Pre-Summit Workshops Day 1: Wednesday, 7 June 2023

Workshop A: Incident Handling, Incident Response, Hacker Tools, Techniques, Exploits
11:00am – 11:30am
D Understanding hackers’ tactics and strategies, finding vulnerabilities and discovering intrustions and equipping with a comprehensive incident handling plan. Know the latest cutting-edge insidious attack vectors. Provide a step-by-step process for responding to computer incidents and inside view of how attackers undermine systems, so that one can prepare for, detect and respond to them.
Michael Connory

Ethical Hacker & CEO
Security In Depth
Security In Depth_logo
Workshop B: Leveraging Machine Learning And AI In Next Generation Cybersecurity
11:30am – 12:00pm
Seminar B Over the past 10 years, the amount of cybercrime has grown exponentially, easily eclipsing the ability of human gate-keepers to keep it at bay. At the same time, cybercrime has become far more diverse in its methods, far more devious in its goals, and far better funded. In this talk we will cover:

  • How machine learning (ML) has risen to this challenge and is perfectly suited to counter the various facets of the problem
  • The new problems encountered when defence relies on effective ML
  • Adversarial machine learning (AML) as the attackers’ new counter-offensive, and
  • The means to effectively counter AML attacks
Dr Michael Brand

Otzma Analytics
Otzma Analytics_logo_500px
                                                                 Workshop C: Cyber Crisis Communications 101 – Perspective Of Security Industry Media
                                                                                                               1:00pm – 1:45pm
incident-response The application of contemporary crisis management principles and practices requires an updated playbook for cybersecurity, incident response, aligning to cyber related legislation, including new legislation for critical infrastructure, mandatory data breach reporting and regulatory frameworks across Europe, Asia and United States. This session examines a number of recent case studies and insight into the formation and roles of the crisis committee, communication planning, cyber breach notifications and communicating with authorities, stakeholders and the public.
Chris Cubbage
Chris Cubbage CPP, CISA, GAICD

Director & Executive Editor
MySecurity Media Pty Ltd
                                                                                 Workshop D: New Cyber Threats In The Real World                                                                                                                                                                                                            1:45pm – 3:15pm
Seminar C

In the world of Cyber Security, the focus has been on Firewalls, Identify and Data Theft, Denial of Service, Phishing attacks, Malware, Ransomware, and the alike. But there is a far more complicated and real threat looming. One with a very low barrier of entry and which will have catastrophic real-world impacts. It is also an area that very few people and organisations have expertise in.

IoT is the new Cyber Threat landscape. It is simple yet complicated and involves factors that your average Cyber Security expert has little practical knowledge of. This is further complicated by intersecting it with new cutting-edge technologies such as GPT-3, YOLO, and GAN.

Skeeve Stevens

Future Warfare Threat Analyst
Future Sumo
Future Sumo_logo

Main Summit Day 2 – Thursday, 8 June 2023

10:00 Welcoming Speech, Opening Remarks & Thank You Sponsor Speech By Summit Producer
10:10 Welcome Address By Summit Chairperson
Brenda van Rensburg
GRC Specialist within Privacy & Information Security
10:15 Meeting New Cybersecurity Challenges In Australia
Hamish Hansford
Head, Cyber Security Policy
Australian Federal Department of Home Affairs
Australian Federal Department of Home Affairs
10:50 Securing The Future Of Work With Cyber AI
The future of work remains unpredictable. More than ever before, business leaders need to remain confident that their operations can continue securely in the face of regional or even global crises, and while sections of the economy remain more uncertain and fragile than ever, cyber-attackers are ramping up their campaigns. Organizations must rethink their approach to security, and rely on new technologies like AI to achieve much-needed adaptability and resilience.In this session, learn about:

  • Emerging threats from the transition to remote work
  • How AI has adapted to new patterns of work
  • Darktrace’s use of Cyber AI to protect the dynamic workforce
  • Defensive Autonomous Response capabilities
Sushant Arora
Regional VP, ANZ
11:25 Breakout Session
Room A: Colonial Pipeline: A Case Study On How To Scare The US Government With Ransomware
Michael Connory

Security In Depth
Security In Depth_logo
Room B: Antigena Network & Cyber AI Analyst
Antigena Network
Antigena Network neutralizes novel attacks and insider threats across the corporate network and Internet of Things. While pre-programmed response tools tend to rely on simplistic pattern matching and static logic, Antigena Network’s decisions are informed by an ever-evolving understanding and awareness of normal and benign behavior. In this way, self-learning AI delivers a categorically different response that understands how, when, and where to neutralize an emerging threat, while allowing the business to operate as usual.
Cyber AI Analyst
Powered by advanced artificial intelligence, Cyber AI Analyst can sift through large volumes of data at speed and scale, augmenting human teams and buying back time to focus on strategic work. Its investigations are enterprise-wide, allowing the technology to piece together disparate anomalies before settling on a high-level conclusion about the nature, root cause, and extent of the wider security incident. This powerful analytical capability has been found to reduce triage time by up to 92%.
Audrey Isaac
Account Executive
12:30 Lunch Break
13:30 Welcome Address By Summit Chairperson
Udaya Wijesinghe
Senior Cyber Security Architect
13:32 The Securing Of Buildings And Smart Cities
Bob Sharon
Founder & Chief Innovation Officer
Blue IoT
Blue IoT_logo
14:05 Instilling The Hacker Mindset To Upskill Your Risk Team
Sumeet Kukar
Arascina logo
14:40 CCTV And Cyber Security
Johnny Lee
Smart City & Critical Infrastructure – Business Development Manager
Axis Communications
Oshana Jouna
Sales Engineering & Training Manager
Axis Communications
15:15 Don’t Pay The Ransom. Rapidly Recover From Ransomware With Rubrik
  • The current security landscape – why & how big organisations are still being hit and what they could have in place to recover imminently without ransom being contemplated
  • What you can do to prepare for and recover from an attack
  • Best practices for constructing and managing a security strategy
Dale Heath
Head of Solutions Engineering
15:45 Extortionware: Your Privacy Problems Made Public
Over the last decade, ransomware has increasingly become the most popular option for hackers to monetise the access they’ve obtained to corporate computer systems around the world. Over the last few years, we’ve observed the ransomware software and techniques adapt and evolve to include the theft and exposure of private information, creating extortionware as a new breed of malicious software. This talk will provide an overview of these techniques and discuss the potential privacy and security impacts you may face as a result.
Lonnie Benavides
Head of Infrastructure and Application Security 
OneLogin logo
16:15 Closing Remarks By Summit Chairperson

Main Summit Day 3 – Friday, 9 June 2023

10:00 Welcoming Speech, Opening Remarks & Thank You Sponsor Speech By Summit Producer
10:10 Welcome Address By Summit Chairperson
Chris Cubbage
Chris Cubbage CPP, CISA, GAICD
Director & Executive Editor
MySecurity Media Pty Ltd
10:15 Exponential Increases In Cyber-Attacks Present Constant Risk To Companies’ Data, IP And Critical Infrastructures
Learn how Belkin’s wide range of NIAP Protection Profile 3.0 certified technology is securing the desktops and networks of the world’s largest government organisations through Air-Gap isolation, while improving operator efficiency and effectiveness.
John Minasyan
Global Director of Product Management, Cyber Security
10:50 Identity-Centric Zero Trust
Discover how to establish zero trust security with Okta and learn the fundamental zero trust properties.
Sami Laine
Principal Solutions Specialist
Okta new logo
11:25 Breakout Session
Room A: Antigena Email & Antigena SaaS
Antigena Email
Antigena Email is the world’s first self-learning email security technology. Powered by AI, it represents a fundamentally new approach to email security in moving away from static rules and playbooks that seek to answer the question of ‘Is this email bad?’. Rather than looking at the data of an email alone and running it through pre-existing deny lists, Antigena Email looks at emails in their full context and instead asks: ‘Does this email belong?’.
Antigena SaaS
Antigena SaaS neutralizes unpredictable attacks in cloud and collaboration tools. From Microsoft Teams to SharePoint, Antigena SaaS responds with surgical precision when trusted cloud accounts are being used carelessly or for malicious purposes. Unlike policy-based defenses, the technology takes action in light of a multidimensional understanding of digital behavior across hybrid and multi-cloud environments. This enables swift and targeted action that stops SaaS attacks while allowing normal business operations to continue unimpeded. Security operators investigating unusual SaaS activity can also trigger Darktrace Antigena actions directly as desired.
Sarah Jarman
Team Lead, Australia
Room B: Making Identity The Foundation For Your Zero Trust Strategy
Leigh Doddy
Senior Principal Solutions Engineer
Okta new logo
12:30 Lunch Break
13:30 Ethics And Cybersecurity, Defending The Right Things In The Right Way
Prof. Greg Adamson

Enterprise Fellow in CyberSecurity
University of Melbourne
University of Melbourne & Blockchain_logo_500px
14:05 How Universities And Educational Institutions In Australia Pre-Empt Foreign Cyber-Attacks
Steven Cvetkovic
Former Chief Information Security Officer
Swinburne University of Technology

Swinburne University of Technology_logo
14:40 Handling Cyber Attacks On The IoT Ecosystem And In The Telecoms Sector
Udaya Wijesinghe
Senior Cyber Security Architect
15:15 New Challenges In Cloud, Container & DevOps Security, Implementing Good Software Practices In The Enterprise
Roxanne Pashaei

Cloud Security, Manager
15:50 Faking It: Stopping Impersonation Attacks With Cyber AI
Mariana Pereira
Director of Email Security
16:15 Closing Remarks By Summit Chairperson