That's a wrap for ROCC24!

A huge thanks to our speakers, and attendees for an incredible day at Brisbane Powerhouse.

ROCC24 Archive

28 Aug Brisbane, AUS
View the speakers and schedule from Realms of Cyber Conference 2024

About Realms of Cyber Conference

ROCC is a high-impact, one-day conference bringing together cutting-edge presentations, live technology demonstrations, and meaningful networking opportunities - all set in the inspiring surrounds of the iconic Brisbane Powerhouse.
Focused on operational security across physical domains - Land, Sea, Air, Space, Biological, and Cognitive - ROCC is dedicated to advancing Australia’s OT and cyber-physical resilience.
Attendees can explore multiple streams of expert talks, get hands-on with interactive tech displays, and connect in curated social spaces designed to spark real conversations and collaboration.

The Realms

Land
Sea
Air
Space
Biological
Cognitive

Highlights

Photo 1
Photo 2
Photo 3
Photo 4
Photo 5
Photo 6

ROCC24 Speakers

View the speakers from Realms of Cyber Conference 2024
Kylie McDevitt
Chief Executive Officer
InfoSect
Read more →
Michael Creagh, PHD
CEO
Skyborne Technologies
Read more →
Anthony Caulfield
Associate Director and APAC Transport Security Lead
NCC
Read more →
Nicholas Lindsay
Former SpaceX Director of Spacecraft Production
MATES Ventures
Read more →
Sanja Marais
Chief Technology and Security Officer
Aspen Medical
Read more →
Bradley Butler
Maritime Cybersecurity Expert
Mantel Group
Read more →
Chris Hockings
Chief Technology Officer
IBM Security Asia Pacific
Read more →
Chathura Abeydeera
Cyber and Space Intelligence Expert
KPMG Australia
Read more →
Samuel Kelly
Offensive Security Consultant
Sekuro
Read more →
Daniel Castillo
OT Cybersecurity Specialist
Read more →
Sadeed Tirmizey
Chief Information Security Officer
Seqwater
Read more →
Travis Quinn
Principal Security Architect
Tesserent
Read more →
Edward Farrell
Chief Executive Officer
Mercury Information Security Services
Read more →
Alex Tilley
APAC Intelligence and Research Head
Secureworks
Read more →
David Middleton
Head of Engineering
Innoflex Technology
Read more →
James Carlopio
Co-founder & Director
Cultural Cyber Security
Read more →
Koh Eng Tay
Principal Advisor (Data Analysis)
Department of Transport and Main Roads
Read more →

ROCC24 hosted by
Adam Green
Founder and CISO
Green Cyber Consulting
Read more →

Schedule - ROCC24

8:00 - 9:00

Registration

9:00 - 9:15

Opening Words

9:15 - 9:35

Secrets to Success in Dynamic Startups: Insights from SpaceX and Beyond

Space Realm
Join us for an insightful presentation by an aerospace engineer with experience in the US Navy and leading startup companies including SpaceX, Gilmour Space Technologies, and Hypersonix. Drawing on over a decade of experience in fast-paced start-ups, this talk will uncover the secrets to success in the dynamic startup environment and how these lessons can contribute to a safer and more secure digital world..

9:35 - 9:50

Enhancing Embedded Security Assessments

Multi Realm
IoT devices have become pervasive in the way we live and interact with the world. In order to provide security assessments on the wide variety of devices on the market, InfoSect has had to expand their capabilities. This talk will walk through InfoSect's improved process for performing security assessment on embedded devices.

9:50 - 10:05

Unlocking the Future: SDW Swiff Army Tools in Automotive Security

Land Realm
This presentation delves into the change from physical penetration mechanisms to modern Software-Defined Radio (SDR) devices in the context of automotive security. As vehicles increasingly incorporate advanced technologies and connected features, the attack surface has expanded dramatically, exposing non-contact vulnerabilities that were once not realistic. The session will explore how SDR devices can be exploited to intercept keyless entry signals, manipulate vehicle systems, and hijack vehicle control networks

10:05 - 10:20

Securing the Seas: From Pirate Threats to Cyber Attacks

Sea Realm
Join Brad for a session on the evolution of maritime security threats, where you will journey from traditional piracy to the emerging challenge of cyber attacks. Discover how the landscape of maritime security has transformed over the years and the innovative strategies being employed to combat these threats. Featuring an in-depth case study on modern-day piracy defense and a detailed look into an onboard cyber assessment for a ship.

10:20 - 10:35

Minding the Gap Between Pentest Tooling and Railway Systems

Land Realm
Wireless networks used in the railway environment can make use of common standards and commodity hardware, others are customised and can seem invisible to our usual attack techniques. This presentation will discuss one such customisation, the challenges with using our standard pentest tooling, and how to better uncover and pentest these networks.

10:35 - 10:45

Group 1 Q&A Session

10:45 - 11:30

Morning Tea Break

11:30 - 11:45

Refactoring Security of the Internet to Achieve Quantum Safety

Multi Realm
Quantum computers are expected to revolutionise compute, not replacing contemporary systems, but augmenting for specific industry use cases where big data analytics with heavy factorial computation is required. Quantum computers are known to be capable of breaking traditional encryption, through Shor's algorithm. Moving to a Quantum safe world will require new capability, and a focus on quantum risk focus on data security. In this session, Chris will talk through what this means for the world, and the timeframe that action will be required for every organisation, government and software/hardware suppliers.

11:45 - 12:00

Information Warfare

Cognitive Realm
Dr. Carlopio will discuss information warfare, from both the Nation-State sponsored and cybercrime perspectives, looking at recent examples, what we can expect in the not-too-distant future, and what we can do about it.

12:00 - 12:15

OT Systems Are Systems Too: Response Considerations to an Attack on an Industrial System

Multi Realm
Preparedness and response considerations to an attack (ransomware or more subtle) on crucial OT/industrial systems. Many considerations are identical to standard IT systems but some unique aspects and stakeholders need to be considered. A session designed to spur internal discussion as organisations plan.

12:25 - 12:30

Group 2 Q&A Session

12:30 - 1:40

Lunch Break

1:40 - 1:55

Cyberwar

Multi Realm
How does conflict and cyber effects play out into the real world Whilst a lot of theory, speculation and "Cyber is good children are our future" conceptual thinking plays out, there are some realities to appreciate if contention or outright conflict takes place. I wanted to work through recent occurrences in Ukraine, the influence conflict plays as well as technical appreciation for prospective scenarios that may exist in Australia and the Asia Pacific.

1:55 - 2:10

The Future of Vehicular Autonomy and Its Interplay with Critical Infrastructure Cybersecurity

Land Realm
Critical Infrastructure is often considered the backbone for essential services required for everyday life including energy, food, water, transport, communications, health, commodity vehicular automation, new security concerns emerge not only for auto manufacturers but also asset owners operating Critical Infrastructure. In a highly connected future, use-cases for integration (or interfacing) between vehicular systems and critical infrastructure introduce a range of new threat vectors for attackers to exploit. As a result, there is an increasing need for standardisation which demands these critical infrastructure space, a look into the history of connectivity in operational technology environments (and its security implications), and the relevance of critical infrastructure to autonomous vehicular systems in relevant sectors. Attendees will walk away with a deeper understanding of the interplay between critical infrastructure assets, vehicular systems, associated security implications, and proposed concepts for addressing security standardisation (and resilience) in these areas.

2:10 - 2:25

Cybers Beyond the Earth

Space Realm
As our reliance on space-based technologies expands, so does the urgency to protect these assets from evolving cyber threats. This will explore key challenges such as securing satellite communication networks, mitigating risks to orbital platforms, and defending against sophisticated cyber attacks targeting space infrastructure. In this climate, innovative approaches and strategies essential for building resilient and secure space systems. Get ready to uncover the complexities and advancements in safeguarding our national interests beyond Earth's atmosphere.

2:25 - 2:40

Cross-Domain Security in Converged IT/OT

Multi Realm
The industry is experiencing a shift away from isolated operational technology (OT) systems towards a model where those systems are integrated into the enterprise information technology (IT) environment. While this model has many advantages, bridging IT and OT domains also invites new threats that challenge our existing security methods. Specifically, the convergence of IT and OT challenges how we perform and secure cross-domain communications. Many organisations lack the knowledge, expertise and technical rigour required to do cross-domain security effectively. This presentation explores the problem of cross-domain security in onverged IT/OT by first defining the problem, then describing the requirements and components of a cross-domain solution (CDS) for converged IT/OT, and finally, providing a CDS reference architecture for converged IT/OT based on best practice from industry and government.

2:40 - 2:50

Group 3 Q&A Session

2:50 - 3:45

Afternoon Tea Break

3:45 - 4:00

Safeguarding Operational Technology Against Cyber Risks

Multi Realm
More details coming soon...

4:00 - 4:15

Guardians of the Health Tech Galaxy: Cybersecurity Edition

Biological Realm
Join me for a thrilling adventure as we explore "Guardians of the Health Tech Galaxy: Cybersecurity Edition." Diving into what happens when medical devices go rogue, how transcriptions can get lost in translation, why health data is the new oil, and savvy strategies to outsmart cyber villains. Let's gaze into the future with AI, blockchain, and quantum computing, and see how these innovations are shaping the next frontier of cybersecurity in healthcare.

4:15 - 4:30

CAN Bus Hacking

Land Realm
Despite the Controller Area Network (CAN) protocol being around since the 1980s, it remains a daunting challenge for backyard mechanics and cybersecurity red teamers alike. In this presentation, Sam will guide you through the process of procuring and reverse engineering unknown data on a vehicle's CAN Bus. Learn how attackers might exploit this information to bypass security controls and how entrepreneurs could develop vehicle-specific products for the market. Plus, for the sheer fun of it, discover how Sam made his car run DOOM.

4:30 - 4:45

Cerberus MI Kinetic Effects with AI Targeting

Air Realm
The Cerberus MI UAS is a man-packable, lethal 22 kg sUAS. Armed with a 40mm Low velocity grenade launcher, 12 Ga shotgun, 5.7 x 28mm Submachine gun or M72 LAW, it is intended to be used at the Company and platoon level to provide target recognition (by A thena AI) which enables "slew-to-cue" semi-automated targeting. This has been demonstrated in live fire exercises to the USMC, ADF and US Army. The Cerberus MI is a modular payload to enable integration of a variety of kinetic and address the current state of the Cerberus and its targeting system (including limitations) and cyber resilience strategies employed.

4:45 - 4:55

Group 4 Q&A Session

FAQ

I'm all in for ROCC26, when is it?

ROCC will be back at Brisbane Powerhouse in 2026, join our mailing list to be the first to know.

I'm interested in becoming a sponsor. How can I get involved?

We love working with sponsors to create partnerships that boost visibility and deliver real value and return on investment through a range of tailored sponsorship options.

I'm interested in presenting at ROCC25. How can I connect?

We'd love to hear from you! If you're interested in presenting, we welcome speakers who bring fresh perspectives, real-world experience, and a passion for advancing physical cyber security.