Program Overview
Scroll down to view Full Program Details
Tuesday 26 November
08:00 - 09:00
Exhibition & Registration Opens with coffee and morning snack
09:00 - 09:30
Conference Opening
09:30 - 10:30
Keynote with Joe Sullivan
10:45 - 12:15
Concurrent sessions and workshops
12:15 - 13:35
Lunch
13:35 - 15:05
Concurrent sessions and workshops
15:05 - 15:50
Afternoon Tea
15:50 - 16:30
Concurrent sessions and workshops
16:45 - 17:45
Keynote with Jose Hernandez
17:45 - 18:45
Welcome Reception served in Exhibition Area
19:00 - 21:00
Movie night
19:00 - 22:30
AISA Awards Dinner
Wednesday 27 November
08:00 - 09:00
Exhibition Open with coffee and morning snack
09:00 - 09:15
Conference Opening
09:15 - 10:15
Keynote with Geoffrey Roberston KC: What the law has in store
10:15 - 12:00
Concurrent sessions and workshops
12:00 - 13:30
Lunch
13:35 - 15:05
Concurrent sessions and workshops
15:00 - 15:50
Afternoon Tea
15:50 - 17:20
Concurrent sessions and workshops
16:40 - 17:20
Keynote with Mikko Hypponen
17:15 - 18:30
Networking Drinks served in Exhibition Area
18:30 - 22:30
Block Party
Thursday 28 November
08:30 - 09:00
Exhibition & Registration Opens with coffee and morning snack
09:00 - 09:15
Conference Opening
09:00 - 10:00
Keynote with Nina Schick
10:15 - 11:45
Concurrent sessions and workshops
11:45 - 13:00
Lunch
13:00 - 15:20
Concurrent sessions and workshops
15:20 - 16:10
Afternoon Tea
16:10 - 17:20
A Conversation with Kal Penn
17:20 - 17:30
Conference close
Showing 0 of 100
Room 209
Why a single source is not enough? A quantitative analysis of exploited vulnerabilities
Room 209
Why a single source is not enough? A quantitative analysis of exploited vulnerabilities
Head Of Security Research
Forescout
Room 210
Beyond Binary. How to leverage the human brain to gain decision superiority against AI in the cyber battlefield
Room 210
Beyond Binary. How to leverage the human brain to gain decision superiority against AI in the cyber battlefield
Head Of Security, APJ MEA
DXC
Room 211
R U Ok, should not be a UDP Packet - Mental health in cyber security
Room 211
R U Ok, should not be a UDP Packet - Mental health in cyber security
Cybersecurity Coach
CRANK - No Barriers (Contractor)
Room 212
Reasonable steps: Perspectives from an expert witness
Room 212
Reasonable steps: Perspectives from an expert witness
Privacy Maven
Ground Up
Room 213
Moving on from maturity assessments: A better way to measure cyber security effectiveness
Room 213
Moving on from maturity assessments: A better way to measure cyber security effectiveness
Head Of Advisory Services
Skylight Cyber
Room 216
Stoic cyber security: Navigating challenges with ancient wisdom
Room 216
Stoic cyber security: Navigating challenges with ancient wisdom
Cyber Security Engineer
Thales Australia
Room 218
Cyber-Partnering: Crafting security culture
Room 218
Cyber-Partnering: Crafting security culture
Manager
Scyne Advisory
Room 219
A Guide to auditing AI for security and ethical compliance - Insights from a CISO
Room 219
A Guide to auditing AI for security and ethical compliance - Insights from a CISO
Chief Security Officer
Freelancer
Room 220
Nothing stays secret forever. Tech advances, codes get broken. Quantum's just the latest exploit. Wish I hadn't missed that
Room 220
Nothing stays secret forever. Tech advances, codes get broken. Quantum's just the latest exploit. Wish I hadn't missed that
Regional Quantum Technology Lead
Accenture
Think Tank 1
Threat targeted cyber resilience – Mapping TTPs from cyber incidents to NIST 2.0 for pragmatic cyber resilience
Think Tank 1
Threat targeted cyber resilience – Mapping TTPs from cyber incidents to NIST 2.0 for pragmatic cyber resilience
Partner - Cyber
McGrathNicol
Think Tank 2
Building resilience: Strengthening cyber security for businesses and citizens in Australia
Think Tank 2
Building resilience: Strengthening cyber security for businesses and citizens in Australia
Manager - Governance, Compliance And Strategy
Quality Management Australia/ Cyber Dame
Think Tank 3
What you don't know can hurt you
Think Tank 3
What you don't know can hurt you
Senior Security Consultant
CyberCX
Think Tank 4
Elevating cyber protection: Leveraging parametric cyber insurance for next-level security
Think Tank 4
Elevating cyber protection: Leveraging parametric cyber insurance for next-level security
Senior Security Consultant
MyCISO
Ask an Expert 1
The Rosetta Stone of cyber security: How can we translate cyber to business risk?
Ask an Expert 1
The Rosetta Stone of cyber security: How can we translate cyber to business risk?
Head Of Cyber Resilience
Zurich Resilience Solutions Australia
Ask an Expert 2
Are you interested in a career in cyber security?
Ask an Expert 2
Are you interested in a career in cyber security?
Director Cyber Security
KPMG
Plenary Theatre
Fireside Chat with Kylie Moore-Gilbert & Cheng Lei
Plenary Theatre
Fireside Chat with Kylie Moore-Gilbert & Cheng Lei
Australian Academic & Former Detainee in Iran
Australian Journalist & Advocate for Press Freedom
Sky News Australia
Melbourne Room 2
Collaborative approaches to cyber security standards, policies, and regulations
Melbourne Room 2
Collaborative approaches to cyber security standards, policies, and regulations
Principal Lawyer
Cyberlex
Chief Information Security Officer
Department of Transport and Planning
Sr Director
IEEE Standards
Director/Co-founder
Dynamic Standards International (DSI)
Room 103
Balancing the FUD factor in OT cyber security
Room 103
Balancing the FUD factor in OT cyber security
Cybersecurity Manager
Citipower Powercor United Energy
Room 105
Defending against evolving bad bots
Room 105
Defending against evolving bad bots
Co-Founder
Peakhour
Director of Performance
Peakhour.io
Room 106
Laughing through the leaks: PII protection in the age of data breaches
Room 106
Laughing through the leaks: PII protection in the age of data breaches
Associate Director
Accenture
Cybersecurity Advisory
University of Melbourne
Security Delivery Manager
Accenture
Security Delivery Manager
Accenture
Room 203
Threat Detection-as-Code for Automated SecOps
Room 203
Threat Detection-as-Code for Automated SecOps
Security Practice Lead | Customer Engineering
Google Cloud
Room 204
Skynet vs. your data: A cyber security smackdown
Room 204
Skynet vs. your data: A cyber security smackdown
Ce/to
DBS Cyber LLC
CPO
DBS Cyber LLC
No results found.
There are no results with this criteria. Try changing your search.
Acknowledgement of Country
We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.
