Agenda
Tuesday, 8 April 2025
“Accelerating Secure Automation & Scaled A.I.”
Please note that 1:1 meetings will be running throughout the day.
Registration & Check-In
Secure your seat and table of 7 peers in the keynote room.
Welcome to the 10th Security Edge: Accelerating Secure Automation & Scaled A.I
Jim Berry - CEO & Founder at ADAPTIn 2025, cybersecurity is at a critical juncture, with Australia facing high-profile attacks and evolving government regulations aimed at achieving national resilience. At the same time, businesses are accelerating digital growth and a distributed workforce, driving the need for stronger verification, compliance, and trust.
AI and Quantum amplify threats – but also offer new ways to automate protection.
To do so, Security leaders will balance innovation with vigilance — fostering a culture of resilience while still enabling the business desire for rapid AI adoption.
Join your peers at ADAPT Security Edge to connect, learn, and lead through the challenges of our rapidly shifting security landscape.
ADAPT Research: Cyber Resilient & AI Ready
Gabby Fredkin - Head of Analytics & Insights at ADAPTADAPT’s Research and Advisory team reveal the latest data-driven insights from over 1000 local surveys from regional Heads of IT, digital and finance enabling companies responsible for over 60% of Australia’s GDP.
Compare their resource allocation, investment priorities, barriers and the unique challenges of Australian IT Security and the Business leaders you serve.
Helping you to benchmark and validate your priorities and thinking, Gabby will reveal the core findings distilled from your aggregated pre-event surveys and examine which Security, AI and data protection strategies are creating the best outcomes.
Get an Edge: Making the Most of Your Day
Tenar Larsen - Head of People & Performance, Executive ProgramsGlobal CISO Guest: From the CIA to the Cloud: In conversation with a Cyber Visionary
William MacMillan - Former CISO of the CIA | Former SVP for Info Sec at Salesforce - in conversation with ADAPTAn exclusive in-person interview with William MacMillan, former CISO of the CIA and former SVP for Information Security at Salesforce, now Chief Product Officer at Andesite. Join us as he shares tactics for AI in SecOps alongside unparalleled insights from a career at the intersection of national security and corporate cybersecurity.
In this candid conversation, William reflects on his leadership in transforming the CIA’s cybersecurity strategy, building the Cybersecurity Operations Center (CSOC), and addressing insider threats and supply chain risks. Discover how his experience in intelligence, cyber operations, and the private sector informs his perspective on safeguarding digital ecosystems in our constantly increasing threat landscape.
Gain valuable lessons on security leadership, resilience, and incident response from one of the most respected names in global cybersecurity – with us in person for the day at Security Edge.
Navigating the New Frontier of A.I. Risk: A CTO Perspective
Rhys Evans - Head of Security ANZ & Japan at AWS Fabio Fratucello - Field Chief Technology Officer, International at Crowdstrike Brett Winterford - APJ CSO at Okta Antonie Falcoe - APJ CTO at ZscalerIn 2025, the cybersecurity landscape faces unprecedented challenges and opportunities, requiring innovative solutions to safeguard digital ecosystems. This session brings together CTOs from AWS, Crowdstrike, Okta, and Zscaler – leaders at the forefront of cloud, endpoint security, identity management, and zero trust architecture. Join this insightful discussion to explore the trends, threats, and technologies shaping cybersecurity in 2025.
Discussing:
- The Future of Zero Trust in an AI-Powered World: How zero trust is evolving in response to AI advancements and increasing automation.
- Cloud Security at Scale: Securing complex, multi-cloud environments while balancing agility and resilience.
- Proactive Threat Detection and Response: Leveraging real-time telemetry, behavioural analytics, and AI.
- Collaboration in Cybersecurity: Strategies for building strong partnerships to tackle rising ransomware and nation-state threats.
- Compliance: Preparing for stricter cybersecurity regulations in 2025 and navigating their impact.
- The Cybersecurity Talent Gap: fostering talent development and implementing intelligent automation.
Morning Break: Refreshments, Snacks & Connections
The Australian Cyber Network: Cyber Strategy Research 2025
Jason Murrell - Chair & Co-Founder at Australian Cyber Network Kylie Watson - CISO APJ/MEA at DXC TechnologyThe Australian Cyber Network’s (ACN) charitable purpose and objective is to advance the cyber security and cyber safety of Australia, the Australian public and its national interests. They focus on 4 strategic pillars: Maturity (of Australian cyber capabilities and professionalism), Insight (for evidence-based policy, programs and research), Outreach (to support and uplift cyber awareness) and Advocacy (as the trusted voice of the Australian cyber industry).
The ACN team will have a new, candid research report out in April on the national Cyber Strategy and what actually has to happen to reach the 2030 goals.
For example, we’ll be 86,000 cyber jobs short by 2030 unless we act now; we need to make GRC sexy (not just Pen Testing); we need to ask if the public reporting is a true reflection; what’s working/ what’s not?; and if our AI defence is not keeping pace with the attacks, then how to ensure we are not all at risk?
Building Cloud Security Programs That Can Shift Left
Matt Preswick - Principal Solution Engineer at Wiz Santanu Lodh - CISO at OFXFor organisations born in the cloud or seeking to adopt modern technologies like containers, Kubernetes, and Serverless architectures, shifting security left is foundational. It empowers engineering teams to collaborate effectively with security teams, and effectively prevent common risks associated with the cloud. But how can this be achieved when security and engineering teams often have transactional relationships? Join this session for real-world examples of how Australian organisations are bringing DevSecOps together with practical guidance from Australian Security leaders.
Cyber Security for Future Connectivity
Daisey Stampfer - Group Executive Business & Wholesale at SuperloopDaisey Stampfer is the Group Executive for Business & Wholesale, responsible for Enterprise, Wholesale, and Smart Communities at Superloop. Daisey has more than 15 years’ experience in technical and non-technical leadership roles in tier 1 organisations such as Bosch, Thales, Telstra and more recently NBN Co where she was the GM of Sales Enablement and Client Services for business service delivery.
Leveraging her education in Robotics Engineering, Computer Science, and Law, Daisey’s passion lies in solving business challenges with Superloop’s modern day solutions, enabling customers to succeed in their pursuits.
ADAPT Executive Insight Roundtables - Share with confidence under the Chatham House Rule
Attend your pre-selected roundtable to participate in a peer discussion with confidence under Chatham House Rule moderated by an ADAPT analyst with subject matter experts.
Peer Networking Seated Lunch
ADAPT Executive Insight Roundtables - Share with confidence under the Chatham House Rule
Attend your pre-selected roundtable to participate in a peer discussion with confidence under Chatham House Rule moderated by an ADAPT analyst with subject matter experts.
Afternoon Break
An opportunity to meet with other attendees and build your network
A Different Perspective on GenAI Security
Prof. Marek Kowalkiewicz - Professor and Chair in Digital Economy at Centre for Future Enterprise, QUT Business SchoolWinning the Boardroom: Helping Businesses Lead, Not Just Comply
Darren Argyle - Former Group Chief Information Security Risk Officer at Standard Chartered BankIn an era of mounting regulatory pressure and rising cyber threats, many organisations struggle to balance compliance with true leadership. Boards and regulators want assurance, clarity, and confidence—but too often, cyber and risk leaders fail to bridge the gap between technical jargon and actionable business impact. This keynote offers a roadmap for attendees to gain influence, avoid fines, and transform their organisations into the go-to examples of excellence in cyber resilience and delivering business value.
This workshop session will give you:
• Practical Tools: leave with a clear framework for engaging stakeholders, simplifying complex risks, and demonstrating business value.
• Real Outcomes: Darren shares how he helped go from regulatory scrutiny to trusted leadership by building confidence with the regulators.
• Relatable Lessons: Through storytelling, he’ll bring to life the challenges and triumphs of working with boards, regulators, and resistant stakeholders.
Key Takeaways:
1. How to Get Off the Naughty List: Proven strategies to regain regulators’ confidence and avoid costly fines or oversight.
2. Building Boardroom Influence: Practical steps to become a trusted advisor and align cybersecurity with business goals.
3. From Compliance to Leadership: Lessons on how to shift from simply “meeting standards” to setting them, becoming the example others follow.
Summary & Closing Comments
Security Edge Peer Networking Drinks
An opportunity to stay, mingle and meet other attendees over drinks and food and discuss the day.