Tuesday 25th February
-
Tuesday 25th
08:30-09:00Registration & Coffee
-
Tuesday 25th
0900:-09:20COSAC APAC 2025 Chairman's Welcome
-
Tuesday 25th
09:30-10:15Security Architect to CISO – How SABSA Saved My Bacon
Session 2A
A personal reflection of the key take aways from undertaking several SABSA trainings and how it has allowed for a successful journey from Security Architect to Chief Information Security Officer for a large enterprise organisation.
Speaker(s)
Nigel Hedges
Quantum Computing Demystified
Session 2B
Since the mid 1990’s the open cryptographic community has been considering the possibility that advanced computing capability would. at some point, undermine the security of the standard cryptographic processes used routinely throughout our daily lives. Of particular relevance was Peter Schor’s development in 1994 of the first quantum algorithm (now known as Shor’s algorithm) to efficiently factorise large numbers such as those used by Public Key Cryptographic schemes.
Speaker(s)
Andy Clark
-
Tuesday 25th
10:20-11:05The High Rollers Table - A Case Study in Proving Your Value Using SABSA
Session 3A
When it comes to demonstrating the value you are providing to your high-roller stakeholder sitting at the table, there isn’t a lot of room for error, filibustery or flub. In any other circumstance, you might be able to lean heavily on bamboozlement at the brilliance of your diatribal eloquence, the captivatingly exquisite heights of your genre-defining diagrams and matrices, or the various bric-a-brac-esque levels of understanding inhabiting the zeitgeist of the VIPs you are presenting to.
But.Speaker(s)
Harley Aw
Dan SchoemakerAI - Your New Partner in Capability Uplift
Session 3B
For over 50 years, IT professionals have been using frameworks and standards to underpin capabilities. We’ve been on an endless quest to support our businesses in leveraging technology for business value whilst maintaining compliance and managing risk.
Speaker(s)
Dave Favelle
-
Tuesday 25th
11:05-11:25Morning Coffee
-
Tuesday 25th
11:25-12:10Building An Explanatory SABSA Matrix Bottom Up
Session 4A
SABSA works from the Attributes, building down from them through the Contextual Architecture into and across the Matrix. This can make it difficult for people to visualise and engage, with the matrix, it also requires commitment. This session will build an example of the matrix across and up from the Component Architecture.
Speaker(s)
Darren Skidmore
AI & Quantum Computing - A Double-Edged Sword for Cybersecurity
Session 4B
In the era of AI and Quantum computing the need for a robust Cyber Security strategy and program have become more essential to ensure that organizations are adequately prepared to both deal with the unintended outcomes and potential benefits.
Speaker(s)
Sammy Chuks
-
Tuesday 25th
12:15-13:00Transforming Enterprise Security Architecture from Theory to Practice
Session 5A
Is having a comprehensive Enterprise Security Architecture (ESA) document enough to meet business needs? We developed an ESA using the SABSA framework, which provided a thorough vision of our desired future state. However, its academic tone and complex structure made it difficult for architects and stakeholders to translate theory into actionable steps. Consequently, it was primarily utilised only by the Cyber Security Architect.
Speaker(s)
Mai Tran
Paul KaranAI Governance and Risk: Navigating ISO 42001 and ISO 23894
Session 5B
Navigating the complexities of AI governance and risk management requires a solid understanding of relevant standards. This session will guide you through ISO 42001 and ISO 23894, highlighting the importance in establishing robust AI governance frameworks and managing risks effectively.
Speaker(s)
Bharat Bajaj
Reshma Devi -
Tuesday 25th
13:00-14:00Lunch
-
Tuesday 25th
14:00-14:45Implementing the NIST CSF 2.0 the SABSA Way Cybersecurity Framework
Session 6A
How should you implement the NIST Cybersecurity Framework (CSF) 2.0 when developing or updating a security architecture using SABSA? With the addition of the Govern Function, the NIST CSF 2.0 is a significant upgrade to the de-facto global framework for managing cybersecurity risks but does not have everything you need to effectively manage your enterprise cybersecurity risk.
Speaker(s)
Glen Bruce
RegTech: The Evolution of Cyber Financial Crime Solutions
Session 6B
Regulatory Technology (RegTech) revolutionises the financial sector by providing innovative solutions for compliance and crime prevention. This presentation delves into RegTech’s pivotal role in combatting financial crime, spotlighting its intersection with cybersecurity through case studies and practical applications.
Speaker(s)
Guarav Vikash
-
Tuesday 25th
14:50-15:35The ISM, E8 & SABSA
Session 7A
The Information Security Manual (ISM) is the Australian Signals Directorate’s opus on all thing’s information security. This evolutionary document is mandated in high level government policy (the PSPF) as the control library for information systems in Australian Federal Government entities.
Speaker(s)
Kirren Hartas
Architecting Cybersecurity Self-Assurance
Session 7B
Cyber security risk is one of the top non-financial risks for organisations. It can be present in almost any part of digital operations. The nature of the risk is both complex and broad due to the complexity of the attacks and evolving capabilities of the attackers.
Speaker(s)
Dimitrios Delivasilis
-
Tuesday 25th
15:35-15:55Afternoon Tea
-
Tuesday 25th
15:55-16:40SABSA, Security Metrics and Compliance (The Good, The Bad and The Ugly)
Session 8A
Data, data, data – is too much data really a thing? Is too much data overwhelming you and creating too much unwanted noise? What are the dangers of too much data?
Speaker(s)
Paul Blowers
Communicating Cyber with Pretty Pictures: A Guide for Technical People
Session 8B
Effective communication has always been crucial for security managers, security architects, and CISOs. Data visualisation plays a key role in this communication, yet it often falls outside the typical skill set of tech and security professionals.
Speaker(s)
Rustam Teregulov
-
Tuesday 25th
16:45-17:30The Mystery of Business Attributes - An Interrogation of Kipling's Six Honest Men
Session 9A
Business Attributes are the central, single most defining concept of concept in SABSA.
Speaker(s)
Sarit Kannanoor
Metrics That Matter
Session 9B
Two seasoned governance, risk, and compliance professionals share unique insights in a thought-provoking discussion about what metrics matter and why some don’t.
Speaker(s)
Kathleen Mullin
Johan Lidros -
Tuesday 25th
17:40-18:40The Increasing Importance of Technical Surveillance Countermeasures (TSCM) in the Era of IoT and Mobile Devices
Plenary 10P
As IoT and mobile devices have become ubiquitous in both personal and professional environments, the landscape of information security has undergone significant transformations. These technologies, while enhancing connectivity and operational efficiency, have introduced new vulnerabilities that are increasingly exploited by adversaries.
Speaker(s)
Andy Clark
-
Tuesday 25th
18:45-19:15Drinks Reception (sponsored by The SABSA Institute)
-
Tuesday 25th
19:15Dinner (sponsored by The SABSA Institute)
Wednesday 26th February
-
Wednesday 26th
09:00-09:30Registration & Coffee
-
Wednesday 26th
09:30-10:15An Analysis of the Integration of SABSA and Mitre Projects
Session 11A
Everyone knows MITRE ATT&CK, but what about other MITRE projects like TRAM, D3FEND, EMB3D, CAPEC or ATLAS.
Speaker(s)
Bruce Large
Exploring Dora
Session 11B
Dora is an explorer, and in the presentation we’re going to explore the wonderful world of Digital Operational Resilience Amigo! Yes, it’s the EU’s DORA which is due to become a regulatory demand in banking and likely beyond.
Speaker(s)
Malcolm Shore
-
Wednesday 26th
10:20-11:05The Intersection of Digital Archiving Principles and SABSA Framework
Session 12A
In an era of ever-expanding digital footprints, organisations grapple with the dual challenge of securing sensitive information while preserving its business and historical context. Enter the information archivist—the custodian of organisational memory. Nowadays digital archivists navigate the digital realm, safeguarding records, emails, and data flows. But what happens when archival principles intersect with a comprehensive security framework like SABSA?
Speaker(s)
Bethany Sinclaire-Giardini
Co-design As A Framework for Cyber Strategies
Session 12B
Cybersecurity remains a significant challenge for organisations, with teams often operating with limited resources. To address this issue, an alternative method involving the engagement of non-cyber stakeholders in the cybersecurity process is proposed utilising the co-design framework.
Speaker(s)
Lynore Close
-
Wednesday 26th
11:05-11:25Morning Coffee
-
Wednesday 26th
11:25-12:10Mishaps & Meltdowns - Using SABSA to Diagnose Failures in Complex Systems
Session 13A
In 1991 The U.S.S.R. was the largest country in the world, covering over 1/6th of the land on earth, but within a year the Soviet Union had ceased to exist.
Speaker(s)
Robert Laurie
Let's Co-Design A Secure Business Transformation
Session 13B
With over 90% of businesses undertaking transformations to take advantage of new technologies, changing customer demands and responding to economic pressures. The new and heightened security risks combined with the changing threat landscape are requiring a co-design and co-collaboration amongst with CRO and CISO with the business.
Speaker(s)
Anu Kukar
-
Wednesday 26th
12:15-13:00You Can Fix Stupid: Automating to Reduce Risk and Reducing Risk in Automation
Session 14A
In a world where cyber threats are evolving at an alarming rate, organizations are expected to do more with less, employees are given ever increasing workloads, and human error remains a significant contributor to data errors and security breaches, automation emerges as a crucial solution.
Speaker(s)
Ashling Lupiani
Honey or Vinegar? Leveraging Human Psychology to deliver positive security outcomes at scale
Session 14B
As the old saying goes – “you catch more flies with honey than vinegar”. The question then follows, how might this saying change the way we approach embedding cybersecurity into the thinking of each and every one within your organisation? And if we did – what might the outcomes be?
Speaker(s)
Ben Ley
-
Wednesday 26th
13:00-14:00Lunch
-
Wednesday 26th
14:00-14:45Unified Security Culture Programs: Impermanence, imperfection and iteration
Session 15A
This session is the story of an organisation like many others, which assembled a clever and capable security team. After establishing their fundamentals, the team developed security education, outreach and champion programs over time to build security culture. While these programs were individually excellent the team realised they could win even more with a unified game plan.
Speaker(s)
Kirk Nicholls
Apocalypse CISO
Session 15B
Continuing the theme from COSAC Naas 2024 of posing challenges faced by CISOs from the viewpoint of cinematic classics, your presenter delves into his past, because like so many things in life, what is old is new again…”the horror”.
Speaker(s)
Steven Kintakas
-
Wednesday 26th
14:50 15:35Seamlessly Traversing Shifting Boundaries
Session 16A
The ability to cross boundaries is one of the most natural human behaviours, in fact, it is so natural and normal that we don’t even give it a second thought.
Speaker(s)
Jaco Jacobs
Leveraging Cyber Threat Intelligence to Elevate Communication with Executives
Session 16B
Cyber Security is a critical topic in Boardrooms across the world. This is driven by increasing reliance on technology to deliver business outcomes along with the rapidly evolving cyber threat landscape and regulatory actions. These changes require CISOs and cyber leaders to develop effective communication strategies that bridge the gap between technical jargon and business acumen.
Speaker(s)
Chirag Joshi
Chatura Abedyeera -
Wednesday 26th
15:35-15:55Afternoon Tea
-
Wednesday 26th
15:55-16:40It is More About the Business Strategy & Less About the Technology
Session 17A
Organisational cyber strategies typically include implementing new tools and hiring more people. A consistent gap, is linking cyber strategies to protecting and enabling business strategies.
Speaker(s)
Paul Karan
FANTASTIC BEASTS AND HOW TO TAME THEM: Operationalising Vulnerability Governance
Session 17B
In this session, we will delve into the intricacies of Vulnerability Management and Governance and provide a clearer understanding of their respective roles. Through her extensive experience, the featured speaker, Stephanie, will share a range of effective methodologies that can be deployed to operationalise vulnerability governance.
Speaker(s)
Stephanie Park
-
Wednesday 26th
16:45-17:30Security Architecture is a Team Sport
Session 18A
Enterprise security architects occupy a strange and sometimes inscrutable place within the team. They talk to business as well as technical staff, ask odd questions, build layered models and feel strongly about something called traceability. Through their efforts plans, designs and roadmaps are created which guide us forward in a sustainable and balanced way.
Speaker(s)
Kirk Nicholls
Sarit KannanoorOn The Art of Game Theory & Threat Modelling
Session 18B
It was asked at the 2024 COSAC APAC, “But we don’t have unlimited resources, how do we threat model and consider the costs?”, this presentation aims to help answer that question.
Speaker(s)
Bruce Large
-
Wednesday 26th
17:40-18:40The COSAC Rump Session
Plenary 19P
The COSAC “rump” has for many years been a hugely popular plenary session at COSAC. The Rump is an informal rapid-fire session in which participants give very short presentations on recent results, work in progress, and any other topic of interest to the COSAC community. Presentations may be purely technical, entirely management oriented in nature, or of any combination of approaches or perspectives.
Speaker(s)
David Lynas
-
Wednesday 26th
15:45-19:15Drinks Reception
-
Wednesday 26th
19:15Dinner
Thursday 27th February
-
Thursday 27th
09:00-09:30Registration & Coffee
-
Thursday 27th
09:30-13:00COSAC Workshops are half-day, 09:30 - 13:00 & 14:00 - 17:30
-
Thursday 27th
09:30-13:005th COSAC APAC Security Architecture Design-Off
Workshop W1
Returning for a 5th year, this design-off will present a new and engaging set of challenges. In the spirit of hack-a-thons, this competition was born out of a desire to provide a venue for security architects to apply their skills in a safe environment.
Speaker(s)
Bill Schultz
Jason KobesMaking Better Risk Decisions with Open FAIR
Workshop W2
Cybersecurity risk quantification has gained popularity in recent years in sectors like banking, insurance, and pharmaceuticals.
Speaker(s)
Patrick Dunstan
Wargames: Tabletop Crisis Simulation
Workshop W3
Tabletop exercises are an essential tool for testing the preparedness of organizations in responding to crisis situations. However, traditional tabletop exercises often lack the element of unpredictability that can make real-life crises so challenging. This is where the Dungeons & Dragons (D&D) 5e tabletop role-playing game (TTRPG) system can be a valuable addition to cybersecurity crisis simulations.
Speaker(s)
Jaco Jacobs
-
Thursday 27th
11:05-11:25Morning Coffee
-
Thursday 27th
13:00-14:00Lunch
-
Thursday 27th
14:00-17:30This is the Way! Using SABSA to Transform A Global Managed Security Services Provider
Workshop W4
In late 2022 I was assigned to lead a team mandated with creating and implementing a strategy to transform the Managed Security Services business of a global organization that provides end-to-end security services. This organization operates more than twenty delivery centres globally and has grown, organically and through acquisition, to more than 3000 delivery centre employees.
Speaker(s)
Jaco Jacobs
Redefining Digital Identity for A Seamless & Secure Future
Workshop W5
In an era where digital transformation drives the global economy, the concept of Digital Identity has emerged as a cornerstone of secure, consumer-friendly interactions. This Masterclass at COSAC APAC 2025 will delve into the intricate process of designing a robust digital identity strategy and its implementation through technology.
Speaker(s)
MZ Omarjee
The COSAC Risk Workshop Series - Challenges with Risk Aggregation & Compound Risk
Workshop W6
The purpose of the risk workshop is to explore the hard parts of understanding risk. We have previously conducted workshops in Ireland and Australia on how to understand and model risk, how to explain and display risk to stakeholders, and how to think like our adversaries to identify threats that we would otherwise miss.
Speaker(s)
Bill Schultz
Jason Kobes -
Thursday 27th
15:40-16:00Afternoon Tea
-
Thursday 27th
17:30-17:45Conference Close - COSAC Chairman's Closing Remarks
-
Thursday 27th
17:45-19:45The SABSA Institute Forum
The SABSA Institute (TSI) and the TSI Liaison Group (LG) update. The TSI Forum includes a question-and-answer session and an opportunity to meet and interact with The SABSA Institute Board of Trustees (Directors) and LG members.
Speaker(s)
Gareth Watters
Kirk Nicholls
Kate Mullin
Glen Bruce
COSAC
Patrons
A completely new COSAC experience pushing the boundaries of cybersecurity further than ever before. Smart people, inspiring guest speakers and a ton of passion. Become a COSAC Patron and gain access like no other.
Become a patronContact
Get in contact with us by email, phone or just stay social and connect with us on LinkedIn & Twitter