Sessions

26/11/24
11:35
 - 
12:15
Beyond reality - The Deepfake challenge
Sieg Lafon
View details
26/11/24
14:25
 - 
15:05
Let’s write an exploit using AI
Julian Totzek-Hallhuber
View details
26/11/24
15:50
 - 
16:30
Deep intellectual property protection: Watermarking AI models
Yuan Zhao & Lynna Leong
View details
26/11/24
15:50
 - 
16:30
The return of the jailbreak: Prompt injection 101
Welbie Chan
View details
26/11/24
15:50
 - 
16:30
Harnessing GenAI: Navigating the double-edged sword in cyber security
Pragati Mehrotra Malik
View details
27/11/24
10:30
 - 
11:10
Protecting and jailbreaking LLM systems: Insights gained from a wargame
Pedram Hayati
View details
27/11/24
10:30
 - 
11:10
Are humans about to be replaced by AI? We think not!
Mandy Ho
View details
27/11/24
11:20
 - 
12:00
A CISO's playbook for achieving ISO 42001 certification to secure the benefits of AI
Andrew Robinson
View details
27/11/24
13:30
 - 
14:10
Generative AI powered information warfare: How to customize highly nuanced but convincing misinformation and disinformation, and how to mitigate them
Timothy McIntosh & Sherry Wu
View details
27/11/24
14:20
 - 
15:00
Fact or fiction? Navigating the AI-Infested information seas
Emily Tabet
View details
27/11/24
14:20
 - 
15:00
AI-Powered cyber threats - A new era of challenges
Abdullah Muhammad
View details
27/11/24
14:20
 - 
15:00
Shadow AI & secure AI-Powered SaaS applications
Tom Pieterse
View details
27/11/24
15:50
 - 
16:30
Balancing AI innovation and security - A guide to AI security governance
Daniela Fernandez
View details
27/11/24
15:50
 - 
16:30
Continuous threat exposure management - A convergence of AI / ML & threat exposure management
Mayur Kriplani
View details
28/11/24
11:05
 - 
11:45
Skynet vs. your data: A cyber security smackdown
Elizabeth Stephens & Daniele Henderson
View details
28/11/24
11:05
 - 
11:45
From code to westworld-like crises: A future-is-now strategy for containing emerging threats of radicalized robotics and Artificial General Intelligence (AGI)
Timothy McIntosh & Malka Halgamuge
View details
28/11/24
11:05
 - 
11:45
AI-Driven cyber security defense and offense
Rohit Borekar
View details
28/11/24
11:05
 - 
11:45
Zero trust for private 5G networks
Puneeta Chellaramani
View details
28/11/24
13:00
 - 
13:40
Machine learning poisoning: How attackers can manipulate AI models for malicious purposes
Shahmeer Amir
View details
28/11/24
13:50
 - 
14:30
Tony Stark's AI assistant: From vision to secure execution
Sieg Lafon & Tennyson Yuan
View details
28/11/24
13:50
 - 
14:30
Where does security intersect in assessing AI for Ethics and Governance and what is the IEEE AI Ethics Certification Program
Joseph Dalessandro
View details
28/11/24
13:50
 - 
14:30
The AI arms race: Defending Australia with automated cyber resilience
Shawn Thompson
View details
28/11/24
14:40
 - 
15:20
MITRE ATLAS: Defend and protect your AI-enabled systems with tools and community collaboration for AI security and assurance
Christina Liaghati
View details
28/11/24
14:40
 - 
15:20
Leveraging AI for kids
Abigail Fitzgerald
View details

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country