
What we’re about
Welcome to BlueCon – Your Hub for Cybersecurity Exploration and Growth!
BlueCon is a vibrant community designed for newcomers, seasoned professionals, and leaders in cybersecurity. We aim to create an inclusive space where individuals at all levels of expertise can come together to learn, collaborate, and grow.
Our focus areas include:
- Challenging Ideas and Expanding Knowledge
We foster an open environment where you can question norms, share innovative ideas, and explore the evolving world of cybersecurity with peers who are equally passionate. - Hands-On Workshops
Every BlueCon event features not just insightful presentations but also practical workshops with technical training. These sessions ensure that attendees leave with actionable skills and knowledge they can apply immediately. - Embracing Failures as Learning Opportunities
At BlueCon, we champion failures as invaluable learning moments. Through open discussions, we uncover the lessons hidden in challenges—and who knows, someone in the room may have the solution you need to overcome your toughest hurdles.
Whether you're starting your journey in cybersecurity, seeking to sharpen your technical expertise, or looking to lead with innovation, BlueCon is the community for you. Join us to connect, learn, and shape the future of cybersecurity!
Core Topics: - Cyber Defence - Offensive Security - Governance Risk & Compliance (GRC)
Upcoming events (1)
See all- Cyber BlueCon Meetup#0x0DStone and Chalk Melbourne Hub, Melbourne
BlueCon#0x0D – Event Details
A Cyber Security event for the community, by the community. Join us on Thursday, 19th June 2025 at Stone & Chalk Melbourne for the June Cyber Blue Team Meetup! Follow us on LinkedIn: https://www.linkedin.com/company/cyber-bluecon. This meetup features a technical talk and hands-on workshop led by experienced industry professionals, with opportunities to connect and network with the broader cyber community.
📅 Event Info- Date: Thursday, 19th June 2025
- Time: 5:30 PM – 7:30 PM AEST
- Location: Stone & Chalk Melbourne – 121 King Street
- Cost: Free (registration essential)
- Catering: Food and drinks provided
💻 What to Bring
- A laptop with internet browser and access to a sandbox or VM (recommended)
- Tools such as CyberChef, VirusTotal, and a capable email client for analysis (Thunderbird)
🌍 International Livestream Locations
- Accra, Ghana: 8:00–10:00 AM GMT
- Lagos & Abuja, Nigeria: 9:00–11:00 AM WAT
Registration Links:
Australia: Melb -In person
https://www.eventbrite.com/e/1396202943589?aff=oddtdtcreatorGhana: Accra - Live Stream
https://www.eventbrite.com/e/1396203675779?aff=oddtdtcreatorNigeria: Lagos/Abuja - Live Stream
https://www.eventbrite.com/e/1396203475179?aff=oddtdtcreator***
## BlueCon#0x0D
Talk Title: P1s, Rabbit Holes & Real-World Blues: Analyst Dilemmas in Modern Cybersecurity
Speaker: Robin Poudel – Security Engineer, Cythera
📝 Presentation Overview: Robin shares real-world insights and reflections from his journey transitioning into a cyber defence roles as first an Analyst and then an Engineer. He’ll walk us through some of the dilemmas, escalation decisions, and investigative rabbit holes modern analysts face — especially in high-pressure environments where alerts become P1s in seconds. You’ll gain visibility into what “the deep end” really looks like in today’s SOCs and how to stay resilient while navigating it.🛠️ Workshop: Practical Phishing Email Analysis & Threat Hunting
Facilitator: CyberLynk Team
🔍 Workshop Description:
Phishing continues to be the leading cause of initial access in major breaches — accounting for over 75% of intrusion pathways globally. In this hands-on workshop, the CyberLynk team will demonstrate how attackers leverage phishing infrastructure and malware-laced payloads to bypass traditional controls.
Together, we will:- Deconstruct malicious phishing emails
- Analyse headers, embedded links, and attachments
- Use dynamic tools to safely test payloads
- Map attacker techniques to MITRE ATT&CK (Initial Access + Credential Access)
✅ Workshop Objectives
- Understand common phishing TTPs (Tactics, Techniques & Procedures)
- Manually analyse and validate malicious indicators
- Perform dynamic email threat analysis in a controlled lab
- Learn tooling and scripting to build repeatable phishing detection workflows
🎓 Learning Outcomes Attendees will leave with the skills to:
- Analyse phishing attempts with precision
- Identify and extract indicators of compromise
- Apply threat intel to enrich and validate findings
- Build their own phishing response SOP (Standard Operating Procedure)
🏆 Prizes Participants can win:
- Sponsor giveaways
- CyberLynk training discounts or lab access
- Recognition for top phishing analysis
Interested in submitting an application to speak at future BlueCon events? You can apply here. Interested in volunteering? Let us know at the event.
#BlueCon #CyberSecurity #BlueTeam #Phishing #ThreatHunting #AttackInformedDefence #CommunityFirst