Key Takeaways:
- Digital identity is now legislated, scrutinised and mission-critical.
- What government and enterprise leaders must prioritise across authentication, access governance and trust.
Key Takeaways
- Updates from NSW Government regarding Digital Identity
- Navigating how digital identity policy translates into service delivery for citizens
- The role of community trust and public communication in digital identity adoption
- Where NSW sits in the national Digital Identity roadmap and what comes after 2026
A fast-paced, structured session designed to maximise the number of meaningful connections you make.
Key Takeaways:
- ACIC’s implementation of Digital ID within Police Checking Systems
- Updates to their contracts for services who can carry out checking systems
- How high-assurance identity verification is transforming the accuracy and speed of police checks
Key Takeaways:
- How ConnectID is working to bridge the peer-to-peer commercial exchange model with the government's centralised broker architecture
- What industry, policymakers and network operators each have within their control to ensure the conditions are primed for adoption
- The commercial incentives and barriers that will determine whether private sector participation scales
- Where liability sits when trust frameworks span both government and commercial identity providers
How far should automation go in identity decisioning before governance pushes back?
How organisations are modernising IAM to manage identities, roles, and access across distributed environments, hybrid workforces, and evolving threat surfaces.
Key Takeaways
- Not a theoretical debate. Real trade-offs between control, agility and assurance in 2026.
- How to evaluate which architecture model fits your organisation's risk profile and regulatory obligations
- Common failure points when organisations migrate between identity architectures mid-programme
- What high-performing organisations are getting right that others are still missing
Key Takeaways
- Incremental upgrade paths for legacy-heavy environments, avoiding the multi-year rewrite trap.
- How to sequence modernisation work so critical services remain available throughout the transition
- Governance structures that keep stakeholders aligned when timelines and budgets are under pressure
- Real examples of phased IAM transformation
Key Takeaways:
- Decisions, not just alerts and dashboards
- How to define policy thresholds that trigger enforcement without generating excessive false positives
- Integrating authentication signals across identity providers, SIEMs and access management platforms
- Building auditability into automated enforcement so decisions can be reviewed and challenged
Key Takeaways:
- Why getting your identity foundations right early creates a competitive advantage.
- How cross-functional alignment between Digital, Security and FinCrime accelerates outcomes.
- What it takes to stay ahead in an endless arms race with sophisticated fraudsters.
- The role of threat intelligence sharing across sectors in keeping pace with evolving attack vectors
Key Takeaways:
- Strategies to correctly integrate AI while maintaining robust frameworks
- How to use automated intervention without sacrificing auditability or introducing new points of failure
Key Takeaways:
- Who owns identity risk?
- How to align cyber, IAM, privacy, fraud and digital transformation under one accountable framework.
- How to identify gaps before they become crises, and what recovery looks like when it does.
- How to implement upgrades to existing systems in a streamlined manner.