Payloads & Protocols: Amplify Your Arsenal with Hak5's Red Team Toolkit - BOOKED OUT
Darren Kitchen
21/05/2024 9:00 am
Tutorial – Day 1
Cyber Security Risk Management - BOOKED OUT
Gary Gaskell
Enhancing Cybersecurity Collaboration: MISP Integration and Scenario Simulations
Michael Hamm, Christian Studer
Plan and prepare your incident management framework, and pay it forward to yourself, colleagues, and customers - BOOKED OUT
JP Haywood
Social Engineering - Practical Red Teaming Lessons from the Field - BOOKED OUT
Chris Gatford, Jesse Keen
FFWD Machine Learning in Cybersecurity - BOOKED OUT
Geoff Thonon
Purple teaming an Azure Cloud Environment - BOOKED OUT
David Jorm, Sayasmito Ghosh
Security in an (Unmanaged) Azure Environment: A Practical Example
Greg Scheidel
21/05/2024 12:30 pm
Cont. Payloads & Protocols: Amplify Your Arsenal with Hak5's Red Team Toolkit - BOOKED OUT
21/05/2024 1:30 pm
Cont. Cyber Security Risk Management - BOOKED OUT
Cont. Enhancing Cybersecurity Collaboration: MISP Integration and Scenario Simulations
Cont. Plan and prepare your incident management framework, and pay it forward to yourself, colleagues, and customers - BOOKED OUT
Cont. Social Engineering - Practical Red Teaming Lessons from the Field - BOOKED OUT
Cont. FFWD Machine Learning in Cybersecurity - BOOKED OUT
Cont. Purple teaming an Azure Cloud Environment - BOOKED OUT
Sayasmito Ghosh, David Jorm
Cont. Security in an (Unmanaged) Azure Environment: A Practical Example
An Introduction to Wireless Security Assessment - BOOKED OUT
Edward Farrell
22/05/2024 9:00 am
Tutorial – Day 2
Securing cloud based identity: there is more than just MFA - BOOKED OUT
Kyle Jackson
MISP Teething, Tricks, Tips and Traps
Shanna Daly, David Zielezna
Tackling imposter syndrome: using psychology to disrupt (cognitive) malicious activity - BOOKED OUT
Shelly Mills, Helen Todd, Peter Degotardi
Running Discussion Exercises Using Exercise in a Box
Dr Mark Carey-Smith, Alex Webling
Cultivating a strong security mindset: A practical guide to Security Culture - BOOKED OUT
Kelsy Luengen
Creating an Information Security Standard - BOOKED OUT
Dr Georg Lippold
Securing Small businesses against cyber threats and risks - BOOKED OUT
Dirk Hodgson
22/05/2024 12:30 pm
Incident Response with Velociraptor - BOOKED OUT
Dr Michael Cohen
22/05/2024 1:30 pm
Cont. Securing cloud based identity: there is more than just MFA - BOOKED OUT
Cont. MISP Teething, Tricks, Tips and Traps
Crisis communications during a cybersecurity incident - BOOKED OUT
Anthony Caruana, Kathryn Goater
Cont. Running Discussion Exercises Using Exercise in a Box
Cont. Cultivating a strong security mindset: A practical guide to Security Culture - BOOKED OUT
Cont. Creating an Information Security Standard - BOOKED OUT
Opening Remarks
Adam Spencer
23/05/2024 9:00 am
Conference – Day 1
Welcome from Director and General Manager from AUSCERT
Ivano Bongiovanni, David Stockdale, Mike Holm
23/05/2024 9:20 am
Protecting Your Organisation Against the Dark Side of Generative AI
Matt Berry
23/05/2024 9:40 am
Live Risky Biz Podcast Recording
Patrick Gray, Adam Boileau
23/05/2024 10:00 am
23/05/2024 11:00 am
Modernising MISP: Applying Infrastructure as Code principles to your MISP (and other) services
Josh Hopkins
23/05/2024 11:25 am
Using Operational Technology Cyber Security Programs to Amplify your Impact
Bruce Large
The “Shiny” Factor: How to sell data governance in your organisation
Trinity McNicol
Free Loaders and Dirty Rats - How Malware Loaders and Remote Access Trojans work together to evade your defences and establish an unwanted presence inside your network
Peter Watson
As We Are Many
23/05/2024 12:10 pm
"OT/ICS and IT in Mining Industry: How bad network design can harm people and business"
Richard Magalad
How to run a successful cyber security tabletops program
Ella Donald, Shelly Mills
Unraveling Attack Chains: Strengthening Endpoint Defense Strategies
David Cottingham
23/05/2024 12:50 pm
CEnet amplifies impact: Automating AUSCERT notifications to pay forward insightful reports
Shannon Hartley
23/05/2024 1:35 pm
Top tips for securing your organisations AWS accounts - lessons from AWS CIRT
Richard Billington, Zohreh Norouzi
Data breach notification is a pain in the a**
David Rudduck, Benjamin Di Marco
The Evolution of AI/ML in the Security Operation Centre (SOC)
Corien Vermaak
The Identity Trilogy: Is this our greatest threat?
Brian Hay
23/05/2024 2:20 pm
Start dropping SBOMs: Gain visibility into the software supply chain
John Harrison
Deciphering Australia's Cyber Security Laws for a Safer Future
James Chadwick, Brenton Poynting
Demystifying MDR - How to achieve tangible cyber uplift, compliance, innovation and take command of your attack surface.
Soumi Mukherjee, Craig Ford
How is the Worlds First Co-Designed Indigenous security Operations Centre Paying it Forward?
Jack Reis, Pip Jenkinson, Jon Robertson
23/05/2024 3:05 pm
Assessing third-party cyber risk
Sergeja Slapnicar, Gary Gaskell
Generative AI: Minimising the privacy impacts of high-risk technologies
Leah Mooney, Veronica Scott
A Practical Approach to a Modern Security Strategy
Lee Roebig
23/05/2024 3:45 pm
Shadowserver: Out of the Shadows
Piotr Kijewski
23/05/2024 4:10 pm
The SOC of the Future is a True Real-Time Platform
Riccardo Galbiati, Brendan Kelly
23/05/2024 4:45 pm
Birds of a Feather sessions
23/05/2024 5:05 pm
Pre-dinner drinks - AUSCERT2024 Gala Dinner
23/05/2024 6:30 pm
24/05/2024 9:00 am
Conference – Day 2
Trust No I.O: Tales of Device Deception
24/05/2024 9:05 am
State of Security Report
David Meister
24/05/2024 9:40 am
How to tackle security tasks and workflows with generative AI
Ben Caisley
24/05/2024 9:50 am
24/05/2024 10:10 am
When it SIEMs like you're doing it all wrong…
Jess Dodson
24/05/2024 10:40 am
TetrisPhantom: A unique story of a long-running sophisticated attack campaign
Noushin Shabab
Invasion of the Body Snatchers: The Insidious Insider
Mazino Onibere
Mastering the Essential Eight Framework with a Platform Approach
Cornelius Mare
What we discovered the hard way about securing M365 (so you don't have to)
Sam Brazier-Hollins
24/05/2024 11:25 am
Active Defence: Building Adversarial Countermeasures in Modern Organisations
Diego Perez
Privacy Pioneers: A blueprint for security professionals to kickstart a privacy program
Navigating Zero Trust Adoption: Insights from Real-World Experiences
Johnny Yeo
On-Prem Ain’t Dead: A Deep-Dive into Modern Active Directory Security Techniques
James Spencer, Andrew Fitzgerald
24/05/2024 12:10 pm
APT x Ransomware x Cybercrime: When Threat Actors are using CTI to Do Their Attacks
Linda Kuo
Hidden Traps: How to make sound cyber decisions amid chaos in IR
Kylie Watson
The Art of Cyber-War: Rules of Machine Speed Engagement
Wayne Phillips
24/05/2024 12:50 pm
Mastering the art of Attacking and Defending a Kubernetes Cluster
Sanjeev Mahajan
24/05/2024 1:50 pm
Incident Response War Stories
Jarrod Loidl, Alistair Longley
The Cyber Health Check Program to elevate SMEs (Panel)
James Chadwick, Salome Bowman, Daniel Johns, Ivano Bongiovanni, Elliot Larard
From Passwords to Password[less] – a case for passkeys in a new GenAI world
Lloyd Evans
Advances in detection engineering
24/05/2024 2:35 pm
Post-Contact: What changes after a security incident
Tim Peel
Governance, Guardians and Gamification - A real life journey to amplifying Cyber Security and influencing all parts of the organisation to own and manage their Cyber Risk
Callum Nelson
-
24/05/2024 3:15 pm
Speed Debate
24/05/2024 3:45 pm
Closing Remarks
24/05/2024 4:30 pm