Follow on Twitter
Conference Registration

GOLD SPONSORS

CISCO

Forcepoint

Juniper

LogRhythm

RSA

SlicedTech

Program

Please note this program is subject to changes and updates.

To see the biography of a presenter, click on their name. To see the abstract of the presentation, click on the presentation title.

Training Program

Monday 11 April & Tuesday 12 April
National Convention Centre, Canberra

See information about the available training here.

Conference Program

Tuesday 12 April

 

National Convention Centre, Canberra

6.00pm-7.30pm

Welcome Reception


Wednesday 13 April

National Convention Centre, Canberra



Blue
Royal Theatre

Chair: Michael Scotton

Red
Bradman Theatrette

Chair: Chris Brookes

Amber
Menzies Theatrette

Chair: Karl Hanmore

White
Nicholls Theatrette

Chair: Dr Jason Smith

Green
Ballroom

Chair: Alex Tilley

Black (Research)
Sutherland Theatrette

Chair: Dr Mike Davies

0850-0900

Housekeeping
Royal Theatre

0900-0940

Latha Maripuri, News Corp
Royal Theatre

Securing a Digital Enterprise

0940-1020

Stephane Lenco, Airbus
Royal Theatre

Airbus Group: A journey to adapt security to modern day threats

10201040

Morning Tea

1040-1115

Antti Kiuru
FICORA

Growing demands, evolving from a CERT to a National Cyber Security Centre

Wade Alcorn
Alcorn Group

I like Blockchain and I cannot lie!

Ashutosh Kapse
IOOF Holdings

Increasing visibility to enhance security

Andre Fucs de Miranda
Macquarie Telecom

Joining the dots - using graph analysis to detect and contain Cryptolocker related activity

Scott Mellis
Australian Federal Police

The changing targets of cyber criminals

Dr Jackie Craig
Defence Science & Technology Group

Is cyber security the next big science?

11151120

5 minute change over period

1120-1200

Ilias Chantzos
Symantec

From IoT to Smart Cities - security challenges continued

Scott Ceely
Seer Security

Cyber Cluedo

Karl Denton
Geoscience Australia

Get out of my logs, get into my report

Nick Race
Arbor Networks

The Hunted become the Hunters - Turning Security Operations on its head

Dr Tobias Feakin
The Australian Strategic Policy Institute

Delivering Australia's Cyber Security Strategy: a view from the independent advisory panel

Dr June Andronick
Data61

We *prove* the trustworthiness of our systems

1200-1320

Lunch

1320-1355

Mike Brown
RSA

Cyber 2020 - Changing the way we look at cyber security from lessons learnt

Marty Edwards
US Department of Homeland Security

Industrial Control Systems - Current Threat Landscape

Pieter Danhieux
Secure Code Warrior

Secure at the (Software) Source

Catherine Pearce
Cisco

Transport Futures: Moving Targets and Multi-dimensional Fragmentation - Multipathed, Multiplexed and Multilateral Network Security

Wayne Ronaldson
Risk Offensive

The Blindspot: Why your adversary is a gold frequent flyer

Gary Blair
Edith Cowan University

Creating and leveraging the cyber security ideas boom

13551400

5 minute changeover period

1400-1440

Shanna Daly
FireEye

Where are all the women you ask?

Tom Millar
US Department of Homeland Security

Peter Freiberg
Shelde

Application Security in a DevOps World


 

Peter Hannay
Edith Cowan University

Satellite Navigation Forensics

Charlotte Wood
Australian Crime Commission

The current cybercrime threat picture for Australia

Dr Andrew Martin
Oxford University

Trustworthy Remote Entities: Cheap,Efficient, Secure Multiparty Computation

1440-1510

Afternoon Tea

1510-1545

Josh Goldfarb
FireEye

Security Operations: Moving to a Narrative-Driven Model

Maarten van Horenbeeck
Fastly

Incident Response: engineering a more resilient internet

Matthieu Kaczamarek
Verizon

Regin Networking: Leverage Malware Network Structure to Improve Defence

Britta Offergeld
Independent Electronic Security Researcher

Alarming your Neighbours

Chad Hunt & Mark Ray
Federal Bureau of Investigation

Mysterious 'Phase 2' - The Attacker's View

Rolf Rolles
Mobius Strip Reverse Engineering

Program synthesis in reverse engineering

1545-1550

5 minute change over period

1550-1625

David Lewis
Australian Signals Directorate

ASD's experience enabling, managing and conducting cyber incident response

Lynwen Connick
Department of Prime Minister & Cabinet

Australia in the global economy: How cyber security underpins prosperity

Andrzej Dereszowski
Independent Consultant

Hunting at Stage 3

Kayne Naughton
Cosive

The Dusty Web - an Exploration of Australian Website Security

Adam Boileau
Insomnia

Getting value from security testing

Dr Cristina Cifuentes
Oracle Labs

Oracle Parfait: The Flavour of Real-World Vulnerability Detection

1625-1630

5 minute change over period

1630-1705

Don Jokhan
IBM

Humans are under rated

Leonard Wills
Defence Export Controls

Cyber Security meets Export Controls


Scott Brown
CERT Australia

What has your National CERT been up to?

Chris Pogue
Nuix

Retaking surrendered ground: getting serious about cybercrime

Roelof Temmingh
Paterva

Comparing attack surfaces of various organisations using OSINT

Research Panel: Vulnerabilities

Dr Cristina Cifuentes
Oracle Labs Australia

Dr June Andronick
Data61

Dr Andrew Martin
Oxford University

Rolf Rolles
Mobius Systems Reverse Engineering




1705-1710

5 minute change over period

1710-1720

Close
Royal Theatre

1830-2300

Conference Dinner
Australian Institute of Sport

 

Thursday 14 April

National Convention Centre, Canberra



Blue
Royal Theatre

Chair: Michael Scotton

Red
Bradman Theatrette

Chair: Jennifer Stockwell

Amber
Menzies Theatrette

Chair: Charlotte Wood

Green
Ballroom

Chair: Scott Brown

Black (Research)
Sutherland Theatrette

Chair: Dr Mike Davies

0850-0900

Housekeeping
Royal Theatre

0900-0935

Australian Cyber Security Centre Leadership Panel
Royal Theatre

0935-0940

5 minute change over period

0940-1020

Craig Davies
Atlassian

Security in an Innovation Culture

Craig Searle
Hivint

Data Combat - warfare in the age of big data

Clive Reeves
Telstra

Eyes on Glass - Lessons Learned in Implementing Battle-Ready SIEM Systems

Shanna Daly & Jason Solomon
FireEye/
Mandiant

How to stop worrying and love the hack

Professor Sri Parameswaran
University of New South Wales

10201040

Morning Tea

1040-1115

Patricia McMillan
Storytelling for Business

Communicating cyber security to executives and managers

Chathura Abeydeera
Deloitte

Giving the Keys to the Kingdom via Citrix

Wayne Tufek
Cyber RISK

Surving a data breach - communicating in a crisis to protect your reputation

Richard Perlotto
Shadow Server

Internet of Malware (Inside the Criminal Malware Machine)

Dr Brian LaMacchia
Microsoft Research

Post-Quantum Crytopgraphy

11151120

5 minute change over period

1120-1200

Aaron Hackworth
Dell SecureWorks

Visibility into the Threat Landscape

David Cottingham
Security Consultant

Top 35 Opsec Toolkit

Jack Klecha
Cisco

What risks are hiding inside your network?

Brian Candlish& Christian Teutenberg
Telstra

Active Incident Response

Dr Douglas Maughan
US Department of Homeland Security

1200 - 1320

Lunch

1320 - 1355

Tim Willis
Google

Beyond the Top 35: Browser exploitation in hardened networks

 

Trent Heisler
Log Rhythm

Tactical Diversion-Driven Defense

Andre McGregor
Tanium

The Shadowy Cyber Attack - State Sponsors of Terror and Cyber Terrorists

Adam Cartwright
ANZ

The role of intelligence in commercial security operations

Dr Marcus Butavicius
Defence Science &Technology Group

The Human Aspects of Cyber Security (HACS) collaboration

1355-1400

5 minute change over period

1400 - 1440

Brad Minnis
Juniper

Where are your products manufactured?

Chun Fai Chui
Arbor Networks

Tracking down the Advanced Threats - detect an internal attack in real-time

Kylie Peak

Hacking Fibre Channel (FC) Networks

Murray Goldschmidt
Sense of Security

DevOps - a How To for Agility with Security

Professor Chris Leckie
University of Melbourne

New challenges from Distributed Denial of Service (DDoS) attacks

1440 - 1510

Afternoon Tea

1510 - 1545

Associate Professor Richard Buckland
University of New South Wales

James Turner
AISA

Are CISOs an endangered species? If so, we're in serious trouble

John Hilderbrandt
AWS

Introduction to AWS Security by Design - a solution to automate security, compliance and auditing in AWS

Chris Eagle
Sk3wl of r00t

Emulators for the Masses

Research Panel: How do we foster innovation in cyber security?

Dr Jackie Craig
Defence Science & Technology Group

Adrian Turner
Data61

Sandra Ragg
Department of Prime Minister & Cabinet

1545-1550

5 minute change over period

1550 - 1630

John Stewart, Cisco
Royal Theatre

The Role of Cybersecurity Hygiene in a Digital Journey

1630 - 1635

Close
Royal Theatre