<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">

    Not Found

  • AppSec & DevSecOps Sydney

  • 08:20

    Register; grab a coffee. Mix, mingle and say hello to peers old and new.

    Arrow
  • 09:00
    Shikha Chandna-1

    Welcome from Corinium and the Chairperson

    Shikha Chandna - Product Security Transformation Lead - Growing Tech Companies

    Arrow
  • 09:10
    Speed Networking

    Speed Networking – Making new connections!

    Arrow

    In this 10-minute networking session, the goal is to connect with three new people. Let the questions on the screen spark your conversation. Enjoy the opportunity to expand your network!  

  • 09:20
    Panel Discussion

    Panel: From SDLC to SSDLC: Making Security Part of the Definition of Done

    Arrow

    Too often security is still a final gate. Shifting to SSDLC means embedding security into every sprint and backlog item. This panel explores how organisations are approaching the shift and what it takes to make it stick.

    • What does embedding security into agile delivery look like at different maturity levels?
    • How can friction between security and development be reduced?
    • What cultural or organisational shifts are most critical to sustain SSDLC?

    Moderator: 
    Tim Pollock Head of Cyber Security Operations Beyond Bank Australia

    Panellists:

    Akella Divyatej Senior Application Security Engineer Endeavour Group

    Nina Juliadotter Application Security Practice Lead Westpac

    Amith Raj Head of Information Security Fluent Commerce 

  • 09:55
    Srinivas Karthick-1

    Securing APIs as the New Perimeter in DevSecOps Pipeline

    Srinivas Karthik - Principal Product Security Engineer - CBA

    Arrow

    As applications become increasingly API-driven, the traditional notion of a network perimeter has dissolved. APIs now serve as the entry points to critical data and services, and attackers are quick to exploit them. Securing this new perimeter requires a shift in mindset, where API security is woven into the DevSecOps pipeline from design through deployment. This session explores how leading teams are tackling API threats, embedding security controls into CI/CD workflows, and ensuring that innovation does not outpace protection. 

  • 10:20
    Sponsor presentation

    From Blind Spots to Shared Context: Turning Observability into DevSecOps Signals

    Arrow

    DevSecOps thrives on shared context, but modern security needs more than traditional observability. In this session, we’ll show how combining APM, real-user monitoring, traces, code-level vulnerability detection, and cloud configuration checks offers both sides of the house what they need. Alongside this, we’ll hear real-world experience from Benjamin Norris, General Manager of Product & Technology at Fone Dynamics, on how unifying observability and security has helped accelerate security compliance while maintaining clear visibility across their threat landscape. DevSecOps ensures secure design, while SecOps detects threats in production. We’ll connect these worlds—from preventing misconfigurations to spotting suspicious activity—showing how shared telemetry enables security operations and DevSecOps teams to collaborate seamlessly.

    Speakers:

    Matthew Moore Principal Observability Strategist APJ Datadog

    Benjamin Norris General Manager of Product & Technology Fone Dynamics

     

  • 10:45
    Claude Wittebron-1

    Transition Journeys: How Organisations Matured their DevSecOps Practice

    Claude Wittebron - Lead Security Engineer - Hipages Group

    Arrow

    Shifting from DevOps to DevSecOps is rarely straightforward. Organisations often encounter cultural resistance, tool sprawl, and uncertainty about what maturity really looks like. This session explores how teams navigated these challenges, what slowed them down, and the turning points that helped security become part of their development DNA.

  • 11:10
    Break

    Morning Coffee and Connect

    Arrow
  • 11:40
    Mike Holland-1

    Frog-proof security: How to Confidently Ignore 88% of Your Critical Vulnerabilities

    Mike Holland - Senior Solutions Engineer - JFrog

    Arrow

    What does the future hold for software supply chain security in 2026? As the types and volume of software entering organisations continue to evolve, DevSecOps teams face increasingly complex challenges, including:

    • How can organisations effectively manage what enters their systems?
    • How can remediation be accelerated without sacrificing accuracy?
    • How will the rise of AI reshape our threat landscape, and can DevOps and security unite without adding friction?

    In this session, we will explore key insights into the looming challenges of software supply chain security and how they will transform operational practices. By analysing recent high-profile supply chain attacks in npm, we will expose malicious threats and offer practical, actionable solutions to mitigate both current and emerging risks. As our attack surfaces shift alongside evolving technologies, join us to discover innovative strategies and capabilities that seamlessly reintegrate security into DevSecOps. 

  • 12:05
    Panel Discussion

    Panel: Move Beyond Compliance – How to Measure ROI and Communicate Security’s Business Impact

    Arrow

    Compliance alone doesn’t prove security’s value. Executives want clear measures of risk reduction, business enablement and resilience. This panel explores how to link DevSecOps to business impact and communicate it in terms that matter to decision-makers.

    • Which metrics and frameworks resonate with senior management the most?
    • How can security leaders frame their impact in business terms rather than cost?
    • What reporting practices have worked in helping organisations secure greater buy-in and investment?

    Moderator: 
    Neha Boora DevOps Manager Class

    Panellists:

    Didar Chy Information Technology Security Architect Reserve Bank of Australia
    Richard Hawkes Senior Manager, DevSecOps & Platform Engineering ASX
    Grace Aulakh Cyber Security Manager LEAP Dev
  • 12:35
    Cameron Sonatype

    Shai-Hulud & the Nx Campaign: When Your Dependencies Turn on You

    Cameron Townshend - Principle Solutions Architect APJ - Sonatype

    Arrow
    Modern JavaScript applications live and die by their dependencies—but what happens when those dependencies turn hostile? In this session, hear from Cameron as he unpacks the Shai-Hulud npm worm and its connection to the Nx ecosystem, tracing how a single compromised package can ripple through the supply chain. You’ll learn how the attack worked, why it was effective, and—most importantly—practical steps to avoid getting owned by your own package.json.
  • 13:00
    Lunch-Dinner

    Lunch

    Arrow
  • 14:00
    Sponsor Presentation

    Secure Application Lifecycle Management in Regulated Industries

    Arrow

    Join this session as Abdullah and Malik share insights on aligning Software Engineering and Application Security to secure the full application lifecycle, powered by DevOps1. Drawing on real-world experience from highly regulated environments, this session explores how organisations are shifting security left through practical threat modelling, automated risk detection, and policy-driven exemption handling embedded directly into delivery pipelines. The discussion also covers the use of smart guardrails to protect sensitive and regulated data while enabling teams to deliver critical services at pace, without compromising compliance or operational outcomes.

    Abdullah Muhammad Application Defence Manager, Technology Security Bupa

    Malik Ayub Principal Consultant DevOps1

  • 14:25
    Suganthi Krishnavathi

    Giving Your AI Agent a Security Conscience

    Suganthi Krishnavathi - Staff Solutions Engineer - Snyk

    Arrow

    Vibecoding is the ultimate productivity rush, but it often leaves security as an afterthought. This talk demonstrates how to give your AI agent a "security conscience" by leveraging MCP servers and rules to inject real-time vulnerability intelligence directly into the LLM’s reasoning loop. You’ll walk away with a practical framework for automated remediation rules that force AI to scan, identify and fix its own bugs before the code ever leaves the chat.

  • 14:50
    Panel Discussion

    Panel: Plugins and Extensions in the Dev Toolchain - New Vectors for Supply Chain Attacks

    Arrow

    Plugins and extensions accelerate development and connect the modern toolchain but they’re also unvetted third-party code that can introduce hidden risks. Attackers are increasingly targeting them as weak links in the software supply chain.

    • Should plugins and extensions be treated as part of the software supply chain and if so, who owns their security?
    • How do we balance developer freedom to install tools with the need for governance and risk control?
    • What practical steps can teams take to detect, manage, and update vulnerable or malicious plugins/extensions before attackers exploit them?

    Panellists:

    Anmol Atkin Infrastructure Security Engineer Culture Amp

    Tim Pettersen Head of Developer Experience Atlassian 

    James Green Manager DevSecOps NSW Education Standards Authority 

     

     

  • 15:25
    Anmolpreet Kaur B&W

    Group Discussion: Shadow AI in the Enterprise - How Do We Manage What We Can’t See?

    Anmol Atkin - Infrastructure Security Engineer - Culture Amp

    Arrow

    As generative AI tools slip into daily workflows, much of their use happens outside formal security or governance controls. Unapproved, unmonitored, but widely adopted “shadow AI” raises critical questions about risk, compliance, and productivity. This is an open discussion for everyone to share experiences and strategies for balancing innovation with oversight.

    • How can organisations discover and track AI usage happening outside official channels?
    • What risks does shadow AI introduce and where might it actually drive positive outcomes?
    • What policies, training, or guardrails are realistic without stifling adoption?
  • 15:50
    Shikha Chandna-1

    Chair’s Closing Remarks

    Shikha Chandna - Product Security Transformation Lead - Growing Tech Companies

    Arrow
  • 16:00

    Afternoon tea and close of AppSec & DevSecOps Sydney 2026. Join us to reflect, connect and network over afternoon tea.