Secure by Design

Australian Cyber Conference 2024
26–28 November 2024
Melbourne Convention and Exhibition Centre (MCEC)

Sessions

26/11/2024
10:45
 - 
11:25
How to map out an organisations cyber security architecture to find its strengths and weaknesses
Wayne Pennington
Room 208
View details
26/11/2024
10:45
 - 
11:25
Smooth seas do not a good architect make
Robert Laurie
Room 209
View details
26/11/2024
11:35
 - 
12:15
In the business of DevSecOps: Enhancing resilience and reducing time to market
Ashwin Pal & Tim Nedyalkov
Room 208
View details
26/11/2024
11:35
 - 
12:15
Getting better insights from penetration tests; An introduction to threat modelling
Matthew Belvedere
Ask an Expert 1
View details
26/11/2024
11:35
 - 
12:15
Project strange: Reviving the internet's lost ideals with an Open Source Creation - IAM reimagined
Sajeeb Lohani & Ben Christian
Room 209
View details
26/11/2024
13:35
 - 
14:15
Achieving cyber herd immunity
Michael Loewy
Room 208
View details
26/11/2024
13:35
 - 
14:15
Secure by design: How DevSecOps supports data privacy compliance
Pramiti Bhatnagar
Room 209
View details
26/11/2024
14:25
 - 
15:05
Navigating the perils of software supply chain attacks
Nirav Kamdar
Room 209
View details
26/11/2024
14:25
 - 
15:05
Corporate structures are a hackers best friend
Holly Wright
Room 208
View details
26/11/2024
15:50
 - 
16:30
How to handle millions of requests a day? Learnings from scaling an IAM platform
Pratish Ray
Room 208
View details
26/11/2024
15:50
 - 
16:30
Adapt or perish: Pioneering adaptive cyber security frameworks for emerging technologies
Alexander Gould & Harrison Rule
Room 209
View details
27/11/2024
10:30
 - 
11:10
Enhancing cyber security through scalable and resilient architectural strategies
Andrew Govell
Room 209
View details
27/11/2024
10:30
 - 
11:10
Be a security champion: Uplifting the security culture in development teams
Raafey Khan & Murray Goldschmidt
Room 208
View details
27/11/2024
10:30
 - 
11:10
Breaking barriers: A deep dive into bypassing next-gen 2FA and MFA security measures
Shahmeer Amir
Ask an Expert 1
View details
27/11/2024
11:20
 - 
12:00
How to develop an AppSec program from ground up and some key learnings
Riduanul Shahria
Room 209
View details
27/11/2024
11:20
 - 
12:00
Lessons from building a single pane of AppSec glass
Ralf Huuck
Room 208
View details
27/11/2024
13:30
 - 
14:10
How delving into hacking has made me a better (more secure) programmer
Gaurav Sood
Room 209
View details
27/11/2024
13:30
 - 
14:10
Learning from insecure architectures: applying opposite thinking
Andrew Bandeira
Room 208
View details
27/11/2024
14:20
 - 
15:00
Automation as a key to Essential Eight compliance success
Tarek Mulla
Room 209
View details
27/11/2024
14:20
 - 
15:00
Doing more with less - DevSecOps with limited budget
Pramod Rana
Room 208
View details
27/11/2024
15:50
 - 
16:30
Threat modelling at the speed of Git
Christian Frichot
Room 209
View details
27/11/2024
15:50
 - 
16:30
The vulnerability game: Mastering the art of vulnerability management
Balaji Kapsikar
Room 208
View details
28/11/2024
10:15
 - 
10:55
Why a single source is not enough? A quantitative analysis of exploited vulnerabilities
Daniel Dos Santos
Room 209
View details
28/11/2024
10:15
 - 
10:55
Adulting in cyber security - The 7 habits of highly mature products
Jamie Ooi
Room 208
View details
28/11/2024
11:05
 - 
11:45
Designing secure systems: The art and science of threat modelling
Kathy Nguyen & Sabrina Blandford
Room 209
View details
28/11/2024
11:05
 - 
11:45
DevSecOps: Preparing for the future
Ralf Huuck
Room 208
View details
28/11/2024
13:00
 - 
13:40
Building secure software - beyond buzzwords like Shift-Left, DevSecOps and Cyber Resilience
Joanne Pizzato
Ask an Expert 2
View details
28/11/2024
13:00
 - 
13:40
How are you protecting modern Cloud-Native web apps & APIs
Nirav Kamdar
Room 208
View details
28/11/2024
13:00
 - 
13:40
The agile security professional: Adapting to DevSecOps and SecDevOps in modern organisations
Wing Tang
Room 209
View details
28/11/2024
13:50
 - 
14:30
Future proofing your digital business security by design
Gautam Kashyap
Room 208
View details
28/11/2024
13:50
 - 
14:30
From commit to compromise: How attackers exploit DevOps pipeline
Adela Ramadhina
Room 209
View details

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country