-
CISO BRISBANE 2025 - AGENDA
-
08:30
Register; grab a coffee. Mix, mingle and say hello to peers old and new.
-
08:50
Welcome from Corinium and the Chairperson
Sanja Marais - CTSO - Aspen Medical
-
09:00
Speed Networking—Making new connections!
In this 10-minute networking session, the goal is to connect with three new people. Let the questions on the screen spark your conversation. Enjoy the opportunity to expand your network!
-
09:10
The Journey of a CISO: From IT to Influencer
Fabian Illanos Lopez - Principal Advisor, Information Management and Security - Department of Natural Resources and Mines, Manufacturing and Regional Rural Development
- Evolving the CISO Role from a technical expert to a strategic leader by balancing accountability
- Navigating board expectations, budget constraints and regulatory pressures
- Fostering sustainable leadership in high-risk environments
-
09:25
The Age of Uncertainty: Navigating the Future of Cyber Security Leadership in a Volatile Digital Landscape
- Senior Representative - Cloudflare
- Navigating the rapid rise of AI-driven attacks and sophisticated cyber threats
- Building agile cyber security strategies while fostering team resilience in times of uncertainty
- Balancing risk management with innovation to drive organizational growth and trust
-
09:50
Case Study Regulatory Burdens or Business Enablers: Balancing Compliance and Risk to deliver Meaningful Security Uplift while Enabling Innovation and Growth
Jon Coleman - GM, Cyber and Information Security - Energy Queensland
- Viewing cyber security as not just as a protective measure but as an enabler for business innovation and trust
- Aligning business strategy with key security outcomes and targets to strengthen overall organizational maturity
- Delivering prudent, risk-based security outcomes to enable business change while achieving compliance targets
-
10:25
Coffee and Connect
-
10:55
Panel Discussion: The Human Element: Strengthening Cyber-Awareness Beyond the Enterprise
- Fostering a ‘security-first’ culture and leveraging tools to reduce human error effectively
- Highlighting the importance of collaborative efforts and community initiatives to enhance awareness of phishing and newer threats
- Transforming the ‘weakest link’ narrative into a culture of accountability and vigilance
Moderator
Senior Representative Head of Cyber Resilience Queensland Government
Panellists:
Glen Gooding Head of Information Security WorkCover Queensland
Nikki Peever Director Cyber Security CAUDIT
Rob Wiggan Senior Cyber Security Advisor
-
11:25
Human vs. Machine: Advancing Offensive Strategies in the Social Engineering Epidemic
- Developing actionable strategies to combat hyper-personalised and sophisticated attacks
- Understanding the wide-reaching impact of AI in the proliferation of social engineering
- Establishing a clear protocol for addressing breaches that result from social engineering, and lessons learned from previous cases
-
11:50
Case Study: Closing the Cyber Gaps: Strategies for Resilience & Collaboration
Mat Cantarella - Chief Information Officer - FKG Group
- Breaking down Australia’s evolving cyber security regulations and how organizations can stay compliant.
- Supporting businesses of all sizes with practical strategies for stronger security postures
- Moving beyond IT silos—positioning cyber security as a business enabler, not just a cost centre
- Building a security-first mindset that integrates cyber risk into corporate strategy, financial planning, and digital transformation
-
12:15
Private Luncheon (Invite Only)
-
12:15
Lunch and networking
-
Track A: Resilience and Maturity
Chaired by: Sanja Marias - CTSO - Aspen Medical
-
13:15
Creating a Risk-Resilient Culture by Making Cyber security a Boardroom Priority
Glenn Dickman - Director of Cyber Security - Griffith University
- Transforming legislative compliance into proactive organizational culture
- Bridging gaps in maturity with practical steps for CISOs to align with boards
- Preparing for upcoming changes in privacy laws, from stricter enforcement to aligning with global frameworks like GDPR
-
12:40
From Ransomware to Resilience: A Cyber Incident Survival Roadmap
- Senior Representative - KnowBe4
- How to build and maintain a robust ransomware response plan.
- The most effective strategies for containment, recovery, and resilience.
- Insights into current and emerging ransomware trends.
-
14:05
Case Study: Opening the AI Roadmap for Security Leaders: Strategy, Ethics & Execution
Dane Warren - Head of Information Security - IOR Group
- Developing an organisational AI roadmap that enhances cyber security resilience and business alignment.
- Leveraging AI for efficiency while maintaining ethical decision-making and control.
- Implementing AI in cyber security while ensuring transparency, fairness, and regulatory adherence.
- Showcasing how organisations are leveraging AI to transform their security strategies.
-
14:30
Data – Centric Security Postures: Transforming Data Protection Strategies into Actionable Practices
- Senior Representative - Trend Micro
- Ensuring the ethical stewardship of sensitive information
- Showcasing the current regulatory landscape and its influence on data protection practices
- Key considerations for CISOs in safeguarding data, access control and monitoring of data
- Ensuring the ethical stewardship of sensitive information
-
14:55
Panel Discussion: The Evolution of AI in Cyber Security: Friend or Foe?
- Understanding AI's dual role: as a tool for defense and an enabler of sophisticated attacks.
- Examining real-world examples of AI-driven phishing, deepfakes, and targeted cyber campaigns
- How Australian organizations can use AI responsibly to strengthen their cyber security programs.
Moderator
Gaurav Vikash Head of Security and Risk AXON
Panellists
Ben Kereopa Yorke Senior InfoSec Specialist Telstra
Michael Poezyn Chief Security Officer Derivco
- Understanding AI's dual role: as a tool for defense and an enabler of sophisticated attacks.
-
15:20
Securing the Hybrid Workplace: Balancing Flexibility, Risk & Resilience
- Senior Representative - Illumio
- Strengthening authentication and access controls is essential to securing a hybrid workforce.
- Adapting to a borderless work environment by implementing a cloud-first security approach.
- Mitigating risks from remote collaboration requires addressing security gaps in employee behaviour and policies.
-
Track B: Tech, Threats and Transformation
Chaired by: Dan Haagman - Honorary Professor of Practice - Murdoch University
-
13:15
Case Study: Beyond the Weakest Link: A Roadmap to Cyber Awareness & Engagement
Felipe Abreu - Head of IT Infrastructure & Cyber Security - VAE Group
- Reframing cyber security awareness to make employees active participants, not liabilities.
- Creating cost-effective campaigns and maximizing the impact of cyber-awareness
- Tactics for shifting mindsets and engaging an indifferent workforce while maintaining compliance.
- Moving beyond the “weakest link” narrative to drive a culture of shared cyber responsibility.
-
14:20
A Tactical Approach to Cyber-Enterprise Risk Modelling
- Senior Representative - Cribl
- How to use current threat intelligence to identify and counter emerging adversaries and attack methods
- Integrating threat models with your organization’s risk management framework to make data-driven decisions and strengthen defences
- Leveraging real-time threat intelligence to anticipate and counter advanced cyber adversaries
- How to use current threat intelligence to identify and counter emerging adversaries and attack methods
-
14:05
Panel Discussion: Innovation Meets Compliance: Aligning Cyber Defences with Upcoming Regulatory Developments
- CPS 230: Addressing APRA’s new operational risk standard for enhanced governance and incident management in critical sectors.
- AML Reform Act: Ensuring seamless compliance with stricter reporting standards
- Mitigating reputational risks from weak enforcement and exploring practical strategies to integrate these frameworks for operational efficiency
- Complying with CPS 234, CPG 234, CPG 235, and other standards such as ISO27001, NIST and Essential 8
Panellists
Jeremy Leong Chief Risk Officer, Head of Risk and Compliance Taishin International Bank – Brisbane Branch
Ejaz Ahmed Cyber Security Operations Lead Airservices Australia
Ben Kereopa Yorke Senior InfoSec Specialist Telstra
-
15:00
Ransomware-as-a-Service: The New Face of Organized Cybercrime
- Senior Representative - Varonis
- Proactive measures to strengthen defences, including vulnerability management and supply chain security
- The role of collaboration between CISOs, law enforcement, and regulatory bodies in combating RaaS
- Insights into negotiation trends and the involvement of insurers in ransom payments
- Proactive measures to strengthen defences, including vulnerability management and supply chain security
-
15:35
Fireside Chat: Securing Continuity: Overcoming Challenges with Legacy Systems
As the industry evolves, maintaining continuity while managing legacy systems is crucial. This session will explore how can ensure business continuity by implementing robust backup strategies and addressing the risks of outdated systems. We’ll discuss how legacy systems may fall short of modern cyber security standards and share insights on upgrading infrastructure to safeguard client data and ensure seamless operations within critical infrastructure.
Marc Reinhardt Director, Cyber Security and IT Risk ICON GroupJohn Heaton Head of Strategy and Innovation Alex Bank
-
15:20
Auditing Cyber security: Navigating Compliance and Risk Management in Critical Infrastructure
- AI Customer Engineer - SambaNova Systems
- Evaluating the effectiveness for cyber-budget increases, consolidation of platforms vs
hiring more talent and addressing investments in the apparent skills gap - Zooming into how large organisations and suppliers handle the rising compliance demands and securing funding for necessary security initiatives
- Reshaping cyber security with up-to-date technology that can match the growing threat of new bad actors
- Evaluating the effectiveness for cyber-budget increases, consolidation of platforms vs
-
15:45
Coffee and Connect
-
16:15
Cyber in 5: Key Insights from Cythera’s CISO Survey
- Senior Representative - Cythera
A quick, 5-minute dive into the key findings from Cythera’s latest CISO survey, highlighting the top trends and insights shaping the future of cyber security leadership.
-
16:20
Panel Discussion: Creating a Resilient Mindset in Cyber Security Teams
- Fostering mental resilience in cyber teams, balancing workload and maintaining focus during high stakes crises.
- Highlighting the importance of mentorship, peer support and resources for CISOs
- The role of CISOs in shaping policies, standards, and global cyber security initiatives for mental health
Moderator
Lama Tayeh Founder & CEO LULUMPR
Panellists
Stephen Bennett CISO Domino’s
Glen Gooding Head of Information Security WorkCover Queensland -
17:10
Securing Brisbane’s Supply Chain from Small Business Vulnerabilities to Large Enterprise Risks
Hitesh Jamb - DevSecOps and Test Practice Lead - APA Group
- Best practices for vetting and securing third, fourth, and fifth parties, ensuring that all links are protected
- Strengthening collaboration and establishing comprehensive cyber security standards that cover all levels of the supply chain, from small businesses to large enterprises
- Strengthening supply chain security by ensuring continuity, and mitigating risks that stem from interconnected business relationships
-
17:35
Chairperson's Closing Remarks and End of CISO Brisbane
-
17:40
Cheers with Peers: Join us for a time of networking and drinks!
Not Found