<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">

    Not Found

  • 08:20

    Register; grab a coffee. Mix, mingle and say hello to peers old and new.

  • 09:00
    Lauren Veenstra Iberdrola

    Welcome Remarks from Corinium and Chairperson

    Lauren Veenstra - Chief Security Officer - Iberdrola Australia

    Arrow
  • 09:05
    1143 CISO Brisbane_Icon_Networking (1)

    Speed Networking – Making new connections!

    Arrow

    During this 10-minute networking session, the aim of the game is to go and meet three people you don't already know. Use the questions on the screen to guide your conversation. Have fun!

  • 09:15
    Vijay Narayan (3)

    Opening Keynote
    Driving National Resilience: Strengthening Cyber and Infrastructure Capabilities

    Vijay Narayan - Chief Information Security Officer - Mercy Health Australia

    Arrow

    Australia’s critical infrastructure is under sustained pressure - from increasingly sophisticated AI-enabled attacks to cascading risks across supply chains, and not to mention natural disasters. This is a call to action: How do we rapidly build real-world cyber-capability, not just policy? Explore the ways C-Suite leaders move beyond minimum compliance to invest in long-term operational resilience across critical infrastructure. Where are your capability gaps, and what happens now to secure Australia’s future?

  • 09:40
    Tim Roughton

    Data Security: The Missing Context

    Tim Roughton - Country Manager – Australia & New Zealand - Concentric AI

    Arrow

    Data security has been around for decades, and yet, it still feels like an unsolvable puzzle. Legacy technologies are typically resource-intensive, find just a small portion of companies’ sensitive data, and produce a ton of false positives. The impact to operations is often so significant that businesses never move their DLP out of monitoring mode.

    Attend our session to learn:

    • Why traditional approaches to data security have failed

    • How AI and context are revolutionizing data security

    • Where to maximize the value of your existing security investments

    • What you can do to secure your Gen AI rollouts

    With the right strategy and technology, you can transform your data from a liability to a well-managed asset.

     
  • 10:05
    Panel Discussion-1

    Panel Discussion
    Navigating SOCI: Building Strength, Maturity and Resilience in Practice

    Arrow

    As PSPF obligations tighten and SOCI reforms deepen, critical infrastructure operators face growing pressure not only to comply but to prove the strength and maturity of their security practices. This keynote explores how to assess, strengthen, and sustain compliance confidence while embedding resilience across systems, people, and processes.

    • Assess your current posture and understand where your capabilities lie, whether you’ve crossed the compliance threshold, and where the biggest uplift opportunities remain.
    • Clarify the regulatory landscape: unpack how PSPF, SOCI, CIRMP, and emerging cyber rules overlap, and what they mean for executive accountability and governance.
    • Link ownership to accountability to explore the “if I can touch it, I can own it” mindset to strengthen control over assets, systems, and risk exposure.
    • Build a practical roadmaps that translates regulatory requirements into stronger, more adaptive security and operational continuity.

    Moderator:
    Prof. Abbi Sharma Chief Digital and Transformation Officer Victorian Government 

    Panellists

    Richard Magalad IRAP Assessor Australian Government

    Anthony Canning Chief Information Security Officer 5G Networks 

  • 10:40

    Morning Coffee and Connect

  • 11:10
    Jimmy AIA

    Third-Party, First Priority: Supply Chain Strategies for Complex Vendor Ecosystems

    Jimmy Wong - General Manager - Information Security, Technology Controls & Governance - AIA Australia

    Arrow
    • Identifying high-risk dependencies and vulnerabilities across your supply chain.
    • Strengthening oversight and accountability through better risk frameworks and due diligence.
    • Embedding cyber resilience into procurement, contracts, and third-party management processes.
    • Applying proactive measures to contain and mitigate threats before they escalate.
  • 11:35
    Shawn - Sentinel One

    Critical Infrastructure Cyber Security-Strengthening Protection with Air Gapped Endpoint Security

    Shawn Luyke - Staff Solutions Engineer - SentinelOne

    Arrow

    Critical infrastructure faces a sharp rise in blended cyber threats. Nation-states increasingly rely on cybercriminal groups to gain access, scale operations, and mask attribution. These campaigns now target OT and ICS environments directly, aiming to disrupt safety, availability, and trust.

    This session sets the threat context and aligns it to the Australian Signals Directorate CI Fortify guidance, focusing on practical defensive outcomes rather than theory. The session explains how static and behavioural AI on the endpoint detects malicious activity in OT and ICS systems, even when traditional controls fail. It covers how endpoints continue to prevent, detect, and respond when fully disconnected from the cloud.

    Attendees will see how air gapped endpoint security maintains protection, visibility, and service availability in isolated or degraded environments. The session closes with a reference to security architectures and deployment models for critical infrastructure. These patterns support connected, partially connected, and fully air-gapped environments. The goal is clear: deployable guidance for protecting endpoints where uptime, safety, and resilience matter most.

     

  • 12:00
    Panel Discussion-1

    Panel Discussion
    Security of a Supply Chain in a Fractured Geopolitical Landscape

    Arrow

    As global volatility intensifies, the stability of critical infrastructure supply chains is increasingly threatened by geopolitical destabilisations, concentrated vendors, and just-in-time models. Efficiency gains have come at the expense of resilience. This session explores how to safeguard essential services amid escalating disruption and regulatory pressure.

    • Reassess procurement models to balance cost, resilience, and compliance while avoiding diminishing security returns.
    • Collaborate with regulators and partners to strengthen transparency and oversight across volatile supply ecosystems.
    • Evaluate geopolitical flashpoints and destabilisations to understand their cascading impacts on Australia’s critical infrastructure.
    • Embed resilience into design, planning, and vendor management to withstand future shocks and disruptions.

    Moderator

    Daisy Wong Head of Security Awareness Medibank

    Panellists

    Helaine Leggat Non-Executive Director CI-ISAC

    John Ellis Global Head of Security, Trust and Influence QBE Insurance

    Vasant Prabhu Global Data Protection Lead (AI, Privacy and Cybersecurity Architecture) Toll Group  

     

  • 12:35

    Networking Lunch

  • Lauren Veenstra (1)

    TRACK A: Resilience in OT and IT

    Chaired by: Lauren Veenstra - Chief Security Officer - Iberdrola Australia

    Arrow
  • 13:35
    Fireside Chat

    Fireside Chat
    Strengthening OT Where It Matters Most: Visibility, Resilience and Real-World Risk Reduction

    Arrow
    • Identify and continuously monitor assets, protocols, and interdependencies across hybrid environments.
    • Align cyber security, operations, and engineering around shared OT security goals.
    • Continuously monitor assets, protocols, and interdependence across hybrid environments.

    Moderator

    Lauren Veenstra
    Chief Security Officer
    Iberdrola Australia

    Speakers
    David Worthington General Manager - Digital Security and Risk Jemena

    Luke Ma Head of Technology Controls and Governance AIA Australia 

  • 14:00
    Scott Hesford Beyond Trust

    Identity Everywhere: Governing AI Agents Across Hybrid & Multi-Cloud

    Scott Hesford - Senior Director, Solutions Engineering - APJ - Beyond Trust

    Arrow

    AI agents and service accounts are exploding across SaaS and cloud, creating a hidden attack surface that traditional security controls can’t see.

    In this presentation, we’ll unpack why non-human identities and the secrets they hold are now the fastest-growing risk in enterprise environments. Learn how attackers exploit privilege sprawl, API keys, shadow AI, and why regulators are demanding demonstrable controls under various frameworks. Our expert will share insights to expose hidden security risks with AI agents, unveil the visibility gap, and provide a practical guide to employ control on escalation paths whilst staying operationally efficient.

    You’ll see how BeyondTrust’s privilege-centric identity security delivers visibility, intelligence and protection across hybrid and multi-cloud environments. Walk away with a blueprint for securing agentic AI and non-human identities so your organisation can innovate confidently, comply continuously, and stay resilient in 2026 and beyond.

  • 14:25
    Fireside Chat

    Fireside Chat
    Bridging the Cyber-Physical Divide: Smarter Asset Management for Legacy Systems

    Arrow

    Modernising these assets requires a careful balance between commercial imperatives, operational continuity, and security assurance. This session explores how critical infrastructure operators can innovate with precision—protecting what matters while unlocking new value.

     

    • Assess asset management practices to identify risk, commercial value, and tangible pathways to secure modernisation.
    • Protect ageing OT systems that are increasingly connected yet remain essential to operations.
    • Mitigate cyber-physical vulnerabilities arising from greater integration, visibility, and remote access.
    • Integrate old and new technologies through phased strategies that minimise disruption and sustain resilience.

     

    Panellists

    Bilal Baig Senior OT Digital Security Specialist Coles Group

    Faysal Hasan Senior Cyber Sec Analyst - OPS Lead Viva Energy
    Moe Nahas Manager - OT Infrastructure Ports Victoria

     

  • 14:50
    Andrew Robinson 6Clicks

    From Outages to Continuous Confidence: Assurance for Critical Infrastructure

    Andrew Robinson - Co-Founder - 6Clicks

    Arrow

    Critical infrastructure operators are judged not on policy, but on performance when services are under pressure. As digital systems, third-party dependencies and AI increasingly underpin essential services, traditional compliance models struggle to keep pace.

    Static documents and periodic audits create gaps between how systems are governed on paper and how they behave in reality.

    This session examines service-level accountability, tolerance thresholds, proportional oversight, and the shift from point-in-time reporting to continuous confidence; making assurance incident-ready, not just audit-ready.

  • 15:15
    Aidan Hollier Melbourne Water

    Tales from the Trenches: Bridging IT and OT in Critical Infrastructure

    Aidan Hollier - Head of Asset Knowledge and Technology - Melbourne Water

    Arrow
    • Understand why IT and OT view risk differently and how to align their priorities.
    • Make traditional IT frameworks practical and effective for operational environments.
    • Create collaboration models that unite IT and OT for resilient operations.
  • Sandeep Taileng

    TRACK B: Regulation, Risk and Maturity

    Chaired by: Sandeep Taileng - Information Security Officer - State Trustees Victoria

    Arrow
  • 13:35
    Fireside Chat

    Panel Discussion
    Are You as Mature as You Think? Rethinking Cybersecurity Readiness

    Arrow
    • Prioritise investments that deliver the highest maturity uplift per dollar.
    • Embed resilience into maturity roadmaps to ensure operational continuity.
    • Building intelligent vulnerability management security controls.
    • Develop leadership buy-in for long-term maturity investments.

    Moderator

    Daisy Wong Head of Security Awareness Medibank 

    Speakers

    Rucha Gatti Director, Tech and Info Risk NAB

    Malhar Vora Principal Security & People Engineer – Group Cyber Security
    ANZ

  • 14:00
    Pouya Ghotbi - Checkpoint

    Exposure Management in Critical Infrastructure: Beyond Compliance

    Pouya Ghotbi - Head of Exposure Management - Check Point

    Arrow

    Critical infrastructure organisations operate under intense regulatory pressure, yet compliance alone rarely reflects their true cyber risk. In many environments that risk remains unclear due to fragmented security tools, disconnected processes, and siloed data across multiple teams.

    As a result, real exposures can remain invisible, unprioritised, or untested until they are exploited. This session explores how Continuous Threat Exposure Management (CTEM) helps critical infrastructure operators move beyond periodic assessments toward a continuous cycle of discovery, prioritisation, validation, and remediation.

    You will be left with practical tips and a clear framework for applying CTEM to reduce real-world cyber exposure in critical infrastructure environments.


     

  • 14:25
    Sandeep Taileng

    Space as Critical Infrastructure: The Security Risks We Cannot See

    Sandeep Taileng - Information Security Officer - State Trustees Victoria

    Arrow

     

    • Examine how space infrastructure underpins critical services across communications, defence, and essential industries.
    • Assess the cascading impact of space disruption and the systemic risks it creates on Earth.
    • Identify security gaps in satellite-to-satellite communication beyond traditional control points.
    • Rethink resilience strategies for infrastructure beyond national and organisational control.
  • 14:50
    Frances Madaffar Trellix

    The Industrial Compromise: The Pivot of Ransomware and Hacktivism to Operational Technology (OT)

    Frances Madaffari - Senior Cyber Threat Intelligence Consultant - Trellix

    Arrow

    Operational Technology (OT) environments, which are critical to industrial, manufacturing, and infrastructure functions, are rapidly emerging as the premier target for sophisticated cyber adversaries.

    This presentation analyzes this year’s critical pivot observed in both hacktivist and financially motivated ransomware groups, detailing their evolution from traditional Information Technology (IT) targeting to more advanced OT compromises. We will explore the primary driving forces behind this shift and its consequences.

     

  • 15:15
    Justin Nga Citicor & powecor

    Rethinking OT Security in the Era of OT Innovation

    Justin Nga - Cyber Security Manager - CitiPower and Powercor

    Arrow

     

      • Take a journey through the evolution of OT and their major leaps in architecture and innovation.
      • What is next on the horizon and what risks do they pose?
      • Navigating OT innovation risk using ACSC’s Principles of OT Cybersecurity and CI Fortify, and INL’s Cyber Informed Engineering.
      • Building defensible and ‘survivable’ OT architectures
  • 15:40

    Afternoon Coffee Break

  • 16:10
    Anya Mishra

    From Disruption to Deliverables: Building Adaptive Strategies for Uninterrupted Operations

    Anya Avinash - Head of Cyber Security - Bank First

    Arrow
    • Move from reactive recovery to proactive, adaptive continuity planning.
    • Identify and mitigate operational risks before they escalate into crises.
    • Design business continuity plans that integrate cyber, physical, and supply chain resilience.
  • 16:35
    Interactive Discussion

    Discussion Roundtable
    Executive Reflections: What’s Next for Critical Infrastructure Cyber Security?

    Arrow

    This candid closing discussion brings together senior executives, CISOs, and government leaders to reflect on the day’s biggest insights - and what they’re taking back to the boardroom.

    • How are you aligning security with business outcomes and operational risk?
    • What’s your top priority for the next 90 days?
    • What role should government, industry, and the boardroom each play?

     

    Moderator

    Tara Dharnikota Chief Information Security Officer Victoria University

    Speakers

    Prof. Abbi Sharma Chief Digital and Transformation Officer Victorian Government

    Huon Curtis Health and Critical Sectors Lead CI-ISAC

    Pearse Courtney Principal Sector Engagement ex-AEMO 

  • 17:10
    Lauren Veenstra Iberdrola

    Chairperson Closing Remarks

    Lauren Veenstra - Chief Security Officer - Iberdrola Australia

    Arrow
  • 17:15

    Cheers with peers: Mocktails and mingle

  • END of CISO CRITICAL INFRASTRUCTURE MELBOURNE