Tuesday 24th February
-
Tuesday 24th
08:30-09:00Registration & Coffee
-
Tuesday 24th
09:00-09:20COSAC APAC 2026 Chairman's Welcome
-
Tuesday 24th
09:30-10:15Implementing the SABSA NIST CSF Community Profile
Session 2A
The NIST CSF provides a collection of essential areas where cybersecurity protections are needed but the current specification of functions, categories and subcategories are far from comprehensive or sufficient for many organizations. NIST is now encouraging extensions be defined to the CSF to add the missing elements deemed important or necessary to adapt the CSF to meet the needs of specific industries, associations, regulatory bodies or legislative requirements through Community Profiles for developing use case-specific cybersecurity risk management guidance for multiple organizations.
Speaker(s)
From Value Chain to Prompt: AI Fast Track
Session 2B
This presentation is a walkthrough of the analysis of value chains as part of architecting AI solutions which demonstrate clear value to the business. It presents the AI Accelerator Playbook and demonstrates how AI value chains are analyzed.
Speaker(s)
-
-
Tuesday 24th
10:20-11:05Enterprise Security Architecture – Using SABSA to Deliver ISO 27001 the Right Way
Session 3A
Many of us who come to attend a SABSA course are well versed in ISO 27001 and/or ISO 20000 (ITIL). Most organisations (especially utilities, water, transport etc), have what is called an integrated management system which brings together standards such as ISO 9001 (Quality), ISO 45001 (Safety), ISO 14001 (Environment) under one management system. Before embarking on developing and implementing enterprise security architecture, it is important that Enterprise Security Architects understand such standards.
Speaker(s)
Beyond the Algorithm: Cultivating Trust in the AI Era
Session 3B
Artificial intelligence is now integral to our lives and businesses. As AI's influence expands, trust becomes paramount. We must go beyond innovation to ensure AI systems are responsible, safe, and dependable.
Speaker(s)
-
-
Tuesday 24th
11:05-11:25Morning Coffee
-
Tuesday 24th
11:25-12:10When SABSA met FAIR: A Framework Dynamic Duo
Session 4A
This session will show how SABSA can incorporate FAIR (Factor Analysis of Information Risk) to increase risk rigor and security decision-making.
Speaker(s)
Human Crash-Test Dummies, and How AI has Taken the RED out of DREAD...
Session 4B
The modern AI world has weaponized the attackers with better and smarter tools than ever before.
The "DREAD" threat model is now trending to just "AD" (i.e. AI tools are blitzing the Reproducibility, Exploitability and Discoverability of vulns. All we can manage now is the Damage and Effected users).Speaker(s)
-
-
Tuesday 24th
12:15-13:00Optimising Information Asset Utilisation Through Co-Design and SABSA Integration
Session 5A
This paper explores the lifecycle of an information asset, tracing its evolution from a singular business process to its strategic positioning within the layers of the SABSA framework.
Speaker(s)
Space Engineering Inspired Cyber Resiliency
Session 5B
Recent high-profile IT outages, like the CrowdStrike incident or the accidental wiping of the complete Google cloud service of UniSuper Australia, are a stark reminder that cybersecurity is not just about malicious threat actors, but also about issues arising from human errors with no failsafe.
Speaker(s)
-
-
Tuesday 24th
13:00-14:00Lunch (Sponsored by David Lynas Consulting)
-
Tuesday 24th
14:00-14:45How to Influence Your Way to Cyber Budgets
Session 6A
Creating persuasive presentations for executive buy-in on cybersecurity strategies requires a fundamental shift from technical jargon to business-focused narratives. Successful cybersecurity presentations must translate complex technical risks into quantifiable business impacts, emphasizing potential financial losses, regulatory compliance failures, and reputational damage. The key lies in speaking the executive language of ROI, competitive advantage, and strategic enablement rather than focusing solely on technical vulnerabilities.
Speaker(s)
Living in a World of Covert Channels
Session 6B
On 24 February 2020 Terence Michael Whall was found guilty by a unanimous verdict of the murder of 74-year-old pensioner Gerald Corrigan, who was shot outside his rural home in Anglesey on Good Friday 2019.
Whall thought he had committed the perfect murder, there was no forensic evidence, no direct eye witness to the shooting and no one saw him travelling to and from the murder scene.Speaker(s)
-
-
Tuesday 24th
14:50-15:35Using the SABSA Matrix with Stakeholders to Define Project Perspectives and Actions
Session 7A
The SABSA Matrix logically sets out the different layers of architectures against the perspectives of that layer. Recently when planning for a new Security Service, the SABSA Matrix was used in discussions with stakeholders for their reasoning, drivers, motivations and outcomes.
Speaker(s)
Taming the Untrusted: Zero Trust Approaches and Cross-Sector Case Studies
Session 7B
Taming the Untrusted: Zero Trust Approaches and Cross-Sector Case Studies In today’s digital world, it is no longer a question of whether an organisation will be the
subject of a cyber-attack but more of when. And as organisations rapidly transform in today’s digital-first world, the traditional security perimeter has vanished. The rise of hybrid work, cloud adoption, and increasingly sophisticated threats demand a new approach - one that doesn’t just defend, but enables cyber resilience.
Speaker(s)
-
-
Tuesday 24th
15:35-15:55Afternoon Tea
-
Tuesday 24th
15:55-16:40Why Security Architectures Fail: “It is not the Architecture’s fault”
Session 8A
Suppose you had a well-defined and documented security architecture based on a comprehensive set of business risk requirements, including an extensive array of solutions and controls to manage the risk and providing traceability across all areas top to bottom. Why then, was it doomed to fail? Based on 30 years of security architecture experience, this session will outline the factors that can and have prevented security architectures from being implemented successfully.
Speaker(s)
Mesh, Hype or Hope? Reassessing Cybersecurity Mesh Architecture (CSMA) in the Shadow of Zero Trust
Session 8B
In an industry already saturated with architecture frameworks—Zero Trust, SASE, CARTA, BeyondCorp, and more—the introduction of Cybersecurity Mesh Architecture (CSMA) by Gartner raises a compelling question: Do we truly need another one?
Speaker(s)
-
-
Tuesday 24th
16:45-17:30Implementing SABSA in Context: A Practical First Step
Session 9A
Let’s be honest, completing the SABSA Foundations course is one thing but knowing where to begin is another thing entirely. Great in theory… but how do I implement this within the context of my business? It’s easy to get lost in the complexity of the framework so what is needed is a manageable, low risk project to gain momentum and build confidence. The answer could be developing a Team Charter.
Speaker(s)
Securing Australia's Federated Future: Rethinking Access, Trust, and Compliance Across Domains
Session 9B
Australia’s digital infrastructure is becoming increasingly federated. Government departments, healthcare networks, research institutions, and private enterprises are no longer isolated systems. They now rely on shared platforms, cross-agency data flows, and multi-cloud architectures. However, most organisations continue to depend on centralised identity and access control systems that were designed for siloed environments. These outdated models are unable to handle the complexity of shared authority, distributed data governance, and jurisdictional compliance.
Speaker(s)
-
-
Tuesday 24th
17:40-18:40High Assurance Computing in the Commercial Sector: Niche or Necessity?
Plenary 10P
As digital transformation accelerates across industries, commercial enterprises are facing heightened exposure to sophisticated cyber threats, regulatory scrutiny, and reputational risk. High Assurance Computing (HAC), with its rigorous standards for correctness, confidentiality, integrity, and trust has been confined traditionally to the defence, aerospace, and critical national infrastructure (CNI) sectors.
Speaker(s)
-
-
Tuesday 24th
18:45-19:15Drinks Reception (Sponsored by The SABSA Institute)
-
Tuesday 24th
19:15Dinner (Sponsored by The SABSA Institute)
Wednesday 25th February
-
Wednesday 25th
09:00-09:30Registration & Coffee
-
Wednesday 25th
09:30-10:15The Pragmatist's Guide to Safely Automating the Management of Critical Infrastructure
Session 11A
How do you safely automate the management of infrastructure responsible for providing society with essential services?
Speaker(s)
Why Misinformed Teams Build Weak Security Programs
Session 11B
After spending 20 years leading security teams across government and enterprise environments, one pattern emerges: the strongest security programs are not built by teams with the biggest headcount, largest budgets or most tools, but by teams that have the best information and are driven by context and data. Misinformed teams inevitably develop weak security programs that fail when facing real-world threats.
Speaker(s)
-
-
Wednesday 25th
10:20-11:05The High Rollers Table – A Case Study in Proving Your Value Using SABSA
Session 12A
When it comes to demonstrating the value you are providing to your high-roller stakeholder sitting at the table, there isn’t a lot of room for error, filibustery or flub. In any other circumstance, you might be able to lean heavily on bamboozlement at the brilliance of your diatribal eloquence, the captivatingly exquisite heights of your genre-defining diagrams and matrices, or the various bric-a-brac-esque levels of understanding inhabiting the zeitgeist of the VIPs you are presenting to.
Speaker(s)
See No Evil?: Visualising Security Risk
Session 12B
In an influential early book on security, [‘Secrets & Lies’: (2000)], the technologist, Bruce Schneier reflects on why, when humans generally have an intuitive, highly developed sense of risk in everyday life, (crossing a road, walking down a dark alley, etc), do we find it so difficult to analyse risk? He identified several factors with significant influence on risk perception: inability to evaluate rare events, confirmation bias in trust of IT, and the degree to which the subject feels a sense of ‘control’, is able to ‘personify’ a threat or is presented with impacts that are either novel or spectacular.
Speaker(s)
-
-
Wednesday 25th
11:05-11:25Morning Coffee
-
Wednesday 25th
11:25-12:10The Grammar of SABSA Attributes
Session 13A
When undertaking any work as a risk professional, it behoves us to proceed with caution and choose our words wisely. Business Drivers, Attributes and the careful crafting of their definitions for the Enterprise to which they belong are foundational to the ESA toolbox. With our craft, we hope to capture complexity within plain language while remaining flexible and removing ambiguity.
Speaker(s)
Architecting Cyber Security Self-Assurance
Session 13B
Cyber security risk is one of the top non-financial risks for organisations. It can be present in almost any part of digital operations. The nature of the risk is both complex and broad due to the complexity of the attacks and evolving capabilities of the attackers. More often than not, the articulation of cyber risk is characterised by a high degree of subjectivity due to the innate difficulty to create a 360o view of the security posture in a timely manner, supported by actuarial data, to answer even to the most basic business requests.
Speaker(s)
-
-
Wednesday 25th
12:15-13:00Beyond Taxonomies A New Ontological Lens for SABSA Data Architecture
Session 14A
In a world obsessed with data - whether for insights, governance, compliance, or control—volume is often mistaken for value. But under the SABSA framework, where data begins life as a physical asset, meaningful transformation requires more than classification. Traditional tools such as the ‘business taxonomy of assets’ and ‘business attributes taxonomy’ have served us well, yet their hierarchical rigidity may no longer align with the complex, fluid nature of today’s data ecosystems.
Speaker(s)
Authorised and Compromised – The Biometric Illusion
Session 14B
Biometrics were meant to kill the password. Instead, they have become permanent keys with no revocation path. We can change your password, we cannot change our face.
This presentation unpacks the systemic risks behind the rush to adopt biometric authentication - risks baked into the technology, amplified by architecture, and overlooked by compliance. From India’s Aadhaar leaks to facial recognition hacks on commercial phones, the pattern is clear: convenience is winning, and users are losing.Speaker(s)
-
-
Wednesday 25th
13:00-14:00Lunch (Sponsored by David Lynas Consulting)
-
Wednesday 25th
14:00-14:45Architecting Stovepipes of Excellence: A Case Study on Connecting Threat Actors, TTPs, Controls, and Assurance Programs
Session 15A
This talk walks through a real-world case study showing how we managed to create security traceability around assets, threats they face and risk mitigation investment.
Instead of keeping threat intel, controls, assurance and overall security architecture in silos, we figured out how to make different parts of a modern organisation work together to provide a solid perspective on prioritised risk mitigations and improve spending on assurance activities that matter.Speaker(s)
If Socrates was a CISO or Even Worse - Your Business Stakeholder
Session 15B
The nature of the cyber security risk is both complex and broad, and present in almost any part of digital operations making it a top non-financial risk. On a daily basis stakeholders are being faced with decisions on how to proceed with the implementation of the business strategy whilst providing a commensurate level of protection against ever evolving cyber threats and ensuring critical products and services operate within the desired risk thresholds.
Speaker(s)
-
-
Wednesday 25th
14:50-15:35Using Security Patterns to Protect Cloud
Session 16A
We'll begin by exploring the concept and purpose of security patterns and how these align with the SABSA framework.
While there are different definitions that exist in the industry, with a specific focus on those published by cloud providers (AWS, Azure). We'll focus on how to navigate and identify the most practical and meaningful onesSpeaker(s)
Architecting Human Resilience: Embedding Cyber-Aware Business Simulation into Enterprise Practice
Session 16B
Cyber threats continue to evolve, but integrated business awareness training remains stagnant. In this session, we explore how enterprise/security architecture approaches can be used to embed simulation and immersive training into operational practice to uplift business resilience. Drawing from field-tested approaches across Defence, government and regulated industries, Derek Grocke presents a blueprint for integrating experiential learning methods, enterprise architecture domains and systems thinking into a unified model that embeds reinforcement learning into business as usual.
Speaker(s)
-
-
Wednesday 25th
15:35-15:55Afternoon Tea
-
Wednesday 25th
15:55-16:40Building an Adaptive Security Architecture
Session 17A
The presentation addresses 3 trends currently challenging the cybersecurity operating model.
• Customer expectations are shifting
Digital natives think in terms of customer journeys, and they want safe but low-friction experiences along the way.
• Threats are evolving
There are now new ways to exploit human nature and decision making, using technologies like AI. Lastly,
• Regulations are fragmenting
Countries recognise the value of data and are taking a stronger, more localised, position on how to protect it.
Speaker(s)
Fear of the Dark
Session 17B
Legacy is a frequently used term in a relatively young industry, reserved for systems made of ageing: hardware, operating systems, software and applications, storage media, file formats, peripherals, connectors and so on. Typically, another term accompanies such systems, the process of ‘sweating assets’ for better or for worse. Not to mention ‘end of life’ and ‘lifecycle management’. Inevitably the word ‘risk’ makes an appearance.
Speaker(s)
-
-
Wednesday 25th
16:45-17:30From Chessboard to Boardroom: A Shift in Ideology to Harness World Class Talent with SABSA
Session 18A
- Since we started leveraging SABSA methodologies to secure wins - not just on chess boards, but any Board. 😉
When people think of enterprise security architecture, they don’t often envision “talent” as a core asset. But what if talent is the very mission that needs to be secured, nurtured and future proofed to endure the test of time?
Speaker(s)
Not Just Lean. But Lean & Mean.
Session 18B
Establishing cyber capabilities in any organisation requires an intentional approach that need to strike a balance between difference forces within an organisation.
Speaker(s)
-
-
Wednesday 25th
17:40-18:40The COSAC Rump Session
Plenary 19P
The COSAC “rump” has for many years been a hugely popular plenary session at COSAC. The Rump is an informal rapid-fire session in which participants give very short presentations on recent results, work in progress, and any other topic of interest to the COSAC community. Presentations may be purely technical, entirely management oriented in nature, or of any combination of approaches or perspectives.
Speaker(s)
-
-
Wednesday 25th
18:45-19:15Drinks Reception (Sponsored by David Lynas Consulting)
-
Wednesday 25th
19:15COSAC APAC 2026 Gala Dinner (Sponsored by ALC Training)
Thursday 26th February
-
Thursday 26th
08:00-09:30The SABSA Institute Forum - Melbourne - AI Architecture 2026 and beyond
Registrations are now open for THE SABSA Institute Forum at COSAC APAC 2026, featuring our special guest from The SABSA Institute, SABSA Master Dr Malcolm Shore, who will discuss and answer questions on AI Architecture in 2026 and beyond.
Note: Entry to SABSA World Forum is open to the public. Entry does not provide entry to COSAC APAC 2026 Security Conference for alternative presentations.Speaker(s)
-
-
Thursday 26th
09:30-10:00Registration & Coffee
-
Thursday 26th
10:00-17:456th COSAC APAC Security Architecture Design-Off
Masterclass M1
Returning for a 6th year, this design-off will present a new and engaging set of challenges. In the spirit of hack-a-thons, this competition was born out of a desire to provide a venue for security architects to apply their skills in a safe environment. This is a unique competition format that uses real clients, scenarios and deliverables to see which team will reign supreme! Whether you are a seasoned enterprise architect or security architect, or just looking to try something different to build and enhance your skills, this session will provide a unique opportunity to prove and hone your architecture chops.
Speaker(s)
COSAC APAC International Round Table Security Forum
Masterclass M2
The 2026 session of the Forum addresses a Pandora’s box full of new information security issues in a world where older issues won’t stay buried. You’ll join a group of similarly situated professionals - experienced, dedicated, resilient, perhaps bloodied in past successes and failures – to seek realistic solutions and accommodations to the challenges facing us in 2026 and beyond.
Speaker(s)
Building an AI Fast Track Agent
Masterclass M3
AI has evolved remarkably quickly from chatbot to agent, and is well on the way to delivering virtual employees. In this workshop we take a hands-on approach to understanding agentic AI, and step by step build the datasets and tools we need to augment an AI model with a modicum of SABSA expertise.
Speaker(s)
-
-
Thursday 26th
11:35-11:55Morning Coffee
-
Thursday 26th
13:30-14:30Lunch (Sponsored by David Lynas Consulting)
-
Thursday 26th
16:00-16:20Afternoon Tea
-
Thursday 26th
18:00-18:15Conference Close - COSAC Chairman's Closing Remarks
COSAC
Patrons
A completely new COSAC experience pushing the boundaries of cybersecurity further than ever before. Smart people, inspiring guest speakers and a ton of passion. Become a COSAC Patron and gain access like no other.
Become a patronCOSAC
2026.
27th Sept - 1st Oct: Kildare, Ireland
Contact
Get in contact with us by email, phone or just stay social and connect with us on LinkedIn