Sessions
26/11/2024
10:45
-
11:25
Making IAM invisible: accessibility, technology, and new opportunities
26/11/2024
11:35
-
12:15
Conditional access to Copilot - securing M365 in 40 minutes or less
26/11/2024
15:50
-
16:30
Cloud boundaries redefined: Exploring the power of Security Service Edge (SSE)
27/11/2024
10:30
-
11:10
Digital ID in Australia – an update on the Digital ID Bill and progress in its implementation
27/11/2024
11:20
-
12:00
Mastering the art of attacking and defending a Kubernetes cluster
27/11/2024
13:30
-
14:10
The imperative of transitioning from traditional access control to modern access control
27/11/2024
14:20
-
15:00
Secure different: Securing macOS devices in an enterprise environment
27/11/2024
15:50
-
16:30
IoT and OT: Owning the risk on someone else's assets: Best practices for approaching IoT cyber risk
28/11/2024
10:15
-
10:55
Guardians of the inbox: Elevating email trust with SPF, DKIM, DMARC, and BIMI
28/11/2024
13:00
-
13:40
Cyber-physical systems risk landscape and its impact on human safety
28/11/2024
13:50
-
14:30
Beyond credentials and 2FA - A strong approach to MFA and secure identity
28/11/2024
14:40
-
15:20
Success with Privileged Access Management - Its more than the tools