Program Overview
Scroll down to view Full Program Details
Tuesday 26 November
08:00 - 09:00
Exhibition & Registration Opens with coffee and morning snack
09:00 - 09:30
Conference Opening
09:30 - 10:30
Keynote with Joe Sullivan
10:45 - 12:15
Concurrent sessions and workshops
12:15 - 13:35
Lunch
13:35 - 15:05
Concurrent sessions and workshops
15:05 - 15:50
Afternoon Tea
15:50 - 16:30
Concurrent sessions and workshops
16:45 - 17:45
Keynote with Jose Hernandez
17:45 - 18:45
Welcome Reception served in Exhibition Area
19:00 - 21:00
Movie night
19:00 - 22:30
AISA Awards Dinner
Wednesday 27 November
08:00 - 09:00
Exhibition Open with coffee and morning snack
09:00 - 09:15
Conference Opening
09:15 - 10:15
Keynote with Geoffrey Roberston KC: What the law has in store
10:15 - 12:00
Concurrent sessions and workshops
12:00 - 13:30
Lunch
13:35 - 15:05
Concurrent sessions and workshops
15:00 - 15:50
Afternoon Tea
15:50 - 17:20
Concurrent sessions and workshops
16:40 - 17:20
Keynote with Mikko Hypponen
17:15 - 18:30
Networking Drinks served in Exhibition Area
18:30 - 22:30
Block Party
Thursday 28 November
08:30 - 09:00
Exhibition & Registration Opens with coffee and morning snack
09:00 - 09:15
Conference Opening
09:00 - 10:00
Keynote with Nina Schick
10:15 - 11:45
Concurrent sessions and workshops
11:45 - 13:00
Lunch
13:00 - 15:20
Concurrent sessions and workshops
15:20 - 16:10
Afternoon Tea
16:10 - 17:20
A Conversation with Kal Penn
17:20 - 17:30
Conference close
Showing 0 of 100
Ask an Expert 2
Spoofing commands - Can you trust process creation logs?
Ask an Expert 2
Spoofing commands - Can you trust process creation logs?
Security Researcher
Seamless Intelligence
Room 103
Conditional access to Copilot - securing M365 in 40 minutes or less
Room 103
Conditional access to Copilot - securing M365 in 40 minutes or less
Head of Technical Consulting
Fujitsu Cyber Security Services
Room 104
Lessons from the Law – What are reasonable steps in the context of cyber security, data privacy, and incident response?
Room 104
Lessons from the Law – What are reasonable steps in the context of cyber security, data privacy, and incident response?
Principal
Gilchrist Connell
Managing Director - Technology
FTI Consulting
Room 105
One port to serve them all - Google GCP cloud shell abuse
Room 105
One port to serve them all - Google GCP cloud shell abuse
Sr. Staff Researcher
Netskope
Room 106
Designing and developing a metaverse experience to build cyber-harm awareness
Room 106
Designing and developing a metaverse experience to build cyber-harm awareness
Senior Lecturer
Deakin University
Software Engineer
Deakin University
Lecturer
Deakin University
Senior Officer, Communications and Outreach
Deakin University
Room 204
Hiding in plain sight: How sub domain attacks use your email authentication against you
Room 204
Hiding in plain sight: How sub domain attacks use your email authentication against you
Cyber Security Specialist
Cisco Systems
Room 207
How safe is safe? Exploring the vitality of physical security in an ever-evolving world and its parallels to cyber security
Room 207
How safe is safe? Exploring the vitality of physical security in an ever-evolving world and its parallels to cyber security
Principal Security Consultant
CyberCX
Room 208
In the business of DevSecOps: Enhancing resilience and reducing time to market
Room 208
In the business of DevSecOps: Enhancing resilience and reducing time to market
Partner – Cyber Security & Privacy Risk Services
RSM Australia
Technology Information Security Officer
Commonwealth Bank Of Australia
Room 209
Project strange: Reviving the internet's lost ideals with an Open Source Creation - IAM reimagined
Room 209
Project strange: Reviving the internet's lost ideals with an Open Source Creation - IAM reimagined
Global Tiso / Snr Director Of Cybersecurity
Bugcrowd
Security Engineer
BugCrowd
Room 210
Bringing the Smart Brevity concept to cyber awareness communications
Room 210
Bringing the Smart Brevity concept to cyber awareness communications
Cyber Awareness and Outreach Manager
Monash University
Room 211
Continuing to build a cyber resilient society: No one left behind
Room 211
Continuing to build a cyber resilient society: No one left behind
Online Programs & Cybersecurity
La Trobe University
Room 212
The 4 Ws of disinformation: What, who, why, and what we can do about it?
Room 212
The 4 Ws of disinformation: What, who, why, and what we can do about it?
Managing Director
Novexus Pty Ltd
Room 213
Attributes of a high-performing CISO: An action plan for aspiring leaders
Room 213
Attributes of a high-performing CISO: An action plan for aspiring leaders
Consultant
Independant
Room 216
Strategic lessons from wartime innovation: A blueprint for cyber resilience
Room 216
Strategic lessons from wartime innovation: A blueprint for cyber resilience
Chief Cyber Security Strategist
McGrathNicol
Room 217
The future of GRC is here - Just unevenly distributed
Room 217
The future of GRC is here - Just unevenly distributed
Principal Consultant - GRC
CyberCX
Room 218
Hybrid threats: A threat to commercial organisations
Room 218
Hybrid threats: A threat to commercial organisations
Director Of RMIT CCSRI
RMIT Univerisity
Room 219
The preservation of complexity: Why securing the digital world is getting harder, and what to do about it
Room 219
The preservation of complexity: Why securing the digital world is getting harder, and what to do about it
Co-Founder and CEO
Cydarm Technologies
Room 220
Beyond reality - The Deepfake challenge
Room 220
Beyond reality - The Deepfake challenge
Ai & Data Security Lead
Accenture
Think Tank 1
Cyber Threat Intelligence is a "nice to have" – Wrong, it's a "must have"!
Think Tank 1
Cyber Threat Intelligence is a "nice to have" – Wrong, it's a "must have"!
Director Of Global Threat Intelligence
NCC Group
Think Tank 2
From chef to cyber security: Exploring non-technical roles, human capabilities, and beyond
Think Tank 2
From chef to cyber security: Exploring non-technical roles, human capabilities, and beyond
Security Analyst
Think Tank 3
Advancing the cyber security sector: Pathway to a diverse and inclusive cyber security workforce
Think Tank 3
Advancing the cyber security sector: Pathway to a diverse and inclusive cyber security workforce
CEO
Aya Leadership
Think Tank 4
Critical infrastructure: Lessons learned from the cyber battlefield
Think Tank 4
Critical infrastructure: Lessons learned from the cyber battlefield
ANZ Regional Director
Claroty
Ask an Expert 1
Getting better insights from penetration tests; An introduction to threat modelling
Ask an Expert 1
Getting better insights from penetration tests; An introduction to threat modelling
Penetration Tester
Proactive Labs
Plenary Theatre
Managing technology risk in an era of hyper-connectivity
Plenary Theatre
Managing technology risk in an era of hyper-connectivity
First Assistant Secretary Cyber and Technology Security Policy
Department of Home Affairs
No results found.
There are no results with this criteria. Try changing your search.
Acknowledgement of Country
We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.
