26/11/2024
10:45
-
11:25
How to map out an organisations cyber security architecture to find its strengths and weaknesses
Room 208
26/11/2024
11:35
-
12:15
In the business of DevSecOps: Enhancing resilience and reducing time to market
Room 208
26/11/2024
11:35
-
12:15
Project strange: Reviving the internet's lost ideals with an Open Source Creation - IAM reimagined
Room 209
26/11/2024
11:35
-
12:15
Getting better insights from penetration tests; An introduction to threat modelling
Ask an Expert 1
26/11/2024
13:35
-
14:15
Secure by design: How DevSecOps supports data privacy compliance
Room 209
26/11/2024
14:25
-
15:05
The state of the cyber security architecture community in Australia
Room 208
26/11/2024
15:50
-
16:30
How to handle millions of requests a day? Learnings from scaling an IAM platform
Room 208
26/11/2024
15:50
-
16:30
Adapt or perish: Pioneering adaptive cyber security frameworks for emerging technologies
Room 209
27/11/2024
10:30
-
11:10
Be a security champion: Uplifting the security culture in development teams
Room 208
27/11/2024
10:30
-
11:10
Enhancing cyber security through scalable and resilient architectural strategies
Room 209
27/11/2024
10:30
-
11:10
Breaking barriers: A deep dive into bypassing next-gen 2FA and MFA security measures
Ask an Expert 1
27/11/2024
11:20
-
12:00
How to develop an AppSec program from ground up and some key learnings
Room 209
27/11/2024
13:30
-
14:10
Learning from insecure architectures: applying opposite thinking
Room 208
27/11/2024
13:30
-
14:10
How delving into hacking has made me a better (more secure) programmer
Room 209
27/11/2024
15:50
-
16:30
The vulnerability game: Mastering the art of vulnerability management
Room 208
28/11/2024
10:15
-
10:55
Adulting in cyber security - The 7 habits of highly mature products
Room 208
28/11/2024
10:15
-
10:55
Why a single source is not enough? A quantitative analysis of exploited vulnerabilities
Room 209
28/11/2024
11:05
-
11:45
Designing secure systems: The art and science of threat modelling
Room 209
28/11/2024
13:00
-
13:40
How are you protecting modern Cloud-Native web apps & APIs
Room 208
28/11/2024
13:00
-
13:40
The agile security professional: Adapting to DevSecOps and SecDevOps in modern organisations
Room 209
28/11/2024
13:50
-
14:30
From commit to compromise: How attackers exploit DevOps pipeline
Room 209
28/11/2024
14:40
-
15:20
Automation as a key to Essential Eight compliance success
Room 208