Showing 0 of 100
Room 103
Making IAM invisible: accessibility, technology, and new opportunities
Manager, Identity and Access Management
Downer
Room 105
Fortifying the skies: Navigating aerospace cyber security challenges
Managing Director
ITR Australia
Director
KPMG
Room 106
The cyber mosaic: How diversity creates impeccable defences
Phd Researcher
Edith Cowan University
Senior Director
Avanade
College of Organisational Psychologists WA State Chair/Director
Australian Psychological Society/Lauriate
Associate Professor
Swinburne University of Technology
Room 203
Inside the MIND of a hacker - Insights and lessons from a ransomware attack
Chief Security Scientist & Advisory CISO
Delinea
Room 208
How to map out an organisations cyber security architecture to find its strengths and weaknesses
Cybersecurity Leader
Airservices Australia
Room 209
Smooth seas do not a good architect make
Director
Hellorisk
Room 210
Welcome to the industry. Expectations and realities for a new professional out of university
Senior Cyber Security Engineer
ANU
Room 212
Lost in the haystack: Unraveling the challenges presented by unstructured data when evaluating the impacts of cyber incidents
Managing Director
Scyne Advisory
Director
Germane Advisory
Room 213
The boardroom and back again: The art of storytelling in cyber security
Principal Customer Solution Lead
CyberCX
Room 217
Building trust: A practical guide to cyber security reporting to executives and the board
Strategy Manager
CyberCX
Room 218
Unmasking supply chain cyber threats: Critical insights for business executives
Senior Cyber Security Advisor
Bunnings Group
Room 220
Quantum resilience: A trustworthy internet in the post-quantum era
CSCRC Research Fellow, Deakin Cyber
Deakin University
Director, Deakin Cyber
Deakin University
Think Tank 1
Lean in or push away: What to do with cyber insurance in 2024?
Head Of Underwriting, Australia
Coalition, Inc
Think Tank 3
How third-party risks can sink sabotage your security
Founder
GRC Mastery
Think Tank 4
Analysing the risks and rewards of leveraging AI in cyber threat triage and response
Technical Director A/NZ
Swimlane
Ask an Expert 1
Ask your cloud security and compliance questions
Security Lead ANZ
AWS
Room 103
Conditional access to Copilot - securing M365 in 40 minutes or less
Head of Technical Consulting
Fujitsu Cyber Security Services
Room 104
Lessons from the Law – What are reasonable steps in the context of cyber security, data privacy, and incident response?
Principal
Gilchrist Connell
Room 105
One port to serve them all - Google GCP cloud shell abuse
Sr. Staff Researcher
Netskope
Room 203
Ctrl Alt Defeat: A comedy of errors in higher Ed cyber security
Head Of Security
Village Roadshow
Technical Lead, Cybersecurity
Village Roadshow
Room 204
Hiding in plain sight: How sub domain attacks use your email authentication against you
Cyber Security Specialist
Cisco Systems
Room 207
How safe is safe? Exploring the vitality of physical security in an ever-evolving world and its parallels to cyber security
Principal Security Consultant
CyberCX
Room 208
In the business of DevSecOps: Enhancing resilience and reducing time to market
Partner – Cyber Security & Privacy Risk Services
RSM Australia
Technology Information Security Officer
Commonwealth Bank Of Australia
No results found.
There are no results with this criteria. Try changing your search.