Running Discussion Exercises with EiaB
Dr Mark Carey-Smith, Alex Webling
20/05/2025 9:00 am
Tutorial – Day 1
Evolve and Thrive with M365: Enhancing Security for Tomorrow
Mark Laffan, Daniel Silver
Using Kubernetes to evolve your infrastructure and deprive attackers
Colby Prior, Kyle Jackson
Cultivating a strong security mindset: A practical guide to Security Culture
Kelsy Luengen
FULLY BOOKED: Social Engineering - Practical Red Teaming Lessons From The Field.
Chris Gatford
FULLY BOOKED: Using cyber data to improve operations and calculate cyber risk
Hinne Hettema
What InfoSec Leaders Need to Know about Cyber Laws, Losses and Insurance
Benjamin Di Marco, Leah Mooney
Generative AI Security: Secure Generative AI Solutions using OWASP Framework
Matthew Gurr, Richard Billington
20/05/2025 12:30 pm
Cont. Running Discussion Exercises with EiaB
20/05/2025 1:30 pm
To be announced
Cont. Using Kubernetes to evolve your infrastructure and deprive attackers
Beyond Compliance: Building a Strong Cyber Security Culture
Claire Wilson, Rachel Mansson
FULLY BOOKED: Cont. Social Engineering - Practical Red Teaming Lessons From The Field.
FULLY BOOKED: Cont. Using cyber data to improve operations and calculate cyber risk
Building a Threat-Informed Security Framework: A Practical Approach to Aligning Security Controls with Real-World Threats
Naima Hassen, Chris Hows
How to CISO
Grant Lockwood
Hands on Cyber Security Architecture Workshop using the SABSA Framework
Bruce Large
21/05/2025 9:00 am
Tutorial – Day 2
ISO27001 & ISO42001 Implementation for both Small Companies and Large Organisations. [Information Security and AI Management Systems and Compliance - ISO/IEC 27001 & ISO/IEC 42001]
Dan Goldberg
Risky Evolution - understanding what may bite you with an infosec & privacy focused risk framework
Simon Stahn
Detection Engineering in Incident Response
Dr Michael Cohen
MISP Kickstart: get up and running with MISP and cyber threat intelligence
Chris Horsley, James Garrett
Transform Your Network Visibility on a Budget: Enhance and Aggregate Logging for Pre and Post-Breach Success
Conor Naughton
Red Teaming the Software Supply Chain
Paul McCarty
Security Operations-ThreatOps
Brett Williams, Rob Collins
Evolve Threat Detection and Incident Response in the Cloud
Zohreh Norouzi, Richard Billington
21/05/2025 12:30 pm
Cont. Hands on Cyber Security Architecture Workshop using the SABSA Framework
21/05/2025 1:30 pm
Battle Tested - Cyber Risk Quantification.
Jason Ha, Leonard Barker
Practical Guide: Managing Supplier and Subcontractor Risks A Step-by-Step Implementation Tutorial
Asrar Ismail
Developing a continuous security detection testing and deployment pipeline with AWS and Splunk
Matthew Gurr, James Young
Cont. MISP Kickstart: get up and running with MISP and cyber threat intelligence
Cont. Transform Your Network Visibility on a Budget: Enhance and Aggregate Logging for Pre and Post-Breach Success
Cont. Red Teaming the Software Supply Chain
Protecting Web Apps & API - Capture The Flag
Richard Bible
Lego Serious Play for Cyber
Vannessa Van Beek
Opening Remarks
Adam Spencer
22/05/2025 9:00 am
Conference – Day 1
Thursday Morning Keynote
22/05/2025 9:20 am
Thursday Morning Plenary with Palo Alto
22/05/2025 10:00 am
22/05/2025 10:20 am
To E8 and Beyond! 🚀
Jess Dodson, Melina Ryan, Tania Ezra
22/05/2025 10:50 am
Novel Threats & Nation States: Mastering the Fundamentals of Incident Response - Lessons from the Field
Dylan Jones
The psychological toll of being scammed
Yashasveene Jayachandran
SentinalOne Session
Financially quantifying cyber risk: A case study in an insurance company
Sergeja Slapnicar
22/05/2025 11:35 am
Incident Response 2.0: Preparing for Tomorrow’s Cyber Challenges Today
Louise Hanna
Cyber Esports: Diversifying and Evolving the Cyber Workforce
Jessica Gulick
Threat Intelligence Session
22/05/2025 12:15 pm
The Face of Fear: Unmasking Our Anxiety About Facial Recognition
Eric Pinkerton
22/05/2025 1:15 pm
Unveiling the Known Unknowns in Windows Event Log Settings: Preparing for DFIR with Yamato Security's Open Source Tools
Fukusuke Takahashi
How to Evolve your Cyber Security Program with a Threat Profile
Bruce Large, Jared Cunningham
Airlock Digital Session
Taking a stand against the rise of the robots
Queen Aigbefo
22/05/2025 2:00 pm
Under Attack: Leveraging military models and cyber warfare strategies for effective cybersecurity in your organisation
Kylie Watson
Patching is the tip of the Iceberg: Why most Vulnerability Management programs suffer the fate of the Titanic
Peter Gigengack
Abnormal Security Session
Generative AI Breaches: Threats, Investigations, and Response
Thomas Roccia
22/05/2025 2:45 pm
Detection Deployment At Scale
Rameez Agnew
Behind the Mask: Defending Against Digital Disguise
Adam Cassar
Session
22/05/2025 3:25 pm
Thursday afternoon Keynote
22/05/2025 3:55 pm
Thursday afternoon plenary
22/05/2025 4:30 pm
Birds of a Feather sessions
22/05/2025 5:00 pm
Pre-dinner drinks - AUSCERT2025 Gala Dinner
22/05/2025 6:30 pm
23/05/2025 9:00 am
Conference – Day 2
Friday Morning Keynote
Lieutenant General Michelle McGuinness, CSC
23/05/2025 9:05 am
Friday Morning Plenary
23/05/2025 9:45 am
23/05/2025 10:05 am
Why Disinformation is a Cybersecurity Threat
Meg Tapia, Ross Paterson
23/05/2025 10:35 am
SecOps Integrations: Evolving from the bowie knife to the conveyor belt
Prescott Pym, Chris Horsley
Securing the Stars: Safeguarding Space systems
Chathura Abeydeera
BEWARE: Company directors and managers have a legal responsibility to manage cyber security risks
James Carlopio
23/05/2025 11:20 am
Credential Stuffing Unmasked: Navigating the Threats and Fortifying Defences.
Zane Jarvis
Spying Cars - Threats and Practical Solutions
Gaurav Vikash
Riding the wave of AI opportunity without a regulatory wipeout
Leah Mooney, Benjamin Di Marco
23/05/2025 12:05 pm
Advanced Threat Hunting in the Cloud: Building and Using Custom Detection Frameworks
Pouya Ghotbi
Hacking Smart Homes - A Threat Analysis of Self-hosted Smart Home Platforms
Matt Jones
23/05/2025 12:45 pm
Evolution of red teaming from Windows domains to the cloud
Lloyd Simon
23/05/2025 1:45 pm
Cyber Life Skills: How to out-innovate cyber criminals
Relax, it will definitely happen. Digital estate planning.
Alex Tilley
Why Didn't I Get Paid? Bug Bounty Programs From the Vendor Perspective
Jon Green
23/05/2025 2:30 pm
When Technology Attacks - How perpetrators of domestic violence use technology to abuse, monitor and control
Andrew Collins
Creating a mentally healthy workplace
David Rudduck, Simon Harvey
23/05/2025 3:10 pm
Speed Debate
23/05/2025 3:45 pm
Closing Remarks
23/05/2025 4:30 pm