Sessions

26/3/2024
11:05
 - 
11:45
Essential 8 - Why it's so hard and how to change your approach to make it easier
Tim Archer
View details
26/3/2024
11:50
 - 
12:30
A risk based approach to managing Supply Chain Cyber Exposure informed by current threats and real incidents
Blare Sutton
View details
26/3/2024
12:35
 - 
13:15
VPNs and post-quantum security
Anantha Kandiah
View details
26/3/2024
14:00
 - 
14:40
DNS: Dangers 'N' Solutions
Dale Bowie
View details
26/3/2024
14:45
 - 
15:25
Insider threat - A primer for planning & response
Nick Mazitelli
View details
27/3/2024
10:20
 - 
11:00
TBC
TBC
View details
27/3/2024
11:30
 - 
12:10
Inside Out: Understanding insider threats through digital forensics investigation
Luke Bradley
View details
27/3/2024
12:15
 - 
12:55
Breaking free from security standards: A practical way to build and assess your controls
Jennifer Vu
View details
27/3/2024
13:55
 - 
14:35
Zero trust deconstructed and practical applications to government
Hansang Bae
View details
27/3/2024
14:40
 - 
15:20
TBC
TBC
View details

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country