Agenda

Pre-Summit Masterclasses Day 1: Monday, 7 June 2021

Seminar A: Incident Handling, Incident Response, Hacker Tools, Techniques, Exploits
Starting at 10:30am (with break in between)
D Understanding hackers’ tactics and strategies, finding vulnerabilities and discovering intrustions and equipping with a comprehensive incident handling plan. Know the latest cutting-edge insidious attack vectors. Provide a step-by-step process for responding to computer incidents and inside view of how attackers undermine systems, so that one can prepare for, detect and respond to them.
Security-In-Depth_logo2
Michael Connory

Ethical Hacker & CEO
Security In Depth
Security In Depth_logo
Seminar B: Leveraging Machine Learning, Automation In Next And AI In Next Generation Cybersecurity
11:30am – 12:00pm
Seminar B
  • Building Robustness in AI Technology
  • Cybersecurity challenges that AI will pose in the future
  • How Hackers use AI to identify vulnerabilities
  • Deterring Hacking Through AI and Machine Learning
  • Combining Machine Learning with Network Traffic Analysis: How AI will help to identify which traffic will be potentially malicious
Michael-Brand-rounded
Dr Michael Brand

Former Chief Data Scientist, Telstra
Founder, Otzma Analytics
Otzma Analytics_logo_500px
                                                                    Seminar C: Incident Response, Threat Hunting And Digital Forensics                                                                                                                                                                                         1:00pm – 2:30pm
Seminar C

Helping responders and threat hunting teams with advanced skills to hunt down, identify, counter and recover from a wide range of threats within enterprise networks including nation-state adversaries, organised crime syndicates and hactivism. Threat hunting is limited by a few factors: good quality data, pervasive visibility across your control points, advanced AI and Machine Learning, and superior detection/correlation. Legacy tools just don’t work. What are the right tools that will work, how the data needs to be improved, finding the threats, and how to build automation to respond and react to your events

  • Update with hands-on incident response and threat hunting tactics and techniques that elite responders and hunters are successfully using to detect, counter and respond to real-world breach cases
  • Devising Penetration Testing and Vulnerability Assessment
Skeeve-Stevens-rounded
Skeeve Stevens

Future Warfare Threat Analyst
Future Sumo
Future Sumo_logo

Main Summit Day 2 – Tuesday, 8 June 2021

TIME AGENDA  
09:55 Opening Remarks
10:00 Cybersecurity Strategy And Its Implementation
Australian-Federal-Department-of-Home-Affairs logoGreg Miller
First Assistant Secretary
Cyber Security Policy
Australian Federal Department of Home Affairs
Australian Federal Department of Home Affairs
10:30 Managing Major Cyber Incidents
  David-Cullen-rounded
David Cullen
Principal Advisor
Cyber Incidents and Emergency Management,
Department of Premier and Cabinet, Victoria
Department of Premier and Cabinet, Victorian Government_logo
10:50 Changing Cyber Landscapes – The Battle Of Algorithms
Claire-Teo-Photo-rounded
Claire Teo
Account Manager
Darktrace
Darktrace_logo
11:10 Morning Break  
11:20 It Started With An Email – How The ATP10 Hackers Gained Access To Global MSPs
Security-In-Depth_logo2
Michael Connory
CEO

Security In Depth
Security In Depth_logo
11:40 Risk-Based Alerting For Anti-Cyber Hacking
nbn_logo2
Nathaniel Gaffud
Malware Reverse Engineer & Cyber Security Analyst, Cyber Defence
nbn Security Group – Legal and Security Department

 

nbn_logo
12:05 Lunch Break
12:50 Panel Discussion: Managing Cyber Security Breaches
Bob-Sharon-rounded
Bob Sharon
Founder & Chief Innovation Officer
Blue IoT
Blue IoT_logo
Matt-Hannah-rounded
Matt Hannah
Chief Information Officer
Silk Contract Logistics
Silk Contract Logistics_logo
Nick-McKenzie-rounded
Nick McKenzie
General Manager, Cybersecurity & Chief Information Security Officer
National Australia Bank
National Australia Bank_logo
Other Invited Speakers of Day 2
13:50 Reaping The Real World Benefits Of The Common Defence Approaches Including Reality Checks On The Many Types Of Cybersecurity Offerings
  Martin-Brown-rounded
Martin Brown
Information Security Advisor
AUSTRAC
AUSTRAC_logo
14:20 The Securing Of Buildings And Smart Cities
Bob-Sharon-rounded
Bob Sharon
Founder & Chief Innovation Officer
Blue IoT

Blue IoT_logo
14:40 Cybersecurity Continuous Improvement And Regulatory Compliance
Joseph-Dalessandro-rounded
Joseph Dalessandro
Head of Security & Technology Audit
Australian Unity
 Joseph Dalessandrot_Australian Unity Logo
15:00 End Of Day 2

Main Summit Day 3 – Wednesday, 9 June 2021

TIME AGENDA  
09:55 Opening Remarks
10:00 Pre-Empting Cyber Attacks In The Mining Sector
Dovid-Clarke-rounded
Dovid Clarke
Chief Information Security Officer
MMG Limited (Minerals and Metals Group)
MMG_logo_500px
10:20 Handling Cyber Attacks On The IoT Ecosystem And In The Telecoms Sector
Udaya-Wijesinghe-rounded
Udaya Wijesinghe

Senior Cyber Security Architect
Optus
Optus_logo_500px
10:40 Cyber Security Governance And Related Government Policy And Regulation Implications
Stanley-Shanapinda-rounded
Dr. Stanley Shanapinda
Research Fellow
Optus La Trobe Cyber Security Research Hub, La Trobe University
La Trobe University_logo
11:00 Morning Break  
11:00 Sponsor Presentation By Okta
Okta_logo2
Senior Representative
Okta
Okta_190px
11:30 Sponsor Presentation By Belkin
John-Minasyan-rounded
John Minasyan
Global Director of Product Management, Cyber Security
Belkin
 Belkin_logo
11:50 Ethics And Cybersecurity, Defending The Right Things In The Right Way
Greg-Adamson-2-rounded
Prof. Greg Adamson

Enterprise Fellow in CyberSecurity
University of Melbourne
University of Melbourne & Blockchain_logo_500px
12:10 Lunch Break
13:10 How Universities And Educational Institutions In Australia Pre-Empt Foreign Cyber-Attacks
Swinburne-University-of-Technology_logo2
Steven Cvetkovic
Former Chief Information Security Officer
Swinburne University of Technology

Swinburne University of Technology_logo
15:30 New Challenges In Devsecops And Container Security. Implementing Good Software Practices In The Enterprise
Suzanne-Dyke-rounded
Suzanne Dyke

Security As A Service Optimization Lead
Telstra
 Telstra_logo_500px
13:50 Future Risk Management In Cybersecurity
  Asha-Rao-rounded
Professor Asha Rao

Associate Dean
RMIT University
RMIT University_logo_500px
 
14:10 Panel Discussion: Meeting New Cybersecurity Challenges In 2021
Invited Speakers Of Day 3
15:10 End Of Day 3