Download the schedule as a pdf here
If you’ve just loaded this page, select a day to fix the table’s formatting
All timings are in AEDT
| Presentations | Workshops | CTF | General | Workshops 2 | Workshops 3 | Workshops 4 | |
|---|---|---|---|---|---|---|---|
| 8:00 am |
Thursday
– DV DayInvited VIPs only |
||||||
| 8:15 am | |||||||
| 8:30 am |
Tuesday
– Intro to Threat ModellingEd FarrellMercury ISS 0830 – 1230 Seats Available: 15 |
||||||
| 8:45 am |
Tuesday
– The role of deception in cyber resilience and threat huntingDylan HoffmannPentenAmio |
Wednesday
– ADFCSA CTF24/7 AccessFinish: 1500 Friday |
Wednesday
– CTF OpeningTBCADF |
||||
| 9:00 am |
Tuesday
– PEAK Threat HuntingRama VadlamudiSplunk 0900 – 1200 Seats Available: 50
Wednesday
– Purple Teaming Active Directory 101Josh Headrick / 0ldMateHack The Box 0900 – 1200 Seats Available: 30 |
Thursday
– ADFCSA CTF24/7 AccessFinish: 1500 Friday
Friday
– ADFCSA CTF24/7 AccessFinish: 1500 Friday |
Monday
– Welcome to Country
Monday
– Opening AddressLTGEN S Coyle AM, CSC, DSMChief Joint Capabilities Patron, ADF Cyber Skills Association |
Tuesday
– Embedded Device Security AssessmentTeam InfosectInfosect 0900 – 1200 Seats Available: 50 |
|||
| 9:15 am |
Monday
– ADF Cyber UpdateBRIG H Ashman, CSCCommander Cyber Forces Group President, ADF Cyber Skills Association |
||||||
| 9:30 am |
Monday
– Qualifying the Critical Infrastructure Attack SurfaceEdward FarrellMercury ISS
Tuesday
– Email spoofing: Discovery of novel system-specific email spoofing techniquesBen WilsonTanto Security |
Monday
– First Steps Deploying Cyber Deception: A Practical TutorialBen Whitham & Craig SweetmanPentenAmio 0930 – 1230 Seats Available: 20 |
Monday
– Embedded Device Security AssessmentTeam InfosectInfosect 0930 – 1230 Seats Available: 50 |
Monday
– RF Signals and SecurityJakub ZverinaCyberCX 0930 – 1230 Seats Available: 20 |
Tuesday
– Online Attribution Management and MitigationJemma WardOSINT Combine 0900 – 1200 Seats Available: 30 |
||
| 9:45 am | |||||||
| 10:00 am | |||||||
| 10:15 am |
Monday
– When Malware Thinks: Adversarial Use of Agentic AI in Cyber WarfareRama VadlamudiSplunk
Tuesday
– Threat Analysis using Open Source IntelligenceJerry MartinTeam Cymru |
||||||
| 10:30 am | |||||||
| 10:45 am | |||||||
| 11:00 am |
Monday
– The Digital Shadows – Using OSINT to Identify GPS Jamming ZonesChris PoulterOSINT Combine
Tuesday
– Tasks Failed SuccessfullyDiego RiveraCommonwealth Bank Australia |
||||||
| 11:15 am | |||||||
| 11:30 am |
Tuesday
– How I Accidentally Hacked the GovernmentAndrew O’ConnorNSW Department of Communities and Justice |
||||||
| 11:45 am |
Monday
– The Dark Web – Drugs, Guns and Ransomware GangsAndrew O’ConnorNSW Department of Communities and Justice
Tuesday
– Attacking SAML: What’s New?Louis NyffeneggerPentesterlab |
||||||
| 12:00 pm |
Friday
– CTF Scoreboard Frozen |
||||||
| 12:15 pm | |||||||
| 12:30 pm |
Tuesday
– Intro to Threat ModellingEd FarrellMercury ISS 1230 – 1630 Seats Available: 15 |
||||||
| 12:45 pm | |||||||
| 1:00 pm |
Tuesday
– Splunk Enterprise Security Hands-On 8.xRama VadlamudiSplunk 1300 – 1600 Seats Available: 50
Wednesday
– AI Red Teaming 101Josh Headrick / 0ldMateHack The Box 0900 – 1200 Seats Available: 30 |
Monday
– Embedded Device Security AssessmentTeam InfosectInfosect 1300 – 1600 Seats Available: 50
Monday
– Splunk4Rookies – Machine Learning for SecurityRama VadlamudiSplunk 1300 – 1600 Seats Available: 50
Tuesday
– Embedded Device Security AssessmentTeam InfosectInfosect 1300 – 1600 Seats Available: 30 |
Monday
– On Attribution – Structured Analytic Techniques, OSINT, and YouJustin ParkerSANS 1300 – 1600 Seats Available: 30 |
Monday
– Web Security Code Review BootcampLouis NyffeneggerPentesterlab 1300 – 1600 Seats Available: 50 |
|||
| 1:15 pm |
Monday
– Inside Vulnerability Research + Pwn2Own WalkthroughCameron JackInfosect
Tuesday
– Threat Intelligence | Deep dive into Threat Intelligence Origins, and Modern-Day LandscapeJackson Norrell |
||||||
| 1:30 pm | |||||||
| 1:45 pm | |||||||
| 2:00 pm |
Tuesday
– Lightning Wizards Beware: Online gaming and the new frontier of malign influence and interferenceSteven CoomberBluerydge
Monday
– Making the unseen seen. The invisible battlefield where adversaries are attacking our national and economic securityJakub ZverinaCyberCX |
||||||
| 2:15 pm | |||||||
| 2:30 pm | |||||||
| 2:45 pm | |||||||
| 3:00 pm |
Monday
– Inside the Mind of a Threat ActorUsayd MarikarStarknex
Tuesday
– Cybercrime Campaigns and Customer Protection: What You Need to KnowEvangeline Endacott & Briana WadeCommonwealth Bank Australia |
||||||
| 3:15 pm |
Friday
– CTF Winners AnnouncedLTGEN S Coyle AM, CSC, DSMChief Joint Capabilities Patron, ADF Cyber Skills Association |
||||||
| 3:30 pm | |||||||
| 3:45 pm |
Tuesday
– Is Australia a cybercrime hub?Dr Miranda BruceUNSW Canberra |
||||||
| 4:00 pm |
Monday
– Annual General MeetingADFCSA Executive CommitteeADFCSA Members Only |
||||||
| 4:15 pm | |||||||
| 4:30 pm | |||||||
| 4:45 pm | |||||||
| 5:00 pm |
Tuesday
– Social EventQT LoungeOpen invite – all participants |
||||||
| 5:15 pm | |||||||
| 5:30 pm | |||||||
| 5:45 pm |
| Presentations | Workshops | CTF | General | Workshops 2 | Workshops 3 | Workshops 4 | |
|---|---|---|---|---|---|---|---|
| 8:30 am |
Tuesday
– Intro to Threat ModellingEd FarrellMercury ISS 0830 – 1230 Seats Available: 15 |
||||||
| 8:45 am |
Tuesday
– The role of deception in cyber resilience and threat huntingDylan HoffmannPentenAmio |
||||||
| 9:00 am |
Tuesday
– PEAK Threat HuntingRama VadlamudiSplunk 0900 – 1200 Seats Available: 50 |
Tuesday
– Embedded Device Security AssessmentTeam InfosectInfosect 0900 – 1200 Seats Available: 50 |
|||||
| 9:15 am | |||||||
| 9:30 am |
Tuesday
– Email spoofing: Discovery of novel system-specific email spoofing techniquesBen WilsonTanto Security |
Tuesday
– Online Attribution Management and MitigationJemma WardOSINT Combine 0900 – 1200 Seats Available: 30 |
|||||
| 9:45 am | |||||||
| 10:00 am | |||||||
| 10:15 am |
Tuesday
– Threat Analysis using Open Source IntelligenceJerry MartinTeam Cymru |
||||||
| 10:30 am | |||||||
| 10:45 am | |||||||
| 11:00 am |
Tuesday
– Tasks Failed SuccessfullyDiego RiveraCommonwealth Bank Australia |
||||||
| 11:15 am | |||||||
| 11:30 am |
Tuesday
– How I Accidentally Hacked the GovernmentAndrew O’ConnorNSW Department of Communities and Justice |
||||||
| 11:45 am |
Tuesday
– Attacking SAML: What’s New?Louis NyffeneggerPentesterlab |
||||||
| 12:00 pm | |||||||
| 12:15 pm | |||||||
| 12:30 pm |
Tuesday
– Intro to Threat ModellingEd FarrellMercury ISS 1230 – 1630 Seats Available: 15 |
||||||
| 12:45 pm | |||||||
| 1:00 pm |
Tuesday
– Splunk Enterprise Security Hands-On 8.xRama VadlamudiSplunk 1300 – 1600 Seats Available: 50 |
Tuesday
– Embedded Device Security AssessmentTeam InfosectInfosect 1300 – 1600 Seats Available: 30 |
|||||
| 1:15 pm |
Tuesday
– Threat Intelligence | Deep dive into Threat Intelligence Origins, and Modern-Day LandscapeJackson Norrell |
||||||
| 1:30 pm | |||||||
| 1:45 pm | |||||||
| 2:00 pm |
Tuesday
– Lightning Wizards Beware: Online gaming and the new frontier of malign influence and interferenceSteven CoomberBluerydge |
||||||
| 2:15 pm | |||||||
| 2:30 pm | |||||||
| 2:45 pm | |||||||
| 3:00 pm |
Tuesday
– Cybercrime Campaigns and Customer Protection: What You Need to KnowEvangeline Endacott & Briana WadeCommonwealth Bank Australia |
||||||
| 3:15 pm | |||||||
| 3:30 pm | |||||||
| 3:45 pm |
Tuesday
– Is Australia a cybercrime hub?Dr Miranda BruceUNSW Canberra |
||||||
| 4:00 pm | |||||||
| 4:15 pm | |||||||
| 5:00 pm |
Tuesday
– Social EventQT LoungeOpen invite – all participants |
||||||
| 5:15 pm | |||||||
| 5:30 pm | |||||||
| 5:45 pm |
| Presentations | Workshops | CTF | General | Workshops 2 | Workshops 3 | Workshops 4 | |
|---|---|---|---|---|---|---|---|
| 9:00 am |
Monday
– Welcome to Country
Monday
– Opening AddressLTGEN S Coyle AM, CSC, DSMChief Joint Capabilities Patron, ADF Cyber Skills Association |
||||||
| 9:15 am |
Monday
– ADF Cyber UpdateBRIG H Ashman, CSCCommander Cyber Forces Group President, ADF Cyber Skills Association |
||||||
| 9:30 am |
Monday
– Qualifying the Critical Infrastructure Attack SurfaceEdward FarrellMercury ISS |
Monday
– First Steps Deploying Cyber Deception: A Practical TutorialBen Whitham & Craig SweetmanPentenAmio 0930 – 1230 Seats Available: 20 |
Monday
– Embedded Device Security AssessmentTeam InfosectInfosect 0930 – 1230 Seats Available: 50 |
Monday
– RF Signals and SecurityJakub ZverinaCyberCX 0930 – 1230 Seats Available: 20 |
|||
| 9:45 am | |||||||
| 10:00 am | |||||||
| 10:15 am |
Monday
– When Malware Thinks: Adversarial Use of Agentic AI in Cyber WarfareRama VadlamudiSplunk |
||||||
| 10:30 am | |||||||
| 10:45 am | |||||||
| 11:00 am |
Monday
– The Digital Shadows – Using OSINT to Identify GPS Jamming ZonesChris PoulterOSINT Combine |
||||||
| 11:15 am | |||||||
| 11:30 am | |||||||
| 11:45 am |
Monday
– The Dark Web – Drugs, Guns and Ransomware GangsAndrew O’ConnorNSW Department of Communities and Justice |
||||||
| 12:00 pm | |||||||
| 12:15 pm | |||||||
| 12:30 pm | |||||||
| 1:00 pm |
Monday
– Embedded Device Security AssessmentTeam InfosectInfosect 1300 – 1600 Seats Available: 50
Monday
– Splunk4Rookies – Machine Learning for SecurityRama VadlamudiSplunk 1300 – 1600 Seats Available: 50 |
Monday
– On Attribution – Structured Analytic Techniques, OSINT, and YouJustin ParkerSANS 1300 – 1600 Seats Available: 30 |
Monday
– Web Security Code Review BootcampLouis NyffeneggerPentesterlab 1300 – 1600 Seats Available: 50 |
||||
| 1:15 pm |
Monday
– Inside Vulnerability Research + Pwn2Own WalkthroughCameron JackInfosect |
||||||
| 1:30 pm | |||||||
| 1:45 pm | |||||||
| 2:00 pm |
Monday
– Making the unseen seen. The invisible battlefield where adversaries are attacking our national and economic securityJakub ZverinaCyberCX |
||||||
| 2:15 pm | |||||||
| 2:30 pm | |||||||
| 2:45 pm | |||||||
| 3:00 pm |
Monday
– Inside the Mind of a Threat ActorUsayd MarikarStarknex |
||||||
| 3:15 pm | |||||||
| 3:30 pm | |||||||
| 3:45 pm | |||||||
| 4:00 pm |
Monday
– Annual General MeetingADFCSA Executive CommitteeADFCSA Members Only |
||||||
| 4:15 pm | |||||||
| 4:30 pm | |||||||
| 4:45 pm |
| Presentations | Workshops | CTF | General | Workshops 2 | Workshops 3 | Workshops 4 | |
|---|---|---|---|---|---|---|---|
| 8:45 am |
Wednesday
– ADFCSA CTF24/7 AccessFinish: 1500 Friday |
Wednesday
– CTF OpeningTBCADF |
|||||
| 9:00 am |
Wednesday
– Purple Teaming Active Directory 101Josh Headrick / 0ldMateHack The Box 0900 – 1200 Seats Available: 30 |
||||||
| 9:15 am | |||||||
| 9:30 am | |||||||
| 9:45 am | |||||||
| 10:00 am | |||||||
| 10:15 am | |||||||
| 10:30 am | |||||||
| 10:45 am | |||||||
| 11:00 am | |||||||
| 11:15 am | |||||||
| 11:30 am | |||||||
| 11:45 am | |||||||
| 12:00 pm | |||||||
| 12:15 pm | |||||||
| 12:30 pm | |||||||
| 12:45 pm | |||||||
| 1:00 pm |
Wednesday
– AI Red Teaming 101Josh Headrick / 0ldMateHack The Box 0900 – 1200 Seats Available: 30 |
||||||
| 1:15 pm | |||||||
| 1:30 pm | |||||||
| 1:45 pm | |||||||
| 2:00 pm | |||||||
| 2:15 pm | |||||||
| 2:30 pm | |||||||
| 2:45 pm | |||||||
| 3:00 pm | |||||||
| 3:15 pm | |||||||
| 3:30 pm | |||||||
| 3:45 pm | |||||||
| 4:00 pm | |||||||
| 4:15 pm | |||||||
| 4:30 pm | |||||||
| 4:45 pm |
| Presentations | Workshops | CTF | General | Workshops 2 | Workshops 3 | Workshops 4 | |
|---|---|---|---|---|---|---|---|
| 8:00 am |
Thursday
– DV DayInvited VIPs only |
||||||
| 8:15 am | |||||||
| 8:30 am | |||||||
| 8:45 am | |||||||
| 9:00 am |
Thursday
– ADFCSA CTF24/7 AccessFinish: 1500 Friday |
||||||
| 9:15 am | |||||||
| 9:30 am | |||||||
| 9:45 am | |||||||
| 10:00 am | |||||||
| 10:15 am | |||||||
| 10:30 am | |||||||
| 10:45 am |
| Presentations | Workshops | CTF | General | Workshops 2 | Workshops 3 | Workshops 4 | |
|---|---|---|---|---|---|---|---|
| 9:00 am |
Friday
– ADFCSA CTF24/7 AccessFinish: 1500 Friday |
||||||
| 9:15 am | |||||||
| 9:30 am | |||||||
| 9:45 am | |||||||
| 10:00 am | |||||||
| 10:15 am | |||||||
| 10:30 am | |||||||
| 10:45 am | |||||||
| 11:00 am | |||||||
| 11:15 am | |||||||
| 11:30 am | |||||||
| 11:45 am | |||||||
| 12:00 pm |
Friday
– CTF Scoreboard Frozen |
||||||
| 12:15 pm | |||||||
| 12:30 pm | |||||||
| 12:45 pm | |||||||
| 1:00 pm | |||||||
| 1:15 pm | |||||||
| 1:30 pm | |||||||
| 1:45 pm | |||||||
| 2:00 pm | |||||||
| 2:15 pm | |||||||
| 2:30 pm | |||||||
| 2:45 pm | |||||||
| 3:15 pm |
Friday
– CTF Winners AnnouncedLTGEN S Coyle AM, CSC, DSMChief Joint Capabilities Patron, ADF Cyber Skills Association |
||||||
| 3:30 pm | |||||||
| 3:45 pm |
Presentations
-
Tuesday
–
The role of deception in cyber resilience and threat hunting
Dylan HoffmannPentenAmio
-
Monday
–
ADF Cyber Update
BRIG H Ashman, CSCCommander Cyber Forces Group
President, ADF Cyber Skills Association
-
Monday
–
Qualifying the Critical Infrastructure Attack Surface
Edward FarrellMercury ISS
-
Tuesday
–
Email spoofing: Discovery of novel system-specific email spoofing techniques
Ben WilsonTanto Security
-
Monday
–
When Malware Thinks: Adversarial Use of Agentic AI in Cyber Warfare
Rama VadlamudiSplunk
-
Tuesday
–
Threat Analysis using Open Source Intelligence
Jerry MartinTeam Cymru
-
Monday
–
The Digital Shadows – Using OSINT to Identify GPS Jamming Zones
Chris PoulterOSINT Combine
-
Tuesday
–
Tasks Failed Successfully
Diego RiveraCommonwealth Bank Australia
-
Tuesday
–
How I Accidentally Hacked the Government
Andrew O’ConnorNSW Department of Communities and Justice
-
Monday
–
The Dark Web – Drugs, Guns and Ransomware Gangs
Andrew O’ConnorNSW Department of Communities and Justice
-
Tuesday
–
Attacking SAML: What’s New?
Louis NyffeneggerPentesterlab
-
Monday
–
Inside Vulnerability Research + Pwn2Own Walkthrough
Cameron JackInfosect
-
Tuesday
–
Threat Intelligence | Deep dive into Threat Intelligence Origins, and Modern-Day Landscape
Jackson Norrell -
Tuesday
–
Lightning Wizards Beware: Online gaming and the new frontier of malign influence and interference
Steven CoomberBluerydge
-
Monday
–
Making the unseen seen. The invisible battlefield where adversaries are attacking our national and economic security
Jakub ZverinaCyberCX
-
Monday
–
Inside the Mind of a Threat Actor
Usayd MarikarStarknex
-
Tuesday
–
Cybercrime Campaigns and Customer Protection: What You Need to Know
Evangeline Endacott & Briana WadeCommonwealth Bank Australia
-
Tuesday
–
Is Australia a cybercrime hub?
Dr Miranda BruceUNSW Canberra
Workshops
-
Tuesday
–
PEAK Threat Hunting
Rama VadlamudiSplunk
0900 – 1200
Studio 4Seats Available: 50
-
Wednesday
–
Purple Teaming Active Directory 101
Josh Headrick / 0ldMateHack The Box
0900 – 1200
Studio 2/3 & OnlineSeats Available: 30
-
Monday
–
First Steps Deploying Cyber Deception: A Practical Tutorial
Ben Whitham & Craig SweetmanPentenAmio
0930 – 1230
Studio 2/3Seats Available: 20
-
Tuesday
–
Splunk Enterprise Security Hands-On 8.x
Rama VadlamudiSplunk
1300 – 1600
Studio 4Seats Available: 50
-
Wednesday
–
AI Red Teaming 101
Josh Headrick / 0ldMateHack The Box
0900 – 1200
Studio 2/3 & OnlineSeats Available: 30
CTF
-
Wednesday
–
ADFCSA CTF
24/7 AccessFinish: 1500 Friday
-
Thursday
–
ADFCSA CTF
24/7 AccessFinish: 1500 Friday
-
Friday
–
ADFCSA CTF
24/7 AccessFinish: 1500 Friday
-
Friday
–
CTF Scoreboard Frozen
General
-
Thursday
–
DV Day
Invited VIPs only
-
Wednesday
–
CTF Opening
TBCADF
-
Monday
–
Welcome to Country
-
Monday
–
Opening Address
LTGEN S Coyle AM, CSC, DSMChief Joint Capabilities
Patron, ADF Cyber Skills Association
-
Friday
–
CTF Winners Announced
LTGEN S Coyle AM, CSC, DSMChief Joint Capabilities
Patron, ADF Cyber Skills Association
-
Monday
–
Annual General Meeting
ADFCSA Executive CommitteeADFCSA Members Only
-
Tuesday
–
Social Event
QT LoungeOpen invite – all participants
Workshops 2
-
Tuesday
–
Embedded Device Security Assessment
Team InfosectInfosect
0900 – 1200
Studio 2/3Seats Available: 50
-
Monday
–
Embedded Device Security Assessment
Team InfosectInfosect
0930 – 1230
Studio 2/3Seats Available: 50
-
Monday
–
Embedded Device Security Assessment
Team InfosectInfosect
1300 – 1600
Studio 2/3Seats Available: 50
-
Monday
–
Splunk4Rookies – Machine Learning for Security
Rama VadlamudiSplunk
1300 – 1600
Studio 4Seats Available: 50
-
Tuesday
–
Embedded Device Security Assessment
Team InfosectInfosect
1300 – 1600
Studio 2/3Seats Available: 30
Workshops 3
-
Tuesday
–
Intro to Threat Modelling
Ed FarrellMercury ISS
0830 – 1230
Studio 1Seats Available: 15
-
Monday
–
RF Signals and Security
Jakub ZverinaCyberCX
0930 – 1230
Studio 1Seats Available: 20
-
Tuesday
–
Intro to Threat Modelling
Ed FarrellMercury ISS
1230 – 1630
Studio 1Seats Available: 15
-
Monday
–
On Attribution – Structured Analytic Techniques, OSINT, and You
Justin ParkerSANS
1300 – 1600
Studio 1Seats Available: 30
Workshops 4
-
Tuesday
–
Online Attribution Management and Mitigation
Jemma WardOSINT Combine
0900 – 1200
OnlineSeats Available: 30
-
Monday
–
Web Security Code Review Bootcamp
Louis NyffeneggerPentesterlab
1300 – 1600
OnlineSeats Available: 50
