March 26, 2026
08:30am - 3:30pm
The Fullerton Hotel Sydney

Sydney Identity, Authentication and Access Management Summit 2026

Join us at the third edition of the IAAM Summit in Sydney to explore the latest in security and compliance with expert-led sessions and interactive discussions. Connect with peers, tackle real-world IAM challenges, and leave with practical insights to strengthen your organisation’s digital identity strategy.

Sydney Identity, Authentication and Access Management Summit 2026

Join us for professionals dedicated to advancing security and compliance.

Attendees will engage in a series of expert-led sessions and interactive activities designed to tackle current challenges and future opportunities in identity and access management.

Highlights include:

  • Implementing the Australian Digital Identity Bill
  • Managing security with access controls
  • Demonstration sessions showcasing real-world solutions to industry challenges
  • A dynamic debate on centralised versus decentralised IAM solutions
  • Unifying identity management across hybrid and multi-cloud environments

This summit promises to equip attendees with the insights and tools needed to navigate the complexities of modern identity management.

Register now to secure your place and receive announcements when our full program launches.

Our Speakers

James Kay

James Kay

Assistant Director-General, Standards, Technical Advice and Research
Maryam Shoraka

Maryam Shoraka

Award Winning Cybersecurity Expert
Krishna Bagla

Krishna Bagla

Manager Cyber Security Operations & Implementation
Vanessa Gale

Vanessa Gale

Head of Identity & Access Management
Jonathan Kelly

Jonathan Kelly

Group Head of Product and Digital
Dr Thayabaran Kathiresan

Dr Thayabaran Kathiresan

Applied AI Scientist and Deepfake Expert
Joe Varkey

Joe Varkey

Practice Lead Security Architecture
Madhuri Nandi

Madhuri Nandi

Head of Security, Nuvei
Gopal Arun

Gopal Arun

Manager Identity and Access Management
Chris Ong

Chris Ong

Senior Manager Identity and Access Management
Miguel Carrasco

Miguel Carrasco

Managing Director and Senior Partner
Tanvir Malek

Tanvir Malek

Product Owner - Privileged Access Management
Surjeet Singh

Surjeet Singh

Head of Information Security - Identity and Access Management
Ash Diffey

Ash Diffey

Vice President, ANZ
Ashley Pereira

Ashley Pereira

Solutions Consultant
Prakash Palani

Prakash Palani

Founder & CTO
Analisa Barretto

Analisa Barretto

Director, Cyber
Ariel Kadyshevitch

Ariel Kadyshevitch

Senior Director, Engineering
Philip Nye

Philip Nye

Senior Product Manager
Register Now

Register Now

To receive speaker and program updates and secure your seat!

Agenda

8:30 AM
Registration Opens & Networking Breakfast

Beat the rush and join us early for complimentary barista-made coffee and breakfast.

No items found.
9:15 AM
Welcome & Opening Remarks
No items found.
9:20 AM
Keynote: Identity Observability: Turning Identity Signals into Real-Time Threat Defence

Identity is now the most valuable signal in cyber  and the earliest indicator of attacker intent. In high-threat environments, waiting for alerts isn’t enough.

This session breaks down how critical organisations are using identity telemetry. Logins, privilege shifts, access anomalies, and behavioural patterns  to detect hostile activity earlier, disrupt lateral movement, and respond before impact. Hear the practical playbook for shifting identity from a static control to a live threat-intelligence capability, and what it takes to operationalise identity data at scale.

James Kay
Assistant Director-General, Standards, Technical Advice and Research, Australian Signals Directorate
9:40 AM
Keynote: Managing Non-Human Identities in the Age of AI Agents

The number of non-human identities, from AI agents to service accounts and automation scripts, now far exceeds human users in many environments. But these identities often lack clear ownership, lifecycle management, or access controls. In this session, we’ll unpack why they’ve become one of the most overlooked and risky parts of modern identity programs.You’ll learn how to:

  • Identify and inventory non-human identities across your environment
  • Set lifecycle, ownership, and access policies that actually stick
  • Reduce risk by securing tokens, automation credentials, and embedded secrets

Ariel Kadyshevitch
Senior Director, Engineering, Okta
Analisa Barretto
Director, Cyber, Deloitte Technology and Transformation
10:10 AM
Panel: Identity + PAM: Securing Privileged Access in a Zero Trust World

As hybrid environments expand and automation increases, privileged access has become the most exploited pathway in breaches. Identities, human and machine, now hold powerful permissions across cloud, APIs, SaaS, and operational systems, making traditional PAM models too slow and siloed.This panel will explore how organisations are unifying Identity and PAM strategies to gain visibility, enforce least privilege, and detect misuse in real time. Hear how leaders are reducing privileged sprawl, managing machine credentials, and aligning PAM with Zero Trust without slowing operations.

  • Why converging IAM and PAM is critical for controlling high-risk access across cloud and hybrid environments.
  • Practical approaches to reducing privileged sprawl and managing machine identities at scale.
  • How to automate least privilege and real-time monitoring without disrupting productivity.

Gopal Arun
Manager Identity and Access Management, NSW Department of Education
Krishna Bagla
Manager Cyber Security Operations & Implementation, NSW Government
Tanvir Malek
Product Owner - Privileged Access Management, Allianz
Ash Diffey
Vice President, ANZ, Ping Identity
10:40 AM
How I Solved ... Access Control Gaps Without Enterprise Complexity

When we uncovered privilege creep, inconsistent approvals, and legacy access pathways, the obvious solution was a large-scale IAM overhaul. Instead, we focused on targeted controls, clearer accountability, and practical automation to close the highest-risk gaps without introducing heavyweight enterprise complexity.

  • Prioritise real risk over perfect architecture
  • Clarify ownership before adding tooling
  • Automate guardrails, not bureaucracy

Harsh Rasik Busa
Chief Information Security Officer, Avant Mutual
10:55 AM
Morning Tea & Networking
No items found.
11:25 AM
Audience Activity

An interactive session where attendees participate in handling a simulated breach due to compromised credentials, focusing on containment and remediation strategies.

No items found.
11:40 AM
How I Solved....Defending Against Deepfake Voice Threats & What IAM Teams Must Do Next

Synthetic voice technologies are advancing rapidly, placing increasing pressure on voice-based authentication and verification systems. This session examines how deepfake audio is beginning to surface in real security-relevant contexts and what this means for identity and access management (IAM).

Drawing on applied research and real-world deployments across speech science and AI security, the talk highlights documented cases of synthetic voice misuse and detection, and what they reveal about current system limitations. It also outlines practical strategies for improving resilience as voice synthesis continues to evolve.

  • Where deepfake voice risks are already emerging in operational workflows
  • How detection and layered defences can strengthen voice authentication
  • What IAM teams should prepare for as synthetic speech capabilities advance

Dr Thayabaran Kathiresan
Applied AI Scientist and Deepfake Expert, University of Melbourne
11:55 AM
How I solved...the challenge of securing AI identity in a world of autonomous agents

As organisations move beyond human users, non‑human identities (NHIs) have become critical to trust, security, and governance. In this session, I demonstrate an NHI architecture built using IBM Verify IAM integrated with HashiCorp Vault, showing how identity, authentication, and secrets management work together in practice.

Using a stock trading scenario, I walk through how AI agents securely authenticate, retrieve credentials, and interact with systems without exposing sensitive data. The demo brings to life an end‑to‑end, zero‑trust approach to securing agent-based workflows—illustrating how enterprises can confidently scale AI while maintaining control, compliance, and resilience.

Philip Nye
Senior Product Manager, IBM Verify
12:10 PM
Panel: Balancing User Experience and Security in Identity Management

Users expect fast, seamless access - while attackers increasingly target identity as the weakest link. This session explores how organisations can deliver frictionless experiences without sacrificing security, using adaptive authentication, passwordless approaches, and smart UX design. Learn practical ways to reduce drop-off, strengthen trust, and align security and product goals.

  • Apply adaptive, risk-based authentication to reduce friction while improving protection.
  • Use design patterns like passwordless and progressive profiling to streamline user journeys.
  • Align security and product teams to create identity experiences that drive engagement and trust.

Madhuri Nandi
Head of Security, Nuvei
Vanessa Gale
Head of Identity & Access Management, Latitude Financial Services
Surjeet Singh
Head of Information Security - Identity and Access Management, Rest Super
Ashley Pereira
Solutions Consultant, iProov
12:40 PM
Roundtable Discussions

Delegates will chose from a list of pertinent peer-to-peer discussion topics focussing on evolving and emerging trends, techniques and technologies.

No items found.
1: 30 PM
Lunch & Networking
No items found.
2:20 PM
QuickFire Quiz: Test Your Knowledge Against Your Peers

Put your knowledge to the test in this fast-paced quiz covering real-world identity trivia, key concepts, and emerging trends. Compete for bragging rights—and a travel voucher—as the top scorer takes the crown.

No items found.
2:35PM
How I Solved... Identity and Access Bottlenecks with Agentic AI

Identity and Access Management often promises control and efficiency. In practice, many enterprises face complex role catalogs, slow approval cycles, inconsistent certification reviews, and emergency access processes that strain security teams and auditors.

This session explores how Agentic AI introduces structured intelligence across the full identity lifecycle without disrupting existing governance frameworks or security controls. Rather than replacing human oversight, AI agents operate within defined guardrails to augment decision-making, strengthen least-privilege enforcement, and reduce operational load.

We will examine practical use cases across enterprise IAM environments, including:

  • Intent-driven access request conversations that guide users to the right access, reducing dependency on static role catalogs
  • Birthright role mapping and AI-based approval recommendations that improve speed and consistency in access approvals and certification campaigns
  • Automated compliance summarization and contextual review support for managers and application owners
  • Emergency access reviews reduced from hours to minutes, improving audit readiness and control transparency

Prakash Palani
Founder & CTO, BCS
2:50 PM
Keynote: Quantum-Proofing Identity – Preparing IAM for the Post-Quantum Era

As quantum computing advances, today’s encryption standards (RSA, ECC) that underpin most identity and access management systems could become obsolete.

This session explores how organisations can prepare IAM programs for a quantum-ready future. What quantum computing means for IAM and why today’s cryptography won’t hold up.

  • Post-quantum cryptographic (PQC) standards emerging from NIST and their IAM implications.
  • Transition strategies: crypto-agility, hybrid models, and vendor roadmaps to quantum-safe IAM.
  • Business impact: how to balance long-term resilience with short-term cost and complexity.

Maryam Shoraka
Award Winning Cybersecurity Expert
3:10 PM
Think Tank: ‍The Future of Digital Identity in Australia

In this session we will take a live pulse of the room with a series of multiple questions discussing Interoperability, digital wallets, and citizen identity and where Australia fits in the global identity landscape and have our panel of leaders discuss in this open forum think tank.

This interactive session puts these questions directly to the audience. Participants vote live on a series of real-world scenarios, explore the results together, and vote again as perspectives shift through the discussion.

  • How close do you think Australia is to making digital wallets part of everyday life?
  • In your view, what’s the hardest challenge to overcome for digital identity adoption?
  • Which sector is best placed to push digital identity forward in Australia?
  • When thinking about interoperability, where should Australia focus its first big step?
  • By 2030, what form of citizen identity do you think Australians will rely on most?
  • How do you see Australia’s position in the global identity landscape by the end of the decade?

Joe Varkey
Practice Lead Security Architecture, AIA
Chris Ong
Senior Manager Identity and Access Management, Insignia Financial
Jonathan Kelly
Group Head of Product and Digital, McMillan Shakespeare
Miguel Carrasco
Managing Director and Senior Partner, BCG
3:40 PM
Networking Drinks Hour

Unwind with your peers for a couple of drinks on us!

No items found.
4:40 PM
Event Closed
No items found.

Past Speaker Highlights

Jan Zeilinga

Former Chief Information Security Officer, James Cook University

Santanu Lodh

Chief Information Security Officer, OFX

Surjeet Singh

Head of Information Security - Identity and Access Management, Rest Super

Ilya Polyakov

Former Chief Security Architect and Head of Identity Management, NSW Department of Planning, Housing and Infrastructure

Sanjay Jha

Professor, Director, Cybersecurity and Privacy Lab, UNSW

Vanessa Gale

Head of Identity & Access Management, Latitude Financial Services

Who Attends?

Chief Information Security Officer

Chief Information Officer

Chief IAM Officer

Chief Risk Officer

Cybersecurity Directors

Head of Cybersecurity

Cybersecurity GRC Director

Senior Cybersecurity Managers

Cybersecurity Engineering Manager

Chief Identity Engineer

Head of Identity Governance

Workforce Identity Lifecycle Manager

Head of IAM

Senior IAM Managers

Head of KYC

Product Security Director

CIAM Director

Man in gray blazer holding a laptop and talking to another man wearing a black jacket with a conference badge, surrounded by other attendees with badges at an indoor event.Audience seated in a conference room watching a speaker present slides about winning fantastic prizes on large screens.Crowd of people networking indoors at a conference or event with informational booths in the background.Audience attentively listening to a speaker in a conference room with round tables and water pitchers.

Attendee Testimonials

No items found.
No items found.
No items found.
No items found.

Our event sponsors

For sponsorship opportunities, please get in touch with Danny Perry, danny@clutchgroup.co

Past Sponsors

Event Location

The Fullerton Hotel Sydney

Lobby Level/1 Martin Pl, Sydney NSW 2000
Sydney Identity, Authentication and Access Management Summit 2026

Frequently Asked Questions

No items found.

Get In Touch

Contact our event team for any enquiry

Danny Perry

Director of Sales
For sponsorship opportunities.
danny@clutchgroup.co

Lili Munar

Director of Client Relations
For guest and attendee enquiries.
lilibeth@clutchgroup.co

Steph Tolmie

Director of Conference Production
For speaking opportunities & content enquiries.
stephanie@clutchevents.co

Taylor Stanyon

Director of Operations
For event-related enquiries.
taylor@clutchgroup.co