The event has been cancelled until further notice

Regrettably, ISA has made the decision to cancel this event. While we are disappointed in this outcome, please know that we are working on ways to continue to benefit the many ISA members and stakeholders in the Asia Pacific region.

Thank you very much for your interest in ISA, and we hope to welcome you to a future event in 2024!

Conference: 27-28 November
Training: 29-30 November

Virtual or onsite at Crown Towers Perth, Great Eastern Hwy, Burswood WA 6100, Australia

Technical Content and Training Courses

Learn & Network

AboutThe Event intro


This dual-track conference will focus on mining and supply chain issues in the Asia Pacific region. Specifically, we will hone in on improved security and efficiency in the energy and mining industries, with an emphasis on predictive analytics, supply chain, and new technology implementation. This first-of-its-kind ISA event brings together subject matter experts from key end users within Australia’s major industries to share presentations, end-user case studies, and best practices for adopting, accelerating, and monetizing Digital Transformation applications.

The mining and metals industry supplies minerals critical to powering a green economy. Sessions will explore ESG and new safety strategies, along with exciting advances in AI, that will drive a sustainable future. Join us on this deep dive into technology applications that streamline design, certification, and start-up processes while improving safety, efficiency, and the bottom line.

Agenda Preliminary Program schedule

Agenda

time iconNovember 27, 2023 12:30

Keynote: Robotics in the Supply Chain: Australia's Impact on the Global Moon to Mars Mission

Crown Towers Perth | Grand Ballroom

Today, there are autonomous robotic systems for every core logistics process, including storage and retrieval, conveying and sorting, picking, packing, and palletizing. These types of robots range from shuttle systems and picking robots to pocket sorters and autonomous mobile robots. Join Zorba and ISA as he goes through Australia's impact on the Global Moon to Mars Mission with NASA and the impact of robotics to accomplish this great feat.

speaker headshot Zorba Parer
Executive Director, Zorba Parer Aerospace Consulting (NASA consultant)
time iconNovember 27, 2023 13:30

Future of the Mining Industry

In this session Eduardo will walk us through how he collaborates with mining customers and an ecosystem of partners to advance mining digital maturity by building automation and digital roadmaps, implementation strategy and business case evaluation to determine where the industry is and how ABB can have an impact. 

speaker headshot Eduardo Lima
Global Mining Industry Consultant, ABB
time iconNovember 27, 2023 14:15

Industry 4.0 TestLab

speaker headshot John Kirkman
Managing Director, Enterprise Transformation Partners Pty Ltd
time iconNovember 27, 2023 15:00

Innovation for a Sustainable Future: Decarbonization Pathways

Decarbonization is essential for achieving net zero emissions. Current efforts alone, however, are not enough to bring global carbon emissions to net zero by 2050.

By scaling and accelerating the deployment of existing technologies and solutions, we can reach this goal.

Join Bas and ISA in a discussion on closing the gap. Bas will talk about accelerating the rollout of renewables and ramp up capacity in our electrical grids, fuel industry and transport through new technologies, such as green hydrogen, and reduce the amount of embodied carbon in the built environment.

speaker headshot Bas Mutsaers
Global Strategy, Technology and Marketing Lead, Schneider Electric
time iconNovember 27, 2023 15:45

Supply Chain Risk Management Panel Discussion

Crown Towers Perth | Grand Ballroom

Join ISA and our panelists as we discuss the risk-based approach of suppliers in supply chain risk management.

What are suppliers doing to manage their supply chain? We will discuss the actions suppliers should/could be taking.

What is the industry doing? Learn about what ISA and other international organizations are doing to assist with these actions.

What are user organizations doing? Learn about the end user organization point of view and hear success stories.

speaker headshot David Dickson
Managing Director, Accenture
speaker headshot David Lafferty
President, Scientific Technical Services
speaker headshot Zorba Parer
Executive Director, Zorba Parer Aerospace Consulting (NASA consultant)
time iconNovember 27, 2023 16:45

Session 4: TBD

time iconNovember 27, 2023 18:00

Igloo Reception

Crown Towers Perth | Grand Ballroom
time iconNovember 27, 2023 12:30

Keynote: Robotics in the Supply Chain: Australia's Impact on the Global Moon to Mars Mission

Crown Towers Perth | Grand Ballroom

Today, there are autonomous robotic systems for every core logistics process, including storage and retrieval, conveying and sorting, picking, packing, and palletizing. These types of robots range from shuttle systems and picking robots to pocket sorters and autonomous mobile robots. Join Zorba and ISA as he goes through Australia's impact on the Global Moon to Mars Mission with NASA and the impact of robotics to accomplish this great feat.

speaker headshot Zorba Parer
Executive Director, Zorba Parer Aerospace Consulting (NASA consultant)
time iconNovember 27, 2023 13:30

Defining Supply Chain

While risks to the operational supply chain are present in all markets and industries, the devil is in the details. Understanding supply-chain vulnerability begins with understanding the supply chain, its component parts, and how these interact. This presentation will take a regional approach to the offshore operations supply chain specific to the APAC region. While energy operations around the globe may share common equipment and practices, it is in the details that we are able to identify (and ultimately mitigate) the biggest security threats.

speaker headshot Tina Hu
VP of Global Supply Chain and Customer Experience - Pacific Region, Schnieder Electric
time iconNovember 27, 2023 14:15

Reinforcement Controllers - Use Case

speaker headshot Edward Naranjo
Sales Engineering Manager, Honeywell
time iconNovember 27, 2023 15:00

LEO Communications for Industrial Applications: Design Considerations & Opportunities

speaker headshot Abdullah Al-Nufaii
Automation Engineering Consultant, Saudi Aramco
time iconNovember 27, 2023 15:45

Supply Chain Risk Management Panel Discussion

Crown Towers Perth | Grand Ballroom

Join ISA and our panelists as we discuss the risk-based approach of suppliers in supply chain risk management.

What are suppliers doing to manage their supply chain? We will discuss the actions suppliers should/could be taking.

What is the industry doing? Learn about what ISA and other international organizations are doing to assist with these actions.

What are user organizations doing? Learn about the end user organization point of view and hear success stories.

speaker headshot David Dickson
Managing Director, Accenture
speaker headshot Dave Lafferty
President, Scientific Technical Services
speaker headshot Zorba Parer
Executive Director, Zorba Parer Aerospace Consulting (NASA consultant)
time iconNovember 27, 2023 16:45

Technology and Business Departments Working Together

IT departments are taking on a greater strategic role, and working alongside business units to use technology as the linchpin to drive corporate evolution. Paulina Chan will go through this process and her own personal experiences of large changes made for company growth.

speaker headshot Paulina Chan
Principal and CEO, Global Mutual Innovation Consortium
time iconNovember 27, 2023 18:00

Igloo Reception

Crown Towers Perth | Grand Ballroom
time iconNovember 28, 2023 08:30

Keynote: Resolving Image to Image Processing and Image Manipulation Problems with Deep Learning

Crown Towers Perth | Grand Ballroom

The concept of Latent Space is getting more important in Deep Learning for various computer vision applications. In this presentation, we start with an elaboration of the mechanism of some deep learning techniques and the reasons for their success, which include attention mechanics and back projection structures for image super-resolution and enlightening, etc. We will then discuss the effect of Latent Block in CNN (Convolutional Neural Network) to gradually highlight the development of Latent Space in Generative Adversarial Network (GAN), StyleGAN, Diffusion Model etc. This allows us to turn many computer vision applications, such as image super-resolution, image enlightening, robotic motions, computer painting & graphics, into a completely searching problem or a problem with prior retrieval exercise in the latent space, which represents the start of a new approach in computer vision applications.  At the end of the presentation, some future directions and fruitful demonstrations will be provided.

speaker headshot Wan-Chi Su
PhD, DIC, Life-FIEEE, APSIPA Distinguished Lecturer
time iconNovember 28, 2023 09:30

AI in Mining - Leveraging the Use of Generative AI in the Mining Industry

AI enables mining companies to use autonomous machinery and data to improve efficiency and productivity and reduce downtime. These tools can reduce operational costs for mining companies. In this session we will go through the new applications of AI and the impact it has on the industry.

speaker headshot David Dickson
Managing Director, Accenture
time iconNovember 28, 2023 10:15

Emerging Regulatory Challenges

In this session we will analyze public sector dimensions of efforts to manage the development pressures associated with mining in Australia by examining the legislative and policy framework of various levels of government. We outline recent legislative trends and variations across jurisdictions. We also identify gaps and inadequacies in the regulatory framework and the implications of these with respect to emerging governance challenges and practices in mining-intensive regions of Australia-particularly for local governments. Then, we will look at how those local regulations impact the Asia Pacific Region and the world. 

speaker headshot Duncan Alderson
OT Cyber Partner, PWC Australia
time iconNovember 28, 2023 11:00

Digital Transformation in Mining

speaker headshot George Coldham
Cyber Security Cloud Solution Architect @ Microsoft
time iconNovember 28, 2023 12:30

Understanding and Developing ISA/IEC 62443 Panel Discussion

Crown Towers Perth | Grand Ballroom

Join us as we break down the ISA/IEC 62443 standard series into how it applies to the asset owner, systems integrator, and product suppliers.

Why does anyone need to apply the standard? What's in it for them? Join ISA as we take a deep dive into understanding why the standard could be beneficial to you and your organization.

speaker headshot Robert Di Pietro (Moderator)
Partner - PwC Australia Cybersecurity & Digital Trust Lead
speaker headshot Steve Mustard
President and CEO, National Automation Inc.
speaker headshot Thomas Leen
Vice President Cybersecurity & Global Architecture, BHP
speaker headshot Duncan Alderson
OT Cyber Partner, PWC Australia
speaker headshot Troy Awad
Cybersecurity Manager, BHP
time iconNovember 28, 2023 13:30

Session 4: TBD

time iconNovember 28, 2023 14:15

Mining Operations Digital Strategy - Tips for Generating Value with Digital and Planning for Scale

What does your strategy for digital look like? Join Dave Lafferty as he gives tips for generating value for digital and planning for scale.

Dave designed ISA's cutting edge Digital Transformation cerified training classes. He will go through the process behind these classes, the importance of having a good digital strategy and lessons learned from his many consulting jobs. 

speaker headshot David Lafferty
President, Scientific Technical Services
time iconNovember 28, 2023 15:00

Cyber Pavilion Technology Demonstration Break

Crown Towers Perth | Grand Ballroom
time iconNovember 28, 2023 15:45

Closing Session

time iconNovember 28, 2023 08:30

Keynote: Keynote: Resolving Image to Image Processing and Image Manipulation Problems with Deep Learning

Crown Towers Perth | Grand Ballroom

The concept of Latent Space is getting more important in Deep Learning for various computer vision applications. In this presentation, we start with an elaboration of the mechanism of some deep learning techniques and the reasons for their success, which include attention mechanics and back projection structures for image super-resolution and enlightening, etc. We will then discuss the effect of Latent Block in CNN (Convolutional Neural Network) to gradually highlight the development of Latent Space in Generative Adversarial Network (GAN), StyleGAN, Diffusion Model etc. This allows us to turn many computer vision applications, such as image super-resolution, image enlightening, robotic motions, computer painting & graphics, into a completely searching problem or a problem with prior retrieval exercise in the latent space, which represents the start of a new approach in computer vision applications.  At the end of the presentation, some future directions and fruitful demonstrations will be provided.

speaker headshot Wan-Chi Su
PhD, DIC, Life-FIEEE, APSIPA Distinguished Lecturer
time iconNovember 28, 2023 09:30

Interdependence of the ecosystem of suppliers working across supply chain

speaker headshot Chris Riley
Partner, Supply Chain & Procurement, Deloitte
time iconNovember 28, 2023 10:15

IEEE’s Roles in Digital Transformation and Initiatives for Humanity

IEEE is the world’s largest professional technical organisation with over 400,000 members world-wide and over 150,000 in the Asia Pacific Region. The mission of IEEE is to foster technological innovation and excellence for the benefit of humanity. Over the years, members of IEEE have contributed much to digital transformation, and in particular, initiatives for humanitarian projects. This talk will provide a glimpse of IEEE’s roles and activities in the areas of Digital transformation and initiative for humanity. IEEE welcomes likeminded professionals and organisations to join hands for the betterment of the society.

speaker headshot Lance CC Fung
IEEE Asia-Pacific Region Director (2023-2024)
time iconNovember 28, 2023 11:00

Lifecycle Management of Equipment

Life cycle equipment management is a process that seeks to optimize the management of equipment and capital purchases by incorporating planning at all phases of the equipment's life cycle. It begins with planning for equipment acquisition and continues through usage and disposal of the equipment. Join Steve Mustard on a step by step of asset management.

speaker headshot Steve Mustard
President and CEO, National Automation Inc.
time iconNovember 28, 2023 12:30

Understanding and Developing ISA/IEC 62443 Panel Discussion

Crown Towers Perth | Grand Ballroom

Join us as we break down the ISA/IEC 62443 standard series into how it applies to the asset owner, systems integrator, and product suppliers.

Why does anyone need to apply the standard? What's in it for them? Join ISA as we take a deep dive into understanding why the standard could be beneficial to you and your organization.

speaker headshot Robert DiPietro (Moderator)
Partner - PwC Australia Cybersecurity & Digital Trust Lead
speaker headshot Troy Awad
Cybersecurity Manager, BHP
speaker headshot Steve Mustard
President and CEO, National Automation Inc.
speaker headshot Duncan Alderson
OT Cyber Partner, PWC Australia
speaker headshot Thomas Leen
Vice President Cybersecurity & Global Architecture, BHP
time iconNovember 28, 2023 13:30

What is the Future of Automation

time iconNovember 28, 2023 14:15

What is the Future of Cybersecurity in Automation?

speaker headshot Prabhu Soundarrajan
President, International Society of Automation
time iconNovember 28, 2023 15:00

Cyber Pavilion Technology Demonstration Break

time iconNovember 28, 2023 15:45

Closing Session

Crown Towers Perth | Grand Ballroom
time iconNovember 29, 2023 08:00

ISA Training: Introduction to IIoT—The Industrial Internet of Things (DT101)

NOTE: Onsite/In-person delivery (Separate Registration Fees Apply)

Length: 1 day

CEU Credits: .7

Course Hours: 8:00 a.m. - 4:00 p.m.

Certificate of Completion: A Certificate of Completion indicating the total number of CEUs earned will be provided upon successful completion of the entire two-day course.

 

Description

Introduction to IIoT—The Industrial Internet of Things, provides a greater familiarity with the Industry 4.0 movement, which is shifting towards increasing the digital transformation efforts of conventional industrial and manufacturing processes.

The course covers the basic concepts of the internet of things and how these concepts and underlying technologies have evolved, and how they are currently being applied to industrial applications.

It also covers supporting technologies that are often employed in IIoT applications in greater detail, including:

- Machine learning/AI

- Data preparation/cleansing

- Data analytics

- Data presentation technologies

Participants will review actual IIoT projects in greater depth and examine these projects' technical and business aspects, giving registrants deeper insights into IIoT applications.

Course content is easily consumable in short online modules for the automation professional to learn concepts in a building block format. The modules begin with IIoT technology fundamentals, continue with how IIoT augments or replaces existing technologies, and then end with practical application examples and exercises. The learning objectives for each module are listed below.

 

Topics Covered:

- Overview of the Industrial Internet of Things

- IIoT Supporting Technologies

- Evaluating a Prospective IIoT Project

- Example IIoT Industrial Applications

- Class Exercise: IIoT Project Proposals

Course Prerequisites:

There are no prerequisites; however general knowledge of communication essentials for industrial automation systems may be helpful.

speaker headshot Dave Lafferty
President, Scientific Technical Services
time iconNovember 29, 2023 08:00

ISA Training: Using the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32) - Day 1 of 2

NOTE: Onsite/In-person delivery (Separate Registration Fees Apply)

CEU Credits: 1.4
Course Hours: 
8:00 a.m - 4:00 p.m.
Certification of Completion: 
A Certificate of Completion indicating the total number of CEUs earned will be provided upon successful completion of the entire two-day course.

Description:

The move to using Ethernet, TCP/IP, and web technologies in supervisory control and data acquisition (SCADA) and process control networks has exposed these systems to the same cyberattacks that have wreaked havoc on corporate information systems. This course provides a detailed look at how the ISA/IEC 62443 standards framework can be used to protect critical control systems. It also explores the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments.

 

You will be able to:

  • Discuss the principles behind creating an effective long term program security
  • Interpret the ISA/IEC 62443 industrial security framework and apply them to your operation
  • Define the basics of risk and vulnerability analysis methodologies
  • Describe the principles of security policy development
  • Explain the concepts of defense in depth and zone/conduit models of security
  • Analyze the current trends in industrial security incidents and methods hackers use to attack a system
  • Define the principles behind the key risk mitigation techniques, including anti-virus and patch management, firewalls, and virtual private networks

 

You will cover:

  • Understanding the Current Industrial Security Environment: What is Electronic Security for Industrial Automation and Control Systems? | How IT and the Plant Floor are Different and How They are the Same
  • How Cyberattacks Happen: Understanding the Threat Sources | The Steps to Successful Cyberattacks
  • Creating A Security Program:  Critical Factors for Success/Understanding the ANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009)- Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program
  • Risk Analysis:  Business Rationale | Risk Identification, Classification, and Assessment 
  • Addressing Risk with Security Policy, Organization, and Awareness: Cyber Security Management System Scope | Organizational Security | Staff Training and Security Awareness
  • Addressing Risk with Selected Security Counter Measures: Personnel Security | Physical and Environmental Security | Network Segmentation | Access Control
  • Addressing Risk with Implementation Measures: Risk Management and Implementation | System Development and Maintenance | Information and Document Management
  • Monitoring and Improving the CSMS: Compliance and Review | Improve and Maintain the CSMS
  • Validating or Verifying the Security of Systems: What is being done? | Developing Secure Products and Systems

 

Classroom/Laboratory Demo:

  • PCAP Live Capture Analysis

 

Includes ISA Standards:

  • ANSI/ISA-62443-1-1 (ANSI/ISA-99.00.01-2007), Security for Industrial Automation and Control Systems Part 1: Terminology, Concepts & Models
  • ANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009), Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program
  • ANSI/ISA-62443-3-3, Security for industrial automation and control systems: System security requirements and security levels
speaker headshot Steve Mustard
Digital Security and Risk Consultant, BP
time iconNovember 29, 2023 17:00

Networking Opportunity: Republic of Fremantle Gin School Workshop

Location: Republic of Fremantle

Cost: 450 AUD

- Transportation to and from the Distillery

- Gin & Tonic on arrival

- Tutorial on distilling in a mini pot still

- 500ml bottle of your custom-distilled gin

- Short educational history of distilling and our processes

- Dinner

Enter the Distillery with a passion for good spirits and leave with your own custom 500ml bottle of Gin and a wealth of knowledge about the art of distilling.

This will be a 2-hour class taking place on the Mezzanine overlooking their one-of-a-kind copper stills.

time iconNovember 30, 2023 08:00

ISA Training: Introduction to Data Visualization (DT103)

NOTE: Onsite/In-person delivery (Separate Registration Fees Apply)

Length: 1 day

Course Hours: 8:00 a.m - 4:00 p.m.

CEU Credits: .7

Certification of Completion: A certificate of completion indicating the total number of CEUs earned will be provided upon successful completion of the course.

 

Description

Visualization is an important technique allowing valuable information to be received and translated visually in the appropriate format for a particular use case. This course explores the various forms of visualization that enable data to become valuable information. 

The course will begin with an overview of visualization by covering the different types of analytics used for visualization, including descriptive and diagnostic portals.    

Students will learn the various types of digital twins and how digital twins are used for visualization. Essential considerations for successful digital twin implementations will also be presented.

Students will learn how extended reality is used for visualization, including augmented virtual, and mixed reality. Specific examples of how the various forms of extended reality are used will be presented.

The course will also explain mobility and wearable devices for visualization. Students will explore the use of these devices and learn why they are essential for visualization.

Finally, the course will present successful visualization project use cases and the associated business value generated. 

This course is recommended for:

-        Automation professionals engaged in designing, implementing, and operating visualization solutions

-         Digital transformation managers working with OT data

-         Automation software providers wishing to expand their enterprise-based offerings 

-         IT professionals tasked with implementing enterprise-based visualization solutions 

-         Professionals tasked with procurement of OT visualization solutions and needing a background in visualization fundamentals to make more informed technology decisions

-

 Topics Covered:

- Introduction to Visualization

- Digital Twins

- Extended Reality

- Mobility and Wearables

- Visualization Use Cases

 

Course Prerequisites:

There are no prerequisites; however, general knowledge of communication essentials for industrial automation systems may be helpful. In addition, the course developer also recommends the ISA Introduction to IIoT – the Industrial Internet of Things (DT101) course.

speaker headshot Dave Lafferty
President, Scientific Technical Services
time iconNovember 30, 2023 08:00

ISA Training: Using the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32) - Day 2 of 2

NOTE: Onsite/In-person delivery (Separate Registration Fees Apply)

CEU Credits: 1.4
Course Hours: 
8:00 a.m - 4:00 p.m.
Certification of Completion: 
A Certificate of Completion indicating the total number of CEUs earned will be provided upon successful completion of the entire two-day course.

Description:

The move to using Ethernet, TCP/IP, and web technologies in supervisory control and data acquisition (SCADA) and process control networks has exposed these systems to the same cyberattacks that have wreaked havoc on corporate information systems. This course provides a detailed look at how the ISA/IEC 62443 standards framework can be used to protect critical control systems. It also explores the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments.

 

You will be able to:

  • Discuss the principles behind creating an effective long term program security
  • Interpret the ISA/IEC 62443 industrial security framework and apply them to your operation
  • Define the basics of risk and vulnerability analysis methodologies
  • Describe the principles of security policy development
  • Explain the concepts of defense in depth and zone/conduit models of security
  • Analyze the current trends in industrial security incidents and methods hackers use to attack a system
  • Define the principles behind the key risk mitigation techniques, including anti-virus and patch management, firewalls, and virtual private networks

 

You will cover:

  • Understanding the Current Industrial Security Environment: What is Electronic Security for Industrial Automation and Control Systems? | How IT and the Plant Floor are Different and How They are the Same
  • How Cyberattacks Happen: Understanding the Threat Sources | The Steps to Successful Cyberattacks
  • Creating A Security Program:  Critical Factors for Success/Understanding the ANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009)- Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program
  • Risk Analysis:  Business Rationale | Risk Identification, Classification, and Assessment 
  • Addressing Risk with Security Policy, Organization, and Awareness: Cyber Security Management System Scope | Organizational Security | Staff Training and Security Awareness
  • Addressing Risk with Selected Security Counter Measures: Personnel Security | Physical and Environmental Security | Network Segmentation | Access Control
  • Addressing Risk with Implementation Measures: Risk Management and Implementation | System Development and Maintenance | Information and Document Management
  • Monitoring and Improving the CSMS: Compliance and Review | Improve and Maintain the CSMS
  • Validating or Verifying the Security of Systems: What is being done? | Developing Secure Products and Systems

 

Classroom/Laboratory Demo:

  • PCAP Live Capture Analysis

 

Includes ISA Standards:

  • ANSI/ISA-62443-1-1 (ANSI/ISA-99.00.01-2007), Security for Industrial Automation and Control Systems Part 1: Terminology, Concepts & Models
  • ANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009), Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program
  • ANSI/ISA-62443-3-3, Security for industrial automation and control systems: System security requirements and security levels
speaker headshot Steve Mustard
Digital Security and Risk Consultant, BP
time iconNovember 30, 2023 17:00

Networking Opportunity: Dinner Cruise to Sandalford Winery

Location: Optus Stadium to Sandalford Winery via river

Cost: 450 AUD

 - Board our cruise at the jetty behind the Optus Stadium (across the street from the Crown Towers Resort)

  - Embark on a dinner cruise down the river to the Sandalford Winery.

-  Transportation back to Crown Towers Resort after the cruise included

 - Dinner

 -  Boat ride

 - Entertainment

Join us for a river cruise starting at the Optus Stadium and ending at Sandalford Winery!

THANK YOUTO OUR SPONSORS

Booth Sponsor

ConferencePricing

In-person Attendee:
  • ISA member : 860.00 AUD
  • Non-member : 1,105.00 AUD

Virtual Attendee: 860.00 AUD



Training

IC32

  • ISA member: 2560.00 AUD
  • Non-member: 3121.00 AUD

DT101

  • ISA member: 1014.00 AUD
  • Non-member: 1272.00 AUD

DT103

  • ISA member: 1014.00 AUD
  • Non-member: 1272.00 AUD


Special Events
  • Republic of Fremantle Gin School Tour: 450.00 AUD
  • Dinner River Cruise to Sandalford Winery: 450.00 AUD

FAQFrequently Asked Questions inquire


You will have the opportunity to network with ISA leaders and automation professionals from around the world—including managers, engineers, technicians, and subject matter experts.

  • Attend vital technical sessions and access an array of technical subject mater experts in the mining/metals and various automation industry areas.
  • Interact with other conference attendees—in person or virtually
  • Visit exhibitor booths to gain insight and information on the latest industry technology products and solutions
  • Networking Receptions
  • Training Opportunities

There are a variety of registration package options from virtual to conference to special events. Registration for the in-person event includes attendance to all technical conference sessions and onsite networking events. Additional registration fees apply for special event tickets and technical training courses.

You do not have to be an ISA member to attend the conference, training, or special events. The conference is open to the public. If you are interested to become an ISA member, click here for more information.

For more on travel and accommodation information, click here.

Through your participation in both the live conference sessions in the auditorium, and the interactive virtual kiosks in the exhibit hall, you have the opportunity to engage with a wealth of ISA subject matter experts, ISA staff, event speakers, event sponsors and exhibitors to create a network, gain valuable information, answer questions or find solutions.
Yes. Please contact Digital Transformation Conference and Events Manager, Morgan Foor (mfoor@isa.org ) or at 919.990.9267 for more information or details.
Yes, like any in-person event, we will have a swag bag for you to collect valuable information and giveaways! By visiting the online resource center during the event and each sponsored virtual exhibit booth, you can choose from an array of available documents. Add your selections to your online swag bag and email them to yourself or forward resources to friends and colleagues by entering their email addresses.
No. You do not need to download or install any applications to participate in the virtual event. You only need to have good quality internet access.
Yes, you will be provided login credentials ahead of the live event so you can test your system, to ensure it meets the requirements, and so you can become familiar with the interface so that you are ready to participate in the event
Your login instructions will be emailed to you ahead of the event with all the details you need for access on the day of the live event.
No, it is not required in order to participate as an attendee. Some speakers may use webcams for their presentations, in addition to their audio and visual presentations.
Google Chrome and/or Firefox are the recommended browsers.
Good quality internet connectivity will ensure high quality video streaming. An unstable internet connection may hinder viewing of certain portions of presentations, where applicable
Yes, the conference recordings will be available to all registered attendees following the live event, so you can still listen to content on-demand, have access to the platform and not miss a beat. However, you must register ahead of time.
The on-demand content will be hosted for 30 days following the live event to all registered attendees. You just login with your same credentials from the live event until the deadline.
Participants can obtain certificates of completion with PDH credit for each session attended. You must fully attend each session to be able to download your individual certificates in your event profile.

We look forward to having you with us in-person or virtually from Perth, Australia this November !