<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">

    Not Found

  • Day 1

  • 08:20

    Register; grab a coffee. Mix, mingle and say hello to peers old and new.

    Arrow
  • 08:50
    Chirag Joshi_Picture-1

    Welcome from Corinium and the Chairperson

    Chirag Joshi - Founder & CISO - 7 Rules Cyber

    Arrow
  • 09:00
    Connect _Network-1

    Speed Networking - Making new connections!

    Arrow

    In this 10-minute networking session, the goal is to connect with three new people. Let the questions on the screen spark your conversation. Enjoy the opportunity to expand your network!

  • 09:10
    Phil Ross-2-1

    Opening Keynote: Dynamic Risks, Strategic Moves – Embracing Change for Success

    Phil Ross - CISO - Air New Zealand

    Arrow
    • Discuss the rapidly evolving landscape of cyber security threats and their profound impact on business success.
    • Highlight the transformational power of aligning technology risk with your core business strategy, creating a strong defence against emerging threats.
    • Emphasise the importance of building and nurturing a resilient workforce, equipped to tackle the evolving challenges of the digital age.
  • 09:35
    Interactive_ Discussion_ Participation-1

    On Plenary Stage Interview: Nurturing High-Performing, Positive Teams

    Arrow

    Cyber security can seem like an unrewarding career. Preventing breaches depends on a variety of factors, including the company's risk-appetite, senior management buy-in and adequate budgets. If the company is not hacked, whether you have a robust and mature cyber strategy or just luck, you're just doing your job. But if it is does, the cyber team often gets the blame. It's essential for CISOs to ensure their teams are motivated and engaged. During this interview, we will review KPIs and discuss successful ways to ensure the wellbeing of the team and prevent burnout.

    Interviewer:

    Chirag Joshi, Founder & CISO, 7 Rules Cyber

    Interviewee:

    Jan Zeilinga, CISO, James Cook University

  • 10:00
    Jamie Wright

    From Best Practice to Mandate: The Rising Stakes of Data Protection in Australia

    Jamie Wright - Field CTO ANZ - HashiCorp

    Arrow

    With evolving Australian regulations, enterprises are facing stricter mandates for securing sensitive data. Protecting is no longer just a best practice—it’s a business imperative. This session will explore key data protection requirements, including enhanced encryption, stricter access controls, and stronger authentication mechanisms.

    Join us to understand how to turn compliance challenges into security advantages while staying ahead of regulatory demands.

  • 10:25

    NETWORKING BREAK
    Real Time Devise Discovery Demo at Tanium Booth

  • 10:55
    Panel Discussion (2)-Sep-25-2023-06-46-39-6361-AM

    PANEL: Keeping up with a constantly changing regulatory environment

    Arrow
    • Navigating regulatory change: Adapting to evolving laws like the Privacy Act, SOCI Act, and Cyber Security Act without disrupting business operations
    • Preparing for a post-quantum future: Addressing the deprecation of legacy encryption and transitioning to Post-Quantum Cryptography
    • Ensuring compliance in a complex ecosystem: Managing regulatory obligations across a globally dispersed network of suppliers, partners, and customers

    Panellists:

    Nathan Lewis, Head of Cyber, Technology and Data Risk, Newcastle Permanent

    Gaurav Vikash, Head of Security and Risk, APAC, Axon Enterprise

    Sebastian Tymoszuk, Director, Australian Trusted 

    Umair Zia, Head of Cyber Security, Sydney Local Health District

    Marc Airo-Farulla, Regional Sales Director, Entrust

  • 11:35
    Pas Apicella-1

    Securing the Digital Future: Strategies for Resilient Application Security

    Pas Apicella - Field CTO - Snyk

    Arrow

    As digital transformation accelerates across industries, the need for secure, scalable, and resilient applications has never been more critical. This session delves into best practices and innovative strategies for ensuring application security in dynamic and complex environments. From integrating Static Application Security Testing (SAST) and Software Composition Analysis (SCA) into modern CI/CD pipelines to addressing unique challenges posed by containerized applications in Kubernetes, we’ll explore practical approaches to safeguard software throughout its lifecycle. Attendees will gain actionable insights into building resilient security postures, fostering collaboration between development and security teams, and aligning security practices with the pace of digital innovation.

    Join us to discover how to future-proof your applications and secure the foundation of your digital initiatives.

  • 12:00
    Nivedita Newar_Photo-1

    Sobering Up the AI Hype – Making Strategic Cyber Investments and Delivering Business Value

    Nivi Newar - Deputy CISO - UNSW

    Arrow
    • Understanding the risks and implications of AI and how it will change our threat landscape
    • Influencing and guiding the business to make strategic investment decisions
    • How cyber leaders are successfully governing the use of AI
    • How can AI be used in cyber defence?
  • 12:25
    Daniel-Jan-23-2025-07-10-55-9584-AM

    Global Security Predictions in 2025 and the ANZ Perspective

    Daniel Sutherland - Regional Vice President, ANZ - DigiCert

    Arrow

    DigiCert’s annual forecast of cybersecurity predictions for identity, technology, and digital trust expected to shape the landscape in 2025 and beyond. These predictions provide a snapshot of the cyber security challenges and opportunities that ANZ enterprises will encounter in the months ahead.

  • 12:50

    Lunch

  • Chirag Joshi_Picture-1

    TRACK A - Innovation & Compliance

    Chair: Chirag Joshi - Founder & CISO - 7 Rules Cyber

    Arrow
  • 14:00
    Panel Discussion-1

    PANEL: Adapting to EU Regulatory Changes: Navigating Compliance and Managing Impacts

    Arrow

    In recent years, with the increasing activity and exploitation of organisations; governments have started to see the importance of Information Security.

    To address this governments have been implementing legislation and regulations around Information Security, to ensure that critical systems and infrastructure are protected.

    Europe last year released their versions which will come into effect in 2024 and 2025, that looks to address Information Security in Europe.

    These new directives and regulations could have implications and impacts, for any business working with EU organisations.

    Moderator: 
    Chirag Joshi, Founder & CISO, 7 Rules Cyber

    Panellists:

    Jihad Zein, Global Head of GRC, Technology, Toll Group

    Matthew Duckworth, Director, IT Risk and Security, MetLife Australia

    Leron Zinatullin, CISO, Linkly 

  • 14:25
    Alex Su-2

    Becoming Supply Chain Resilient - Lessons from Recent Cyber Outages

    Alex Su - Senior Solutions Architect, ANZ - SecurityScorecard

    Arrow
    Developing risk assessment Supply chain disruptions can have catastrophic consequences, and recent incidents have shown that knowing your supply chain (KYSC) is a cornerstone of cyber resilience. Security teams need the ability to map dependencies effectively, identify critical vendors, and gain visibility into their extended ecosystem.
    Learn how to enhance your organization's cyber resilience, mitigate supply chain risks, and future-proof your organization for incidents. Alex will discuss:
    • The impact of recent outages on the global supply chain
    • The critical role of KYSC in managing emerging threats 
    • How to prioritize vendors based on criticality and business impact
    • Best practices for leveraging technology to enhance supply chain visibility
    • Actionable recommendations to build a resilient supply chain through proactive measures
  • 14:50
    Panel Discussion-1

    PANEL: Driving the Need for AI Security Regulations

    Arrow
    • Strategies to increase awareness of AI risks to senior management and the board to support informed business decisions
    • How can cyber leaders collaborate with regulatory bodies to create effective AI security standards and guidelines
    • Overview of the ISO/IEC CD 27090 guidance and ASD’s Guidelines for Secure AI System Development – where to from here

    Moderator:

    Chirag Joshi, Founder & CISO, 7 Rules Cyber

    Panellists:

    Nathan Lewis, Head of Cyber, Technology and Data Risk, Newcastle Permanent

    Pearse Courtney, Cyber Project Manager, AEMO

    Robin Long, CTO, Rapid7

  • 15:25
    Brad Ford-1

    From Vulnerability to Vanguard: Reinventing DNS Security

    Brad Ford - Security Specialist – ANZ - Infoblox

    Arrow

    In today's fast-paced digital world, the security landscape is evolving rapidly, presenting organisations with increasingly sophisticated challenges. As Australia aims to achieve ambitious security objectives, the demand for cost-effective, high-impact security solutions is escalating. One area of immense potential lies within Domain Name System (DNS) technology, yet many organisations lack a comprehensive understanding of its pivotal role in modern security strategies.

    This session will shed light on the vulnerabilities inherent in DNS, the diverse array of threats exploiting the protocol, and innovative security approaches harnessing DNS and related network services to fortify organisations against evolving cyber threats. Attendees will learn about the importance of DNS, its vulnerabilities, and how to leverage DNS for defence, gaining valuable insights into threat detection and mitigation to bolster their security posture.

  • Dan Haagman 2

    TRACK B - Risk Management

    Chair: Dan Haagman - CEO of Chaleit & Honorary Professor - Murdoch University

    Arrow
  • 14:00
    Dan Elliott - Blank Background

    Leveraging Offensive Security for Proactive Risk Management

    Dan Elliott - Head of Cyber Resilience ANZ - Zurich Resilience Solutions - Zurich

    Arrow
    • Integrate offensive security teams into a proactive risk management strategy to prioritise and address critical vulnerabilities.
    • Foster a culture of continuous improvement within teams to stay agile and responsive to evolving threats.
    • Align offensive security efforts with organisational risk reduction goals, ensuring they support broader security objectives.
    • Apply offensive security skills beyond traditional penetration testing to identify emerging threats and reinforce the organisation's overall risk posture
  • 14:25
    1137 Speaker Image 600x600 - 2024-12-19T071950.687

    Protecting against Identity Fraud

    Johan Fantenberg - Product Marketing Director - Ping Identity

    Arrow

    In today’s rapidly evolving digital landscape, identity fraud poses a significant threat to organizations, costing billions annually and damaging customer trust. From account takeovers and synthetic identities to sophisticated impersonation scams, fraudsters are becoming more adept at exploiting vulnerabilities.

    Join us for a session  tailored for Security & IAM professionals, where we will explore:
    - Emerging Threats: A deep dive into the latest trends in identity fraud, including account takeovers, new account fraud, and the risks posed by bots and advanced impersonation techniques.
    - Proven Mitigation Strategies: Discover how a layered identity approach with real-time risk assessment, dynamic fraud detection, and secure authentication methods can protect your organization without compromising user experience.
    - Future-Proofing IAM Systems: Learn about scalable, AI-driven fraud detection technologies and identity orchestration that integrate seamlessly into existing IAM infrastructures.

    This session will equip you with actionable insights to strengthen your organisation’s defences while ensuring seamless and secure user journeys. Don’t miss this opportunity to stay ahead in the fight against identity fraud!

  • 14:50
    Panel Discussion-1

    PANEL: Elevating Cyber Risks To Boards, Senior Management, And Across Departments

    Arrow
    • Effective ways to influence boards and senior management on how security is aligned with the business goals
    • Engaging the Steering Committee: How to get cross-functional representatives to be security cheerleaders
    • The power of joining forces to assess risks, implement security controls, and ensure tech infrastructure is compliant to regulations

    Moderator:

    Madhuri Nandi, Head of Security, Nuvei

    Panellists:

    Vasyl Nair, Group CEO, Team Super 

    Christopher Johnson, Group Head of Technology, Charter Hall

    Saleshni Sharma, Regional CISO, Berkley

    Catherine Rowe, Former Global CISO, ex-QBE

  • 15:25
    Paul Thomas - Axonius-3-1

    The Risk in Risk Management

    Paul Thomas - Solutions Architect - Axonius

    Arrow

    Risk management is a crucial aspect of every organisation. The basic process is to identify potential risks, assess their impact, and implement strategies to mitigate them. Data analytics plays a vital role in risk management by providing insights into potential risks and helping organisations make informed decisions. Additionally, data analytics closes the risk management loop through assessing the effectiveness of mitigation strategies. Historical data, both external and internal, enables an organisation to evaluate the efficacy of previous initiatives and identify areas for further improvement.

    So how can you add data analytics to your Cyber Risk Management process? Let's discuss the risks of this promising venture and the potential sweet spot for your organisation.

  • River Nygryn

    TRACK C - Enabling Growth

    River Nygryn - CISO - HammondCare

    Arrow
  • 14:00
    Harsh Rasik Busa-2

    New CISO: A Toolkit For Your First 90 Days

    Harsh Rasik Busa - CISO - Avant Mutual

    Arrow

    In the ever-evolving landscape of cyber security, the path to leadership is often as unpredictable as the threats we face. In this presentation, we’ll explore successful ways to become an effective leader in a critical domain. Attendees will gain a deeper understanding of the strategic and operational adjustments required, the importance of rapid learning and adaptation, and the value of leveraging diverse experiences to build a resilient security posture.

  • 14:25
    Andrew Kay-2

    Segmentation's Second Coming: Get Secure, Grow!

    Andrew Kay - Director Systems Engineering, APJ - Illumio

    Arrow

    Zero Trust is revolutionizing network security architecture: it is data and device-centric and designed to stop data breaches while protecting critical infrastructure and making cyber-attacks unsuccessful. This session will explore how Zero Trust will help you achieve tactical and operational goals that make cybersecurity a business growth enabler, not a business inhibitor. Find out why Forrester calls this 'the golden age of microsegmentation,' and how it's driving growth in confidence, resilience and accelerating modern platform adoption.

  • 14:50
    Panel Discussion

    PANEL: Educate, educate, educate – simple steps to improve accountability across the business

    Arrow

    Effective ways to educate – engaging diverse people with cybersecurity and online safety

    People centric – adopting an in-person tone and using real-life examples of how a cyberattack can impact everyone’s lives

    Relevant – what’s in it for them and why they should care

    Providing resources – setting clear expectations and providing resources

    Moderator:

    Lisa Dethridge, Research Fellow, RMIT University

    Panellists:

    Hani Arab, CIO, Seymour Whyte

    River Nygryn, CISO, HammondCare

    Naveen Sharma, Head of Information Security, Superloop

    Amelia Gowa, State Director of NSW (CPS), Trustwave 

  • 15:25
    Scott Leach_page-0001-1

    Safely Enabling AI Copilots with Varonis

    Scott Leach - Vice President, APAC - Varonis

    Arrow

    During this session, we will show you just how easily your company’s sensitive data can be exposed using Microsoft Copilot with simple prompts. We will share practical steps and strategies to ensure a secure Microsoft Copilot rollout and prevent prompt hacking data exposure.

  • 15:50

    NETWORKING BREAK

  • Chirag Joshi_Picture-1

    Track A

    Chair: Chirag Joshi - Founder & CISO - 7 Rules Cyber

    Arrow
  • 16:20
    Interactive_ Discussion_ Participation-1

    Zero Trust for the C-Suite: Translating Security Strategy into Business Value with Okta and Palo Alto Networks

    Jefferson Haw - Principal Solutions Architect - Okta

    Arrow

    Zero Trust is a vital component of modern security, but its value needs to be communicated to the C-suite. This session will explore how Okta and Palo Alto Networks can work together to align Zero Trust strategies with the organisation’s overall business goals.

    The pair will deep dive into:

    • How can Okta’s IAM and Palo Alto’s security solutions help reduce business risk while enhancing operational agility?
    • How can security leaders demonstrate the ROI of Zero Trust to the board, using examples from Okta and Palo Alto’s combined solutions?
    • What are the key business drivers for adopting Zero Trust, particularly in terms of risk management, compliance, and breach prevention?

    Speakers:

    Jefferson Haw, Principal Solutions Architect, Okta

    Riccardo Galbiati, Regional CSO, JAPAC, Palo Alto Networks

  • Dan Haagman, Doctoral Security Researcher

    Track B

    Chair: Dan Haagman - Doctoral Security Researcher -

    Arrow
  • 16:20
    Matt headshot 450x450-1

    Real Time Visibility to Fortify Your Security Operations

    Matt Waite - Director of Technical Account Management - Tanium

    Arrow

    In today’s rapidly evolving digital landscape, real-time data is revolutionising the way critical infrastructure organisations manage and secure their IT environments. This insightful presentation by Tanium delves into the transformative power of real-time data, highlighting three key pillars: 

    • Cyber Hygiene: How to fortify your defences and make it increasingly difficult for adversaries to penetrate your systems. 
    • Security: Learn how to swiftly detect breaches, understand the extent of intrusions, and implement effective response measures to mitigate damage. 
    • Compliance: How real-time data super charges data collection, remediation and uplifts Essential 8 Maturity levels faster. 

    Join Matt as he explores how leveraging real-time data can enhance your cyber resilience, providing a robust shield against ever-evolving threats. 

  • 16:45
    Panel Discussion-1

    Plenary Panel: Influencing Human Behaviour and Reducing Cyber Risks

    Arrow
    • Importance of human factor to cyber security and why most cyber awareness efforts fail
    • Tailoring security awareness programs to address cyber risks and business priorities
    • Strategies to influence behaviour and create a cyber-safe culture

    Moderator:

    Jennifer Firbank, Cyber Security Strategy & Influence Principal, Telstra

    Panellists:

    Oliver Sebastian, Director, Information Technology, Landcom

    Bradley Busch, Non-Executive Director, Shire Christian School

    Sophia Barbour, Cyber Awareness and Intelligence Lead, Commonwealth Superannuation Corporation

    Tom Scully, Principal Architect, Public Sector, Palo Alto Networks 

  • 17:20
    Interactive_ Discussion_ Participation-1

    On Plenary Stage Interview: AI vs Cyber Attacks: What’s the Real Impact

    Arrow
    • Exploring the role of AI in cyber security, including how it’s currently implemented and making a real impact on defence and threat response.
    • Discussing the challenges and key considerations for adopting AI in cyber risk management and choosing the right technologies for a broader strategy.
    • Looking ahead to the future of AI in security, focusing on how organisations can measure its effectiveness and continue to strengthen their defences.

    Interviewer:

    Dan Haagman, CEO of Chaleit & Honorary Professor of Murdoch University

    Interviewee:

    Lee Barney, GM Tech Security, TPG Telecom

  • 17:40
    Cocktails

    CISO Sydney Day 1 Closing Remarks, Networking Drinks Reception and Casino Evening

    Arrow