Sessions

Sign in to add sessions to your agenda
26/11/2024
10:45
 - 
11:25
How to map out an organisations cyber security architecture to find its strengths and weaknesses
Wayne Pennington
26/11/2024
11:35
 - 
12:15
In the business of DevSecOps: Enhancing resilience and reducing time to market
Ashwin Pal & Tim Nedyalkov
26/11/2024
14:25
 - 
15:05
The state of the cyber security architecture community in Australia
Bruce Large
26/11/2024
15:50
 - 
16:30
How to handle millions of requests a day? Learnings from scaling an IAM platform
Pratish Ray
27/11/2024
10:30
 - 
11:10
Be a security champion: Uplifting the security culture in development teams
Raafey Khan & Murray Goldschmidt
27/11/2024
11:20
 - 
12:00
Lessons from building a single pane of AppSec glass
Ralf Huuck
27/11/2024
13:30
 - 
14:10
Learning from insecure architectures: applying opposite thinking
Andrew Bandeira
27/11/2024
14:20
 - 
15:00
Doing more with less - DevSecOps with limited budget
Pramod Rana
27/11/2024
15:50
 - 
16:30
The vulnerability game: Mastering the art of vulnerability management
Balaji Kapsikar
28/11/2024
10:15
 - 
10:55
Adulting in cyber security - The 7 habits of highly mature products
Jamie Ooi
28/11/2024
11:05
 - 
11:45
DevSecOps: Preparing for the future
Ralf Huuck
28/11/2024
13:00
 - 
13:40
How are you protecting modern Cloud-Native web apps & APIs
Nirav Kamdar
28/11/2024
13:50
 - 
14:30
Future proofing your digital business security by design
Gautam Kashyap
28/11/2024
14:40
 - 
15:20
Automation as a key to Essential Eight compliance success
Tarek Mulla
No items found.
No items found.
No items found.

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country