Cyber Security Infrastructure

Australian Cyber Conference 2024
26–28 November 2024
Melbourne Convention and Exhibition Centre (MCEC)

Sessions

26/11/2024
10:45
 - 
11:25
Ask your cloud security and compliance questions
Pouya Ghotbi
Ask an Expert 1
View details
26/11/2024
10:45
 - 
11:25
Cumulus secure: Navigating cloud security posture
Lynore Close
Think Tank 2
View details
26/11/2024
10:45
 - 
11:25
Making IAM invisible: accessibility, technology, and new opportunities
Aidan Turner
Room 103
View details
26/11/2024
11:35
 - 
12:15
One port to serve them all - Google GCP cloud shell abuse
Hubert Lin
Room 105
View details
26/11/2024
11:35
 - 
12:15
Conditional access to Copilot - securing M365 in 40 minutes or less
Sam Brazier-Hollins
Room 103
View details
26/11/2024
13:35
 - 
14:15
Future-proofing Zero Trust: Machine identities in the AI era
Anjani Sankar
Room 103
View details
26/11/2024
13:35
 - 
14:15
A blueprint for ransomware defence
Wayne Tufek
Room 105
View details
26/11/2024
13:35
 - 
14:15
Cross-domain security in converged IT/OT
Travis Quinn
Think Tank 1
View details
26/11/2024
14:25
 - 
15:05
The NetZero cyber security challenge
Sian John
Think Tank 4
View details
26/11/2024
14:25
 - 
15:05
Very Pwn-able Network (VPN) – The gift to hackers that keeps on giving!
Rodman Ramezanian
Room 105
View details
26/11/2024
14:25
 - 
15:05
Social network botnet attack mitigation model for cloud
Hooman Alavizadeh
Room 103
View details
26/11/2024
15:50
 - 
16:30
Building boardroom trust - Articulating the business impact of IAM investments with outcome-driven metrics
Narayana Madineni & Krishanu Sikdar
Room 105
View details
26/11/2024
15:50
 - 
16:30
Cloud boundaries redefined: Exploring the power of Security Service Edge (SSE)
Umu Guleid
Room 103
View details
26/11/2024
15:50
 - 
16:30
Uncharted territory: The art of hacking transportation - Planes, trains, and ships
Shahmeer Amir
Think Tank 4
View details
26/11/2024
15:50
 - 
16:30
Elevating identity management: strategic planning, building, and monitoring for unmatched security
Lee-Ann Dias, Sophie Wade, Taylah Rowe & Daniel Goffredo
Room 106
View details
26/11/2024
15:50
 - 
16:30
Goldilocks and the cyber risk disclosure porridge: Striking the right balance with disclosure of material cyber events
Denny Wan & Annie Haggar
Room 203
View details
27/11/2024
10:30
 - 
11:10
Digital ID in Australia – an update on the Digital ID Bill and progress in its implementation
Rajiv Shah
Room 103
View details
27/11/2024
10:30
 - 
11:10
Emerging challenges for CISOs in 2025 and beyond
Rene Morel
Room 105
View details
27/11/2024
10:30
 - 
11:10
Safeguarding the connected health revolution
Puneeta Chellaramani
Think Tank 2
View details
27/11/2024
10:30
 - 
11:10
How to build customs applications to extend Entra ID Sign-Up Flows and migrate your customer's digital identities
Alexander Cavalli
Ask an Expert 2
View details
27/11/2024
11:20
 - 
12:00
Mastering the art of attacking and defending a Kubernetes cluster
Sanjeev Mahajan
Room 103
View details
27/11/2024
11:20
 - 
12:00
Hunting in the dark: Detecting and disrupting DNS-based C2 traffic
Hubert Lin
Room 105
View details
27/11/2024
13:30
 - 
14:10
Turning DNS from your top threat vector to your most productive defender
Tim Hartman
Think Tank 3
View details
27/11/2024
13:30
 - 
14:10
The imperative of transitioning from traditional access control to modern access control
Ahmad Salehi Shahraki
Room 103
View details
27/11/2024
13:30
 - 
14:10
Account takeovers, fraudsters, booters, scrapers and how to find them
Adam Cassar & Daniel D'Alessandro
Room 105
View details
27/11/2024
14:20
 - 
15:00
How to avoid being the next data breach headline- Strategies that governments and corporates have adopted
David Brykman
Room 105
View details
27/11/2024
14:20
 - 
15:00
Email Security, our policies and how we make them work.
Leela Ross
Ask an Expert 1
View details
27/11/2024
14:20
 - 
15:00
Secure different: Securing macOS devices in an enterprise environment
Jed Laundry
Room 103
View details
27/11/2024
15:50
 - 
16:30
IoT and OT: Owning the risk on someone else's assets: Best practices for approaching IoT cyber risk
Leon Poggioli
Room 103
View details
27/11/2024
15:50
 - 
16:30
Adopting Cloud? How do you ensure positive security outcomes?
Peter Dowley
Room 105
View details
27/11/2024
15:50
 - 
16:30
Unleashing the power of IAM: Navigating the strategy maze
Anna-Lena Naumann, Ella Collings, Jeffrey Jambu & Rachael Hardy
Room 106
View details
28/11/2024
10:15
 - 
10:55
Fortifying the cloud: Current practices, emerging trends, and future strategies
Rimple Kapil
Room 105
View details
28/11/2024
10:15
 - 
10:55
Guardians of the inbox: Elevating email trust with SPF, DKIM, DMARC, and BIMI
Wayne Small
Room 103
View details
28/11/2024
11:05
 - 
11:45
Balancing the FUD factor in OT cyber security
Justin Nga
Room 103
View details
28/11/2024
11:05
 - 
11:45
Defending against evolving bad bots
Adam Cassar
Room 105
View details
28/11/2024
11:05
 - 
11:45
Laughing through the leaks: PII protection in the age of data breaches
Skye Wu, Kanchana Devi, Martin Dempster & Preethi Arjun
Room 106
View details
28/11/2024
13:00
 - 
13:40
Cyber-physical systems risk landscape and its impact on human safety
Jason Pearce
Room 103
View details
28/11/2024
13:00
 - 
13:40
Emergency access in the cloud - Unleashing breakglass accounts
Andrew Bain
Room 105
View details
28/11/2024
13:00
 - 
13:40
The identity security and threat landscape: What can we learn from today to protect the future?
Christopher Hills
Think Tank 3
View details
28/11/2024
13:50
 - 
14:30
A digital bedrock? A practical take on Australian Digital Identity Legislation and what this means for citizens and industry
Julie Gleeson, Linden Dawson & Natalie Reed
Room 106
View details
28/11/2024
13:50
 - 
14:30
How do I uplift my IAM reporting
Sophie Wade
Ask an Expert 1
View details
28/11/2024
13:50
 - 
14:30
The call is coming from inside the house - the ticking time bomb that is legacy cyber security technology
Simon Gribble
Think Tank 3
View details
28/11/2024
13:50
 - 
14:30
Beyond credentials and 2FA - A strong approach to MFA and secure identity
Randall Hughson
Room 103
View details
28/11/2024
13:50
 - 
14:30
Empowering you with ATT&CK and D3FEND. A shared language to understand TTPs and driving action to disrupt the Kill Chain
Nico Riquelme-Ramirez
Room 105
View details
28/11/2024
13:50
 - 
14:30
Passwordless authentication - Capturing the human element
Alex Wilson
Think Tank 1
View details
28/11/2024
14:40
 - 
15:20
Don't be late to the party
Supriya N
Think Tank 2
View details
28/11/2024
14:40
 - 
15:20
Success with Privileged Access Management - Its more than the tools
Ashley Coward
Room 103
View details

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country