Government Cyber Security Showcase Western Australia
Registration and Networking Coffee
8:00 AM - 8:45 AM (45 mins)
Settle in, grab a coffee and meet a few friendly faces before we begin.
Welcome and How to Make the Most of Today
8:45 AM - 9:00 AM (15 mins)
A short welcome, plus a few quick tips to help you connect, share and get real value from the day. We’ll also run a couple of quick polls to see what everyone’s interested in and what people are working on right now.
State Scene Setter: Government Spending, Direction and Priorities
9:00 AM - 9:10 AM (10 mins)
A short briefing from the Chair to get everyone aligned, comfortable, and ready for a great day of ideas and connection.
The Future of Cyber Security in WA
9:10 AM - 9:20 AM (10 mins)
Making Cyber Security Measurable in WA
9:20 AM - 9:40 AM (20 mins)
Western Australia is moving beyond policy into operational delivery, where cyber performance must be measurable, defensible and consistent across agencies. This session explores how central oversight and real-time visibility are reshaping accountability and uplift.
- Moving from compliance reporting to real-time cyber performance indicators
- Embedding accountability across agencies with varying maturity levels
- Using central visibility to drive consistent whole-of-government uplift
Addressing the growing need for robust data protection strategies
9:40 AM - 10:00 AM (20 mins)
As government agencies manage increasing volumes of sensitive data across complex and distributed environments, the need for stronger, more adaptive data protection strategies has never been greater. This session explores how organisations can better understand, control and protect their data while enabling secure access and maintaining compliance.
- Strengthening visibility and control over who has access to sensitive data and why
- Protecting data across systems, users and environments as risk continues to evolve
- Balancing security, compliance and accessibility to support effective service delivery
Protecting WA’s Economic Engine from Cyber Disruption in a High-Threat World
10:00 AM - 10:30 AM (30 mins)
Western Australia’s economy makes it a high-value cyber target, particularly across mining, energy and supply chains. This session examines how cyber security must evolve to protect economic continuity without slowing productivity.
- Securing critical industries from disruption and targeted attacks
- Understanding cyber risk as economic and national security risk
- Balancing resilience with operational efficiency in high-output sectors
Zero Trust: Beyond the Buzzword – Implementing Practical Solutions
10:30 AM - 10:50 AM (20 mins)
- Real-world applications of Zero Trust Architecture in public sector networks
- Overcoming the challenges of continuous authentication and identity verification
- Exploring the role of multi-factor authentication in mitigating insider threats
Morning Tea and Mingling
10:50 AM - 11:30 AM (40 mins)
It's time to grab a coffee - connect, recharge and explore our exhibition floor before the track discussions begin!
Government Keynote: Translating SOC Insights into Leadership Decisions
11:30 AM - 11:50 AM (20 mins)
Cyber intelligence must inform strategic decisions. This session explores how to bridge technical and executive perspectives.
- Communicating risk in business terms
- Improving leadership engagement
- Aligning cyber insights with strategic priorities
Securing Innovation Without Stalling It
11:50 AM - 12:10 PM (20 mins)
As agencies accelerate digital transformation and adopt emerging technologies, security must evolve from a blocker to an enabler of innovation. This session explores how organisations can embed security into new initiatives from the outset, reducing risk while maintaining speed, agility and service delivery outcomes.
- Embedding security early to support faster innovation
- Balancing risk, compliance and delivery pressures without slowing critical projects
- Leveraging automation and integrated platforms to reduce complexity and enable secure scale
Cyber, Privacy and Data Sharing – One Conversation, Not Three
12:10 PM - 12:40 PM (30 mins)
WA’s PRIS reforms are creating a long-overdue convergence between cyber security, privacy and data sharing. This session explores how agencies can move from siloed governance to a unified trust framework.
- Aligning privacy obligations with cyber controls and data use
- Breaking down policy silos that slow delivery and increase risk
- Designing systems where trust, access and protection coexist
Ensuring that identity, privacy and accessibility remain protected
12:40 PM - 1:00 PM (20 mins)
This session explores how agencies can strengthen identity controls, safeguard sensitive data and ensure services remain secure and accessible for all users.
- Strengthening identity and access management to prevent unauthorised access while maintaining user experience
- Embedding privacy and data protection into service design to reduce risk and build public trust
- Ensuring secure and accessible digital services that meet diverse user needs without compromising protection
How Recovery, Communication and Confidence Equals Trust
1:00 PM - 1:20 PM (20 mins)
Cyber resilience is no longer defined by prevention alone, but by how quickly government can recover and maintain trust. This session explores the role of communication, transparency and system design in crisis moments.
- Measuring success through recovery and continuity
- Communicating clearly with citizens during disruption
- Designing systems that fail safely and recover quickly
Lunch: Wander, Discover, Connect
1:20 PM - 2:20 PM (60 mins)
Grab lunch, have a wander, and chat with industry partners and peers about practical ideas you can take back to work. Arguably the most important part of the day!
AI Governance in Government: Balancing Innovation and Regulation
2:20 PM - 3:20 PM (60 mins)
The public sector faces both opportunity and risk with AI. This session explores how to set guardrails, audit AI models and align with emerging critical infrastructure legislation.
From Data Breach to Data Trust: Securing Citizen Information
2:20 PM - 3:20 PM (60 mins)
Data is government’s most sensitive asset. This session explores advanced approaches to encryption, classification and data sovereignty that protect citizen trust while enabling safe data use.
Cloud Security Without Compromise: Meeting Compliance and Agility Goals
2:20 PM - 3:20 PM (60 mins)
Government is under pressure to innovate quickly while maintaining strict compliance. This session demonstrates how cloud security can enable speed and resilience without creating policy or compliance gaps.
Zero Trust in Action: Safeguarding South Australia’s Digital Future
2:20 PM - 3:20 PM (60 mins)
Explore how zero trust frameworks can be practically implemented across departments, from legacy systems to modern cloud platforms. The session highlights lessons learned from government rollouts and vendor expertise in enabling secure, identity-first operations.
AI vs. AI: Defending Government Systems Against Machine-Driven Attacks
2:20 PM - 3:20 PM (60 mins)
With adversaries weaponising AI, agencies must evolve their defences. This session examines how AI/ML can detect, predict and counter novel threats faster than human-only teams.
Operational Technology Security: Bridging IT–OT Risk Gaps
2:20 PM - 3:20 PM (60 mins)
Utilities and transport networks increasingly rely on connected OT. This session shows how security frameworks can protect critical infrastructure from AI-enabled attacks without disrupting essential services.
Identity at the Core: Securing Access in a Borderless Government
2:20 PM - 3:20 PM (60 mins)
How agencies can strengthen identity and access management to prevent breaches, enforce zero trust, and balance compliance with seamless citizen and workforce access.
Privacy as a Cyber Imperative: Securing Responsible Information Sharing Across WA Government
3:20 PM - 3:40 PM (20 mins)
As data sharing accelerates across agencies, privacy is no longer just a compliance exercise, it is a core component of cyber security and risk management. This keynote explores how Western Australia is embedding Privacy and Responsible Information Sharing (PRIS) into cyber frameworks to strengthen whole-of-government resilience.
- Treating privacy as a security control to reduce attack surfaces through data minimisation, classification and access management
- Securing information sharing environments to prevent data leakage, misuse and unauthorised access across agencies
- Embedding PRIS into cyber governance to strengthen trust, accountability and incident response readiness
How AI is Reshaping Cyber Threats in WA
3:40 PM - 4:10 PM (30 mins)
As artificial intelligence accelerates across government and critical industries, it is also reshaping the cyber threat landscape. For Western Australia, this raises urgent questions around how to secure AI-driven systems, protect data integrity and maintain trust while continuing to innovate.
- How AI is being weaponised
- Protecting government data, models and systems from manipulation, leakage and adversarial threats
- Embedding governance and accountability to manage AI risk without slowing innovation
Closing Remarks: What We’re Taking with Us
4:10 PM - 4:20 PM (10 mins)
We’ll pull out a few highlights from the day, share what’s coming next, and point you to ways to stay connected.
Networking Reception: Stay for a Chat
4:20 PM - 5:20 PM (60 mins)
Wrap up the day with good conversation and a few new connections. Thanks for making GIW your one-stop shop for benchmarking, industry updates, and great conversations.
Ready to register?
Registration is free for government