Program Overview
Scroll down to view Full Program Details
Tuesday 26 November
08:00 - 09:00
Exhibition & Registration Opens with coffee and morning snack
09:00 - 09:30
Conference Opening
09:30 - 10:30
Keynote with Joe Sullivan
10:45 - 12:15
Concurrent sessions and workshops
12:15 - 13:35
Lunch
13:35 - 15:05
Concurrent sessions and workshops
15:05 - 15:50
Afternoon Tea
15:50 - 16:30
Concurrent sessions and workshops
16:45 - 17:45
Keynote with Jose Hernandez
17:45 - 18:45
Welcome Reception served in Exhibition Area
19:00 - 21:00
Movie night
19:00 - 22:30
AISA Awards Dinner
Wednesday 27 November
08:00 - 09:00
Exhibition Open with coffee and morning snack
09:00 - 09:15
Conference Opening
09:15 - 10:15
Keynote with Geoffrey Roberston KC: What the law has in store
10:15 - 12:00
Concurrent sessions and workshops
12:00 - 13:30
Lunch
13:35 - 15:05
Concurrent sessions and workshops
15:00 - 15:50
Afternoon Tea
15:50 - 17:20
Concurrent sessions and workshops
16:40 - 17:20
Keynote with Mikko Hypponen
17:15 - 18:30
Networking Drinks served in Exhibition Area
18:30 - 22:30
Block Party
Thursday 28 November
08:30 - 09:00
Exhibition & Registration Opens with coffee and morning snack
09:00 - 09:15
Conference Opening
09:00 - 10:00
Keynote with Nina Schick
10:15 - 11:45
Concurrent sessions and workshops
11:45 - 13:00
Lunch
13:00 - 15:20
Concurrent sessions and workshops
15:20 - 16:10
Afternoon Tea
16:10 - 17:20
A Conversation with Kal Penn
17:20 - 17:30
Conference close
Showing 0 of 100
Room 209
Threat modelling at the speed of Git
Room 209
Threat modelling at the speed of Git
Principal Security Engineer
Atlassian
Room 210
Unlocking your potential – Is security culture for you?
Room 210
Unlocking your potential – Is security culture for you?
Security Culture And Engagement Lead
EBOS Group
Head of Security Awareness
Medibank
Room 211
RAR! This is all too hard and overwhelming. The mental load of our cyber defenders
Room 211
RAR! This is all too hard and overwhelming. The mental load of our cyber defenders
Field Chief Technology Officer
Sophos
Room 212
Eating our own dog food: The business case for great GRC at start-up & scale-up
Room 212
Eating our own dog food: The business case for great GRC at start-up & scale-up
GRC Specialist
UpGuard
Chief Information Security Officer
UpGuard
Room 213
Rebalancing cyber security: Prioritizing response and recovery in governance
Room 213
Rebalancing cyber security: Prioritizing response and recovery in governance
Partner – Cyber Security & Privacy Risk Services
RSM Australia
Researcher/Lecturer
University Of Sydney
Room 216
Protecting the personal and private information of domestic violence survivors
Room 216
Protecting the personal and private information of domestic violence survivors
Co-CEO Nansen Digital Forensic Services
Nansen Digital Forensic Services
Co-CEO Nansen Digital Forensic Services
Nansen Digital Forensic Services
Room 217
Building cyber resilience in small and medium businesses
Room 217
Building cyber resilience in small and medium businesses
Senior GRC Consultant
Gridware Cybersecurity
Room 218
Lessons learned from a ransomware attack and setting up a defensive cyber resilience strategy, execution plan and reporting to board
Room 218
Lessons learned from a ransomware attack and setting up a defensive cyber resilience strategy, execution plan and reporting to board
Chief Information Security Officer
Eastern Health
Room 219
The risk of taking the human factor out of GRC
Room 219
The risk of taking the human factor out of GRC
Associate Director
ANZ
Security Partner
ANZ
Room 220
Balancing AI innovation and security - A guide to AI security governance
Room 220
Balancing AI innovation and security - A guide to AI security governance
Head Of Information Security
Paypal Australia
Think Tank 1
Delivering effective and user friendly cybersecurity solutions
Think Tank 1
Delivering effective and user friendly cybersecurity solutions
Founder
Nightingale Cybersecurity
Think Tank 3
Continuous threat exposure management - A convergence of AI / ML & threat exposure management
Think Tank 3
Continuous threat exposure management - A convergence of AI / ML & threat exposure management
Associate Director
EY
Think Tank 4
From burnout to balance: Building cyber resilience and competitive advantage
Think Tank 4
From burnout to balance: Building cyber resilience and competitive advantage
Senior Manager- Information Security Risk
Equip Super
Ask an Expert 1
Wanna be a "CISO"...Lets chat :)
Ask an Expert 1
Wanna be a "CISO"...Lets chat :)
APAC ISO
Lockheed Martin
Plenary Theatre
No turning back: We can't uninvent things
Plenary Theatre
No turning back: We can't uninvent things
Chief Research Officer
WithSecure
Plenary Theatre
Keynote with Nina Schick
Plenary Theatre
Keynote with Nina Schick
Global expert in responsible generative AI
Plenary Theatre
National Cyber Security Coordinator Presentation
Plenary Theatre
National Cyber Security Coordinator Presentation
National Cyber Security Coordinator
National Office of Cyber Security
Melbourne Room 2
How cyber professionals can be a driving force for good. Achieving the UN sustainable development goals
Melbourne Room 2
How cyber professionals can be a driving force for good. Achieving the UN sustainable development goals
Professor in CyberCrime Cyberwar and Cyberterror
University of New South Wales School of Computer Science and Engineering
Senior Lecturer
ANU
President
AUSCL Australasian Society for Computers & Law
Room 103
Guardians of the inbox: Elevating email trust with SPF, DKIM, DMARC, and BIMI
Room 103
Guardians of the inbox: Elevating email trust with SPF, DKIM, DMARC, and BIMI
Technology Evangelist
The Small Business Group
Room 105
Fortifying the cloud: Current practices, emerging trends, and future strategies
Room 105
Fortifying the cloud: Current practices, emerging trends, and future strategies
Senior Security Architect
Telstra
Room 106
From bytes to rights: The intersection of law and cyber security
Room 106
From bytes to rights: The intersection of law and cyber security
CISO
Thales Australia And New Zealand
Partner and Head of Cybersecurity - Australia
Norton Rose Fulbright
Principal
Wise Law
Room 204
Decoupling and decentralising authority
Room 204
Decoupling and decentralising authority
Lecturer
RMIT University
Room 207
Exploiting the physical plane: Red team intrusion techniques and tools
Room 207
Exploiting the physical plane: Red team intrusion techniques and tools
Managing Consultant - Offensive Security
Tesserent
No results found.
There are no results with this criteria. Try changing your search.
Acknowledgement of Country
We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.
