Program Overview
Scroll down to view Full Program Details
Tuesday 26 November
08:00 - 09:00
Exhibition & Registration Opens with coffee and morning snack
09:00 - 09:30
Conference Opening
09:30 - 10:30
Keynote with Joe Sullivan
10:45 - 12:15
Concurrent sessions and workshops
12:15 - 13:35
Lunch
13:35 - 15:05
Concurrent sessions and workshops
15:05 - 15:50
Afternoon Tea
15:50 - 16:30
Concurrent sessions and workshops
16:45 - 17:45
Keynote with Jose Hernandez
17:45 - 18:45
Welcome Reception served in Exhibition Area
19:00 - 21:00
Movie night
19:00 - 22:30
AISA Awards Dinner
Wednesday 27 November
08:00 - 09:00
Exhibition Open with coffee and morning snack
09:00 - 09:15
Conference Opening
09:15 - 10:15
Keynote with Geoffrey Roberston KC: What the law has in store
10:15 - 12:00
Concurrent sessions and workshops
12:00 - 13:30
Lunch
13:35 - 15:05
Concurrent sessions and workshops
15:00 - 15:50
Afternoon Tea
15:50 - 17:20
Concurrent sessions and workshops
16:40 - 17:20
Keynote with Mikko Hypponen
17:15 - 18:30
Networking Drinks served in Exhibition Area
18:30 - 22:30
Block Party
Thursday 28 November
08:30 - 09:00
Exhibition & Registration Opens with coffee and morning snack
09:00 - 09:15
Conference Opening
09:00 - 10:00
Keynote with Nina Schick
10:15 - 11:45
Concurrent sessions and workshops
11:45 - 13:00
Lunch
13:00 - 15:20
Concurrent sessions and workshops
15:20 - 16:10
Afternoon Tea
16:10 - 17:20
A Conversation with Kal Penn
17:20 - 17:30
Conference close
Showing 0 of 100
Room 209
Designing secure systems: The art and science of threat modelling
Room 209
Designing secure systems: The art and science of threat modelling
Manager
McGrathNicol
Assistant Manager
McGrathNicol Advisory
Room 210
Why did it take a breakdown to ask for help? And what can you learn from my mental health journey?
Room 210
Why did it take a breakdown to ask for help? And what can you learn from my mental health journey?
CEO
Solis Security / CFC Response
Room 211
The personality hire' When a community manager infiltrates cyber security
Room 211
The personality hire' When a community manager infiltrates cyber security
Chief Humanist
Phronesis Security
Room 212
Unhinged insights: How to visualise security data to business stakeholders with pretty pictures
Room 212
Unhinged insights: How to visualise security data to business stakeholders with pretty pictures
Principal Consultant
NTT DATA
Room 213
Knife to a gun fight: Privacy law as a regulatory mechanism for AI
Room 213
Knife to a gun fight: Privacy law as a regulatory mechanism for AI
Special Counsel, Privacy
Griffin Legal
Room 216
Secure your body and mind - protecting your most critical assets
Room 216
Secure your body and mind - protecting your most critical assets
Federal Government Lead
Wipro Australia
Room 217
Leading a Whole-of-Government approach: Enabling security operations and a consistent approach to cyber security
Room 217
Leading a Whole-of-Government approach: Enabling security operations and a consistent approach to cyber security
Director Cyber Security
Dept. Premier and Cabinet WA
Room 218
Why your board doesn't want to hear from you!
Room 218
Why your board doesn't want to hear from you!
CISO / Principal Consultant
Prism Cyber by Cube Networks
Room 219
Cyber-proof your biz: Strengthening cyber resilience and business continuity in the digital age
Room 219
Cyber-proof your biz: Strengthening cyber resilience and business continuity in the digital age
Head Of Security Advisory & Professional Services
DXC
Room 220
From code to westworld-like crises: A future-is-now strategy for containing emerging threats of radicalized robotics and Artificial General Intelligence (AGI)
Room 220
From code to westworld-like crises: A future-is-now strategy for containing emerging threats of radicalized robotics and Artificial General Intelligence (AGI)
Generative AI & Cybersecurity Research Strategist
Cyberoo Pty Ltd
Senior Lecturer in Cybersecurity
RMIT University, Melbourne, Australia
Think Tank 1
Zero trust for private 5G networks
Think Tank 1
Zero trust for private 5G networks
Senior Executive Director
Capgemini
Think Tank 2
Mandatory cyber laws: 2024's global blueprint
Think Tank 2
Mandatory cyber laws: 2024's global blueprint
Director Security Strategy
Microsoft
Think Tank 3
AI-Driven cyber security defense and offense
Think Tank 3
AI-Driven cyber security defense and offense
Director
Solution Tech
Think Tank 4
Are you attracting the employee diversity to your business that you think you need?
Think Tank 4
Are you attracting the employee diversity to your business that you think you need?
Director
Jay & Janes
Ask an Expert 1
Cyber incident response exercises: Gold teaming on top of silver and bronze
Ask an Expert 1
Cyber incident response exercises: Gold teaming on top of silver and bronze
Executive Director
CyberCX Pty Ltd
Melbourne Room 2
Is 'Cyber Resiliency' the new first line of defence for organisations?
Melbourne Room 2
Is 'Cyber Resiliency' the new first line of defence for organisations?
Partner
Wotton and Kearney
Client Manager - Cyber Solutions Group
Aon
Cyber Lead, Senior Claims Specialist, Professional & Financial Risks
Liberty Specialty Markets
Client Executive - Cyber Solutions Group
Aon
Underwriting Manager, Cyber Insurance
Probitas (pacific) Pty Ltd
Room 103
Cyber-physical systems risk landscape and its impact on human safety
Room 103
Cyber-physical systems risk landscape and its impact on human safety
Field CTO Asia Pacific & Japan
Claroty
Room 105
Emergency access in the cloud - Unleashing breakglass accounts
Room 105
Emergency access in the cloud - Unleashing breakglass accounts
Senior Cyber Lead
Intuit Technologies
Room 106
Building a Cyber secure future for Critical Infrastructure: leveraging public-private Collaboration to enhance cybersecurity resilience
Room 106
Building a Cyber secure future for Critical Infrastructure: leveraging public-private Collaboration to enhance cybersecurity resilience
Chief Information Security Officer
Department of Transport and Planning
Chief Security Officer
NBN
Senior Cyber Security Governance Officer - Pacific
Schneider Electric
Director Of Security & Risk
RDS IT - Transport for NSW
Acting Assistant Director General Cyber Uplift
ASD
Room 203
Navigating the storm: Security Incident Response in the Cloud
Room 203
Navigating the storm: Security Incident Response in the Cloud
Security Lead ANZ
AWS
Room 204
Can Aussie cyber security turbocharge cooperative autonomous adventures in the land down under?
Room 204
Can Aussie cyber security turbocharge cooperative autonomous adventures in the land down under?
Senior Lecturer
University Of New South Wales
Room 207
Harnessing strategic, operational and tactical threat intelligence for a more robust security posture
Room 207
Harnessing strategic, operational and tactical threat intelligence for a more robust security posture
Deputy Global Head Of Threat Intelligence
NCC Group
Room 208
How are you protecting modern Cloud-Native web apps & APIs
Room 208
How are you protecting modern Cloud-Native web apps & APIs
Cybersecurity Solutions Architect Cloud and DevOps APAC
Qualys
No results found.
There are no results with this criteria. Try changing your search.
Acknowledgement of Country
We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.
