
to engage with the country's leading IT Security professionals on the

standing committee and advisory board from
the country's most respected Security / IT Leaders.
These will be addressed over the course
of the CISO Leaders Summit Australia.
The summit program is a draft and is subject to change.
30min
5mins
David has just retired in July 2024 and is building out his portfolio. He is an Advisor with Bain Advisory Network and also an Advisor to JS [...]
This topic addresses the often-conflicting priorities of rapid technological adoption and stringent security requirements. Focusing on whether the CIO’s drive for innovation or the CISO’s focus on security should take precedence.
Join this engaging session where Steven and Jamie will have a light-hearted battle between CIO and CISO on a topic where each member will argue their side trying to convince you they have the right opinion on the matter.
20min
A Global Technology and Business leader with more than twenty years of experience applying technology to transform business performance and [...]
30min
Join our expert panel as we explore the intersection of AI, innovation, and security in the enterprise. Our discussion will delve into the opportunities and challenges of AI adoption, from driving business growth to mitigating cyber threats. CIOs and CISOs alike will gain valuable insights on how to harness the power of AI while ensuring the security and integrity of their organisations.
30min
Lukasz is a seasoned cyber security leader with 20 years of experience in the field. He is currently the Head of Cyber Security at Accent Group [...]
Energetic and influential leader, possessing diverse leadership, relationship management, program delivery [...]
Anna Clive is the former CIO of Aussie Broadband. Anna thrives on on leveraging technology to drive innovation and enhance customer experiences. With [...]
Bio Coming [...]
Cloud and Artificial Intelligence (AI) are empowering organisations to meet their business goals quickly and effectively, however, also presents a tectonic shift for cyber security teams. Today, CISO’s are forced to enable the adoption of Cloud and AI use cases at the speed of dev, requiring new operating models to continue to protect their environments and eliminate critical risks. Join this session to learn how you can enable your team to build faster in the cloud, ensuring security, dev and devops can work together in a self-service model built for the scale and speed of your cloud and AI developments.
30mins
Passionate technology evangelist focused on successful outcomes for customers throughout the Asia Pacific [...]
10:50
15mins
Trying to stay one step ahead by looking for traditional indicators of compromise is a fool’s errand, especially as AI changes the game.
So what can be done?
How do we stop ever-evolving email attacks from bypassing the SEG?
Hear from REA Groups Joanna Dalton, Head of Cyber Defence on her team's journey to Abnormal Security.
30min
Joanna Dalton is the Head of Cyber Defence at REA Group where she is responsible leading the operational security strategy for Australia’s [...]
Joshua is a methodical and outcome-oriented enterprise sales professional with 10+ years proven success, helping customers drive transformational [...]
A successful cloud security strategy needs to evolve to meet the changing needs of the business and growth of the cloud. Cutting-edge security teams are coming up with new approaches and initiatives to increase their company’s agility through security and move from slowing the business to accelerating it. Across ANZ, organisations are rapidly expanding cloud adoption and expecting security leaders to follow suit, and fast. As a result, CISO’s need to rethink their approach to cloud security be able to move at the speed of business, ensure compliance with regulation, and enable their organisations to innovate with AI. Join your peers for this roundtable as we discuss and share insights on simplifying your security stack and using a new cloud security operation model to meet the growing demands of your business.
30min
Passionate technology evangelist focused on successful outcomes for customers throughout the Asia Pacific [...]
· How relevant the Essential Eight Guidelines have been for Victorian organisations as they respond to the increase in cyber threats.
· Addressing some of the key challenges around: the increase in ransomware attacks, building up the right skill-set within, as well as scaling your data security operations.
· The future role AI is playing in combating cyber threats and how it is being utilised by threat actors.
· A look at some local use cases where organisations have scaled their security posture in order to adapt to the current environment.
30min
With 20+ years experience in relationship, sales and team management, I have focused on driving successful customer outcomes and generating [...]
30min
Darren Cockerell is Head of Solutions Consulting ANZ at SS&C Blue Prism where he is responsible for understanding the strategic aims and [...]
Detective Superintendent Jayne Crossling will deliver a presentation to the CISO Leaders Summit 2024 on the cybercrime threat and the work law enforcement is doing to counter cybercriminals.
The presentation will take attendees through the latest information on the cybercrime threat environment and ecosystem, the role of law enforcement in responding to cybercrime and major cyber incidents, as well as a case study into the takedown of international cybercrime syndicates.
30min
Detective Superintendent Jayne Crossling has been a member for over 34 years. She has worked across a range of teams and crime types in [...]
30min
I provide CISO-level leadership in an enterprise setting. I enjoy strategy, program development, operations and building & developing an [...]
Cybersecurity and IT decision-makers continue to make significant progress in combatting identity-related threats.
But they are typically dependent on static manual techniques. As cybercriminals increasingly leverage AI, existing identity controls are struggling to keep up.
While cybersecurity criminals still use basic techniques, GenAI is fast becoming used to support attacks and obtain credentials and privileges.
How can organisations respond to ensure their identity management controls are adequate in an increasingly AI-driven world?
In this roundtable we will discuss:
30min
Zeeshan is the lead Cybersecurity Solution Engineer at Delinea. He has over 15 years of experience and significant achievements in [...]
Improving their maturity within the Essential Eight is considered daunting for many organisations. Strategies such as application control, restricting admin privileges and user application hardening are seen as difficult to implement effectively without impacting employee productivity.
However, security technologies such as Privileged Access Management (PAM) can help organisations bridge the gap for a number of requirements of the Essential Eight, including the above three. Modern PAM solutions can also provide compensating controls on other elements of the Essential Eight.
Join this discussion amongst peers of the Essential Eight, how organisations are aligning to it and how PAM can support those strategies.
Attend this roundtable and you will:
30min
Scott Hesford has over a decade of experience in IT security. Before joining BeyondTrust in 2019, he worked as Principal Consultant for CA [...]
In an era where technology shapes every aspect of customer experience (CX), CIOs are at the forefront of integrating cutting-edge innovations like GenAI with quality assurance to boost satisfaction while tackling cost challenges. This exclusive roundtable will dive into these critical issues, using the CrowdStrike IT outage as an example to underscore the pivotal role of quality engineering in mitigating risks.
Explore how embedding robust quality practices can avert disruptions, elevate customer experiences, and strike a delicate balance between risk, reward, and efficiency. Engage in an impactful dialogue with fellow CIOs, examine real-world scenarios, and discover actionable solutions to optimize risk management and quality control, driving superior customer experience in today's high-tech world.
Join this dynamic discussion to connect with a network of peer CIOs, share insights, and uncover strategies that elevate your organization's approach to risk management and quality assurance in an AI-driven landscape.
30min
Joel enables a team of amazing talent to drive quality leadership across Planit's practices, innovative [...]
As an executive in Planit’s business, Alex’s focus is on the implementation of the company’s vision and strategy, focusing on quality of [...]
In the last few years, effective information management has taken on a whole new meaning for enterprises. The raft of new cloud technologies and the speed of AI development have made it more urgent than ever for CIOs to ensure their organisations are maximising use of the technology, while also remaining compliant with complex data and privacy regulations.
Join us for this round table as we discuss:
30min
Bharath heads the Customer Experience & Marketing initiatives of Zoho's low code platform, Zoho Creator, and has over 15 years of experience [...]
13:30
40min
Why do many of us fall for dirty tricks even after we understand how they work?
From the slight-of-hand used by magicians, to the sleight-of-tongue used by politicians and pundits, to the sleight-of-mind that accompanies cognitive bias, we are all wired to deceive and to be deceived. Join Caroline Soo, VP Customer Success APJ for KnowBe4 for an engaging exploration into the dark world of deception. After laying the groundwork for a basic understanding into our own inclinations and predispositions, Caroline will provide interactive examples of how human nature can be used against us. Key topics will include understanding perception vs reality, how to make people believe anything in 3 easy steps, and what it all implies. Learning Objectives:30min
Caroline Soo leads the APJ Customer Success team for KnowBe4 and has been in the business of setting up her clients for success over the past 17 [...]
30min
Stephen has over 30 years of experience in the security and technology space, working with large enterprise organizations in various market [...]
15:25
15min
20min
Andrew Milroy leads the research and advisory business at Focus Network. His work involves empowering organisations to make decisions more [...]
Delve into the critical issue of gender diversity in cybersecurity and technology fields. With women still significantly underrepresented in these sectors, this discussion aims to explore effective strategies for attracting and retaining female talent. Our panellists will share insights, experiences, and actionable solutions to bridge the gender gap and foster greater diversity and innovation in these rapidly evolving industries.
30min
Sanja is an accomplished ICT executive with a strong focus on cybersecurity, compliance, and technology management. She excels in driving digital [...]
Catherine Buhler, Fellow of the Australian Information Security Association Catherine Buhler is a Fellow of the Australian Information [...]
Experienced Executive Manager, Chief Technology Officer (CTO) and CISO, with a demonstrated history of working in the financial services [...]
David has just retired in July 2024 and is building out his portfolio. He is an Advisor with Bain Advisory Network and also an Advisor to JS [...]
16:40
5min
16:45
60min
30min
5min
Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]
This topic addresses the often-conflicting priorities of rapid technological adoption and stringent security requirements. Focusing on whether the CIO’s drive for innovation or the CISO’s focus on security should take precedence.
Join this engaging session where Brett and Jamie will have a light-hearted battle between CIO and CISO on a topic where each member will argue their side trying to convince you they have the right opinion on the matter.
20min
Jamie Rossato, has served in CISO roles for over a decade across a range of industries. He has served as a non-executive director at [...]
Recognised in the CIO50 in 2022, 2021, 2020 and 2019 for innovation and leadership. An executive leader with experience in digital [...]
Tyron McGurgan is a seasoned entrepreneur, media expert, and events professional boasting over 17 years of industry experience. As the CEO and [...]
The intersection of AI, data, and digital platforms is transforming the design and construction of infrastructure across our cities. This session will explore how technology and data is now enabling the public and private sector to rethink how to best partner to deliver city shaping projects. Holding the benchmark as top CIO50 in 2024, Kurt will share key insights on:
30min
Kurt is an internationally renowned technology executive with over 25 years’ experience in the industry. He is currently the Chief Digital and [...]
Join our expert panel as we explore the intersection of AI, innovation, and security in the enterprise. Our discussion will delve into the opportunities and challenges of AI adoption, from driving business growth to mitigating cyber threats.
CIOs and CISOs alike will gain valuable insights on how to harness the power of AI while ensuring the security and integrity of their organisations.
30min
With experience operating at the intersection of risk, cyber security, technology, law and governance, I have built a successful career leading [...]
Leron is a forward-thinking technology executive specialising in cyber strategy, management and delivery. He has led large scale, global, high [...]
Passionate about next-gen financial services technology and how this can support financial inclusion in emerging markets. [...]
Global technology executive delivering transformation, commercial value, and innovation at scale. With experience across 10 [...]
Tyron McGurgan is a seasoned entrepreneur, media expert, and events professional boasting over 17 years of industry experience. As the CEO and [...]
68% of cyber incidents are attributed to human error however risk isn’t evenly distributed with recent statistics revealing that 80% of security incidents are caused by just 8% of employees, underscoring the critical importance of identifying high-risk users within an organisation.
This session will explore the factors contributing to user vulnerabilities that lead to certain individuals being classed as high-risk. Participants will gain insights into measuring user risk effectively and implementing tailored strategies to enhance cybersecurity across their organisations. This session will also highlight how a personalised and adaptive security approach can provide customised security measures for each user. By focusing on these high-risk individuals, organisations can safeguard their workforce while maintaining operational productivity.30min
Ryan Economos is Mimecast’s Field CTO and is at the intersection between business and technology. With over 15 years of broad technology [...]
10:45
15min
This session explores how automation and orchestration are reshaping AI governance—enabling real-time compliance, embedded controls, and continuous oversight. Tech and security leaders will gain insights on enforcing guardrails at scale, ensuring traceability, and building governance into the AI fabric without slowing innovation.
30min
As AI transforms how businesses operate, it’s also redefining the identity threat landscape. Many organisations are still grappling with how to effectively manage human identities and now face the added challenge of growing machine identities, which already outnumber human ones by 46 to 1 and are projected to surpass 45 billion by the end of 2025.
This explosion of access across cloud platforms is dramatically expanding the attack surface. Threat actors are taking advantage, using AI to exploit gaps in visibility and privilege at speed and scale.
For security leaders, identity has become the new perimeter and securing it means protecting everything: people, systems, and applications. But how do you manage that at scale while maintaining efficiency?
This executive roundtable will explore:
Join senior security leaders to unpack the realities of managing identity risk in a cloud-first, AI-driven world.
30min
Bio coming [...]
30min
With over three decades of experience across local, national, and international IT landscapes, Dennis leads Rimini Street’s Asia-Pacific team [...]
Bio [...]
11:05
30min
As cyber threats continue to evolve, adopting a Zero Trust security model and Multi-Factor Authentication (MFA) has become essential, particularly in Singapore's fast-moving digital landscape. Zero Trust ensures that no entity—whether internal or external—is trusted without verification. Combined with MFA, which adds additional layers of authentication beyond passwords, this approach helps organizations protect critical data, reduce unauthorized access, and enhance security resilience.
This session will discuss how implementing Zero Trust and MFA can combat sophisticated cyberattacks and offer CISOs practical strategies to deploy these models across their organizations.
Key Takeaways:
30min
Over the past 20 years in leadership roles, Charles has developed a strong understanding in translating business requirements into proven [...]
As cyber threats become more sophisticated, Australian organizations must move beyond reactive defence and embrace proactive cyber threat intelligence strategies. In this session, James Kay will share insights from the Australian Cyber Security Centre (ACSC) on how intelligence-led threat hunting can enhance national cyber resilience. He will explore the evolving cyber threat landscape, the role of the National Cyber Watch Office in identifying emerging threats, and best practices for integrating intelligence-driven security strategies within enterprise cybersecurity frameworks.
Key Takeaways:
30min
James is the Assistant Director‐General for Standards, Technical Advice, and Research, at the Australian Signals Directorate’s (ASD) [...]
Modern CIOs are turning to the powerful combination of AI and low-code to lead enterprise innovation.
This session explores the key factors driving this trend and how AI powered low-code empowers IT leaders to deliver faster business outcomes. We will also discuss a play-book that CIOs can adapt to drive this change.
30min
Bharath heads the Customer Experience & Marketing initiatives of Zoho's low code platform, Zoho Creator, and has over 15 years of experience [...]
In today's interconnected world, ransomware attacks are no longer a matter of "if" but "when." Businesses need solutions that not only safeguard their critical assets but also reduce costs and improve operational efficiency. Join Rubrik as we delve into the critical need for a modern cyber resilience strategy.
Simplify. This session will break down the anatomy of a ransomware attack, exposing the vulnerabilities that legacy backup solutions simply can't address. We'll explore why traditional backups are no longer enough to guarantee recovery in the face of sophisticated cyber threats. By consolidating, simplifying and automating data protection, you can dramatically reduce the total cost of ownership.
Connect. Discover how Rubrik's platform empowers you to simplify your data management, connect your critical systems, and ultimately protect your business from the devastating impact of a cyber incident. And in a world where data is increasingly moving to the cloud, ensure your cloud data is protected and managed as seamlessly as on-premises data.
Protect. Learn how to achieve true cyber resilience and ensure business continuity, even in the face of a successful attack.
Ask yourself…
30min
A sales leader who can lead high performing sales teams through applying strong commercial, customer and people management skills. Have built a [...]
12:50
30min
12:50
30min
13:25
40min
In today's complex threat landscape, Security Operations Centres (SOCs) must be equipped to detect and respond to advanced threats in real-time. As a seasoned security operations executive, Maryam will delve into the technical aspects of building and optimising a world-class SOC, including threat detection, incident response, and security analytics.
Takeaways:
30min
I am a seasoned security operations executive with extensive experience building world class (24/7) security operations centres from the ground, [...]
In this presentation, River will explore the intersection of data-driven leadership and human-centric leadership in cybersecurity. She’ll discuss how Chief Information Security Officers (CISOs) can leverage data analytics to inform strategic decisions while also building strong relationships with their teams and stakeholders. By combining these two approaches, CISOs can create a more comprehensive cybersecurity strategy that not only protects organisational assets but also fosters a culture of collaboration, trust, and innovation.
Key takeaways:
20min
A respected industry leader & advocate for women in Cybersecurity, Tech and Business, River is driven by inclusion, innovation, process [...]
As cyber threats become more complex and frequent, leveraging artificial intelligence (AI) and machine learning (ML) in cybersecurity strategies has emerged as a critical trend for CISOs in Singapore in 2025. This focus on AI-driven solutions will enhance threat detection capabilities, automate responses, and provide deeper insights into potential vulnerabilities, ultimately enabling organisations to stay ahead of cybercriminals.
Key Takeaways:
20min
I am a cyber security and IT leader with over 20 years of experience across government, healthcare, academia, and telecommunications. I have a [...]
15:35
15min
In an era of rapid technological advancement, leaders must strike the right balance between innovation and security. This session will focus on how senior executives can lead their organisations through the complexities of digital transformation while managing cybersecurity risks. Through real-world examples, the speaker will address the evolving role of leadership in ensuring that innovation doesn’t come at the expense of security, compliance, or business resilience in Singapore's highly connected landscape.
Key Takeaways:
20min
As the cybersecurity landscape evolves at an unprecedented pace, this closing keynote panel will bring together industry leaders to discuss the transformative innovations reshaping the future of cybersecurity, the challenges that lie ahead, and the strategies CISOs must adopt to navigate this dynamic environment.
Key takeaways:
30min
International experience leading IT roles across both developed and emerging [...]
Head of Security at Nuvei | Author | Co-Chair AWSN | Diversity & Inclusion Advocate | Cybersecurity Leader Madhuri is a hands-on [...]
I am an accomplished ‘Cyber Security Leader’ & Security Speaker with overall IT Security experience of more than 13 years including [...]
Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]
16:55
5min
Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]
17:00
60min
We invite only the leading international and local experts to provide sessions on site, this allows for attendees to be taught by front-line executives that compress years of meaningful experience into a systematic, well organised learning program.
Keeping in line with the main goal of the event in achieving new relationships, we provide a huge amount of networking opportunities for attendees through breakfast, luncheons, cocktails and informal introductions.
Allowing both buyers and sellers the opportunity to engage with one another onsite in a series of prearranged business meetings. These provide both parties a great opportunity to build new relationships by interacting face to face.
Being able to experience different sessions is what makes this event unique; whether you are looking to attend an interactive workshop, roundtable, 1-1 meeting or panel discussion.
Interacting face-to-face is still one of the most effective ways to do business. During lunch hour you will have the opportunity to do just that in a very relaxed atmosphere.
The summit is personalised for YOU, this means that what is important to your business is important to us. We create personalised itineraries around sessions you want to attend, allowing for your time to be spent wisely while out of the office.
Should you wish to attend this years upcoming 16th Australian CISO Leaders Summit on the 2nd of September 2025 at the Grand Hyatt Hotel in Melbourne, please purchase your tickets below
$1990
$1790
$1500
Some pictures from previous events.
– 20TH CENTURY FOX
– GENESYS
– OPTUS
DOMINO’S PIZZA CORPORATION
Grand Hyatt Melbourne
123 Collins St, Melbourne VIC 3000
Telephone: +61 (03) 9657 1234
Email Enquiries: melbourne.grand@hyatt.com