Skip to main content

Agenda

Thu 10 Sep 2026

View event details
8:00AM

Registration, Coffee & Hellos

8:00 AM - 8:45 AM (45 mins)

Settle in, grab a coffee, and meet a few friendly faces before we begin.

8:45AM

Welcome & How to Make the Most of Today

8:45 AM - 9:00 AM (15 mins)

A short welcome, plus a few quick tips to help you connect, share, and get real value from the day. We’ll also run a couple of quick polls to see what everyone’s interested in and what people are working on right now.

9:00AM

Chair's Opening Remarks

9:00 AM - 9:10 AM (10 mins)

A short briefing from the Chair to get everyone aligned, comfortable, and ready for a great day of ideas and connection.

9:10AM

Ministerial Address

9:10 AM - 9:19 AM (9 mins)

Honourable Steven Minnikin MP Minister for Customer Services and Open Data and Minister for Small and Family Business, Queensland Government
9:20AM
Keynote

Turning Strategy into Action: Advancing Queensland’s Cyber Security Priorities

9:20 AM - 9:40 AM (20 mins)

Guillaume Noe Executive Director, Cyber Resilience, Department of Customer Services, Open Data and Small and Family Business

As Queensland continues to implement its Cyber Security Strategy, attention is shifting from policy and planning to delivery across government systems, services and infrastructure. This session will explore how agencies are progressing key initiatives, strengthening coordination across government, and embedding cyber security into digital service delivery. It will highlight early progress, emerging lessons and how Queensland can sustain momentum as cyber threats continue to evolve.

  • Strengthening whole-of-government coordination to accelerate cyber maturity across agencies
  • Progress and lessons emerging from early implementation of Queensland’s cyber priorities
  • Embedding cyber security into the design and delivery of digital government services
  • Sustaining momentum and capability as Queensland prepares for an increasingly complex cyber environment
9:40AM

Industry Insights

9:40 AM - 10:00 AM (20 mins)

10:00AM
Keynote panel

Vendors, Platforms, Partners: Strengthening Resilience and Response Across the Supply Chain

10:00 AM - 10:20 AM (20 mins)

Critical infrastructure operators increasingly rely on vendors, cloud platforms, and digital partners, expanding risk well beyond the agency perimeter. This panel explores how to manage third-party exposure while strengthening OT security, improving detection and response, and building trusted collaboration across government and industry.

  • Managing supply chain and third-party cyber risks as operators rely more heavily on external vendors and digital platforms
  • Securing OT environments as energy, transport and utilities systems become increasingly connected to digital networks
  • Strengthening real-time monitoring and incident response to minimise disruption to essential services
  • Improving threat intelligence sharing and collaboration between government, operators, and cyber security partners
Tim Gall
Chief Information Security Officer & Executive Director Governance Cyber and Policy, Queensland Department of Education
Leigh Dixon
Cyber Security Lead, Department of Justice
Jack Cross
Chief Information Security Officer, Queensland University of Technology
Mary-Jane Phillips
Cyber Security, Governance, Risk and Compliance, Queensland Treasury
10:20AM

Industry Insights

10:20 AM - 10:50 AM (30 mins)

10:50AM

Morning Tea & Mingling

10:50 AM - 11:29 AM (39 mins)

Perfect time to swap notes and compare what’s working across teams and sectors

11:30AM
Keynote

Human Error, Real Harm: Rethinking Risk and Response Under MNDB

11:30 AM - 11:50 AM (20 mins)

Alexander White Queensland Privacy Commissioner, Office of the Information Commissioner

MNDB is now one year in and has recently been extended to local government, with agencies beginning to see its real-world impact. While the framework itself is clear, applying it in practice is proving more complex—particularly when it comes to assessing breaches, determining what constitutes “serious harm,” and coordinating effective responses. These challenges are reshaping how agencies approach breach management and accountability, while driving more consistent and coordinated decision-making during incidents.

  • Applying MNDB in practice: assessing breaches and determining “serious harm”
  • Strengthening breach response, incident management and coordinated decision-making
  • Embedding risk assessment and secure-by-design to build resilient digital services
  • Enhancing whole-of-government collaboration to strengthen resilience and maintain public trust
11:50AM

Industry Insights

11:50 AM - 12:09 PM (19 mins)

12:10PM
Panel discussion

Securing Brisbane 2032 on the World Stage: From Global Insight to Local Execution

12:10 PM - 12:40 PM (30 mins)

Paula Robinson Chief Corporate Services Officer, Brisbane Organising Committee for the 2032 Olympic and Paralympic Games

The Brisbane 2032 Olympic and Paralympic Games will place Queensland’s digital infrastructure under unprecedented global attention, with critical services—from ticketing and broadcasting to transport and public safety—required to operate securely under sustained scrutiny. The scale and sophistication of cyber threats, combined with a highly distributed ecosystem of platforms and partners, is reshaping how risk is managed in a live event environment. Lessons from recent Games highlight the need to better manage supply chain exposure, integrate physical and cyber security, and strengthen real-time response to ensure secure delivery at scale.

  • Preparing for cyber incidents at scale, including coordinated response, recovery and third-party risk management to maintain continuity and public trust
  • Translating global event experience into securing critical systems — from ticketing and broadcasting to transport and public safety — under sustained global scrutiny
  • Strengthening real-time monitoring, threat detection and cyber operations, informed by how large-scale events are managed in practice
12:40PM

Industry Insights

12:40 PM - 1:00 PM (20 mins)

1:00PM
Fireside Chat

Beyond the Firewall: Why Culture, Trust and Human Behaviour Define Cyber Resilience

1:00 PM - 1:20 PM (20 mins)

Dr Magid Fahim Chief Clinical Information Officer, Metro North Health
Cindy McQualter Director of Delivery, Cyber Security Unit

As cyber threats continue to evolve, organisations are increasingly recognising that resilience extends beyond technology alone. While systems and infrastructure remain critical, many of the most significant vulnerabilities—and opportunities for strengthening resilience—sit within people, behaviours and organisational culture. The limitations of tool-led approaches, combined with the realities of user behaviour in complex environments, are reshaping how cyber risk is understood and managed. This shift is placing greater emphasis on trust, leadership and accountability as essential components in delivering secure, resilient services.

  • Moving beyond a technology-first mindset: why tools alone cannot mitigate cyber risk
  • Understanding human behaviour as a core driver of vulnerability and resilience
  • Embedding a culture of security through education, accountability and leadership
  • Balancing trust, usability and safeguarding in the delivery of digital services
1:20PM

Lunch: Wander, Discover, Connect

1:20 PM - 2:20 PM (60 mins)

Grab lunch, have a wander, and chat with industry partners and peers about practical ideas you can take back to work. Arguably the most important part of the day!

2:20PM
Roundtables

Roundtable 1: AI Governance in Government: Balancing Innovation and Regulation

2:20 PM - 3:20 PM (60 mins)

The public sector faces both opportunity and risk with AI. This session explores how to set guardrails, audit AI models and align with South Australia's emerging critical infrastructure legislation.

2:20PM
Roundtables

Roundtable 2: From Data Breach to Data Trust: Securing Citizen Information

2:20 PM - 3:20 PM (60 mins)

Data is government’s most sensitive asset. This session explores advanced approaches to encryption, classification and data sovereignty that protect citizen trust while enabling safe data use.

2:20PM
Roundtables

Roundtable 3: Cloud Security Without Compromise: Meeting Compliance and Agility Goals

2:20 PM - 3:20 PM (60 mins)

Government is under pressure to innovate quickly while maintaining strict compliance. This session demonstrates how cloud security can enable speed and resilience without creating policy or compliance gaps.

2:20PM
Roundtables

Roundtable 4: Zero Trust in Action: Safeguarding Queensland's Digital Future

2:20 PM - 3:20 PM (60 mins)

Explore how zero trust frameworks can be practically implemented across departments, from legacy systems to modern cloud platforms. The session highlights lessons learned from government rollouts and vendor expertise in enabling secure, identity-first operations.

2:20PM
Roundtables

Roundtable 5: AI vs. AI: Defending Government Systems Against Machine-Driven Attacks

2:20 PM - 3:20 PM (60 mins)

With adversaries weaponising AI, agencies must evolve their defences. This session examines how AI/ML can detect, predict and counter novel threats faster than human-only teams.

2:20PM
Roundtables

Roundtable 6: Operational Technology Security: Bridging IT–OT Risk Gaps

2:20 PM - 3:20 PM (60 mins)

Utilities and transport networks increasingly rely on connected OT. This session shows how security frameworks can protect critical infrastructure from AI-enabled attacks without disrupting essential services.

2:20PM
Roundtables

Roundtable 7: 84% of Breaches Start with Identity — Securing Access in a Borderless Government -

2:20 PM - 3:20 PM (60 mins)

The traditional network perimeter has dissolved. Government is now borderless - spanning contractors, partners, legacy platforms, SaaS, and emerging AI systems. With the majority of breaches originating from compromised or misused credentials, identity has become the primary control point for cyber resilience.

This roundtable will explore how agencies can reduce breach risk by improving identity visibility, enforcing least privilege, and operationalising zero trust in complex environments. Discussion will also address the challenge of balancing compliance obligations with seamless access, while managing cost pressures and operational efficiency.

3:20PM
Keynote

National Coordination in a Complex Threat Landscape with NOCS

3:20 PM - 3:40 PM (20 mins)

As cyber threats grow in scale and coordination, strengthening alignment between federal leadership and state delivery is critical to protecting essential services and national interests. This keynote explores how Queensland is working with the National Office of Cyber Security to enhance visibility, coordination and response across jurisdictions.

  • Strengthening cross-jurisdiction coordination - Improving how federal and state agencies align on threat intelligence, response and shared priorities.
  • Lifting national visibility of cyber risk and enhancing situational awareness to support faster, more informed decision-making across government.
  • Coordinating response to protect critical services
3:40PM
Panel discussion

The Future of Encryption: Preparing Government for the 2030 Post-Quantum Shift

3:40 PM - 4:10 PM (30 mins)

Craig Costello Professor of Cryptology, Queensland University of Technology

As quantum computing accelerates, the security foundations that underpin today’s digital government are being fundamentally challenged. With a national shift towards post-quantum cryptography mandated by 2030, government agencies must begin preparing now to ensure sensitive data, critical infrastructure and citizen services remain secure in the decades ahead.

  • What the 2030 post-quantum mandate means for government policy, systems and long-term data security
  • Identifying cryptographic risk across legacy systems, infrastructure and supply chains
  • Preparing for “harvest now, decrypt later” threats and protecting sensitive data over time
  • Embedding cryptographic agility into digital infrastructure, procurement and transformation programs
  • Building a practical roadmap for transitioning to quantum-safe encryption across government
4:10PM

Closing Remarks: What We're Taking With Us

4:10 PM - 4:20 PM (10 mins)

We’ll pull out a few highlights from the day, share what’s coming next, and point you to ways to stay connected.

4:20PM

Networking Reception: Stay for a Chat

4:20 PM - 5:20 PM (60 mins)

Wrap up the day with good conversation and a few new connections. Thanks for making GIW your one-stop shop for benchmarking, industry updates, and great conversations.

Questions?

See our FAQs or get in touch

Ready to register?

Registration is free for government