
Australian Cyber Conference Canberra 2025
My Agenda
Showing 0 of 100
How to Seduce a Model (a Large Language Model)
How to Seduce a Model (a Large Language Model)
Cybersecurity in maritime operations - Protecting ports and shipping channels from evolving threats
Cybersecurity in maritime operations - Protecting ports and shipping channels from evolving threats
Building ISM and E8-compliant master images with DevSecOps
Building ISM and E8-compliant master images with DevSecOps
No results found.
There are no results with this criteria. Try changing your search.
Acknowledgement of Country
We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.