Australian Cyber Conference Program

Canberra | 17–19 March 2025, National Convention Centre

By Theme
Clear
By Type
Clear
By Location
Clear
Search
Clear
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Tag
Showing 0 of 100

The devil’s in the details: OSINT and social engineering - Why threat actors don’t need to know how to hack

The devil’s in the details: OSINT and social engineering - Why threat actors don’t need to know how to hack

Georgia Turnham
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914405010
19/3/2025 14:40
Human Elements & Criminology
19 Mar 2025
Georgia Turnham
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914405010
19/3/2025 14:40
Human Elements & Criminology
19 Mar 2025

Using automation to link evidence to compliance controls for the Essential 8

Using automation to link evidence to compliance controls for the Essential 8

Gavin Coulthard
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914405020
19/3/2025 14:40
Governance / Risk & Compliance
19 Mar 2025
Gavin Coulthard
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914405020
19/3/2025 14:40
Governance / Risk & Compliance
19 Mar 2025

The unique challenges of managing cyber security risks in not-for-profits

The unique challenges of managing cyber security risks in not-for-profits

Tammy Ven Dange
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914405030
19/3/2025 14:40
Executives & Board
19 Mar 2025
Tammy Ven Dange
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914405030
19/3/2025 14:40
Executives & Board
19 Mar 2025

Building boardroom trust - Articulating the business impact of IAM investments with outcome-driven metrics

Building boardroom trust - Articulating the business impact of IAM investments with outcome-driven metrics

Narayana Madineni & Krishanu Sikdar
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914405040
19/3/2025 14:40
Identity Management
19 Mar 2025
Narayana Madineni & Krishanu Sikdar
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914405040
19/3/2025 14:40
Identity Management
19 Mar 2025

Engaging the enemy: Decision makers how to appease them

Engaging the enemy: Decision makers how to appease them

Greg Wilson
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914405050
19/3/2025 14:40
Security Standards & Frameworks
19 Mar 2025
Greg Wilson
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914405050
19/3/2025 14:40
Security Standards & Frameworks
19 Mar 2025

Afternoon Tea Break

Afternoon Tea Break

TBC
15:20
 - 
15:50
19 Mar
 
2025
Other
25031915201010
19/3/2025 15:20
19 Mar 2025
TBC
15:20
 - 
15:50
19 Mar
 
2025
Other
25031915201010
19/3/2025 15:20
19 Mar 2025

A foretaste of the future: Navigating the cyber security landscape in 2025

A foretaste of the future: Navigating the cyber security landscape in 2025

Paula Januszkiewicz
15:50
 - 
17:00
19 Mar
 
2025
Keynote
25031915502010
19/3/2025 15:50
19 Mar 2025
Paula Januszkiewicz
15:50
 - 
17:00
19 Mar
 
2025
Keynote
25031915502010
19/3/2025 15:50
19 Mar 2025
No results found.
There are no results with this criteria. Try changing your search.

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.