-
CISO Perth 2025 - AGENDA
-
08:30
Register; grab a coffee. Mix, mingle and say hello to peers old and new.
-
08:50
Welcome from Corinium and the Chairperson
Dan Haagman - Doctoral Security Researcher -
-
09:00
Speed Networking – Making New Connections!
In this 10-minute networking session, the goal is to connect with three new people. Let the questions on the screen spark your conversation. Enjoy the opportunity to expand your network!
-
09:10
Opening Presentation: Unpacking the 2023-2030 Australian Cyber Security Strategy
Senior representative - National Cyber Security Office - Department of Home Affairs
- Uncover what lies ahead - a brief guide outlining key initiatives, strategic imperatives and the challenges that CISOs must navigate.
- Deepen your understanding of the vision of the 2023-2030 Australian Cyber Security Strategy to empower you with actionable strategies to craft a path to success.
- Learn about the key challenges and success factors identified for the strategy, including the need for long-term commitment, flexibility, and alignment with global allies.
-
09:35
Panel: The Chain Reaction– Assess, Mitigate and Manage Supply Chain Cyber Risk
- Identify key vulnerabilities in the supply chain, focusing on gaps in vendor cyber security practices and their potential business impacts.
- Examine the anatomy of supply chain attacks, highlighting the critical role of risk assessment, due diligence, and continuous third-party monitoring.
- Implement actionable strategies for improving vendor oversight and securing the entire supply chain against evolving cyber threats.
- Develop tailored mitigation strategies to address financial, reputational, and operational risks posed by third-party vulnerabilities.
Moderator:
Neel Goradia, Cyber Security Lead, Pilbara Minerals
Panellists:
Joel Earnshaw, Senior Manager Cyber Security, Perenti
George Siemens, Cyber Security, Risk & Compliance Officer, CalEnergy Resources (Australia)
Tara Lie, Information & Technology Governance Manager, Department of Water and Environmental Regulation
Jason Fraser, Head of Cyber & Influence, Capricorn Society
Senior representative, Delinea
-
10:10
Partner Presentation
Harnessing Global Threat Intelligence to Stay Ahead of the GameBy consolidating threat feeds from a global source of intel, businesses can swiftly adapt security configurations to counter emerging risks. This streamlined approach simplifies security management across diverse systems, empowering proactive defence against evolving cyber threats. Join us as we explore how this integration enhances organizational resilience and fortifies digital assets against today's dynamic threat landscape.
-
10:35
Morning Coffee Break
-
11:05
Partner Presentation
The Impact of the Evolving Threat Landscape on the “Defender’s DilemmaDue to the constant evolution of our internal networks and in the face of an unforgiving threat landscape, Security Operations teams are constantly looking at new ways to enhance their visibility in order to better anticipate cyber threats. This session will explore the importance of how enhanced detection and response capabilities, visibility of your attack surface, and cyber threat intelligence can be helpful in better focusing your cyber security defences.
-
11:30
Unlocking the Value: Elevating Cyber Security from Technical Concern to Strategic Asset
Robbie Whittome - CISO - Curtin University
- Discuss how cyber security initiatives can be better aligned with overall business goals to enhance organisational resilience and growth.
- Explore how other C-suite members can be effectively engaged in cyber security strategies to ensure it is prioritised at the highest levels of the organisation.
- Highlighting how cyber security, when positioned as a strategic asset, can drive business value, increase organisational resilience, and create a competitive advantage.
- Discuss how organisations develop more proactive approaches to managing cyber risks
-
11:55
Partner Presentation
Risk Intelligence at Scale: Are You Risk Operations Centre Ready?- Discover how a Risk Operations Centre (ROC) enhances cyber risk management through real-time monitoring and proactive decision-making.
- Understand key concepts like Value at Risk (VAR) and Enterprise True Risk Management (ETM) to prioritise threats effectively.
- Learn the “language of risk” for clearer communication of cyber threats to senior leadership and stakeholders.
- Gain insights into building or optimising a ROC to align risk management with organisational objectives.
-
12:20
Redefining the Role of CISO to Drive Innovation
Rob Labbé - CEO & CISO in Residence - Mining and Metals ISAC
- Exploring how the CISO’s responsibilities are evolving from solely managing risks to enabling business growth and innovation.
- Understanding how CISOs can design adaptable security frameworks that support business agility and innovation while safeguarding against emerging threats.
- Discussing how CISOs can cultivate a mindset where security is not seen as a barrier but as a driver of business agility, empowering teams to innovate with confidence.
-
12:45
Lunch
-
Track A: Strategic Resilience
Track A Chair: Dan Haagman, - Doctoral Security Researcher -
-
13:45
Partner Presentation
Resilient by Design: Embedding Cyber Security in Operational Resilience Planning- Integrate cyber security into business continuity by applying best practices for creating robust resilience plans.
- Leverage frameworks to proactively assess and mitigate risks before they disrupt critical business operations.
- Learn from real-world case studies on how strategic resilience planning helped organisations maintain stability and safeguard vital assets amidst cyber threats.
-
14:10
Panel: From Risk to Transformation– AI's Impact on Next-Gen Cyber Security
- How would you assess the current level of AI implementation within your organisation?
- What challenges have you encountered in adopting AI, and how have you addressed them?
- What are the key criteria and considerations for evaluating AI technologies as part of a holistic cyber risk management strategy?
- What indicators or benchmarks should organisations consider to evaluate the effectiveness of AI-driven cyber defence initiatives?
Moderator:
Vannessa Van Beek, CSO30 2024 & vCISO, Pax Security
Panellists:
Daryll Holland, CISO, Education Horizons
Tim Downing, CISO, Clean Energy Finance Corporation
Brenda van Rensburg, Cyber Security GRC & Assurance Specialist, P&N Bank
Prashant Singh, Member Board of Directors, ISACA Perth Chapter -
14:45
Partner Presentation
Critical Infrastructure: Empowering Resilience for Thriving Businesses and Communities- Uncover the risks that vulnerable infrastructure poses to local businesses and communities, impacting economic growth and public safety.
- Collaborate with industry partners, local leaders, and stakeholders to develop resilient infrastructure strategies that support sustainable operations and community wellbeing.
- Gain insights into cutting-edge technologies and innovative practices driving infrastructure resilience and operational continuity.
-
15:10
Maturity Uplift for the Essential 8 and the "Further Five"
Steve Woods - CISO - Department of Justice WA
- Implement practical strategies and methodologies to elevate your maturity level within the Essential 8 framework, showcasing key steps and milestones.
- Identify and address real-world challenges, bridging gaps and mitigating risks that remain even after achieving high maturity.
- Highlight effective solutions and adjustments that enhance resilience and ensure continuous improvement in cyber security practices.
-
Track B: Technical Excellence
Track B Chair: Karen Owens - CISO - Insurance Commission of WA
-
13:45
Partner Presentation
Fortifying your Security Operations with Enhanced Visibility- Enhance detection and response capabilities by leveraging advanced security tools to improve visibility and quickly identify potential threats.
- Strengthen situational awareness by gaining a comprehensive view of your attack surface and utilising cyber threat intelligence to better anticipate emerging risks.
- Bolster overall security posture through proactive risk prioritisation and refined response strategies, ensuring more effective and targeted defence actions.
-
14:10
Panel: OT Security— So What? Why Cyber Security Can't Just Take Over OT
- How do you address the misconception that traditional IT security measures can be directly applied to OT systems?
- How can OT security leaders effectively communicate the unique risks and challenges of OT systems to senior management?
- How can we ensure OT security remains a priority without over-relying on cyber security frameworks designed for IT?
- How can OT security leaders balance the need for updates with the realities of maintaining legacy equipment in critical operational environments?
- How do you see the growing trend of convergence between IT, OT, and IoT impacting security operations and incident response?
Moderator:
Miriam Sanchez-Blanco, CTO, City of Stirling
Panellists:
Trevlyn Farrar, Principal Program Officer Cyber Security, WA Health
Rob Labbe, CEO & CISO in Residence, Mining and Metals ISAC
Osmar Couto, Senior Principal Consultant – OT Cyber Security, Worley
Dane Hobson, Head of Cyber Security, Western Power
-
14:45
Partner Presentation
Optimising Cyber Defences in the Cloud: Best Practices for Future-Proof Security- Develop adaptive security strategies to address the rapidly evolving cloud threat landscape.
- Focus on integrated cloud security tools and their role in protecting sensitive data across hybrid environments.
- Gain actionable insights into how to align cloud security with the business’s growth objectives while maintaining strong defence postures.
-
15:10
ML for Phishing Defence: Decoding Psychological Manipulation in Real Time
Dr Keyvan Ansari - Senior Lecturer in Information Technology - Murdoch University
- Leverage NLP and machine learning to identify psychological manipulation.
- Explore the potential of deep learning for improving email phishing detection and protecting against this pervasive threat.
- Evaluate the effectiveness of different deep learning architectures and techniques for email phishing detection.
-
Afternoon Tea Break
-
16:05
Cyber in 5: Key Insights from Cythera’s CISO Survey
Senior representative - - Cythera
A quick, 5-minute dive into the key findings from Cythera’s latest CISO survey, highlighting the top trends and insights shaping the future of cyber security leadership.
-
16:10
Panel: Invest Smart, Secure Smart– Maximising the Value through Strategic Resource Allocation
- What strategies effectively prioritise resource allocation towards high-value targets without over-allocating to less critical areas? What metrics or KPIs should be tracked?
- How crucial are comprehensive risk assessments for identifying critical assets?
- How can businesses balance thorough risk assessments with the fast-paced threat landscape?
- What are the main challenges in getting the board to prioritise cyber security investments, and how do you tackle them? What do you do when the board says no?
Moderator
Gavin Ryan, Global Head of Information Security, Navitas
Panellists
Karen Owens, CISO, Insurance Commission of WA
Helen McLeish, Chief Cybersecurity Officer, East Metropolitan Health Service
Robbie Whittome, CISO, Curtin University
Dwayne Dias, Cyber Security Manager, NRW Holdings
-
16:45
Panel: Building Resilience from Within– Fostering a Cyber-Aware Culture
- Understand the influence of human behaviour and organisational culture on the effectiveness of cyber security practices.
- Implement strategies to foster a security-conscious mindset, encouraging proactive cyber hygiene and responsible digital behaviour across the workforce.
- Measure and evaluate the impact of security awareness initiatives, refining approaches to maintain a continuously improving cyber-aware culture.
- Empower employees to become active defenders, fortifying the organisation’s resilience.
Moderator:
Caitriona Forde, Managing Director, caIT Cyber Safe
Panellists:
Peter Gigengack, Director Cyber Security, Department of the Premier and Cabinet of WA
Marie Knights, Head of Cyber Influence and Education, Ramsay Healthcare
Mia Araminta, Cyber Security Resilience Lead, South32
Gavin Ryan, Global Head of Information Security, Navitas
Faiza Khawar, President & Chair of the Board of Directors, ISACS Perth Chapter
-
17:20
CISO Perth 2025 Chair's Closing
-
17:20
Cheers with Peers
Not Found