Sessions

26/11/24
10:45
 - 
11:25
Supercharge threat hunting teams for enhanced detection
Claire Carpenter
View details
26/11/24
11:35
 - 
12:15
Cyber Threat Intelligence is a "nice to have" – Wrong, it's a "must have"!
Matt Hull
View details
26/11/24
13:35
 - 
14:15
Beyond detection: Transforming threat intelligence into actionable attack surface reduction
Loris Minassian
View details
26/11/24
14:25
 - 
15:05
Unlocking the power of threat intelligence infused detections in the SOC
Ray Huang
View details
27/11/24
10:30
 - 
11:10
Game-on (Part 2): 16-bit Adventures of a Security Analyst
Jai Minton
View details
27/11/24
11:20
 - 
12:00
Creating cyber threat intelligence like a journalist
Chris Horsley
View details
27/11/24
11:20
 - 
12:00
Teaching the intelligence bits of CTI
Brendon Hawkins
View details
27/11/24
14:20
 - 
15:00
The enemy is within the gates – Recent lessons from internal threat incident response investigations
Peter Chapman
View details
27/11/24
15:50
 - 
16:30
Unmasking the scattered spider: A deep dive into the tactics and techniques of a notorious hacking group
Shiraz Chegini
View details
28/11/24
11:05
 - 
11:45
State-sponsored cyber operations: understanding global risks and implications for Australia
Jana Dekanovska
View details
28/11/24
13:00
 - 
13:40
Harnessing strategic, operational and tactical threat intelligence for a more robust security posture
Ian Francis Usher
View details
28/11/24
14:40
 - 
15:20
Adaptive threat intelligence: Predicting the unpredictable
Alexander Gould & Monika Tarnavetchi
View details

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country