close
EARLY BIRD TICKETS WILL END SOON
  • Days
  • Hours
  • Minnutes
  • Seconds

Schedule and agenda

8:30am - 9:15am

Registration & exhibition open

9:15am - 9:25am

MC Welcome

9:25am - 9:30am

Cyber Daily Welcome

9:30am - 9:40am

Principal Partner welcome & industry overview

9:40am - 10:15am

Taking your cyber security company global: Challenges and opportunities in the AUKUS landscape

This session will explore how cyber security companies can navigate the global market, with a particular focus on opportunities and challenges arising from the AUKUS security partnership.

Our speakers will focus on key regulations, cross-border collaboration and technical standards in the context of the AUKUS partnership while offering practical insights for cyber security companies aiming to expand into global markets.

10:15am - 10:50am

Developing a business-ready cyber security architecture

This session will provide a deep dive into designing and implementing a business-ready cyber security architecture in Australia, focusing on technical strategies that align with local regulations, industry standards, and business objectives.

The discussion will emphasise how organisations can build scalable, resilient cyber security frameworks to protect against modern threats while ensuring regulatory compliance with Australia's cyber security laws, such as the Security Legislation Amendment (Critical Infrastructure) Act 2021 and the Security of Critical Infrastructure (SOCI) reforms.

We will discuss:

  • Understanding key cyber security requirements.
  • Creating a secure network.
  • Threat modelling and defence strategies.
  • Integrating business continuity.
  • Automation and AI in cyber security.

Dr Tom Gao
Dr Tom Gao
Chief Technology and Digital Services Officer
City of Sydney
10:50am - 11:20am

Morning networking break

11:20am - 11:55am

On the shoulders of giants: What we can learn from enterprise CISOs

This session will explore the technical strategies, lessons, and best practices learnt from seasoned CISOs in large enterprises.

It will focus on the evolution of cyber security leadership and how enterprise-level CISOs are driving innovation in cyber security architecture, incident response, threat intelligence, and governance.

With insights into real-world implementations, the session will provide actionable takeaways for cyber security professionals looking to strengthen their own security operations, architecture, and risk management practices.

Victor Akkari
Victor Akkari
Chief Information Security Officer
Cochlear Limited
Doug Thompson
Doug Thompson
National Information Security & Digital Risk Manager
Myer
11:55am - 12:30pm

Combatting cyber crime: Technical strategies and national collaboration in Australlia

This session focuses on the advanced technical strategies, tools, and collaborative efforts used to combat cyber crime in Australia. Attendees will gain a comprehensive understanding of how key agencies can work together to tackle cyber threats.

The session will delve into the technical methods used to track, prevent, and respond to cyber crime, covering areas such as ransomware, financial fraud, and cyber espionage. You will also learn about the integration of cyber intelligence, digital forensics, and law enforcement actions aimed at disrupting cyber criminal activity and reducing cyber threats across the country.

Key topics include:

  • Understanding the cyber crime landscape.
  • The importance of a collaborative national response.
  • Technical investigation tools.
  • Proactive cybercrime prevention.
  • Cyber crime legislation and enforcement.

12:30pm - 1:05pm

Emerging technologies: AI and quantum computing in the future of cyber security

This session delves into the opportunities and challenges that AI and quantum computing present. We will cover how AI is reshaping cyber security through advanced threat detection, automated defence systems, and predictive analytics. This session will also explore how quantum computing, both as a tool for cyber defence and a new class of threat, could revolutionise encryption and cryptography, prompting a re-evaluation of security architectures.

Key takeaways include:

  • Exploring how AI-driven systems are transforming threat detection, response automation, and security operations.
  • Understanding how quantum computing can both break existing encryption schemes and enable new, more secure cryptographic methods.
  • Gain insights into quantum-resistant algorithms that can protect against future quantum-enabled cyber threats.
  • Discover how AI and quantum technologies are creating both challenges and opportunities for cyber defence

1:05pm - 1:40pm

The future of cyber security

This session explores the future of cyber security through the lens of emerging technologies, advanced threats, and evolving defence strategies. With a focus on long-term projections, it will address how advances in AI, quantum computing, autonomous systems, and other disruptive technologies will redefine both cyber threats and defence mechanisms.

Senior cyber leaders will provide in-depth insights into how government, defence, and industry can prepare for this new frontier of cyber security.

The session will analyse both the technical challenges and opportunities these technologies present and explore how proactive cyber security frameworks can adapt to keep pace with future cyber landscapes.

1:40pm - 2:35pm

Lunch & networking break

2:35pm - 3:00pm

Staying ahead of the curve in cyber-security

Sam Mackay
Sam Mackay
Chief Information Security Officer
NSW Department of Customer Service
3:00pm - 3:30pm

Allied capacity building and the evolution of cyber threats

James Corera
James Corera
Director, Cyber, Technology & Security, Australian Strategic Policy Institute
3:30pm - 3:35pm

MC close

3:35pm - 4:15pm

Networking drinks

4:15pm

Event concludes



*agenda subject to change