About | Exhibitors | Speakers | Reviews | Deals |
You are heading to the event with 19 people! Who's coming with you?
Share
The premier industry event showcasing the latest advancements in Data Architecture solutions. Join expert speakers for discussions on Data Ethics and Responsible AI, keynote presentations, and panel discussions. Network with industry leaders and AI pioneers to explore the business value of innovative data architecture applications.
Listed In
You are heading to the event with 19 people! Who's coming with you?
Share
Timings08:20 AM - 11:50 PM
General Hours | Entry FeesCheck Official Website |
Estimated Turnout100 - 500 Delegates Based on previous editions | Event TypeConference |
EditionsFeb 2025Frequency Not Available | Official LinksWebsiteContacts Report Error Claim this event |
Organizer![]() Queries about the event?
Ask Organizer
| |
-33.906489151.230065 Venue Map & Directions |
Write a Review
Add Your Review EditionFeb 2025
How did you participate in this event?
Visitor
Exhibitor
Speaker
Followers [ Users who have shown interest for this Event ] Join Community Invite
Sort By
Schedule & Agenda
Tue, 11 Feb 08:20 AM - 08:50 AM | Register; grab a coffee. Mix, mingle and say hello to peers old and new. | |
Tue, 11 Feb 08:50 AM - 09:00 AM | Welcome from Corinium and the Chairperson | |
Tue, 11 Feb 09:00 AM - 09:25 AM | Adopting a practical approach to OT risk | |
Tue, 11 Feb 09:25 AM - 09:50 AM | Asset Intelligence: The Bedrock of Cyber Security | |
Tue, 11 Feb 09:50 AM - 10:45 AM | Develop and Implement a Software as a Service Security Program | |
Tue, 11 Feb 10:45 AM - 11:10 AM | Wireless attacks on IoT in 2025 | |
Tue, 11 Feb 11:10 AM - 11:35 AM | Zero Trust in Critical Infra: from Cyber Conscious to Cyber Resilient | |
Tue, 11 Feb 11:35 AM - 12:10 PM | Panel: OT Compliance and Standards – Are you Resilient Enough? | |
Tue, 11 Feb 12:05 PM - 12:30 PM | Ransomware, Risk & Recovery - Is Your Hybrid Active Directory Secure from Cyberattacks? | |
Tue, 11 Feb 12:10 PM - 12:35 PM | The Chain Reaction - Take Control of Supply Chain Cyber Risk | |
Tue, 11 Feb 12:15 PM - 01:55 PM | Mental Health Roundtable | |
Tue, 11 Feb 12:30 PM - 02:15 PM | Panel discussion: Harnessing cyber awareness to your company’s advantage | |
Tue, 11 Feb 12:35 PM - 02:00 PM | Using Gen AI in OT risk management | |
Tue, 11 Feb 01:20 PM - 01:45 PM | Group discussion: Preventing social engineering attacks | |
Tue, 11 Feb 01:20 PM - 01:45 PM | Building and scaling developer-led security culture | |
Tue, 11 Feb 01:45 PM - 02:10 PM | Developing a maturity model – What Australia can learn from US Government cybersecurity | |
Tue, 11 Feb 01:45 PM - 02:10 PM | Getting security into your quality and safety engineering plans | |
Tue, 11 Feb 01:55 PM - 02:20 PM | Adopting good cyber-hygiene across your supply chain | |
Tue, 11 Feb 01:55 PM - 02:45 PM | Cyber Awareness ‘Gamification’ for Executives | |
Tue, 11 Feb 02:00 PM - 02:35 PM | Panel: Protecting Operations Technology from increased cyber risks | |
Tue, 11 Feb 02:10 PM - 03:10 PM | Group discussion: Recovering from cyber incidents in CI | |
Tue, 11 Feb 02:10 PM - 03:10 PM | Group discussion: Tackling cultural challenges and changing paradigms | |
Tue, 11 Feb 02:15 PM - 02:40 PM | Creating a robust security strategy | |
Tue, 11 Feb 02:15 PM - 02:40 PM | What do you need to know about the Cloud before totally going for it? | |
Tue, 11 Feb 02:20 PM - 02:45 PM | Harnessing asset data to transform your cyber security program | |
Tue, 11 Feb 02:35 PM - 03:00 PM | Incident Management Strategies for Critical Infrastructure Operators | |
Tue, 11 Feb 02:40 PM - 03:05 PM | Why PAM is Essential for the Essential Eight | |
Tue, 11 Feb 02:40 PM - 03:05 PM | Adversarial Hygiene: Security that doesn’t Stink! | |
Tue, 11 Feb 02:45 PM - 03:10 PM | Strengthening your Zero Trust Security Model | |
Tue, 11 Feb 02:45 PM - 03:10 PM | Data Security Predictions: Staying Cyber Resilient in 2023 | |
Tue, 11 Feb 03:00 PM - 03:25 PM | Improving collaboration between IT and OT teams | |
Tue, 11 Feb 03:05 PM - 03:30 PM | Cyber’s best friend: Have you brought them into the tent? | |
Tue, 11 Feb 03:05 PM - 03:30 PM | SOC Automation – dos and don’ts | |
Tue, 11 Feb 03:10 PM - 01:55 PM | Applying real-life lessons and advancing your security maturity journey | |
Tue, 11 Feb 03:10 PM - 04:05 PM | Mastering the skills of effective communication with the board | |
Tue, 11 Feb 03:10 PM - 03:35 PM | Following civil aviation as a role model for CI protection | |
Tue, 11 Feb 03:10 PM - 03:35 PM | Group discussion: Getting your engineering team engaged in software and infrastructure | |
Tue, 11 Feb 03:25 PM - 04:20 PM | Convergence of physical and cybersecurity | |
Tue, 11 Feb 03:30 PM - 03:55 PM | End-to-End Customer Journeys Optimized for Security and Convenience | |
Tue, 11 Feb 03:30 PM - 03:55 PM | Organisational Considerations for Impending GPDR like Regulations to Cyber, Data Governance and Data Privacy Teams | |
Tue, 11 Feb 03:35 PM - 04:00 PM | Successful practices for critical infrastructure security documentation | |
Tue, 11 Feb 03:35 PM - 04:00 PM | Shifting Left – How far could we go, and could we go all the way with it? | |
Tue, 11 Feb 03:55 PM - 02:15 PM | How to adopt a security by design approach | |
Tue, 11 Feb 03:55 PM - 04:20 PM | Sharpening your Cloud standards and compliance practices | |
Tue, 11 Feb 04:00 PM - 04:35 PM | Wrap-up group discussion: What’s next? | |
Tue, 11 Feb 04:00 PM - 04:35 PM | Wrap-up group discussion: Influencing behavioural economics & psychologies | |
Tue, 11 Feb 04:05 PM - 04:30 PM | Overview of Cyber City - the Cyber Security Learning Experience | |
Tue, 11 Feb 04:20 PM - 04:45 PM | Defence in Depth in CI – Technology and Process | |
Tue, 11 Feb 04:20 PM - 05:20 PM | Cocktail in the Cloud - API Security and Visibility in the Cloud | |
Tue, 11 Feb 04:30 PM - 04:55 PM | Wrap-up Panel: What’s Next? | |
Tue, 11 Feb 04:35 PM - 04:40 PM | Closing remarks | |
Tue, 11 Feb 04:40 PM - 08:20 PM | End of Critical Infrastructure Focus Day | |
Tue, 11 Feb 04:40 PM - 08:20 PM | End of DevSecOps Focus Day | |
Tue, 11 Feb 04:45 PM - 05:10 PM | Ransomware and social engineering on OT environments | |
Tue, 11 Feb 04:50 PM - 05:15 PM | Be the Thermostat not a Thermometer | |
Tue, 11 Feb 04:55 PM - 09:50 PM | Closing remarks from the Chair | |
Tue, 11 Feb 05:10 PM - 07:15 PM | OT Security 2025 Close & Networking Drinks | |
Tue, 11 Feb 05:15 PM - 05:40 PM | Keynote of Success: Like being challenged? Strategies to report risks to the board | |
Tue, 11 Feb 05:40 PM - 06:05 PM | Fireside chat: Can CEOs and CISOs work better together & collaborate? | |
Tue, 11 Feb 06:05 PM - 07:00 PM | Day One Close and CISOs Cocktail Reception & Networking - Continue the conversations in a fun and entertaining way | |
Tue, 11 Feb 07:15 PM - 08:20 PM | VIP Breakfast – Invite only | |
Tue, 11 Feb 07:20 PM - 08:20 PM | VIP Breakfast – Invite only | |
Tue, 11 Feb 08:20 PM - 09:00 PM | Register; grab a coffee. Mix, mingle and say hello to peers old and new. | |
Tue, 11 Feb 08:20 PM - 08:50 PM | Register; grab a coffee. Mix, mingle and say hello to peers old and new. | |
Tue, 11 Feb 08:50 PM - 09:00 PM | Welcome from Corinium and the Chairperson | |
Tue, 11 Feb 09:00 PM - 09:15 PM | Welcome from Corinium and the Chairperson | |
Tue, 11 Feb 09:00 PM - 09:25 PM | Earning the 'O' in your CISO role | |
Tue, 11 Feb 09:00 PM - 09:25 PM | Ministerial Keynote: NSW Government plans to support organisations prepare for fast-growing cyber threats | |
Tue, 11 Feb 09:00 PM - 09:25 PM | Ministerial Keynote: Australian Government & Industries partnering up to tackle the talent gap through skills and training | |
Tue, 11 Feb 09:00 PM - 09:25 PM | Setting the Scene: Accelerating your digital business strategy | |
Tue, 11 Feb 09:15 PM - 09:40 PM | Keynote: Leveraging cybersecurity as a business growth enabler | |
Tue, 11 Feb 09:25 PM - 09:50 PM | Keynote: Battling the threat evolution – trends, advice and key considerations for Australian businesses | |
Tue, 11 Feb 09:25 PM - 09:50 PM | Mitigating real-world damage from attacks to critical infrastructure | |
Tue, 11 Feb 09:25 PM - 09:50 PM | Emotional intelligence for cybersecurity leaders | |
Tue, 11 Feb 09:25 PM - 09:50 PM | The fusion of DevOps and DevSecOps | |
Tue, 11 Feb 09:40 PM - 10:05 PM | Top Cloud Threats in 2023 | |
Tue, 11 Feb 09:50 PM - 10:50 PM | How Deep Learning is Unlocking a $362B Value Creation Opportunity in Financial Services | |
Tue, 11 Feb 09:50 PM - 11:00 PM | Keynote: Implementing successful ransomware protection strategies | |
Tue, 11 Feb 09:50 PM - 09:50 PM | How Deep Learning is Unlocking a $362B Value Creation Opportunity in Financial Services | |
Tue, 11 Feb 09:50 PM - 07:20 PM | How Deep Learning is Unlocking a $362B Value Creation Opportunity in Financial Services | |
Tue, 11 Feb 09:50 PM - 10:45 PM | Detecting and preventing real threats to critical infrastructure | |
Tue, 11 Feb 09:50 PM - 09:50 PM | Keynote: Embracing cybersecurity in 2023 – Building an effective program | |
Tue, 11 Feb 09:50 PM - 09:55 PM | Fireside Chat: How Deep Learning is Unlocking a $362B Value Creation Opportunity in Financial Services | |
Tue, 11 Feb 09:50 PM - 10:45 PM | Keynote: A framework for secure software development | |
Tue, 11 Feb 09:55 PM - 10:00 PM | Group Discussion: How Deep Learning is Unlocking a $362B Value Creation Opportunity in Financial Services | |
Tue, 11 Feb 10:00 PM - 10:05 PM | Panel Discussion: How Deep Learning is Unlocking a $362B Value Creation Opportunity in Financial Services | |
Tue, 11 Feb 10:05 PM - 09:50 PM | Ministerial Virtual Keynote: Australian Government & Industries partnering up to tackle the talent gap through skills and training | |
Tue, 11 Feb 10:05 PM - 07:20 PM | Solutions Clinic: How Deep Learning is Unlocking a $362B Value Creation Opportunity in Financial Services | |
Tue, 11 Feb 10:05 PM - 10:05 PM | Solutions Clinic: How Deep Learning is Unlocking a $362B Value Creation Opportunity in Financial Services | |
Tue, 11 Feb 10:45 PM - 11:10 PM | Keynote: Understanding the full spectrum and preparing for the SOCI Act Reforms | |
Tue, 11 Feb 10:45 PM - 11:10 PM | How to get your DevSecOps maturity model right | |
Tue, 11 Feb 10:50 PM - 11:15 PM | Keynote: Proactive cybersecurity – stepping up your efforts | |
Tue, 11 Feb 11:00 PM - 11:25 PM | Keynote: Cyber strategy – Creating a secure innovation pathway | |
Tue, 11 Feb 11:10 PM - 11:45 PM | Go beyond compliance with your critical OT | |
Tue, 11 Feb 11:10 PM - 11:45 PM | Can we trust developers to handle security? | |
Tue, 11 Feb 11:15 PM - 11:40 PM | Minimising User Exposure to Threats | |
Tue, 11 Feb 11:25 PM - 11:50 PM | Cybercrime as a Service (CaaS): How Criminals are Bypassing MFA, SMS Toll Fraud, and More | |
Tue, 11 Feb 11:40 PM - 12:05 PM | Inspirational Keynote: Don’t blame the victim | |
Tue, 11 Feb 11:45 PM - 01:20 PM | Keynote Panel: Compliance burden – How much regulation is too much? | |
Tue, 11 Feb 11:45 PM - 01:20 PM | Keynote Panel: What is good and bad when measuring DevSecOps? | |
Tue, 11 Feb 11:50 PM - 12:15 PM | Keynote: Building a sound and effective cybersecurity program |
-33.906489151.230065
Venue Map & Directions

Alison Rd, Randwick NSW 2031
Sydney,
Australia
More Events in Sydney
![]() | Sydney Morning Herald Schools Summit Sydney, Australia |
Apr 082025 | TheMHS Autumn Forum Sydney, Australia |
May 152025 | Annual Future Fund Admin - The Future of Superannuation Fund Administration Forum Sydney, Australia |
May 282025 | AIRA Annual Conference Sydney, Australia |
Jun 252025 | Professional Builders Summit Sydney, Australia |
https://10times.com/hub/technology-hub