Showing 0 of 100
Welcome to Country and Conference Open with Tony Chapman, Michael Burchell
Welcome to Country and Conference Open with Tony Chapman, Michael Burchell
Join the industry leaders' professionalisation debate
Join the industry leaders' professionalisation debate
Free Loaders and Dirty Rats - how Malware Loaders and Remote Access Trojans work together to evade your defences and establish an unwanted presence inside
Free Loaders and Dirty Rats - how Malware Loaders and Remote Access Trojans work together to evade your defences and establish an unwanted presence inside
Navigating the AI paradox: Ensuring responsible AI in cyber security
Navigating the AI paradox: Ensuring responsible AI in cyber security
Building cyber resilience: Our learnings from a live fire incident response and strategic desktop exercises
Building cyber resilience: Our learnings from a live fire incident response and strategic desktop exercises
Secrets no more: Implication of quantum security on a cyber strategy
Secrets no more: Implication of quantum security on a cyber strategy
From reactive to resilient: Revolutionising CISO strategy with threat intelligence
From reactive to resilient: Revolutionising CISO strategy with threat intelligence
Security strategy and architecture: Building resilience in a complex threat landscape
Security strategy and architecture: Building resilience in a complex threat landscape
Project DFNDR: Adaptive cyber security for defence & critical infrastructure SMEs
Project DFNDR: Adaptive cyber security for defence & critical infrastructure SMEs
Revenge of the nerds: Confronting gender bias in cyber security and cybercrime
Revenge of the nerds: Confronting gender bias in cyber security and cybercrime
The future dynamics of Super-SaaS and Information Security
The future dynamics of Super-SaaS and Information Security
Surviving the cyber budget squeeze – making the business case
Surviving the cyber budget squeeze – making the business case
When transformation becomes a moral imperative: How we can (and should) do much better in keeping our digitally engaged children much safer online
When transformation becomes a moral imperative: How we can (and should) do much better in keeping our digitally engaged children much safer online
Hiding in plain sight: Using DMARC against you
Hiding in plain sight: Using DMARC against you
Lessons from the field: Priorities in planning for incident response
Lessons from the field: Priorities in planning for incident response
The single-person (and several dozen AI agent) CTI team
The single-person (and several dozen AI agent) CTI team
Securing your kubernetes environment: Identifying and addressing common misconfigurations
Securing your kubernetes environment: Identifying and addressing common misconfigurations
Navigating the future: AI governance for sustainable innovation
Navigating the future: AI governance for sustainable innovation
Cyber litigation and third party risks – Preparing for the proposed amendments to the Privacy Act
Cyber litigation and third party risks – Preparing for the proposed amendments to the Privacy Act
L'affaire du télégraphe. The Bordeaux hackers of 1834
L'affaire du télégraphe. The Bordeaux hackers of 1834
The Privacy Act and data breach management: overview of recent amendments
The Privacy Act and data breach management: overview of recent amendments
The gamers guide to cyber tabletop exercises: These are not the powerpoints you’re looking for
The gamers guide to cyber tabletop exercises: These are not the powerpoints you’re looking for
No results found.
There are no results with this criteria. Try changing your search.
Acknowledgement of Country
We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.