The Good, The Glam and The Guidance

Glamour shots, fresh t-shirts, a Melbourne meetup, and (of course) Matt’s unsolicited advice.

Starting off strong with some recent shots of our Chief Floof Officer Volk

Skynet, Quantum Future & Fast Furious Lessons - Melbourne Preso Day

Matt and Alexei have been running Preso Days long before Volkis was a twinkle in their eyes. We often bring in guests from across the security industry - and just like fight club, if it’s your first time attending, you have to present! Here is a recap:

  • Andy | Skynet is Coming - A look at AI and AI Security and how real-world AI systems work, where they’re vulnerable, and how attackers are already beginning to exploit them. 🖊

  • Alexei | Does everyone phish like me? - An example of a recent Campaign and a discussion of different approaches.

  • Michael | Why Automation Matters for Red teams Penetration testing

  • Thomas | Family over Friction - How the greatest movie franchise to exist (Fast and the Furious of course) can influence and teach lessons about cyber security and the industry a quarter mile at a time.

  • Nathan | The concerning use of AI in Cyber Security training - With AI being introduced into training platforms everywhere, a question has been raised as to whether it will train better professionals... or just to save money for the trainer at the students expense.

  • David | Quantum What Now? - A speech by Frank-Er, a Frank Reynolds-Inspired guide to quantum computing.

The team shots + Josh showcasing how to dominate cameras as well as computers

Unsolicited advice from our Managing Director

Matthew Strahan

If you're good enough at detecting attacks, you might just be able to stop them before they cause you harm. How do you make sure you can detect attacks when they occur?

Unfortunately the holes in your detection are something you might never find out about. If your detection systems don't work, you simply don't hear anything. It's impossible to tell the difference between not having detection set up properly and your system just not yet being under attack.

The best (maybe even only?) way to tell whether your detection is working properly is to test it. In my mind, the best way you can do that is to take advantage of the pentesting you're probably already doing. If you're getting a pentest (and, if you're reading our newsletter, that's something you're probably doing already) then you should be actively trying to listen in and see if you can tell what the tester is doing. Ask questions, look at your screens, and see if you can keep track. If not, what can you do to detect these attacks?

We also formalise this as well with our Detection Alert Testing where we go through with you, one by one, a lot of the attacks that you might face. You can then make sure each attack is detected by your systems and find out where your gaps are.

Special mention to Lycan who packed up over 100 of the new Volkis T-shirts to send out to the fans!

If you missed our socials:

Thanks again for making it this far!

Matt, Alexei & the Volkis team 🐺