Sessions

18/3/2025
10:30
 - 
11:10
Hiding in plain sight: Using DMARC against you
Bradley Anstis
View details
18/3/2025
11:20
 - 
12:00
What security controls really matter?
Peter Dowley
View details
18/3/2025
12:10
 - 
12:50
How AI proactive threat intelligence can stop attacks before they become active
Brad Ford
View details
18/3/2025
13:50
 - 
14:30
From risk-based vulnerability management to exposure management: The future of cyber security
Zaira Pirzada
View details
18/3/2025
14:40
 - 
15:20
ATT&CK and D3FEND frameworks. A common language to understand threat actors and drive action to disrupt the kill chain
Nico Riquelme-Ramirez
View details
18/3/2025
15:50
 - 
16:30
Is post-quantum encryption ready for prime-time? A pragmatic assessment of the threats, possible responses and practical guidance
Rajiv Shah
View details
19/3/2025
10:10
 - 
10:50
Post Quantum Cryptography: From CRYSTALS to SPHINCS+
Tim Kiermaier
View details
19/3/2025
11:20
 - 
12:00
Lifecycle of a CVE in the context of a CAN
Medha Mishra
View details
19/3/2025
12:10
 - 
12:50
Automation as a key to Essential Eight compliance success
Tarek Mulla
View details
19/3/2025
13:50
 - 
14:30
Cyber Security and AUKUS: How will AUKUS change the security landscape in Australia, what will this look like and how will it affect you?
Kat McCrabb & Aaron Pollard
View details
19/3/2025
14:40
 - 
15:20
Engaging the enemy: Decision makers how to appease them
Greg Wilson
View details

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.