 @ Auldhouse |
Duration | 480 mins |
Name | Viss |
Origin | San Diego, USA |
Bio | Dan Tentler is the executive founder and offensive security practice director of The Phobos Group. Dan has an established reputation in the industry for his innovative risk surface discovery projects and numerous speaking engagements. Dan and his team have conducted unique targeted attack simulations for companies in sectors including financial, energy, manufacturing and industrials, and varied platform service providers. Dan routinely appears in the press on new security risks and security industry development. |
Title | Bluetooth Low Energy hacking 101 (Second Class) |
Abstract | Training Details |
Location | Thu 15 0900 @ Unconfirmed Location |
Duration | 480 mins |
Name | Kevin Alcock |
Origin | NZ |
Bio | Kevin resides in the baaaaadlands of Christchurch, NZ. where he helps organise the local Information Security Interest Group and CHCon. He has been programming for a living since 1986 (yes, longer than most of you have been alive). That makes him a fairly old dog, although he can still learn new tricks and obtained his OSCP in mid 2016. Now he is the founder and principal consultant at Katipo Information Security. |
Title | A Cat, a Dog, and a Roast Turkey: Whats in your Threat Model? (Free) |
Abstract | Training Details |
Location | Thu 15 0900 @ Auldhouse |
Duration | 480 mins |
Name | Mark "pipes" Piper and Wade Winright |
Origin | New Zealand / London |
Bio | pipes is a Principal Security Consultant for Insomnia Security and one time Kiwicon co-founder. Threat Modeling has been as accidental by-product of building and hacking on stuff for a looooong time. Wade is the Director of Public Cloud Platform Security at Salesforce/Heroku with a drive to make this series of tubes we call home a safer place for all, and has been modeling threats for far more years than he'd care to admit." |