26/11/2024
10:45
-
11:25
Supercharge threat hunting teams for enhanced detection
26/11/2024
11:35
-
12:15
Hiding in plain sight: How sub domain attacks use your email authentication against you
26/11/2024
13:35
-
14:15
Owning your cyber security mid-game strategy
26/11/2024
14:25
-
15:05
Unlocking the power of threat intelligence infused detections in the SOC
26/11/2024
15:50
-
16:30
Ransomware attack scenario review
27/11/2024
10:30
-
11:10
Ineffable cryptography – Manifesting unobtainable secrets
27/11/2024
11:20
-
12:00
Points A through to Q - R: Strategies for moving Australian organisations towards better cryptography (including Quantum-Resistance)
27/11/2024
13:30
-
14:10
Even large language models can't understand privacy policies: Towards building LLM-based solutions to make privacy policies more user-friendlier
27/11/2024
14:20
-
15:00
AI-Powered cyber threats - A new era of challenges
27/11/2024
15:50
-
16:30
The art of cognition: Empowering defenders with attacker mindsets
28/11/2024
10:15
-
10:55
Decoupling and decentralising authority
28/11/2024
11:05
-
11:45
Skynet vs. your data: A cyber security smackdown
28/11/2024
13:00
-
13:40
Can Aussie cyber security turbocharge cooperative autonomous adventures in the land down under?
28/11/2024
13:50
-
14:30
Where does security intersect in assessing AI for Ethics and Governance and what is the IEEE AI Ethics Certification Program
28/11/2024
14:40
-
15:20
Leveraging AI for kids
No items found.