Join us at the 16th CISO Leaders Australia Summit Be part of this year's upcoming gathering where you will be able
to engage with the country's leading IT security executives on the
2nd September 2025, Grand Hyatt Hotel, Melbourne View Agenda Become A Sponsor

Join us at the 14th CISO Leaders
Australia Summit

BE PART OF THIS YEAR’S UPCOMING GATHERING WHERE YOU WILL BE ABLE TO ENGAGE WITH THE COUNTRY’S LEADING IT SECURITY PROFESSIONALS ON THE
3rd September 2024, Grand Hyatt Hotel,
Melbourne

Become A Sponsor

Join the gathering

ABOUT THE EVENT

The top 5 reasons to attend our Summit:

  • Strengthen your market presence and drive business growth at the CISO Leaders summit.

  • Get in front of your prospects, spend the day interacting with over 150 leading IT Security executives!

  • Gain direct access to leading cybersecurity executives from across Australia over a full day.

  • Pre – arrange 1-1 business meetings with the IT security executives of your choice.

  • Increase your companies GTM Strategy and drive your message to the right audience through participating in our presentations, roundtables or workshops.

UPCOMING THEME & TOPICS

Navigating the Cybersecurity Frontier Through Innovations Threats and Opportunities

The 16th CISO Leaders Australia Summit, scheduled for September 2nd, 2025, at the Grand Hyatt Hotel in Melbourne, will once again serve as the premier gathering for more than 150 of the state’s foremost CISOs, Heads of IT Security, Cyber Security experts, and IT executives.

The theme for this year’s summit revolves around “Securing the Intelligent Enterprise through Resilience, Risk Foresight & Real Time Defence“, this message will be conveyed by a distinguished assembly of thought leaders through keynote addresses, panel discussions, interactive workshops, and focused roundtable conversations.

Attendees will have the opportunity to tailor their own agendas, allowing them to optimize their time away from the office by participating in sessions most pertinent to their specific business needs.

Additionally, the networking opportunities available throughout the event will enable senior security executives to engage directly with a carefully curated group of technology partners through pre arranged business meetings. These partners will be showcased throughout the day, providing valuable assistance to leading security executives modernisation initiatives. These engagements ensure that businesses remain at the forefront of adopting new technologies, aligning their investment strategies with their overarching business goals.

  • Cyber Threat Intelligence
  • Cloud Security
  • IOT Security
  • Identity and Access Management
  • Ransomware
  • Cybercrime
  • Artificial Intelligence
  • Mobile Device Security

BECOME A SPONSOR

PROGRAM

The summit program is a draft and is subject to change.

Registration, Badge Collection & Refreshments

30min

Welcome and Introduction & Master of Ceremonies

Anthony Caruana, Principal Advisor, Focus Network

5mins

Anthony Caruana

Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]

Opening Debate – Budgets Are Tight, So Do We Invest in Risk Reduction or Growth Acceleration?

As economic pressures tighten and technology budgets come under intense scrutiny, CIOs and CISOs are often at a crossroads, should limited resources be directed toward reducing risk or accelerating business growth? In this interactive debate, two seasoned executives go head to head to argue their side of the boardroom tug of war.

Throughout this debate we will see the CIO advocate for bold technology investments that unlock innovation, drive operational efficiency, and keep the business competitive in a fast changing market. While on the other side, the CISO will make the case that without robust security and risk mitigation, growth initiatives could collapse under the weight of cyber threats, compliance failures, and reputational damage.

With the future of digital transformation and organisational resilience hanging in the balance, this session will challenge the audience to consider, Where does the real value lie when budgets are on the line?

 

20min

Keynote Presentation – Preparing for Quantum Threats, The Next Encryption Frontier

Quantum computing is on the horizon and while its mainstream use may be a few years away, the time to prepare is now. Quantum’s ability to break current encryption standards poses a future risk to all sensitive data.

This session explores how security leaders can assess their cryptographic footprint and begin transitioning toward post-quantum cryptography (PQC). We’ll review emerging NIST recommendations, how to protect long-life data today, and how to build a strategic roadmap for quantum resilience. Even in the absence of immediate quantum disruption, the groundwork laid now will determine your organisation’s future resilience.

Key Takeaways:

  • Understanding quantum computing’s threat to encryption
  • Timelines and roadmaps for post-quantum readiness
  • NIST recommendations and emerging standards
  • How to prepare your organisation’s cryptographic inventory

20min

Keynote Panel Discussion – Balancing Innovation and Risk by Aligning IT Modernisation with Cybersecurity Resilience

Panellists:
Jimmy Wong, General Manager, IT Security, Controls & Governance, AIA
Tristan Lawrence, Head of Cybersecurity, Monash Health
Moderator:

As organisations accelerate digital transformation, CIOs and CISOs must collaborate to modernise infrastructure without exposing the business to new vulnerabilities.

This panel will explore how IT modernisation initiatives, such as cloud migration, AI integration, and legacy system replacement, are being strategically aligned with evolving cyber threat landscapes.

Key Takeaways:

  • Frameworks for integrating security into every stage of IT modernisation
  • How to measure risk and resilience in transformation projects
  • Strategies for cross-functional collaboration between IT and security teams
 

30min

Jimmy Wong

Jimmy is a passionate cyber security and risk management professional who has held global and regional leadership roles with a diversified [...]

Tristan Lawrence

- 15 years of experience in Cyber Security, technology and 8 years in leadership - Passionate about enabling people and bringing people together [...]

Speaking Presentation – Securing the Cloud, Posture, Policy, and Continuous Vigilance

James Galbraith, Network and Cloud Security Engineering Lead, APA Group

Cloud adoption in Australia is accelerating, but with it comes a growing attack surface riddled with misconfigurations, fragmented policies, and limited visibility.

This session explores how CISOs are using next-generation tools, like Cloud Security Posture Management (CSPM) and Cloud Native Application Protection Platforms (CNAPP) to implement security policies that scale and adapt across multi-cloud environments.

Learn how AI is enhancing cloud visibility, policy enforcement, and real-time threat detection. Attendees will walk away with strategies to ensure secure cloud transformation while maintaining compliance and agility.

Key Takeaways:

  • Key principles of secure cloud architecture
  • How to use CSPM and CNAPP effectively
  • AI’s role in continuous cloud monitoring
  • Ensuring alignment with compliance frameworks

30mins

James Galbraith

Bio [...]

Networking Break

15mins

Breakout Session – Securing Your Data, Simplify The Path to Cyber Resilience and Defence

In today's interconnected world, ransomware attacks are no longer a matter of "if" but "when." Businesses need solutions that not only safeguard their critical assets but also reduce costs and improve operational efficiency. Join Rubrik as we delve into the critical need for a modern cyber resilience strategy.

Simplify. This session will break down the anatomy of a ransomware attack, exposing the vulnerabilities that legacy backup solutions simply can't address. We'll explore why traditional backups are no longer enough to guarantee recovery in the face of sophisticated cyber threats. By consolidating, simplifying and automating data protection, you can dramatically reduce the total cost of ownership.

Connect. Discover how Rubrik's platform empowers you to simplify your data management, connect your critical systems, and ultimately protect your business from the devastating impact of a cyber incident. And in a world where data is increasingly moving to the cloud, ensure your cloud data is protected and managed as seamlessly as on-premises data.

Protect. Learn how to achieve true cyber resilience and ensure business continuity, even in the face of a successful attack. Ask yourself…

  • Does your board know it would likely take you weeks to recover from a cyber attack today?
  • Have you established a clear operating model between ITOps and SecOps with clearly defined roles when it comes to cyber recovery?
  • When was the last time you tested recovery of a Tier 1 application from backups? Has this been tested under cyber duress?
  • What potential could be realised when all organisations operate with cyber confidence and known recovery times?
  • Does your organisation operate and invest based on a true 'assumed breach' mindset?

30min

Breakout Session – How Do You Orchestrate Governance in an AI-Driven Enterprise

This session explores how automation and orchestration are reshaping AI governance—enabling real-time compliance, embedded controls, and continuous oversight.

Tech and security leaders will gain insights on enforcing guardrails at scale, ensuring traceability, and building governance into the AI fabric without slowing innovation.

30min

Breakout Session – The Unseen Threat Driving Strategic Risk

Ariel Lumbroso, NSW Sales Engineer, Delinea
Zeeshan Ilyas, Cybersecurity Solution Engineer, Delinea A/NZ

As AI transforms how businesses operate, it’s also redefining the identity threat landscape. Many organisations are still grappling with how to effectively manage human identities and now face the added challenge of growing machine identities, which already outnumber human ones by 46 to 1 and are projected to surpass 45 billion by the end of 2025.

This explosion of access across cloud platforms is dramatically expanding the attack surface. Threat actors are taking advantage, using AI to exploit gaps in visibility and privilege at speed and scale.

For security leaders, identity is now the new perimeter and securing it means securing everything: people, systems and applications. But how do you manage that at scale?

This session will explore:

  • Strategic challenges in improving preventative controls.
  • Reducing the cost and effort of non-compliance
  • How AI and automation can improve security while improving IT efficiencies

Join senior security leaders to unpack the realities of managing identity risk in a cloud-first, AI-driven world.


30min

Zeeshan Ilyas

Zeeshan is the Lead Cybersecurity Solution Engineer at Delinea with over 15 years of experience in IT security, specializing in Privileged Access [...]

Ariel Lumbroso

Ariel Lumbroso is a cybersecurity leader specializing in Privileged Access Management, identity security, and compliance. With expertise in [...]

Breakout Session – The Hidden Weakness in Identity Security, Why Traditional PAM is No Longer Enough

Identity is now the number one attack vector. Attackers are bypassing outdated security controls, exploiting misconfigured identities, excessive permissions, and poor session management. Traditional PAM (Privileged Access Management) solutions weren’t designed for today’s dynamic, cloud-first environments.

A 2024 threat intelligence report found that credential-based attacks accounted for 38% of all data breaches—significantly more than phishing (17%) and exploits (16%). This shift highlights a growing risk for security teams: legacy PAM tools alone aren’t enough to stop identity-based threats.

The session will explore where the biggest gaps and challenges lay in today’s PAM and identity security strategies that include:

  • Legacy PAM solutions that don’t scale
  • Mismanaged permissions creating hidden risk
  • Fragmented identity controls
  • Session monitoring gaps

With identity now at the centre of the attack surface, organisations need a modern PAM approach that integrates with broader identity security strategies—ensuring access is continuously verified, monitored, and minimised.

This breakout session will bring together cybersecurity and IAM leaders to discuss:

  • Why is traditional PAM no longer enough?
  • How can organisations implement a defence-in-depth approach to identity security
  • How can privileged access be secured without slowing down the business?

30min

Speaking Presentation – Building resilience to malicious insider threats

Professor, Monica Whitty, Head of Software Systems & Cybersecurity, Monash University

In today’s complex threat landscape, malicious insiders pose one of the most difficult security challenges for CISOs. Unlike external threats, insiders have access, knowledge, and often the trust of the organization, making detection and prevention uniquely complex.

In this session, Professor Monica Whitty draws on cutting-edge research in cybersecurity, psychology, and behavioural science to explore how organisations can build true resilience to insider threats.

The talk will unpack the human and contextual factors that lead to insider risks, discuss how organisations can shift from reactive to preventative strategies, and present evidence-based frameworks to better predict, manage, and reduce these threats across critical environments.

Key Takeaways

  • Gain insight into the psychological and behavioural characteristics that commonly underpin malicious insider actions.
  • Explore how cultivating a security conscious culture and embedding protective mechanisms into organisational design can help mitigate insider risk.
  • Learn why traditional tech based monitoring alone is insufficient and how human-centric indicators and behavioural analytics can strengthen early detection.
  • Discover actionable strategies to move from reactive post incident management to proactive risk mitigation and resilience building across teams and systems.

30min

Professor Monica Whitty

Professor Monica Whitty is the Head of Department for Software Systems and Cyber Security, and holds a Professorship in Human Factors in Cyber [...]

Speaking Presentation – Cybersecurity Leadership in the Boardroom , Communicating Risk and Driving Strategy

CISOs are now expected to be strategic advisors, translating technical risks into business decisions that influence the boardroom.

This session will explore how you as a cybersecurity leader can effectively engage with executive stakeholders, communicate evolving threats in business terms, and influence enterprise strategy.

You will be presented with lessons on gaining executive buy-in, justifying security budgets, and aligning cybersecurity with broader business and ESG goals. The conversation will also touch on what boards really want to know and how CISOs can deliver insights that drive action without inducing unnecessary fear.

Key Takeaways:

  • How to present cybersecurity as a business enabler, not just a cost center
  • Strategies for effective boardroom communication and storytelling
  • Aligning cybersecurity programs with ESG, regulatory, and reputational goals
  • Building a security narrative that resonates with CEOs and CFOs

30min

Breakout Session – Securing the Software Supply Chain

Discuss real-world tactics to identify and mitigate risks in third-party software, open-source components, and CI/CD pipelines in the wake of increasing supply chain attacks.

30min

Breakout Session – Governance, Risk & Compliance in the Age of AI

Examine how CISOs are adapting GRC frameworks to address AI governance, new regulatory expectations, and the need for continuous assurance across evolving tech stacks.

30min

Breakout Session – AI-Driven Threat Detection – Hype or Reality?

A focused discussion on the current effectiveness of AI in detecting and responding to threats, how mature the tools really are, and the practical challenges of integrating them into legacy environments.

30min

Breakout Session – Navigating Cybersecurity Talent Shortages

Explore strategies for recruiting, developing, and retaining top cybersecurity talent amid growing competition, evolving skill demands, and the rise of AI-assisted security roles.

30min

Networking Lunch

40min

Keynote Panel Discussion – Beyond Compliance, Building a Culture of Cyber Resilience

Compliance is important, but resilience is essential. In this discussion, CISOs will share how they are evolving beyond checkbox-driven compliance to build agile, resilient cybersecurity cultures that can adapt to shifting threats and regulations.

The panel will examine how to embed security across teams, build response muscle through simulations and tabletop exercises, and develop high-performance security teams. The conversation will also explore how to use AI and automation to reinforce controls and detect risk in real time.

Whether you're responding to supply chain attacks or adapting to new privacy laws, building resilience is the new benchmark of mature security programs.

Key Takeaways

  • Tactics for embedding security into the DNA of the organization
  • The role of AI and automation in maintaining continuous compliance and resilience
  • Practical methods for upskilling teams and simulating incident response

30min

Speaking Presentation – Zero Trust in the Real World, Moving from Strategy to Execution

Zero Trust is no longer a buzzword it's becoming a necessity. But while the theory is compelling, execution across large, hybrid organisations remains a complex and often fragmented process.

This session will provide practical insights into what Zero Trust looks like beyond the whiteboard. Learn how to phase in Zero Trust across users, devices, applications, and networks, and understand the critical role of identity, segmentation, and continuous validation. We’ll also explore lessons from Australian companies that have moved beyond pilots to build sustainable Zero Trust architectures that deliver measurable results.

Key Takeaways

  • Key stages and roadmap for Zero Trust implementation
  • Identity and access management as foundational layers
  • Overcoming legacy infrastructure limitations
  • Metrics to measure Zero Trust maturity

20min

Closing Keynote – AI and the New Frontlines of Threat Detection

As cyber threats grow in complexity, speed, and volume, traditional detection methods are no longer sufficient. Artificial intelligence and machine learning are now essential components in modern Security Operations Centers (SOCs), helping teams identify and respond to threats faster than ever before.

This session delves into how AI is being deployed across leading enterprises in Australia to power anomaly detection, behavioural analytics, and automated triage. We’ll also examine how to balance AI decision-making with human oversight, reduce false positives, and establish trust in these intelligent systems.

Learn from real-world implementations and understand how to scale AI initiatives responsibly within your cyber infrastructure.

Key Takeaways

  • How to implement AI/ML in your threat detection and response strategy
  • Managing AI model bias and drift in security use cases
  • Real-world examples of AI-powered SOC transformation
  • The risks of over-reliance on AI and maintaining human oversight

20min

Keynote Presentation

20min

Closing Remarks

Anthony Caruana, Principal Advisor, Focus Network

5min

Anthony Caruana

Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]

Networking Drinks

60min

Registration & Morning Refreshments

30min

Welcome & Introduction – Master of Ceremonies

Anthony Caruana, Principal Advisor, Focus Network

5min

Anthony Caruana

Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]

Opening Debate – Balancing Innovation and Security: Who Should Have the Final Say in Approving New Technologies?

Speakers:
Jamie Rossato, Chief Information Security Officer, CSIRO
Brett Wilson, Chief Information Officer, RACP
Moderator:
Tyron McGurgan, CEO, Focus Network

This topic addresses the often-conflicting priorities of rapid technological adoption and stringent security requirements. Focusing on whether the CIO’s drive for innovation or the CISO’s focus on security should take precedence.

Join this engaging session where Brett and Jamie will have a light-hearted battle between CIO and CISO on a topic where each member will argue their side trying to convince you they have the right opinion on the matter.


20min

Jamie Rossato

  Jamie Rossato, has served in CISO roles for over a decade across a range of industries. He has served as a non-executive director at [...]

Brett Wilson

  Recognised in the CIO50 in 2022, 2021, 2020 and 2019 for innovation and leadership. An executive leader with experience in digital [...]

Keynote Presentation – The Future of Mobility & Smart Cities: AI, Data & Citizen-Centric Design

Kurt Brissett, Chief Digital and Information Officer, Built

As cities evolve, the intersection of AI, data, and digital platforms is transforming mobility and infrastructure. This session will explore how technology is shaping the future of transport, delivering seamless and secure experiences at scale. Drawing from award-winning, multi-modal transport innovations, Kurt will share key insights on:

  • How AI and digital platforms are reshaping transport and infrastructure – leveraging predictive analytics, automation, and real-time data for smarter urban mobility.
  • Delivering seamless, secure, and integrated mobility experiences at extreme scale – ensuring reliability, cybersecurity, and user-centric design in large-scale transport networks.
  • Lessons from building award-winning, multi-modal transport solutions – insights into navigating complexity, driving innovation, and aligning technology with public needs.

30min

Kurt Brissett

Kurt is an internationally renowned technology executive with over 25 years’ experience in the industry. He is currently the Chief Digital and [...]

Keynote Panel Discussion – AI in the Enterprise: Balancing Innovation and Security

Panellists:
Catherine Rowe, Former Group CISO, QBE
Leron Zinatullin, CISO, Linkly
Russell Morris, CIO, APA
Moderator:
Anthony Caruana, Advisor, Focus Network

Join our expert panel as we explore the intersection of AI, innovation, and security in the enterprise. Our discussion will delve into the opportunities and challenges of AI adoption, from driving business growth to mitigating cyber threats.

CIOs and CISOs alike will gain valuable insights on how to harness the power of AI while ensuring the security and integrity of their organisations.


30min

Catherine Rowe

With experience operating at the intersection of risk, cyber security, technology, law and governance, I have built a successful career leading [...]

Leron Zinatullin

Leron is a forward-thinking technology executive specialising in cyber strategy, management and delivery. He has led large scale, global, high [...]

Russell Morris

Global technology executive delivering transformation, commercial value, and innovation at scale. With experience across 10 [...]

Anthony Caruana

Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]

Keynote Presentation – High Risk Users & Where to Find Them

Scott Jenner, Senior Sales Engineer, Mimecast

68% of cyber incidents are attributed to human error however risk isn’t evenly distributed with recent statistics revealing that 80% of security incidents are caused by just 8% of employees, underscoring the critical importance of identifying high-risk users within an organisation.

This session will explore the factors contributing to user vulnerabilities that lead to certain individuals being classed as high-risk.

Participants will gain insights into measuring user risk effectively and implementing tailored strategies to enhance cybersecurity across their organisations. This session will also highlight how a personalised and adaptive security approach can provide customised security measures for each user. By focusing on these high-risk individuals, organisations can safeguard their workforce while maintaining operational productivity.


30min

Scott Jenner

Scott is a experienced cybersecurity professional with a strong track record of working across Africa, Europe, the UK, and Australia. Over the [...]

Networking Break

15min

Breakout Session – How Do You Orchestrate Governance in an AI-Driven Enterprise

Darren Cockerell, Head of Sales and Solution Consulting, Australia and New Zealand, Blue Prism

This session explores how automation and orchestration are reshaping AI governance—enabling real-time compliance, embedded controls, and continuous oversight.

Tech and security leaders will gain insights on enforcing guardrails at scale, ensuring traceability, and building governance into the AI fabric without slowing innovation.


30min

Darren Cockerell

Darren Cockerell is Head of Sales and Solutions Consulting ANZ at SS&C Blue Prism where he is responsible for understanding the strategic [...]

Breakout Session – The Unseen Threat Driving Strategic Risk

Ariel Lumbroso, NSW Sales Engineer, Delinea

As AI transforms how businesses operate, it’s also redefining the identity threat landscape. Many organisations are still grappling with how to effectively manage human identities and now face the added challenge of growing machine identities, which already outnumber human ones by 46 to 1 and are projected to surpass 45 billion by the end of 2025.

This explosion of access across cloud platforms is dramatically expanding the attack surface. Threat actors are taking advantage, using AI to exploit gaps in visibility and privilege at speed and scale.

For security leaders, identity has become the new perimeter and securing it means protecting everything: people, systems, and applications. But how do you manage that at scale while maintaining efficiency? 

This executive roundtable will explore:

  • Strategic challenges in improving preventative controls. 
  • Reducing the cost and effort of non-compliance
  • How AI and automation can improve security while improving IT efficiencies

Join senior security leaders to unpack the realities of managing identity risk in a cloud-first, AI-driven world.


30min

Ariel Lumbroso

Ariel Lumbroso is a cybersecurity leader specializing in Privileged Access Management, identity security, and compliance. With expertise in [...]

Breakout Session – The Hidden Weakness in Identity Security: Why Traditional PAM is No Longer Enough

Roshi Balendran, Regional Director, BeyondTrust

Identity is now the number one attack vector. Attackers are bypassing outdated security controls, exploiting misconfigured identities, excessive permissions, and poor session management. Traditional PAM (Privileged Access Management) solutions weren’t designed for today’s dynamic, cloud-first environments.

A 2024 threat intelligence report found that credential-based attacks accounted for 38% of all data breaches—significantly more than phishing (17%) and exploits (16%). This shift highlights a growing risk for security teams: legacy PAM tools alone aren’t enough to stop identity-based threats.

Where are the biggest gaps in today’s PAM and identity security strategies?

Legacy PAM solutions that don’t scale – Traditional vault-based PAM was built for static infrastructure, not today’s hybrid-cloud and SaaS environments.

Mismanaged permissions creating hidden risk – Overprivileged accounts, orphaned identities, and excessive standing access leave the door open for attackers.

Fragmented identity controls – Security teams struggle to enforce least privilege consistently across hybrid environments, SaaS applications, and third-party access.

Session monitoring gaps – Without real-time insights into privileged activity, it’s harder to detect and prevent identity-based attacks before they escalate.

With identity now at the centre of the attack surface, organisations need a modern PAM approach that integrates with broader identity security strategies—ensuring access is continuously verified, monitored, and minimised.

This invite-only roundtable will bring together cybersecurity and IAM leaders to discuss:

  • Why is traditional PAM no longer enough? – What are the key limitations of vault-based approaches, and how can modern identity security strategies address them?
  • How can organisations implement a defence-in-depth approach to identity security? – What role do zero trust, just-in-time access, and continuous verification play in stopping identity-driven attacks?
  • How can privileged access be secured without slowing down the business? – What are the best ways to reduce operational complexity while enforcing stronger identity controls?

Join an exclusive discussion with senior cybersecurity and IAM leaders to explore the future of modern PAM and identity security. Secure your seat today.

30min

Roshi Balendran

Bio [...]

Breakout Session – Securing Your Data: Simplify The Path to Cyber Resilience and Defence

Alister Freese, Enterprise Account Executive, Rubrik

In today's interconnected world, ransomware attacks are no longer a matter of "if" but "when." Businesses need solutions that not only safeguard their critical assets but also reduce costs and improve operational efficiency. Join Rubrik as we delve into the critical need for a modern cyber resilience strategy.

Simplify. This session will break down the anatomy of a ransomware attack, exposing the vulnerabilities that legacy backup solutions simply can't address. We'll explore why traditional backups are no longer enough to guarantee recovery in the face of sophisticated cyber threats. By consolidating, simplifying and automating data protection, you can dramatically reduce the total cost of ownership.

Connect. Discover how Rubrik's platform empowers you to simplify your data management, connect your critical systems, and ultimately protect your business from the devastating impact of a cyber incident. And in a world where data is increasingly moving to the cloud, ensure your cloud data is protected and managed as seamlessly as on-premises data.

Protect. Learn how to achieve true cyber resilience and ensure business continuity, even in the face of a successful attack.

Ask yourself…

  • Does your board know it would likely take you weeks to recover from a cyber attack today?
  • Have you established a clear operating model between ITOps and SecOps with clearly defined roles when it comes to cyber recovery?
  • When was the last time you tested recovery of a Tier 1 application from backups? Has this been tested under cyber duress?
  • What potential could be realised when all organisations operate with cyber confidence and known recovery times?
  • Does your organisation operate and invest based on a true 'assumed breach' mindset?

30min

Alister Freese

A sales leader who can lead high performing sales teams through applying strong commercial, customer and people management skills. Have built a [...]

Speaking Presentation – Strengthening Cyber Defences – The Power of Zero Trust and Multi-Factor Authentication (MFA)

Iain Hart, Head of Risk Management, Crown Resorts

As cyber threats continue to evolve, adopting a Zero Trust security model and Multi-Factor Authentication (MFA) has become essential, particularly in Singapore's fast-moving digital landscape. Zero Trust ensures that no entity—whether internal or external—is trusted without verification. Combined with MFA, which adds additional layers of authentication beyond passwords, this approach helps organizations protect critical data, reduce unauthorized access, and enhance security resilience.

This session will discuss how implementing Zero Trust and MFA can combat sophisticated cyberattacks and offer CISOs practical strategies to deploy these models across their organizations.

Key Takeaways:

  • Understanding Zero Trust: Learn how enforcing identity verification for every person and device accessing resources helps build a resilient security posture.
  • Deploying MFA for Enhanced Security: Discover the role of MFA as a crucial layer of defence against credential-based attacks.
  • Reducing Attack Surfaces: Explore how Zero Trust limits access to necessary resources and continuously verifies user identities, improving threat mitigation.

30min

Iain Hart

I am an experienced IT leader who has enjoyed a career spanning 30 years across multiple industries, including Banking and Finance, Retail, Online [...]

Speaking Presentation – Cyber Threat Intelligence: Strengthening Australia’s Cyber Defences Through Proactive Threat Hunting

James Kay, Assistant Director - General Standards, Technical Advice and Research, Australian Signals Directorate

As cyber threats become more sophisticated, Australian organizations must move beyond reactive defence and embrace proactive cyber threat intelligence strategies. In this session, James Kay will share insights from the Australian Cyber Security Centre (ACSC) on how intelligence-led threat hunting can enhance national cyber resilience. He will explore the evolving cyber threat landscape, the role of the National Cyber Watch Office in identifying emerging threats, and best practices for integrating intelligence-driven security strategies within enterprise cybersecurity frameworks.

Key Takeaways:

  1. Understanding the Threat Landscape: Insights into the latest cyber threats targeting Australian organizations, including nation-state actors, ransomware, and supply chain attacks.
  2. Proactive Threat Hunting: How organizations can leverage intelligence to detect and neutralize threats before they escalate.
  3. Bridging the Public-Private Gap: The role of information sharing between government agencies and private sector organizations in improving national cybersecurity.
  4. Incident Preparedness & Response: Lessons from ACSC’s frontline experience in handling major cyber incidents and how organizations can strengthen their response capabilities.

30min

James Kay

James is the Assistant Director‐General for Standards, Technical Advice, and Research, at the Australian Signals Directorate’s (ASD) [...]

Breakout Session – How Modern CIOs Redefine Innovation with AI + Low-Code

Bharath Kumar, Head of Marketing & CX, Zoho Developer Suite, Zoho

Modern CIOs are turning to the powerful combination of AI and low-code to lead enterprise innovation.

This session explores the key factors driving this trend and how AI powered low-code empowers IT leaders to deliver faster business outcomes. We will also discuss a play-book that CIOs can adapt to drive this change.


30min

Breakout Session – Improving the CyberSecurity metrics that matter

Rob Collins, Enterprise Security Architect, SentinelOne
  • How are you using AI to reduce Mean time to detect (MTTD)?
  • How can Automation reduce Time to contain?
  • How do you get 100% visibility across networks, systems, cloud infrastructure, users?
  • Are your successful phishing attempts still declining, in the age of AI generated phishing?

30min

Rob Collins (MBA, BSc, CISM)

Rob is a keenly active cyber-security practitioner and has over 20 years’ experience in the Cyber Security industry. Prior to joining [...]

Breakout Session – Leveraging observability to support the AI era: A playbook for CIOs

Aron Marden, Principal Solutions Consultant, New Relic

As AI becomes a crucial component of modern IT strategies, observability becomes even more relevant. The 2024 Observability Forecast revealed that the adoption of AI technologies was the top strategy or trend driving the need for observability (41%), with 42% of those surveyed saying they had already deployed AI monitoring.

But how can CIOs maximise their investments and get the best value from observability? This roundtable explores key features of AI, including enhanced predictive capabilities and streamlined incident management, and how to use them to drive the best business outcomes.

Roundtable attendees will discuss the challenges they face, and share insights on leveraging AI-driven observability components, such as predictive alerts.

Key takeaways include:

  • How AI enhances observability for predictive insights and incident prevention.
  • Real-world examples of AI-driven observability in action.
  • Overcoming skepticism and building confidence in AI-powered tools

30min

Aron Marden

Aron has been working in the Technology space for over 15 years with a background in SysOps, System and Solution Architecture and a hobby developer [...]

Breakout Session – Smarter IT Strategies: Optimise Costs, Maximise Value, and Accelerate Innovation

Dennis Remmer, Sr. Director, Oracle Delivery, Rimini Street
Ant Withers , VP of Sales and Marketing, Rimini Street

In today’s economic climate, IT leaders are under growing pressure to do more with less—balancing cost efficiency with the need to modernise and innovate. 

This breakout session will uncover how forward-thinking organisations are leveraging third-party support to reduce operational costs, extend the life of critical systems, and reinvest in the technologies that matter most.

Key takeaways:

  • Proven Savings in Action: Explore real examples of how enterprises have cut support and maintenance costs while maintaining performance.
  • Modernise Without Disruption: Learn how to extend the lifespan of your ERP environment and delay costly upgrades without compromising capabilities.
  • Flexible Customisation Support: See how organisations are confidently supporting mission-critical customisations—without hidden costs.

30min

Dennis Remmer

With over three decades of experience across local, national, and international IT landscapes, Dennis leads Rimini Street’s Asia-Pacific team [...]

Ant Withers

Bio [...]

Networking Lunch

40min

Speaking Presentation – Architecting Resilient Security Operations: Advanced Strategies for Threat Detection, Incident Response, and SOC Optimization

Maryam Shoraka, Head of OT Cyber Security Operations, Sydney Trains

In today's complex threat landscape, Security Operations Centres (SOCs) must be equipped to detect and respond to advanced threats in real-time. As a seasoned security operations executive, Maryam will delve into the technical aspects of building and optimising a world-class SOC, including threat detection, incident response, and security analytics.

Takeaways:

  • Practical advice on SOC optimisation techniques and technologies
  • Guidance on integrating threat intelligence into SOC operations
  • Key metrics and KPIs for measuring SOC performance and effectiveness

30min

Maryam Shoraka

I am a seasoned security operations executive with extensive experience building world class (24/7) security operations centres from the ground, [...]

Speaking Presentation – Data-Driven Leadership – Turning Information into Strategic Advantage

River Nygryn, Chief Information Security Officer, Hammond Care

In this presentation, River will explore the intersection of data-driven leadership and human-centric leadership in cybersecurity. She’ll discuss how Chief Information Security Officers (CISOs) can leverage data analytics to inform strategic decisions while also building strong relationships with their teams and stakeholders. By combining these two approaches, CISOs can create a more comprehensive cybersecurity strategy that not only protects organisational assets but also fosters a culture of collaboration, trust, and innovation.

Key takeaways:

  • The role of human-centric leadership in building strong relationships and teams
  • Strategies for combining data analytics with human insights to drive business outcomes
  • Best practices for CISOs to balance data-driven decision making with human-centric leadership
 

20min

River Nygryn

A respected industry leader & advocate for women in Cybersecurity, Tech and Business, River is driven by inclusion, innovation, process [...]

Speaking Presentation – Balancing cyber security risks in a Healthcare setting

Peter Croll, Chief Information Security Officer, NSW Health

In this session, Peter will explore the complexities of managing cyber security risks in a healthcare setting. With the increasing reliance on digital technologies, healthcare organisations face a unique challenge in protecting sensitive patient data while providing timely and effective care. Our speaker will share insights on strategies for mitigating cyber threats, ensuring regulatory compliance with Australian standards (e.g. My Health Record, Australian Digital Health Agency), and maintaining patient trust.

Key Takeaways:

  • Effective strategies for protecting sensitive patient data
  • Balancing security controls with clinical workflows and patient care
  • Regulatory compliance requirements and best practices under Australian law
  • Practical tips for implementing a robust cyber security framework in a healthcare setting

20min

Peter Croll

I am a cyber security and IT leader with over 20 years of experience across government, healthcare, academia, and telecommunications. I have a [...]

Networking Break

15min

Fireside Chat – Cybersecurity in the Spotlight: A Fireside Chat with Anna Aquilina

Anna Aquilina, Chief Information Security Officer, University of Technology Sydney
Anthony Caruana, Principal Advisor, Focus Network

Join us for an intimate fireside chat with Anna Aquilina, Chief Information Security Officer, UTS, a renowned cybersecurity expert and thought leader. As a seasoned CISO with extensive experience in driving cybersecurity strategy and innovation, Anna will share her insights on the evolving cyber threat landscape, the importance of diversity in cybersecurity, and the future of cybersecurity leadership.

Key Takeaways:

  • Gain valuable insights into the latest cyber threats and trends and learn how to stay ahead of the curve in terms of threat detection and mitigation.
  • Understand the importance of diversity in cybersecurity and learn strategies for promoting greater diversity and inclusion in your organisation's cybersecurity teams.
  • Discover the key qualities and skills required for effective cybersecurity leadership in the future and learn how to develop and nurture the next generation of cybersecurity leaders.

20min

Anna Aquilina

An experienced and successful senior executive with broad and deep knowledge of the domestic and international dimensions of cyber security, [...]

Anthony Caruana

Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]

Closing Keynote Panel Discussion – The Future of Cybersecurity: Innovations, Challenges, and the Path Ahead

Panellists:
Jihad Zein, Global Head of GRC, Technology, Toll Holding
Madhuri Nandi, Head of Security, Till Payments
Siddharth Rajanna, Head of IT Security, Bingo Industries
Manasseh Paradesi, Chief Information Security Officer, Tyro Payments
Moderator:
Anthony Caruana, Principal Advisor, Focus Network

As the cybersecurity landscape evolves at an unprecedented pace, this closing keynote panel will bring together industry leaders to discuss the transformative innovations reshaping the future of cybersecurity, the challenges that lie ahead, and the strategies CISOs must adopt to navigate this dynamic environment.

Key takeaways:

  • Strategic Insights: Gain valuable insights into how industry leaders are approaching the future of cybersecurity and the strategies they are implementing.
  • Innovative Approaches: Discover innovative technologies and solutions that can enhance your organisation's security posture.
  • Networking Opportunities: Foster connections among attendees, panellists, and industry experts to encourage ongoing collaboration and knowledge sharing.
 

30min

Madhuri Nandi

Head of Security at Nuvei | Author | Co-Chair AWSN | Diversity & Inclusion Advocate | Cybersecurity Leader Madhuri is a hands-on [...]

Siddharth Rajanna

I am an accomplished ‘Cyber Security Leader’ & Security Speaker with overall IT Security experience of more than 13 years including [...]

Manasseh Paradesi

Manasseh Paradesi is an experienced CISO and executive advisor, known for delivering pragmatic, risk-based cybersecurity leadership across top-tier [...]

Anthony Caruana

Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]

Closing Remarks

Anthony Caruana, Principal Advisor, Focus Network

5min

Anthony Caruana

Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]

Networking Drinks

60min

DOWNLOAD THE POST EVENT REPORT FROM OUR PREVIOUS EVENT

BECOME A SPONSOR

Meet leading IT security executives from Australia’s strongest brands.

Interact and engage with some of the strongest and most powerful brands from across Australia.

“First of all, can I just say this was one of the best conferences I have been to in the last 5 years. The caliber of delegates (and networking opportunities), suppliers and speakers was exceptional. Your team – were so helpful before and during the event. Well done, I'd be very happy to be invited back!”

 

– 20TH CENTURY FOX

'Fantastic event! Congratulations to you and the team. Hands down the best event I have attended as a sponsor since I've been at Genesys. You and your team were extremely professional and helpful in the lead up to the event and I very much appreciate your patience in dealing with the many hurdles along the way. I can't tell you how refreshing that is after the dealings we've had with several other event/conference providers across APAC.'

 

– GENESYS

“Just wanted to thank you and the team for making us feel so welcome and looking after the team during the conference. It was definitely one of the best ones we’ve been to, so well done. When is your next event? Would love to keep the ball rolling on this.”

 

– SHOOTSTA

“I always enjoy the opportunity this summit affords for networking and a general check in on what everyone is doing.”

 

TRAVERS STOW – SIGMA HEALTHCARE

PLATINUM PARTNER

GOLD PARTNERS




SILVER PARTNERS



BRONZE PARTNERS

BECOME A SPONSOR

Grand Hyatt Melbourne
123 Collins St, Melbourne VIC 3000
Telephone: +61 (03) 9657 1234
Email Enquiries: melbourne.grand@hyatt.com

More Information
Copyright 2025 ©Focus Network. All rights reserved