2022 Theme: Ethical and Responsible use of AI

Topics

Cyber Situational Awareness

  • Situational Awareness Assessments
  • Social Media Analysis, Collaborative Defense Approach
  • Cyber Situational Awareness Tools & Techniques
  • Network Situational Awareness
  • Human Factor Cognitive
  • National and Critical Infrastructure Security Issues
  • Situation Awareness in Military Operations
  • Cyber Situational Analytics
  • Cyber Situational Awareness Frameworks
  • Fusion Centres
  • Situational Awareness Applications
  • Cyber Situational Awareness Designs
  • Solutions and Services
  • Situational Awareness Training Cyber Attack Scenarios
  • Situation-Aware and Context-Aware Network Applications
  • Artificial Intelligence (AI)
  • Machine Learning & Deep Learning,
  • Ethics, Transparency and Trustworthy AI.

Artificial Intelligence & Robotics

  •  Predictive Data Analytics for Situation Awareness
  • Machine Learning for Cyber Situation Awareness
  • Artificial Intelligence for Cyber Situation Awareness
  • Artificial Intelligence & Machine Learning for Cybersecurity
  • Autonomous & Self-driving
  • Self-Healing, Domestic Assistance
  • Autonomous Healthcare and Assistance
  • Industrial Manufacturing Robotics
  • Search and Rescue Operations

Human Factor Cognition

  • Workload
  • Perception
  • Stress
  • Knowledge
  • Training and Expertise
  • Risk Assessment and Decision Making,
  • Forecasting and Prediction Operator SA & Team SA
  • Knowledge, Skills and Abilities (KSA)

Blockchain Technologies

  • Cryptocurrency
  • Regulation of Cryptocurrencies
  • Mechanisms to address Environmental
  • Social and Governance (ESG) concerns with Blockchain Technologies
  • Bitcoin & Bit-everything
  • Blockchain in Manufacturing,
  • Blockchain in Banking & Financial Systems,
  • Blockchain in Aviation
  • Blockchain in Pharmaceuticals
  • Blockchain in IoT
  • Blockchain in Defence
  • Blockchain in Cybersecurity Operations
  • Blockchain in Publications
  • Blockchain in Smart Contracts
  • Blockchain in the Energy Sector & Utilities

STEM & Cyber Security Education

  • Cyber Security in childhood education,
  • Code – Teaching Coding for Kids, Teens and Colleges
  • Secure by Code
  • Secure by Design
  • Secure by Default
  • Immersive learning for Cyber
  • Metaverse and Cybersecurity Education

Social Media, Wearable and Web Analytics

  • Advances in Social Media
  • Trust and privacy in Social Media
  • Social Medial Big Data Analysis
  • Social Network Analysis
  • Social Media Technologies Advances in Wearable
  • Wearable in e-Health
  • Wearable in Fitness
  • Wearable and Security
  • Trust and Privacy in Wearable
  • Wearable Technologies
  • Economic Importance of Wearable
  • Web Analytics & Cyber Intelligence
  • Advances in Web Analytics Web
  • Analytics for Law Enforcement and Security Monitoring
  • Legal Issues of Web Analytics
  • Law, Legislation and Compliance
  • Security, Trust, Privacy
  • Web Analytics for Business Intelligence
  • Responsible use of Social Media
  • Geolocation Content-Aware analytics
  • Digital Content
  • Customer-centric Analysis
  • Social Network Analysis
  • Cyber Intelligence

Cyber Security

  • Cyber Security
  • App Security
  • Mobile Security
  • Wireless & Sensor Network Security
  • Software Coding Security
  • Security Operations Centres
  • Digital Trust and Reputation
  • Geographical Location (IP Geolocation) and Cyber Travel
  • Geospatial Intelligence Networks (Centralised, Distributed & Hybrid)
  • Policy, Legal, Legislation & Compliance
  • Security Standardisation
  • Law, Legal and Ethics
  • Digital Services
  • Web Services
  • Cloud Computing
  • Intrusion Detection Systems
  • Protection of Digital Services
  • Security, Trust, Privacy, Security in Online Gaming Systems
  • Security in e-Government and Electoral Systems
  • Content Security
  • Protection of Public Online Content Distribution Systems
  • Secure practices, processes and procedures in Public Online Services
  • Cryptography
  • Digital Forensics and Investigations
  • HoneyPots and Honey Nets
  • Critical National Infrastructures (CNIs) and Blockchain Technologies

Application Container Platform Security

  • ACP
  • Container Technologies
  • Security Concerns Associated with Container Technologies
  • Apps, Cultural and Technical Processes for Managing Containers & Apps
  • Microservices
  • Kubernetes
  • Docker
  • Cloud Computing
  • Virtualisation (Network, OS, Container & Apps),
  • DevOps
  • API
  • HostOS
  • Container Technology Architecture
  • Approaches to Management, Maintenance and Processing of Containers
  • Apps and HostOS
  • CI/CD
  • Risks & Issues
  • OWASP
  • Open Web Application Security

Cyber Incident Response

  • Cyber Incident Analysis
  • Cyber Incident Correlation and Assessment,
  • Coordination, Containment
  • Root Cause Analysis (RCA)
  • Cyber Incident Management
  • Emergence Services
  • Preparedness & Readiness
  • Human in the Loop
  • Training, Processes and Procedures
  • Policy and Standards,
  • Emergency Services
  • Forensic Readiness and Investigations
  • Cyber Incident Notification and Announcements
  • Cyber Incident Management Tool, Framework and Methodology
  • Expertise, Skills, Knowledge and Resource
  • Maturity Model and Goal Setting
  • Certification and Accreditation
  • Cyber Incident Responders
  • Incident Response Organisation
  • Investigation Techniques – Rule-Based Systems & Expert Systems
  • Adaptive Learning Systems & Predictive Systems
  • The use of Biometrics to aid Forensic Investigations
  • Speak, audio and voice Recognition for forensics
  • Correlation and cross-correlation for Incident Analysis
  • Cross-Domain Analysis, Training, Processes and Procedures, Policy and Standards, Emergency Services
  • Chain of Custody, Forensic Readiness and Investigations
  • Cyber Incident Notification and Announcements
  • Cyber Incident Management Tool, Standardisation, Framework and Methodology
  • Expertise, Skills, Knowledge and Resource
  • Maturity Model and Goal Setting
  • Certification and Accreditation
  • Memberships to Cyber Incident Responders
  • Incident Response Organisation.