Showing 0 of 100
Room 103
Conditional access to Copilot - securing M365 in 40 minutes or less
Head of Technical Consulting
Fujitsu Cyber Security Services
Room 104
Lessons from the Law – What are reasonable steps in the context of cyber security, data privacy, and incident response?
Principal
Gilchrist Connell
Room 105
One port to serve them all - Google GCP cloud shell abuse
Sr. Staff Researcher
Netskope
Room 106
Designing and developing a metaverse experience to build cyber-harm awareness
Senior Lecturer
Deakin University
Software Engineer
Deakin University
Lecturer
Deakin University
Senior Officer, Communications and Outreach
Deakin University
Room 203
Ctrl Alt Defeat: A comedy of errors in higher Ed cyber security
Head Of Security
Village Roadshow
Technical Lead, Cybersecurity
Village Roadshow
Room 204
Hiding in plain sight: How sub domain attacks use your email authentication against you
Cyber Security Specialist
Cisco Systems
Room 207
How safe is safe? Exploring the vitality of physical security in an ever-evolving world and its parallels to cyber security
Principal Security Consultant
CyberCX
Room 208
In the business of DevSecOps: Enhancing resilience and reducing time to market
Partner – Cyber Security & Privacy Risk Services
RSM Australia
Technology Information Security Officer
Commonwealth Bank Of Australia
Room 209
Project strange: Reviving the internet's lost ideals with an Open Source Creation - IAM reimagined
Global Tiso / Snr Director Of Cybersecurity
Bugcrowd
Security Engineer
BugCrowd
Room 210
Bringing the Smart Brevity concept to cyber awareness communications
Cyber Awareness and Outreach Manager
Monash University
Room 211
Continuing to build a cyber resilient society: No one left behind
Online Programs & Cybersecurity
La Trobe University
Room 212
The 4 Ws of disinformation: What, who, why, and what we can do about it?
Managing Director
Novexus Pty Ltd
Room 213
Attributes of a high-performing CISO: An action plan for aspiring leaders
Ciso
7 Rules Cyber
Consultant
Independant
Room 216
Invasion of the body snatchers: Insidious insider
Head Of Cyber Security, Risk And Compliance
Regis Aged Care
Room 217
The future of GRC is here - Just unevenly distributed
Principal Consultant - GRC
CyberCX
Room 218
Hybrid threats: A threat to commercial organisations
Director Of RMIT CCSRI
RMIT Univerisity
Room 219
The preservation of complexity: Why securing the digital world is getting harder, and what to do about it
Co-Founder and CEO
Cydarm Technologies
Room 220
Beyond reality - The Deepfake challenge
Ai & Data Security Lead
Accenture
Think Tank 1
Cyber Threat Intelligence is a "nice to have" – Wrong, it's a "must have"!
Director Of Global Threat Intelligence
NCC Group
Think Tank 2
From chef to cyber security: Exploring non-technical roles, human capabilities, and beyond
Security Analyst
Think Tank 3
Advancing the cyber security sector: Pathway to a diverse and inclusive cyber security workforce
CEO
Aya Leadership
Think Tank 4
Critical infrastructure: Lessons learned from the cyber battlefield
ANZ Regional Director
Claroty
Ask an Expert 1
Getting better insights from penetration tests; An introduction to threat modelling
Penetration Tester
Proactive Labs
Room 103
Future-proofing Zero Trust: Machine identities in the AI era
Lead Identity Architect
Securoak
No results found.
There are no results with this criteria. Try changing your search.