Sessions

26/11/24
10:45
 - 
11:25
How to map out an organisations cyber security architecture to find its strengths and weaknesses
Wayne Pennington
View details
26/11/24
10:45
 - 
11:25
Smooth seas do not a good architect make
Robert Laurie
View details
26/11/24
11:35
 - 
12:15
Getting better insights from penetration tests; An introduction to threat modelling
Matthew Belvedere
View details
26/11/24
13:35
 - 
14:15
Achieving cyber herd immunity
Michael Loewy
View details
26/11/24
14:25
 - 
15:05
Corporate structures are a hackers best friend
Holly Wright
View details
26/11/24
15:50
 - 
16:30
How to handle millions of requests a day? Learnings from scaling an IAM platform
Pratish Ray
View details
27/11/24
10:30
 - 
11:10
Enhancing cyber security through scalable and resilient architectural strategies
Andrew Govell
View details
27/11/24
13:30
 - 
14:10
Learning from insecure architectures: applying opposite thinking
Andrew Bandeira
View details
28/11/24
11:05
 - 
11:45
Designing secure systems: The art and science of threat modelling
Kathy Nguyen & Sabrina Blandford
View details
28/11/24
13:50
 - 
14:30
Future proofing your digital business security by design
Gautam Kashyap
View details

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country