Learn from the Experts
6th November, 2025
SYDNEY
Features Speakers
Guarding the Digital Frontier : Data level Protection in a Borderless Ecosystem
As organisations embrace a digital-first ecosystem, data no longer stays confined within traditional perimeters. It flows across clouds, devices, and 3rd parties networks. Thus, creating both opportunity and risk. The challenge of data sprawl, shadow IT, and evolving regulatory requirements means that perimeter-based defenses are no longer sufficient. This talk explores how data-level control, embedded directly with the data itself, can provide continuous protection of data regardless of where it travels or where it resides. By adopting strategies such as access control, persistent obfuscation, security policies, and context -aware discovery & classification, organisations can balance security with usability. Attendees will gain insights into how to move beyond network and device centric defenses, toward a more holistic approach where security travels with the data, ensuring trust, compliance, and visibility in an increasingly borderless digital ecosystem.
Takeaways from this talk
Why Perimeters Fail in a Borderless World Understand how data sprawl, cloud adoption, and digital ecosystems contradict with traditional security boundaries.
Guide to the OWASP Top 10 for LLMs
As organizations rapidly adopt Large Language Models (LLMs) for everything from customer service chatbots to code generation, security vulnerabilities are emerging that traditional cybersecurity frameworks don’t address. This presentation provides a comprehensive overview of the OWASP Top 10 for LLMs, the security framework for AI applications.
Takeaways from this talk
Understand all 10 critical vulnerability categories from prompt injection to supply chain attacks.
Learn to identify these risks in real-world deployments.
Panel Discussion Speaker
Cayley Wright
Cayley is a senior technology and cyber security leader with experience spanning defence, energy, and critical infrastructure. She has led major cyber transformation programs based on threat led architecture. Her focus is on aligning people, process, technology, and intelligence to build practical, resilient security operations that support both regional autonomy and global governance.