Showing 0 of 100
Keynote with Professor Sue Black: Did Twitter Save Bletchley Park?
Keynote with Professor Sue Black: Did Twitter Save Bletchley Park?
Cyber to C-suite: reposition your intelligence to benefit the entire business
Cyber to C-suite: reposition your intelligence to benefit the entire business
I said AI like it like that - LLM so secure, what's it's name?
I said AI like it like that - LLM so secure, what's it's name?
The CISO dilemma: Stakeholder management in running an enterprise incident response exercise
The CISO dilemma: Stakeholder management in running an enterprise incident response exercise
High-impact and cost-effective strategies leading cyber security teams are deploying to protect Operational Technologies against sophisticated cyber threats
High-impact and cost-effective strategies leading cyber security teams are deploying to protect Operational Technologies against sophisticated cyber threats
Cyber Soundtracks: Navigating the intersection of music, security, and AI
Cyber Soundtracks: Navigating the intersection of music, security, and AI
Seek and you shall find: Risks highlighted by Copilot for M365
Seek and you shall find: Risks highlighted by Copilot for M365
Privacy Act changes in Australia and their impact on security and privacy
Privacy Act changes in Australia and their impact on security and privacy
I'm just Ed - anywhere else I'd be a CISO. How to succeed as a Deputy CISO/Second in charge
I'm just Ed - anywhere else I'd be a CISO. How to succeed as a Deputy CISO/Second in charge
Post quantum cryptography: From CRYSTALS to SPHINCS+
Post quantum cryptography: From CRYSTALS to SPHINCS+
SneakyChef Espionage Campaign: Unveiling the Multi-Staged Attack on Global Government Entities
SneakyChef Espionage Campaign: Unveiling the Multi-Staged Attack on Global Government Entities
Cyber incident response management (a.k.a when the waste-water hits the fan!)
Cyber incident response management (a.k.a when the waste-water hits the fan!)
Using security patterns for securing cloud environments
Using security patterns for securing cloud environments
Leverage the power of AI / ML to transform your security compliance posture and evolve your adherence to regulatory frameworks
Leverage the power of AI / ML to transform your security compliance posture and evolve your adherence to regulatory frameworks
How cybersecurity managers anticipate an adverse event
How cybersecurity managers anticipate an adverse event
That's an enterprise feature! - Exploring the exclusion of Single Sign On from SMB cloud offerings
That's an enterprise feature! - Exploring the exclusion of Single Sign On from SMB cloud offerings
Tinker, Tailor, Insider, Outsider: A framework to detect and respond to external threats that manifest as internal risks
Tinker, Tailor, Insider, Outsider: A framework to detect and respond to external threats that manifest as internal risks
From data to defence: Using OSINT to build resilience across critical infrastructure supply chains
From data to defence: Using OSINT to build resilience across critical infrastructure supply chains
The third 3rd party incident this week: Real world business advice from real world incidents
The third 3rd party incident this week: Real world business advice from real world incidents
DIGITAL IDENTITY: Q&A regarding a successful Australian framework
DIGITAL IDENTITY: Q&A regarding a successful Australian framework
No results found.
There are no results with this criteria. Try changing your search.
Acknowledgement of Country
We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.