<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">

    Not Found

  • Day 2

  • 08:20

    Register; grab a coffee. Mix, mingle and say hello to peers old and new

    Arrow
  • 8:55
    Dan Haagman, Doctoral Security Researcher

    Welcome from Corinium and the Chairperson

    Dan Haagman - CEO Chaleit & Honorary Professor of Practice - Murdoch University

    Arrow
  • 09:00
    Panel Discussion

    Opening Spotlight: How Do You Succeed When You Can’t Win Every Battle?

    Arrow

    In cyber security, no system is completely secure, and no plan survives every challenge. This opening keynote explores how leaders can achieve success despite uncertainty, setbacks, and evolving threats. 

    • How do you choose what’s worth protecting? 
    • Can failure be an advantage? 
    • What if your best defence still fails? 
    • What separates teams that adapt from those that crumble? 

    Speakers: 

    Sunil Rodhan Head of Security & IT Risk IPH  

    Hank Opdam Former CISO Ausgrid  

    Martin Doherty CISO Australia HSBC  

  • 09:25
    Sponsor Presentation

    Ransomware Readiness: What Every Organisation Needs to Know

    - Senior representative - KnowBe4

    Arrow

    Ransomware remains one of the most disruptive threats with attackers adapting faster than many defences. This session explores practical strategies for prevention, early detection and effective response. Learn how to reduce impact, strengthen readiness and close the gaps that make organisations vulnerable to modern ransomware campaigns. 

  • 09:50
    Panel Discussion

    Panel: CISOs in an Identity-Driven, As-a-Service World – What Really Matters Now?

    Arrow

    As organisations shift more services, data and operations into an as-a-service model, identity risk becomes a critical business concern. This conversation explores what CISOs need to know beyond the technical detail to guide strategy, investment and trust.

    • What’s the hardest part of managing identity sprawl across SaaS and multi-cloud?
    • What’s the most effective ways to reduce complexity and maintain positive user experience while maintaining control?
    • How do identity failures affect operational resilience and regulatory standing?
    • How can CISO get a clear, continuous picture of trust, privilege and lifecycle in cloud-based environments?

    Moderator:

    Gaurav Vikash Head of Security and Risk (APAC) Axon

    Panellists:

    Chris Grisdale Head of Information Security hipages Group

    Sajeesh Patail Global Cyber Operations Manager & Head of Cyber Operations Orica

    Siddharth Rajanna Head of IT Security BINGO Industries

    Vishwanath Nair GM Cyber & IT Risk BaptistCare
  • 10:25
    Sponsor Presentation

    Rethinking Identity in a Changing Threat Landscape

    - Senior representative - Exabeam

    Arrow

    Digital trust is being redefined as identity threats grow more complex. From deepfakes and impersonation attacks to the rapid rise of non-human identities, the identity landscape is evolving. This session explores what these changes mean for verification and control and how security leaders can adapt their strategies to safeguard trust in a world where not every identity is who or what it claims to be. 

  • 10:50
    Fireside Chat

    Panel: Doing More with Less Budget- Constraints and Tool Rationalisation

    Arrow

    This interactive discussion explores how to optimise sourcing, consolidate tools, and make smarter budget decisions. Join us to share your experiences, discuss trade-offs, and uncover practical strategies to streamline operations, reduce costs, and maximise value from existing investments.

    • How can organisations decide which tools to keep, consolidate, or retire under budget constraints?
    • What strategies or framework help teams achieve more without increasing spend?
    • How do you avoid false economises that save money but increase risk?
    • How do you measure the impact of tool rationalisation on efficiency, performance, and cost savings?

    Moderator:

    Madhuri Nandi Head of Security Nuvei

    Speakers:

    Arun Singh CISO Tyro Payments

    Leana El-Hourani Head of Information Security & GRC Mission Australia  
  • 11:10
    Sponsor Presentation

    Cyber in 5: Key Insights from Cythera’s CISO Survey

    - Senior Representative - Cythera

    Arrow

    A quick, 5-minute dive into the key findings from Cythera’s latest CISO survey, highlighting the top trends and insights shaping the future of cyber security leadership.

     

  • 11:15
    Break

    Get refreshed! Mingle!

    Arrow
  • Lauren Veenstra-4

    Track A: Resilience & Leadership

    Track Chair: Lauren Veenstra - CSO - Iberdrola Australia

    Arrow
  • 11:45
    Mustafa Qasim-1

    Reputation, Risk and Recovery: Good Cyber Crisis Leadership

    Mustafa Qasim - Former Global Head of Detection & Response - Flight Centre Travel Group

    Arrow

    In a cyber crisis, technical controls matter, but leadership defines the outcome. Crises demand fast decisions and trade-offs, and incidents quickly become organisation-wide challenges. This session explores how security leaders align technical response with executive-level crisis management to ensure clarity, speed, and coordinated action, building resilience before, during, and after the storm.

  • 12:10
    Abbas Headshot

    Identity Is a System: Why Visibility and Intelligence Are Now a Board-Level Requirement

    Abbas Kudrati - Chief Identity Security Advisor - Silverfort

    Arrow

    AI agents, automation, and non-human identities are reshaping how enterprises operate—but they are also breaking the assumptions that identity security has relied on for decades. Boards are rightly asking whether AI can be trusted to make decisions. Yet a more fundamental risk often goes unaddressed: do we have visibility into which identities are actually acting inside the enterprise, at machine speed, and with what authority?

    Identity is no longer a static access control function. It has become a dynamic, distributed system—executing continuously across cloud platforms, legacy infrastructure, APIs, SaaS, and autonomous AI agents. Managing identity as configuration rather than behavior creates blind spots that traditional IAM, PAM, and CIEM platforms cannot close.

    This session introduces Identity Visibility and Intelligence Platforms (IVIP) as a necessary evolution of identity security in the AI era. IVIP treats identity as an observable system, collecting authentication telemetry across environments, applying behavioral intelligence, and enabling adaptive Zero Trust enforcement in real time.

    Using Silverfort’s evolution as an illustrative case study, this talk demonstrates how identity visibility becomes a foundational capability for AI trust, cyber risk resilience—without requiring application rewrites or operational disruption. quantification, and digital 

  • 12:35
    Andrew Hottes-1

    Group Discussion: Three Things Every SME Should Check in Their Security Posture

    Andrew Hottes - Chief Digital Information Officer - Cranbrook School

    Arrow

    Small and medium enterprises often face tough security challenges without the resources of larger organisations. In this interactive discussion, we’ll explore three critical areas to strengthen security posture—from access control and data protection to incident response and vendor risk. Participants will share experiences, practical tips, and examples to protect their businesses effectively without overburdening teams or budgets.

  • Dan Haagman, Doctoral Security Researcher

    Track B: Security Operations

    Track Chair: Dan Haagman - CEO Chaleit & Honorary Professor of Practice - Murdoch University

    Arrow
  • 11:45
    Hani Arab-1

    The Paradigm Shift from Castle Walls to Zero Trust

    Hani Arab - CIO - Seymour Whyte

    Arrow

    The shift from perimeter-based defence to Zero Trust marks a fundamental transformation in cybersecurity thinking. Rather than relying on static boundaries, Zero Trust requires a reimagining of how trust, identity, and access are governed. This talk examines how such shifts reshape the mental models of practitioners, emphasising the socio-technical dimensions that drive sustainable security change.

    • Explore how trust is redefined as contextual, provisional, and continuously evaluated.
    • Identify shifts in practitioner mental models and the cognitive load of adopting Zero Trust logic.
    • Examine the socio-technical integration required for cohesive, organisation-wide Zero Trust implementation.
  • 12:10
    Sponsor Presentation

    Adapting Security Operations to the Modern Threat Landscape

    Arrow

    Today, staying ahead of cyber threats requires a proactive and adaptive approach. This session will focus on how organisations can optimise threat detection, response, and attack surface management to enhance visibility and build more resilient security operations. 

  • 12:35
    Doug Hammond Headshot Jul25 v2-2

    What Actually Strengthens Security Operations

    Doug Hammond - CISO - Uniting

    Arrow

    This session examines how security operations can move beyond volume and noise to focus on outcomes that actually reduce risk. This session reflects on prioritisation, decision-making, and what makes SecOps effective when resources are limited and everything appears urgent.

  • 13:00
    Lunch-Dinner

    Lunch

    Arrow
  • 13:55

    Prize Draw!

    Arrow
  • 14:00
    Guy Brown (2)

    Architecting Resilience: Strategies for Web Application Security in an AI and Multi-Cloud Landscape

    Guy Brown - Staff Enterprise Security Architect, APAC - Fastly

    Arrow
    Native cloud controls are no longer sufficient in an era of AI-driven attacks and multi-cloud fragmentation. This talk demands a fundamental shift: fusing security and resilience into a unified design principle. We explore how to move beyond disparate tools to a unified defence posture, ensuring consistent protection and resilience against sophisticated Bot and API threats across every environment. 
  • 14:25
    Panel Discussion

    Panel: Quantum Computing – Is It a Risk or Not?

    Arrow

    Quantum computing promises groundbreaking capabilities, but also the potential to break today’s encryption and security assumptions. In this debate, leading experts will explore whether quantum is an imminent cyber risk, a distant concern, or an overhyped distraction. We will explore what security leaders should be doing now to prepare.

    Moderator:

    Cathy Foley CSIRO Board Member & Former Australia’s Chief Scientist

    Panellists:

    Adam Byrne Group CSO The Adecco Group

    Saba Bagheri Cyber Threat Intelligence Manager Bupa

    Henry Huang Head of IT - Digital Service Delivery & Operations UBank

    Dr Andreas Sawadsky Technology & Innovation Manager Quantum Brilliance 

  • 14:55
    Ash Smith-1

    Outsmarting Disruption: Threat-Led Security for Cyber Leaders

    Ash Smith - Principal Technology Strategist - CrowdStrike

    Arrow

    AI is amplifying both innovation and adversary capability, widening the gap between disruption and defence. To stay ahead, organisations must anchor their security strategy in threat intelligence that reveals intent, exposes tradecraft, and drives precise action. By leading with real-time insight, enterprises can prioritise what matters most, strengthen resilience, and outpace attackers in an environment where the rules are being rewritten.

  • 15:20
    Fireside Chat

    Fireside Chat: Where To From Here? Redefining Cyber Strategy for 2026 and Beyond

    Arrow

    Has cyber really changed, or are we still fighting the same battles in new ways? This closing session pairs two perspectives, one deeply experienced and the other earlier in their career, to spark a candid conversation about what defines a “good” cyber strategy today. Together, we’ll explore:

    • What has truly changed in cyber strategy over the past 20 years, and what hasn’t?
    • Can you share a strategy that failed and the key lesson you took from it?
    • Where should organisations go “back to basics” and where is bold innovation needed?
    • If you had to define the top marker of a “good” strategy in 2026, what would it be?

    Moderator:

    Chirag Joshi Founder & CISO 7 Rules Cyber

    Speakers:

    Sanja Petrovic GM Cyber Security & Governance HUB24

    Abhishek Singh GM – Enterprises System, ICT, Data Analytics & Cyber Security New Horizons  

     

  • 15:45
    Dan Haagman, Doctoral Security Researcher

    Chair's Closing Remarks

    Dan Haagman - CEO Chaleit & Honorary Professor of Practice - Murdoch University

    Arrow
  • 15:55

    Close of CISO Sydney 2026 & Networking over tea . Join us to reflect, connect and network over tea.