Tuesday 24th February
-
Tuesday 24th
08:30-09:00Registration & Coffee
-
Tuesday 24th
09:00-09:20COSAC APAC 2026 Chairman's Welcome
-
Tuesday 24th
09:30-10:15Implementing the SABSA NIST CSF Community Profile
Session 2A
The NIST CSF provides a collection of essential areas where cybersecurity protections are needed but the current specification of functions, categories and subcategories are far from comprehensive or sufficient for many organizations. NIST is now encouraging extensions be defined to the CSF to add the missing elements deemed important or necessary to adapt the CSF to meet the needs of specific industries, associations, regulatory bodies or legislative requirements through Community Profiles for developing use case-specific cybersecurity risk management guidance for multiple organizations.
Speaker(s)
From Value Chain to Prompt: AI Fast Track
Session 2B
This presentation is a walkthrough of an AI Fast Track playbook designed for architecting AI solutions which demonstrate clear value to the business. It provides an insight into the steps required to identify the opportunities for AI in the business, and describes reference mappings of attributes to various AI standards, guidelines, and regulations.
Speaker(s)
-
-
Tuesday 24th
10:20-11:05Enterprise Security Architecture – Using SABSA to Deliver ISO 27001 the Right Way
Session 3A
Many of us who come to attend a SABSA course are well versed in ISO 27001 and/or ISO 20000 (ITIL). Most organisations (especially utilities, water, transport etc), have what is called an integrated management system which brings together standards such as ISO 9001 (Quality), ISO 45001 (Safety), ISO 14001 (Environment) under one management system. Before embarking on developing and implementing enterprise security architecture, it is important that Enterprise Security Architects understand such standards.
Speaker(s)
Beyond the Algorithm: Cultivating Trust in the AI Era
Session 3B
Artificial intelligence is now integral to our lives and businesses. As AI's influence expands, trust becomes paramount. We must go beyond innovation to ensure AI systems are responsible, safe, and dependable.
Speaker(s)
-
-
Tuesday 24th
11:05-11:25Morning Coffee
-
Tuesday 24th
11:25-12:10When SABSA met FAIR: A Framework Dynamic Duo
Session 4A
This session will show how SABSA can incorporate FAIR (Factor Analysis of Information Risk) to increase risk rigor and security decision-making.
Speaker(s)
Human Crash-Test Dummies, and How AI has Taken the RED out of DREAD...
Session 4B
The modern AI world has weaponized the attackers with better and smarter tools than ever before.
The "DREAD" threat model is now trending to just "AD" (i.e. AI tools are blitzing the Reproducibility, Exploitability and Discoverability of vulns. All we can manage now is the Damage and Effected users).Speaker(s)
-
-
Tuesday 24th
12:15-13:00Optimising Information Asset Utilisation Through Co-Design and SABSA Integration
Session 5A
This paper explores the lifecycle of an information asset, tracing its evolution from a singular business process to its strategic positioning within the layers of the SABSA framework.
Speaker(s)
Space Engineering Inspired Cyber Resiliency
Session 5B
Recent high-profile IT outages, like the CrowdStrike incident or the accidental wiping of the complete Google cloud service of UniSuper Australia, are a stark reminder that cybersecurity is not just about malicious threat actors, but also about issues arising from human errors with no failsafe.
Speaker(s)
-
-
Tuesday 24th
13:00-14:00Lunch
-
Tuesday 24th
14:00-14:45How to Influence Your Way to Cyber Budgets
Session 6A
Creating persuasive presentations for executive buy-in on cybersecurity strategies requires a fundamental shift from technical jargon to business-focused narratives. Successful cybersecurity presentations must translate complex technical risks into quantifiable business impacts, emphasizing potential financial losses, regulatory compliance failures, and reputational damage. The key lies in speaking the executive language of ROI, competitive advantage, and strategic enablement rather than focusing solely on technical vulnerabilities.
Speaker(s)
Beyond Chatbots: Building Semantic Intelligence for Next-Generation GRC Automation
Session 6B
While large language models dominate headlines, the real revolution in governance, risk, and compliance (GRC) automation lies in semantic technologies that deliver deterministic, auditable outcomes. This presentation explores how knowledge graphs, ontologies, and policy-as-code are transforming cybersecurity governance from reactive compliance theatre into proactive, intelligent defence.
Speaker(s)
-
-
Tuesday 24th
14:50-15:35Using the SABSA Matrix with Stakeholders to Define Project Perspectives and Actions
Session 7A
The SABSA Matrix logically sets out the different layers of architectures against the perspectives of that layer. Recently when planning for a new Security Service, the SABSA Matrix was used in discussions with stakeholders for their reasoning, drivers, motivations and outcomes.
Speaker(s)
Taming the Untrusted: Zero Trust Approaches and Cross-Sector Case Studies
Session 7B
Taming the Untrusted: Zero Trust Approaches and Cross-Sector Case Studies In today’s digital world, it is no longer a question of whether an organisation will be the
subject of a cyber-attack but more of when. And as organisations rapidly transform in today’s digital-first world, the traditional security perimeter has vanished. The rise of hybrid work, cloud adoption, and increasingly sophisticated threats demand a new approach - one that doesn’t just defend, but enables cyber resilience.
Speaker(s)
-
-
Tuesday 24th
15:35-15:55Afternoon Tea
-
Tuesday 24th
15:55-16:40The Needs of the Many Outweigh the Needs of the Few, or the One - Spock
Session 8A
It is an accepted adage in SABSA that
‘For want of a nail the shoe was lost; … all for want of care about a horse-shoe nail.’
Is a good example of the consequence of miscommunicating risks, issues and opportunities ‘up’ the chain.Speaker(s)
Mesh, Hype or Hope? Reassessing Cybersecurity Mesh Architecture (CSMA) in the Shadow of Zero Trust
Session 8B
In an industry already saturated with architecture frameworks—Zero Trust, SASE, CARTA, BeyondCorp, and more—the introduction of Cybersecurity Mesh Architecture (CSMA) by Gartner raises a compelling question: Do we truly need another one?
Speaker(s)
-
-
Tuesday 24th
16:45-17:30SABSA Foundations Complete… Now What?
Session 9A
Let’s be honest, completing the SABSA Foundations course is one thing but knowing where to begin is another thing entirely. Great in theory… but how do I implement this within the context of my business? It’s easy to get lost in the complexity of the framework so what is needed is a manageable, low risk project to gain momentum and build confidence. The answer could be developing a Team Charter.
Speaker(s)
Securing Australia's Federated Future: Rethinking Access, Trust, and Compliance Across Domains
Session 9B
Australia’s digital infrastructure is becoming increasingly federated. Government departments, healthcare networks, research institutions, and private enterprises are no longer isolated systems. They now rely on shared platforms, cross-agency data flows, and multi-cloud architectures. However, most organisations continue to depend on centralised identity and access control systems that were designed for siloed environments. These outdated models are unable to handle the complexity of shared authority, distributed data governance, and jurisdictional compliance.
Speaker(s)
-
-
Tuesday 24th
17:40-18:40High Assurance Computing in the Commercial Sector: Niche or Necessity?
Plenary 10P
As digital transformation accelerates across industries, commercial enterprises are facing heightened exposure to sophisticated cyber threats, regulatory scrutiny, and reputational risk. High Assurance Computing (HAC), with its rigorous standards for correctness, confidentiality, integrity, and trust has been confined traditionally to the defence, aerospace, and critical national infrastructure (CNI) sectors.
Speaker(s)
-
-
Tuesday 24th
18:45-19:15Drinks Reception
-
Tuesday 24th
19:15Dinner
Wednesday 25th February
-
Wednesday 25th
09:00-09:30Registration & Coffee
-
Wednesday 25th
09:30-10:15The Pragmatist's Guide to Safely Automating the Management of Critical Infrastructure
Session 11A
How do you safely automate the management of infrastructure responsible for providing society with essential services?
Speaker(s)
Why Misinformed Teams Build Weak Security Programs
Session 11B
After spending 20 years leading security teams across government and enterprise environments, one pattern emerges: the strongest security programs are not built by teams with the biggest headcount, largest budgets or most tools, but by teams that have the best information and are driven by context and data. Misinformed teams inevitably develop weaksecurity programs that fail when facing real-world threats.
Speaker(s)
-
-
Wednesday 25th
10:20-11:05Bridging Business and Cybersecurity: An Enterprise Security Architecture Journey in the Australian Energy Sector
Session 12A
This session shares the journey of an Australian energy company in establishing a practical and scalable Enterprise Security Architecture using the SABSA framework. It explores how SABSA has been leveraged as the “glue” component, from a cyber security perspective, to address emerging business challenges, digital transformation, and an evolving regulatory landscape.
Speaker(s)
Dynamic Risk Management
Session 12B
Effective Risk Management is a sacrosanct for any organization to remain a going concern. Organizations that can optimize their risk postures have greater chance of maximizing stakeholder values. But risk variables are moving extremely fast and static risk management can no longer enable risk optimization.
Speaker(s)
-
-
Wednesday 25th
11:05-11:25Morning Coffee
-
Wednesday 25th
11:25-12:10The Grammar of SABSA Attributes
Session 13A
When undertaking any work as a risk professional, it behooves us to proceed with caution and choose our words wisely. Business Drivers, Attributes and the careful crafting of their definitions for the Enterprise to which they belong are foundational to the ESA toolbox. With our craft, we hope to capture complexity within plain language while remaining flexible and removingambiguity.
Speaker(s)
Zero to Owned: Mapping the Lifecycle of a Credential Stealer to Corporate Breach
Session 13B
This research explores how infostealer malware turns into an early-stage access vector for corporate breaches. The focus is on how stealer logs, which are publicly available in various Telegram channels and marketplaces, contain data that attackers can use to identify and target businesses. Logs are collected from infected personal and unmanaged devices. Once the data is extracted, it typically contains a mix of credentials, cookies, tokens, and browser-stored artifacts. + Working and defense from common infostealers like Raccoon, Redline, and LummaC2.
Speaker(s)
-
-
Wednesday 25th
12:15-13:00Beyond Taxonomies A New Ontological Lens for SABSA Data Architecture
Session 14A
In a world obsessed with data - whether for insights, governance, compliance, or control—volume is often mistaken for value. But under the SABSA framework, where data begins life as a physical asset, meaningful transformation requires more than classification. Traditional tools such as the ‘business taxonomy of assets’ and ‘business attributes taxonomy’ have served us well, yet their hierarchical rigidity may no longer align with the complex, fluid nature of today’s data ecosystems.
Speaker(s)
Authorised and Compromised – The Biometric Illusion
Session 14B
Biometrics were meant to kill the password. Instead, they have become permanent keys with no revocation path. We can change your password, we cannot change our face.
This presentation unpacks the systemic risks behind the rush to adopt biometric authentication - risks baked into the technology, amplified by architecture, and overlooked by compliance. From India’s Aadhaar leaks to facial recognition hacks on commercial phones, the pattern is clear: convenience is winning, and users are losing.Speaker(s)
-
-
Wednesday 25th
13:00-14:00Lunch
-
Wednesday 25th
14:00-14:45Architecting Stovepipes of Excellence: A Case Study on Connecting Threat Actors, TTPs, Controls, and Assurance Programs
Session 15A
This talk walks through a real-world case study showing how we managed to create security traceability around assets, threats they face and risk mitigation investment.
Instead of keeping threat intel, controls, assurance and overall security architecture in silos, we figured out how to make different parts of a modern organisation work together to provide a solid perspective on prioritised risk mitigations and improve spending on assurance activities that matter.Speaker(s)
If Socrates was a CISO or Even Worse - Your Business Stakeholder
Session 15B
The nature of the cyber security risk is both complex and broad, and present in almost any part of digital operations making it a top non-financial risk. On a daily basis stakeholders are being faced with decisions on how to proceed with the implementation of the business strategy whilst providing a commensurate level of protection against ever evolving cyber threats and ensuring critical products and services operate within the desired risk thresholds.
Speaker(s)
-
-
Wednesday 25th
14:50-15:35Using Security Patterns to Protect Cloud
Session 16A
We'll begin by exploring the concept and purpose of security patterns and how these align with the SABSA framework.
While there are different definitions that exist in the industry, with a specific focus on those published by cloud providers (AWS, Azure). We'll focus on how to navigate and identify the most practical and meaningful onesSpeaker(s)
Architecting Human Resilience: Embedding Cyber-Aware Business Simulation into Enterprise Practice
Session 16B
Cyber threats continue to evolve, but integrated business awareness training remains stagnant. In this session, we explore how enterprise/security architecture approaches can be used to embed simulation and immersive training into operational practice to uplift business resilience. Drawing from field-tested approaches across Defence, government and regulated industries, Derek Grocke presents a blueprint for integrating experiential learning methods, enterprise architecture domains and systems thinking into a unified model that embeds reinforcement learning into business as usual.
Speaker(s)
-
-
Wednesday 25th
15:35-15:55Afternoon Tea
-
Wednesday 25th
15:55-16:40Privacy by Design: A Conceptual Ideal, A Practical Failure
Session 17A
Privacy is often viewed as a policy or compliance requirement - designed in theory but seldom architected into practice. Controls are typically retrofitted, with limited connection to business objectives or the entire data lifecycle.
Speaker(s)
Fear of the Dark
Session 17B
Legacy is a frequently used term in a relatively young industry, reserved for systems made of ageing: hardware, operating systems, software and applications, storage media, file formats, peripherals, connectors and so on. Typically, another term accompanies such systems, the process of ‘sweating assets’ for better or for worse. Not to mention ‘end of life’ and ‘lifecycle management’. Inevitably the word ‘risk’ makes an appearance.
Speaker(s)
-
-
Wednesday 25th
16:45-17:30From Chessboard to Boardroom: A Shift in Ideology to Harness World Class Talent with SABSA
Session 18A
- Since we started leveraging SABSA methodologies to secure wins - not just on chess boards, but any Board. 😉
When people think of enterprise security architecture, they don’t often envision “talent” as a core asset. But what if talent is the very mission that needs to be secured, nurtured and future proofed to endure the test of time?
Speaker(s)
Not Just Lean. But Lean & Mean.
Session 18B
Establishing cyber capabilities in any organisation requires an intentional approach that need to strike a balance between difference forces within an organisation.
Speaker(s)
-
-
Wednesday 25th
17:40-18:40The COSAC Rump Session
Plenary 19P
The COSAC “rump” has for many years been a hugely popular plenary session at COSAC. The Rump is an informal rapid-fire session in which participants give very short presentations on recent results, work in progress, and any other topic of interest to the COSAC community. Presentations may be purely technical, entirely management oriented in nature, or of any combination of approaches or perspectives.
Speaker(s)
-
-
Wednesday 25th
18:45-19:15Drinks Reception
-
Wednesday 25th
19:15Dinner
Thursday 26th February
-
Thursday 26th
09:30-10:00Registration & Coffee
-
Thursday 26th
10:00-17:456th COSAC APAC Security Architecture Design-Off
Masterclass M1
Returning for a 6th year, this design-off will present a new and engaging set of challenges. In the spirit of hack-a-thons, this competition was born out of a desire to provide a venue for security architects to apply their skills in a safe environment. This is a unique competition format that uses real clients, scenarios and deliverables to see which team will reign supreme! Whether you are a seasoned enterprise architect or security architect, or just looking to try something different to build and enhance your skills, this session will provide a unique opportunity to prove and hone your architecture chops.
Speaker(s)
COSAC APAC International Round Table Security Forum
Masterclass M2
The 2026 session of the Forum addresses a Pandora’s box full of new information security issues in a world where older issues won’t stay buried. You’ll join a group of similarly situated professionals - experienced, dedicated, resilient, perhaps bloodied in past successes and failures – to seek realistic solutions and accommodations to the challenges facing us in 2026 and beyond.
Speaker(s)
Building an AI Fast Track Agent
Masterclass M3
AI has evolved remarkably quickly from chatbot to agent, and is well on the way to delivering virtual employees. In this workshop we take a hands-on approach to understanding agentic AI, and step by step build the datasets and tools we need to augment an AI model with a modicum of SABSA expertise.
Speaker(s)
-
-
Thursday 26th
11:35-11:55Morning Coffee
-
Thursday 26th
13:30-14:30Lunch
-
Thursday 26th
16:00-16:20Afternoon Tea
-
Thursday 26th
18:00-18:15Conference Close - COSAC Chairman's Closing Remarks
COSAC
Patrons
A completely new COSAC experience pushing the boundaries of cybersecurity further than ever before. Smart people, inspiring guest speakers and a ton of passion. Become a COSAC Patron and gain access like no other.
Become a patronContact
Get in contact with us by email, phone or just stay social and connect with us on LinkedIn