Emerging Technologies

Australian Cyber Conference 2024
26–28 November 2024
Melbourne Convention and Exhibition Centre (MCEC)

Sessions

26/11/2024
10:45
 - 
11:25
Quantum resilience: A trustworthy internet in the post-quantum era
Syed W Shah & Robin Doss
Room 220
View details
26/11/2024
11:35
 - 
12:15
Beyond reality - The Deepfake challenge
Sieg Lafon
Room 220
View details
26/11/2024
13:35
 - 
14:15
Australian healthcare & legal industry: Navigating cyber threats in 2024
Peter Maloney
Room 220
View details
26/11/2024
14:25
 - 
15:05
Let’s write an exploit using AI
Julian Totzek-Hallhuber
Room 220
View details
26/11/2024
15:50
 - 
16:30
Deep intellectual property protection: Watermarking AI models
Yuan Zhao & Lynna Leong
Room 220
View details
26/11/2024
15:50
 - 
16:30
The return of the jailbreak: Prompt injection 101
Welbie Chan
Think Tank 2
View details
26/11/2024
15:50
 - 
16:30
Harnessing GenAI: Navigating the double-edged sword in cyber security
Pragati Mehrotra Malik
Think Tank 3
View details
27/11/2024
10:30
 - 
11:10
Ineffable cryptography – Manifesting unobtainable secrets
Michael Loewy
Room 204
View details
27/11/2024
10:30
 - 
11:10
Protecting and jailbreaking LLM systems: Insights gained from a wargame
Pedram Hayati
Room 220
View details
27/11/2024
10:30
 - 
11:10
Are humans about to be replaced by AI? We think not!
Mandy Ho
Think Tank 4
View details
27/11/2024
11:20
 - 
12:00
A CISO's playbook for achieving ISO 42001 certification to secure the benefits of AI
Andrew Robinson
Room 220
View details
27/11/2024
11:20
 - 
12:00
Points A through to Q - R: Strategies for moving Australian organisations towards better cryptography (including Quantum-Resistance)
Stewart Walters
Room 204
View details
27/11/2024
13:30
 - 
14:10
Even large language models can't understand privacy policies: Towards building LLM-based solutions to make privacy policies more user-friendlier
Bhanuka Pinchahewage
Room 204
View details
27/11/2024
13:30
 - 
14:10
Generative AI powered information warfare: How to customize highly nuanced but convincing misinformation and disinformation, and how to mitigate them
Timothy McIntosh & Sherry Wu
Room 220
View details
27/11/2024
14:20
 - 
15:00
Fact or fiction? Navigating the AI-Infested information seas
Emily Tabet
Think Tank 1
View details
27/11/2024
14:20
 - 
15:00
An architected cyber security management process model integrated with maturity and effectiveness measurement
Mengying (Marina) Liu & William Yeoh
Room 220
View details
27/11/2024
14:20
 - 
15:00
AI-Powered cyber threats - A new era of challenges
Abdullah Muhammad
Room 204
View details
27/11/2024
14:20
 - 
15:00
Shadow AI & secure AI-Powered SaaS applications
Tom Pieterse
Think Tank 2
View details
27/11/2024
15:50
 - 
16:30
Balancing AI innovation and security - A guide to AI security governance
Daniela Fernandez
Room 220
View details
27/11/2024
15:50
 - 
16:30
Continuous threat exposure management - A convergence of AI / ML & threat exposure management
Mayur Kriplani
Think Tank 3
View details
27/11/2024
15:50
 - 
16:30
The art of cognition: Empowering defenders with attacker mindsets
Michael Collins
Room 204
View details
28/11/2024
10:15
 - 
10:55
Decoupling and decentralising authority
Matthew Skerritt
Room 204
View details
28/11/2024
10:15
 - 
10:55
Nothing stays secret forever. Tech advances, codes get broken. Quantum's just the latest exploit. Wish I hadn't missed that
Alexey Bocharnikov
Room 220
View details
28/11/2024
11:05
 - 
11:45
Skynet vs. your data: A cyber security smackdown
Elizabeth Stephens & Daniele Henderson
Room 204
View details
28/11/2024
11:05
 - 
11:45
From code to westworld-like crises: A future-is-now strategy for containing emerging threats of radicalized robotics and Artificial General Intelligence (AGI)
Timothy McIntosh & Malka Halgamuge
Room 220
View details
28/11/2024
11:05
 - 
11:45
Embracing Post-Quantum Cryptography: Strategies for Cryptographic Agility in Product Security
Avesta Hojjati
Ask an Expert 2
View details
28/11/2024
11:05
 - 
11:45
AI-Driven cyber security defense and offense
Rohit Borekar
Think Tank 3
View details
28/11/2024
11:05
 - 
11:45
Zero trust for private 5G networks
Puneeta Chellaramani
Think Tank 1
View details
28/11/2024
13:00
 - 
13:40
Machine learning poisoning: How attackers can manipulate AI models for malicious purposes
Shahmeer Amir
Room 220
View details
28/11/2024
13:00
 - 
13:40
Can Aussie cyber security turbocharge cooperative autonomous adventures in the land down under?
Shabnam Kasra
Room 204
View details
28/11/2024
13:50
 - 
14:30
Tony Stark's AI assistant: From vision to secure execution
Sieg Lafon & Tennyson Yuan
Room 220
View details
28/11/2024
13:50
 - 
14:30
Where does security intersect in assessing AI for Ethics and Governance and what is the IEEE AI Ethics Certification Program
Joseph Dalessandro
Room 204
View details
28/11/2024
13:50
 - 
14:30
The AI arms race: Defending Australia with automated cyber resilience
Shawn Thompson
Think Tank 2
View details
28/11/2024
14:40
 - 
15:20
MITRE ATLAS: Defend and protect your AI-enabled systems with tools and community collaboration for AI security and assurance
Christina Liaghati
Room 220
View details
28/11/2024
14:40
 - 
15:20
Leveraging AI for kids
Abigail Fitzgerald
Room 204
View details

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country