-
CISO Perth 2026 - AGENDA
-
08:15
Register; grab a coffee. Mix, mingle and say hello to peers old and new.
-
08:45
Welcome from Corinium and the Chairperson
Sheavy Kaur - CISO - RAAFA WA
-
08:55
Speed Networking – Making New Connections at CISO Perth!
In this 5-minute networking session, the goal is to connect with three new people. Have fun!
-
09:00
Keynote Headliner
Bridging Policy and Reality: What WA’s Cyber Policy Shift Means for OrganisationsPeter Bouhlas - WA CISO - Department of the Premier and Cabinet
Western Australia’s new cyber policies are reshaping expectations around accountability, resilience, and information sharing across all sectors. This keynote presentation explores how to close the gap between policy ambition and operational reality.
- What WA’s policy shift means across public, private, and SME sectors
- Turning compliance goals into practical resilience
- Building capability and culture to match new expectations
- Opportunities for collaboration across the state’s cyber ecosystem
-
09:25
Panel Discussion
Risk Management, Leadership and Communication in Cyber IncidentsIn a cyber crisis, technical controls matter, but leadership defines the outcome. This panel explores how leaders navigate crises, communicate effectively, and manage operational and technical risk.
- Who do you call first when a cyber incident hits? How do you prioritise action?
- How do leaders balance immediate response with long-term reputation and trust management?
- Are playbooks useful in practice, or do they get ignored in real incidents
Panellists:
Joel Earnshaw Senior Manager Cyber Security Perenti
Simi Das IT Audit, Risk and Compliance Manager Wilson Group
Nicholas Putra Manager Cyber Security Department of Creative Industries, Tourism and Sport
-
10:00
The Power of Global Threat Intelligence to Enhance Cyber Resilience
Harnessing global threat intelligence allows organisations to move from reactive defence to proactive threat mitigation. This session will demonstrate how consolidating and operationalising threat feeds can improve security agility, enhance visibility across systems, and drive a more resilient cyber security posture.
-
10:25
Morning coffee and connect
-
10:55
Anatomy of a Breach: How Attackers Spread and How to Stop Them
Cybercriminals exploit weak segmentation to move laterally across networks, increasing the impact of breaches. This session will break down real-world attack patterns, revealing how organisations can disrupt lateral movement and reduce the success of cyber threats.
-
11:20
Panel Discussion
Culture, Behaviour and Cyber Resilience: Stories from the FrontlineThis panel explores how organisations embed secure behaviours, transform awareness into action and sustain change over time. Join us as panellists share practical examples and relatable stories, offering attendees simple, actionable habits to strengthen their teams’ cyber resilience.
- How do organisational culture and human behaviour influence cyber resilience?
- How do you embed secure behaviours into everyday work so they feel natural rather than forced?
- How can organisations measure the real impact of security awareness efforts and adjust over time?
- How do you encourage staff to see themselves as defenders rather than vulnerabilities?
- What’s one simple habit you wish every employee would adopt to improve cyber resilience?
Panellists:
Sheavy Kaur CISO RAAFA WA
Tim Orr Senior Manager Security Awareness CBA
Rebecca Moonen Security & Privacy Influence and Cyber Safety Outreach Manager NBN
Neel Goradia Cyber Security Lead PLS
Mark O'Brien GM Digital Technology & Innovation (CIO) CITIC Pacific Mining
-
11:55
Automating Cloud Defence: From Detection to Response at Scale
Cloud environments move faster than human teams can monitor. Misconfigurations, identity risks, and lateral movement often unfold in minutes, not hours. This session will explore how automation is being embedded into cloud-native security operations from real-time detection of anomalies to automated remediation of misconfigurations and credential misuse. Learn how leading organisations are reducing dwell time, accelerating incident response, and maintaining resilience at cloud speed.
-
12:20
Panel Discussion
AI Governance: Structure, Responsibility and ScopeAs AI adoption accelerates, leaders face the challenge of setting clear boundaries, not only around what AI should and shouldn’t do, but also around who holds responsibility for its oversight.
- Where does AI sit across the organisation?
- How should accountability be shared between security, risk, data, and business teams?
- What tasks can AI be trusted with, and where must human oversight remain non-negotiable?
- How can organisations prevent over-reliance, ensure explainability, and avoid ethical or operational pitfalls?
Moderator:
Mia Araminta Cybersecurity Resilience South32
Panellists:
Nigel Elders CIO The Perth Mint
Sameera Bandara Head of APAC IT Programmed
Steven Paice Head of Cyber Security South Metropolitan Health Service
-
12:55
Cyber in 5: Key Insights from Cythera’s CISO Survey
- Senior representative - Cythera
A quick, 5-minute dive into the key findings from Cythera’s latest CISO survey, highlighting the top trends and insights shaping the future of cyber security leadership.
-
13:00
Lunch break!
-
13:55
Prize draw!
-
Track A: Strategic resilience
Track A Chair: Sheavy Kaur - CISO - RAAFA WA
-
14:00
The Cyber Budget Challenge: Where Would You Spend Your Last Dollar?
Helen McLeish - Chief Cybersecurity Officer - East Metropolitan Health Service
Join us for a live, gamified session that puts you in the CISO’s seat to make tough budget decisions. Working in teams, you will debate, prioritise, and justify your spending choices. This hands-on session discusses how strategy, culture, and risk tolerance shape security outcomes.
-
14:25
Shifting Security Left in the Organisation: Risk Thinking Beyond the Security Team
This session explores how to embed security thinking into broader organisational decision-making from procurement and product to HR and finance and build a culture where shared responsibility drives better security outcomes.
-
14:50
AIC’s Secure Digital-Transformation Journey Toward the School of 2030
Tamjid Aijazi - CIO - Australian Islamic College
This practical case study shows how resilience was strengthened across a multi campus K–12 environment, offering lessons that resonate far beyond the education sector. It highlights the decisions, trade offs, and shifts in thinking required to manage sensitive data at scale, and explores how privacy and AI governance now shape strategy for any organisation navigating complex, people centred digital transformation.
-
15:15
Rethinking Identity in a Changing Threat Landscape
Digital trust is being redefined as identity threats grow more complex. From deepfakes and impersonation attacks to the rapid rise of non-human identities, the identity landscape is evolving. This session explores what these changes mean for verification and control and how security leaders can adapt their strategies to safeguard trust in a world where not every identity is who or what it claims to be.
-
15:40
Third- and Fourth-Party Risk: Moving from Prevention to Containment
Biljana Roksandić - Cyber Security Governance Risk & Compliance Officer - Synergy
As supply chains expand, the question is no longer if a third-party breach will occur, but how far it will spread. This session explores how cyber leaders can strengthen resilience across complex ecosystems by accepting that breaches will happen and focusing on limiting the blast radius, finding practical ways to renegotiate contracts and turning security requirements into enforceable commitments.
-
Track B: Technical excellence
-
14:00
Legacy Systems, Real Constraints: Managing Risk When You Can’t Patch Everything
David Taylor - CISO – Manager Cyber Security & Network Controls - Public Transport Authority
When critical systems can’t be patched, security becomes an exercise in precision. This session looks at how to safeguard ageing or vendor-locked environments without breaking availability or safety, using smart risk assessment, layered controls, segmentation, and monitoring to keep vulnerabilities contained.
-
14:25
Protecting What Matters: DLP Strategies for the AI Era
DLP is evolving fast in the era of AI offering new capabilities, but also new risks. This session shares case studies on how organisations are deploying DLP alongside AI tools to protect sensitive data without stifling productivity. Explore practical lessons, from policy design and user adoption to monitoring, governance, and incident response in AI-enabled environments.
-
14:50
Aligning IEC 62443 Expectations with OT Reality
Ricardo Da Paz - Lead OT Cyber Operations/Cyber Technical Authority - Woodside Energy
IEC 62443 offers a robust framework for securing industrial automation systems, but many organisations struggle to translate its comprehensive guidance into actionable steps. This session bridges the gap between theory and implementation, focusing on practical and scalable risk assessments to define appropriate security levels and build a sustainable foundation for operations.
-
15:15
Continuous AI Risk Monitoring for Critical Assets
This session examines how to implement continuous AI risk monitoring — from identifying vulnerabilities in AI models and data pipelines to detecting misuse and drift. Learn how to combine automation, governance, and human oversight to safeguard high-value systems against evolving AI threats.
-
15:40
Preparing for the Quantum Era
Tara Lie - Information & Technology Governance Manager - Department of Water and Environmental Regulation
With ASD outlining Australia’s direction on post-quantum cryptography, organisations are being urged to prepare now for the transition to quantum-resilient security. This session unpacks what this will mean in practice and where to start.
- How to ensure you are asking the right questions of your internal teams and third parties
- What a realistic post-quantum migration roadmap looks like for organisations
- Where to start with balancing interoperability, performance, and compliance demands
-
16:05
Afternoon tea and connect
-
16:35
The Burnout-Breach Connection: Why Human Overload Is Cyber’s Hidden Risk
Dinda Timperon - Head of Cyber Security Engineering - Insignia Financial
What if your next cyber incident isn’t a system failure, but human fatigue or overload? Human energy is a critical, often overlooked control that shapes decision-making and risk outcomes. Burnout, alert fatigue, and constant context-switching quietly increase the likelihood of errors and breaches. In this session, Dinda draws on behavioural science and leadership psychology to reframe burnout as a core cyber vulnerability and offers leaders practical strategies to turn resilience into a measurable advantage for both people and performance.
-
17:00
Closing Fireside Chat
Cyber Strategy for the next 2-3 years: What MattersAs organisations continue shifting services, data, and operations to cloud and as-a-service models, one truth has become unavoidable: identity is now the foundation of cyber strategy. Knowing who has access to what, verifying intent, and being able to respond quickly has replaced the traditional perimeter as the anchor of effective security.
This closing session brings together two practitioners, each with different perspectives, to have a candid conversation about executing a cyber strategy today. The discussion will focus on the practical shifts organisations must make to stay resilient in a rapidly changing threat and technology landscape. We will explore:
- What has changed in cyber strategy over the past few years and what surprisingly hasn’t
- Which fundamentals organisations must return to, even as environments grow more complex
- Where bold innovation is now required, particularly in identity, automation, and resilience engineering
- The critical markers of an effective strategy
Speakers:
Andrew Bullen Manager Cyber Security St John WA
-
17:25
Closing Remarks by the Chair
Sheavy Kaur - CISO - RAAFA WA
-
17:30
Cheers with Peers
Not Found