Skip to content

Schedule

Sunday 28th September

  • Sunday 28th
    15:00-16:00

    Delegate Registration

  • Sunday 28th
    19:30-20:00

    Delegate Registration & Drinks Reception - sponsored by Killashee Hotel

  • Sunday 28th
    20:00 onwards

    COSAC 2025 Welcome Dinner

Monday 29th September

  • Monday 29th
    09:00-9:30

    Registration & Coffee

  • Monday 29th
    09:30-17:30

    COSAC Masterclasses are full-day, 09:30 - 17:30

  • Monday 29th
    09:30-17:30

    The 24th COSAC International Roundtable Security Forum

    Masterclass M1

    For 2025, the COSAC Forum puts you in a roomful of other information security veterans. Accomplished, creative, battle-scarred, they’ve faced dragons of almost infinite variety – technical, political, managerial, psychological, structural, architectural … - you get the picture. They’ve had notable successes. They’ve also had workable, effective security strategies gutted by corporate politics and rapidly changing strategies. Still they maintain professionalism and dedication to securing organizational assets. These professionals detect, recognize and avert threats (old and new), exploit latest and greatest security technologies and techniques, and keep sensitive information private. And they’re not shy. Sound like a picture of you?

    Speaker(s)

    John O'Leary

    The 9th COSAC 'Design-Off'

    Masterclass M2

    Returning for a 9th year, this design-off will present a new and engaging set of challenges. In the spirit of hack-a-thons, this competition was born out of a desire to provide a venue for security architects to apply their skills in a safe environment. This is a unique competition format that uses real clients, scenarios and deliverables to see which team will reign supreme!

    Speaker(s)

    Jason Kobes
    William Schultz

    Zero Trust: What Are We Really Doing?

    Masterclass M3

    Many organizations are implementing or planning to implement Zero Trust Architecture (ZTA) systems believing it will strengthen security and protect against insider threats. But do they fully understand what’s being gained—and what’s being sacrificed?

    Speaker(s)

    Char Sample
    Connie Justice
    Lynette Hornung
    Kaleb Frye

  • Monday 29th
    11:05-11:25

    Morning Coffee

  • Monday 29th
    13:00-14:00

    Lunch

  • Monday 29th
    15:35-15:35

    Afternoon Tea

  • Monday 29th
    18:30-19:00

    Drinks Reception

  • Monday 29th
    19:00 onwards

    Dinner & Traditional Irish Music Night

Tuesday 30th September

  • Tuesday 30th
    09:00-09:30

    Registration & Coffee

  • Tuesday 30th
    09:30-10:30

    The Nearest Emergency Exit May Be Behind You

    Session 1A

    What can we learn from aviation security?
    Most of us love air travel, and even if we do not like it, we still place our lives in the capable hands of an airline multiple times a year. With its unbeatable safety record the airline industry is a beacon of the safety-first culture. Airlines need to deal with, complex industrial machines, complicated supply chains, unpredictable customers, highly skilled workers, major logistic challenges and major regulator pressure and they still manage to deliver us this complex product in a very secure way.

    Speaker(s)

    Karel Koster

    Automating Secure-by-Design: The AI-Enabled Security Revolution

    Session 1B

    CISOs have been in the hot seat lately, as evidenced by charges levied by the U.S. Securities and Exchange Commission in October 2023 against Solarwinds and CISO Tim Brown for “fraud and internal control failures relating to allegedly known cybersecurity risks and vulnerabilities”, in that he overstated the cybersecurity practices and understated or failed to disclose known risks.

    Speaker(s)

    Sophia Mexi-Jones
    Jonathan Cassam

    Using the SABSA Cybersecurity Framework (CSF) Profile and Examples

    Session 1S

    How should you implement the NIST Cybersecurity Framework (CSF) 2.0 when developing or updating a security architecture using SABSA? The NIST CSF 2.0 is a significant upgrade to the de-facto global framework for managing cybersecurity risks, but it does not have everything that the SABSA Method can provide to effectively manage your enterprise cybersecurity risk right?

    Speaker(s)

    Glen Bruce

  • Tuesday 30th
    10:30-11:30

    Space Engineering Inspired Cyber Resiliency

    Session 2A

    Recent high-profile IT outages, like the CrowdStrike incident or the accidental wiping of the complete Google cloud service of UniSuper Australia, are a stark reminder that cybersecurity is not just about malicious threat actors, but also about issues arising from human errors with no failsafe.

    Speaker(s)

    Chathura Abeydeera
    Andreas Dannert

    Navigating the Future of Cybersecurity: AI Assistants in Security Operations

    Session 2B

    As the landscape of cybersecurity becomes increasingly complex, organisations are turning to AI assistants to improve operational efficiency and strengthen their response to emerging threats. These systems, capable of automating routine tasks and processing vast amounts of threat intelligence, promise to transform security operations. But their integration into existing infrastructures is not without its challenges.

    Speaker(s)

    Vriti Magee

    How I Implemented an ISMS in Day-to-Day Operations and Used SABSA without Telling Anyone

    Session 2S

    We’ve all heard the expression “Paper tiger” – it deceivingly looks like a powerful tiger, but it’s just a bunch of folded paper. My experience is that many organizations today say they have an Information Security Management System in place, but in fact it is an ineffectual system that cannot withstand challenges – a paper tiger!

    Speaker(s)

    Øystein Balstad

  • Tuesday 30th
    11:30-11:45

    Morning Coffee

  • Tuesday 30th
    11:45-12:45

    And What Is Truth?

    Session 3A

    “Persons here invent stories that neither are true nor ever will be.”
    - Thucydides

    Over one million men killed or wounded in Ukraine. Or maybe not. Peace is imminent. Or maybe not. We somehow thought that the ubiquity of information would quash the ability to generate mis- or dis-information, but that isn’t how it’s worked out. Why not?

    Speaker(s)

    G. Mark Hardy

    AI and Weaponizing Privacy – How Companies Use AI and Personal Data to Give Consumers a SHI**Y Deal – And What You Can Do About It**

    Session 3B

    In an age of big data and artificial intelligence, companies are using vast amounts of personal data to manipulate consumer behavior and maximize profits — often at the expense of privacy and fairness.

    Speaker(s)

    Mark Rasch
    Valerie Lyons

    Choose Your Own Adventure: Use Flow Engineering to Apply SABSA

    Seesion 3S

    The SABSA Framework provides a structured methodology for developing an Enterprise Security Architecture (ESA). However, knowing where to begin and what path to take through the matrix can be challenging.

    Speaker(s)

    Chris Blunt

  • Tuesday 30th
    12:45-13:30

    Lunch

  • Tuesday 30th
    13:30-14:30

    The Scars of IAM

    Seesion 4A

    Identity is considered the new perimeter but no one knows where it starts or ends? Having been part of IAM programmes before, and coming into a new environment you stop and think what would I do different this time?

    Speaker(s)

    Daniel Avieritei

    Action Figures - AI Generated Large Action Models and Privacy and Security

    Session 4B

    Generative AI and Large Action Models (LAMs) have introduced unprecedented challenges at the intersection of privacy, security, and intellectual property. While generative AI programs rely on large language models (LLMs) for training and testing, the expansion of AI into real-time, action-oriented decision-making has given rise to more complex privacy and data security issues. The session will explore how AI-driven data aggregation, behavioral profiling, and decision-making create new vulnerabilities and privacy risks, especially when AI models require continuous data collection from personal devices and behavioral inputs.

    Speaker(s)

    Mark Rasch

    Moving from SABSA Foundation to Practice

    Session 4S

    Many newly qualified SABSA architects find it difficult to start putting SABSA into practice. SABSA’s business-led approach, which links business objectives to security controls, is compelling when you are on the Foundation training course but can feel overwhelming when you get back to the office.

    Speaker(s)

    Gordon Jenkins

  • Tuesday 30th
    14:30-15:30

    Zero Trustageddon

    Session 5A

    At COSAC 2023 we learned how a Tsunami of Truth (aka Trunami) could, and had, brought about the collapse of large businesses. In some cases, it just needed a small snippet of truth, but one broadcast to the world, to effect great change; we even referred light-heartedly to “Elon moments”.

    Speaker(s)

    Nick Spenceley

    Engineering A Security Framework for Digital Twins

    Session 5B

    The concept of digital twins is part of the buzzword bingo and hype cycle surrounding use of digital simulation and analysis, with a dash of AI, that may enable us to better forecast use and improve design of physical assets and business processes. The Indian government’s proposed initiative to create of a city-scale digital twin aimed at improving future urban planning raises interesting security, privacy and ethical issues. To address the inherent risks, we need to look beyond traditional IT threat modelling and consider a holistic approach to managing safety and security aspects.

    Speaker(s)

    Hugh Boyes

    To Build or Not To Build That is The Question – Case Study on Building a Cybersecurity Architecture Capability at a Global Semiconductor

    Session 5S

    Today, there is not a lot of published case studies on how to build a cybersecurity architecture capability at an organization, especially one based on SABSA. The purpose of this talk is to contribute to the body of case studies and architecture community about building a cybersecurity architecture capability. The case study highlighted in this talk is derived from the presenter being hired to “build” a cybersecurity architecture program at a global semi-conductor. The build phase continues in 2025.

    Speaker(s)

    Robert Rost

  • Tuesday 30th
    15:30-15:45

    Afternoon Tea

  • Tuesday 30th
    15:45–16:45

    Security That Works For You: Building User-Friendly Architectures

    Session 6A

    Tired of security that gets in your way? We're flipping the script! This session dives into building security architectures that actually make users' lives easier, not harder. We'll show you how to ditch the "security-first, user-maybe-later" approach and focus on what users really need.

    Speaker(s)

    Lori Murray

    Breaking the Chain - API Security Lessons from Ruby Core Implementation

    Session 6B

    When implementing CSV::TSV in Ruby core (ruby/csv#319), I uncovered critical security patterns that challenge conventional API security thinking. This exclusive session reveals previously unpublished security insights from core library development that directly impact enterprise API security.

    Speaker(s)

    Jasveen Sandral
    Siori Sata

    Using High-Assurance and Dependency Modelling Methods and Techniques to Develop and Exploit Bespoke Attack Vectors

    Session 6S

    This presentation examines the dual-use nature of high-assurance methods in cybersecurity, exploring how structured methods and probabilistic dependency modelling can be employed not only to secure systems but also to craft bespoke attack vectors. We analyse historical case studies to illustrate how such techniques have been used to uncover and exploit vulnerabilities in critical national infrastructure.

    Speaker(s)

    Jaco Jacobs
    Andy Clark

  • Tuesday 30th
    16:45–17:45

    MBTI Meets Cybesecurity: Leveraging Personality for Stronger Defence

    Session 7A

    We are all different based on the environment that we grew up in, the time we grew up (generational influence), and our individual psychological preferences. One tool that has been time-tested, and debated, is the Myers-Briggs Personality Typing tool (MBTI). For years the cybersecurity community has wondered what the implications of a person’s MBTI is on how they behave with respect to cybersecurity. At last, in 2023 Myers-Briggs themselves published a report on the linkages between different MBTI types (16) and the impact on cybersecurity!

    Speaker(s)

    Todd Fitzgerald

    Firmware Forensics: Analyzing Malware Embedded in Device Firmware

    Session 7B

    Firmware, essential to hardware functionality, increasingly becomes a prime target for cyber threat actors because of its foundational control over devices. This presentation delves into a detailed analysis of malware embedded within purported firmware updates for Sabrent devices, a case study revealing widespread exploitation.

    Speaker(s)

    Diyar Saadi

    The Hidden Backbone

    Session 7S

    Every business depends on the Domain Name System (DNS), yet it is often dismissed as merely a connectivity tool. In reality, DNS is a critical control point—shaping security, resilience, and compliance while underpinning the systemic availability of the internet.

    Speaker(s)

    Simon Cross

  • Tuesday 30th
    17:45–18:00

    Refreshments

  • Tuesday 30th
    18:00–19:00

    Post-Quantum Readiness for Sceptics: From Theory to Action

    Plenary 8P

    Quantum computing is no longer a far-off concept—it’s here, and it’s transforming the landscape of enterprise security. Yet, too often, it’s dismissed as a curiosity rather than the critical risk it has become. This session gets straight to the point: preparing for a post-quantum world demands action now. This session is for the people who disagree with that statement and/or feel they already have way too much to do to possibly take on the extra responsibility of addressing the future impacts of quantum computing on current cryptographic methods.

    Speaker(s)

    Anne Leslie

  • Tuesday 30th
    19:15-1945

    Drinks Reception

  • Tuesday 30th
    19:45 onwards

    COSAC 2025 Gala Dinner

Wednesday 1st October

  • Wednesday 1st
    09:00-09:30

    Registration & Coffee

  • Wednesday 1st
    09:30-10:30

    Around The World In 2025

    Session 9A

    Politics always influences our cybersecurity agenda, geopolitics drives our risk agenda, and compliance requirements with new laws and regulations drive the implementation of various mandatory controls. Currently, the world is changing faster than ever before. Geopolitical tensions, the fight against cybercrime and espionage, state protectionism, and the continued focus on data privacy, on the other hand, create a challenging cocktail of laws and regulations to abide by.

    Speaker(s)

    Karel Koster

    The Implications of Majorana Chip on Cybersecurity

    Session 9B

    The advent of Microsoft's Majorana 1 chip marks a significant leap in quantum computing, with profound implications for cybersecurity.

    Speaker(s)

    Lesley Kipling

    Hostile Architecture – When Protection Becomes the Problem

    Session 9S

    In urban design, hostile architecture restricts behavior—think anti-homeless spikes or armrests that prevent sleeping on benches. In security, we see similar patterns: overly restrictive authentication, excessive access policies, intrusive monitoring, and a poor UX that obstruct legitimate users as much as attackers.

    Speaker(s)

    James Chinn

  • Wednesday 1st
    10:30–11:30

    How To Stay Compliant With And Take Benefits From The EU CRA

    Session 10A

    The EU Cyber Resilience Act (CRA) aims to safeguard European consumers and at first glance it targets only the EU market. But in fact the entire OSS ecosystem falls under its scope as CRA creates mandatory cybersecurity requirements for vendors, distributors, integrators, even enterprise consumers and, in fact, the entire open-source ecosystem by introducing terms like “Manufacturer”, “Steward”, “Individual developer” among others. So, how to ensure you stay compliant?

    Speaker(s)

    Roman Zhukov

    Understanding the Risks - Protecting Your Identity, Privacy, and Devices

    Session 10B

    In today’s hyper-connected digital landscape, safeguarding personal identity, privacy, and devices is no longer optional—it’s critical. At COSAC 2025, this session will delve into why enterprises must prioritize consumer cybersecurity as a core component of their strategy. With rising incidents of enterprise data breaches directly impacting consumers, the line between corporate and individual security has blurred. Cybercriminals are exploiting advanced AI tools to execute sophisticated attacks, including identity theft, spreading misinformation, scamming, and victimizing individuals on an unprecedented scale.

    Speaker(s)

    Naveen Shivaramu Yeshodara
    Benny Chee

    Why Security Architectures Fail: “It Is Not the Architecture’s Fault”

    Session 10S

    Suppose you had a well-defined and documented security architecture based on a comprehensive set of business risk requirements, including an extensive array of solutions and controls to manage the risk and providing traceability across all areas top to bottom. Why then, was it doomed to fail? Based on 30 years of security architecture experience, this session will outline the factors that can and have prevented security architectures from being implemented successfully.

    Speaker(s)

    Glen Bruce

  • Wednesday 1st
    11:30-11:45

    Morning Coffee

  • Wednesday 1st
    11:45–12:45

    Outgrowing Chaos: Transforming Security In Fast-Paced Environments

    Session 11A

    Today, Agile and DevOps practices enable many organisations to develop and deploy software at an ever-increasing pace. At the same time, thanks to cloud computing, systems are becoming increasingly abstract and complex, making them difficult to secure.

    Speaker(s)

    Chris Blunt

    Inside A Cyber Attack; Real-World Insights and Response Strategies

    Session 11B

    In today's digital landscape, no organization is immune to cyber threats. Cyber criminals and state actors are constantly working to breach our defences for their own gain. When your organization becomes the target, how do you respond? How do your colleagues perform under pressure?

    Speaker(s)

    Martin De Vries

    Writing Security Requirements That Don’t Suck: A Practical Approach

    Session 11S

    Introduction to the Problem Statement
    In many organisations, poorly defined security requirements create significant challenges throughout a project's lifecycle. Weak or vague requirements not only expose the business to security risks but also place undue strain on security architects tasked with designing effective solutions. When security is treated as an afterthought, projects face increased costs, compliance issues, and operational inefficiencies. This session will explore the consequences of inadequate security requirements and the broader impact on businesses and security professionals.

    Speaker(s)

    Dan Taylor

  • Wednesday 1st
    12:45-13:30

    Lunch

  • Wednesday 1st
    13:30– 14:30

    When Privacy By Design Is Not Enough: Building Safety By Design In Gen AI

    Session 12A

    The EU GDPR mandated the principle of Privacy by Design (and Default). While the concept was not new, its regulatory obligation was. However, generative AI (GenAI) systems like ChatGPT, and DALL·E, introduce risks beyond those addressed by Privacy By Design such as misinformation and disinformation, deepfakes, harmful biases, and even intellectual property infringements.

    Speaker(s)

    Valerie Lyons

    Threat-Informed Cyber Resilience: How the Energy Sector Chooses Controls Based On What Attackers Will Do

    session 12B

    Security professionals have no shortage of cyber security controls and solutions from which to choose from. So, what controls do you choose and where do you spend your money? Even the largest budget will run out at some point and your ability to manage all the controls will constrain how much you can do in practice.

    Speaker(s)

    Paul Dorey

    Connecting the Macro to the Micro

    Session 12S

    Organisations have often driven the cyber programmes and remediation activities through cyber maturity assessments or from risk reporting initiatives.

    Speaker(s)

    Jonathan Cassam

  • Wednesday 1st
    14:30–15:30

    Grab and Go – Compelled Production of Large Data Sets

    Session 13A

    Government investigations increasingly rely on obtaining large sets of personal data held by third-party providers, including email, chat logs, social media, financial records, and cloud-based documents. However, traditional methods of compulsory process-subpoenas, search warrants, and court orders-are poorly suited to handling the vast scope and sensitivity of these modern data sets.

    Speaker(s)

    Mark Rasch

    Maritime Cyber Deception: Tracking Digital Footprints on the High Seas

    Session 13B

    The maritime domain is both a lifeline of global trade and a theater for covert operations, from vessels disappearing off tracking systems to ships falsifying registries to evade sanctions. Open Source Intelligence (OSINT) plays a pivotal role in decoding these activities, offering insights into illicit operations hidden in plain sight.

    Speaker(s)

    Shubham Kumar
    Sagar Tiwari

    See No Evil?: Visualising Security Risk

    Session 13S

    In an influential early book on security, [‘Secrets & Lies’: (2000)], the technologist, Bruce Schneier reflects on why, when humans generally have an intuitive, highly developed sense of risk in everyday life, (crossing a road, walking down a dark alley, etc), do we find it so difficult to analyse risk? He identified several factors with significant influence on risk perception: inability to evaluate rare
    events, confirmation bias in trust of IT, and the degree to which the subject feels a sense of ‘control’, is able to ‘personify’ a threat or is presented with impacts that are either novel or spectacular.

    Speaker(s)

    Steven Bradley
    Mates Leoŝ

  • Wednesday 1st
    15:30-15:45

    Afternoon Tea

  • Wednesday 1st
    15:45–16:45

    Cybersecurity’s Billion-Dollar Question: The Hunt for High-Impact Innovations

    Session 14A

    This paper was triggered by a request from a client of mine. The brief sounded simple: “we would like an alternative version of our cyber security investment strategy that taps into emerging cyber technologies”.

    Speaker(s)

    Anton Tkachov
    George Bull

    All Your Risk Scores Belong To Us

    Session 14B

    As technology platforms become more pervasive and we move towards continual compliance every vendor is developing a risk score or dashboard to visualise their risk. From Qualys to Microsoft to Snyk everyone wants you to submit your data to them and to be the central risk score for your company.

    Speaker(s)

    Siân John

    Architecting Cyber Security Self-Assurance

    Session 14S

    Cyber security risk is one of the top non-financial risks for organisations. It can be present in almost any part of digital operations. The nature of the risk is both complex and broad due to the complexity of the attacks and evolving capabilities of the attackers. More often than not, the articulation of cyber risk is characterised by a high degree of subjectivity due to the innate difficulty to create a 360o view of the security posture in a timely manner, supported by actuarial data, to answer even to the most basic business requests.

    Speaker(s)

    Dimitrios Delivasilis

  • Wednesday 1st
    16:45–17:00

    Refreshments

  • Wednesday 1st
    17:00–18:00

    Anthony Sale Memorial Session - How to avoid maritime accidents

    Plenary 15P

    How did Alan meet Norbert?
    Did Elsie do as she was told?
    What have Samuel, Edward and Kurt got to do with it?
    Where does Tony fit in?
    And how is George finding his diet?

    Speaker(s)

    Sir Dermot Turing

  • Wednesday 1st
    18:00–19:00

    The COSAC Rump Session

    Plenary 16P

    The COSAC “rump” has for many years been a hugely popular plenary session at COSAC. The Rump is an informal rapid-fire session in which participants give very short presentations on recent results, work in progress, and any other topic of interest to the COSAC community. Presentations may be purely technical, entirely management oriented in nature, or of any combination of approaches or perspectives.

    Speaker(s)

    David Lynas & Various

  • Wednesday 1st
    19:15–19:45

    Drinks Reception

  • Wednesday 1st
    19:45 onwards

    Dinner & COSAC Prize Night

Thursday 2nd October

  • Thursday 2nd
    09:00-09:30

    Registration & Coffee

  • Thursday 2nd
    09:30-1230

    COSAC Workshops are half-day, 09:30 - 12:30 & 13:30 - 16:30

  • Thursday 2nd
    09:30-1230

    Beyond Boundaries: Redefining Digital Identity for a Seamless and Secure Future

    Workshop W1

    In an era where digital transformation drives the global economy, the concept of digital identity has emerged as a cornerstone of secure, consumer-friendly interactions. This Masterclass at COSAC APAC 2025 will delve into the intricate process of designing a robust digital identity strategy and its implementation through technology.

    Speaker(s)

    MZ Omarjee

    The 3rd COSAC Lab: When Biomimicry Meets Cybersecurity

    Workshop W2

    This year, I am pleased to introduce an innovative new initiative for the 3rd edition of the COSAC LAB.
    For the year 2024, the lab will use a new approach based on the lessons learned from the first edition performed in 2023.

    Speaker(s)

    Ghariba Bourhidane

    META Matters and Sadly Maybe Most

    Workshop W3

    Security professionals pride themselves on being highly analytical, skilled in multiple domains, and steadfast in pushing through agendas that other parts of the business may not be enthusiastic about. We know what’s right from wrong.

    Speaker(s)

    Karel Koster

  • Thursday 2nd
    10:50-11:10

    Morning Coffee

  • Thursday 2nd
    12:30-13:30

    Lunch

  • Thursday 2nd
    13:30-16:30

    COSAC Risk Workshop: Leveraging AI to Enhance Enterprise Risk Management

    Workshop W4

    The purpose of the risk workshop is to explore the hard parts of understanding risk. We have previously conducted workshops in Ireland and Australia on how to understand and model risk, how to explain and display risk to stakeholders, and how to think like our adversaries to identify threats that we would otherwise miss. Last year the discussion focused on the challenge of how to aggregate risk in a complex environment to help determine which mission objectives are most at risk, and also discussed how defining and understanding risk ownership is a key factor in improving our understanding and communications regarding organizational risk.

    Speaker(s)

    Jason Kobes
    William Schultz

    Designing, Building, and Improving a Secure Cloud Deployment - A Practical Approach

    Workshop W5

    A CIO, CISO, CTO, and a Chief Cybersecurity Advisor walk into a bar…the discussion that naturally ensues is how to design a cloud security architecture that meets the business requirements while addressing the spoken and unspoken cybersecurity needs. What does a business leader, architect, or advisor need to know about the business and its future direction?

    Speaker(s)

    Kathleen Mullin
    Lesley Kipling

    Moving Towards a Functional Security Services Catalogue

    Workshop W6

    Efforts to establish a standardised Security Services Catalogue have faced significant challenges, as demonstrated by the TSI R100 Security Services Catalogue initiative, which has struggled to progress towards a practical, database-driven implementation. This workshop presents an alternative approach, leveraging the SABSA based Security Services Relationship Model (SSRM) as an Enterprise Reference Data (ERD) framework to structure and standardise security capabilities.

    Speaker(s)

    Robert Campbell

  • Thursday 2nd
    14:50-15:10

    Afternoon Tea

  • Thursday 2nd
    16:30-16:45

    Refreshments

  • Thursday 2nd
    16:45-17:00

    Conference Close - COSAC Chairman's Closing Remarks

COSAC
Patrons

A completely new COSAC experience pushing the boundaries of cybersecurity further than ever before. Smart people, inspiring guest speakers and a ton of passion. Become a COSAC Patron and gain access like no other.

Become a patron

COSAC APAC
2026.

24th - 26th Feb: Melbourne, Australia

Contact

Get in contact with us by email, phone or just stay social and connect with us on LinkedIn & Twitter

Sponsors

MELBOURNE

+61 386 869 119