Cyber security, AI security, AppSec, DevSecOps, Cloud security, Deception defence, Hacking, Exploitation

AI Security

Location Date Presentation Title
๐Ÿ‡ฉ๐Ÿ‡ฐ FirstCon 2025 Beyond the Hype: How Large Language Models Really Help (and Hinder) Vulnerability Remediation
๐Ÿ‡ต๐Ÿ‡ฑ Code Europe 2025 Hacking LLM applications: trends and live secure coding lessons
๐Ÿ‡ฆ๐Ÿ‡บ Programmable Sydney 2025 Jailbreaking and Protecting LLM Apps: A Public Wargame Experiment
๐Ÿ‡บ๐Ÿ‡ธ Black Hat USA 2025 AI Wargame
๐Ÿ‡ธ๐Ÿ‡ฌ Black Hat Asia 2025 AI Wargame
๐Ÿ‡บ๐Ÿ‡ธ TechBash 2025 LLM (in)Security Workshop - Find, Hack and Fix LLM Apps
๐Ÿ‡บ๐Ÿ‡ธ Black Hat USA 2024 AI Wargame
๐Ÿ‡ธ๐Ÿ‡ฆ Black Hat MEA 2024 Prompt injection and secure prompt engineering
๐Ÿ‡ณ๐Ÿ‡ฟ OWASP AppSec Days 2024 Jailbreaking and Securing LLM Apps: Lessons from an Online Wargame Experiment
๐Ÿ‡ฏ๐Ÿ‡ต FirstCon 2024 AppSec & Secure AI Challenges
๐Ÿ‡ฆ๐Ÿ‡บ AISA CyberCon 2024 Securing and attacking LLM-Based apps
๐Ÿ‡ธ๐Ÿ‡ฌ OWASP AppSec Days 2024 LLM Security Is Broken: Data Collected From an AI Wargame
๐Ÿ‡จ๐Ÿ‡ฆ Black Hat SecTor 2024 AI Wargame
๐Ÿ‡ฌ๐Ÿ‡ง Black Hat EU 2024 AI Wargame
๐Ÿ‡ธ๐Ÿ‡ฆ Black Hat MEA 2024 AI Wargame
๐Ÿ‡ธ๐Ÿ‡ฌ Black Hat Asia 2024 AI Wargame

AppSec, DevSecOps & Secure Coding

Location Date Presentation Title
๐Ÿ‡ธ๐Ÿ‡ฌ OWASP AppSec Days 2025 40,000 CVEs and Counting: The State of AppSec in 2025
๐Ÿ‡ฉ๐Ÿ‡ฐ FirstCon 2025 AppSec & DevSecOps Challenges
๐Ÿ‡ฆ๐Ÿ‡บ NDC Melbourne 2025 Proactively defending your software
๐Ÿ‡บ๐Ÿ‡ธ DEF CON AppSec Village 2025 Web 3 and AppSec Challenges
๐Ÿ‡บ๐Ÿ‡ธ DEF CON AppSec Village 2024 Secure Coding Wargame (Fix The Flag)
๐Ÿ‡ฏ๐Ÿ‡ต FirstCon 2024 Challenges in Establishing Secure Software Development Culture
๐Ÿ‡บ๐Ÿ‡ธ DEF CON AppSec Village 2023 AppSec Wargame
๐Ÿ‡บ๐Ÿ‡ธ DEF CON AppSec Village 2023 Secure Coding Attack and Defence Challenge (Fix The Flag)
๐Ÿ‡จ๐Ÿ‡ฆ FirstCon 2023 AppSec & DevSecOps Challenges
๐Ÿ‡จ๐Ÿ‡ฆ FirstCon 2023 How to Create a Secure Programming Culture Among Engineering Teams
๐Ÿ‡ฌ๐Ÿ‡ง BlackHat EU 2023 Build security unit and integration tests like a hacker
๐Ÿ‡จ๐Ÿ‡ฆ BlackHat SecTor 2023 Security Attacks as Software Tests: How to build security unit tests
๐Ÿ‡ฆ๐Ÿ‡บ NDC Melbourne 2022 Fuzzing Cloud Native Apps: Zero to Hero

Hacking & Exploitation

Location Date Presentation Title
๐Ÿ‡ญ๐Ÿ‡บ BsidesBudapest 2020 Immune your Javascript Programs Against Modern Vulnerabilities
๐Ÿ‡ฆ๐Ÿ‡บ SyPy Sydney 2018 Member-Oriented Exploitation Technique in Python 2.x and 3.x
๐Ÿ‡ฆ๐Ÿ‡บ ReactJS Sydney 2018 Client-Side Template Injection in AngularJS 2
๐Ÿ‡ฆ๐Ÿ‡บ AusCERT 2016 The trade-off between UX vs Security

Deception Defence

Location Date Presentation Title
๐Ÿ‡ญ๐Ÿ‡บ BsidesBudapest 2017 Deception defence 101 - a platform at low cost
๐Ÿ‡ธ๐Ÿ‡ฎ BsidesLjubljana 2017 Deception defence 101 - a platform at low cost
๐Ÿ‡ฆ๐Ÿ‡บ Csides Canberra 2017 Deceptive defence
๐Ÿ‡ณ๐Ÿ‡ฑ HITB, Netherlands 2015 Uncovering Secret Connections Among Attackers Using Network Theory and Custom Honeypots

Cloud Security

Location Date Presentation Title
๐Ÿ‡ฆ๐Ÿ‡บ AISA Sydney 2012 Know who targets your public facing infrastructure and give yourself a second chance even if your servers are not patched
๐Ÿ‡ฆ๐Ÿ‡บ ISACA Perth 2011 Don’t let your Cloud turns Dark

Machine Learning

Location Date Presentation Title
๐Ÿ‡บ๐Ÿ‡ธ CEAS 2010 Rule-Based On-the-fly Web Spambot Detection Using Action Strings
๐Ÿ‡ฆ๐Ÿ‡บ AINA 2010 Web Spambot Detection Based on Web Navigation Behaviour

Honeypot & Spam

Location Date Presentation Title
๐Ÿ‡ฏ๐Ÿ‡ต PRIMA 2009 HoneySpam 2.0: Profiling Web Spambot Behaviour