This is unique course designed for IT Professionals. Its purpose is to provide practical technical guidance to those responsible for managing the IT environment of an organisation. It focuses on the techniques, approaches and solutions that help mitigate attacks in the growing sophistication of the threat landscape.

This course looks at the current threat environment before sharing trusted strategic approaches that will combat those threats.

Based on the highly regarded “CIS Controls”, this session provides a foundational cyber strategy that is layered with time-proven approaches such as “Least Privilege” and “Defence-in-Depth”. It also discusses practical approaches to the more recent security model of “Zero Trust”.

The content of this course is both practical and technical but is not structured like most other IT training—there are no labs to complete.

A key aim of this workshop is to provide a safe space for attendees to discuss challenging issues of their own environment, and to share their experiences in managing them.

The aim is that all attendees leave the day not only empowered with a clear cyber strategy for their environment, but one that also provides detailed governance reporting to their senior management or Board.

This face-to-face session starts at 9am and is catered for morning tea and lunch. It aims to conclude around 4pm.

Topics covered include:

  •        The Cyber Kill Chain and MITRE ATT@CK Framework—structured approaches to assessing attack risks and securing an environment.
  •        The CIS Controls v8.1, benchmarks & tools.
  •        Vulnerability management - dealing with the 30K patches released annually.
  •        Threat awareness, assessment & management – effective use of EDR/XDR, MDR, SIEMs.
  •        Test methods & tools for unknown URLs and files using sandboxes and VT.
  •        Creating cyber playbooks and Incident Response planning
  •        System configuration changes you can make to dramatically reduce the risk of malware entering your environment.
  •        Deploying AI securely. AI attacks - managing issues and risks.
  •        Ransomware, Social Engineering, phish-resistant MFA, and the latest password best-practices.
  •        Cloud security, incl. Conditional Access & SAML/SSO risks.
  •        The Essential Eight Maturity Levels; touching on DISP.
  •        Securing OT (operational technology) & ICS (such as used in automated physical/manufacturing processes).
  •        The full PowerPoint slide deck will be provided to attendees after the session. It includes an extensive list of key resources on the topic areas covered.

 

 

  • Date and time

    Fri, 28 Mar 2025
    09:00 AM - 04:30 PM

  • Location
    Ai Group, Melbourne
  • Cost

    Members: $495.00

    Non-Members: $550.00

Login to Register

Other Sessions for this Event