Dockside Group
March 20, 2025
9:00am - 3:00pm

Sydney Identity, Authentication & Access Management Summit 2025

Secure the future of secure access and join industry experts for hands-on sessions and insights on identity management, authentication, and passwordless security solutions.

Sydney Identity, Authentication & Access Management Summit 2025
Sydney Identity, Authentication & Access Management Summit 2025

Welcome to the Identity, Authentication, and Access Management Summit in Sydney, where industry leaders and innovators gather to explore the critical challenges of securing digital identities in today's interconnected world.

This summit serves as a key platform for diving into the latest trends, technologies, and strategies in identity and access management (IAM). Attendees will gain invaluable insights into the tools and best practices that can help organisations strengthen their IAM frameworks and safeguard access to sensitive systems and data.

Throughout the day, participants will engage in expert-led sessions, thought-provoking discussions, and hands-on demonstrations designed to address real-world cloud security issues and opportunities.

Join us to explore:

  • Building Resilience in Identity and Access Management: Develop a robust IAM framework with automated identity lifecycle management and access governance to protect against insider threats.
  • Zero Trust: The Future of Identity and Access Security: Implement continuous authentication and least-privilege access policies to verify and secure users at every interaction.
  • The Growing Threat of Credential-Based Attacks: Enforce Multi-Factor Authentication (MFA) and use AI-driven threat detection to combat credential theft and phishing attacks.
  • AI and Machine Learning: Transforming Identity Security: Utilise AI for behavioural analytics, risk-based authentication, and automated incident response to enhance security and reduce human error.
  • Securing Identity in Cloud-Native Environments: Integrate IAM into DevSecOps pipelines, leveraging SSO and RBAC for secure access control in cloud-native environments.
  • Privacy and Compliance in Identity Management: Align IAM strategies with privacy regulations like GDPR and CCPA, ensuring auditability and compliance with data sovereignty laws.
  • Interactive Demos and Simulation Exercises: Participate in hands-on simulations to practice incident response, credential attack mitigation, and access control management.

Join us in Sydney to connect with identity, authentication, and access management experts, refine your IAM strategies, and prepare your organisation to excel in securing identities and controlling access in an evolving digital landscape.

Program Highlights

12+

Speakers

10+

Sessions

125+

IAM & Cybersecurity Leaders

1

Track

Our Speakers

Surjeet Singh

Surjeet Singh

Head of Information Security - Identity and Access Management
Vanessa Gale

Vanessa Gale

Head of Identity & Access Management
Santanu Lodh

Santanu Lodh

Chief Information Security Officer
Ilya Polyakov

Ilya Polyakov

Former Chief Security Architect and Head of Identity Management
Phil De'ath

Phil De'ath

Head of Cyber Security - APAC
Sanjay Jha

Sanjay Jha

Professor, Director, Cybersecurity and Privacy Lab
Michael Loewy

Michael Loewy

Co-Founder
Hannah Quayle

Hannah Quayle

Director of Identity and Access Management
Maruthi Gullapudi

Maruthi Gullapudi

Director
Ashwani Ram

Ashwani Ram

General Manager - Cybersecurity, Data and IT Operations
Joe Varkey

Joe Varkey

Principal Cyber Security Architect
Ray Moukaddem

Ray Moukaddem

Regional VP, Customer First APJ
Simon Ell

Simon Ell

Sales Manager
Liam Dewsnap

Liam Dewsnap

Account Executive
Simon Hu

Simon Hu

Senior Solutions Engineer
Phil Richardson

Phil Richardson

Alliances - APAC

Agenda

9:00am
Arrival & Networking
No items found.
9:15am
MC Introduction
No items found.
9:25am
Opening Keynote: The Future of Identity: Securing the Digital Landscape in an Era of Constant Change

This session will explore the future of Identity and Access Management (IAM) and how organisations can adapt to the evolving cybersecurity landscape while providing seamless, secure experiences for users.

Ilya Polyakov
Former Chief Security Architect and Head of Identity Management, NSW Department of Planning, Housing and Infrastructure
9:50am
Fireside Chat: Building a Unified Identity Security Strategy for Your Organization

As the digital landscape evolves, organizations face both opportunities and risks across their expanding digital footprint - from users and devices to networks, applications, and data. Learn how to protect against common vulnerabilities, including credential-based attacks which account for 89% of web application breaches, through a comprehensive identity security approach.

Ray Moukaddem
Regional VP, Customer First APJ, Okta
Hannah Quayle
Director of Identity and Access Management, CyberCX
10:20am
Panel Discussion: IAM in 2030: The Future of Identity and Access Management

This forward-looking panel will explore the evolving landscape of Identity and Access Management (IAM) over the next decade. Experts will discuss the cutting-edge trends and technologies that are expected to reshape IAM, including:

  • AI-powered Identity Management: AI and ML driving smarter, adaptive identity management and real-time threat detection.
  • Self-Sovereign Identity (SSI): Empowering users with control over digital identities for better privacy and security.
  • Decentralised Authentication: Blockchain and distributed ledgers creating decentralised, trust-based authentication systems across platforms.
  • The Rise of Automation: Automation streamlining IAM processes and enabling real-time, context-aware access control.

Surjeet Singh
Head of Information Security - Identity and Access Management, Rest Super
Santanu Lodh
Chief Information Security Officer, OFX
Simon Ell
Sales Manager, Sailpoint
Phil De'ath
Head of Cyber Security - APAC, APM
10:50am
Morning Tea & Networking
No items found.
11:20am
Audience Activity

In this innovative session, attendees will be faced with a series of scenarios that they may face in their roles. Attendees will discuss the possible courses of action with their peers to consider the ramifications of each option before logging their own course of action.

Results will be tallied and analysed by our session facilitator and results will impact the way the group moves through the activity.

Will we collectively choose the right course of action?

No items found.
11:40am
How we address Windows Active Directory blind spots that attackers regularly target..

According to the Australian Signals Directorate (ASD), Microsoft’s Windows Active Directory is the most widely used authentication and authorisation solution in enterprise IT (and OT) networks globally. 

This makes it a valuable target for malicious cyber actors and it is routinely targeted as part of attacks against enterprise networks.  

With Windows Active Directory being a regular factor in the increasing amount of data theft and business disruptions by attackers gaining unauthorised access to systems and data:

  • What are common blind-spots that organisations face and that attackers exploit?
  • How modern identity-security controls help mitigate the risk exposure organisations face?
  • Demonstration of applying these controls where it was difficult/impossible to do before!

Phil Richardson
Alliances - APAC, SIlverfort
11:55am
How I Solved... the catastrophic threat of a compromised admin with Ineffable Cryptography

Discover how reimagining digital authority transforms data security and digital ownership, and why breaches soon won’t matter.

  • Super-admin altering any permissions, vendor devops with a backdoor, sysadmin accessing root keys,  db-admin accessing any record – takes only one to compromise
  • Understanding the fundamental flaw in today’s cybersecurity
  • How ineffable cryptography ensures digital authority can no longer be stolen or abused
  • How application of the technology to your IAM will turn a breach from a catastrophe into a non-event

Michael Loewy
Co-Founder, Tide Foundation
12:10pm
How We Secured... Non-Human Identities and Stopped Hidden Access Risks
  • Understanding the risks associated with service accounts, bots, and machine identities, and how to bring them under governance
  • Implementing access controls, automated policy enforcement, and real-time monitoring to detect and prevent unauthorised privilege escalations
  • Demonstrating how to unify identity security across on-prem, cloud, and third-party applications without disrupting operation

Simon Hu
Senior Solutions Engineer, Saviynt
12:25pm
Panel discussion Zero Trust Identity: The Future of Access Management in Cloud Security
  • Why is Zero Trust IAM becoming the standard for Cloud Security: Zero Trust principles, such as least-privilege access and continuous identity verification, are crucial for securing modern cloud environments and reducing risk
  • Challenges in Implementing Zero Trust for IAM: Implementing Zero Trust in hybrid and multi-cloud environments presents challenges, such as integrating legacy systems and managing diverse identity sources
  • Evolving IAM Models for Continuous Verification: Organisations must evolve their IAM strategies to support real-time authentication, adaptive access control, and continuous identity verification
  • Success Stories and Lessons Learned: Successful enterprise adoption of Zero Trust for IAM demonstrates its impact on security and the valuable lessons learned along the way

Vanessa Gale
Head of Identity & Access Management, Latitude Financial Services
Liam Dewsnap
Account Executive, Ping Identity
Joe Varkey
Principal Cyber Security Architect, AIA
12:55pm
Roundtable Discussions

Choose 1 topic from the following:

  1. Secure Your Identity Infrastructure from Insider Threats
  2. What is the future of Identity Governance and Security?
  3. Implementing Adaptive Authentication to Combat Evolving Threats
  4. The role of Unified Identity Security in protecting your organisation from malicious cyber actors
  5. Bridging the Gap: Integrating Privileged Access Management and Identity Access Governance
  6. Secure identity before, during, and after authentication:  Addressing additional roadblocks in your IAM solution
  7. Leveraging AI in Modern Privileged Access Management: Uncovering Threats and Hidden Paths to Privilege 
No items found.
1:45PM
Lunch and Exhibition

No items found.
2:35pm
Afternoon keynote: AI Deepfakes & the Future of Identity Security

AI-powered deepfakes have become more sophisticated, which means organisations must stay ahead of evolving threats to digital identity, authentication, and trust. In this presentation, we’ll unpack: 

  • The increasing role of AI deepfakes in identity fraud and authentication
  • Emerging detection techniques and AI-driven countermeasures
  • Best practices for safeguarding digital identities in a deepfake-driven landscape

Sanjay Jha
Professor, Director, Cybersecurity and Privacy Lab, UNSW
2:55pm
The Great Identity Think Tank: Navigating the Next Frontier in IAM

As identity, authentication, and access management practices evolve, the industry is rife with debate over which technologies and models best serve security and user experience. This session challenges thought leaders to examine the pros, cons, and trade-offs of emerging trends that are reshaping the IAM landscape.

Contentious Trends Up for Debate:

  • Should we focus on centralised or decentralised identity?
  • Is passwordless authentication the next big thing?
  • Is there more to come for consumer biometrics or has the novelty worn off?
  • Is the digital identity bill achieving its goal? 
  • Should UX be considered in choosing IAM methods?

Tania Snell
Founder, Nightingale Cybersecurity
Maruthi Gullapudi
Director, Deloitte
Ashwani Ram
General Manager - Cybersecurity, Data and IT Operations, Chartered Accountants Australia and New Zealand
3:25PM
Event Closes
No items found.

Who Attends?

Chief IAM Officer

Chief Identity Engineer

Head of KYC

Head of Risk and Compliance

Head of Financial Crime

Head of Privacy

Head of Identity Governance

Head of Cybersecurity Platform

Head of IAM

Head of Access Control

Head of PAM

Cyber GRC Director

CIAM Director

Digital ID Manager

Workforce Identity Lifecycle Manager

Digital Product Manager

Fraud Risk Manager

Authentication Manager

Cybersecurity Engineering Manager

Cybersecurity Architecture Manager

Benefits For Attendees

4.7 / 5

average overall rating from attendees at our events.

94%

of attendees rate our content as “Extremely Relevant”.

100%

of attendees would recommend attending a Clutch Event to a colleague.

Our event sponsors
For sponsorship opportunities, please get in touch with Danny Perry, danny@weareclutch.com.au

Event Location

Dockside Group

2 Wheat Road, Sydney, NSW 2000
Sydney Identity, Authentication & Access Management Summit 2025

FAQs

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.

No items found.

Get In Touch

Contact our event team for any enquiry

Danny Perry

Director of Sales
For sponsorship opportunities.
danny@weareclutch.com.au

Lili Munar

Director of Client Relations
For guest and attendee enquiries.
lilibeth@weareclutch.com.au

Ben Turner

Director of Conference Production
For speaking opportunities & content enquiries.
ben@weareclutch.com.au

Taylor Stanyon

Director of Operations
For event-related enquiries.
taylor@weareclutch.com.au