Do not publish - still working with Home Affairs on the session
Horizon 2: Shaping the next stage of Australia's Cyber Security Strategy
The world around us is changing fast. By 2028, Australia will be facing a materially different cyber security landscape, shaped by cascading threats, increased digital reliance, and technological advancements. While it is difficult to pinpoint precisely how these changes will materialise, the cyber security needs of Australian businesses and citizens will have increased exponentially.
In this timely session, Ash Bell, Assistant Secretary Cyber Policy and Programs at the Australian Department of Home Affairs, provides an update on how government and industry are working together to best prepare Australian citizens and businesses to securely navigate the transformative era. You'll hear the regulatory, legislative and policy settings that are being weighed and refined under Horizon 2 to effectively scale cyber maturity across the whole economy.
The cyber threat landscape is being reshaped by escalating state competition, economic coercion, and hybrid conflicts.
As cyber crime syndicates and state-backed threat actors converge, Australia faces growing pressure to safeguard its infrastructure and economy.
In this incisive panel, senior security leaders will unpack the blurred lines between cyber crime, espionage, and statecraft.
You'll leave with a clear understanding of how geopolitical tensions and state-based cyber threats are directly impacting Australia's cyber landscape, as well as what a co-ordinated national response looks like.
Discussion points will include:
2026 marks a critical juncture for Australia's cyber regulatory environment, with landmark updates to security obligations, critical infrastructure protections, and privacy laws on the horizon.
This session will provide clarity on the evolving compliance landscape, unpack new legislative requirements, and explore how organisations can meet rising expectations from regulators, customers, and stakeholders.
You'll walk away with a comprehensive understanding of Australia's evolving cyber regulatory environment alongside actionable steps to improve compliance within your organisation.
Key discussion points will include:
Cyber security is a board-level priority shaping both organisational resilience and competitiveness.
In this session, you'll take a seat at the table with leading CISOs to see how cyber is influencing corporate strategy in an era of escalating digital threats.
This high-level panel is essential for business owners and cyber professionals with senior leadership aspirations.
You'll gain practical insights into how CISOs communicate risk, translate cyber priorities, and influence decision making at the executive and board levels.
Key discussion points will include:
Revolutionary technologies like AI, quantum computing, and autonomous systems are set to redefine both cyber threats and defensive capabilities.
Deep insights into how government, defence, and industry are preparing for this new frontier will help you keep pace in the race to harness and defend against these technologies.
This session will equip you to anticipate how current and emerging technologies are disrupting the threat landscape, improving your readiness and responsiveness in an evolving security context.
Key discussion points will include:
After more than three decades investigating cyber crime at the FBI, Scott Augenbaum uncovered underlying truths that explain why organisations continue to fall victim to cyber attacks, and why technology will never be enough. In this exclusive keynote address, Scott revisits those truths through the lens of today's evolving threat landscape, where human behaviour, social engineering, and AI-powered deception collide.
With gripping case studies drawn from real investigations, Scott reveals how attackers exploit psychology as effectively as code, manipulating authority, trust, and urgency to bypass even the strongest technical defences. You'll leave with timeless principles that still define modern attacks in a rapidly changing security context.
*agenda subject to change