Program Overview
Scroll down to view Full Program Details
Tuesday 26 November
08:00 - 09:00
Exhibition & Registration Opens with coffee and morning snack
09:00 - 09:30
Conference Opening
09:30 - 10:30
Keynote with Joe Sullivan
10:45 - 12:15
Concurrent sessions and workshops
12:15 - 13:35
Lunch
13:35 - 15:05
Concurrent sessions and workshops
15:05 - 15:50
Afternoon Tea
15:50 - 16:30
Concurrent sessions and workshops
16:45 - 17:45
Keynote with Jose Hernandez
17:45 - 18:45
Welcome Reception served in Exhibition Area
19:00 - 21:00
Movie night
19:00 - 22:30
AISA Awards Dinner
Wednesday 27 November
08:00 - 09:00
Exhibition Open with coffee and morning snack
09:00 - 09:15
Conference Opening
09:15 - 10:15
Keynote with Geoffrey Roberston KC: What the law has in store
10:15 - 12:00
Concurrent sessions and workshops
12:00 - 13:30
Lunch
13:35 - 15:05
Concurrent sessions and workshops
15:00 - 15:50
Afternoon Tea
15:50 - 17:20
Concurrent sessions and workshops
16:40 - 17:20
Keynote with Mikko Hypponen
17:15 - 18:30
Networking Drinks served in Exhibition Area
18:30 - 22:30
Block Party
Thursday 28 November
08:30 - 09:00
Exhibition & Registration Opens with coffee and morning snack
09:00 - 09:15
Conference Opening
09:00 - 10:00
Keynote with Nina Schick
10:15 - 11:45
Concurrent sessions and workshops
11:45 - 13:00
Lunch
13:00 - 15:20
Concurrent sessions and workshops
15:20 - 16:10
Afternoon Tea
16:10 - 17:20
A Conversation with Kal Penn
17:20 - 17:30
Conference close
Showing 0 of 100
Room 203
AI and DFIR: A match made in cyber heaven or a recipe for digital disaster?
Room 203
AI and DFIR: A match made in cyber heaven or a recipe for digital disaster?
Managing Director
SoteriaSec
Room 204
Ineffable cryptography – Manifesting unobtainable secrets
Room 204
Ineffable cryptography – Manifesting unobtainable secrets
Co-Founder / CEO
Tide Foundation
Room 207
Game-on (Part 2): 16-bit Adventures of a Security Analyst
Room 207
Game-on (Part 2): 16-bit Adventures of a Security Analyst
Principal SOC Analyst
Huntress
Room 208
Be a security champion: Uplifting the security culture in development teams
Room 208
Be a security champion: Uplifting the security culture in development teams
Managing Consultant, Application Security
CyberCX
Executive Director
CyberCX Pty Ltd
Room 210
All about Enigma - a demo and talk on its design, build, compromise and driving the birth of computing
Room 210
All about Enigma - a demo and talk on its design, build, compromise and driving the birth of computing
Director Curator
Espionage Museum Australia
Room 211
Beyond boring bytes: From oops to oh yeah!
Room 211
Beyond boring bytes: From oops to oh yeah!
Cyber Security Consultant
Phronesis Security
Room 212
Forging forward: The grit and grace of cyber entrepreneurship in the Australian cyber landscape
Room 212
Forging forward: The grit and grace of cyber entrepreneurship in the Australian cyber landscape
Consultant
Independant
Room 213
Unraveling the unseen: Unconscious bias in cyber security hiring
Room 213
Unraveling the unseen: Unconscious bias in cyber security hiring
Customer Success/Information Security Manager
Retrospect Labs
Manager, Cyber SecOps and Incident Response
East Metropolitan Health Service
Room 216
How to drive true behaviour change through a tailored communication approach
Room 216
How to drive true behaviour change through a tailored communication approach
Cyber Resilience Lead
South32
Room 217
The Privacy Act - obligations, changes and where to next
Room 217
The Privacy Act - obligations, changes and where to next
Data Privacy Lead
CSO Group
Room 218
To insert, swipe or touch: A credit card dilemma
Room 218
To insert, swipe or touch: A credit card dilemma
Consultant - Governance, Risk and Compliance
CyberCX
Room 219
From retaliation to deterrence: Redefining cyber security in the age of digital conflict
Room 219
From retaliation to deterrence: Redefining cyber security in the age of digital conflict
Manager
Deloitte
Senior Manager
Deloitte
Think Tank 1
Why is cyber incident response so expensive and what can I do about it?
Think Tank 1
Why is cyber incident response so expensive and what can I do about it?
CEO
Solis Security / CFC Response
Think Tank 2
Safeguarding the connected health revolution
Think Tank 2
Safeguarding the connected health revolution
Senior Executive Director
Capgemini
Think Tank 3
Crisis management: A once in a lifetime security incident and your response
Think Tank 3
Crisis management: A once in a lifetime security incident and your response
Regional Head of Information Security (APAC)
ISS World Services A/S
Think Tank 4
Are humans about to be replaced by AI? We think not!
Think Tank 4
Are humans about to be replaced by AI? We think not!
Associate Director
KPMG
Ask an Expert 2
How to build customs applications to extend Entra ID Sign-Up Flows and migrate your customer's digital identities
Ask an Expert 2
How to build customs applications to extend Entra ID Sign-Up Flows and migrate your customer's digital identities
Senior Software Developer
Modern 42
Plenary Theatre
A lawyer, a hacker, a journalist and an executive walk into a cyber crisis: Future proofing through a multidisciplinary approach
Plenary Theatre
A lawyer, a hacker, a journalist and an executive walk into a cyber crisis: Future proofing through a multidisciplinary approach
Partner and Head of Cybersecurity - Australia
Norton Rose Fulbright
Director & Principal Consultant
Redacted Information Security
Federal Government Lead
Wipro Australia
Managing Director
Novexus Pty Ltd
Managing Director
Hemisphere East
Melbourne Room 2
Pie in the sky no more – Have your pie and eat it too! Doubling down on successful cyber strategy
Melbourne Room 2
Pie in the sky no more – Have your pie and eat it too! Doubling down on successful cyber strategy
Associate Director
Accenture
Director of Policy
Cyber Security Cooperative Research Centre - Australia
Managing Director
Accenture
Chief Information Security Officer
Australian Digital Health Agency
Room 103
Mastering the art of attacking and defending a Kubernetes cluster
Room 103
Mastering the art of attacking and defending a Kubernetes cluster
Principal Security Engineer
SYBER Services
Room 104
From data to defence: Using OSINT to build resilience across critical infrastructure supply chains
Room 104
From data to defence: Using OSINT to build resilience across critical infrastructure supply chains
Head Intelligence Services
OSINT Combine
Room 105
Hunting in the dark: Detecting and disrupting DNS-based C2 traffic
Room 105
Hunting in the dark: Detecting and disrupting DNS-based C2 traffic
Sr. Staff Researcher
Netskope
Room 106
What Australia's most vulnerable postcodes can tell us about cybercrime
Room 106
What Australia's most vulnerable postcodes can tell us about cybercrime
Manager, Outreach & Education
IDCare
Head of Production
IDCARE
Community Engagement Coordinator
IDCARE Australia
Room 203
The rise and rise of advanced eCrime threat - Incident Response edition
Room 203
The rise and rise of advanced eCrime threat - Incident Response edition
Sr Manager - Incident Response
CrowdStrike
No results found.
There are no results with this criteria. Try changing your search.
Acknowledgement of Country
We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.
