Agenda Day 2

High-Assurance IAM & Privileged Access in 2026

8:50 am - 9:00 am Chair's Opening Remarks

Identity Infrastructure That Holds Under Pressure

9:10 am - 9:40 am Panel Discussion: Privilege Creep Is Inevitable, Exposure Is Not

Carol Ostos - Head of Identity and Access Management, Origin Energy

Key Takeaways:

 - Role sprawl, excessive entitlements and misaligned policies across hybrid estates.

 - How organisations are tightening least privilege without paralysing productivity.

 - Practical approaches to continuous entitlement review at scale

 - Tooling and process combinations that are actually working in complex enterprise environments 

img

Carol Ostos

Head of Identity and Access Management
Origin Energy

9:40 am - 10:10 am PAM Beyond the Vault: Governing Privileged Access in Cloud, SaaS & Federated Environments

Reid Hokai - Senior Cyber Security Professional, IAM architecture, Commonwealth bank of Australia

Key Takeaways:

 - What high-assurance privileged access looks like across distributed architectures

 - Why traditional vault-centric PAM tools fall short when admin access is ephemeral, API-driven or embedded in automated pipelines

 - Strategies for maintaining least-privilege enforcement when the perimeter is gone, and identities are scattered across dozens of platforms

 - What good privileged access monitoring looks like in practice: moving beyond session recording to genuine behavioural risk detection 

img

Reid Hokai

Senior Cyber Security Professional, IAM architecture
Commonwealth bank of Australia

10:10 am - 10:40 am Securing Identity Data in Motion

Key Takeaways:

- Why real-time authentication flows, not data at rest, are where modern identity breaches actually happen 

- How distributed systems create hidden trust gaps that attackers exploit during authentication and transitions 

- Practical architecture principles for securing identity assertions, MFA enrolment, and session hand-offs at scale 

- Balancing strong security with the reality of diverse customer behaviours, from passkeys to shared households and legacy constraints 

10:40 am - 11:10 am Morning Recharge in the Expo

Fuel up, connect, and explore. Your chance to grab a coffee, meet solution partners, and spark new conversations across the Digital Identity and IAM community. 

Identity Infrastructure That Holds Under Pressure

11:10 am - 11:40 am Case Study: Verifiable Credentials & Digital ID in Production

Adnene Guabtni - Principal Research Scientist/Engineer, Architecture and Analytics Platforms, CSIRO Data 61

Key Takeaways:

 - How Macrokey's decentralised identity architecture is enabling verifiable credentials to operate across institutional boundaries without centralised intermediaries

 - Where decentralised identity, wallets and national Digital ID frameworks are delivering operational value, and where centralised models still dominate.

 - The technical and governance conditions that need to be in place before decentralised identity moves from pilot to mainstream

 - A candid assessment of where digital wallets are genuinely adding value versus where centralised models remain the more pragmatic choice 

img

Adnene Guabtni

Principal Research Scientist/Engineer, Architecture and Analytics Platforms
CSIRO Data 61

11:40 am - 12:10 pm VicRoads' Identity Journey in Practice

Crispin Blackall - Chief Technology Officer, VicRoads

Key Takeaways:

 - What identity means now — building deeper levels of trust and providing individuals with greater security 

 - Building selfie-capture capability and continuous improvement of the verification experience 

 - Moving identity away from the physical card and why that transition is now genuinely tangible 

 - Edge cases and real-world friction encountered along the way 

img

Crispin Blackall

Chief Technology Officer
VicRoads

12:10 pm - 12:40 pm Identity Reinvented: Preparing for the Credential Revolution

Brian Lee - Principal Solution Architect, Digital Identity and Verifiable Credentials progra, Services NSW

Key Takeaways:

 - What governments, businesses, and citizens must know as digital wallets become the new norm.

 - How verifiable credentials are reshaping the relationship between identity providers, relying parties and end users

 - Practical considerations for organisations planning to accept or issue digital credentials in the next 12–24 months

 - The standards landscape: what to build to now and what to wait on 

img

Brian Lee

Principal Solution Architect, Digital Identity and Verifiable Credentials progra
Services NSW

12:40 pm - 1:40 pm Lunch Break & VIP Hosted Lunches

Join us in the expo hall for a relaxed networking lunch with the full Digital Identity and IAM community. Connect with peers, explore the exhibition, and recharge for the afternoon ahead. For invited guests, exclusive VIP lunches will run concurrently, bringing senior leaders and select partners together for high-impact conversations in a more intimate setting.

Problem-Solving Labs: Real Scenarios. Real Pressure. Real Solutions.

1:40 pm - 2:40 pm Problem 1: An Interoperability Breakdown Has Locked Out Thousands of Users
A standards mismatch between two major systems has caused identity failure across partner platforms. You need a fix, a comms plan, and a pathway to rebuild trust. Where do you start?

1:40 pm - 2:40 pm Problem 3: Leadership Demands a 90-Day Plan to Cut Identity Program Costs by 25%
Without risking fraud, privacy, or citizen satisfaction, how do you respond? What stays, what goes, and how do you defend your choices?

1:40 pm - 2:40 pm Problem 2: Your IAM System Just Gave the Wrong People the Wrong Access
Due to a misconfigured rule set, sensitive systems were exposed to unauthorised staff. You have hours to contain the damage and restore confidence. What’s your next move?

1:40 pm - 2:40 pm Problem 4: Your Identity System Is Under Attack from a Deepfake-Powered Scam
A coordinated spoofing attack is exploiting biometric vulnerabilities and targeting citizens across multiple services. What's your response?

2:40 pm - 3:10 pm Final Coffee & Farewell

Wrap up an incredible two days with one last coffee and a final chance to reconnect with new contacts, exchange details, and say goodbye to the Digital Identity Week community. One more conversation. One more connection. Until next year!