Sessions

26/3/2024
11:05
 - 
11:45
Which and how of cyber security frameworks-identify and implement the perfect fit
Gaurav Vikash
View details
26/3/2024
11:50
 - 
12:30
Level 100 druids beware: Online gaming and the new frontier of malign influence and interference
Steven Coomber
View details
26/3/2024
12:35
 - 
13:15
Security and the social internet of things
Travis Quinn
View details
26/3/2024
14:00
 - 
14:40
Tracking advanced persistent threats through advanced SIGINT techniques
Ryan Sherstobitoff
View details
26/3/2024
14:45
 - 
15:25
Navigating the convergence of GDPR and Australian privacy principles - A comparative analysis
Asrar Ismail
View details
27/3/2024
10:20
 - 
11:00
The government has identified the Medibank hacker –does law enforcement make any difference in protecting Australians, and if it doesn’t, what will?
Simone Herbert-Lowe
View details
27/3/2024
11:30
 - 
12:10
Success with privileged access management - its more than the tools
Ash Coward
View details
27/3/2024
12:15
 - 
12:55
Global insight into changing ransomware techniques
Raj Samani
View details
27/3/2024
13:55
 - 
14:35
Emotional intelligence in effective risk communication
Monika Mathur
View details
27/3/2024
14:40
 - 
15:20
Unlocking the mystery of zeroknowledge proofs to ensure the security of eGovernment
Sameer Ali
View details

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country