*BOOKED OUT* Social Engineering - Physical Red Teaming Lessons From The Field
Chris Gatford, Alex Young
19/05/2026 9:00 am
Tutorial – Day 1
Boss Fight: Disrupting Phishing Campaigns with urlscan.io
Daniel McNamara
The Fifth International Cybersecurity Challenge
*BOOKED OUT* Practical Digital Forensics Triage and Analysis Using KAPE and EZ Tools
Seth Enoka
*BOOKED OUT* Cyber Risk Quantification Bootcamp
Patrick Dunstan
Code to container: How to secure a container build pipeline
Pratima Singh, Chris Lamont-Smith
AWS Security Event Simulation - Ransomware on S3 and SSRF with IMDSv1
Richard Billington, Zohreh Norouzi
19/05/2026 12:30 pm
*BOOKED OUT* Social Engineering - Physical Red Teaming Lessons From The Field (Full day - Continued)
Chris Gatford
19/05/2026 1:30 pm
Boss Fight: Disrupting Phishing Campaigns with urlscan.io (Full-day – continued)
High School Student CTF
Cyber Risk Quantification Bootcamp (Full-day – continued)
AI Compliance implementation using ISO42001, ISO42005, NIST-AI-RMF and global AI Guidelines
Dan Goldberg
*BOOKED OUT* From Silos to Synergy: How Identity Unifies Security Architecture
Michael Smith, Will Harrington
*BOOKED OUT* Practical Threat Hunting: From Intelligence to Action
James Short, Luke Haber
20/05/2026 9:00 am
Tutorial – Day 2
*BOOKED OUT* How to Actually Change Security Behaviour (without the BS)
Kelsy Luengen
Day 2: The Fifth International Cybersecurity Challenge
*BOOKED OUT* Game Plan for AI Governance: ISO 42001 Integration for Security Leaders
JP Haywood
*BOOKED OUT* Hands on Enterprise Security Architecture Workshop
Bruce Large
*BOOKED OUT* Kickstart your CTI program with MISP
Prescott Pym, Chris Horsley
20/05/2026 12:30 pm
Practical Threat Hunting: From Intelligence to Action (Full-day – continued)
Luke Haber
20/05/2026 1:30 pm
Channel Meets Gold Coast - Invite Only
Understanding Emerging AI and Data Governance Best Practices
Leah Mooney, Anthony Smit, David Rudduck
*BOOKED OUT* Hands on Enterprise Security Architecture Workshop (full day - continued)
Kickstart your CTI program with MISP (Full-day – continued)
Welcome to AUSCERT2026
Adam Spencer
21/05/2026 9:00 am
Conference – Day 1
Welcome from AUSCERT GM, Ivano Bongiovanni
Ivano Bongiovanni
21/05/2026 9:20 am
Game On: The AUSCERT Challenge
21/05/2026 9:40 am
How Attackers Play the Endpoint—and How to Break the Game
Daniel Schell
21/05/2026 10:10 am
21/05/2026 10:30 am
Flattening the SOC: Re-thinking Tiered Operations to Improve Outcomes
Zane Jarvis
21/05/2026 11:00 am
DDoS, Doxxing, and Digital Warfare: Cybersecurity Lessons from the Gaming Trenches
Elese Cox
"GAME OVER! Start Again?" - Getting Security Right From The Start
Jess Dodson
When Attackers Use AI: How Defenders Can Respond
Brett Williams
Incident Response: What Security Teams Need to Know (legal one)
Matthew Pokarier
21/05/2026 11:45 am
Cognitive Warfare: When Defenders Stop Updating Their Mental Model
Somindu Abeydeera
Levelling up your CTI program with the CTI-CMM
Chris Horsley, Prescott Pym
Make Your Business a Hard Target for Cybercriminals
Emile Barakat
21/05/2026 12:25 pm
How much tech should a CISO know before a CISO passes GO?
Eric Pinkerton
21/05/2026 1:25 pm
Critical Links: Strategic and Technical Risk Assessment of Pacific Submarine Cable Infrastructure
Edward Farrell
Threat Intelligence for Smarter Risk Reduction
Shanna Daly
The 16-Minute Breach: Why Human-Led Defense Fails Against Agentic AI
Nick Clark
Skateboarding, Skydiving, Security – What can we learn from Extreme Sports?
Hank Opdam
21/05/2026 2:10 pm
Under the Hood: The Battle for Security, Safety & Privacy in a Connected Vehicle World
Daniel Hreszczuk
Hunting Nation-State APTs in Telecommunications Networks: Intelligence Lessons from the Front Lines
Luke Haber, James Short
The New Face of the Email Attack: When Everything Looks Legitimate
Rahul Samant
From Zero to Global: A Founder's Journey in Building a Successful Cybersecurity SaaS Company
Ian Yip
21/05/2026 2:55 pm
Ready Player Three: Trawling telegram for threat intelligence
Dylan Jones
The real state of North Korea's employment fraud operations in Australia.
Alex Tilley
The Ghost in the Machine: AI Automated Attacks From Inside & Out
Mick Davies
21/05/2026 3:35 pm
Scaling Capability or Scaling Risk? A Look at AI at the Coalface
Mick McCluney, Matt Nock
21/05/2026 4:00 pm
The Honest Debrief: What It Actually Takes to Evolve Security for the AI Era
Andrew Philp, Scott Hawkins, Ben Laker
21/05/2026 4:30 pm
Birds of a Feather sessions
21/05/2026 5:00 pm
Pre-dinner drinks - AUSCERT2026 Gala Dinner
21/05/2026 6:30 pm
Welcome to Day 2 of AUSCERT2026
22/05/2026 9:00 am
Conference – Day 2
iTnews State of Security Report 2026
22/05/2026 9:05 am
Beyond the Perimeter: Navigating Identity Exploitation in the Age of AI
Andrew Aston
22/05/2026 9:15 am
Beyond Bits: Defending Data in the Quantum Age
Kawin Boonyapredee
22/05/2026 9:35 am
Offensive security: Walking the fine red (team) line
22/05/2026 10:05 am
22/05/2026 10:25 am
AUSCERT Cyber Leadership Network (CLN)
Mikhail Lopushanski, Tim Lane
22/05/2026 11:00 am
Why Quantum Cryptanalysis is Bollocks
Peter Gutmann
ProfileHound: BloodHound collector for user profiles stored on machines
Chris Haller
Strength in Connections: The Anatomy of Managed Defence
Justin Allen
The Referee’s Playbook: Avoiding the Red Card ($5.8M Fines) and the Sin Bin
Chris Haigh
22/05/2026 11:40 am
Building Your First Operational Technology (OT) Incident Response Plan
Lesley Carhart
Achievement Unlocked: Two Decades of Phishing Research
The AI Cyber Arms Race Has Begun
Ty Miller
Co-op Mode: Levelling Up Supply Chain Resilience
Adam Selwood
22/05/2026 12:20 pm
Gaining a Cognitive Edge: Smart Esports (AI and Cyber) for High-Performance Team Training
Jessica Gulick
AI In Bug Bounty @ GitLab: The Good, The Bad, and The Extreme
Katherine Wu
To be announced
22/05/2026 1:00 pm
The Accidental Security Architect (and why that needs to change)
Lidia Giuliano
22/05/2026 2:00 pm
How To Replace Your People With AI
David Rudduck
Build your own Potato - An exploration of how Windows authentication abuse “actually works”
Daniel Cooper
Game On! Inside the Program Committee: What Makes a CFP a Winner
Kat McCrabb, Lukasz Gogolkiewicz, Colby Prior, Bek Cheb, Lidia Giuliano
22/05/2026 2:40 pm
Project Kitsune: The Agentic AI SOC Analyst That Never Sleeps (and Rarely Complains)
Matthew Gurr
Why I created OpenSourceMalware (right here on the Gold Coast!)
Paul McCarty
22/05/2026 3:15 pm
the AUSCERT Speed Debate 👏
Adam Spencer, Eric Pinkerton, Jess Dodson, Chris Gatford, Kelsy Luengen, Troy Hunt, Lidia Giuliano, Alex Tilley, Shanna Daly
22/05/2026 3:45 pm
Closing Remarks
22/05/2026 4:45 pm