Program Overview
Scroll down to view Full Program Details
Tuesday 26 November
08:00 - 09:00
Exhibition & Registration Opens with coffee and morning snack
09:00 - 09:30
Conference Opening
09:30 - 10:30
Keynote with Joe Sullivan
10:45 - 12:15
Concurrent sessions and workshops
12:15 - 13:35
Lunch
13:35 - 15:05
Concurrent sessions and workshops
15:05 - 15:50
Afternoon Tea
15:50 - 16:30
Concurrent sessions and workshops
16:45 - 17:45
Keynote with Jose Hernandez
17:45 - 18:45
Welcome Reception served in Exhibition Area
19:00 - 21:00
Movie night
19:00 - 22:30
AISA Awards Dinner
Wednesday 27 November
08:00 - 09:00
Exhibition Open with coffee and morning snack
09:00 - 09:15
Conference Opening
09:15 - 10:15
Keynote with Geoffrey Roberston KC: What the law has in store
10:15 - 12:00
Concurrent sessions and workshops
12:00 - 13:30
Lunch
13:35 - 15:05
Concurrent sessions and workshops
15:00 - 15:50
Afternoon Tea
15:50 - 17:20
Concurrent sessions and workshops
16:40 - 17:20
Keynote with Mikko Hypponen
17:15 - 18:30
Networking Drinks served in Exhibition Area
18:30 - 22:30
Block Party
Thursday 28 November
08:30 - 09:00
Exhibition & Registration Opens with coffee and morning snack
09:00 - 09:15
Conference Opening
09:00 - 10:00
Keynote with Nina Schick
10:15 - 11:45
Concurrent sessions and workshops
11:45 - 13:00
Lunch
13:00 - 15:20
Concurrent sessions and workshops
15:20 - 16:10
Afternoon Tea
16:10 - 17:20
A Conversation with Kal Penn
17:20 - 17:30
Conference close
Showing 0 of 100
Room 213
How do we make decisions in cybersecurity? Operational, tactical, and strategic decision-making in the age of AI
Room 213
How do we make decisions in cybersecurity? Operational, tactical, and strategic decision-making in the age of AI
General Manager / Sr Lecturer
AusCERT / UQ
Room 217
Essential 8 and compliance culture
Room 217
Essential 8 and compliance culture
Managing Director
Uplift Security Pty Ltd
Room 218
Strengthening corporate security: The critical role of vendor validation
Room 218
Strengthening corporate security: The critical role of vendor validation
Manager - Governance, Compliance And Strategy
Quality Management Australia/ Cyber Dame
Room 219
Unlocking business value: The transformative role of the security Governance, Risk, and Compliance (GRC) team
Room 219
Unlocking business value: The transformative role of the security Governance, Risk, and Compliance (GRC) team
Senior Security Compliance Analyst
Zendesk
Room 220
Tony Stark's AI assistant: From vision to secure execution
Room 220
Tony Stark's AI assistant: From vision to secure execution
Ai & Data Security Lead
Accenture
ANZ AI Security Consulting Lead
Accenture
Think Tank 1
Passwordless authentication - Capturing the human element
Think Tank 1
Passwordless authentication - Capturing the human element
Director Solution Engineering
Yubico
Think Tank 2
The AI arms race: Defending Australia with automated cyber resilience
Think Tank 2
The AI arms race: Defending Australia with automated cyber resilience
Managing Director
Cyber Express
Think Tank 3
The call is coming from inside the house - the ticking time bomb that is legacy cyber security technology
Think Tank 3
The call is coming from inside the house - the ticking time bomb that is legacy cyber security technology
Partner
Deloitte
Think Tank 4
From biggest threats to greatest assets: Collective vigilance through leveraging the entire workforce
Think Tank 4
From biggest threats to greatest assets: Collective vigilance through leveraging the entire workforce
Senior Consultant
KPMG
Ask an Expert 1
How do I uplift my IAM reporting
Ask an Expert 1
How do I uplift my IAM reporting
CEO
Modern 42
Ask an Expert 2
Are you an effective team? Creating resilient individuals and teams in cybersecurity
Ask an Expert 2
Are you an effective team? Creating resilient individuals and teams in cybersecurity
College of Organisational Psychologists WA State Chair/Director
Australian Psychological Society/Lauriate
Melbourne Room 2
Beyond the headlines: Why cyber security remains an afterthought for many
Melbourne Room 2
Beyond the headlines: Why cyber security remains an afterthought for many
Head of Security Awareness
Medibank
Change Management
AWSN
Managing Director
ITR Australia
Room 103
Success with Privileged Access Management - Its more than the tools
Room 103
Success with Privileged Access Management - Its more than the tools
IAM & PAM SME
Modern 42
Room 105
How a reasonably competent threat actor disrupts Australian infrastructure (…and society)
Room 105
How a reasonably competent threat actor disrupts Australian infrastructure (…and society)
Cyber Security Technical Consultant
NTT DATA
Room 106
Cyber consulting room - CyberCon Edition - Threat Intel Led TableTop Exercises
Room 106
Cyber consulting room - CyberCon Edition - Threat Intel Led TableTop Exercises
Host
Cyber Consulting Room
Security Technical Specialist, Founder at Kids SecuriDay
Microsoft
Chief Pessimist
Phronesis Security
Room 203
SOC200 and Threat Hunting with Kali Purple
Room 203
SOC200 and Threat Hunting with Kali Purple
Cdev
Offensive Security
Developer
OffSec
Room 207
Adaptive threat intelligence: Predicting the unpredictable
Room 207
Adaptive threat intelligence: Predicting the unpredictable
Manager
Deloitte
Specialist Senior Manager
Deloitte
Room 208
Automation as a key to Essential Eight compliance success
Room 208
Automation as a key to Essential Eight compliance success
Cloud & Cybersecurity Consultant
Cevo
Room 210
The human firewall assuring your resilience
Room 210
The human firewall assuring your resilience
Chief Executive Officer
Allied Assurance Pty Ltd
Room 211
Cyber security awareness training reimagined
Room 211
Cyber security awareness training reimagined
GRC Manager & Security Officer
Cushman & Wakefield
Room 212
My SME's journey to SMB1001 certification: Is cybersecurity certification worthwhile for your SME?
Room 212
My SME's journey to SMB1001 certification: Is cybersecurity certification worthwhile for your SME?
Director
The Detail Department
Room 213
From crisis to control: A look back at cyber incident response strategies in 2024
Room 213
From crisis to control: A look back at cyber incident response strategies in 2024
Chief Cyber Security Strategist
McGrathNicol
Partner
McGrathNicol
No results found.
There are no results with this criteria. Try changing your search.
Acknowledgement of Country
We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.
