- 21/03/2024: Never tell me the odds!, Kendra Ross
- 10/10/2023: Thoughts on Threat Modelling, John DiLeo, Solution Architect – Asia Pacific, IriusRisk
- 08/08/2023: Cyber risk doesn’t exist!, Gavin Willbond, Principal Information Security Consultant, SSS
- 13/06/2023: Inflationary Tides: Navigating the Impact of Cybersecurity in Organisations, Edd Barber, Chief Information Security Officer, Gallagher
- 14/03/2023: OT/ICS security – NZ vs. International – How are we placed?, Marty Rickard, Director of Technical Support and Customer Success APAC, Nozomi Networks
- 11/11/2022: Getting Started in Open-Source Intelligence, Simon Howard, CTO & Founder, ZX Security
- 11/10/2022: Microsoft 365 Security Overview, Jono Green, Microsoft Practice Lead, DEFEND
- 13/09/2022: Privacy in Technology Projects, Caroline Carver, Principal Consultant – Privacy, Mosaic FSI
- 08/06/2021: Building Cyber Resilience: How Much Can You Afford To Lose?, Sandy Leadbeater, Advisory Systems Engineer, Dell
- 11/05/2021: Penetration Testing – The What, Why and How , Paul Bryant, Director, phew
- 13/04/2021: Zero Trust, Mark Shaw, Technology Strategist, Palo Alto Networks NZ
- 18/03/2021: Ransomware, DDOS and Cybersecurity in 2021, Peter Bailey, General Manager, Aura Information Security, Kordia
- 09/02/2021: Seamless SIEM, John Barnett, Senior Sales Engineer, Splunk
- 10/11/2020: End of Year Celebration, Jon Edney, Organiser, BOPSIG
- 13/10/2020: Firewall Log Analysis – A Key Element of Cyber Security, Win Amann, Cyber Security Engineer/Consultant, Pro.Security
- 10/09/2020: Privacy Act Roadshow, John Edwards, NZ Privacy Commissioner, Office of the Privacy Commissioner
- 11/08/2020: How to create Cyber Resiliency in your Organisation, David Duffy, Managing Director – Midlands, Defend
- 14/07/2020: Prevention is better than Detection and Response, Greg Wyman, Business Strategist for Australia and NZ, Bufferzone Security
- 10/03/2020: Left out in the cold, Stephan van Lieshout, Director, Cybersmart
- 11/02/2020: Darwin Awards and Security, Jonathon Berry, Consulting Partner, InPhySec
- 12/11/2019: End of Year Celebration, Jon Edney, Organiser, BOPSIG
- 08/10/2019: Malware vs Machine Learning, Brad Pearpoint, Advantage
- 10/09/2019: Disrupting Traditional Incident Response Approaches With Automation, Tim Jackson, Chief Architect, SSS
- 13/08/2019: Burning Questions Everyone Needs An Answer To, Richard Tims, Partner, KPMG
- 09/07/2019: Cloud Access Security Brokering, John Crawford, Sales Director, Packet Technologies
- 11/06/2019: Standards, Controls, and Making Things Happen, Tony Krzyzewski, Director, SAM for Compliance
- 14/05/2019: How a Hacker Attacks their Target – Part II, Win Amann, Certified Ethical Hacker, Pro.Security
- 09/04/2019: Threat Intelligence and the Dark Web, Jeremy Jones, Head of Cyber Security, Theta
- 12/03/2019: Risk & Compliance, Linzee Bickley, CISSP, CISM, CISA
- 12/02/2019: Secure Development, Tony Grasso, Director of Technology, CyberToa
- 12/11/2018: End of Year Celebration, Jon Edney, Organiser, BOPSIG
- 08/10/2018: Privileged Access Management, John Crawford, Sales Director, Packet Technologies
- 10/09/2018: How a Hacker Attacks their Target, Win Amann, Certified Ethical Hacker, Pro.Security
- 13/08/2018: Raising Your Posture & Incident Response, Mike Conboy & Steve Macmillan, Kaon Security
- 09/07/2018: Should I Run in 2020?, Simon Howard, Director, ZX Security
- 11/06/2018: The Fast Evolving Threat Environment, Peter Benson, Director Cyber Security Services, KPMG
- 15/05/2018: Airbags, Seatbelts and Bald Tyres, Stephan van Lieshout, Director, Cybersmart
- 17/04/2018: Demystifying PKI, Paul Platen, Public Key Infrastructure Specialist, SSS
- 13/03/2018: Cyber Security the perfect storm, Geoff Burt, Security Portfolio Manager, Spark Digital
- 08/02/2018: Information Security in NZ, Roger Temple, Principal Security Consultant, SSS
- 18/12/2017: The Art of War, Philip Whitmore, Partner Cyber Security Services, KPMG
- 17/09/2017: Survey of Interest, Jon Edney, Organiser, BOPSIG