Agenda
Tuesday, 8 April 2025
“Accelerating Secure Automation & Scaled AI”
Please note that 1:1 meetings will be running throughout the day.
Registration & Check-In
Secure your seat and table of peers in the keynote room.
Welcome to the 10th Security Edge: Accelerating Secure Automation & Scaled AI
Jim Berry - CEO & Founder at ADAPT
In 2025, cybersecurity is at a critical juncture, with Australia facing high-profile attacks and evolving government regulations aimed at achieving national resilience. At the same time, businesses are accelerating digital growth and a distributed workforce, driving the need for stronger verification, compliance, and trust.
AI and Quantum amplify threats – but also offer new ways to automate protection.
To do so, Security leaders will balance innovation with vigilance — fostering a culture of resilience while still enabling the business desire for rapid AI adoption.
Join your peers at ADAPT Security Edge to connect, learn, and lead through the challenges of our rapidly shifting security landscape.
ADAPT Research: Cyber Resilient & AI Ready
Gabby Fredkin - Head of Analytics & Insights at ADAPT
ADAPT’s Research and Advisory team reveal the latest data-driven insights from over 1000 local surveys from regional Heads of IT, digital and finance enabling companies responsible for over 60% of Australia’s GDP.
Compare their resource allocation, investment priorities, barriers and the unique challenges of Australian IT Security and the Business leaders you serve.
Helping you to benchmark and validate your priorities and thinking, Gabby will reveal the core findings distilled from your aggregated pre-event surveys and examine which Security, AI and data protection strategies are creating the best outcomes.
Get an Edge: Making the Most of Your Day
Tenar Larsen - Head of People & Performance, Executive Programs
Global CISO Guest: From the CIA to the Cloud: In conversation with a Cyber Visionary
Matt Boon - Senior Research Director at ADAPT William MacMillan - Former CISO of the CIA | Former SVP for Info Sec at Salesforce

An exclusive in-person interview with William MacMillan, former CISO of the CIA and former SVP for Information Security at Salesforce, now Chief Product Officer at Andesite. Join us as he shares tactics for AI in SecOps alongside unparalleled insights from a career at the intersection of national security and corporate cybersecurity.
In this candid conversation, William reflects on his leadership in transforming the CIA’s cybersecurity strategy, building the Cybersecurity Operations Center (CSOC), and addressing insider threats and supply chain risks. Discover how his experience in intelligence, cyber operations, and the private sector informs his perspective on safeguarding digital ecosystems in our constantly increasing threat landscape.
Gain valuable lessons on security leadership, resilience, and incident response from one of the most respected names in global cybersecurity – with us in person for the day at Security Edge.
Navigating the New Frontier of A.I. Risk: A CTO Perspective
Pratima Singh - Security Specialist Solutions Architect at AWS Fabio Fratucello - Field Chief Technology Officer, International at Crowdstrike Brett Winterford - Regional CISO at Okta Antonie Falcoe - APJ CTO at Zscaler



In 2025, the cybersecurity landscape faces unprecedented challenges and opportunities, requiring innovative solutions to safeguard digital ecosystems. This session brings together CTOs from AWS, Crowdstrike, Okta, and Zscaler – leaders at the forefront of cloud, endpoint security, identity management, and zero trust architecture. Join this insightful discussion to explore the trends, threats, and technologies shaping cybersecurity in 2025.
Discussing:
- The Future of Zero Trust in an AI-Powered World: How zero trust is evolving in response to AI advancements and increasing automation.
- Cloud Security at Scale: Securing complex, multi-cloud environments while balancing agility and resilience.
- Proactive Threat Detection and Response: Leveraging real-time telemetry, behavioural analytics, and AI.
- Collaboration in Cybersecurity: Strategies for building strong partnerships to tackle rising ransomware and nation-state threats.
- Compliance: Preparing for stricter cybersecurity regulations in 2025 and navigating their impact.
- The Cybersecurity Talent Gap: fostering talent development and implementing intelligent automation.
Morning Break: Refreshments, Snacks & Connections
The Australian Cyber Network: Cyber Strategy Research 2025
Jason Murrell - Chair & Co-Founder at Australian Cyber Network Kylie Watson - Head of Cyber Security at DXC Technology Catherine Rowe - Global CISO, Previously at QBE Insurance


The Australian Cyber Network’s (ACN) charitable purpose and objective is to advance the cyber security and cyber safety of Australia, the Australian public and its national interests. They focus on 4 strategic pillars: Maturity (of Australian cyber capabilities and professionalism), Insight (for evidence-based policy, programs and research), Outreach (to support and uplift cyber awareness) and Advocacy (as the trusted voice of the Australian cyber industry).
The ACN team will have a new, candid research report out in April on the national Cyber Strategy and what actually has to happen to reach the 2030 goals.
For example, we’ll be 86,000 cyber jobs short by 2030 unless we act now; we need to make GRC accessible (not just Pen Testing); we need to ask if the public reporting is a true reflection; what’s working/ what’s not?; and if our AI defence is not keeping pace with the attacks, then how to ensure we are not all at risk?
Building Cloud Security Programs That Can Shift Left
Matt Preswick - Principal Solution Engineer at Wiz Santanu Lodh - CISO at OFX

For organisations born in the cloud or seeking to adopt modern technologies like containers, Kubernetes, and Serverless architectures, shifting security left is foundational. It empowers engineering teams to collaborate effectively with security teams, and effectively prevent common risks associated with the cloud. But how can this be achieved when security and engineering teams often have transactional relationships? Join this session for real-world examples of how Australian organisations are bringing DevSecOps together with practical guidance from Australian Security leaders.
Cybersecurity for Future Connectivity
Daisey Stampfer - Group Executive Business & Wholesale at Superloop
Explore how Superloop is redefining the role of connectivity providers by integrating scalable security technologies into their core capabilities. Learn how this innovative approach delivers enhanced value to businesses and consumers, empowering secure and seamless digital experiences in an increasingly interconnected world.
Daisey Stampfer is the Group Executive for Business & Wholesale, responsible for Enterprise, Wholesale, and Smart Communities at Superloop. Daisey has more than 15 years’ experience in technical and non-technical leadership roles in tier 1 organisations such as Bosch, Thales, Telstra and more recently NBN Co where she was the GM of Sales Enablement and Client Services for business service delivery.
Leveraging her education in Robotics Engineering, Computer Science, and Law, Daisey’s passion lies in solving business challenges with Superloop’s modern day solutions, enabling customers to succeed in their pursuits.
ADAPT Executive Insight Roundtables - Share with confidence under the Chatham House Rule
Attend your pre-selected roundtable to participate in a peer discussion with confidence under Chatham House Rule moderated by an ADAPT analyst with subject matter experts.
How the CISO and Executive Stakeholders Can Align for Smarter Cyber Risk Management & Governance
Kevin Davis - Senior Account Director at Diligent
Cyber risk isn’t just another item for CISOs and executive stakeholders — it’s a business-critical issue that demands alignment at the highest levels. Effective cyber risk management and governance are crucial for organisational resilience and trust and goes beyond technology.
In this roundtable, we’ll discuss how CISOs and executive stakeholders can align their efforts to enhance cyber risk management and governance. Participants will share their experiences, challenges, and best practices, and explore strategies for building a robust and collaborative approach to cyber risk management and governance
Misinformation and Beyond: How To Measure the Impact of the New Cyber Threats of 2025
with VerizonCyber Risk assessment can be both art and a science. But what if we could eliminate the guesswork? Like industries that specialise in risk quantification, organisations must understand the impact of cyber threats on their risk and compliance, especially with the next layer of threat from misinformation and disinformation in the AI era. A continuous, programmatic cyber risk assessment is required that enhances decision-making at the board level, and shows an organisation where to deploy its resources most efficiently.
Join Verizon risk consulting and insights experts, backed by the Verizon Threat Research Advisory Centre (VTRAC), to gain leading insights in cyber risk quantification. VTRAC is renowned for its deep analysis of cyber breach and incident trends and publishes the annual global Data Breach Investigations Report (DBIR) now in its 17th year, which reflects the evolving landscape that today’s CISOs must navigate.
Putting Zero Trust to Work
Kylie Watson - Head of Cyber Security at DXC Technology Nick Jackson - Security Offerings Leader & Centre of Excellence at DXC Technology

While Zero Trust is essential for securing today’s distributed workforce and cloud-first environments, implementation remains a major challenge.
Transitioning from legacy architectures requires rearchitecting security controls, modernising applications, and segmenting data. A lack of standardised frameworks creates uncertainty, complicating vendor integration. Poorly implemented Zero Trust strategies can disrupt business operations, degrade user experience, and introduce new security gaps rather than closing them.
Additionally, ongoing policy management and enforcement require continuous optimisation to keep pace with evolving threats and business needs. Without a clear, structured approach, many organisations struggle to realize the full security benefits of Zero Trust while minimising risk and operational friction.
DXC’s global footprint and extensive experience with large enterprises enables us to understand, cater to, and seamlessly implement zero trust models for organisations worldwide. DXC brings real-world zero trust expertise, having modernised and deployed its own zero trust network for over 130,000 employees globally.
Join us to hear about DXC’s journey with Zero Trust, and we’ll share best practices with the group on how to:
- Assess your current maturity posture.
- Enforce strong identity controls (IAM, MFA, continuous authentication).
- Implement micro-segmentation to reduce your blast radius
- Monitor and respond to threats with AI-driven analytics.
- Adopt Zero-Trust Network Access (ZTNA) instead of traditional VPNs.
Enhancing Cybersecurity Through Advanced Observability Strategies
Damien Mathieson - Field CISO at Splunk
In today’s complex digital landscape, ensuring robust cybersecurity is paramount. This session dives deep into how advanced observability strategies can empower your organization to not only detect threats early but also stay ahead of them. Gain actionable insights into strengthening your security posture with cutting-edge tools and techniques.
This roundtable session will delve into key industry insights, ensuring you and your peers are equipped to stay ahead of emerging threats:
- Deep Observability for Total Network Visibility: How comprehensive monitoring can transform your cybersecurity approach.
- Zero Trust + Observability: Integrating observability into Zero Trust architectures for unbeatable defence.
- AI-Driven Threat Detection: Leveraging the power of AI to identify risks before they become threats.
Join industry experts and peers in exploring the advanced observability strategies that will shape the future of cybersecurity
Peer Networking Seated Lunch
AWS Lunch Roundtable: Building a Culture of Security
Pratima Singh - Security Specialist Solutions Architect at AWS
Since day one, AWS has deeply invested into the culture of security. Security is prioritised by our leadership and built into our organizational structure. Everyone, regardless of role, views security as a shared responsibility. Strong security at the core of an organization enables digital transformation and innovation. AWS helps organisations to develop and evolve security, identity, and compliance into key business enablers.
Join AWS Pratima Singh – Security Specialist Solutions Architect along with your peers over lunch for a moderated debate on practical ways to lead this in your business.
Meet a Cyber Visionary: From the CIA to the Cloud, to AI in SecOps
William MacMillan - Former CISO of the CIA | Former SVP for Info Sec at Salesforce
A private boardroom conversation over lunch with William MacMillan, former CISO of the CIA and former SVP for Information Security at Salesforce, now Chief Product Officer at Andesite. Join us as William shares unparalleled insights from a career at the intersection of national security and corporate cybersecurity. Moderated by Kate Middleton – Partner at Deloitte with 15 Cyber peers.
ADAPT Executive Insight Roundtables - Share with confidence under the Chatham House Rule
Attend your pre-selected roundtable to participate in a peer discussion with confidence under Chatham House Rule moderated by an ADAPT analyst with subject matter experts.
Protect Your Organisation from Identity-Based Attacks
Brett Winterford - Regional CISO at Okta Byron Pogson - Senior Security Architect at AWS

Today’s IT and security leaders know that the evolving digital landscape presents both unprecedented opportunity and unprecedented risk. Your digital blast radius includes users, devices, networks, applications, and data, making organisations vulnerable to malicious activity. Malicious actors often exploit the weakest link – people – to launch attacks (did you know that 89% of web app attacks stem from credential abuse?).
Join us for an engaging session where we’ll delve into the five most prevalent identity attacks targeting users today, and provide tactical guidance on best practices for mitigation. We’ll discuss the what, how, and why for these attacks and equip you with straightforward yet powerful security techniques to stay ahead of threat actors. Expect actionable information to help you regardless of your IT stack!
Strengthening your Human Firewall: Effective Strategies for Managing Human Risk
Joe Gillett - Director at KnowBe4
This session will explore the evolving landscape of human risk management (HRM) in cybersecurity. Participants will engage in discussions about current strategies used by organisations to address human risk, how this is integrated into their broader security frameworks, and effective methods for measuring success. Additionally, we will also explore how AI is influencing human risk management, both as a tool for enhancing security measures and as a potential vector for new threats.
AI-Powered Threats: How Attackers Are Using AI Against You – And How to Fight Back
with AkamaiArtificial Intelligence is revolutionizing cybersecurity—but not just for defenders. Attackers are rapidly leveraging AI to enhance phishing, automate malware development, evade detection, and exploit vulnerabilities at unprecedented speed and scale.
Exactly how are cybercriminals using AI to bypass traditional security measures, and what steps can CISOs take to mitigate these evolving risks?
Join this roundtable discussion to explore real-world examples of AI-driven threats.
Learn amongst peers how adversaries are weaponizing AI and what security leaders must do to adapt their defences. We’ll discuss proactive strategies, from AI-powered threat intelligence to zero-trust architectures, to ensure your organization stays ahead.
Autonomous Cybersecurity: Empowering CISOs to Stay Ahead
Wayne Phillips - Field Chief Technology Officer at SentinelOne
SentinelOne, a leader in autonomous cybersecurity solutions, joins ADAPT’s Peter Hind to host an exclusive roundtable for CISOs. This one-hour session will delve into cutting-edge strategies powered by AI and machine learning, enabling organisations to proactively detect and respond to advanced threats. Discover how SentinelOne’s innovative approach empowers CISOs to safeguard critical assets and revolutionize their security posture in an ever-evolving digital landscape.
Afternoon Break
An opportunity to meet with other attendees and build your network
Embracing Our Adaptive Intelligence
Andrea Clarke - Work Futurist & Author at FutureFit
Great leaders & learners are defined by one trait: the ability to understand what is changing around them, and adapt. Andrea shares the new, expanded role of adaptability for modern leaders, and three practical ways to get started on building your AQ to shift from reacting & responding to change – to anticipating & shaping it.
This will be of specific value to leaders in IT Security – to help deal with the unique challenges of the role.
Andrea is a Work Futurist who encourages people to adapt to change more effectively so they can be ‘future fit’ for their work/life.
One year before the pandemic, Andrea released her first award-winning book, ‘Future Fit: How to Stay Relevant and Competitive in the Future of Work’ – winner of the Australian Business Book of the Year 2019 and finalist in the UK Business Book Awards 2020.
She founded Future Fit Learning in 2012 – a small business that builds leaders who drive innovation, growth and cultural change by accelerating the ‘real skills’ needed to lead with impact. Through her programs, Andrea and her team have helped major organisations develop leaders at all levels.
Her 2nd book, “Adapt” is out soon.
Winning the Boardroom: Helping Businesses Lead, Not Just Comply
Darren Argyle - Former Group Chief Information Security Risk Officer at Standard Chartered Bank
In an era of mounting regulatory pressure and rising cyber threats, many organisations struggle to balance compliance with true leadership. Boards and regulators want assurance, clarity, and confidence—but too often, cyber and risk leaders fail to bridge the gap between technical jargon and actionable business impact. This keynote offers a roadmap for attendees to gain influence, avoid fines, and transform their organisations into the go-to examples of excellence in cyber resilience and delivering business value.
This workshop session will give you:
• Practical Tools: leave with a clear framework for engaging stakeholders, simplifying complex risks, and demonstrating business value.
• Real Outcomes: Darren shares how he helped go from regulatory scrutiny to trusted leadership by building confidence with the regulators.
• Relatable Lessons: Through storytelling, he’ll bring to life the challenges and triumphs of working with boards, regulators, and resistant stakeholders.
Key Takeaways:
1. How to Get Off the Naughty List: Proven strategies to regain regulators’ confidence and avoid costly fines or oversight.
2. Building Boardroom Influence: Practical steps to become a trusted advisor and align cybersecurity with business goals.
3. From Compliance to Leadership: Lessons on how to shift from simply “meeting standards” to setting them, becoming the example others follow.
Darren Argyle is a seasoned cybersecurity leader with executive roles spanning Standard Chartered Bank, Qantas Airlines, iCare and S&P Global.
Recognised for his contributions to the industry, in 2023 Darren secured a CSO30 award for the third consecutive year, along with the inaugural CSO30 Leadership Award. He was named a Top 100 CISO in 2022 + 2017, awarded “Innovator of the Year” by SANS (2022), “Outstanding Cybersecurity Professional” by the Cyber OSPAs (2022) and listed among the top 100 IT security influencers in 2018. Author of best seller “The Cyber Leadership Imperative”
Summary & Closing Comments
Security Edge Peer Networking Drinks
An opportunity to stay, mingle and meet other attendees over drinks and food and discuss the day.