<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">

    Not Found

  • OT Security Melbourne

  • 08:20

    Register; grab a coffee. Mix, mingle and say hello to peers old and new.

    Arrow
  • 09:00
    Pippa Flanagan

    Welcome from Corinium and the Chairperson

    Pippa Flanagan - Manager ICT & Cyber Security - GWMWater

    Arrow
  • 09:10
    Connect _Network-1

    Speed Networking - Making new connections!

    Arrow
    In this 10-minute networking session, the goal is to connect with three new people. Enjoy the opportunity to expand your network!
  • 09:20
    Supriya profile

    Be the Influencer of OT Security: Aligning IT and OT for a Unified Security Strategy

    Supriya Nair - Global Security Architect - Telstra

    Arrow
    • Discuss how to position OT security as a business priority and integrate it into the broader cyber security strategy.
    • Raising awareness of OT security across the organisation for greater efficiency, less complexity and ultimately boost the bottom line. 
    • Establishing OT security governance and defining clear policies, roles, and responsibilities to bridge IT-OT gaps and create a unified security framework.
  • 09:45
    Panel Discussion-1

    Panel: Compliance in the Real World – How to Move Beyond a Checkbox Approach

    Arrow
    • What key aspects of the Cyber Security Act should organisations consider, particularly those regulated under SoCI and those outside its scope?
    • How does the 2024 enhanced response and prevention amendment impact responsible entities, and what new obligations does it introduce?
    • What strategies can organisations use to effectively implement approved cyber security frameworks to strengthen security and resilience?
    • What are the practical challenges of applying governance-driven frameworks to industrial OT environments, and how can organisations integrate these frameworks into a unified, risk-based security approach? 
    • How can organisations prevent compliance fatigue and turn regulatory reforms into opportunities for building meaningful cyber resilience in OT environments?

    Moderator: 
    Lauren Veenstra Cybersecurity Lead Iberdrola Australia 

    Panellists

    Maryam Shoraka Head of OT Cyber Security Operations Sydney Trains

  • 10:15
    Dave Reeves-1

    The Case for Integrated Cyber Security Across IT and OT

    Dave Reeves - Critical Infrastructure and Operational Technology – APJ - Tenable

    Arrow

    The days of the operational environment functioning in a true standalone manner are over. Today, threats span both corporate and operational domains. Isolated systems lack visibility into credential misuse, lateral movement, and cross-domain attacks. Identity is a critical risk, with compromised accounts often bridging environments. Effective protection demands integrated visibility across users, assets, and threats: enabling a coordinated, resilient defence and supporting compliance with mandates such as the Essential Eight, SoCI, and SoNS.

  • 10:40
    Break-1

    Get Refreshed! Mingle

    Arrow
  • 11:10
    Shaun_Price_square-2

    OT Cloud: How to Adapt Your OT Architecture for Cloud Applications

    Shaun Price - Cybersecurity Strategy & Architecture - Transurban

    Arrow
    • Understanding how OT networks have evolved to support cloud-based applications.
    • Exploring key architectural considerations and best practices for secure OT-cloud convergence.
    • Examining different approaches to integrating cloud services while maintaining security, reliability, and compliance.
    • Building a secure OT Cloud strategy through implementing effective security measures to protect industrial operations in a cloud environment. 
  • 11:35
    Partner-1

    Asset Intelligence: The Bedrock of Cyber Security

    Arrow

    Extensive knowledge of assets that need to be secured is foundational for any effort to secure any type of asset. It’s no surprise that the Security of Critical Infrastructure Act 2018 (SOCI) addresses this in its initial requirements and recommendations. When an Asset Intelligence platform is implemented as the bedrock of a cyber security initiative asset information is continuously collected, aggregated, correlated and analysed making all subsequent activities easier. Join us to learn what constitutes an Asset Intelligence platform and how specific capabilities optimise every step of the process to compliance.

  • 12:00
    Panel Discussion-1

    Panel: The Reality of Patching in OT– Balancing Risk, Cost, and Downtime

    Arrow
    • How do you effectively assess the risk of each vulnerability and prioritise patching based on the severity of the risk? 
    • What strategies can help mitigate risks when patching is not immediately possible due to system limitations or operational constraints?
    • How do you balance security investments in patch management with the cost of potential downtime or system failures?
    • How do you collaborate and best work with vendors and suppliers in ensuring timely and secure patching?

    Moderator: 
    Ameneh Jalali Chief Cyber Security Officer Yokogawa Australia & New Zealand

    Panellists:
    David Worthington, GM - Digital Security & Risk, Jemena

    Lu Ou Yang Group Head of Cyber Security Orora

    Arijit Lahiri Cyber Security Senior Consultant Melbourne Water 

  • 12:35
    Partner-1

    Guarding the Gate: Combating Insider Threats in OT/IoT Cybersecurity

    Arrow

    Focusing on insider threats in OT/IoT environments, this session will highlight how internal actors pose significant risks, often due to OT/IoT systems' weaker security compared to IT environments. It will explore real-world cases and explore strategies to mitigate insider risks, enhancing overall security and operational resilience in OT/IoT infrastructures.

  • 13:00
    Lunch_ Dinner-1

    Lunch

    Arrow
  • 14:00
    Ariel Egber

    Fortifying the Perimeter: Strengthening OT Security Where It Matters Most

    Ariel Egber - Principal Cybersecurity Architect OT - AGL

    Arrow
    • Addressing the unique challenges of OT environments, where legacy systems, strict uptime requirements, and limited patching create security gaps, and even minor perimeter misconfigurations can lead to major vulnerabilities.
    • Strengthening multi-layered perimeter defence by deploying advanced firewalls, intrusion prevention systems, and adaptive segmentation strategies that go beyond the traditional Purdue Model to accommodate modern OT connectivity needs.
    • Enforcing strict access controls with granular role-based permissions and continuous authentication to ensure only authorised users and devices interact with OT systems.
    • Enhancing real-time threat detection by integrating OT-aware security analytics, enabling rapid response to anomalies and minimising operational disruptions.
  • 14:25
    Keynote-1

    The Chain Reaction: Take Control of Supply Chain Cyber Risk

    Arrow
    • Evaluating security vulnerabilities in both design and operational supply chain practices.
    • Developing supply chain policies and procedures to address cyber security, third-party security, and compliance risks.
    • Gaining full supply chain visibility by understanding suppliers, vendors, and sub-suppliers to mitigate hidden security risks.
    • Embedding security culture across suppliers by aligning security standards and conducting regular supplier reviews. 
  • 14:50
    Arijit Lahiri-2

    Enhancing Operational Resilience and Security through Effective OT Security Governance

    Arijit Lahiri - Cyber Security Senior Consultant - Melbourne Water

    Arrow
    • Mapping OT-specific goals to overarching business objectives to drive operational efficiency, strategic success and improved decision-making. 
    • Defining clear roles and responsibilities within your OT governance framework ensures accountability and prevents operational inefficiencies.
    • Moving beyond a one-size-fits-all approach to ensure engineers, operators, managers, and IT staff receive targeted OT security training. 
  • 15:15
    Keynote-1

    Ports Victoria: Incident Management Strategies for Critical Infrastructure Operators

    Arrow

    Having an effective incident declaration process in place is key when developing your compliance strategy and meeting critical infrastructure regulations and standards. During this session, we’ll discuss best-practice defining and fine-tuning incident declaration processes and response plans, identify what your organisation is doing, and brainstorm strategies to advance your maturity model.

    Speakers:

    Moe Nahas OT & Infrastructure Delivery Manager Ports Victoria

    Ramy Ibrahim Cyber Security Advisor Ports Victoria

  • 15:40
    Break-1

    Get Refreshed! Mingle

    Arrow
  • 16:10
    Keynote-1

    Practical Risk Assessment based on IEC62443

    Arrow

    As ICS and OT environments become increasingly connected, the need for structured cyber security risk management has never been greater. IEC 62443 offers a robust framework for securing industrial automation systems—but many organizations struggle with translating its comprehensive guidance into actionable steps. This session bridges the gap between theory and implementation by focusing on how to perform practical, scalable risk assessments aligned with IEC 62443, particularly for organizations that may have limited resources or are just beginning their OT cybersecurity journey.

    Speakers:

    Gerald Pang Security Manager Metro Trains Melbourne

    Lu Ou Yang Group Head of Cyber Security Orora 

  • 16:35
    Panel Discussion-1

    Panel: Powering Up OT Engineers– Building Cyber-Ready Operational Teams

    Arrow
    • How can we effectively train OT engineers in cyber security without disrupting operations?
    • What are the key cyber security concepts every OT professional should understand?
    • How can organisations create role-specific security training for OT engineers, managers, and security leads?
    • What challenges do OT professionals face when adopting cyber security practices, and how can they be addressed?
    • How can IT and OT teams collaborate to enhance cyber security awareness and skills?

    Moderator:

    Aidan Hollier Head of Asset Knowledge & Technology Melbourne Water

    Panellists: 
    Justin Nga Cybersecurity Manager CitiPower and Powercor

    Greg Leibel Cyber Security Architect IXOM

  • 17:10

    Chairperson's Closing Remark

    Arrow
  • 17:20
    Cocktails

    OT Security 2025 Close & Cheers with Peers!

    Arrow