Keynote Speakers:

Peter Coroneos

International Vice President, Cybersecurity Advisors Network

 

Peter is an internationally recognised authority on cyber policy. In 2019 he was appointed as the International Vice President at Cybersecurity Advisors Network (CyAN), where he works to promote a culture of cybersecurity across industries and jurisdictions. His appointment is recognition of the hard work he put in to building a strong, successful Asia Pacific CyAN community.

 

Click here to view Peter's full bio.

 

How does the risk behaviour need to change to keep pace with a hyper connected world?

What can the last 200 million years of evolution tell us about the way humans respond to cyber threats?
In this fascinating, thought provoking and highly original presentation, international cybersecurity thought leader Peter Coroneos will guide us down a path rarely trodden by traditional cyber risk analysis.

This presentation will radically transform the way you think about cyber risk and will open the way to a more sophisticated approach to a problem that shows no signs of abating.

Dr Andrew Dowse
Director, Defence Research and Engagement, Edith Cowan University
Andrew Dowse served as an electronic engineer with the Royal Australian Air Force over a 37 year career in areas such as air defence, IT, communications and electronic warfare. His senior appointments included oversight of Defence capability planning, Air Force strategy and his final posting as Head of ICT Operations and Defence strategic J6. Andrew retired from active military service at the rank of Air Vice-Marshal in early 2018 and now works at Edith Cowan University, where he advises on research and education programs to support Defence. He is also the Chair of the Advisory Board for Sapien Cyber and a board member for the Pawsey Supercomputing Centre.
 

Information warfare - control and hyper connectivity, and their implications for cyber security:

Dr Dowse will briefly recount his views on the evolution of cyber security in Defence. He will then consider the changes in information system technologies associated with the Fourth Industrial Revolution, with two key aspects – information control and connectivity – combining to fundamentally change the future threat landscape. With these changes, traditional approaches to cyber security will be ineffective and we need to think about how we can adjust our protective capabilities in response to this looming information warfare threat.
 

 

Featured Speakers:

avatar
test test
test

테스트용 입니다

 

테스트 1용 고객



Nicolas Aragnou
Nicolas Aragnou
IT Infrastructure Lead, Kennards Hire
Nicolas is IT Infrastructure Lead at Kennards Hire, one of the biggest players in the trans-Tasman equipment hire market. With more than 162 branches and 1,100 employees, Kennards Hire is a family-owned business founded more than 70 years ago in Bathurst. Nicolas, who graduated from the University of Technology, Sydney with a Bachelor of Engineering, has been with Kennards Hire since 2012.

Nicolas has been instrumental in a number of digital transformation projects at Kennards Hire. He is currently spearheading Kennard Hire’s current Fortinet-based initiative. His presentation will focus on the challenges faced by Kennards Hire and how they have harnessed Fortinet’s Security Fabric to embrace digital technology.

Scott La Franchie
Scott La Franchie
Head of Cybersecurity, Kordia
Scott has more than 12 years’ experience in cyber security, software & telecommunications. During this time he has held multiple marketing and product development roles across various organisations, including NZ Police, Orcon, Yellow and GEO (formally GeoOp).

As Head of Cybersecurity at Kordia, a leading provider of mission-critical technology to businesses in New Zealand, Australia and the Pacific, Scott is in charge of the strategic leadership of this key portfolio. His key responsibilities include ensuring that any products and services launched as part of Kordia’s security offering are both leading-edge in approach, and that they help ease our customers’ pain points when it comes to improving their overall security posture.

Scott is also the subject matter expert internally for Kordia’s Advice, Protect and Insight & Response Portfolio, which is NZ's most comprehensive cyber security offering. It comprises a range of solutions for Kordia’s customers, from managed security products through to expert consultancy services, provided by Kordia’s independent, award-winning cyber consultancy, Aura Information Security.

Glenn Veen
Glenn Veen
Director of Infrastructure, Government of Western Australia - Department of Education
In this role, Glenn has overall responsibility for designing, developing, implementing, monitoring and managing the Department’s technology and telecommunications infrastructure.

The components of the ICT strategy that Glenn is responsible for include the telecommunications (voice and data) deployment, Internet Service Provision, as well as the Standard Operating Environment for schools. The SOE has been implemented in 791 of the Department’s 799 schools.

Frank Phillis
Frank Phillis
Specialist Technical Account Manager, Amazon Web Services
Focused on Security within AWS, Frank regularly travels within the ASEAN region, providing guidance, best practice and technical deep dives for AWS customers on implementing security best practices for their AWS accounts and workloads. Prior to this role, Frank was a Senior Engineer in the AWS Support organisation, and prior to that, he led the Cloud Support (Security) team in Sydney within AWS. Before AWS, Frank has worked in various technical roles in Telstra, The Seven Network and Bloomberg, to name a few. Frank’s main areas of discipline within AWS are Authentication/Authorisation, cryptography, incident response/monitoring and Denial of Service.

Stephen Watkins
Stephen Watkins
Principal Cybersecurity Advisor

Stephen serves as a Principal Cybersecurity Advisor within Fortinet’s US Channel Sales Organization. Applying his formal education, practical experience, and advisory expertise, Stephen leads a team of seasoned practitioners who have established a proven framework to shepherd managed services providers through the offer creation and services delivery journey. Stephen draws upon more than 30 years residence in the Information Technology and Cybersecurity trenches. He is a Trusted Security Advisor to managed services providers (SP/MSSP) around the world, co-developing strategic vision and operational cadence using a standard, repeatable framework for managed services profitability.



Aamir Lakhani
Aamir Lakhani
Global Director Of Threat Intelligence and Adversarial Artificial Intelligence Research

Aamir Lakhani is the Global Director of Threat Intelligence and Artificial Intelligence, and a recognized authority in cybersecurity, advanced threat detection, and AI innovation. With over 20 years of experience, Aamir leads global initiatives that integrate cutting-edge AI technologies into cyber defense strategies for Fortune 500 enterprises, government agencies, and national security operations.

He is known for designing and executing large-scale threat intelligence programs, offensive and defensive cyber operations, and AI-driven security architectures. Aamir has developed and deployed AI agents to simulate threat actor behavior, test system resilience, and drive next-generation SOC automation. His work spans adversarial AI, agentic AI systems, deepfake detection, and advanced ML-based malware analysis.

Aamir’s background includes creating offensive countermeasures for the U.S. Department of Defense and advising national intelligence agencies. He has helped organizations fortify both their digital and physical environments against state-sponsored threats and cybercriminal syndicates operating on the darknet.​

With a deep technical foundation, Aamir has spent two decades researching artificial intelligence, writing and testing AI/ML models, and operationalizing them for cyber use cases. His expertise spans cyber defense, AI-driven reconnaissance, mobile threats, APT research, and the weaponization of machine learning by threat actors.

Aamir is a published author and regular contributor to books, threat research reports, and white papers. He has been featured on FOX Business News, National Public Radio (NPR), and other national media outlets as an expert in cybersecurity and artificial intelligence.​

Under the pseudonym Dr. Chaos, Aamir also operates a widely followed cybersecurity blog at DrChaos.com, where he shares insights on emerging threats, AI trends, and real-world attack simulations. In its list of "46 Federal Technology Experts to Follow on Twitter," Forbes described him as “a blogger, InfoSec specialist, superhero... and all-around good guy.”

 



Cornelius Mare
Cornelius Mare
CISO

Corne has more than 20 years experience in network security and delivering cyber-resilient solutions. He has a focus on hybrid cloud environments and artificial intelligence to ensure organisations are enabled while also safeguarding their data and applications.

In his role as a CISO, Corne acts as the evangelist for Fortinet activities across Australia and the advanced technology that underpins its success. His role is to provide leadership and strategy for technical, pre-sales and support initiatives. He works closely with partners and customers to understand their business drivers and risk posture and to reduce their risk to an acceptable level.