Sunday 28th September
-
Sunday 28th
15:00-16:00Delegate Registration
-
Sunday 28th
19:30-20:00Delegate Registration & Drinks Reception - sponsored by Killashee Hotel
-
Sunday 28th
20:00 onwardsCOSAC 2025 Welcome Dinner
Monday 29th September
-
Monday 29th
09:00-9:30Registration & Coffee
-
Monday 29th
09:30-17:30COSAC Masterclasses are full-day, 09:30 - 17:30
-
Monday 29th
09:30-17:30The 24th COSAC International Roundtable Security Forum
Masterclass M1
For 2025, the COSAC Forum puts you in a roomful of other information security veterans. Accomplished, creative, battle-scarred, they’ve faced dragons of almost infinite variety – technical, political, managerial, psychological, structural, architectural … - you get the picture. They’ve had notable successes. They’ve also had workable, effective security strategies gutted by corporate politics and rapidly changing strategies. Still they maintain professionalism and dedication to securing organizational assets. These professionals detect, recognize and avert threats (old and new), exploit latest and greatest security technologies and techniques, and keep sensitive information private. And they’re not shy. Sound like a picture of you?
Speaker(s)
John O'Leary
The 9th COSAC 'Design-Off'
Masterclass M2
Returning for a 9th year, this design-off will present a new and engaging set of challenges. In the spirit of hack-a-thons, this competition was born out of a desire to provide a venue for security architects to apply their skills in a safe environment. This is a unique competition format that uses real clients, scenarios and deliverables to see which team will reign supreme!
Speaker(s)
Jason Kobes
William SchultzZero Trust: What Are We Really Doing?
Masterclass M3
Many organizations are implementing or planning to implement Zero Trust Architecture (ZTA) systems believing it will strengthen security and protect against insider threats. But do they fully understand what’s being gained—and what’s being sacrificed?
Speaker(s)
Char Sample
Connie Justice
Lynette Hornung
Kaleb Frye -
Monday 29th
11:05-11:25Morning Coffee
-
Monday 29th
13:00-14:00Lunch
-
Monday 29th
15:35-15:35Afternoon Tea
-
Monday 29th
18:30-19:00Drinks Reception
-
Monday 29th
19:00 onwardsDinner & Traditional Irish Music Night
Tuesday 30th September
-
Tuesday 30th
09:00-09:30Registration & Coffee
-
Tuesday 30th
09:30-10:30The Nearest Emergency Exit May Be Behind You
Session 1A
What can we learn from aviation security?
Most of us love air travel, and even if we do not like it, we still place our lives in the capable hands of an airline multiple times a year. With its unbeatable safety record the airline industry is a beacon of the safety-first culture. Airlines need to deal with, complex industrial machines, complicated supply chains, unpredictable customers, highly skilled workers, major logistic challenges and major regulator pressure and they still manage to deliver us this complex product in a very secure way.Speaker(s)
Karel Koster
Automating Secure-by-Design: The AI-Enabled Security Revolution
Session 1B
CISOs have been in the hot seat lately, as evidenced by charges levied by the U.S. Securities and Exchange Commission in October 2023 against Solarwinds and CISO Tim Brown for “fraud and internal control failures relating to allegedly known cybersecurity risks and vulnerabilities”, in that he overstated the cybersecurity practices and understated or failed to disclose known risks.
Speaker(s)
Sophia Mexi-Jones
Jonathan CassamUsing the SABSA Cybersecurity Framework (CSF) Profile and Examples
Session 1S
How should you implement the NIST Cybersecurity Framework (CSF) 2.0 when developing or updating a security architecture using SABSA? The NIST CSF 2.0 is a significant upgrade to the de-facto global framework for managing cybersecurity risks, but it does not have everything that the SABSA Method can provide to effectively manage your enterprise cybersecurity risk right?
Speaker(s)
Glen Bruce
-
Tuesday 30th
10:30-11:30Space Engineering Inspired Cyber Resiliency
Session 2A
Recent high-profile IT outages, like the CrowdStrike incident or the accidental wiping of the complete Google cloud service of UniSuper Australia, are a stark reminder that cybersecurity is not just about malicious threat actors, but also about issues arising from human errors with no failsafe.
Speaker(s)
Chathura Abeydeera
Andreas DannertNavigating the Future of Cybersecurity: AI Assistants in Security Operations
Session 2B
As the landscape of cybersecurity becomes increasingly complex, organisations are turning to AI assistants to improve operational efficiency and strengthen their response to emerging threats. These systems, capable of automating routine tasks and processing vast amounts of threat intelligence, promise to transform security operations. But their integration into existing infrastructures is not without its challenges.
Speaker(s)
Vriti Magee
How I Implemented an ISMS in Day-to-Day Operations and Used SABSA without Telling Anyone
Session 2S
We’ve all heard the expression “Paper tiger” – it deceivingly looks like a powerful tiger, but it’s just a bunch of folded paper. My experience is that many organizations today say they have an Information Security Management System in place, but in fact it is an ineffectual system that cannot withstand challenges – a paper tiger!
Speaker(s)
Øystein Balstad
-
Tuesday 30th
11:30-11:45Morning Coffee
-
Tuesday 30th
11:45-12:45And What Is Truth?
Session 3A
“Persons here invent stories that neither are true nor ever will be.”
- Thucydides
Over one million men killed or wounded in Ukraine. Or maybe not. Peace is imminent. Or maybe not. We somehow thought that the ubiquity of information would quash the ability to generate mis- or dis-information, but that isn’t how it’s worked out. Why not?Speaker(s)
G. Mark Hardy
AI and Weaponizing Privacy – How Companies Use AI and Personal Data to Give Consumers a SHI**Y Deal – And What You Can Do About It**
Session 3B
In an age of big data and artificial intelligence, companies are using vast amounts of personal data to manipulate consumer behavior and maximize profits — often at the expense of privacy and fairness.
Speaker(s)
Mark Rasch
Valerie LyonsChoose Your Own Adventure: Use Flow Engineering to Apply SABSA
Seesion 3S
The SABSA Framework provides a structured methodology for developing an Enterprise Security Architecture (ESA). However, knowing where to begin and what path to take through the matrix can be challenging.
Speaker(s)
Chris Blunt
-
Tuesday 30th
12:45-13:30Lunch
-
Tuesday 30th
13:30-14:30The Scars of IAM
Seesion 4A
Identity is considered the new perimeter but no one knows where it starts or ends? Having been part of IAM programmes before, and coming into a new environment you stop and think what would I do different this time?
Speaker(s)
Daniel Avieritei
Action Figures - AI Generated Large Action Models and Privacy and Security
Session 4B
Generative AI and Large Action Models (LAMs) have introduced unprecedented challenges at the intersection of privacy, security, and intellectual property. While generative AI programs rely on large language models (LLMs) for training and testing, the expansion of AI into real-time, action-oriented decision-making has given rise to more complex privacy and data security issues. The session will explore how AI-driven data aggregation, behavioral profiling, and decision-making create new vulnerabilities and privacy risks, especially when AI models require continuous data collection from personal devices and behavioral inputs.
Speaker(s)
Mark Rasch
Moving from SABSA Foundation to Practice
Session 4S
Many newly qualified SABSA architects find it difficult to start putting SABSA into practice. SABSA’s business-led approach, which links business objectives to security controls, is compelling when you are on the Foundation training course but can feel overwhelming when you get back to the office.
Speaker(s)
Gordon Jenkins
-
Tuesday 30th
14:30-15:30Zero Trustageddon
Session 5A
At COSAC 2023 we learned how a Tsunami of Truth (aka Trunami) could, and had, brought about the collapse of large businesses. In some cases, it just needed a small snippet of truth, but one broadcast to the world, to effect great change; we even referred light-heartedly to “Elon moments”.
Speaker(s)
Nick Spenceley
Engineering A Security Framework for Digital Twins
Session 5B
The concept of digital twins is part of the buzzword bingo and hype cycle surrounding use of digital simulation and analysis, with a dash of AI, that may enable us to better forecast use and improve design of physical assets and business processes. The Indian government’s proposed initiative to create of a city-scale digital twin aimed at improving future urban planning raises interesting security, privacy and ethical issues. To address the inherent risks, we need to look beyond traditional IT threat modelling and consider a holistic approach to managing safety and security aspects.
Speaker(s)
Hugh Boyes
To Build or Not To Build That is The Question – Case Study on Building a Cybersecurity Architecture Capability at a Global Semiconductor
Session 5S
Today, there is not a lot of published case studies on how to build a cybersecurity architecture capability at an organization, especially one based on SABSA. The purpose of this talk is to contribute to the body of case studies and architecture community about building a cybersecurity architecture capability. The case study highlighted in this talk is derived from the presenter being hired to “build” a cybersecurity architecture program at a global semi-conductor. The build phase continues in 2025.
Speaker(s)
Robert Rost
-
Tuesday 30th
15:30-15:45Afternoon Tea
-
Tuesday 30th
15:45–16:45Security That Works For You: Building User-Friendly Architectures
Session 6A
Tired of security that gets in your way? We're flipping the script! This session dives into building security architectures that actually make users' lives easier, not harder. We'll show you how to ditch the "security-first, user-maybe-later" approach and focus on what users really need.
Speaker(s)
Lori Murray
Breaking the Chain - API Security Lessons from Ruby Core Implementation
Session 6B
When implementing CSV::TSV in Ruby core (ruby/csv#319), I uncovered critical security patterns that challenge conventional API security thinking. This exclusive session reveals previously unpublished security insights from core library development that directly impact enterprise API security.
Speaker(s)
Jasveen Sandral
Siori SataUsing High-Assurance and Dependency Modelling Methods and Techniques to Develop and Exploit Bespoke Attack Vectors
Session 6S
This presentation examines the dual-use nature of high-assurance methods in cybersecurity, exploring how structured methods and probabilistic dependency modelling can be employed not only to secure systems but also to craft bespoke attack vectors. We analyse historical case studies to illustrate how such techniques have been used to uncover and exploit vulnerabilities in critical national infrastructure.
Speaker(s)
Jaco Jacobs
Andy Clark -
Tuesday 30th
16:45–17:45MBTI Meets Cybesecurity: Leveraging Personality for Stronger Defence
Session 7A
We are all different based on the environment that we grew up in, the time we grew up (generational influence), and our individual psychological preferences. One tool that has been time-tested, and debated, is the Myers-Briggs Personality Typing tool (MBTI). For years the cybersecurity community has wondered what the implications of a person’s MBTI is on how they behave with respect to cybersecurity. At last, in 2023 Myers-Briggs themselves published a report on the linkages between different MBTI types (16) and the impact on cybersecurity!
Speaker(s)
Todd Fitzgerald
Firmware Forensics: Analyzing Malware Embedded in Device Firmware
Session 7B
Firmware, essential to hardware functionality, increasingly becomes a prime target for cyber threat actors because of its foundational control over devices. This presentation delves into a detailed analysis of malware embedded within purported firmware updates for Sabrent devices, a case study revealing widespread exploitation.
Speaker(s)
Diyar Saadi
The Hidden Backbone
Session 7S
Every business depends on the Domain Name System (DNS), yet it is often dismissed as merely a connectivity tool. In reality, DNS is a critical control point—shaping security, resilience, and compliance while underpinning the systemic availability of the internet.
Speaker(s)
Simon Cross
-
Tuesday 30th
17:45–18:00Refreshments
-
Tuesday 30th
18:00–19:00Post-Quantum Readiness for Sceptics: From Theory to Action
Plenary 8P
Quantum computing is no longer a far-off concept—it’s here, and it’s transforming the landscape of enterprise security. Yet, too often, it’s dismissed as a curiosity rather than the critical risk it has become. This session gets straight to the point: preparing for a post-quantum world demands action now. This session is for the people who disagree with that statement and/or feel they already have way too much to do to possibly take on the extra responsibility of addressing the future impacts of quantum computing on current cryptographic methods.
Speaker(s)
Anne Leslie
-
Tuesday 30th
19:15-1945Drinks Reception
-
Tuesday 30th
19:45 onwardsCOSAC 2025 Gala Dinner
Wednesday 1st October
-
Wednesday 1st
09:00-09:30Registration & Coffee
-
Wednesday 1st
09:30-10:30Around The World In 2025
Session 9A
Politics always influences our cybersecurity agenda, geopolitics drives our risk agenda, and compliance requirements with new laws and regulations drive the implementation of various mandatory controls. Currently, the world is changing faster than ever before. Geopolitical tensions, the fight against cybercrime and espionage, state protectionism, and the continued focus on data privacy, on the other hand, create a challenging cocktail of laws and regulations to abide by.
Speaker(s)
Karel Koster
The Implications of Majorana Chip on Cybersecurity
Session 9B
The advent of Microsoft's Majorana 1 chip marks a significant leap in quantum computing, with profound implications for cybersecurity.
Speaker(s)
Lesley Kipling
Hostile Architecture – When Protection Becomes the Problem
Session 9S
In urban design, hostile architecture restricts behavior—think anti-homeless spikes or armrests that prevent sleeping on benches. In security, we see similar patterns: overly restrictive authentication, excessive access policies, intrusive monitoring, and a poor UX that obstruct legitimate users as much as attackers.
Speaker(s)
James Chinn
-
Wednesday 1st
10:30–11:30How To Stay Compliant With And Take Benefits From The EU CRA
Session 10A
The EU Cyber Resilience Act (CRA) aims to safeguard European consumers and at first glance it targets only the EU market. But in fact the entire OSS ecosystem falls under its scope as CRA creates mandatory cybersecurity requirements for vendors, distributors, integrators, even enterprise consumers and, in fact, the entire open-source ecosystem by introducing terms like “Manufacturer”, “Steward”, “Individual developer” among others. So, how to ensure you stay compliant?
Speaker(s)
Roman Zhukov
Understanding the Risks - Protecting Your Identity, Privacy, and Devices
Session 10B
In today’s hyper-connected digital landscape, safeguarding personal identity, privacy, and devices is no longer optional—it’s critical. At COSAC 2025, this session will delve into why enterprises must prioritize consumer cybersecurity as a core component of their strategy. With rising incidents of enterprise data breaches directly impacting consumers, the line between corporate and individual security has blurred. Cybercriminals are exploiting advanced AI tools to execute sophisticated attacks, including identity theft, spreading misinformation, scamming, and victimizing individuals on an unprecedented scale.
Speaker(s)
Naveen Shivaramu Yeshodara
Benny CheeWhy Security Architectures Fail: “It Is Not the Architecture’s Fault”
Session 10S
Suppose you had a well-defined and documented security architecture based on a comprehensive set of business risk requirements, including an extensive array of solutions and controls to manage the risk and providing traceability across all areas top to bottom. Why then, was it doomed to fail? Based on 30 years of security architecture experience, this session will outline the factors that can and have prevented security architectures from being implemented successfully.
Speaker(s)
Glen Bruce
-
Wednesday 1st
11:30-11:45Morning Coffee
-
Wednesday 1st
11:45–12:45Outgrowing Chaos: Transforming Security In Fast-Paced Environments
Session 11A
Today, Agile and DevOps practices enable many organisations to develop and deploy software at an ever-increasing pace. At the same time, thanks to cloud computing, systems are becoming increasingly abstract and complex, making them difficult to secure.
Speaker(s)
Chris Blunt
Inside A Cyber Attack; Real-World Insights and Response Strategies
Session 11B
In today's digital landscape, no organization is immune to cyber threats. Cyber criminals and state actors are constantly working to breach our defences for their own gain. When your organization becomes the target, how do you respond? How do your colleagues perform under pressure?
Speaker(s)
Martin De Vries
Writing Security Requirements That Don’t Suck: A Practical Approach
Session 11S
Introduction to the Problem Statement
In many organisations, poorly defined security requirements create significant challenges throughout a project's lifecycle. Weak or vague requirements not only expose the business to security risks but also place undue strain on security architects tasked with designing effective solutions. When security is treated as an afterthought, projects face increased costs, compliance issues, and operational inefficiencies. This session will explore the consequences of inadequate security requirements and the broader impact on businesses and security professionals.Speaker(s)
Dan Taylor
-
Wednesday 1st
12:45-13:30Lunch
-
Wednesday 1st
13:30– 14:30When Privacy By Design Is Not Enough: Building Safety By Design In Gen AI
Session 12A
The EU GDPR mandated the principle of Privacy by Design (and Default). While the concept was not new, its regulatory obligation was. However, generative AI (GenAI) systems like ChatGPT, and DALL·E, introduce risks beyond those addressed by Privacy By Design such as misinformation and disinformation, deepfakes, harmful biases, and even intellectual property infringements.
Speaker(s)
Valerie Lyons
Threat-Informed Cyber Resilience: How the Energy Sector Chooses Controls Based On What Attackers Will Do
session 12B
Security professionals have no shortage of cyber security controls and solutions from which to choose from. So, what controls do you choose and where do you spend your money? Even the largest budget will run out at some point and your ability to manage all the controls will constrain how much you can do in practice.
Speaker(s)
Paul Dorey
Connecting the Macro to the Micro
Session 12S
Organisations have often driven the cyber programmes and remediation activities through cyber maturity assessments or from risk reporting initiatives.
Speaker(s)
Jonathan Cassam
-
Wednesday 1st
14:30–15:30Grab and Go – Compelled Production of Large Data Sets
Session 13A
Government investigations increasingly rely on obtaining large sets of personal data held by third-party providers, including email, chat logs, social media, financial records, and cloud-based documents. However, traditional methods of compulsory process-subpoenas, search warrants, and court orders-are poorly suited to handling the vast scope and sensitivity of these modern data sets.
Speaker(s)
Mark Rasch
Maritime Cyber Deception: Tracking Digital Footprints on the High Seas
Session 13B
The maritime domain is both a lifeline of global trade and a theater for covert operations, from vessels disappearing off tracking systems to ships falsifying registries to evade sanctions. Open Source Intelligence (OSINT) plays a pivotal role in decoding these activities, offering insights into illicit operations hidden in plain sight.
Speaker(s)
Shubham Kumar
Sagar TiwariSee No Evil?: Visualising Security Risk
Session 13S
In an influential early book on security, [‘Secrets & Lies’: (2000)], the technologist, Bruce Schneier reflects on why, when humans generally have an intuitive, highly developed sense of risk in everyday life, (crossing a road, walking down a dark alley, etc), do we find it so difficult to analyse risk? He identified several factors with significant influence on risk perception: inability to evaluate rare
events, confirmation bias in trust of IT, and the degree to which the subject feels a sense of ‘control’, is able to ‘personify’ a threat or is presented with impacts that are either novel or spectacular.Speaker(s)
Steven Bradley
Mates Leoŝ -
Wednesday 1st
15:30-15:45Afternoon Tea
-
Wednesday 1st
15:45–16:45Cybersecurity’s Billion-Dollar Question: The Hunt for High-Impact Innovations
Session 14A
This paper was triggered by a request from a client of mine. The brief sounded simple: “we would like an alternative version of our cyber security investment strategy that taps into emerging cyber technologies”.
Speaker(s)
Anton Tkachov
George BullAll Your Risk Scores Belong To Us
Session 14B
As technology platforms become more pervasive and we move towards continual compliance every vendor is developing a risk score or dashboard to visualise their risk. From Qualys to Microsoft to Snyk everyone wants you to submit your data to them and to be the central risk score for your company.
Speaker(s)
Siân John
Architecting Cyber Security Self-Assurance
Session 14S
Cyber security risk is one of the top non-financial risks for organisations. It can be present in almost any part of digital operations. The nature of the risk is both complex and broad due to the complexity of the attacks and evolving capabilities of the attackers. More often than not, the articulation of cyber risk is characterised by a high degree of subjectivity due to the innate difficulty to create a 360o view of the security posture in a timely manner, supported by actuarial data, to answer even to the most basic business requests.
Speaker(s)
Dimitrios Delivasilis
-
Wednesday 1st
16:45–17:00Refreshments
-
Wednesday 1st
17:00–18:00Anthony Sale Memorial Session - How to avoid maritime accidents
Plenary 15P
How did Alan meet Norbert?
Did Elsie do as she was told?
What have Samuel, Edward and Kurt got to do with it?
Where does Tony fit in?
And how is George finding his diet?Speaker(s)
Sir Dermot Turing
-
Wednesday 1st
18:00–19:00The COSAC Rump Session
Plenary 16P
The COSAC “rump” has for many years been a hugely popular plenary session at COSAC. The Rump is an informal rapid-fire session in which participants give very short presentations on recent results, work in progress, and any other topic of interest to the COSAC community. Presentations may be purely technical, entirely management oriented in nature, or of any combination of approaches or perspectives.
Speaker(s)
David Lynas & Various
-
Wednesday 1st
19:15–19:45Drinks Reception
-
Wednesday 1st
19:45 onwardsDinner & COSAC Prize Night
Thursday 2nd October
-
Thursday 2nd
09:00-09:30Registration & Coffee
-
Thursday 2nd
09:30-1230COSAC Workshops are half-day, 09:30 - 12:30 & 13:30 - 16:30
-
Thursday 2nd
09:30-1230Beyond Boundaries: Redefining Digital Identity for a Seamless and Secure Future
Workshop W1
In an era where digital transformation drives the global economy, the concept of digital identity has emerged as a cornerstone of secure, consumer-friendly interactions. This Masterclass at COSAC APAC 2025 will delve into the intricate process of designing a robust digital identity strategy and its implementation through technology.
Speaker(s)
MZ Omarjee
The 3rd COSAC Lab: When Biomimicry Meets Cybersecurity
Workshop W2
This year, I am pleased to introduce an innovative new initiative for the 3rd edition of the COSAC LAB.
For the year 2024, the lab will use a new approach based on the lessons learned from the first edition performed in 2023.Speaker(s)
Ghariba Bourhidane
META Matters and Sadly Maybe Most
Workshop W3
Security professionals pride themselves on being highly analytical, skilled in multiple domains, and steadfast in pushing through agendas that other parts of the business may not be enthusiastic about. We know what’s right from wrong.
Speaker(s)
Karel Koster
-
Thursday 2nd
10:50-11:10Morning Coffee
-
Thursday 2nd
12:30-13:30Lunch
-
Thursday 2nd
13:30-16:30COSAC Risk Workshop: Leveraging AI to Enhance Enterprise Risk Management
Workshop W4
The purpose of the risk workshop is to explore the hard parts of understanding risk. We have previously conducted workshops in Ireland and Australia on how to understand and model risk, how to explain and display risk to stakeholders, and how to think like our adversaries to identify threats that we would otherwise miss. Last year the discussion focused on the challenge of how to aggregate risk in a complex environment to help determine which mission objectives are most at risk, and also discussed how defining and understanding risk ownership is a key factor in improving our understanding and communications regarding organizational risk.
Speaker(s)
Jason Kobes
William SchultzDesigning, Building, and Improving a Secure Cloud Deployment - A Practical Approach
Workshop W5
A CIO, CISO, CTO, and a Chief Cybersecurity Advisor walk into a bar…the discussion that naturally ensues is how to design a cloud security architecture that meets the business requirements while addressing the spoken and unspoken cybersecurity needs. What does a business leader, architect, or advisor need to know about the business and its future direction?
Speaker(s)
Kathleen Mullin
Lesley KiplingMoving Towards a Functional Security Services Catalogue
Workshop W6
Efforts to establish a standardised Security Services Catalogue have faced significant challenges, as demonstrated by the TSI R100 Security Services Catalogue initiative, which has struggled to progress towards a practical, database-driven implementation. This workshop presents an alternative approach, leveraging the SABSA based Security Services Relationship Model (SSRM) as an Enterprise Reference Data (ERD) framework to structure and standardise security capabilities.
Speaker(s)
Robert Campbell
-
Thursday 2nd
14:50-15:10Afternoon Tea
-
Thursday 2nd
16:30-16:45Refreshments
-
Thursday 2nd
16:45-17:00Conference Close - COSAC Chairman's Closing Remarks
COSAC
Patrons
A completely new COSAC experience pushing the boundaries of cybersecurity further than ever before. Smart people, inspiring guest speakers and a ton of passion. Become a COSAC Patron and gain access like no other.
Become a patronContact
Get in contact with us by email, phone or just stay social and connect with us on LinkedIn & Twitter