Skip to content

Schedule

Tuesday 24th February

  • Tuesday 24th
    08:30-09:00

    Registration & Coffee

  • Tuesday 24th
    09:00-09:20

    COSAC APAC 2026 Chairman's Welcome

  • Tuesday 24th
    09:30-10:15

    Implementing the SABSA NIST CSF Community Profile

    Session 2A

    The NIST CSF provides a collection of essential areas where cybersecurity protections are needed but the current specification of functions, categories and subcategories are far from comprehensive or sufficient for many organizations. NIST is now encouraging extensions be defined to the CSF to add the missing elements deemed important or necessary to adapt the CSF to meet the needs of specific industries, associations, regulatory bodies or legislative requirements through Community Profiles for developing use case-specific cybersecurity risk management guidance for multiple organizations.

    Speaker(s)

    From Value Chain to Prompt: AI Fast Track

    Session 2B

    This presentation is a walkthrough of the analysis of value chains as part of architecting AI solutions which demonstrate clear value to the business. It presents the AI Accelerator Playbook and demonstrates how AI value chains are analyzed.

    Speaker(s)

  • Tuesday 24th
    10:20-11:05

    Enterprise Security Architecture – Using SABSA to Deliver ISO 27001 the Right Way

    Session 3A

    Many of us who come to attend a SABSA course are well versed in ISO 27001 and/or ISO 20000 (ITIL). Most organisations (especially utilities, water, transport etc), have what is called an integrated management system which brings together standards such as ISO 9001 (Quality), ISO 45001 (Safety), ISO 14001 (Environment) under one management system. Before embarking on developing and implementing enterprise security architecture, it is important that Enterprise Security Architects understand such standards.

    Speaker(s)

    Beyond the Algorithm: Cultivating Trust in the AI Era

    Session 3B

    Artificial intelligence is now integral to our lives and businesses. As AI's influence expands, trust becomes paramount. We must go beyond innovation to ensure AI systems are responsible, safe, and dependable.

    Speaker(s)

  • Tuesday 24th
    11:05-11:25

    Morning Coffee

  • Tuesday 24th
    11:25-12:10

    When SABSA met FAIR: A Framework Dynamic Duo

    Session 4A

    This session will show how SABSA can incorporate FAIR (Factor Analysis of Information Risk) to increase risk rigor and security decision-making.

    Speaker(s)

    Human Crash-Test Dummies, and How AI has Taken the RED out of DREAD...

    Session 4B

    The modern AI world has weaponized the attackers with better and smarter tools than ever before.
    The "DREAD" threat model is now trending to just "AD" (i.e. AI tools are blitzing the Reproducibility, Exploitability and Discoverability of vulns. All we can manage now is the Damage and Effected users).

    Speaker(s)

  • Tuesday 24th
    12:15-13:00

    Optimising Information Asset Utilisation Through Co-Design and SABSA Integration

    Session 5A

    This paper explores the lifecycle of an information asset, tracing its evolution from a singular business process to its strategic positioning within the layers of the SABSA framework.

    Speaker(s)

    Space Engineering Inspired Cyber Resiliency

    Session 5B

    Recent high-profile IT outages, like the CrowdStrike incident or the accidental wiping of the complete Google cloud service of UniSuper Australia, are a stark reminder that cybersecurity is not just about malicious threat actors, but also about issues arising from human errors with no failsafe.

    Speaker(s)

  • Tuesday 24th
    13:00-14:00

    Lunch (Sponsored by David Lynas Consulting)

  • Tuesday 24th
    14:00-14:45

    How to Influence Your Way to Cyber Budgets

    Session 6A

    Creating persuasive presentations for executive buy-in on cybersecurity strategies requires a fundamental shift from technical jargon to business-focused narratives. Successful cybersecurity presentations must translate complex technical risks into quantifiable business impacts, emphasizing potential financial losses, regulatory compliance failures, and reputational damage. The key lies in speaking the executive language of ROI, competitive advantage, and strategic enablement rather than focusing solely on technical vulnerabilities.

    Speaker(s)

    Living in a World of Covert Channels

    Session 6B

    On 24 February 2020 Terence Michael Whall was found guilty by a unanimous verdict of the murder of 74-year-old pensioner Gerald Corrigan, who was shot outside his rural home in Anglesey on Good Friday 2019.

    Whall thought he had committed the perfect murder, there was no forensic evidence, no direct eye witness to the shooting and no one saw him travelling to and from the murder scene.

    Speaker(s)

  • Tuesday 24th
    14:50-15:35

    Using the SABSA Matrix with Stakeholders to Define Project Perspectives and Actions

    Session 7A

    The SABSA Matrix logically sets out the different layers of architectures against the perspectives of that layer. Recently when planning for a new Security Service, the SABSA Matrix was used in discussions with stakeholders for their reasoning, drivers, motivations and outcomes.

    Speaker(s)

    Taming the Untrusted: Zero Trust Approaches and Cross-Sector Case Studies

    Session 7B

    Taming the Untrusted: Zero Trust Approaches and Cross-Sector Case Studies In today’s digital world, it is no longer a question of whether an organisation will be the
    subject of a cyber-attack but more of when. And as organisations rapidly transform in today’s digital-first world, the traditional security perimeter has vanished. The rise of hybrid work, cloud adoption, and increasingly sophisticated threats demand a new approach - one that doesn’t just defend, but enables cyber resilience.

    Speaker(s)

  • Tuesday 24th
    15:35-15:55

    Afternoon Tea

  • Tuesday 24th
    15:55-16:40

    Why Security Architectures Fail: “It is not the Architecture’s fault”

    Session 8A

    Suppose you had a well-defined and documented security architecture based on a comprehensive set of business risk requirements, including an extensive array of solutions and controls to manage the risk and providing traceability across all areas top to bottom. Why then, was it doomed to fail? Based on 30 years of security architecture experience, this session will outline the factors that can and have prevented security architectures from being implemented successfully.

    Speaker(s)

    Mesh, Hype or Hope? Reassessing Cybersecurity Mesh Architecture (CSMA) in the Shadow of Zero Trust

    Session 8B

    In an industry already saturated with architecture frameworks—Zero Trust, SASE, CARTA, BeyondCorp, and more—the introduction of Cybersecurity Mesh Architecture (CSMA) by Gartner raises a compelling question: Do we truly need another one?

    Speaker(s)

  • Tuesday 24th
    16:45-17:30

    Implementing SABSA in Context: A Practical First Step

    Session 9A

    Let’s be honest, completing the SABSA Foundations course is one thing but knowing where to begin is another thing entirely. Great in theory… but how do I implement this within the context of my business? It’s easy to get lost in the complexity of the framework so what is needed is a manageable, low risk project to gain momentum and build confidence. The answer could be developing a Team Charter.

    Speaker(s)

    Securing Australia's Federated Future: Rethinking Access, Trust, and Compliance Across Domains

    Session 9B

    Australia’s digital infrastructure is becoming increasingly federated. Government departments, healthcare networks, research institutions, and private enterprises are no longer isolated systems. They now rely on shared platforms, cross-agency data flows, and multi-cloud architectures. However, most organisations continue to depend on centralised identity and access control systems that were designed for siloed environments. These outdated models are unable to handle the complexity of shared authority, distributed data governance, and jurisdictional compliance.

    Speaker(s)

  • Tuesday 24th
    17:40-18:40

    High Assurance Computing in the Commercial Sector: Niche or Necessity?

    Plenary 10P

    As digital transformation accelerates across industries, commercial enterprises are facing heightened exposure to sophisticated cyber threats, regulatory scrutiny, and reputational risk. High Assurance Computing (HAC), with its rigorous standards for correctness, confidentiality, integrity, and trust has been confined traditionally to the defence, aerospace, and critical national infrastructure (CNI) sectors.

    Speaker(s)

  • Tuesday 24th
    18:45-19:15

    Drinks Reception (Sponsored by The SABSA Institute)

  • Tuesday 24th
    19:15

    Dinner (Sponsored by The SABSA Institute)

Wednesday 25th February

  • Wednesday 25th
    09:00-09:30

    Registration & Coffee

  • Wednesday 25th
    09:30-10:15

    The Pragmatist's Guide to Safely Automating the Management of Critical Infrastructure

    Session 11A

    How do you safely automate the management of infrastructure responsible for providing society with essential services?

    Speaker(s)

    Why Misinformed Teams Build Weak Security Programs

    Session 11B

    After spending 20 years leading security teams across government and enterprise environments, one pattern emerges: the strongest security programs are not built by teams with the biggest headcount, largest budgets or most tools, but by teams that have the best information and are driven by context and data. Misinformed teams inevitably develop weak security programs that fail when facing real-world threats.

    Speaker(s)

  • Wednesday 25th
    10:20-11:05

    The High Rollers Table – A Case Study in Proving Your Value Using SABSA

    Session 12A

    When it comes to demonstrating the value you are providing to your high-roller stakeholder sitting at the table, there isn’t a lot of room for error, filibustery or flub. In any other circumstance, you might be able to lean heavily on bamboozlement at the brilliance of your diatribal eloquence, the captivatingly exquisite heights of your genre-defining diagrams and matrices, or the various bric-a-brac-esque levels of understanding inhabiting the zeitgeist of the VIPs you are presenting to.

    Speaker(s)

    See No Evil?: Visualising Security Risk

    Session 12B

    In an influential early book on security, [‘Secrets & Lies’: (2000)], the technologist, Bruce Schneier reflects on why, when humans generally have an intuitive, highly developed sense of risk in everyday life, (crossing a road, walking down a dark alley, etc), do we find it so difficult to analyse risk? He identified several factors with significant influence on risk perception: inability to evaluate rare events, confirmation bias in trust of IT, and the degree to which the subject feels a sense of ‘control’, is able to ‘personify’ a threat or is presented with impacts that are either novel or spectacular.

    Speaker(s)

  • Wednesday 25th
    11:05-11:25

    Morning Coffee

  • Wednesday 25th
    11:25-12:10

    The Grammar of SABSA Attributes

    Session 13A

    When undertaking any work as a risk professional, it behoves us to proceed with caution and choose our words wisely. Business Drivers, Attributes and the careful crafting of their definitions for the Enterprise to which they belong are foundational to the ESA toolbox. With our craft, we hope to capture complexity within plain language while remaining flexible and removing ambiguity.

    Speaker(s)

    Architecting Cyber Security Self-Assurance

    Session 13B

    Cyber security risk is one of the top non-financial risks for organisations. It can be present in almost any part of digital operations. The nature of the risk is both complex and broad due to the complexity of the attacks and evolving capabilities of the attackers. More often than not, the articulation of cyber risk is characterised by a high degree of subjectivity due to the innate difficulty to create a 360o view of the security posture in a timely manner, supported by actuarial data, to answer even to the most basic business requests.

    Speaker(s)

  • Wednesday 25th
    12:15-13:00

    Beyond Taxonomies A New Ontological Lens for SABSA Data Architecture

    Session 14A

    In a world obsessed with data - whether for insights, governance, compliance, or control—volume is often mistaken for value. But under the SABSA framework, where data begins life as a physical asset, meaningful transformation requires more than classification. Traditional tools such as the ‘business taxonomy of assets’ and ‘business attributes taxonomy’ have served us well, yet their hierarchical rigidity may no longer align with the complex, fluid nature of today’s data ecosystems.

    Speaker(s)

    Authorised and Compromised – The Biometric Illusion

    Session 14B

    Biometrics were meant to kill the password. Instead, they have become permanent keys with no revocation path. We can change your password, we cannot change our face.

    This presentation unpacks the systemic risks behind the rush to adopt biometric authentication - risks baked into the technology, amplified by architecture, and overlooked by compliance. From India’s Aadhaar leaks to facial recognition hacks on commercial phones, the pattern is clear: convenience is winning, and users are losing.

    Speaker(s)

  • Wednesday 25th
    13:00-14:00

    Lunch (Sponsored by David Lynas Consulting)

  • Wednesday 25th
    14:00-14:45

    Architecting Stovepipes of Excellence: A Case Study on Connecting Threat Actors, TTPs, Controls, and Assurance Programs

    Session 15A

    This talk walks through a real-world case study showing how we managed to create security traceability around assets, threats they face and risk mitigation investment.

    Instead of keeping threat intel, controls, assurance and overall security architecture in silos, we figured out how to make different parts of a modern organisation work together to provide a solid perspective on prioritised risk mitigations and improve spending on assurance activities that matter.

    Speaker(s)

    If Socrates was a CISO or Even Worse - Your Business Stakeholder

    Session 15B

    The nature of the cyber security risk is both complex and broad, and present in almost any part of digital operations making it a top non-financial risk. On a daily basis stakeholders are being faced with decisions on how to proceed with the implementation of the business strategy whilst providing a commensurate level of protection against ever evolving cyber threats and ensuring critical products and services operate within the desired risk thresholds.

    Speaker(s)

  • Wednesday 25th
    14:50-15:35

    Using Security Patterns to Protect Cloud

    Session 16A

    We'll begin by exploring the concept and purpose of security patterns and how these align with the SABSA framework.

    While there are different definitions that exist in the industry, with a specific focus on those published by cloud providers (AWS, Azure). We'll focus on how to navigate and identify the most practical and meaningful ones

    Speaker(s)

    Architecting Human Resilience: Embedding Cyber-Aware Business Simulation into Enterprise Practice

    Session 16B

    Cyber threats continue to evolve, but integrated business awareness training remains stagnant. In this session, we explore how enterprise/security architecture approaches can be used to embed simulation and immersive training into operational practice to uplift business resilience. Drawing from field-tested approaches across Defence, government and regulated industries, Derek Grocke presents a blueprint for integrating experiential learning methods, enterprise architecture domains and systems thinking into a unified model that embeds reinforcement learning into business as usual.

    Speaker(s)

  • Wednesday 25th
    15:35-15:55

    Afternoon Tea

  • Wednesday 25th
    15:55-16:40

    Building an Adaptive Security Architecture

    Session 17A

    The presentation addresses 3 trends currently challenging the cybersecurity operating model.
    • Customer expectations are shifting
    Digital natives think in terms of customer journeys, and they want safe but low-friction experiences along the way.
    • Threats are evolving
    There are now new ways to exploit human nature and decision making, using technologies like AI. Lastly,
    • Regulations are fragmenting
    Countries recognise the value of data and are taking a stronger, more localised, position on how to protect it.

    Speaker(s)

    Fear of the Dark

    Session 17B

    Legacy is a frequently used term in a relatively young industry, reserved for systems made of ageing: hardware, operating systems, software and applications, storage media, file formats, peripherals, connectors and so on. Typically, another term accompanies such systems, the process of ‘sweating assets’ for better or for worse. Not to mention ‘end of life’ and ‘lifecycle management’. Inevitably the word ‘risk’ makes an appearance.

    Speaker(s)

  • Wednesday 25th
    16:45-17:30

    From Chessboard to Boardroom: A Shift in Ideology to Harness World Class Talent with SABSA

    Session 18A

    - Since we started leveraging SABSA methodologies to secure wins - not just on chess boards, but any Board. 😉

    When people think of enterprise security architecture, they don’t often envision “talent” as a core asset. But what if talent is the very mission that needs to be secured, nurtured and future proofed to endure the test of time?

    Speaker(s)

    Not Just Lean. But Lean & Mean.

    Session 18B

    Establishing cyber capabilities in any organisation requires an intentional approach that need to strike a balance between difference forces within an organisation.

    Speaker(s)

  • Wednesday 25th
    17:40-18:40

    The COSAC Rump Session

    Plenary 19P

    The COSAC “rump” has for many years been a hugely popular plenary session at COSAC. The Rump is an informal rapid-fire session in which participants give very short presentations on recent results, work in progress, and any other topic of interest to the COSAC community. Presentations may be purely technical, entirely management oriented in nature, or of any combination of approaches or perspectives.

    Speaker(s)

  • Wednesday 25th
    18:45-19:15

    Drinks Reception (Sponsored by David Lynas Consulting)

  • Wednesday 25th
    19:15

    COSAC APAC 2026 Gala Dinner (Sponsored by ALC Training)

Thursday 26th February

  • Thursday 26th
    08:00-09:30

    The SABSA Institute Forum - Melbourne - AI Architecture 2026 and beyond

    Registrations are now open for THE SABSA Institute Forum at COSAC APAC 2026, featuring our special guest from The SABSA Institute, SABSA Master Dr Malcolm Shore, who will discuss and answer questions on AI Architecture in 2026 and beyond.

    Note: Entry to SABSA World Forum is open to the public. Entry does not provide entry to COSAC APAC 2026 Security Conference for alternative presentations.

    Speaker(s)

  • Thursday 26th
    09:30-10:00

    Registration & Coffee

  • Thursday 26th
    10:00-17:45

    6th COSAC APAC Security Architecture Design-Off

    Masterclass M1

    Returning for a 6th year, this design-off will present a new and engaging set of challenges. In the spirit of hack-a-thons, this competition was born out of a desire to provide a venue for security architects to apply their skills in a safe environment. This is a unique competition format that uses real clients, scenarios and deliverables to see which team will reign supreme! Whether you are a seasoned enterprise architect or security architect, or just looking to try something different to build and enhance your skills, this session will provide a unique opportunity to prove and hone your architecture chops.

    Speaker(s)

    COSAC APAC International Round Table Security Forum

    Masterclass M2

    The 2026 session of the Forum addresses a Pandora’s box full of new information security issues in a world where older issues won’t stay buried. You’ll join a group of similarly situated professionals - experienced, dedicated, resilient, perhaps bloodied in past successes and failures – to seek realistic solutions and accommodations to the challenges facing us in 2026 and beyond.

    Speaker(s)

    Building an AI Fast Track Agent

    Masterclass M3

    AI has evolved remarkably quickly from chatbot to agent, and is well on the way to delivering virtual employees. In this workshop we take a hands-on approach to understanding agentic AI, and step by step build the datasets and tools we need to augment an AI model with a modicum of SABSA expertise.

    Speaker(s)

  • Thursday 26th
    11:35-11:55

    Morning Coffee

  • Thursday 26th
    13:30-14:30

    Lunch (Sponsored by David Lynas Consulting)

  • Thursday 26th
    16:00-16:20

    Afternoon Tea

  • Thursday 26th
    18:00-18:15

    Conference Close - COSAC Chairman's Closing Remarks

COSAC
Patrons

A completely new COSAC experience pushing the boundaries of cybersecurity further than ever before. Smart people, inspiring guest speakers and a ton of passion. Become a COSAC Patron and gain access like no other.

Become a patron

COSAC
2026.

27th Sept - 1st Oct: Kildare, Ireland

Contact

Get in contact with us by email, phone or just stay social and connect with us on LinkedIn

Sponsors

MELBOURNE

+61 386 869 119