The speaker’s profile picture
Adam Jacobs

Adam Jacobs has a background in corporate finance and investment banking and has spent the past 11 years leading educational institutions. He is currently the Managing Director and Group CEO of the EdTech Group, a national education and training organisation specialising in the delivery of both accredited and non-accredited digital technologies education. Before joining Junior Engineers, Adam served as CEO of The Australian Institute of Personal Trainers (AIPT), Australia’s leading Registered Training Organisation for health and wellness, nutrition, and fitness qualifications, delivered through a network of 110 campuses nationwide. Prior to his career in the education sector, Adam worked at a Sydney-based corporate advisory firm, specialising in mergers and acquisitions, strategic advisory, IPOs, capital raising, valuations, underwriting, financial structuring, corporate restructuring, governance, and risk management.

  • Cybersecurity Simplified: Practical Steps Every Business Leader Can Take to Protect Your Digital World
The speaker’s profile picture
Alfred Tay and Stephen Boatwright

Alfred is an incident responder, specialising in managing and mitigating complex cyber threats.
Outside of his professional life, Alfred is an avid sports enthusiast. He enjoys a wide range of activities, including basketball, badminton, and volleyball, to name just a few. His love for sports is matched only by his enthusiasm for desserts, making him a connoisseur of sweet treats.

Stephen is currently employed by NCC Group as a Senior DFIR consultant, guiding clients through cyber incidents and ensuring effective security measures are in place to mitigate against current and future threats. Stephen has over eight years of experience in the cybersecurity industry, with a career spanning the Royal Air Force, Royal Australian Air Force, PwC, and his current role at NCC Group APAC. His expertise covers a wide range of disciplines, including Vulnerability Assessments, Threat Hunting, and Digital Forensics & Incident Response. Prior to joining NCC Group, he was part of PwC’s Global Threat Response Team, where he played a key role in securing PwC’s network across 150+ countries.

  • Dissect - The Solution to Large-Scale Incident Response
The speaker’s profile picture
Arijit Paul

Arijit Paul is a seasoned cybersecurity professional with extensive experience in cloud security, threat hunting and incident response. With a background in both offensive and defensive security, Arijit specializes in leveraging advanced tools and techniques to protect cloud environments. Currently, Arijit is focused on threat detection, automation and response, helping organizations secure their cloud infrastructures.

  • Threat Hunting AWS CloudTrail Logs using KQL: EC2 SSRF Attack Demo
The speaker’s profile picture
Darryl Bosch

Darryl has worked across multiple areas and disciplines, both as an electronics engineer working in embedded design, in academia lecturing at the University of Adelaide, a train controller, FIFO mining and construction across the country and now works in security analysis.  After a broad career, he has found a discipline to call home and refine his skills.  In his spare time, Darryl prefers to keep his hands dirty renovating his house, and repairing cars and bicycles, spending quality time with his daughter and partner and playing with their Golden Retriever.

  • Pulling back the curtain on Emanation Security
The speaker’s profile picture
Dylan Jones

Dylan is a cyber security leader specialising in digital forensics, incident response and security advisory. He has spent the last 8 years helping world leading brands investigate, respond to and recover from cyber incidents.

He actively contributes to open source projects covering threat hunting and intelligence; in addition to the MITRE ATT&CK framework (ask about defence evasion!).

  • Threat Hunting: The human solution to a human problem
The speaker’s profile picture
Harrison McMILLAN

Harrison McMILLAN

  • CV/Resume Review and Interview Preparation
The speaker’s profile picture
Harrison McMILLAN
  • CV/Resume Review and Interview Preparation
The speaker’s profile picture
Hosted by Bianca Holmes
  • Panel | A Day in the Life of Cybersecurity Professionals
The speaker’s profile picture
Hosted by Bianca Holmes
  • Panel | The Future of Cybersecurity: Emerging Trends and Skills to Watch
The speaker’s profile picture
Hosted by Bianca Holmes
  • Panel | Industry Leap: Stories from Professionals who've successfully Transitioned into Cyber Security
The speaker’s profile picture
Hosted by Jacob Bywater, e2cyber
  • Personal Branding and Networking
The speaker’s profile picture
James Bannan

James is a Principal Consultant with CyberCX specialising in Microsoft Azure architecture, security and automation with over 25 years industry experience. He is a published author and journalist, an ex-Microsoft MVP and a current Microsoft Certified Trainer. He has worked with customers across a wide range of industries, including government, defence, finance, retail and higher education.

  • Building ISM and E8-compliant master images with DevSecOps
The speaker’s profile picture
Jason M. Pittman

Dr. Jason M. Pittman is an academic and practitioner with expertise in cybersecurity and artificial intelligence. Faculty positions include Fulbright Scholar at University of Adelaide, University of Maryland Global Campus, High Point University, Cal State Polytechnic Pomona, as well as Capitol Tech University. In industry, he has worked for consulting firms, corporations, and startups.

  • PoPoS - A Polymorphic Port Scanner
The speaker’s profile picture
Mickey Perre

Mickey is a Solution Consultant at Palo Alto Networks with a solid track record in the SIEM space, including stints at Elastic, Devo, and Splunk, he brings invaluable expertise to the table. Before tenures in cyber security, he worked at the Department of Industry as an Assistant ITSA.

  • Cyber Wombats Guide to Attack Surface Management
The speaker’s profile picture
Monika

Monika is a software IT professional working in one of the Big Four Banks in Cyber Security Risk and Control Enablement Advisory Services.

Monika has poken at a range of events AISA Canberra ,AISA Brisbane ,ISACA Melbourne ,ISACA New Zealand ,Bsides Sydney ,Victoria University podcasts sessions .Victoria University Panel speaker ,Speaker and Chair of some more council events in Melbourne

  • Benefits and Risks: IoT in Operational Technology and Critical Infrastructure
The speaker’s profile picture
Nick Route

Nick, with over 25 years of experience, has worked across multiple roles and industries, including radio frequency engineering, software programming, and cyber security. He has led cyber security practices, advised executives as a virtual CISO, and helped deliver Australia’s first NATO ‘Locked Shields’ event. Nick was the Global Cyber Alliance's first Australian ambassador.

  • It's About Time: The Hidden Risks of Time Synchronisation in Cyber Security
The speaker’s profile picture
OSINT Combine
  • Illuminating the Dark Web
  • Advanced website profiling for cyber operators
  • Unmasking the Medibank Hacker in 45 minutes with the Russian internet
  • OSINT CTFs: An introduction to the OSINT Combine 101 CTF
  • Dark Web cookie sales: Implication for 2FA
  • Essential OPSEC for cyber operations
  • What the Chinese internet can tell us about the I-SOON data leak
The speaker’s profile picture
Richard Appleby

Richard is the head of research and SilentGrid Security. He has over 20 years of cybersecurity experience as a researcher and pentester across goverment and private organisations.

  • LLMs for Pentesters and the Curious
The speaker’s profile picture
Sasha Baranikov

Mum, Artist, Investor. Sasha has never worked in the same industry twice. Her story is one of a non-conformist, of following opportunities and doing things differently. Currently MD of Steam Ventures, a strategic advisory that aims to put the ‘A’ back into STEM, her 17 years of global experience spans entertainment, gaming, telecommunications, space and technology industries. As Co-Founder of Internet provider Uniti Wireless Limited (ASX:UWL), she took the company to an ASX listing within < 5 years and in < 10 the Company sold for ~ $3.7 billion to a global asset management consortium. Sasha believes it’s a privilege to now support other Australian Founders on their journeys - their unwavering pursuits of vision, which through continuous exploration of ideas and determined trial and error, pushes boundaries to create the new futures that lay ahead of us.

  • Pickles for a Profit - The Art of Doing Things Differently
The speaker’s profile picture
Somindu Abeydeera

I'm a high school student currently in grade 9, I enjoy studying in STEM. I am a lockpicking enthusiast and I have won 1st place in the 2023 BSides Melbourne lockpicking competition and got 2nd place in the 2023 AISA Cyber-Con lockpicking competition. At BSides Adelaide I got third in Lockpicking and participated in the Black bag CTF.

  • Exploring the Crossroads: What are we dealing with
The speaker’s profile picture
Telstra
  • Using the Intelligence Cycle in an investigation
  • Encounters with Dark Web information stealing malware
  • Recognising bias in cyber operations
The speaker’s profile picture
Toby Richer

Toby Richer is a Security Architect at Leidos Australia. After obtaining his PhD in AI and working as a postdoctoral researcher, he spent 15 years researching AI for Cybersecurity at Defence Science Technology Group Australia. In his spare time, he doesn't enjoy arguing about AI on the internet but does it anyway.

  • Old Man Yells at Cloud: The Gap Between AI Concepts and Real World Cybersecurity