Sessions

Sign in to add sessions to your agenda
26/11/24
11:35
 - 
12:15
Beyond reality - The Deepfake challenge
Sieg Lafon
26/11/24
14:25
 - 
15:05
Let’s write an exploit using AI
Julian Totzek-Hallhuber
26/11/24
15:50
 - 
16:30
Deep intellectual property protection: Watermarking AI models
Yuan Zhao & Lynna Leong
26/11/24
15:50
 - 
16:30
The return of the jailbreak: Prompt injection 101
Welbie Chan
26/11/24
15:50
 - 
16:30
Harnessing GenAI: Navigating the double-edged sword in cyber security
Pragati Mehrotra Malik
27/11/24
10:30
 - 
11:10
Protecting and jailbreaking LLM systems: Insights gained from a wargame
Pedram Hayati
27/11/24
10:30
 - 
11:10
Are humans about to be replaced by AI? We think not!
Mandy Ho
27/11/24
11:20
 - 
12:00
A CISO's playbook for achieving ISO 42001 certification to secure the benefits of AI
Andrew Robinson
27/11/24
13:30
 - 
14:10
Generative AI powered information warfare: How to customize highly nuanced but convincing misinformation and disinformation, and how to mitigate them
Timothy McIntosh & Sherry Wu
27/11/24
14:20
 - 
15:00
AI-Powered cyber threats - A new era of challenges
Abdullah Muhammad
27/11/24
14:20
 - 
15:00
Fact or fiction? Navigating the AI-Infested information seas
Emily Tabet
27/11/24
14:20
 - 
15:00
Shadow AI & secure AI-Powered SaaS applications
Tom Pieterse
27/11/24
15:50
 - 
16:30
Balancing AI innovation and security - A guide to AI security governance
Daniela Fernandez
27/11/24
15:50
 - 
16:30
Continuous threat exposure management - A convergence of AI / ML & threat exposure management
Mayur Kriplani
28/11/24
11:05
 - 
11:45
Skynet vs. your data: A cyber security smackdown
Elizabeth Stephens & Daniele Henderson
28/11/24
11:05
 - 
11:45
From code to westworld-like crises: A future-is-now strategy for containing emerging threats of radicalized robotics and Artificial General Intelligence (AGI)
Timothy McIntosh & Malka Halgamuge
28/11/24
11:05
 - 
11:45
Zero trust for private 5G networks
Puneeta Chellaramani
28/11/24
11:05
 - 
11:45
AI-Driven cyber security defense and offense
Rohit Borekar
28/11/24
13:00
 - 
13:40
Machine learning poisoning: How attackers can manipulate AI models for malicious purposes
Shahmeer Amir
28/11/24
13:50
 - 
14:30
Where does security intersect in assessing AI for Ethics and Governance and what is the IEEE AI Ethics Certification Program
Joseph Dalessandro
28/11/24
13:50
 - 
14:30
Tony Stark's AI assistant: From vision to secure execution
Sieg Lafon & Tennyson Yuan
28/11/24
13:50
 - 
14:30
The AI arms race: Defending Australia with automated cyber resilience
Shawn Thompson
28/11/24
14:40
 - 
15:20
Leveraging AI for kids
Abigail Fitzgerald
28/11/24
14:40
 - 
15:20
MITRE ATLAS: Defend and protect your AI-enabled systems with tools and community collaboration for AI security and assurance
Christina Liaghati

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country