Join us at the 16th CISO Leaders Australia Summit Be part of this year's upcoming gathering where you will be able
to engage with the country's leading IT Security professionals on the
3rd September 2025, Grand Hyatt Hotel, Melbourne
Summit Themes Key themes and topics are developed by our
standing committee and advisory board from
the country's most respected Security / IT Leaders.
These will be addressed over the course
of the CISO Leaders Summit Australia.

 

Anti Virus

 

Network Security

 

Analytics

 

Cyber Security

 

Mobile & cloud
security

 

Identity
Management

 

Fraud
Protection

 

End Point
Security

Join us at the 16th CISO Leaders
Australia Summit

BE PART OF THIS YEAR’S UPCOMING GATHERING WHERE YOU WILL BE ABLE TO ENGAGE WITH THE COUNTRY’S LEADING IT SECURITY PROFESSIONALS ON THE
3rd September 2025, Grand Hyatt Hotel, Melbourne

Join the gathering

ABOUT THE EVENT

The 16th CISO Leaders Australia Summit, scheduled for September 3rd, 2025, at the Grand Hyatt Hotel in Melbourne, will once again serve as the premier gathering for more than 150 of the state’s foremost CISOs, Heads of IT Security, Cyber Security experts, and IT executives.

The theme for this year’s summit revolves around “Navigating the Cybersecurity Frontier Through Innovations Threats and Opportunities“, this message will be conveyed by a distinguished assembly of thought leaders through keynote addresses, panel discussions, interactive workshops, and focused roundtable conversations.

Attendees will have the opportunity to tailor their own agendas, allowing them to optimize their time away from the office by participating in sessions most pertinent to their specific business needs.

Additionally, the networking opportunities available throughout the event will enable senior security executives to engage directly with a carefully curated group of technology partners through pre arranged business meetings. These partners will be showcased throughout the day, providing valuable assistance to leading security executives modernisation initiatives. These engagements ensure that businesses remain at the forefront of adopting new technologies, aligning their investment strategies with their overarching business goals.

SPEAKERS

Jihad Zein
plus

Jihad Zein

Global Head of GRC, Technology, Toll Holding

Dr Alan D. Thompson
plus

Dr Alan D. Thompson

World expert in AI

Rosalie Adriano
plus

Rosalie Adriano

Head of IT & CIO, Nestle Oceania

REGISTER YOUR INTEREST

PROGRAM

The summit program is a draft and is subject to change.

Registration, Badge Collection & Refreshments

30min

Welcome and Introduction & Master of Ceremonies

David Gee, Principal Advisor, Focus Network

5mins

Opening Debate: Balancing Innovation and Security: Who Should Have the Final Say in Approving New Technologies?

Steven Bonnici, CIO - Asia Pacific, Middle East and Africa, Ford Motor Company
Jamie Rossato, Former CISO, Lion
Moderator:
Ross O’Brien, Principal Advisor, Focus Network 

This topic addresses the often-conflicting priorities of rapid technological adoption and stringent security requirements. Focusing on whether the CIO’s drive for innovation or the CISO’s focus on security should take precedence.

Join this engaging session where Steven and Jamie will have a light-hearted battle between CIO and CISO on a topic where each member will argue their side trying to convince you they have the right opinion on the matter.

20min

Keynote Presentation – Artificial intelligence and your business

Dr. Alan Thompson, World Expert in Artificial Intelligence
This year has brought about an explosion in the world of artificial intelligence. The impact on the business landscape—and beyond—is completely transformative. This keynote explores the current trajectory of AI, its use cases in your industry, and the effects of such a revolution.

30min

Keynote Panel Discussion: AI in the Enterprise: Balancing Innovation and Security

Panellists:
Lukasz Gogolkiewicz, Head of Cyber Security, Accent Group Limited
Anna Clive, Former CIO, Aussie Broadband
Callum Nelson, Chief Information Security Officer, Ebos Group Limited
Sinan Erbay, Chief Information Officer, RMIT 
Moderator:
Tyron McGurgan, CEO, Focus Network

Join our expert panel as we explore the intersection of AI, innovation, and security in the enterprise. Our discussion will delve into the opportunities and challenges of AI adoption, from driving business growth to mitigating cyber threats. CIOs and CISOs alike will gain valuable insights on how to harness the power of AI while ensuring the security and integrity of their organisations.

30min

Keynote Presentation: Accelerating Cloud Security to enable AI: How Security teams can adopt a new operating model to enable agile AI adoption?

Daniel Moloney, Solutions Engineering Lead APAC, Wiz

Cloud and Artificial Intelligence (AI) are empowering organisations to meet their business goals quickly and effectively, however, also presents a tectonic shift for cyber security teams. Today, CISO’s are forced to enable the adoption of Cloud and AI use cases at the speed of dev, requiring new operating models to continue to protect their environments and eliminate critical risks. Join this session to learn how you can enable your team to build faster in the cloud, ensuring security, dev and devops can work together in a self-service model built for the scale and speed of your cloud and AI developments.

30mins

Networking Break

15mins

Breakout Session: How REA Group Utilises Behavioural Data Science to Safeguard Against Email Borne Threats and Streamline Security Protocols

Joanna Dalton, Head of Cyber Defence, REA Group
Josh Goodman, Senior Enterprise Account Executive, Abnormal Security

Trying to stay one step ahead by looking for traditional indicators of compromise is a fool’s errand, especially as AI changes the game.

So what can be done?

How do we stop ever-evolving email attacks from bypassing the SEG?

Hear from REA Groups Joanna Dalton, Head of Cyber Defence on her team's journey to Abnormal Security.

30min

Breakout Session: Are You Ready to Adopt a New Cloud Security Operation Model?

Daniel Moloney, Solutions Engineering Lead APAC, Wiz

A successful cloud security strategy needs to evolve to meet the changing needs of the business and growth of the cloud. Cutting-edge security teams are coming up with new approaches and initiatives to increase their company’s agility through security and move from slowing the business to accelerating it. Across ANZ, organisations are rapidly expanding cloud adoption and expecting security leaders to follow suit, and fast. As a result, CISO’s need to rethink their approach to cloud security be able to move at the speed of business, ensure compliance with regulation, and enable their organisations to innovate with AI. Join your peers for this roundtable as we discuss and share insights on simplifying your security stack and using a new cloud security operation model to meet the growing demands of your business.

30min

Breakout Session: The Essential Eight & The Modern Threat Landscape

Steve Baker, Regional Director, Rubrik

·  How relevant the Essential Eight Guidelines have been for Victorian organisations as they respond to the increase in cyber threats.

·  Addressing some of the key challenges around: the increase in ransomware attacks, building up the right skill-set within, as well as scaling your data security operations.

·  The future role AI is playing in combating cyber threats and how it is being utilised by threat actors.

·  A look at some local use cases where organisations have scaled their security posture in order to adapt to the current environment.

30min

Breakout Session: Driving the Right Work to the Right Resource at the Right Time

Darren Cockerell, Head of Solutions Consulting ANZ, SS&C Blue Prism
Tightening cost and time constraints coupled with the rising complexity in current technology environment are crippling organizations’ speed to growth. The ability to drive the right work to the right resource at the right time will grant organizations the competitive advantage to navigate the challenges and spur their growth. At this interactive session, we’ll discuss:
  • The transformative power of Process Orchestration powered by Intelligent Automation and Business Process Management – all in one platform.
  • Exploring CIO-led digital transformation strategies.
  • Anticipating the AI and Process Orchestration and Automation boom in 2024 and its impact on business transformation

30min

Speaking Presentation: Unmasking cybercrime, the law enforcement response

Jayne Crossling, Detective Superintendent, Australian Federal Police Cybercrime Operations

Detective Superintendent Jayne Crossling will deliver a presentation to the CISO Leaders Summit 2024 on the cybercrime threat and the work law enforcement is doing to counter cybercriminals.

The presentation will take attendees through the latest information on the cybercrime threat environment and ecosystem, the role of law enforcement in responding to cybercrime and major cyber incidents, as well as a case study into the takedown of international cybercrime syndicates.

30min

Keynote Speaking Presentation: Reducing Risk with Modern Identity Management

Nigel Hedges, Chief Information Security Officer, Chemist Warehouse
In today's digital age, effective identity management is crucial for mitigating risks and safeguarding valuable assets. Delve into innovative strategies and technologies designed to empower organisations to navigate the complexities of identity management effectively. Gain invaluable insights to enhance security and stay ahead in an ever-evolving landscape.

30min

Breakout Session: Identity Protection in an AI-Driven World

Zeeshan Ilyas, Cybersecurity Solution Engineer, Delinea A/NZ

Cybersecurity and IT decision-makers continue to make significant progress in combatting identity-related threats.

But they are typically dependent on static manual techniques. As cybercriminals increasingly leverage AI, existing identity controls are struggling to keep up.

While cybersecurity criminals still use basic techniques, GenAI is fast becoming used to support attacks and obtain credentials and privileges.

How can organisations respond to ensure their identity management controls are adequate in an increasingly AI-driven world?

In this roundtable we will discuss:

  • The threats to identify protection from AI
  • The benefits of using AI to augment identify protection
  • The impact of Generative AI on identity and access management
  • Understanding the ROI of AI in security

30min

Breakout Session: The Essential Eight: Overcoming Your Challenges with PAM

Scott Hesford, Senior Director, Solutions Engineering, APJ, BeyondTrust

Improving their maturity within the Essential Eight is considered daunting for many organisations. Strategies such as application control, restricting admin privileges and user application hardening are seen as difficult to implement effectively without impacting employee productivity. 

However, security technologies such as Privileged Access Management (PAM) can help organisations bridge the gap for a number of requirements of the Essential Eight, including the above three. Modern PAM solutions can also provide compensating controls on other elements of the Essential Eight.

Join this discussion amongst peers of the Essential Eight, how organisations are aligning to it and how PAM can support those strategies. 

Attend this roundtable and you will:

  • Hear from your peers on how they are approaching the Essential Eight in their organisations 
  • Know how Privileged Access Management maps against the eight strategies, including the November 2023 update
  • Learn some of the best practices around implementing parts of the Essential Eight.

30min

Breakout Session: Balancing Innovation and Risk: Enhancing CX with AI and Quality

Alex Edwards, COO, Planit
Joel Deutscher, Executive General Manager, Technology & Innovation, Planit

In an era where technology shapes every aspect of customer experience (CX), CIOs are at the forefront of integrating cutting-edge innovations like GenAI with quality assurance to boost satisfaction while tackling cost challenges. This exclusive roundtable will dive into these critical issues, using the CrowdStrike IT outage as an example to underscore the pivotal role of quality engineering in mitigating risks.

Explore how embedding robust quality practices can avert disruptions, elevate customer experiences, and strike a delicate balance between risk, reward, and efficiency. Engage in an impactful dialogue with fellow CIOs, examine real-world scenarios, and discover actionable solutions to optimize risk management and quality control, driving superior customer experience in today's high-tech world.

Join this dynamic discussion to connect with a network of peer CIOs, share insights, and uncover strategies that elevate your organization's approach to risk management and quality assurance in an AI-driven landscape.

30min

Breakout Session: A Practical Guide to Driving Digital/AI Innovation in Enterprises

Bharath Kumar, Head of Marketing & Customer Experience, Zoho Creator

In the last few years, effective information management has taken on a whole new meaning for enterprises. The raft of new cloud technologies and the speed of AI development have made it more urgent than ever for CIOs to ensure their organisations are maximising use of the technology, while also remaining compliant with complex data and privacy regulations.

Join us for this round table as we discuss:

  • The opportunities that digital and AI adoption brings to the enterprise, and the challenges involved.
  • Practical strategies to address technological challenges in the organisation.
  • Building a culture of innovation at every stage of the business, and getting all stakeholders on board.
  • How CIOs can ensure security and privacy compliance across the organisation while supporting a thriving culture of innovation.

30min

Networking Lunch

40min

Speaking Presentation: The Art and Science of Deception

Caroline Soo, Vice President, Customer Success, APAC & Japan, KnowBe4

Why do many of us fall for dirty tricks even after we understand how they work?

From the slight-of-hand used by magicians, to the sleight-of-tongue used by politicians and pundits, to the sleight-of-mind that accompanies cognitive bias, we are all wired to deceive and to be deceived. Join Caroline Soo, VP Customer Success APJ for KnowBe4 for an engaging exploration into the dark world of deception. After laying the groundwork for a basic understanding into our own inclinations and predispositions, Caroline will provide interactive examples of how human nature can be used against us. Key topics will include understanding perception vs reality, how to make people believe anything in 3 easy steps, and what it all implies. Learning Objectives:
  • Recognise the psychology behind why we fall for scams and schemes
  • List two easy-to-use models for why/ how we make decisions
  • Define practical examples of how cybercriminals exploit our decision-making processes in this Digital Age
  • Explain where and how we can ethically leverage the foundational principles of what we've covered

30min

Speaking Session: Empathy in Cybersecurity Leadership: Navigating Beyond Conventional Wisdom

Stephen Bennett, Group Chief Information Security Officer, Domino’s Pizza Enterprises
Join Stephen for an in-depth session where he’ll challenge the conventional wisdom that a business-aligned cybersecurity strategy is the ultimate solution. Despite the widespread belief and significant support from top management, experience tells him that the path remains fraught with challenges and frustrations, even with a strategy that seems perfectly aligned. Stephen will explore the critical, yet often overlooked, element of empathy. He will discuss how even the most well-aligned cybersecurity strategies don't automatically guarantee success – things won't just magically fall into place. He’ll share insights into how adopting an empathetic leadership approach and focusing on strategic relationship-building can lead to a more nuanced and effective cybersecurity posture. Expect to learn how this can redefine our metrics, enhance collaboration, and foster a security culture that transcends mere alignment with business goals. I invite you to join Stephen in exploring practical strategies and personal insights on how to navigate beyond the conventional, toward a more holistic and impactful approach to cybersecurity leadership.

30min

Networking Break

15min

Keynote Speaking Session: Australian Cybersecurity Trends and Initiatives Research

Andrew Milroy, VP and Head of Research, Focus Network 
This presentation will explore the current state of cybersecurity in Australia and the challenges and opportunities facing Chief Information Security Officers (CISOs) in today's rapidly evolving threat landscape. Drawing on the latest industry research and analysis by Focus Network analysts, the presentation will provide insights into the key trends and emerging technologies that are shaping the CISO role. During this session we will delve deeper into areas that cover:
  • The evolving nature of cyber threats and the importance of proactive risk management
  • The role of the CISO in driving a culture of cybersecurity across the organization
  • The impact of digital transformation on cybersecurity and the challenges of securing cloud, mobile, and IoT
  • environments
  • The emerging technologies and strategies for enhancing cybersecurity, including AI (particularly Generative AI), machine learning, and zero trust.
  • Cybersecurity best practices

20min

Closing Keynote Panel Discussion: Breaking Barriers: Empowering Women in Cybersecurity and Tech – Strategies for Attracting and Retaining Female Talent

Panellists:
Sanja Marais, Chief Technology and Security Officer, Aspen Medical
Catherine Buhler, CISO & Advisory, AISA
Sandra Barns, General Manager Risk, Technology Data Cyber, Judo Bank
Moderator:
David Gee, Principal Advisor, Focus Network

Delve into the critical issue of gender diversity in cybersecurity and technology fields. With women still significantly underrepresented in these sectors, this discussion aims to explore effective strategies for attracting and retaining female talent. Our panellists will share insights, experiences, and actionable solutions to bridge the gender gap and foster greater diversity and innovation in these rapidly evolving industries.

30min

Closing Remarks

Anthony Caruana, Principal Advisor, Focus Network

5min

Networking Drinks

60min

Registration & Morning Refreshments

30min

Welcome & Introduction – Master of Ceremonies

Anthony Caruana, Principal Advisor, Focus Network

5min

Anthony Caruana

Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]

Opening Keynote Presentation – The Voice Of The CIO/CISO Australia

This presentation will share Focus Network’s latest CIO/CISO research findings and highlight 2025 technology trends that will have the most significant impact on Australian organisations. In addition to sharing the latest technology trends, the presentation will highlight challenges facing the industry, as well as the emerging technologies and opportunities. During this session we will delve deeper into:

  •       Modernising enterprise IT and Security
  •       The impact of AI, particularly generative AI on Australian organisations
  •       Building trust, greater organisational resilience and adaptability
  •       The emergence of new technologies, such as edge computing, industry clouds and their potential impact on the industry and their teams
  •       Strategies for staying ahead of the curve and driving innovation in the CIO/CISO role

20min

Keynote Presentation – Data-Driven Leadership – Turning Information into Strategic Advantage

As data becomes a core asset for business success, CIOs and CISOs play crucial roles in transforming vast amounts of information into actionable insights while ensuring security and compliance. This session explores how IT and security leaders can drive data-driven decision-making, harness AI and analytics, and manage data privacy to support business innovation without compromising security. Key Focus Areas:

  1. Data Governance and Security: Learn how CIOs and CISOs can jointly establish governance frameworks that balance accessibility with privacy and regulatory compliance.
  2. Leveraging Advanced Analytics: Discover ways to apply AI and machine learning for real-time insights that drive business strategy, with an emphasis on data protection.
  3. Balancing Innovation with Privacy: Explore strategies for fostering data-centric innovation while safeguarding sensitive information and building trust with stakeholders.

30min

Keynote Panel Discussion – AI in the Enterprise: Balancing Innovation and Security

Panellists:
Moderator:

Join our expert panel as we explore the intersection of AI, innovation, and security in the enterprise. Our discussion will delve into the opportunities and challenges of AI adoption, from driving business growth to mitigating cyber threats.

CIOs and CISOs alike will gain valuable insights on how to harness the power of AI while ensuring the security and integrity of their organisations.


30min

Keynote Presentation

30min

Networking Break

15min

Breakout Session

30min

Breakout Session

30min

Breakout Session

30min

Breakout Session

30min

Speaking Presentation – Strengthening Cyber Defences – The Power of Zero Trust and Multi-Factor Authentication (MFA)

As cyber threats continue to evolve, adopting a Zero Trust security model and Multi-Factor Authentication (MFA) has become essential, particularly in Singapore's fast-moving digital landscape. Zero Trust ensures that no entity—whether internal or external—is trusted without verification. Combined with MFA, which adds additional layers of authentication beyond passwords, this approach helps organizations protect critical data, reduce unauthorized access, and enhance security resilience. This session will discuss how implementing Zero Trust and MFA can combat sophisticated cyberattacks and offer CISOs practical strategies to deploy these models across their organizations. Key Takeaways:

  1. Understanding Zero Trust: Learn how enforcing identity verification for every person and device accessing resources helps build a resilient security posture.
  2. Deploying MFA for Enhanced Security: Discover the role of MFA as a crucial layer of defence against credential-based attacks.
  3. Reducing Attack Surfaces: Explore how Zero Trust limits access to necessary resources and continuously verifies user identities, improving threat mitigation.

30min

Speaking Presentation – Navigating Complexity in Regulatory Compliance for CISOs

As global and local regulations become stricter, CISOs face growing challenges to stay compliant. Singapore's evolving privacy laws and the recent SEC ruling requiring breach disclosures within days add pressure on cybersecurity teams. This session will provide strategies for meeting these new compliance demands while maintaining security effectiveness. Key Takeaways:

  1. Regulatory Updates: Understand how Singapore’s PDPA and SEC rulings impact data breach disclosures and compliance efforts.
  2. Agile Incident Responses: Learn how to streamline breach detection and disclosure processes to meet tighter regulatory deadlines.
  3. Balancing Compliance with Security: Discover how to meet regulations without compromising your organization’s security posture.

30min

Breakout Session

30min

Breakout Session

30min

Breakout Session

30min

Breakout Session

30min

Networking Lunch

40min

Speaking Session

30min

Speaking Presentation – Leveraging AI to Stay Ahead of Cyber Threats

AI is transforming cybersecurity by enabling proactive threat detection and real-time responses. CISOs must integrate AI-driven tools into their security strategies to enhance visibility and maintain a Zero Trust architecture. This session will explore how AI can predict threats, automate incident responses, and optimize risk management, ensuring businesses stay ahead of evolving cyber threats. Key Takeaways:

  1. Learn how AI can predict and prevent emerging threats with real-time data analysis.
  2. Discover how automating incident response can improve security efficiency and reduce risk.
  3. Understand how AI enhances a Zero Trust framework by continuously analysing access patterns.

20min

Speaking Presentation – AI-Driven Cybersecurity – Harnessing Machine Learning for Threat Detection and Response

As cyber threats become more complex and frequent, leveraging artificial intelligence (AI) and machine learning (ML) in cybersecurity strategies has emerged as a critical trend for CISOs in Singapore in 2025. This focus on AI-driven solutions will enhance threat detection capabilities, automate responses, and provide deeper insights into potential vulnerabilities, ultimately enabling organisations to stay ahead of cybercriminals. Key Takeaways:

  1. Enhancing Threat Detection with AI - Gain insights into the latest AI and ML technologies that can improve threat detection and reduce false positives.
  2. Streamlining Incident Response - Learn how to implement automation strategies that enhance incident response and improve overall cybersecurity efficiency.
  3. Building Predictive Capabilities - Discover how to leverage predictive analytics to anticipate and mitigate future cyber threats, strengthening your organisation's resilience.

20min

Networking Break

15min

Keynote Presentation – Leading Through Innovation and Balancing Cybersecurity in the Digital Era

In an era of rapid technological advancement, leaders must strike the right balance between innovation and security. This session will focus on how senior executives can lead their organisations through the complexities of digital transformation while managing cybersecurity risks. Through real-world examples, the speaker will address the evolving role of leadership in ensuring that innovation doesn’t come at the expense of security, compliance, or business resilience in Singapore's highly connected landscape. Key Takeaways:

  • Leadership strategies for balancing innovation and cybersecurity.
  • How to foster a culture of collaboration between IT, security, and business functions.
  • Approaches to ensuring regulatory compliance while driving digital transformation.

20min

Closing Keynote Panel Discussion – The Future of Cybersecurity: Innovations, Challenges, and the Path Ahead

Panellists:
Moderator:
As the cybersecurity landscape evolves at an unprecedented pace, this closing keynote panel will bring together industry leaders to discuss the transformative innovations reshaping the future of cybersecurity, the challenges that lie ahead, and the strategies CISOs must adopt to navigate this dynamic environment. Key takeaways:
  • Strategic Insights: Gain valuable insights into how industry leaders are approaching the future of cybersecurity and the strategies they are implementing.
  • Innovative Approaches: Discover innovative technologies and solutions that can enhance your organisation's security posture.
  • Networking Opportunities: Foster connections among attendees, panellists, and industry experts to encourage ongoing collaboration and knowledge sharing.
 

30min

Closing Remarks

Anthony Caruana, Principal Advisor, Focus Network

5min

Anthony Caruana

Anthony Caruana has worked for almost every major masthead in the Australian IT press with his work appearing around the world. As an experienced [...]

Networking Drinks

60min

WHY ATTEND

STAR KEYNOTES
AND PRESENTERS

We invite only the leading international and local experts to provide sessions on site, this allows for attendees to be taught by front-line executives that compress years of meaningful experience into a systematic, well organised learning program.

NETWORKING
OPPORTUNITIES

Keeping in line with the main goal of the event in achieving new relationships, we provide a huge amount of networking opportunities for attendees through breakfast, luncheons, cocktails and informal introductions.

1-1 PRIVATE
MEETINGS

Allowing both buyers and sellers the opportunity to engage with one another onsite in a series of prearranged business meetings. These provide both parties a great opportunity to build new relationships by interacting face to face.

TARGETED
SESSIONS

Being able to experience different sessions is what makes this event unique; whether you are looking to attend an interactive workshop, roundtable, 1-1 meeting or panel discussion.

NETWORKING
LUNCH

Interacting face-to-face is still one of the most effective ways to do business. During lunch hour you will have the opportunity to do just that in a very relaxed atmosphere.

PERSONALISED
PROGRAM

The summit is personalised for YOU, this means that what is important to your business is important to us. We create personalised itineraries around sessions you want to attend, allowing for your time to be spent wisely while out of the office.

DOWNLOAD THE POST EVENT REPORT FROM OUR PREVIOUS EVENT

REGISTER YOUR INTEREST

PURCHASE TICKETS

Should you wish to attend this years upcoming 16th Australian CISO Leaders Summit on the 3rd of September 2025 at the Grand Hyatt Hotel in Melbourne, please purchase your tickets below

1 Ticket

$1990

  • Access to onsite mobile APP
  • Meals and refreshments
  • Access to all presentation sessions
    and roundtable discussions
  • Access to all presentation
    slides and photos
BUY NOW
Group Ticket (2 - 4)

$1790

  • Access to onsite mobile APP
  • Meals and refreshments
  • Access to all presentation sessions
    and roundtable discussions
  • Access to all presentation
    slides and photos
BUY NOW
GROUP TICKETS (5+)

$1500

  • Access to onsite mobile APP
  • Meals and refreshments
  • Access to all presentation sessions
    and roundtable discussions
  • Access to all presentation
    slides and photos
BUY NOW

LATEST NEWS

Attitude, Language & Approach – Keys to CIO Success – Frank De Sa

Frank De Sa, Chief Information Officer, Just Group Limited The presentation was based around “Attitude, Language & Approach – Keys to […]

Attracting and Retaining IT Top Talent for the Future of Work – Panel Discussion

Panellists: Amanda Bennie, Head of Technology, Cbus Property John Tait, Head of Technology, T2 Tea SAR Raheem, APAC Region Manager, Security & […]

How do you Protect your Company from Ransomware Attacks? – Jason Mantell

Jason Mantell, Director of Sales Engineering APAC, Cloudian Jason spoke about how Cloudian’s data immutability goes beyond protections […]

Understanding risk and the perils of not identifying your risk growth – Damien Lewis

Damien Lewis, Sales Manager, ExtraHop A quantitative risk assessment is great for getting really precise about the potential financial impact, […]

Meet leading IT Security executives from Australia's strongest brands.

Interact and engage with some of the strongest and most powerful brands from across Australia.

“First of all, can I just say this was one of the best conferences I have been to in the last 5 years. The caliber of delegates (and networking opportunities), suppliers and speakers was exceptional. Your team – were so helpful before and during the event. Well done, I'd be very happy to be invited back!”

 

– 20TH CENTURY FOX

'Fantastic event! Congratulations to you and the team. Hands down the best event I have attended as a sponsor since I've been at Genesys. You and your team were extremely professional and helpful in the lead up to the event and I very much appreciate your patience in dealing with the many hurdles along the way. I can't tell you how refreshing that is after the dealings we've had with several other event/conference providers across APAC.'

 

– GENESYS

“Just wanted to thank you and the team for making us feel so welcome and looking after the team during the conference. It was definitely one of the best ones we’ve been to, so well done. When is your next event? Would love to keep the ball rolling on this.”

 

– SHOOTSTA

“I always enjoy the opportunity this summit affords for networking and a general check in on what everyone is doing.”

 

TRAVERS STOW – SIGMA HEALTHCARE

PLATINUM PARTNERS

GOLD PARTNERS

SILVER PARTNERS


BRONZE PARTNERS




BECOME A SPONSOR

MEDIA PARTNERS


Grand Hyatt Melbourne
123 Collins St, Melbourne VIC 3000
Telephone: +61 (03) 9657 1234
Email Enquiries: [email protected]

More Information
Copyright 2024 ©Focus Network. All rights reserved