Sessions

26/11/2024
10:45
 - 
11:25
How to map out an organisations cyber security architecture to find its strengths and weaknesses
Wayne Pennington
View details
26/11/2024
11:35
 - 
12:15
In the business of DevSecOps: Enhancing resilience and reducing time to market
Ashwin Pal & Tim Nedyalkov
View details
26/11/2024
13:35
 - 
14:15
Achieving cyber herd immunity
Michael Loewy
View details
26/11/2024
15:50
 - 
16:30
How to handle millions of requests a day? Learnings from scaling an IAM platform
Pratish Ray
View details
27/11/2024
10:30
 - 
11:10
Be a security champion: Uplifting the security culture in development teams
Raafey Khan & Murray Goldschmidt
View details
27/11/2024
11:20
 - 
12:00
Lessons from building a single pane of AppSec glass
Ralf Huuck
View details
27/11/2024
13:30
 - 
14:10
Learning from insecure architectures: applying opposite thinking
Andrew Bandeira
View details
27/11/2024
14:20
 - 
15:00
Doing more with less - DevSecOps with limited budget
Pramod Rana
View details
27/11/2024
15:50
 - 
16:30
The vulnerability game: Mastering the art of vulnerability management
Balaji Kapsikar
View details
28/11/2024
10:15
 - 
10:55
Adulting in cyber security - The 7 habits of highly mature products
Jamie Ooi
View details
28/11/2024
11:05
 - 
11:45
DevSecOps: Preparing for the future
Ralf Huuck
View details
28/11/2024
13:00
 - 
13:40
How are you protecting modern Cloud-Native web apps & APIs
Nirav Kamdar
View details
28/11/2024
13:50
 - 
14:30
Future proofing your digital business security by design
Gautam Kashyap
View details
28/11/2024
14:40
 - 
15:20
Automation as a key to Essential Eight compliance success
Tarek Mulla
View details
No items found.
No items found.

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country