Australian Cyber Conference Program

Canberra | 17–19 March 2025, National Convention Centre

By Theme
Clear
By Type
Clear
By Location
Clear
Search
Clear
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Tag
Showing 0 of 100

Force Multiplying Risk Management with the Intelligence Cycle

Force Multiplying Risk Management with the Intelligence Cycle

Daryl Sheppard
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912103010
19/3/2025 12:10
Threat Intelligence & Threat Hunting
19 Mar 2025
Daryl Sheppard
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912103010
19/3/2025 12:10
Threat Intelligence & Threat Hunting
19 Mar 2025

A Practical Approach to Assessing AI Risk

A Practical Approach to Assessing AI Risk

Malcolm Shore
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912103020
19/3/2025 12:10
Artificial Intelligence & Machine Learning
19 Mar 2025
Malcolm Shore
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912103020
19/3/2025 12:10
Artificial Intelligence & Machine Learning
19 Mar 2025

From chaos to clarity - the impact of clear communications during a cyber crisis

From chaos to clarity - the impact of clear communications during a cyber crisis

Chloe Soklevski
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912103030
19/3/2025 12:10
Incident Response & Crisis Communications
19 Mar 2025
Chloe Soklevski
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912103030
19/3/2025 12:10
Incident Response & Crisis Communications
19 Mar 2025

War in Ukraine: Threat informed cyber education

War in Ukraine: Threat informed cyber education

Elena Scifleet
12:10
 - 
12:50
19 Mar
 
2025
Think Tank
25031912104010
19/3/2025 12:10
Human Elements & Criminology
19 Mar 2025
Elena Scifleet
12:10
 - 
12:50
19 Mar
 
2025
Think Tank
25031912104010
19/3/2025 12:10
Human Elements & Criminology
19 Mar 2025

How your Microsoft 365 gets hacked (and how to prevent it)

How your Microsoft 365 gets hacked (and how to prevent it)

Sam Brazier-Hollins
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912104030
19/3/2025 12:10
Cloud & Infrastructure Security
19 Mar 2025
Sam Brazier-Hollins
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912104030
19/3/2025 12:10
Cloud & Infrastructure Security
19 Mar 2025

Cloud concentration risk: Are financial institutions heading for a catastrophic disruption event?

Cloud concentration risk: Are financial institutions heading for a catastrophic disruption event?

Matt Ryan & Frank den Hartog
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912105020
19/3/2025 12:10
Governance / Risk & Compliance
19 Mar 2025
Matt Ryan & Frank den Hartog
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912105020
19/3/2025 12:10
Governance / Risk & Compliance
19 Mar 2025

A decade in the making: The evolution of directors' cyber duties

A decade in the making: The evolution of directors' cyber duties

Annie Haggar & Amanda Wescombe
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912105030
19/3/2025 12:10
Executives & Board
19 Mar 2025
Annie Haggar & Amanda Wescombe
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912105030
19/3/2025 12:10
Executives & Board
19 Mar 2025

Securing Australia’s digital future: The case for embracing passkeys and verifiable credentials stored in digital wallets

Securing Australia’s digital future: The case for embracing passkeys and verifiable credentials stored in digital wallets

Narayana Madineni
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912105040
19/3/2025 12:10
Identity Management
19 Mar 2025
Narayana Madineni
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912105040
19/3/2025 12:10
Identity Management
19 Mar 2025

Automation as a key to Essential Eight compliance success

Automation as a key to Essential Eight compliance success

Tarek Mulla
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912105050
19/3/2025 12:10
Security Standards & Frameworks
19 Mar 2025
Tarek Mulla
12:10
 - 
12:50
19 Mar
 
2025
Breakout
25031912105050
19/3/2025 12:10
Security Standards & Frameworks
19 Mar 2025

Lunch Break

Lunch Break

TBC
12:50
 - 
13:50
19 Mar
 
2025
Other
25031912501010
19/3/2025 12:50
19 Mar 2025
TBC
12:50
 - 
13:50
19 Mar
 
2025
Other
25031912501010
19/3/2025 12:50
19 Mar 2025

Now we're getting somewhere: A look at additional log sources that improve hunting and detection in Entra ID and O365

Now we're getting somewhere: A look at additional log sources that improve hunting and detection in Entra ID and O365

John Stoner
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913503010
19/3/2025 13:50
Threat Intelligence & Threat Hunting
19 Mar 2025
John Stoner
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913503010
19/3/2025 13:50
Threat Intelligence & Threat Hunting
19 Mar 2025

How to Seduce a Model (a Large Language Model)

How to Seduce a Model (a Large Language Model)

Harrison Smith
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913503020
19/3/2025 13:50
Artificial Intelligence & Machine Learning
19 Mar 2025
Harrison Smith
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913503020
19/3/2025 13:50
Artificial Intelligence & Machine Learning
19 Mar 2025

Cyber security in maritime operations - Protecting ports and shipping channels from evolving threats

Cyber security in maritime operations - Protecting ports and shipping channels from evolving threats

Ramy Ibrahim
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913503040
19/3/2025 13:50
Security Strategy & Architecture
19 Mar 2025
Ramy Ibrahim
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913503040
19/3/2025 13:50
Security Strategy & Architecture
19 Mar 2025

Building ISM and E8-compliant master images with DevSecOps

Building ISM and E8-compliant master images with DevSecOps

James Bannan
13:50
 - 
14:30
19 Mar
 
2025
Think Tank
25031913504010
19/3/2025 13:50
Cloud & Infrastructure Security
19 Mar 2025
James Bannan
13:50
 - 
14:30
19 Mar
 
2025
Think Tank
25031913504010
19/3/2025 13:50
Cloud & Infrastructure Security
19 Mar 2025

Behaviour hacks: How to build a human-driven cyber defence

Behaviour hacks: How to build a human-driven cyber defence

Reilly Innes
13:50
 - 
14:30
19 Mar
 
2025
Think Tank
25031913504020
19/3/2025 13:50
Human Elements & Criminology
19 Mar 2025
Reilly Innes
13:50
 - 
14:30
19 Mar
 
2025
Think Tank
25031913504020
19/3/2025 13:50
Human Elements & Criminology
19 Mar 2025

Whose resource is this? – Why asset management is key to cloud security

Whose resource is this? – Why asset management is key to cloud security

Pouya Ghotbi
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913504030
19/3/2025 13:50
Cloud & Infrastructure Security
19 Mar 2025
Pouya Ghotbi
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913504030
19/3/2025 13:50
Cloud & Infrastructure Security
19 Mar 2025

Femme Fatale - Women agents and technical operators in the evolution of espionage

Femme Fatale - Women agents and technical operators in the evolution of espionage

Mike Pritchard & Vannessa Van Beek
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913505010
19/3/2025 13:50
Human Elements & Criminology
19 Mar 2025
Mike Pritchard & Vannessa Van Beek
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913505010
19/3/2025 13:50
Human Elements & Criminology
19 Mar 2025

Preparing for the inevitable: Cyber resilience as a catalyst for transformation

Preparing for the inevitable: Cyber resilience as a catalyst for transformation

Pierre Tagle
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913505030
19/3/2025 13:50
Executives & Board
19 Mar 2025
Pierre Tagle
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913505030
19/3/2025 13:50
Executives & Board
19 Mar 2025

Biometric authentication: Risks and opportunities

Biometric authentication: Risks and opportunities

Gaurav Vikash
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913505040
19/3/2025 13:50
Identity Management
19 Mar 2025
Gaurav Vikash
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913505040
19/3/2025 13:50
Identity Management
19 Mar 2025

Introduction to threat modelling

Introduction to threat modelling

Edward Farrell
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914403010
19/3/2025 14:40
Threat Intelligence & Threat Hunting
19 Mar 2025
Edward Farrell
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914403010
19/3/2025 14:40
Threat Intelligence & Threat Hunting
19 Mar 2025

Better security with code analytics and predictive maintenance

Better security with code analytics and predictive maintenance

Peter Freiberg
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914403020
19/3/2025 14:40
Artificial Intelligence & Machine Learning
19 Mar 2025
Peter Freiberg
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914403020
19/3/2025 14:40
Artificial Intelligence & Machine Learning
19 Mar 2025

Mastering DDoS defense: A survival guide for Australian organisations

Mastering DDoS defense: A survival guide for Australian organisations

Harman Nagra
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914403040
19/3/2025 14:40
Security Strategy & Architecture
19 Mar 2025
Harman Nagra
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914403040
19/3/2025 14:40
Security Strategy & Architecture
19 Mar 2025

Defending the Nexus: A league of legends approach to cyber security

Defending the Nexus: A league of legends approach to cyber security

Arjun Xavshaw
14:40
 - 
15:20
19 Mar
 
2025
Think Tank
25031914404020
19/3/2025 14:40
Security Strategy & Architecture
19 Mar 2025
Arjun Xavshaw
14:40
 - 
15:20
19 Mar
 
2025
Think Tank
25031914404020
19/3/2025 14:40
Security Strategy & Architecture
19 Mar 2025

Detecting and mitigating active directory compromises

Detecting and mitigating active directory compromises

James Duncan
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914404030
19/3/2025 14:40
Cloud & Infrastructure Security
19 Mar 2025
James Duncan
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914404030
19/3/2025 14:40
Cloud & Infrastructure Security
19 Mar 2025
No results found.
There are no results with this criteria. Try changing your search.

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.