21-23 Aug 2024
ICC, Sydney

Security & ASIAL Conference
21 - 22 August 2024

For over 35 years, the ASIAL Security Conference has shared expert knowledge and insights to ensure that the industry can keep our communities safe. The conference highlights the importance that an innovative, technologically advanced and competitive industry plays in meeting the challenges of a new era of security.

21 - 22 August 2024
ICC Sydney
9:00AM - 4:15PM
From $895 + GST

About the Conference

The ASIAL Security Conference is set to be a great success in 2024. The program will include a compelling lineup of experts and academics who will share their insights on how to protect your business, brand reputation, and crucial assets along with mitigating risk and vulnerability.

The Security Conference is your annual opportunity to receive timely updates and insights from the organisations shaping today’s security landscape in a program carefully curated by the industry’s peak body.

Drawing on a distinguished panel of industry experts, the two-day program will run from 21 – 22 August 2024.

Program coming soon.

2023 keynote speakers

2023 Program

Stronger together – building security capability and capacity

Wednesday 30th August 2023

The challenges facing Organisers, Stadiums, Police and Security at Major Events are likely to increase in complexity and scope as global strategic trends continue to influence the theatre wide operational environment of Major Events. "A Safe and Secure Event is not a coincidence it is deliberate."


An insight into how organized crime syndicates make money and launder it through businesses.

Stephen, the former Facebook CEO for ANZ, who helped guide Facebook’s unprecedented rise from quirky Silicon Valley start-up to media and technology titan. Stephen is Australia’s most authoritative voice on digital disruption, transformation, culture & leadership, whose experience at the heart of Silicon Valley is truly unparalleled. Stephen will enlighten us about the future of security, AI and data.


The panel will be discussing implications arising from the Security of Critical Infrastructure (SoCI) white paper, published by the Australian Security Research Centre in partnership with the Department of Home Affairs, which outlines the need for effective risk management and security planning.


• The importance of forging stronger relationships between business, government and the security industry
• Hostile reconnaissance – developing programs to deny, detect and deter an attack


ISO31000, the international standard for risk management, may not be a perfect tool but it provides a universal methodology for ensuring security planning has a rational and defensible basis.

Its application should ensure credible risks are being appropriately managed rather than having people plan for ‘worst case scenarios’. Operational solutions should not attempt to erase any and all risk – that is delusional, profligate and can cause severe resource stresses.

It is necessary to mitigate any risk ratings that are assessed at High or above down to Medium or, preferably, down to Low – not to try and reduce all risks to Very Low.

Neil will talk to some case studies involving complex risk issues that have impacted security for international major events and critical infrastructure projects. Some successes and some failures


In this interactive session, we will discuss:
· How to achieve buy-in for Resilience and Security projects and budgets.
· Practical tips from the facilitator's worldwide experience in engaging top management and achieving their continued support.
· Includes sharing between participants regarding the 'rock on your Resilience/Security road'.
· How to translate Resilience and Security into business benefits and opportunities, to engage all levels in the organisation.


Thursday 31st August 2023

This session will share insights from Arctic Wolf Lab’s cybersecurity research relevant to Australian businesses, highlighting the do’s and don’ts in navigating the cybersecurity environment. The session will compare global vs local differences identified in the research and will provide practical advice for small and medium sized businesses on steps they can take to address their cyber risk.


ChatGPT and similar AI models are here to stay. ChatGPT burst onto the cyber landscape in November 2022 and has gone from strength to strength since with a seemingly endless amount of possibilities it is much more than just a fun tool to teach you how to get a peanut butter sandwich out of a VCR. Microsoft, Google, Amazon and many other big name IT companies are investing significant money and resources into this technology and as more and more possibilities become reality the cost savings and consumer user experience is becoming an impossible benefit to ignore. However, while humanity remains preoccupied with the pursuit of what is achievable, we have yet to properly pause and reflect on whether we should proceed, and what the associated risks and hazards may be. Despite significant advancements in AI, we have made only marginal strides in comprehending its technical and ethical risks. AI poses a hugely powerful opportunity but as Spiderman’s Uncle Ben would say with great power comes great responsibility.


Robotic Process Automation (RPA) is a general class of enterprise software technologies that handle repetitive and rule-based tasks without human intervention. Some experts predict that RPA could eliminate up to 35 percent of current jobs by 2035. And yet these tools have had minimal penetration into the physical security world, largely owing to the physical nature of security tasks. However, actual physical robots offer a compelling way to bridge the cyber-physical divide. In this talk, we will examine the ways in which large enterprises are adopting robots and RPA to automate, enhance, and extend their overall coverage – as well as how to automate other workflows through the intelligent integration of existing tools such as cameras and access control.. We will look at specific capabilities such as: automated alarm response, automated door checks and closures, safety observation tours, enhanced security audits and noise reduction.


Cloud video surveillance is the fastest growing trend in physical security today. Major markets around the world are adopting cloud video surveillance, but at varying rates. Why has the security industry been slow to adopt cloud? What’s the best way for enterprise organizations to take advantage of today’s changing dynamic? Join entrepreneur and inventor Dean Drako (founder of Barracuda Networks, Eagle Eye Networks, Drako Motors) for a keynote address as he explores these questions. He examines why global enterprise and security decision makers are opting for true cloud cybersecurity via subscription instead of hiring IT personnel, how true cloud systems can deliver advanced AI functionality at minimal cost, and what’s on the horizon in the next five years for businesses that make the move to cloud, and those that don’t.


Headlines in the news each day highlight the vulnerability of Australian consumers and businesses to cyber-attacks and devastating data exposures. Why are we still facing these issues, how can we solve them, who is responsible for fixing these issues and who exactly are the hackers?
Importantly, what new challenges can we expect to face as a society in the next five to ten years?
Being cyber security resilient isn’t about spending lots of money, it is about changing our behaviours to trust less, thinking more about our vulnerabilities and the government ensuring the things we use are safe while also protecting our privacy.


While it has been recognised for some time that cyber is the fifth domain of warfare alongside air, sea, land, and space. The Russian/Ukraine conflict has brought to the forefront the importance of cyber operations in modern day warfare, be that destructive cyber-attacks, cyber espionage or cyber influence operations. For many, this is the first time that the combination of kinetic and cyber operations has been observed operating in concert on a public stage, moreover, the introduction and participation of non-state actors, such as technology companies, has brought a new dimension to conflict in the interconnected world. In this session, Mark will provide an overview of the observations and lessons learnt from Microsoft’s engagement in the grey-zone of the conflict.


This presentation will focus on robotics in Australia, the adoption of robots and where drones and security robots are being used and by whom.


AI (Artificial Intelligence) has long been regarded as a potential source of business innovation. With the enablers now in place, organisations are starting to see how AI can multiply value for them – especially in security and cyber security.
AI has the potential to cut costs while introducing new levels of consistency, speed and scalability to business processes. However, before investing in AI, it is essential to ensure you have identified the right challenge to determine the appropriate resources required to overcome that challenge.
This panel discussion will discuss the five most important steps to maximising the use of AI within your organisation.

1) Identifying real-world challenges
Too often, organisations spend vast amounts of time and energy solving the wrong problems. How do you identify the challenges that have the most significant impact on your business?

2) Defining AI versus video analytics
With so many new organisations seeking to take advantage of the explosive growth in AI, how do you determine which new solutions offer the benefits of AI versus sophisticated video analytics?

3) What does AI enable you to do?
Based on the marketing hype, one could be forgiven for believing that AI is a panacea to the world’s problems. The reality is quite different. To ensure you are getting the greatest return on investment, you must first understand the limits and capabilities of current AI systems, what they can do and how they do it.

4) Measuring return on investment.
It is one thing to identify a challenge and apply an AI solution. But how do you ensure that your solution has an enduring, positive impact on your organisation?

5) Understanding the ethical, regulatory, and legal issues relating to Artificial Intelligence.
Technology leaders of tomorrow need to understand issues of fairness, privacy, accountability, and transparency in this emerging technology to develop appropriate policy settings for effective use across society.


2023 Speakers

N.B. Program subject to change

2022 ASIAL Security Conference & Gala Dinner Highlights

Your browser is out-of-date!

Update your browser to view this website correctly. Update my browser now

×