Skip to content

Schedule

Tuesday 25th February

  • Tuesday 25th
    08:30-09:00

    Registration & Coffee

  • Tuesday 25th
    0900:-09:20

    COSAC APAC 2025 Chairman's Welcome

  • Tuesday 25th
    09:30-10:15

    Security Architect to CISO – How SABSA Saved My Bacon

    Session 2A

    A personal reflection of the key take aways from undertaking several SABSA trainings and how it has allowed for a successful journey from Security Architect to Chief Information Security Officer for a large enterprise organisation.

    Speaker(s)

    Nigel Hedges

    Quantum Computing Demystified

    Session 2B

    Since the mid 1990’s the open cryptographic community has been considering the possibility that advanced computing capability would. at some point, undermine the security of the standard cryptographic processes used routinely throughout our daily lives. Of particular relevance was Peter Schor’s development in 1994 of the first quantum algorithm (now known as Shor’s algorithm) to efficiently factorise large numbers such as those used by Public Key Cryptographic schemes.

    Speaker(s)

    Andy Clark

  • Tuesday 25th
    10:20-11:05

    The High Rollers Table - A Case Study in Proving Your Value Using SABSA

    Session 3A

    When it comes to demonstrating the value you are providing to your high-roller stakeholder sitting at the table, there isn’t a lot of room for error, filibustery or flub. In any other circumstance, you might be able to lean heavily on bamboozlement at the brilliance of your diatribal eloquence, the captivatingly exquisite heights of your genre-defining diagrams and matrices, or the various bric-a-brac-esque levels of understanding inhabiting the zeitgeist of the VIPs you are presenting to.

    But.

    Speaker(s)

    Harley Aw
    Dan Schoemaker

    AI - Your New Partner in Capability Uplift

    Session 3B

    For over 50 years, IT professionals have been using frameworks and standards to underpin capabilities. We’ve been on an endless quest to support our businesses in leveraging technology for business value whilst maintaining compliance and managing risk.

    Speaker(s)

    Dave Favelle

  • Tuesday 25th
    11:05-11:25

    Morning Coffee

  • Tuesday 25th
    11:25-12:10

    Building An Explanatory SABSA Matrix Bottom Up

    Session 4A

    SABSA works from the Attributes, building down from them through the Contextual Architecture into and across the Matrix. This can make it difficult for people to visualise and engage, with the matrix, it also requires commitment. This session will build an example of the matrix across and up from the Component Architecture.

    Speaker(s)

    Darren Skidmore

    AI & Quantum Computing - A Double-Edged Sword for Cybersecurity

    Session 4B

    In the era of AI and Quantum computing the need for a robust Cyber Security strategy and program have become more essential to ensure that organizations are adequately prepared to both deal with the unintended outcomes and potential benefits.

    Speaker(s)

    Sammy Chuks

  • Tuesday 25th
    12:15-13:00

    Transforming Enterprise Security Architecture from Theory to Practice

    Session 5A

    Is having a comprehensive Enterprise Security Architecture (ESA) document enough to meet business needs? We developed an ESA using the SABSA framework, which provided a thorough vision of our desired future state. However, its academic tone and complex structure made it difficult for architects and stakeholders to translate theory into actionable steps. Consequently, it was primarily utilised only by the Cyber Security Architect.

    Speaker(s)

    Mai Tran
    Paul Karan

    AI Governance and Risk: Navigating ISO 42001 and ISO 23894

    Session 5B

    Navigating the complexities of AI governance and risk management requires a solid understanding of relevant standards. This session will guide you through ISO 42001 and ISO 23894, highlighting the importance in establishing robust AI governance frameworks and managing risks effectively.

    Speaker(s)

    Bharat Bajaj
    Reshma Devi

  • Tuesday 25th
    13:00-14:00

    Lunch

  • Tuesday 25th
    14:00-14:45

    Implementing the NIST CSF 2.0 the SABSA Way Cybersecurity Framework

    Session 6A

    How should you implement the NIST Cybersecurity Framework (CSF) 2.0 when developing or updating a security architecture using SABSA? With the addition of the Govern Function, the NIST CSF 2.0 is a significant upgrade to the de-facto global framework for managing cybersecurity risks but does not have everything you need to effectively manage your enterprise cybersecurity risk.

    Speaker(s)

    Glen Bruce

    RegTech: The Evolution of Cyber Financial Crime Solutions

    Session 6B

    Regulatory Technology (RegTech) revolutionises the financial sector by providing innovative solutions for compliance and crime prevention. This presentation delves into RegTech’s pivotal role in combatting financial crime, spotlighting its intersection with cybersecurity through case studies and practical applications.

    Speaker(s)

    Guarav Vikash

  • Tuesday 25th
    14:50-15:35

    The ISM, E8 & SABSA

    Session 7A

    The Information Security Manual (ISM) is the Australian Signals Directorate’s opus on all thing’s information security. This evolutionary document is mandated in high level government policy (the PSPF) as the control library for information systems in Australian Federal Government entities.

    Speaker(s)

    Kirren Hartas

    Architecting Cybersecurity Self-Assurance

    Session 7B

    Cyber security risk is one of the top non-financial risks for organisations. It can be present in almost any part of digital operations. The nature of the risk is both complex and broad due to the complexity of the attacks and evolving capabilities of the attackers.

    Speaker(s)

    Dimitrios Delivasilis

  • Tuesday 25th
    15:35-15:55

    Afternoon Tea

  • Tuesday 25th
    15:55-16:40

    SABSA, Security Metrics and Compliance (The Good, The Bad and The Ugly)

    Session 8A

    Data, data, data – is too much data really a thing? Is too much data overwhelming you and creating too much unwanted noise? What are the dangers of too much data?

    Speaker(s)

    Paul Blowers

    Communicating Cyber with Pretty Pictures: A Guide for Technical People

    Session 8B

    Effective communication has always been crucial for security managers, security architects, and CISOs. Data visualisation plays a key role in this communication, yet it often falls outside the typical skill set of tech and security professionals.

    Speaker(s)

    Rustam Teregulov

  • Tuesday 25th
    16:45-17:30

    The Mystery of Business Attributes - An Interrogation of Kipling's Six Honest Men

    Session 9A

    Business Attributes are the central, single most defining concept of concept in SABSA.

    Speaker(s)

    Sarit Kannanoor

    Metrics That Matter

    Session 9B

    Two seasoned governance, risk, and compliance professionals share unique insights in a thought-provoking discussion about what metrics matter and why some don’t.

    Speaker(s)

    Kathleen Mullin
    Johan Lidros

  • Tuesday 25th
    17:40-18:40

    The Increasing Importance of Technical Surveillance Countermeasures (TSCM) in the Era of IoT and Mobile Devices

    Plenary 10P

    As IoT and mobile devices have become ubiquitous in both personal and professional environments, the landscape of information security has undergone significant transformations. These technologies, while enhancing connectivity and operational efficiency, have introduced new vulnerabilities that are increasingly exploited by adversaries.

    Speaker(s)

    Andy Clark

  • Tuesday 25th
    18:45-19:15

    Drinks Reception (sponsored by The SABSA Institute)

  • Tuesday 25th
    19:15

    Dinner (sponsored by The SABSA Institute)

Wednesday 26th February

  • Wednesday 26th
    09:00-09:30

    Registration & Coffee

  • Wednesday 26th
    09:30-10:15

    An Analysis of the Integration of SABSA and Mitre Projects

    Session 11A

    Everyone knows MITRE ATT&CK, but what about other MITRE projects like TRAM, D3FEND, EMB3D, CAPEC or ATLAS.

    Speaker(s)

    Bruce Large

    Exploring Dora

    Session 11B

    Dora is an explorer, and in the presentation we’re going to explore the wonderful world of Digital Operational Resilience Amigo! Yes, it’s the EU’s DORA which is due to become a regulatory demand in banking and likely beyond.

    Speaker(s)

    Malcolm Shore

  • Wednesday 26th
    10:20-11:05

    The Intersection of Digital Archiving Principles and SABSA Framework

    Session 12A

    In an era of ever-expanding digital footprints, organisations grapple with the dual challenge of securing sensitive information while preserving its business and historical context. Enter the information archivist—the custodian of organisational memory. Nowadays digital archivists navigate the digital realm, safeguarding records, emails, and data flows. But what happens when archival principles intersect with a comprehensive security framework like SABSA?

    Speaker(s)

    Bethany Sinclaire-Giardini

    Co-design As A Framework for Cyber Strategies

    Session 12B

    Cybersecurity remains a significant challenge for organisations, with teams often operating with limited resources. To address this issue, an alternative method involving the engagement of non-cyber stakeholders in the cybersecurity process is proposed utilising the co-design framework.

    Speaker(s)

    Lynore Close

  • Wednesday 26th
    11:05-11:25

    Morning Coffee

  • Wednesday 26th
    11:25-12:10

    Mishaps & Meltdowns - Using SABSA to Diagnose Failures in Complex Systems

    Session 13A

    In 1991 The U.S.S.R. was the largest country in the world, covering over 1/6th of the land on earth, but within a year the Soviet Union had ceased to exist.

    Speaker(s)

    Robert Laurie

    Let's Co-Design A Secure Business Transformation

    Session 13B

    With over 90% of businesses undertaking transformations to take advantage of new technologies, changing customer demands and responding to economic pressures. The new and heightened security risks combined with the changing threat landscape are requiring a co-design and co-collaboration amongst with CRO and CISO with the business.

    Speaker(s)

    Anu Kukar

  • Wednesday 26th
    12:15-13:00

    You Can Fix Stupid: Automating to Reduce Risk and Reducing Risk in Automation

    Session 14A

    In a world where cyber threats are evolving at an alarming rate, organizations are expected to do more with less, employees are given ever increasing workloads, and human error remains a significant contributor to data errors and security breaches, automation emerges as a crucial solution.

    Speaker(s)

    Ashling Lupiani

    Honey or Vinegar? Leveraging Human Psychology to deliver positive security outcomes at scale

    Session 14B

    As the old saying goes – “you catch more flies with honey than vinegar”. The question then follows, how might this saying change the way we approach embedding cybersecurity into the thinking of each and every one within your organisation? And if we did – what might the outcomes be?

    Speaker(s)

    Ben Ley

  • Wednesday 26th
    13:00-14:00

    Lunch

  • Wednesday 26th
    14:00-14:45

    Unified Security Culture Programs: Impermanence, imperfection and iteration

    Session 15A

    This session is the story of an organisation like many others, which assembled a clever and capable security team. After establishing their fundamentals, the team developed security education, outreach and champion programs over time to build security culture. While these programs were individually excellent the team realised they could win even more with a unified game plan.

    Speaker(s)

    Kirk Nicholls

    Apocalypse CISO

    Session 15B

    Continuing the theme from COSAC Naas 2024 of posing challenges faced by CISOs from the viewpoint of cinematic classics, your presenter delves into his past, because like so many things in life, what is old is new again…”the horror”.

    Speaker(s)

    Steven Kintakas

  • Wednesday 26th
    14:50 15:35

    Seamlessly Traversing Shifting Boundaries

    Session 16A

    The ability to cross boundaries is one of the most natural human behaviours, in fact, it is so natural and normal that we don’t even give it a second thought.

    Speaker(s)

    Jaco Jacobs

    Leveraging Cyber Threat Intelligence to Elevate Communication with Executives

    Session 16B

    Cyber Security is a critical topic in Boardrooms across the world. This is driven by increasing reliance on technology to deliver business outcomes along with the rapidly evolving cyber threat landscape and regulatory actions. These changes require CISOs and cyber leaders to develop effective communication strategies that bridge the gap between technical jargon and business acumen.

    Speaker(s)

    Chirag Joshi
    Chatura Abedyeera

  • Wednesday 26th
    15:35-15:55

    Afternoon Tea

  • Wednesday 26th
    15:55-16:40

    It is More About the Business Strategy & Less About the Technology

    Session 17A

    Organisational cyber strategies typically include implementing new tools and hiring more people. A consistent gap, is linking cyber strategies to protecting and enabling business strategies.

    Speaker(s)

    Paul Karan

    FANTASTIC BEASTS AND HOW TO TAME THEM: Operationalising Vulnerability Governance

    Session 17B

    In this session, we will delve into the intricacies of Vulnerability Management and Governance and provide a clearer understanding of their respective roles. Through her extensive experience, the featured speaker, Stephanie, will share a range of effective methodologies that can be deployed to operationalise vulnerability governance.

    Speaker(s)

    Stephanie Park

  • Wednesday 26th
    16:45-17:30

    Security Architecture is a Team Sport

    Session 18A

    Enterprise security architects occupy a strange and sometimes inscrutable place within the team. They talk to business as well as technical staff, ask odd questions, build layered models and feel strongly about something called traceability. Through their efforts plans, designs and roadmaps are created which guide us forward in a sustainable and balanced way.

    Speaker(s)

    Kirk Nicholls
    Sarit Kannanoor

    On The Art of Game Theory & Threat Modelling

    Session 18B

    It was asked at the 2024 COSAC APAC, “But we don’t have unlimited resources, how do we threat model and consider the costs?”, this presentation aims to help answer that question.

    Speaker(s)

    Bruce Large

  • Wednesday 26th
    17:40-18:40

    The COSAC Rump Session

    Plenary 19P

    The COSAC “rump” has for many years been a hugely popular plenary session at COSAC. The Rump is an informal rapid-fire session in which participants give very short presentations on recent results, work in progress, and any other topic of interest to the COSAC community. Presentations may be purely technical, entirely management oriented in nature, or of any combination of approaches or perspectives.

    Speaker(s)

    David Lynas

  • Wednesday 26th
    15:45-19:15

    Drinks Reception

  • Wednesday 26th
    19:15

    Dinner

Thursday 27th February

  • Thursday 27th
    09:00-09:30

    Registration & Coffee

  • Thursday 27th
    09:30-13:00

    COSAC Workshops are half-day, 09:30 - 13:00 & 14:00 - 17:30

  • Thursday 27th
    09:30-13:00

    5th COSAC APAC Security Architecture Design-Off

    Workshop W1

    Returning for a 5th year, this design-off will present a new and engaging set of challenges. In the spirit of hack-a-thons, this competition was born out of a desire to provide a venue for security architects to apply their skills in a safe environment.

    Speaker(s)

    Bill Schultz
    Jason Kobes

    Making Better Risk Decisions with Open FAIR

    Workshop W2

    Cybersecurity risk quantification has gained popularity in recent years in sectors like banking, insurance, and pharmaceuticals.

    Speaker(s)

    Patrick Dunstan

    Wargames: Tabletop Crisis Simulation

    Workshop W3

    Tabletop exercises are an essential tool for testing the preparedness of organizations in responding to crisis situations. However, traditional tabletop exercises often lack the element of unpredictability that can make real-life crises so challenging. This is where the Dungeons & Dragons (D&D) 5e tabletop role-playing game (TTRPG) system can be a valuable addition to cybersecurity crisis simulations.

    Speaker(s)

    Jaco Jacobs

  • Thursday 27th
    11:05-11:25

    Morning Coffee

  • Thursday 27th
    13:00-14:00

    Lunch

  • Thursday 27th
    14:00-17:30

    This is the Way! Using SABSA to Transform A Global Managed Security Services Provider

    Workshop W4

    In late 2022 I was assigned to lead a team mandated with creating and implementing a strategy to transform the Managed Security Services business of a global organization that provides end-to-end security services. This organization operates more than twenty delivery centres globally and has grown, organically and through acquisition, to more than 3000 delivery centre employees.

    Speaker(s)

    Jaco Jacobs

    Redefining Digital Identity for A Seamless & Secure Future

    Workshop W5

    In an era where digital transformation drives the global economy, the concept of Digital Identity has emerged as a cornerstone of secure, consumer-friendly interactions. This Masterclass at COSAC APAC 2025 will delve into the intricate process of designing a robust digital identity strategy and its implementation through technology.

    Speaker(s)

    MZ Omarjee

    The COSAC Risk Workshop Series - Challenges with Risk Aggregation & Compound Risk

    Workshop W6

    The purpose of the risk workshop is to explore the hard parts of understanding risk. We have previously conducted workshops in Ireland and Australia on how to understand and model risk, how to explain and display risk to stakeholders, and how to think like our adversaries to identify threats that we would otherwise miss.

    Speaker(s)

    Bill Schultz
    Jason Kobes

  • Thursday 27th
    15:40-16:00

    Afternoon Tea

  • Thursday 27th
    17:30-17:45

    Conference Close - COSAC Chairman's Closing Remarks

  • Thursday 27th
    17:45-19:45

    The SABSA Institute Forum

    The SABSA Institute (TSI) and the TSI Liaison Group (LG) update. The TSI Forum includes a question-and-answer session and an opportunity to meet and interact with The SABSA Institute Board of Trustees (Directors) and LG members.

    Speaker(s)

    Gareth Watters
    Kirk Nicholls
    Kate Mullin
    Glen Bruce

COSAC
Patrons

A completely new COSAC experience pushing the boundaries of cybersecurity further than ever before. Smart people, inspiring guest speakers and a ton of passion. Become a COSAC Patron and gain access like no other.

Become a patron

COSAC
2024.

29th Sept - 3rd Oct: Kildare, Ireland

Contact

Get in contact with us by email, phone or just stay social and connect with us on LinkedIn & Twitter

Sponsors

MELBOURNE

+61 386 869 119