This event is now complete
Government Cyber Security Showcase Queensland
Exhibition - Boulevard Foyer
Registration and Networking Coffee
8:00 AM - 8:45 AM (45 mins)
Boulevard Room
Opening from Public Sector Network
8:45 AM - 8:55 AM (10 mins)
Boulevard Room
Ministerial Address
8:55 AM - 9:15 AM (20 mins)
Boulevard Room
Chair Opening
9:15 AM - 9:25 AM (10 mins)
Boulevard Room
Beyond the Checklist: Aligning Cyber Compliance with Risk-Based Security for Resilience and Value
9:25 AM - 9:45 AM (20 mins)
- Addressing Queensland’s unique risks.
- Strengthening cybersecurity across government agencies to ensure consistent protection of public data.
- Developing collaborative approaches to address state-wide cyber threats and resilience goals.
Boulevard Room
Cybersecurity Resilience in a Volatile World: People, Process and Partnership
9:45 AM - 10:05 AM (20 mins)
This session examines how organisations can strengthen their defences against evolving cyber threats. This presentation highlights the importance of skilled people, effective processes, and strong partnerships. Attendees will gain practical insights into building a security-focused culture, improving response strategies, and collaborating to enhance resilience in an unpredictable digital environment.
Boulevard Room
Mitigating the rising threat of state-sponsored cyber attacks in Queensland
10:05 AM - 10:30 AM (25 mins)
- Understanding how state-sponsored attacks are evolving and targeting Queensland's public sector.
- Preparing agencies to counteract advanced persistent threats (APTs) and ransomware.
- Enhancing incident response and recovery measures to minimise impact.
- Building strong cross-agency networks to share threat intelligence effectively.
Exhibition - Boulevard Foyer
Morning Tea and Networking
10:30 AM - 11:15 AM (45 mins)
Boulevard Room
Architecting security from the ground up: It takes a village
11:15 AM - 11:40 AM (25 mins)
- Recognising vulnerabilities.
- Implementing advanced risk management strategies for services.
- Partnering with the private sector to enhance security while ensuring continuity
Boulevard Room
Agents at Work: Agentic AI in Government, Balancing Innovation with Risk
11:40 AM - 12:00 PM (20 mins)
Agentic AI is shifting from experimental tech to the backbone of organisations, with autonomous agents increasingly taking on tasks from customer support to cybersecurity. This session explores practical use cases where Agentic AI is driving efficiency and innovation, highlights emerging trends shaping its adoption, and outlines areas of caution, ranging from hallucination risks to adversarial exploitation. We'll discuss where Agentic AI fits in today’s modern architecture, and strategies to harness its power responsibly while mitigating risks like errant behaviour and exploitation by malicious actors.
Boulevard Room
Cyber security connectedness across QLD Government
12:00 PM - 12:25 PM (25 mins)
- Closing the gap between metro and regional agencies
- Creating a unified cyber intelligence network
- Building resilience for all communities
Boulevard Room
Securing the Queensland Olympics as the world descends
12:25 PM - 12:50 PM (25 mins)
- Protect critical systems, such as ticketing, broadcasting, and athlete data, from cyber threats during the Games.
- Implement continuous monitoring to detect and respond to cyberattacks in real time, ensuring the security of the event.
- Foster collaboration between local, national, and international cybersecurity teams to coordinate responses to potential threats.
Exhibition - Boulevard Foyer
Lunch and Networking
12:50 PM - 2:10 PM (80 mins)
Roundtable 1: Future-proofing Australia’s critical infrastructure ahead of Brisbane 2032
2:10 PM - 3:10 PM (60 mins)
As Brisbane prepares to host the Olympic Games, Australia’s critical infrastructure resilience will be tested. This roundtable will explore how national and regional critical infrastructure entity collaboration and consideration of supply chain resilience are essential to securing the systems that underpin our national security and global reputation.
We’ll discuss:
- The threat landscape for critical infrastructure from an all hazards perspective.
- The hidden risks of third-party dependencies and concentration risk with real-world examples from key sectors.
- How supplier diversification and sovereign capability can strengthen national resilience.
- The importance of fostering strong local partnerships to ensure operational continuity and trust.
As nationally significant operators, Critical Infrastructure providers must cultivate strong local partnerships with vendors, service providers, and industry leaders to build a more secure and resilient future.
Roundtable 2: Automate, optimise, transform: Modernising identity in the public sector
2:10 PM - 3:10 PM (60 mins)
Public sector organisations are under increasing pressure to do more with less and identity is no exception. This discussion explores how automation and optimisation can streamline identity processes, reduce administrative overhead, and improve security outcomes. We’ll cover practical ways to evolve from manual and legacy approaches to a modern, automated identity framework. Plus, hear how QLD TAFE successfully migrated from Microsoft Identity Manager to a new platform and the lessons they learned along the way.
In this session we will discuss:
- Where to Start: Laying the foundations for an automated, scalable identity program.
- Process Optimisation: Identifying and removing bottlenecks in identity lifecycle management.
- Automation in Action: How workflows, integrations, and policy-driven controls can reduce effort and errors.
- QLD TAFE Migration Story: Real-world example of moving from MIM to a modern identity solution.
- Measuring Success: Metrics and outcomes that matter in identity modernisation.
Roundtable 3: The best defense is a good offense: Barriers and solutions for uniting Government departments on cyber incident management
2:10 PM - 3:10 PM (60 mins)
- Explore opportunities to prepare for incidents before they happen. What does good incident response look like?
- Discuss key insights gleaned from more than 500 significant cyber compromise event responses across the nation in the past year
- The most dangerous threats are coordinated and synchronised. What should be on your Cyber checklist for 2025?
Roundtable 4: How to combat offensive AI: Defending government apps and APIs from smarter cyber threats
2:10 PM - 3:10 PM (60 mins)
AI is now a weapon in the hands of bad actors—creating self-morphing malware, automating breaches, and outpacing legacy defences. This session will show you how to embed AI in your security posture so you can stay ahead of evolving threats, protect exposed APIs, and boost resilience with limited resources.
- Explore how AI is being weaponised to evade traditional government cyber defences
- Unpack why AI adoption remains low despite rising threat levels
- Identify where your third-party APIs are most vulnerable to exploitation
- Discover how AI can offset the growing cyber skills shortage
- Learn how to integrate AI into your detection and response architecture
Roundtable 5: Closing the back door: Securing end-of-life devices while delivering on ESG and indigenous procurement commitments
2:10 PM - 3:10 PM (60 mins)
Join us for a high-impact discussion with Australia’s first NAID AAA Certified with PSPF-endorsed provider of Top Secret-level data destruction, WV Technologies, a Supply Nation Registered and Social Traders Certified Social Enterprise.
We’ll explore:
- The hidden cyber risks in your end-of-life ICT equipment- How they could leave you exposed, non-compliant, or vulnerable to attack.
- How leading government and enterprise organisations are aligning cybersecurity, ESG and Indigenous procurement strategies through their IT asset lifecycle.
- Real-world insights on how to achieve cyber risk reduction, regulatory compliance (PSPF, ISM, SOCI), and social impact without trade-offs.
Key Outcomes:
- Learn what certified data disposal really looks like and what most vendors get dangerously wrong.
- Understand how to turn IT disposal into a strategic lever for reconciliation, sustainability, and cyber resilience.
- Walk away with a framework for meeting Privacy Act, ISM, SOCI and ESG obligations while protecting your reputation and reducing operational risk.
Roundtable 6: Intel for Intel’s sake: making the case for threat intel investment
2:10 PM - 3:10 PM (60 mins)
- Learn how government agencies are transforming threat intelligence from a "nice-to-have" into a strategic asset that drives measurable security outcomes and mission success
- Explore real-world examples of operationalising intelligence across tactical, operational and strategic levels - from immediate threat detection to long-term security planning
- Learn proven frameworks for building intelligence programs that demonstrate clear ROI by aligning threat data with risk reduction, operational efficiency and mission-critical objectives
Boulevard Room
The Role of Transparency and Collaboration in QLD's Cyber Future
3:20 PM - 3:40 PM (20 mins)
- Fostering open communication between the public sector, industry, and citizens
- Building a culture of transparency to enhance public trust in QLD's digital services
- Partnering with industry to mitigate threats and strengthen defences across QLD
Boulevard Room
Building Queensland’s cyber security workforce and skills for the future
3:40 PM - 4:10 PM (30 mins)
- Encouraging pathways into cybersecurity for Queensland’s diverse population.
- Addressing workforce shortages through targeted education programs and initiatives.
- Retaining talent within the public sector to ensure sustained growth and resilience.
- Supporting cross-sector training to align skills with evolving cybersecurity needs.
Boulevard Room
Closing remarks from chair
4:10 PM - 4:20 PM (10 mins)