Monday, 7 June 2021

Seminar A: Incident Handling, Incident Response, Hacker Tools, Techniques, Exploits
D Understanding hackers’ tactics and strategies, finding vulnerabilities and discovering intrustions and equipping with a comprehensive incident handling plan. Know the latest cutting-edge insidious attack vectors. Provide a step-by-step process for responding to computer incidents and inside view of how attackers undermine systems, so that one can prepare for, detect and respond to them.
Security in depth_logo_112pxMICHAEL CONNORY
Ethical Hacker & CEO
Security In Depth
Security In Depth_logo
Seminar B: Leveraging Machine Learning, Automation In Next And AI In Next Generation Cybersecurity
Seminar B
  • Building Robustness in AI Technology
  • Cybersecurity challenges that AI will pose in the future
  • How Hackers use AI to identify vulnerabilities
  • Deterring Hacking Through AI and Machine Learning
  • Combining Machine Learning with Network Traffic Analysis: How AI will help to identify which traffic will be potentially malicious
Michael-Brand-112x128DR MICHAEL BRAND
Former Chief Data Scientist, Telstra
Founder, Otzma Analytics
Otzma Analytics_logo_500px
                                                                                   Seminar C: Incident Response, Threat Hunting And Digital Forensics
Seminar C

Helping responders and threat hunting teams with advanced skills to hunt down, identify, counter and recover from a wide range of threats within enterprise networks including nation-state adversaries, organised crime syndicates and hactivism. Threat hunting is limited by a few factors: good quality data, pervasive visibility across your control points, advanced AI and Machine Learning, and superior detection/correlation. Legacy tools just don’t work. What are the right tools that will work, how the data needs to be improved, finding the threats, and how to build automation to respond and react to your events

  • Update with hands-on incident response and threat hunting tactics and techniques that elite responders and hunters are successfully using to detect, counter and respond to real-world breach cases
  • Devising Penetration Testing and Vulnerability Assessment
skeeve-stevens-112x128SKEEVE STEVENS
Future Warfare Threat Analyst
Future Sumo
Future Sumo_logo

Tuesday, 8 June 2021

09:00 Welcoming Speech, Opening Remarks & Thank You Sponsor Speech By Conference Producer

Victor-Perton-112x128VICTOR PERTON
Author: The Case for Optimism: The Optimists’ Voices
Founder, Editor & Interviewer: “The Australian Leadership Project”, Australian Leadership

09:15 2020 Cyber Security Strategy And Its Implementation – Pre-empting Massive Future Attacks & State-sponsored Vectors
Australia Federal Government_v2GREG MILLER
First Assistant Secretary
Cyber Security Policy
Cyber Risk Services Branch
Technology and Major Capability Group
Australian Federal Department of Home Affairs
Australian Federal Department of Home Affairs
09:45 How Hackers Are Using Machine Learning to Exploit Security Lapses
Weaponizing AI: How Cyber Criminals Are Using Machine Learning To Launch Attacks And Machine Learning To Improve Exploits – Case Study Of Creating An Adaptive Blockchain For Messaging Purposes For Bypassing Government Controls
  Patrick-Hamilton-112x128PATRICK HAMILTON
Former Cyber Security Advisor & Expert
US Special Operations Solutions (Iraq/Afghanistan), US Department of Defence
Cyber Security Director
WithYouWithMe (serving Army Veterans)

Contributor to the Australian Government Protective Security Policy Framework and the US Department of Defence and National Institute of Standards and Technology (NIST) Cybersecurity Framework and Risk Management Framework
10:15 Morning Refreshments & Networking Session
10:30 Managing Major Cyber Incidents – Insights And Observations
David-Cullen-112x128DAVID CULLEN
Principal Advisor
Cyber Incidents and Emergency Management,
Department of Premier and Cabinet, Victoria
Department of Premier and Cabinet, Victorian Government_logo
11:00 Changing Cyber Landscapes: The Battle Of Algorithms
Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous and harder to identify. In the near future, we will begin to see supercharged, AI-powered cyber-attacks leveraged at scale. To protect against Offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.

In this session, learn about:

  • Paradigm shifts in the cyber landscape
  • Advancements in offensive AI attack techniques
  • The Immune System Approach to cyber security and defensive, Autonomous Response capabilities
  • Real-world examples of emerging threats that were stopped with Cyber AI
Claire-Teo-Photo-112x128CLAIRE TEO
Account Manager
11:40 Lessons From Past Breaches In Cybersecurity And The Way Forward

Mario-Tieppo-112x128MARIO TIEPPO
Chief Technology & Digital Officer, AusNet Services
Board Member, Executive Advisory Board for Cyber, Deakin University (Former)

Bob-Sharon-112x128BOB SHARON
Founder & Chief Innovation Officer
Blue IoT
 Blue IoT_logo
Matt-Hannah-112x128MATT HANNAH
Chief Information Officer
Silk Contract Logistics
Silk Contract Logistics_logo
12:10 Global CEO –CIO- CTO – CISO Panel Discussion:
  • How to talk to your Board about Cybersecurity?
  • Why doesn’t my boss get it?
  • Cybersecurity influence in the Board Room
  • Cyber knowledge uplift for key personnel
  • What are some effective toolsets used by CIO to guide the board of directors in a language that they can understand at the business level
  • Developing a viable Data Governance Strategy
  • How to build corporate resilience, post-attacks
  • Developing an effective response to Australia’s Security Regulations: GDPR/NDB – many CISO’s are still searching for the right approach to ensure organisational compliance
  • How to ensure your IT provider is doing your cybersecurity right?
  • How hackers attack and how to fight back
  • Reasons why more CEOs will be fired over cybersecurity breaches
  • How to ensure yours is not next
Peter-Jones-112x128PETER JONES
Chief Executive Officer
Scott-Wall-112x128SCOTT WALL
Chief Information Officer
Dovid-Clarke-112x128DOVID CLARKE
Chief Information Security Officer
MMG Limited (Minerals and Metals Group)
Chief Information Security Officer
Swinburne University of Technology
 Swinburne University of Technology_logo
Mario-Tieppo-112x128MARIO TIEPPO
Chief Technology & Digital Officer, AusNet Services
Board Member, Executive Advisory Board for Cyber, Deakin University
Australian Digital Health Agency_logo (1)ANTHONY KITZELMANN
Chief Information Security Officer
Australian Digital Health Agency
Australian Digital Health Agency_logo
John-Taylor-112x128JOHN TAYLOR
CTO (I), Future Business & Technology
Nick-McKenzie-112x128NICK MCKENZIE
General Manager, Cybersecurity & Chief Information Security Officer
National Australia Bank
National Australia Bank_logo
Bob-Hennessy-112x128BOB HENNESSY
Group Chief Information Officer
Australian Federal Police_logo_112pxMARIANNE VOSLOO
National Technology and Innovation Manager
Australian Federal Police (pending)
Australian Federal Police_logo
And invited CEOs, CISOs, CTOs in Australia and the region
12:50 Lunch & Networking
14:00 “It Started With An Email – How The ATP10 Hackers Gained Access To Global MSPs” With Case Study On How Singapore Health Was Hacked And Lessons Learnt
Security in depth_logo_112pxMICHAEL CONNORY
Ethical Hacker & CEO

Security In Depth
Security In Depth_logo
14:30 Risk-Based Alerting for Anti-Cyber Hacking – The nbn Experience
nbn_logo_112pxNATHANIEL GAFFUD
Malware Reverse Engineer & Cyber Security Analyst, Cyber Defence
nbn Security Group – Legal and Security Department 


15:00 Reaping The Real-World Benefits Of The Common Defence Approaches Including Reality Checks On Many Types Of Cybersecurity Offerings – An Austrac Perspective
What are the executive-level justifications and discussions, particularly in a government environment where the impact of security breaches can be far more than simply financial?
Martin-Brown-112x128MARTIN BROWN
Information Security Adviser
Innovation & Technology Solutions
AUSTRAC, Australian Federal Government
15:30 Afternoon Refreshments & Networking Session
16:00 The Securing of Buildings And Smart Cities
  Bob-Sharon-112x128BOB SHARON
Founder & Chief Innovation Officer
Blue IoT
 Blue IoT_logo
16:30 Security By Design For IoT Networks
Sibi-Ravindaran-112x128SIBI RAVINDRAN
Electromagnetic Spectrum and Cyberspace Warfare Operations Officer
Royal Australian Air Force
Royal Australian Air Force_logo
16:50 Interactive Roundtable Discussion, Followed By One-on-one (Sponsorship Opportunities Available)
Roundtable: Mobile Device Security And Ethical Hacking. How To Maintain Your Security Standards As Business Goes Mobile
Roundtable: Optimism In CyberSecurity
Roundtable: Threat Hunting And Digital Forensics
Roundtable: The Fundamental Role Of AI In Cyber Security
Claire-Teo-Photo-112x128CLAIRE TEO
Account Manager
Roundtable: Cybersecurity Continuous Improvement And Regulatory Compliance
Joseph-Dalessandro-112x128JOSEPH DALESSANDRO
Head of Security & Technology Audit and Audit Data Analytics
Australian Unity
Joseph Dalessandrot_Australian Unity Logo
Roundtable: Anti COVID-19 Scams And Cyber Attacks Strategem
Roundtable: Operational Technology And Pre-Empting Cyber-Attacks In The Rail Sector
Divya-Dayalamurthy-112x128DIVYA DAYALAMURTHY
Cyber Security Lead
Arc Infrastructure
Arc Infrastructure_logo_500px
17:30 Closing Remarks By Conference Chairman
17:35 Champagne Networking Session
Enjoy a glass of champagne whilst networking with other like-minded individuals on topics that are of most interest to you and fellow delegates.

New champagne networking session

Wednesday, 9 June 2021

New Threat Vectors and Malicious Attacks
08:55 Welcoming Speech, Opening Remarks & Thank You Sponsor Speech By Conference Producer
09:00 Industrial Control Systems
Countering Industrial Cyberthreats in Critical Infrastructures & Plants. Industrial (ICS/OT/SCADA) cyberattacks that are made public get a wide variety of attention. What happens behind the scene before and after these attacks? Operational technology devices connected to the Internet can be used as a pivot for network ingress or directly attacked to cause kinetic effect. The teams that orchestrate these attacks are still active, learning, developing and targeting other organisations. How can one use honeypots to determine who is targeting SCADA and control systems? How can you secure your infrastructure against such attacks?
  • Pre-empting Cyber-attacks In The Mining Sector
Dovid-Clarke-112x128DOVID CLARKE
Chief Information Security Officer
MMG Limited (Minerals and Metals Group)
  • Pre-empting Cyber-attacks In The Water & Wastewater Sector
Head of Research & Development
Sydney Water
 Sydney Water_logo_500px
Designing Systems To Protect Against Exploits and Vulnerabilities
10:15 Morning Refreshments & Networking Session
10:30 Handling Cyber Attacks On The IoT Ecosystem And In The Telecommunications Sector
  • Developing a Robust and Secure IoT Ecosystem, with the advent of 5G
  • Governance looking beyond the functionality of IoT device
  • Detecting infected IoT devices to prevent distributed DDoS attacks
  • Case studies in the telecoms sector, and with driveless cars
Udaya-Wijesinghe-112x128UDAYA WIJESINGHE
Senior Cyber Security Architect
11:00 Cyber Security Governance And Related Government Policy And Regulation Implications
Stanley-Shanapinda-112x128DR. STANLEY SHANAPINDA
Research Fellow
Optus La Trobe Cyber Security Research Hub
La Trobe University
 La Trobe University_logo
11:30 CyberSecurity Presentation
12:00 Bridging The Air-Gap With Shared Peripherals
Learn how Belkin’s NIAP certified technology is securing the desktops and networks of the world’s largest government organisations through Air-Gap isolation.
John-Minasyan-112x128JOHN MINASYAN
Global Director of Product Management, Cyber Security
12:30 Lunch & Networking Session
13:30 Automating Cyber Security Defences In The Next Industrial Revolution
Why is automation important and how do you incorporate automation into your enterprise cyber strategy? 
Helge-Janicke-112x128PROF. HELGE JANICKE
Research Director
The Cyber Security Cooperative Research Centre, Australia
The Cyber Security Cooperative Research Centre_logo_500px
 14:00 Ethics And Cybersecurity, Defending The Right Things In The Right Way

Standards and regulation in ethics and AI technologies

Greg-Adamson-2-112x128PROF. GREG ADAMSON
Enterprise Fellow in CyberSecurity
University of Melbourne & Blockchain Expert
University of Melbourne & Blockchain_logo_500px
Foreign Cyber Attacks, Standards, Ethics, AI in Cybersecurity
14:30 How Universities And Educational Institutions In Australia Pre-empt Foreign Cyber-attacks: An Update
Former Chief Information Security Officer
Swinburne University of Technology
 Swinburne University of Technology_logo
15:00 Afternoon Refreshment & Networking Session
15:30 New Challenges In Devsecops And Container Security. Implementing Good Software Practices In The Enterprise
Suzanne-Dyke-112x128 SUZANNE DYKE
Security As A Service Optimization Lead
International CyberCrime and Future Risk Management
16:00 Future Risk Management In Cybersecurity: Advances In Quantum Cryptography
  • Are Quantum Computers Really A Threat To Cryptography?
  • What need to be done for early adoption of quantum-safe methodologies and the challenges ahead
  • Why the best way to secure our networks is by doing risk management
Associate Dean (Mathematical Sciences)
RMIT University/Quantum Cryptography Expert
RMIT University_logo_500px
16:30 The Advent Of The Anti-Pandemic Robot For Coronavirus
International Humanoid Robotics Expert
17:00 Closing Remarks By Conference Chairman