ROCCON 2024

20 Aug Brisbane, AUS
Inspiring and informative talks from some of the world's brightest minds in physical cybersecurity

About ROCCON

We see a future where land, air, sea, space, cognitive, and biotechnological industries are well supported to make the Australian digital world safer.
Our vision is simple: to help everyone grow and protect against online threats. We're here to make sure that cyber professionals and those who need their support can easily connect, creating a strong and united community that keeps our digital spaces secure and thriving.

Event Starts In:

The Realms

Land
Sea
Air
Space
Biological
Cognitive

Previously

ROCCON ran our first conference in Brisbane. We established in August 2022 in response to a greater perceived need to explore and foster ethical security research into land, sea, air, and space vehicles.

Speakers

We have an exciting list of speakers rolling out for our 2024 show, check them out:
Kylie McDevitt
Chief Executive Officer
InfoSect
Read more →
Michael Creagh, PHD
Chief Executive Officer
Skyborne Technologies
Read more →
Anthony Caulfield
Associate Director and APAC Transport Security Lead
NCC
Read more →
Nicholas Lindsay
Former SpaceX Director of Spacecraft Production
Read more →
Sanja Marais
Chief Technology and Security Officer
Aspen Medical
Read more →
Bradley Butler
Maritime Cybersecurity Expert
Mantel Group
Read more →
Chris Hockings
Chief Technology Officer
IBM Security Asia Pacific
Read more →
Chathura Abeydeera
Cyber and Space Intelligence Expert
KPMG Australia
Read more →
Samuel Kelly
Offensive Security Consultant
Sekuro
Read more →
Daniel Castillo
OT Cybersecurity Specialist
Read more →
Sadeed Tirmizey
Chief Information Security Officer
Seqwater
Read more →
Travis Quinn
Principal Security Architect
Tesserent
Read more →
Edward Farrell
Chief Executive Officer
Mercury Information Security Services
Read more →
Alex Tilley
APAC Intelligence and Research Head
Secureworks
Read more →
David Middleton
Head of Engineering
Innoflex Technologies
Read more →
James Carlopio
Co-founder & Director
Cultural Cyber Security
Read more →
Koh Eng Tay
Principal Advisor (Data Analysis)
Department of Transport and Main Roads
Read more →

MC

ROCCON 2024 will be hosted by Adam Green:
Adam Green
Founder and CISO
Green Cyber Consulting
Read more →

Schedule

8:00 - 9:00

Registration

9:00 - 9:15

Acknowledgement of Country and Opening Words

9:15 - 9:35

Secrets to Success in Dynamic Startups: Insights from SpaceX and Beyond

Space Realm
Join us for an insightful presentation by an aerospace engineer with experience in the US Navy and leading startup companies including SpaceX, Gilmour Space Technologies, and Hypersonix. Drawing on over a decade of experience in fast-paced start-ups, this talk will uncover the secrets to success in the dynamic startup environment and how these lessons can contribute to a safer and more secure digital world.

9:35 - 9:50

Enhancing Embedded Security Assessments

Multi Realm
IoT devices have become pervasive in the way we live and interact with the world. In order to provide security assessments on the wide variety of devices on the market, InfoSect has had to expand their capabilities. This talk will walk through InfoSect's improved process for performing security assessment on embedded devices.

9:50 - 10:05

Unlocking the Future: SDR Swiss Army Tools in Automotive Security

Land Realm
David's presentation delves into the change from physical penetration mechanisms to modern Software-Defined Radio (SDR) devices in the context of automotive security. As vehicles increasingly incorporate advanced technologies and connected features, the attack surface has expanded dramatically, exposing non-contact vulnerabilities that were once not realistic. The session will explore how SDR devices can be exploited to intercept keyless entry signals, manipulate vehicle systems, and hijack vehicle control networks.

10:05 - 10:20

Securing the Seas: From Pirate Threats to Cyber Attacks

Sea Realm
Join Brad for a session on the evolution of maritime security threats, where you will journey from traditional piracy to the emerging challenge of cyber attacks. Discover how the landscape of maritime security has transformed over the years and the innovative strategies being employed to combat these threats. Brad's talk will feature an in-depth case study on modern-day piracy defense and a detailed look into an onboard cyber assessment for a ship.

10:20 - 10:35

Minding the Gap Between Pentest Tooling and Railway Systems

Land Realm
Wireless networks used in the railway environment can make use of common standards and commodity hardware, others are customised and can seem invisible to our usual attack techniques. This presentation will discuss one such customisation, the challenges with using our standard pentest tooling, and how to better uncover and pentest these networks.

10:35 - 10:45

Group 1 Q&A Session

10:45 - 11:30

Morning Tea Break

11:30 - 11:45

Refactoring Security of the Internet to Achieve Quantum Safety

Multi Realm
Quantum computers are expected to revolutionise compute, not replacing contemporary systems, but augmenting for specific industry use cases where big data analytics with heavy factorial computation is required. Quantum computers are known to be capable of breaking traditional encryption, through Shor's algorithm. Moving to a Quantum safe world will require new capability, and a focus on quantum risk focus on data security.

In this session, Chris will talk through what this means for the world, and the timeframe that action will be required for every organisation, government and software/hardware suppliers.

11:45 - 12:00

Information Warfare

Cognitive Realm
Dr. Carlopio will discuss information warfare, from both the Nation-State sponsored and cybercrime perspectives, looking at recent examples, what we can expect in the not-too-distant future, and what we can do about it.

12:00 - 12:15

OT Systems Are Systems Too: Response Considerations to an Attack on an Industrial System

Multi Realm
Preparedness and response considerations to an attack (ransomware or more subtle) on crucial OT/industrial systems. Many considerations are identical to standard IT systems but some unique aspects and stakeholders need to be considered. A session designed to spur internal discussion as organisations plan.

12:15 - 12:25

Group 2 Q&A Session

12:25 - 12:30

Cooperative and Automated Vehicle Initiative (CAVI)

Land Realm
In the rapidly evolving landscape of transportation, automated vehicles (AVs) are at the forefront of innovation, promising significant safety and mobility benefits for Queenslanders. The Department of Transport and Main Roads (TMR) has been at the forefront of understanding the impacts and benefits of this technology on Queensland's roads and road users.

As the road safety regulator and responsible entity for physical and digital infrastructure, TMR has been proactive in preparing for the future through its Cooperative and Automated Vehicle Initiative (CAVI). This presentation will provide a brief overview of research prototype vehicles developed for the CAVI.

12:30 - 1:40

Lunch Break

1:40 - 1:55

Cyberwar

Multi Realm
How does conflict and cyber effects play out into the real world? Whilst a lot of theory, speculation and "Cyber is good children are our future" conceptual thinking plays out, there are some realities to appreciate if contention or outright conflict takes place. Edward will work through recent occurrence's in Ukraine, the influence conflict plays as well as technical appreciation for prospective scenarios that may exist in Australia and the Asia Pacific.

1:55 - 2:10

The Future of Vehicular Autonomy and Its Interplay with Critical Infrastructure Cybersecurity

Land Realm
Critical Infrastructure is often considered the backbone for essential services required for everyday life including energy, food, water, transport, communications, health, banking and finance.

With the emergence of Industry 4.0 and the advent of commodity vehicular automation, new security concerns emerge not only for auto manufacturers but also asset owners operating Critical Infrastructure. In a highly connected future, use-cases for integration (or interfacing) between vehicular systems and critical infrastructure introduce a range of new threat vectors for attackers to exploit. As a result, there is an increasing need for standardisation which demands these fields not be studied in isolation.

This talk covers an overview of the critical infrastructure space, a look into the history of connectivity in operational technology environments (and its security implications), and the relevance of critical infrastructure to autonomous vehicular systems in relevant sectors. Attendees will walk away with a deeper understanding of the interplay between critical infrastructure assets, vehicular systems, associated security implications, and proposed concepts for addressing security standardisation (and resilience) in these areas.

2:10 - 2:25

Cybers Beyond the Earth

Space Realm
As our reliance on space-based technologies expands, so does the urgency to protect these assets from evolving cyber threats. This will explore key challenges such as securing satellite communication networks, mitigating risks to orbital platforms, and defending against sophisticated cyber attacks targeting space infrastructure. In this climate, innovative approaches and strategies essential for building resilient and secure space systems. Get ready to uncover the complexities and advancements in safeguarding our national interests beyond Earth's atmosphere.

2:25 - 2:40

Cross-Domain Security in Converged IT/OT

Multi Realm
The industry is experiencing a shift away from isolated operational technology (OT) systems towards a model where those systems are integrated into the enterprise information technology (IT) environment. While this model has many advantages, bridging IT and OT domains also invites new threats that challenge our existing security methods. Specifically, the convergence of IT and OT challenges how we perform and secure cross-domain communications.

Many organisations lack the knowledge, expertise and technical rigour required to do cross-domain security effectively. This presentation explores the problem of cross-domain security in converged IT/OT by first defining the problem, then describing the requirements and components of a cross-domain solution (CDS) for converged IT/OT, and finally, providing a CDS reference architecture for converged IT/OT based on best practice from industry and government.

2:40 - 2:50

Group 3 Q&A Session

2:50 - 3:45

Afternoon Tea Break

3:45 - 4:00

Safeguarding Operational Technology Against Cyber Risks

Multi Realm
Sadeed will discuss "Safeguarding Operational Technology (OT) Against Cyber Risks," focusing on key challenges and opportunities. As user bases and system types expand, securing diverse OT/IT environments becomes essential. Digital transformation demands secure, adaptable services, while interconnected supply chains and advanced cyber threats add risks. Navigating evolving government legislation and regulatory requirements is crucial for compliance. The session will outline a comprehensive risk management approach, including risk assessment, identification, mitigation, and continuous monitoring. It will highlight effective incident response planning, robust employee training, and awareness programs. Frameworks like NIST and ISO/IEC 27001 will guide best practices, emphasising compensating controls and advanced continuous monitoring tools to proactively identify and mitigate threats.

4:00 - 4:15

Guardians of the Health Tech Galaxy: Cybersecurity Edition

Biological Realm
Join Sanja for a thrilling adventure as we explore “Guardians of the Health Tech Galaxy: Cybersecurity Edition." She'll delve into what happens when medical devices go rogue, how transcriptions can get lost in translation, why health data is the new oil, and savvy strategies to outsmart cyber villains. Let's gaze into the future with AI, blockchain, and quantum computing, and see how these innovations are shaping the next frontier of cybersecurity in healthcare.

4:15 - 4:30

CAN Bus Hacking

Land Realm
Sam will dive into the fascinating world of CAN Bus hacking. Despite the Controller Area Network (CAN) protocol being around since the 1980s, it remains a daunting challenge for backyard mechanics and cybersecurity red teamers alike.

In this presentation, Sam will guide you through the process of procuring and reverse engineering unknown data on a vehicle's CAN Bus. Learn how attackers might exploit this information to bypass security controls and how entrepreneurs could develop vehicle-specific products for the market. Plus, for the sheer fun of it, discover how Sam made his car run DOOM.

Join Sam for an insightful and entertaining look into the world of automotive cybersecurity and innovation.

4:30 - 4:45

Cerberus MI Kinetic Effects with AI Targeting

Air Realm
The Cerberus MI UAS is a man-packable, lethal 22 kg sUAS. Armed with a 40mm Low velocity grenade launcher, 12 Ga shotgun, 5.7 x 28mm Submachine gun or M72 LAW, it is intended to be used at the Company and platoon level to provide organic, direct aerial fire support.

The Cerberus MI supports onboard AI target recognition (by Athena AI) which enables “slew-to-cue” semi-automated targeting. This has been demonstrated in live fire exercises to the USMC, ADF and US Army. The Cerberus MI is a modular payload to enable integration of a variety of kinetic and non-kinetic payloads for operation flexibility.

This presentation will address the current state of the Cerberus and its targeting system (including limitations) and cyber resilience strategies employed.

4:45 - 4:55

Group 4 Q&A Session

4:55 - 5:00

Closing Words

5:00 - 6:30

Networking Session and Closing Reception

Tickets

Super Early Bird

25% Discount
Purchase before 1st June using our discount code.

Early Bird

10% Discount
Purchase before 1st July. Limited tickets available.

Regular

$125
Our standard ticket with entrance to the show.

VIP Tickets

$350
Get access to our VIP tables, private catered section, and VIP breakout area. All discount codes apply.

Venue

How To Get Here

Brisbane Powerhouse is an iconic venue only 20 minutes from the Airport and 400 metres from Public Transport! It is a magnificent power station of the 1920s reborn as Queensland's home of contemporary art and culture located along the Brisbane River (Maiwar) on Yagara Country. We think it's a perfect location to be hosting Brisbane's pure cyberphysical conference.

Google Maps

Sponsors & Partners

Realms of Cyber is proudly supported by the Queensland Government.

We also work closely with all of our other generous sponsors to make ROCCON 2024 a reality. If you're interested in becoming a sponsor, get in touch below!

Platinum

Queensland Government

Gold

Tayko Group
EAGLEGATE Lawyers

Silver

Sekuro
Redwood Consulting
Tarian Cyber
Decipher Bureau
Adrenalan
Infotrust

Bronze

AusCERT
Payatu
Jepsec
Baidam Solutions
elttam
Radiant Security
ZEV Integrations
Griffith University
Galah Cyber
Netskope
Tom Shaw
Jypra Group
Volkis
SecAlerts
CYBERON
Hudson
IBM
Acumenis
Orca Cyber Solutions