Wed 25 Mar 2026
View event detailsRegistration: Networking Session
8:00 AM - 8:45 AM (45 mins)
PSN opening
8:45 AM - 9:00 AM (15 mins)
Chair opening
9:00 AM - 9:10 AM (10 mins)
Ministerial Address
9:10 AM - 9:20 AM (10 mins)
Securing Innovation Without Stalling It
9:20 AM - 9:40 AM (20 mins)
- Navigating the tension between agility, security and compliance in public sector transformation
- Embedding cyber risk thinking into digital service delivery and emerging tech rollouts
- Building a shared language between delivery, risk and security teams to support bold, safe innovation
Protecting Critical Infrastructure from Current Threats
9:40 AM - 10:00 AM (20 mins)
Operational Technology & Cyber – Bridging the Visibility Gap
10:00 AM - 10:30 AM (30 mins)
- Addressing vulnerabilities in legacy OT systems
- Securing smart infrastructure and IoT environments
- Practical use cases from transport, health, and utilities
From Data Breach to Data Trust: Securing Victoria’s Information Assets
10:30 AM - 10:50 AM (20 mins)
Morning Tea
10:50 AM - 11:20 AM (30 mins)
Opening from Track Chair
11:20 AM - 11:30 AM (10 mins)
Opening from Track Chair
11:20 AM - 11:30 AM (10 mins)
Cyber Readiness for AI – Securing the New Threat Vector
11:30 AM - 11:50 AM (20 mins)
- Understand how generative AI is changing the landscape
- Explore AI-specific risks in public sector contexts and adhere to regulations.
- Learn how to build security guardrails for AI use in government
Cyber Incident Response for Non-Techies (Trekkies are however very welcome!)
11:30 AM - 11:50 AM (20 mins)
- Discussion on past incidents, both internal and 3rd party, that VLA have had to manage
- Key lessons learnt from an organisation that supports some of Victoria's most vulnerable people
- Some advice on key areas of prior planning to have in place to help manage this type of event
- And most importantly in the words of Douglas Adams - Don’t Panic.
Supply Chain Blind Spots: Tackling Third-Party Risk in Government
11:50 AM - 12:10 PM (20 mins)
AI vs. AI: Defending Government Systems Against Machine-Driven Attacks
11:50 AM - 12:10 PM (20 mins)
Strengthening the Human Layer – What Next in Cyber Awareness & Behavioural Risk?
12:10 PM - 12:38 PM (28 mins)
- Addressing cyber fatigue
- Applying behavioural science to build secure habits
- Empowering employees to act as the first line of defence
Modernising IR Plans – Getting to First Response Faster
12:10 PM - 12:40 PM (30 mins)
- Reducing time-to-response across large agency environments
- Leveraging simulation, threat modelling, and tabletop exercises
- Aligning IR with ASD guidance and state recovery priorities
Secure-by-Design Cloud Transformation for Victorian Agencies
12:40 PM - 1:00 PM (20 mins)
Identity at the Core: Securing Access in a Borderless Government
12:40 PM - 1:00 PM (20 mins)
From Compliance to Confidence: Embedding Cyber Governance into Everyday Decision-Making
1:00 PM - 1:20 PM (20 mins)
- How Victorian agencies can move beyond ticking regulatory boxes to building a proactive, organisation - wide security culture.
- Integrating cyber risk considerations into policy, procurement, and strategic planning.
- Ensuring governance frameworks are agile enough to respond to emerging threats and evolving regulations
Identity and Access Management with Alfred Health
1:00 PM - 1:20 PM (20 mins)
Managing digital identities in complex health environments is critical to protecting sensitive information and ensuring frontline staff have fast, secure access to the tools they need. This session explores Alfred Health’s approach to strengthening cyber resilience through modern Identity and Access Management (IAM).
Key Takeaways:
- Strengthening Zero Trust foundations to protect sensitive data.
- Balancing clinician usability with compliance requirements.
- Integrating IAM across systems to boost resilience and response.
Lunch
1:20 PM - 2:20 PM (60 mins)
AI Governance in Government: Balancing Innovation and Regulation
2:20 PM - 3:20 PM (60 mins)
The public sector faces both opportunity and risk with generative AI. This session explores how to set guardrails, audit AI models, and align with Australia’s emerging critical infrastructure legislation.
From Data Breach to Data Trust: Securing Citizen Information
2:20 PM - 3:20 PM (60 mins)
Data is government’s most sensitive asset. This session explores advanced approaches to encryption, classification, and data sovereignty that protect citizen trust while enabling safe data use.
Cloud Security Without Compromise
2:20 PM - 3:20 PM (60 mins)
Meeting Compliance and Agility Goals: Government is under pressure to innovate quickly while maintaining strict compliance. This session demonstrates how cloud security can enable speed and resilience without creating policy or compliance gaps.
Zero Trust in Action
2:20 PM - 3:20 PM (60 mins)
Safeguarding Victoria’s Digital Future: Explore how zero trust frameworks can be practically implemented across departments, from legacy systems to modern cloud platforms. The session highlights lessons learned from government rollouts and vendor expertise in enabling secure, identity-first operations.
AI vs. AI: Defending Government Systems Against Machine-Driven Attacks
2:20 PM - 3:20 PM (60 mins)
With adversaries weaponising AI, agencies must evolve their defences. This session examines how AI/ML can detect, predict, and counter novel threats faster than human-only teams.
Operational Technology Security
2:20 PM - 3:20 PM (60 mins)
Bridging IT–OT Risk Gaps: Victorian utilities and transport networks increasingly rely on connected OT. This session shows how security frameworks can protect critical infrastructure from AI-enabled attacks without disrupting essential services.
Identity at the Core: Securing Access in a Borderless Government
2:20 PM - 3:20 PM (60 mins)
How Victorian agencies can strengthen identity and access management to prevent breaches, enforce zero trust, and balance compliance with seamless citizen and workforce access.
How to Elevate Third-Party Risk Management Beyond a Tick-Box Exercise
3:20 PM - 3:40 PM (20 mins)
Many agencies still treat TPRM as a compliance exercise, leaving critical gaps in their cyber posture. This session will explain why adopting a strategic, risk-led approach to TPRM is essential for strengthening your overall cyber strategy.
- Understanding supply chain risk
- Avoiding common pitfalls when implementing TPRM
- Practical tips for implementing TPRM with business impact
- Learn what the Victorian Government is doing to help agencies better manage supply chain risk
Governing at the Speed of AI: Ensuring Control, Accountability and Trust
3:40 PM - 4:10 PM (30 mins)
- How can Victorian agencies implement guardrails that keep pace with rapid AI adoption while maintaining compliance and citizen trust?
- Ensuring AI use remains transparent, ethical and accountable across government services?
- How do leaders strike the balance between innovation and responsibility when technology advances faster than policy?
Closing Remarks
4:10 PM - 4:20 PM (10 mins)
Networking Drinks
4:20 PM - 5:30 PM (70 mins)