Building the cybersecurity community in regional Victoria.
The Underground is calling.
While many conferences are held in capital cities, regional areas often miss out. We are changing that.
Getting started in your cybersecurity career and understanding practical projects.
Understanding security architectures and the cyberworld of attackers vs defenders.
Capture the Flag contests, cybersecurity games, and interactive challenges.
Designed and produced by Firnsy at the Ballarat Hackerspace. This badge provides a fun, interactive experience, featuring badge-to-badge communication, ESP32 processor, screen and controls. The badge also supports the SAO add-on standard, so bring your own from previous conferences.
Grab the exclusive add-on for just $7 with your ticket. All proceeds support the Ballarat Hackerspace.
Signs point to an underground bitcoin mining operation stealing power from local businesses. Can you track them down? Designed for beginners, with surprises for veterans. Prizes for progress and completion! Developed by Eurekative and volunteers.
>> SYSTEM ALERT: UNAUTHORIZED HARDWARE DETECTED
It wasn’t meant to fall into your hands. The Underground Badge is black-market hardware built by the rogue miners themselves.
A device humming with hidden logs, encrypted comms, and fragments of their operation. They use it to track power siphons, hide their crypto flow, and stay one step ahead.
>> MISSION: BREAK THE ENCRYPTION.
Now it’s your job to break it. As you do, the badge spills another secret: coordinates of a tunnel, methods of leeching power, whispers of who’s behind it all. _
Paul Black
Stuart Harrison NBN
No plan survives first contact with the enemy, now what ...
Stuart’s career spans almost 3 decades with a primary focus on information, data and cyber security. He is currently the Deputy Chief Security Officer at NBN Co who design, build and operate a wholesale broadband access network for Australia. Prior to NBN, Stuart was the CISO for Medibank, a health company providing private health insurance and health services to more than 3.9 million people in Australia and before that, held multiple senior leadership roles in international consulting and big tech companies. He began his career in South Africa (born to English parents), moved to the UK and has spent the last 13 in years in Australia. Stuart is of the firm belief that people are the first and last line of defence in cyber security, and that security done right is a business enabler and a must have ‘ticket to play’ for every business.
Ben Wilkinson eManaged
When a breach hits, the hardest problems aren't always technical—they're human. This session equips executives and IT leaders to steer calmly under pressure: how to manage the mental and emotional load, make clear decisions with incomplete information, and handle tough questions from boards, clients, staff, media, regulators and insurers. We'll also show how uplift against the ACSC Essential Eight reduces the blast radius of incidents and supports compliance expectations—particularly around identity, application control, patching, backups and least privilege—so you can demonstrate due care before, during and after an event. Key takeaways include: a leader's crisis toolkit to stabilize people, prioritize actions, and control the narrative; a first-day/first-week recovery framework with roles, thresholds and evidence; and using Essential Eight maturity to limit damage and satisfy stakeholders.
Ben Wilkinson is a vCIO and cybersecurity practitioner who helps organizations build resilience before incidents and lead decisively during them. He designs recovery runbooks, facilitates incident tabletop exercises, and guides Essential Eight uplift for SMEs and community organizations across regional Victoria and South Australia. Ben's work focuses on clear, human-centered response: reducing downtime, improving decision speed, and aligning security controls with insurer, client and regulatory expectations. He has presented at regional industry events on cybersecurity, risk and practical AI, and partners with leadership teams to turn complex security topics into actions that withstand real-world pressure.
Peter Lake Starmaster Space Education
In our increasingly connected world, we are reliant on critical infrastructure for essential daily services. Space technology underpins much of this critical infrastructure, and Australia's participation in the fast-growing space industry is rapidly accelerating. Space is Critical, Congested, and Contested (the 3 C's) and exposed to the same hazards covered in the Security of Critical Infrastructure Act (SOCI). This session discusses the 3 C's and how these hazards are managed across the four segments: Space Segment, Link Segment, Ground Segment, and User Segment. The session will walk through what Defence-in-Depth and Zero Trust look like from onboard systems to communications links and the traditional cybersecurity threats we all face on the ground as users. It will conclude with a short case study and review of some tools specific to the space industry for managing cybersecurity.
Peter Lake is a dedicated business leader and researcher at the forefront of cybersecurity and space science. He earned his Master's in Cybersecurity from Edith Cowan University in 2023, building on alumni ties to Queensland University of Technology. In December 2025, Peter joined Starmaster as Strategy Lead for Cybersecurity and Space, where the organization delivers micro-credentials to help skilled professionals transition into Australia's booming space sector. A lifelong amateur astronomer and STEM enthusiast, Peter participated in Cisco and CSIRO's Scientists in Schools program in 2013/14. His passion for hands-on learning drives his work in gamification, esports, and Capture the Flag (CTF) competitions, fostering pathways for emerging talent, including those with autism and neurodivergent traits through coaching at Crank – No Barriers from 2023-2025. Peter champions experiential training, from leading CTF teams to facilitating tabletop exercises on business continuity and disaster recovery, including a 2025 space cybersecurity session using FEMA's NIMS and ICS4ICS methodology. He is a member of AISA and the Australian Institute of Professional Intelligence Officers.
George Ferres DUCA
This talk is a practical guide to turning a low-budget homelab into a small but realistic cyber environment that builds job-ready skills. We will look at simple reference designs, free and cheap tools, and concrete examples of Windows, Linux, firewall, and logging setups that mirror real SME networks. Attendees will leave with clear lab blueprints, links to resources, and ideas for how to turn what they build at home into evidence of real experience.
George Ferres is a sysadmin and IT teacher who broke into the industry at 17 based on a homelab built from cast-off hardware. He is keen to show people coming up behind him that you can get practical IT and security experience with recycled gear and free tools, and have a fun time doing it.
Slavo Greminger Independent Security Consultant
Beginning with the investigation of a suspected phishing campaign, this talk demonstrates how combining defensive and offensive actions can yield a fuller picture of a malware's infrastructure and operational scope. Octo2, an Android malware family, serves as the primary case study. We surgically dissect it to expose its inner workings and tradecraft, surfacing actionable insights for detection and response.
Passionate malware reverse engineer, incident responder, and digital forensicator with a tendency towards academic rigor and a readiness to follow rabbit holes until the underlying story emerges.
Darren Arnott Cyber Informed
In 1834, twin brothers Joseph and François Blanc, entrepreneurs from Bordeaux, France, frequently speculated on the Paris stock market. To increase their profits, they devised an elaborate scheme to reduce the time taken for news of price changes at the Paris stock exchange to reach them in Bordeaux. Instead of waiting three days for price updates to arrive by mail coach, they exploited the semaphore-based telegraph system used to communicate between major cities in France. With news of stock prices in Paris in their hands before anyone else in Bordeaux, they had the ability to use this information to make vast amounts of money. Based on research from news archives, and archival material from the police investigation and court proceedings, this talk will explore the details behind how this hack was accomplished, how it was discovered, what the outcome was, and what we can learn today from an audacious hacking event that took place in the early 1800s.
Darren Arnott is an experienced consultant with a deep enterprise background across Governance, Risk and Compliance (GRC) and technical security. He pairs his background in penetration-testing expertise with risk assessments, practical policy and standards, audit readiness, vendor risk reviews, and clear briefings for executives and management. A published author and regular conference speaker, Darren has delivered outcomes across local and state government, not-for-profits, finance, insurance, superannuation, healthcare, education, retail, food production, and water utilities.
Neel Paranjape Monash University
Join Neel as he demystifies the Application Programming Interface (API). This session aims to guide attendees through the journey of how an API works, explore common API vulnerabilities, and API security best practices. It will provide anyone interested in modern application security with the knowledge needed to secure their APIs and protect their data.
Neel Paranjape is a Senior Application Security Engineer at Monash University where he specializes in API Security and DevSecOps, focusing on building a reliable and secure development process for applications from start to finish. His engineering perspective is informed by knowledge from previous roles across Application Security Engineering, Security Intelligence, and Detection and Response.
Tim Haintz Microsoft/ICSL
A short, technical demo showing how Microsoft Agent Framework and the Model Context Protocol (MCP) orchestrate an end-to-end agentic pipeline: agents fetch research papers using MCP tools, leverage LLMs to analyze paper content, surface key concepts and relationships, then convert those signals into clear Mermaid diagrams to visualize the literature.
Tim Haintz has spent most of his life in Ballarat. He attended Ballarat High School before continuing his education at the University of Ballarat, which is now known as Federation University. Tim earned a Bachelor of Computing and, in 2023, began his Masters in Computing by Research at Federation University/ICSL. His research focuses on Prompt Engineering – The Way to Talk to AI. Tim is a Senior Product Manager on Microsoft’s Agentic AI team within the Security Engineering division. He joined Microsoft in 2019 after 13 years as a Systems Administrator/Engineer at Ambulance Victoria in Ballarat.
Ryan Fox DUCA
Open-Source Intelligence (OSINT) is the art of collecting and analyzing publicly available information—such as social media, websites, public databases, news, and forums—to understand digital footprints and verify information. In this talk, Ryan Fox breaks down the essentials of OSINT in a practical, beginner-friendly way, while highlighting its importance for cybersecurity and personal privacy. Through real-world contexts, including how these techniques can help identify exposed information and support investigations, the session explores how everyday platforms can unintentionally reveal more than people expect. Ryan will also cover defensive tactics you can apply immediately, such as privacy settings, reducing exposed personal details, and improving account security, to help protect yourself from OSINT-based threats like impersonation and social engineering. To wrap up, the audience will participate in an interactive 'OSINT Bingo' challenge, working together on a fictional persona to demonstrate how quickly 'breadcrumbs' can be pieced together, making the learning hands-on, memorable, and fun for both beginners and experienced attendees.
Ryan Fox (he/him) is the President and Founder of the Deakin University Cybersecurity Association (DUCA) and Co-Chair of the Australian Council of University Cyber Societies. He has previously delivered a well-received talk on OSINT and social media and enjoys making OSINT concepts approachable through practical demonstrations and interactive activities.
Jedd Parrott Monash University
We'll walk through some of the major cyber threats facing the Australian Higher Education and Research sector, including emerging threat trends, vulnerability and exploit trends, the geopolitical influence on cyber risk, and attack vector and technique trends.
Jedd Parrott is a Cyber Security Systems Analyst at Monash University. He recently completed a double Bachelor in Information Technology and Criminology and is now working in an Incident Response role in his third year in the Cyber Security industry following Monash University's Cyber Student Incubator Program 2024.
Paramvir Singh RISC
I just received a message on my phone. I'm unable to unlock and use my own phone now. I didn't click or open or download anything, yet my privacy, content, data, information, location, and personal details are leaked and compromised.
Hey, I'm Param, a 21-year-old Bachelor of Cybersecurity student at RMIT, also studying a Bachelor of Business Administration online and working as an Admin Manager at KAS Fuels Pty Ltd. A fun fact about me: I served in the Indian Army. During my training at the biggest tri-service academy in Asia, NDA, I learned about various fields I never thought of exploring, and hence here I am today. I've seen a lot but am still learning even more every day, every time!
Matt Ustinov & Ken Tan AFP
When digital evidence is mishandled, cases slow down—or fall over. This session details what frontline investigators and support teams need to do (and avoid) in the first hours of an engagement, so evidence remains intact and admissible.
Matthew USTINOV is a Senior Technical Analyst in Cybercrime Operations with the Australian Federal Police in Melbourne. Matthew began his career with the AFP in 2006, working in a number of different policing roles before moving into AFP Cybercrime in 2021. Matthew’s primary role upon joining Cybercrime was as an investigator before moving into his current technical support role. Matthew has also completed significant tertiary study and has had experience in cybercrime matters ranging from investigating complex transnational cybercrime, cyber intelligence, incident response and providing assistance in technology enabled crime. He has a strong interest in cybercrime and cyber security matters, in particular cyber intelligence and ransomware. Ken Tan is a Senior Cybercrime Technical Analyst in cybercrime operations, bridging frontline investigations and DFIR. He helps investigators interpret complex detections and potential threats, then shapes pragmatic investigative approaches for high‑pressure incidents. Ken routinely supports warrant activity, post‑incident reviews, and practitioner training, with a focus on chain of custody and evidentiary integrity. His guiding principle is simple: make the right thing the easy thing for investigators under pressure.
David Mulraney Ballarat Smartphones
Every day in my tech repair shops, I see phones compromised not by elite threat actors, but by a simple Google search and a legitimate-looking ad. Users search for utilities like 'phone cleaner,' 'PDF viewer,' 'weather app,' or 'Phone Booster,' tap the top (Sponsored) result, and follow a slick landing page that guides them into installing adware, trackers, or worse. In this talk, I walk through real infection paths from customer devices in regional Victoria to show exactly how these malvertising chains operate. I'll walk through what happened when I dug into one of these apps and uncovered a Hong Kong-based advertiser pumping hundreds of near-identical Google Ads into the same scam network. I will also examine why we almost never see this specific compromise style on iOS, and what that platform gap actually means for user risk. The second half is a practical playbook. I cover how I triage these devices at the counter, how I decide between a cleanup versus a full factory reset, and how I explain the infection to customers in plain language. Attendees will leave with a checklist and practical concepts they can use with their own users, as well as with friends and family, particularly our elderly population.
David runs Ballarat Smartphones and Bendigo Smartphones, spending his days at the frontline of real-world device repairs, failures, data recovery, and mobile security incidents. He sees hundreds of handsets a month across all demographics, giving him a blunt view of how people actually get compromised outside of lab conditions. David is part of the BSides Ballarat organizing committee and cares about turning messy, real incidents into simple, actionable lessons for the community.
Rue Maharaj Melbourne Water
Cyberattacks have rapidly become one of the most significant threats to modern governments, critical infrastructure, and businesses. Insider threats account for a significant portion of attacks on organizations (over 60%), and that number is increasing. They can be malicious (e.g., theft, sabotage) or negligent (e.g., accidental data loss). What makes these threats acutely concerning is that they are performed by trusted personnel who have already been assigned legitimate access and have knowledge of security measures. This presentation highlights the types of insider threats (including malicious insiders, negligent or accidental insiders, compromised insiders, and collusive insiders), key motivators driving them, and pragmatic approaches we can implement to proactively detect and defend against insider threats.
Rue is a cybersecurity practitioner with over 25 years of experience across both private (global) and public sector organizations. He currently works in cybersecurity defense management in the Victorian State Critical Infrastructure sector. In this role, he has championed the cyber incident response management practice at Melbourne Water. Rue's passion for cyber incident response management extends beyond the organization's ability to recover from anomalous events. He strongly believes that understanding the psychological drivers of the malicious actors behind cyber-attacks, as well as the consequential impacts to our cyber incident responders, organization, and wider citizens, are key to building higher resiliency and stronger cyber incident response management strategies. Rue holds professional and academic qualifications from Harvard University, The University of Auckland, and The University of South Africa. Furthermore, he holds a range of cybersecurity and IT professional certifications.
Gyle dela Cruz
Our favourite mobile apps collect more personal information than we realize, from location and habits to health and relationships. When data leaks occur, like the recent Tea app breach, this information can be exposed or weaponized in ways that harm real people. This presentation will explore what app breaches reveal about digital vulnerability and provide actionable steps to protect privacy, security, and overall well-being in an increasingly connected world.
Gyle has been in tech-focused jobs for more than two decades. She pivoted to an IT career in the early 2000s and specialized in cyber security a decade later. She received her Graduate Certificate in Incident Response from the SANS Institute and her master's in cyber security – Digital Forensics from UNSW Canberra. Her focus is on DFIR (Digital Forensics and Incident Response) and threat response areas (blue team related work) but adopts an adversarial mindset (red team) to further understand the different types of threats and attacks. She was part of the first cohort of Project Friedman, an initiative by WomenSpeakCyber and AWSN to produce more conference-ready women speakers. She contributes to the infosec community by volunteering for different community-based organizations, mentoring others, and advocating for diversity, inclusivity, and better mental health support for everyone in the community. At work, she currently leads a team of committed and diverse cyber defenders.
Daniel Cross Tilt Renewables
Australia's critical infrastructure is the backbone of national security and economic stability, making cyber security a top priority for operators and policymakers alike. This session provides a high-level introduction to the evolving cyber security landscape for Australia's critical infrastructure, drawing particularly from the speaker's experience within the energy sector. We will explore the Security of Critical Infrastructure (SOCI) Act, in place since 2018, its implications for operators, and the evolving regulatory landscape. The talk will also highlight key cyber threats facing critical infrastructure globally and locally, and introduce sector-specific approaches and frameworks that guide organizations in building a defensible cyber posture. Attendees will gain an understanding of why cyber security is a business imperative for critical infrastructure operators, the shifting landscape of threats and regulation, and how adopting relevant structured frameworks can help energy providers and other critical sectors stay ahead of emerging risks.
Daniel Cross is the Cyber Security Manager at Tilt Renewables, where he oversees the organization's cyber security strategy and operational program to protect critical energy infrastructure from evolving cyber threats. Drawing on broad experience across technology and cyber security, Daniel specializes in translating complex technical challenges into clear business priorities and is a committed advocate for industry collaboration and community knowledge sharing.
Andrew Feutrill Darwinium
With the rise in sophistication and popularity of Agetic AI models, fraud prevention has become more challenging with fraudsters utilising AI to execute fraud and appear more like legitimate users. In this talk we will explore the current fraud landscape and current techniques, both modern and traditional, that can help identify and mitigate fraud in this new era.
Andrew Feutrill is a Mathematician who has built models in the fraud, e-commerce, cyber security and defence domains. He is currently Director of Science at Darwinium, developing techniques to mitigate the rise of AI assisted fraud.
Hirusha Adikari DUCA
Technical support scams are the digital equivalent of snake oil, with massive pop-ups, fake antivirus warnings, and call centers waiting to 'fix' your computer for a fee. In this talk, we'll break down how these scams work and the psychological tricks they use to hook victims. Then we'll dive into the world of scambaiting, where researchers and hobbyists turn the tables, tracing scam infrastructure, collecting evidence, and sometimes infiltrating the scammers' own systems. If you've ever wondered what really happens when you call 'Microsoft Support', or wanted to fight back safely, this session will pull back the curtain.
I'm Hirusha, a cybersecurity student at Deakin University, developer, and scambaiter who spends way too much time breaking things, doing OSINT, and responsibly reporting the stuff I probably shouldn't have found.
Christian Azuero BMM
The HackerEscapeRoom.online platform fuses the intensity of Capture-the-Flag (CTF) hacking challenges with the narrative-driven immersion of escape rooms, creating timed, story-based cybersecurity puzzles that test everything from threat hunting and penetration testing to governance and incident analysis.
Christian Azuero is a cybersecurity specialist and Technical System Consultant at BMM Testlabs with over five years of experience across firewall auditing, threat detection, DFIR, and regulatory compliance. He designs hands-on Blue-Team and CTF learning environments, including the Hacker Escape Room platform used by students and cybersecurity communities across Australia. Christian holds an MSc in Network & Security from Monash University and multiple industry certifications, and is passionate about making cybersecurity education accessible, practical, and fun.
Peter Coroneos Cybermindz
BSides has a theme of building a cybersecurity career. One topic that is missing is mental health in cybersecurity. It is becoming recognized as a serious problem in the industry due to high-stakes situations, a sense of constant vigilance, and lack of control over when incidents may occur. For people looking to get into cybersecurity as a career, they need to learn skills to manage their mental health in the face of these challenges early, otherwise they will be at risk of burnout or other mental health issues.
Twice invited to the White House to advise the Obama Administration on cybersecurity, Peter Coroneos is a distinguished leader in the cyber and technology sectors. As CEO of Australia's Internet Industry Association (1997-2011), he pioneered 'icode', an anti-botnet scheme, inspiring a similar US initiative that reached 276 million users by 2012. Peter led the Australian industry delegation to Washington bilaterals on critical infrastructure protection. Beyond his cyber credentials, Peter is an accredited iRest instructor and long-term meditation teacher and practitioner. He holds qualifications in science, education, and law. In 2022, Peter founded Cybermindz.org, an international non-profit empowering and restoring embattled cyber teams with scalable, evidence-based mental health support.
Nabil Siddiqui FedUni/Microsoft
Large Language Models (LLMs) are transforming software development by accelerating code generation, automating routine tasks, and enabling rapid prototyping. Yet beneath that fluency sits a growing supply‑chain risk: package hallucination. This happens when models reference libraries or APIs that simply don’t exist, or suggest incorrect versions, quietly introducing failures that are hard to catch. In this talk, he will share insights from a multi‑model, multi‑language analysis that highlights how these hallucinations show up across different ecosystems and what this means for developer trust and ultimately, for building safer AI‑assisted tooling.
Nabil Siddiqui is a Solution Engineer at Microsoft and a researcher at Federation University, where his research explores the intersection of cybersecurity and artificial intelligence. With a career spanning more than 20 years, Nabil is recognized for his expertise in application innovation, AI, and security. He is passionate about leveraging cutting-edge technologies to solve complex challenges and drive secure, ethical digital transformation. Beyond his professional role, Nabil is a passionate open-source contributor and a published author. His book, Embracing Microservices Design: A Practical Guide to Revealing Anti-Patterns and Architectural Pitfalls, helps practitioners avoid common microservices fallacies.
Purvi Mehta ICSL
In today's fast-evolving threat environment, simply knowing security fundamentals is no longer enough. Cybersecurity professionals and organizations must be skillful, well-prepared, and efficient in deploying advanced defense measures instantly when an alert occurs. This session introduces the values and limitations of the Cyber Training Range (CTR)—a vital resource for building operational readiness. A CTR provides a secure, isolated, and highly realistic virtual setting where teams can conduct full-scale cyber exercises without risking production systems.
I am a cybersecurity researcher and educator currently undertaking a Master's by Research with a planned conversion to PhD from Federation University. Alongside my research, I work as an IT trainer at Box Hill Institute, contributing to capability-focused cyber education and training delivery. Before my appointment at Box Hill, I worked as a lecturer and tutor at a number of universities, teaching a wide range of IT units. My teaching portfolio included subjects such as Cloud Computing, Cloud Security, Networking, and Project Management, among others.
Kenneth Yu Cyberknowledge
The dark web is often portrayed as a shadowy underworld of the internet, but the reality is far more nuanced and relevant to cybersecurity professionals. In this session, we will cut through the myths to explore what the dark web really is, how it operates, and why it matters. We will examine its infrastructure, the marketplaces and communities that thrive there, and the role it plays in cybercrime, from data breaches to ransomware operations. We will discuss how defenders can monitor dark web activity and use this to their advantage. Attendees will leave with practical insights into leveraging dark web intelligence for threat hunting, incident response, and proactive defense.
Kenneth Yu is currently the Head of Adversarial Research at Cyberknowledge, where he leads the offensive security capabilities and the integration of adversary simulation modules into the Cyberknowledge platform. With over 18 years of cybersecurity experience, Kenneth has extensive experience in delivering penetration testing, incident response, and both technical and executive-level tabletop exercise engagements. He has worked with organizations across a wide range of industries, including finance, consulting, retail, technology, and government, to identify and remediate real-world attack vectors, strengthen security controls, and enhance leadership preparedness.
>> Technical deep dives, exploit walkthroughs, and security research discussions.
Paul Black
ICSL - ROP Exploits
Abhay Vaish
Palo Alto Networks
Sean Park
ICSL / Trend Micro
Physical security is the first line of defense. Join us to learn the art of non-destructive entry. Whether you've never held a pick before or you're a seasoned pro, the Lock Picking Village is open to all skill levels throughout the conference.
Saturday & Sunday
Technology Park
106 Lydiard Street South
Central Ballarat, Victoria
The ICSL would like to thank the following sponsors of BSides Ballarat / MRE 2026, without which our conference would not be possible.