Sydney Cloud Security Summit 2025
Join us at the Cloud Security Summit to strengthen your cloud defenses and tackle emerging threats. Explore Zero Trust, secure multi-cloud deployments, and AI-driven security with industry experts through hands-on sessions and real-world case studies.

Join us at the Cloud Security Summit to explore the latest in cloud security and stay ahead of emerging threats.
This August, we're bringing together cloud security professionals, IT leaders, and industry experts to strengthen your cloud security posture and safeguard your organisation.
Dive deep into Zero Trust models, secure multi-cloud deployments, ensure your Infrastructure-as-Code is compliant, and discover how AI is revolutionising cloud security. Participate in interactive sessions, real-world case studies, panel discussions, and debates to stay ahead of the game.
Key Themes:
- Tackling Emerging Cloud Security
- ThreatsImplementing Zero Trust in Cloud Environments
- Securing Multi-Cloud Deployments
- Ensuring Infrastructure-as-Code Compliance
- Leveraging AI in Cloud Security
- Protecting Cloud Data
- Building Robust Cloud Security Architectures
Who Should Attend?
Cloud security professionals, IT leaders, cybersecurity experts, DevOps engineers, and anyone keen to enhance their understanding of cloud security and network with industry peers.
Don't miss this chance for a day of learning, innovation, and collaboration at the Cloud Security Summit.
Program Highlights
Speakers
Sessions
Cloud Security Leaders
Track
Our Speakers
Agenda
AI systems like chatbots and agent models are booming—but traditional cloud security doesn’t see the threats they bring. Learn how one team adapted their security program to protect AI from emerging risks.
- Why AI workloads introduce new types of risks (e.g. prompt injection, agent misuse)
- Why traditional tools miss these threats entirely
- How to monitor what’s going in and out of LLMs
- Lessons from securing inference pipelines and vector databases
Enterprise applications are deployed across a wide range of cloud environments, each with their own security controls of various capabilities. In the meantime, the threat landscape for web applications has become increasingly sophisticated, and has seen common threats like Bot, DDoS, and Application attacks persist and grow in complexity.
- The evolving nature of Bot, DDoS, and Layer 7 application attacks — and why they continue to succeed
- Architecting a consistent security inspection and enforcement layer at the edge, independent of origin infrastructure
- Leveraging DevOps tools like Terraform and GitHub to automate the deployment of security controls as part of the CI/CD pipeline
From AI integration to multi-cloud sprawl and ephemeral workloads, Australian organisations are facing a new set of cloud security challenges. This panel brings together security leaders across industries to discuss how they’re adapting their strategies to stay ahead of emerging threats and evolving regulatory pressure.
- What cloud threats are gaining traction across Australia right now
- Why AI, serverless, and multi-cloud are exposing new security blind spots
- How local teams are balancing innovation with risk—without slowing down delivery
- What capabilities, tools, and talent Australian orgs are prioritising for the future
In this innovative session, attendees will be faced with a series of scenarios that they may face in their roles. Attendees will discuss the possible courses of action with their peers to consider the ramifications of each option before logging their own course of action.
Results will be tallied and analysed by our session facilitator and results will impact the way the group moves through the activity.
Will we collectively choose the right course of action?
Securing access in the cloud is one thing — scaling it across teams and platforms without constant manual oversight is another. In this talk, Kenny shares how he designed and implemented a scalable IAM guardrail solution that automates permission boundaries, enforces policy consistency, and reduces risk across CBA’s cloud environments.
You deployed with Terraform—but did the cloud environment change after that? This demo shows how to spot and fix drift between IaC and real cloud state.
- Why drift happens (and how it leads to risk)
- Tools for detecting changes not in your repo
- How to automate drift correction
- Building trust in your security baselines
One exposed Lambda shouldn’t lead to a full cloud breach. This panel shares how teams are enforcing tighter roles, networks, and service boundaries.
- What flat cloud environments look like (and why they’re dangerous)
- How attackers move laterally across over-permissioned roles
- Real-world examples of blast radius failures
- Segmentation strategies across IAM, VPCs, and accounts
Choose 1 topic to join on the day!
- Securing AI Workloads in the Cloud
- Detecting Threats in Short-Lived Cloud Workloads
- Stopping Cloud-Native Ransomware
- Managing Secrets in the Cloud at Scale
- Fixing Multi-Cloud Identity Sprawl
- Securing Temporary Cloud Credentials in CI/CD Pipelines
- Controlling Third-Party Access to Cloud and SaaS
- Mapping Cloud Controls to Compliance Requirements
Put your cloud security knowledge to the test in this fast-paced quiz covering real-world threats, key concepts, and emerging trends. Compete for bragging rights—and a $500 voucher—as the top scorer takes the crown.
Finance wants to cut costs—security wants to protect. This keynote explores how one team justified controls like logging, backups, and monitoring in a cost-cutting world.
- Which controls get cut first—and why it’s risky
- Talking security in financial language
- Metrics that justify spend (MTTR, data loss, breach cost)
- How to work with FinOps, not against them
As cloud sprawl accelerates, teams face a trade-off between agility and control. This think tank explores whether it’s time to consolidate, simplify, and standardise—or double down on layered defenses to manage complexity.
- Is multi-cloud making security harder than it needs to be?
- Should we centralise controls or decentralise responsibility?
- What’s the right balance between developer freedom and guardrails?
- How leading orgs are designing for simplicity and security
Who Attends?
Chief Information Security Officer
Chief Information Officer
Heads of Cloud Security
Head of Infrastructure
Head of Cloud
Head of Cloud Platform
Head of DevSecOps and AppSec
Head of Cybersecurity Architecture
IT Risk Director
Cybersecurity GRC Director
SRE Director
Network Engineering Director
Network Manager
Cybersecurity Engineering Director
Cybersecurity Operations Manager
Benefits For Attendees





Event Location
Dockside

FAQs
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.
Get In Touch
Contact our event team for any enquiry

Danny Perry
For sponsorship opportunities.

Lili Munar
For guest and attendee enquiries.

Ben Turner
For speaking opportunities & content enquiries.

Taylor Stanyon
For event-related enquiries.