As seen on ....

As seen on …. #

Welcome to the “As Seen On” page, a comprehensive collection of my journey in the realm of cybersecurity. Here, you will find a curated selection of presentations, videos, blog posts, and other valuable content that I’ve had the privilege of sharing over the years.

This page serves as a testament to the collaborative efforts, insights, and experiences that I’ve had the honor of sharing with various audiences, from conference halls to online platforms. Whether you’re a fellow professional in the field, an aspiring cybersecurity enthusiast, or someone seeking to understand the importance of digital safety, I hope you find value in the wealth of knowledge and expertise that’s gathered here.

Feel free to explore the listings below to access a wealth of information and insights on cybersecurity. Each entry provides a glimpse into the various facets of my contributions to this dynamic industry. Click on the links to dive deeper into the content and stay informed about the latest advancements and strategies in the world of cybersecurity.

Thank you for joining me on this journey, and I look forward to sharing more in the future. Your curiosity and interest are greatly appreciated.

(written by ChatGPT cause there is no way I’d write that about myself!)

2023 #

Build amazing things (securely) #

August 2, 2023

  • (Podcast) The Person They Call When Things GO WRONG with Shanna Daly In this episode, Laura and Shanna talk through what actually happens when a forensics team is called in after an incident, what data really matters, and what we can do as developers to make investigations easier.


The Diana Initiative #

July 16, 2023

  • (Panel) Cybersecurity Research Panel

    This video features a panel of experts discussing topics related to cybersecurity research. They provide insights on how to pick a research topic, structure your research, manage your time, and set realistic goals.

    Watch Video

AISA Cybercon Canberra 2023 #

March 21, 2023

  • (Panel) What’s next for women in cyber?

    A panel discussion with Corch, Chloe Hatzis, Daisy Wong, and Shanna Daly on how we can keep moving the dial on diversity.

  • (Panel) The value of cyber threat intelligence

    A panel discussion with Shanna Daly, Bex Nitert, Chris Horsley, and Brett Williams on what threat intel is and how it is used by practitioners.

March 22, 2023

  • (Live podcast) Keynote session - Risky Business live podcast

    Shanna Daly joined Patrick Gray and Adam Boileau on stage at AISA Cybercon to talk about why the infosec industry sucks.

    Listen Here

  • (Presentation) Threat Intelligence without boiling the ocean

    Whilst no one will ever tell you that threat intelligence is easy, setting out on the path to use it in smart ways doesn’t need to be overwhelming. The amount of open source intelligence feeds, documents, blog posts and information shared in the community can easily become overwhelming, but there are some ways we can tackle this without jumping in the deep end, so to speak.

    Read the follow up blog post Here

2022 #

AusCERT “Share Today, Save Tomorrow” #

November 25, 2022

  • (Podcast) Digital Forensics and Incident Response

    With the changing threat surface presenting new and evolving challenges, Anthony speaks with Shanna Daly to discuss her views on digital forensics and incident response. They delve into the ‘how’ and ‘why’, which requires looking for proof of how something happened, from low-level investigations to evidence-based hypotheses of what is likely to have occurred.

    Listen Here

BSides Melbourne 2022 #

September 10, 2022

  • (Presentation) Old dog, new tricks

    This first-time talk with Mike and Shanna takes a fun and informative look at how todays cyber landscape has its roots in the tools and methodologies of the Cold War. With the aid of genuine spy artefacts Mike and Shanna will aim to give attendees a better appreciation of how the craft of traditional espionage maps to the modern cyber world.

    Drawing on Shanna’s deep experience in mitigating cyber threats, and Mike’s extensive collection of espionage tech, this talk will take you from housebreaking to Access Brokers, from typewriters to Keyloggers, from bugs and Kompromat cameras to RATS, from speech-over-IR to malware C&C - and more.

September 9, 2022

  • (Workshop) Introduction to Digital Forensics

    During this workshop participants will be introduced to the fundamentals of digital forensics, including artefact collection, preservation and analysis. Participants will learn how to start a digital investigation using open source or freely available tools to demonstrate the theory and challenges will be provided to participants to practice along.

CrikeyCon 2022 #

September 3, 2022

  • (Workshop) Using the ATT&CK matrix to map incidents to bolster detect and respond capabilities

    This workshop walked through the anatomy of an incident, from mapping incident stages to the ATT&CK tactics and techniques and then developing detection and mitigation strategies most relevant to that particular threat type.

AusCERT Conference 2022 #

May 13, 2022

  • (Presentation) Overcoming cognitive bias

    Cognitive biases are human errors that lead to an irrational or incorrect conclusion based on a particular person’s view of the world. For each of us, our individual biases drive our decisions every day; from where we sit on the bus, who we get our coffee from and how we do our work. These biases are based on many factors, including our upbringing, belief system, personal experiences, and education and if run unchecked in security operations, can impact the security of an organization. When building a team to run cyber investigations diversity can be the key to breaking the bias and I’ll talk through what some of these biases look like in the real world and some of the ways I have tried to combat them through hiring team members from diverse backgrounds and skillsets.

    Watch Video

may 10, 2022

  • (Workshop) Introduction to digital forensics

    During this workshop participants will be introduced to the fundamentals of digital forensics, including artefact collection, preservation and analysis. Participants will learn how to start a digital investigation using open source or freely available tools to demonstrate the theory and challenges will be provided to participants to practice along.

CRESTCon Australia 2022 #

April 29, 2022

Women speak cyber #

March 31, 2022

  • Sharing Your Knowledge with special guest Shanna Daly

    In this episode, LP, LV, and Shanna discuss her career, why she loves what she does and the importance of managing burnout, especially when you are passionate about what you do. They also chat about Shanna’s public speaking journey, how she overcomes nerves and her ambition to keynote at RSA as well as the inclusive, community conference she co-founded called ComfyCon.

    Listen Here

2020 #

Magnet forensics: Cache Up podcast #

October 21, 2020

  • Cache Up - Ep.21 - Shanna Daly

    Jessica interviews Shanna Daly about the latest trends in DFIR and explores Shanna’s journey to becoming a leading expert in the field. Listen Here

2019 #

BSides New Orleans #

October 26, 2019

  • (Presentation) Threat modelling in the land down under

    Australia is (in)famous for its dangerous flora and fauna, most notably deadly spiders, snakes and jellyfish. We continually have to look at potential threats and assess our risk of basic things like venturing outside. This talk looks to help turn threat modelling exercises into something relatable, fun and educational. Too often security education is delivered in a dry format that is difficult for non security folks to digest, so let’s look at fun ways to turn that around!

ICSL MRE 2019 #

July 1 and 2, 2019

2016 #

CrikeyCon 2016 #

February 20, 2016

  • (Presentation) Data Exfiltration in the Wild

    Watch Video

2015 #

ICSL MRE 2015 #

October 2, 2015

  • (Presentation) Incident response - The first 24 hours

    Cause it always happens at 3pm on a Friday …. You’ve received an alert, could be anything from a user reporting weird behaviour after clicking on a link, or after opening an attachment, could be an alert from your AV, correlation in SIEM detected something from a threat intel feed, external party notification, from your own analysis of a binary, the source for our purposes is irrelevant as we want to look at what to do and mostly what NOT to do in the first 24 hours after an incident has been detected (and the first world problems of incidents always happening late on a Friday …)