Showing 0 of 100
Room 105
Very Pwn-able Network (VPN) – The gift to hackers that keeps on giving!
Global Cloud Threat Lead
Skyhigh Security
Room 106
Weathering cyber-incident storms: practical management of lawyers and closing down ransom republication - lessons from Optus and HWL Ebsworth litigation
Principal & Professor of Practice
UNSW Business School & Data Synergies
Principal
Law & Cyber
Legal Counsel
CyberCX
Room 203
Taming Threats: A symphony of two worlds – Paper trail meets threat trail
Cyber Security Consultant
Phronesis Security
Founder
Zybersec
Room 204
Unlocking the power of threat intelligence infused detections in the SOC
Senior Security Solution Architect - APAC
Splunk Inc.
Room 207
Measures and metrics: How to report on more than just the SOC
Cyber Security Consultant
Phronesis Security
Room 209
Navigating the perils of software supply chain attacks
Cybersecurity Solutions Architect Cloud and DevOps APAC
Qualys
Room 210
How phishing can actually build trust in the workplace (true story!)
Security Community Lead
SPY internetworking / spy.net
Room 211
The top 10 skills your security awareness and culture person must have with no IT or cyber skills in sight
The Independent Cybersecurity Expert
Jacqueline Jayne
Head of Security Awareness
Medibank
Room 212
They can't hack it, if you don't have it!
Industry Engagement and Strategy Lead
AvePoint
Room 213
When and why to insource your offensive security team
Senior Red Team Manager
TPG Telecom
Room 216
What we now know about burnout in cyber security
Founder
Cybermindz.org
Room 217
How MSPs can solve the cyber security crisis for SMB/SME
Executive Coach - Cybersecurity
Pax8
Room 218
Cyber & AUKUS: Driving innovation through national security
Managing Director
Hemisphere East
Room 219
Cerebro-Level defense: A Cyber security framework that works (Cerebro is the X-Men's mutant-detecting device)
Ce/to
DBS Cyber LLC
CPO
DBS Cyber LLC
Room 220
Let’s write an exploit using AI
Manager Solution Architects EMEA/APAC
Veracode
Think Tank 1
Boldly going secure: Cyber security voyage for directors, SME's and charities
Special Counsel
FAL Lawyers
Think Tank 2
It's time to move on (from manual controls testing)
Snr. Cyber Risk Advisor
Ethan
Think Tank 4
The NetZero cyber security challenge
Chief Technology Officer
Ncc Group
Ask an Expert 1
Demystifying the Assessment & Authorisation (A&A) Journey for Secure Systems
APAC ISO
Lockheed Martin
Room 103
Cloud boundaries redefined: Exploring the power of Security Service Edge (SSE)
Solutions Engineer
Cisco Systems Australia
Room 104
Both sides – What do directors and cyber security professional needs from each other
Cyber and Technology Risk Specialist, ANZ - FINEX
WTW
Australia / New Zealand Cyber Security Consulting Leader
Wtw
Room 105
Building boardroom trust - Articulating the business impact of IAM investments with outcome-driven metrics
Security Technical Specialist | Master Inventor
IBM Security
Cybersecurity Portfolio Lead for ANZ Region
Capgemini
Room 106
Elevating identity management: strategic planning, building, and monitoring for unmatched security
Director
Sasbri Consulting
CEO
Modern Methodologies Pty Ltd
Cyber Security Specialist
Australian Redcross Lifeblood
Cybersecurity Manager
Microsoft
Room 203
Goldilocks and the cyber risk disclosure porridge: Striking the right balance with disclosure of material cyber events
Chair
Reasonable Security Institute
Partner and Head of Cybersecurity - Australia
Norton Rose Fulbright
No results found.
There are no results with this criteria. Try changing your search.