Cyber BlueCon Meetup#0x0D


Details
BlueCon#0x0D – Event Details
A Cyber Security event for the community, by the community. Join us on Thursday, 19th June 2025 at Stone & Chalk Melbourne for the June Cyber Blue Team Meetup! Follow us on LinkedIn: https://www.linkedin.com/company/cyber-bluecon. This meetup features a technical talk and hands-on workshop led by experienced industry professionals, with opportunities to connect and network with the broader cyber community.
📅 Event Info
- Date: Thursday, 19th June 2025
- Time: 5:30 PM – 7:30 PM AEST
- Location: Stone & Chalk Melbourne – 121 King Street
- Cost: Free (registration essential)
- Catering: Food and drinks provided
💻 What to Bring
- A laptop with internet browser and access to a sandbox or VM (recommended)
- Tools such as CyberChef, VirusTotal, and a capable email client for analysis (Thunderbird)
🌍 International Livestream Locations
- Accra, Ghana: 8:00–10:00 AM GMT
- Lagos & Abuja, Nigeria: 9:00–11:00 AM WAT
Registration Links:
Australia: Melb -In person
https://www.eventbrite.com/e/1396202943589?aff=oddtdtcreator
Ghana: Accra - Live Stream
**https://www.eventbrite.com/e/1396203675779?aff=oddtdtcreator**
Nigeria: Lagos/Abuja - Live Stream
**https://www.eventbrite.com/e/1396203475179?aff=oddtdtcreator**
***
## BlueCon#0x0D
Talk Title: P1s, Rabbit Holes & Real-World Blues: Analyst Dilemmas in Modern Cybersecurity
Speaker: Robin Poudel – Security Engineer, Cythera
📝 Presentation Overview: Robin shares real-world insights and reflections from his journey transitioning into a cyber defence roles as first an Analyst and then an Engineer. He’ll walk us through some of the dilemmas, escalation decisions, and investigative rabbit holes modern analysts face — especially in high-pressure environments where alerts become P1s in seconds. You’ll gain visibility into what “the deep end” really looks like in today’s SOCs and how to stay resilient while navigating it.
🛠️ Workshop: Practical Phishing Email Analysis & Threat Hunting
Facilitator: CyberLynk Team
🔍 Workshop Description:
Phishing continues to be the leading cause of initial access in major breaches — accounting for over 75% of intrusion pathways globally. In this hands-on workshop, the CyberLynk team will demonstrate how attackers leverage phishing infrastructure and malware-laced payloads to bypass traditional controls.
Together, we will:
- Deconstruct malicious phishing emails
- Analyse headers, embedded links, and attachments
- Use dynamic tools to safely test payloads
- Map attacker techniques to MITRE ATT&CK (Initial Access + Credential Access)
✅ Workshop Objectives
- Understand common phishing TTPs (Tactics, Techniques & Procedures)
- Manually analyse and validate malicious indicators
- Perform dynamic email threat analysis in a controlled lab
- Learn tooling and scripting to build repeatable phishing detection workflows
🎓 Learning Outcomes Attendees will leave with the skills to:
- Analyse phishing attempts with precision
- Identify and extract indicators of compromise
- Apply threat intel to enrich and validate findings
- Build their own phishing response SOP (Standard Operating Procedure)
🏆 Prizes Participants can win:
- Sponsor giveaways
- CyberLynk training discounts or lab access
- Recognition for top phishing analysis
Interested in submitting an application to speak at future BlueCon events? You can apply here. Interested in volunteering? Let us know at the event.
#BlueCon #CyberSecurity #BlueTeam #Phishing #ThreatHunting #AttackInformedDefence #CommunityFirst


Cyber BlueCon Meetup#0x0D