Invited Presentations

Home || Publications || Media: In the News || Invited Presentations || Professional Activities

Invited Presentations

 

One Plenary Speech

16 Keynote Speeches

 

1.        Choo K-K R 2018. Keynote Speaker. Internet of Battlefield Things: Challenges and Research Opportunities. 2018 World Congress on Information Technology Applications and Services, Jeju Island, South Korea, 20–22 February

2.        Choo K-K R 2017. Invited Lecture. Incident Handling and Forensics. Incident Handling and Forensics, India, 11 – 15 December (funded by the Indian Government’s Global Initiative of Academic Networks – GIAN)

3.        Choo K-K R 2017 Data, data, data: Getting to, Making Sense of, and Using or Exploiting Data. New Mexico Tech, NM, USA, 17 November

4.        Choo K-K R 2017. Keynote Speaker. Cloud of Things (In)Security: What are the Research Opportunities?. IEEE International Conference on Smart Cloud 2017 (SmartCloud 2017), New York, USA, 3–5 November

5.        Choo K-K R 2017. Keynote Speaker. Research Challenges and Opportunities in Big Digital Forensic Data. 9th ACM CCS International Workshop on Managing Insider Security Threats (MIST 2017 @ACM CCS), Dallas, USA, 30 October – 3 November

6.        Choo K-K R 2017. Keynote Speaker.  Internet of Medical Things: Security and Privacy Challenges and Research Opportunities. Keynote Speaker. Workshop on Security and Privacy in the Internet Of Things (SePrIoT 2017), in conjunction with EAI International Conference on Security and Privacy in Communication Networks, Niagara Falls, Canada, 22 –25 October

7.        Choo K-K R 2017. Keynote Speaker. Internet of Medical Things: Security and Privacy Challenges and Research Opportunities. International Workshop on Security, Privacy, and Trustworthiness in Medical Cyber-Physical Systems (MedSPT 2017), in conjunction with IEEE/ACM CHASE 2017, Philadelphia, USA, 17–19 July

8.        Choo K-K R 2017. Blue Ribbon Panelist. National Workshop on Redefining Cyber Forensics (NWRCF 2017), New Haven, USA, 23–24 May

9.        Choo K-K R 2017 Data, data, data: Getting to, Making Sense of, and Using or Exploiting Data. Syracuse University, NY, USA, 26 April

10.      Choo K-K R 2016 Cyber Security: Identification, Exploitation, Mitigation and Investigation. Wuhan University, Wuhan, China, 5 December

11.      Choo K-K R 2016 Cyber Security: Identification, Exploitation, Mitigation and Investigation. Hunan University of Science and Technology, Hunan, China, 3 December

12.      Choo K-K R 2016 Cyber Security: Identification, Exploitation, Mitigation and Investigation. Huazhong University of Science & Technology, Wuhan, China, 1 December

13.      Choo K-K R 2016 Cyber Security: Identification, Exploitation, Mitigation and Investigation. China University of Geosciences, Wuhan, China, 30 November

14.      Choo K-K R 2016. Cyber Security: Identification, Exploitation, Mitigation and Investigation. East China Normal University, Shanghai, China, 24 November

15.      Choo K-K R 2016. Distinguished Speaker. International Summer School on Computational Forensics (SuCoFo 2016), Norwegian University of Science and Technology, Gjevik, Norway, September

16.      Choo K-K R 2016. Big forensic data. Cyber Security Winter School, Deakin University, Melbourne, Australia, 7-8 July

17.      Choo K-K R 2016. Opening Session Keynote Speaker. Data exfiltration and collection from mobile and cloud. SERENE-RISC Spring 2016 Workshop, Vancouver BC, Canada, 27–28 April

18.      Choo K-K R 2015. Opening Keynote Speaker. Big forensic data challenges and future research directions. IEEE International Conference on Data Science and Data Intensive Systems (DSDIS 2015), Sydney, Australia, 11–13 December

19.      Choo K-K R 2015. Opening Keynote Speaker. Cloud security. Cloud Security Alliance New Zealand Summit (CSA NZ 2015), Wellington, New Zealand, 27 November

20.      Choo K-K R 2015. Cyber security and forensic research. Sun Yat-sen University, FuZhou, China, 20 November

21.      Choo K-K R 2015. Cyber security and forensic research. Jinan University, FuZhou, China, 20 November

22.      Choo K-K R 2015. Cyber security and forensic research. Guangzhou University, GuangZhou, China, 19 November

23.      Choo K-K R 2015. Cyber security and forensic research. Fujian Normal University, FuZhou, China, 12 November

24.      Choo K-K R 2015. A Forensically Sound Adversary Model for Mobile Devices. University of Electronic Science and Technology of China, ChengDu, China, 4 November

25.      Choo K-K R 2015. Covert data exfiltration from mobile devices. University of Electronic Science and Technology of China, ChengDu, China, 2 November

26.      Choo K-K R 2015. Cyber security and forensic research. Hangzhou Dianzi University, HangZhou, China, 30 October

27.      Choo K-K R 2015. Cyber security and forensic research. Zhejiang GongShang University, HangZhou, China, 29 October

28.      Choo K-K R 2015. Keynote Speaker. Cloud forensics: Challenges and opportunities. International Conference on Cloud Computing Research and Innovation (ICCCRI 2015), Singapore, 26–27 October, Co-organised by Infocomm Development Authority of Singapore

29.      Choo K-K R 2015. The use of data collection and exfiltration techniques in counter terrorism investigations. 2015 Taiwan International Symposium on Regional Security and Transnational Crimes, Taiwan, 18–23 October, Organised by Ministry of Justice Investigation Bureau

30.      Choo K-K R 2015. Keynote Speaker. Evidence / data collection for organisational cloud service users: Why and how?. CSO CXO Series Breakfast Event, Melbourne, Australia, 30 July, Organised by CSO Australia and Trend Micro

31.      Choo K-K R 2015. Keynote Speaker. Evidence / data collection for organisational cloud service users: Why and how?. CSO CXO Series Breakfast Event, Sydney, Australia, 31 July, Organised by CSO Australia and Trend Micro

32.      Choo K-K R 2015. Panel Discussion: Cloud forensics. ASEAN Cloud Security Alliance (CSA) Summit 2015, Bangkok, Thailand, 11–12 June

33.      Choo K-K R 2015. Data collection and exfiltration: Challenges and opportunities. Mahidol University, Thailand, 9 June

34.      Choo K-K R 2015. Invited Lecture. United Nations Asia and Far East Institute for the Prevention of Crime and the Treatment of Offenders (UNAFEI) Criminal Justice (Focus on Investigation, Prosecution, Adjudication, and International Cooperation)J15-04250Training, UNAFEI, Tokyo, Japan, 10 May–18 June

35.      Choo K-K R 2015. The evolving cyberthreat landscape: Challenges and future research direction. College of Economics, Nihon University, Japan, 26 May

36.      Choo K-K R 2015. Invited Lecture. Data collection and exfiltration, Deakin University, 14 May

37.      Choo K-K R 2015. Workshop Facilitator: Cyber Intelligence: Collation and Analytics Tools and Techniques for Cyber Resilience. Cyber Resilience in Financial Institutions, Hilton, Singapore, 9–11 March

38.      Choo K-K R 2015. Invited Lecture. INTERPOL Cyber Research Agenda Workshop,  INTERPOL Global Complex for Innovation, Singapore, 10 March

39.      Choo K-K R 2014. Invited Lecture: Cloud and mobile security and forensics. Cyber Wargame Centre, Singapore Polytechnic, 10 December

40.      Choo K-K R 2014. Workshop Faculty Director. Cloud Security: Exhilaration of Opportunities / Future Trends and Opportunities, Singapore, 8-9 December

41.      Choo K-K R 2014. Cloud and mobile security and forensics: Challenges and future research directions. Multimedia University, Malaysia, 24 November

42.      Choo K-K R 2014. Cloud and mobile security and forensics: Challenges and future research directions. Shanghai Jiao Tong University, China, 21 November

43.      Choo K-K R 2014. Panel Discussion: Strengthen international cooperation to combat cyber-terrorism'. World Internet Conference (Wuzhen Summit), Jointly Organized by the Cyberspace Administration of China and the People's Government of Zhejiang Province, China, 19–21 November

44.      Choo K-K R 2014. Keynote Speaker. Cloud and Mobile Security: Challenges and Future Research Directions. The International Conference on Cyber-Crime Investigation and Cyber Security (ICCICS 2014), Asia Pacific University of Technology and Innovation (APU), Kuala Lumpur, Malaysia, 17–19 November

45.      Choo K-K R 2014. Are crypto-currencies potential money laundering / terrorism financing instruments?. SKBI Cryptocurrency Workshop 2014, Singapore Management University, Singapore, 5 November

46.      Choo K-K R 2014. Panel Discussion: Cryptocurrency: Financial market, innovation and analytics. Inaugural CAIA-SKBI Crypto-currency Conference 2014, Singapore Management University, Singapore, 4 November

47.      Choo K-K R 2014. Cybercrime and Digital Forensics. Australian Institute of Professional Intelligence Officers (AIPIO)’s Intelligence 2014 - "Concept to Reality", Stamford Grand Adelaide, Australia, 28 August

48.      Choo K-K R 2014. If your corporate mobile is lost, what can I know about you?. Digital Fraud in Corporate & Government, Melbourne, Australia, 27 August

49.      Choo K-K R 2014. Mobile cloud nexus: Challenges and future research directions. 19th Annual SimTecT Conference, Adelaide Convention Centre, Adelaide, Australia, 26 August

50.      Choo K-K R 2014. Invited Lecture: Cyber crime and mobile (in)security. Cyber Security for Analysts and Policy-makers Professional Development Program, Australian Graduate School of Policing and Security, Canberra, 18–20 August

51.      Choo K-K R 2014. Cyber security and digital forensics. International Conference on Cyber Crime – Jointly organised by United Nations Asia and Far East Institute (UNAFEI) and UAE Government, Abu Dhabi, United Arab Emirates, 23–25 June

52.      Choo K-K R 2014. Keynote Speaker. Digital forensics and electronic evidence: How can we communicate concepts clearly and effectively?. 2014 International Conference on Applied Linguistics & Language Teaching, National Taiwan University of Science and Technology, Taipei, Taiwan, 17–19 April

53.      Choo K-K R 2014. Technical Keynote Speaker. Cloud and Mobile Forensics. Anti-Phishing Working Group (APWG)’s Counter-eCrime Operations Summit (CeCOS VIII), Mira Hong Kong Hotel, Hong Kong, 8–10 April

54.      Choo K-K R 2014. Forensics and Incident Response in the Cloud. International Conference on Cyberlaw & Cybercrime, India International Centre (IIC), New Delhi, India

55.      Choo K-K R 2014. Mobile devices and their implications for forensic investigations in Australia. Police Technology Forum, Canberra, 12–13 March

56.      Choo K-K R 2014. Cyber crime and digital forensics. Dagstuhl Seminar,"Digital Evidence and Forensic Readiness", Leibniz Center for Informatics, 23–28 February

57.      Choo K-K R 2013. Panel Discussion: Technical measure to combat cybercrime. ANU Cybercrime Observatory Workshop 2013, Australian National University, Hotel Realm, Canberra, 7–8 November

58.      Choo K-K R 2013. Panel Discussion: The emerging trend of AML risk in the financial services industry?. 4th Pan-Asian Regulatory Summit, Ritz-Carlton, Millenia Singapore, 25–26 September

59.      Choo K-K R, Martini B and Quick D 2013. Cloud Forensics - Challenges for Investigators and Lawyers. Australian Association of Crown Prosecutors Conference 2013, the Royal Science Exchange, Adelaide, 3 – 5 July

60.      Choo K-K R 2013. Cloud Forensics. World Crime Forum: 1st Asian Regional Conference, Korean Institute of Criminology, Seoul, South Korea, 20 June

61.      Choo K-K R 2013. Crime in Cyberspace. Toorak Gardens Men's Probus Club, Adelaide, Australia, 4 June

62.      Choo K-K R 2013. Cloud (Storage) Forensics. Kaspersky Lab’s Cyber Security for the Next Generation – Asia Pacific & MEA Cup 2013, National University of Singapore, Singapore, 21–23 March

63.      Choo K-K R 2013. Panel Discussion: Can we keep up with the Cyber Arms Race?”. Kaspersky Lab’s Cyber Security for the Next Generation – Asia Pacific & MEA Cup 2013, National University of Singapore, Singapore, 21 – 23 March

64.      Martini B, Quick D and Choo K-K R 2012. Digital Forensics: The Implications of Cloud Computing. New South Wales Crime Commission, Sydney, Australia, 21 November

65.      Choo K-K R 2012. Cloud Forensics: The Need for an Evidence Based Framework. Cyber Security Law Australia 2012, Sydney Convention and Exhibition Centre, Australia, 12 September

66.      Choo K-K R 2012. Invited Lecture: Securing our cyber space and future. Bangladesh Institute of International and Strategic Studies, Dhaka, Bangladesh, 14 August

67.      Choo K-K R 2012. My life of in crime: From a police officer to international student to … cyber crime researcher. National Library of Australia 'Innovative Ideas Talk', Canberra, National Library of Australia, 23 May

68.      Choo K-K R 2012. Panel Discussion: Is the security forecast cloudy or is the worse yet to come?. Kaspersky Lab’s IT Security for the Next Generation - Asia Pacific & MEA Cup 2012, City University of Hong Kong, Hong Kong, 14–16 March

69.      Choo K-K R 2012. Cyber crime prevention strategies: A Routine Activity Theory approach. The Inaugural Cyber Crime Symposium, Sydney Harbour Marriott, Australia, 1–2 March

70.      Choo K-K R 2011. Transnational organized groups and Cybercrime. United Nations Office on Drugs and Crime–International Telecommunication Union (UNODC-ITU) Asia-Pacific Regional Workshop on Fighting Cybercrime, Supreme Prosecutors' Office, Seoul, Republic of Korea, 21–23 September

71.      Choo K-K R 2011. Cyberspace: Our new front-line. (Ministerial-level) Korea-Australia-New Zealand (KANZ) Broadband Summit 2011: Digital Futures, Hotel Grand Chancellor Hobart, Tasmania, Australia, 28–29 April

72.      Choo K-K R 2011. Keynote Speaker. Economic Crime Asia Conference, Nanyang Technological University, Singapore, 25–26 April

73.      Choo K-K R 2011. Panel Moderator: Cloud computing challenges and future directions. Cloud Computing Forum 2011, Hotel Realm Canberra, 23–24 February

74.      Lindley J & Choo K-K R 2010. Regulatory pluralism and defeating organised cyber fraud networks. 2nd Illicit Networks Workshop 2010, University of Wollongong, Australia, 6–7 December

75.      Choo K-K R 2010. Plenary Speaker: Does it matter how we describe cybercrime?. International Conference on Applied Linguistics 2010, National Chiayi University, Taiwan, 26–27 November

76.      Choo K-K R 2010. The organised cyber crime threat landscape. CPA congress, Adelaide Convention Centre, Adelaide, 5 November

77.      Choo K-K R 2010. The organised cybercrime threat landscape. International Serious and Organised Crime Conference 2010, Melbourne Convention Centre, 18–19 October

78.      Choo K-K R 2010. The evolving cyberthreat landscape. GovernmentWare 2010 conference, Suntec Singapore International Convention & Exhibition Centre, Singapore, 28–30 September

79.      Choo K-K R 2010. Is a PhD (in IT) for everyone?. Australian Computer Society’s Young IT in the Pub, The Academy Club, Canberra, 27 August

80.      Choo K-K R 2010. Online child exploitation. Presentation to JERA International & Convention on the Elimination of all forms of Discrimination Against Women (CEDAW) implementation program in China delegations, Australian Institute of Criminology, 4 August

81.      Choo K-K R 2010. Cybercrime 101. AIC student criminology forum 2010, Australian Institute of Criminology, 30 July

82.      Choo K-K R 2010. Challenges in regulating politically exposed persons. Presentation to Commonwealth Government Anti-Corruption Discussion, Australian Government Attorney-General's Department, 22 March.

83.      Choo K-K R 2010. The Cyber Crime Threat Environment. National Security Australia 2010 Conference, Sydney, 25–26 February

84.      Choo K-K R 2009. Cybercrime research: An overview.  Palo Alto Research Center (PARC), 21 October

85.      Choo K-K R 2009. Criminal exploitation of ICT for grooming children for sexual offences.  Centre international de criminologie comparée, Université de Montréal, 8 October

86.      Choo K-K R 2009. High tech crime research. Presentation to Ministry of Public Security of the People’s Republic of China delegation, Australian Institute of Criminology, 3 July

87.      Choo K-K R 2009. Anti-Money Laundering / Counter-Terrorism Financing research. Presentation to Taiwan's Public Prosecutors delegation, Australian Institute of Criminology, 1 July

88.      Choo K-K R & Russell RG 2009. Nature and extent of syntactic and semantic of online personal fraud attacks. 2009 Online Fraud & E-Crime Forum, Sydney, 23–24 June

89.      Choo K-K R 2009. Criminal exploitation of ICT for child abuse. Presentation to The Hon Sussan Ley MP Shadow Minister for Justice and Customs, Australian Institute of Criminology, 23 June

90.      Choo K-K R 2009. Criminal exploitation of social networking for online child grooming. Australian High Tech Crime Conference 2009, University of Technology Sydney, 9–11 June

91.      Choo K-K R 2009. Organised crime groups in cyberspace: a typology. National Security Australia Conference 2009, Sydney, 23–24 March

92.      Choo K-K R 2009. High tech criminal threats to the national Information Infrastructure. Global Security Asia 2009, Singapore, 17–19 March

93.      Choo K-K R 2008. Politically exposed persons (PEPs): risk and mitigation. 2008 Conference on Criminal Problems and Intervention Strategy (2008年犯罪問題與對策國際研討會), Department of Criminology, National Chung-Cheng University (国立中正大学犯罪学研究所), Taipei, Taiwan, 22–23 November

94.      Choo K-K R 2008. Anti-money laundering and counter terrorism financing research. Information Security Institute workshop, Queensland University of Technology, Brisbane, Australia, 19 November

95.      Choo K-K R 2008. Keynote Speaker:  Criminal exploitation of ICT for child abuse. 2008 Conference on Criminal Problems and Intervention Strategy (2008年保護兒少上網安全國際研討會), End Children Prostitution, Child Pornography & trafficking of Children for Sexual Purposes (ECPAT) Taiwan (台灣終止童妓協會), Taiwan, 6–7 November

96.      Choo K-K R 2008. The use of technology to facilitate the transfer/flow of funds. China Anti-Money Laundering Monitoring and Analysis Center (中国反洗钱监测分析中心), Beijing, China, 8 April

97.      Choo K-K R 2008. Anti-money laundering and counter terrorism financing research. Department of Criminology, National Chung-Cheng University (国立中正大学犯罪学研究所), Taipei, Taiwan, 19 March

98.      Choo K-K R 2008. The cyber crime in and from China. National Security Australia Conference 2008, Sydney, 6–7 March

99.      Choo K-K R 2007. The use of technology to facilitate the transfer/flow of funds. Presentation to the “Proceeds of Crime Working Group” at Australian Federal Police Sydney Headquarters, Australia, 27 November

100.   Choo K-K R 2007. Criminal exploitation of online systems by organised crime groups. Organised Crime in Asia: Governance and Accountability colloquium, Singapore, 28–29 June

Comments