Join us at the 16th CISO Leaders Australia Summit Be part of this year's upcoming gathering where you will be able
to engage with the country's leading IT Security professionals on the
2nd September 2025, Grand Hyatt Hotel, Melbourne
Summit Themes Key themes and topics are developed by our
standing committee and advisory board from
the country's most respected Security / IT Leaders.
These will be addressed over the course
of the CISO Leaders Summit Australia.

 

Anti Virus

 

Network Security

 

Analytics

 

Cyber Security

 

Mobile & cloud
security

 

Identity
Management

 

Fraud
Protection

 

End Point
Security

Join us at the 16th CISO Leaders
Australia Summit

BE PART OF THIS YEAR’S UPCOMING GATHERING WHERE YOU WILL BE ABLE TO ENGAGE WITH THE COUNTRY’S LEADING IT SECURITY PROFESSIONALS ON THE
2nd September 2025, Grand Hyatt Hotel, Melbourne

Join the gathering

ABOUT THE EVENT

The 16th CISO Leaders Australia Summit, scheduled for September 2nd, 2025, at the Grand Hyatt Hotel in Melbourne, will once again serve as the premier gathering for more than 150 of the state’s foremost CISOs, Heads of IT Security, Cyber Security experts, and IT executives.

The theme for this year’s summit revolves around “Securing the Intelligent Enterprise through Resilience, Risk Foresight & Real Time Defence”, this message will be conveyed by a distinguished assembly of thought leaders through keynote addresses, panel discussions, interactive workshops, and focused roundtable conversations.

Attendees will have the opportunity to tailor their own agendas, allowing them to optimize their time away from the office by participating in sessions most pertinent to their specific business needs.

Additionally, the networking opportunities available throughout the event will enable senior security executives to engage directly with a carefully curated group of technology partners through pre arranged business meetings. These partners will be showcased throughout the day, providing valuable assistance to leading security executives modernisation initiatives. These engagements ensure that businesses remain at the forefront of adopting new technologies, aligning their investment strategies with their overarching business goals.

SPEAKERS

Catherine Rowe
plus

Catherine Rowe

Former Global Chief Information Security Officer, QBE Insurance Group

Jamie Rossato
plus

Jamie Rossato

CISO, CSIRO

Dr Alan D. Thompson
plus

Dr Alan D. Thompson

World expert in AI

Sanja Marais
plus

Sanja Marais

Chief Technology and Security Officer, Aspen Medical

REGISTER YOUR INTEREST

PROGRAM

The summit program is a draft and is subject to change.

Registration, Badge Collection & Refreshments

30min

Welcome and Introduction & Master of Ceremonies

Anthony Caruana, Principal Advisor, Focus Network

5mins

Anthony Caruana

Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]

Opening Debate – Budgets Are Tight, So Do We Invest in Risk Reduction or Growth Acceleration?

As economic pressures tighten and technology budgets come under intense scrutiny, CIOs and CISOs are often at a crossroads, should limited resources be directed toward reducing risk or accelerating business growth? In this interactive debate, two seasoned executives go head to head to argue their side of the boardroom tug of war.

Throughout this debate we will see the CIO advocate for bold technology investments that unlock innovation, drive operational efficiency, and keep the business competitive in a fast changing market. While on the other side, the CISO will make the case that without robust security and risk mitigation, growth initiatives could collapse under the weight of cyber threats, compliance failures, and reputational damage.

With the future of digital transformation and organisational resilience hanging in the balance, this session will challenge the audience to consider, Where does the real value lie when budgets are on the line?

 

20min

Keynote Presentation – Preparing for Quantum Threats, The Next Encryption Frontier

Quantum computing is on the horizon and while its mainstream use may be a few years away, the time to prepare is now. Quantum’s ability to break current encryption standards poses a future risk to all sensitive data.

This session explores how security leaders can assess their cryptographic footprint and begin transitioning toward post-quantum cryptography (PQC). We’ll review emerging NIST recommendations, how to protect long-life data today, and how to build a strategic roadmap for quantum resilience. Even in the absence of immediate quantum disruption, the groundwork laid now will determine your organisation’s future resilience.

Key Takeaways:

  • Understanding quantum computing’s threat to encryption
  • Timelines and roadmaps for post-quantum readiness
  • NIST recommendations and emerging standards
  • How to prepare your organisation’s cryptographic inventory

20min

Keynote Panel Discussion – Balancing Innovation and Risk by Aligning IT Modernisation with Cybersecurity Resilience

As organisations accelerate digital transformation, CIOs and CISOs must collaborate to modernise infrastructure without exposing the business to new vulnerabilities.

This panel will explore how IT modernisation initiatives, such as cloud migration, AI integration, and legacy system replacement, are being strategically aligned with evolving cyber threat landscapes.

Key Takeaways:

  • Frameworks for integrating security into every stage of IT modernisation
  • How to measure risk and resilience in transformation projects
  • Strategies for cross-functional collaboration between IT and security teams
 

30min

Speaking Presentation – Securing the Cloud, Posture, Policy, and Continuous Vigilance

Cloud adoption in Australia is accelerating, but with it comes a growing attack surface riddled with misconfigurations, fragmented policies, and limited visibility.

This session explores how CISOs are using next-generation tools, like Cloud Security Posture Management (CSPM) and Cloud Native Application Protection Platforms (CNAPP) to implement security policies that scale and adapt across multi-cloud environments.

Learn how AI is enhancing cloud visibility, policy enforcement, and real-time threat detection. Attendees will walk away with strategies to ensure secure cloud transformation while maintaining compliance and agility.

Key Takeaways:

  • Key principles of secure cloud architecture
  • How to use CSPM and CNAPP effectively
  • AI’s role in continuous cloud monitoring
  • Ensuring alignment with compliance frameworks

30mins

Networking Break

15mins

Breakout Session – Securing Your Data, Simplify The Path to Cyber Resilience and Defence

In today's interconnected world, ransomware attacks are no longer a matter of "if" but "when." Businesses need solutions that not only safeguard their critical assets but also reduce costs and improve operational efficiency. Join Rubrik as we delve into the critical need for a modern cyber resilience strategy.

Simplify. This session will break down the anatomy of a ransomware attack, exposing the vulnerabilities that legacy backup solutions simply can't address. We'll explore why traditional backups are no longer enough to guarantee recovery in the face of sophisticated cyber threats. By consolidating, simplifying and automating data protection, you can dramatically reduce the total cost of ownership.

Connect. Discover how Rubrik's platform empowers you to simplify your data management, connect your critical systems, and ultimately protect your business from the devastating impact of a cyber incident. And in a world where data is increasingly moving to the cloud, ensure your cloud data is protected and managed as seamlessly as on-premises data.

Protect. Learn how to achieve true cyber resilience and ensure business continuity, even in the face of a successful attack. Ask yourself…

  • Does your board know it would likely take you weeks to recover from a cyber attack today?
  • Have you established a clear operating model between ITOps and SecOps with clearly defined roles when it comes to cyber recovery?
  • When was the last time you tested recovery of a Tier 1 application from backups? Has this been tested under cyber duress?
  • What potential could be realised when all organisations operate with cyber confidence and known recovery times?
  • Does your organisation operate and invest based on a true 'assumed breach' mindset?

30min

Breakout Session – How Do You Orchestrate Governance in an AI-Driven Enterprise

This session explores how automation and orchestration are reshaping AI governance—enabling real-time compliance, embedded controls, and continuous oversight.

Tech and security leaders will gain insights on enforcing guardrails at scale, ensuring traceability, and building governance into the AI fabric without slowing innovation.

30min

Breakout Session – The Unseen Threat Driving Strategic Risk

As AI transforms how businesses operate, it’s also redefining the identity threat landscape. Many organisations are still grappling with how to effectively manage human identities and now face the added challenge of growing machine identities, which already outnumber human ones by 46 to 1 and are projected to surpass 45 billion by the end of 2025.

This explosion of access across cloud platforms is dramatically expanding the attack surface. Threat actors are taking advantage, using AI to exploit gaps in visibility and privilege at speed and scale.

For security leaders, identity has become the new perimeter and securing it means protecting everything: people, systems, and applications. But how do you manage that at scale while maintaining efficiency?

This session will explore:

  • Strategic challenges in improving preventative controls.
  • Reducing the cost and effort of non-compliance
  • How AI and automation can improve security while improving IT efficiencies

Join senior security leaders to unpack the realities of managing identity risk in a cloud-first, AI-driven world.

30min

Breakout Session – The Hidden Weakness in Identity Security, Why Traditional PAM is No Longer Enough

Identity is now the number one attack vector. Attackers are bypassing outdated security controls, exploiting misconfigured identities, excessive permissions, and poor session management. Traditional PAM (Privileged Access Management) solutions weren’t designed for today’s dynamic, cloud-first environments.

A 2024 threat intelligence report found that credential-based attacks accounted for 38% of all data breaches—significantly more than phishing (17%) and exploits (16%). This shift highlights a growing risk for security teams: legacy PAM tools alone aren’t enough to stop identity-based threats.

The session will explore where the biggest gaps and challenges lay in today’s PAM and identity security strategies that include:

  • Legacy PAM solutions that don’t scale
  • Mismanaged permissions creating hidden risk
  • Fragmented identity controls
  • Session monitoring gaps

With identity now at the centre of the attack surface, organisations need a modern PAM approach that integrates with broader identity security strategies—ensuring access is continuously verified, monitored, and minimised.

This breakout session will bring together cybersecurity and IAM leaders to discuss:

  • Why is traditional PAM no longer enough?
  • How can organisations implement a defence-in-depth approach to identity security
  • How can privileged access be secured without slowing down the business?

30min

Speaking Presentation – AI-Driven Risk & Compliance Monitoring in a Post-Privacy Act World

With Australia’s evolving data privacy regulations and the global push for more transparent digital ecosystems, compliance and risk management must become smarter and more proactive.

AI is now being embedded into Governance, Risk and Compliance (GRC) platforms to streamline audits, detect anomalies, and predict non-compliance before it happens.

In this session, discover how AI can help monitor privacy obligations, automate reporting, and align with frameworks such as ISO 27001 and CPS 234. We’ll also cover key governance considerations for AI-driven GRC tools—ensuring ethics, transparency, and regulatory trustworthiness in your compliance stack.

Key Takeaways:

  • Overview of emerging privacy and compliance obligations in Australia
  • Using AI for predictive risk modelling and reporting
  • Challenges in data sovereignty, transparency, and ethics
  • Building AI-driven GRC platforms that scale

30min

Speaking Presentation – Cybersecurity Leadership in the Boardroom , Communicating Risk and Driving Strategy

CISOs are now expected to be strategic advisors, translating technical risks into business decisions that influence the boardroom.

This session will explore how you as a cybersecurity leader can effectively engage with executive stakeholders, communicate evolving threats in business terms, and influence enterprise strategy.

You will be presented with lessons on gaining executive buy-in, justifying security budgets, and aligning cybersecurity with broader business and ESG goals. The conversation will also touch on what boards really want to know and how CISOs can deliver insights that drive action without inducing unnecessary fear.

Key Takeaways:

  • How to present cybersecurity as a business enabler, not just a cost center
  • Strategies for effective boardroom communication and storytelling
  • Aligning cybersecurity programs with ESG, regulatory, and reputational goals
  • Building a security narrative that resonates with CEOs and CFOs

30min

Breakout Session – Securing the Software Supply Chain

Discuss real-world tactics to identify and mitigate risks in third-party software, open-source components, and CI/CD pipelines in the wake of increasing supply chain attacks.

30min

Breakout Session – Governance, Risk & Compliance in the Age of AI

Examine how CISOs are adapting GRC frameworks to address AI governance, new regulatory expectations, and the need for continuous assurance across evolving tech stacks.

30min

Breakout Session – AI-Driven Threat Detection – Hype or Reality?

A focused discussion on the current effectiveness of AI in detecting and responding to threats, how mature the tools really are, and the practical challenges of integrating them into legacy environments.

30min

Breakout Session – Navigating Cybersecurity Talent Shortages

Explore strategies for recruiting, developing, and retaining top cybersecurity talent amid growing competition, evolving skill demands, and the rise of AI-assisted security roles.

30min

Networking Lunch

40min

Keynote Panel Discussion – Beyond Compliance, Building a Culture of Cyber Resilience

Compliance is important, but resilience is essential. In this discussion, CISOs will share how they are evolving beyond checkbox-driven compliance to build agile, resilient cybersecurity cultures that can adapt to shifting threats and regulations.

The panel will examine how to embed security across teams, build response muscle through simulations and tabletop exercises, and develop high-performance security teams. The conversation will also explore how to use AI and automation to reinforce controls and detect risk in real time.

Whether you're responding to supply chain attacks or adapting to new privacy laws, building resilience is the new benchmark of mature security programs.

Key Takeaways

  • Tactics for embedding security into the DNA of the organization
  • The role of AI and automation in maintaining continuous compliance and resilience
  • Practical methods for upskilling teams and simulating incident response

30min

Speaking Presentation – Zero Trust in the Real World, Moving from Strategy to Execution

Zero Trust is no longer a buzzword it's becoming a necessity. But while the theory is compelling, execution across large, hybrid organisations remains a complex and often fragmented process.

This session will provide practical insights into what Zero Trust looks like beyond the whiteboard. Learn how to phase in Zero Trust across users, devices, applications, and networks, and understand the critical role of identity, segmentation, and continuous validation. We’ll also explore lessons from Australian companies that have moved beyond pilots to build sustainable Zero Trust architectures that deliver measurable results.

Key Takeaways

  • Key stages and roadmap for Zero Trust implementation
  • Identity and access management as foundational layers
  • Overcoming legacy infrastructure limitations
  • Metrics to measure Zero Trust maturity

20min

Closing Keynote – AI and the New Frontlines of Threat Detection

As cyber threats grow in complexity, speed, and volume, traditional detection methods are no longer sufficient. Artificial intelligence and machine learning are now essential components in modern Security Operations Centers (SOCs), helping teams identify and respond to threats faster than ever before.

This session delves into how AI is being deployed across leading enterprises in Australia to power anomaly detection, behavioural analytics, and automated triage. We’ll also examine how to balance AI decision-making with human oversight, reduce false positives, and establish trust in these intelligent systems.

Learn from real-world implementations and understand how to scale AI initiatives responsibly within your cyber infrastructure.

Key Takeaways

  • How to implement AI/ML in your threat detection and response strategy
  • Managing AI model bias and drift in security use cases
  • Real-world examples of AI-powered SOC transformation
  • The risks of over-reliance on AI and maintaining human oversight

20min

Closing Remarks

Anthony Caruana, Principal Advisor, Focus Network

5min

Anthony Caruana

Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]

Networking Drinks

60min

Registration & Morning Refreshments

30min

Welcome & Introduction – Master of Ceremonies

Anthony Caruana, Principal Advisor, Focus Network

5min

Anthony Caruana

Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]

Opening Debate – Balancing Innovation and Security: Who Should Have the Final Say in Approving New Technologies?

Speakers:
Jamie Rossato, Chief Information Security Officer, CSIRO
Brett Wilson, Chief Information Officer, RACP
Moderator:
Tyron McGurgan, CEO, Focus Network

This topic addresses the often-conflicting priorities of rapid technological adoption and stringent security requirements. Focusing on whether the CIO’s drive for innovation or the CISO’s focus on security should take precedence.

Join this engaging session where Brett and Jamie will have a light-hearted battle between CIO and CISO on a topic where each member will argue their side trying to convince you they have the right opinion on the matter.


20min

Jamie Rossato

  Jamie Rossato, has served in CISO roles for over a decade across a range of industries. He has served as a non-executive director at [...]

Brett Wilson

  Recognised in the CIO50 in 2022, 2021, 2020 and 2019 for innovation and leadership. An executive leader with experience in digital [...]

Tyron McGurgan

Tyron McGurgan is a seasoned entrepreneur, media expert, and events professional boasting over 17 years of industry experience. As the CEO and [...]

Keynote Presentation – The Future of Mobility & Smart Cities: AI, Data & Citizen-Centric Design

Kurt Brissett, Chief Digital and Information Officer, Built

As cities evolve, the intersection of AI, data, and digital platforms is transforming mobility and infrastructure. This session will explore how technology is shaping the future of transport, delivering seamless and secure experiences at scale. Drawing from award-winning, multi-modal transport innovations, Kurt will share key insights on:

  • How AI and digital platforms are reshaping transport and infrastructure – leveraging predictive analytics, automation, and real-time data for smarter urban mobility.
  • Delivering seamless, secure, and integrated mobility experiences at extreme scale – ensuring reliability, cybersecurity, and user-centric design in large-scale transport networks.
  • Lessons from building award-winning, multi-modal transport solutions – insights into navigating complexity, driving innovation, and aligning technology with public needs.

30min

Kurt Brissett

Kurt is an internationally renowned technology executive with over 25 years’ experience in the industry. He is currently the Chief Digital and [...]

Keynote Panel Discussion – AI in the Enterprise: Balancing Innovation and Security

Panellists:
Catherine Rowe, Former Group CISO, QBE
Leron Zinatullin, CISO, Linkly
Russell Morris, CIO, APA
Moderator:
Anthony Caruana, Advisor, Focus Network

Join our expert panel as we explore the intersection of AI, innovation, and security in the enterprise. Our discussion will delve into the opportunities and challenges of AI adoption, from driving business growth to mitigating cyber threats.

CIOs and CISOs alike will gain valuable insights on how to harness the power of AI while ensuring the security and integrity of their organisations.


30min

Catherine Rowe

With experience operating at the intersection of risk, cyber security, technology, law and governance, I have built a successful career leading [...]

Leron Zinatullin

Leron is a forward-thinking technology executive specialising in cyber strategy, management and delivery. He has led large scale, global, high [...]

Russell Morris

Global technology executive delivering transformation, commercial value, and innovation at scale. With experience across 10 [...]

Anthony Caruana

Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]

Keynote Presentation – High Risk Users & Where to Find Them

Scott Jenner, Senior Sales Engineer, Mimecast

68% of cyber incidents are attributed to human error however risk isn’t evenly distributed with recent statistics revealing that 80% of security incidents are caused by just 8% of employees, underscoring the critical importance of identifying high-risk users within an organisation.

This session will explore the factors contributing to user vulnerabilities that lead to certain individuals being classed as high-risk.

Participants will gain insights into measuring user risk effectively and implementing tailored strategies to enhance cybersecurity across their organisations. This session will also highlight how a personalised and adaptive security approach can provide customised security measures for each user. By focusing on these high-risk individuals, organisations can safeguard their workforce while maintaining operational productivity.


30min

Scott Jenner

Scott is a experienced cybersecurity professional with a strong track record of working across Africa, Europe, the UK, and Australia. Over the [...]

Networking Break

15min

Breakout Session – How Do You Orchestrate Governance in an AI-Driven Enterprise

Darren Cockerell, Head of Sales and Solution Consulting, Australia and New Zealand, Blue Prism

This session explores how automation and orchestration are reshaping AI governance—enabling real-time compliance, embedded controls, and continuous oversight.

Tech and security leaders will gain insights on enforcing guardrails at scale, ensuring traceability, and building governance into the AI fabric without slowing innovation.


30min

Darren Cockerell

Darren Cockerell is Head of Sales and Solutions Consulting ANZ at SS&C Blue Prism where he is responsible for understanding the strategic [...]

Breakout Session – The Unseen Threat Driving Strategic Risk

Ariel Lumbroso, NSW Sales Engineer, Delinea

As AI transforms how businesses operate, it’s also redefining the identity threat landscape. Many organisations are still grappling with how to effectively manage human identities and now face the added challenge of growing machine identities, which already outnumber human ones by 46 to 1 and are projected to surpass 45 billion by the end of 2025.

This explosion of access across cloud platforms is dramatically expanding the attack surface. Threat actors are taking advantage, using AI to exploit gaps in visibility and privilege at speed and scale.

For security leaders, identity has become the new perimeter and securing it means protecting everything: people, systems, and applications. But how do you manage that at scale while maintaining efficiency? 

This executive roundtable will explore:

  • Strategic challenges in improving preventative controls. 
  • Reducing the cost and effort of non-compliance
  • How AI and automation can improve security while improving IT efficiencies

Join senior security leaders to unpack the realities of managing identity risk in a cloud-first, AI-driven world.


30min

Ariel Lumbroso

Bio coming [...]

Breakout Session – The Hidden Weakness in Identity Security: Why Traditional PAM is No Longer Enough

Roshi Balendran, Regional Director, BeyondTrust

Identity is now the number one attack vector. Attackers are bypassing outdated security controls, exploiting misconfigured identities, excessive permissions, and poor session management. Traditional PAM (Privileged Access Management) solutions weren’t designed for today’s dynamic, cloud-first environments.

A 2024 threat intelligence report found that credential-based attacks accounted for 38% of all data breaches—significantly more than phishing (17%) and exploits (16%). This shift highlights a growing risk for security teams: legacy PAM tools alone aren’t enough to stop identity-based threats.

Where are the biggest gaps in today’s PAM and identity security strategies?

Legacy PAM solutions that don’t scale – Traditional vault-based PAM was built for static infrastructure, not today’s hybrid-cloud and SaaS environments.

Mismanaged permissions creating hidden risk – Overprivileged accounts, orphaned identities, and excessive standing access leave the door open for attackers.

Fragmented identity controls – Security teams struggle to enforce least privilege consistently across hybrid environments, SaaS applications, and third-party access.

Session monitoring gaps – Without real-time insights into privileged activity, it’s harder to detect and prevent identity-based attacks before they escalate.

With identity now at the centre of the attack surface, organisations need a modern PAM approach that integrates with broader identity security strategies—ensuring access is continuously verified, monitored, and minimised.

This invite-only roundtable will bring together cybersecurity and IAM leaders to discuss:

  • Why is traditional PAM no longer enough? – What are the key limitations of vault-based approaches, and how can modern identity security strategies address them?
  • How can organisations implement a defence-in-depth approach to identity security? – What role do zero trust, just-in-time access, and continuous verification play in stopping identity-driven attacks?
  • How can privileged access be secured without slowing down the business? – What are the best ways to reduce operational complexity while enforcing stronger identity controls?

Join an exclusive discussion with senior cybersecurity and IAM leaders to explore the future of modern PAM and identity security. Secure your seat today.

30min

Roshi Balendran

Bio [...]

Breakout Session – Securing Your Data: Simplify The Path to Cyber Resilience and Defence

Alister Freese, Enterprise Account Executive, Rubrik

In today's interconnected world, ransomware attacks are no longer a matter of "if" but "when." Businesses need solutions that not only safeguard their critical assets but also reduce costs and improve operational efficiency. Join Rubrik as we delve into the critical need for a modern cyber resilience strategy.

Simplify. This session will break down the anatomy of a ransomware attack, exposing the vulnerabilities that legacy backup solutions simply can't address. We'll explore why traditional backups are no longer enough to guarantee recovery in the face of sophisticated cyber threats. By consolidating, simplifying and automating data protection, you can dramatically reduce the total cost of ownership.

Connect. Discover how Rubrik's platform empowers you to simplify your data management, connect your critical systems, and ultimately protect your business from the devastating impact of a cyber incident. And in a world where data is increasingly moving to the cloud, ensure your cloud data is protected and managed as seamlessly as on-premises data.

Protect. Learn how to achieve true cyber resilience and ensure business continuity, even in the face of a successful attack.

Ask yourself…

  • Does your board know it would likely take you weeks to recover from a cyber attack today?
  • Have you established a clear operating model between ITOps and SecOps with clearly defined roles when it comes to cyber recovery?
  • When was the last time you tested recovery of a Tier 1 application from backups? Has this been tested under cyber duress?
  • What potential could be realised when all organisations operate with cyber confidence and known recovery times?
  • Does your organisation operate and invest based on a true 'assumed breach' mindset?

30min

Alister Freese

A sales leader who can lead high performing sales teams through applying strong commercial, customer and people management skills. Have built a [...]

Speaking Presentation – Strengthening Cyber Defences – The Power of Zero Trust and Multi-Factor Authentication (MFA)

Iain Hart, Head of Risk Management, Crown Resorts

As cyber threats continue to evolve, adopting a Zero Trust security model and Multi-Factor Authentication (MFA) has become essential, particularly in Singapore's fast-moving digital landscape. Zero Trust ensures that no entity—whether internal or external—is trusted without verification. Combined with MFA, which adds additional layers of authentication beyond passwords, this approach helps organizations protect critical data, reduce unauthorized access, and enhance security resilience.

This session will discuss how implementing Zero Trust and MFA can combat sophisticated cyberattacks and offer CISOs practical strategies to deploy these models across their organizations.

Key Takeaways:

  • Understanding Zero Trust: Learn how enforcing identity verification for every person and device accessing resources helps build a resilient security posture.
  • Deploying MFA for Enhanced Security: Discover the role of MFA as a crucial layer of defence against credential-based attacks.
  • Reducing Attack Surfaces: Explore how Zero Trust limits access to necessary resources and continuously verifies user identities, improving threat mitigation.

30min

Iain Hart

I am an experienced IT leader who has enjoyed a career spanning 30 years across multiple industries, including Banking and Finance, Retail, Online [...]

Speaking Presentation – Cyber Threat Intelligence: Strengthening Australia’s Cyber Defences Through Proactive Threat Hunting

James Kay, Assistant Director - General Standards, Technical Advice and Research, Australian Signals Directorate

As cyber threats become more sophisticated, Australian organizations must move beyond reactive defence and embrace proactive cyber threat intelligence strategies. In this session, James Kay will share insights from the Australian Cyber Security Centre (ACSC) on how intelligence-led threat hunting can enhance national cyber resilience. He will explore the evolving cyber threat landscape, the role of the National Cyber Watch Office in identifying emerging threats, and best practices for integrating intelligence-driven security strategies within enterprise cybersecurity frameworks.

Key Takeaways:

  1. Understanding the Threat Landscape: Insights into the latest cyber threats targeting Australian organizations, including nation-state actors, ransomware, and supply chain attacks.
  2. Proactive Threat Hunting: How organizations can leverage intelligence to detect and neutralize threats before they escalate.
  3. Bridging the Public-Private Gap: The role of information sharing between government agencies and private sector organizations in improving national cybersecurity.
  4. Incident Preparedness & Response: Lessons from ACSC’s frontline experience in handling major cyber incidents and how organizations can strengthen their response capabilities.

30min

James Kay

James is the Assistant Director‐General for Standards, Technical Advice, and Research, at the Australian Signals Directorate’s (ASD) [...]

Breakout Session – How Modern CIOs Redefine Innovation with AI + Low-Code

Bharath Kumar, Head of Marketing & CX, Zoho Developer Suite, Zoho

Modern CIOs are turning to the powerful combination of AI and low-code to lead enterprise innovation.

This session explores the key factors driving this trend and how AI powered low-code empowers IT leaders to deliver faster business outcomes. We will also discuss a play-book that CIOs can adapt to drive this change.


30min

Bharath Kumar

Bharath heads the Customer Experience & Marketing initiatives of Zoho's low code platform, Zoho Creator, and has over 15 years of experience [...]

Breakout Session – Improving the CyberSecurity metrics that matter

Rob Collins, Enterprise Security Architect, SentinelOne
  • How are you using AI to reduce Mean time to detect (MTTD)?
  • How can Automation reduce Time to contain?
  • How do you get 100% visibility across networks, systems, cloud infrastructure, users?
  • Are your successful phishing attempts still declining, in the age of AI generated phishing?

30min

Rob Collins (MBA, BSc, CISM)

Rob is a keenly active cyber-security practitioner and has over 20 years’ experience in the Cyber Security industry. Prior to joining [...]

Breakout Session – Leveraging observability to support the AI era: A playbook for CIOs

Aron Marden, Principal Solutions Consultant, New Relic

As AI becomes a crucial component of modern IT strategies, observability becomes even more relevant. The 2024 Observability Forecast revealed that the adoption of AI technologies was the top strategy or trend driving the need for observability (41%), with 42% of those surveyed saying they had already deployed AI monitoring.

But how can CIOs maximise their investments and get the best value from observability? This roundtable explores key features of AI, including enhanced predictive capabilities and streamlined incident management, and how to use them to drive the best business outcomes.

Roundtable attendees will discuss the challenges they face, and share insights on leveraging AI-driven observability components, such as predictive alerts.

Key takeaways include:

  • How AI enhances observability for predictive insights and incident prevention.
  • Real-world examples of AI-driven observability in action.
  • Overcoming skepticism and building confidence in AI-powered tools

30min

Aron Marden

Aron has been working in the Technology space for over 15 years with a background in SysOps, System and Solution Architecture and a hobby developer [...]

Breakout Session – Smarter IT Strategies: Optimise Costs, Maximise Value, and Accelerate Innovation

Dennis Remmer, Sr. Director, Oracle Delivery, Rimini Street
Ant Withers , VP of Sales and Marketing, Rimini Street

In today’s economic climate, IT leaders are under growing pressure to do more with less—balancing cost efficiency with the need to modernise and innovate. 

This breakout session will uncover how forward-thinking organisations are leveraging third-party support to reduce operational costs, extend the life of critical systems, and reinvest in the technologies that matter most.

Key takeaways:

  • Proven Savings in Action: Explore real examples of how enterprises have cut support and maintenance costs while maintaining performance.
  • Modernise Without Disruption: Learn how to extend the lifespan of your ERP environment and delay costly upgrades without compromising capabilities.
  • Flexible Customisation Support: See how organisations are confidently supporting mission-critical customisations—without hidden costs.

30min

Dennis Remmer

With over three decades of experience across local, national, and international IT landscapes, Dennis leads Rimini Street’s Asia-Pacific team [...]

Ant Withers

Bio [...]

Networking Lunch

40min

Speaking Presentation – Architecting Resilient Security Operations: Advanced Strategies for Threat Detection, Incident Response, and SOC Optimization

Maryam Shoraka, Head of OT Cyber Security Operations, Sydney Trains

In today's complex threat landscape, Security Operations Centres (SOCs) must be equipped to detect and respond to advanced threats in real-time. As a seasoned security operations executive, Maryam will delve into the technical aspects of building and optimising a world-class SOC, including threat detection, incident response, and security analytics.

Takeaways:

  • Practical advice on SOC optimisation techniques and technologies
  • Guidance on integrating threat intelligence into SOC operations
  • Key metrics and KPIs for measuring SOC performance and effectiveness

30min

Maryam Shoraka

I am a seasoned security operations executive with extensive experience building world class (24/7) security operations centres from the ground, [...]

Speaking Presentation – Data-Driven Leadership – Turning Information into Strategic Advantage

River Nygryn, Chief Information Security Officer, Hammond Care

In this presentation, River will explore the intersection of data-driven leadership and human-centric leadership in cybersecurity. She’ll discuss how Chief Information Security Officers (CISOs) can leverage data analytics to inform strategic decisions while also building strong relationships with their teams and stakeholders. By combining these two approaches, CISOs can create a more comprehensive cybersecurity strategy that not only protects organisational assets but also fosters a culture of collaboration, trust, and innovation.

Key takeaways:

  • The role of human-centric leadership in building strong relationships and teams
  • Strategies for combining data analytics with human insights to drive business outcomes
  • Best practices for CISOs to balance data-driven decision making with human-centric leadership
 

20min

River Nygryn

A respected industry leader & advocate for women in Cybersecurity, Tech and Business, River is driven by inclusion, innovation, process [...]

Speaking Presentation – Balancing cyber security risks in a Healthcare setting

Peter Croll, Chief Information Security Officer, NSW Health

In this session, Peter will explore the complexities of managing cyber security risks in a healthcare setting. With the increasing reliance on digital technologies, healthcare organisations face a unique challenge in protecting sensitive patient data while providing timely and effective care. Our speaker will share insights on strategies for mitigating cyber threats, ensuring regulatory compliance with Australian standards (e.g. My Health Record, Australian Digital Health Agency), and maintaining patient trust.

Key Takeaways:

  • Effective strategies for protecting sensitive patient data
  • Balancing security controls with clinical workflows and patient care
  • Regulatory compliance requirements and best practices under Australian law
  • Practical tips for implementing a robust cyber security framework in a healthcare setting

20min

Peter Croll

I am a cyber security and IT leader with over 20 years of experience across government, healthcare, academia, and telecommunications. I have a [...]

Networking Break

15min

Fireside Chat – Cybersecurity in the Spotlight: A Fireside Chat with Anna Aquilina

Anna Aquilina, Chief Information Security Officer, University of Technology Sydney
Anthony Caruana, Principal Advisor, Focus Network

Join us for an intimate fireside chat with Anna Aquilina, Chief Information Security Officer, UTS, a renowned cybersecurity expert and thought leader. As a seasoned CISO with extensive experience in driving cybersecurity strategy and innovation, Anna will share her insights on the evolving cyber threat landscape, the importance of diversity in cybersecurity, and the future of cybersecurity leadership.

Key Takeaways:

  • Gain valuable insights into the latest cyber threats and trends and learn how to stay ahead of the curve in terms of threat detection and mitigation.
  • Understand the importance of diversity in cybersecurity and learn strategies for promoting greater diversity and inclusion in your organisation's cybersecurity teams.
  • Discover the key qualities and skills required for effective cybersecurity leadership in the future and learn how to develop and nurture the next generation of cybersecurity leaders.

20min

Anna Aquilina

An experienced and successful senior executive with broad and deep knowledge of the domestic and international dimensions of cyber security, [...]

Anthony Caruana

Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]

Closing Keynote Panel Discussion – The Future of Cybersecurity: Innovations, Challenges, and the Path Ahead

Panellists:
Jihad Zein, Global Head of GRC, Technology, Toll Holding
Madhuri Nandi, Head of Security, Till Payments
Siddharth Rajanna, Head of IT Security, Bingo Industries
Manasseh Paradesi, Chief Information Security Officer, Tyro Payments
Moderator:
Anthony Caruana, Principal Advisor, Focus Network

As the cybersecurity landscape evolves at an unprecedented pace, this closing keynote panel will bring together industry leaders to discuss the transformative innovations reshaping the future of cybersecurity, the challenges that lie ahead, and the strategies CISOs must adopt to navigate this dynamic environment.

Key takeaways:

  • Strategic Insights: Gain valuable insights into how industry leaders are approaching the future of cybersecurity and the strategies they are implementing.
  • Innovative Approaches: Discover innovative technologies and solutions that can enhance your organisation's security posture.
  • Networking Opportunities: Foster connections among attendees, panellists, and industry experts to encourage ongoing collaboration and knowledge sharing.
 

30min

Madhuri Nandi

Head of Security at Nuvei | Author | Co-Chair AWSN | Diversity & Inclusion Advocate | Cybersecurity Leader Madhuri is a hands-on [...]

Siddharth Rajanna

I am an accomplished ‘Cyber Security Leader’ & Security Speaker with overall IT Security experience of more than 13 years including [...]

Manasseh Paradesi

Manasseh Paradesi is an experienced CISO and executive advisor, known for delivering pragmatic, risk-based cybersecurity leadership across top-tier [...]

Anthony Caruana

Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]

Closing Remarks

Anthony Caruana, Principal Advisor, Focus Network

5min

Anthony Caruana

Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]

Networking Drinks

60min

WHY ATTEND

STAR KEYNOTES
AND PRESENTERS

We invite only the leading international and local experts to provide sessions on site, this allows for attendees to be taught by front-line executives that compress years of meaningful experience into a systematic, well organised learning program.

NETWORKING
OPPORTUNITIES

Keeping in line with the main goal of the event in achieving new relationships, we provide a huge amount of networking opportunities for attendees through breakfast, luncheons, cocktails and informal introductions.

1-1 PRIVATE
MEETINGS

Allowing both buyers and sellers the opportunity to engage with one another onsite in a series of prearranged business meetings. These provide both parties a great opportunity to build new relationships by interacting face to face.

TARGETED
SESSIONS

Being able to experience different sessions is what makes this event unique; whether you are looking to attend an interactive workshop, roundtable, 1-1 meeting or panel discussion.

NETWORKING
LUNCH

Interacting face-to-face is still one of the most effective ways to do business. During lunch hour you will have the opportunity to do just that in a very relaxed atmosphere.

PERSONALISED
PROGRAM

The summit is personalised for YOU, this means that what is important to your business is important to us. We create personalised itineraries around sessions you want to attend, allowing for your time to be spent wisely while out of the office.

DOWNLOAD THE POST EVENT REPORT FROM OUR PREVIOUS EVENT

REGISTER YOUR INTEREST

PURCHASE TICKETS

Should you wish to attend this years upcoming 16th Australian CISO Leaders Summit on the 2nd of September 2025 at the Grand Hyatt Hotel in Melbourne, please purchase your tickets below

1 Ticket

$1990

  • Access to onsite mobile APP
  • Meals and refreshments
  • Access to all presentation sessions
    and roundtable discussions
  • Access to all presentation
    slides and photos
BUY NOW
Group Ticket (2 - 4)

$1790

  • Access to onsite mobile APP
  • Meals and refreshments
  • Access to all presentation sessions
    and roundtable discussions
  • Access to all presentation
    slides and photos
BUY NOW
GROUP TICKETS (5+)

$1500

  • Access to onsite mobile APP
  • Meals and refreshments
  • Access to all presentation sessions
    and roundtable discussions
  • Access to all presentation
    slides and photos
BUY NOW

LATEST NEWS

Attitude, Language & Approach – Keys to CIO Success – Frank De Sa

Frank De Sa, Chief Information Officer, Just Group Limited The presentation was based around “Attitude, Language & Approach – Keys to […]

Attracting and Retaining IT Top Talent for the Future of Work – Panel Discussion

Panellists: Amanda Bennie, Head of Technology, Cbus Property John Tait, Head of Technology, T2 Tea SAR Raheem, APAC Region Manager, Security & […]

How do you Protect your Company from Ransomware Attacks? – Jason Mantell

Jason Mantell, Director of Sales Engineering APAC, Cloudian Jason spoke about how Cloudian’s data immutability goes beyond protections […]

Understanding risk and the perils of not identifying your risk growth – Damien Lewis

Damien Lewis, Sales Manager, ExtraHop A quantitative risk assessment is great for getting really precise about the potential financial impact, […]

Meet leading IT Security executives from Australia's strongest brands.

Interact and engage with some of the strongest and most powerful brands from across Australia.

“First of all, can I just say this was one of the best conferences I have been to in the last 5 years. The caliber of delegates (and networking opportunities), suppliers and speakers was exceptional. Your team – were so helpful before and during the event. Well done, I'd be very happy to be invited back!”

 

– 20TH CENTURY FOX

'Fantastic event! Congratulations to you and the team. Hands down the best event I have attended as a sponsor since I've been at Genesys. You and your team were extremely professional and helpful in the lead up to the event and I very much appreciate your patience in dealing with the many hurdles along the way. I can't tell you how refreshing that is after the dealings we've had with several other event/conference providers across APAC.'

 

– GENESYS

“Summit was well organised, great speaker program! Focus Network  staff were friendly, polite and welcoming. Good ambience, location was excellent and in the heart of the city for transportation. The facilities, food and beverages were also excellent.”

 

– OPTUS

“Great experience. Definitely walked away with a long list of 'things to do'. Focus Network Team is Awesome.”

 

DOMINO’S PIZZA CORPORATION

PLATINUM PARTNER

GOLD PARTNERS



SILVER PARTNERS



BRONZE PARTNERS


BECOME A SPONSOR

MEDIA PARTNERS


Grand Hyatt Melbourne
123 Collins St, Melbourne VIC 3000
Telephone: +61 (03) 9657 1234
Email Enquiries: melbourne.grand@hyatt.com

More Information
Copyright 2025 ©Focus Network. All rights reserved