Speakers FEATURED SPEAKERS Singapore Dr Magda Chelly Cyber Risk Sydney Chris Cubbage – Executive Director & Editor | MySec.TV & Cyber Security Podcast Host Security Australia Dr Gav Schneider Risk Management Australia Shamane Tan Cyber Security JOIN AS SPEAKER Filter by: Location Adelaide Australia Austria Bangkok Bogota Brisbane Canada Canberra Colombia Dubai France Germany Ghana Gold Coast Greater Boston Greater Brisbane Area Hong Kong India Israel Japan Jordan Korea Kuala Lumpur Las Vegas London Luxembourg Malaysia Melbourne Monaco Netherlands New Zealand Oman Online Perth, WA Philippines Portugal Qatar Romania Russia Singapore South Korea Sweden Switzerland Sydney Sydney, NSW Taiwan Tanzania Texas Thailand Tokyo UAE United Kingdom United States Speciality Aerospace and Defence Aerospace and Drone Expert AI Technologist Artificial Intelligence Astronomy Autonomous B2B Sales BCI Technology Blockchain Blockchain Technologies Business Strategic Planning Channel Analyst Cloud Architecture Cloud Security Communication Computer Networking Computer Science and Mathematics Computing and Security Consultant Consulting Criminology Cyber Crime Cyber Defense Cyber Risk Cyber Security Cyber Strategist Cyber Threat Intelligence Cybersecurity Data & Analytics Data Analysts Data Governance Data Scientis Data Scientist Defence and Security Defence Systems Defense Defense and Space Digital Forensics Digital Innovator Digital Transformation Drone Pilot Drones E-Governance Ecosystem Fitness Forensic Science Imaging Scientist Information & Technology Infrastructure Consultant Inventor Investment IoT IoT Solutions IT and telecommunications IT security Land Warfare Legal Advisor Machine Learning Media Consolidation Missile systems Network Security Networking planetary scientist Policy Researcher Politicians PowerAI Quantum Computing R&D Experts Risk Management Robotics RSA Security Safety Sales Engineering Sales professional Security Security & Author Security & Strategy Security & Technology Security and Resilience Security and Technology Security Consultant Security Evangelist Security Management Security Researcher Security Solutions Security Specialist Smart Cities Smart City Smart Grid Smart Home Space Space & Technology Space Entrepreneurship Space Science and Technology Space Technology strategist Strategist and Defence strategy Tech Entrepreneur Technical and Sales Technology Threat Intelligence Threat Researcher Urban Transformation Wireless Communications Writer Topic (ISC)² #TechVision2019 12 trends to watch in 2019 2019 2019 Trustwave Global Security Report 2020 2020 predictions report 2020 technology trends predictions 24X7 POWER 3 U's of Data Security 3C of Cyber 3D Printing 5G 5G mobile networks 5G Security 5G transformation A10 Networks Accelerating cybersecurity growth Accenture access control Access control system Access Management Access Threat account management account takeover (ATO) attacks Account Takeover Activity Actionable Intelligence Active Directory Security Adoption Adrian Beer Advanced Advanced cyberattacks Advanced Exploitation Advanced Manufacturing Advanced Persistent Threats Advanced technology advanced threats Adversary Tradecraft advisory councils Adware Aerospace Africa after Corona AI AI and Machine Learning AI Combats AI ethics AI governance AI Infrastructure AI/ML implementation Air Mobility Air-blown micro cables Air-Maritime Cooperation Aircraft airlines airport Airport Security Akamai Alastair MacGibbon algorithms Alternative Payments Amazon CloudFront Amazon Web Services AMNESIA:33 Analysis Analysis Tool Analyst Analytics Analytics Automation Analytics Primer analytics solutions analyze Anglo American Anti-drone solution Anti-Fraud Resilience Anti-Machine Learning anti-malware Anti-ransomware technology anti-virus antivirus Antivirus solutions APAC APAC Chiefs APAC consumers API API Protection API Security API Technology APIs app-centric success application Application Attacks application health Application Programming Interfaces Application Security Application Services Application Strategy applications APs APT APT29 MITRE ATTACK APTs AR/VR AR/VR Smart Tech Artifical Intelligence Artificial Intelligence ASEAN ASEAN utilities ASEAN-Australia Digital Trade Standards Cooperation Initiative Asia Pacific Asia-Pacific ASIAL Asian space organization ASITII 21 Assault Assessing Risk Asset Management assets and landmarks ASX 200 organisations ATLAS attack Attack surface management Attack trends attack vector attacks Auditing AI & Emerging Technology Audits Aussie businesses AustCyber Australia Australia and New Zealand Australia-ASEAN Australia’s construction and maintenance industries Australia’s Cybersecurity Sector Australia’s workforce Australia's space industry Australian Australian and New Zealand consumers Australian businesses Australian companies Australian Cyber Security Centre Australian Cyber Security Industry Roadmap Australian economic Australian economy Australian enterprises Australian Government Australian government websites Australian jobs Australian Market Threat Report Australian Networks Australian Parliament House Australian Prudential Regulatory Authority Australian Space Agency Australian Tech Authentication authentication technologies Auto Scaling automated networks automated source Automation Automation Support Automation technology Automotive Industry Autonomous Autonomous Drones available Averaging Attacks Aviation aviation vietnam Awards awareness AWS AWS Cloud AWS Marketplace AWS Services Axis Experience Centre Azure B2B security event Baby Monitoring Camera Bachelor of IT backhauling Backup Backup solutions Badhatch Balancing Fire Safety & Security Baldr Bank Debit bankcard fraud Banking banking Trojan Banking Trojans Barracuda Battle strategies BDO BEC attacks Behavioral Anomaly Detection Behavioral Health Behaviour Detection Behavioural Analysis behavioural health benchmark Benchmarking Beyondtrust BFSI BGP Security BHP Bias in AI Big Challenges Big Data biomedical devices biometrics Biotech Bitcoin Blackberry Blockchain Blockchain Framework Blockchain Networks Blockchain technologies Body armour Border Gateway Protocol border protection Border Security Bosch Camera Review bot attacks Bot geography Bot management solutions Bot mitigation bot visibility botnets Bots Down Under BPI Network Brain-Computer Interface Brand Trust Breach Manager Breach Prevention Breach Protection Breaches breakout time bribery and corruption threat Browser isolation Budgets Bug Bounty Building Building a global team building automation Building Fibre Dense Networks Built environment Built Environment Event Business Business challenges Business Competition Business Continuity business development Business Email Compromise business email compromise attacks Business Environment Business Fraud Business interruption Business IT systems business leaders Business Models Business Resilience Business risk Business strategies Business Success Business Technology business threats businesses businesses in Australia BYOD C-IED C-level executives C-Suite C-suite executives CAEC Call Centre Canada canalys Capital Investment Carbon Black card fraud careers Carrier Ethernet case studies Cashless Systems Catastrophic risks CBRNe CCSP CCSP certification CCTV CDAO CDR CEDA CEOs certificate-related outages Certification Certification Prep Kit Certified Certified Cloud Security Professional Certified Ethical Hacker Training CFAC CFO Chafer APT Challenge challenger banks Challenges channel Check Point chief information officers Chief Information Security Office chief information security officers child sexual exploitation online China China Conundrum China's support for Russia Chinese cyber operations Chinese economy Christmas shoppers CIAM CIO CIOs CISCO CISO CISO Lens CISO Survey CISOs CISSP CISSP certification Cities and Strategy CLAC Client Information Gaps Climate & Security Climate And Security Climate change Climate threats Cloud cloud account attacks cloud adoption Cloud and IT services Cloud Architecture Cloud attack Cloud Computing Cloud Computing Forensics cloud data Cloud Data Management Cloud Data Warehousing Cloud Delivered Solutions Cloud Edge Cloud environment Cloud Foundation cloud industry Cloud Infrastructure Cloud infrastructures Cloud migrations Cloud Misconfigurations Cloud Native Networking Cloud Networking Cloud Networks cloud platforms Cloud Protection Cloud readiness Cloud Security Cloud security risks cloud service providers’ cloud services Cloud Snooper cloud solutions Cloud Strategy Cloud systems cloud technologies Cloud technology Cloud Threat cloud transformation Cloud Trends cloud-based Cloud-based Servers Cloud-based Services Cloud-based solutions Cloud-Native Cloud-native networking Cloudera Streaming Analytics CloudGenix CMD+CTRL Cyber Range CMMC CNAC CNII-Critical National Information Infrastructure. Coalition Against Stalkerware Code of Practice code quality risk CodeMeter Coding Cognizant Collaboration Collect health and safety Colonial Pipeline commercial networks commercial software Commercial UAS committees Communication System Communications Communications industry communications technology Compliance Compliance Laws and Regulations compromise CompTIA compute computer hacking computer network Computer Security Computing devices Conference Confidential information Configuration Connected Device Security Connected Women connection time Connectivity considerations Consulting Consulting & Professional Services Consumer Behaviours Consumer Data Right Consumer preferences Contact Centre convenience and security convenient digital experiences core network security Coronavirus Coronavirus pandemic Counter Drones Counter Terrorism Counter-Drone Counter-terrorist Counterdrone Course COVID 19 vaccinations COVID-19 COVID-19 analytics hub COVID-19 Effects Covid-19 experience COVID-19 technologies COVID-19 Tensions CPAC CPTO crafted attacks credential abuse credential abuse attacks Credential Exposure credential stuffing attacks credential theft Credentials Crime Crime prevention Crimeware Criminal activity criminal attacks Criminology CRISC Crisis Management Critical analysis Critical Assets Critical broadband world Critical communications critical data Critical Info Infrastructure critical information Critical infrastructure Critical Infrastructure act critical infrastructures Critical Risks Critical safety Critical Technology CRO crowded places crowded spaces CrowdStrike Crown jewel applications crypto mining Crypto-Currency crypto-jacking cryptocurrencies cryptocurrency Cryptographic Cryptography cryptojacking cryptomining CSAT CSF CSIRO CSPs CSSLP CSSLP certification CSX culture current and evolving threats Customer Experience Customer experiences Customer Identity Customer Service Customer validation strategies Cutting edge discussion Cutting-edge CVEC cyber Cyber Activities cyber activity Cyber actors Cyber AI cyber analytics cyber and terrorism Cyber attack cyber attackers cyber attacks Cyber Attacks Trends cyber breaches cyber businesses Cyber campaign cyber challenges Cyber claims cyber crime Cyber criminals cyber crisis Cyber Defence Cyber defences cyber defense AI cyber deterrence cyber education Cyber espionage campaigns cyber exposure cyber fraud Cyber Front Lines Cyber Fusion cyber governance Cyber Hygiene Cyber incident cyber incidents Cyber industry Cyber insurance Cyber Intelligence cyber IP theft Cyber Kill Chain Cyber landscape cyber law cases Cyber Maturity Model Cyber Mayday Cyber Protection Cyber Readiness Cyber Regulations Cyber Resilience Cyber resilience strategy Cyber Resilient cyber risk Cyber risk assessment Cyber Risk Lead