Pre-Summit Masterclasses Day 1: Monday, 7 June 2021

Seminar A: Incident Handling, Incident Response, Hacker Tools, Techniques, Exploits
Starting at 10:30am (with break in between)
D Understanding hackers’ tactics and strategies, finding vulnerabilities and discovering intrustions and equipping with a comprehensive incident handling plan. Know the latest cutting-edge insidious attack vectors. Provide a step-by-step process for responding to computer incidents and inside view of how attackers undermine systems, so that one can prepare for, detect and respond to them.
Michael Connory

Ethical Hacker & CEO
Security In Depth
Security In Depth_logo
Seminar B: Leveraging Machine Learning, Automation In Next And AI In Next Generation Cybersecurity
11:30am – 12:00pm
Seminar B
  • Building Robustness in AI Technology
  • Cybersecurity challenges that AI will pose in the future
  • How Hackers use AI to identify vulnerabilities
  • Deterring Hacking Through AI and Machine Learning
  • Combining Machine Learning with Network Traffic Analysis: How AI will help to identify which traffic will be potentially malicious
Dr Michael Brand

Former Chief Data Scientist, Telstra
Founder, Otzma Analytics
Otzma Analytics_logo_500px
                                                                    Seminar C: Incident Response, Threat Hunting And Digital Forensics                                                                                                                                                                                         1:00pm – 2:30pm
Seminar C

Helping responders and threat hunting teams with advanced skills to hunt down, identify, counter and recover from a wide range of threats within enterprise networks including nation-state adversaries, organised crime syndicates and hactivism. Threat hunting is limited by a few factors: good quality data, pervasive visibility across your control points, advanced AI and Machine Learning, and superior detection/correlation. Legacy tools just don’t work. What are the right tools that will work, how the data needs to be improved, finding the threats, and how to build automation to respond and react to your events

  • Update with hands-on incident response and threat hunting tactics and techniques that elite responders and hunters are successfully using to detect, counter and respond to real-world breach cases
  • Devising Penetration Testing and Vulnerability Assessment
Skeeve Stevens

Future Warfare Threat Analyst
Future Sumo
Future Sumo_logo

Main Summit Day 2 – Tuesday, 8 June 2021

09:55 Opening Remarks
10:00 Cybersecurity Strategy And Its Implementation
Australian-Federal-Department-of-Home-Affairs logoGreg Miller
First Assistant Secretary
Cyber Security Policy
Australian Federal Department of Home Affairs
Australian Federal Department of Home Affairs
10:30 Managing Major Cyber Incidents
David Cullen
Principal Advisor
Cyber Incidents and Emergency Management,
Department of Premier and Cabinet, Victoria
Department of Premier and Cabinet, Victorian Government_logo
10:50 Changing Cyber Landscapes – The Battle Of Algorithms
Claire Teo
Account Manager
11:10 Morning Break  
11:20 It Started With An Email – How The ATP10 Hackers Gained Access To Global MSPs
Michael Connory

Security In Depth
Security In Depth_logo
11:40 Risk-Based Alerting For Anti-Cyber Hacking
Nathaniel Gaffud
Malware Reverse Engineer & Cyber Security Analyst, Cyber Defence
nbn Security Group – Legal and Security Department


12:05 Lunch Break
12:50 Panel Discussion: Managing Cyber Security Breaches
Bob Sharon
Founder & Chief Innovation Officer
Blue IoT
Blue IoT_logo
Matt Hannah
Chief Information Officer
Silk Contract Logistics
Silk Contract Logistics_logo
Nick McKenzie
General Manager, Cybersecurity & Chief Information Security Officer
National Australia Bank
National Australia Bank_logo
Other Invited Speakers of Day 2
13:50 Reaping The Real World Benefits Of The Common Defence Approaches Including Reality Checks On The Many Types Of Cybersecurity Offerings
Martin Brown
Information Security Advisor
14:20 The Securing Of Buildings And Smart Cities
Bob Sharon
Founder & Chief Innovation Officer
Blue IoT

Blue IoT_logo
14:40 Cybersecurity Continuous Improvement And Regulatory Compliance
Joseph Dalessandro
Head of Security & Technology Audit
Australian Unity
 Joseph Dalessandrot_Australian Unity Logo
15:00 End Of Day 2

Main Summit Day 3 – Wednesday, 9 June 2021

09:55 Opening Remarks
10:00 Pre-Empting Cyber Attacks In The Mining Sector
Dovid Clarke
Chief Information Security Officer
MMG Limited (Minerals and Metals Group)
10:20 Handling Cyber Attacks On The IoT Ecosystem And In The Telecoms Sector
Udaya Wijesinghe

Senior Cyber Security Architect
10:40 Cyber Security Governance And Related Government Policy And Regulation Implications
Dr. Stanley Shanapinda
Research Fellow
Optus La Trobe Cyber Security Research Hub, La Trobe University
La Trobe University_logo
11:00 Morning Break  
11:00 Identity-Centric Zero Trust
Discover how to establish zero trust security with Okta and learn the fundamental zero trust properties.
Sami Laine
Principal Solutions Specialist
11:30 Exponential Increases In Cyber-Attacks Present Constant Risk To Companies’ Data, IP And Critical Infrastructures
Learn how Belkin’s wide range of NIAP Protection Profile 3.0 certified technology is securing the desktops and networks of the world’s largest government organisations through Air-Gap isolation, while improving operator efficiency and effectiveness.
John Minasyan
Global Director of Product Management, Cyber Security
11:50 Ethics And Cybersecurity, Defending The Right Things In The Right Way
Prof. Greg Adamson

Enterprise Fellow in CyberSecurity
University of Melbourne
University of Melbourne & Blockchain_logo_500px
12:10 Lunch Break
13:10 How Universities And Educational Institutions In Australia Pre-Empt Foreign Cyber-Attacks
Steven Cvetkovic
Former Chief Information Security Officer
Swinburne University of Technology

Swinburne University of Technology_logo
15:30 New Challenges In Devsecops And Container Security. Implementing Good Software Practices In The Enterprise
Suzanne Dyke

Security As A Service Optimization Lead
13:50 Future Risk Management In Cybersecurity
Professor Asha Rao

Associate Dean
RMIT University
RMIT University_logo_500px
14:10 Panel Discussion: Meeting New Cybersecurity Challenges In 2021
Invited Speakers Of Day 3
15:10 End Of Day 3