<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">

    Not Found

  • Day 1

  • 08:20

    Register; grab a coffee. Mix, mingle and say hello to peers old and new.

    Arrow
  • 09:00
    Aaron McKeown-3

    Welcome from Corinium and the Chairperson

    Aaron McKeown - CISO - NGM Group

    Arrow
  • 09:10
    Speed Networking

    Speed Networking - Making new connections!

    Arrow

     In this 10-minute networking session, the goal is to connect with three new people. Enjoy the opportunity to expand your network! 

  • 09:20
    Stephanie Crowe-1

    Reading the Signals – What Global Threat Intelligence Is Telling Us.

    Stephanie Crowe - Head of ACSC - ASD

    Arrow

    Cyber threat intelligence teams worldwide are observing a sharp rise in activity, from sophisticated state-linked campaigns to the growing overlap of criminal and geopolitical motives. The session will explore how global threat intelligence is evolving from state-linked activity to the growing overlap between criminal and geopolitical motives and what this means for national and regional cyber resilience.

  • 9:45
    Andrew Brydon Speaking-2

    The AI Agent: The Most Privileged Identity in Your Enterprise Isn’t on Your Org Chart

    Andrew Brydon - Field CTO - HashiCorp

    Arrow

    AI agents are already provisioning infrastructure, writing code, and accessing sensitive systems, often with broad permissions and limited oversight. In effect, AI has become the most privileged identity in the enterprise. Many organisations are responding with policies and governance committees, but AI moves faster than documentation. Andrew will share how you can reframe AI security as a platform engineering problem, and not as a policy gap. CISOs can apply Zero Trust principles directly to AI, using strong identity, least privilege, and policy-as-code embedded into shared platforms to secure AI at scale without slowing innovation. 

     

  • 10:10
    Fireside Chat

    Fireside Chat: How to Land Cyber Deliverables – From Strategy to Impact

    Arrow

    Bridging the gap between strategy and execution is one of the toughest challenges in cyber leadership. This candid conversation explores how to turn high-level plans into clear, achievable actions that deliver measurable outcomes. From stakeholder alignment to delivery roadmaps and the metrics that matter, the discussion focuses on making cyber real across the organisation.

    • What are the common pitfalls leaders face when trying to turn cyber strategy into actionable outcomes, and how can they be avoided?
    • How do you create buy-in across the organisation to ensure cyber initiatives move from plan to execution?
    • When cyber strategies are successfully implemented, what really makes the difference?

    Moderator:

    Leron Zinatullin CISO Linkly

    Speakers:

    David Griffiths CISO Northern Beaches Council

    Roshan Fernandes Information Security & Risk Manager Sydney Children’s Hospital Networks
  • 10:35
    Break

    Get refreshed! Mingle

    Arrow
  • 11:05
    Panel Discussion

    C-Suite Panel: Driving Executive-Level Engagement in Security Strategy

    Arrow

    While security professionals are across the threats, the same can’t always be said for executive leadership and board members. Bringing together the C-suite in this panel, we explore how CISOs get meaningful cut-through with the executive suite when they’re already swamped with compliance, governance, and operational pressures.

    • What was the defining moment or incident that fundamentally changed how you think about cyber resilience and your role in it?
    • How do you embed security into the way the business actually operates – not just slogans but as something enduring and strategic?
    • How do you, as CFO, set priorities, and where can the cyber leader add the most value? Has there been a moment or incident that shifted your view or priorities for cyber and resilience?
    • As a CIO, what qualities beyond technical expertise do you value most in a cyber leader?
    • What language, evidence, or framing truly resonates with non-security executives?
    • How can we influence the broader business to own and act on risk, creating accountability beyond the security team?

    Moderator: 
    Aaron McKeown CISO NGM Group

    Panellists:

    Andrew Karvinen CISO NSW Department of Communities and Justice

    Rajini Carpenter CTO Beforepay Group

    Jon Blackburn CFO, Director Corporate Services Sydney Opera House

     

  • 11:40
    Mike Nelson

    The End of Manual Trust: Why Automation, Quantum Readiness, and AI Integrity Will Define Security in 2026

    Mike Nelson - Vice President, Digital Trust - DigiCert

    Arrow

    As digital ecosystems expand and machine identities outpace human ones, traditional, manual approaches to trust and security are reaching their limits. By 2026, organizations will face mounting pressure from shorter certificate lifecycles, growing outage risks, emerging quantum threats, and the urgent need to establish trust in AI-driven systems. In this session, we’ll explore why automation is no longer optional for managing cryptographic assets at scale, how quantum-safe cryptography is moving from theory to reality, and why AI integrity has become a critical pillar of modern security strategies. Attendees will gain practical insights into how these shifts intersect, and what security leaders should prioritize today to build resilient, future-ready trust infrastructures. 

  • 12:05
    Panel Discussion

    Panel: Governing AI – Where Should We Draw the Line?

    Arrow

    As AI adoption accelerates, leaders face the challenge of setting clear boundaries, not only around what AI should and shouldn’t do, but also around who holds responsibility for its oversight. This panel explores governance from two critical perspectives:

    • Structure and Responsibility - Where does AI sit across the organisation? Which teams shared responsibility
    • Scope of AI – What tasks should AI be trusted with, and where must human oversight remain non-negotiable? How can organisations prevent over-reliance, ensure explainability, and avoid ethical or operational pitfalls?

    Panellists will debate practical approaches to establishing guardrails that support innovation without undermining trust, compliance, or human judgement.

    Moderator:

    Matt Keast Senior Solutions Engineer Vanta

    Panellists:

    Mustafa Qasim Former Global Head of Detection & Response 

    Leron Zinatullin CISO Linkly

    Daminda Kumara CISO Commonwealth Superannuation Corporation 

  • 12:35
    Antonio Rancan-2

    Secure the AI Future, Now

    Antonio Rancan - Head of Solution Engineering, APAC - Cyera

    Arrow

    AI runs on data, and every leader knows it’s no longer enough to simply lock information down. The real challenge is scaling AI securely and responsibly, without treating protection and progress as opposing forces. Yet today, only 14% of security leaders report success in doing both. In this keynote, the Cyera team will reveal the mindset shift forward-looking enterprises are making, to thrive in the AI era. 

  • 13:00
    Lunch-Dinner

    Lunch

    Arrow
  • River Nygryn-2

    Track A: AI in Practice

    Track Chair: River Nygryn - CTO - CRVAA

    Arrow
  • 14:00
    Roger Millar-1

    AI Agents Unleashed: Where Humans Fit In

    Roger Millar - CIO & CISO - Angus Knight Group

    Arrow

    This session explores the landscape of human–AI collaboration, focusing on how humans and AI agents co-create value, share trust, and define oversight in agentic workflows. Explore practical approaches to managing and governing agentic systems, including accountability, monitoring, and frameworks for ethical, secure, and resilient systems. 

  • 14:25
    Paul Thomas

    Making the Case for Asset Intelligence and Actionability

    Paul Thomas - Solutions Architect - Axonius

    Arrow

    Security processes are hampered by the complexity of accessing data spread across many tools. This data problem limits individual tool contributions, yielding incremental instead of exponential improvement. Join us to review common suboptimal security scenarios and explore how Asset Intelligence and Actionability can resolve this. We'll also cover its impact on current operations and the future effectiveness of AI. 

  • 14:50
    Umair Zia-1

    When AI Goes Rogue: Responding to the Next Wave of Intelligent Cyber Attacks

    Umair Zia - Head of Cyber Security - Sydney Local Health District, NSW Health

    Arrow

    AI driven attacks are escalating in speed, scale, and sophistication, overwhelming traditional defences and response playbooks. This session explores the practical techniques, tools, and decision points that matter when confronting intelligent, adaptive threats. 

  • 15:15
    Sponsor Presentation

    Managing Non-Human Identities (NHIs) in the Era of AI Agents

    Arrow

    As companies continue to integrate AI agents to reduce costs and improve operating efficiencies, they also face new waves of security challenges from the new workforce of "non-human identities" (NHIs). With NHIs often outnumbering human identities, they introduce significant new attack vectors. 

    Join security experts from Okta and Deloitte for an in-depth discussion of the new security challenges that arise with AI adoption, and the right approaches to safely integrate AI without compromising security. In this timely session, we will cover emerging security challenges, including understanding new threats like prompt injection, data poisoning, and the challenges of managing "shadow access" created by autonomous agents, as well as addressing the risks of unintentional data leakage and the loss of traditional audit trails.  

    We will also cover the following: 

    • How to gain visibility to undermanaged NHIs 
    • Strategies to bring access control policies to these types of unfederated NHIs 
    • And considerations for using the same security framework for NHIs as human identities 

    Moderator:

    River Nygryn CTO CRVAA 

    Speakers: 

    Mathew Graham APJ CSO Okta 

    Shweta Pandey APAC Cyber Risk Advisory Partner Deloitte

     

  • Aaron McKeown-4

    Track B: Human-Tech Momentum

    Track Chair: Aaron McKeown - CISO - NGM Group

    Arrow
  • 14:00
    Dr Alana Maurushat-2

    Cyber Security Meets Human Behaviour: Rethinking Awareness in the Age of AI

    Dr. Alana Maurushat - Professor of Cybersecurity and Behaviour & Acting Associate Dean Engagement, School of Computer, Data and Mathematical Sciences - Western Sydney University

    Arrow

     Phishing and social engineering remain among the most effective attack vectors, and AI is making them more persuasive and scalable than ever. Yet traditional awareness programmes often rely on “gotcha” tests and compliance-driven training that fail to change behaviour. In this session, we explore how behavioural science and psychology can be applied to build more resilient human firewalls.

     

  • 14:25
    Geoff Morrison - Varonis-1

    AI Is Hungry: How to Stop Your Data Becoming Its Next Meal

    Geoff Morrison - Director of Sales Engineering, APAC - Varonis

    Arrow

    AI is accelerating faster than ever and so are the risks. As organisations race to adopt generative AI, sensitive data is becoming the unintended fuel feeding these models. In this session, we’ll break down how modern AI systems ingest and learn from corporate information, where the hidden exposure points are, and what leading APAC organisations are doing to stay in control. You’ll leave with practical strategies to safeguard your data, enforce boundaries around AI usage, and unlock value without becoming the next cautionary tale. If your business is embracing AI, this is the playbook you need before the appetites grow.

  • 14:50
    Sharon Lee-1

    Group Discussion: The Future Cyber Workforce – Humans, AI, and the Skills That Still Matter

    Sharon Lee - Associate Director Cyber Security Operations - NSW Department of Creative Industries, Tourism, Hospitality and Sport

    Arrow

    AI is already automating parts of engineering and analyst roles. In this interactive group discussion, every participant will have the chance to share their views on which skills will matter most in an AI-augmented workforce and how to reshape the talent pipeline to match.

    • Which current cyber roles are most likely to be transformed or replaced by AI?
    • What new roles or skills will emerge as AI adoption grows?
    • How can we work with education providers to prepare the next generation of talent?
  • 15:15
    Phil Ross

    Shadow AI and the OAuth Explosion: Shining a Light on the Invisible Perimeter

    Phil Ross - CISO - UpGuard

    Arrow

    Shadow AI is moving from theory to a daily operational challenge as teams adopt tools faster than policy can respond. Corporate perimeters now stretch across OAuth grants, browser extensions, and third-party integrations that quietly connect sensitive data to unvetted AI models. This session focuses on practical observability: how to detect and score the risk of connected consent, analyse browser signals and OAuth activity, and build relative risk scores that help SecOps prioritise interventions without slowing innovation.

  • Dan Haagman, Doctoral Security Researcher

    Track C: Partnerships & Ecosystem Security

    Track Chair: Prof. Dan Haagman - CEO Chaleit & Honorary Professor of Practice - Murdoch University

    Arrow
  • 14:00
    Saba Bagheri-1

    Seeing Around Corners: Threat Intelligence for Supply Chain Defence

    Saba Bagheri - Cyber Threat Intelligence Manager - Bupa

    Arrow

    Supply chains are now one of the most exploited entry points for attackers and too often, organisations only discover the risk once it’s too late. When applied effectively, threat intelligence can give earlier warning of emerging exposures across these extended ecosystems. This session explores how consolidating and operationalising intelligence feeds strengthens supplier oversight, reveals adversary patterns before they strike, and improves agility in response.

  • 14:25
    Brad Ford-3

    Pre-Emptive Cybersecurity: Blocking Threats at the First Question

    Brad Ford - Product Sales Security Specialist – Australia and New Zealand - Infoblox

    Arrow

    Almost every connection on the Internet begins with a DNS request. This session demonstrates how Infoblox Protective DNS stops threats at the moment of intent, blocking access to malicious infrastructure before connections are established. Discover how a pre-emptive DNS-based security strategy dramatically shrinks attack surfaces while protecting users, devices, and networks everywhere they operate. 

  • 14:50
    Fireside Chat

    Fireside Chat: Embedding Security Obligations into Partner Agreements – Contract Clauses That Matter

    Arrow

    While legal teams own contracts, security teams play a crucial role in shaping the obligations that protect the organisation. This session explores how security leaders can collaborate with legal and business teams to ensure key risks are addressed in partner agreements. Learn which clauses matter most, from data protection and breach notification to audit rights and compliance obligations, and how to turn security requirements into enforceable commitments.

    Moderator:
    Prof. Dan Haagman CEO Chaleit & Honorary Professor of Practice Murdoch University

    Speakers:

    Sarah Lattimer Chief Legal and Corporate Affairs Officer I-MED Radiology Network

    Jihad Zein Global Head of Governance, Risk & Assurance Toll Group

  • 15:15
    craig-boyle

    Enabling Organisation Specific Threat Intelligence

    Craig Boyle - Principal Security Architect - XM Cyber

    Arrow

    Threat intelligence should reflect an organisation’s unique risk profile. This session explores how security teams can move beyond consumed threat feeds to organisation specific threat intelligence that informs strategic decisions. Understanding immediate and impactful risks enables a more confident response and better investment choices.

  • 15:40
    Break

    Get refreshed! Mingle

    Arrow
  • 15:40-17:00
    Robin Long-Feb-03-2026-07-51-12-9710-AM

    VIP Roundtable by Rapid7 – Invite only

    Robin Long - Regional CTO - Rapid7

    Arrow

    As adversaries move at machine speed, the window between initial access and full-scale impact is shrinking to minutes. Organisations face a critical “Response Gap” — the time between spotting a threat and having the capability to contain it. Collecting telemetry alone is no longer enough; success depends on high-fidelity interpretation and decisive action. 

    This roundtable will explore: 

    •    Operational bottlenecks in modern Detection & Response (D&R) 

    •    Moving from high-volume alerts to precision-based response 

    •    Closing “Detection Debt” and optimising collaboration between internal teams and external MDR partners 

  • River Nygryn-3

    Track A: AI in Practice

    Track Chair: River Nygryn - CTO - CRVAA 

    Arrow
  • 16:10
    Interactive Discussion

    Group Discussion: Shadow AI in the Enterprise - Governing the Unseen

    Arrow

    The rapid rise of generative AI has brought powerful new capabilities into the enterprise but also created “shadow AI,” where employees adopt unapproved tools without security review. For CISOs, the challenge is not only visibility but also accountability. Join us to share your thoughts on how to govern what is unseen, while enabling innovation.

    • Oversight: How should CISOs gain visibility into AI use without creating a culture of surveillance or distrust?
    • Accountability: Who should own the risks of shadow AI — security, business leaders, or individual teams?
    • Governance: What frameworks or guardrails can balance compliance, ethics, and innovation at scale?

    Facilitators:

    Siddharth Rajanna Head of IT Security BINGO Industries

    Jim Marinos Head of Security Advisory REA Group  

  • 16:35
    Johan-Fantenberg-Ping-2024

    Identity and the New AI Infrastructure Layer: Securing Every Interaction at Scale

    Johan Fantenberg - Director, Product and Solutions Marketing - Ping Identity

    Arrow

    As generative AI accelerates digital transformation across Australia and New Zealand, identity is emerging as the critical infrastructure layer that enables trust, security, and scale. In this session, Ping Identity unpacks how organisations can modernise identity to tap into the Agentic AI opportunity as well as protecting against AI-driven threats like deepfakes and account takeover—without slowing innovation. Learn how leading enterprises are unifying identity across edge, cloud, and third-party ecosystems to support massive-scale AI workloads while enabling seamless, secure access for every user, device, and agent. 

  • 17:00
    River Nygryn-4

    Group Discussion: Scaling Small Security Teams with AI – Tools and Tactics to Boost Productivity

    River Nygryn - CTO - CRVAA

    Arrow

    This discussion explores how AI can help streamline workflows, automate repetitive tasks, and prioritise alerts, allowing teams to focus on high-value work.

    • Which AI tools provide the biggest productivity gains for small security teams?
    • How do you balance automation with human oversight to avoid missed threats?
    • What tasks should be prioritised for AI-assisted workflows versus manual handling?
    • How can small teams measure the impact of AI on efficiency and risk reduction?
  • 17:25
    River Nygryn-Oct-10-2025-01-23-50-9662-PM

    Track A Chair's Closing Remarks

    Track Chair: River Nygryn - CTO - CRVAA 

    Arrow
  • Aaron McKeown-Oct-10-2025-01-20-24-9609-PM

    Track B: Human-Tech Momentum

    Track Chair: Aaron McKeown - CISO - NGM Group

    Arrow
  • 16:10
    Speaker

    Fireside Chat: Building AI Capability Without Losing Momentum

    Arrow

    How can organisations create the capacity for AI upskilling while ensuring regular work and operational tasks continue uninterrupted? Join us to share your thoughts and experience on balancing training, workload, and business priorities, discussing approaches to integrate AI learning into day-to-day workflows effectively.

    • How can AI upskilling be integrated into existing workflows without disrupting productivity?
    • What methods ensure employees apply newly acquired AI skills effectively in real projects?
    • How can organisations measure the impact of AI upskilling on workforce capability, innovation, and business outcomes?
    • What’s one lesson learned from failed AI 

    Speakers:

     Dr Tom Gao Chief Technology & Digital Services Officer City of Sydney 

     David Norwood CIO & Director Sydney Local Health District, NSW Health 

  • 16:35
    damien-skeeles-headshot

    Building Cyber Resilience through Threat-Informed Defence

    Damien Skeeles - Head of Solution Architecture, Asia Pacific and Japan - Filigran

    Arrow

    Threat-Informed Defence has gained strong momentum over the past year, driven by regulations such as Australia’s CPS 230 / CORIE and the EU’s DORA, which require resilience testing based on real-world cyber threats. This session introduces practical, open-source tools and techniques to help organisations build a threat-informed defence strategy and strengthen their overall cyber resilience—whether operating in regulated environments or not.

  • 17:00
    Interactive Discussion

    On the Stage Interview: Decisions That Shaped a CISO’s Leadership Journey

    Arrow

    This one-on-one conversation delves into stories behind the decisions, inflection points and leadership lessons that have shaped their journey. From earning trust and building influence to navigating complexity under pressure, the dialogue explores what they might approach differently today and what they still stand by. More than frameworks and controls, this session reveals how the CISO role is defined by the judgement calls that matter, focusing on the personal side of leadership in one of the most high-stakes positions in any organisation

    Interviewee:

    Arun Singh CISO Tyro Payments

    Interviewer:

    Dan Haagman CEO Chaleit & Honorary Professor of Practice Murdoch University 

     

  • 17:25
    Aaron McKeown-Oct-10-2025-01-24-14-3079-PM

    Track B Chair's Closing Remarks

    Track Chair: Aaron McKeown - CISO - NGM Group

    Arrow
  • 17:30

    Networking Drinks Reception