Sessions

26/11/24
10:45
 - 
11:25
Building trust: A practical guide to cyber security reporting to executives and the board
Lachlan McGrath
View details
26/11/24
10:45
 - 
11:25
The boardroom and back again: The art of storytelling in cyber security
Hannah Quayle & Fraser Metcalf
View details
26/11/24
11:35
 - 
12:15
The 4 Ws of disinformation: What, who, why, and what we can do about it?
Meg Tapia
View details
26/11/24
11:35
 - 
12:15
Attributes of a high-performing CISO: An action plan for aspiring leaders
Chirag Joshi & Branko Ninkovic
View details
26/11/24
11:35
 - 
12:15
Advancing the cyber security sector: Pathway to a diverse and inclusive cyber security workforce
Susan McGinty
View details
26/11/24
11:35
 - 
12:15
The preservation of complexity: Why securing the digital world is getting harder, and what to do about it
Vaughan Shanks
View details
26/11/24
11:35
 - 
12:15
Hybrid threats: A threat to commercial organisations
Matthew Warren
View details
26/11/24
13:35
 - 
14:15
Building a resilient cyber strategy - A roadmap for success
Tara Dharnikota
View details
26/11/24
13:35
 - 
14:15
Enabling more effective risk management through risk quantification
Sean Gunasekera & Sunil D'Souza
View details
26/11/24
13:35
 - 
14:15
Leadership and vision in cyber defense: How security operations is evolving and what Executives need to know
Vannessa Van Beek & Phil Zongo
View details
26/11/24
14:25
 - 
15:05
Cyber & AUKUS: Driving innovation through national security
Cameron Watts
View details
26/11/24
14:25
 - 
15:05
When and why to insource your offensive security team
Jason Ford
View details
27/11/24
10:30
 - 
11:10
Unraveling the unseen: Unconscious bias in cyber security hiring
Deany Jaghdour & Simon Carabetta
View details
27/11/24
10:30
 - 
11:10
Forging forward: The grit and grace of cyber entrepreneurship in the Australian cyber landscape
Chirag Joshi & Branko Ninkovic
View details
27/11/24
10:30
 - 
11:10
Future is now: Cautious reflections and bold predictions on cyber security in the years to come
Ivano Bongiovanni, Ian Yip, Chathura Abeydeera, Katherine Robins & Dushyant Sattiraju
View details
27/11/24
10:30
 - 
11:10
From retaliation to deterrence: Redefining cyber security in the age of digital conflict
Alexander Gould & Harrison Rule
View details
27/11/24
11:20
 - 
12:00
Next generation of board members, What are they looking for?
Faizal Janif
View details
27/11/24
11:20
 - 
12:00
Pie in the sky no more – Have your pie and eat it too! Doubling down on successful cyber strategy
Melanie Broder, Anne-Louise Brown & Mitra Minai
View details
27/11/24
11:20
 - 
12:00
A dance of quant and qual - Establishing materiality thresholds for regulatory disclosures
Jack Freund
View details
27/11/24
13:30
 - 
14:10
Building a cyber champion in a NFP
Adrian Bole, Denny Wan & Rodney Anderson
View details
27/11/24
13:30
 - 
14:10
Recruitment and employment of autistic people in cyber: The advantages of inclusion and divergent thinking
Michalina Lisik
View details
27/11/24
13:30
 - 
14:10
Cyber due diligence - do's and don'ts
Lucas Roe & Wouter Veugelen
View details
27/11/24
13:30
 - 
14:10
Old threats, new faces: Navigating the persistent and ever-changing third-party cyber security landscape
Mark Jones
View details
27/11/24
14:20
 - 
15:00
An innovation opportunity with great risk. How to explain quantum to executives and why they should become quantum threat literate
Julie Gleeson
View details
27/11/24
14:20
 - 
15:00
Security awareness 2.0: The paradigm shift from training and simulations to engagement and culture
Jacqueline Jayne
View details
27/11/24
15:50
 - 
16:30
Wanna be a "CISO"...Lets chat :)
Sharin Yeoh
View details
27/11/24
15:50
 - 
16:30
Delivering effective and user friendly cybersecurity solutions
Tania Snell
View details
27/11/24
15:50
 - 
16:30
Lessons learned from a ransomware attack and setting up a defensive cyber resilience strategy, execution plan and reporting to board
Roshan Daluwakgoda
View details
28/11/24
10:15
 - 
10:55
A Guide to auditing AI for security and ethical compliance - Insights from a CISO
Raza Nowrozy
View details
28/11/24
10:15
 - 
10:55
Cyber-Partnering: Crafting security culture
Lynore Close
View details
28/11/24
10:15
 - 
10:55
A clockwork CISO
Steven Kintakas
View details
28/11/24
10:15
 - 
10:55
The Rosetta Stone of cyber security: How can we translate cyber to business risk?
Dan Elliott
View details
28/11/24
11:05
 - 
11:45
Leading a Whole-of-Government approach: Enabling security operations and a consistent approach to cyber security
Peter Gigengack
View details
28/11/24
11:05
 - 
11:45
Why your board doesn't want to hear from you!
Brendan Smith
View details
28/11/24
11:05
 - 
11:45
Unhinged insights: How to visualise security data to business stakeholders with pretty pictures
Rustam Teregulov
View details
28/11/24
13:00
 - 
13:40
Lessons learnt from a transition from law enforcement to corporate CISO and from SME to global business operations
Jason Plumridge
View details
28/11/24
13:00
 - 
13:40
Are you spending too much on cyber security?
Michael Shepherd
View details
28/11/24
13:00
 - 
13:40
The failure of cyber security investment
Robert Laurie
View details
28/11/24
13:00
 - 
13:40
Getting serious with the Essential 8
Arjen Lentz
View details
28/11/24
13:50
 - 
14:30
Essential 8 and compliance culture
Mark Navarrete
View details
28/11/24
14:40
 - 
15:20
Assessing the strategic imperative and challenge for industry of post-quantum cryptography (PQC)
Chris Hickman & Richard Searle
View details
28/11/24
14:40
 - 
15:20
Building a cyber champion in a local council
Denny Wan & Iftekhar Alam
View details

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country