-
OT Security Melbourne
-
08:20
Register; grab a coffee. Mix, mingle and say hello to peers old and new.
-
09:00
Welcome from Corinium and the Chairperson
Pippa Flanagan - Manager ICT & Cyber Security - GWMWater
-
09:10
Speed Networking - Making new connections!
In this 10-minute networking session, the goal is to connect with three new people. Enjoy the opportunity to expand your network! -
09:20
Be the Influencer of OT Security: Aligning IT and OT for a Unified Security Strategy
Supriya Nair - Senior Solutions Architect - OutofBox Solutions
- Discuss how to position OT security as a business priority and integrate it into the broader cyber security strategy.
- Raising awareness of OT security across the organisation for greater efficiency, less complexity and ultimately boost the bottom line.
- Establishing OT security governance and defining clear policies, roles, and responsibilities to bridge IT-OT gaps and create a unified security framework.
-
09:45
Panel: Compliance in the Real World – How to Move Beyond a Checkbox Approach
- What key aspects of the Cyber Security Act should organisations consider, particularly those regulated under SoCI and those outside its scope?
- How does the 2024 enhanced response and prevention amendment impact responsible entities, and what new obligations does it introduce?
- What strategies can organisations use to effectively implement approved cyber security frameworks to strengthen security and resilience?
- What are the practical challenges of applying governance-driven frameworks to industrial OT environments, and how can organisations integrate these frameworks into a unified, risk-based security approach?
- How can organisations prevent compliance fatigue and turn regulatory reforms into opportunities for building meaningful cyber resilience in OT environments?
Moderator:
Lauren Veenstra Chief Security Officer Iberdrola AustraliaPanellists
Maryam Shoraka Head of OT Cyber Security Operations Sydney Trains
Pippa Flanagan Manager ICT & Cyber Security GWMWater
-
10:15
The Case for Integrated Cyber Security Across IT and OT
Dave Reeves - Critical Infrastructure and Operational Technology – APJ - Tenable
The days of the operational environment functioning in a true standalone manner are over. Today, threats span both corporate and operational domains. Isolated systems lack visibility into credential misuse, lateral movement, and cross-domain attacks. Identity is a critical risk, with compromised accounts often bridging environments. Effective protection demands integrated visibility across users, assets, and threats: enabling a coordinated, resilient defence and supporting compliance with mandates such as the Essential Eight, SoCI, and SoNS.
-
10:40
Get Refreshed! Mingle
-
11:10
OT Cloud: How to Adapt Your OT Architecture for Cloud Applications
Shaun Price - Cybersecurity Strategy & Architecture - ex-Transurban
- Understanding how OT networks have evolved to support cloud-based applications.
- Exploring key architectural considerations and best practices for secure OT-cloud convergence.
- Examining different approaches to integrating cloud services while maintaining security, reliability, and compliance.
- Building a secure OT Cloud strategy through implementing effective security measures to protect industrial operations in a cloud environment.
-
11:35
Leveraging the Essential Eight (E8) Framework to Strengthen OT Cyber Security
Ron Wang - Senior Director of Solutions Engineering, APJ - Trellix
Join this session to explore how Trellix provides practical guidance for leveraging and mapping the Essential Eight cyber security framework to enhance OT security. Gain insights into identifying critical assets, mitigating vulnerabilities, implementing layered defences, and monitoring for anomalies—while supporting regulatory compliance. Learn how this structured approach does not only improves risk management and defines clear security controls, but also bridges the gap between IT cyber security practices and OT-specific requirements like safety, uptime, and physical process integrity—ensuring resilient protection across industrial environments.
-
12:00
Panel: The Reality of Patching in OT– Balancing Risk, Cost, and Downtime
- How do you effectively assess the risk of each vulnerability and prioritise patching based on the severity of the risk?
- What strategies can help mitigate risks when patching is not immediately possible due to system limitations or operational constraints?
- How do you balance security investments in patch management with the cost of potential downtime or system failures?
- How do you collaborate and best work with vendors and suppliers in ensuring timely and secure patching?
Moderator:
Ameneh Jalali Chief Cyber Security Officer Yokogawa Australia & New ZealandPanellists:
David Worthington, GM - Digital Security & Risk, JemenaLu Ou Yang Group Head of Cyber Security Orora
-
12:35
Context is Critical: Prioritising OT Risk Without Breaking the Business
Andrew Philp - ANZ Field CISO - Trend Micro
As the lines between IT and OT continue to blur, security teams face increasing pressure to manage cyber risk without disrupting operations or duplicating effort. Yet in many organisations, convergence remains more aspirational than operational — with siloed tools, teams, and priorities. This session explores how taking a context-first approach to OT security helps bridge that gap. By aligning risk to operational impact — not just technical vulnerabilities — we can prioritise what truly matters, even in resource-constrained, legacy-heavy environments. With real-world examples and a practical look at passive discovery, AI-driven analysis, and business-aligned decision-making, this talk offers a path to meaningful convergence: one built on shared context, not shared control. -
13:00
Lunch
-
14:00
Fortifying the Perimeter: Strengthening OT Security Where It Matters Most
Ariel Egber - Principal Cybersecurity Architect OT - AGL
- Addressing the unique challenges of OT environments, where legacy systems, strict uptime requirements, and limited patching create security gaps, and even minor perimeter misconfigurations can lead to major vulnerabilities.
- Strengthening multi-layered perimeter defence by deploying advanced firewalls, intrusion prevention systems, and adaptive segmentation strategies that go beyond the traditional Purdue Model to accommodate modern OT connectivity needs.
- Enforcing strict access controls with granular role-based permissions and continuous authentication to ensure only authorised users and devices interact with OT systems.
- Enhancing real-time threat detection by integrating OT-aware security analytics, enabling rapid response to anomalies and minimising operational disruptions.
-
14:25
The Chain Reaction: Take Control of Supply Chain Cyber Risk
Marryam Shoraka - Head of OT Cyber Security Operations - Sydney Trains
- Evaluating security vulnerabilities in both design and operational supply chain practices.
- Developing supply chain policies and procedures to address cyber security, third-party security, and compliance risks.
- Gaining full supply chain visibility by understanding suppliers, vendors, and sub-suppliers to mitigate hidden security risks.
- Embedding security culture across suppliers by aligning security standards and conducting regular supplier reviews.
-
14:50
Zero Trust for OT: Modernising Third-Party Access in Critical Infrastructure
Tim Jackson - Head of Solutions Engineering - Dull
During this session, we will dissect some of the common approaches to third party OT remote access and, in the context of recent attacks on critical infrastructure, understand why their compromise can be so devastating. We will then explore how a new generation of zero trust solutions are aligning to Australian regulations, such as SOCI and ACSC’s Remote Access Protocol, to enhance the efficiency of third parties while safeguarding Australian critical infrastructure.
-
15:15
Ports Victoria: Incident Management Strategies for Critical Infrastructure Operators
Having an effective incident declaration process in place is key when developing your compliance strategy and meeting critical infrastructure regulations and standards. During this session, we’ll discuss best-practice defining and fine-tuning incident declaration processes and response plans, identify what your organisation is doing, and brainstorm strategies to advance your maturity model.
Speakers:
Moe Nahas OT & Infrastructure Delivery Manager Ports Victoria
Ramy Ibrahim Cyber Security Advisor Ports Victoria
-
15:40
Get Refreshed! Mingle
-
16:10
Practical Risk Assessment based on IEC62443
As ICS and OT environments become increasingly connected, the need for structured cyber security risk management has never been greater. IEC 62443 offers a robust framework for securing industrial automation systems—but many organizations struggle with translating its comprehensive guidance into actionable steps. This session bridges the gap between theory and implementation by focusing on how to perform practical, scalable risk assessments aligned with IEC 62443, particularly for organizations that may have limited resources or are just beginning their OT cybersecurity journey.
Speakers:
Gerald Pang Security Manager Metro Trains Melbourne
Lu Ou Yang Group Head of Cyber Security Orora
-
16:35
Panel: Powering Up OT Engineers– Building Cyber-Ready Operational Teams
- How can we effectively train OT engineers in cyber security without disrupting operations?
- What are the key cyber security concepts every OT professional should understand?
- How can organisations create role-specific security training for OT engineers, managers, and security leads?
- What challenges do OT professionals face when adopting cyber security practices, and how can they be addressed?
- How can IT and OT teams collaborate to enhance cyber security awareness and skills?
Moderator:
Aidan Hollier Head of Asset Knowledge & Technology Melbourne Water
Panellists:
Justin Nga Cybersecurity Manager CitiPower and PowercorGreg Leibel Cyber Security Architect IXOM
-
17:10
Chairperson's Closing Remark
-
17:20
OT Security 2025 Close & Cheers with Peers!
Not Found