Sessions

26/11/24
10:45
 - 
11:25
Unmasking supply chain cyber threats: Critical insights for business executives
Alladean Chidukwani
View details
26/11/24
10:45
 - 
11:25
How third-party risks can sink sabotage your security
Abed Hamdan
View details
26/11/24
11:35
 - 
12:15
The future of GRC is here - Just unevenly distributed
Allen Baranov
View details
26/11/24
13:35
 - 
14:15
AI governance: Navigating the new wave of global standards and regulations
Kathy Nguyen
View details
26/11/24
14:25
 - 
15:05
It's time to move on (from manual controls testing)
Leonard Barker
View details
26/11/24
14:25
 - 
15:05
Demystifying the Assessment & Authorisation (A&A) Journey for Secure Systems
Sharin Yeoh
View details
26/11/24
14:25
 - 
15:05
They can't hack it, if you don't have it!
Janine Morris
View details
26/11/24
15:50
 - 
16:30
The hamster wheel of death: Learnings from navigating third party security audits over the last 10 years!
John Reeman
View details
26/11/24
15:50
 - 
16:30
Why your security certificate won't stop a breach
Elliot Dellys
View details
27/11/24
10:30
 - 
11:10
To insert, swipe or touch: A credit card dilemma
Chloe Pang
View details
27/11/24
11:20
 - 
12:00
How to land your first cyber security job in 2024
Abed Hamdan
View details
27/11/24
11:20
 - 
12:00
Where worlds collide – The intersection between cyber security and climate change
Amelia Gowa
View details
27/11/24
11:20
 - 
12:00
Is security by design now the governance standard expected for company directors?
Tony Vizza
View details
27/11/24
13:30
 - 
14:10
Weaving archival threads into SABSA's security fabric
Bethany Victoria Sinclair-Giardini
View details
27/11/24
14:20
 - 
15:00
The new dawn: Cyber risks in an AI world
Adam Henry
View details
27/11/24
14:20
 - 
15:00
Getting Into the Weeds: Solving Your Cyber GRC Problems
Jennifer Vu
View details
27/11/24
14:20
 - 
15:00
APRA CPS230 - Can you be ready?
Vikram Asnani
View details
27/11/24
15:50
 - 
16:30
Rebalancing cyber security: Prioritizing response and recovery in governance
Ashwin Pal & Asaf Dori
View details
27/11/24
15:50
 - 
16:30
Building cyber resilience in small and medium businesses
Katherine Downing
View details
27/11/24
15:50
 - 
16:30
Eating our own dog food: The business case for great GRC at start-up & scale-up
Cindy Ruan & Phil Ross
View details
27/11/24
15:50
 - 
16:30
The risk of taking the human factor out of GRC
Cory Keating & Gavin Oh
View details
28/11/24
10:15
 - 
10:55
Moving on from maturity assessments: A better way to measure cyber security effectiveness
Jennifer Vu
View details
28/11/24
10:15
 - 
10:55
Elevating cyber protection: Leveraging parametric cyber insurance for next-level security
Vanessa Sunassee
View details
28/11/24
10:15
 - 
10:55
Reasonable steps: Perspectives from an expert witness
Nicole Stephensen
View details
28/11/24
13:00
 - 
13:40
Reading the GRC tea leaves – Common themes from recent major updates to ISO 27001, NIST CSF, and PCI DSS
Elliot Dellys
View details
28/11/24
13:00
 - 
13:40
How to uplift your third party risk management approach (whilst saving time in the process)
Anjali Varghese
View details
28/11/24
13:50
 - 
14:30
How do we make decisions in cybersecurity? Operational, tactical, and strategic decision-making in the age of AI
Ivano Bongiovanni
View details
28/11/24
13:50
 - 
14:30
Unlocking business value: The transformative role of the security Governance, Risk, and Compliance (GRC) team
Nick Vallianos
View details
28/11/24
13:50
 - 
14:30
Strengthening corporate security: The critical role of vendor validation
Asrar Ismail
View details
28/11/24
14:40
 - 
15:20
The critical alliance: Strengthening third-party risk management through cyber and legal collaboration
Biljana Roksandic
View details

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country