
Adam Foster, also known as evildaemond is a Senior Penetration Tester with OneStep Group and an Information Security Researcher, with niches in Physical and Hardware Security. They have developed and released open source tools such as the DoorSim and Physsec Methodology, aiming to encourage cyber security professionals to understand the physical side of information security.
- Your Key is My Key - Breaking key controls

Adam Kues (hashkitten) is a Security Researcher at Assetnote from Melbourne. Outside of finding esoteric and tricky but exploitable vulnerabilities in enterprise software in his day job, he participates in CTFs with the skateboarding dog team. He represented Australia in the International Cybersecurity Championships from 2022 to 2024 and regularly contributes challenges for DownUnderCTF.
- Finding Critical Bugs in Adobe Experience Manager

- let’s make malware but it might get caught so the malware gets worse ☣️

I'm a digital nomad fighting cybercrime.
I've been travelling Australia full time for over two years in my Landcruiser and hacking the planet from the most pristine beaches our country has to offer to the most remote parts of the outback.
I specialise in dark web, cybercrime and blockchain security, I'm also the proud founder of Rivanorth.
- Behind the Curtain of Dark Web and Cybercrime Operations

Reverse engineering for threat intel by day. Reverse engineering for no reason by night.
- GET into the mainframe

Anurag is a Director with the CrowdStrike Digital Forensics and Incident Response (DFIR) team, where he leads the team in Asia Pacific. His team works on several incident response investigations that involve nation state and eCrime adversaries every year.
He has led several high profile investigations over years involving nation state threat actors, investigating threat actor activity, scoping the incidents, creating and executing eviction plans and helping organisations improve detection capabilities .His work has led to detection and tracking of previously unknown threat actor groups and malware.
He has also been involved in eCrime incident response investigations, often getting into knife fights with adversaries, during dynamic threat actor activity.
Anurag is a SANS Certified Instructor where he teaches SEC504: Hacker Tools, Techniques, and Incident Handling.
- Active Directory Security - Attack, Defend and Investigate
Ayman is a principal security consultant at CyberCX with a decade of professional cybersecurity experience. Ayman enjoys offensive security research, vulnerability discovery and malware analysis.
- Ding Dong The EDR is DEAD

Ben's background spans embedded development, safety-critical systems, browser security, network security and cryptographic protocols. He left Apple in 2024, having worked on autonomous systems, iCloud Keychain sync protocols, and a Rust implementation of IPsec that secures network traffic across Apple's data centres. He has trained hundreds of engineers and helped multiple teams to adopt and deploy Rust at scale. You can find his training videos on youtube via RustCurious.com.
- Why Rust is Safe

The BSides Canberra Organising Group is a volunteer team passionate about growing Australia’s cyber security community. Since 2016, they’ve built BSides Canberra into the country’s largest hacker conference - while keeping it community-focused, technically deep, and welcoming.
Outside the conference, the team supports year-round learning and connection through events like CSides and initiatives that promote diversity and inclusion in cyber.
- HackerChix Networking

- Interested in find vulnerability in
Windows (kernel, user application)
, binary exploit - MSI, eScan Hall Of Fame (with BoB.0DayResearchLab)
- Presentation Member of CODEBLUE 2024 (1-Click-Fuzz: Systematically Fuzzing the Windows Kernel Driver with Symbolic Execution.)
- CVE-2024-20653, CVE-2024-21442, CVE-2024-21445 in windows kernel, and find many CVE from that project
- M.S. Computer Science in Sejong University
- Breaking COMposure: Journey to Hunting Windows COM Vulnerabilities

After earning his PhD in Mathematics, Dave dedicated the next 25 years to consulting for the Australian Government, focusing primarily on Defence, Intelligence, and Law Enforcement, before transitioning to roles at CrowdStrike and Gen Digital (which was formed from the merger of Avira, Avast, and NortonLifelock). Throughout his career, he has remained deeply involved in Incident Response and Forensics, with the privilege of supporting individuals during some of their most challenging moments at work.
His expertise spans the full spectrum of cybersecurity, from offensive and defensive operations to incident response and building security capabilities. He holds a strong passion for digital forensics and incident response, with a focus on helping people prevent and recover from attacks, and on removing obstacles to effective information sharing.
- Decoding Threat Actors: a Free Tool for Mapping Aliases and Taming the Name Game

Dave/Karit has worked in various parts of the IT industry and has developed a skillset that encompasses various disciplines in the information security domain. Dave currently does Security Consulting in Wellington and runs Kākācon.
Dave has presented at a range of conferences such as DefCon, Kiwicon, Aerospace Village @ DefCon, BSidesCBR, CHCon, Unrestcon and at numerous local meetups; along with running training at Kiwicon, Syscan, CrikeyCon, CHCon and TuskCon. He also has a keen interest in aerospace, lock-picking and all things wireless.
- Navigating Planes in a Hostile Radio World

Dylan Pindur is a Security Researcher at Assetnote from Perth. He has a diverse background in information security, having worked in roles over the last ten years that have included pentesting, creating vulnerable VMs for Offensive Security, and leading an Application Security team for a large insurance company.
- Finding Critical Bugs in Adobe Experience Manager

Giuliana is a Security Engineer at Atlassian. She likes poking at things on her laptop until they do something they aren’t supposed to. She loves food, fashion and making new friends - so come say hi!
- Reversing Bytecode into Bounties: Uncovering Vulnerabilities in Jira and Confluence Plugins

Jamal is also a Security Engineer at Atlassian. He likes computers, masquerading as a farmer, making new friends and wholesome security vibes, so come say hi!
- Reversing Bytecode into Bounties: Uncovering Vulnerabilities in Jira and Confluence Plugins

James is an Intrusion Analyst and Threat Hunter at CrowdStrike (OverWatch), with a strong focus on identity and authentication security. Formerly, he was an Security Engineer at Monash University, and a Systems Engineer at identity startup Lithnet.
- Protecting the Forest, Starting at the Roots: AD Hardening & Defence using Modern Techniques
Senior Penetration Tester - SilentGrid
- Development of an Implant in C#
- Kerberoasting in C#: An OPSEC Perspective

John Uhlmann (he/him) is a Security Research Engineer at Elastic where he is the R&D lead for the Elastic Endpoint (EDR) Windows agent. Prior to this he did similar work at the Australian Cyber Security Centre.
- Writing Windows Unit Tests: Telemetry bugs are security vulnerabilities too

Joshua Padman is a Senior Principal Security Analyst working in Red Hat's Information Security Incident Response team. He has spent a total of eight years at Red Hat, prior to his current role he was in the Product Security team. Joshua has a strong interest in the challenges faced by companies working in open source. More importantly, Joshua is a long term BSides Canberra volunteer and attendee.
- Where Did I Put My Keys? Preventing Data Leaks at Scale with Automation

Justin is a seasoned computer security professional with 13 years of experience across Incident Response and Software Security. As Tanto Security's Head of Research, Justin fosters the curiosity and ingenuity of our consultants, supporting them as they engage in their own research projects.
- Sleepless Strings - Template Injection in Insomnia
- "Well well well, if it isn’t the consequences of my own actions" - the time I got in the middle of 100,000 Linux machines and their fwupd/LVFS firmware updates 🙈

Katie Deakin-Sharpe is a malware analyst at the Australian Cyber Security Centre (ACSC), where she reverse engineers malware to help protect and defend Australian government and industry networks. Prior to joining the ACSC, she worked as a software developer at the consumer privacy start-up Anonyome Labs.
- Reverse Engineering Sherlock Holmes Style: Obfuscated APIs & The Art of Deduction.
A Security Engineer with Advanced Practices at Google. He primarily supports frontline intelligence operations and incident response investigations.
- Picking Flowers and Maybe Chaos

Kristin (aka Krispy) is a Security Engineer in Google’s Detection and Response team. Her team’s mission is to protect, respect and defend their users, Googlers and the internet. Her area of expertise is all things Identity; think authentication, tokens and cookies galore.
Outside of work, she enjoys travelling, joining an unsustainable amount of book-clubs and speaking in third person.
- Is this binary Naughty or Nice? How Google leverages ML and Santa to detect persistence on MacOS

- Closing Ceremony
- Opening Ceremony

Liam began his cybersecurity journey in 2020 and currently works as a Senior Capability Developer in the Digital Forensics & Incident Response (DFIR) team at CyberCX. In his current role, he is responsible for designing, implementing and maintaining various in-house and third-party tooling used by the DFIR practice, as well as contributing to investigations specializing in cloud and application security.
He currently holds the GIAC Certified Forensic Analyst (GCFA) and GIAC Cloud Security Automation (GCSA) certifications and has a wealth of knowledge and experience in digital forensics, incident response, application security, and software engineering.
- DarkEngine: Conducting Research into a Highly Orchestrated Phishing Campaign

Luke is a Junior Security Engineer at Bugcrowd with a particular interest around supply chain vulnerabilities and security risks that impact systems and developers.
As a security researcher he has reported vulnerabilities to over 40+ organisations including Microsoft, Adobe, Anthropic, Electronic Arts and more!
- Why I am (still) finding secrets in your code
Malware Security
- The Black Bag

Marcio Almeida is one of the Co-Founders and the Director of Technical Services at Tanto Security. He has worked in cyber security for over 15 years and has experience with Penetration Testing, Code Review, Exploit Development, Secure Development, DevSecOps and Red Team Operations.
- Sleepless Strings - Template Injection in Insomnia
- Kubernetes Capture the Flag
Matthew is a principal security consultant within the Proactive Labs team, with over 15 year’s
experience in the Information Technology industry, and with 8 years in offensive security.
Matthew regularly develops bespoke tooling for engagements, and has
also performed other technical roles outside of penetration testing, including development of
open-source collection systems, and technical advisory for uplifting large government organisations.
- Bitsquatting dot gov.au domains – exploring network data bitflips in DNS traffic

Matthew Flanagan (@mattimustang@infosec.exchange) is the Director and Principal Cyber Security Consultant at Cybliminal, a security consultancy he founded in 2022. With 30 years of IT experience, including 25 years specialising in cyber security, he applies adversarial and offensive techniques to help organisations build stronger, more resilient defences.
- Panning for Gold - A Hacker's Guide to Next Generation Firewalls

Nic is an experienced cyber security manager with a strong passion for helping lay people understand complex and technical concepts.
This is aided by his broad experience gained from 20 years in Government across intrusion detection, network analysis, technical analysis, cryptography, non-technical analysis, crisis leadership, teaching technical concepts to non-technical audiences and music. (Thankfully, no interpretive dance).
Nic has infinite curiosity and considers it a great day when he has learned something new. He also hates writing about himself pompously in the third person.
- Insights of a Middling Cyber Monk - or how I learned to stop worrying and love the complexity

Priya Gnanasekaran is a Senior Security Engineer at LAB3, a TEDx speaker, and a recognised cybersecurity advocate. With a strong background in infrastructure security, DevSecOps, and identity management, Priya blends technical expertise with a passion for reimagining digital trust. She has led enterprise-wide security transformations, championed secure design thinking, and frequently speaks on global stages about emerging technologies, including Web3, AI, and decentralized identity. Priya’s mission is to make cybersecurity more accessible, equitable, and human-centric—bridging the gap between innovation and impact.
Linkedin Profile: https://www.linkedin.com/in/priyacyber/
- CTRL + ALT + UPGRADE: Navigating Your Cyber Career in the AI Era

Rajiv is an expert in explaining emerging technology, and helping organisations to apply it in a way that is both secure and delivers business value. In addition to running his own consulting business, MDR Security, he is a Fellow of the Australian Strategic Policy Institute, and a member of the board of the Australian Information Security Association. He is a regular speaker at major conferences, including SXSW Sydney 2024 and the CSIRO "Quantum Meets Communications" event.
Rajiv has a PhD in quantum physics, and has almost 30 years experience in the technology industry, working across cyber security, quantum technology, telecommunications, AI and cloud. His current work includes technical advice and oversight to major IT projects, solution architecture for complex data platforms and providing technical input to strategy development and analysis of public policy options. Rajiv's previous experience includes as the inaugural Australian regional director for the cyber security division of BAE Systems, and establishing Australian federal government business for British Telecom.
- When will a quantum computer be able to crack modern encryption and what should we do about it?
Redacted Information Security
- The Black Bag

- Careers Panel
- Where's Wally: Cyber Edition
- Cards Against Humans in Cyber
- Live CV Roast: The Degustation

Riley has experience building, breaking, learning, and teaching across consulting and internal security teams in Australia and Europe. As the Product Owner of Adversary Simulation at NAB, he helps protect the bank by proactively doing what our tracked threat actors like to do.
- Time Traveling Exploitation: Remote Code Execution in a 10,000 Day Old Game Protocol

Principle Consultant @ControlPlane - Like to talk about how Security is fundamental to DevOps, how Kubernetes often isn't the best answer to your problem and my lived experience of SRE.
I've been Automating toil in Linux for 20 years, but when Kubernetes came along I was initially dismissive, after all I was already building everything in Containers with Docker and orchestrating in a variety of semi-manual ways. I've since come to appreciate all it can do and also what its limitations are and when NOT to use it. I've taught DevOps courses and Kubernetes courses while also helping large enterprises setup internally managed Kubernetes platforms with a product based mindset.
- Kubernetes Capture the Flag

Season Cherian is a hacker and entrepreneur with deep expertise in technical and strategic security across both private and public sectors. Leading Hardware Security Research at Traboda Cyber Labs, he specializes in OT System Security Analysis, IoT Security, and N-day research. Beyond his entrepreneurial pursuits, Season is a key organizer of the bi0s meetup, collaborating with a team to host monthly sessions that draw top cybersecurity experts and researchers, promoting cutting-edge discussions and advancements. Additionally, he is a speaker and trainer at premier conferences, including Black Hat, SINCON, and InCTF.
- Twin-Core Hardware CTF: From Soldering Fumes to PLC Pwn - Day 2
- Twin-Core Hardware CTF: From Soldering Fumes to PLC Pwn - Day 1

Lead Incident Responder @ Mastercard
- Unravelling LummaStealer - A Malware Analysis workshop

- Closing Ceremony
- Opening Ceremony

skateboarding dog aren’t just any CTF team – they’re the best in the country. A powerhouse of talent, this team of former university students turned elite hackers has dominated the Australian CTF scene for years. They win almost every local conference they play in and have claimed the top spot at the BSides Canberra CTF for the past three years running.
In 2025, they're stepping up in a new role: not just as competitors, but as creators. skateboarding dog is designing and hosting the BSides Canberra CTF – and if their track record is anything to go by, it’s going to be one of the best challenges you’ll play all year. With deep technical skill, a nose for creative exploitation, and a flair for building clever, high-quality puzzles, they’re setting the bar high.
They’re also part of the brains behind DownUnderCTF, Australia’s largest online CTF, helping grow and support the local community of hackers and learners.
Get ready – the BSides Canberra 2025 CTF is going to be unforgettable. With skateboarding dog at the helm, you’re in for something special.
Follow them on twitter: https://x.com/sk8boardingdog
- Capture-the-Flag (Day One)
- Capture-the-Flag (Day Two)

Stephen has been working in cyber security for around 20 years across both Government and the private sector. His current focus includes work such as security research, pentesting, vulnerability hunting, purple and red teaming, working on cyber security incidents and building, designing and maintaining offensive security systems and tools.
- Abusing native cloud services for Command and Control
Announcement to be made shortly
- Closing Keynote
- Friday Keynote
- Opening Keynote

Your host for the Speedrun CTF is none other than toasterpwn (https://x.com/toasterpwn) - winner of the Hexacon Speedrun CTF 2024, captain of the rising Australian team Emu Exploit, and a professional vulnerability researcher at InfoSect.
Known for sharp skills and even sharper reflexes, toasterpwn has quickly built a reputation as Australia’s newest, brightest hacker. Whether it’s pwning binaries or racing the clock, they're here to put challengers to the test and bring the heat to the qualifier.
- Speedrun CTF Finale
- Speedrun CTF Qualifiers

A cybersecurity professional with extensive experience in incident response and threat research. Initially beginning my career as an Incident Responder, I specialized in managing and mitigating active security threats within enterprise environments. Building upon this foundational expertise, I have transitioned into the role of a Threat Researcher, where I focus on in-depth analyses of emerging cyber threats, including sophisticated malware families.
- Atomic Stealer's Dyld Injection Tactics

Vivek N J is a seasoned cybersecurity professional with expertise in IoT security, penetration testing, firmware analysis, and reversing. As a Senior Security Engineer at Traboda, he leads the security team in identifying and mitigating risks associated with IoT devices. His focus lies in firmware analysis and reversing, enabling him to uncover hidden vulnerabilities and develop comprehensive security solutions for firmware-based systems.
- Twin-Core Hardware CTF: From Soldering Fumes to PLC Pwn - Day 2
- Twin-Core Hardware CTF: From Soldering Fumes to PLC Pwn - Day 1

BSides Canberra is entirely volunteer-run, with around 40 dedicated volunteers who contribute both before and during the event. Volunteers can be easily identified by their maroon t-shirts.
- Hardware Village (Day One)
- Locksport (Day 2)
- Locksport (Day 1)
- Locksport (Day 3)
- Hardware Village (Day Three)
- Hardware Village (Day Two)