<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">

    Not Found

  • Cloud Security Melbourne

  • 08:20

    Register; grab a coffee. Mix, mingle and say hello to peers old and new.

    Arrow
  • 09:00
    Speaker

    Welcome from Corinium and the Chairperson

    Arrow
  • 09:10
    Connect _Network-1

    Speed Networking – Making new connections!

    Arrow

    In this 5-minute networking session, the goal is to connect with three new people. Enjoy the opportunity to expand your network!  

  • 09:15
    Panel Discussion

    Opening panel discussion
    Are We Designing for Prevention or Responding Faster?

    Arrow

    Cloud security has matured across architecture, application defence and incident response. But are we truly reducing the likelihood of incidents, or simply becoming more efficient at handling them? This panel explores how prevention and response influence each other across the cloud lifecycle.

    • How do architecture and design choices help prevent incidents rather than just speed up recovery?
    • Where does application defence struggle to keep up with fast cloud delivery?
    • How does incident response adapt when multi cloud increases complexity?
    • Are cyber security leaders effectively closing the loop between incidents and future controls?

    Moderator:

    Niall McCarthy Engineering Director & Incident Management Leader

    Panellists:

    Usman Sultan Senior Cyber Security Architect CleanCo Queensland

    Abdullah Muhammad Application Defence Manager Bupa

    Jumar Pando Head of Cyber Security Local City Council

  • 09:50
    Sponsor Presentation

    SaaS Sprawl & Cloud Control: Tackling API Blind Spots

    Arrow

    APIs, tokens, and compromised credentials continue to be the top threat vector for SaaS applications. In this session, we’ll explore how attackers gain access, why these breaches often remain undisclosed, and what steps you can take to implement a proactive SaaS security model.

  • 10:15
    Panel Discussion

    Panel discussion
    Who Really Owns Cloud Security?

    Arrow

    As organisations migrate, modernise, and expand across cloud, SaaS, and hybrid environments, responsibility is increasingly fragmented between platform teams, security, IT, and the business. This panel brings together cloud and security leaders to challenge assumptions around shared responsibility, governance models, and decision-making in complex cloud environments.

    • Where does cloud security ownership really sit today?
    • Which cloud security decisions must be centralised — and which should not?
    • What responsibility still falls through the cracks during migration?
    • When do guardrails enable speed, and when do they slow it down?
    • How do you know cloud security is working beyond compliance?

    Moderator:

    Kavita Chetty Senior Manager, Technology Risk NAB

    Panellists:

    James Galbraith Cloud Services Manager APA Group

    Kanik Sachdeva Security Engineering Manager Medibank

    James Byrne Head of Cyber Security & Architecture Ampol  

  • 10:50
    Sponsor Presentation

    Automating Cloud Defence: From Detection to Response at Scale

    Arrow

    Cloud environments move faster than human teams can monitor. Misconfigurations, identity risks, and lateral movement often unfold in minutes, not hours. This session will explore how automation is being embedded into cloud-native security operations from real-time detection of anomalies to automated remediation of misconfigurations and credential misuse. Learn how leading organisations are reducing dwell time, accelerating incident response, and maintaining resilience at cloud speed.

  • 11:15
    Break-1

    Get Refreshed! Mingle

    Arrow
  • 11:55
    Shanil Chetty-1

    Cloud Security at the Edge of the World: Lessons from Critical Infrastructure with No Room for Error

    Shanil Chetty - Manager ICT & Cybersecurity - Civil Aviation Authority of Fiji

    Arrow

    When your cloud goes down and the nearest help is a 4-hour flight away, you figure out very quickly what actually matters. This session draws on real experience securing aviation infrastructure across the Pacific, a region where misconfiguration isn’t a compliance finding, it’s a safety event. No hyperscaler support office. No IR retainer. No second chances. What that environment forces you to build is a different kind of discipline, one that large enterprises with large budgets rarely develop. We’ll cover what constraint teaches you about cloud security that tooling never will.

  • 12:20
    Sponsor Presentation

    Securing Cloud, Compliance, and the Software Supply Chain

    Arrow

    As cloud adoption accelerates, managing and securing digital assets is more critical than ever. This session explores strategies for ensuring robust security, maintaining compliance, and strengthening governance. We’ll also examine how software supply chain management plays a key role in mitigating vulnerabilities, providing a comprehensive approach to securing your organisation’s digital landscape.

  • 12:45
    Priya Balasekaran

    API Security in Motion: Automating Discovery and Defence

    Priya Balasekaran - IT Risk Analyst - Kmart Australia

    Arrow

    Most organisations don’t know how many APIs they have in production — or who’s calling them. This session explores automated API discovery, continuous monitoring, and runtime protection techniques that help teams identify shadow APIs, detect credential abuse, and prevent data exfiltration before it spreads.

  • 13:10
    Lunch_ Dinner-1

    Lunch

    Arrow
  • 14:10
    Panel Discussion

    Panel Discussion
    Facing the Hidden Risk: Is AI Creating Accidental Insider Risk in the Cloud?

    Arrow

    Generative AI is transforming how employees interact with sensitive data, often faster than organisations can control. This panel explores how to prevent accidental data exposure, enforce access policies, and balance security with productivity in an AI-driven cloud environment.

    • How do you stop sensitive data from leaving the organisation via AI tools?
    • Which controls actually work to prevent accidental misuse?
    • How can teams enable employees safely without creating a culture of surveillance?

    Moderator:

    Bernadeth Lucanas Cloud, Data, AI, & Cyber Security Expert

    Panellists:

    Priya Balasekaran IT Risk Analyst Kmart Australia

    Rue Maharaj Specialist – Cybersecurity Defence Management Melbourne Water 

  • 14:45
    Speaker

    When Policies Drift: Keeping Your Cloud Configurations in Check

    Arrow
    Cloud configurations change faster than policies can keep up. This session shows how drift creates security gaps, demonstrates tools and automation for continuous monitoring, and provides techniques to enforce policies at scale.
  • 15:10
    Malhar Vora   Principal Security Engineer & People & Engineering Leader ANZ

    The Cloud’s Silent Privileged Identities: Gaining Visibility and Control Over Machine Accounts

    Malhar Vora - Principal Security Engineer & People & Engineering Leader -

    Arrow

    Machine identities such as service accounts, API keys, and automation scripts now outnumber humans in many cloud environments. Yet they often operate unchecked, holding broad privileges and creating hidden risk. This session explores practical strategies to detect, govern, and secure non-human identities, reducing risk while enforcing least privilege and stronger cloud trust.

  • 15:35
    Mayank Sharma

    Closing Keynote Presentation
    Mind the Gap: 3 Moves to Secure AI That Acts on Intent

    Mayank Sharma - Security Architect -

    Arrow

    Traditional cloud security focuses on detecting bad code but AI-driven threats now exploit intent, bypassing tools and oversight. As adoption accelerates, gaps in governance, compliance and risk control are widening. This closing keynote shares three practical moves cloud defenders can take to mind the gap: defining clear boundaries for agentic AI, enforcing human in the loop controls and deploying defensive AI. Walk away with actionable guidance to secure AI systems based on behaviour and intent, not just code.

  • 16:40
    Speaker

    Chairperson's Closing Remark

    Arrow
  • 16:50

    Close of Cloud Security Melbourne 2025 & Afternoon Tea

    Arrow