Sessions

18/3/2025
10:30
 - 
11:10
Navigating the AI Paradox: Ensuring Responsible AI in Cyber Security
John Burgess
View details
18/3/2025
12:10
 - 
12:50
Betrayed by Apps; Detecting Mobile App Content Malpractices at-scale
Dishanika Denipitiyage & Bhanuka Pinchahewage
View details
18/3/2025
13:50
 - 
14:30
Generative AI and Deepfakes: Navigating the New Frontier of Cyber Reality and Safety
Stacey Edmonds
View details
18/3/2025
14:40
 - 
15:20
Better security with code analytics and predictive maintenance
Peter Freiberg
View details
18/3/2025
15:50
 - 
16:30
Securing the Skies: Mitigating Cybersecurity Challenges in Autonomous Drone Swarms Controlled by Artificial Intelligence
Zac Chu
View details
19/3/2025
10:10
 - 
10:50
I said AI like it like that - LLM so secure, what's it's name?
Jayant Kripalani
View details
19/3/2025
11:20
 - 
12:00
Whose mind is this anyway? The problem with securing AI when we can't even agree what it is, whether it's here to stay, and who owns it.
Ben Kereopa-Yorke
View details
19/3/2025
12:10
 - 
12:50
A Practical Approach to Assessing AI Risk
Malcolm Shore
View details
19/3/2025
13:50
 - 
14:30
How to Seduce a Model (a Large Language Model)
Harrison Smith
View details

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.