Social Engineering - Physical Red Teaming Lessons From The Field
Chris Gatford
19/05/2026 9:00 am
Tutorial – Day 1
Boss Fight: Disrupting Phishing Campaigns with urlscan.io
Daniel McNamara
The Fifth International Cybersecurity Championship
Practical Digital Forensics Triage and Analysis Using KAPE and EZ Tools
Seth Enoka
Cyber Risk Quantification Bootcamp
Patrick Dunstan
Code to container: How to secure a container build pipeline
Pratima Singh
AWS Security Event Simulation - Ransomware on S3 and SSRF with IMDSv1
Richard Billington, Zohreh Norouzi
19/05/2026 12:30 pm
Social Engineering - Physical Red Teaming Lessons From The Field (Full day - Continued)
19/05/2026 1:30 pm
Boss Fight: Disrupting Phishing Campaigns with urlscan.io (Full-day – continued)
.
Cyber Risk Quantification Bootcamp (Full-day – continued)
AI Compliance implementation using ISO42001, ISO42005, NIST-AI-RMF and global AI Guidelines
Dan Goldberg
From Silos to Synergy: How Identity Unifies Security Architecture
Michael Smith
Practical Threat Hunting: From Intelligence to Action
James Short, Luke Haber
20/05/2026 9:00 am
Tutorial – Day 2
Hands on Enterprise Security Architecture Workshop
Bruce Large
Day 2: The Fifth International Cybersecurity Championship
Game Plan for AI Governance: ISO 42001 Integration for Security Leaders
JP Haywood
How to Actually Change Security Behaviour (without the BS)
Kelsy Luengen
Kickstart your CTI program with MISP
Prescott Pym, Chris Horsley
20/05/2026 12:30 pm
Practical Threat Hunting: From Intelligence to Action (Full-day – continued)
Luke Haber
20/05/2026 1:30 pm
Hands on Enterprise Security Architecture Workshop (Full-day – continued)
Understanding Emerging AI and Data Governance Best Practices
Leah Mooney
Kickstart your CTI program with MISP (Full-day – continued)
Opening Remarks
Adam Spencer
21/05/2026 9:00 am
Conference – Day 1
To be announced
21/05/2026 9:20 am
21/05/2026 10:00 am
21/05/2026 10:20 am
Flattening the SOC: Re-thinking Tiered Operations to Improve Outcomes
Zane Jarvis
21/05/2026 10:50 am
DDoS, Doxxing, and Digital Warfare: Cybersecurity Lessons from the Gaming Trenches
Elese Cox
"GAME OVER! Start Again?" - Getting Security Right From The Start
Jess Dodson
SentinelOne
Incident Response: What Security Teams Need to Know (legal one)
Matthew Pokarier
21/05/2026 11:35 am
Cognitive Warfare: When Defenders Stop Updating Their Mental Model
Somindu Abeydeera
OSINT Vulnerability Management
John Derrick
ThreatLocker
21/05/2026 12:15 pm
How much tech should a CISO know before a CISO passes GO?
Eric Pinkerton
21/05/2026 1:15 pm
Critical Links: Strategic and Technical Risk Assessment of Pacific Submarine Cable Infrastructure
Edward Farrell
Threat Intelligence for Smarter Risk Reduction
Shanna Daly
Zscaler
Skateboarding, Skydiving, Security – What can we can learn from Extreme Sports?
Hank Opdam
21/05/2026 2:00 pm
Under the Hood: The Battle for Security, Safety & Privacy in a Connected Vehicle World
Daniel Hreszczuk
Hunting Nation-State APTs in Telecommunications Networks: Intelligence Lessons from the Front Lines
Luke Haber, James Short
Abnormal AI
From Zero to Global: A Founder's Journey in Building a Successful Cybersecurity SaaS Company
Ian Yip
21/05/2026 2:45 pm
Ready Player Three: Trawling telegram for threat intelligence
Dylan Jones
The real state of North Korea's employment fraud operations in Australia.
Alex Tilley
21/05/2026 3:25 pm
21/05/2026 3:55 pm
21/05/2026 4:30 pm
Birds of a Feather sessions
21/05/2026 5:00 pm
Pre-dinner drinks - AUSCERT2026 Gala Dinner
21/05/2026 6:30 pm
22/05/2026 9:00 am
Conference – Day 2
22/05/2026 9:05 am
Friday Morning Keynote
22/05/2026 9:15 am
22/05/2026 9:45 am
22/05/2026 10:05 am
Is Australia Ready for a Cyber Crisis? Strengthening our National Preparedness
David Cullen
22/05/2026 10:35 am
Why Quantum Cryptanalysis is Bollocks
Peter Gutmann
ProfileHound: BloodHound collector for user profiles stored on machines
Chris Haller
The Referee’s Playbook: Avoiding the Red Card ($5.8M Fines) and the Sin Bin
Chris Haigh
22/05/2026 11:20 am
Building Your First Operational Technology (OT) Incident Response Plan
Lesley Carhart
Achievement Unlocked: Two Decades of Phishing Research
Co-op Mode: Levelling Up Supply Chain Resilience
Adam Selwood
22/05/2026 12:05 pm
Gaining a Cognitive Edge: Smart Esports (AI and Cyber) for High-Performance Team Training
Jessica Gulick
AI In Bug Bounty @ GitLab: The Good, The Bad, and The Extreme
Katherine Wu
22/05/2026 12:45 pm
The Accidental Security Architect (and why that needs to change)
Lidia Giuliano
22/05/2026 1:45 pm
How To Replace Your People With AI
David Rudduck
Build your own Potato - An exploration of how Windows authentication abuse “actually works”
Daniel Cooper
Game On! Inside the Program Committee: What Makes a CFP a Winner
22/05/2026 2:30 pm
Project Kitsune: The Agentic AI SOC Analyst That Never Sleeps (and Rarely Complains)
Matthew Gurr
Why I created OpenSourceMalware (right here on the Gold Coast!)
Paul McCarty
22/05/2026 3:10 pm
Speed Debate
22/05/2026 3:45 pm
Closing Remarks
22/05/2026 4:45 pm