Program Overview
Scroll down to view Full Program Details
Tuesday 26 November
08:00 - 09:00
Exhibition & Registration Opens with coffee and morning snack
09:00 - 09:30
Conference Opening
09:30 - 10:30
Keynote with Joe Sullivan
10:45 - 12:15
Concurrent sessions and workshops
12:15 - 13:35
Lunch
13:35 - 15:05
Concurrent sessions and workshops
15:05 - 15:50
Afternoon Tea
15:50 - 16:30
Concurrent sessions and workshops
16:45 - 17:45
Keynote with Jose Hernandez
17:45 - 18:45
Welcome Reception served in Exhibition Area
19:00 - 21:00
Movie night
19:00 - 22:30
AISA Awards Dinner
Wednesday 27 November
08:00 - 09:00
Exhibition Open with coffee and morning snack
09:00 - 09:15
Conference Opening
09:15 - 10:15
Keynote with Geoffrey Roberston KC: What the law has in store
10:15 - 12:00
Concurrent sessions and workshops
12:00 - 13:30
Lunch
13:35 - 15:05
Concurrent sessions and workshops
15:00 - 15:50
Afternoon Tea
15:50 - 17:20
Concurrent sessions and workshops
16:40 - 17:20
Keynote with Mikko Hypponen
17:15 - 18:30
Networking Drinks served in Exhibition Area
18:30 - 22:30
Block Party
Thursday 28 November
08:30 - 09:00
Exhibition & Registration Opens with coffee and morning snack
09:00 - 09:15
Conference Opening
09:00 - 10:00
Keynote with Nina Schick
10:15 - 11:45
Concurrent sessions and workshops
11:45 - 13:00
Lunch
13:00 - 15:20
Concurrent sessions and workshops
15:20 - 16:10
Afternoon Tea
16:10 - 17:20
A Conversation with Kal Penn
17:20 - 17:30
Conference close
Showing 0 of 100
Room 103
Future-proofing Zero Trust: Machine identities in the AI era
Room 103
Future-proofing Zero Trust: Machine identities in the AI era
Lead Identity Architect
Securoak
Room 104
What about the data subjects!? What cyber professionals need to know about emerging risks in online safety and the protection of individuals
Room 104
What about the data subjects!? What cyber professionals need to know about emerging risks in online safety and the protection of individuals
Director
KPMG
Partner
McGrathNicol
Room 105
A blueprint for ransomware defence
Room 105
A blueprint for ransomware defence
Director
Cyberrisk
Room 106
Power of mentoring: Showcase of the AWSN mentoring program
Room 106
Power of mentoring: Showcase of the AWSN mentoring program
Director Cyber Security
Dept. Premier and Cabinet WA
Executive Director
Australian Women in Security Network (AWSN)
Cyber Security Analyst
Dept. Communities and Justice (NSW)
Community Support Manager
OK RDY
Specialist
AWSN
Room 203
How NOT to run a security operation centre, a SOC manager’s perspective
Room 203
How NOT to run a security operation centre, a SOC manager’s perspective
Director, Cyber Security
Deakin University
Group Manager - Cyber Security Operations
Monash University
Room 204
Owning your cyber security mid-game strategy
Room 204
Owning your cyber security mid-game strategy
Senior Security Advisor
ExtraHop
Room 207
Beyond detection: Transforming threat intelligence into actionable attack surface reduction
Room 207
Beyond detection: Transforming threat intelligence into actionable attack surface reduction
Founder & CEO
CyberStash
Room 209
Secure by design: How DevSecOps supports data privacy compliance
Room 209
Secure by design: How DevSecOps supports data privacy compliance
Principal Product Manager
Microsoft
Room 210
Secure your own life jacket first: Escaping the ‘yes’ trap and prioritising well-being in cyber security
Room 210
Secure your own life jacket first: Escaping the ‘yes’ trap and prioritising well-being in cyber security
Project Manager
Cybermerc
Room 211
Pathways to cyber security in secondary schools
Room 211
Pathways to cyber security in secondary schools
Leading Teacher STEAM
Joseph Banks Secondary College
Room 212
Building a resilient cyber strategy - A roadmap for success
Room 212
Building a resilient cyber strategy - A roadmap for success
Head of Information Security Management
PEXA
Room 213
Enabling more effective risk management through risk quantification
Room 213
Enabling more effective risk management through risk quantification
Partner
EY
Director
EY
Room 216
A cyber security profession: what are we talking about?
Room 216
A cyber security profession: what are we talking about?
Porfessor Of Practice, Lifelong Learning
UNSW Canberra
Room 218
Privacy act overhaul: The intersection of data privacy and cyber security
Room 218
Privacy act overhaul: The intersection of data privacy and cyber security
Founder & CEO
de.iterate
Room 219
Leadership and vision in cyber defense: How security operations is evolving and what Executives need to know
Room 219
Leadership and vision in cyber defense: How security operations is evolving and what Executives need to know
Senior Director
Avanade
CEO
Cyber Leadership Institute
Room 220
Australian healthcare & legal industry: Navigating cyber threats in 2024
Room 220
Australian healthcare & legal industry: Navigating cyber threats in 2024
CEO & Managing Director
AUCyber
Think Tank 1
Cross-domain security in converged IT/OT
Think Tank 1
Cross-domain security in converged IT/OT
Security Leader
Amazon Web Services
Think Tank 2
Lessons learned from 100+ cyber incident response exercises with boards, executives and technical teams
Think Tank 2
Lessons learned from 100+ cyber incident response exercises with boards, executives and technical teams
Executive Director
CyberCX Pty Ltd
Think Tank 3
AI governance: Navigating the new wave of global standards and regulations
Think Tank 3
AI governance: Navigating the new wave of global standards and regulations
Manager
McGrathNicol
Think Tank 4
Qualifying the critical infrastructure attack surface
Think Tank 4
Qualifying the critical infrastructure attack surface
Ceo, Director
Mercury Information Security Services
Ask an Expert 1
Routes into cyber for mature career switchers
Ask an Expert 1
Routes into cyber for mature career switchers
Senior Consultant
Tesserent
Ask an Expert 2
Securing your application development in Microsoft Azure and Entra ID
Ask an Expert 2
Securing your application development in Microsoft Azure and Entra ID
Lead Software Engineer
Modern 42
Room 103
Social network botnet attack mitigation model for cloud
Room 103
Social network botnet attack mitigation model for cloud
Lecturer
La Trobe University
Room 104
Doing more with less – Managing spend without compromising on security
Room 104
Doing more with less – Managing spend without compromising on security
CISO
Ethan Global
Director
Cyber Security CAUDIT
No results found.
There are no results with this criteria. Try changing your search.
Acknowledgement of Country
We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.
