Download the schedule as a pdf here

If you’ve just loaded this page, select a day to fix the table’s formatting

All timings are in AEDT

Presentations

  • Tuesday

    The role of deception in cyber resilience and threat hunting

    Dylan Hoffmann

    PentenAmio

  • Monday

    ADF Cyber Update

    BRIG H Ashman, CSC

    Commander Cyber Forces Group

    President, ADF Cyber Skills Association

  • Monday

    Qualifying the Critical Infrastructure Attack Surface

    Edward Farrell

    Mercury ISS

  • Tuesday

    Email spoofing: Discovery of novel system-specific email spoofing techniques

    Ben Wilson

    Tanto Security

  • Monday

    When Malware Thinks: Adversarial Use of Agentic AI in Cyber Warfare

    Rama Vadlamudi

    Splunk

  • Tuesday

    Threat Analysis using Open Source Intelligence

    Jerry Martin

    Team Cymru

  • Monday

    The Digital Shadows – Using OSINT to Identify GPS Jamming Zones

    Chris Poulter

    OSINT Combine

  • Tuesday

    Tasks Failed Successfully

    Diego Rivera

    Commonwealth Bank Australia

  • Tuesday

    How I Accidentally Hacked the Government

    Andrew O’Connor

    NSW Department of Communities and Justice

  • Monday

    The Dark Web – Drugs, Guns and Ransomware Gangs

    Andrew O’Connor

    NSW Department of Communities and Justice

  • Tuesday

    Attacking SAML: What’s New?

    Louis Nyffenegger

    Pentesterlab

  • Monday

    Inside Vulnerability Research + Pwn2Own Walkthrough

    Cameron Jack

    Infosect

  • Tuesday

    Threat Intelligence | Deep dive into Threat Intelligence Origins, and Modern-Day Landscape

    Jackson Norrell

  • Tuesday

    Lightning Wizards Beware: Online gaming and the new frontier of malign influence and interference

    Steven Coomber

    Bluerydge

  • Monday

    Making the unseen seen. The invisible battlefield where adversaries are attacking our national and economic security

    Jakub Zverina

    CyberCX

  • Monday

    Inside the Mind of a Threat Actor

    Usayd Marikar

    Starknex

  • Tuesday

    Cybercrime Campaigns and Customer Protection: What You Need to Know

    Evangeline Endacott & Briana Wade

    Commonwealth Bank Australia

  • Tuesday

    Is Australia a cybercrime hub?

    Dr Miranda Bruce

    UNSW Canberra

Workshops

  • Tuesday

    PEAK Threat Hunting

    Rama Vadlamudi

    Splunk

    0900 – 1200
    Studio 4

    Seats Available: 50

  • Wednesday

    Purple Teaming Active Directory 101

    Josh Headrick / 0ldMate

    Hack The Box

    0900 – 1200
    Studio 2/3 & Online

    Seats Available: 30

  • Monday

    First Steps Deploying Cyber Deception: A Practical Tutorial

    Ben Whitham & Craig Sweetman

    PentenAmio

    0930 – 1230
    Studio 2/3

    Seats Available: 20

  • Tuesday

    Splunk Enterprise Security Hands-On 8.x

    Rama Vadlamudi

    Splunk

    1300 – 1600
    Studio 4

    Seats Available: 50

  • Wednesday

    AI Red Teaming 101

    Josh Headrick / 0ldMate

    Hack The Box

    0900 – 1200
    Studio 2/3 & Online

    Seats Available: 30

CTF

  • Wednesday

    ADFCSA CTF

    24/7 Access

    Finish: 1500 Friday

  • Thursday

    ADFCSA CTF

    24/7 Access

    Finish: 1500 Friday

  • Friday

    ADFCSA CTF

    24/7 Access

    Finish: 1500 Friday

  • Friday

    CTF Scoreboard Frozen

General

  • Thursday

    DV Day

    Invited VIPs only

  • Wednesday

    CTF Opening

    TBC

    ADF

  • Monday

    Welcome to Country

  • Monday

    Opening Address

    LTGEN S Coyle AM, CSC, DSM

    Chief Joint Capabilities

    Patron, ADF Cyber Skills Association

  • Friday

    CTF Winners Announced

    LTGEN S Coyle AM, CSC, DSM

    Chief Joint Capabilities

    Patron, ADF Cyber Skills Association

  • Monday

    Annual General Meeting

    ADFCSA Executive Committee

    ADFCSA Members Only

  • Tuesday

    Social Event

    QT Lounge

    Open invite – all participants

Workshops 2

  • Tuesday

    Embedded Device Security Assessment

    Team Infosect

    Infosect

    0900 – 1200
    Studio 2/3

    Seats Available: 50

  • Monday

    Embedded Device Security Assessment

    Team Infosect

    Infosect

    0930 – 1230
    Studio 2/3

    Seats Available: 50

  • Monday

    Embedded Device Security Assessment

    Team Infosect

    Infosect

    1300 – 1600
    Studio 2/3

    Seats Available: 50

  • Monday

    Splunk4Rookies – Machine Learning for Security

    Rama Vadlamudi

    Splunk

    1300 – 1600
    Studio 4

    Seats Available: 50

  • Tuesday

    Embedded Device Security Assessment

    Team Infosect

    Infosect

    1300 – 1600
    Studio 2/3

    Seats Available: 30

Workshops 3

  • Tuesday

    Intro to Threat Modelling

    Ed Farrell

    Mercury ISS

    0830 – 1230
    Studio 1

    Seats Available: 15

  • Monday

    RF Signals and Security

    Jakub Zverina

    CyberCX

    0930 – 1230
    Studio 1

    Seats Available: 20

  • Tuesday

    Intro to Threat Modelling

    Ed Farrell

    Mercury ISS

    1230 – 1630
    Studio 1

    Seats Available: 15

  • Monday

    On Attribution – Structured Analytic Techniques, OSINT, and You

    Justin Parker

    SANS

    1300 – 1600
    Studio 1

    Seats Available: 30

Workshops 4

  • Tuesday

    Online Attribution Management and Mitigation

    Jemma Ward

    OSINT Combine

    0900 – 1200
    Online

    Seats Available: 30

  • Monday

    Web Security Code Review Bootcamp

    Louis Nyffenegger

    Pentesterlab

    1300 – 1600
    Online

    Seats Available: 50