Showing 0 of 100
Room 204
Even large language models can't understand privacy policies: Towards building LLM-based solutions to make privacy policies more user-friendlier
Doctoral Student
The University Of Sydney
Room 207
What happens on day 2?
National Security Practice Manager
Data#3
Room 208
Learning from insecure architectures: applying opposite thinking
Security Architect
Room 209
How delving into hacking has made me a better (more secure) programmer
Head Of Architecture
miniOrange
Room 210
From bedside to boardroom: How considering individuals from varying backgrounds can complement your cyber security capability
Strategic Advisory Consultant
CyberCX
Room 211
Cyber awareness in education
Cyber Education Consultant
Cyber Unicorns
Cofounder and Director (Head Unicorn)
Cyber Unicorns
Room 212
Weaving archival threads into SABSA's security fabric
Principal Consultant
Votar Partners
Room 213
The cyber response playbook - Structuring an effective human approach
Director
Spectral Cyber Security
Room 216
Stranger danger: Your digital footprint, using you against you
eLearning Instructional Designer
Phriendly Phishing / CyberCx
Content Specialist
Phriendly Phishing
Room 217
Cyber due diligence - do's and don'ts
Senior Director, Cybersecurity
FTI Consulting
Head Of Cybersecurity
FTI Consulting
Room 218
Old threats, new faces: Navigating the persistent and ever-changing third-party cyber security landscape
Senior Partner
Tesserent
Room 219
Notification overload: From legislative intent to consumer fatigue
Managing Director
Scyne Advisory
Director
Germane Advisory
Room 220
Generative AI powered information warfare: How to customize highly nuanced but convincing misinformation and disinformation, and how to mitigate them
Generative AI & Cybersecurity Research Strategist
Cyberoo Pty Ltd
Business Analyst
Cyberoo Pty Ltd
Think Tank 1
Recruitment and employment of autistic people in cyber: The advantages of inclusion and divergent thinking
It Business Partner
PEXA
Think Tank 2
SingHealth Attack: A story of its relevance for the world and Australia
Cyber GRC Specialist
Sportsbet
Think Tank 3
Turning DNS from your top threat vector to your most productive defender
HEAD OF SOLUTIONS ARCHITECT - ANZ
Infoblox
Think Tank 4
OSINT in action: Creating meaningful solutions through hackathons
Project Officer
Cygenus Pty Ltd
Ask an Expert 1
How to get your dream job with "FIGMA" companies. (Facebook, IBM, Google, Microsoft, Amazon)
Chief Cybersecurity Advisor
Microsoft
Ask an Expert 2
Ask an Expert stream - Talk to a digital forensic analyst
Certified Instructor/Principal Investigator
SANS/CyberCX
Plenary Theatre
Featured Speaker Dan Tripovich
Assistant Director-General Incident Management, Cyber Threat Intelligence Division
Australian Signals Directorate
Melbourne Room 2
Psychology in cyber security - Creating a safer world together
College of Organisational Psychologists WA State Chair/Director
Australian Psychological Society/Lauriate
Phd Researcher
Edith Cowan University
Chair Aps College Of Organisational Psychology
Australian Psychological Society
Room 103
Secure different: Securing macOS devices in an enterprise environment
Senior Manager, Security
CyberCX
Room 104
Defending critical infrastructure from insider threats: An interactive walkthrough
Customer Solutions Manager
Dtex Systems
Director
Pentagram Advisory
No results found.
There are no results with this criteria. Try changing your search.