Showing 0 of 100
Room 207
Game-on (Part 2): 16-bit Adventures of a Security Analyst
Principal SOC Analyst
Huntress
Room 208
Be a security champion: Uplifting the security culture in development teams
Managing Consultant, Application Security
CyberCX
Executive Director
CyberCX Pty Ltd
Room 209
Enhancing cyber security through scalable and resilient architectural strategies
Cyberspecialist - ANZ
Cisco
Room 210
All about Enigma - a demo and talk on its design, build, compromise and driving the birth of computing
Director Curator
Espionage Museum Australia
Room 211
Beyond boring bytes: From oops to oh yeah!
Cyber Security Consultant
Phronesis Security
Room 212
Forging forward: The grit and grace of cyber entrepreneurship in the Australian cyber landscape
Ciso
7 Rules Cyber
Consultant
Independant
Room 213
Unraveling the unseen: Unconscious bias in cyber security hiring
Customer Success/Information Security Manager
Retrospect Labs
Manager, Cyber SecOps and Incident Response
East Metropolitan Health Service
Room 216
How to drive true behaviour change through a tailored communication approach
Cyber Resilience Lead
South32
Room 217
The Privacy Act - obligations, changes and where to next
Data Privacy Lead
CSO Group
Room 218
To insert, swipe or touch: A credit card dilemma
Consultant - Governance, Risk and Compliance
CyberCX
Room 219
From retaliation to deterrence: Redefining cyber security in the age of digital conflict
Manager
Deloitte
Senior Manager
Deloitte
Think Tank 1
Why is cyber incident response so expensive and what can I do about it?
CEO
Solis Security / CFC Response
Think Tank 2
Safeguarding the connected health revolution
Senior Executive Director
Capgemini
Think Tank 3
Crisis management: A once in a lifetime security incident and your response
Regional Head of Information Security (APAC)
ISS World Services A/S
Think Tank 4
Are humans about to be replaced by AI? We think not!
Associate Director
KPMG
Ask an Expert 1
Breaking barriers: A deep dive into bypassing next-gen 2FA and MFA security measures
CEO
Speeqr
Ask an Expert 2
How to build customs applications to extend Entra ID Sign-Up Flows and migrate your customer's digital identities
Senior Software Developer
Modern Methodologies
Plenary Theatre
A lawyer, a hacker, a journalist and an executive walk into a cyber crisis: Future proofing through a multidisciplinary approach
Partner and Head of Cybersecurity - Australia
Norton Rose Fulbright
Director & Principal Consultant
Redacted Information Security
Federal Government Lead
Wipro Australia
Managing Director
Novexus Pty Ltd
Managing Director
Hemisphere East
Melbourne Room 2
Pie in the sky no more – Have your pie and eat it too! Doubling down on successful cyber strategy
Associate Director
Accenture
Director of Policy
Cyber Security Cooperative Research Centre - Australia
Managing Director
Accenture
Room 103
Mastering the art of attacking and defending a Kubernetes cluster
Principal Security Engineer
SYBER Services
Room 104
From data to defence: Using OSINT to build resilience across critical infrastructure supply chains
Head Intelligence Services
OSINT Combine
Room 105
Hunting in the dark: Detecting and disrupting DNS-based C2 traffic
Sr. Staff Researcher
Netskope
Room 106
What Australia's most vulnerable postcodes can tell us about cybercrime
Manager, Outreach & Education
IDCare
Head of Production
IDCARE
Community Engagement Coordinator
IDCARE Australia
No results found.
There are no results with this criteria. Try changing your search.