Sessions

26/3/2024
11:05
 - 
11:45
Processing threat reports at scale using AI and ML: Expectations and reality
Yury Sergeev
View details
26/3/2024
11:50
 - 
12:30
Putin, Hamas, Hezbollah: How current kynetic conflicts play out in cyber space
Jana Dekanovska
View details
26/3/2024
12:35
 - 
13:15
Hacktivism - the misunderstood threat
Davyn Baumann
View details
26/3/2024
14:00
 - 
14:40
Navigating the cyber frontier: Mastering cyber threat intelligence management in business
Nick Baragar & Alexander Gould
View details
26/3/2024
14:45
 - 
15:25
From STIX to MISP and back again: how hard could it be?
Chris Horsley
View details
26/3/2024
14:45
 - 
15:25
Asymmetric warfare in the cyber domain
Katherine Weissel
View details
27/3/2024
12:15
 - 
12:55
Global insight into changing ransomware techniques
Raj Samani
View details

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country