01 - 02 October, 2019 | Novotel Sydney Central, Sydney, Australia
Ernest Foo, Associate Professor at Griffith University

Ernest Foo


Associate Professor
Griffith University

Check out the incredible speaker line-up to see who will be joining Ernest.

Download The Latest Agenda

Interactive Workshops: Monday, 30 September 2019

Monday, September 30th, 2019


11:00 AM SECURING YOUR DIGITAL TWIN TECHNOLOGY AGAINST SAFETY THREATS

With the technology behind digital twins expanding to include buildings, smart cities and large-scale control systems, understanding the cyber risks involved in safeguarding this technology can revolve strongly around securing data within the cloud. 

With 62% of organisations implementing IoT either using or establishing digital twins, Ernest Foo, Associate Professor from Griffith University, will deliver an in-depth discussion for all ICS and IT practitioners either involved or considering implementing digital twins for their control systems.

This workshop will discuss the idea behind digital twin technology, as well as the security threats that are involved in its creation. From there he will discuss the resulting challenges if these digital technologies are unable to remain secure.

Key takeaways within this 2.5 hour workshop include: 
  • Understanding the potential security measures you would need to implement to secure your digital twin technology against cyber breaches
  • Determining how to mirror and diagnose problems within your control system through a fully digital simulation 
  • Picking a defensible framework that aligns with appropriate controls catalog based on scalable processes

Facilitator:

Conference Day One: Tuesday, 01 October 2019

Tuesday, October 1st, 2019


2:50 PM Demystifying Machine Learning Analytics for Threat Monitoring in Industrial Control Systems

This case study will look at how organizations can use machine learning capabilities to analyze large volumes of malicious and attack traffic. This in turn will help organisations determine the key characteristics that make malicious traffic unique.

  • Using machine learning to analyze data from a variety of sources over long periods of time
  • Delivering the ability to highlight anomalous behavior through legitimate business transactions
  • Continuous monitoring of unusual activity on the cyber network coupled with the ability to mitigate threats before they occur

Speaker:

Conference Day Two: Wednesday, 02 October 2019

Wednesday, October 2nd, 2019


1:20 PM Panel Discussion: What Does Australia Need to Do to Enhance the Resilience of Critical Infrastructure

This panel will host Risk and Resilience experts to discuss how Australia can enhance their critical security.

  • The challenges of securing the IT/OT environment while working with multiple vendors to adopt existing and new technologies
  • Balancing ease of use and accessibility and remote access demands in a multi-vendor environment 
  • Talking to your board to increase the level of security and potential funding

Panelists: