Sessions

26/11/24
10:45
 - 
11:25
Spoofing commands - Can you trust process creation logs?
Tristan Bennett
View details
26/11/24
11:35
 - 
12:15
Hiding in plain sight: How sub domain attacks use your email authentication against you
Bradley Anstis
View details
26/11/24
11:35
 - 
12:15
Ctrl Alt Defeat: A comedy of errors in higher Ed cyber security
Keyur Lavingia & Patrick Kean
View details
26/11/24
13:35
 - 
14:15
How NOT to run a security operation centre, a SOC manager’s perspective
Dushyant Sattiraju & Raj Udayanga
View details
26/11/24
13:35
 - 
14:15
Owning your cyber security mid-game strategy
Chris Thomas
View details
26/11/24
14:25
 - 
15:05
Measures and metrics: How to report on more than just the SOC
Harry Brown
View details
26/11/24
14:25
 - 
15:05
Taming Threats: A symphony of two worlds – Paper trail meets threat trail
Queen Aigbefo & Ashley Wicks
View details
26/11/24
15:50
 - 
16:30
Ransomware attack scenario review
Chris Thomas
View details
27/11/24
15:50
 - 
16:30
Mature your detection capabilities - Evolve your SIEM and know your priorities
Mlaz Adlbi
View details
28/11/24
13:50
 - 
14:30
Cyber security meets Project Management: why cyber risk management is achievable through better collaboration between the cyber security team and project managers
Tony Vizza & Ian Chen
View details
28/11/24
13:50
 - 
14:30
Effective security detections: From intent to action
Aditya Patil
View details
28/11/24
14:40
 - 
15:20
SOC200 and Threat Hunting with Kali Purple
Malcolm Shore & Carsten Boeving
View details

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country