Australian Cyber Conference Program (First Release)

Canberra | 17–19 March 2025, National Convention Centre

By Theme
Clear
By Type
Clear
By Location
Clear
Search
Clear
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Tag
Showing 0 of 100

Is post-quantum encryption ready for prime-time? A pragmatic assessment of the threats, possible responses and practical guidance

Is post-quantum encryption ready for prime-time? A pragmatic assessment of the threats, possible responses and practical guidance

Rajiv Shah
15:50
 - 
16:30
18 Mar
 
2025
Breakout
25031815505050
18/3/2025 15:50
Security Standards & Frameworks
18 Mar 2025
Rajiv Shah
15:50
 - 
16:30
18 Mar
 
2025
Breakout
25031815505050
18/3/2025 15:50
Security Standards & Frameworks
18 Mar 2025

Keynote with Dr Jordan Nguyen

Keynote with Dr Jordan Nguyen

Dr Jordan Nguyen
16:40
 - 
17:40
18 Mar
 
2025
Keynote
25031816402010
18/3/2025 16:40
18 Mar 2025
Dr Jordan Nguyen
16:40
 - 
17:40
18 Mar
 
2025
Keynote
25031816402010
18/3/2025 16:40
18 Mar 2025

Networking Drinks in Exhibition

Networking Drinks in Exhibition

TBC
17:40
 - 
18:40
18 Mar
 
2025
Other
25031817401010
18/3/2025 17:40
18 Mar 2025
TBC
17:40
 - 
18:40
18 Mar
 
2025
Other
25031817401010
18/3/2025 17:40
18 Mar 2025

Conference Dinner

Conference Dinner

TBC
19:00
 - 
22:30
18 Mar
 
2025
Other
25031819001010
18/3/2025 19:00
18 Mar 2025
TBC
19:00
 - 
22:30
18 Mar
 
2025
Other
25031819001010
18/3/2025 19:00
18 Mar 2025

Keynote with Professor Sue Black

Keynote with Professor Sue Black

Professor Sue Black
9:00
 - 
10:00
19 Mar
 
2025
Keynote
25031909002010
19/3/2025 9:00
19 Mar 2025
Professor Sue Black
9:00
 - 
10:00
19 Mar
 
2025
Keynote
25031909002010
19/3/2025 9:00
19 Mar 2025

Cyber to C-suite: reposition your intelligence to benefit the entire business

Cyber to C-suite: reposition your intelligence to benefit the entire business

James Murphy & Bevan Read
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910103010
19/3/2025 10:10
Threat Intelligence & Threat Hunting
19 Mar 2025
James Murphy & Bevan Read
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910103010
19/3/2025 10:10
Threat Intelligence & Threat Hunting
19 Mar 2025

I said AI like it like that - LLM so secure, what's it's name?

I said AI like it like that - LLM so secure, what's it's name?

Jayant Kripalani
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910103020
19/3/2025 10:10
Artificial Intelligence & Machine Learning
19 Mar 2025
Jayant Kripalani
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910103020
19/3/2025 10:10
Artificial Intelligence & Machine Learning
19 Mar 2025

The CISO dilemma: Stakeholder management in running an enterprise incident response exercise

The CISO dilemma: Stakeholder management in running an enterprise incident response exercise

Murray Goldschmidt
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910103030
19/3/2025 10:10
Incident Response & Crisis Communications
19 Mar 2025
Murray Goldschmidt
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910103030
19/3/2025 10:10
Incident Response & Crisis Communications
19 Mar 2025

High-impact and cost-effective strategies leading cyber security teams are deploying to protect Operational Technologies against sophisticated cyber threats

High-impact and cost-effective strategies leading cyber security teams are deploying to protect Operational Technologies against sophisticated cyber threats

Opeyemi Ajibola
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910103040
19/3/2025 10:10
Security Strategy & Architecture
19 Mar 2025
Opeyemi Ajibola
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910103040
19/3/2025 10:10
Security Strategy & Architecture
19 Mar 2025

A taxonomy for mitigating the latest AI-based cyber attacks

A taxonomy for mitigating the latest AI-based cyber attacks

Nitheilan Thanigachalam
10:10
 - 
10:50
19 Mar
 
2025
Think Tank
25031910104010
19/3/2025 10:10
Artificial Intelligence & Machine Learning
19 Mar 2025
Nitheilan Thanigachalam
10:10
 - 
10:50
19 Mar
 
2025
Think Tank
25031910104010
19/3/2025 10:10
Artificial Intelligence & Machine Learning
19 Mar 2025

Cyber Soundtracks: Navigating the intersection of music, security, and AI

Cyber Soundtracks: Navigating the intersection of music, security, and AI

Victoria Birch
10:10
 - 
10:50
19 Mar
 
2025
Think Tank
25031910104020
19/3/2025 10:10
Artificial Intelligence & Machine Learning
19 Mar 2025
Victoria Birch
10:10
 - 
10:50
19 Mar
 
2025
Think Tank
25031910104020
19/3/2025 10:10
Artificial Intelligence & Machine Learning
19 Mar 2025

Seek and you shall find: Risks highlighted by Copilot for M365

Seek and you shall find: Risks highlighted by Copilot for M365

David Stocks & Victoria Young
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910104030
19/3/2025 10:10
Cloud & Infrastructure Security
19 Mar 2025
David Stocks & Victoria Young
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910104030
19/3/2025 10:10
Cloud & Infrastructure Security
19 Mar 2025

Privacy Act Changes in Australia and their Impact on Security and Privacy

Privacy Act Changes in Australia and their Impact on Security and Privacy

Alyssa Blackburn
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910105020
19/3/2025 10:10
Governance / Risk & Compliance
19 Mar 2025
Alyssa Blackburn
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910105020
19/3/2025 10:10
Governance / Risk & Compliance
19 Mar 2025

I'm just Ed - anywhere else I'd be a CISO. How to succeed as a Deputy CISO/Second in charge

I'm just Ed - anywhere else I'd be a CISO. How to succeed as a Deputy CISO/Second in charge

Edward Messina
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910105030
19/3/2025 10:10
Executives & Board
19 Mar 2025
Edward Messina
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910105030
19/3/2025 10:10
Executives & Board
19 Mar 2025

Building digital identity for Australians without compromise

Building digital identity for Australians without compromise

Andrew Black
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910105040
19/3/2025 10:10
Identity Management
19 Mar 2025
Andrew Black
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910105040
19/3/2025 10:10
Identity Management
19 Mar 2025

Post Quantum Cryptography: From CRYSTALS to SPHINCS+

Post Quantum Cryptography: From CRYSTALS to SPHINCS+

Tim Kiermaier
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910105050
19/3/2025 10:10
Security Standards & Frameworks
19 Mar 2025
Tim Kiermaier
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910105050
19/3/2025 10:10
Security Standards & Frameworks
19 Mar 2025

Morning Tea Break

Morning Tea Break

TBC
10:50
 - 
11:20
19 Mar
 
2025
Other
25031910501010
19/3/2025 10:50
19 Mar 2025
TBC
10:50
 - 
11:20
19 Mar
 
2025
Other
25031910501010
19/3/2025 10:50
19 Mar 2025

SneakyChef Espionage Campaign: Unveiling the Multi-Staged Attack on Global Government Entities

SneakyChef Espionage Campaign: Unveiling the Multi-Staged Attack on Global Government Entities

Chetan Raghuprasad
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911203010
19/3/2025 11:20
Threat Intelligence & Threat Hunting
19 Mar 2025
Chetan Raghuprasad
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911203010
19/3/2025 11:20
Threat Intelligence & Threat Hunting
19 Mar 2025

Whose mind is this anyway? The problem with securing AI when we can't even agree what it is, whether it's here to stay, and who owns it.

Whose mind is this anyway? The problem with securing AI when we can't even agree what it is, whether it's here to stay, and who owns it.

Ben Kereopa-Yorke
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911203020
19/3/2025 11:20
Artificial Intelligence & Machine Learning
19 Mar 2025
Ben Kereopa-Yorke
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911203020
19/3/2025 11:20
Artificial Intelligence & Machine Learning
19 Mar 2025

Cyber incident response management (a.k.a When the waste-water hits the fan!)

Cyber incident response management (a.k.a When the waste-water hits the fan!)

Rue Maharaj
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911203030
19/3/2025 11:20
Incident Response & Crisis Communications
19 Mar 2025
Rue Maharaj
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911203030
19/3/2025 11:20
Incident Response & Crisis Communications
19 Mar 2025

Using Security Patterns for securing cloud environments

Using Security Patterns for securing cloud environments

Ken Fitzpatrick & Deepayan Chanda
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911203040
19/3/2025 11:20
Security Strategy & Architecture
19 Mar 2025
Ken Fitzpatrick & Deepayan Chanda
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911203040
19/3/2025 11:20
Security Strategy & Architecture
19 Mar 2025

Leverage the power of AI / ML to transform your Security Compliance posture and evolve your adherence to Regulatory frameworks

Leverage the power of AI / ML to transform your Security Compliance posture and evolve your adherence to Regulatory frameworks

Mayur Kriplani
11:20
 - 
12:00
19 Mar
 
2025
Think Tank
25031911204010
19/3/2025 11:20
Security Standards & Frameworks
19 Mar 2025
Mayur Kriplani
11:20
 - 
12:00
19 Mar
 
2025
Think Tank
25031911204010
19/3/2025 11:20
Security Standards & Frameworks
19 Mar 2025

How cybersecurity managers anticipate an adverse event

How cybersecurity managers anticipate an adverse event

Gennadiy Belenkiy
11:20
 - 
12:00
19 Mar
 
2025
Think Tank
25031911204020
19/3/2025 11:20
Security Strategy & Architecture
19 Mar 2025
Gennadiy Belenkiy
11:20
 - 
12:00
19 Mar
 
2025
Think Tank
25031911204020
19/3/2025 11:20
Security Strategy & Architecture
19 Mar 2025

That's an enterprise feature! - Exploring the exclusion of Single Sign On from SMB cloud offerings

That's an enterprise feature! - Exploring the exclusion of Single Sign On from SMB cloud offerings

Corch Ω
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911204030
19/3/2025 11:20
Cloud & Infrastructure Security
19 Mar 2025
Corch Ω
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911204030
19/3/2025 11:20
Cloud & Infrastructure Security
19 Mar 2025
No results found.
There are no results with this criteria. Try changing your search.

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.