
Connect with WA’s leading cyber minds as they explore real-world threats, smarter defence strategies and how to strengthen organisational resilience.
Delegates
Speakers
Sessions
With threat actors getting more organised and sophisticated, it is vital to shift to an assumed breach mindset.
This cyber security conference in Perth will bring together cyber security leaders from across WA to collaborate on the best practice in cyber defence for the contemporary threat landscape.
Cyber criminals have come a long way from individuals and small groups seeking a technical challenge or notoriety. While those individuals still exist we now see well organised, sophisticated and sometimes state backed hacking groups. For any organisations it’s not whether they can be hacked but how much time and resources would it take to do so and is it worth it.
This cybersecurity conference Australia event will will explore the evolving characteristics, motivations and tactics of these hacking groups. On the defenders side we will look at the best practices in testing monitoring, incident response, crisis management and recovery capabilities with practical insights into security measures, vulnerability assessment and risk management for security professionals across Western Australia.
Meet our Speakers
Featured Topics for the Day
View Agenda
9:00 am
Welcome Remarks
Welcome Remarks
9:10 am
Attendee Spotlight
Attendee Spotlight
9:40 am
Panel Discussion
Panel Discussion
The rise of nation state cyber threats and its implications on Australian security
Michele Clement,
David Taylor,
Neil Bray,
10:20 am
Case Study
Case Study
Securing a Nation: The Evolving Role of Telcos in Cyber Resilience
11:10 am
Interactive Scenario
Interactive Scenario
In your tables put yourself in the shoes of an attacker and decide on your strategy
11:40 am
Panel Discussion
Panel Discussion
Optimising Security Monitoring, Detection & Assurance for Contemporary Cyber Threats
Adam Spight,
Chad Madafari,
Kritika Bhardwaj,
12:20 pm
Case Study
Case Study
Unpacking the 2026 Threat Report: What we Have Seen & Where we are Heading
1:20 pm
Interactive Workshops
Interactive Workshops
Identity is the New Perimeter: extending zero trust across every authentication
Exploring the do’s and don’ts of automated vulnererability management
Designing for failure: building systems that stay operational during a cyber attack
Effectively integrating multilayered protection with endpoint security
Tailoring threat intelligence to your organisation’s cyber adversaries
2:10 pm
Panel Discussion
Panel Discussion
Driving Organisation Wide Readiness: Building your Cyber Incident Response & Crisis Management Capabilities
Joel Earnshaw,
Trevlyn Farrar ,
Sheavy Kaur ,
Chris Stannage ,
2:50 pm
Case Study
Case Study
Building Cyber Resilience in the Face of Shadow AI
3:30 pm
Keynote































