*BOOKED OUT* Social Engineering - Physical Red Teaming Lessons From The Field
Chris Gatford
19/05/2026 9:00 am
Tutorial – Day 1
Boss Fight: Disrupting Phishing Campaigns with urlscan.io
Daniel McNamara
The Fifth International Cybersecurity Challenge
*BOOKED OUT* Practical Digital Forensics Triage and Analysis Using KAPE and EZ Tools
Seth Enoka
*BOOKED OUT* Cyber Risk Quantification Bootcamp
Patrick Dunstan
Code to container: How to secure a container build pipeline
Pratima Singh
AWS Security Event Simulation - Ransomware on S3 and SSRF with IMDSv1
Richard Billington, Zohreh Norouzi
19/05/2026 12:30 pm
*BOOKED OUT* Social Engineering - Physical Red Teaming Lessons From The Field (Full day - Continued)
19/05/2026 1:30 pm
Boss Fight: Disrupting Phishing Campaigns with urlscan.io (Full-day – continued)
.
Cyber Risk Quantification Bootcamp (Full-day – continued)
AI Compliance implementation using ISO42001, ISO42005, NIST-AI-RMF and global AI Guidelines
Dan Goldberg
*BOOKED OUT* From Silos to Synergy: How Identity Unifies Security Architecture
Michael Smith
*BOOKED OUT* Practical Threat Hunting: From Intelligence to Action
James Short, Luke Haber
20/05/2026 9:00 am
Tutorial – Day 2
*BOOKED OUT* Hands on Enterprise Security Architecture Workshop
Bruce Large
Day 2: The Fifth International Cybersecurity Challenge
*BOOKED OUT* Game Plan for AI Governance: ISO 42001 Integration for Security Leaders
JP Haywood
*BOOKED OUT* How to Actually Change Security Behaviour (without the BS)
Kelsy Luengen
*BOOKED OUT* Kickstart your CTI program with MISP
Prescott Pym, Chris Horsley
20/05/2026 12:30 pm
Practical Threat Hunting: From Intelligence to Action (Full-day – continued)
Luke Haber
20/05/2026 1:30 pm
Hands on Enterprise Security Architecture Workshop (Full-day – continued)
Understanding Emerging AI and Data Governance Best Practices
Leah Mooney
Kickstart your CTI program with MISP (Full-day – continued)
Opening Remarks
Adam Spencer
21/05/2026 9:00 am
Conference – Day 1
To be announced
21/05/2026 9:20 am
21/05/2026 10:00 am
21/05/2026 10:20 am
Flattening the SOC: Re-thinking Tiered Operations to Improve Outcomes
Zane Jarvis
21/05/2026 10:50 am
DDoS, Doxxing, and Digital Warfare: Cybersecurity Lessons from the Gaming Trenches
Elese Cox
"GAME OVER! Start Again?" - Getting Security Right From The Start
Jess Dodson
SentinelOne
Incident Response: What Security Teams Need to Know (legal one)
Matthew Pokarier
21/05/2026 11:35 am
Cognitive Warfare: When Defenders Stop Updating Their Mental Model
Somindu Abeydeera
OSINT Vulnerability Management
John Derrick
ThreatLocker
21/05/2026 12:15 pm
How much tech should a CISO know before a CISO passes GO?
Eric Pinkerton
21/05/2026 1:15 pm
Critical Links: Strategic and Technical Risk Assessment of Pacific Submarine Cable Infrastructure
Edward Farrell
Threat Intelligence for Smarter Risk Reduction
Shanna Daly
Zscaler
Skateboarding, Skydiving, Security – What can we can learn from Extreme Sports?
Hank Opdam
21/05/2026 2:00 pm
Under the Hood: The Battle for Security, Safety & Privacy in a Connected Vehicle World
Daniel Hreszczuk
Hunting Nation-State APTs in Telecommunications Networks: Intelligence Lessons from the Front Lines
Luke Haber, James Short
Abnormal AI
From Zero to Global: A Founder's Journey in Building a Successful Cybersecurity SaaS Company
Ian Yip
21/05/2026 2:45 pm
Ready Player Three: Trawling telegram for threat intelligence
Dylan Jones
The real state of North Korea's employment fraud operations in Australia.
Alex Tilley
The Ghost in the Machine: AI Automated Attacks From Inside & Out
Mark Davies
21/05/2026 3:25 pm
21/05/2026 3:55 pm
21/05/2026 4:30 pm
Birds of a Feather sessions
21/05/2026 5:00 pm
Pre-dinner drinks - AUSCERT2026 Gala Dinner
21/05/2026 6:30 pm
22/05/2026 9:00 am
Conference – Day 2
22/05/2026 9:05 am
Friday Morning Keynote
22/05/2026 9:15 am
22/05/2026 9:45 am
22/05/2026 10:05 am
Is Australia Ready for a Cyber Crisis? Strengthening our National Preparedness
David Cullen
22/05/2026 10:35 am
Why Quantum Cryptanalysis is Bollocks
Peter Gutmann
ProfileHound: BloodHound collector for user profiles stored on machines
Chris Haller
The Referee’s Playbook: Avoiding the Red Card ($5.8M Fines) and the Sin Bin
Chris Haigh
22/05/2026 11:20 am
Building Your First Operational Technology (OT) Incident Response Plan
Lesley Carhart
Achievement Unlocked: Two Decades of Phishing Research
Co-op Mode: Levelling Up Supply Chain Resilience
Adam Selwood
22/05/2026 12:05 pm
Gaining a Cognitive Edge: Smart Esports (AI and Cyber) for High-Performance Team Training
Jessica Gulick
AI In Bug Bounty @ GitLab: The Good, The Bad, and The Extreme
Katherine Wu
22/05/2026 12:45 pm
The Accidental Security Architect (and why that needs to change)
Lidia Giuliano
22/05/2026 1:45 pm
How To Replace Your People With AI
David Rudduck
Build your own Potato - An exploration of how Windows authentication abuse “actually works”
Daniel Cooper
Game On! Inside the Program Committee: What Makes a CFP a Winner
22/05/2026 2:30 pm
Project Kitsune: The Agentic AI SOC Analyst That Never Sleeps (and Rarely Complains)
Matthew Gurr
Why I created OpenSourceMalware (right here on the Gold Coast!)
Paul McCarty
22/05/2026 3:10 pm
Speed Debate
22/05/2026 3:45 pm
Closing Remarks
22/05/2026 4:45 pm