Seminar A: Incident Response, Threat Hunting, And Digital Forensics
9.00am – 10.30am
  • Helping responders and threat hunting teams with advanced skills to hunt down, identify, counter and recover from a wide range of threats within enterprise networks including nation-state adversaries, organised crime syndicates and hactivism. Threat hunting is limited by a few factors: good quality data, pervasive visibility across your control points, advanced AI and Machine Learning, and superior detection/correlation. Legacy tools just don’t work. What are the right tools that will work, how the data needs to be improved, finding the threats, and how to build automation to respond and react to your events
  • Update with hands-on incident response and threat hunting tactics and techniques that elite responders and hunters are successfully using to detect, counter and respond to real-world breach cases
  • Devising Penetration Testing and Vulnerability Assessment

Future Warfare Threat Analyst
Future Sumo


Future Sumo_logo
 Seminar B: Cloud Security And Operations – Developing Your Cloud Access Security Broker (CASB) Strategy
10.45am – 12.00pm

The cloud adoption is growing at an exponential pace, many traditional IT setups are being replaced and evolved to adopt cloud whether on a whole or as a hybrid solution. people are becoming increasingly mobile, collaborate more freely, and shifting more of their data to the cloud. With that in mind, organizations big or small needs security that governs use and protect data everywhere. Most IT teams are still struggling trying to make their legacy security products to continue providing a secured computing environment, only to fail as these products are not designed primarily to handle the modern cloud. Legacy solutions works like binary, on or off, allow or block, making exceptions or granular controls are not a standard in many legacy products. These products also present blind spots, putting sensitive data at risk of loss, exposure and abuse. To optimize the adoption of cloud, people and companies should be able to collaborate without limits, working safely across the cloud, web, devices and locations. A good Cloud Access Security Broker (CASB) platform should provide the deepest visibility into cloud and web transactions so that IT security teams can make informed policy decisions to reduce risk. The platform should also enable enterprises to secure both sanctioned and unsanctioned cloud services, protect sensitive data across the cloud and web, and stop even the most advanced online threats. Essentially a good CASB solution should empower organisations to customize security designed according to how the company work, without slowing them down.

Seminar C: Building A Defensible Security Architecture And Engineering
2.00pm – 3.30pm

Illustrating and Showcasing the Latest Methodologies (with case studies) in:

  • Endpoint detection and response (EDR)
  • Network Traffic Analysis (NTA)
  • Malware sandboxes
  • Central analytics and management
Seminar D: Hacker Tools, Techniques, Exploits, And Incident Handling
3.45pm – 5.00pm

Understanding hackers’ tactics and strategies, finding vulnerabilities and discovering intrustions and equipping with a comprehensive incident handling plan. Know the latest cutting-edge insidious attack vectors. Provide a step-by-step process for responding to computer incidents and inside view of how attackers undermine systems, so that one can prepare for, detect and respond to them.

09:00 Welcoming Speech, Opening Remarks & Thank You Sponsor Speech By Conference Producer
09:05 Keynote
2020 Cyber Security Strategy And Its Implementation – Pre-empting Massive Future Attacks & State-sponsored Vectors
Australia Federal Government_v2SENIOR REPRESENTATIVE
Home Affairs Department, Australian Federal Government
09:45 How Hackers Are Using Machine Learning to Exploit Security Lapses
Weaponizing AI: How Cyber Criminals Are Using Machine Learning To Launch Attacks And Machine Learning To Improve Exploits – Case Study Of Creating An Adaptive Blockchain For Messaging Purposes For Bypassing Government Controls
  Patrick-Hamilton-112x128PATRICK HAMILTON
Former Cyber Security Advisor & Expert
US Special Operations Solutions (Iraq/Afghanistan), US Department of Defence
Cyber Security Director
WithYouWithMe (serving Army Veterans)

Contributor to the Australian Government Protective Security Policy Framework and the US Department of Defence and National Institute of Standards and Technology (NIST) Cybersecurity Framework and Risk Management Framework
10:15 Morning Refreshments & Networking Session
10:30 Managing Major Cyber Incidents – Insights And Observations
David-Cullen-112x128DAVID CULLEN
Principal Advisor
Cyber Incidents and Emergency Management,
Department of Premier and Cabinet, Victoria
Department of Premier and Cabinet, Victorian Government_logo
11:00 Lessons From Past Data Breaches 
Ian-McKenzie-112x128IAN MCKENZIE
Chief Information Security Officer
Cyber Security Branch

Information Services Division, Department of Parliamentary Services
Parliament of Australia
Australian Federal Parliament_logo
11:30 International CyberSecurity Frontier Case Studies
  • The Singapore CyberSecurity Experience
CyberSecurity Authority of SingaporeSENIOR MANAGEMENT
CyberSecurity Authority of Singapore (pending)
  • The Israeli CyberSecurity Experience
Israel National Cyber DirectorateSENIOR MANAGEMENT, Israel National Cyber Directorate/
YONATAN MARCUS, Technological Team Leader, Yehida Shmonae – Matayim, Israel (pending)
12:15 Global CEO –CIO- CTO – CISO Panel Discussion:
  • How to talk to your Board about Cybersecurity?
  • Why doesn’t my boss get it?
  • Cybersecurity influence in the Board Room
  • Cyber knowledge uplift for key personnel
  • What are some effective toolsets used by CIO to guide the board of directors in a language that they can understand at the business level
  • Developing a viable Data Governance Strategy
  • How to build corporate resilience, post-attacks
  • Developing an effective response to Australia’s Security Regulations: GDPR/NDB – many CISO’s are still searching for the right approach to ensure organisational compliance
  • How to ensure your IT provider is doing your cybersecurity right?
  • How hackers attack and how to fight back
  • Reasons why more CEOs will be fired over cybersecurity breaches
  • How to ensure yours is not next
Peter-Jones-112x128PETER JONES
Chief Executive Officer
Scott-Wall-112x128SCOTT WALL
Chief Information Officer
Mitra-Bhar-112x128MITRA BHAR
Chief Information Officer
NSW Education Standards Authority
NSW Education Standards Authority_logo
Dovid-Clarke-112x128DOVID CLARKE
Chief Information Security Officer
MMG Limited (Minerals and Metals Group)
Vladas-Leonas-112x128DR VLADAS LEONAS
Senior IT Advisor, iCare
Former Group Deputy Chief Information OfficerTransport for NSW
Andrew-Crawford-112x128ANDREW CRAWFORD
Data Governance Manager
St Vincent’s Health
ChairmanAustralian Computer Society (NSW)
St Vincent’s Health_logo
Chief Information Security Officer
Swinburne University of Technology
Clive-Reeves-112x128CLIVE REEVES
Deputy Chief Information Security Officer
Telstra (pending)
Australian Federal PoliceSENIOR MANAGEMENT
Australian Federal Police
Office of the Auditor General for Western AustraliaSENIOR MANAGEMENT
Office of the Auditor General for Western Australia
And invited CEOs, CISOs, CTOs in Australia and the region
12:50 Lunch & Networking (With Real World Live Demonstrations of Security Analysis Tools – Sponsorship Opportunities Available)
14:00 How State Sponsored Cyber Attacks Are Stealing Commercial, Technological And State Secrets?  What Can Be Done To Protect Against Cyber Threats, How Do You Wage A Cyber Operation?
How has the cyber-kill chain evolved and what are the latest trends and methodologies in lateral movement and counter-incident response? What is the defensive framework to suppress the modern cybercriminal and spy? Evolving the hunt – reducing the attacker dwell time. Moving from Cyber Preparedness (post-attack) to Cyber Attacking
Skeeve-Stevens-112x128SKEEVE STEVENS
Future Warfare Threat Analyst

Future Sumo

Future Sumo_logo
14:30 Security By Design For IoT Networks
Zero day-based exploits focus on vulnerabilities that are not yet known to anti-malware companies or for which no targeted solutions are available, such as patches or updates. Could Security by Design be the AntiDote? Can better design thinking close the door against “zero day exploits”?
Sibi-Ravindaran-112x128SIBI RAVINDRAN
Electromagnetic Spectrum and Cyberspace Warfare Operations Officer
Royal Australian Air Force
Royal Australian Air Force_logo
15:00 Reaping The Real-world Benefits Of The Common Defence Approaches Including Reality Checks On Many Types Of Cybersecurity Offerings – An Austrac Perspective
What are the executive-level justifications and discussions, particularly in a government environment where the impact of security breaches can be far more than simply financial?
Martin-Brown-112x128MARTIN BROWN
Information Security Adviser
Innovation & Technology Solutions
AUSTRAC, Australian Federal Government
15:30 Afternoon Refreshments & Networking Session
16:00 2020 Ransomware
Is The World Ready for The Next Big Ransomware Attack? Why Ransomware Criminals Are Now setting Their Sights on Data Backups in 2020. New research on Ransomware – what are the possible training options for industries who will be targeted in the future, to see and measure impact of training on effects post ransomware. AI enabled payment diversion fraud.
  Alana-Maurushat-112x128PROF. ALANA MAURUSHAT
Professor of Cybersecurity and Behaviour Western Sydney University
Key Researcher, CRC Smart Satellites
Board Director, IFW Global
Western Sydney University_logo
16:30 Cybermed: Cybersecurity Measures Undertaken By Hospitals And Institutions In The Healthcare Sector – An Update
Andrew-Crawford-112x128ANDREW CRAWFORD
Data Governance Manager
, St Vincent’s Health
Chairman, Australian Computer Society (NSW)
St Vincent’s Health_logo
16:50 Interactive Roundtable Discussion, Followed By One-on-one (Sponsorship Opportunities Available)
Roundtable A: Open-Source Intelligence (OSINT) Gathering and Analysis
Roundtable B: Mobile Device Security And Ethical Hacking. How To Maintain Your Security Standards As Business Goes Mobile.
Roundtable C: Deceptive Advertising Techniques.
1 in Every 200 Online Ads is Now Malicious: How Hackers Are Adopting Increasingly Sophisticated Malvertising Techniques to Exploit Vulnerabilities
Roundtable D: Managing Open Source Vulnerabilities
How to Manage Open Source Vulnerabilities at Scale.80-90% of software applications are assembled from Open Source components. Developers don’t often have tools to choose healthy components and security doesn’t have visibility on where the vulnerable ones are used. How can companies automate security to manage OS? How do you identify and remediate critical OS security vulnerabilities? How do you scan, create and read an app’s corresponding Software Bill of Materials?
Roundtable E: Forensics Incident Response:
Distributed Forensic Collection & Analysis. What are the tools that can allow for truly surgical collection and analysis of forensic evidence across the networks, say, from the theft of confidential data to complex network breaches?
Roundtable F: Hacking Through Collaboration App
Hacking Into Collaboration App Security Such as Slack to Exploit All Users
Roundtable G: Access Management And Advanced Phishing
How Hackers Are Now Using Machine Learning to Deploy Threats That Breaks into An Email System, Lurks and Learns. Advanced Phishing on 2 Factor Authentication. Handling CEO Fraud, Waterhole Fraud. Digital Identity, Access Management and Dealing with Credential Stuffing.
Roundtable H: Advances In Drone Cyber Security And Cryptanalysis
How can we tell whether a passing drone is being used by its operator for a legitimate or illegitimate purpose? How do you detest a drone’s FPV channel, determine whether the drone is being used as a spy after a POI and how you locate the spying drone in space
Roundtable I: Exploring The Potential For Cyber Insurance & Reinsurance. Maturity And Gap Insurance
Roundtable J: New Challenges In Devsecops And Container Security. Implementing Good Software Practices In The Enterprise
Roundtable K: Hacking With Advanced IoT Smart Botnets: Why We Can’t Stop Them
Roundtable L: Understanding Backdoors: Malicious Or Unintended
Roundtable M: Advances In The Dark Net
Roundtable N: The Rising Use Of Augmented Reality/Virtual Reality In The Security Operations Center (SOC)
17:30 Closing Remarks By Conference Chairman
17:35 Champagne Networking Session
Enjoy a glass of champagne whilst networking with other like-minded individuals on topics that are of most interest to you and fellow delegates.

New champagne networking session

New Threat Vectors and Malicious Attacks
08:55 Welcoming Speech, Opening Remarks & Thank You Sponsor Speech By Conference Producer
09:00 Industrial Control Systems
Countering Industrial Cyberthreats in Critical Infrastructures & Plants. Industrial (ICS/OT/SCADA) cyberattacks that are made public get a wide variety of attention. What happens behind the scene before and after these attacks? Operational technology devices connected to the Internet can be used as a pivot for network ingress or directly attacked to cause kinetic effect. The teams that orchestrate these attacks are still active, learning, developing and targeting other organisations. How can one use honeypots to determine who is targeting SCADA and control systems? How can you secure your infrastructure against such attacks?
  • Pre-empting Cyber-attacks In The Power Sector
Jeff-Campbell-112x128JEFF CAMPBELL
Chief Information Security Officer
Horizon Power
Horizon Power_logo
  • Pre-empting Cyber-attacks In The Port And Maritime Sector
Stephen-Kraemer-112x128STEPHEN KRAEMER
Chief Information Security Officer
Ports of Auckland
Ports of Auckland_logo_500px
  • Pre-empting Cyber-attacks In The Water & Wastewater Sector
Head of Research & Development
Sydney Water
  • Pre-empting Cyber-attacks In The Mining Sector
Dovid-Clarke-112x128DOVID CLARKE
Chief Information Security Officer
MMG Limited (Minerals and Metals Group)
Designing Systems To Protect Against Exploits and Vulnerabilities
09:50 Case Study: Operational Technology In The Rail Sector
  • Where to start for operational technology Cyber security in the rail industry?
  • A layered approach for securing OT – organisation, skills, trust and technology to secure OT networks
  • Why social engineering is most important?
  • How to get NIST cybersecurity standards compliant
Divya-Dayalamurthy-112x128DIVYA DAYALAMURTHY
Cyber Security Lead
Arc Infrastructure
Nominated for 20 in 20 People’s Choice Award for Women in Technology WA in the field of cybersecurity in 2019
Arc Infrastructure_logo_500px
10:15 Morning Refreshments & Networking Session
10:30 Handling Cyber Attacks On The IoT Ecosystem And In The Telecommunications Sector
  • Developing a Robust and Secure IoT Ecosystem, with the advent of 5G
  • Governance looking beyond the functionality of IoT device
  • Detecting infected IoT devices to prevent distributed DDoS attacks
  • Case studies in the telecoms sector, and with driveless cars
Udaya-Wijesinghe-112x128UDAYA WIJESINGHE
Senior Cyber Security Architect
11:00 Deploying A Zero-trust Approach To Securing Access Of Mobile Devices, Apps And Networks. Securing User Access Authentication In A Perimeter-less World – A Corporate Perspective
Joseph-Dalessandro-112x128JOSEPH DALESSANDRO
Head of Security & Technology Audit and Audit Data Analytics
Australian Unity
Australian Unity_logo_500px
11:30 Leveraging Machine Learning, Automation And AI In Next Generation Cybersecurity
  • Building Robustness in AI Technology
  • Cybersecurity challenges that AI will pose in the future
  • How Hackers use AI to identify vulnerabilities
  • Deterring Hacking Through AI and Machine Learning
  • Combining Machine Learning with Network Traffic Analysis: How AI Will Help to Identify Which Traffic Will Be Potentially Malicious
Michael-Brand-112x128DR MICHAEL BRAND
Former Chief Data Scientist, Telstra
Founder, Otzma Analytics
Otzma Analytics_logo_500px
12:00 Automating Cyber Security Defences In The Next Industrial Revolution
Why is automation important and how do you incorporate automation into your enterprise cyber strategy?
Helge-Janicke-112x128PROF. HELGE JANICKE
Research Director
The Cyber Security Cooperative Research Centre, Australia
The Cyber Security Cooperative Research Centre_logo_500px
12:30 Lunch & Networking Session
13:30 Pre-empting Cyber-attacks In The Entertainment/Gaming Sector: A Case Study
David-Osborne-112x128DAVID OSBORNE
Group ICT Operations Manager
SkyCity Entertainment Group
 14:00 5G & Cybersecurity
Why A Massive Cyber Attack On 5G & Vulnerable Iots Could Cripple An Entire City Or Country – Managing New Challenges In 5G, Cybersecurity, Security Design, Zero Day Exploit
Julian-Garthwaite-112x128JULIAN GARTHWAITE
Virtual Lead – Cyber Defence Operations/Security Design
Spark New Zealand
Spark New Zealand_logo_500px
Foreign Cyber Attacks, Standards, Ethics, AI in Cybersecurity
14:30 How Universities And Educational Institutions In Australia Pre-empt Foreign Cyber-attacks: An Update
Chief Information Security Officer
Swinburne University of Technology
15:00 Afternoon Refreshment & Networking Session
15:30 Male SpeakerInternational Keynote: Permanent Record

Skype Interview With Edward Snowden, Freedom Of The Press Foundation: Data Privacy, Surveillance Capitalism, The Right To Be Forgotten And Whistle Blowing (pending)

International CyberCrime and Future Risk Management
16:00 Ethics And Cybersecurity, Defending The Right Things In The Right Way
Standards and regulation in ethics and AI technologies
Greg-Adamson-2-112x128PROF. GREG ADAMSON
Enterprise Fellow in CyberSecurity
University of Melbourne & Blockchain Expert
University of Melbourne & Blockchain_logo_500px
16:30 Future Risk Management In Cybersecurity: Advances In Quantum Cryptography
  • Are Quantum Computers Really A Threat To Cryptography?
  • What need to be done for early adoption of quantum-safe methodologies and the challenges ahead
  • Why the best way to secure our networks is by doing risk management
Associate Dean (Mathematical Sciences)
RMIT University/Quantum Cryptography Expert
RMIT University_logo_500px
17:00 Managing, Investigating And Prosecuting International Cyber Crime
17:30 Closing Remarks By Conference Chairman