Skip to content

Schedule

Sunday 27th September

  • Sunday 27th
    15:00-16:00

    Delegate Registration

  • Sunday 27th
    19:30-20:00

    Delegate Registration & Drinks Reception - sponsored by Killashee Hotel

  • Sunday 27th
    20:00 onwards

    COSAC 2026 Welcome Dinner

Monday 28th September

  • Monday 28th
    09:00-9:30

    Registration & Coffee

  • Monday 28th
    09:30-17:30

    COSAC Masterclasses are full-day, 09:30 - 17:30

  • Monday 28th
    09:30-17:30

    The 25th COSAC International Roundtable Security Forum

    Masterclass M1

    2026 marks the 25th edition of the Forum, a full-throated, bare-knuckles, no-holds-barred immersion into the COSAC Way. You join a group of experienced practitioners of our somewhat dark art. They’ve seen it all, done it all, won some, lost some and had some rained out. They’ve persisted in giving their employers the best information security for resources expended and political will. Like you, they know what works and what doesn’t and have a low tolerance for BS.

    Speaker(s)

    The 10th COSAC 'Design-Off'

    Masterclass M2

    This design-off will present a new and engaging set of challenges. In the spirit of hack-a-thons, this competition was born out of a desire to provide a venue for security architects to apply their skills in a safe environment. This is a unique competition format that uses real clients, scenarios and deliverables to see which team will reign supreme! Whether you are a seasoned enterprise architect or security architect, or just looking to try something different to build and enhance your skills, this session will provide a unique opportunity to prove and hone your architecture chops.

    Speaker(s)

    Leave Your Ego At The Door - Negotiation Skills for Security Professionals

    Masterclass M3

    Security professionals are trained to be right. We’re analytical, precise, and trained to avoid risk. But in high-pressure situations — budget fights, incident response, risk trade-offs — the person who “wins the argument” often loses the outcome. The real deciding factor is usually emotion: fear, status, certainty, and trust.

    Speaker(s)

    Making Digital Empathy Real: Turning People Centric Security a Reality

    Masterclass M4

    As technology becomes ever more embedded in work and daily life, security teams must rethink how they design, communicate and implement controls. This master class introduces digital empathy as a practical security capability—one that recognises the diversity of user behaviour, context and culture, and uses that understanding to create more effective, human centred security.

    Speaker(s)

  • Monday 28th
    11:05-11:25

    Morning Coffee

  • Monday 28th
    13:00-14:00

    Lunch

  • Monday 28th
    15:35-15:55

    Afternoon Tea

  • Monday 28th
    18:30-19:00

    Drinks Reception

  • Monday 28th
    19:00 onwards

    Dinner

Tuesday 29th September

  • Tuesday 29th
    09:00-09:30

    Registration & Coffee

  • Tuesday 29th
    09:30-10:30

    The CISO Operating System: Fixing the 7 Failures in Security Leadership

    Session 1A

    Most struggling security programs don’t fail because of technology — they fail because of gaps in leadership, structure, culture, and execution.

    Drawing on various insights from decades of CISO experience and lessons from over 200 security leaders, this session introduces a practical model for evaluating the effectiveness of a security organization: the CISO Operating System, based on seven interdependent elements of leadership and organizational performance.

    Speaker(s)

    Preventing Insider Risk at the Human Layer: How Adversaries Target Your People Before They Target Your Systems

    Session 1B

    We pour huge effort into technical controls and monitoring, yet many insider risk cases begin long before any alert fires. Adversaries often start by targeting people in relaxed, social settings: that must attend conference, a networking dinner, or a friendly chat with someone who seems genuinely interested. Before you know it, a colleague enjoys a great evening, lets their guard down… and unknowingly gives an adversary exactly the foothold they were looking for.

    Speaker(s)

    AI – Super Hero or Super Villain?

    Session 1C

    Security AI is often framed through a glass‑half‑empty lens, yet for security architects, it is becoming an indispensable tool. This session for practitioners who are curious, or under pressure to “use AI”, while remaining accountable for rigour, traceability and regulatory compliance. It shows, with examples, how to weave AI into delivery without lowering standards.

    Speaker(s)

    Securing Cyber-Physical Systems with the SABSA framework

    Session 1S

    Current cyber security practice typically focuses on classic IT ecosystem comprising computing environments running enterprise and business applications. Breaches result in personal data loss, financial loss, and IP theft. We also depend upon cyber-physical systems (CPS) to service many of our personal and business needs. These are complex systems-of-systems comprising digital elements (for control, sensing and safe operation) and physical elements (for interaction with physical entities and providing physical safety constraints).

    Speaker(s)

  • Tuesday 29th
    10:30-11:30

    Leading on Your Worst Day

    Session 2A

    You remember exactly where you were that morning. The moment you saw the alert on the screen. The confusion. The realization that this was not an accident. Your world changed forever.

    Now imagine finding yourself suddenly in charge, without a playbook and without the ability to reach higher authority. Fragmented information that is often wrong. More rumors than facts. Uncontrolled emotions. And 150 people are looking to you to make a decision.

    Speaker(s)

    (Ab)using Cognitive Biases: A Hacker's Guide to Defensive Social Engineering

    Session 2B

    Attendees will learn to apply the B=MAP framework and defensive social engineering to ethically exploit cognitive biases, transforming passive compliance into reflexive security instincts capable of defeating AI-driven deepfake attacks.

    Speaker(s)

    Seeing the Unseen: A SABSA Approach for Discovering Hidden AI in Third-Party Vendors

    Session 2C

    Vendors increasingly embed AI deep in products and subcontracted services, obscuring model provenance, data lineage, and third party dependencies. This creates a business critical blind spot for security leaders: you cannot govern what you cannot see. Consequences include hidden model risk, opaque data flows, unmodeled threat surfaces, and weak auditability—directly impacting regulatory assurance, incident response, and contract risk.

    Speaker(s)

    Architecting for Failure: Designing Cyber Recovery from Failure Modes

    Session 2S

    Defence in depth is reassuring. It is also architecturally incomplete.

    Over the past year, ransomware, identity compromise and systemic supply chain attacks have continued to escalate, with major organisations in the US and UK suffering significant disruption and, in some cases, struggling to recover in a timely or controlled manner. These incidents have demonstrated a hard truth: layered prevention does not prevent failure it merely delays it.

    Speaker(s)

  • Tuesday 29th
    11:30-11:45

    Morning Coffee

  • Tuesday 29th
    11:45-12:45

    Named a Top CISO by an Algorithm: An OSINT Investigation into the AI Ego-Baiting Machine

    Session 3A

    In February of 2026, my name suddenly appeared in a LinkedIn post about "5 CISOs to watch in Norway’s Computer & Network Security Industry" – from a seemingly American online newspaper writing about security by and for CISOs. It’s always nice to be recognized for doing a good job, but there was also something suspicious about the whole thing. Why had I never heard of this site before? Or heard anything from the named journalist before they published an article mentioning me?

    Speaker(s)

    From No SIEM to Intelligent SOC: Building Detection Capability in a UK Public Sector Estate

    Session 3B

    Many organisations assume that implementing a SIEM will inherently improve their security posture. Within the UK public sector, this assumption is commonly reinforced by increasing pressure to comply with guidance from the National Cyber Security Centre and demonstrate assurance under frameworks such as GovAssure. However, within environments with limited visibility, fragmented controls, and constrained resources, introducing a SIEM can just as easily amplify noise as it can improve detection.

    Speaker(s)

    Cybersecurity Architecture as Code: Using AI to Deliver Better Architecture Artifacts, Faster and Better Quality

    Seesion 3C

    At an all-hands town hall, onsemi's CEO challenged every employee — not just the security team — to stop thinking about AI as a way to automate existing processes and start thinking like a startup: disrupt the process entirely. Rob Rost took that challenge into his cybersecurity architecture program.

    Speaker(s)

    Designing Security Around the Most Fallible Asset: Reframing Enterprise Architecture Through a Human-Centric SABSA Lens

    Session 3S

    Cybersecurity architecture has traditionally been designed around systems, applications, networks, and data. Humans are typically treated as risks to be managed, constrained, or monitored.
    What if the primary asset in our design were not the system… but the human, and the task the person is trying to accomplish.

    Speaker(s)

  • Tuesday 29th
    12:45-13:45

    Lunch

  • Tuesday 29th
    13:45-14:45

    Rethinking Supply Chain Cyber Security: From Audit Burden to Threat-Led Defence

    Seesion 4A

    Organisations are increasingly overwhelmed by audit-based approaches to supply chain cyber security. As regulatory expectations rise and procurement teams demand ever-growing evidence of compliance, suppliers face a proliferation of questionnaires, attestations, and point-in-time checks. Yet despite this escalating administrative load, overall risk is not materially reduced. Attackers do not respect audit cycles, and compliance artefacts rarely reflect the dynamic threat environment or the real security posture of complex supply chains.

    Speaker(s)

    Demystifying encryption in use: homomorphic encryption & multi-party computation

    Session 4B

    Encryption of data at rest and in transit are well known cryptographic use cases. However, their sibling use case of encryption of data in use is less known and less understood. As an example, the European DORA regulation mentions using encryption of data in use “where necessary”, but that leaves to wonder: when is it necessary to encrypt data in use? And if it is necessary, how can we do so?

    Speaker(s)

    Education’s Artificial Intelligence Dilemma

    Session 4C

    In the rush to adopt generative AI, the education sector has found itself on a unique frontline. As CISO for the Department for Education, I’ve observed that while every industry faces AI-driven threats, the stakes in academia are fundamentally different. Our sector is built on a currency of trust. Trust between student and teacher, researcher and peer, and institution and employer.

    Speaker(s)

    The Architecture for Abandonment: Reducing Tech Debt by Killing Zombies

    Session 4S

    As Security Architects, we are fluent in Secure by Design, yet often neglect Secure by Decommissioning. For many organisations, the most significant architectural risk is not the latest technology or emerging threats, but the silent persistence of legacy systems that nobody owns, understands, or has the courage to switch off. In 2026, technical debt has evolved from an engineering nuisance into a core security architecture issue.

    Speaker(s)

  • Tuesday 29th
    14:45-15:00

    Afternoon Tea

  • Tuesday 29th
    15:00-16:00

    Minimum Viable Company: How Organisations Survive After Trust Fails

    Session 5A

    Most cyber recovery strategies quietly assume that trust still exists — in identity systems, administrators, backups, telemetry, or time. In real incidents, it rarely does. When trust collapses, the question is no longer how quickly can we recover everything, but what can we safely rely on at all.

    Speaker(s)

    Dropping the C-BOM: A Practical Playbook for Defusing the Post-Quantum Threat

    Session 5B

    This session presents a practical, tool-ready approach for identifying organisational exposure to post-quantum cryptographic (PQC) risk through enterprise architecture and cryptographic asset discovery.
    The session shows how a canonical EA blueprint, utilising a cryptographic taxonomy specified in CycloneDX Cryptographic Bill of Materials (CBOM) format, can be used to create model of cryptographic material in the context an enterprise-wide IT landscape.

    Speaker(s)

    No Humans in the Kill Chain: Architecting Response Capabilities for AI agents and AI-on-AI Attacks

    Session 5C

    Let's be honest, everything we've built in incident response assumes there's a human at the other end. Our logs, our kill chains, our IoCs, our forensic timelines, all of it expects human-speed actions and human decision-making. That falls apart with autonomous AI systems.

    Speaker(s)

    The Illusion of Control: Why Security Architectures Look Strong on Paper and Collapse in Reality

    Session 5S

    Security architectures are often dense with controls, policies, and assurance artefacts. On paper they appear comprehensive, well governed, and rigorously designed. Yet some of the most heavily controlled environments still experience catastrophic security failures. Why?

    Speaker(s)

  • Tuesday 29th
    16:00-17:00

    From Devils to Angels: Back to the Future of Cyber Security

    Session 6A

    Much of the focus of internal cyber security is on malicious behaviour. But this is not the only reason incidents happen and risks overlooking other behaviours that are just as dangerous, if not worse.
    Centuries ago, do something wrong and you’re either a knave or a fool. While this sentiment persists, there are better ways of carving up the population. Consider the “5% devils, 5% angels and 80% in-between” model. Within the 80% we have the malicious, the reckless, the negligent and the accidental. Of these it is the accidental who, far from being the weakest link, are the least understood link.

    Speaker(s)

    Cybercrime as a System: The Modern Attack Surface Under Pressure

    Session 6B

    Cybercrime is no longer best understood as a series of isolated attacks. It now operates more like an industry: distributed, specialised and quietly efficient. Behind a successful breach sits a web of malicious and semi-malicious activity including access brokers, phishing infrastructure, traffic distribution, malware services, identity abuse, compromised supply chains and monetisation networks. Each part may appear limited on its own; together they create a scalable operating model for intrusion.

    Speaker(s)

    The Story of the AVR Roaming Around the Factory Floor

    Session 6C

    A consumer buys a cheap robot vacuum on TEMU, plugs it in, and sends it on its way. A cautious security professional isolates it on the home network and blocks internet access. The result? The robot slowly stops functioning—because it can’t phone home to its “mothership.”

    Speaker(s)

    E5 Isn’t a Strategy: Designing Security Architecture Before Licensing in the UK Public Sector

    Session 6S

    The UK public sector has invested heavily in modern security suites aligned with National Cyber Security Centre guidance and assurance frameworks, such as GovAssure and Cyber Essentials. However, many organisations still find it difficult to demonstrate real improvements in resilience, detection, or control effectiveness. In some cases, increased capability introduces complexity without reducing risk.

    Speaker(s)

  • Tuesday 29th
    17:00–17:15

    Refreshments

  • Tuesday 29th
    17:15–18:15

    Compliant and Compromised

    Plenary 7P

    Your Smart TV is watching you back. Your internet-connected fridge is mapping your home network. Your video doorbell is feeding footage into a law enforcement surveillance platform you never signed up for. These are not theoretical attack scenarios — they are documented, real-world behaviours of devices sitting in millions of homes right now, including the homes of your employees, your executives, and, most likely, everyone in this room.

    Speaker(s)

  • Tuesday 29th
    18:30-19:00

    Drinks Reception

  • Tuesday 29th
    19:00 onwards

    Dinner & Irish Music Night

Wednesday 30th September

  • Wednesday 30th
    08:45-09:00

    Registration & Coffee

  • Wednesday 30th
    09:00-10:00

    Outcome Driven Metrics – The Holy Grail of Metrics

    Session 8A

    Modern security metrics are overrun by control and activity counts that fail to tell senior stakeholders whether loss, resilience and trust are actually improving. This session treats outcome‑driven metrics as the governing layer and shows how to wire compliance, activity, maturity and risk‑based measures into them as evidence and levers. Attendees leave with a pattern for defining business‑service outcomes, constructing outcome trees and mapping existing telemetry into a minimal, board‑ready set of measures tied directly to loss and resilience, plus a practical test for whether any proposed metric is genuinely informative about risk rather than a decorative KPI.

    Speaker(s)

    Information As A Domain of War – IWAR

    Session 8B

    Information has emerged as a critical warfare domain alongside traditional military environments. COL (R) Lawrence D. Dietz's lecture explores how modern military operations leverage the information environment across three interconnected dimensions: physical infrastructure, informational flow, and cognitive perception.

    Speaker(s)

    The Cognitive Attack Surface - Architecting Defence in Depth for Agentic AI

    Session 8C

    This session is designed for Cybersecurity professionals to identify the architectural choke points in multi-agent environments before the current surge in illicit AI activity fully matures.

    We will be moving beyond the "AI hype" to deconstruct how adversaries are operationalizing autonomous agents to execute entire attack chains with minimal human oversight.

    Speaker(s)

    When SABSA Met FAIR: A Framework Dynamic Duo

    Session 8S

    This session will show how SABSA can incorporate FAIR (Factor Analysis of Information Risk) to increase risk rigor and security decision-making.

    Speaker(s)

  • Wednesday 30th
    10:00–11:00

    A Security Roadmap is Not a Strategy: Crafting Your North Star

    Session 9A

    Do you have a security technology strategy?
    Are you sure it’s a strategy, or is it a roadmap for technology purchases and updates?

    Speaker(s)

    The Death of Truth: Cyber War and the Fifth Domain of Conflict

    Session 9B

    "Words had to change their ordinary meaning and to take that which was now given them."
    - Thucydides

    In modern conflict, the most important battlefield may no longer be territory, infrastructure, or even networks; it is truth itself. This presentation continues a five-year COSAC series examining cyber strategy, information warfare, and the manipulation of truth. Cyberspace has expanded the battlefield beyond geography into the information ecosystems that shape public perception and political will.

    Speaker(s)

    You Can't Patch a Mental Model: How Agentic Systems Expose our Hidden Security Assumptions

    Session 9C

    Agentic security is not hard because it is new. It is hard because it violates the assumptions our security models are built on.

    We build controls. Agents adapt around them. It’s not that we built the wrong controls; it’s that we built them on the wrong mental models. We keep trying to “secure agents”, but what’s required is to govern agency. These are fundamentally different problems.

    Speaker(s)

    Using SABSA NIST CSF Business Attributes

    Session 9S

    The SABSA Institute (TSI) sponsored SABSA Enhanced NIST Cybersecurity Framework (SENC) workgroup project is developing various tools, techniques and guidance to help your organization put the NIST CSF to work the SABSA way. The SENC project has defined a collection of example Attributes and Attribute Profiles, based on the NIST CSF Functions, Categories and Subcategories and can be leveraged when integrating the NIST CSF into a SABSA Security Architecture. This first SENC project deliverable includes the requirements, method, process and examples for leveraging the NIST CSF based Business Attributes and Attribute Profiles to integrate the CSF into a SABSA security architecture that is tailored to the specific needs, and aligned to the risk appetite, of the business. The business attributes profiling process is one of the more important techniques to integrate the NIST CSF into a SABSA security architecture.

    Speaker(s)

  • Wednesday 30th
    11:00-11:15

    Morning Coffee

  • Wednesday 30th
    11:15–12:15

    Human-Centric Security: What Anthropology, Archaeology, and Behavioural Science Reveal About Cyber Resilience

    Session 10A

    Cybersecurity has long leaned on technical frameworks and compliance-driven methods, but security is, fundamentally, about people. This talk draws on interdisciplinary insights from anthropology, archaeology, criminology and behavioural science to rethink how organisations understand risk, design controls and build resilient security cultures.

    Speaker(s)

    Digital Sovereignty and Sovereign Cloud Platforms for National Critical Workloads

    Session 10B

    Governments and critical infrastructure operators face rising pressure to maintain control over sensitive digital systems. Healthcare records, defence intelligence, justice data, and national infrastructure telemetry all hold strategic value. Many public sector organizations rely on global cloud providers operating under foreign legal regimes. This creates exposure to extraterritorial legislation, opaque operational control, and reduced national oversight.

    Speaker(s)

    Fractional Identities for the Agentic AI Future

    Session 10C

    The emergence of autonomous AI agents acting on behalf of users challenges the current identity paradigm. While existing identity infrastructures are designed to authenticate who performs an action, they do not natively support verifiable delegation—making it difficult to determine who authorized an automated action and under what conditions. This limitation becomes critical in regulated digital ecosystems where accountability, non-repudiation, and auditability are required.

    Speaker(s)

    Defending the Final: Applying SABSA Business Attributes to Quantify Cyber Risk for a Live FIFA World Cup Broadcast

    Session 10S

    A billion viewers. Ninety minutes. If the stream fails during the penalty shootout, no incident response plan recovers the revenue. The match is over. The value is gone.

    Speaker(s)

  • Wednesday 30th
    12:15-13:00

    Lunch

  • Wednesday 30th
    13:00–14:00

    Where the CISO Sits in 2026: Reporting Lines, Power Structures, and Risk Ownership

    Session 11A

    The question of where the CISO reports is no longer an organizational preference — it is a statement about who owns cyber risk, who communicates what to whom, and who is accountable when something goes wrong.

    Speaker(s)

    So You’re Being Told You Need a Sovereign Cloud…

    session 11B

    Sovereign cloud is appearing everywhere in board directives and government strategies — usually framed as something you can acquire. But sovereignty isn’t a product. It’s a disposition – a way of shaping architectural and operational conditions so that, over time, an organisation has more agency and resilience, and fewer opaque dependencies and surprises. Treating it as a purchase order obscures the real work.

    Speaker(s)

    From Whiteboard to Workflow: AI-Assisted Dependency Modelling

    Session 11C

    Dependency modelling offers a rigorous way to understand how outcomes depend on interconnected capabilities, conditions, and uncontrollable factors. However, building meaningful models often requires significant time, expertise, and analytical effort. This presentation explores how AI-assisted techniques can help practitioners accelerate the modelling process while preserving methodological integrity.

    Speaker(s)

    Zero to SABSA: Scar Tissue from Establishing Security Architecture into Maritime Shipbuilding

    Session 11S

    A practitioner’s account from the field, when a strategically significant Defence programme moves quickly, stakeholders focus on delivery, and engineers are ready to ‘cut steel’. This session outlines how architectural thinking was integrated into a live project in which security was initially treated as a compliance afterthought rather than a design input. The audience will learn how business attributes, risk drivers, mission context, stakeholder tension, and architectural traceability were employed to shift discussions from “what controls do we need?” to “what mission outcomes must be protected, and why?”

    Speaker(s)

  • Wednesday 30th
    14:00-14:15

    Afternoon Tea

  • Wednesday 30th
    14:15-15:15

    Protecting Our Children: Mobilizing the Security Community Against Online Sexual Predators

    Session 12A

    The people in this room understand the internet's attack surface better than almost anyone alive. Most of us are also parents, aunts, uncles, coaches, and neighbors. Yet when it comes to child sexual abuse and exploitation online, the security community has largely stayed in its lane — treating this as a law enforcement problem, not ours.

    Speaker(s)

    Measuring Digital Safety using Dependency Modelling

    Session 12B

    Digital systems are increasingly complex, interconnected and continuously evolving making it difficult to assess their safety at any given point in time. Traditional assessments of risk and safety are often infrequent, static, and focused on individual components; limiting their ability to reflect the dynamic nature of modern complex digital systems of systems.

    Speaker(s)

    Using SABSA to Find Amelia Earhart

    Session 12C

    On a warm tropical morning in 1937, Amelia Earhart and Fred Noonan flew into history. They took off in a Lockheed Electra from New Guinea at 10am on the second last leg of their groundbreaking around the world flight. 18 hours later, the Electra, Amelia and Fred had vanished without a trace.

    Speaker(s)

    Robert Laurie

    404 Enterprise Architecture Not Found: How to Build a Defensible ESA Without a Functional EA

    Session 12S

    Security architects are often advised to "align with Enterprise Architecture (EA)," but this presumes a mature EA capability is in place. In reality, many organisations operate without a reliable enterprise model, a clear target state, or even a unified understanding of how the business actually functions. Consequently, architecture is frequently reduced to ambiguous objectives, inherited standards, obsolete documentation, and tactical decisions masquerading as strategy. In such environments, the work more closely resembles corporate archaeology than genuine architecture.

    Speaker(s)

  • Wednesday 30th
    15:15–16:15

    The Great Conflation: Privacy Ethics vs Privacy Law

    Session 13A

    As organisations increasingly turn to ethical frameworks to demonstrate responsible technology governance, an important distinction is often blurred: the difference between ethical aspiration and legal obligation. This session addresses this growing challenge by contrasting the perspectives of a US cybersecurity lawyer and Of Counsel with those of a European data protection expert. In doing so, this session examines how privacy is understood through two fundamentally different lenses – Law and Ethics.

    Speaker(s)

    Your Security Stack Isn’t Slow. Your Decision System Is

    Session 13B

    Most security leaders can tell you how many tools they own. Very few can tell you how fast they can change them when a new threat appears. That’s now the real problem.
    Attackers change paths in hours. Vendors ship new control points in days. Most enterprise security teams still need weeks of meetings, design reviews, change boards and tool-by-tool coordination before risk is reduced. The gap is no longer just technical. It’s operational. It’s architectural. It’s about decision speed.

    Speaker(s)

    Securing Trust in a Fragmented World: AI, Privacy and Democratic Resilience

    Session 13C

    Artificial Intelligence is reshaping society at an unprecedented pace. From automated content moderation to AI-driven social media feeds, recommendation engines, and generative tools, AI increasingly influences public opinion, information consumption, and civic engagement. While these technologies promise innovation and efficiency, they also introduce complex security, privacy, and digital trust challenges that vary across regions, demographics, and regulatory frameworks.

    Speaker(s)

    From Risk Acceptance to Security-by-Design: Applying the SABSA Guardrail Model to Transform Legacy Enterprise Architectures

    Session 13S

    Most enterprise security architectures are not intentionally designed, they evolve over time as systems, integrations, and infrastructure accumulate in response to changing business needs. As a result, many organizations operate complex environments that were not originally built with consistent security-by-design principles or architectural governance.

    Speaker(s)

  • Wednesday 30th
    16:15–16:30

    Refreshments

  • Wednesday 30th
    16:30–17:30

    Anthony Sale Memorial Session - Time is of the Essence

    Plenary 14P

    Modern enterprise infrastructure assumes that time is accurate, available, and trustworthy. Critical authentication systems, cryptographic protocols, distributed databases, logging platforms, and monitoring and analysis systems all rely on tightly synchronised clocks to function correctly. Unfortunately, the infrastructure that provides trusted time (GPS receivers, network time services, and hierarchical NTP services) is rarely treated as critical security infrastructure. Consequently, many organisations have not seriously considered how failures or manipulation of time sources could cascade into systemic outages.

    Speaker(s)

  • Wednesday 30th
    17:30–18:30

    The COSAC Rump Session

    Plenary 15P

    The COSAC “rump” has for many years been a hugely popular plenary session at COSAC. The Rump is an informal rapid-fire session in which participants give very short presentations on recent results, work in progress, and any other topic of interest to the COSAC community. Presentations may be purely technical, entirely management oriented in nature, or of any combination of approaches or perspectives.

    Speaker(s)

    David Lynas & Various

  • Wednesday 30th
    18:45-19:15

    Drinks Reception

  • Wednesday 30th
    19:15 onwards

    Dinner & Networking

Thursday 1st October

  • Thursday 1st
    09:00-09:30

    Registration & Coffee

  • Thursday 1st
    09:30-12:30

    COSAC Workshops are half-day, 09:30 - 12:30

  • Thursday 1st
    09:30-12:30

    Information Warfare (IWAR) Tabletop Exercise

    Workshop W1

    This half day workshop allows participants to experience the fog of information warfare and apply their analytical and creative skills to address military aggression in Eastern Europe.

    Speaker(s)

    The COSAC Risk Workshop Series – Using AI to Enhance Enterprise Risk Management

    Workshop W2

    The purpose of the risk workshop is to explore the hard parts of understanding risk. We have previously conducted workshops in Ireland and Australia on how to understand and model risk, how to explain and display risk to stakeholders, and how to think like our adversaries to identify threats that we would otherwise miss. Last year we discussed the emergence of AI and how it is being used as a tool by cybersecurity professionals as well as how it is being used by our adversaries.

    Speaker(s)

    Network Security Futures - Part 1: AgentDNS - Architecting Navigation Through the AgentWeb

    Workshop W3 - Part 1 09:30-10:50

    The World Wide Web already hosts AI services such as ChatGPT and is evolving rapidly to handle the next wave of AI, that of autonomous Ai-enabled endpoints or Agentic AI. As vast numbers of AI Agents become directly accessible on the internet, the existing addressing schemes that have supported web sites will no longer be adequate.

    Speaker(s)

    Network Security Futures - Part 2: Fun with Micro-segmentation; Subnets, Supernets, and Aliases

    Workshop W3 - Part 2 11:10-12:30

    Micro-segmentation is a familiar concept, but new emphasis is being placed on this technique that creates one of the few proactive security solutions available to architects. IAM and PAM solutions all for users and user groups to exist in tightly formed boundaries and these boundaries can extend beyond file and server permissions to the network segmentation tricks.

    Speaker(s)

    From Static Risk Registers to Living Risk Models: Extending SABSA Threat Scenarios with Dependency Modelling and Bayesian Evidence for Complex Nonlinear Systems

    Workshop W4

    Cybersecurity risk is frequently assessed using static registers and scoring models that struggle to represent the dynamic and contextual behaviour of modern digital systems. This limitation becomes particularly visible in AI-driven platforms, where relatively minor architectural modifications can significantly alter exposure and privacy risk. In such environments, risk behaviour often resembles that of complex nonlinear systems characterized by sensitivity to initial conditions, rather than the stable and predictable dynamics traditionally assumed in engineered technological systems.

    Speaker(s)

  • Thursday 1st
    10:50-11:10

    Morning Coffee

  • Thursday 1st
    12:30-12:45

    Conference Close

  • Thursday 1st
    12:45-13:45

    Lunch

COSAC
Patrons

A completely new COSAC experience pushing the boundaries of cybersecurity further than ever before. Smart people, inspiring guest speakers and a ton of passion. Become a COSAC Patron and gain access like no other.

Become a patron

COSAC APAC
2027.

23rd - 25th Feb: Melbourne, Australia

Contact

Get in contact with us by email, phone or just stay social and connect with us on LinkedIn

Sponsors

MELBOURNE

+61 386 869 119