-
CISO NEW ZEALAND - DAY ONE
-
08:30
Register; grab a coffee. Mix, mingle and say hello to peers old and new.
-
09:00
Ngāti Whātua Ōrākei - Mihi Whakatau by Te Aroha Grace
-
09:10
Welcome from Corinium and the Chairperson
Adwin Singh - Cybersecurity Domain Lead – CISO Office - Inland Revenue NZ
-
09:20
Speed Networking - Making New Connections!
In this 10-minute networking session, the goal is to connect with three new people. Enjoy the opportunity to expand your network! -
09:30
Navigating the Threat Landscape to Explore the Strategic Path Forward
Sarah Penman - Director of Enterprise Information Security NCSC & CISO - GCSB
Drawing on frontline reporting and incident trends, NCSC outlines the current state of New Zealand’s threat landscape covering what’s changing, what’s persistent, and what’s coming next. This session offers clarity on the risks facing Kiwi organisations and where leaders should focus attention to stay ahead.
- The latest threat activity observed across sectors and systems
- Patterns in attacker behaviour, tactics, and target profiles
- Strategic implications for detection, response, and sector-wide resilience
-
09:55
Enabling Secure Innovation Without Sacrificing Compliance: A Practical Zero Trust Playbook for CISOs
(Powered by the Platform Engineering Operating Model and the HashiCorp Security Stack)Andrew Brydon - Field CTO ANZ - HashiCorp
Join Andrew Brydon, Field CTO at HashiCorp, as he shares a Zero Trust playbook for CISOs to accelerate innovation without compromising compliance. Learn how identity-driven security, automation, and policy-as-code can secure multi-cloud environments, meet sovereignty requirements, and enable teams to move faster while staying audit-ready.
-
10:20
Panel: AI in Cyber – What Are We Really Talking About?
This panel unpacks where organisations are truly using AI, what’s working, what isn’t, and how leaders are separating hype from value in practical, risk-aligned ways.
- How would you assess the current level of AI implementation within your organisation?
- What challenges have you encountered in adopting AI, and how have you addressed them?
- What are the key criteria and considerations for evaluating AI technologies as part of a holistic cyber risk management strategy?
- What indicators or benchmarks should organisations consider evaluating the effectiveness of AI-driven cyber defence initiatives?
Moderator:
Jason Wood Chair ISACA Auckland
Panellists:
Deepak Veerasamy CISO Kainga Ora
Andy Pace Network & Information Security Manager MediaWorks
Francis Kaitano Enterprise Security Architect BNZ
Scott Morris Managing Director, Australia and New Zealand Infoblox
-
10:50
Get refreshed! Morning Coffee Break
-
11:20
Plenary Stage Interview: Decisions That Shaped a CISO's Leadership Journey
This one-on-one conversation delve into stories behind the decisions, inflection points and leadership lessons that have shaped their journey. From earning trust and building influence to navigating complexity under pressure, the dialogue explores what they might approach differently today and what they still stand by. More than frameworks and controls, this session reveals how the CISO role is defined by the judgement calls that matter, focusing on the personal side of leadership in one of the most high-stakes positions in any organisation.
Interviewee:
Colin James Head of Information Security, Risk Management & Network Services Southern Cross Health Society
Interviewer:
Bob Kombora Head of IT Operations Vulcan
-
11:45
The CISO’s AI Challenge: Balancing Speed and Security in Cloud-Driven Innovation
Senior representative - - Wiz
Security leaders are under pressure to secure AI-driven cloud environments at the speed of development. This session unpacks strategies for integrating security seamlessly into AI and cloud workflows, ensuring protection while enabling business agility.
-
12:10
Panel: Leading with Risk – How to Make Risk Your Ally
Risk can’t just be understood — it must shape decisions, drive priorities, and speak the language of the business. This panel discusses the keys to embed risk thinking into decision-making, repositioning as a powerful tool for alignment, influence, and long-term value.
- How are leading CISOs reframing cyber risk as business risk?
- What does effective risk communication look like – up, down, and across the organisation?
- How are leading CISOs using risk to manage conflicting prioritise and budget constraints?
- What does good cyber risk governance look like; how it will leave your teams feeling empowered?
Moderator
Kavita Chetty Senior Manager Technology Risk NZAA
Panelists
Ronald Chung Head of Risk (Information, Technology & Cyber Security) BNZ
Laura Marshall Head of Information Security LIC
Richard Harrison Head of Cyber & Architecture Foodstuffs SI
-
12:40
Operationalising AI in Cyber: Influence with Integrity
Corne Mare - CISO Australia - Fortinet
As AI rapidly transforms the cyber landscape, organisations face both unprecedented opportunities and new layers of complexity in defending against evolving threats. This session explores how to operationalise AI in cyber defence amid increasingly complex threat environments. Corne will unpack recent incidents impacting major organisations, examine practical ways to enhance cyber risk awareness and decision-making using AI and advanced monitoring tools and discuss how executives are navigating the unpredictable nature of AI - balancing innovation with integrity in every security decision.
-
13:05
Lunch
-
Track A: Leading Security Across the Enterprise
Adwin Singh - Cybersecurity Domain Lead – CISO Office - Inland Revenue NZ
-
14:05
Beyond Awareness: Activating Security through Safer Choices by Design
Marek Jawurek - Head of Cyber Security Advisory - Ampol
A cyber-conscious mindset and security-aware culture are non-negotiable. It is not just about ticking boxes with e-learning or phishing tests. Real success is when people instinctively make safer choices and even share tips with family and friends. That’s when culture truly sticks. This session explores practical ways to embed that mindset and turn everyday behaviours into security habits.
-
14:30
Secure Innovation, Not Slower Innovation: A Playbook for CISOs
Andrew Philp - Field CISO, ANZ - Trend Micro
Digital transformation and AI aren’t side projects; they’re the growth engines of modern organisations. But the pace of change creates a tension: how do CISOs enable innovation without becoming the brake pedal? In this session, we’ll explore a playbook for balancing ambition with assurance. Drawing on lessons from boardrooms and transformation programs across ANZ, we’ll unpack how to align cyber with business strategy, translate risk appetite into clear decision guardrails, and leverage AI safely to accelerate, not hinder, innovation. The result: a pathway where security isn’t a compliance afterthought, but a catalyst for resilient growth.
- How to align digital transformation goals with cyber strategy.
- Turning risk appetite into practical decision-making guardrails.
- Where AI can safely speed up both defence and innovation.
- Positioning cyber as an enabler of resilience and growth.
-
14:55
Cyber Crisis Leadership: Uniting Security and Leadership
Laura Jury - Resilience Specialist (Business Continuity) - Air New Zealand
Cyber incidents don't stay confined to the SOC — they quickly become whole-of-business events. This session explores how security leaders are aligning technical response with executive-level crisis management to ensure clarity, speed, and coordination when it matters most.
- The anatomy of cyber disruption from a senior leadership lens – what makes it uniquely difficult?
- How to build "muscle memory" for high-pressure response (beyond the plan)
- Bridging the gap between security experts and executive decision-makers
-
15:20
When Trust Becomes a Weapon: The Rise of Invisible Phishing Attacks
Toby Guthrie - Sales Engineering Manager APJ - Abnormal AI
Phishing attacks are increasingly outsmarting traditional defenses by hijacking trusted infrastructure like Microsoft’s Direct Send. These sophisticated threats first evade legacy email filters and then go a step further, bypassing even multi-factor authentication, to deliver dangerous emails directly to CxO inboxes. Leveraging hyper-personalised tactics and advanced social engineering, attackers circumvent email authentication checks and exploit internal mail flows—putting every executive’s mailbox at risk. Blocking obvious spam is no longer enough; today's phishing is invisible, relentless, and requires modern security strategies built for today’s evolving threat landscape. Toby Guthrie from Abnormal AI will share insights on real-world examples and targeted campaigns seen in the wild.
-
Track B: Technical & Operational Resilience
Tash Bettridge - Co-Founder - New Zealand Network for Women in Security (NZNWS)
-
14:05
The Unexpected Union: When GRC and Architects Come Together
Shawn Wang - Head of Cybersecurity Governance Risk & Architecture - Spark
Tick-box compliance is no longer enough. This presentation explores how organisations are moving beyond policy-driven approaches to build real and measurable cyber capability through their GRC functions. Learn how embedding technical thinking into risk frameworks, reporting and decision-making helps turn intent into action and drives stronger security outcomes.
-
14:30
When IAM is Targeted, Everything Changes
Ben Mudie - Principal Security Engineer - Tenable
Attackers are not "hacking in, they are logging in", they target your user accounts (like Active Directory) before anything else. Why? To break your recovery plans. This talk shows how they get in and how you can stop them.
-
14:55
Security Operations for Critical Infrastructure: Improving Visibility, Detection, and Resilience
Adarsh Lal - Security Operations Lead - Mercury NZ
Join Adarsh as he shares how security operations were enhanced within a critical infrastructure environment. This session will explore strategies for increasing log visibility in high-risk areas, aligning threat intelligence with detection workflows, and validating coverage through adversary simulation. It will also cover the application of structured frameworks to guide detection engineering, the use of meaningful metrics to track progress, and practical approaches to overcoming operational challenges.
-
15:20
AI in Threat Detection: The Practical Use Cases
Senior representative - - Qualys
AI is becoming a practical tool for detecting and validating threats at speed. This session explores how organisations are using AI to reduce alert fatigue, support overburdened analysts, and improve time to detection. Learn where AI is delivering real value, what pitfalls to avoid, and how to build trust in machine-led decisions.
-
15:45
Get refreshed! Afternoon Tea Break.
-
Track A: Leading Security Across the Enterprise (cont'd)
-
16:15
Beyond the Phishing Test: Effective Strategies for Managing Human Risk
Joe Gillett - Head of ANZ - KnowBe4
68% of all data breaches are due to human error, and despite significant investments in technical safeguards, phishing and social engineering attacks remain the #1 threat to your organisation.
This session will explore:
- The critical shift from traditional security awareness to human risk management (HRM).
- How social engineering and phishing—particularly via email—remain the primary vectors for breaches and ransomware, now amplified by AI technologies that make sophisticated attacks accessible to novice cybercriminals.
- Explore frameworks to quantify human risk, establish meaningful benchmarks, and provide clear metrics to measure success.
-
16:40
What CISOs Need to Ask in Today’s Identity-Driven, As-a-Service Environment
Ivan Reutskiy - GM Security - 2degrees
As organisations move to SaaS and cloud native or hybrid models, identity has become the new security boundary and a frequent source of risk when transitions expose gaps attackers are quick to exploit. This session explores the key questions CISOs should be asking, including:
- What’s really changing in how we manage and secure identity?
- What have we seen go wrong and how can it be avoided?
- Are we thinking clearly about trust, privilege, and lifecycle in cloud-based environments?
- How do we reduce complexity while maintaining control?
-
17:05
Track A Chair Closing Remark
Adwin Singh - Cybersecurity Domain Lead – CISO Office - Inland Revenue NZ
-
Track B: Technical & Operational Resilience (Cont'd)
-
16:15
Frog-Proof Security: Elevating DevSecOps for Tomorrow’s Challenges
Shani Levy - Senior Solutions Engineer - JFrog
What does the future hold for software supply chain security in 2026? As the types and volume of software entering organizations continue to evolve, DevSecOps teams face increasingly complex challenges, including:
- How can organisations effectively manage what enters their systems?
- How can remediation be accelerated without sacrificing accuracy?
- How will the rise of AI reshape our threat landscape, and can DevOps and security unite without adding friction?
In this session, we will explore key insights into the looming challenges of software supply chain security and how they will transform operational practices. By analysing recent high-profile supply chain attacks in npm, we will expose malicious threats and offer practical, actionable solutions to mitigate both current and emerging risks. As our attack surfaces shift alongside evolving technologies, join us to discover innovative strategies and capabilities that seamlessly reintegrate security into DevSecOps.
-
16:40
From Orchard to Firewall: Building Cyber Resilience Across the Supply Chain
Bryan Graham - CIO - Seeka
Cyber resilience doesn’t stop at the enterprise boundary — especially in a sector reliant on seasonal staff, contractors, and legacy tech. Join Bryan as he shares how one of Australasia’s largest horticulture businesses manages cyber risk across a complex, distributed operation.
- Managing cyber security across a sprawling, seasonal, and third-party-reliant operation
- Tackling the “unsexy” risks: shared passwords, insecure remote access, outdated SCADA/PLC systems
- Setting up vendor controls, contract guardrails, and alignment with business risk appetite
- Cultivating cyber awareness in an industry where IT is often invisible — until something breaks.
-
17:05
Track B Chair Closing Remark
Tash Bettridge - Co-founder - NZNWS
-
17:10
Cheers with Peers!
Not Found
-
CISO NEW ZEALAND - DAY TWO
-
08:30
Register; grab a coffee. Mix, mingle and say hello to peers old and new.
-
09:00
Day 2 Chair’s Opening Remarks
Denise Carter-Bennett - Co-Chair - New Zealand Network for Women in Security (NZNWS)
-
09:10
Fireside Chat: Where To From Here? What A Good Cyber Strategy Looks Like In NZ
This fireside chat explores what defines an effective cyber strategy in the New Zealand context — from aligning with business priorities and building resilience to uplifting sector capabilities and navigating a lighter regulatory environment. A forward-looking conversation on what matters most now, and what’s next.
Speakers:
Phil Ross CISO Air New Zealand
Edd Barber CISO WEL Networks
-
09:35
Seeing Ahead: Turning DNS Data into a Predictive Defense
Brad Ford - Security Specialist – ANZ - Infoblox
In today’s rapidly evolving threat landscape, organisations must move beyond reactive security strategies and embrace predictive intelligence to stay ahead of adversaries. The rise of generative AI has dramatically lowered the barrier of entry for cybercriminals - enabling faster, more focused attacks that are harder to detect and easier to automate. This session explores how Infoblox leverages the untapped potential of DNS data to deliver actionable, predictive threat insights that empower security teams to anticipate and mitigate attacks before they materialise. By transforming DNS into a rich source of early warning signals, Infoblox enables organisations to proactively defend their environments, reduce dwell time, and strengthen their overall security posture.
-
10:00
Panel: Is Trust Enough? Do We Need Stronger Cyber Regulations?
New Zealand’s flexible, trust-based approach to cyber security has long been seen as a strength — but is it enough? With rising threats and growing interdependence, this panel explores whether the time has come for stronger, enforceable regulation, and what a proportionate, uniquely Kiwi model might look like.
- Is voluntary compliance still working or are gaps widening across sectors?
- What would smarter, targeted regulation look like? vs. more red tape?
- Should New Zealand follow Australia’s lead with sector-specific obligations such as SOCI Act?
Moderator:
Rebecca Holdsworth Head of Privacy & Responsible AI One NZ
Panellists:
Kavita Chetty Senior Manager Technology Risk NZAA
Deepak Veerasamy CISO Kainga Ora
Scott Shearman CISO House of Travel
-
10:35
Get refreshed! Morning Coffee Break
-
11:05
Panel: Resilience Starts Within – Nurturing a Cyber-Aware Culture Across Your Organisation
This panel explores how security leaders are embedding a culture of cyber awareness across the organisation. From influencing behaviour to measuring impact, hear how organisations are moving beyond annual training to create lasting engagement and shared responsibility.
- How does human behaviour and organisational culture influence the effectiveness of cyber security practices?
- What strategies can foster a security-conscious mindset and encourage proactive digital habits?
- How can organisations measure the real impact of security awareness efforts and adjust over time?
- What does it take to turn employees into active defenders of your cyber environment?
Moderator:
Lakshya Mehra National Security Awareness and Phishing Lead Health NZ
Panellists:
Ronnie Rahman Head of Cyber & Risk Hamilton City Council
Brad Ward Able Head of Digital Security & Assurance Mitre 10
Scott Shearman CISO House of Travel
Andy Pedroso Head of APAC SoSafe
-
11:35
Harnessing AI for a Stronger Security Posture
Johnny Yeo - Transformation Architect - Zscaler
- Explore how AI is transforming modern security operations, enhancing threat detection, prevention, and response.
- Understand the role of AI in enabling data-centric security strategies to prevent breaches and mitigate insider threats.
- Learn how advanced techniques like real-time behavioral analysis, contextual policy enforcement, and adaptive controls strengthen security.
-
12:00
Panel: Securing the Supply Chain in a Connected, Trust-Based Ecosystem
This panel explores how security leaders are navigating supply chain complexity, driving uplift among vendors with varying levels of maturity, and balancing commercial relationships with the need for assurance.
- How are you gaining visibility into third-party and SaaS risk across your ecosystem?
- How are you evolving vendor assessments to keep up with the pace of procurement and onboarding?
- Where should organisations draw the line between shared responsibility and direct control?
- How can mitigation strategies be tailored to address financial, reputational and operational risks linked to third-party vulnerabilities?
Moderator:
Adwin Singh Cybersecurity Domain Lead – CISO Office Inland Revenue NZ
Panellists:
Eli Hirschauge Head of Info Security ANZ
Darren Beattie Head of Information Security Tower Insurance
-
12:35
Lunch
-
13:35
Mapping NZ’s Threat Landscape and Unmasking a Local Phishing Kit
Kamo Basentsyan - APAC & ANZ Head of Business Unit - Attack Surface Management (ASM), Digital Risk Protection (DRP) and Threat Intelligence (TI) - Group-IB
Join Kamo for an unfiltered look inside New Zealand’s cyber threat reality. From dissecting a real phishing kit found on local networks to uncovering how attacker tactics evolve, this session reveals what drives today’s biggest risks including ransomware, credential theft, card fraud, DDoS and hacktivism, and how security leaders can stay one move ahead. Expect sharp insights, local relevance and practical takeaways that help CISOs turn intelligence into action and resilience.
-
14:00
Panel: Invest Smart, Secure Smart – Maximising the Value through Strategic Resource Allocation
Cyber security investment is a balancing act. The goal isn’t to spend more, it’s to spend wisely. This panel explores how security leaders are aligning investment with actual risk, avoiding overengineering, and prioritising what matters most. From risk assessments to board conversations, it's about building fit-for-purpose capability that protects what counts without paying for the platinum package when the essentials will do.
-
How do you prioritise investment toward high-value areas without overinvesting in low-risk domains?
-
What metrics or KPIs help demonstrate whether security spend is driving real impact?
-
How can you balance the need for thorough evaluation with the urgency of fast-moving threats?
-
What are the key challenges in securing board support and how do you respond when the answer is no?
Moderator:
Luke Taylor CEO SSS Cybersecurity Specialists
Panellists:
Ashley Archibald CISO Natural Hazards Commission
Marek Jawurek Head of Cyber Security Advisory Ampol
Hassham Idris Manager Cyber Risk and Assurance Ministry of Justice - New Zealand
-
-
14:35
OT Under Siege: Modernising Remote Access in Critical Infrastructure
Tim Jackson - Head of Solutions Engineering - Dull
OT is digitalising fast and remote access is now the softest target. Join us for a pragmatic walkthrough of the SANS 5 Critical Controls, with a special focus on securing remote access without slowing operations. We’ll unpack common missteps (and why they happen), share lessons from the field, and show how to implement controls that both the security team and the engineers will actually support.
-
14:50
Panel: Diverse Cyber Leadership – Roles, Growth and Influence Beyond the Title
This panel explores the expanding ecosystem of cyber decision-makers — from heads of risk and GRC to operations leads, architects, and advisors — who are driving impact without necessarily holding the top title. Hear how they’re shaping strategy, building capability, and influencing outcomes across diverse career paths.
- What leadership roles are emerging beneath or alongside the CISO?
- How can professionals grow influence without chasing a title?
- How can organisations recognise and support non-linear career growth?
Moderator:
Michael Karich Deputy CISO University of Auckland
Panellists:
Ronald Chung Head of Risk (Information, Technology & Cyber Security) BNZ
Lakshya Mehra National Security Awareness and Phishing Lead Health NZ Francis Kaitano Enterprise Security Architect BNZ
-
15:25
Get refreshed! Afternoon Tea Break.
-
15:55
Landing Cyber Deliverables: Beyond Strategy to Impact
Edd Barber - CISO - WEL Networks
Bridging the gap between strategy and execution is one of the hardest parts of cyber leadership. This session explores how to turn high-level plans into clear, achievable actions that deliver measurable outcomes. From prioritisation and stakeholder alignment to delivery roadmaps and metrics that matter, it’s about making cyber real across the organisation.
-
16:20
Fireside Chat: The Innovation Mindset – Cyber Leaders Who Dare to Think Differently
Innovation and security are often seen as opposing forces, but the most successful organisations find ways to balance both. This dialogue brings together forward-thinking cyber security leaders to explore how to foster creativity while maintaining the rigour needed to safeguard organisations.
- What does an innovation mindset mean to you as a cyber leader and how have you applied it in practice?
- How do you create space for experimentation and bold ideas in environments where minimising risk is the norm?
- Can you share a moment where thinking differently led to a shift in your cyber strategy, tooling, or team culture?
Speakers:
Shawn Wang Head of Cybersecurity Governance Risk & Architecture Spark
Kane Narraway Head of Enterprise Security Canva
-
16:45
Chair Closing Remark & Close of CISO New Zealand 2025
Denise Carter-Bennett - Co-Chair - New Zealand Network for Women in Security (NZNWS)
Not Found