Running Discussion Exercises with EiaB
Dr Mark Carey-Smith, Alex Webling
20/05/2025 9:00 am
Tutorial – Day 1
Evolve and Thrive with M365: Enhancing Security for Tomorrow
Mark Laffan, Daniel Silver
Using Kubernetes to evolve your infrastructure and deprive attackers
Colby Prior, Kyle Jackson
Cultivating a strong security mindset: A practical guide to Security Culture
Kelsy Luengen
Social Engineering - Practical Red Teaming Lessons From The Field.
Chris Gatford
Using cyber data to improve operations and calculate cyber risk
Hinne Hettema
What InfoSec Leaders Need to Know about Cyber Laws, Losses and Insurance
Benjamin Di Marco, Leah Mooney
Generative AI Security: Secure Generative AI Solutions using OWASP Framework
Matthew Gurr, Richard Billington
20/05/2025 12:30 pm
Cont. Running Discussion Exercises with EiaB
20/05/2025 1:30 pm
To be announced
Cont. Using Kubernetes to evolve your infrastructure and deprive attackers
Beyond Compliance: Building a Strong Cyber Security Culture
Claire Wilson, Rachel Mansson
Cont. Social Engineering - Practical Red Teaming Lessons From The Field.
Cont. Using cyber data to improve operations and calculate cyber risk
Building a Threat-Informed Security Framework: A Practical Approach to Aligning Security Controls with Real-World Threats
Niru Verma, Chris Hows
How to CISO
Grant Lockwood
Hands on Cyber Security Architecture Workshop using the SABSA Framework
Bruce Large
21/05/2025 9:00 am
Tutorial – Day 2
ISO27001 & ISO42001 Implementation for both Small Companies and Large Organisations. [Information Security and AI Management Systems and Compliance - ISO/IEC 27001 & ISO/IEC 42001]
Dan Goldberg
Risky Evolution - understanding what may bite you with an infosec & privacy focused risk framework
Simon Stahn
Detection Engineering in Incident Response
Dr Michael Cohen
MISP Kickstart: get up and running with MISP and cyber threat intelligence
Chris Horsley, James Garrett
Transform Your Network Visibility on a Budget: Enhance and Aggregate Logging for Pre and Post-Breach Success
Conor Naughton
Red Teaming the Software Supply Chain
Paul McCarty
Security Operations-ThreatOps
Brett Williams, Rob Collins
Evolve Threat Detection and Incident Response in the Cloud
Zohreh Norouzi, Richard Billington
21/05/2025 12:30 pm
Cont. Hands on Cyber Security Architecture Workshop using the SABSA Framework
21/05/2025 1:30 pm
Battle Tested - Cyber Risk Quantification.
Jason Ha, Leonard Barker
Practical Guide: Managing Supplier and Subcontractor Risks A Step-by-Step Implementation Tutorial
Asrar Ismail
Developing a continuous security detection testing and deployment pipeline with AWS and Splunk
Matthew Gurr, James Young
Cont. MISP Kickstart: get up and running with MISP and cyber threat intelligence
Cont. Transform Your Network Visibility on a Budget: Enhance and Aggregate Logging for Pre and Post-Breach Success
Cont. Red Teaming the Software Supply Chain
Protecting Web Apps & API - Capture The Flag
Richard Bible
Lego Serious Play for Cyber
Vannessa Van Beek
Opening Remarks
Adam Spencer
22/05/2025 9:00 am
Conference – Day 1
Thursday Morning Keynote
22/05/2025 9:20 am
Thursday Morning Plenary
22/05/2025 10:00 am
22/05/2025 10:20 am
Session
22/05/2025 10:50 am
22/05/2025 11:35 am
22/05/2025 12:15 pm
22/05/2025 1:15 pm
22/05/2025 2:00 pm
22/05/2025 2:45 pm
Thursday afternoon Keynote
22/05/2025 3:25 pm
22/05/2025 3:55 pm
22/05/2025 4:30 pm
Birds of a Feather sessions
22/05/2025 5:00 pm
Pre-dinner drinks - AUSCERT2024 Gala Dinner
22/05/2025 6:30 pm
23/05/2025 9:00 am
Conference – Day 2
Friday Morning Keynote
23/05/2025 9:05 am
23/05/2025 9:45 am
23/05/2025 10:05 am
23/05/2025 10:45 am
23/05/2025 11:20 am
23/05/2025 12:05 pm
On-Prem Ain’t Dead: A Deep-Dive into Modern Active Directory Security Techniques
23/05/2025 12:45 pm
APT x Ransomware x Cybercrime: When Threat Actors are using CTI to Do Their Attacks
Hidden Traps: How to make sound cyber decisions amid chaos in IR
SentinalOne
23/05/2025 1:45 pm
23/05/2025 2:30 pm
Speed Debate
23/05/2025 3:10 pm
23/05/2025 3:45 pm
Closing Remarks
23/05/2025 4:30 pm