Program - Wednesday 27 November
Australian Cyber Conference Melbourne 2024
Filters
Sort by
Showing 0 of 100
Melbourne Room 2
Pie in the sky no more – Have your pie and eat it too! Doubling down on successful cyber strategy
Room 103
Mastering the art of attacking and defending a Kubernetes cluster
Room 104
From data to defence: Using OSINT to build resilience across critical infrastructure supply chains
Room 105
Hunting in the dark: Detecting and disrupting DNS-based C2 traffic
Room 106
What Australia's most vulnerable postcodes can tell us about cybercrime
Room 203
The rise and rise of advanced eCrime threat - Incident Response edition
Room 204
Points A through to Q - R: Strategies for moving Australian organisations towards better cryptography (including Quantum-Resistance)
Room 207
Creating cyber threat intelligence like a journalist
Room 208
Lessons from building a single pane of AppSec glass
Room 209
How to develop an AppSec program from ground up and some key learnings
Room 210
Why mentoring secondary school students in cyber security is a good idea
Room 211
Keeping our kids safe online: The essential information for parents and caregivers
Room 212
Where worlds collide – The intersection between cyber security and climate change
Room 216
The psychology of cybercrime - Part III
Room 218
A model for delivering your cyber risk message to leadership and the board using the SMEACS briefing model
Room 219
Is security by design now the governance standard expected for company directors?
Room 220
A CISO's playbook for achieving ISO 42001 certification to secure the benefits of AI
Think Tank 1
Teaching the intelligence bits of CTI
Think Tank 2
Who you're gonna call? Your Cyber-000
Think Tank 3
Digital accessibility and cyber security: 2 pillars or poles apart?
Think Tank 4
CRITICAL NEXUS: The role of policy and cybersecurity in critical infrastructure resilience
Ask an Expert 2
How to land your first cyber security job in 2024
Plenary Theatre
Featured Speaker Brendan Dowling
Melbourne Room 2
Surviving and thriving in SecOps: A conversation with two experts
No results found.
There are no results with this criteria. Try changing your search.