Sunday 27th September
-
Sunday 27th
15:00-16:00Delegate Registration
-
Sunday 27th
19:30-20:00Delegate Registration & Drinks Reception - sponsored by Killashee Hotel
-
Sunday 27th
20:00 onwardsCOSAC 2026 Welcome Dinner
Monday 28th September
-
Monday 28th
09:00-9:30Registration & Coffee
-
Monday 28th
09:30-17:30COSAC Masterclasses are full-day, 09:30 - 17:30
-
Monday 28th
09:30-17:30The 25th COSAC International Roundtable Security Forum
Masterclass M1
2026 marks the 25th edition of the Forum, a full-throated, bare-knuckles, no-holds-barred immersion into the COSAC Way. You join a group of experienced practitioners of our somewhat dark art. They’ve seen it all, done it all, won some, lost some and had some rained out. They’ve persisted in giving their employers the best information security for resources expended and political will. Like you, they know what works and what doesn’t and have a low tolerance for BS.
Speaker(s)
The 10th COSAC 'Design-Off'
Masterclass M2
This design-off will present a new and engaging set of challenges. In the spirit of hack-a-thons, this competition was born out of a desire to provide a venue for security architects to apply their skills in a safe environment. This is a unique competition format that uses real clients, scenarios and deliverables to see which team will reign supreme! Whether you are a seasoned enterprise architect or security architect, or just looking to try something different to build and enhance your skills, this session will provide a unique opportunity to prove and hone your architecture chops.
Speaker(s)
Leave Your Ego At The Door - Negotiation Skills for Security Professionals
Masterclass M3
Security professionals are trained to be right. We’re analytical, precise, and trained to avoid risk. But in high-pressure situations — budget fights, incident response, risk trade-offs — the person who “wins the argument” often loses the outcome. The real deciding factor is usually emotion: fear, status, certainty, and trust.
Speaker(s)
Making Digital Empathy Real: Turning People Centric Security a Reality
Masterclass M4
As technology becomes ever more embedded in work and daily life, security teams must rethink how they design, communicate and implement controls. This master class introduces digital empathy as a practical security capability—one that recognises the diversity of user behaviour, context and culture, and uses that understanding to create more effective, human centred security.
Speaker(s)
-
-
Monday 28th
11:05-11:25Morning Coffee
-
Monday 28th
13:00-14:00Lunch
-
Monday 28th
15:35-15:55Afternoon Tea
-
Monday 28th
18:30-19:00Drinks Reception
-
Monday 28th
19:00 onwardsDinner
Tuesday 29th September
-
Tuesday 29th
09:00-09:30Registration & Coffee
-
Tuesday 29th
09:30-10:30The CISO Operating System: Fixing the 7 Failures in Security Leadership
Session 1A
Most struggling security programs don’t fail because of technology — they fail because of gaps in leadership, structure, culture, and execution.
Drawing on various insights from decades of CISO experience and lessons from over 200 security leaders, this session introduces a practical model for evaluating the effectiveness of a security organization: the CISO Operating System, based on seven interdependent elements of leadership and organizational performance.Speaker(s)
Preventing Insider Risk at the Human Layer: How Adversaries Target Your People Before They Target Your Systems
Session 1B
We pour huge effort into technical controls and monitoring, yet many insider risk cases begin long before any alert fires. Adversaries often start by targeting people in relaxed, social settings: that must attend conference, a networking dinner, or a friendly chat with someone who seems genuinely interested. Before you know it, a colleague enjoys a great evening, lets their guard down… and unknowingly gives an adversary exactly the foothold they were looking for.
Speaker(s)
AI – Super Hero or Super Villain?
Session 1C
Security AI is often framed through a glass‑half‑empty lens, yet for security architects, it is becoming an indispensable tool. This session for practitioners who are curious, or under pressure to “use AI”, while remaining accountable for rigour, traceability and regulatory compliance. It shows, with examples, how to weave AI into delivery without lowering standards.
Speaker(s)
Securing Cyber-Physical Systems with the SABSA framework
Session 1S
Current cyber security practice typically focuses on classic IT ecosystem comprising computing environments running enterprise and business applications. Breaches result in personal data loss, financial loss, and IP theft. We also depend upon cyber-physical systems (CPS) to service many of our personal and business needs. These are complex systems-of-systems comprising digital elements (for control, sensing and safe operation) and physical elements (for interaction with physical entities and providing physical safety constraints).
Speaker(s)
-
-
Tuesday 29th
10:30-11:30Leading on Your Worst Day
Session 2A
You remember exactly where you were that morning. The moment you saw the alert on the screen. The confusion. The realization that this was not an accident. Your world changed forever.
Now imagine finding yourself suddenly in charge, without a playbook and without the ability to reach higher authority. Fragmented information that is often wrong. More rumors than facts. Uncontrolled emotions. And 150 people are looking to you to make a decision.Speaker(s)
(Ab)using Cognitive Biases: A Hacker's Guide to Defensive Social Engineering
Session 2B
Attendees will learn to apply the B=MAP framework and defensive social engineering to ethically exploit cognitive biases, transforming passive compliance into reflexive security instincts capable of defeating AI-driven deepfake attacks.
Speaker(s)
Seeing the Unseen: A SABSA Approach for Discovering Hidden AI in Third-Party Vendors
Session 2C
Vendors increasingly embed AI deep in products and subcontracted services, obscuring model provenance, data lineage, and third party dependencies. This creates a business critical blind spot for security leaders: you cannot govern what you cannot see. Consequences include hidden model risk, opaque data flows, unmodeled threat surfaces, and weak auditability—directly impacting regulatory assurance, incident response, and contract risk.
Speaker(s)
Architecting for Failure: Designing Cyber Recovery from Failure Modes
Session 2S
Defence in depth is reassuring. It is also architecturally incomplete.
Over the past year, ransomware, identity compromise and systemic supply chain attacks have continued to escalate, with major organisations in the US and UK suffering significant disruption and, in some cases, struggling to recover in a timely or controlled manner. These incidents have demonstrated a hard truth: layered prevention does not prevent failure it merely delays it.Speaker(s)
-
-
Tuesday 29th
11:30-11:45Morning Coffee
-
Tuesday 29th
11:45-12:45Named a Top CISO by an Algorithm: An OSINT Investigation into the AI Ego-Baiting Machine
Session 3A
In February of 2026, my name suddenly appeared in a LinkedIn post about "5 CISOs to watch in Norway’s Computer & Network Security Industry" – from a seemingly American online newspaper writing about security by and for CISOs. It’s always nice to be recognized for doing a good job, but there was also something suspicious about the whole thing. Why had I never heard of this site before? Or heard anything from the named journalist before they published an article mentioning me?
Speaker(s)
From No SIEM to Intelligent SOC: Building Detection Capability in a UK Public Sector Estate
Session 3B
Many organisations assume that implementing a SIEM will inherently improve their security posture. Within the UK public sector, this assumption is commonly reinforced by increasing pressure to comply with guidance from the National Cyber Security Centre and demonstrate assurance under frameworks such as GovAssure. However, within environments with limited visibility, fragmented controls, and constrained resources, introducing a SIEM can just as easily amplify noise as it can improve detection.
Speaker(s)
Cybersecurity Architecture as Code: Using AI to Deliver Better Architecture Artifacts, Faster and Better Quality
Seesion 3C
At an all-hands town hall, onsemi's CEO challenged every employee — not just the security team — to stop thinking about AI as a way to automate existing processes and start thinking like a startup: disrupt the process entirely. Rob Rost took that challenge into his cybersecurity architecture program.
Speaker(s)
Designing Security Around the Most Fallible Asset: Reframing Enterprise Architecture Through a Human-Centric SABSA Lens
Session 3S
Cybersecurity architecture has traditionally been designed around systems, applications, networks, and data. Humans are typically treated as risks to be managed, constrained, or monitored.
What if the primary asset in our design were not the system… but the human, and the task the person is trying to accomplish.Speaker(s)
-
-
Tuesday 29th
12:45-13:45Lunch
-
Tuesday 29th
13:45-14:45Rethinking Supply Chain Cyber Security: From Audit Burden to Threat-Led Defence
Seesion 4A
Organisations are increasingly overwhelmed by audit-based approaches to supply chain cyber security. As regulatory expectations rise and procurement teams demand ever-growing evidence of compliance, suppliers face a proliferation of questionnaires, attestations, and point-in-time checks. Yet despite this escalating administrative load, overall risk is not materially reduced. Attackers do not respect audit cycles, and compliance artefacts rarely reflect the dynamic threat environment or the real security posture of complex supply chains.
Speaker(s)
Demystifying encryption in use: homomorphic encryption & multi-party computation
Session 4B
Encryption of data at rest and in transit are well known cryptographic use cases. However, their sibling use case of encryption of data in use is less known and less understood. As an example, the European DORA regulation mentions using encryption of data in use “where necessary”, but that leaves to wonder: when is it necessary to encrypt data in use? And if it is necessary, how can we do so?
Speaker(s)
Education’s Artificial Intelligence Dilemma
Session 4C
In the rush to adopt generative AI, the education sector has found itself on a unique frontline. As CISO for the Department for Education, I’ve observed that while every industry faces AI-driven threats, the stakes in academia are fundamentally different. Our sector is built on a currency of trust. Trust between student and teacher, researcher and peer, and institution and employer.
Speaker(s)
The Architecture for Abandonment: Reducing Tech Debt by Killing Zombies
Session 4S
As Security Architects, we are fluent in Secure by Design, yet often neglect Secure by Decommissioning. For many organisations, the most significant architectural risk is not the latest technology or emerging threats, but the silent persistence of legacy systems that nobody owns, understands, or has the courage to switch off. In 2026, technical debt has evolved from an engineering nuisance into a core security architecture issue.
Speaker(s)
-
-
Tuesday 29th
14:45-15:00Afternoon Tea
-
Tuesday 29th
15:00-16:00Minimum Viable Company: How Organisations Survive After Trust Fails
Session 5A
Most cyber recovery strategies quietly assume that trust still exists — in identity systems, administrators, backups, telemetry, or time. In real incidents, it rarely does. When trust collapses, the question is no longer how quickly can we recover everything, but what can we safely rely on at all.
Speaker(s)
Dropping the C-BOM: A Practical Playbook for Defusing the Post-Quantum Threat
Session 5B
This session presents a practical, tool-ready approach for identifying organisational exposure to post-quantum cryptographic (PQC) risk through enterprise architecture and cryptographic asset discovery.
The session shows how a canonical EA blueprint, utilising a cryptographic taxonomy specified in CycloneDX Cryptographic Bill of Materials (CBOM) format, can be used to create model of cryptographic material in the context an enterprise-wide IT landscape.Speaker(s)
No Humans in the Kill Chain: Architecting Response Capabilities for AI agents and AI-on-AI Attacks
Session 5C
Let's be honest, everything we've built in incident response assumes there's a human at the other end. Our logs, our kill chains, our IoCs, our forensic timelines, all of it expects human-speed actions and human decision-making. That falls apart with autonomous AI systems.
Speaker(s)
The Illusion of Control: Why Security Architectures Look Strong on Paper and Collapse in Reality
Session 5S
Security architectures are often dense with controls, policies, and assurance artefacts. On paper they appear comprehensive, well governed, and rigorously designed. Yet some of the most heavily controlled environments still experience catastrophic security failures. Why?
Speaker(s)
-
-
Tuesday 29th
16:00-17:00From Devils to Angels: Back to the Future of Cyber Security
Session 6A
Much of the focus of internal cyber security is on malicious behaviour. But this is not the only reason incidents happen and risks overlooking other behaviours that are just as dangerous, if not worse.
Centuries ago, do something wrong and you’re either a knave or a fool. While this sentiment persists, there are better ways of carving up the population. Consider the “5% devils, 5% angels and 80% in-between” model. Within the 80% we have the malicious, the reckless, the negligent and the accidental. Of these it is the accidental who, far from being the weakest link, are the least understood link.Speaker(s)
Cybercrime as a System: The Modern Attack Surface Under Pressure
Session 6B
Cybercrime is no longer best understood as a series of isolated attacks. It now operates more like an industry: distributed, specialised and quietly efficient. Behind a successful breach sits a web of malicious and semi-malicious activity including access brokers, phishing infrastructure, traffic distribution, malware services, identity abuse, compromised supply chains and monetisation networks. Each part may appear limited on its own; together they create a scalable operating model for intrusion.
Speaker(s)
The Story of the AVR Roaming Around the Factory Floor
Session 6C
A consumer buys a cheap robot vacuum on TEMU, plugs it in, and sends it on its way. A cautious security professional isolates it on the home network and blocks internet access. The result? The robot slowly stops functioning—because it can’t phone home to its “mothership.”
Speaker(s)
E5 Isn’t a Strategy: Designing Security Architecture Before Licensing in the UK Public Sector
Session 6S
The UK public sector has invested heavily in modern security suites aligned with National Cyber Security Centre guidance and assurance frameworks, such as GovAssure and Cyber Essentials. However, many organisations still find it difficult to demonstrate real improvements in resilience, detection, or control effectiveness. In some cases, increased capability introduces complexity without reducing risk.
Speaker(s)
-
-
Tuesday 29th
17:00–17:15Refreshments
-
Tuesday 29th
17:15–18:15Compliant and Compromised
Plenary 7P
Your Smart TV is watching you back. Your internet-connected fridge is mapping your home network. Your video doorbell is feeding footage into a law enforcement surveillance platform you never signed up for. These are not theoretical attack scenarios — they are documented, real-world behaviours of devices sitting in millions of homes right now, including the homes of your employees, your executives, and, most likely, everyone in this room.
Speaker(s)
-
-
Tuesday 29th
18:30-19:00Drinks Reception
-
Tuesday 29th
19:00 onwardsDinner & Irish Music Night
Wednesday 30th September
-
Wednesday 30th
08:45-09:00Registration & Coffee
-
Wednesday 30th
09:00-10:00Outcome Driven Metrics – The Holy Grail of Metrics
Session 8A
Modern security metrics are overrun by control and activity counts that fail to tell senior stakeholders whether loss, resilience and trust are actually improving. This session treats outcome‑driven metrics as the governing layer and shows how to wire compliance, activity, maturity and risk‑based measures into them as evidence and levers. Attendees leave with a pattern for defining business‑service outcomes, constructing outcome trees and mapping existing telemetry into a minimal, board‑ready set of measures tied directly to loss and resilience, plus a practical test for whether any proposed metric is genuinely informative about risk rather than a decorative KPI.
Speaker(s)
Information As A Domain of War – IWAR
Session 8B
Information has emerged as a critical warfare domain alongside traditional military environments. COL (R) Lawrence D. Dietz's lecture explores how modern military operations leverage the information environment across three interconnected dimensions: physical infrastructure, informational flow, and cognitive perception.
Speaker(s)
The Cognitive Attack Surface - Architecting Defence in Depth for Agentic AI
Session 8C
This session is designed for Cybersecurity professionals to identify the architectural choke points in multi-agent environments before the current surge in illicit AI activity fully matures.
We will be moving beyond the "AI hype" to deconstruct how adversaries are operationalizing autonomous agents to execute entire attack chains with minimal human oversight.Speaker(s)
When SABSA Met FAIR: A Framework Dynamic Duo
Session 8S
This session will show how SABSA can incorporate FAIR (Factor Analysis of Information Risk) to increase risk rigor and security decision-making.
Speaker(s)
-
-
Wednesday 30th
10:00–11:00A Security Roadmap is Not a Strategy: Crafting Your North Star
Session 9A
Do you have a security technology strategy?
Are you sure it’s a strategy, or is it a roadmap for technology purchases and updates?Speaker(s)
The Death of Truth: Cyber War and the Fifth Domain of Conflict
Session 9B
"Words had to change their ordinary meaning and to take that which was now given them."
- Thucydides
In modern conflict, the most important battlefield may no longer be territory, infrastructure, or even networks; it is truth itself. This presentation continues a five-year COSAC series examining cyber strategy, information warfare, and the manipulation of truth. Cyberspace has expanded the battlefield beyond geography into the information ecosystems that shape public perception and political will.
Speaker(s)
You Can't Patch a Mental Model: How Agentic Systems Expose our Hidden Security Assumptions
Session 9C
Agentic security is not hard because it is new. It is hard because it violates the assumptions our security models are built on.
We build controls. Agents adapt around them. It’s not that we built the wrong controls; it’s that we built them on the wrong mental models. We keep trying to “secure agents”, but what’s required is to govern agency. These are fundamentally different problems.Speaker(s)
Using SABSA NIST CSF Business Attributes
Session 9S
The SABSA Institute (TSI) sponsored SABSA Enhanced NIST Cybersecurity Framework (SENC) workgroup project is developing various tools, techniques and guidance to help your organization put the NIST CSF to work the SABSA way. The SENC project has defined a collection of example Attributes and Attribute Profiles, based on the NIST CSF Functions, Categories and Subcategories and can be leveraged when integrating the NIST CSF into a SABSA Security Architecture. This first SENC project deliverable includes the requirements, method, process and examples for leveraging the NIST CSF based Business Attributes and Attribute Profiles to integrate the CSF into a SABSA security architecture that is tailored to the specific needs, and aligned to the risk appetite, of the business. The business attributes profiling process is one of the more important techniques to integrate the NIST CSF into a SABSA security architecture.
Speaker(s)
-
-
Wednesday 30th
11:00-11:15Morning Coffee
-
Wednesday 30th
11:15–12:15Human-Centric Security: What Anthropology, Archaeology, and Behavioural Science Reveal About Cyber Resilience
Session 10A
Cybersecurity has long leaned on technical frameworks and compliance-driven methods, but security is, fundamentally, about people. This talk draws on interdisciplinary insights from anthropology, archaeology, criminology and behavioural science to rethink how organisations understand risk, design controls and build resilient security cultures.
Speaker(s)
Digital Sovereignty and Sovereign Cloud Platforms for National Critical Workloads
Session 10B
Governments and critical infrastructure operators face rising pressure to maintain control over sensitive digital systems. Healthcare records, defence intelligence, justice data, and national infrastructure telemetry all hold strategic value. Many public sector organizations rely on global cloud providers operating under foreign legal regimes. This creates exposure to extraterritorial legislation, opaque operational control, and reduced national oversight.
Speaker(s)
Fractional Identities for the Agentic AI Future
Session 10C
The emergence of autonomous AI agents acting on behalf of users challenges the current identity paradigm. While existing identity infrastructures are designed to authenticate who performs an action, they do not natively support verifiable delegation—making it difficult to determine who authorized an automated action and under what conditions. This limitation becomes critical in regulated digital ecosystems where accountability, non-repudiation, and auditability are required.
Speaker(s)
Defending the Final: Applying SABSA Business Attributes to Quantify Cyber Risk for a Live FIFA World Cup Broadcast
Session 10S
A billion viewers. Ninety minutes. If the stream fails during the penalty shootout, no incident response plan recovers the revenue. The match is over. The value is gone.
Speaker(s)
-
-
Wednesday 30th
12:15-13:00Lunch
-
Wednesday 30th
13:00–14:00Where the CISO Sits in 2026: Reporting Lines, Power Structures, and Risk Ownership
Session 11A
The question of where the CISO reports is no longer an organizational preference — it is a statement about who owns cyber risk, who communicates what to whom, and who is accountable when something goes wrong.
Speaker(s)
So You’re Being Told You Need a Sovereign Cloud…
session 11B
Sovereign cloud is appearing everywhere in board directives and government strategies — usually framed as something you can acquire. But sovereignty isn’t a product. It’s a disposition – a way of shaping architectural and operational conditions so that, over time, an organisation has more agency and resilience, and fewer opaque dependencies and surprises. Treating it as a purchase order obscures the real work.
Speaker(s)
From Whiteboard to Workflow: AI-Assisted Dependency Modelling
Session 11C
Dependency modelling offers a rigorous way to understand how outcomes depend on interconnected capabilities, conditions, and uncontrollable factors. However, building meaningful models often requires significant time, expertise, and analytical effort. This presentation explores how AI-assisted techniques can help practitioners accelerate the modelling process while preserving methodological integrity.
Speaker(s)
Zero to SABSA: Scar Tissue from Establishing Security Architecture into Maritime Shipbuilding
Session 11S
A practitioner’s account from the field, when a strategically significant Defence programme moves quickly, stakeholders focus on delivery, and engineers are ready to ‘cut steel’. This session outlines how architectural thinking was integrated into a live project in which security was initially treated as a compliance afterthought rather than a design input. The audience will learn how business attributes, risk drivers, mission context, stakeholder tension, and architectural traceability were employed to shift discussions from “what controls do we need?” to “what mission outcomes must be protected, and why?”
Speaker(s)
-
-
Wednesday 30th
14:00-14:15Afternoon Tea
-
Wednesday 30th
14:15-15:15Protecting Our Children: Mobilizing the Security Community Against Online Sexual Predators
Session 12A
The people in this room understand the internet's attack surface better than almost anyone alive. Most of us are also parents, aunts, uncles, coaches, and neighbors. Yet when it comes to child sexual abuse and exploitation online, the security community has largely stayed in its lane — treating this as a law enforcement problem, not ours.
Speaker(s)
Measuring Digital Safety using Dependency Modelling
Session 12B
Digital systems are increasingly complex, interconnected and continuously evolving making it difficult to assess their safety at any given point in time. Traditional assessments of risk and safety are often infrequent, static, and focused on individual components; limiting their ability to reflect the dynamic nature of modern complex digital systems of systems.
Speaker(s)
Using SABSA to Find Amelia Earhart
Session 12C
On a warm tropical morning in 1937, Amelia Earhart and Fred Noonan flew into history. They took off in a Lockheed Electra from New Guinea at 10am on the second last leg of their groundbreaking around the world flight. 18 hours later, the Electra, Amelia and Fred had vanished without a trace.
Speaker(s)
Robert Laurie
404 Enterprise Architecture Not Found: How to Build a Defensible ESA Without a Functional EA
Session 12S
Security architects are often advised to "align with Enterprise Architecture (EA)," but this presumes a mature EA capability is in place. In reality, many organisations operate without a reliable enterprise model, a clear target state, or even a unified understanding of how the business actually functions. Consequently, architecture is frequently reduced to ambiguous objectives, inherited standards, obsolete documentation, and tactical decisions masquerading as strategy. In such environments, the work more closely resembles corporate archaeology than genuine architecture.
Speaker(s)
-
-
Wednesday 30th
15:15–16:15The Great Conflation: Privacy Ethics vs Privacy Law
Session 13A
As organisations increasingly turn to ethical frameworks to demonstrate responsible technology governance, an important distinction is often blurred: the difference between ethical aspiration and legal obligation. This session addresses this growing challenge by contrasting the perspectives of a US cybersecurity lawyer and Of Counsel with those of a European data protection expert. In doing so, this session examines how privacy is understood through two fundamentally different lenses – Law and Ethics.
Speaker(s)
Your Security Stack Isn’t Slow. Your Decision System Is
Session 13B
Most security leaders can tell you how many tools they own. Very few can tell you how fast they can change them when a new threat appears. That’s now the real problem.
Attackers change paths in hours. Vendors ship new control points in days. Most enterprise security teams still need weeks of meetings, design reviews, change boards and tool-by-tool coordination before risk is reduced. The gap is no longer just technical. It’s operational. It’s architectural. It’s about decision speed.Speaker(s)
Securing Trust in a Fragmented World: AI, Privacy and Democratic Resilience
Session 13C
Artificial Intelligence is reshaping society at an unprecedented pace. From automated content moderation to AI-driven social media feeds, recommendation engines, and generative tools, AI increasingly influences public opinion, information consumption, and civic engagement. While these technologies promise innovation and efficiency, they also introduce complex security, privacy, and digital trust challenges that vary across regions, demographics, and regulatory frameworks.
Speaker(s)
From Risk Acceptance to Security-by-Design: Applying the SABSA Guardrail Model to Transform Legacy Enterprise Architectures
Session 13S
Most enterprise security architectures are not intentionally designed, they evolve over time as systems, integrations, and infrastructure accumulate in response to changing business needs. As a result, many organizations operate complex environments that were not originally built with consistent security-by-design principles or architectural governance.
Speaker(s)
-
-
Wednesday 30th
16:15–16:30Refreshments
-
Wednesday 30th
16:30–17:30Anthony Sale Memorial Session - Time is of the Essence
Plenary 14P
Modern enterprise infrastructure assumes that time is accurate, available, and trustworthy. Critical authentication systems, cryptographic protocols, distributed databases, logging platforms, and monitoring and analysis systems all rely on tightly synchronised clocks to function correctly. Unfortunately, the infrastructure that provides trusted time (GPS receivers, network time services, and hierarchical NTP services) is rarely treated as critical security infrastructure. Consequently, many organisations have not seriously considered how failures or manipulation of time sources could cascade into systemic outages.
Speaker(s)
-
-
Wednesday 30th
17:30–18:30The COSAC Rump Session
Plenary 15P
The COSAC “rump” has for many years been a hugely popular plenary session at COSAC. The Rump is an informal rapid-fire session in which participants give very short presentations on recent results, work in progress, and any other topic of interest to the COSAC community. Presentations may be purely technical, entirely management oriented in nature, or of any combination of approaches or perspectives.
Speaker(s)
David Lynas & Various
-
Wednesday 30th
18:45-19:15Drinks Reception
-
Wednesday 30th
19:15 onwardsDinner & Networking
Thursday 1st October
-
Thursday 1st
09:00-09:30Registration & Coffee
-
Thursday 1st
09:30-12:30COSAC Workshops are half-day, 09:30 - 12:30
-
Thursday 1st
09:30-12:30Information Warfare (IWAR) Tabletop Exercise
Workshop W1
This half day workshop allows participants to experience the fog of information warfare and apply their analytical and creative skills to address military aggression in Eastern Europe.
Speaker(s)
The COSAC Risk Workshop Series – Using AI to Enhance Enterprise Risk Management
Workshop W2
The purpose of the risk workshop is to explore the hard parts of understanding risk. We have previously conducted workshops in Ireland and Australia on how to understand and model risk, how to explain and display risk to stakeholders, and how to think like our adversaries to identify threats that we would otherwise miss. Last year we discussed the emergence of AI and how it is being used as a tool by cybersecurity professionals as well as how it is being used by our adversaries.
Speaker(s)
Network Security Futures - Part 1: AgentDNS - Architecting Navigation Through the AgentWeb
Workshop W3 - Part 1 09:30-10:50
The World Wide Web already hosts AI services such as ChatGPT and is evolving rapidly to handle the next wave of AI, that of autonomous Ai-enabled endpoints or Agentic AI. As vast numbers of AI Agents become directly accessible on the internet, the existing addressing schemes that have supported web sites will no longer be adequate.
Speaker(s)
Network Security Futures - Part 2: Fun with Micro-segmentation; Subnets, Supernets, and Aliases
Workshop W3 - Part 2 11:10-12:30
Micro-segmentation is a familiar concept, but new emphasis is being placed on this technique that creates one of the few proactive security solutions available to architects. IAM and PAM solutions all for users and user groups to exist in tightly formed boundaries and these boundaries can extend beyond file and server permissions to the network segmentation tricks.
Speaker(s)
From Static Risk Registers to Living Risk Models: Extending SABSA Threat Scenarios with Dependency Modelling and Bayesian Evidence for Complex Nonlinear Systems
Workshop W4
Cybersecurity risk is frequently assessed using static registers and scoring models that struggle to represent the dynamic and contextual behaviour of modern digital systems. This limitation becomes particularly visible in AI-driven platforms, where relatively minor architectural modifications can significantly alter exposure and privacy risk. In such environments, risk behaviour often resembles that of complex nonlinear systems characterized by sensitivity to initial conditions, rather than the stable and predictable dynamics traditionally assumed in engineered technological systems.
Speaker(s)
-
-
Thursday 1st
10:50-11:10Morning Coffee
-
Thursday 1st
12:30-12:45Conference Close
-
Thursday 1st
12:45-13:45Lunch
COSAC
Patrons
A completely new COSAC experience pushing the boundaries of cybersecurity further than ever before. Smart people, inspiring guest speakers and a ton of passion. Become a COSAC Patron and gain access like no other.
Become a patronContact
Get in contact with us by email, phone or just stay social and connect with us on LinkedIn