-
OT Security Melbourne
-
08:20
Register; grab a coffee. Mix, mingle and say hello to peers old and new.
-
09:00
Welcome from Corinium and the Chairperson
Justin Nga - Cybersecurity Manager - CitiPower and Powercor
-
09:10
Speed Networking - Making new connections!
In this 5-minute networking session, the goal is to connect with three new people. Enjoy the opportunity to expand your network! -
09:15
Opening headliner
The Decision Gap: When Visibility Meets ResponsibilityMaryam Shoraka - Australian CISO Advisory Board Member - Corinium Global Intelligence
Security teams have more visibility into their environments than ever before, yet many organisations still struggle to translate data into clear security priorities. This opening presentation explores how security leaders move beyond dashboards and inventories to focus on the exposures that truly matter. By connecting visibility with risk, operations and investment decisions, organisations can turn insight into meaningful action.
-
09:40
Panel discussion
Who Actually Owns Risk When a Cyber Decision Can Cause Downtime or Endanger People?When cyber decisions have physical consequences, accountability can be unclear. This panel explores where responsibility truly lies between engineering, operations, and security teams during incidents or critical changes. Panellists will discuss how organisations can align authority with operational responsibility to reduce risk.
- Who is accountable when a decision affects both cyber and physical systems?
- Where do current governance models fail under operational pressure?
- How can organisations clarify decision-making authority in OT environments?
Panellists:
Aidan Hollier Head of Asset Knowledge & Technology Melbourne Water
Vijay Narayan CISO Mercy Health
Sajid Bavakunji Cyber Security Manager Australian Energy Company
-
10:15
Powered by Automation: Ensuring Safety. Resilience and Regulatory Compliance
This session explores how organisations can automate compliance checks, monitor assets continuously, and enforce security policies, while still keeping human oversight at the core.
-
10:40
Get Refreshed! Mingle
-
11:10
Who Responds? Closing the Gap Between OT Alerts and Action
When alarms are raised in OT environments, response can stall if responsibilities between IT, OT, and cyber teams are unclear. This session explores how organisations define ownership and governance so alerts lead to timely action rather than delay.
-
11:35
Panel discussion
Can OT Networks Be Secure and Reliable?OT networks—from SCADA systems to PLCs—are designed to meet operational needs, but they can also create security gaps. This session explores how organisations can design architectures that balance reliability, availability, and cyber resilience. Hear lessons from highly customised environments, discuss safe IT–OT integration, and identify practical strategies to strengthen resilience without disrupting operations.
- How can OT networks be designed to meet operational needs while limiting security risk?
- What lessons can we take from industries with highly customised OT environments?
- How can IT–OT integration be achieved without compromising resilience?
Moderator:
Maryam Shoraka Corinium Advisory Board Member
Panellists:
Yi Wang Executive Manager – Network Security Risk nbn
Ameneh Jalali Chief Cyber Security Officer Yokogawa Australia & New Zealand
Bilal Baig Senior Digital Security Specialist OT Coles Group
-
12:10
Beyond the Perimeter: Securing OT in a Connected World
With IT–OT convergence, IoT growth, and remote access, what does perimeter security even mean — and what replaces it?
-
12:35
How Do We Get Engineers to Care About Cyber?
Jenny Botton - Senior Manager Cyber Security - ABN Group
Engineers instinctively prioritise physical safety, but cyber security is often treated as someone else’s responsibility. As operational systems become increasingly connected, that mindset creates risk. The challenge is embedding cyber security into engineering culture so it carries the same weight as HSE. This session will explore how organisations can advocate for cyber security within engineering teams without relying too heavily on a few security champions.
-
13:00
Lunch
-
14:00
Aligning IEC 62443 Expectations with OT Reality
IEC 62443 offers a robust framework for securing industrial automation systems, but many organisations struggle to translate its comprehensive guidance into actionable steps. This session bridges the gap between theory and implementation, focusing on practical and scalable risk assessments to define appropriate security levels and build a sustainable foundation for operations. .
-
14:25
When the Supply Chain Becomes the Attack Surface
Usman Sultan - Senior Cyber Security Architect - CleanCo Queensland
OT attacks are increasingly targeting engineering processes, diagrams, and templates, not just software. This session explores how trusted workflows and vendor inputs can introduce risk, why these compromises are hard to detect, and how organisations can secure connected systems without relying solely on audits or compliance checks.
-
14:50
Securing Legacy OT Systems Without Disruption
How do you protect assets that were never designed to be connected and can’t just be swapped out?
-
15:15
Closing panel discussion
If We Designed OT Security from Scratch Today, Would We Recognise It?Legacy systems, inherited standards, and vendor constraints shape much of today’s OT security. This panel asks panellists to imagine starting over, revealing which practices exist out of habit and which are truly effective. The discussion highlights opportunities to simplify, improve, and focus security on operational outcomes.
Discussion questions:- Which current practices exist because of history rather than effectiveness?
- What design principles would matter most if starting from scratch?
- What practices would we eliminate immediately if rebuilding OT security today?
Panellists:
Trevor Goldman Manager – OT Cybersecurity ex-AGL
Mostafa Abdulla OT Cybersecurity SME APA Group
-
15:50
Chairperson's Closing Remark
-
16:00
OT Security 2026 Close & Afternoon Tea
Not Found