Australian Cyber Conference Program

Canberra | 17–19 March 2025, National Convention Centre

By Theme
Clear
By Type
Clear
By Location
Clear
Search
Clear
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Tag
Showing 0 of 100

Networking Drinks in Exhibition

Networking Drinks in Exhibition

TBC
17:40
 - 
18:40
18 Mar
 
2025
Other
25031817401010
18/3/2025 17:40
18 Mar 2025
TBC
17:40
 - 
18:40
18 Mar
 
2025
Other
25031817401010
18/3/2025 17:40
18 Mar 2025

Conference Dinner

Conference Dinner

TBC
19:00
 - 
22:30
18 Mar
 
2025
Other
25031819001020
18/3/2025 19:00
18 Mar 2025
TBC
19:00
 - 
22:30
18 Mar
 
2025
Other
25031819001020
18/3/2025 19:00
18 Mar 2025

Keynote with Professor Sue Black: Did Twitter Save Bletchley Park?

Keynote with Professor Sue Black: Did Twitter Save Bletchley Park?

Professor Sue Black
9:00
 - 
10:00
19 Mar
 
2025
Keynote
25031909002010
19/3/2025 9:00
19 Mar 2025
Professor Sue Black
9:00
 - 
10:00
19 Mar
 
2025
Keynote
25031909002010
19/3/2025 9:00
19 Mar 2025

Cyber to C-suite: reposition your intelligence to benefit the entire business

Cyber to C-suite: reposition your intelligence to benefit the entire business

James Murphy & Bevan Read
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910103010
19/3/2025 10:10
Threat Intelligence & Threat Hunting
19 Mar 2025
James Murphy & Bevan Read
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910103010
19/3/2025 10:10
Threat Intelligence & Threat Hunting
19 Mar 2025

I said AI like it like that - LLM so secure, what's it's name?

I said AI like it like that - LLM so secure, what's it's name?

Jayant Kripalani
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910103020
19/3/2025 10:10
Artificial Intelligence & Machine Learning
19 Mar 2025
Jayant Kripalani
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910103020
19/3/2025 10:10
Artificial Intelligence & Machine Learning
19 Mar 2025

The CISO dilemma: Stakeholder management in running an enterprise incident response exercise

The CISO dilemma: Stakeholder management in running an enterprise incident response exercise

Murray Goldschmidt
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910103030
19/3/2025 10:10
Incident Response & Crisis Communications
19 Mar 2025
Murray Goldschmidt
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910103030
19/3/2025 10:10
Incident Response & Crisis Communications
19 Mar 2025

High-impact and cost-effective strategies leading cyber security teams are deploying to protect Operational Technologies against sophisticated cyber threats

High-impact and cost-effective strategies leading cyber security teams are deploying to protect Operational Technologies against sophisticated cyber threats

Opeyemi Ajibola
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910103040
19/3/2025 10:10
Security Strategy & Architecture
19 Mar 2025
Opeyemi Ajibola
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910103040
19/3/2025 10:10
Security Strategy & Architecture
19 Mar 2025

Cyber Soundtracks: Navigating the intersection of music, security, and AI

Cyber Soundtracks: Navigating the intersection of music, security, and AI

Victoria Birch
10:10
 - 
10:50
19 Mar
 
2025
Think Tank
25031910104020
19/3/2025 10:10
Artificial Intelligence & Machine Learning
19 Mar 2025
Victoria Birch
10:10
 - 
10:50
19 Mar
 
2025
Think Tank
25031910104020
19/3/2025 10:10
Artificial Intelligence & Machine Learning
19 Mar 2025

Seek and you shall find: Risks highlighted by Copilot for M365

Seek and you shall find: Risks highlighted by Copilot for M365

David Stocks & Victoria Young
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910104030
19/3/2025 10:10
Cloud & Infrastructure Security
19 Mar 2025
David Stocks & Victoria Young
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910104030
19/3/2025 10:10
Cloud & Infrastructure Security
19 Mar 2025

Privacy Act changes in Australia and their impact on security and privacy

Privacy Act changes in Australia and their impact on security and privacy

Alyssa Blackburn
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910105020
19/3/2025 10:10
Governance / Risk & Compliance
19 Mar 2025
Alyssa Blackburn
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910105020
19/3/2025 10:10
Governance / Risk & Compliance
19 Mar 2025

I'm just Ed - anywhere else I'd be a CISO. How to succeed as a Deputy CISO/Second in charge

I'm just Ed - anywhere else I'd be a CISO. How to succeed as a Deputy CISO/Second in charge

Edward Messina
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910105030
19/3/2025 10:10
Executives & Board
19 Mar 2025
Edward Messina
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910105030
19/3/2025 10:10
Executives & Board
19 Mar 2025

Post quantum cryptography: From CRYSTALS to SPHINCS+

Post quantum cryptography: From CRYSTALS to SPHINCS+

Tim Kiermaier
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910105050
19/3/2025 10:10
Security Standards & Frameworks
19 Mar 2025
Tim Kiermaier
10:10
 - 
10:50
19 Mar
 
2025
Breakout
25031910105050
19/3/2025 10:10
Security Standards & Frameworks
19 Mar 2025

Morning Tea Break

Morning Tea Break

TBC
10:50
 - 
11:20
19 Mar
 
2025
Other
25031910501010
19/3/2025 10:50
19 Mar 2025
TBC
10:50
 - 
11:20
19 Mar
 
2025
Other
25031910501010
19/3/2025 10:50
19 Mar 2025

SneakyChef Espionage Campaign: Unveiling the Multi-Staged Attack on Global Government Entities

SneakyChef Espionage Campaign: Unveiling the Multi-Staged Attack on Global Government Entities

Chetan Raghuprasad
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911203010
19/3/2025 11:20
Threat Intelligence & Threat Hunting
19 Mar 2025
Chetan Raghuprasad
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911203010
19/3/2025 11:20
Threat Intelligence & Threat Hunting
19 Mar 2025

Cyber incident response management (a.k.a when the waste-water hits the fan!)

Cyber incident response management (a.k.a when the waste-water hits the fan!)

Rue Maharaj
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911203030
19/3/2025 11:20
Incident Response & Crisis Communications
19 Mar 2025
Rue Maharaj
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911203030
19/3/2025 11:20
Incident Response & Crisis Communications
19 Mar 2025

Using security patterns for securing cloud environments

Using security patterns for securing cloud environments

Ken Fitzpatrick & Deepayan Chanda
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911203040
19/3/2025 11:20
Security Strategy & Architecture
19 Mar 2025
Ken Fitzpatrick & Deepayan Chanda
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911203040
19/3/2025 11:20
Security Strategy & Architecture
19 Mar 2025

Leverage the power of AI / ML to transform your security compliance posture and evolve your adherence to regulatory frameworks

Leverage the power of AI / ML to transform your security compliance posture and evolve your adherence to regulatory frameworks

Mayur Kriplani
11:20
 - 
12:00
19 Mar
 
2025
Think Tank
25031911204010
19/3/2025 11:20
Security Standards & Frameworks
19 Mar 2025
Mayur Kriplani
11:20
 - 
12:00
19 Mar
 
2025
Think Tank
25031911204010
19/3/2025 11:20
Security Standards & Frameworks
19 Mar 2025

How cybersecurity managers anticipate an adverse event

How cybersecurity managers anticipate an adverse event

Gennadiy Belenkiy
11:20
 - 
12:00
19 Mar
 
2025
Think Tank
25031911204020
19/3/2025 11:20
Security Strategy & Architecture
19 Mar 2025
Gennadiy Belenkiy
11:20
 - 
12:00
19 Mar
 
2025
Think Tank
25031911204020
19/3/2025 11:20
Security Strategy & Architecture
19 Mar 2025

That's an enterprise feature! - Exploring the exclusion of Single Sign On from SMB cloud offerings

That's an enterprise feature! - Exploring the exclusion of Single Sign On from SMB cloud offerings

Corch Ω
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911204030
19/3/2025 11:20
Cloud & Infrastructure Security
19 Mar 2025
Corch Ω
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911204030
19/3/2025 11:20
Cloud & Infrastructure Security
19 Mar 2025

Tinker, Tailor, Insider, Outsider: A framework to detect and respond to external threats that manifest as internal risks

Tinker, Tailor, Insider, Outsider: A framework to detect and respond to external threats that manifest as internal risks

Dirk Hodgson
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911205010
19/3/2025 11:20
Human Elements & Criminology
19 Mar 2025
Dirk Hodgson
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911205010
19/3/2025 11:20
Human Elements & Criminology
19 Mar 2025

From data to defence: Using OSINT to build resilience across critical infrastructure supply chains

From data to defence: Using OSINT to build resilience across critical infrastructure supply chains

Emerald Sage
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911205020
19/3/2025 11:20
Governance / Risk & Compliance
19 Mar 2025
Emerald Sage
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911205020
19/3/2025 11:20
Governance / Risk & Compliance
19 Mar 2025

The third 3rd party incident this week: Real world business advice from real world incidents

The third 3rd party incident this week: Real world business advice from real world incidents

Chris Keune & Grant McKechnie
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911205030
19/3/2025 11:20
Executives & Board
19 Mar 2025
Chris Keune & Grant McKechnie
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911205030
19/3/2025 11:20
Executives & Board
19 Mar 2025

DIGITAL IDENTITY: Q&A regarding a successful Australian framework

DIGITAL IDENTITY: Q&A regarding a successful Australian framework

Philip Bos
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911205040
19/3/2025 11:20
Identity Management
19 Mar 2025
Philip Bos
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911205040
19/3/2025 11:20
Identity Management
19 Mar 2025

Lifecycle of a CVE in the context of a CAN

Lifecycle of a CVE in the context of a CAN

Medha Mishra
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911205050
19/3/2025 11:20
Security Standards & Frameworks
19 Mar 2025
Medha Mishra
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911205050
19/3/2025 11:20
Security Standards & Frameworks
19 Mar 2025
No results found.
There are no results with this criteria. Try changing your search.

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.