Skip to content

Schedule

Tuesday 24th February

  • Tuesday 24th
    08:30-09:00

    Registration & Coffee

  • Tuesday 24th
    09:00-09:20

    COSAC APAC 2026 Chairman's Welcome

  • Tuesday 24th
    09:30-10:15

    Implementing the SABSA NIST CSF Community Profile

    Session 2A

    The NIST CSF provides a collection of essential areas where cybersecurity protections are needed but the current specification of functions, categories and subcategories are far from comprehensive or sufficient for many organizations. NIST is now encouraging extensions be defined to the CSF to add the missing elements deemed important or necessary to adapt the CSF to meet the needs of specific industries, associations, regulatory bodies or legislative requirements through Community Profiles for developing use case-specific cybersecurity risk management guidance for multiple organizations.

    Speaker(s)

    From Value Chain to Prompt: AI Fast Track

    Session 2B

    This presentation is a walkthrough of an AI Fast Track playbook designed for architecting AI solutions which demonstrate clear value to the business. It provides an insight into the steps required to identify the opportunities for AI in the business, and describes reference mappings of attributes to various AI standards, guidelines, and regulations.

    Speaker(s)

  • Tuesday 24th
    10:20-11:05

    Enterprise Security Architecture – Using SABSA to Deliver ISO 27001 the Right Way

    Session 3A

    Many of us who come to attend a SABSA course are well versed in ISO 27001 and/or ISO 20000 (ITIL). Most organisations (especially utilities, water, transport etc), have what is called an integrated management system which brings together standards such as ISO 9001 (Quality), ISO 45001 (Safety), ISO 14001 (Environment) under one management system. Before embarking on developing and implementing enterprise security architecture, it is important that Enterprise Security Architects understand such standards.

    Speaker(s)

    Beyond the Algorithm: Cultivating Trust in the AI Era

    Session 3B

    Artificial intelligence is now integral to our lives and businesses. As AI's influence expands, trust becomes paramount. We must go beyond innovation to ensure AI systems are responsible, safe, and dependable.

    Speaker(s)

  • Tuesday 24th
    11:05-11:25

    Morning Coffee

  • Tuesday 24th
    11:25-12:10

    When SABSA met FAIR: A Framework Dynamic Duo

    Session 4A

    This session will show how SABSA can incorporate FAIR (Factor Analysis of Information Risk) to increase risk rigor and security decision-making.

    Speaker(s)

    Human Crash-Test Dummies, and How AI has Taken the RED out of DREAD...

    Session 4B

    The modern AI world has weaponized the attackers with better and smarter tools than ever before.
    The "DREAD" threat model is now trending to just "AD" (i.e. AI tools are blitzing the Reproducibility, Exploitability and Discoverability of vulns. All we can manage now is the Damage and Effected users).

    Speaker(s)

  • Tuesday 24th
    12:15-13:00

    Optimising Information Asset Utilisation Through Co-Design and SABSA Integration

    Session 5A

    This paper explores the lifecycle of an information asset, tracing its evolution from a singular business process to its strategic positioning within the layers of the SABSA framework.

    Speaker(s)

    Space Engineering Inspired Cyber Resiliency

    Session 5B

    Recent high-profile IT outages, like the CrowdStrike incident or the accidental wiping of the complete Google cloud service of UniSuper Australia, are a stark reminder that cybersecurity is not just about malicious threat actors, but also about issues arising from human errors with no failsafe.

    Speaker(s)

  • Tuesday 24th
    13:00-14:00

    Lunch

  • Tuesday 24th
    14:00-14:45

    How to Influence Your Way to Cyber Budgets

    Session 6A

    Creating persuasive presentations for executive buy-in on cybersecurity strategies requires a fundamental shift from technical jargon to business-focused narratives. Successful cybersecurity presentations must translate complex technical risks into quantifiable business impacts, emphasizing potential financial losses, regulatory compliance failures, and reputational damage. The key lies in speaking the executive language of ROI, competitive advantage, and strategic enablement rather than focusing solely on technical vulnerabilities.

    Speaker(s)

    Beyond Chatbots: Building Semantic Intelligence for Next-Generation GRC Automation

    Session 6B

    While large language models dominate headlines, the real revolution in governance, risk, and compliance (GRC) automation lies in semantic technologies that deliver deterministic, auditable outcomes. This presentation explores how knowledge graphs, ontologies, and policy-as-code are transforming cybersecurity governance from reactive compliance theatre into proactive, intelligent defence.

    Speaker(s)

  • Tuesday 24th
    14:50-15:35

    Using the SABSA Matrix with Stakeholders to Define Project Perspectives and Actions

    Session 7A

    The SABSA Matrix logically sets out the different layers of architectures against the perspectives of that layer. Recently when planning for a new Security Service, the SABSA Matrix was used in discussions with stakeholders for their reasoning, drivers, motivations and outcomes.

    Speaker(s)

    Taming the Untrusted: Zero Trust Approaches and Cross-Sector Case Studies

    Session 7B

    Taming the Untrusted: Zero Trust Approaches and Cross-Sector Case Studies In today’s digital world, it is no longer a question of whether an organisation will be the
    subject of a cyber-attack but more of when. And as organisations rapidly transform in today’s digital-first world, the traditional security perimeter has vanished. The rise of hybrid work, cloud adoption, and increasingly sophisticated threats demand a new approach - one that doesn’t just defend, but enables cyber resilience.

    Speaker(s)

  • Tuesday 24th
    15:35-15:55

    Afternoon Tea

  • Tuesday 24th
    15:55-16:40

    The Needs of the Many Outweigh the Needs of the Few, or the One - Spock

    Session 8A

    It is an accepted adage in SABSA that

    ‘For want of a nail the shoe was lost; … all for want of care about a horse-shoe nail.’

    Is a good example of the consequence of miscommunicating risks, issues and opportunities ‘up’ the chain.

    Speaker(s)

    Mesh, Hype or Hope? Reassessing Cybersecurity Mesh Architecture (CSMA) in the Shadow of Zero Trust

    Session 8B

    In an industry already saturated with architecture frameworks—Zero Trust, SASE, CARTA, BeyondCorp, and more—the introduction of Cybersecurity Mesh Architecture (CSMA) by Gartner raises a compelling question: Do we truly need another one?

    Speaker(s)

  • Tuesday 24th
    16:45-17:30

    SABSA Foundations Complete… Now What?

    Session 9A

    Let’s be honest, completing the SABSA Foundations course is one thing but knowing where to begin is another thing entirely. Great in theory… but how do I implement this within the context of my business? It’s easy to get lost in the complexity of the framework so what is needed is a manageable, low risk project to gain momentum and build confidence. The answer could be developing a Team Charter.

    Speaker(s)

    Securing Australia's Federated Future: Rethinking Access, Trust, and Compliance Across Domains

    Session 9B

    Australia’s digital infrastructure is becoming increasingly federated. Government departments, healthcare networks, research institutions, and private enterprises are no longer isolated systems. They now rely on shared platforms, cross-agency data flows, and multi-cloud architectures. However, most organisations continue to depend on centralised identity and access control systems that were designed for siloed environments. These outdated models are unable to handle the complexity of shared authority, distributed data governance, and jurisdictional compliance.

    Speaker(s)

  • Tuesday 24th
    17:40-18:40

    High Assurance Computing in the Commercial Sector: Niche or Necessity?

    Plenary 10P

    As digital transformation accelerates across industries, commercial enterprises are facing heightened exposure to sophisticated cyber threats, regulatory scrutiny, and reputational risk. High Assurance Computing (HAC), with its rigorous standards for correctness, confidentiality, integrity, and trust has been confined traditionally to the defence, aerospace, and critical national infrastructure (CNI) sectors.

    Speaker(s)

  • Tuesday 24th
    18:45-19:15

    Drinks Reception

  • Tuesday 24th
    19:15

    Dinner

Wednesday 25th February

  • Wednesday 25th
    09:00-09:30

    Registration & Coffee

  • Wednesday 25th
    09:30-10:15

    The Pragmatist's Guide to Safely Automating the Management of Critical Infrastructure

    Session 11A

    How do you safely automate the management of infrastructure responsible for providing society with essential services?

    Speaker(s)

    Why Misinformed Teams Build Weak Security Programs

    Session 11B

    After spending 20 years leading security teams across government and enterprise environments, one pattern emerges: the strongest security programs are not built by teams with the biggest headcount, largest budgets or most tools, but by teams that have the best information and are driven by context and data. Misinformed teams inevitably develop weaksecurity programs that fail when facing real-world threats.

    Speaker(s)

  • Wednesday 25th
    10:20-11:05

    Bridging Business and Cybersecurity: An Enterprise Security Architecture Journey in the Australian Energy Sector

    Session 12A

    This session shares the journey of an Australian energy company in establishing a practical and scalable Enterprise Security Architecture using the SABSA framework. It explores how SABSA has been leveraged as the “glue” component, from a cyber security perspective, to address emerging business challenges, digital transformation, and an evolving regulatory landscape.

    Speaker(s)

    Dynamic Risk Management

    Session 12B

    Effective Risk Management is a sacrosanct for any organization to remain a going concern. Organizations that can optimize their risk postures have greater chance of maximizing stakeholder values. But risk variables are moving extremely fast and static risk management can no longer enable risk optimization.

    Speaker(s)

  • Wednesday 25th
    11:05-11:25

    Morning Coffee

  • Wednesday 25th
    11:25-12:10

    The Grammar of SABSA Attributes

    Session 13A

    When undertaking any work as a risk professional, it behooves us to proceed with caution and choose our words wisely. Business Drivers, Attributes and the careful crafting of their definitions for the Enterprise to which they belong are foundational to the ESA toolbox. With our craft, we hope to capture complexity within plain language while remaining flexible and removingambiguity.

    Speaker(s)

    Zero to Owned: Mapping the Lifecycle of a Credential Stealer to Corporate Breach

    Session 13B

    This research explores how infostealer malware turns into an early-stage access vector for corporate breaches. The focus is on how stealer logs, which are publicly available in various Telegram channels and marketplaces, contain data that attackers can use to identify and target businesses. Logs are collected from infected personal and unmanaged devices. Once the data is extracted, it typically contains a mix of credentials, cookies, tokens, and browser-stored artifacts. + Working and defense from common infostealers like Raccoon, Redline, and LummaC2.

    Speaker(s)

  • Wednesday 25th
    12:15-13:00

    Beyond Taxonomies A New Ontological Lens for SABSA Data Architecture

    Session 14A

    In a world obsessed with data - whether for insights, governance, compliance, or control—volume is often mistaken for value. But under the SABSA framework, where data begins life as a physical asset, meaningful transformation requires more than classification. Traditional tools such as the ‘business taxonomy of assets’ and ‘business attributes taxonomy’ have served us well, yet their hierarchical rigidity may no longer align with the complex, fluid nature of today’s data ecosystems.

    Speaker(s)

    Authorised and Compromised – The Biometric Illusion

    Session 14B

    Biometrics were meant to kill the password. Instead, they have become permanent keys with no revocation path. We can change your password, we cannot change our face.

    This presentation unpacks the systemic risks behind the rush to adopt biometric authentication - risks baked into the technology, amplified by architecture, and overlooked by compliance. From India’s Aadhaar leaks to facial recognition hacks on commercial phones, the pattern is clear: convenience is winning, and users are losing.

    Speaker(s)

  • Wednesday 25th
    13:00-14:00

    Lunch

  • Wednesday 25th
    14:00-14:45

    Architecting Stovepipes of Excellence: A Case Study on Connecting Threat Actors, TTPs, Controls, and Assurance Programs

    Session 15A

    This talk walks through a real-world case study showing how we managed to create security traceability around assets, threats they face and risk mitigation investment.

    Instead of keeping threat intel, controls, assurance and overall security architecture in silos, we figured out how to make different parts of a modern organisation work together to provide a solid perspective on prioritised risk mitigations and improve spending on assurance activities that matter.

    Speaker(s)

    If Socrates was a CISO or Even Worse - Your Business Stakeholder

    Session 15B

    The nature of the cyber security risk is both complex and broad, and present in almost any part of digital operations making it a top non-financial risk. On a daily basis stakeholders are being faced with decisions on how to proceed with the implementation of the business strategy whilst providing a commensurate level of protection against ever evolving cyber threats and ensuring critical products and services operate within the desired risk thresholds.

    Speaker(s)

  • Wednesday 25th
    14:50-15:35

    Using Security Patterns to Protect Cloud

    Session 16A

    We'll begin by exploring the concept and purpose of security patterns and how these align with the SABSA framework.

    While there are different definitions that exist in the industry, with a specific focus on those published by cloud providers (AWS, Azure). We'll focus on how to navigate and identify the most practical and meaningful ones

    Speaker(s)

    Architecting Human Resilience: Embedding Cyber-Aware Business Simulation into Enterprise Practice

    Session 16B

    Cyber threats continue to evolve, but integrated business awareness training remains stagnant. In this session, we explore how enterprise/security architecture approaches can be used to embed simulation and immersive training into operational practice to uplift business resilience. Drawing from field-tested approaches across Defence, government and regulated industries, Derek Grocke presents a blueprint for integrating experiential learning methods, enterprise architecture domains and systems thinking into a unified model that embeds reinforcement learning into business as usual.

    Speaker(s)

  • Wednesday 25th
    15:35-15:55

    Afternoon Tea

  • Wednesday 25th
    15:55-16:40

    Privacy by Design: A Conceptual Ideal, A Practical Failure

    Session 17A

    Privacy is often viewed as a policy or compliance requirement - designed in theory but seldom architected into practice. Controls are typically retrofitted, with limited connection to business objectives or the entire data lifecycle.

    Speaker(s)

    Fear of the Dark

    Session 17B

    Legacy is a frequently used term in a relatively young industry, reserved for systems made of ageing: hardware, operating systems, software and applications, storage media, file formats, peripherals, connectors and so on. Typically, another term accompanies such systems, the process of ‘sweating assets’ for better or for worse. Not to mention ‘end of life’ and ‘lifecycle management’. Inevitably the word ‘risk’ makes an appearance.

    Speaker(s)

  • Wednesday 25th
    16:45-17:30

    From Chessboard to Boardroom: A Shift in Ideology to Harness World Class Talent with SABSA

    Session 18A

    - Since we started leveraging SABSA methodologies to secure wins - not just on chess boards, but any Board. 😉

    When people think of enterprise security architecture, they don’t often envision “talent” as a core asset. But what if talent is the very mission that needs to be secured, nurtured and future proofed to endure the test of time?

    Speaker(s)

    Not Just Lean. But Lean & Mean.

    Session 18B

    Establishing cyber capabilities in any organisation requires an intentional approach that need to strike a balance between difference forces within an organisation.

    Speaker(s)

  • Wednesday 25th
    17:40-18:40

    The COSAC Rump Session

    Plenary 19P

    The COSAC “rump” has for many years been a hugely popular plenary session at COSAC. The Rump is an informal rapid-fire session in which participants give very short presentations on recent results, work in progress, and any other topic of interest to the COSAC community. Presentations may be purely technical, entirely management oriented in nature, or of any combination of approaches or perspectives.

    Speaker(s)

  • Wednesday 25th
    18:45-19:15

    Drinks Reception

  • Wednesday 25th
    19:15

    Dinner

Thursday 26th February

  • Thursday 26th
    09:30-10:00

    Registration & Coffee

  • Thursday 26th
    10:00-17:45

    6th COSAC APAC Security Architecture Design-Off

    Masterclass M1

    Returning for a 6th year, this design-off will present a new and engaging set of challenges. In the spirit of hack-a-thons, this competition was born out of a desire to provide a venue for security architects to apply their skills in a safe environment. This is a unique competition format that uses real clients, scenarios and deliverables to see which team will reign supreme! Whether you are a seasoned enterprise architect or security architect, or just looking to try something different to build and enhance your skills, this session will provide a unique opportunity to prove and hone your architecture chops.

    Speaker(s)

    COSAC APAC International Round Table Security Forum

    Masterclass M2

    The 2026 session of the Forum addresses a Pandora’s box full of new information security issues in a world where older issues won’t stay buried. You’ll join a group of similarly situated professionals - experienced, dedicated, resilient, perhaps bloodied in past successes and failures – to seek realistic solutions and accommodations to the challenges facing us in 2026 and beyond.

    Speaker(s)

    Building an AI Fast Track Agent

    Masterclass M3

    AI has evolved remarkably quickly from chatbot to agent, and is well on the way to delivering virtual employees. In this workshop we take a hands-on approach to understanding agentic AI, and step by step build the datasets and tools we need to augment an AI model with a modicum of SABSA expertise.

    Speaker(s)

  • Thursday 26th
    11:35-11:55

    Morning Coffee

  • Thursday 26th
    13:30-14:30

    Lunch

  • Thursday 26th
    16:00-16:20

    Afternoon Tea

  • Thursday 26th
    18:00-18:15

    Conference Close - COSAC Chairman's Closing Remarks

COSAC
Patrons

A completely new COSAC experience pushing the boundaries of cybersecurity further than ever before. Smart people, inspiring guest speakers and a ton of passion. Become a COSAC Patron and gain access like no other.

Become a patron

COSAC
2025.

28th Sept - 2nd Oct: Kildare, Ireland

Contact

Get in contact with us by email, phone or just stay social and connect with us on LinkedIn

Sponsors

MELBOURNE

+61 386 869 119