An invitation for leaders to leave an energetic imprint. To listen deeply, act with intention, and dare to challenge the status quo not for recognition, but for regeneration. This is......
This session will explore key perspectives on insider threats, focusing on the critical role of intention in predicting and preventing harmful actions. We examine various methods and tools for identifying......
With the hype around AI and machine learning; which has actually been around for decades; there is a rise in shadow AI with the associated traditional risk of data being......
Trump, Putin and Xi Jinping — how three wildcards are overturning global security. To understand what’s happening in the world we need to get into the minds of three of......
As Artificial Intelligence (AI) technologies evolve at an unprecedented rate, so too does the potential for their misuse. The growing threat posed by AI-generated Deep Fakes and Synthetic Identity attacks......
Amanda Spencer explores how organisations can move beyond reactive cybersecurity and align strategy, culture and operations to build true resilience. Using recent breaches and threat intelligence, she contrasts the risks......
When Doors Lie is a sharp look at how digital exploits are unlocking real-world access in ways most organisations never see coming. Cybersecurity consultant John Kouroutzoglou unpacks major case studies,......
An overview and insight into why third party risk is a growing security issue and exploration of the available mitigation strategies. Key Session Takeaways: • How third party risk directly......
In this session, we’ll explore the transformative rise of AI and its growing impact across industries. We’ll start by unpacking the following: • Key AI trends highlighting how intelligent systems......
The presentation aims to address current complexities and also some unique strategies against using CTI (Strategic, Tactical & Operational) information for uplifting the overall security posture. Including using CTI data......
Data-driven technologies and process optimisation techniques are changing the effectiveness of operations. Machine Learning (AI) and other modern tools are delivering tremendous benefits to organisations to be more effective in......
Getting people to implement security controls is hard. The traditional method of sending people policies and processes and expecting them to implement these effectively leads to inconsistent results. This presents......
Protective security encompasses efforts to safeguard people, assets, and information from threats including terrorism, cyberattacks, espionage, and insider threats. As threats grow in complexity and scale, a collaborative approach between......
Physical access still relies heavily on trust—keys get lost, credentials are shared, and permissions quickly become outdated. While cybersecurity universally embraces zero-trust models, physical access management dangerously lags behind, creating......
Cybersecurity professionals often rely on technical jargon, acronyms, and complex terminologies that often alienate stakeholders and inadvertently create barriers between security teams and business leaders. This session is designed to......
A strong security culture is more than just having the right technology – it involves cultivating a mindset and behaviours where security becomes everyone’s responsibility. It is a continuous effort......
Jonathan will share with the audience the approach being taken to implement an assurance framework for the SOCI Act and lessons learnt from the early trails. Top tips for entities......
Overview of the Brisbane 2032 Olympic and Paralympic Games. Role of the Brisbane 2032 Organising Committee and Games partners. Scale of the Games and how the security industry can register......