We provide cybersecurity training both in-person and remotely throughout Australia and New Zealand, including to organisations in Melbourne, Sydney, Canberra, Brisbane, Darwin, Perth, Hobart, Wellington, Christchurch and Auckland.
STIX, TAXII and CybOX are community-championed specifications for threat data sharing, promising to make sharing within and between organisations much easier.
Learn the fundamentals of establishing a CSIRT, the functions of a CSIRT, and how to operate a CSIRT efficiently.
Learn how to use open source tooling to automate the contextualisation and remediation of security threats in your environment.
This workshop will walk through the anatomy of an incident, from mapping incident stages to the ATT&CK tactics and techniques.
In this workshop we'll look at what information can be used to perform OSINT and some common tools that can be used to investigate information further.
There are many ways for a threat actor to maintain persistence in Windows systems. We'll take a look at some common persistence mechanisms, where to look and what can be done to detect them.
A comprehensive crash course on how to effectively use MISP for cyber threat intelligence. Cosive staff have served as MISP subject matter experts on major MISP projects including the CTIS initiative spearheaded by the ACSC.