-
Cloud Security Melbourne
-
08:20
Register; grab a coffee. Mix, mingle and say hello to peers old and new.
-
09:00
Welcome from Corinium and the Chairperson
Royden Rahul Rebello - Network Security Specialist & Creator - ‘TheSocialDork’ Youtube channel
-
09:10
Speed Networking – Making new connections!
In this 10-minute networking session, the goal is to connect with three new people. Enjoy the opportunity to expand your network!
-
09:20
Securing the Future: A Deep Dive into Cloud-Native Application Protection Platform (CNAPP) Architecture
Ravi Buddannagari - Enterprise Architect – Cyber, Identity Advisor - Suncorp Group
- The core architecture of CNAPP and its key features.
- How CNAPP solutions enable continuous monitoring and threat detection for modern, distributed cloud workloads.
- Best practices for implementing CNAPP in real-world enterprise environments.
- Real-world use case of CNAPP in securing cloud-native applications.
-
09:45
Consuming Cloud Services Securely: A Scalable Approach
Maunish Patel - Product Owner - Cloud Security and Continuous Assurance - ANZ
- Uncovering a real-world challenge and the innovative approach used to overcome it.
- Demonstrating the process, methodologies, and key decisions behind the solution.
- Showcasing the tools and strategies that turned the challenge into success.
Maunish Patel Product Owner - Cloud Security and Continuous Assurance ANZ
Sandeep Godbole Security Partner ANZ
-
10:10
Securing Multi-Cloud & SaaS Ecosystems
Senior representative - - Appomini
- Overcoming security challenges in managing multiple cloud service providers.
- Enforcing consistent security policies across cloud and SaaS environments.
- Tools and frameworks for gaining visibility and mitigating risks in a fragmented cloud landscape.
-
10:35
The Power of IAM: Pioneering the Next Era of Security
Fatima Hoblos - Lead Engineer - Kmart
- Deepen the understanding of IAM’s role in securing access and protecting sensitive information across digital environments, including unique challenges posed by cloud security.
- Move beyond traditional passwords with more secure and user-friendly authentication methods while evaluating RBAC vs. ABAC for effective access control.
- Streamline identity management by automating identity governance, user lifecycle management, and ensuring seamless integration of multiple IAM systems.
- Develop IAM solutions that enable quick recovery in case of a disaster, minimising disruptions and maintaining secure access during crises.
-
11:00
Get Refreshed! Mingle
-
10:30
Enhancing CSPM to Go Beyond Visibility to Automate Security Action
Senior representative - - Tenable
- The journey of Cloud Security Posture Management (CSPM) from monitoring to enforcement.
- Automating risk remediation and reducing misconfigurations and policy violations.
- Case studies on organisations leveraging CSPM to strengthen cloud security.
-
11:55
Panel: Data Security & Privacy – Navigating Governance, Compliance, and IAM
- How can Australian organisations effectively manage data security and sovereignty while complying with regulations like the Privacy Act, APRA CPS 234, and the Security of Critical Infrastructure Act?
- What are the key challenges in implementing IAM at scale, and how can organisations balance security with user experience?
- How can automation and AI enhance governance, enforce compliance, and reduce the operational burden on security teams?
- What emerging threats or regulatory changes should organisations anticipate, and how can they future-proof their cloud security strategies?
Moderator:
Bernadeth Lucanas Associate Director – Platform Architect (Cloud) Macquarie Group
Panellists:
Aidan Turner Manager IAM Downer Group
Mayank Sharma Security Architect Viva Energy Australia
Rahul Trikha Director of Product & Technology DomainRaj Siva Senior Manager - Security Strategy & Architecture AustralianSuper
-
12:30
Microsegmentation & Network Security in the Cloud
Senior representative - - Sysdig
- How microsegmentation prevents attackers from spreading across cloud workloads.
- Implementing dynamic, software-defined security controls for cloud environments.
- Ensuring effective segmentation without disrupting cloud agility.
-
12:55
Lunch
-
13:55
Panel: From Code to Cloud – Strengthening Supply Chain Security
- How can organisations gain better visibility into supply chain risks, especially with third-party dependencies and open-source components?
- How can automation and AI-driven threat intelligence help detect and respond to supply chain attacks in cloud environments?
- How does your cloud platform integrate security within DevSecOps workflows to prevent vulnerabilities from moving downstream?
- What advice would you give to organisations looking to strengthen their supply chain security posture over the next 12-24 months?
Moderator:
Roberto Calero Cloud Operations Manager Blackwoods
Panellists:
May Mun Senior Manager - Cyber Governance & Assurance Transurban
Uday Korlimarla Application Security Architect UniSuper
Fabiola Martinez Product Owner – Cloud Security Posture Management CBA
Brad Rogers Cloud Security Account Manager Fortinet
-
14:30
Cloud Risk Management: Breaking the Cloud Security Silos
Nirav Kamdar - Cybersecurity Solution Architect, Cloud & DevOps APAC - Qualys
In today’s cloud environments, real risk isn’t just about critical CVEs, it’s about what’s exploitable and exposed. As the cloud attack surface grows, proactive risk management and frictionless automation are essential from code to cloud to reduce remediation time and provide actionable context to IT and development teams.
- De-Risk your Cloud, Security Insights Approach: Correlate vulnerabilities, misconfigurations, identity risks, and threat intelligence to gain contextual, prioritized visibility across your multi-cloud environment.
- Security teams move from alert overload to real-time action: orchestrating remediation, eliminating manual steps, and maintaining continuous compliance.
- Learn how to enable Cloud risk operations with TruRisk Prioritization, Attack Path Analysis, and autonomous response using no-code remediation of misconfigurations and vulnerabilities.
-
14:55
Managing Cloud Security Vulnerabilities and Exposures
Ad Wolst - Head of Cyber Security Engineering & Platform Services - Bupa
- Exploring the key steps to develop and implement an effective framework to identity security vulnerabilities and exposures.
- Integration of security observed exposures into development pipelines
- Managing exemptions programmatically.
- Leveraging AI to generate remediation actions.
-
15:20
Get Refreshed! Mingle
-
15:50
Panel: The Digital Nexus – Harnessing Data, AI, Cloud, and Security for a Resilient Future
This session explores how integrating data, AI, cloud computing, and robust security measures are crucial for building a resilient future. By harnessing these technologies, we can drive innovation, protect sensitive information, and maintain trust in the organisational landscape. Our speakers will explore these:
- Leverage data and AI to drive innovation while ensuring security.
- Protect sensitive information and maintain trust.
- Key challenges when integrating data, AI, cloud, and security.
- Managing risks across cloud environments.
Moderator:
Reshma Devi Data & AI Risk and Information Management Transurban
Panellists:
Amreet Prasad Cyber Security Specialist
Stefan Prioriello Cloud Security Lead Transurban
Reeti Upmon Security Engineer Wesfarmers OneDigital
Fabiola Martinez Product Owner – Cloud Security Posture Management CBA
-
16:15
Hype vs Reality: Conversation on the Role of AI in Enhancing Cloud Security
Gautam Kashya - Principal Domain Architect Cloud Security - NAB
- Separating AI security myths from real-world applications in cloud protection.
- How AI-driven analytics and automation are reshaping threat detection and response.
- Ethical considerations and risks of over-relying on AI in cloud security.
-
16:40
Chairperson's Closing Remark
Royden Rahul Rebello - Network Security Specialist & Creator - 'TheSocialDork’ Youtube channel
-
16:50
Close of Cloud Security Melbourne 2025
Not Found