AISA Cybercon 2025: Key Takeaways From Orro’s Cyber Leadership Team

Australia’s biggest cybersecurity event once again delivered a clear message: the pace, scale and complexity of cyber risk is accelerating — and the organisations that thrive will be those that build true operational resilience, not just better defences.

Across three packed days in Melbourne, our CISO, Reza Nashvi, and CTO, Stuart Long, attended sessions spanning AI risk, identity, SOC transformation, regulatory evolution and the realities of modern cyber-resilient architecture. Their combined takeaways paint a sharp picture of where the industry is heading — and what matters most for Australian organisations today.

1. AI Isn’t a Future Threat — It’s Already Inside the Walls

One of the strongest and most confronting messages throughout the conference was this:

“AI is already part of your attack surface.”

— Reza Nashvi, CISO

AI isn’t just a tool used by adversaries — it’s now embedded through:

  • Third-party SaaS platforms
  • Shadow AI workflows
  • Productivity tools and copilots
  • User-driven experimentation with genAI assistants

Rather than treating AI as an external risk, security teams must assume it’s already operating inside their environment. This shift is set to reshape regulation, internal controls and liability models over the next 12 months.

The practical guidance?

The NIST AI Risk Management Framework was heavily referenced and recommended as an immediate step for organisations wanting to get ahead. The first action:

Map where AI is already in use — formally and informally — and evaluate governance gaps.

2. “Resilience Is the New Security” — and Vendors Agree

If the conference had a single unifying theme, it was this:

“Resilience is the new security.”

Breaches are assumed. Downtime is the real cost.

Security strategy is shifting from prevention to continuity, recoverability, and response speed — and budget allocation is following.

According to Stuart, this aligns with a broader structural trend:

“Security is moving down the commoditisation curve. Platforms — with their baked-in integrations — are now where customers see the most value.”
— Stuart Long, CTO

The message from vendors was clear: customers want platform-based security ecosystems, not standalone tools. But the hallway conversations exposed a reality check:

The blocker isn’t platform choice — it’s identity maturity.

Without strong identity and access management (IAM), organisations simply can’t realise the benefits of modern architectures like SASE, Zero Trust, or AI-enhanced SOC operations.

3. Identity Is Still the Weakest Link — and the Biggest ROI

Identity compromise remains the leading cause of breaches, and the advice from multiple AISA speakers was blunt:

“If privileged identity isn’t under control, nothing else matters.”

Both Reza and Stuart heard numerous examples where poor identity practice led directly to large-scale exposure — from Salesforce data extraction through call-centre over-permissions to lateral movement enabled by legacy AD environments.

If customers could only invest $50,000 in improvements?

The top recommendation from both leaders was unified:

  • Identity threat detection & response (ITDR)
  • Asset discovery and segmentation
  • Cleaning up architectural foundations

These are foundational, high-ROI investments that unlock the benefits of everything else.

4. AI in the SOC: Beyond Hype, Genuine Impact

For the first time, organisations showcased real SOC use cases where AI copilots are already delivering measurable operational improvements:

  • Summarising incidents
  • Accelerating triage
  • Reducing analyst cognitive load
  • Improving decision consistency
  • Automatically correlating alerts

This isn’t pilot-stage anymore — it’s being used at scale.

The critical insight was that AI is not replacing analysts; it’s augmenting them, improving time-to-response, and helping teams manage significantly higher alert volumes without proportional headcount increases.

5. The Gap Between the “Stage Version” of Security and Reality

A recurring tension emerged between conference presentations and practitioner conversations:

On stage:

“Zero Trust maturity is the new baseline.”

In the hallways:

“We can’t modernise because our identity, architecture and skillset aren’t ready.”

The result is a widening execution gap: organisations know what “good” looks like but can’t get there due to technical debt, legacy systems, and competing budget priorities.

For many, the real battleground isn’t new threats — it’s getting the basics back under control.

6. Recoverability Is the New Blind Spot

Stuart highlighted a critical but under-discussed issue:

“Most organisations haven’t tested their recovery properly post-COVID — even though their systems have radically changed.”

The ripple effects from cloud outages (such as recent global DNS disruptions) demonstrated just how tightly coupled digital services have become. A single point of failure now impacts:

• Banking

• Retail

• Government agencies

• Critical infrastructure

• Logistics and supply chain

• Multi-region cloud workloads

Visibility is important — but recoverability is now paramount.

7. The Next Security Battleground: Data Sovereignty, Supply Chain & Post-Quantum

Looking 12–18 months ahead, both leaders pointed to similar priorities — but with different weightings:

  1. Data sovereignty & data loss prevention – the most immediate and impactful
  2. Post-quantum cryptography – high value but fast-evolving
  3. Continuous supply-chain assurance – strategically critical but resource-intensive

Reza also emphasised that regulators are shifting from annual questionnaires toward continuous assurance — a major operational lift for many industries.

8. The Most Overlooked Action Customers Should Take Today

Both leaders agreed that one of the simplest, most powerful improvements is also the one most organisations still ignore:

Run a realistic business continuity or ransomware tabletop exercise.

Not a theoretical walk-through.

Not a compliance tick-box.

A real simulation involving:

  • IT & OT
  • Exec leadership
  • Communications teams
  • Third-party providers
  • Cloud dependencies
  • Operational decision points

It is the fastest way to expose blind spots — and improve resilience before a real incident occurs.

Final Thoughts: Cybercon Confirmed What We Already Knew — and Revealed What We’re Missing

AISA Cybercon 2025 reinforced that:

  • AI is already reshaping the attack surface
  • Identity maturity is still the foundation of modern security
  • Platforms are replacing point-solutions
  • Real-world resilience matters more than theoretical prevention
  • Organisations must prepare for continuous assurance in their supply chain
  • Recovery — not visibility alone — will define operational success

For Australian organisations, the path forward is clear: strengthen identity, modernise the SOC, uplift foundational architecture, and test resilience regularly.

These are the building blocks of secure, dependable operations — and they remain the areas where momentum is needed most.

Build resilience where it matters most.

If you’re looking to strengthen identity controls, uplift SOC capability, test recoverability, or prepare for new regulatory expectations around data sovereignty and supply-chain assurance, our team can help.

Talk to our cyber experts

Related Insights

3 November 2021

Secure Workspace for Businesses in the New Normal

As the COVID-19 pandemic forever changes the way we work, it’s vital to ensure that your people can remain productive working from anywhere, on any device, without compromising on security.
20 April 2022

Connecting Australia: Next Generation Networks

The last two years have reinforced the notion that connectivity is a public good. High capacity networks played a crucial role in the country’s response to the pandemic — enabling remote working, learning and health care.
21 February 2023

The Increasing Need for Cyber Security and Risk Management

The cyber security threat landscape continues to evolve at an unprecedented rate. News headlines are constantly reporting the latest cyber attack, inevitably leading to financial and reputational damage to the businesses caught up in the data breach.

Explore our Resources​

News
post
2025: The Year Technology Became Accountable
Collaboration
post
From Meeting Fatigue to Meaningful Connection: How Collaboration Evolved in 2025
Critical Infrastructure
post
The Death of the Air Gap: Critical Infrastructure’s Point of No Return
News
post
The Great AI Reality Check: From Hype to Hard Truths in 2025
Cyber Security
post
Resilience vs Compliance: The Boardroom Wake-Up Call of 2025
News
post
The Great Network Simplification: How Organisations Rebuilt Their Environments in 2025