<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">

    Not Found

  • DAY 2

    Wednesday, 23 July

  • 08:20

    Register; grab a coffee. Mix, mingle and say hello to peers old and new.

    Arrow
  • 9:00
    Dan Haagman, Doctoral Security Researcher

    Welcome from Corinium and the Chairperson

    Prof Dan Haagman - CEO Chaleit & Honorary Professor - Murdoch University

    Arrow
  • 09:10
    Keynote-1

    Fireside Chat: Threats on the Horizon - Unpacking the Evolving Cyber Landscape

    Arrow

    In this candid one-on-one conversation, a leading Australian CISO reflects on the rapidly evolving threat landscape impacting organisations across all sectors. This session explores how emerging technologies, geopolitical shifts, and adversarial innovation are reshaping the threat horizon. Discussing the rise of sophisticated multi-vector attacks, the increasing role of AI in both offence and defence, and the shifting tactics of cybercriminals and nation-state actors. Unpacking what’s keeping security leaders up at night, how businesses can move from reactive to strategic risk management, and what it truly takes to build resilience in a climate of constant cyber disruption.

    Speakers:

    Vannessa van Beek Global CISO Fortescue

    Jason Murrell Chair Australian Cyber Network

  • 09:35
    Glenn Maiden

    Into the Cyberwars

    Glenn Maiden - CSO Fortinet Australia & Director of Threat Intelligence, FortiGuard Labs ANZ - Fortinet

    Arrow

    Explore FortiGuard Lab's 2025 threat predictions and learn actionable strategies to combat emerging risks like supply chain attacks. Build resilience, minimise systemic risk and stay ahead in an interconnected threat landscape.

  • 10:00
    Panel Discussion-1

    Panel: Invest Smart, Secure Smart – Maximising the Value through Strategic Resource Allocation

    Arrow
    • What strategies effectively prioritise resource allocation towards high-value targets without over-allocating to less critical areas? What metrics or KPIs should be tracked?
    • How crucial are comprehensive risk assessments for identifying critical assets?
    • How can businesses balance thorough risk assessments with the fast-paced threat landscape?
    • What are the main challenges in getting the board to prioritise cyber security investments, and how do you tackle them? What do you do when the board says no?

    Moderator:

    Tara Dharnikota CISO Victoria University

    Panellists:

    Callum Nelson CISO EBOS Group

    James Ng GM Cyber Security (CISO) Insignia Financial

    Robert Turney CISO auDA

  • 10:35
    John Cunningham

    Managing Data Security and Data Risk in the Age of Generative AI

    John Cunningham - VP Sales APAC - Securiti

    Arrow
    • Value of Implementing Data Security Posture Management (DSPM) and Data Intelligence Access Governance
    • How can DSPM and DIAG help organisations prepare for Generative AI Adoption.

    Both DSPM and Data Intelligence Access Governance are critical tools for modern organisations aiming to protect sensitive data, ensure compliance, and reduce risk. They address distinct but complementary aspects of data security and governance, helping organisations proactively manage vulnerabilities, minimise attack surfaces, and optimise data usage. Implementing Data Security Posture Management (DSPM) and Data Intelligence Access Governance (DIAG) can significantly help organisations prepare for the adoption of Generative AI (GenAI) by addressing key challenges related to data security, governance, and compliance. This session will provide the audience with a high level understanding of why their Cyber, Data Governance and Data Privacy teams will need to collaborate to enable the business in the age of Generative AI.

     

  • 11:00
    Break-1

    Get refreshed! Mingle

    Arrow
  • Dan Haagman, Doctoral Security Researcher

    TRACK A: CRITICAL INFRASTRUCTURE

    Prof Dan Haagman - CEO Chaleit & Honorary Professor - Murdoch University

    Arrow
  • 11:30
    Keynote-1

    Responsible AI in the Enterprise: Managing Risks while Driving Business Value

    Arrow
    • Explore frameworks and best practices for implementing responsible AI governance in enterprise environments.
    • Identify key risk factors associated with AI adoption, including ethical considerations, regulatory compliance, and operational vulnerabilities.
    • Demonstrate how to align AI initiatives with business objectives to drive value while maintaining accountability and trust.

    Speakers:

    Bharat Bajaj Senior Director ISACA Melbourne Chapter 

    Reshma Devi Data & AI Risk and Information Management Transurban

  • 11:55
    Mohamed Ibrahim Pic-1

    Winning the AI Arms Race in Cyber

    Moe Ibrahim - Area Vice President, Sales Engineering – APJ - Exabeam

    Arrow

    AI is rapidly transforming the cyber threat landscape, with adversaries—from script kiddies to nation-state actors—leveraging AI to scale and automate attacks. Security operations leaders must adapt, using AI-driven defense strategies to stay ahead. This session explores how organisations can harness AI to enhance detection, response, and resilience. Learn key techniques for integrating AI into security operations, mitigating emerging risks, and ensuring AI works for you—not against you.

  • 12:20
    Panel Discussion-1

    Panel: Rethinking Security for Critical Infrastructure - Zero Trust as a Foundation

    Arrow
    • Identifying key dependencies to address before embarking on a Zero Trust network transformation to ensure a smooth and effective implementation.
    • Exploring the essential components of a Zero Trust technology stack, their roles in fortifying infrastructure, and their integration into existing environments.
    • Applying pragmatic policy principles to focus on high-impact areas, maximising risk reduction without overwhelming resources or processes.
    • Addressing the complexities of deploying Zero Trust in environments with legacy systems, OT, and IoT.

    Moderator:

    Helaine Leggat NED CI-ISAC & Chair CI-ISAC Health Cyber Sharing Network Advisory Panel

    Panellists:

    David Worthington, GM - Digital Security & Risk, Jemena

    Winston Fernando Head of Cyber Security & Compliance Darebin City Council

    Maria Paz CTO Epworth

    Ash Diffey Vice President, ANZ Ping Identity

  • Andrew Morgan (sized)

    TRACK B: CYBER MATURITY

    Andrew Morgan - Head of Information Security & Risk - Defence Health

    Arrow
  • 11:30
    Muzamil Rashid

    Breaking the Firewall: Navigating Security in a World Without Boundaries

    Muzamil Rashid - Head of Cyber Security - Mazda Australia

    Arrow
    • The end of traditional perimeter security—why firewalls alone are no longer enough.
    • Zero Trust and micro-segmentation—building security from the inside out.
    • Defending a hyperconnected world—securing data, identities, and applications everywhere.
  • 11:55
    Interactive Discussion

    Data Visibility: The Foundation of Proactive Cyber Resilience

    Arrow

    As the evolving threat environment demands a shift to proactive, data-centric security, traditional perimeter defences no longer suffice. Understanding data context is critical.

    This session explores how data intelligence can empower cyber resilience, and why collaboration between data and security teams, underpinned by shared visibility, is key to staying ahead in an increasingly complex environment.

    Adam Plotnikov Senior Solutions Engineer BigID

    John Karabin Chief Cyber Security Strategist McGrathNicol

  • 12:20
    Panel Discussion-1

    Panel: From Framework to Function– Embedding GRC into Cyber Maturity Journeys

    Arrow
    • How can organisations transform GRC from a compliance framework into a strategic tool that drives cyber maturity and resilience?
    • What are the main challenges organisations face when embedding GRC into their cyber maturity journey, and how can these be overcome effectively?
    • How can organisations measure and track the impact of GRC integration on their cyber maturity and long-term resilience goals?

    Panellists:

    Cameron Walter Head of Cyber Security Cricket Australia

    Tharaka Perera Head of Information Security Estia Health

    Dhaval Parikh Senior Partner Information Security &Technology Risk BoQ Group 

    Nimisha Balyan GM Program Delivery & Change - P&T Transformation Telstra

  • 12:55
    Lunch_ Dinner-1

    Lunch

    Arrow
  • 13:55

    Prize Draw

    Arrow

    The Great Rugby Giveaway to win hospitality tickets to see The British & Irish Lions face off against the Wallabies!

  • 14:00
    Interactive Discussion

    Cyber Defenses in the Crosshairs: Prioritising Security in an Evolving Threat Landscape

    Arrow

    Join this conversation between Serkan Cetin (Technical Director APJ, One Identity) and Kylie Watson (Head of Cybersecurity, DXC Technology) as they unpack the evolving threats to critical infrastructure and how AI is reshaping cyber security responses. 

    • Geopolitical risk spotlight: how conflicts like Ukraine expose infrastructure vulnerabilities
    • SOCI Act: what’s changed and why it matters for security leaders
    • QR and energy sector case studies: applying controls to protect people and services
    • Real-world use of least-privilege and zero trust in operational environments
    • AI in action: 113 hours saved in one month by automating SOC approvals for a financial client
    • How to prioritise controls when budgets are under pressure

    Serkan Cetin Technical Director APJ One Identity

    Kylie Watson Head of Cybersecurity DXC technology

  • 14:25
    Panel Discussion-1

    Panel: Resilience Starts Within - Nurturing a Cyber-Aware Culture Across Your Organisation

    Arrow
    • Understand the influence of human behaviour and organisational culture on the effectiveness of cyber security practices.
    • Implement strategies to foster a security-conscious mindset, encouraging proactive cyber hygiene and responsible digital behaviour across the workforce.
    • Measure and evaluate the impact of security awareness initiatives, refining approaches to maintain a continuously improving cyber-aware culture.
    • Empower employees to become active defenders, fortifying the organisation’s resilience.

    Moderator:

    Daisy Wong Squad Lead - Security Awareness Medibank

    Panellists:

    Cheryl Wong Security Culture & Engagement Lead EBOS Group

    Winston Fernando Head of Cyber Security & Compliance Darebin City Council

    Daniel Eastley Head of Group Cybersecurity JB HI-FI

  • 15:00
    Ian Pham-1

    Healthcare-Inspired Frameworks for Smarter Cyber Response

    Ian Pham - Head of Information Security - Victorian Managed Insurance Authority (VMIA)

    Arrow

    Building on last year’s exploration of what Cyber can learn from Health, this presentation delves into the practical application of healthcare-inspired frameworks like ISBAR and PROMPT within cyber incident management. This session provides insights from the journey at VMIA, highlighting how these frameworks have informed the development of operational processes and systems to enhance response efficiency, communication, and resilience in the face of cyber threats. Join Ian as he shared actionable strategies for bridging disciplines and driving innovation in cyber security.

  • 15:25
    Break-1

    Get refreshed! Mingle

    Arrow
  • 15:55
    Panel Discussion-1

    Panel: The Chain Reaction– Assess, Mitigate and Manage Supply Chain Cyber Risk

    Arrow
    • What are the key vulnerabilities in the supply chain or gaps in vendor cyber security practices and their potential business impacts?
    • How can businesses shift from reactive to proactive approaches in identifying and managing supply chain risks, particularly with the growing reliance on third-party services?
    • What are the actionable strategies for improving vendor oversight and securing the entire supply chain against evolving cyber threats?
    • How to develop tailored mitigation strategies to address financial, reputational, and operational risks posed by third-party vulnerabilities?

    Moderator:

    Raheem Sar APAC CISO The Access Group

    Panellists:

    Sandra Barns GM Information Security, Technology & Data Risk Judo Bank

    Muzamil Rashid Head of Cyber Security Mazda Australia

    Catherine Rowe Former Global CISO ex-QBE

  • 16:30
    Panel Discussion-1

    Panel: The Innovation Mindset – Cyber Leaders Who Dare to Think Differently

    Arrow

    Innovation and security are often seen as opposing forces, but the most successful organisations find ways to balance both. This panel brings together forward-thinking cyber security leaders to explore how to foster creativity while maintaining the rigour needed to safeguard organisations.

    Moderator:

    Prof Dan Haagman CEO Chaleit & Honorary Professor Murdoch University

    Panellists:

    Jerome Brown Head of IT: Cyber Security & Risk Country Road Group

    Alison Stretch GM Cyber Security MACS

    Vannessa Van Beek Global CISO Fortescue

  • 16:55
    Dan Haagman, Doctoral Security Researcher

    Chairperson's Closing Remarks

    Prof Dan Haagman - CEO Chaleit & Honorary Professor - Murdoch University

    Arrow
  • 17:00

    Close of CISO Melbourne 2025

    Arrow