Keynotes and Workshops on Incident Response, Digital Forensics, and OT Cyber Resilience
Seth Enoka helps leaders and technical teams make better decisions under pressure, drawing on real investigations across enterprise and critical infrastructure.
About Seth
Seth is Director and Principal Analyst at Lykos Defence, specialising in digital forensics, incident response, and cyber resilience across both enterprise and industrial environments.
He speaks to technical and non-technical audiences with the same objective: clarity. Seth translates complex incidents into practical lessons, showing teams what matters, what doesn’t, and how to improve readiness before the next high-pressure event.
Seth has delivered keynotes, talks, and workshops for security leaders, operators, and cross-functional stakeholders across the globe, including conference sessions, SANS content, and industry events focused on critical infrastructure.
Speaking Formats
Keynote (45–60 minutes)
A high-signal, story-driven talk grounded in real incidents and defensible lessons.
Conference Session (30–45 minutes)
Focused, practical content designed for practitioners and mixed technical audiences.
Executive Briefing (30–60 minutes)
A leadership-focused session aimed at boards and senior decision-makers.
Workshop (Half-day / Full-day)
Hands-on sessions with frameworks, exercises, and practical artefacts teams can apply immediately.
Panel Moderation and Facilitation
Incident readiness panels, OT cyber risk discussions, and cybersecurity tabletop exercise facilitation.
Topics and Talks
Below are a selection of Seth’s most requested sessions. Each can be delivered as a keynote, conference session, or executive briefing, and can be tailored to your sector and audience.
Incident Response Under Pressure: How Leaders Make Decisions That Save Their Organisation
When incidents occur, teams don’t fail because they lack tools. They fail because decision-making collapses under uncertainty. This talk shows leaders and responders how high-performing organisations reduce confusion, avoid common traps, and execute with clarity in the first critical hours.
What’s Really Happening in Cyber Attacks on Critical Infrastructure
A practical look at attacker behaviour in OT and industrial environments, grounded in real investigations and readiness work. This session demystifies what’s actually happening in the field, what defenders routinely miss, and how to strengthen resilience without unrealistic programs.
Digital Forensics for Executives: Understanding the Evidence Behind Modern Breaches
Executives are often asked to make irreversible decisions without understanding what evidence can reliably support. This session explains how investigations really work, what “confidence” means in DFIR, why timelines slip, and what leaders can do to support a defensible response.
The Five Ways Organisations Fail at Incident Readiness (and What High Performers Do Differently)
A pattern-based breakdown of the most common readiness challenges: unclear authority, missing or untested playbooks, weak evidence handling, poor communication, and unrealistic assumptions about tooling. Audience members leave with practical steps to uplift capability quickly.
The Future of Cyber Risk: What Defenders Need to Prepare For
A forward-looking but grounded view of what’s changing in incident response and cyber risk, based on real-world trends rather than hype. This session helps leaders prioritise investment and capability development for the next wave of incidents.
Why Book Seth
- Clear and engaging delivery for mixed audiences
- Deep DFIR and OT/ICS experience, grounded in real investigations
- Practical frameworks and artefacts, not generic advice
- Executive-friendly explanations without losing technical credibility
- Content that supports measurable improvements in readiness and response
“Seth Enoka’s expertise contributed immensely to the success of the inaugural Cyber and Infrastructure Security Conference, attended by critical infrastructure leaders from across Australia.”
— Cyber and Infrastructure Security Conference organisers
Audience Fit
- Security leaders and incident response teams
- Boards and executives seeking practical cyber resilience guidance
- Critical infrastructure operators and OT engineering stakeholders
- Government and regulators focused on national resilience
- Cyber insurers, legal teams, and governance stakeholders
Media and Speaking Highlights
Seth has delivered keynotes, conference talks, workshops, and research briefings for global cybersecurity and critical-infrastructure audiences.
Selected Highlights
What’s Really Happening in OT Cyberattacks in 2025 — Australian Cyber Conference (Melbourne)
Session pageProcess Code Injection – Detection, Response, and Mitigation — SANS Webcast (2024)
RecordingE-MIMICS: Extended Malware in Modern ICS — SANS ICS Security Summit (2021)
Recording · Slides (PDF)Responding to Ransomware in ICS — AISA AdelaideSEC Conference (2022)
Slides (PDF)Cybersecurity for Small Networks — No Starch Press (Book)
Publisher page
Additional Speaking & Workshops
Conferences & Workshops
Tying a Bow in Your OT Cyber Risk (Workshop) — CyberWest Summit (2023)
Contemporaneous Note Taking and Sausage Dogs — PancakesCon 4 (2023)
Recording
Industry Forums
Beyond the Wall: A Song of Logs and Fire — Dragos Industrial Cybersecurity Conference (DISC)
Incident Response Planning Workshop — Dragos ANZ Forum
Cybersecurity Roundtable Group Discussion & Exercise — Cyber & Infrastructure Security Conference (CISC), Australia
Event Page & Report
Media, Publications & Research
Media & Commentary
Safeguarding Civilisation: Protecting Critical Infrastructure Against Cyberattacks — Intelligent CISO (2022)
PDFOp-Ed: ICS/OT Threat Landscape – 2022 Year in Review — Cybersecurity Connect
Article
Whitepapers
Book Seth
To enquire about availability, fees, or tailoring for your event, email us directly: contact@lykosdefence.com
Frequently Asked Questions
Incident response decision-making, digital forensics, and OT/ICS cyber resilience. Sessions are tailored to your audience and sector.
Yes. Executive briefings focus on decision-making, risk, communication, and what “good” looks like during the first critical hours of an incident.
Both. Delivery depends on your event format, time zone, and requirements. Workshops and facilitation can be run remotely or on-site.
Event date/time, audience type and size, preferred format (keynote/session/briefing/workshop), and any constraints such as sector requirements or sensitivity.
Yes. A kit can include bios, headshots, a talk catalogue, and links to relevant material. If you need specific formats, tell us and we’ll align to your workflow.
