Sessions

18/3/2025
10:30
 - 
11:10
From Reactive to Resilient: Revolutionising CISO Strategy with Threat Intelligence
Raymond Schippers
View details
18/3/2025
11:20
 - 
12:00
Securing Your Kubernetes Environment: Identifying and Addressing Common Misconfigurations
Rob Kenefeck
View details
18/3/2025
12:10
 - 
12:50
BEWARE: Company directors and managers have a legal responsibility to manage cyber security risks!
James Carlopio
View details
18/3/2025
13:50
 - 
14:30
DevSecOps to DevSecOooops: Unveiling how adversaries use Secure CI/CD Ecosystem as a puppet !!!
Sanjeev Mahajan
View details
18/3/2025
14:40
 - 
15:20
Deep fake it until you make It - Social engineering in the new age
James Anderson
View details
18/3/2025
15:50
 - 
16:30
You've survived the breach. Now what? Exploring establishment of an effective and resilient post breach security program and roadmap
Saad Ayad
View details
19/3/2025
10:10
 - 
10:50
A taxonomy for mitigating the latest AI-based cyber attacks
Nitheilan Thanigachalam
View details
19/3/2025
11:20
 - 
12:00
Leverage the power of AI / ML to transform your Security Compliance posture and evolve your adherence to Regulatory frameworks
Mayur Kriplani
View details
19/3/2025
12:10
 - 
12:50
War in Ukraine: Threat informed cyber education
Elena Scifleet
View details
19/3/2025
13:50
 - 
14:30
Building ISM and E8-compliant master images with DevSecOps
James Bannan
View details
19/3/2025
14:40
 - 
15:20
Building Resilient Cloud Infrastructures: Golden Paths and Cyber Shields for Multi-Cloud Stability
Saurabh Bajaj
View details

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.