Auckland Cloud Security Summit 2025
Join us at the Cloud Security Summit to strengthen your cloud defenses and tackle emerging threats. Explore Zero Trust, secure multi-cloud deployments, and AI-driven security with industry experts through hands-on sessions and real-world case studies.

Join us at the Cloud Security Summit to explore the latest in cloud security and stay ahead of emerging threats.
In May, we're bringing together cloud security professionals, IT leaders, and industry experts to strengthen your cloud security posture and safeguard your organisation.
Dive deep into Zero Trust models, secure multi-cloud deployments, ensure your Infrastructure-as-Code is compliant, and discover how AI is revolutionising cloud security. Participate in interactive sessions, real-world case studies, panel discussions, and debates to stay ahead of the game.
Key Themes:
- Tackling Emerging Cloud Security
- ThreatsImplementing Zero Trust in Cloud Environments
- Securing Multi-Cloud Deployments
- Ensuring Infrastructure-as-Code Compliance
- Leveraging AI in Cloud Security
- Protecting Cloud Data
- Building Robust Cloud Security Architectures
Who Should Attend?
Cloud security professionals, IT leaders, cybersecurity experts, DevOps engineers, and anyone keen to enhance their understanding of cloud security and network with industry peers.
Don't miss this chance for a day of learning, innovation, and collaboration at the Cloud Security Summit.
Program Highlights
Speakers
Sessions
Cloud Security Leaders
Track
Our Speakers
Agenda
As cyber threats grow and compliance demands increase, Pulse Energy transformed its cloud strategy—moving beyond "lift and shift" to a security-first, automated, and scalable cloud environment.
- Beyond Lift and Shift – How breaking down silos and modernising legacy systems created a secure cloud foundation
- Automating Security Operations – Using AI-driven automation to proactively detect and mitigate vulnerabilities
- Vendor Collaboration & SaaS Selection – Identifying the right cloud partners while ensuring security remains top priority
- The next phase of cloud security: reducing reliance on passwords for a frictionless experience
Enterprise applications are deployed across a wide range of cloud environments, each with their own security controls of various capabilities. In the meantime, the threat landscape for web applications has become increasingly sophisticated, and has seen common threats like Bot, DDoS, and Application attacks persist and grow in complexity.
- The evolving nature of Bot, DDoS, and Layer 7 application attacks — and why they continue to succeed
- Architecting a consistent security inspection and enforcement layer at the edge, independent of origin infrastructure
- Leveraging DevOps tools like Terraform and GitHub to automate the deployment of security controls as part of the CI/CD pipeline
As New Zealand embraces cloud technologies at scale, the panel explores the current state of cloud security and what steps must be taken to future-proof against emerging threats and risks.
- Assessing current vulnerabilities, threats, and gaps in cloud security practices
- Identifying emerging cyber threats like AI-driven attacks and supply chain vulnerabilities
- Reviewing the effectiveness of existing cloud security regulations and policy frameworks
- Leveraging automation, AI, and zero-trust models for enhanced future cloud security resilience
In this innovative session, attendees will be faced with a series of scenarios that they may face in their roles. Attendees will discuss the possible courses of action with their peers to consider the ramifications of each option before logging their own course of action.
Results will be tallied and analysed by our session facilitator and results will impact the way the group moves through the activity.
Will we collectively choose the right course of action?
Demonstrating how to use Infrastructure as Code (IaC) tools to automate compliance and security checks in cloud deployments.
A deep dive into utilizing artificial intelligence to predict and prevent security threats before they occur.
This panel explores innovative approaches to securing diverse cloud infrastructures and ensuring seamless protection across multiple platforms
- Ensuring uniform security policies and controls across different cloud providers
- Addressing interoperability and complexity in securing multi-cloud environments
- Leveraging automation tools to enhance cross-cloud security visibility and incident response
- Building a unified security framework that spans multiple cloud services and platformsBuilding a unified security framework that spans multiple cloud services and platforms
Choose 1 topic to join on the day!
Topics will be made available closer to the event
Insider threats remain one of the most significant risks to cloud security. This session will focus on strategies to detect, prevent, and mitigate insider threats in cloud environments.
- Identifying signs of insider threats in cloud environments
- Tools for monitoring and mitigating insider risks
- Building a culture of trust and security to prevent insider attacks
New Zealand enterprises are increasingly adopting cloud technologies, and they now face unique challenges in balancing compliance with local privacy laws and mitigating security vulnerabilities, all while striving to remain competitive on the global stage.
Talking points include:
- How do New Zealand's data sovereignty requirements impact cloud adoption compared to international practices?
- Are local enterprises overburdened by stringent privacy laws, or are these regulations essential for robust cloud security?
- With New Zealand ranking among the top ten nations for cloud security vulnerabilities, are our enterprises lagging in cybersecurity, or is this a global trend?
- Do New Zealand businesses face unique cloud security challenges, or are they simply echoing international issues?
Who Attends?
Chief Information Security Officer
Chief Information Officer
Heads of Cloud Security
Head of Infrastructure
Head of Cloud
Head of Cloud Platform
Head of DevSecOps and AppSec
Head of Cybersecurity Architecture
IT Risk Director
Cybersecurity GRC Director
SRE Director
Network Engineering Director
Network Manager
Cybersecurity Engineering Director
Cybersecurity Operations Manager
Benefits For Attendees





Event Location
Grand Millennium Auckland

FAQs
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.
Get In Touch
Contact our event team for any enquiry

Danny Perry
For sponsorship opportunities.

Lili Munar
For guest and attendee enquiries.

Ben Turner
For speaking opportunities & content enquiries.

Taylor Stanyon
For event-related enquiries.