Speakers

We are excited to have confirmed the following international and national speakers. More amazing speakers will be added to the list as they are confirmed.

Australian Speakers          International Speakers
Kate Carruthers
Chief Data Officer, University of New South Wales
Laura Bell
Director, SafeStack Limited
Madeleine Dove
Student, University of Canberra
Sarah Brown
Independent Researcher, Security Links
Senior Scientist, North Atlantic Treaty Organisation
Debbie Fuzy
Lead Research Analyst, Australia Post
M Carlton
Vice President of Research, Senrio
Miah Hammond-Errey
PhD Candidate, Deakin University
Dr Linda Finch
Defence Science & Technology Laboratory
Kate McInnes
Security Assessments Manager, Telstra
Dr Deborah Frincke
Research Directorate, National Security Agency/Central Security Service
Patricia McMillan
Director, Patricia McMillan & Associates
Erin Kenneally
Program Manager, Data Trust and Innovation, Department of Homeland Security
Alana Maurushat
Senior Research Fellow Australian Centre for Cyber Security, University of New South Wales
Catherine Pearce
Senior Security Consultant, Cisco
Lynn Moore
Assistant Secretary Border Intelligence Fusion Centre, Department of Immigration & Border Protection
Zoë Rose
Cyber security analyst, Schillings
Melissa Osborne
Director Cyber Security Partnerships & ASD Certification Authority, Australian Signals Directorate
Harsha Banavara
Senior Cybersecurity Analyst, Schneider Electric USA
Kylie Peak
Independent Consultant
Dr Andrew Blaich
Manager of Vulnerability Research, Lookout
Dr Vanessa Teague
Senior Lecturer, University of Melbourne
Vern Boyle
Vice President, Northrop Grumman
Charlotte Wood
Australian Criminal Intelligence Commission
Phil Burdette
Senior Security Researcher, SecureWorks
Chathura Abeydeera
Penetration Testing Lead, Deloitte
Christopher Butera
Division Director for Hunt & Incident Response, US-CERT
Wade Alcorn
Founder, Alcorn Group
Earl Carter
Talos Senior Threat Researcher, Cisco Talos
Andrew Bailey
Secure Code Engineer, Telstra
Mark Chaffe
Information Security Engineer, The Shadowserver Foundation
Paul Black
PhD Candidate, Internet Commerce Security Lab (ICSL), Federation University
Eric Cornelius
SANS Certified Instructor and Director of ICS at Cylance
Doug Brown
Information Security Analyst, Red Hat
Alfonso De Gregorio
Founder and CEO, Zeronomicon
Paul Byrne
National Director Cyber, Deloitte
Adrahmane Diarra
German Federal Criminal Police
David Campbell
Director, CERT Australia
Chris Eagle
Dean of Hacking, Sk3wl 0f R00t
Dr David Chatterton
CIO, Aconex
Casey Ellis
CEO and Founder, Bugcrowd
Chris Chow
PhD Student, Australian National University
Jeff Farago
Director Cyber Security, Schneider Electric
David Cottingham
Co-Founder, Airlock Digital
Christian Frichot
Security specialist, Salesforce.com
Dr Gideon Creech
Lecturer, University of New South Wales
Patrice Godefroid
Principal Researcher, Microsoft Research
Craig Davies
CEO, Australian Cyber Security Growth Network
Joshua Goldfarb
VP, CTO-Emerging Technologies, FireEye
Ashley Deuble
Manager Cyber Security, Griffith University
Aaron Hackworth
Senior Distinguished Engineer, SecureWorks
Dr Tobias Feakin
Ambassador for Cyber Affairs, Department of Foreign Affairs
Chris Hallenbeck
Director of Endpoint Detection & Response, Tanium
Andre Fucs De Miranda
SOC Manager, Macquarie Government
Frode Hommedal
Subject Matter Lead, Telenor
Ajoy Ghosh
Chief Information Security Officer – Insurance & Care NSW, Alcheme
Simon Howard
Director, Principal Consultant, ZX Security
Murray Goldschmidt
Chief Operating Officer, Sense of Security
Joe Jarzombek
Global Manager, Software Supply Chain Solutions, Synposys
Peter Hannay
Lecturer, Edith Cowan University
Professor Angelos Keromytis
Program Manager, Defense Advanced Research Projects Agency
Alexander Hogue
Senior Intelligence Analyst, Atlassian
Oren Koriat
Cyber Intelligence Analyst, Check Point
Adam Janik
Innovation, Awareness and Culture Team, Australia Post
Antti Kurittu
Senior specialist, National Cyber Center of Finland
Trevor Jay
Principle Software Engineer, Red Hat
Dr Arun Lakhotia
Professor, University of Louisiana at Lafayette
David Lacey
Managing Director, IDCARE
Stephane Lenco
Chief Information Security Officer, Airbus Group
Tim Lane
Manager, Client Services & Security, Southern Cross University
Terry MacDonald
Chief Product Officer, Cosive
Clive Lines
Coordinator, Australian Cyber Security Centre
Dhia Mahjoub
Principal Engineer, Cisco Umbrella
Glenn Maiden
Cyber Security Adviser, Cisco
Donald McCarthy
Vice President of Operations, myNetWatchman
Kevin Manderson
Incident Response Manager & Threat Intelligence, BAE Systems
Andre McGregor
Director of Security, Tanium
Commander David McLean
Manager Cybercrime Operations, Australian Federal Police
Paul McKitrick
IceBrg
Chris Mohan
General Manager, Telstra
Dennis Moreau
Senior Engineering Architect, VMware
Paul Nevin
CTO, Cybermerc
Justin Myers
Computer Scientist, Naval Criminal Investigative Service
Jade Newman-Andrews
ACSC Liaison, Australian Federal Police
Kjell Christian Nilsen
Security Analyst, Norwegian HealthCERT
Timothy O’Sullivan
Assistant Director – Technical Assessment, Defence Export Controls
William Peteroy
Co-founder and CEO, Icebrg
Domenico Perre
Sales Engineer, Splunk
Daniel Plohmann
Senior Analyst, Fraunhofer FKIE
Arun Raghu
Security Consultant, Hivint
Stephen A. Ridley
Founder and CTO, Senrio
OJ Reeves
Authorised Intruder, Beyond Binary
Adam Shostack
Wayne Ronaldson
Security Lead, Datacom TSS
Florian Ruechel
Security Analyst, Atlassian
Maarten Van Horenbeeck
Vice President, Security Engineering, Fastly
Rob Sloan
Cybersecurity Research Directory, Dow Jones
Michael Scotton
Assistant Secretary Cyber Security, Australian Signals Directorate
Michael Sentonas
VP Technology, Strategy, Crowdstrike
Michael Shatter
Director, RSM Australia
Dr Matthew Sorell
Senior Lecturer, University of Adelaide
Adrian Turner
CEO, Data61
Shaun Vlassis
Director, Detection Cloud, Salesforce
Brett Williams
Senior Security Consultant, Carbon Black
Ben Wilson
FireEye
Andrew Wurster
Security Intelligence Team Lead, Atlassian
Joseph Yuen
Cyber Security Researcher, Defence Science & Technology Group
 Dr Alex Zelinsky
Chief Defence Scientist, Department of Defence
 Prof Liming Zhu
Research Director of Software & Computational Systems Research, Data61
Speaker Laura Bell
Laura Bell likes building secure things and going really really fast, preferably at the same time.  A speaker at a range of events such as BlackHat USA, BlueHat Velocity and OSCON,on the subjects of privacy, covert communications, agile security, and security mindset, she is an author for O’Reilly (the people with the animal books) and trains people anywhere they stay still long enough.  She founded the most chaotic security company in New Zealand, SafeStack (http://safestack.io) and now tries to bring security to some of the fastest moving application development environments on Earth.  You can find her at home in Auckland, New Zealand with her husband and daughter.
 Speaker Sarah Brown
Sarah Brown is a cyber security expert with interests in threat intelligence, cyber security information sharing, cyber exercises, and technical security standards. She has worked since August 2016 in the NATO Communications and Information Agency’s cyber security line. Prior to joining NATO, she worked on the threat intelligence team at Fox-IT, bringing the latest financial threat information to banks globally. There, she transformed the cutting edge portal, creating structured content and automated feeds adhering to the international STIX standard. Sarah worked for nine years at The MITRE Corporation, which brought her to The Netherlands in 2008. Sarah has spoken at RSA, FIRST, the ACM Workshop on Information Sharing and Collaborative Security (WISCS), and the International Conference on Cyber Conflict (CyCon). Sarah holds B.A. degrees in Mathematics and Computer Science from Oberlin College and an M.A. in Mathematics from University of Maryland, College Park.
Speaker M Carlton
Ms Carlton heads the Senrio research team, focusing on product security and development. She brings strong embedded device research capabilities to the team. After graduating from MIT, she worked as a software security analyst in the DC area. Most recently, she was conducting embedded device security research at Draper Laboratory in Massachusetts before joining the Senrio team.
Speaker Kate Carruthers
Kate is Chief Data Officer for UNSW Australia, and is also an Adjunct Senior Lecturer in the School of Computer Science & Engineering. With extensive experience in senior executive roles for General Electric, AMP, Westfield, and NSW Treasury, she is on the advisory boards for Telstra and the NSW DAC.
Speaker Madeleine Dove
Madeleine Dove has recently completed her B Law (Honours) B Arts at the University of Canberra. Her Honours focus was on legal issues surrounding cybercrime..
Speaker Linda Finch
Linda is currently employed as the Group Leader for the Assurance Group within the Defence Science and Technology Laboratory (Dstl). In addition to ensuring that the Group has appropriate and enduring access to the necessary skills, knowledge and facilities to deliver S&T in accordance with Customer requirements and priorities, Linda also practices her research interests in Information Assurance and Cyber Security. In her spare time Linda enjoys a varied programme of fitness and music.
Speaker Dr Deborah Frincke
Dr. Deborah Frincke leads the Research Directorate (RD) of the National Security Agency/Central Security Service (NSA/CSS) – the largest “in house” research organization in the U.S. Intelligence Community. She is a member of the Agency’s Board of Directors and serves as the NSA Science Advisor and Innovation Champion. Prior to joining NSA/CSS, her career included work in academia and technical leadership roles in both the public and private sector. Dr. Frincke has published numerous articles and technical reports, and frequently speaks nationally and internationally on topics from leadership to cybersecurity to big data.
 Speaker Debbie Fuzy
Debbie is the lead research analyst for Australia Post’s information security office. With her background degree in criminology, she likes to focus on the human element of infosec, especially in the way people think and act. Over the last year she’s worked on a project investigating how Australian consumers understand privacy and security, and is interested in what motivates and de-motivates people to form and maintain good security practices, especially when compared to perceptions of both internationally.
Miah Hammond-Errey
Miah has over a decade of experience in leading tactical, operational, and strategic intelligence across law enforcement, defence and regulatory bodies and has represented the Australian government overseas. Miah completed a Master of National Security Policy at ANU in 2016 and is currently a PhD candidate with scholarship.
Speaker Erin Kenneally
Erin Kenneally is a Program Manager in the Cyber Security Division for the Homeland Security Advanced Research Projects Agency (HSARPA) at the DHS Science & Technology Directorate. Her portfolio comprises trusted data sharing, cyber risk economics, privacy, and Information Communication Technology (ICT) ethics. She leads the IMPACT (Information Marketplace for Policy and Analysis of Cyber-risk and Trust), CyRiE (Cyber Risk Economics)and Data Privacy Programs (co-PM). Prior to joining CSD, Kenneally was Founder and CEO of Elchemy, Inc., and served as Technology-Law Specialist at the International Computer Science Institute (ICSI) and the Center for Internet Data Analysis (CAIDA) and Center for Evidence-based Security Research (CESR) at the University of California, San Diego.
Erin is a licensed Attorney specializing in information technology law, including privacy technology, data protection, trusted information sharing, technology policy, cybercrime, data ethics, and emergent IT legal risks. She holds Juris Doctorate and Masters of Forensic Sciences degrees, and is a graduate of Syracuse University and The George Washington University.
Speaker Alana Maurushat
Dr Alana Maurushat is a Senior Lecturer, Law UNSW; Key Researcher D2DCRC; Senior Research Fellow Australian Centre for Cybersecurity, UNSW Canberra, and Director, IFW – an anti-cybercrime investigation firm.
Speaker Kate McInnes
Kate McInnes is the Security Assessments Manager at Telstra where she is responsible for securing all Telstra source code. Kate has previously worked for Datacom TSS and as an AppSec specialist for Barclays Capital. Kate started her career at the Australian Department of Defence where she held several technical positions.
 Speaker Patricia McMillan
Patricia McMillan is a business storytelling specialist. She helps leaders use the power of stories to build trust and influence and transform their organisations. Her background in maths and 20 years experience in IT make her ideally placed to bring these skills to cyber security professionals. Learn more at patriciamcmillan.com.
 Speaker Lynn Moore
Ms Moore joined the Department of Immigration and Border Protection in April 2016 as the new Assistant Secretary Border Intelligence Fusion Centre (BIFC). Ms Moore started her career as a Signaller in the Australian Army, later moving to the Defence Signals Directorate (now ASD). In 2007 she was appointed Director of Signals Intelligence Development. In 2009 she was appointed as the inaugural Director Cyber Security Operations Centre and was responsible for building and managing the new integrated capability. Ms Moore moved to CIO Group in 2013 to coordinate a review into ICT security for Defence and later acted in the Assistant Secretary ICT Security role. In late 2014 she returned to ASD as the Program Manager for Geospatial Intelligence working closely with the Australian Geospatial Organisation to deliver new capability. In April 2016 she moved to the Department of Immigration and Border protection to establish the Border Protection Fusion Centre.
Speaker Melissa Osborne
Melissa has an extensive Department of Defence career spanning over two decades. Since 2011 she has engaged with the cyber security industry and government on behalf of the Australian Signals Directorate (ASD) and the Australian Cyber Security Centre (ACSC), with a passion for assisting government and industry to secure government information. Currently the Director of Cyber Security Industry Partnerships, Melissa leads IRAP, AISEP and other industry partnership programs. Melissa is also the ASD Certification Authority for multi-government systems, including gateways and cloud services, partnering with providers to understand and mitigate security risks.
 Speaker Kylie Peak
Kylie studied Telco Engineering at ANU in the late 90’s and has a Masters in Computer Networking with CSU.  Kylie has worked primarily within Network Engineering across government and private sectors and currently consults as a Network Engineer.  In her spare time she enjoys building and breaking networks, pushing boundaries in security and knowledge.
Speaker Catherine Pearce
Catherine Pearce (@secvalve) is a Senior Security Consultant at Cisco based in Wellington, New Zealand. Formerly of Neohapsis in the USA, she engages with varied clients to assist them in understanding their current security state, adding resilience into their systems and processes, and managing their ongoing security risk.
 Speaker Zoë Rose
Zoë Rose is a Cisco Champion and Cyber Security Analyst at Schillings. Zoë helps clients secure their network infrastructure from data loss and cyber-attack. In addition to specialising in network security and secure communications, Zoë also supports ethical hacking and incident response engagements and advises on best practice software development, awareness training, and secure systems architecture. Zoë’s true passion is her ferrets and cyber awareness training programme where her ferrets play a key role in each demonstration.
Speaker Vanessa Teague
Dr Vanessa Teague is a cryptographer with an interest in cryptographic protocols that support a free and democratic society. Her main research interest is in electronic voting protocols, which aim to protect individual vote privacy while providing verifiable evidence of a correct election result.
Speaker Charlotte Wood
Charlotte Wood is the Australian Criminal Intelligence Commission’s Manager of Cybercrime Intelligence. Charlotte has led Australia’s whole-of-government cybercrime threat picture for the past three years. Her 13 years with the Commission has seen her work across Australia on a variety of criminal intelligence topics including drugs, money laundering, child sex offences and fraud. Charlotte has academic qualifications in finance and social research. Charlotte has experience working collaboratively across law enforcement and intelligence agencies both within Australia and internationally.
 Speaker Chathura Abeydeera
Chathura is the Penetration Testing lead in the Risk advisory Service line in Deloitte Australia with more than 10 years of industry experience in information security. He has worked with clients across the State & Federal Government, Technology and Financial Services sectors, specialising in vulnerability assessments, penetration testing and security trainings.
 Speaker Wade Alcorn
Wade Alcorn is the founder of Alcorn Group. As one of the first penetration testers in Australia, Wade has discovered security vulnerabilities and developed exploits for numerous critical infrastructure and enterprise level applications. He is a founding director of CREST Australia, and as Chair of the Technical Committee, he led the establishment of the organisation’s technical certifications.Wade Alcorn is the co-author of the internationally acclaimed book: “The Browser Hacker’s Handbook”. He has published leading technical papers on emerging threats and was awarded the AusCERT national ‘Award for Individual Excellence in the field of IT Security”. He is the creator of the BeEF open source browser exploitation framework, which is included in toolswatch.org’s top 10 security tools.
Andrew Bailey
Andrew is a Secure Code Engineer at Telstra having previously worked as a Software Engineer at IBM. Over the last 15 years he’s developed products in Java and C/C++, learnt to embrace Automation, Agile, CI/CD and is now pursuing his passion for Secure Application Programming.
Speaker Harsha Banavara
Harsha Banavara, CSSLP is a senior cybersecurity analyst and the global subject matter expert in the “Requirements” stage of Secure Development Lifecycle at Schneider Electric. He is a contributing author of the Industrial Internet Security Framework and NEMA Supply Chain Best Practices document.
Speaker Paul Black
Paul Black is studying a PhD in Information Technology at the Internet Commerce Security Lab (ICSL) at Federation University. His PhD topic is Techniques for the Reverse Engineering of Banking Malware. Paul has a Masters of Computing, his research topic was the reversing of Zeus malware. Paul started his career as a programmer in 1981 and has worked in banking, defence, law enforcement and malware analysis.
Speaker Andrew Blaich
Andrew Blaich is a security researcher at Lookout where he is focused on mobile threat hunting and vulnerability research. Prior to Lookout, Andrew was the Lead Security Analyst at Bluebox Security. He holds a Ph.D. in computer science, and engineering from the University of Notre Dame in enterprise security and wireless networking. In the past Andrew has worked at both Samsung and Qualcomm Research. Andrew has presented at conferences including BlackHat, RSA, SecTor, Interop, and SANS DFIR. In his free time he loves to research the security of IoT devices.
 Speaker Vern Boyle
Vern Boyle has over 25 years experience developing advanced technology solutions for the U.S. Department of Defense, intelligence community, and government agencies globally. He leads a team of multidiscipline engineers and scientists in developing transformational solutions; focused on emerging technologies and R&D that support customer missions in defense and intelligence.
 Speaker Doug Brown
Doug is an Information Security Analyst with Red Hat’s internal Information Security team and member of the SplunkTrust. Doug has a number of Open Source security projects, including the Security Playbook and recently published his thesis (http://eprints.qut.edu.au/93693/) about using formal methods to analyse the composite behaviours of network protocols.
Speaker Phil Burdette
Phil Burdette is a Sr. Security Researcher who joined the SecureWorks Counter Threat Unit research team in 2013. He leads targeted threat hunting and response engagements, and performs intrusion analysis to create threat intelligence assessments on nation state actors. Before joining SecureWorks, Phil worked at CERT/CC supporting the DoD and USG communities. His research interests include model-based threat actor behavioral analysis, adversary responses to stimuli, and threat group disruption tactics. Phil holds a B.S. in Applied Computing from Allegheny College and an M.S. from Carnegie Mellon University in Information Systems Management.
Speaker Christopher Butera
Mr. Christopher Butera serves as the Director of the Hunt and Incident Response Team for NCCIC/US-CERT. The NCCIC Hunt and Incident Response Team (HIRT) is the DHS’s front line in responding to cyber incidents and proactively hunting for malicious cyber activity. HIRT leverages world-class expertise to lead response, containment, remediation, and asset recovery efforts with our constituents and partners.
In this role, he has led response efforts to many large-scale data breaches in both the private sector and federal government, several of which you may have read about in the news. His focus is on discovering and analyzing new forensic artifacts and finding new security controls to prevent APT intrusions and create or enhance opportunities for early detection and containment.
Mr. Butera is a graduate of the University of Notre Dame and has a Master of Science Degree in Computer Science from the University of Chicago. He holds CISSP, GSEC, and GCED certifications.
Speaker Paul Byrne
Paul has worked in the Cyber Security space globally since 2000 and has always had a keen interest in finding better ways to protect businesses against the growing threat of Cybercrime. He has worked in research roles, security consulting, major banks running innovation projects and also managed operational teams in penetration testing and Cybercrime. In the last five years Paul has been dabbling in big data, analytics, visualusation and machine learning.
Speaker David Campbell
David has worked in Government security for the past seventeen years, and has held a range of positions related to electronic and cyber security. He played a key role in developing the Defence Signals Directorate’s original Infosec-Registered Assessor Program and managed Australia’s participation in the first International Cyber Storm exercise in 2006. He then went on to participate in the Cyber Storm 2, 3 and 4 exercises. David led the Australian Government Computer Emergency Readiness Team (GovCERT.au) as part of the Attorney General’s Department, for four years. David has been a Director in CERT Australia, the national computer emergency response team, for the past six years and is currently A/Executive Manager of the CERT. David has a Masters degree from the Australian National University, and is an Adjunct Associate Professor with Edith Cowan University’s Security Research Institute.
Speaker Earl Carter
Almost 20 years ago, Earl Carter was introduced to network security. Mr Carter has spent over 18 years working at Cisco. Currently, Mr Carter is a Senior Talos Threat Researcher and spends his time hunting for new threats against live customer networks by examining various intelligence feeds and data sources.
Mark Chaffe
Mark Chaffe is a security engineer at the Shadowserver Foundation, a non-profit organisation that gather, track, and report on malware, botnet activity, and electronic fraud. His background is in systems administrator, security, and developer roles and has contributed to open source projects. Mark learnt to code BASIC at the age of 8 and his first use of a hex editor was to cheat at Dune II.
 Speaker David Chatterton
Dr David Chatterton joined Aconex in 2007 and was promoted to CIO in 2008. He has led the company’s transition to Agile, has been responsible for all production and corporate IT systems, while driving the compliance of Aconex with ISO 27001 and SSAE16. David has a PhD in Computer Science.
Chris Chow
Chris is a PhD student in the Research School of Computer Science at the Australian National University. His interests lie in user experience and user-centric computing. Chris’ research mixes psychology and computer science to model user emotion from biometric signals using machine learning models.
Speaker Eric Cornelius
Eric Cornelius is a SANS Certified Instructor and the Director of Critical Infrastructure and Industrial Control Systems (ICS) at Cylance, Inc. where he is responsible for thought leadership, architecture, and consulting implementations. Eric brings a wealth of ICS knowledge and his leadership keeps organizations safe, secure, and resilient against advanced attackers. Previously, Eric served as the Deputy Director and Chief Technical Analyst for the Control Systems Security Program at the US Department of Homeland Security.Eric earned a bachelor’s degree from the New Mexico Institute of Mining and Technology where he was the recipient of many scholarships and awards including the National Science Foundation’s Scholarship for Service.Eric went on to work at the Army Research Laboratory’s Survivability/Lethality Analysis Directorate where he worked to secure field deployable combat technologies. It was at ARL that Cornelius became interested in non-traditional computing systems, an interest which ultimately led him to the Idaho National Laboratory where he participated in deep-dive vulnerability assessments of a wide range of ICS systems.Eric is the co-author of “Recommended Practice: Creating Cyber Forensics Plans for Control Systems” as part of the DHS National Cyber Security Division, Control Systems Security Program, 2008 and is also a frequent speaker and instructor at ICS events across the globe.
Speaker David Cottingham
David Cottingham is a security consultant and co-founder of the application whitelisting company Airlock Digital. Based in Canberra, Australia he provides security advice, and technical consulting work for a wide range of organisations, primarily focusing on the challenges of performing the strategies to mitigate targeted cyber intrusions in modern enterprises.
 Speaker Gideon Creech
Gideon is an academic at the Australian Centre for Cyber Security (UNSW Canberra). His research areas include exploit development, network security, intrusion detection systems, cyber resilience and cyber threat intelligence. He holds a BE (Hons), MEngSc, MBA and PhD, along with various industry qualifications including SANS Cyber Guardian, GSE and OSCP.
 Speaker Craig Davies
Craig Davies is the CEO for the Australian Cyber Security Growth Network Ltd (ACSGN). Australia’s Cyber Security Strategy, launched in April 2016, committed to establish a Cyber Security Growth Centre to position Australia as an attractive location for cyber security research and innovation. The ACSGN has been created to support the development of a vibrant and globally competitive Australian cyber security industry aimed at enhancing Australia’s future economic growth and help protect Australia’s interests online. Prior to joining the ACSGN, Craig was Head of Security for Atlassian where he lead the security program supporting all aspects of Atlassian’s business from product security, to their Cloud operations and the protection of Atlassian itself. Craig has 20+ years experience in Cyber security and has worked in a number of fields including Infrastructure operations and management, security architecture, and website development and operations.
 Speaker Alfonso De Gregorio
Alfonso De Gregorio is the Founder and CEO of Zeronomicon, the premium exploit acquisition platform. Since the early days of his career in 1990s, he has been working at the intersection of software security and security software, where he explores — and tries to contain — the space of unmitigable surprises. In his past life, Alfonso founded BeeWise, the first information-security prediction market, worked with Fortune 100 companies, engineered cryptographic appliances, and served as an Expert at the European Commission. In 2003, he held the position of Visiting Scholar with the Computer Security and Industrial Cryptography (COSIC) research group, K.U. Leuven. Today, Alfonso researches solutions for aligning software security incentives, tweets @secYOUre, and generally does not speak of himself in the third person.
 Speaker Ashley Deuble
Ashley has been working in Information Security for a lot longer than he would like to remember. He has worked for numerous financial institutions, global engineering firms, education and Fortune 50 companies. Ashley’s experience in Information Security includes security incident response, forensic analysis, ISO27000 Policy/ISMS development and implementation, security risk and compliance assessments, penetration testing, mentoring and training. He has achieved many security certifications such as CISSP, CISM, CISA, CGEIT, CRISC and OSCP. When Ashley isn’t working or studying he likes to go running, mountain biking and camping.
Adbrahmane Diarra
Abdrahmane Diarra attended the Federal University of Applied Administrative Sciences from 2006 till 2009. Since 2009 he is with the German Federal Criminal Police Office in Wiesbaden/Germany. Since 2011 he is with the Cybercrime Inteligence Unit, focussing on botnet analysis.
Speaker Casey Ellis
As CEO and Founder of Bugcrowd, Casey Ellis brings over 14 years of information security experience to lead the company’s technology vision and strategic operation. Prior to Bugcrowd, he served as Chief Security Officer at ScriptRock and as an Information Security Specialist and Account Manager for Vectra Corporation Ltd. Casey has also presented at several security shows including RSA, DerbyCon, BSides, Converge, SOURCE Conference and the AISA National Summit. A former penetration tester, Casey has taken on the role of “white hat” to connect organizations large and small with the power of Bugcrowd’s platform for a revolutionary approach to cybersecurity.
Speaker Chris Eagle
Chris Eagle is a Senior Lecturer of Computer Science at the Naval Postgraduate School (NPS) in Monterey, CA. A computer engineer/scientist for over 30 years, his research interests include computer network operations, computer forensics and reverse/anti-reverse engineering. He was the chief architect of the competition infrastructure for DARPA’s Cyber Grand Challenge. He has been a speaker at conferences such as Black Hat, Shmoocon, and Defcon and is the author of “The IDA Pro Book”. In his spare time he is an inveterate CTF player and has twice won the prestigious capture the flag competition at Defcon.
Speaker Jeffrey Farago
Jeffrey Farago, CSSLP, CEH, CPT, MSc in Cybersecurity; is cybersecurity director in the Building & IT Business Unit, for Schneider Electric; with a 44-year career in product development; 21 years at Schneider Electric. For the past 6+ years his focus has been on cybersecurity, including Secure Development Lifecycle, Data Privacy, Trade Controls, and Secure Supply Chain related initiatives. Additionally, he has conducted numerous Cybersecurity workshops throughout his company and has promoted a Cybersecurity mindset amongst the many functional groups and disciplines.
Speaker Tobias Feakin
Dr Tobias Feakin is Australia’s inaugural Ambassador for Cyber Affairs. He leads Australia’s whole of government international engagement to advance and protect Australia’s national security, foreign policy, economic and trade, and development interests in the internet and in cyberspace. Ambassador Feakin was a member of the Independent Panel of Experts that supported the Australian Cyber Security Review to produce Australia’s 2016 Cyber Security Strategy. He has also held a number of research and advisory positions. Ambassador Feakin holds an Honours Degree in Security Studies and a Doctorate of Philosophy in International Politics and Security Studies, both from the University of Bradford.
 Speaker Christian Frichot
Christian is a passionate application security expert currently working in the Salesforce.com Product Security team in San Francisco. He has previously worked in security specialist positions for LinkedIn, Bankwest and Rio Tinto. Originally from Australia, Christian co-founded Perth’s only pure-play, information security consulting organisation, Asterisk Information Security, and has a long history of presenting at Perth’s AISA & ISACA meetings and conferences.Christian has been active within the open source security community for a number of years, working on projects including the Browser Exploitation Framework, the OpenSAMM Self Assessment tool, and a 2FA extension for Rails’ Devise authentication framework. Through his love/hate relationship with JavaScript, and his involvement with BeEF, he was invited to co-author the Browser Hacker’s Handbook published by Wiley.In addition to Perth AISA & ISACA conferences, Christian has also presented at Kiwicon (NZ), DEFCON (USA), BSidesSF (USA), Blackhat Arsenal (USA), CactusCon (USA), WAHCKon (Aus), and OWASP AppSec APAC (Aus).
Andre Fucs De Miranda
With 20 years of experience on Information Security, Andre Fucs de Miranda has spent good part of his life securing systems around the globe. Andre is Apache NiFi PMC Member and an accidental big data user. As SOC Manager, Andre leads a team of professionals trying to secure our cyberspace.
Speaker Ajoy Ghosh
Ajoy Ghosh is CISO for Insurance and Care NSW (icare) the NSW Government’s newly formed insurance company. Previously he was the founding chair of the NSW Government’s IT Security Steering Group and General Manager Security & Risk of Transport for NSW. Ajoy is an IRAP Assessor and also expert witness including giving evidence for cases establishing responsibility for cyber events.
 Speaker Patrice Godefroid
Patrice Godefroid is a Principal Researcher at Microsoft Research. He received a B.S. degree in Electrical Engineering (Computer Science elective) and a Ph.D. degree in Computer Science from the University of Liege, Belgium, in 1989 and 1994 respectively. From 1994 to 2006, he worked at AT&T/Lucent Bell Laboratories, where he was promoted to “distinguished member of technical staff” in 2001. His research interests include program specification, analysis, testing and verification. Patrice is probably best known for his early work on partial-order reduction for model checking concurrent systems (his PhD thesis is published as LNCS volume 1032 by Springer), for his work on VeriSoft, the first software model checker for mainstream programming languages such as C and C++, for his work on 3-valued model checking with may/must abstractions for sound program verification and falsification, and for his work on automatic test generation with DART. More recently, he co-developed SAGE, the first whitebox fuzzer for security testing, which was credited to have found roughly one third of all the security vulnerabilities discovered by file fuzzing during the development of Microsoft’s Windows 7. In 2015, he co-founded Project Springfield, the first commercial cloud fuzzing service.
Speaker Joshua Goldfarb
Josh (Twitter: @ananalytical) is an experienced information security analyst with over a decade of experience building, operating, and running Security Operations Centers (SOCs). Josh currently serves as VP, CTO – Emerging Technologies at FireEye. Until its acquisition by FireEye, Josh served as Chief Security Officer for nPulse Technologies. Prior to joining nPulse, Josh worked as an independent consultant, applying his analytical methodology to help enterprises build and enhance their network traffic analysis, security operations, and incident response capabilities to improve their information security postures. He has consulted and advised numerous clients in both the public and private sectors at strategic and tactical levels. Earlier in his career, Josh served as the Chief of Analysis for the United States Computer Emergency Readiness Team (US-CERT) where he built from the ground up and subsequently ran the network, endpoint, and malware analysis/forensics capabilities for US-CERT. In addition to Josh’s blogging and public speaking appearances, he is also a regular contributor to DarkReading, SecurityWeek, SC Magazine UK, and The Business Journals.
Speaker Murray Goldschmidt
Murray Goldschmidt is co-founder and Chief Operating Officer at Sense of Security, a leading Australian Information Security firm. Murray has presented at ACSC in 2016 on general DevOps Security. With over 17 years’ experience and a degree in Electrical Engineering, Murray is an IRAP Assessor, CISSP and PCI QSA.
 Speaker Aaron Hackworth
Aaron Hackworth is a Senior Distinguished Engineer with the SecureWorks Counter Threat Unit research group. He has been experimenting with computers and computer security for more than 30 years, including 20+ years of professional experience. In his current role, he leads the CTU Special Operations team; an elite group responsible for the development of technology, intelligence and methodologies focused on disrupting targeted and other advanced security threats. Prior to joining SecureWorks, Aaron was a Senior Malware Analyst and Security Researcher at CERT, where he performed critical research for the US Government and led a team that participated in high impact operations for Federal Law Enforcement and the Intelligence Community. He has also worked in IT/Network engineering, operations and security for some of the world’s largest companies. Aaron holds several industry certifications including a CISSP, NOP and EnCE. He also holds multiple academic degrees including an M.B.A. and a B.S. in Computer Science.
Speaker Chris Hallenbeck
Chris is a Director with Tanium’s Endpoint Detection and Response (EDR) Team after almost 7 years of government service at the U.S. Computer Emergency Readiness Team (US-CERT). At US-CERT, he was responsible for having designed and built their incident response capabilities while restructuring their current focus on strategic mitigation guidance. Over countless IR engagements both with government and private sector critical infrastructure victims, he has seen a common theme: a lack of emphasis on IT operations and IT security hygiene fundamentals. Prior to joining US-CERT, Mr. Hallenbeck worked for RSA Security and EMC as a security engineer and with AOL/Time Warner on their global incident response team. He started his career as a Unix sys-admin at Binghamton University. When not chasing electrons he prefers to be 18 meters under the sea.
 Speaker Peter Hannay
Peter Hannay is a researcher and lecturer based at Edith Cowan University in Perth Western Australia. His research is focused on the acquisition and analysis of data from small and embedded devices. In addition to this he is involved in smart grid research and other projects under the banner of the ECU Security Research Institute.
Speaker Alexander Hogue
Alex is a kid with a laptop and a pocketful of memes. Currently he’s an Incident Response Something Something at Atlassian, which is a little bit like being an adult but with more ice cream. On the side he writes dumb blog posts about graphing when your Facebook friends are awake and other um “independent research” (https://defaultnamehere.tumblr.com). He’s also totally a magician, so ask him to show you some magic if you’re into that.
 Speaker Frode Hommendal
Frode Hommedal is a senior incident responder and CSIRT leader. He is currently head of incident response and security analytics at Telenor CERT. He is currently part of the team that is establishing the global CERT/SOC capability of Telenor, a Norwegian telco with operations in 13 countries and over 200 million customers. He previously worked seven years for the Norwegian national CSIRT, NorCERT, and he has extensive experience with countering digital espionage. One of Frode’s goals is to contribute to the infosec curriculum, hoping it will help more CSIRTs to find, face and fight the ever growing number of advanced threats.
 Speaker Simon Howard
Simon Howard runs ZX Security, a penetration testing firm based out of New Zealand. In his spare time Simon runs a monthly security meetup in Wellington and also co-founded and assists with the running of Australasia’s largest (some might even say premier) hacker conference, Kiwicon. Simon and his team spend their days hacking GPS, creating rogue cell-phone base stations and making web applications cry. His team have also spent a considerable amount of time researching OSINT techniques, training LEA and Government organisations across the Asia-pacific region and understanding the tribulations of developing a sound OSINT process.
Speaker Adam Janik
Adam is an ex-graduate at Australia Post working in the Information Security field for the past two years. He’s worked in the investigations and remediation team, specialising in phishing. This led to a logical move to the Innovation, Culture and Awareness team where Adam runs the phishing simulation across the organisation, manages email security communications and works on various projects aiming to minimise the company’s exposure to being phished and being used for phishing.
 Speaker Trevor Jay
Trevor Jay is a principal security engineer at Red Hat, where he is responsible for emerging technologies. Previously he has worked as a penetration engineer. His background is in software engineering for web-based autonomous robotics.
Speaker Joe Jarzombek
Joe Jarzombek is Global Manager for Software Supply Chain Solutions in the Software Integrity Group at Synopsys. He leads efforts to enhance the Software Integrity Platform to mitigate software supply chain risk via automated analysis and testing technologies that integrate within acquisition and development processes; enabling the detection, reporting, and remediation of defects and security weaknesses and vulnerabilities throughout the lifecycle to better enable others to gain assurance and visibility within the software supply chain. Focused on software security, safety and quality, he collaborates with industry consortia, standards bodies, and government agencies in evolving processes and technologies addressing software assurance, supply chain risk management, and security automation.
 Speaker Angelos Keromytis
Dr. Angelos Keromytis is an associate professor in the Computer Science department at Columbia University in New York City, and the director of the Network Security Lab. He received his Ph.D. in 2001 from the University of Pennsylvania. His research interests include systems and network security, and applied cryptography. He was elected ACM Distringuished Scientist in 2012. In 2013, he served as Program Director with the National Science Foundation (NSF), responsible for the Secure and Trustworthy Cyberspace (SaTC) program. Since 2014, he is serving as Program Manager with the Defense Advanced Research Projects Agency (DARPA), where he is responsible for several cybersecurity programs.
 Speaker Antti Kurittu
Antti Kurittu is a Senior Specialist at the National Cyber Security Center of Finland. The NCSC-FI is a part of the Finnish Communications Regulatory Authority. Antti has a background in law enforcement and has worked as a team leader, digital forensics and criminal investigator at the Helsinki Police Department. Currently he is a part of the national CERT team of Finland, handling a diverse array of incident management tasks and overseeing the cyber exercise functions of critical infrastructure providers.
Speaker Oren Koriat
Oren Koriat is a mobile threat intelligence analyst and researcher. He’s an expert on the threat landscape of Asian mobile markets, and the author of many of Check Point’s publication on mobile malware.
 Speaker David Lacey
Professor David Lacey is Managing Director of IDCARE, Australia and New Zealand’s National Identity and Cyber Support Service, and Professor of Cyber Security with the Centre for Human Factors & Sociotechnical Systems, University of the Sunshine Coast. IDCARE is a joint public-private sector innovation that provides a free helpline to the Australian and New Zealand communities who confront identity and cyber-related crime. As Managing Director of IDCARE, Dave works intensively across the community in advocating for identity and cyber security resilience and participant confidence. His teaching and research engagement with business and government leaders focuses on building consumer-centric approaches to cyber crime prevention and response.
Speaker Tim Lane
Tim Lane is a Technology Services professional at Southern Cross University IT department with over 20 years’ experience in a variety of IT environments. Tim is also Chair of both the QLD and national based Cybersecurity Community of Practice groups for Universities. Specialties include Cybersecurity program, research, strategic planning and leadership, policy, infrastructure management, Disaster Recovery Planning. Tim is professionally interested in cybersecurity related evolving trends and threats, leadership, technology, organisational behaviour, and project management.
Speaker Arun Lakhotia
Dr. Arun Lakhotia is CEO of Cythereal and a Professor of Computer Science at the University of Louisiana at Lafayette. He specializes in automated and large-scale analysis of malware. To deal with mid-life crisis he ventured into developing self-driving automobile, leading to the development of CajunBot, a self-driving Jeep.
Speaker Clive Lines
Clive Lines was appointed Deputy Director Australian Signals Directorate (ASD) in May 2013 and regularly stands in for the Director ASD as well as having responsibility for the delivery of Security Services for all three Defence Intelligence Agencies. In July 2015 Clive was appointed Deputy Director Cyber & Information Security and also serves as the Coordinator of the Australian Cyber Security Centre, these two roles are in addition to Deputy Director ASD.
Prior to these appointments Clive was responsible for the development and support of Defence’s enterprise IT systems in the finance, logistics, military, intelligence and corporate domains and related industry partnership arrangements. In addition, he was responsible for the single Defence telecommunications contract, a significant part of the reform agenda.
Clive enjoys gardening and spending time with his family.
 Speaker Stephane Lenco
Stephane Lenco holds an engineering degree from “Ecole Nationale de l’Aviation Civile” (National School for Civil Aviation) in Toulouse, France, with majors in Air Traffic Management and Computer Science. After a time in the United States, working on project management in the field of satellite control, he joins the IT department of the Space branch of Aerospatiale-Matra in Paris where he successively manages international IT integration projects and migrations for networks, workstations or servers. In 2002, he shifts to the headquarters of what became EADS, to manage the IT infrastructure of the new unit. In 2007, he steers his career towards the Security department of the group, in charge of Information Security, in close relationship with regulatory authorities. He is currently Chief Information Security Officer of Airbus Group where he recently created the Airbus Group CERT and is the secretary to GITSIS, a CISO association in France.
Speaker Terry MacDonald
Terry MacDonald has been involved in information security for over 14 years. Terry currently works at Cosive, a company he co-founded with Kayne Naughton and Chris Horsley, focused on helping organizations make use of their threat intelligence. Terry previously worked at the Cisco Managed Threat Defense centre and helped Microsoft develop their internal Threat Intelligence Management solution. Terry has been a major contributor to the STIX, TAXII, and CybOX threat intelligence sharing standards, and has worked with major vendors such as Microsoft, Soltra, and EclecticIQ. Terry is also a NZITF board member in his spare time.
 Speaker Dhia Mahjoub
Dr Dhia Mahjoub is the Principal Engineer of Cisco Umbrella Research (OpenDNS). In addition to building threat detection systems at scale, he advises on R&D strategy and leads innovative research projects in order to enhance the product and better protect customers. Dhia also regularly engages with prospects and clients and speaks at conferences worldwide including Black Hat, Defcon, Virus Bulletin, ShmooCon, Kaspersky SAS, Infosecurity Europe, RSA, Les Assises de la sécurité and Usenix Enigma.
 Speaker Glenn Maiden
Glenn Maiden boasts a proud ICT career spanning two decades – primarily in the Defence, Intelligence and Security environments. Glenn has performed diverse roles including penetration testing; intelligence analysis and reporting; security risk analysis & management; compliance; systems engineering; systems administration; operations management, enterprise leadership… just to name a few.
Speaker Kevin Manderson
Kevin started in defence as a mainframe engineer in the 1970s and then industrial systems in the early 1980s. In the 90s he commenced his own business in consulting, web development and information security. He built a startup which undertook security gateway monitoring and incident response and sold it in 2000. Since then Kevin has been involved with utility infrastructure testing, has been an IT auditor, managed a large SCADA environment and is now back in Incident Response. He has been either responder, manager or provided technical support for more than 120 Cyber Incidents. Kevin is now responsible for Threat Intelligence and managing the Incident Response function at BAE Systems Applied Intelligence in Australia.
 Speaker Donald McCarthy
Mac has been in the IT industry for 17 years. Having supported equipment ranging from cash registers to super computers, he has spent the last 7 years focusing on security. Prior to joining myNetWatchman, Mac was a security engineer in the education, legal and healthcare sectors. His research at myNetWatchman focuses on digital fraud aimed mostly at the financial and retail verticals.  myNetWatchman has spent the past 15 years establishing a reputation as a preeminent global leader in fraud intelligence where Mac has spent the past 2 years serving as Vice President of Operations.
Speaker Andre McGregor
Andre McGregor is Tanium’s Director of Security responsible for cyber security protection. Before Tanium, Andre served as a technically-trained FBI Cyber Special Agent in New York City forming FBI New York’s first cyber squad against China, Russia, and Iran. Additionally, Andre is technical consultant for the TV show Mr. Robot.
Speaker Paul McKitrick
Paul McKitrick a New Zealand native, now resides in the beautiful, misty, shores of Seattle and is the Principal Engineering PM at ICEBRG.IO. Prior to ICEBRG Paul was a Senior Security Strategist in the Microsoft Security Response Center, responsible for managing Microsoft’s international relationships with the incident response community. Paul worked for the .NZ ccTLD as the Manager Compliance and Security and spent the better part of a decade working for the New Zealand government, for his sins. Paul sits on the CERT NZ Establishment Advisory Board, and was the founding Chair of the New Zealand Internet Task Force.
Chris Mohan
Chris Mohan has worked for fortune 50 companies security teams. Chris’ career has had him fighting in the front-line trenches and battling in boardrooms to instil solid, intelligent, and practical security practices and controls that are relevant to the business and its needs.
Speaker Dennis Moreau
Dennis’ current efforts focus on virtualization strategies to transformatively improve the efficacy and efficiency cybersecurity. He works with NIST and the U.S. DoD on securit and compliance information and automation standards. He holds a doctorate in Computer Science and has held faculty positions in Computational and Computer Sciences.
Speaker Justin Myers
Justin Myers is a computer scientist with the Naval Criminal Investigative Service’s Cyber Directorate. As a founding member of NCIS’ Cyber Capabilities Integration Division, Justin plays an active role in efforts to make Cyber insights applicable to the wide variety of missions at NCIS. Justin hold a M.S in Cyber Operations from Air Force Institute of Technology, where he conducted research into distributed log event correlation. His current pursuits include network forensics, data visualization, and spending time with his wife and son.
Speaker Paul Nevin
Paul Nevin is a career IT security professional having worked in Government and industry roles for more than 20 years. His area of research is counter cyber espionage. Paul is an adjunct lecturer at the Australian Defence Force Academy and teaches classes in cyber operations and tradecraft.
Speaker Jade Newman-Andrews
Federal Agent Jade Newman-Andrews has been with the Australian Federal Police for 12 years, the last four with Cyber Crime Operations and currently the AFP’s Liaison Officer at the ACSC. He holds a Bachelor of Science and was employed in the IT industry before joining the AFP. FA Newman-Andrews has experience with issue motivated groups, hacktivists and has a general interest in gadgets; great and small.
 Speaker Kjell Christian Nilsen
Growing up in the cold winters of Norway, Kjell Christian was always interested in the outdoors as a kid. Fast-forwarding from this, he got both his education and subsequently work at the Norwegian Armed forces. He worked as a security analyst working with detecting and handling cyber security incidents – both for forces at home and deployed in international operations. In the course of this work, he got in touch with multiple people in the operational information security community, and ended up joining the non-profit organizations Underworld.no and Shadowserver. In 2012, he started working at the Norwegian HealthCERT, detecting and handling incidents in the Norwegian healthcare sector. At the same time, he kept strong ties to the infosec community, and even managed to find his wife there. In his copious spare time, he enjoys taking walks with his wife and dog, as well as punching miscreants in cyberspace.
Speaker Timothy O’Sullivan
Timothy has worked for Defence Export Control as a technical assessor since 2012. In addition to assessing export applications, he represents Australia at the meetings of the major export control regimes including the Wassenaar Arrangement, and helps to compile Australia’s national control list – the Defence and Strategic Goods List.
Domenico Perre
Domenico Perre currently works as a Sales Engineer at Splunk with a focus on Security assisting Government agencies in the ACT. In his previous roles he has worked as an Assistant ITSA for Department of Industry, Innovation and Science. His passions are around threat hunting.
 Speaker William Peteroy
William Peteroy, co-founder and CEO at ICEBRG, served as a security response strategist at Microsoft where he worked on product security for Windows and Internet Explorer, managing a number of critical 0-day vulnerabilities in both platforms and served on the Microsoft Crypto Board. Peteroy has also been an instructor at the National Cryptologic School at Ft. Meade. Peteroy speaks regularly at information security and research conferences in the United States and internationally, including RECON, SECTOR, Kiwicon and NZITF.
 Speaker Daniel Plohmann
Daniel Plohmann works as a senior analyst for Fraunhofer FKIE, taking apart malware families and botnet instances. His PhD research at University of Bonn focuses on automation and improving the efficiency of reverse engineering as an instrument for in-depth analysis. As a Teaching Assistant and Thesis Advisor for computer security related topics, he gives regular presentations and workshops on malware analysis and botnet infiltration. He also loves to put his experience to good use by supporting law enforcement as a subject matter expert.
 Speaker Arun Raghu
Arun is an experienced consultant in cyber security policy. With a background in technology and law and experience advising government and the private sector on emerging cyber policy issues, his insights in this unique space have been extensively published in legal journals and business publications across Australia and the USA.
Speaker OJ Reeves
After 13 years of building software “targets” in various forms, OJ made the switch from wannabe developer to wannabe hacker by starting Beyond Binary, an Attack Simulation consultancy based on the Sunshine Coast. OJ’s goal is to help organisations improve their security postures through realistic assessments that focus on the actual risks the business may face. He’s a distance runner, an active committer on the Metasploit Project, and loves to teach others about security topics via live-streaming.
 Speaker Stephen A Ridley
Stephen Ridley is Founder and CEO/CTO of Senrio. Stephen has more than 10 years of experience in software development, software security, and reverse engineering. His original research on embedded device vulnerabilities has been featured on NPR, SecurityWeek, Wired and numerous other publications. Prior to his current work at Senrio, Mr. Ridley was Principal Researcher at Xipiter and served as Chief Information Security Officer of a financial services firm. Prior to that Mr. Ridley held various information security researcher/consultant roles (Matasano Security, et al) and was the Senior Security Architect at McAfee. Earlier in his career, Stephen was a founding member of the Security and Mission Assurance (SMA) group at a major U.S. Defense contractor where he did vulnerability research and reverse engineering in support of the U.S. Defense and Intelligence community.
Speaker Wayne Ronaldson
Wayne is an experienced tester, having conducted security assessments for a range of leading organisations. Wayne has expertise in Red Team Assessments, Physical, Digital and Social, and has presented to a number of organisations and government departments on the current and future state of the cyber security landscape.
Speaker Florian Ruechel
Florian studied IT Security in Germany before moving to Sydney to work as a Security Analyst for Atlassian. He tries to find the balance between embracing new technology and being paranoid about their security implications by combining German caution with the Australian relaxed spirit.
Speaker Michael Scotton
Michael Scotton joined the Defence Signals Directorate as a graduate Research Officer in 1985 after completing an honours degree in English Literature at the University of Melbourne. Since then he has worked in a variety of positions in intelligence production and analysis, project management and information security, and was DSD’s UK liaison officer in Cheltenham from 2000 to 2002. He completed a Master of Business Administration at Monash University in 1994, and a Master of Science (IT) at the University of New South Wales in 2003. He currently occupies the position of Assistant Secretary Cyber Security in the Australian Cyber Security Centre.
Speaker Michael Sentonas
Mike Sentonas is Vice President, Technology Strategy at CrowdStrike. Reporting directly to the Co-Founder and CTO, Mike’s focus is on driving CrowdStrike’s APAC go-to-market efforts and overseeing the company’s growing customer and partner network. With over 20 year’s experience in cybersecurity, Mike’s most recent roles prior to joining CrowdStrike were: Chief Technology and Strategy Officer, Asia Pacific at Intel Security and Vice President and World Wide Chief Technology Officer of Security Connected at Intel Security. Michael holds a B.S. degree in Computer Science from Edith Cowan University, Western Australia and holds an Australian Government security clearance.
Speaker Michael Shatter
Michael leads the RSM Australia IT Security & Privacy Services team delivering strategic and tactical security risk management projects including Cyber Security Assessments, Penetration Tests and Social Engineering Security Reviews to medium and large organisations. Michael presents to Boards on current cyber risk issues and on practical security governance.
 Speaker Adam Shostack
Adam is an entrepreneur, technologist, author and game designer. He’s a member of the BlackHat Review Board, and helped found the CVE and many other things. He’s currently building his 5th startup, focused on improving security effectiveness, and mentors startups as a Mach37 Star Mentor. While at Microsoft, he drove the Autorun fix into Windows Update, was the lead designer of the SDL Threat Modeling Tool v3 and created the “Elevation of Privilege” game. Adam is the author of “Threat Modeling: Designing for Security,” and the co-author of “The New School of Information Security.”
 Speaker Rob Sloan
Rob Sloan is Cybersecurity Research Director at the WSJ Pro. His role focuses on providing thought leadership, building datasets and contributing to the WSJ Pro Cybersecurity newsletter. Rob is based in Princeton has been with the company since 2014. Previously, Rob was Response Director for a specialist IT security consultancy and led a team focused on detecting, investigating and responding to cyber intrusions, especially state sponsored attacks. Rob started his career working for the UK Government in defence and foreign affairs, looking at some of the earliest attacks targeting government and critical national infrastructure networks.
Speaker Matthew Sorell
Dr Matthew Sorell is Senior Lecturer in telecommunications and multimedia engineering in the School of Electrical and Electronic Engineering at the University of Adelaide. With a background in forensic analysis of multimedia provenance, he was invited in 2014 to speak at the opening of the Centre for Digital Forensics and Cyber Security at the Tallinn University of Technology, and became an instant Eestiphile. Dr Sorell initiated and chaired the International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-Forensics) in 2008 and 2009 in Adelaide, and has published research in image and video content provenance. In 2013 he was an invited academic observer to the UNODC Intergovernmental Experts Panel on Cybercrime (Vienna, Austria).
Speaker Adrian Turner
Adrian Turner is the CEO of Data61 at CSIRO. Data61 is Australia’s leading data innovation group with 1,100 people and 680 PhDs including contributed staff and students. Adrian is a successful and influential Australian technology entrepreneur who has spent 18 years in Silicon Valley. Most recently he was Managing Director and Co-Founder of Borondi Group, a holding company focused on the intersection of pervasive computing, platform economics and traditionally conservative industries. Prior to this, Adrian was co-founder and CEO of smart phone and Internet of Things security company Mocana Corporation, had profit and loss responsibility for Philips Electronics connected devices infrastructure, and was Chairman of the Board for Australia’s expat network, Advance.org. He is regarded as a thought leader on entrepreneurialism, Internet of Things and the impact of network connectivity on business economics.
 Speaker Maarten Van Horrenbeeck
Maarten Van Horenbeeck (twitter: @maartenvhb) is Vice President of Security Engineering at Fastly, the Content Delivery Network that speeds up web properties around the world. He is also Board member, and former Chairman, of the Forum of Incident Response and Security Teams (FIRST), the largest association of security teams, counting 300 members in over 70 countries. Prior to his work at Fastly, Maarten managed the Threat Intelligence team at Amazon, and worked on the security teams at Google and Microsoft. Maarten has a master’s degree in Information Security from Edith Cowan University, and a Masters degree in International Relations from the Freie Universitat Berlin. When not working, he enjoys backpacking, sailing and collecting first edition travel literature.
Speaker Shaun Vlassis
Shaun Vlassis is the Director of the Detection Cloud at Salesforce.com. Other than coming up with team names that make perfect sense internally, his team focuses on the creation and management of detection capabilities to identify attacks against Salesforce infrastructure and its customers. Before Salesforce, Shaun worked in the banking sector where he focussed on battling fraud groups that utilized Malware to target Australian citizens. In his spare time Shaun is a volunteer with the Shadowserver Foundation, a US based non-profit dedicated to keeping the internet safe, a regular speaker at security events and was awarded the AusCERT national ‘Award for Individual Excellence in the field IT Security’.
 Speaker Brett Williams
Brett is an Information Security Professional and is widely recognised for his extensive and in-depth knowledge of the IT security landscape. Brett has over 25 years experience working in IT infrastructure and Security with a focus on incident response, advanced threat detection, security operations and digital forensics.
Speaker Ben Wilson
Ben Wilson, is an Intelligence Analyst working for FireEye, tracking threats actors and their TTPs through various collection methods, and using that insight to drive strategies, tools, and methodologies to enable better detection and response for FireEye and their customers.
Prior to FireEye, Ben worked as a security consultant for Microsoft’s InfoSec ACE team.
Andrew Wurster
Andrew is a Team Lead for Atlassian’s Security Intelligence team, where he builds new intel capabilities to help protect Atlassian and their customers. Andrew hails from the gym’ed tanned and laundered shores of New Jersey, currently living in Sydney. He is passionate about working with others and travelling the world.
Speaker Joseph Yuen
Joseph been working as a researcher in the cyber and electronic warfare division of Defence Science and Technology Group for 4 years, with subject matter expertise in cyber red teaming, artificial intelligence and visual analytics. He is also completing a PhD with UNSW in this area of research.
Speaker Alex Zelinsky
Dr Alex Zelinsky was appointed Chief Defence Scientist and head of Defence Science and Technology Organisation (now Defence Science and Technology Group) in March 2012. Dr Zelinsky researched in robotics and computer vision at the AIST Electrotechnical Laboratory in Japan and has taught and conducted research in computer science at the University of Wollongong, New South Wales, Australia. He started his career as a Systems Engineer with BHP Steel International. In 2009, Engineers Australia named Dr Zelinsky Professional Engineer of the Year (Sydney Division) and he has been included in Engineers Australia’s list of the 100 most influential engineers since that year. He subsequently received the Engineers Australia M A Sargent Medal 2015 – the most prestigious award made by the College of Electrical Engineers. In 2013 he was awarded the prestigious Pearcey Medal, the ICT industry’s premier prize for lifetime achievement.
Speaker Liming Zhu
Prof Liming Zhu is the Research Director of Software and Computational Systems Research Program at Data61, CSIRO. He holds conjoint full professor position at University of New South Wales (UNSW). His research program has more than 200 people innovating in the area of (big) data platforms and cyber security. He has published more than 150 academic papers on software architecture, dependable and secure systems and data analytics infrastructure. His recent book is DevOps: A Software Architect’s Perspective.