Program - Wednesday 27 November
Australian Cyber Conference Melbourne 2024
Filters
Sort by
Showing 0 of 100
Melbourne Room 2
Psychology in cyber security - Creating a safer world together
Room 103
Secure different: Securing macOS devices in an enterprise environment
Room 105
How to avoid being the next data breach headline- Strategies that governments and corporates have adopted
Room 106
Welcome to the Panopticon: The creep of smart surveillance - Navigating your risks, rights and duties
Room 204
AI-Powered cyber threats - A new era of challenges
Room 207
The enemy is within the gates – Recent lessons from internal threat incident response investigations
Room 208
Doing more with less - DevSecOps with limited budget
Room 210
L'affaire du télégraphe. The Bordeaux hackers of 1834
Room 211
Transforming cyber security awareness training: From one-size-fits-all to targeted efficiency
Room 212
Security awareness 2.0: The paradigm shift from training and simulations to engagement and culture
Room 213
Navigating the ripple effects: Lessons from a year of third-party breaches
Room 216
Data on the move: The hidden risks of employee turnover
Room 217
The new dawn: Cyber risks in an AI world
Room 218
How cyber security can help you achieve B Corp certification and address UN sustainable development goals
Room 219
Cyber regulation readiness - Preparing for global cyber rules
Room 220
An architected cyber security management process model integrated with maturity and effectiveness measurement
Think Tank 1
Fact or fiction? Navigating the AI-Infested information seas
Think Tank 3
APRA CPS230 - Can you be ready?
Think Tank 4
Boost cyber security resourcing with a strategic mindset change
Ask an Expert 2
Getting Into the Weeds: Solving Your Cyber GRC Problems
Plenary Theatre
Clash of Threats and Our Response
Melbourne Room 2
Mindset mastery: Balancing mental health in a high stakes incident response team
Room 103
IoT and OT: Owning the risk on someone else's assets: Best practices for approaching IoT cyber risk
Room 104
The changing threat landscape of hacktivism
No results found.
There are no results with this criteria. Try changing your search.