Sessions

26/11/2024
10:45
 - 
11:25
Ask your cloud security and compliance questions
Pouya Ghotbi
View details
26/11/2024
11:35
 - 
12:15
Getting better insights from penetration tests; An introduction to threat modelling
Matthew Belvedere
View details
26/11/2024
13:35
 - 
14:15
Routes into cyber for mature career switchers
Ian Mountford
View details
26/11/2024
14:25
 - 
15:05
Demystifying the Assessment & Authorisation (A&A) Journey for Secure Systems
Sharin Yeoh
View details
27/11/2024
10:30
 - 
11:10
Breaking barriers: A deep dive into bypassing next-gen 2FA and MFA security measures
Shahmeer Amir
View details
27/11/2024
11:20
 - 
12:00
A dance of quant and qual - Establishing materiality thresholds for regulatory disclosures
Jack Freund
View details
27/11/2024
13:30
 - 
14:10
How to get your dream job with "FIGMA" companies. (Facebook, IBM, Google, Microsoft, Amazon)
Abbas Kudrati
View details
27/11/2024
14:20
 - 
15:00
Email Security, our policies and how we make them work.
Leela Ross
View details
27/11/2024
15:50
 - 
16:30
Wanna be a "CISO"...Lets chat :)
Sharin Yeoh
View details
28/11/2024
10:15
 - 
10:55
The Rosetta Stone of cyber security: How can we translate cyber to business risk?
Dan Elliott
View details
28/11/2024
11:05
 - 
11:45
Cyber incident response exercises: Gold teaming on top of silver and bronze
Murray Goldschmidt
View details
28/11/2024
13:00
 - 
13:40
Human factors in cyber security: Cultivating cybersecurity culture and cyber skills gap
Leanne Ngo
View details
28/11/2024
13:50
 - 
14:30
How do I uplift my IAM reporting
Sophie Wade
View details
No items found.
No items found.

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country