Payloads & Protocols: Amplify Your Arsenal with Hak5's Red Team Toolkit - BOOKED OUT
Darren Kitchen
21/05/2024 9:00 am
Tutorial – Day 1
Cyber Security Risk Management - BOOKED OUT
Gary Gaskell
Enhancing Cybersecurity Collaboration: MISP Integration and Scenario Simulations - BOOKED OUT
Michael Hamm, Christian Studer
Plan and prepare your incident management framework, and pay it forward to yourself, colleagues, and customers - BOOKED OUT
JP Haywood
Social Engineering - Practical Red Teaming Lessons from the Field - BOOKED OUT
Chris Gatford, Jesse Keen
FFWD Machine Learning in Cybersecurity - BOOKED OUT
Geoff Thonon
Purple teaming an Azure Cloud Environment - BOOKED OUT
David Jorm, Sayasmito Ghosh
Security in an (Unmanaged) Azure Environment: A Practical Example
Greg Scheidel
21/05/2024 12:30 pm
Cont. Payloads & Protocols: Amplify Your Arsenal with Hak5's Red Team Toolkit - BOOKED OUT
21/05/2024 1:30 pm
Cont. Cyber Security Risk Management - BOOKED OUT
Cont. Enhancing Cybersecurity Collaboration: MISP Integration and Scenario Simulations - BOOKED OUT
Cont. Plan and prepare your incident management framework, and pay it forward to yourself, colleagues, and customers - BOOKED OUT
Cont. Social Engineering - Practical Red Teaming Lessons from the Field - BOOKED OUT
Cont. FFWD Machine Learning in Cybersecurity - BOOKED OUT
Cont. Purple teaming an Azure Cloud Environment - BOOKED OUT
Sayasmito Ghosh, David Jorm
Cont. Security in an (Unmanaged) Azure Environment: A Practical Example
An Introduction to Wireless Security Assessment - BOOKED OUT
Edward Farrell
22/05/2024 9:00 am
Tutorial – Day 2
Securing cloud based identity: there is more than just MFA - BOOKED OUT
Kyle Jackson
MISP Teething, Tricks, Tips and Traps
Shanna Daly, David Zielezna
Tackling imposter syndrome: using psychology to disrupt (cognitive) malicious activity - BOOKED OUT
Shelly Mills, Helen Todd, Peter Degotardi
Running Discussion Exercises Using Exercise in a Box
Dr Mark Carey-Smith, Alex Webling
Cultivating a strong security mindset: A practical guide to Security Culture - BOOKED OUT
Kelsy Luengen
Creating an Information Security Standard - BOOKED OUT
Dr Georg Lippold
Securing Small businesses against cyber threats and risks -
Dirk Hodgson
22/05/2024 12:30 pm
Incident Response with Velociraptor - BOOKED OUT
Dr Michael Cohen
22/05/2024 1:30 pm
Cont. Securing cloud based identity: there is more than just MFA - BOOKED OUT
Cont. MISP Teething, Tricks, Tips and Traps
Crisis communications during a cybersecurity incident - BOOKED OUT
Anthony Caruana, Kathryn Goater
Cont. Running Discussion Exercises Using Exercise in a Box
Cont. Cultivating a strong security mindset: A practical guide to Security Culture - BOOKED OUT
Cont. Creating an Information Security Standard - BOOKED OUT
Opening Remarks
Adam Spencer
23/05/2024 8:45 am
Conference – Day 1
Thursday Morning Keynote
23/05/2024 9:05 am
Protecting Your Organisation Against the Dark Side of Generative AI
Matt Berry
23/05/2024 9:40 am
Live Risky Biz Podcast Recording
23/05/2024 10:00 am
23/05/2024 11:00 am
Modernising MISP: Applying Infrastructure as Code principles to your MISP (and other) services
Josh Hopkins
23/05/2024 11:25 am
Using Operational Technology Cyber Security Programs to Amplify your Impact
Bruce Large
The “Shiny” Factor: How to sell data governance in your organisation
Trinity McNicol
Free Loaders and Dirty Rats - How Malware Loaders and Remote Access Trojans work together to evade your defences and establish an unwanted presence inside your network
Peter Watson
As We Are Many
23/05/2024 12:10 pm
"OT/ICS and IT in Mining Industry: How bad network design can harm people and business"
Richard Magalad
How to run a successful cyber security tabletops program
Ella Donald, Shelly Mills
Airlock Digital
23/05/2024 12:50 pm
CEnet amplifies impact: Automating AUSCERT notifications to pay forward insightful reports
Shannon Hartley
23/05/2024 1:35 pm
Top tips for securing your organisations AWS accounts - lessons from AWS CIRT
Richard Billington, Zohreh Norouzi
Data breach notification is a pain in the a**
David Rudduck
CISCO
The Identity Trilogy: Is this our greatest threat?
Brian Hay
23/05/2024 2:20 pm
Start dropping SBOMs: Gain visibility into the software supply chain
John Harrison
Deciphering Australia's Cyber Security Laws for a Safer Future
James Chadwick, Brenton Poynting
Demystifying MDR - How to achieve tangible cyber uplift, compliance, innovation and take command of your attack surface.
Soumi Mukherjee, Craig Ford
How is the Worlds First Co-Designed Indigenous security Operations Centre Paying it Forward?
Jack Reis, Pip Jenkinson
23/05/2024 3:05 pm
Assessing third-party cyber risk
Sergeja Slapnicar, Gary Gaskell
Generative AI: Minimising the privacy impacts of high-risk technologies
Leah Mooney, Veronica Scott
Sekuro
23/05/2024 3:45 pm
Shadowserver: Out of the Shadows
Piotr Kijewski
23/05/2024 4:10 pm
The SOC of the Future is a True Real-Time Platform
Riccardo Galbiati
23/05/2024 4:45 pm
Birds of a Feather sessions
23/05/2024 5:05 pm
Pre-dinner drinks - AUSCERT2024 Gala Dinner
23/05/2024 6:30 pm
24/05/2024 9:00 am
Conference – Day 2
Trust No I.O: Tales of Device Deception
24/05/2024 9:05 am
QLD Government Cyber Plenary
24/05/2024 9:40 am
Virus Total Plenary
24/05/2024 10:00 am
24/05/2024 10:20 am
When it SIEMs like you're doing it all wrong…
Jess Dodson
24/05/2024 10:45 am
TetrisPhantom: A unique story of a long-running sophisticated attack campaign
Noushin Shabab
Invasion of the Body Snatchers: The Insidious Insider
Mazino Onibere
Mastering the Essential Eight Framework with a Platform Approach
Cornelius Mare
What we discovered the hard way about securing M365 (so you don't have to)
Sam Brazier-Hollins
24/05/2024 11:30 am
Active Defence: Building Adversarial Countermeasures in Modern Organisations
Diego Perez
Privacy Pioneers: A blueprint for security professionals to kickstart a privacy program
Zscaler
On-Prem Ain’t Dead: A Deep-Dive into Modern Active Directory Security Techniques
James Spencer, Andrew Fitzgerald
24/05/2024 12:15 pm
APT x Ransomware x Cybercrime: When Threat Actors are using CTI to Do Their Attacks
Linda Kuo
Hidden Traps: How to make sound cyber decisions amid chaos in IR
Kylie Watson
SentinalOne
24/05/2024 12:55 pm
Mastering the art of Attacking and Defending a Kubernetes Cluster
Sanjeev Mahajan
24/05/2024 1:55 pm
Incident Response War Stories
Jarrod Loidl, Alistair Longley
The Cyber Health Check Program to elevate SMEs (Panel)
James Chadwick, Salome Bowman, Daniel Johns
LastPass
Advances in detection engineering
24/05/2024 2:40 pm
Post-Contact: What changes after a security incident
Brett Winterford
Governance, Guardians and Gamification - A real life journey to amplifying Cyber Security and influencing all parts of the organisation to own and manage their Cyber Risk
Callum Nelson
Anomali
24/05/2024 3:20 pm
Speed Debate
24/05/2024 3:45 pm
Closing Remarks
24/05/2024 4:30 pm