Event Details

9th – 10th February, 2027 // Perth, Australia

Register Now

The Cyber Security for Critical Assets summit unites 100+ senior cybersecurity leaders, providing a valuable platform for experts to connect, learn and collaborate towards cyber resilience for critical infrastructure.

Expect to be both challenged and inspired, as we uncover new techniques and defense mechanisms from some of the world’s leading cyber security innovators. Hear exclusive keynotes from trail-blazing industry execs as well as having the chance to take part in interactive panel debates, benchmarking your approach to cyber security against peers. Take part in group discussions to target specific cyber security pain points and benefit from in-depth case studies, relevant to your sector with tangible, actionable insights.

Keen to learn more? View the agenda or the Speaker Line-up for a more detailed look at what you can expect over the two days on 9th – 10th February 2027.

Benefits of Attending

  • Network With a Senior Audience of 100+ Cyber Security Leaders From Critical Infrastructure
  • Gain Real-Life Insights on How Your Peers are Addressing Current Cyber Security Pain Points
  • Engage in Meaningful Conversations & Share First-Hand Experiences
  • Build Partnerships Aimed at Securing the Future of Critical Infrastructure in the ANZ Region
  •  Earn CPE Credits for Your Continued Professional Development

Key Themes

  • Shared Responsibility: Governing OT Security with Best Practice – Break down silos and assign responsibility for securing your OT environment
  • Foundational Principles: Underpinning Operational Resilience – Set the basis for your OT security with principles like segmentation and segregation, secure access and identity management
  • Critical Standards: Applying Key Security Standards – Move from reactive to contextual risk-based security models, and align with evolving standards like IEC 62443
  • Secure Integration: Navigating Emerging Technologies – Manage the risks associated with web-enabled sensing, IoT devices, and automation in OT environments
  • Maintain Control: Protecting Key Industrial Systems  Adopt security guidelines for the protection of SCADA systems and ICS from common cyber threats
  • Operator Empowerment: Integrating a Holistic Approach – Enable collaboration between the three pillars of OT protection: People, Process, and Technology

Register Now

Choose Your Pass

View the Agenda

Find Out More

Request A Sponsor Pack

Access Here