-
OT Security Melbourne
-
08:20
Register; grab a coffee. Mix, mingle and say hello to peers old and new.
-
09:00
Welcome from Corinium and the Chairperson
Pippa Flanagan - Manager ICT & Cyber Security - GWMWater
-
09:10
Speed Networking - Making new connections!
In this 10-minute networking session, the goal is to connect with three new people. Enjoy the opportunity to expand your network! -
09:20
Be the Influencer of OT Security: Aligning IT and OT for a Unified Security Strategy
Supriya Nair - Global Security Architect - Telstra
- Discuss how to position OT security as a business priority and integrate it into the broader cyber security strategy.
- Raising awareness of OT security across the organisation for greater efficiency, less complexity and ultimately boost the bottom line.
- Establishing OT security governance and defining clear policies, roles, and responsibilities to bridge IT-OT gaps and create a unified security framework.
-
09:45
Panel: Compliance in the Real World – How to Move Beyond a Checkbox Approach
- What key aspects of the Cyber Security Act should organisations consider, particularly those regulated under SoCI and those outside its scope?
- How does the 2024 enhanced response and prevention amendment impact responsible entities, and what new obligations does it introduce?
- What strategies can organisations use to effectively implement approved cyber security frameworks to strengthen security and resilience?
- What are the practical challenges of applying governance-driven frameworks to industrial OT environments, and how can organisations integrate these frameworks into a unified, risk-based security approach?
- How can organisations prevent compliance fatigue and turn regulatory reforms into opportunities for building meaningful cyber resilience in OT environments?
Moderator:
Lauren Veenstra Cybersecurity Lead Iberdrola AustraliaPanellists
Maryam Shoraka Head of OT Cyber Security Operations Sydney Trains
-
10:15
The Case for Integrated Cyber Security Across IT and OT
Dave Reeves - Critical Infrastructure and Operational Technology – APJ - Tenable
The days of the operational environment functioning in a true standalone manner are over. Today, threats span both corporate and operational domains. Isolated systems lack visibility into credential misuse, lateral movement, and cross-domain attacks. Identity is a critical risk, with compromised accounts often bridging environments. Effective protection demands integrated visibility across users, assets, and threats: enabling a coordinated, resilient defence and supporting compliance with mandates such as the Essential Eight, SoCI, and SoNS.
-
10:40
Get Refreshed! Mingle
-
11:10
OT Cloud: How to Adapt Your OT Architecture for Cloud Applications
Shaun Price - Cybersecurity Strategy & Architecture - Transurban
- Understanding how OT networks have evolved to support cloud-based applications.
- Exploring key architectural considerations and best practices for secure OT-cloud convergence.
- Examining different approaches to integrating cloud services while maintaining security, reliability, and compliance.
- Building a secure OT Cloud strategy through implementing effective security measures to protect industrial operations in a cloud environment.
-
11:35
Asset Intelligence: The Bedrock of Cyber Security
Extensive knowledge of assets that need to be secured is foundational for any effort to secure any type of asset. It’s no surprise that the Security of Critical Infrastructure Act 2018 (SOCI) addresses this in its initial requirements and recommendations. When an Asset Intelligence platform is implemented as the bedrock of a cyber security initiative asset information is continuously collected, aggregated, correlated and analysed making all subsequent activities easier. Join us to learn what constitutes an Asset Intelligence platform and how specific capabilities optimise every step of the process to compliance.
-
12:00
Panel: The Reality of Patching in OT– Balancing Risk, Cost, and Downtime
- How do you effectively assess the risk of each vulnerability and prioritise patching based on the severity of the risk?
- What strategies can help mitigate risks when patching is not immediately possible due to system limitations or operational constraints?
- How do you balance security investments in patch management with the cost of potential downtime or system failures?
- How do you collaborate and best work with vendors and suppliers in ensuring timely and secure patching?
Moderator:
Ameneh Jalali Chief Cyber Security Officer Yokogawa Australia & New ZealandPanellists:
David Worthington, GM - Digital Security & Risk, JemenaLu Ou Yang Group Head of Cyber Security Orora
Arijit Lahiri Cyber Security Senior Consultant Melbourne Water
-
12:35
Guarding the Gate: Combating Insider Threats in OT/IoT Cybersecurity
Focusing on insider threats in OT/IoT environments, this session will highlight how internal actors pose significant risks, often due to OT/IoT systems' weaker security compared to IT environments. It will explore real-world cases and explore strategies to mitigate insider risks, enhancing overall security and operational resilience in OT/IoT infrastructures.
-
13:00
Lunch
-
14:00
Fortifying the Perimeter: Strengthening OT Security Where It Matters Most
Ariel Egber - Principal Cybersecurity Architect OT - AGL
- Addressing the unique challenges of OT environments, where legacy systems, strict uptime requirements, and limited patching create security gaps, and even minor perimeter misconfigurations can lead to major vulnerabilities.
- Strengthening multi-layered perimeter defence by deploying advanced firewalls, intrusion prevention systems, and adaptive segmentation strategies that go beyond the traditional Purdue Model to accommodate modern OT connectivity needs.
- Enforcing strict access controls with granular role-based permissions and continuous authentication to ensure only authorised users and devices interact with OT systems.
- Enhancing real-time threat detection by integrating OT-aware security analytics, enabling rapid response to anomalies and minimising operational disruptions.
-
14:25
The Chain Reaction: Take Control of Supply Chain Cyber Risk
- Evaluating security vulnerabilities in both design and operational supply chain practices.
- Developing supply chain policies and procedures to address cyber security, third-party security, and compliance risks.
- Gaining full supply chain visibility by understanding suppliers, vendors, and sub-suppliers to mitigate hidden security risks.
- Embedding security culture across suppliers by aligning security standards and conducting regular supplier reviews.
-
14:50
Enhancing Operational Resilience and Security through Effective OT Security Governance
Arijit Lahiri - Cyber Security Senior Consultant - Melbourne Water
- Mapping OT-specific goals to overarching business objectives to drive operational efficiency, strategic success and improved decision-making.
- Defining clear roles and responsibilities within your OT governance framework ensures accountability and prevents operational inefficiencies.
- Moving beyond a one-size-fits-all approach to ensure engineers, operators, managers, and IT staff receive targeted OT security training.
-
15:15
Ports Victoria: Incident Management Strategies for Critical Infrastructure Operators
Having an effective incident declaration process in place is key when developing your compliance strategy and meeting critical infrastructure regulations and standards. During this session, we’ll discuss best-practice defining and fine-tuning incident declaration processes and response plans, identify what your organisation is doing, and brainstorm strategies to advance your maturity model.
Speakers:
Moe Nahas OT & Infrastructure Delivery Manager Ports Victoria
Ramy Ibrahim Cyber Security Advisor Ports Victoria
-
15:40
Get Refreshed! Mingle
-
16:10
Practical Risk Assessment based on IEC62443
As ICS and OT environments become increasingly connected, the need for structured cyber security risk management has never been greater. IEC 62443 offers a robust framework for securing industrial automation systems—but many organizations struggle with translating its comprehensive guidance into actionable steps. This session bridges the gap between theory and implementation by focusing on how to perform practical, scalable risk assessments aligned with IEC 62443, particularly for organizations that may have limited resources or are just beginning their OT cybersecurity journey.
Speakers:
Gerald Pang Security Manager Metro Trains Melbourne
Lu Ou Yang Group Head of Cyber Security Orora
-
16:35
Panel: Powering Up OT Engineers– Building Cyber-Ready Operational Teams
- How can we effectively train OT engineers in cyber security without disrupting operations?
- What are the key cyber security concepts every OT professional should understand?
- How can organisations create role-specific security training for OT engineers, managers, and security leads?
- What challenges do OT professionals face when adopting cyber security practices, and how can they be addressed?
- How can IT and OT teams collaborate to enhance cyber security awareness and skills?
Moderator:
Aidan Hollier Head of Asset Knowledge & Technology Melbourne Water
Panellists:
Justin Nga Cybersecurity Manager CitiPower and PowercorGreg Leibel Cyber Security Architect IXOM
-
17:10
Chairperson's Closing Remark
-
17:20
OT Security 2025 Close & Cheers with Peers!
Not Found