Australian Cyber Conference Program (First Release)

Canberra | 17–19 March 2025, National Convention Centre

By Theme
Clear
By Type
Clear
By Location
Clear
Search
Clear
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Tag
Showing 0 of 100

Welcome to Country

Welcome to Country

TBC
8:45
 - 
9:00
18 Mar
 
2025
Other
25031808452010
18/3/2025 8:45
18 Mar 2025
TBC
8:45
 - 
9:00
18 Mar
 
2025
Other
25031808452010
18/3/2025 8:45
18 Mar 2025

Keynote with Chris Riddell

Keynote with Chris Riddell

Chris Riddell
9:00
 - 
10:00
18 Mar
 
2025
Keynote
25031809002010
18/3/2025 9:00
18 Mar 2025
Chris Riddell
9:00
 - 
10:00
18 Mar
 
2025
Keynote
25031809002010
18/3/2025 9:00
18 Mar 2025

Morning Tea Break

Morning Tea Break

TBC
10:00
 - 
10:30
18 Mar
 
2025
Other
25031810001010
18/3/2025 10:00
18 Mar 2025
TBC
10:00
 - 
10:30
18 Mar
 
2025
Other
25031810001010
18/3/2025 10:00
18 Mar 2025

Free Loaders and Dirty Rats - how Malware Loaders and Remote Access Trojans work together to evade your defences and establish an unwanted presence

Free Loaders and Dirty Rats - how Malware Loaders and Remote Access Trojans work together to evade your defences and establish an unwanted presence

Peter Watson
10:30
 - 
11:10
18 Mar
 
2025
Breakout
25031810303010
18/3/2025 10:30
Threat Intelligence & Threat Hunting
18 Mar 2025
Peter Watson
10:30
 - 
11:10
18 Mar
 
2025
Breakout
25031810303010
18/3/2025 10:30
Threat Intelligence & Threat Hunting
18 Mar 2025

Navigating the AI Paradox: Ensuring Responsible AI in Cyber Security

Navigating the AI Paradox: Ensuring Responsible AI in Cyber Security

John Burgess
10:30
 - 
11:10
18 Mar
 
2025
Breakout
25031810303020
18/3/2025 10:30
Artificial Intelligence & Machine Learning
18 Mar 2025
John Burgess
10:30
 - 
11:10
18 Mar
 
2025
Breakout
25031810303020
18/3/2025 10:30
Artificial Intelligence & Machine Learning
18 Mar 2025

Building cyber resilience: Our learnings from a live fire incident response and strategic desktop exercises

Building cyber resilience: Our learnings from a live fire incident response and strategic desktop exercises

Alex Duffy
10:30
 - 
11:10
18 Mar
 
2025
Breakout
25031810303030
18/3/2025 10:30
Incident Response & Crisis Communications
18 Mar 2025
Alex Duffy
10:30
 - 
11:10
18 Mar
 
2025
Breakout
25031810303030
18/3/2025 10:30
Incident Response & Crisis Communications
18 Mar 2025

Secrets no more: Implication of quantum security on a cyber strategy

Secrets no more: Implication of quantum security on a cyber strategy

Alexey Bocharnikov
10:30
 - 
11:10
18 Mar
 
2025
Breakout
25031810303040
18/3/2025 10:30
Security Strategy & Architecture
18 Mar 2025
Alexey Bocharnikov
10:30
 - 
11:10
18 Mar
 
2025
Breakout
25031810303040
18/3/2025 10:30
Security Strategy & Architecture
18 Mar 2025

From Reactive to Resilient: Revolutionising CISO Strategy with Threat Intelligence

From Reactive to Resilient: Revolutionising CISO Strategy with Threat Intelligence

Raymond Schippers
10:30
 - 
11:10
18 Mar
 
2025
Think Tank
25031810304010
18/3/2025 10:30
Threat Intelligence & Threat Hunting
18 Mar 2025
Raymond Schippers
10:30
 - 
11:10
18 Mar
 
2025
Think Tank
25031810304010
18/3/2025 10:30
Threat Intelligence & Threat Hunting
18 Mar 2025

Security Strategy and Architecture: Building resilience in a complex threat landscape

Security Strategy and Architecture: Building resilience in a complex threat landscape

Rohit Borekar
10:30
 - 
11:10
18 Mar
 
2025
Think Tank
25031810304020
18/3/2025 10:30
Security Strategy & Architecture
18 Mar 2025
Rohit Borekar
10:30
 - 
11:10
18 Mar
 
2025
Think Tank
25031810304020
18/3/2025 10:30
Security Strategy & Architecture
18 Mar 2025

Revenge of the nerds: Confronting gender bias in cyber security and cybercrime

Revenge of the nerds: Confronting gender bias in cyber security and cybercrime

Anika Guenov & Annie-Mei Forster
10:30
 - 
11:10
18 Mar
 
2025
Breakout
25031810305010
18/3/2025 10:30
Human Elements & Criminology
18 Mar 2025
Anika Guenov & Annie-Mei Forster
10:30
 - 
11:10
18 Mar
 
2025
Breakout
25031810305010
18/3/2025 10:30
Human Elements & Criminology
18 Mar 2025

The Future Dynamics of Super-SaaS and Information Security

The Future Dynamics of Super-SaaS and Information Security

John Baird
10:30
 - 
11:10
18 Mar
 
2025
Breakout
25031810305020
18/3/2025 10:30
Governance / Risk & Compliance
18 Mar 2025
John Baird
10:30
 - 
11:10
18 Mar
 
2025
Breakout
25031810305020
18/3/2025 10:30
Governance / Risk & Compliance
18 Mar 2025

Surviving the cyber budget squeeze – making the business case

Surviving the cyber budget squeeze – making the business case

Denny Wan & Madhuri Nandi
10:30
 - 
11:10
18 Mar
 
2025
Breakout
25031810305030
18/3/2025 10:30
Executives & Board
18 Mar 2025
Denny Wan & Madhuri Nandi
10:30
 - 
11:10
18 Mar
 
2025
Breakout
25031810305030
18/3/2025 10:30
Executives & Board
18 Mar 2025

When transformation becomes a moral imperative: How we can (and should) do much better in keeping our digitally engaged children much safer online

When transformation becomes a moral imperative: How we can (and should) do much better in keeping our digitally engaged children much safer online

Julie Gleeson & Tim Scott
10:30
 - 
11:10
18 Mar
 
2025
Breakout
25031810305040
18/3/2025 10:30
Public Policy & Government
18 Mar 2025
Julie Gleeson & Tim Scott
10:30
 - 
11:10
18 Mar
 
2025
Breakout
25031810305040
18/3/2025 10:30
Public Policy & Government
18 Mar 2025

Hiding in plain sight: Using DMARC against you

Hiding in plain sight: Using DMARC against you

Bradley Anstis
10:30
 - 
11:10
18 Mar
 
2025
Breakout
25031810305050
18/3/2025 10:30
Security Standards & Frameworks
18 Mar 2025
Bradley Anstis
10:30
 - 
11:10
18 Mar
 
2025
Breakout
25031810305050
18/3/2025 10:30
Security Standards & Frameworks
18 Mar 2025

Lessons from the field: Priorities in planning for incident response

Lessons from the field: Priorities in planning for incident response

Paula Januszkiewicz
11:20
 - 
12:00
18 Mar
 
2025
Featured
25031811202010
18/3/2025 11:20
18 Mar 2025
Paula Januszkiewicz
11:20
 - 
12:00
18 Mar
 
2025
Featured
25031811202010
18/3/2025 11:20
18 Mar 2025

The single-person (and several dozen AI agent) CTI team

The single-person (and several dozen AI agent) CTI team

Brendon Hawkins
11:20
 - 
12:00
18 Mar
 
2025
Breakout
25031811203010
18/3/2025 11:20
Threat Intelligence & Threat Hunting
18 Mar 2025
Brendon Hawkins
11:20
 - 
12:00
18 Mar
 
2025
Breakout
25031811203010
18/3/2025 11:20
Threat Intelligence & Threat Hunting
18 Mar 2025

Securing Your Kubernetes Environment: Identifying and Addressing Common Misconfigurations

Securing Your Kubernetes Environment: Identifying and Addressing Common Misconfigurations

Rob Kenefeck
11:20
 - 
12:00
18 Mar
 
2025
Think Tank
25031811204010
18/3/2025 11:20
Cloud & Infrastructure Security
18 Mar 2025
Rob Kenefeck
11:20
 - 
12:00
18 Mar
 
2025
Think Tank
25031811204010
18/3/2025 11:20
Cloud & Infrastructure Security
18 Mar 2025

Navigating the future: AI governance for sustainable innovation

Navigating the future: AI governance for sustainable innovation

Megan Motto
11:20
 - 
12:00
18 Mar
 
2025
Think Tank
25031811204020
18/3/2025 11:20
Governance / Risk & Compliance
18 Mar 2025
Megan Motto
11:20
 - 
12:00
18 Mar
 
2025
Think Tank
25031811204020
18/3/2025 11:20
Governance / Risk & Compliance
18 Mar 2025

Cyber litigation and third party risks – Preparing for the proposed amendments to the Privacy Act

Cyber litigation and third party risks – Preparing for the proposed amendments to the Privacy Act

Rakhee Dullabh, Nicole Gabryk, Gavin Davies & Michael Parrant
11:20
 - 
12:00
18 Mar
 
2025
Panel
25031811204030
18/3/2025 11:20
Incident Response & Crisis Communications
18 Mar 2025
Rakhee Dullabh, Nicole Gabryk, Gavin Davies & Michael Parrant
11:20
 - 
12:00
18 Mar
 
2025
Panel
25031811204030
18/3/2025 11:20
Incident Response & Crisis Communications
18 Mar 2025

L'affaire du télégraphe. The Bordeaux hackers of 1834

L'affaire du télégraphe. The Bordeaux hackers of 1834

Darren Arnott
11:20
 - 
12:00
18 Mar
 
2025
Breakout
25031811205010
18/3/2025 11:20
Human Elements & Criminology
18 Mar 2025
Darren Arnott
11:20
 - 
12:00
18 Mar
 
2025
Breakout
25031811205010
18/3/2025 11:20
Human Elements & Criminology
18 Mar 2025

The Privacy Act and Data Breach Management : overview of recent amendments

The Privacy Act and Data Breach Management : overview of recent amendments

Melinda Smith
11:20
 - 
12:00
18 Mar
 
2025
Breakout
25031811205020
18/3/2025 11:20
Governance / Risk & Compliance
18 Mar 2025
Melinda Smith
11:20
 - 
12:00
18 Mar
 
2025
Breakout
25031811205020
18/3/2025 11:20
Governance / Risk & Compliance
18 Mar 2025

The gamers guide to cyber tabletop exercises: These are not the powerpoints you’re looking for

The gamers guide to cyber tabletop exercises: These are not the powerpoints you’re looking for

Amy Ormrod & David Ormrod
11:20
 - 
12:00
18 Mar
 
2025
Breakout
25031811205030
18/3/2025 11:20
Executives & Board
18 Mar 2025
Amy Ormrod & David Ormrod
11:20
 - 
12:00
18 Mar
 
2025
Breakout
25031811205030
18/3/2025 11:20
Executives & Board
18 Mar 2025

Public policy in practice: From Syria to Canberra

Public policy in practice: From Syria to Canberra

Adam Henry & Mohamad Alrajab
11:20
 - 
12:00
18 Mar
 
2025
Breakout
25031811205040
18/3/2025 11:20
Public Policy & Government
18 Mar 2025
Adam Henry & Mohamad Alrajab
11:20
 - 
12:00
18 Mar
 
2025
Breakout
25031811205040
18/3/2025 11:20
Public Policy & Government
18 Mar 2025

What security controls really matter?

What security controls really matter?

Peter Dowley
11:20
 - 
12:00
18 Mar
 
2025
Breakout
25031811205050
18/3/2025 11:20
Security Standards & Frameworks
18 Mar 2025
Peter Dowley
11:20
 - 
12:00
18 Mar
 
2025
Breakout
25031811205050
18/3/2025 11:20
Security Standards & Frameworks
18 Mar 2025
No results found.
There are no results with this criteria. Try changing your search.

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.