Melbourne Cloud Security Summit 2025
Join us at the Cloud Security Summit to strengthen your cloud defenses and tackle emerging threats. Explore Zero Trust, secure multi-cloud deployments, and AI-driven security with industry experts through hands-on sessions and real-world case studies.

Welcome to the Cloud Security Summit in Melbourne, where industry leaders and innovators gather to tackle the ever-evolving challenges of securing cloud environments in today's digital world. This summit will serve as an essential platform for exploring the latest trends, technologies, and strategies in cloud security, offering invaluable insights into the tools and practices that can help organisations strengthen their cloud defences. Throughout the day, participants will engage in expert-led sessions, thought-provoking discussions, and hands-on demonstrations, all focused on addressing real-world identity and access management issues and opportunities
Join us to explore:
- Building Resilience in Multi-Cloud Environments: Learn strategies to secure data and applications across multiple cloud platforms.
- Zero Trust: The Future of Cybersecurity in the Cloud: Implement Zero Trust to ensure continuous verification and reduce vulnerabilities in cloud security.
- The Growing Threat of Ransomware in the Cloud: Understand evolving ransomware threats and proactive steps to mitigate risks in cloud environments.
- AI and Machine Learning: Transforming Cloud Security :Leverage AI for advanced threat detection, automation, and faster incident response in the cloud.
- Securing Cloud-Native Applications and DevOps: Integrate security into cloud-native apps and DevOps pipelines to safeguard modern applications.
- Privacy and Compliance in the Cloud: Navigate regulatory changes and address data sovereignty to ensure cloud compliance.
- Interactive Demos and Simulation Exercises: Experience hands-on demos and simulations to enhance incident response and cloud security readiness.
Join us in Melbourne to connect with cloud security experts, enhance your security strategies, and prepare your organisation to thrive in an increasingly complex and interconnected cloud landscape.
Program Highlights
Speakers
Sessions
Cloud Security Leaders
Track
Our Speakers
Agenda
The Cybersecurity Act 2024 introduces comprehensive regulations aimed at protecting critical infrastructure—how should businesses navigate the act’s wide-ranging implications?
- What businesses are affected, and how does the Act expand its reach across industries?
- The financial and operational impact of adhering to new cybersecurity standards for businesses.
- How businesses can maintain agility while meeting the stringent requirements of the Act.
- How the Act’s provisions set the stage for long-term business resilience in the face of evolving threats.
This session explores the current cloud threat landscape and strategies to build better processes in the face of the common challenges facing organizations as they look to improve their Cloud SecOps.
- The nature of low and high sophistication in cloud attacks
- Key people, process and technology challenges preventing heightened cloud security postures
- Evidence-based prioritization of proactive/preventative security
- The opportunity for anti-fragile Cloud SecOps via the concept of Respond Left
As cloud environments evolve and become increasingly complex, the future of cloud security is more critical than ever. This panel will explore emerging trends, future challenges, and cutting-edge strategies that will define the next generation of cloud security.
- What does the future of multi-cloud security look like, and how can businesses stay ahead?
- How will AI and machine learning evolve to become essential tools in threat detection and incident response?
- What are the next big cybersecurity risks that organisations need to prepare for in cloud environments?
- How can organisations build more resilient cloud security frameworks to adapt to an ever-changing landscape?
- The role of automation in the future of cloud security: Can we rely on it to defend against evolving threats?
In this innovative session, attendees will be faced with a series of scenarios that they may face in their roles. Attendees will discuss the possible courses of action with their peers to consider the ramifications of each option before logging their own course of action.
Results will be tallied and analysed by our session facilitator and results will impact the way the group moves through the activity.
Will we collectively choose the right course of action?
This session will uncover how to leverage AI to streamline runtime security and enhance threat detection in Kubernetes and containerised environments.
- Discover how AI can prioritise and address runtime security challenges in cloud-native applications.
- Gain insights into implementing effective runtime security measures for Kubernetes and containerised environments.
- Learn how AI can augment threat detection and incident response, improving security posture and reducing noise.
This demonstration session will uncover how an industry leader overcame a common industry challenge. They’ll take you inside their world and show you the process and tools they use to build something brilliant.
Learn how Hold Your Own Key (HYOK) enhances data security by ensuring full encryption key control in cloud environments.
- How HYOK strengthens data sovereignty and regulatory compliance in multi-cloud environments.
- Comparing HYOK with traditional cloud provider-managed encryption key solutions.
- Best practices for implementing HYOK without compromising cloud agility or performance.
This panel will explore how adopting a prevention-first approach to security is essential for effectively protecting hybrid and multi-cloud environments, with insights on overcoming challenges and implementing proactive strategies.
- The importance of adopting a prevention-first security approach in hybrid and multi-cloud environments.
- How organisations can shift from reactive to proactive security models to minimise risk and prevent breaches.
- Key challenges in implementing prevention-first strategies, including technology, culture, and complexity in cloud infrastructures.
- Real-world examples and lessons learned from enterprises successfully integrating prevention-first measures into their security frameworks
Choose 1 topic to join on the day!
- Security and Observability of Cloud-Native Application
- Achieving Security Transparency Across Teams
- Navigating Data Sovereignty and Cloud Security: Balancing Compliance and Protection
- Enhanced Strategies for Monitoring and Remediation of Cloud Misconfigurations
- Secure Your Identity Infrastructure from Insider Threats
- From Chaos to Clarity: Building Resilient Cloud Security Operations in the Age of Breaches
Learn how security leaders can facilitate the integration of conversational AI technologies within their organisations while ensuring robust security measures are in place. The discussion will emphasise the importance of enabling innovation without compromising on security standards, ultimately driving business growth and efficiency.
- Enable innovation safely by supporting conversational AI adoption while ensuring robust security measures
- Mitigate risks with tailored security protocols addressing data privacy and cyber threats
- Cultivate a security-conscious culture promoting education, collaboration, and adherence to best practices
The Cybersecurity Act 2024 introduces new protections for critical infrastructure—does it go far enough to ensure national security in the face of evolving cyber threats?
- Does the Act sufficiently cover all sectors critical to national security?
- Will the law be adaptable enough to handle emerging cybersecurity challenges?
- Are the consequences severe enough to encourage real compliance and action?
- Does the law adequately address the unique cybersecurity risks across different industries?
Who Attends?
Chief Information Security Officer
Chief Information Officer
Heads of Cloud Security
Head of Infrastructure
Head of Cloud
Head of Cloud Platform
Head of DevSecOps and AppSec
Head of Cybersecurity Architecture
IT Risk Director
Cybersecurity GRC Director
SRE Director
Network Engineering Director
Network Manager
Cybersecurity Engineering Director
Cybersecurity Operations Manager
Benefits For Attendees








Event Location
Metropolis Events

FAQs
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.
Get In Touch
Contact our event team for any enquiry

Danny Perry
For sponsorship opportunities.

Lili Munar
For guest and attendee enquiries.

Ben Turner
For speaking opportunities & content enquiries.

Taylor Stanyon
For event-related enquiries.