26/11/24
11:35
-
12:15
Conditional access to Copilot - securing M365 in 40 minutes or less
26/11/24
14:25
-
15:05
Very Pwn-able Network (VPN) – The gift to hackers that keeps on giving!
26/11/24
15:50
-
16:30
Cloud boundaries redefined: Exploring the power of Security Service Edge (SSE)
27/11/24
11:20
-
12:00
Mastering the art of attacking and defending a Kubernetes cluster
27/11/24
11:20
-
12:00
Hunting in the dark: Detecting and disrupting DNS-based C2 traffic
27/11/24
13:30
-
14:10
Account takeovers, fraudsters, booters, scrapers and how to find them
27/11/24
13:30
-
14:10
Turning DNS from your top threat vector to your most productive defender
27/11/24
14:20
-
15:00
Secure different: Securing macOS devices in an enterprise environment
27/11/24
15:50
-
16:30
Adopting Cloud? How do you ensure positive security outcomes?
28/11/24
10:15
-
10:55
Guardians of the inbox: Elevating email trust with SPF, DKIM, DMARC, and BIMI
28/11/24
10:15
-
10:55
Fortifying the cloud: Current practices, emerging trends, and future strategies