Agenda

Pre-Summit Workshops Day 1: Monday, 7 June 2021

Workshop A: Incident Handling, Incident Response, Hacker Tools, Techniques, Exploits
11:00am – 11:30am
D Understanding hackers’ tactics and strategies, finding vulnerabilities and discovering intrustions and equipping with a comprehensive incident handling plan. Know the latest cutting-edge insidious attack vectors. Provide a step-by-step process for responding to computer incidents and inside view of how attackers undermine systems, so that one can prepare for, detect and respond to them.
Michael-Connory-rounded
Michael Connory

Ethical Hacker & CEO
Security In Depth
Security In Depth_logo
Workshop B: Leveraging Machine Learning And AI In Next Generation Cybersecurity
11:30am – 12:00pm
Seminar B Over the past 10 years, the amount of cybercrime has grown exponentially, easily eclipsing the ability of human gate-keepers to keep it at bay. At the same time, cybercrime has become far more diverse in its methods, far more devious in its goals, and far better funded. In this talk we will cover:

  • How machine learning (ML) has risen to this challenge and is perfectly suited to counter the various facets of the problem
  • The new problems encountered when defence relies on effective ML
  • Adversarial machine learning (AML) as the attackers’ new counter-offensive, and
  • The means to effectively counter AML attacks
Michael-Brand-rounded
Dr Michael Brand

Founder
Otzma Analytics
Otzma Analytics_logo_500px
                                                                 Workshop C: Cyber Crisis Communications 101 – Perspective Of Security Industry Media
                                                                                                               1:00pm – 1:45pm
incident-response The application of contemporary crisis management principles and practices requires an updated playbook for cybersecurity, incident response, aligning to cyber related legislation, including new legislation for critical infrastructure, mandatory data breach reporting and regulatory frameworks across Europe, Asia and United States. This session examines a number of recent case studies and insight into the formation and roles of the crisis committee, communication planning, cyber breach notifications and communicating with authorities, stakeholders and the public.
Chris Cubbage
Chris Cubbage CPP, CISA, GAICD

Director & Executive Editor
MySecurity Media Pty Ltd
MySecurityMedia_190px
                                                                                 Workshop D: New Cyber Threats In The Real World                                                                                                                                                                                                            1:45pm – 3:15pm
Seminar C

In the world of Cyber Security, the focus has been on Firewalls, Identify and Data Theft, Denial of Service, Phishing attacks, Malware, Ransomware, and the alike. But there is a far more complicated and real threat looming. One with a very low barrier of entry and which will have catastrophic real-world impacts. It is also an area that very few people and organisations have expertise in.

IoT is the new Cyber Threat landscape. It is simple yet complicated and involves factors that your average Cyber Security expert has little practical knowledge of. This is further complicated by intersecting it with new cutting-edge technologies such as GPT-3, YOLO, and GAN.

Skeeve-Stevens-rounded
Skeeve Stevens

Future Warfare Threat Analyst
Future Sumo
Future Sumo_logo

Main Summit Day 2 – Tuesday, 8 June 2021

TIME AGENDA  
10:00 Welcoming Speech, Opening Remarks & Thank You Sponsor Speech By Summit Producer
10:10 Welcome Address By Summit Chairperson
Brenda-van-Rensburg-rounded
Brenda van Rensburg
GRC Specialist within Privacy & Information Security
10:15 Meeting New Cybersecurity Challenges In Australia
Hamish-Hansford-rounded
Hamish Hansford
Head, Cyber Security Policy
Australian Federal Department of Home Affairs
Australian Federal Department of Home Affairs
10:50 Securing The Future Of Work With Cyber AI
The future of work remains unpredictable. More than ever before, business leaders need to remain confident that their operations can continue securely in the face of regional or even global crises, and while sections of the economy remain more uncertain and fragile than ever, cyber-attackers are ramping up their campaigns. Organizations must rethink their approach to security, and rely on new technologies like AI to achieve much-needed adaptability and resilience.In this session, learn about:

  • Emerging threats from the transition to remote work
  • How AI has adapted to new patterns of work
  • Darktrace’s use of Cyber AI to protect the dynamic workforce
  • Defensive Autonomous Response capabilities
Sushant-Arora-photo-rounded
Sushant Arora
Regional VP, ANZ
Darktrace
Darktrace_logo
11:25 Breakout Session
Room A: Colonial Pipeline: A Case Study On How To Scare The US Government With Ransomware
Michael-Connory-rounded
Michael Connory
CEO

Security In Depth
Security In Depth_logo
Room B: Antigena Network & Cyber AI Analyst
Antigena Network
Antigena Network neutralizes novel attacks and insider threats across the corporate network and Internet of Things. While pre-programmed response tools tend to rely on simplistic pattern matching and static logic, Antigena Network’s decisions are informed by an ever-evolving understanding and awareness of normal and benign behavior. In this way, self-learning AI delivers a categorically different response that understands how, when, and where to neutralize an emerging threat, while allowing the business to operate as usual.
Cyber AI Analyst
Powered by advanced artificial intelligence, Cyber AI Analyst can sift through large volumes of data at speed and scale, augmenting human teams and buying back time to focus on strategic work. Its investigations are enterprise-wide, allowing the technology to piece together disparate anomalies before settling on a high-level conclusion about the nature, root cause, and extent of the wider security incident. This powerful analytical capability has been found to reduce triage time by up to 92%.
Audrey-Isaac-rounded
Audrey Isaac
Account Executive
Darktrace
Darktrace_logo
12:30 Lunch Break
13:30 Welcome Address By Summit Chairperson
Udaya-Wijesinghe-rounded
Udaya Wijesinghe
Senior Cyber Security Architect
Optus
Optus_logo_500px
13:32 The Securing Of Buildings And Smart Cities
Bob-Sharon-rounded
Bob Sharon
Founder & Chief Innovation Officer
Blue IoT
Blue IoT_logo
14:05 Instilling The Hacker Mindset To Upskill Your Risk Team
Sumeet-Kukar-photo-rounded
Sumeet Kukar
CEO
Arascina
Arascina logo
14:40 CCTV And Cyber Security
Johnny-Lee-photo-rounded
Johnny Lee
Smart City & Critical Infrastructure – Business Development Manager
Axis Communications
axis_color_cmyk_logo
Oshana-Jouna-photo-rounded
Oshana Jouna
Sales Engineering & Training Manager
Axis Communications
axis_color_cmyk_logo
15:15 Don’t Pay The Ransom. Rapidly Recover From Ransomware With Rubrik
  • The current security landscape – why & how big organisations are still being hit and what they could have in place to recover imminently without ransom being contemplated
  • What you can do to prepare for and recover from an attack
  • Best practices for constructing and managing a security strategy
Dale-updated-rounded
Dale Heath
Head of Solutions Engineering
Rubrik
Rubrik-horizontal-RGB-logos_transparent
15:45 Extortionware: Your Privacy Problems Made Public
Over the last decade, ransomware has increasingly become the most popular option for hackers to monetise the access they’ve obtained to corporate computer systems around the world. Over the last few years, we’ve observed the ransomware software and techniques adapt and evolve to include the theft and exposure of private information, creating extortionware as a new breed of malicious software. This talk will provide an overview of these techniques and discuss the potential privacy and security impacts you may face as a result.
Lonnie-Benavides-photo-rounded
Lonnie Benavides
Head of Infrastructure and Application Security 
OneLogin
OneLogin logo
16:15 Closing Remarks By Summit Chairperson

Main Summit Day 3 – Wednesday, 9 June 2021

TIME AGENDA  
10:00 Welcoming Speech, Opening Remarks & Thank You Sponsor Speech By Summit Producer
10:10 Welcome Address By Summit Chairperson
Chris Cubbage
Chris Cubbage CPP, CISA, GAICD
Director & Executive Editor
MySecurity Media Pty Ltd
 MySecurityMedia_190px
10:15 Exponential Increases In Cyber-Attacks Present Constant Risk To Companies’ Data, IP And Critical Infrastructures
Learn how Belkin’s wide range of NIAP Protection Profile 3.0 certified technology is securing the desktops and networks of the world’s largest government organisations through Air-Gap isolation, while improving operator efficiency and effectiveness.
John-Minasyan-rounded
John Minasyan
Global Director of Product Management, Cyber Security
Belkin
Belkin_logo
10:50 Identity-Centric Zero Trust
Discover how to establish zero trust security with Okta and learn the fundamental zero trust properties.
Sami-Laine-rounded
Sami Laine
Principal Solutions Specialist
Okta
Okta new logo
11:25 Breakout Session
Room A: Antigena Email & Antigena SaaS
Antigena Email
Antigena Email is the world’s first self-learning email security technology. Powered by AI, it represents a fundamentally new approach to email security in moving away from static rules and playbooks that seek to answer the question of ‘Is this email bad?’. Rather than looking at the data of an email alone and running it through pre-existing deny lists, Antigena Email looks at emails in their full context and instead asks: ‘Does this email belong?’.
Antigena SaaS
Antigena SaaS neutralizes unpredictable attacks in cloud and collaboration tools. From Microsoft Teams to SharePoint, Antigena SaaS responds with surgical precision when trusted cloud accounts are being used carelessly or for malicious purposes. Unlike policy-based defenses, the technology takes action in light of a multidimensional understanding of digital behavior across hybrid and multi-cloud environments. This enables swift and targeted action that stops SaaS attacks while allowing normal business operations to continue unimpeded. Security operators investigating unusual SaaS activity can also trigger Darktrace Antigena actions directly as desired.
Sarah-Jarman-rounded
Sarah Jarman
Team Lead, Australia
Darktrace
Darktrace_logo
Room B: Making Identity The Foundation For Your Zero Trust Strategy
Leigh-Doddy-photo-rounded
Leigh Doddy
Senior Principal Solutions Engineer
Okta
Okta new logo
12:30 Lunch Break
13:30 Ethics And Cybersecurity, Defending The Right Things In The Right Way
Greg-Adamson-2-rounded
Prof. Greg Adamson

Enterprise Fellow in CyberSecurity
University of Melbourne
University of Melbourne & Blockchain_logo_500px
14:05 How Universities And Educational Institutions In Australia Pre-Empt Foreign Cyber-Attacks
Swinburne-University-of-Technology_logo2
Steven Cvetkovic
Former Chief Information Security Officer
Swinburne University of Technology

Swinburne University of Technology_logo
14:40 Handling Cyber Attacks On The IoT Ecosystem And In The Telecoms Sector
Udaya-Wijesinghe-rounded
Udaya Wijesinghe
Senior Cyber Security Architect
Optus
Optus_logo_500px
15:15 New Challenges In Cloud, Container & DevOps Security, Implementing Good Software Practices In The Enterprise
Roxanne-Pashaei-new-photo-rounded
Roxanne Pashaei

Cloud Security, Manager
Telstra
 Telstra_logo_500px
15:50 Faking It: Stopping Impersonation Attacks With Cyber AI
Mariana-Pereira-photo-rounded
Mariana Pereira
Director of Email Security
Darktrace
Darktrace_logo
16:15 Closing Remarks By Summit Chairperson