Program Overview
Scroll down to view Full Program Details
Tuesday 26 November
08:00 - 09:00
Exhibition & Registration Opens with coffee and morning snack
09:00 - 09:30
Conference Opening
09:30 - 10:30
Keynote with Joe Sullivan
10:45 - 12:15
Concurrent sessions and workshops
12:15 - 13:35
Lunch
13:35 - 15:05
Concurrent sessions and workshops
15:05 - 15:50
Afternoon Tea
15:50 - 16:30
Concurrent sessions and workshops
16:45 - 17:45
Keynote with Jose Hernandez
17:45 - 18:45
Welcome Reception served in Exhibition Area
19:00 - 21:00
Movie night
19:00 - 22:30
AISA Awards Dinner
Wednesday 27 November
08:00 - 09:00
Exhibition Open with coffee and morning snack
09:00 - 09:15
Conference Opening
09:15 - 10:15
Keynote with Geoffrey Roberston KC: What the law has in store
10:15 - 12:00
Concurrent sessions and workshops
12:00 - 13:30
Lunch
13:35 - 15:05
Concurrent sessions and workshops
15:00 - 15:50
Afternoon Tea
15:50 - 17:20
Concurrent sessions and workshops
16:40 - 17:20
Keynote with Mikko Hypponen
17:15 - 18:30
Networking Drinks served in Exhibition Area
18:30 - 22:30
Block Party
Thursday 28 November
08:30 - 09:00
Exhibition & Registration Opens with coffee and morning snack
09:00 - 09:15
Conference Opening
09:00 - 10:00
Keynote with Nina Schick
10:15 - 11:45
Concurrent sessions and workshops
11:45 - 13:00
Lunch
13:00 - 15:20
Concurrent sessions and workshops
15:20 - 16:10
Afternoon Tea
16:10 - 17:20
A Conversation with Kal Penn
17:20 - 17:30
Conference close
Showing 0 of 100
Room 209
The agile security professional: Adapting to DevSecOps and SecDevOps in modern organisations
Room 209
The agile security professional: Adapting to DevSecOps and SecDevOps in modern organisations
Senior Security Engineer
Flybuys
Room 210
Building digital empathy into cyber security
Room 210
Building digital empathy into cyber security
Chief Technology Officer
Ncc Group
Room 211
Hack stress for success: Practical neuroscience for burnout
Room 211
Hack stress for success: Practical neuroscience for burnout
Project Manager
CyberCX Australia
Room 212
The failure of cyber security investment
Room 212
The failure of cyber security investment
Director
Hellorisk
CISO
Cyberstrat (AUS)
Room 213
Cyber in the Pacific: Vanuatu and Fiji perspectives
Room 213
Cyber in the Pacific: Vanuatu and Fiji perspectives
Managing Director
Novexus Pty Ltd
Managing Director
Hemisphere East
Room 217
Are you spending too much on cyber security?
Room 217
Are you spending too much on cyber security?
Cyber Security Advisor & Growth Lead ANZ, Cybersecurity & Risk Services
Wipro Shelde Australia
Room 218
Reading the GRC tea leaves – Common themes from recent major updates to ISO 27001, NIST CSF, and PCI DSS
Room 218
Reading the GRC tea leaves – Common themes from recent major updates to ISO 27001, NIST CSF, and PCI DSS
Chief Realist (CEO)
Phronesis Security
Room 219
Ethics and legal in cyber security
Room 219
Ethics and legal in cyber security
Head of Strategic Cybersecurity Engagement
TNK2
Research and Development Engineer at TNK
TNK2
Think Tank 1
Lessons learnt from a transition from law enforcement to corporate CISO and from SME to global business operations
Think Tank 1
Lessons learnt from a transition from law enforcement to corporate CISO and from SME to global business operations
Chief Information Security Officer
Tesserent Cyber Services
Think Tank 2
Getting serious with the Essential 8
Think Tank 2
Getting serious with the Essential 8
Senior Technical Architect
Think Tank 3
The identity security and threat landscape: What can we learn from today to protect the future?
Think Tank 3
The identity security and threat landscape: What can we learn from today to protect the future?
Chief Security Strategist
BeyondTrust
Think Tank 4
How to uplift your third party risk management approach (whilst saving time in the process)
Think Tank 4
How to uplift your third party risk management approach (whilst saving time in the process)
Cyber GRC Specialist
Grant Thornton Australia
Ask an Expert 1
Human factors in cyber security: Cultivating cybersecurity culture and cyber skills gap
Ask an Expert 1
Human factors in cyber security: Cultivating cybersecurity culture and cyber skills gap
Online Programs & Cybersecurity
La Trobe University
Plenary Theatre
Australia's Landmark Cyber Security Legislative Package
Plenary Theatre
Australia's Landmark Cyber Security Legislative Package
Director Critical Infrastructure Strategic Policy
Cyber and Infrastructure Security Group
Director Cyber Legislative Reforms
Cyber and Infrastructure Security Group
Melbourne Room 2
Cyber security essentials workshop: Managing, preventing and responding to attacks
Melbourne Room 2
Cyber security essentials workshop: Managing, preventing and responding to attacks
CEO & Managing Director
AUCyber
Strategic Adviser
CommandHub
Room 103
Beyond credentials and 2FA - A strong approach to MFA and secure identity
Room 103
Beyond credentials and 2FA - A strong approach to MFA and secure identity
Director
Spectral Cyber Security
Room 105
Empowering you with ATT&CK and D3FEND. A shared language to understand TTPs and driving action to disrupt the Kill Chain
Room 105
Empowering you with ATT&CK and D3FEND. A shared language to understand TTPs and driving action to disrupt the Kill Chain
Information Security consultant
QinetiQ
Room 106
A digital bedrock? A practical take on Australian Digital Identity Legislation and what this means for citizens and industry
Room 106
A digital bedrock? A practical take on Australian Digital Identity Legislation and what this means for citizens and industry
Customer Digital Identity Product Lead
National Australia Bank
Director, Digital Identity
Deloitte
Head of Product and Scheme, ConnectID
Australian Payments Plus
Room 204
Where does security intersect in assessing AI for Ethics and Governance and what is the IEEE AI Ethics Certification Program
Room 204
Where does security intersect in assessing AI for Ethics and Governance and what is the IEEE AI Ethics Certification Program
CSO/Principle AI Assessor
Sirius Matters Pty Ltd
Room 207
Effective security detections: From intent to action
Room 207
Effective security detections: From intent to action
Sr. Security Monitoring Architect
Telstra
Room 208
Future proofing your digital business security by design
Room 208
Future proofing your digital business security by design
Enterprise Architect for Cloud Security
NAB
Room 209
From commit to compromise: How attackers exploit DevOps pipeline
Room 209
From commit to compromise: How attackers exploit DevOps pipeline
Offensive Cyber Security Consultant
Irradiate Security
Room 211
Invasion of the body snatchers: Insidious insider
Room 211
Invasion of the body snatchers: Insidious insider
Head Of Cyber Security, Risk And Compliance
Regis Aged Care
Room 212
Blind spots in AI-Powered counterterrorism
Room 212
Blind spots in AI-Powered counterterrorism
Professor Of Law And Director, Centre Of Law As Protection
Deakin University
No results found.
There are no results with this criteria. Try changing your search.
Acknowledgement of Country
We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.
