• 11 Jun, 2026

    Cyber Resilience Summit WA 2026

    Location Pin 1 Streamline Icon: https://streamlinehq.com

    Residence on Langley Park

  • Connect with WA’s leading cyber minds as they explore real-world threats, smarter defence strategies and how to strengthen organisational resilience.

  • 0+

    Delegates

  • 0+

    Speakers

  • 0+

    Sessions

  • Line Arrow Diagonal Bottom Right Large Streamline Icon: https://streamlinehq.com

    With threat actors getting more organised and sophisticated, it is vital to shift to an assumed breach mindset.

    This cyber security conference in Perth will bring together cyber security leaders from across WA to collaborate on the best practice in cyber defence for the contemporary threat landscape.

    Cyber criminals have come a long way from individuals and small groups seeking a technical challenge or notoriety. While those individuals still exist we now see well organised, sophisticated and sometimes state backed hacking groups. For any organisations it’s not whether they can be hacked but how much time and resources would it take to do so and is it worth it.

    This cybersecurity conference Australia event will will explore the evolving characteristics, motivations and tactics of these hacking groups. On the defenders side we will look at the best practices in testing monitoring, incident response, crisis management and recovery capabilities with practical insights into security measures, vulnerability assessment and risk management for security professionals across Western Australia.

    Meet our Speakers

    Head of Cyber Security

    Adam Spight speaking at Cyber Resilience Summit WA 2026

    Chief Information Security Officer

    Michele Clement

    Director, Defence Engagement

    Michele Clement speaking at Cyber Resilience Summit WA 2026

    Manager Cyber Security & Network Controls (CISO)

    David Taylor speaking at Cyber Resilience Summit WA 2026

    Senior Manager, Cyber Security & Risk

    Joel Earnshaw speaking at Cyber Resilience Summit WA 2026
    Kritika Bhardwaj

    Superintendent Cyber Security Operations

    Kritika Bhardwaj speaking at Cyber Resilience Summit WA 2026

    Featured Topics for the Day

    The rise of nation state cyber threats and it's implications on Australian security
    Optimising Security Monitoring, Detection & Assurance for Contemporary Cyber Threats
    Driving Organisation Wide Readiness: Building your Cyber Incident Response & Crisis Management Capabilities
    Embedding Organisation Wide Cyber Responsibility: Keeping Staff & Customers Secure

    9:00 am

    Welcome Remarks

    Welcome Remarks

    Duration: 10 min

    9:10 am

    Attendee Spotlight

    Attendee Spotlight

    Duration: 30 min

    9:40 am

    Panel Discussion

    Panel Discussion

    The rise of nation state cyber threats and its implications on Australian security

    Duration: 40 min

    Michele Clement,

    David Taylor,

    Neil Bray,

    10:20 am

    Case Study

    Case Study

    Securing a Nation: The Evolving Role of Telcos in Cyber Resilience

    Duration: 20 min

    11:10 am

    Interactive Scenario

    Interactive Scenario

    In your tables put yourself in the shoes of an attacker and decide on your strategy

    Duration: 30 min

    11:40 am

    Panel Discussion

    Panel Discussion

    Optimising Security Monitoring, Detection & Assurance for Contemporary Cyber Threats

    Duration: 40 min

    Adam Spight,

    Chad Madafari,

    Kritika Bhardwaj,

    12:20 pm

    Case Study

    Case Study

    Unpacking the 2026 Threat Report: What we Have Seen & Where we are Heading

    Duration: 20 min

    1:20 pm

    Interactive Workshops

    Interactive Workshops

    • Identity is the New Perimeter: extending zero trust across every authentication

    • Exploring the do’s and don’ts of automated vulnererability management

    • Designing for failure: building systems that stay operational during a cyber attack

    • Effectively integrating multilayered protection with endpoint security

    • Tailoring threat intelligence to your organisation’s cyber adversaries

    Duration: 50 min

    2:10 pm

    Panel Discussion

    Panel Discussion

    Driving Organisation Wide Readiness: Building your Cyber Incident Response & Crisis Management Capabilities

    Duration: 40 min

    Joel Earnshaw,

    Trevlyn Farrar ,

    Sheavy Kaur ,

    Chris Stannage ,

    2:50 pm

    Case Study

    Case Study

    Building Cyber Resilience in the Face of Shadow AI

    Duration: 20 min

    3:30 pm

    Keynote

    Keynote

    The Insider Threat: Developing a Cohesive Strategy to Protect Against the Most Severe Vulnerability

    Duration: 30 min

    4:00 pm

    Closing Remarks Followed by Networking Drinks

    Duration: 1 hr

    Who Should Attend the Cyber Resilience Summit WA 2026

    Check Circle Streamline Icon: https://streamlinehq.com

    Chief Information Security Officers

    Check Circle Streamline Icon: https://streamlinehq.com

    Chief Information Officers

    Check Circle Streamline Icon: https://streamlinehq.com

    Heads of Cybersecurity

    Check Circle Streamline Icon: https://streamlinehq.com

    Heads of Information Security

    Check Circle Streamline Icon: https://streamlinehq.com

    Heads of IT

    Check Circle Streamline Icon: https://streamlinehq.com

    Head of Technology Risk

    Welcome Remarks

    Start:
    End:

     

    Duration:

    Attendee Spotlight

    Start:
    End:

     

    Duration:

    Panel Discussion
    The rise of nation state cyber threats and its implications on Australian security

    Start:
    End:

     

    Duration:

    Michele Clement
    David Taylor
    Neil Bray

    Case Study
    Securing a Nation: The Evolving Role of Telcos in Cyber Resilience

    Start:
    End:

     

    Duration:

    Interactive Scenario
    In your tables put yourself in the shoes of an attacker and decide on your strategy

    Start:
    End:

     

    Duration:

    Panel Discussion
    Optimising Security Monitoring, Detection & Assurance for Contemporary Cyber Threats

    Start:
    End:

     

    Duration:

    Adam Spight
    Chad Madafari
    Kritika Bhardwaj

    Case Study
    Unpacking the 2026 Threat Report: What we Have Seen & Where we are Heading

    Start:
    End:

     

    Duration:

    Interactive Workshops

    • Identity is the New Perimeter: extending zero trust across every authentication

    • Exploring the do’s and don’ts of automated vulnererability management

    • Designing for failure: building systems that stay operational during a cyber attack

    • Effectively integrating multilayered protection with endpoint security

    • Tailoring threat intelligence to your organisation’s cyber adversaries

    Start:
    End:

     

    Duration:

    Panel Discussion
    Driving Organisation Wide Readiness: Building your Cyber Incident Response & Crisis Management Capabilities

    Start:
    End:

     

    Duration:

    Joel Earnshaw
    Trevlyn Farrar
    Sheavy Kaur
    Chris Stannage

    Case Study
    Building Cyber Resilience in the Face of Shadow AI

    Start:
    End:

     

    Duration:

    Keynote
    The Insider Threat: Developing a Cohesive Strategy to Protect Against the Most Severe Vulnerability

    Start:
    End:

     

    Duration:

    Closing Remarks Followed by Networking Drinks

    Start:
    End:

     

    Duration: