Australian Cyber Conference Program (First Release)

Canberra | 17–19 March 2025, National Convention Centre

By Theme
Clear
By Type
Clear
By Location
Clear
Search
Clear
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Tag
Showing 0 of 100

Tinker, Tailor, Insider, Outsider: A framework to detect and respond to external threats that manifest as internal risks

Tinker, Tailor, Insider, Outsider: A framework to detect and respond to external threats that manifest as internal risks

Dirk Hodgson
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911205010
19/3/2025 11:20
Human Elements & Criminology
19 Mar 2025
Dirk Hodgson
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911205010
19/3/2025 11:20
Human Elements & Criminology
19 Mar 2025

From Data to Defence: Using OSINT to Build Resilience Across Critical Infrastructure Supply Chains

From Data to Defence: Using OSINT to Build Resilience Across Critical Infrastructure Supply Chains

Emerald Sage
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911205020
19/3/2025 11:20
Governance / Risk & Compliance
19 Mar 2025
Emerald Sage
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911205020
19/3/2025 11:20
Governance / Risk & Compliance
19 Mar 2025

The third 3rd party incident this week: Real world business advice from real world incidents

The third 3rd party incident this week: Real world business advice from real world incidents

Chris Keune & Grant McKechnie
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911205030
19/3/2025 11:20
Executives & Board
19 Mar 2025
Chris Keune & Grant McKechnie
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911205030
19/3/2025 11:20
Executives & Board
19 Mar 2025

DIGITAL IDENTITY: Q and A regarding a successful Australian framework

DIGITAL IDENTITY: Q and A regarding a successful Australian framework

Philip Bos
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911205040
19/3/2025 11:20
Identity Management
19 Mar 2025
Philip Bos
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911205040
19/3/2025 11:20
Identity Management
19 Mar 2025

Lifecycle of a CVE in the context of a CAN

Lifecycle of a CVE in the context of a CAN

Medha Mishra
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911205050
19/3/2025 11:20
Security Standards & Frameworks
19 Mar 2025
Medha Mishra
11:20
 - 
12:00
19 Mar
 
2025
Breakout
25031911205050
19/3/2025 11:20
Security Standards & Frameworks
19 Mar 2025

Force Multiplying Risk Management with the Intelligence Cycle

Force Multiplying Risk Management with the Intelligence Cycle

Daryl Sheppard
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912103010
19/3/2025 12:10
Threat Intelligence & Threat Hunting
19 Mar 2025
Daryl Sheppard
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912103010
19/3/2025 12:10
Threat Intelligence & Threat Hunting
19 Mar 2025

A Practical Approach to Assessing AI Risk

A Practical Approach to Assessing AI Risk

Malcolm Shore
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912103020
19/3/2025 12:10
Artificial Intelligence & Machine Learning
19 Mar 2025
Malcolm Shore
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912103020
19/3/2025 12:10
Artificial Intelligence & Machine Learning
19 Mar 2025

From chaos to clarity - the impact of clear communications during a cyber crisis

From chaos to clarity - the impact of clear communications during a cyber crisis

Chloe Soklevski
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912103030
19/3/2025 12:10
Incident Response & Crisis Communications
19 Mar 2025
Chloe Soklevski
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912103030
19/3/2025 12:10
Incident Response & Crisis Communications
19 Mar 2025

The Challenges of Identity Management in Operational Technology Networks

The Challenges of Identity Management in Operational Technology Networks

Luke Forsyth
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912103040
19/3/2025 12:10
Security Strategy & Architecture
19 Mar 2025
Luke Forsyth
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912103040
19/3/2025 12:10
Security Strategy & Architecture
19 Mar 2025

War in Ukraine: Threat informed cyber education

War in Ukraine: Threat informed cyber education

Elena Scifleet
12:10
 - 
12:50
19 Mar
 
2025
Think Tank
25031912104010
19/3/2025 12:10
Human Elements & Criminology
19 Mar 2025
Elena Scifleet
12:10
 - 
12:50
19 Mar
 
2025
Think Tank
25031912104010
19/3/2025 12:10
Human Elements & Criminology
19 Mar 2025

Understanding digital resilience: A multidimensional study of victimisation and recovery in sextortion cases

Understanding digital resilience: A multidimensional study of victimisation and recovery in sextortion cases

Alina Abramenko
12:10
 - 
12:50
19 Mar
 
2025
Think Tank
25031912104020
19/3/2025 12:10
Human Elements & Criminology
19 Mar 2025
Alina Abramenko
12:10
 - 
12:50
19 Mar
 
2025
Think Tank
25031912104020
19/3/2025 12:10
Human Elements & Criminology
19 Mar 2025

How your Microsoft 365 gets hacked (and how to prevent it)

How your Microsoft 365 gets hacked (and how to prevent it)

Sam Brazier-Hollins
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912104030
19/3/2025 12:10
Cloud & Infrastructure Security
19 Mar 2025
Sam Brazier-Hollins
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912104030
19/3/2025 12:10
Cloud & Infrastructure Security
19 Mar 2025

Dark web dynamics: Exposing the amplified risks of insider threats

Dark web dynamics: Exposing the amplified risks of insider threats

Balaji Kapsikar
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912105010
19/3/2025 12:10
Human Elements & Criminology
19 Mar 2025
Balaji Kapsikar
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912105010
19/3/2025 12:10
Human Elements & Criminology
19 Mar 2025

Cloud concentration risk: Are financial institutions heading for a catastrophic disruption event?

Cloud concentration risk: Are financial institutions heading for a catastrophic disruption event?

Matt Ryan & Frank den Hartog
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912105020
19/3/2025 12:10
Governance / Risk & Compliance
19 Mar 2025
Matt Ryan & Frank den Hartog
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912105020
19/3/2025 12:10
Governance / Risk & Compliance
19 Mar 2025

A decade in the making: The evolution of directors' cyber duties

A decade in the making: The evolution of directors' cyber duties

Annie Haggar & Amanda Wescombe
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912105030
19/3/2025 12:10
Executives & Board
19 Mar 2025
Annie Haggar & Amanda Wescombe
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912105030
19/3/2025 12:10
Executives & Board
19 Mar 2025

Securing Australia’s digital future: The case for embracing passkeys and verifiable credentials stored in digital wallets

Securing Australia’s digital future: The case for embracing passkeys and verifiable credentials stored in digital wallets

Narayana Madineni & Craig Pearson
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912105040
19/3/2025 12:10
Identity Management
19 Mar 2025
Narayana Madineni & Craig Pearson
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912105040
19/3/2025 12:10
Identity Management
19 Mar 2025

Automation as a key to Essential Eight compliance success

Automation as a key to Essential Eight compliance success

Tarek Mulla
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912105050
19/3/2025 12:10
Security Standards & Frameworks
19 Mar 2025
Tarek Mulla
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912105050
19/3/2025 12:10
Security Standards & Frameworks
19 Mar 2025

Lunch Break

Lunch Break

TBC
12:50
 - 
13:50
19 Mar
 
2025
Other
25031912501010
19/3/2025 12:50
19 Mar 2025
TBC
12:50
 - 
13:50
19 Mar
 
2025
Other
25031912501010
19/3/2025 12:50
19 Mar 2025

Now We're Getting Somewhere: A Look At Additional Log Sources That Improve Hunting and Detection in Entra ID and O365

Now We're Getting Somewhere: A Look At Additional Log Sources That Improve Hunting and Detection in Entra ID and O365

John Stoner
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913503010
19/3/2025 13:50
Threat Intelligence & Threat Hunting
19 Mar 2025
John Stoner
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913503010
19/3/2025 13:50
Threat Intelligence & Threat Hunting
19 Mar 2025

How to Seduce a Model (a Large Language Model)

How to Seduce a Model (a Large Language Model)

Harrison Smith
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913503020
19/3/2025 13:50
Artificial Intelligence & Machine Learning
19 Mar 2025
Harrison Smith
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913503020
19/3/2025 13:50
Artificial Intelligence & Machine Learning
19 Mar 2025

Cybersecurity in Maritime Operations - Protecting Ports and Shipping Channels from Evolving Threats

Cybersecurity in Maritime Operations - Protecting Ports and Shipping Channels from Evolving Threats

Ramy Ibrahim
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913503040
19/3/2025 13:50
Security Strategy & Architecture
19 Mar 2025
Ramy Ibrahim
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913503040
19/3/2025 13:50
Security Strategy & Architecture
19 Mar 2025

Building ISM and E8-compliant master images with DevSecOps

Building ISM and E8-compliant master images with DevSecOps

James Bannan
13:50
 - 
14:30
19 Mar
 
2025
Think Tank
25031913504010
19/3/2025 13:50
Cloud & Infrastructure Security
19 Mar 2025
James Bannan
13:50
 - 
14:30
19 Mar
 
2025
Think Tank
25031913504010
19/3/2025 13:50
Cloud & Infrastructure Security
19 Mar 2025

Behaviour hacks: How to build a human-driven cyber defence

Behaviour hacks: How to build a human-driven cyber defence

Reilly Innes
13:50
 - 
14:30
19 Mar
 
2025
Think Tank
25031913504020
19/3/2025 13:50
Human Elements & Criminology
19 Mar 2025
Reilly Innes
13:50
 - 
14:30
19 Mar
 
2025
Think Tank
25031913504020
19/3/2025 13:50
Human Elements & Criminology
19 Mar 2025

Whose Resource is This? – Why Asset Management is Key to Cloud Security

Whose Resource is This? – Why Asset Management is Key to Cloud Security

Pouya Ghotbi
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913504030
19/3/2025 13:50
Cloud & Infrastructure Security
19 Mar 2025
Pouya Ghotbi
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913504030
19/3/2025 13:50
Cloud & Infrastructure Security
19 Mar 2025
No results found.
There are no results with this criteria. Try changing your search.

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.