Sessions

18/3/2025
11:20
 - 
12:00
Cyber litigation and third party risks – Preparing for the proposed amendments to the Privacy Act
Rakhee Dullabh, Nicole Gabryk, Gavin Davies & Michael Parrant
View details
18/3/2025
12:10
 - 
12:50
ICT product evaluations: What they are; Why we need them?
Patrick Campbell-Dunn, Greg Wilson & Alan Laing
View details
18/3/2025
10:30
 - 
11:10
Project DFNDR: Adaptive cyber security for Defence & Critical Infrastructure SMEs
Caitlin Sauza, Abu Barkat Ullah, Paul Nevin & Andrew Muller
View details
18/3/2025
13:50
 - 
14:30
On life support - Navigating a complex incident in healthcare
Hamish Krebs, Cheng Lim, Michelle Fitzgerald & Elliot Stein
View details
18/3/2025
14:40
 - 
15:20
I think I need to talk to a (cyber) lawyer: Two lawyers and a CISO decode Australia's new cybersecurity legal landscape
Annie Haggar, Ben Doyle & Reece Corbett-Wilkins
View details
18/3/2025
15:50
 - 
16:30
CISOs Unplugged - 3 CISOs practically tackle cyber security's pressing challenges!
Chirag Joshi, Jake Radloff & Vish Nair
View details
19/3/2025
10:10
 - 
10:50
Seek and you shall find: Risks highlighted by Copilot for M365
David Stocks & Victoria Young
View details
19/3/2025
11:20
 - 
12:00
That's an enterprise feature! - Exploring the exclusion of Single Sign On from SMB cloud offerings
Corch Ω
View details
19/3/2025
12:10
 - 
12:50
How your Microsoft 365 gets hacked (and how to prevent it)
Sam Brazier-Hollins
View details
19/3/2025
13:50
 - 
14:30
Who's Resource is This? – Why Asset Management is Key to Cloud Security
Pouya Ghotbi
View details
19/3/2025
14:40
 - 
15:20
Detecting and Mitigating Active Directory Compromises
James Duncan
View details

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.