Program Overview
Scroll down to view Full Program Details
Tuesday 26 November
08:00 - 09:00
Exhibition & Registration Opens with coffee and morning snack
09:00 - 09:30
Conference Opening
09:30 - 10:30
Keynote with Joe Sullivan
10:45 - 12:15
Concurrent sessions and workshops
12:15 - 13:35
Lunch
13:35 - 15:05
Concurrent sessions and workshops
15:05 - 15:50
Afternoon Tea
15:50 - 16:30
Concurrent sessions and workshops
16:45 - 17:45
Keynote with Jose Hernandez
17:45 - 18:45
Welcome Reception served in Exhibition Area
19:00 - 21:00
Movie night
19:00 - 22:30
AISA Awards Dinner
Wednesday 27 November
08:00 - 09:00
Exhibition Open with coffee and morning snack
09:00 - 09:15
Conference Opening
09:15 - 10:15
Keynote with Geoffrey Roberston KC: What the law has in store
10:15 - 12:00
Concurrent sessions and workshops
12:00 - 13:30
Lunch
13:35 - 15:05
Concurrent sessions and workshops
15:00 - 15:50
Afternoon Tea
15:50 - 17:20
Concurrent sessions and workshops
16:40 - 17:20
Keynote with Mikko Hypponen
17:15 - 18:30
Networking Drinks served in Exhibition Area
18:30 - 22:30
Block Party
Thursday 28 November
08:30 - 09:00
Exhibition & Registration Opens with coffee and morning snack
09:00 - 09:15
Conference Opening
09:00 - 10:00
Keynote with Nina Schick
10:15 - 11:45
Concurrent sessions and workshops
11:45 - 13:00
Lunch
13:00 - 15:20
Concurrent sessions and workshops
15:20 - 16:10
Afternoon Tea
16:10 - 17:20
A Conversation with Kal Penn
17:20 - 17:30
Conference close
Showing 0 of 100
Room 204
Points A through to Q - R: Strategies for moving Australian organisations towards better cryptography (including Quantum-Resistance)
Room 204
Points A through to Q - R: Strategies for moving Australian organisations towards better cryptography (including Quantum-Resistance)
Managing Director / Principal Consultant
Bespoke IT Pty Ltd
Room 207
Creating cyber threat intelligence like a journalist
Room 207
Creating cyber threat intelligence like a journalist
CTO
Cosive
Room 208
Lessons from building a single pane of AppSec glass
Room 208
Lessons from building a single pane of AppSec glass
CEO
Logilica
Room 209
How to develop an AppSec program from ground up and some key learnings
Room 209
How to develop an AppSec program from ground up and some key learnings
Senior Cyber Security Professional
Bunnings
Room 210
Why mentoring secondary school students in cyber security is a good idea
Room 210
Why mentoring secondary school students in cyber security is a good idea
Leading Teacher STEAM
Joseph Banks Secondary College
Cyber Advisory Lead
Mantel Group
Room 211
Keeping our kids safe online: The essential information for parents and caregivers
Room 211
Keeping our kids safe online: The essential information for parents and caregivers
The Independent Cybersecurity Expert
Jacqueline Jayne
Room 212
Where worlds collide – The intersection between cyber security and climate change
Room 212
Where worlds collide – The intersection between cyber security and climate change
State Director, NSW
Trustwave
Room 216
The psychology of cybercrime - Part III
Room 216
The psychology of cybercrime - Part III
Security Awareness Manager
Room 218
A model for delivering your cyber risk message to leadership and the board using the SMEACS briefing model
Room 218
A model for delivering your cyber risk message to leadership and the board using the SMEACS briefing model
Chief Information Security Officer
Tesserent Cyber Services
Room 219
Is security by design now the governance standard expected for company directors?
Room 219
Is security by design now the governance standard expected for company directors?
Cyber Security Risk Management Professional
Room 220
A CISO's playbook for achieving ISO 42001 certification to secure the benefits of AI
Room 220
A CISO's playbook for achieving ISO 42001 certification to secure the benefits of AI
Founder And CISO
6clicks
Think Tank 1
Teaching the intelligence bits of CTI
Think Tank 1
Teaching the intelligence bits of CTI
Product Owner Cyber Threat Intelligence
ANZ
Think Tank 2
Who you're gonna call? Your Cyber-000
Think Tank 2
Who you're gonna call? Your Cyber-000
Chief Executive Officer
Allied Assurance Pty Ltd
Think Tank 3
Digital accessibility and cyber security: 2 pillars or poles apart?
Think Tank 3
Digital accessibility and cyber security: 2 pillars or poles apart?
Cyber Senior Product Manager
Telstra
Think Tank 4
CRITICAL NEXUS: The role of policy and cybersecurity in critical infrastructure resilience
Think Tank 4
CRITICAL NEXUS: The role of policy and cybersecurity in critical infrastructure resilience
Cybersecurity Officer
Iberdrola Australia
Ask an Expert 2
How to land your first cyber security job in 2024
Ask an Expert 2
How to land your first cyber security job in 2024
Founder
GRC Mastery
Plenary Theatre
Featured Speaker Brendan Dowling
Plenary Theatre
Featured Speaker Brendan Dowling
Ambassador for Cyber Affairs and Critical Technology
Department of Foreign Affairs and Trade
Melbourne Room 2
Surviving and thriving in SecOps: A conversation with two experts
Melbourne Room 2
Surviving and thriving in SecOps: A conversation with two experts
Cloud Solution Architect
Microsoft
Cloud Solution Architect
Microsoft
Senior Director
Avanade
Room 103
The imperative of transitioning from traditional access control to modern access control
Room 103
The imperative of transitioning from traditional access control to modern access control
Lecturer In Cybersecurity
La Trobe University
Room 104
Zero to hero: Protect critical infrastructure from top floor to the plant floor
Room 104
Zero to hero: Protect critical infrastructure from top floor to the plant floor
Chief Product Officer
Opswat
Room 105
Account takeovers, fraudsters, booters, scrapers and how to find them
Room 105
Account takeovers, fraudsters, booters, scrapers and how to find them
Co-Founder
Peakhour
Director of Performance
Peakhour.io
Room 106
Building a cyber champion in a NFP
Room 106
Building a cyber champion in a NFP
Director
IdentityXP
Chair
Reasonable Security Institute
Head of Information Security and Compliance
Barnardos Australia
Room 203
Keep your enemies closer: the future is in Red Team Ops
Room 203
Keep your enemies closer: the future is in Red Team Ops
Director & Principal Consultant
Redacted Information Security
Room 204
Even large language models can't understand privacy policies: Towards building LLM-based solutions to make privacy policies more user-friendlier
Room 204
Even large language models can't understand privacy policies: Towards building LLM-based solutions to make privacy policies more user-friendlier
Doctoral Student
The University Of Sydney
No results found.
There are no results with this criteria. Try changing your search.
Acknowledgement of Country
We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.
