MEET THE TEAM

The founding consultants of Asterisk have provided information security advice, services and infrastructure to our clients for more than 15 years. Our experience ranges from assisting small and medium businesses to larger enterprises covering sectors such as government, mining and resources, critical infrastructure and commercial.

The Asterisk team of consultants have

  • Extensive, practical and relevant industry experience
  • Highly regarded technical skill sets
  • Industry recognised qualifications across multiple security domains
  • Business acumen
  • The ability to engage with stakeholders across all levels of business

Asterisk invests in ongoing technical training and our consultants currently hold various certifications including Certified Information Systems Security Professionals (CISSP), CREST Certified Tester (CCT), GIAC Penetration Tester (GPEN), Certified in Risk and Information Systems (CRISC) and various technology related certifications (CheckPoint, Cisco, Bluecoat, Symantec, F5).

By selecting Asterisk for the delivery of information security services, clients can expect to work with consultants who are passionate about information security, have a wealth of experience and are keen to deliver real results that help achieve tangible benefits to a business.

Download our corporate brochure here

IN THE INDUSTRY

Asterisk consultants actively participate in the information security community and are involved in several industry groups including OWASP, the Australian Information Security Association, and ISACA.

AUG 18
"The art of manipulation" at ECU DigiWeek 2018
AUG 18
"Negotiating Your Worth" at WiTWA TechXChange Panel Event
JUL 18
"How to win friends and comply with the Notifiable Data Breaches scheme" at DDD Perth & SecTalks Perth
MAY 18
"A primer in online safety and information security" at Deanmore Primary School
APR 18
"Client-side is Best-side for Authentication" at SecTalks PER
APR 18
"Get-GPTrashFire" at Bsides Canberra
MAR 18
"A primer in online safety and information security" at Alkimos Primary School
FEB 18
"Let's Play-AI Super Metroid" at CrikeyCon Brisbane
JAN 18
"An introduction to ROP" at SecTalks Perth
SEP 18
"Influencing the Future" at IT Vision iNNOVATE 2017
APR 17
"Cyber threats for places of mass gathering: it's only kind of like the movies" at Mass Gathering Security Collective Perth
MAR 17
"International Women's Day panel discussion" at Bankwest Perth
MAR 17
"Cyber criminals are effective and efficient: Are you protected?" at the Business Knowledge and Software Expo
MAR 17
"We have no idea how to hack a Furby Connect" at BSides Canberra & WAHCKon
JUN 16
"Cloud Security" at Australian Institute of Management Perth
JUN 16
"An Evolved Approach to Security Testing" at Interbank Conference Perth
SEP 15
"Secure Application Development workshop" at Curtin
MAR 15
"Information Security Root Causes"
DECEMBER 2015
"Australian Metadata Law" at Kiwicon
MAY 2015
"A foray into hardware hackery" at WAHCKon
MAY 2015
"Cloutron - The Hipster way to monitor your cloud" at WAHCKon
FEBRUARY 2015
"An Analysis of Ice-Breakers" at CrikeyCon
DECEMBER 2014
"WTFlip is Browser Hacking?" at OWASP Melbourne
DECEMBER 2014
"BeEF for Vegetarians (Hooked Browser Meshed-Networks with WebRTC)" at Kiwicon 8
NOVEMBER 2014
"Shedding Light on the Known Unknowns" at the Perth AISA Con 2014
OCTOBER 2014
"Undressing your Threat Model" at the ISACA CACS 2014
MAY 2014
"WTF is Browser Hacking?" at AISA Perth
MAY 2014
"Continuous Security" at Perth's DevOps Meetup
MAY 2014
"Browser Break-Dancing" at WAHCKon
APRIL 2014
"Stop it or you'll go Blind" at SecTalks Perth
MARCH 2014
"Security - the missing ingredient in Continuous Everything" at TestWest 2014
FEBRUARY 2014
"BROWSER Y U SO SLO?" at SecTalks Perth
DECEMBER 2013
"APT is the new Black(hat)" at WA News SGH & SWM IT Annual Conference
OCTOBER 2013
"Time to Limber Up: Security in Agile Environments" at the ISACA Perth Conference
SEPTEMBER 2013
"Risky e-Business" at the IT Vision Users Conference
MAY 2013
"Anonymous Post-Compromise Control via Tor Hidden Services" at WAHCKon
MARCH 2013
"BeEF: The Browser Exploitation Framework" at the Edge of the Web Conference
DECEMBER 2012
"Tor, what is is good for?" at the AISA Perth Conference
OCTOBER 2012
"A Nightmare on Incident Response Street" at the ISACA Perth Conference
JUNE 2012
"You won’t believe the things I’ve seen" at Ruxmon Perth
APRIL 2012
"Shake Hooves with BeEF" at OWASP’s AppSecAPAC Sydney
MARCH 2012
"Shake Hooves with BeEF" at Perth’s Inaugural Ruxmon Meeting
DECEMBER 2011
"Defending Web Applications" at AISA’s Techday Perth
JULY 2011
Presentation at Perth’s CloudCamp on Penetration Testing from the Cloud
MAY 2011
"How minor vulnerabilities can do ‘very bad things’" at the ANZTB’s SIGIST Perth
MAY 2011
"Cross-site scripting: You don’t always know who the actors are" at SecAU’s Security SIG Perth
DECEMBER 2010
"How minor vulnerabilities can do ‘very bad things’" at AISA’s Techday Perth
AUGUST 2010
SecAU’s Cyber Resilience Conference Panel
JUNE 2010
"How mature is your software security process?" at AISA Perth
APRIL 2010
"Web Security" at Perth’s BarCamp
DECEMBER 2009
"Catching (some) of the Top 10" at AISA’s Inaugural Techday Perth

PARTNERS

Close working relationships with information security partners and investment in regular training ensures that Asterisk consultants are certified to offer quality service and product advice.