Australian Cyber Conference Program (First Release)

Canberra | 17–19 March 2025, National Convention Centre

By Theme
Clear
By Type
Clear
By Location
Clear
Search
Clear
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Tag
Showing 0 of 100

Femme Fatale - Women agents and technical operators in the evolution of espionage

Femme Fatale - Women agents and technical operators in the evolution of espionage

Mike Pritchard & Vannessa Van Beek
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913505010
19/3/2025 13:50
Human Elements & Criminology
19 Mar 2025
Mike Pritchard & Vannessa Van Beek
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913505010
19/3/2025 13:50
Human Elements & Criminology
19 Mar 2025

Preparing for the inevitable: Cyber resilience as a catalyst for transformation

Preparing for the inevitable: Cyber resilience as a catalyst for transformation

Pierre Tagle
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913505030
19/3/2025 13:50
Executives & Board
19 Mar 2025
Pierre Tagle
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913505030
19/3/2025 13:50
Executives & Board
19 Mar 2025

Biometric authentication: Risks and opportunities

Biometric authentication: Risks and opportunities

Gaurav Vikash
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913505040
19/3/2025 13:50
Identity Management
19 Mar 2025
Gaurav Vikash
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913505040
19/3/2025 13:50
Identity Management
19 Mar 2025

Cyber Security and AUKUS: How will AUKUS change the security landscape in Australia, what will this look like and how will it affect you?

Cyber Security and AUKUS: How will AUKUS change the security landscape in Australia, what will this look like and how will it affect you?

Kat McCrabb & Aaron Pollard
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913505050
19/3/2025 13:50
Security Standards & Frameworks
19 Mar 2025
Kat McCrabb & Aaron Pollard
13:50
 - 
14:30
19 Mar
 
2025
Breakout
25031913505050
19/3/2025 13:50
Security Standards & Frameworks
19 Mar 2025

Introduction to Threat Modelling

Introduction to Threat Modelling

Edward Farrell
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914403010
19/3/2025 14:40
Threat Intelligence & Threat Hunting
19 Mar 2025
Edward Farrell
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914403010
19/3/2025 14:40
Threat Intelligence & Threat Hunting
19 Mar 2025

Mastering DDoS defense: A survival guide for Australian organisations

Mastering DDoS defense: A survival guide for Australian organisations

Harman Nagra
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914403040
19/3/2025 14:40
Security Strategy & Architecture
19 Mar 2025
Harman Nagra
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914403040
19/3/2025 14:40
Security Strategy & Architecture
19 Mar 2025

Building Resilient Cloud Infrastructures: Golden Paths and Cyber Shields for Multi-Cloud Stability

Building Resilient Cloud Infrastructures: Golden Paths and Cyber Shields for Multi-Cloud Stability

Saurabh Bajaj
14:40
 - 
15:20
19 Mar
 
2025
Think Tank
25031914404010
19/3/2025 14:40
Cloud & Infrastructure Security
19 Mar 2025
Saurabh Bajaj
14:40
 - 
15:20
19 Mar
 
2025
Think Tank
25031914404010
19/3/2025 14:40
Cloud & Infrastructure Security
19 Mar 2025

Defending the Nexus: A league of legends approach to cyber security

Defending the Nexus: A league of legends approach to cyber security

Arjun Xavshaw
14:40
 - 
15:20
19 Mar
 
2025
Think Tank
25031914404020
19/3/2025 14:40
Security Strategy & Architecture
19 Mar 2025
Arjun Xavshaw
14:40
 - 
15:20
19 Mar
 
2025
Think Tank
25031914404020
19/3/2025 14:40
Security Strategy & Architecture
19 Mar 2025

Detecting and Mitigating Active Directory Compromises

Detecting and Mitigating Active Directory Compromises

James Duncan
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914404030
19/3/2025 14:40
Cloud & Infrastructure Security
19 Mar 2025
James Duncan
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914404030
19/3/2025 14:40
Cloud & Infrastructure Security
19 Mar 2025

The devil’s in the details: OSINT and social engineering - Why threat actors don’t need to know how to hack

The devil’s in the details: OSINT and social engineering - Why threat actors don’t need to know how to hack

Georgia Turnham
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914405010
19/3/2025 14:40
Human Elements & Criminology
19 Mar 2025
Georgia Turnham
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914405010
19/3/2025 14:40
Human Elements & Criminology
19 Mar 2025

Using automation to link evidence to compliance controls for the Essential 8

Using automation to link evidence to compliance controls for the Essential 8

Gavin Coulthard
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914405020
19/3/2025 14:40
Governance / Risk & Compliance
19 Mar 2025
Gavin Coulthard
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914405020
19/3/2025 14:40
Governance / Risk & Compliance
19 Mar 2025

The unique challenges of managing cyber security risks in not for profits

The unique challenges of managing cyber security risks in not for profits

Tammy Ven Dange
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914405030
19/3/2025 14:40
Executives & Board
19 Mar 2025
Tammy Ven Dange
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914405030
19/3/2025 14:40
Executives & Board
19 Mar 2025

Building boardroom trust - Articulating the Business Impact of IAM Investments with Outcome-Driven Metrics

Building boardroom trust - Articulating the Business Impact of IAM Investments with Outcome-Driven Metrics

Narayana Madineni & Krishanu Sikdar
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914405040
19/3/2025 14:40
Identity Management
19 Mar 2025
Narayana Madineni & Krishanu Sikdar
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914405040
19/3/2025 14:40
Identity Management
19 Mar 2025

Engaging the enemy: Decision makers how to appease them

Engaging the enemy: Decision makers how to appease them

Greg Wilson
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914405050
19/3/2025 14:40
Security Standards & Frameworks
19 Mar 2025
Greg Wilson
14:40
 - 
15:20
19 Mar
 
2025
Breakout
25031914405050
19/3/2025 14:40
Security Standards & Frameworks
19 Mar 2025

Afternoon Tea Break

Afternoon Tea Break

TBC
15:20
 - 
15:50
19 Mar
 
2025
Other
25031915201010
19/3/2025 15:20
19 Mar 2025
TBC
15:20
 - 
15:50
19 Mar
 
2025
Other
25031915201010
19/3/2025 15:20
19 Mar 2025

A foretaste of the future: Navigating the cyber security landscape in 2025

A foretaste of the future: Navigating the cyber security landscape in 2025

Paula Januszkiewicz
15:50
 - 
17:00
19 Mar
 
2025
Keynote
25031915502010
19/3/2025 15:50
19 Mar 2025
Paula Januszkiewicz
15:50
 - 
17:00
19 Mar
 
2025
Keynote
25031915502010
19/3/2025 15:50
19 Mar 2025
No results found.
There are no results with this criteria. Try changing your search.

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.