Skip to main content

Agenda |

Western Australia 2026

Government Cyber Security Showcase Western Australia

 Tuesday, 25 Aug 2026
8:00AM

Registration and Networking Coffee

8:00 AM - 8:50 AM (50 mins)

Settle in, grab a coffee and meet a few friendly faces before we begin.

8:50AM

Welcome and How to Make the Most of Today

8:50 AM - 9:00 AM (10 mins)

A short welcome, plus a few quick tips to help you connect, share and get real value from the day. We’ll also run a couple of quick polls to see what everyone’s interested in and what people are working on right now.

9:00AM
Ministerial Address

Ministerial Address

9:00 AM - 9:10 AM (10 mins)

Hon Stephen Dawson MLC Minister for Regional Development; Ports; Science and Innovation; Medical Research and Minister for the Kimberley, WA Government
9:10AM

State Scene Setter: Government Spending, Direction and Priorities

9:10 AM - 9:20 AM (10 mins)

A short briefing from the Chair to get everyone aligned, comfortable, and ready for a great day of ideas and connection.

9:20AM
Keynote

Making Cyber Security Measurable in WA

9:20 AM - 9:40 AM (20 mins)

Peter Gigengack Director Cyber Security, Office of Digital Government WA

Western Australia is moving beyond policy into operational delivery, where cyber performance must be measurable, defensible and consistent across agencies. This session explores how central oversight and real-time visibility are reshaping accountability and uplift.

  • Moving from compliance reporting to real-time cyber performance indicators
  • Embedding accountability across agencies with varying maturity levels
  • Using central visibility to drive consistent whole-of-government uplift
9:40AM

Addressing the growing need for robust data protection strategies

9:40 AM - 10:00 AM (20 mins)

As government agencies manage increasing volumes of sensitive data across complex and distributed environments, the need for stronger, more adaptive data protection strategies has never been greater. This session explores how organisations can better understand, control and protect their data while enabling secure access and maintaining compliance.

  • Strengthening visibility and control over who has access to sensitive data and why
  • Protecting data across systems, users and environments as risk continues to evolve
  • Balancing security, compliance and accessibility to support effective service delivery
10:00AM
Panel discussion

Protecting WA’s Economic Engine from Cyber Disruption in a High-Threat World

10:00 AM - 10:30 AM (30 mins)

Serena King Assistant Director Cyber Security Engagement WA, National Office of Cyber Security, Department of Home Affairs

Western Australia’s economy makes it a high-value cyber target, particularly across mining, energy and supply chains. This session examines how cyber security must evolve to protect economic continuity without slowing productivity.

  • Securing critical industries from disruption and targeted attacks
  • Understanding cyber risk as economic and national security risk
  • Balancing resilience with operational efficiency in high-output sectors
10:30AM

Zero Trust: Beyond the Buzzword – Implementing Practical Solutions

10:30 AM - 10:50 AM (20 mins)

  • Real-world applications of Zero Trust Architecture in public sector networks
  • Overcoming the challenges of continuous authentication and identity verification
  • Exploring the role of multi-factor authentication in mitigating insider threats
10:50AM

Morning Tea and Mingling

10:50 AM - 11:20 AM (30 mins)

It's time to grab a coffee - connect, recharge and explore our exhibition floor before the track discussions begin!

11:20AM

How Recovery, Communication and Confidence Equals Trust

11:20 AM - 11:40 AM (20 mins)

Andrew Woodward Director, Centre for Securing Digital Futures, Edith Cowan University

Cyber resilience is no longer defined by prevention alone, but by how quickly government can recover and maintain trust. This session explores the role of communication, transparency and system design in crisis moments.

  • Measuring success through recovery and continuity
  • Communicating clearly with citizens during disruption
  • Designing systems that fail safely and recover quickly
11:40AM
Keynote

Translating SOC Insights into Leadership Decisions

11:40 AM - 12:00 PM (20 mins)

Cyber intelligence must inform strategic decisions. This session explores how to bridge technical and executive perspectives.

  • Communicating risk in business terms
  • Improving leadership engagement
  • Aligning cyber insights with strategic priorities
12:00PM
Panel discussion

Cyber, Privacy and Data Sharing – One Conversation, Not Three

12:00 PM - 12:30 PM (30 mins)

Steven Paice CISO, South Metropolitan Health Service
Rebecca Howard Senior Manager - Product Security, Office of Digital Government WA

WA’s PRIS reforms are creating a long-overdue convergence between cyber security, privacy and data sharing. This session explores how agencies can move from siloed governance to a unified trust framework.

  • Aligning privacy obligations with cyber controls and data use
  • Breaking down policy silos that slow delivery and increase risk
  • Designing systems where trust, access and protection coexist
12:30PM

Ensuring that identity, privacy and accessibility remain protected

12:30 PM - 12:50 PM (20 mins)

This session explores how agencies can strengthen identity controls, safeguard sensitive data and ensure services remain secure and accessible for all users.

  • Strengthening identity and access management to prevent unauthorised access while maintaining user experience
  • Embedding privacy and data protection into service design to reduce risk and build public trust
  • Ensuring secure and accessible digital services that meet diverse user needs without compromising protection
12:50PM
Keynote

Securing Innovation Without Stalling It

12:50 PM - 1:10 PM (20 mins)

Stephen Woods Chief Information Security Officer, Department of Justice WA

As agencies accelerate digital transformation and adopt emerging technologies, security must evolve from a blocker to an enabler of innovation. This session explores how organisations can embed security into new initiatives from the outset, reducing risk while maintaining speed, agility and service delivery outcomes.

  • Embedding security early to support faster innovation
  • Balancing risk, compliance and delivery pressures without slowing critical projects
  • Leveraging automation and integrated platforms to reduce complexity and enable secure scale
1:10PM

Lunch: Wander, Discover, Connect

1:10 PM - 2:10 PM (60 mins)

Grab lunch, have a wander, and chat with industry partners and peers about practical ideas you can take back to work. Arguably the most important part of the day!

2:10PM
Roundtables

AI Governance in Government: Balancing Innovation and Regulation

2:10 PM - 3:10 PM (60 mins)

The public sector faces both opportunity and risk with AI. This session explores how to set guardrails, audit AI models and align with emerging critical infrastructure legislation.

2:10PM
Roundtables

From Data Breach to Data Trust: Securing Citizen Information

2:10 PM - 3:10 PM (60 mins)

Data is government’s most sensitive asset. This session explores advanced approaches to encryption, classification and data sovereignty that protect citizen trust while enabling safe data use.

2:10PM
Roundtables

Cloud Security Without Compromise: Meeting Compliance and Agility Goals

2:10 PM - 3:10 PM (60 mins)

Government is under pressure to innovate quickly while maintaining strict compliance. This session demonstrates how cloud security can enable speed and resilience without creating policy or compliance gaps.

2:10PM
Roundtables

Zero Trust in Action: Safeguarding Western Australia's Digital Future

2:10 PM - 3:10 PM (60 mins)

Explore how zero trust frameworks can be practically implemented across departments, from legacy systems to modern cloud platforms. The session highlights lessons learned from government rollouts and vendor expertise in enabling secure, identity-first operations.

2:10PM
Roundtables

AI vs. AI: Defending Government Systems Against Machine-Driven Attacks

2:10 PM - 3:10 PM (60 mins)

With adversaries weaponising AI, agencies must evolve their defences. This session examines how AI/ML can detect, predict and counter novel threats faster than human-only teams.

2:10PM
Roundtables

Operational Technology Security: Bridging IT–OT Risk Gaps

2:10 PM - 3:10 PM (60 mins)

Utilities and transport networks increasingly rely on connected OT. This session shows how security frameworks can protect critical infrastructure from AI-enabled attacks without disrupting essential services.

2:10PM
Roundtables

Identity at the Core: Securing Access in a Borderless Government

2:10 PM - 3:10 PM (60 mins)

How agencies can strengthen identity and access management to prevent breaches, enforce zero trust, and balance compliance with seamless citizen and workforce access.

3:15PM
Keynote

Cyber Security Incidents and Preparing Executives for the Inevitable

3:15 PM - 3:35 PM (20 mins)

Nicholas Putra Manager Cyber Security Corporate Services, Department of Creative Industries, Tourism and Sport

This session explores how organisations can strengthen executive readiness, decision-making and coordination before a major incident occurs.

  • Executive leadership during cyber disruption - Preparing senior leaders to make fast, informed decisions under pressure.
  • Strengthening coordination, communication and response planning before an event occurs.
  • From technical issue to business-wide impact
3:35PM
Panel discussion

How AI is Reshaping Cyber Threats in WA

3:35 PM - 4:05 PM (30 mins)

Mia Araminta Cybersecurity & AI Resilience Program Manager, South32

As artificial intelligence accelerates across government and critical industries, it is also reshaping the cyber threat landscape. For Western Australia, this raises urgent questions around how to secure AI-driven systems, protect data integrity and maintain trust while continuing to innovate.

  • How AI is being weaponised
  • Protecting government data, models and systems from manipulation, leakage and adversarial threats
  • Embedding governance and accountability to manage AI risk without slowing innovation
4:05PM

Closing Remarks: What We’re Taking with Us

4:05 PM - 4:15 PM (10 mins)

We’ll pull out a few highlights from the day, share what’s coming next, and point you to ways to stay connected.

4:15PM

Networking Reception: Stay for a Chat

4:15 PM - 5:15 PM (60 mins)

Wrap up the day with good conversation and a few new connections. Thanks for making GIW your one-stop shop for benchmarking, industry updates, and great conversations.

Questions?

See our FAQs or get in touch

Ready to register?

Registration is free for government