Program Overview
Scroll down to view Full Program Details
Tuesday 26 November
08:00 - 09:00
Exhibition & Registration Opens with coffee and morning snack
09:00 - 09:30
Conference Opening
09:30 - 10:30
Keynote with Joe Sullivan
10:45 - 12:15
Concurrent sessions and workshops
12:15 - 13:35
Lunch
13:35 - 15:05
Concurrent sessions and workshops
15:05 - 15:50
Afternoon Tea
15:50 - 16:30
Concurrent sessions and workshops
16:45 - 17:45
Keynote with Jose Hernandez
17:45 - 18:45
Welcome Reception served in Exhibition Area
19:00 - 21:00
Movie night
19:00 - 22:30
AISA Awards Dinner
Wednesday 27 November
08:00 - 09:00
Exhibition Open with coffee and morning snack
09:00 - 09:15
Conference Opening
09:15 - 10:15
Keynote with Geoffrey Roberston KC: What the law has in store
10:15 - 12:00
Concurrent sessions and workshops
12:00 - 13:30
Lunch
13:35 - 15:05
Concurrent sessions and workshops
15:00 - 15:50
Afternoon Tea
15:50 - 17:20
Concurrent sessions and workshops
16:40 - 17:20
Keynote with Mikko Hypponen
17:15 - 18:30
Networking Drinks served in Exhibition Area
18:30 - 22:30
Block Party
Thursday 28 November
08:30 - 09:00
Exhibition & Registration Opens with coffee and morning snack
09:00 - 09:15
Conference Opening
09:00 - 10:00
Keynote with Nina Schick
10:15 - 11:45
Concurrent sessions and workshops
11:45 - 13:00
Lunch
13:00 - 15:20
Concurrent sessions and workshops
15:20 - 16:10
Afternoon Tea
16:10 - 17:20
A Conversation with Kal Penn
17:20 - 17:30
Conference close
Showing 0 of 100
Room 208
Doing more with less - DevSecOps with limited budget
Room 208
Doing more with less - DevSecOps with limited budget
Sr Manager - Application Security
Netskope
Room 210
L'affaire du télégraphe. The Bordeaux hackers of 1834
Room 210
L'affaire du télégraphe. The Bordeaux hackers of 1834
Head Of Cyber Security & Operations
Trusted Impact
Room 211
Transforming cyber security awareness training: From one-size-fits-all to targeted efficiency
Room 211
Transforming cyber security awareness training: From one-size-fits-all to targeted efficiency
Managing Director
caIT Cyber Safe
Room 212
Security awareness 2.0: The paradigm shift from training and simulations to engagement and culture
Room 212
Security awareness 2.0: The paradigm shift from training and simulations to engagement and culture
The Independent Cybersecurity Expert
Jacqueline Jayne
Room 213
Navigating the ripple effects: Lessons from a year of third-party breaches
Room 213
Navigating the ripple effects: Lessons from a year of third-party breaches
Manager
McGrathNicol
Senior Manager
McGrathNicol
Room 216
Data on the move: The hidden risks of employee turnover
Room 216
Data on the move: The hidden risks of employee turnover
Information Security Leader
State Trustees
Room 217
The new dawn: Cyber risks in an AI world
Room 217
The new dawn: Cyber risks in an AI world
Senior Fellow Partner
Social Cyber Group
Room 218
How cyber security can help you achieve B Corp certification and address UN sustainable development goals
Room 218
How cyber security can help you achieve B Corp certification and address UN sustainable development goals
Chief Realist (CEO)
Phronesis Security
Room 219
Cyber regulation readiness - Preparing for global cyber rules
Room 219
Cyber regulation readiness - Preparing for global cyber rules
Director, Cyber Resilience Practice
Kyndryl
Room 220
An architected cyber security management process model integrated with maturity and effectiveness measurement
Room 220
An architected cyber security management process model integrated with maturity and effectiveness measurement
Researcher
Deakin University
Associate Professor
Deakin University
Think Tank 1
Fact or fiction? Navigating the AI-Infested information seas
Think Tank 1
Fact or fiction? Navigating the AI-Infested information seas
Cyber Security Consultant
Phronesis Security
Think Tank 3
APRA CPS230 - Can you be ready?
Think Tank 3
APRA CPS230 - Can you be ready?
Vice President GTM Strategy
Processunity
Think Tank 4
Boost cyber security resourcing with a strategic mindset change
Think Tank 4
Boost cyber security resourcing with a strategic mindset change
Principal Project Manager
CyberCX
Ask an Expert 2
Getting Into the Weeds: Solving Your Cyber GRC Problems
Ask an Expert 2
Getting Into the Weeds: Solving Your Cyber GRC Problems
Head Of Advisory Services
Skylight Cyber
Plenary Theatre
Clash of Threats and Our Response
Plenary Theatre
Clash of Threats and Our Response
Deputy Secretary
Cyber and Infrastructure Security Department of Home Affairs
Melbourne Room 2
Mindset mastery: Balancing mental health in a high stakes incident response team
Melbourne Room 2
Mindset mastery: Balancing mental health in a high stakes incident response team
Cyber Response Primary Investigator
Accenture
Managing Partner
Cyber Resilience Group
Cyber Response Primary Investigator
Accenture
Cyber Response Senior Analyst
Accenture
Global Engagement Management Lead - Cyber Response
Accenture
Room 103
IoT and OT: Owning the risk on someone else's assets: Best practices for approaching IoT cyber risk
Room 103
IoT and OT: Owning the risk on someone else's assets: Best practices for approaching IoT cyber risk
ANZ Regional Director
Claroty
Room 104
The changing threat landscape of hacktivism
Room 104
The changing threat landscape of hacktivism
Cyber Security Evangelist
Check Point Software Technologies
Room 105
Adopting Cloud? How do you ensure positive security outcomes?
Room 105
Adopting Cloud? How do you ensure positive security outcomes?
Field CISO
Broadcom
Room 106
Unleashing the power of IAM: Navigating the strategy maze
Room 106
Unleashing the power of IAM: Navigating the strategy maze
Cyber Strategy Consultant
Accenture
Market Development Lead
Accenture
Security Delivery Senior Manager
Accenture
Cyber Security Consultant
Accenture
Room 203
A cyber journey around the world - Are we ready for a cyber war?
Room 203
A cyber journey around the world - Are we ready for a cyber war?
WA Committee member
AISA
CISO
Cyberproof
Room 204
The art of cognition: Empowering defenders with attacker mindsets
Room 204
The art of cognition: Empowering defenders with attacker mindsets
Chief Information Security Officer
Cyber Cognition
Room 207
Mature your detection capabilities - Evolve your SIEM and know your priorities
Room 207
Mature your detection capabilities - Evolve your SIEM and know your priorities
Cyber Security Consulting Lead
Crayon
Room 208
The vulnerability game: Mastering the art of vulnerability management
Room 208
The vulnerability game: Mastering the art of vulnerability management
Head Of Technology & Cyber Risk
Funding societies
No results found.
There are no results with this criteria. Try changing your search.
Acknowledgement of Country
We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.
