Sessions

26/3/2024
11:50
 - 
12:30
6 things your SOC must be doing to better defend against complex Cyber Attacks
James Oram
View details
26/3/2024
12:35
 - 
13:15
Unveiling zero days: An in-depth exploration of post-initial access detections
Ash Smith
View details
26/3/2024
14:00
 - 
14:40
Security made CVEasy: Countering common vulnerabilities and exploits attacking Australian organisations
Rohit Murali
View details
26/3/2024
14:00
 - 
14:40
Do I really need to supplement email security in Microsoft 365?
Bradley Anstis
View details
26/3/2024
14:45
 - 
15:25
Hunter or the hunted
Steve Molloy & Jamal Boutkabout
View details
27/3/2024
10:20
 - 
11:00
View details
27/3/2024
11:30
 - 
12:10
When the playbook will not help you: Managing a security incident with no visibility or control
David Willett
View details
27/3/2024
11:30
 - 
12:10
Inside Out: Understanding insider threats through digital forensics investigation
Luke Bradley
View details
27/3/2024
12:15
 - 
12:55
Practical guide to Implementing XDR and what it could do for your company
Bradley Anstis
View details
27/3/2024
13:55
 - 
14:35
Threat hunting with Malcolm
Dr Malcolm Shore & Carsten Boeving
View details
27/3/2024
14:40
 - 
15:20
I have three viruses and no analysts... Why can't I have no viruses and three analysts: Simplified malware analysis for Incident Response teams
Lewis Ingram
View details

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country