Program Overview
Scroll down to view Full Program Details
Tuesday 26 November
08:00 - 09:00
Exhibition & Registration Opens with coffee and morning snack
09:00 - 09:30
Conference Opening
09:30 - 10:30
Keynote with Joe Sullivan
10:45 - 12:15
Concurrent sessions and workshops
12:15 - 13:35
Lunch
13:35 - 15:05
Concurrent sessions and workshops
15:05 - 15:50
Afternoon Tea
15:50 - 16:30
Concurrent sessions and workshops
16:45 - 17:45
Keynote with Jose Hernandez
17:45 - 18:45
Welcome Reception served in Exhibition Area
19:00 - 21:00
Movie night
19:00 - 22:30
AISA Awards Dinner
Wednesday 27 November
08:00 - 09:00
Exhibition Open with coffee and morning snack
09:00 - 09:15
Conference Opening
09:15 - 10:15
Keynote with Geoffrey Roberston KC: What the law has in store
10:15 - 12:00
Concurrent sessions and workshops
12:00 - 13:30
Lunch
13:35 - 15:05
Concurrent sessions and workshops
15:00 - 15:50
Afternoon Tea
15:50 - 17:20
Concurrent sessions and workshops
16:40 - 17:20
Keynote with Mikko Hypponen
17:15 - 18:30
Networking Drinks served in Exhibition Area
18:30 - 22:30
Block Party
Thursday 28 November
08:30 - 09:00
Exhibition & Registration Opens with coffee and morning snack
09:00 - 09:15
Conference Opening
09:00 - 10:00
Keynote with Nina Schick
10:15 - 11:45
Concurrent sessions and workshops
11:45 - 13:00
Lunch
13:00 - 15:20
Concurrent sessions and workshops
15:20 - 16:10
Afternoon Tea
16:10 - 17:20
A Conversation with Kal Penn
17:20 - 17:30
Conference close
Showing 0 of 100
Room 105
Very Pwn-able Network (VPN) – The gift to hackers that keeps on giving!
Room 105
Very Pwn-able Network (VPN) – The gift to hackers that keeps on giving!
Global Cloud Threat Lead
Skyhigh Security
Room 106
Weathering cyber-incident storms: practical management of lawyers and closing down ransom republication - lessons from Optus and HWL Ebsworth litigation
Room 106
Weathering cyber-incident storms: practical management of lawyers and closing down ransom republication - lessons from Optus and HWL Ebsworth litigation
Principal & Professor of Practice
UNSW Business School & Data Synergies
Principal
Law & Cyber
Legal Counsel
CyberCX
Room 203
Taming Threats: A symphony of two worlds – Paper trail meets threat trail
Room 203
Taming Threats: A symphony of two worlds – Paper trail meets threat trail
Cyber Security Consultant
Phronesis Security
Founder
Zybersec
Room 204
Unlocking the power of threat intelligence infused detections in the SOC
Room 204
Unlocking the power of threat intelligence infused detections in the SOC
Senior Security Solution Architect - APAC
Splunk Inc.
Room 207
Measures and metrics: How to report on more than just the SOC
Room 207
Measures and metrics: How to report on more than just the SOC
Cyber Security Consultant
Phronesis Security
Room 208
The state of the cyber security architecture community in Australia
Room 208
The state of the cyber security architecture community in Australia
Principal Cyber Security Architect
B Large
Room 209
Navigating the perils of software supply chain attacks
Room 209
Navigating the perils of software supply chain attacks
Cybersecurity Solutions Architect Cloud and DevOps APAC
Qualys
Room 210
How phishing can actually build trust in the workplace (true story!)
Room 210
How phishing can actually build trust in the workplace (true story!)
Security Community Lead
SPY internetworking / spy.net
Room 211
The top 10 skills your security awareness and culture person must have with no IT or cyber skills in sight
Room 211
The top 10 skills your security awareness and culture person must have with no IT or cyber skills in sight
The Independent Cybersecurity Expert
Jacqueline Jayne
Head of Security Awareness
Medibank
Room 212
They can't hack it, if you don't have it!
Room 212
They can't hack it, if you don't have it!
Industry Engagement and Strategy Lead
AvePoint
Room 213
When and why to insource your offensive security team
Room 213
When and why to insource your offensive security team
Senior Red Team Manager
TPG Telecom
Room 216
What we now know about burnout in cyber security
Room 216
What we now know about burnout in cyber security
Founder
Cybermindz.org
Room 217
How MSPs can solve the cyber security crisis for SMB/SME
Room 217
How MSPs can solve the cyber security crisis for SMB/SME
Executive Coach - Cybersecurity
Pax8
Room 218
Cyber & AUKUS: Driving innovation through national security
Room 218
Cyber & AUKUS: Driving innovation through national security
Managing Director
Hemisphere East
Room 219
Cerebro-Level defense: A Cyber security framework that works (Cerebro is the X-Men's mutant-detecting device)
Room 219
Cerebro-Level defense: A Cyber security framework that works (Cerebro is the X-Men's mutant-detecting device)
Ce/to
DBS Cyber LLC
CPO
DBS Cyber LLC
Room 220
Let’s write an exploit using AI
Room 220
Let’s write an exploit using AI
Manager Solution Architects EMEA/APAC
Veracode
Think Tank 1
Boldly going secure: Cyber security voyage for directors, SME's and charities
Think Tank 1
Boldly going secure: Cyber security voyage for directors, SME's and charities
Special Counsel
Seeing Machines
Think Tank 2
It's time to move on (from manual controls testing)
Think Tank 2
It's time to move on (from manual controls testing)
Snr. Cyber Risk Advisor
Ethan
Think Tank 4
The NetZero cyber security challenge
Think Tank 4
The NetZero cyber security challenge
Chief Technology Officer
Ncc Group
Ask an Expert 1
Demystifying the Assessment & Authorisation (A&A) Journey for Secure Systems
Ask an Expert 1
Demystifying the Assessment & Authorisation (A&A) Journey for Secure Systems
APAC ISO
Lockheed Martin
Room 103
Cloud boundaries redefined: Exploring the power of Security Service Edge (SSE)
Room 103
Cloud boundaries redefined: Exploring the power of Security Service Edge (SSE)
Solutions Engineer
Cisco Systems Australia
Room 104
Both sides – What do directors and cyber security professional needs from each other
Room 104
Both sides – What do directors and cyber security professional needs from each other
Cyber and Technology Risk Specialist, ANZ - FINEX
WTW
Australia / New Zealand Cyber Security Consulting Leader
Wtw
Room 105
Building boardroom trust - Articulating the business impact of IAM investments with outcome-driven metrics
Room 105
Building boardroom trust - Articulating the business impact of IAM investments with outcome-driven metrics
Security Technical Specialist | Master Inventor
IBM Security
Cybersecurity Portfolio Lead for ANZ Region
Capgemini
Room 106
Elevating identity management: strategic planning, building, and monitoring for unmatched security
Room 106
Elevating identity management: strategic planning, building, and monitoring for unmatched security
Director
Sasbri Consulting
CEO
Modern 42
Cyber Security Specialist
Australian Redcross Lifeblood
Cybersecurity Manager
Microsoft
No results found.
There are no results with this criteria. Try changing your search.
Acknowledgement of Country
We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.
