-
OT Security Melbourne
-
08:20
Register; grab a coffee. Mix, mingle and say hello to peers old and new.
-
09:00
Welcome from Corinium and the Chairperson
Pippa Flanagan - Manager ICT & Cyber Security - GWMWater
-
09:10
Speed Networking - Making new connections!
In this 10-minute networking session, the goal is to connect with three new people. Enjoy the opportunity to expand your network! -
09:20
Be the Influencer of OT Security: Aligning IT and OT for a Unified Security Strategy
Supriya Nair - Global Security Architect - Telstra
- Discuss how to position OT security as a business priority and integrate it into the broader cyber security strategy.
- Raising awareness of OT security across the organisation for greater efficiency, less complexity and ultimately boost the bottom line.
- Establishing OT security governance and defining clear policies, roles, and responsibilities to bridge IT-OT gaps and create a unified security framework.
-
09:45
Panel: Compliance in the Real World – How to Move Beyond a Checkbox Approach
- What key aspects of the Cyber Security Act should organisations consider, particularly those regulated under SoCI and those outside its scope?
- How does the 2024 enhanced response and prevention amendment impact responsible entities, and what new obligations does it introduce?
- What strategies can organisations use to effectively implement approved cyber security frameworks to strengthen security and resilience?
- What are the practical challenges of applying governance-driven frameworks to industrial OT environments, and how can organisations integrate these frameworks into a unified, risk-based security approach?
- How can organisations prevent compliance fatigue and turn regulatory reforms into opportunities for building meaningful cyber resilience in OT environments?
Lauren Veenstra Cybersecurity Lead Iberdrola Australia
Panellists: -
10:15
Visibility is Power: Leveraging AI and Automation for OT Asset Management
Senior representative - - Tenable
-
10:40
Get Refreshed! Mingle
-
11:10
OT Cloud: How to Adapt Your OT Architecture for Cloud Applications
Shaun Price - Cybersecurity Strategy & Architecture - Transurban
- Understanding how OT networks have evolved to support cloud-based applications.
- Exploring key architectural considerations and best practices for secure OT-cloud convergence.
- Examining different approaches to integrating cloud services while maintaining security, reliability, and compliance.
- Building a secure OT Cloud strategy through implementing effective security measures to protect industrial operations in a cloud environment.
-
11:35
Asset Intelligence: The Bedrock of Cyber Security
Extensive knowledge of assets that need to be secured is foundational for any effort to secure any type of asset. It’s no surprise that the Security of Critical Infrastructure Act 2018 (SOCI) addresses this in its initial requirements and recommendations. When an Asset Intelligence platform is implemented as the bedrock of a cyber security initiative asset information is continuously collected, aggregated, correlated and analysed making all subsequent activities easier. Join us to learn what constitutes an Asset Intelligence platform and how specific capabilities optimise every step of the process to compliance.
-
12:00
Beyond Traditional Defences: Adapting OT Security to the Evolving Threat Landscape
Ariel Egber - Principal Cybersecurity Architect OT - AGL
- Examining the weaknesses of traditional OT security models and the need for a more dynamic approach.
- Enhancing real-time monitoring and threat detection to strengthen resilience against evolving cyber risks.
- Implementing proactive security strategies to mitigate threats while ensuring operational continuity.
-
12:25
Guarding the Gate: Combating Insider Threats in OT/IoT Cybersecurity
Focusing on insider threats in OT/IoT environments, this session will highlight how internal actors pose significant risks, often due to OT/IoT systems' weaker security compared to IT environments. It will explore real-world cases and explore strategies to mitigate insider risks, enhancing overall security and operational resilience in OT/IoT infrastructures.
-
12:50
Lunch
-
13:55
Panel: The Reality of Patching in OT– Balancing Risk, Cost, and Downtime
- How do you effectively assess the risk of each vulnerability and prioritise patching based on the severity of the risk?
- What strategies can help mitigate risks when patching is not immediately possible due to system limitations or operational constraints?
- How do you balance security investments in patch management with the cost of potential downtime or system failures?
- How do you collaborate and best work with vendors and suppliers in ensuring timely and secure patching?
David Worthington, GM - Digital Security & Risk, Jemena
Lu Ou Yang Group Head of Cyber Security Orora -
14:30
Convergence of Physical and Cyber Security
- Addressing the intersection of physical and cyber threats in OT environments.
- Developing an integrated security strategy that unifies physical security controls with cybersecurity measures.
- Leveraging advanced monitoring, access controls, and incident response to enhance resilience.
-
14:55
Enhancing Operational Resilience and Security through Effective OT Security Governance
Arijit Lahiri - Cyber Security Senior Consultant - Melbourne Water
- Mapping OT-specific goals to overarching business objectives to drive operational efficiency, strategic success and improved decision-making.
- Defining clear roles and responsibilities within your OT governance framework ensures accountability and prevents operational inefficiencies.
- Moving beyond a one-size-fits-all approach to ensure engineers, operators, managers, and IT staff receive targeted OT security training.
-
15:20
Incident Management Strategies for Critical Infrastructure Operators
Having an effective incident declaration process in place is key when developing your compliance strategy and meeting critical infrastructure regulations and standards. During this session, we’ll discuss best-practice defining and fine-tuning incident declaration processes and response plans, identify what your organisation is doing, and brainstorm strategies to advance your maturity model.
Speakers:
Moe Nahas OT & Infrastructure Delivery Manager Ports Victoria
Ramy Ibrahim Cyber Security Advisor Ports Victoria
-
15:45
Get Refreshed! Mingle
-
16:15
The Chain Reaction: Take Control of Supply Chain Cyber Risk
- Evaluating security vulnerabilities in both design and operational supply chain practices.
- Developing supply chain policies and procedures to address cyber security, third-party security, and compliance risks.
- Gaining full supply chain visibility by understanding suppliers, vendors, and sub-suppliers to mitigate hidden security risks.
- Embedding security culture across suppliers by aligning security standards and conducting regular supplier reviews.
-
16:40
Panel: Powering Up OT Engineers– Building Cyber-Ready Operational Teams
- How can we effectively train OT engineers in cyber security without disrupting operations?
- What are the key cyber security concepts every OT professional should understand?
- How can organisations create role-specific security training for OT engineers, managers, and security leads?
- What challenges do OT professionals face when adopting cyber security practices, and how can they be addressed?
- How can IT and OT teams collaborate to enhance cyber security awareness and skills?
Justin Nga Cybersecurity Manager CitiPower and Powercor
Greg Leibel Cyber Security Architect IXOM
Mostafa Abdulla OT Cybersecurity SME APA Group -
17:15
Chairperson's Closing Remark
-
17:20
OT Security 2025 Close & Cheers with Peers!
Not Found