26/11/2024
10:45
 - 
11:25
Supercharge threat hunting teams for enhanced detection
26/11/2024
11:35
 - 
12:15
Hiding in plain sight: How sub domain attacks use your email authentication against you
26/11/2024
13:35
 - 
14:15
Owning your cyber security mid-game strategy
26/11/2024
14:25
 - 
15:05
Unlocking the power of threat intelligence infused detections in the SOC
26/11/2024
15:50
 - 
16:30
Ransomware attack scenario review
27/11/2024
10:30
 - 
11:10
Ineffable cryptography – Manifesting unobtainable secrets
27/11/2024
11:20
 - 
12:00
Points A through to Q - R: Strategies for moving Australian organisations towards better cryptography (including Quantum-Resistance)
27/11/2024
13:30
 - 
14:10
Even large language models can't understand privacy policies: Towards building LLM-based solutions to make privacy policies more user-friendlier
27/11/2024
14:20
 - 
15:00
AI-Powered cyber threats - A new era of challenges
27/11/2024
15:50
 - 
16:30
The art of cognition: Empowering defenders with attacker mindsets
28/11/2024
10:15
 - 
10:55
Decoupling and decentralising authority
28/11/2024
11:05
 - 
11:45
Skynet vs. your data: A cyber security smackdown
28/11/2024
13:00
 - 
13:40
Can Aussie cyber security turbocharge cooperative autonomous adventures in the land down under?
28/11/2024
13:50
 - 
14:30
Where does security intersect in assessing AI for Ethics and Governance and what is the IEEE AI Ethics Certification Program
28/11/2024
14:40
 - 
15:20
Leveraging AI for kids
No items found.
