FULLY BOOKED: Running Discussion Exercises with EiaB
Dr Mark Carey-Smith, Alex Webling
20/05/2025 9:00 am
Tutorial – Day 1
Evolve and Thrive with M365: Enhancing Security for Tomorrow
Mark Laffan, Daniel Silver
FULLY BOOKED: Using Kubernetes to evolve your infrastructure and deprive attackers
Colby Prior, Kyle Jackson
FULLY BOOKED: Cultivating a strong security mindset: A practical guide to Security Culture
Kelsy Luengen
To Be Announced
FULLY BOOKED: Social Engineering - Practical Red Teaming Lessons From The Field.
Chris Gatford
What InfoSec Leaders Need to Know about Cyber Laws, Losses and Insurance
Benjamin Di Marco, Leah Mooney, David Rudduck
FULLY BOOKED: Generative AI Security: Secure Generative AI Solutions using OWASP Framework
Matthew Gurr, Richard Billington
20/05/2025 12:30 pm
FULLY BOOKED: Cont. Running Discussion Exercises with EiaB
20/05/2025 1:30 pm
To be announced
FULLY BOOKED: Cont. Using Kubernetes to evolve your infrastructure and deprive attackers
FULLY BOOKED: Beyond Compliance: Building a Strong Cyber Security Culture
Claire Wilson, Rachel Mansson
FULLY BOOKED: Social Engineering - Practical Red Teaming Lessons From The Field
FULLY BOOKED: Building a Threat-Informed Security Framework: A Practical Approach to Aligning Security Controls with Real-World Threats
Naima Hassen, Chris Hows
FULLY BOOKED: How to CISO
Grant Lockwood
FULLY BOOKED: Hands on Cyber Security Architecture Workshop using the SABSA Framework
Bruce Large
21/05/2025 9:00 am
Tutorial – Day 2
FULLY BOOKED: ISO27001 & ISO42001 Implementation for both Small Companies and Large Organisations. [Information Security and AI Management Systems and Compliance - ISO/IEC 27001 & ISO/IEC 42001]
Dan Goldberg
FULLY BOOKED: Detection Engineering in Incident Response
Dr Michael Cohen
MISP Kickstart: get up and running with MISP and cyber threat intelligence
Chris Horsley, James Garrett
FULLY BOOKED: Risky Evolution - understanding what may bite you with an infosec & privacy focused risk framework
Simon Stahn
Red Teaming the Software Supply Chain
Paul McCarty
FULLY BOOKED: Security Operations-ThreatOps
Brett Williams, Rob Collins
FULLY BOOKED: Evolve Threat Detection and Incident Response in the Cloud
Zohreh Norouzi, Richard Billington
21/05/2025 12:30 pm
FULLY BOOKED: Cont. Hands on Cyber Security Architecture Workshop using the SABSA Framework
21/05/2025 1:30 pm
FULLY BOOKED: Battle Tested - Cyber Risk Quantification.
Jason Ha, Leonard Barker
FULLY BOOKED: Developing a continuous security detection testing and deployment pipeline with AWS and Splunk
Matthew Gurr, James Young
Cont. MISP Kickstart: get up and running with MISP and cyber threat intelligence
FULLY BOOKED: Practical Guide: Managing Supplier and Subcontractor Risks A Step-by-Step Implementation Tutorial
Asrar Ismail
Cont. Red Teaming the Software Supply Chain
FULLY BOOKED: Protecting Web Apps & API - Capture The Flag
Richard Bible
FULLY BOOKED: Lego Serious Play for Cyber
Vannessa Van Beek
Opening Remarks
Adam Spencer
22/05/2025 9:00 am
Conference – Day 1
Digital Survivors: The Epidemiology of Cyber Resilience
Jess Modini
22/05/2025 9:20 am
From Attack to Defence: Leveraging Precision AI to Combat AI-Powered Threats
Tom Scully, Dr Helen Teixeira
22/05/2025 10:00 am
22/05/2025 10:20 am
To E8 and Beyond! 🚀
Jess Dodson, Melina Ryan, Tania Ezra
22/05/2025 10:50 am
Novel Threats & Nation States: Mastering the Fundamentals of Incident Response - Lessons from the Field
Dylan Jones
The psychological toll of being scammed
Yashasveene Jayachandran
The Autonomous SOC evolution: Outsmart Threat Actors, Outpace Risks
Wayne Phillips
Financially quantifying cyber risk: A case study in an insurance company
Sergeja Slapnicar
22/05/2025 11:35 am
Incident Response 2.0: Preparing for Tomorrow’s Cyber Challenges Today
Louise Hanna
Cyber Esports: Diversifying and Evolving the Cyber Workforce
Jessica Gulick
Imagine Limitless: Fighting a Digital War with a Skeleton Crew
Ty Miller
22/05/2025 12:15 pm
The Face of Fear: Unmasking Our Anxiety About Facial Recognition
Eric Pinkerton
22/05/2025 1:15 pm
Unveiling the Known Unknowns in Windows Event Log Settings: Preparing for DFIR with Yamato Security's Open Source Tools
Fukusuke Takahashi
How to Evolve your Cyber Security Program with a Threat Profile
Bruce Large, Jared Cunningham
TRIM the Fat: Reducing The Attack Surface by Removing Unused OS Features
Josh Schwarz
Taking a stand against the rise of the robots
Queen Aigbefo
22/05/2025 2:00 pm
Under Attack: Leveraging military models and cyber warfare strategies for effective cybersecurity in your organisation
Kylie Watson
Patching is the tip of the Iceberg: Why most Vulnerability Management programs suffer the fate of the Titanic
Peter Gigengack
The Art of the Socially Engineered Attack
Matt Berry
Generative AI Breaches: Threats, Investigations, and Response
Thomas Roccia
22/05/2025 2:45 pm
Detection Deployment At Scale
Rameez Agnew
Behind the Mask: Defending Against Digital Disguise
Adam Cassar
From Band-aids to Battle Plans: The evolution from Vulnerability Management (VM) to Continuous Threat Exposure Management (CTEM)
David Coleman
22/05/2025 3:25 pm
Beyond the Horizon: AI's Uncharted Territories
Marek Kowalkiewicz
22/05/2025 3:55 pm
Making Sense of Threat Intelligence
Brent Muir
22/05/2025 4:30 pm
Birds of a Feather sessions
22/05/2025 5:00 pm
Pre-dinner drinks - AUSCERT2025 Gala Dinner
22/05/2025 6:30 pm
23/05/2025 9:00 am
Conference – Day 2
iTnews State of Security Report 2025
23/05/2025 9:05 am
Friday Morning Keynote
Lieutenant General Michelle McGuinness, CSC
23/05/2025 9:15 am
Cyber-futurism: Key trends for an evolving (and thriving) landscape
Ivano Bongiovanni
23/05/2025 9:45 am
23/05/2025 10:05 am
Why Disinformation is a Cyber Security Threat
Meg Tapia, Ross Paterson
23/05/2025 10:35 am
SecOps Integrations: Evolving from the Bowie Knife to the Conveyor Belt
Chris Horsley, Prescott Pym
Securing the Stars: Safeguarding Space Systems
Chathura Abeydeera
Sink or Sync: Cybersecurity Strategies that will Connect, Protect and Build your Business
Amanda Spencer
BEWARE: Company directors and managers have a legal responsibility to manage cyber security risks
James Carlopio
23/05/2025 11:20 am
Credential Stuffing Unmasked: Navigating the Threats and Fortifying Defences.
Zane Jarvis
Spying Cars - Threats and Practical Solutions
Gaurav Vikash
Ransomware Tales
Emile Barakat
Riding the wave of AI opportunity without a regulatory wipeout
Leah Mooney, Benjamin Di Marco
23/05/2025 12:05 pm
Advanced Threat Hunting in the Cloud: Building and Using Custom Detection Frameworks
Pouya Ghotbi
Hacking Smart Homes - A Threat Analysis of Self-hosted Smart Home Platforms
Matt Jones
From Governance to Agentic AI: Navigating the AI Revolution in Your Organisation
Mikhail Lopushanski
23/05/2025 12:45 pm
Evolution of red teaming from Windows domains to the cloud
Lloyd Simon
23/05/2025 1:45 pm
Cyber Life Skills: How to out-innovate cyber criminals
Relax, it will definitely happen. Digital estate planning.
Alex Tilley
Cyber Governance 2025: Trends and dynamics from the 2025 AUSCERT Member survey
Mohammad Firman Fidillah
Why Didn't I Get Paid? Bug Bounty Programs From the Vendor Perspective
Jon Green
23/05/2025 2:30 pm
When Technology Attacks - How perpetrators of domestic violence use technology to abuse, monitor and control
Andrew Collins
Creating a mentally healthy workplace
David Rudduck, Dean Ellis
Session
23/05/2025 3:10 pm
Speed Debate
23/05/2025 3:45 pm
Closing Remarks
23/05/2025 4:45 pm