June 17, 2026
08:30am - 3:30pm
Doltone House Hyde Park

Sydney Secure Software and AppSec Summit 2026

Strengthen your development process with cutting-edge security practices. Connect with experts, explore automation, secure containers, and gain practical insights through interactive sessions and real-world case studies.

Sydney Secure Software and AppSec Summit 2026
Fortify your software development lifecycle.

We're bringing together developers, security experts, and industry leaders to seamlessly integrate security into every step of your development process.

Discover best practices for shifting left, automating security, and managing open-source risks. Explore how to improve DevSecOps adoption, secure containers and microservices, and weigh in on the debate: automation vs. manual testing. Engage in interactive sessions, real-world case studies, panel discussions, and debates to stay ahead of the latest trends in application security.

Key Themes:

  • Integrating Security into the Software Development Lifecycle
  • Shift Left Strategies
  • Application Breach Response
  • Automating Security Processes
  • Managing Open Source Risks
  • Improving DevSecOps Adoption
  • Container and Microservices Security
  • Automation vs. Manual Testing: What Works Best

Register now to secure your place.

Our Speakers

Robert Whelan

Robert Whelan

Security Architect
Cole Cornford

Cole Cornford

Chief Executive Officer
Richard Hawkes

Richard Hawkes

Senior Manager, DevSecOps & Platform Engineering
Dinesh Singh Panwar

Dinesh Singh Panwar

Head of Technology
Sarah Assaf

Sarah Assaf

Senior Security Engineer
Edwin Kwan

Edwin Kwan

Head of Product Security
Jason Koh

Jason Koh

Head of Cyber Security Design and Assurance
Hamid Vahidi

Hamid Vahidi

Senior Engineering Manager
Francis Dong

Francis Dong

Lead Application Security Engineer
Kason Yu

Kason Yu

Senior Enterprise Architect
Akhil Sharma

Akhil Sharma

Security and Compliance Director
Paul McCarty

Paul McCarty

Founder
Gaurav Vikash

Gaurav Vikash

Head of Security and Risk - APAC
Suganthi Krishnavathi

Suganthi Krishnavathi

Staff Solutions Engineer
Register Now

Register Now

To receive speaker and program updates and secure your seat!

Agenda

8:30 AM
Registration Opens & Networking Breakfast

Beat the rush and join us early for complimentary barista-made coffee and breakfast.

No items found.
9:15 AM
Welcome & Opening Remarks
No items found.
9:20 AM
Opening Keynote: Secure by Design in Practice: Building Defensible Architecture for AI-Assisted Software

AI-assisted development is reshaping how software is built but it’s also introducing new risks across the SDLC, from generated code to autonomous workflows. This session explores how organisations are embedding Secure by Design principles and modern defensible architecture to maintain control, visibility, and trust as AI becomes part of everyday engineering.

You’ll learn how leading teams are evolving their security models to support speed without compromising resilience in an increasingly AI-driven environment.


• How to embed Secure by Design principles into AI-assisted development workflows
• What defensible architecture looks like when code is increasingly AI-generated
• Practical approaches to maintaining control, visibility, and trust as AI scales across the SDLC

Robert Whelan
Security Architect, Australian Signals Directorate
9:40 AM
Keynote: Hidden in Plain Sight: The AI Risks Developers Overlook

While teams focus on improving model performance and speed, new AI-specific security risks are quietly entering production.

In this session Suganthi will cover:

  • Where traditional security practices fall short in AI-driven development.
  • Why existing approaches to application security need to evolve.
  • How developers can identify and fix these issues early without slowing innovation down.

Suganthi Krishnavathi
Staff Solutions Engineer, Snyk
10:10 AM
Panel Discussion: The Evolving Supply Chain Risk Landscape: What’s Actually Breaking in Production

Modern applications run on layered platforms, third-party extensions, and AI assisted development and tooling, each introducing dependencies that traditional supply chain controls struggle to track. Even with SBOMs and automated scanning, teams are seeing supply chain risk surface in production through transitive packages, platform abstractions, and components that weren’t visible at build time.

This panel explores how supply chain risks are actually surfacing in real environments and what effective control looks like when dependency sprawl is structural, not accidental.

We'll Cover

  • Where SBOMs help in practice and where they still fall short
  • How layered platforms, third-party extensions, and AI era tooling introduce new blind spots
  • What transitive dependencies, dormant packages, and platform abstractions mean for real-world risk
  • Practical approaches for regaining control without killing development velocity
Edwin Kwan
Head of Product Security, Domain Group
Kason Yu
Senior Enterprise Architect, Commonwealth Bank
Dinesh Singh Panwar
Head of Technology , Westpac Group
10:40 AM
How I Solved...
No items found.
10:55
Morning Tea & Networking
No items found.
11:25 AM
Audience Activity

In this innovative session, attendees will be faced with a series of scenarios that they may face in their roles. Attendees will discuss the possible courses of action with their peers to consider the ramifications of each option before logging their own course of action.

Results will be tallied and analysed by our session facilitator and results will impact the way the group moves through the activity.

Will we collectively choose the right course of action?

No items found.
11:40 AM
How I Solved...Redesigning Secure Code Review for an AI-Native World

AI is changing how software gets written. Code is no longer produced line by line by a single developer. It is generated, refactored, and stitched together by AI tools at a speed traditional review processes were never designed to handle. Yet many AppSec programs are still relying on the same manual reviews, static rules, and approval gates built for a pre-AI era.

This keynote explores why secure code review is breaking down as AI becomes a core part of development, where existing practices create false confidence, and what needs to change to keep risk under control without slowing teams to a crawl.

The speaker will cover:

  • Why AI-generated code shifts risk from individual lines to system-level behaviour
  • Where traditional code review and SAST fail in high-velocity, AI-assisted pipelines
  • How leading teams are redesigning review around intent, context, and ownership
  • Practical ways to evolve secure code review for AI-native development in the next 12 months

Cole Cornford
Chief Executive Officer, Galah Cyber
11:55 AM
How I Solved ... The Authority Gap: Building Production-Ready AI Without Custom Identity Code

Last year, our team faced a critical problem: every AI agent deployed required weeks of custom identity work before it could reach production. Authentication, authorisation, audit trails, compliance, all built from scratch.

In this hands-on session, I’ll show how we solved it by embedding identity directly into AI code generation from the start, not bolting it on later.

You’ll see the before and after: a slow, risky workflow replaced by identity-first generation with built-in governance. Through a live demo, I’ll show how we moved to production-ready agents in days, reclaimed 20% of dev capacity, and redirected it into higher-value work.

Key Takeaways:

  • Why custom identity code kills AI velocity and how to remove it
  • How to reclaim dev capacity without sacrificing security or compliance
  • A path to production-ready AI that doesn’t slow teams down

No items found.
12:10 PM
Panel Discussion: Security vs Velocity: When to Say Yes to Risk (and How to Track What You Said Yes To)

Modern engineering teams move fast, and AppSec teams are constantly negotiating when to block, when to slow down, and when to accept risk to keep delivery on track. As exceptions, waivers, and temporary approvals become part of everyday workflows, many organisations struggle to understand what risks they’ve accepted, why they accepted them, and whether those decisions are still defensible months later. 

This panel explores how high-performing teams balance speed with security, how they document and monitor accepted risk, and the frameworks that keep fast-moving environments accountable.

The panel will cover:

  • How teams decide when risk acceptance is justified and when it isn’t
  • Practical approaches to tracking exceptions, waivers, and approvals over time
  • Techniques for documenting context so decisions remain defensible later
  • How AppSec and engineering collaborate to keep velocity without losing control

Richard Hawkes
Senior Manager, DevSecOps & Platform Engineering, ASX
Jason Koh
Head of Cyber Security Design and Assurance, Insignia Financial
Sarah Assaf
Senior Security Engineer, Stan.
Hamid Vahidi
Senior Engineering Manager, Commonwealth Bank
12:40 PM
Roundtable Discussions

Select a topic of discussion and engage in an interactive roundtable discussion with a group of your like-minded peers.

No items found.
1:30 PM
Lunch & Networking
No items found.
2:30 PM
QuickFire Quiz: Test Your Knowledge Against Your Peers

Put your knowledge to the test in this fast-paced quiz covering real-world trivia, key concepts, and emerging trends. Compete for bragging rights - and a travel voucher - as the top scorer takes the crown.

No items found.
2:35 PM
Testing Second-Order Prompt Injection in AI Agent Deployments

Most security programs have matured around AI-generated code risks, but a critical gap remains: the injection surface introduced by autonomous AI agents. Gaurav Vikash, Head of Security and Risk, Apac at Axon presents hands-on testing across Claude Desktop with MCP tooling, browser-based agents, and document processing pipelines, with demos highlighting where trust models fail and where they still hold.  

Key Takeaways:

  • Understand how second-order prompt injection emerges when agents retrieve and process external content.  
  • See concrete examples of where trust boundaries break across common AI agent deployments.  
  • Learn how to evaluate and strengthen trust models to mitigate these emerging risks.  

Gaurav Vikash
Head of Security and Risk - APAC, AXON
2:55 PM
How I Solved...
No items found.
3:10 PM
Keynote: Everything Is an API Now. So Why Are They Still the #1 Breach Vector?

APIs power every modern product, yet organisations continue to face the same breach patterns year after year: over-permissioned data exposure, zombie endpoints left running long after teams move on, and orphaned microservices no one remembers owning. As architectures become more distributed and engineering velocity accelerates, the real challenge isn’t building APIs, it’s controlling their sprawl. 

This session explores why API security has fallen behind, why traditional controls haven’t kept pace, and what needs to change for teams to finally get ahead of the problem.

The speaker will cover:

  • Why API sprawl creates persistent security blind spots
  • How over-permissioned data, zombie endpoints, and orphaned services become breach paths
  • What leading teams are doing to regain visibility and ownership
  • Practical steps to modernize API security in the next year
Francis Dong
Lead application Security Engineer, BigCommerce
3:30 PM
Think Tank: How AppSec Should Really Operate: Live Debate With the Audience

AppSec teams sit at the center of fast-moving engineering organisations, yet there’s still no consensus on how they should be structured, what they should own, or how much authority they should have to slow things down. 

This interactive session puts those debates on the screen literally. The audience votes live on five core questions covering team design, ownership boundaries, blocking power, developer experience, and how AI is reshaping the AppSec operating model. We explore the results, debate the trade-offs, then vote again to see if perspectives shift in real time.

This session will cover:

  • How structure and ownership shape AppSec’s influence
  • When blocking authority helps or harms engineering velocity
  • How AI is forcing teams to rethink traditional operating models
  • What leading organisations are learning about building developer-first AppSec

Paul McCarty
Founder, OpenSourceMalware
Cole Cornford
Chief Executive Officer, Galah Cyber
Akhil Sharma
Security and Compliance Director, Vital
4:00 PM
Networking Drinks Hour

Unwind with your peers for a couple of drinks on us!

No items found.
5:00 PM
Event Closed
No items found.

Our event sponsors

For sponsorship opportunities, please get in touch with Danny Perry, danny@clutchgroup.co

Past Speaker Highlights

Anne-Marie Charett

Group Owner - Principal Automation, Telstra

Glen Whitaker

E2E Platform Automation Group Owner, Telstra

Cole Cornford

Chief Executive Officer, Galah Cyber

Scott Contini

AppSec Manager, Nine

Sara Gray

Senior Product Security Manager, Atlassian

Jon-Anthony de Boer

Product Security Lead, Transmax

Past Sponsors

Event Location

Doltone House Hyde Park

3/181 Elizabeth St, Sydney NSW 2000
Sydney Secure Software and AppSec Summit 2026

About Clutch

Hyper-Niche Content

Our conferences are specific to niche sub-sets of the technology industry, drilling down into the biggest issues, challenges and market trends facing tomorrow's leaders.

Collaboration first

Enjoy ample networking opportunities, roundtable discussions, interactive group sessions and real-world case-studies that arm attendees with actionable insights.

Dynamic & Bite-Size formats

No more death-by-PowerPoint. Our events are short, sharp and collaborative with a variety of session formats and a 3/4 day commitment to ensure returns on your time investment.

Get In Touch

Contact our event team for any enquiry

Danny Perry

Director of Sales
For sponsorship opportunities.
danny@clutchgroup.co

Lili Munar

Director of Client Relations
For guest and attendee enquiries.
lilibeth@clutchgroup.co

Steph Tolmie

Director of Conference Production
For speaking opportunities & content enquiries.
stephanie@clutchevents.co

Taylor Stanyon

Director of Operations
For event-related enquiries.
taylor@clutchgroup.co