Sessions

26/3/2024
11:05
 - 
11:45
Processing threat reports at scale using AI and ML: Expectations and reality
Yury Sergeev
View details
26/3/2024
11:50
 - 
12:30
Putin, Hamas, Hezbollah: How current kynetic conflicts play out in cyber space
Jana Dekanovska
View details
26/3/2024
12:35
 - 
13:15
Hacktivism - the misunderstood threat
Davyn Baumann
View details
26/3/2024
14:00
 - 
14:40
Navigating the cyber frontier: Mastering cyber threat intelligence management in business
Nick Baragar & Alexander Gould
View details
26/3/2024
14:45
 - 
15:25
From STIX to MISP and back again: how hard could it be?
Chris Horsley
View details
27/3/2024
10:20
 - 
11:00
Account takeovers, fraudsters, booters, scrapers and how to find them
Adam Cassar & Daniel D'Alessandro
View details
27/3/2024
11:30
 - 
12:10
Steps to building a holistic perimeter defence strategy for IT and OT networks
Yiyi Miao
View details
27/3/2024
12:15
 - 
12:55
AI-powered network security monitoring
Dale Bowie
View details
27/3/2024
13:55
 - 
14:35
Jinxed! How attackers are creating bad luck for MFA
Liam Dermody
View details
27/3/2024
14:40
 - 
15:20
How do you hear the alerts that don't go off?
Matthew Strahan
View details

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country