Sessions

Sign in to add sessions to your agenda
26/11/24
10:45
 - 
11:25
Spoofing commands - Can you trust process creation logs?
Tristan Bennett
26/11/24
11:35
 - 
12:15
Hiding in plain sight: How sub domain attacks use your email authentication against you
Bradley Anstis
26/11/24
13:35
 - 
14:15
How NOT to run a security operation centre, a SOC manager’s perspective
Dushyant Sattiraju & Raj Udayanga
26/11/24
13:35
 - 
14:15
Owning your cyber security mid-game strategy
Chris Thomas
26/11/24
14:25
 - 
15:05
Taming Threats: A symphony of two worlds – Paper trail meets threat trail
Queen Aigbefo & Ashley Wicks
26/11/24
14:25
 - 
15:05
Measures and metrics: How to report on more than just the SOC
Harry Brown
26/11/24
15:50
 - 
16:30
Ransomware attack scenario review
Chris Thomas
26/11/24
15:50
 - 
16:30
SOC metrics and performance measurement
Pranjali Karve
27/11/24
15:50
 - 
16:30
Mature your detection capabilities - Evolve your SIEM and know your priorities
Mlaz Adlbi
28/11/24
13:50
 - 
14:30
Cyber security meets Project Management: why cyber risk management is achievable through better collaboration between the cyber security team and project managers
Tony Vizza
28/11/24
13:50
 - 
14:30
Effective security detections: From intent to action
Aditya Patil
28/11/24
14:40
 - 
15:20
SOC200 and Threat Hunting with Kali Purple
Malcolm Shore & Carsten Boeving

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country