AISA Security Days 
Learn | Connect | Inspire
Home
SydneySEC
AdelaideSEC
PerthSEC
AISA Security Days 
Learn | Connect | Inspire
Home
SydneySEC
AdelaideSEC
PerthSEC
More
  • Home
  • SydneySEC
  • AdelaideSEC
  • PerthSEC
  • Home
  • SydneySEC
  • AdelaideSEC
  • PerthSEC

SydneySEC Workshops

From navigating the cyber risk landscape and leveraging AI for defence, to managing a cyber incident with confidence, these sessions are designed to equip you with actionable skills and real-world insights from top industry leaders. Whether you're building your foundation or sharpening your edge, this is where cyber resilience begins. 


Workshops attendance is limited however no need to pre book. First in on the day.

Today's AI Security Trifecta

First session: 10:45am - 12:15pm 

Second session:  1:15pm - 2:45pm 

(noting the same workshop will be repeated)

Location: Level 2 - Rooms 3&4


Serious organisations have been very deliberate and purposeful as they integrate AI capabilities into their cybersecurity processes, workflows, and technologies. Yes, practical AI usage is a bit tentative. But, that doesn't mean AI is not being used in serious way.


Note: workshop attendees will need to BYO a device to participate 

Facilitator

Dr James Stanger, Chief Technology Evangelist, CompTIA

 

Workshop Overview

Join CompTIA's Chief Technology Evangelist, Dr. James Stanger, for a session that delves in to practical AI cyber security integration. He will demonstrate how organisations worldwide recognise the "AI implementation trifecta." First, AI needs to be protected. Second, it can be used to make operations more efficient. Third, attackers are using it to evolve their techniques. We're going to do more than just talk about AI and cyber security. We're going to do a bit of creating in the short time we're together.


First, Dr. Stanger will start his presentation with a speedy overview of AI types, as well as the four modes of AI interaction. He will then outline the first part of the trifecta: Using AI to enhance existing cyber security efforts. He will lead students as they all experiment with a practical Convolutional Neural Network (CNN) to process image-based threat data. Then, the audience will use a Logical Language Model (LLM) to analyse threat feed data. All the while, we will evaluate if AI has contributed to this particular workflow. Audience members will learn about how security analysts are using the Model Context Protocol (MCP) to enhance how AI works.


For the second part of the trifecta, James will investigate the steps organisations are taking to secure their actual AI systems. This is somewhat different than using AI to improve cybersecurity. In this part of the session. Instead, we will analyse threat data and analyze attack patterns on a working AI solution. One of the key elements will involve how protecting AI emphasises the “I” portion of the CIA triad. Again, we'll investigate practical ways to do this; we'll go right into practice, and not waddle in theory.


Finally, the session will investigate how attackers are using AI. James will show how attackers are using AI tools in much the same way attackers have used legitimate tools such as VirusTotal to create more potent attacks. This part of the investigation will include social engineering and prompt attacks involving zero-shot-one-shot, and few-shot prompts.

Workshop Participation/Takeaways

Key take-away is that audience members will be able to differentiate between hype-based AI claims and actual, practical use of AI: Workers are still confused about the types of AI being used, and how to best interact with each method. Second, students will learn about fundamental changes in perspective are necessary to protect AI. One of them is that integrity of data becomes paramount. Another is the importance of real-time monitoring, and the adjacent skills often lumped under the phrases, "security analytics" and "zero trust."

The Cyber Compass

Time: 10:45am - 12:15pm

Location: Level 2 - Room 5&6


The Cyber Compass - Navigating today's tides, charting tomorrow's course, and mastering the enduring horizon

Expert Panellists

  • Mark Tims, Partner, KPMG
  • May Lam, Group CIO, Australian Payment Plus
  • Roxanne Pashaei, Director - Cyber Security Operations, Western Sydney University
  • Andrew Webster, Group CISO, BlueScope Steel
  • Martijn Verbree, CIRO, CBA


Workshop Overview

 In our fast-paced digital world, cyber security isn't just about reacting, it's about leading with foresight. Join us, and a panel of top cyber executives, as we unveil The Cyber Compass. 


This framework helps us tackle the 'Now' – immediate challenges like privacy, data breaches, and complying with the SOCI Act, all while making Board reports genuinely clear. We'll then look to the 'Next' – upcoming shifts, including AI's evolving role, new digital frontiers, and the strategic implications of Quantum Computing. Finally, we'll focus on the 'Enduring Horizon' – those timeless, impact-reducing principles like cyber resilience, least privilege, and Zero Trust that always matter. 


Get ready for a practical, engaging session that will strengthen your cyber capabilities and empower you to lead with confidence.

Workshop Participation/Takeaways

 Throughout the session, we'll actively involve you, our audience, through live polling and interactive exercises. This means you'll have the chance to weigh in on key strategic dilemmas and see how your priorities align with those of your peers and our expert panel. To close, we'll have a dynamic, quick-fire round with our panellists, giving each of them a final opportunity to share their biggest takeaway or call to action. This session is designed to provide you with a clearer 'Cyber Compass' to navigate today's complexities and strategically prepare for tomorrow's opportunities 

Effective Incident Response: How to Manage Every Element of a Cyber Crisis

Time: 1:15pm - 2:45pm

Location: Level 2 - Room 5&6


 This workshop will simulate the first 72 hours of an incident. Experienced incident responders will work through key decisions with attendees to be made and equip you to walk away with assets to take back to the business.

Expert Panellists

  • Darren Hopkins, Partner, McGrathNicol
  • Honi Rosenwax, CEO, Arize
  • Robyn Adcock, National Placement Manager Cyber and Technology, AJG


Workshop Overview

In this pragmatic workshop, you'll step into the critical first 72 hours of a simulated cyber incident. Drawing on first hand experience from incident responders, the workshop has be expertly crafted by experienced cyber, insurance, and communications managers. 

The workshop will guide you through the key decisions, communications, and leadership actions required during a high-pressure cyber event including critically, how key decisions made during the first 72 hours will determine the overall outcome of the event.

Workshop Participation/Takeaways

By the end of the session, you’ll walk away with practical assets you can immediately apply in your business—tools to strengthen your cyber response posture and lead with confidence when it matters most.

Australian Information Security Association (AISA) Ltd 

Level 8, 65 York Street, Sydney NSW 2000 | 02 8076 6012 | ABN: 18 171 935 959 

 www.aisa.org.au | events@aisa.org.au


Copyright © 2025 AISA Sec Days All Rights Reserved

This website uses cookies.

We use cookies to analyse website traffic and optimise your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept