26/11/24
10:45
-
11:25
Spoofing commands - Can you trust process creation logs?
26/11/24
11:35
-
12:15
Hiding in plain sight: How sub domain attacks use your email authentication against you
26/11/24
13:35
-
14:15
How NOT to run a security operation centre, a SOC manager’s perspective
26/11/24
14:25
-
15:05
Taming Threats: A symphony of two worlds – Paper trail meets threat trail
26/11/24
14:25
-
15:05
Measures and metrics: How to report on more than just the SOC
27/11/24
15:50
-
16:30
Mature your detection capabilities - Evolve your SIEM and know your priorities
28/11/24
13:50
-
14:30
Cyber security meets Project Management: why cyber risk management is achievable through better collaboration between the cyber security team and project managers