Australian Cyber Conference Canberra 2025

By Theme
Clear
By Type
Clear
By Location
Clear
Search
Clear
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Tag
Showing 0 of 100

Lifecycle of a CVE in the context of a CAN

Lifecycle of a CVE in the context of a CAN

Medha Mishra
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911205050
19/3/2025 11:20
Security Standards & Frameworks
19 Mar 2025
Medha Mishra
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911205050
19/3/2025 11:20
Security Standards & Frameworks
19 Mar 2025

Force Multiplying Risk Management with the Intelligence Cycle

Force Multiplying Risk Management with the Intelligence Cycle

Daryl Sheppard
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912103010
19/3/2025 12:10
Threat Intelligence & Threat Hunting
19 Mar 2025
Daryl Sheppard
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912103010
19/3/2025 12:10
Threat Intelligence & Threat Hunting
19 Mar 2025

A Practical Approach to Assessing AI Risk

A Practical Approach to Assessing AI Risk

Malcolm Shore
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912103020
19/3/2025 12:10
Artificial Intelligence & Machine Learning
19 Mar 2025
Malcolm Shore
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912103020
19/3/2025 12:10
Artificial Intelligence & Machine Learning
19 Mar 2025
No results found.
There are no results with this criteria. Try changing your search.

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.