Sessions

18/3/2025
10:30
 - 
11:10
Hiding in plain sight: Using DMARC against you
Bradley Anstis
View details
18/3/2025
11:20
 - 
12:00
What security controls really matter?
Peter Dowley
View details
18/3/2025
13:50
 - 
14:30
From risk-based vulnerability management to exposure management: The future of cyber security
Zaira Pirzada
View details
18/3/2025
14:40
 - 
15:20
ATT&CK and D3FEND frameworks. A common language to understand threat actors and drive action to disrupt the kill chain
Nico Riquelme-Ramirez
View details
18/3/2025
15:50
 - 
16:30
Is post-quantum encryption ready for prime-time? A pragmatic assessment of the threats, possible responses and practical guidance
Rajiv Shah
View details
19/3/2025
10:10
 - 
10:50
Post quantum cryptography: From CRYSTALS to SPHINCS+
Tim Kiermaier
View details
19/3/2025
11:20
 - 
12:00
Lifecycle of a CVE in the context of a CAN
Medha Mishra
View details
19/3/2025
12:10
 - 
12:50
Automation as a key to Essential Eight compliance success
Tarek Mulla
View details
19/3/2025
14:40
 - 
15:20
Engaging the enemy: Decision makers how to appease them
Greg Wilson
View details

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.