Director, CryptoPhoto.com Pty Ltd
Expertise: CEH.v10 skills, Govt. PenTest Author, Cipher and bigmath implementations, 40 years industry+business experience (build+market+sell+etc), B.App.Sc-Comp (QUT)
Biography: 40-year-experienced Coder, White-Hat hacker, speaker, and winner of more than a dozen international awards for innovation and excellence in cyber. Author of words most heavily-cited security patent, founder multiple successful (and some failed) cyber businesses, and frequent contributor to government and defense cyber policy and inquiries.
Director, FlatMap IT Pty Ltd
Expertise: Consultant Software Engineer with experience in secure remote access technologies, implementing health informatics and warehousing solutions with HIPAA and 21CFR11 compliance. Development of security and integrity safeguard standards with Boston Children’s Hospital, US Food and Drug Administration, and hl7.org.
Biography: Christopher Gentle is a consultant, analyst, software developer, technical leader and director of Flatmap IT Pty Ltd.
Chris has 34 years of experience as a technical manager, software and systems engineer developing integration solutions, system management, telecommunications, data networking, banking, and defence simulation products. Past employers and clients include Commonwealth Bank, GEC Marconi, Lucent, Avaya, VitalCare, Boston Children's Hospital and I-MED Radiology Network.
As lead consultant at FlatMap IT, Chris works with a variety of clients in the fields of GIS and carbon farming, clinical research technology, health informatics, health standards, and large-scale healthcare imaging and practice management integration.
Lecturer, University of NSW, Canberra
Biography: Francesco (Frank) Schiliro’ is a lecture at the University of New South Wales / ADFA. Frank holds a Master of Research in Computing from Macquarie University and is a PhD candidate examining ‘Securely Cognitive Augmentation in Policing Processes’ at Macquarie University in Australia. He is the AI-enabled Policing – Stream Leader in the Macquarie University, AI-enabled Processes Research Centre, and a Senior Certified Professional with the Australian Computer Society (MACS Snr CP IP3P).
Frank is a retired Superintendent from the Australian Federal Police (AFP). Frank initially began a career in Policing with the New South Wales Police Force in February 1988, having roughly spent 15 years, during which he pursued a role in criminal investigations and achieved his Detective designation. In 2003 he joined the Australian Federal Police where he moved up the ranks to become a Superintendent. Then retiring in February 2022, ending a 34 year career in policing.
Frank is highly committed, and results focused with interests in improving the police officer’s effectiveness and efficiency in crime response, detection, and prevention using Information and Communication Technology (ICT) and digital leadership. Through his academic studies, Frank applies himself to research that supports, improves, and validates police practices for the advancement of the professional status of the occupation of policing and that increases public confidence in police practices.
Research Assistant Professor, Clemson University
Expertise: Expertise of Applied Cybersecurity, censorship circumvention, blockchain, digital forensics, privacy-preserving data mining.
Biography: Dr. Yu’s research interests mainly focus on cybersecurity. She is currently engaged in research in privacy-preserving data mining, blockchain technology, and anonymity network. Her previous research includes botnet detection (e.g., domain name generation (DGA)), distributed denial-of-service (DDoS) attacks detection and mitigation, and Markov decision processes (MDP), etc.
Blockchain is a distributed digital ledger storing provenance metadata. A reliable, efficient and secure consensus algorithm is critical to the blockchain technology. The lightweight mining (LWM) consensus algorithm guarantees a c as long as there is one good miner. Unlike most existing mining algorithms (e.g., Proof-of-Work (PoW), Proof-of-Stake (PoS)) that are devised for cryptocurrency applications, LWM is completely free of monetary qualities. This allows consensus to be achieved with minimal computational overhead. The application of the LWM algorithm includes clinical trials, transparency and accountability of agriculture supply chain, and digital forensics, etc.
Privacy-preserving data mining techniques are critical to protect user privacy in the era of big data. Privacy-preserving data techniques look at techniques that useful statistics from user data without disclosing any private user information. Dr. Yu’s research focuses on privacy-preserving data collection approaches. True user privacy is only possible when no personally identifiable information (PII) is ever collected. In particular, her previous work includes privacy-preserving probabilistic counting, and negative surveys.
Managing Director, Enex Pty Ltd (T/AS Enex TestLab)
Expertise: Industry veteran 30+ years cybersecurity experience. Independent Testing, Advisory & Subject Matter Expertise. CISSP, CISA, CISM certified in good standing.
Biography: Matt Tett is the Managing Director of Enex TestLab. He is well known globally across industry and government as a very well connected, highly technical straight shooter. Effectively applying science to translating complex technology for the lay person, ensuring customers receive what they are paying for. Enex TestLab’ objective is to use science to keep tech vendors honest by rigorously testing their product claims and ensuring consumer requirements are met factually.
Enex TestLab is an independent ISO17025 accredited testing laboratory with a 33+ year history, university heritage (RMIT), and ISO 9001 QMS Quality, ISO 27001 ISMS Security and ISO 45001 OH&S certifications.
Matt is a board director of Communications Alliance. He is also a board director, and Co-Chair, of the Australian Women in Security Network (AWSN) He is also the current chair of IoT Alliance Australia (IoTAA) enabler Work Stream 3 (eWS-3) – Cyber Security and Network Resilience and sits on the IoTAA Executive Council.
Matt is an Advisor and Subject Matter Expert (SME) for IoT Security Mark P/L who operate the global IoT Security Trust Mark™ (STM) Certification and voluntary cyber security labelling scheme. He is the founder of the national Day of The Month (DOTM) clubs, which currently has over 3800+ members across the information security industry.
Matt has a deep technical background in network and security systems and he holds the following security certifications in good standing for 17+ years: CISSP, CISM, CSEPS and CISA. He is a certified Government security advisor and retains State and Federal Government security clearances. He is also a judge for a number of industries, including the Commsday “Edison” Awards, IT Journo “Lizzies” Awards, InnovationAus Awards for Excellence, IoT Impact Awards and the Australian Women in Security Networking Awards.
Cybersecurity Consultant, IT Contractor
Expertise: Cybersecurity consulting in Cyber GRC and System Security Architecture.
Biography: Dr Rani Yesudas is a Cybersecurity SME working as a consultant for federal government agencies. She has 16 years of experience in systems engineering and project management. She received PhD in Computer Science from ANU. She has worked on various federal government cybersecurity projects (for the DoD, DPS, AHDA, Services Australia, etc.). In 2019 she worked at UNSW Canberra as an academic researcher in cybersecurity. She has published various papers on requirements and risk analysis of complex systems.
Biography: Dr Robert Layton is a data scientist with extensive research experience in academia and industry. He was awarded the inaugural Young Alumni of the Year for Federation University Australia in 2014 and has an h-index of 21 and an i10-index of 29. Dr Layton’s PhD research was on investigating authorship attributes of cyber attacks, in order to determine their provenance. This research was done at the Internet Commerce Security Laboratory (ICSL) at Federation University Australia (then University of Ballarat), in partnership with Westpac. During this time, Dr Layton undertook consultancy work, software development and industry-led research tasks for ICSL’s clients.
Since then he has been a consultant to companies in all sectors in Australia from banking, government, mining, data analytics and software development. Dr Layton has also taught software development to more than 1,000 participants through commercial training providers. Dr Layton’s primary focus is on providing data security and science to small and medium businesses, including startups as a founder of Eurekative and as founder/director of Data Pipeline. Dr Layton is the Vice-President of the Ballarat Hackerspace, a not-for-profit community group aiming to increase technology skills in the Ballarat region. In addition, Dr Layton sits on the Central Highlands Innovation and Entrepreneurship Group and the IT Discipline industry advisory group for IISS at Federation University Australia.
Associate Professor, Wireless Networks and IoT
Expertise: Expertise of Applied Cybersecurity, censorship circumvention, blockchain, digital forensics, privacy-preserving data mining.
Biography: Takuya Yoshihiro received his B.E., M.I. and Ph.D. degrees from Kyoto University in 1998, 2000 and 2003, respectively. He was an assistant professor at Wakayama University from 2003 to 2009. He has been an associate professor in Wakayama University from 2009. His current interest includes graph theory, distributed algorithms, computer networks, wireless networks, Internet of things, network security, intelligent transportation systems, data economics, medical applications, etc. He is a member of IEEE, ACM, IEICE, and IPSJ.
Principal Electrical Engineer, Asset Integrity
Expertise: Digital Substation Automation – 15 years’ experience. Cybersecurity issues in hacking a digital infrastructure network.
Biography: Shantanu Kumar has 35 years of post qualification experience in Substation and High/Low Voltage industrial equipment. He is a Fellow and Chartered Engineer of Engineers Australia. He is a committee member of Electrical Energy Society of Australia – WA chapter. He has been in the committee of number reputed conferences such as AUPEC-2021, APPEEC-2022 and ISPEC-2022. Previously he has a Bachelor of Electrical Engineering from India, MBA from India and MScEng from the University of Western Australia. At present he is engaged as a PhD student of Curtin university working on IEC 61850 protocol as applicable to substation and HV infrastructure.
Expertise: Have worked on numerous projects where security and privacy issues had to be considered at all times.
Biography: Software developer / architect / manager / producer with over thirty years of industry experience ranging from children’s games to pharmaceutical detailing tools to scientific questionnaire software to social media platforms.
Principal Information Security Consultant, Westpac
Expertise: Strategic consultation.
Biography: Stephanie is a scientist turned banker who completed her PhD investigating the role different molecules play in olfactory axonal guidance. She is now with the Westpac Cybersecurity Strategy team where her research background is helping frame the threat environment and how best to defend against this. At Westpac she has been responsible for running the Mortgages Product business as well as the Branch design and investment program through a period of disintermediation. She is a passionate advocate for women in Cybersecurity and building the next generation of tech female leaders.
Senior Cyber Security Consultant, Deloitte NZ
Expertise: Cyber risk management, incident response and crisis management
Biography: Dr Mengmeng Ge is working as a Senior Cyber Security Consultant at Deloitte New Zealand. She completed her PhD degree at the University of Canterbury in New Zealand in 2018. She then worked for Telstra New Zealand as the Analytics Engineer for a year. Since 2019, she joined Deakin University in Australia and worked as a Lecturer in Cyber and Networking for 2 years. She then joined RMIT University in 2021 and worked as a Lecturer in Cyber Security for over a year. Her research mainly focuses on model-based cybersecurity analysis, security modelling for the Internet of Things, and emerging proactive defences (e.g., moving target defence, cyber deception). She has over 25 publications in refereed conference proceedings and journals. She also has considerable industrial experience in system design, cyber risk management, security assessment, incident and crisis management, and security analytics.
Senior researcher, National Institute of Information and Communications Technology
Expertise: Network security, malware analysis, IoT security, machine learning and data mining for cybersecurity
Biography: Dr. Tao Ban received his B.E. degree from Xi’an Jiaotong University in 1999, M.E. degree from Tsinghua University in 2003, and Ph.D. degree from Kobe University in 2006, respectively. He is currently a senior researcher with Cybersecurity Research Institute, National Institute of Information and Communications Technology, Tokyo, Japan. He is the receiver of the following awards. IEEE TrustCom 2020 best paper award, IEICE CSS 2020 concept research award, APNNS 2020 excellent service award award, IEEE TrusCom 2019 leadership award, AsiaJCIS 2013/2018 Best paper award, IEICE CSS 2013 best paper award, IEEE DMAI2008 best paper award, ICONIP 2007 best paper award, 2004 IEEE Kansai section best student paper award. He is a member of IEEE and an active member of program committee of international conferences such as IJCNN, ICONIP, ISNN, FUZZ-IEEE, CEC. He has published more than 100 Journal and Conference publications and book chapters in the field of Cybersecurity, Machine Learning, Data Mining, etc. His research interest includes pattern classification, neural processing, machine learning and data mining for network security, malware analysis, and cyber threat hunting etc.
Freelance Cybersecurity Analyst
Expertise: Malware, Phishing & Incident Response
Biography: Veteran of the security industry having worked in the Australian banking industry & large & Small US tech startups for 15 years. The roles I've taken included anything from hands-on malware analysis and developing the tooling for SOC teams to use in responding to threats, to building and managing some well recognized SOC teams & security functions.
Organisational Change Management Consultant
Biography: Nicolas has an honours degree from Bristol Business School, University West of England, and wide-ranging experience in Europe and the U.S.A. with Citibank, Time Warner, Liverpool Victoria, and H.M. Customs & Excise.
His Australian public sector experience includes the Department of Fair Trading, NSW Police Force and as a board member for the NSW Community of Change Professionals.
Nicolas’ main field of expertise is in organisational change management within law enforcement, focusing on recording and investigative technologies, commercial fraud, and cybercrime. His strengths lie in placing a high priority on due diligence, intergovernmental cooperation, and communication.
Facilitator, speaker and event organiser across Europe and Australia, Nicolas has presented a series of change management and contract management (security) industry sessions over the past decade and has introduced organisational change management practices to the Catalan Police Force / Mossos d'Esquadra.