Payloads & Protocols: Amplify Your Arsenal with Hak5's Red Team Toolkit
Darren Kitchen
21/05/2024 9:00 am
Tutorial – Day 1
Cyber Security Risk Management
Gary Gaskell
Enhancing Cybersecurity Collaboration: MISP Integration and Scenario Simulations
Michael Hamm, Christian Studer
Plan and prepare your incident management framework, and pay it forward to yourself, colleagues, and customers
JP Haywood
Social Engineering - Practical Red Teaming Lessons from the Field
Chris Gatford, Jesse Keen
FFWD Machine Learning in Cybersecurity
Geoff Thonon
Purple teaming an Azure Cloud Environment
David Jorm, Sayasmito Ghosh
21/05/2024 12:30 pm
Cont. Payloads & Protocols: Amplify Your Arsenal with Hak5's Red Team Toolkit
21/05/2024 1:30 pm
Cont. Cyber Security Risk Management
Cont. Enhancing Cybersecurity Collaboration: MISP Integration and Scenario Simulations
Cont. Plan and prepare your incident management framework, and pay it forward to yourself, colleagues, and customers
Cont. Social Engineering - Practical Red Teaming Lessons from the Field
Cont. FFWD Machine Learning in Cybersecurity
Cont. Purple teaming an Azure Cloud Environment
Sayasmito Ghosh, David Jorm
An intro to wireless security assessment
Edward Farrell
22/05/2024 9:00 am
Tutorial – Day 2
Securing cloud based identity: there is more than just MFA
Kyle Jackson
MISP Teething, Tricks, Tips and Traps
Shanna Daly, David Zielezna
Tackling imposter syndrome: using psychology to disrupt (cognitive) malicious activity
Shelly Mills, Helen Todd, Peter Degotardi
Running Discussion Exercises Using Exercise in a Box
Dr Mark Carey-Smith, Alex Webling
Cultivating a strong security mindset: A practical guide to Security Culture
Kelsy Luengen
Creating an Information Security Standard
Dr Georg Lippold
Securing Small businesses against cyber threats and risks
Dirk Hodgson
22/05/2024 12:30 pm
Incident Response with Velociraptor
Dr Michael Cohen
22/05/2024 1:30 pm
Cont. Securing cloud based identity: there is more than just MFA
Cont. MISP Teething, Tricks, Tips and Traps
Crisis communications during a cybersecurity incident
Anthony Caruana, Kathryn Goater
Cont. Running Discussion Exercises Using Exercise in a Box
Cont. Cultivating a strong security mindset: A practical guide to Security Culture
Cont. Creating an Information Security Standard
Opening Remarks
Adam Spencer
23/05/2024 8:45 am
Conference – Day 1
Thursday Morning Keynote
23/05/2024 9:05 am
Abnormal Security Plenary
23/05/2024 9:40 am
Live Risky Biz Podcast Recording
23/05/2024 10:00 am
23/05/2024 11:00 am
Modernising MISP: Applying Infrastructure as Code principles to your MISP (and other) services
Josh Hopkins
23/05/2024 11:25 am
Using Operational Technology Cyber Security Programs to Amplify your Impact
Bruce Large
The “Shiny” Factor: How to sell data governance in your organisation
Trinity McNicol
Recorded Future
As We Are Many
23/05/2024 12:10 pm
"OT/ICS and IT in Mining Industry: How bad network design can harm people and business"
Richard Magalad
How to run a successful cyber security tabletops program
Ella Donald, Shelly Mills
Airlock Digital
23/05/2024 12:50 pm
CEnet amplifies impact: Automating AUSCERT notifications to pay forward insightful reports
Shannon Hartley
23/05/2024 1:35 pm
Top tips for securing your organisations AWS accounts - lessons from AWS CIRT
Richard Billington, Zohreh Norouzi
Data breach notification is a pain in the a**
David Rudduck
CISCO
The Identity Trilogy: Is this our greatest threat?
Brian Hay
23/05/2024 2:20 pm
Start dropping SBOMs: Gain visibility into the software supply chain
John Harrison
Deciphering Australia's Cyber Security Laws for a Safer Future
James Chadwick, Brenton Poynting
Rapid7
How is the Worlds First Co-Designed Indigenous security Operations Centre Paying it Forward?
Jack Reis, Pip Jenkinson
23/05/2024 3:05 pm
Assessing third-party cyber risk
Sergeja Slapnicar, Gary Gaskell
Generative AI: Minimising the privacy impacts of high-risk technologies
Leah Mooney, Veronica Scott
Securo
23/05/2024 3:45 pm
Piotr Kijewski - Shadowserver
Piotr Kijewski
23/05/2024 4:10 pm
Palo Alto Plenary
23/05/2024 4:45 pm
Birds of a Feather sessions
23/05/2024 5:05 pm
Pre-dinner drinks - AUSCERT2024 Gala Dinner
23/05/2024 6:30 pm
24/05/2024 9:00 am
Conference – Day 2
Friday Morning Keynote
24/05/2024 9:05 am
QLD Government Cyber Plenary
24/05/2024 9:40 am
Virus Total Plenary
24/05/2024 10:00 am
24/05/2024 10:20 am
When it SIEMs like you're doing it all wrong…
Jess Dodson
24/05/2024 10:45 am
TetrisPhantom: A unique story of a long-running sophisticated attack campaign
Noushin Shabab
Invasion of the Body Snatchers: The Insidious Insider
Mazino Onibere
Fortinet
What we discovered the hard way about securing M365 (so you don't have to)
Sam Brazier-Hollins
24/05/2024 11:30 am
Active Defence: Building Adversarial Countermeasures in Modern Organisations
Diego Perez
Privacy Pioneers: A blueprint for security professionals to kickstart a privacy program
Zscaler
On-Prem Ain’t Dead: A Deep-Dive into Modern Active Directory Security Techniques
James Spencer, Andrew Fitzgerald
24/05/2024 12:15 pm
APT x Ransomware x Cybercrime: When Threat Actors are using CTI to Do Their Attacks
Linda Kuo
Hidden Traps: How to make sound cyber decisions amid chaos in IR
Kylie Watson
SentinalOne
24/05/2024 12:55 pm
Mastering the art of Attacking and Defending a Kubernetes Cluster
Sanjeev Mahajan
24/05/2024 1:55 pm
Incident Response War Stories
Jarrod Loidl, Alistair Longley
The Cyber Health Check Program to elevate SMEs (Panel)
James Chadwick, Salome Bowman, Daniel Johns
LastPass
Advances in detection engineering
24/05/2024 2:40 pm
Post-Contact: What changes after a security incident
Brett Winterford
Governance, Guardians and Gamification - A real life journey to amplifying Cyber Security and influencing all parts of the organisation to own and manage their Cyber Risk
Callum Nelson
Anomali
24/05/2024 3:20 pm
Speed Debate
24/05/2024 3:45 pm
Closing Remarks
24/05/2024 4:30 pm