Cyber Security Operations

Australian Cyber Conference 2024
26–28 November 2024
Melbourne Convention and Exhibition Centre (MCEC)

Sessions

Sign in to add sessions to your agenda
26/11/2024
10:45
 - 
11:25
Fortifying the skies: Navigating aerospace cyber security challenges
Richard Magalad & Chathura Abeydeera
Room 105
26/11/2024
10:45
 - 
11:25
Inside the MIND of a hacker - Insights and lessons from a ransomware attack
Joseph Carson
Room 203
26/11/2024
10:45
 - 
11:25
Supercharge threat hunting teams for enhanced detection
Claire Carpenter
Room 204
26/11/2024
10:45
 - 
11:25
Fortifying cyber frontlines: The essential role of deception
Ben Potter
Room 207
26/11/2024
10:45
 - 
11:25
Analysing the risks and rewards of leveraging AI in cyber threat triage and response
Gavin Coulthard
Think Tank 4
26/11/2024
10:45
 - 
11:25
Spoofing commands - Can you trust process creation logs?
Tristan Bennett
Ask an Expert 2
26/11/2024
11:35
 - 
12:15
Hiding in plain sight: How sub domain attacks use your email authentication against you
Bradley Anstis
Room 204
26/11/2024
11:35
 - 
12:15
How safe is safe? Exploring the vitality of physical security in an ever-evolving world and its parallels to cyber security
KS Lam
Room 207
26/11/2024
11:35
 - 
12:15
Cyber Threat Intelligence is a "nice to have" – Wrong, it's a "must have"!
Matt Hull
Think Tank 1
26/11/2024
13:35
 - 
14:15
How NOT to run a security operation centre, a SOC manager’s perspective
Dushyant Sattiraju & Raj Udayanga
Room 203
26/11/2024
13:35
 - 
14:15
Owning your cyber security mid-game strategy
Chris Thomas
Room 204
26/11/2024
13:35
 - 
14:15
Beyond detection: Transforming threat intelligence into actionable attack surface reduction
Loris Minassian
Room 207
26/11/2024
14:25
 - 
15:05
Taming Threats: A symphony of two worlds – Paper trail meets threat trail
Queen Aigbefo & Ashley Wicks
Room 203
26/11/2024
14:25
 - 
15:05
Unlocking the power of threat intelligence infused detections in the SOC
Ray Huang
Room 204
26/11/2024
14:25
 - 
15:05
Measures and metrics: How to report on more than just the SOC
Harry Brown
Room 207
26/11/2024
15:50
 - 
16:30
Ransomware attack scenario review
Chris Thomas
Room 204
26/11/2024
15:50
 - 
16:30
SOC metrics and performance measurement
Pranjali Karve
Room 207
27/11/2024
10:30
 - 
11:10
AI and DFIR: A match made in cyber heaven or a recipe for digital disaster?
Josh Lemon
Room 203
27/11/2024
10:30
 - 
11:10
Game-on (Part 2): 16-bit Adventures of a Security Analyst
Jai Minton
Room 207
27/11/2024
11:20
 - 
12:00
The rise and rise of advanced eCrime threat - Incident Response edition
Anurag Khanna
Room 203
27/11/2024
11:20
 - 
12:00
Creating cyber threat intelligence like a journalist
Chris Horsley
Room 207
27/11/2024
11:20
 - 
12:00
Teaching the intelligence bits of CTI
Brendon Hawkins
Think Tank 1
27/11/2024
13:30
 - 
14:10
Surviving and thriving in SecOps: A conversation with two experts
Melina Ryan, Jess Dodson & Vannessa Van Beek
Melbourne Room 2
27/11/2024
13:30
 - 
14:10
Keep your enemies closer: the future is in Red Team Ops
Remy Coll
Room 203
27/11/2024
13:30
 - 
14:10
Incident Response: What Happens on Day 2?
Richard Dornhart
Room 207
27/11/2024
13:30
 - 
14:10
SingHealth Attack: A story of its relevance for the world and Australia
Ninad Dhavase
Think Tank 2
27/11/2024
13:30
 - 
14:10
Ask an Expert stream - Talk to a digital forensic analyst
Phill Moore
Ask an Expert 2
27/11/2024
14:20
 - 
15:00
The enemy is within the gates – Recent lessons from internal threat incident response investigations
Peter Chapman
Room 207
27/11/2024
15:50
 - 
16:30
A cyber journey around the world - Are we ready for a cyber war?
Odaya Amsellem & Ruman Sarawer
Room 203
27/11/2024
15:50
 - 
16:30
Mature your detection capabilities - Evolve your SIEM and know your priorities
Mlaz Adlbi
Room 207
28/11/2024
10:15
 - 
10:55
Exploiting the physical plane: Red team intrusion techniques and tools
Austyn Guo
Room 207
28/11/2024
11:05
 - 
11:45
Threat Detection-as-Code for Automated SecOps
Stefan Avgoustakis
Room 203
28/11/2024
11:05
 - 
11:45
State-sponsored cyber operations: understanding global risks and implications for Australia
Jana Dekanovska
Room 207
28/11/2024
13:00
 - 
13:40
Is 'Cyber Resiliency' the new first line of defence for organisations?
Nicole Gabryk, Salman Khokhar, Angela Messih, Thomas Tracey & Stephen Wright
Melbourne Room 2
28/11/2024
13:00
 - 
13:40
Navigating the storm: Security Incident Response in the Cloud
Pouya Ghotbi
Room 203
28/11/2024
13:00
 - 
13:40
Harnessing strategic, operational and tactical threat intelligence for a more robust security posture
Ian Francis Usher
Room 207
28/11/2024
13:50
 - 
14:30
Effective security detections: From intent to action
Aditya Patil
Room 207
28/11/2024
14:40
 - 
15:20
SOC200 and Threat Hunting with Kali Purple
Malcolm Shore & Carsten Boeving
Room 203
28/11/2024
14:40
 - 
15:20
Adaptive threat intelligence: Predicting the unpredictable
Alexander Gould & Monika Tarnavetchi
Room 207

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country