Program Overview
Scroll down to view Full Program Details
Tuesday 26 November
08:00 - 09:00
Exhibition & Registration Opens with coffee and morning snack
09:00 - 09:30
Conference Opening
09:30 - 10:30
Keynote with Joe Sullivan
10:45 - 12:15
Concurrent sessions and workshops
12:15 - 13:35
Lunch
13:35 - 15:05
Concurrent sessions and workshops
15:05 - 15:50
Afternoon Tea
15:50 - 16:30
Concurrent sessions and workshops
16:45 - 17:45
Keynote with Jose Hernandez
17:45 - 18:45
Welcome Reception served in Exhibition Area
19:00 - 21:00
Movie night
19:00 - 22:30
AISA Awards Dinner
Wednesday 27 November
08:00 - 09:00
Exhibition Open with coffee and morning snack
09:00 - 09:15
Conference Opening
09:15 - 10:15
Keynote with Geoffrey Roberston KC: What the law has in store
10:15 - 12:00
Concurrent sessions and workshops
12:00 - 13:30
Lunch
13:35 - 15:05
Concurrent sessions and workshops
15:00 - 15:50
Afternoon Tea
15:50 - 17:20
Concurrent sessions and workshops
16:40 - 17:20
Keynote with Mikko Hypponen
17:15 - 18:30
Networking Drinks served in Exhibition Area
18:30 - 22:30
Block Party
Thursday 28 November
08:30 - 09:00
Exhibition & Registration Opens with coffee and morning snack
09:00 - 09:15
Conference Opening
09:00 - 10:00
Keynote with Nina Schick
10:15 - 11:45
Concurrent sessions and workshops
11:45 - 13:00
Lunch
13:00 - 15:20
Concurrent sessions and workshops
15:20 - 16:10
Afternoon Tea
16:10 - 17:20
A Conversation with Kal Penn
17:20 - 17:30
Conference close
Showing 0 of 100
Room 207
Incident Response: What Happens on Day 2?
Room 207
Incident Response: What Happens on Day 2?
National Security Practice Manager
Data#3
Room 208
Learning from insecure architectures: applying opposite thinking
Room 208
Learning from insecure architectures: applying opposite thinking
Security Architect
Room 209
How delving into hacking has made me a better (more secure) programmer
Room 209
How delving into hacking has made me a better (more secure) programmer
Head Of Architecture
miniOrange
Room 210
From bedside to boardroom: How considering individuals from varying backgrounds can complement your cyber security capability
Room 210
From bedside to boardroom: How considering individuals from varying backgrounds can complement your cyber security capability
Strategic Advisory Consultant
CyberCX
Room 211
Cyber awareness in education
Room 211
Cyber awareness in education
Cyber Education Consultant
Cyber Unicorns
Cofounder and Director (Head Unicorn)
Cyber Unicorns
Room 212
Weaving archival threads into SABSA's security fabric
Room 212
Weaving archival threads into SABSA's security fabric
Principal Consultant
Votar Partners
Room 213
The cyber response playbook - Structuring an effective human approach
Room 213
The cyber response playbook - Structuring an effective human approach
Director
Spectral Cyber Security
Room 216
Stranger danger: Your digital footprint, using you against you
Room 216
Stranger danger: Your digital footprint, using you against you
eLearning Instructional Designer
Phriendly Phishing / CyberCx
Content Specialist
Phriendly Phishing
Room 217
Cyber due diligence - do's and don'ts
Room 217
Cyber due diligence - do's and don'ts
Senior Director, Cybersecurity
FTI Consulting
Head Of Cybersecurity
FTI Consulting
Room 218
Old threats, new faces: Navigating the persistent and ever-changing third-party cyber security landscape
Room 218
Old threats, new faces: Navigating the persistent and ever-changing third-party cyber security landscape
Senior Partner
Tesserent
Room 219
Notification overload: From legislative intent to consumer fatigue
Room 219
Notification overload: From legislative intent to consumer fatigue
Managing Director
Scyne Advisory
Director
Germane Advisory
Room 220
Generative AI powered information warfare: How to customize highly nuanced but convincing misinformation and disinformation, and how to mitigate them
Room 220
Generative AI powered information warfare: How to customize highly nuanced but convincing misinformation and disinformation, and how to mitigate them
Generative AI & Cybersecurity Research Strategist
Cyberoo Pty Ltd
Business Analyst
Cyberoo Pty Ltd
Think Tank 1
Recruitment and employment of autistic people in cyber: The advantages of inclusion and divergent thinking
Think Tank 1
Recruitment and employment of autistic people in cyber: The advantages of inclusion and divergent thinking
It Business Partner
PEXA
Think Tank 2
SingHealth Attack: A story of its relevance for the world and Australia
Think Tank 2
SingHealth Attack: A story of its relevance for the world and Australia
Cyber GRC Specialist
Sportsbet
Think Tank 3
Turning DNS from your top threat vector to your most productive defender
Think Tank 3
Turning DNS from your top threat vector to your most productive defender
Head of Solutions Architect - ANZ
Infoblox
Ask an Expert 1
How to get your dream job with "FIGMA" companies. (Facebook, IBM, Google, Microsoft, Amazon)
Ask an Expert 1
How to get your dream job with "FIGMA" companies. (Facebook, IBM, Google, Microsoft, Amazon)
Chief Cybersecurity Advisor
Microsoft
Ask an Expert 2
Ask an Expert stream - Talk to a digital forensic analyst
Ask an Expert 2
Ask an Expert stream - Talk to a digital forensic analyst
Certified Instructor/Principal Investigator
SANS/CyberCX
Plenary Theatre
Featured Speaker Dan Tripovich
Plenary Theatre
Featured Speaker Dan Tripovich
Assistant Director-General Incident Management, Cyber Threat Intelligence Division
Australian Signals Directorate
Melbourne Room 2
Psychology in cyber security - Creating a safer world together
Melbourne Room 2
Psychology in cyber security - Creating a safer world together
College of Organisational Psychologists WA State Chair/Director
Australian Psychological Society/Lauriate
Phd Researcher
Edith Cowan University
CEO
APS
Room 103
Secure different: Securing macOS devices in an enterprise environment
Room 103
Secure different: Securing macOS devices in an enterprise environment
Senior Manager, Security
CyberCX
Room 105
How to avoid being the next data breach headline- Strategies that governments and corporates have adopted
Room 105
How to avoid being the next data breach headline- Strategies that governments and corporates have adopted
CEO
Bryk Group
Room 106
Welcome to the Panopticon: The creep of smart surveillance - Navigating your risks, rights and duties
Room 106
Welcome to the Panopticon: The creep of smart surveillance - Navigating your risks, rights and duties
Professor of Law and Director
University of Melbourne and Centre for AI and Digital Ethics
President
AUSCL Australasian Society for Computers & Law
Partner
Thomson Geer
No results found.
There are no results with this criteria. Try changing your search.
Acknowledgement of Country
We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.
