<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">

    Not Found

  • CISO Perth 2025 - AGENDA

  • 08:30

    Register; grab a coffee. Mix, mingle and say hello to peers old and new.

    Arrow
  • 08:50
    Dan Haagman, Doctoral Security Researcher

    Welcome from Corinium and the Chairperson

    Dan Haagman - Doctoral Security Researcher -

    Arrow
  • 09:00
    1143 CISO Brisbane_Icon_Networking

    Speed Networking – Making New Connections!

    Arrow

    In this 10-minute networking session, the goal is to connect with three new people. Let the questions on the screen spark your conversation. Enjoy the opportunity to expand your network!

  • 09:10
    Keynote-1

    Opening Presentation: Unpacking the 2023-2030 Australian Cyber Security Strategy

    Senior representative - National Cyber Security Office - Department of Home Affairs

    Arrow
    • Uncover what lies ahead - a brief guide outlining key initiatives, strategic imperatives and the challenges that CISOs must navigate.
    • Deepen your understanding of the vision of the 2023-2030 Australian Cyber Security Strategy to empower you with actionable strategies to craft a path to success.
    • Learn about the key challenges and success factors identified for the strategy, including the need for long-term commitment, flexibility, and alignment with global allies. 
  • 09:35
    Panel Discussion-1

    Panel: The Chain Reaction– Assess, Mitigate and Manage Supply Chain Cyber Risk

    Arrow
    •  Identify key vulnerabilities in the supply chain, focusing on gaps in vendor cyber security practices and their potential business impacts.
    • Examine the anatomy of supply chain attacks, highlighting the critical role of risk assessment, due diligence, and continuous third-party monitoring.
    • Implement actionable strategies for improving vendor oversight and securing the entire supply chain against evolving cyber threats.
    • Develop tailored mitigation strategies to address financial, reputational, and operational risks posed by third-party vulnerabilities.

    Moderator: 

    Neel Goradia, Cyber Security Lead, Pilbara Minerals

    Panellists:

    Joel Earnshaw, Senior Manager Cyber Security, Perenti 

    George Siemens, Cyber Security, Risk & Compliance Officer, CalEnergy Resources (Australia)

    Tara Lie, Information & Technology Governance Manager, Department of Water and Environmental Regulation

    Jason Fraser, Head of Cyber & Influence, Capricorn Society

    Senior representative, Delinea

  • 10:10
    Partner-1

    Partner Presentation
    Harnessing Global Threat Intelligence to Stay Ahead of the Game

    Arrow

    By consolidating threat feeds from a global source of intel, businesses can swiftly adapt security configurations to counter emerging risks. This streamlined approach simplifies security management across diverse systems, empowering proactive defence against evolving cyber threats. Join us as we explore how this integration enhances organizational resilience and fortifies digital assets against today's dynamic threat landscape.

  • 10:35

    Morning Coffee Break

  • 11:05
    Partner-1

    Partner Presentation
    The Impact of the Evolving Threat Landscape on the “Defender’s Dilemma

    Arrow

    Due to the constant evolution of our internal networks and in the face of an unforgiving threat landscape, Security Operations teams are constantly looking at new ways to enhance their visibility in order to better anticipate cyber threats. This session will explore the importance of how enhanced detection and response capabilities, visibility of your attack surface, and cyber threat intelligence can be helpful in better focusing your cyber security defences.

  • 11:30
    Robbie Whittome_Photo-2

    Unlocking the Value: Elevating Cyber Security from Technical Concern to Strategic Asset

    Robbie Whittome - CISO - Curtin University

    Arrow
    • Discuss how cyber security initiatives can be better aligned with overall business goals to enhance organisational resilience and growth.
    • Explore how other C-suite members can be effectively engaged in cyber security strategies to ensure it is prioritised at the highest levels of the organisation.
    • Highlighting how cyber security, when positioned as a strategic asset, can drive business value, increase organisational resilience, and create a competitive advantage.
    • Discuss how organisations develop more proactive approaches to managing cyber risks
  • 11:55
    Partner-1

    Partner Presentation
    Risk Intelligence at Scale: Are You Risk Operations Centre Ready?

    Arrow
    • Discover how a Risk Operations Centre (ROC) enhances cyber risk management through real-time monitoring and proactive decision-making.
    • Understand key concepts like Value at Risk (VAR) and Enterprise True Risk Management (ETM) to prioritise threats effectively.
    • Learn the “language of risk” for clearer communication of cyber threats to senior leadership and stakeholders.
    • Gain insights into building or optimising a ROC to align risk management with organisational objectives.
  • 12:20
    PersonPlaceholder-5

    Redefining the Role of CISO to Drive Innovation

    Rob Labbé - CEO & CISO in Residence - Mining and Metals ISAC

    Arrow
    • Exploring how the CISO’s responsibilities are evolving from solely managing risks to enabling business growth and innovation.
    • Understanding how CISOs can design adaptable security frameworks that support business agility and innovation while safeguarding against emerging threats.
    • Discussing how CISOs can cultivate a mindset where security is not seen as a barrier but as a driver of business agility, empowering teams to innovate with confidence.
  • 12:45

    Lunch

  • Dan Haagman, Doctoral Security Researcher

    Track A: Strategic Resilience

    Track A Chair: Dan Haagman, - Doctoral Security Researcher -

    Arrow
  • 13:45
    Partner-1

    Partner Presentation
    Resilient by Design: Embedding Cyber Security in Operational Resilience Planning

    Arrow
    • Integrate cyber security into business continuity by applying best practices for creating robust resilience plans.
    • Leverage frameworks to proactively assess and mitigate risks before they disrupt critical business operations.
    • Learn from real-world case studies on how strategic resilience planning helped organisations maintain stability and safeguard vital assets amidst cyber threats. 
  • 14:10
    Panel Discussion-1

    Panel: From Risk to Transformation– AI's Impact on Next-Gen Cyber Security

    Arrow
    • How would you assess the current level of AI implementation within your organisation?
    • What challenges have you encountered in adopting AI, and how have you addressed them?
    • What are the key criteria and considerations for evaluating AI technologies as part of a holistic cyber risk management strategy?
    • What indicators or benchmarks should organisations consider to evaluate the effectiveness of AI-driven cyber defence initiatives?

    Moderator:

    Vannessa Van Beek, CSO30 2024 & vCISO, Pax Security

    Panellists:

    Daryll Holland, CISO, Education Horizons

    Tim Downing, CISO, Clean Energy Finance Corporation

    Brenda van Rensburg, Cyber Security GRC & Assurance Specialist, P&N Bank

    Prashant Singh, Member Board of Directors, ISACA Perth Chapter
  • 14:45
    Partner-1

    Partner Presentation
    Critical Infrastructure: Empowering Resilience for Thriving Businesses and Communities

    Arrow
    • Uncover the risks that vulnerable infrastructure poses to local businesses and communities, impacting economic growth and public safety.
    • Collaborate with industry partners, local leaders, and stakeholders to develop resilient infrastructure strategies that support sustainable operations and community wellbeing.
    • Gain insights into cutting-edge technologies and innovative practices driving infrastructure resilience and operational continuity.
  • 15:10
    steve w

    Maturity Uplift for the Essential 8 and the "Further Five"

    Steve Woods - CISO - Department of Justice WA

    Arrow
    • Implement practical strategies and methodologies to elevate your maturity level within the Essential 8 framework, showcasing key steps and milestones.
    • Identify and address real-world challenges, bridging gaps and mitigating risks that remain even after achieving high maturity.
    • Highlight effective solutions and adjustments that enhance resilience and ensure continuous improvement in cyber security practices.
  • Karen Owens-1

    Track B: Technical Excellence

    Track B Chair: Karen Owens - CISO - Insurance Commission of WA

    Arrow
  • 13:45
    Partner-1

    Partner Presentation
    Fortifying your Security Operations with Enhanced Visibility

    Arrow
    • Enhance detection and response capabilities by leveraging advanced security tools to improve visibility and quickly identify potential threats.
    • Strengthen situational awareness by gaining a comprehensive view of your attack surface and utilising cyber threat intelligence to better anticipate emerging risks.
    • Bolster overall security posture through proactive risk prioritisation and refined response strategies, ensuring more effective and targeted defence actions.
  • 14:10

    Panel: OT Security— So What? Why Cyber Security Can't Just Take Over OT

    Arrow
    • How do you address the misconception that traditional IT security measures can be directly applied to OT systems?
    • How can OT security leaders effectively communicate the unique risks and challenges of OT systems to senior management?
    • How can we ensure OT security remains a priority without over-relying on cyber security frameworks designed for IT?
    • How can OT security leaders balance the need for updates with the realities of maintaining legacy equipment in critical operational environments?
    • How do you see the growing trend of convergence between IT, OT, and IoT impacting security operations and incident response?

    Moderator:

    Miriam Sanchez-Blanco, CTO, City of Stirling

    Panellists:

    Trevlyn Farrar, Principal Program Officer Cyber Security, WA Health

    Rob Labbe, CEO & CISO in Residence, Mining and Metals ISAC

    Osmar Couto, Senior Principal Consultant – OT Cyber Security, Worley 

    Dane Hobson, Head of Cyber Security, Western Power

  • 14:45
    Partner-1

    Partner Presentation
    Optimising Cyber Defences in the Cloud: Best Practices for Future-Proof Security

    Arrow
    • Develop adaptive security strategies to address the rapidly evolving cloud threat landscape.
    • Focus on integrated cloud security tools and their role in protecting sensitive data across hybrid environments.
    • Gain actionable insights into how to align cloud security with the business’s growth objectives while maintaining strong defence postures. 
  • 15:10
    KeyvanAnsari-HeadShot

    ML for Phishing Defence: Decoding Psychological Manipulation in Real Time

    Dr Keyvan Ansari - Senior Lecturer in Information Technology - Murdoch University

    Arrow
    • Leverage NLP and machine learning to identify psychological manipulation.
    • Explore the potential of deep learning for improving email phishing detection and protecting against this pervasive threat.
    • Evaluate the effectiveness of different deep learning architectures and techniques for email phishing detection.

  • Afternoon Tea Break

  • 16:05
    Partner-1

    Cyber in 5: Key Insights from Cythera’s CISO Survey

    Senior representative - - Cythera

    Arrow

    A quick, 5-minute dive into the key findings from Cythera’s latest CISO survey, highlighting the top trends and insights shaping the future of cyber security leadership.

  • 16:10
    Panel Discussion-1

    Panel: Invest Smart, Secure Smart– Maximising the Value through Strategic Resource Allocation

    Arrow
    • What strategies effectively prioritise resource allocation towards high-value targets without over-allocating to less critical areas? What metrics or KPIs should be tracked?
    • How crucial are comprehensive risk assessments for identifying critical assets?
    • How can businesses balance thorough risk assessments with the fast-paced threat landscape?
    • What are the main challenges in getting the board to prioritise cyber security investments, and how do you tackle them? What do you do when the board says no?

    Moderator

    Gavin Ryan, Global Head of Information Security, Navitas

    Panellists

    Karen Owens, CISO, Insurance Commission of WA

    Helen McLeish, Chief Cybersecurity Officer, East Metropolitan Health Service

    Robbie Whittome, CISO, Curtin University

    Dwayne Dias, Cyber Security Manager, NRW Holdings

  • 16:45
    Panel Discussion-1

    Panel: Building Resilience from Within– Fostering a Cyber-Aware Culture

    Arrow
    • Understand the influence of human behaviour and organisational culture on the effectiveness of cyber security practices.
    • Implement strategies to foster a security-conscious mindset, encouraging proactive cyber hygiene and responsible digital behaviour across the workforce.
    • Measure and evaluate the impact of security awareness initiatives, refining approaches to maintain a continuously improving cyber-aware culture.
    • Empower employees to become active defenders, fortifying the organisation’s resilience.

    Moderator: 

    Caitriona Forde, Managing Director, caIT Cyber Safe

    Panellists:

    Peter Gigengack, Director Cyber Security, Department of the Premier and Cabinet of WA 

    Marie Knights, Head of Cyber Influence and Education, Ramsay Healthcare

    Mia Araminta, Cyber Security Resilience Lead, South32 

    Gavin Ryan, Global Head of Information Security, Navitas 

    Faiza Khawar, President & Chair of the Board of Directors, ISACS Perth Chapter

  • 17:20

    CISO Perth 2025 Chair's Closing

  • 17:20

    Cheers with Peers