Sydney Secure Software and AppSec Summit 2026
Strengthen your development process with cutting-edge security practices. Connect with experts, explore automation, secure containers, and gain practical insights through interactive sessions and real-world case studies.

Fortify your software development lifecycle.
We're bringing together developers, security experts, and industry leaders to seamlessly integrate security into every step of your development process.
Discover best practices for shifting left, automating security, and managing open-source risks. Explore how to improve DevSecOps adoption, secure containers and microservices, and weigh in on the debate: automation vs. manual testing. Engage in interactive sessions, real-world case studies, panel discussions, and debates to stay ahead of the latest trends in application security.
Key Themes:
- Integrating Security into the Software Development Lifecycle
- Shift Left Strategies
- Application Breach Response
- Automating Security Processes
- Managing Open Source Risks
- Improving DevSecOps Adoption
- Container and Microservices Security
- Automation vs. Manual Testing: What Works Best
Speakers & Full Agenda Announced Soon!
Our speaker lineup will be released in March 2026.
Register now to secure your place and receive announcements when our full program launches.
Agenda
Get in early avoid the queue hot coffee and fresh made barista coffee.
AI has shifted from assistants that make suggestions to autonomous agents that can read files, execute commands, call APIs, and modify systems on their own. That change expands the attack surface from prompt injection to full system compromise, lateral movement between agents, and persistent access through memory and tooling.
This session explores how autonomous agents are reshaping the threat model, what early adopters are discovering in practice, and the questions AppSec teams must confront as AI systems gain more autonomy and more potential for harm.
The speaker will cover:
- New risks from code-executing prompt injection to agent-to-agent lateral movement
- How teams are designing permissions, audit trails, sandboxing, and monitoring agent behavior
- Examples of agents being manipulated to exfiltrate data or modify configurations
- The security shifts required to safely deploy autonomous agents in the next year
Modern applications run on layered platforms, third-party extensions, and AI assisted development and tooling, each introducing dependencies that traditional supply chain controls struggle to track. Even with SBOMs and automated scanning, teams are seeing supply chain risk surface in production through transitive packages, platform abstractions, and components that weren’t visible at build time.
This panel explores how supply chain risks are actually surfacing in real environments and what effective control looks like when dependency sprawl is structural, not accidental.
We'll Cover
- Where SBOMs help in practice and where they still fall short
- How layered platforms, third-party extensions, and AI era tooling introduce new blind spots
- What transitive dependencies, dormant packages, and platform abstractions mean for real-world risk
- Practical approaches for regaining control without killing development velocity
In this innovative session, attendees will be faced with a series of scenarios that they may face in their roles. Attendees will discuss the possible courses of action with their peers to consider the ramifications of each option before logging their own course of action.
Results will be tallied and analysed by our session facilitator and results will impact the way the group moves through the activity.
Will we collectively choose the right course of action?
Modern engineering teams move fast, and AppSec teams are constantly negotiating when to block, when to slow down, and when to accept risk to keep delivery on track. As exceptions, waivers, and temporary approvals become part of everyday workflows, many organizations struggle to understand what risks they’ve accepted, why they accepted them, and whether those decisions are still defensible months later.
This panel explores how high-performing teams balance speed with security, how they document and monitor accepted risk, and the frameworks that keep fast-moving environments accountable.
The panel will cover:
- How teams decide when risk acceptance is justified and when it isn’t
- Practical approaches to tracking exceptions, waivers, and approvals over time
- Techniques for documenting context so decisions remain defensible later
- How AppSec and engineering collaborate to keep velocity without losing control
Select a topic of discussion and engage in an interactive roundtable discussion with a group of your like-minded peers.
Put your knowledge to the test in this fast-paced quiz covering real-world trivia, key concepts, and emerging trends. Compete for bragging rights - and a travel voucher - as the top scorer takes the crown.
APIs power every modern product, yet organizations continue to face the same breach patterns year after year: over-permissioned data exposure, zombie endpoints left running long after teams move on, and orphaned microservices no one remembers owning. As architectures become more distributed and engineering velocity accelerates, the real challenge isn’t building APIs, it’s controlling their sprawl.
This session explores why API security has fallen behind, why traditional controls haven’t kept pace, and what needs to change for teams to finally get ahead of the problem.
The speaker will cover:
- Why API sprawl creates persistent security blind spots
- How over-permissioned data, zombie endpoints, and orphaned services become breach paths
- What leading teams are doing to regain visibility and ownership
- Practical steps to modernize API security in the next year
AppSec teams sit at the center of fast-moving engineering organizations, yet there’s still no consensus on how they should be structured, what they should own, or how much authority they should have to slow things down.
This interactive session puts those debates on the screen literally. The audience votes live on five core questions covering team design, ownership boundaries, blocking power, developer experience, and how AI is reshaping the AppSec operating model. We explore the results, debate the trade-offs, then vote again to see if perspectives shift in real time.
This session will cover:
- How structure and ownership shape AppSec’s influence
- When blocking authority helps or harms engineering velocity
- How AI is forcing teams to rethink traditional operating models
- What leading organizations are learning about building developer-first AppSec
Past Speaker Highlights
Who Attends?
Chief Information Officer
Chief Information Security Officer
Head of DevSecOps and AppSec
Application Security Manager
Head of Application Security
Application Development Director
Application Architects and Engineers
DevOps Director
DevOps Engineer
Head of DevOps
Software Development Director
Head of Development Technology
VP Engineering
Head of Engineering




Attendee Testimonials
Our event sponsors






Past Sponsors






.webp)

Event Location
Doltone House Hyde Park

Frequently Asked Questions
Get In Touch
Contact our event team for any enquiry

Danny Perry
For sponsorship opportunities.

Lili Munar
For guest and attendee enquiries.

Steph Tolmie
For speaking opportunities & content enquiries.

Taylor Stanyon
For event-related enquiries.











