26/11/2024
10:45
-
11:25
Making IAM invisible: accessibility, technology, and new opportunities
Room 103
26/11/2024
11:35
-
12:15
Conditional access to Copilot - securing M365 in 40 minutes or less
Room 103
26/11/2024
11:35
-
12:15
One port to serve them all - Google GCP cloud shell abuse
Room 105
26/11/2024
13:35
-
14:15
Future-proofing Zero Trust: Machine identities in the AI era
Room 103
26/11/2024
13:35
-
14:15
Securing your application development in Microsoft Azure and Entra ID
Ask an Expert 2
26/11/2024
14:25
-
15:05
Very Pwn-able Network (VPN) – The gift to hackers that keeps on giving!
Room 105
26/11/2024
15:50
-
16:30
Cloud boundaries redefined: Exploring the power of Security Service Edge (SSE)
Room 103
26/11/2024
15:50
-
16:30
Building boardroom trust - Articulating the business impact of IAM investments with outcome-driven metrics
Room 105
26/11/2024
15:50
-
16:30
Elevating identity management: strategic planning, building, and monitoring for unmatched security
Room 106
26/11/2024
15:50
-
16:30
Goldilocks and the cyber risk disclosure porridge: Striking the right balance with disclosure of material cyber events
Room 203
26/11/2024
15:50
-
16:30
Uncharted territory: The art of hacking transportation - Planes, trains, and ships
Think Tank 4
27/11/2024
10:30
-
11:10
Digital ID in Australia – an update on the Digital ID Bill and progress in its implementation
Room 103
27/11/2024
10:30
-
11:10
How to build customs applications to extend Entra ID Sign-Up Flows and migrate your customer's digital identities
Ask an Expert 2
27/11/2024
11:20
-
12:00
Mastering the art of attacking and defending a Kubernetes cluster
Room 103
27/11/2024
11:20
-
12:00
Hunting in the dark: Detecting and disrupting DNS-based C2 traffic
Room 105
27/11/2024
13:30
-
14:10
The imperative of transitioning from traditional access control to modern access control
Room 103
27/11/2024
13:30
-
14:10
Account takeovers, fraudsters, booters, scrapers and how to find them
Room 105
27/11/2024
13:30
-
14:10
Turning DNS from your top threat vector to your most productive defender
Think Tank 3
27/11/2024
14:20
-
15:00
Secure different: Securing macOS devices in an enterprise environment
Room 103
27/11/2024
14:20
-
15:00
How to avoid being the next data breach headline- Strategies that governments and corporates have adopted
Room 105
27/11/2024
14:20
-
15:00
Email Security, our policies and how we make them work.
Ask an Expert 1
27/11/2024
15:50
-
16:30
IoT and OT: Owning the risk on someone else's assets: Best practices for approaching IoT cyber risk
Room 103
27/11/2024
15:50
-
16:30
Adopting Cloud? How do you ensure positive security outcomes?
Room 105
27/11/2024
15:50
-
16:30
Unleashing the power of IAM: Navigating the strategy maze
Room 106
28/11/2024
10:15
-
10:55
Guardians of the inbox: Elevating email trust with SPF, DKIM, DMARC, and BIMI
Room 103
28/11/2024
10:15
-
10:55
Fortifying the cloud: Current practices, emerging trends, and future strategies
Room 105
28/11/2024
11:05
-
11:45
Laughing through the leaks: PII protection in the age of data breaches
Room 106
28/11/2024
13:00
-
13:40
Cyber-physical systems risk landscape and its impact on human safety
Room 103
28/11/2024
13:00
-
13:40
Emergency access in the cloud - Unleashing breakglass accounts
Room 105
28/11/2024
13:00
-
13:40
The identity security and threat landscape: What can we learn from today to protect the future?
Think Tank 3
28/11/2024
13:50
-
14:30
Beyond credentials and 2FA - A strong approach to MFA and secure identity
Room 103
28/11/2024
13:50
-
14:30
Empowering you with ATT&CK and D3FEND. A shared language to understand TTPs and driving action to disrupt the Kill Chain
Room 105
28/11/2024
13:50
-
14:30
A digital bedrock? A practical take on Australian Digital Identity Legislation and what this means for citizens and industry
Room 106
28/11/2024
13:50
-
14:30
Passwordless authentication - Capturing the human element
Think Tank 1
28/11/2024
13:50
-
14:30
The call is coming from inside the house - the ticking time bomb that is legacy cyber security technology
Think Tank 3
28/11/2024
14:40
-
15:20
Success with Privileged Access Management - Its more than the tools
Room 103
28/11/2024
14:40
-
15:20
How a reasonably competent threat actor disrupts Australian infrastructure (…and society)
Room 105