Sessions

Sign in to add sessions to your agenda
26/11/24
10:45
 - 
11:25
Unmasking supply chain cyber threats: Critical insights for business executives
Alladean Chidukwani
26/11/24
10:45
 - 
11:25
How third-party risks can sink sabotage your security
Abed Hamdan
26/11/24
11:35
 - 
12:15
The future of GRC is here - Just unevenly distributed
Allen Baranov
26/11/24
13:35
 - 
14:15
AI governance: Navigating the new wave of global standards and regulations
Kathy Nguyen
26/11/24
14:25
 - 
15:05
They can't hack it, if you don't have it!
Janine Morris
26/11/24
14:25
 - 
15:05
It's time to move on (from manual controls testing)
Leonard Barker
26/11/24
14:25
 - 
15:05
Demystifying the Assessment & Authorisation (A&A) Journey for Secure Systems
Sharin Yeoh
26/11/24
15:50
 - 
16:30
Why your security certificate won't stop a breach
Elliot Dellys
26/11/24
15:50
 - 
16:30
The hamster wheel of death: Learnings from navigating third party security audits over the last 10 years!
John Reeman
27/11/24
10:30
 - 
11:10
To insert, swipe or touch: A credit card dilemma
Chloe Pang
27/11/24
11:20
 - 
12:00
Where worlds collide – The intersection between cyber security and climate change
Amelia Gowa
27/11/24
11:20
 - 
12:00
Is security by design now the governance standard expected for company directors?
Tony Vizza
27/11/24
11:20
 - 
12:00
How to land your first cyber security job in 2024
Abed Hamdan
27/11/24
13:30
 - 
14:10
Weaving archival threads into SABSA's security fabric
Bethany Victoria Sinclair-Giardini
27/11/24
14:20
 - 
15:00
The new dawn: Cyber risks in an AI world
Adam Henry
27/11/24
14:20
 - 
15:00
Cyber regulation readiness - Preparing for global cyber rules
Sandeep Parande
27/11/24
14:20
 - 
15:00
APRA CPS230 - Can you be ready?
Vikram Asnani
27/11/24
14:20
 - 
15:00
Getting Into the Weeds: Solving Your Cyber GRC Problems
Jennifer Vu
27/11/24
15:50
 - 
16:30
Eating our own dog food: The business case for great GRC at start-up & scale-up
Cindy Ruan & Phil Ross
27/11/24
15:50
 - 
16:30
Rebalancing cyber security: Prioritizing response and recovery in governance
Ashwin Pal & Asaf Dori
27/11/24
15:50
 - 
16:30
Building cyber resilience in small and medium businesses
Katherine Downing
27/11/24
15:50
 - 
16:30
The risk of taking the human factor out of GRC
Cory Keating & Gavin Oh
28/11/24
10:15
 - 
10:55
Reasonable steps: Perspectives from an expert witness
Nicole Stephensen
28/11/24
10:15
 - 
10:55
Moving on from maturity assessments: A better way to measure cyber security effectiveness
Jennifer Vu
28/11/24
10:15
 - 
10:55
Elevating cyber protection: Leveraging parametric cyber insurance for next-level security
Vanessa Sunassee
28/11/24
11:05
 - 
11:45
Mandatory cyber laws: 2024's global blueprint
Dmitry Butko
28/11/24
13:00
 - 
13:40
Reading the GRC tea leaves – Common themes from recent major updates to ISO 27001, NIST CSF, and PCI DSS
Elliot Dellys
28/11/24
13:00
 - 
13:40
How to uplift your third party risk management approach (whilst saving time in the process)
Anjali Varghese
28/11/24
13:50
 - 
14:30
How do we make decisions in cybersecurity? Operational, tactical, and strategic decision-making in the age of AI
Ivano Bongiovanni
28/11/24
13:50
 - 
14:30
Strengthening corporate security: The critical role of vendor validation
Asrar Ismail
28/11/24
13:50
 - 
14:30
Unlocking business value: The transformative role of the security Governance, Risk, and Compliance (GRC) team
Nick Vallianos
28/11/24
14:40
 - 
15:20
The critical alliance: Strengthening third-party risk management through cyber and legal collaboration
Biljana Roksandic

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country