Invited Presentations

Home || Publications || Media: In the News || Invited Presentations || Professional Activities

Invited Presentations

 

One Plenary Speech

12 Keynote Speeches

One Distinguished Lecture

 

 

1.        Choo K-K R 2017. Keynote Speaker. International Workshop on Security, Privacy, and Trustworthiness in Medical Cyber-Physical Systems (MedSPT 2017), in conjunction with IEEE/ACM CHASE 2017, Philadelphia, USA, 17–19 July

2.        Choo K-K R 2017. Blue Ribbon Panelist. National Workshop on Redefining Cyber Forensics (NWRCF 2017), New Haven, USA, 23–24 May

3.        Choo K-K R 2017 Data, data, data: Getting to, Making Sense of, and Using or Exploiting Data. Syracuse University, NY, USA, 26 April

4.        Choo K-K R 2016 Cyber Security: Identification, Exploitation, Mitigation and Investigation. Wuhan University, Wuhan, China, 5 December

5.        Choo K-K R 2016 Cyber Security: Identification, Exploitation, Mitigation and Investigation. Hunan University of Science and Technology, Hunan, China, 3 December

6.        Choo K-K R 2016 Cyber Security: Identification, Exploitation, Mitigation and Investigation. Huazhong University of Science & Technology, Wuhan, China, 1 December

7.        Choo K-K R 2016 Cyber Security: Identification, Exploitation, Mitigation and Investigation. China University of Geosciences, Wuhan, China, 30 November

8.        Choo K-K R 2016. Cyber Security: Identification, Exploitation, Mitigation and Investigation. East China Normal University, Shanghai, China, 24 November

9.        Choo K-K R 2016. Distinguished Speaker. International Summer School on Computational Forensics (SuCoFo 2016), Norwegian University of Science and Technology, Gjevik, Norway, September

10.     Choo K-K R 2016. Big forensic data. Cyber Security Winter School, Deakin University, Melbourne, Australia, 7-8 July

11.     Choo K-K R 2016. Opening Session Keynote Speaker. Data exfiltration and collection from mobile and cloud. SERENE-RISC Spring 2016 Workshop, Vancouver BC, Canada, 27–28 April

12.     Choo K-K R 2015. Opening Keynote Speaker. Big forensic data challenges and future research directions. IEEE International Conference on Data Science and Data Intensive Systems (DSDIS 2015), Sydney, Australia, 11–13 December

13.     Choo K-K R 2015. Opening Keynote Speaker. Cloud security. Cloud Security Alliance New Zealand Summit (CSA NZ 2015), Wellington, New Zealand, 27 November

14.     Choo K-K R 2015. Cyber security and forensic research. Sun Yat-sen University (中山大学), FuZhou, China, 20 November

15.     Choo K-K R 2015. Cyber security and forensic research. Jinan University (暨南大学), FuZhou, China, 20 November

16.     Choo K-K R 2015. Cyber security and forensic research. Guangzhou University (广州大学), GuangZhou, China, 19 November

17.     Choo K-K R 2015. Cyber security and forensic research. Fujian Normal University (福建师范大学), FuZhou, China, 12 November

18.     Choo K-K R 2015. A Forensically Sound Adversary Model for Mobile Devices. University of Electronic Science and Technology of China (电子科技大学), ChengDu, China, 4 November

19.     Choo K-K R 2015. Covert data exfiltration from mobile devices. University of Electronic Science and Technology of China (电子科技大学), ChengDu, China, 2 November

20.     Choo K-K R 2015. Cyber security and forensic research. Hangzhou Dianzi University (杭州电子科技大学), HangZhou, China, 30 October

21.     Choo K-K R 2015. Cyber security and forensic research. Zhejiang GongShang University (浙江工商大学), HangZhou, China, 29 October

22.     Choo K-K R 2015. Cyber security and forensic research. Third Research Institute of China's Ministry of Public Security (公安部第三研究所), Shanghai, China, 28 October

23.     Choo K-K R 2015. Keynote Speaker. Cloud forensics: Challenges and opportunities. International Conference on Cloud Computing Research and Innovation (ICCCRI 2015), Singapore, 26–27 October, Co-organised by Infocomm Development Authority of Singapore

24.     Choo K-K R 2015. The use of data collection and exfiltration techniques in counter terrorism investigations. 2015 Taiwan International Symposium on Regional Security and Transnational Crimes, Taiwan, 18–23 October, Organised by Ministry of Justice Investigation Bureau

25.     Choo K-K R 2015. Keynote Speaker. Evidence / data collection for organisational cloud service users: Why and how?. CSO CXO Series Breakfast Event, Melbourne, Australia, 30 July, Organised by CSO Australia and Trend Micro

26.     Choo K-K R 2015. Keynote Speaker. Evidence / data collection for organisational cloud service users: Why and how?. CSO CXO Series Breakfast Event, Sydney, Australia, 31 July, Organised by CSO Australia and Trend Micro

27.     Choo K-K R 2015. Panel Discussion: Cloud forensics. ASEAN Cloud Security Alliance (CSA) Summit 2015, Bangkok, Thailand, 11–12 June

28.     Choo K-K R 2015. Data collection and exfiltration: Challenges and opportunities. Mahidol University, Thailand, 9 June

29.     Choo K-K R 2015. Invited Lecture. United Nations Asia and Far East Institute for the Prevention of Crime and the Treatment of Offenders (UNAFEI) Criminal Justice (Focus on Investigation, Prosecution, Adjudication, and International Cooperation)J15-04250Training, UNAFEI, Tokyo, Japan, 10 May–18 June

30.     Choo K-K R 2015. The evolving cyberthreat landscape: Challenges and future research direction. College of Economics, Nihon University, Japan, 26 May

31.     Choo K-K R 2015. Invited Lecture. Data collection and exfiltration, Deakin University, 14 May

32.     Choo K-K R 2015. Workshop Facilitator: Cyber Intelligence: Collation and Analytics Tools and Techniques for Cyber Resilience. Cyber Resilience in Financial Institutions, Hilton, Singapore, 9–11 March

33.     Choo K-K R 2015. Invited Lecture. INTERPOL Cyber Research Agenda Workshop,  INTERPOL Global Complex for Innovation, Singapore, 10 March

34.     Choo K-K R 2014. Invited Lecture: Cloud and mobile security and forensics. Cyber Wargame Centre, Singapore Polytechnic, 10 December

35.     Choo K-K R 2014. Workshop Faculty Director. Cloud Security: Exhilaration of Opportunities / Future Trends and Opportunities, Singapore, 8-9 December

36.     Choo K-K R 2014. Cloud and mobile security and forensics: Challenges and future research directions. Multimedia University, Malaysia, 24 November

37.     Choo K-K R 2014. Cloud and mobile security and forensics: Challenges and future research directions. Shanghai Jiao Tong University, China, 21 November

38.     Choo K-K R 2014. Panel Discussion: Strengthen international cooperation to combat cyber-terrorism'. World Internet Conference (Wuzhen Summit), Jointly Organized by the Cyberspace Administration of China and the People's Government of Zhejiang Province, China, 19–21 November

39.     Choo K-K R 2014. Keynote Speaker. Cloud and Mobile Security: Challenges and Future Research Directions. The International Conference on Cyber-Crime Investigation and Cyber Security (ICCICS 2014), Asia Pacific University of Technology and Innovation (APU), Kuala Lumpur, Malaysia, 17–19 November

40.     Choo K-K R 2014. Are crypto-currencies potential money laundering / terrorism financing instruments?. SKBI Cryptocurrency Workshop 2014, Singapore Management University, Singapore, 5 November

41.     Choo K-K R 2014. Panel Discussion: Cryptocurrency: Financial market, innovation and analytics. Inaugural CAIA-SKBI Crypto-currency Conference 2014, Singapore Management University, Singapore, 4 November

42.     Choo K-K R 2014. Cybercrime and Digital Forensics. Australian Institute of Professional Intelligence Officers (AIPIO)’s Intelligence 2014 - "Concept to Reality", Stamford Grand Adelaide, Australia, 28 August

43.     Choo K-K R 2014. If your corporate mobile is lost, what can I know about you?. Digital Fraud in Corporate & Government, Melbourne, Australia, 27 August

44.     Choo K-K R 2014. Mobile cloud nexus: Challenges and future research directions. 19th Annual SimTecT Conference, Adelaide Convention Centre, Adelaide, Australia, 26 August

45.     Choo K-K R 2014. Invited Lecture: Cyber crime and mobile (in)security. Cyber Security for Analysts and Policy-makers Professional Development Program, Australian Graduate School of Policing and Security, Canberra, 18–20 August

46.     Choo K-K R 2014. Cyber security and digital forensics. International Conference on Cyber Crime – Jointly organised by United Nations Asia and Far East Institute (UNAFEI) and UAE Government, Abu Dhabi, United Arab Emirates, 23–25 June

47.     Choo K-K R 2014. Keynote Speaker. Digital forensics and electronic evidence: How can we communicate concepts clearly and effectively?. 2014 International Conference on Applied Linguistics & Language Teaching, National Taiwan University of Science and Technology, Taipei, Taiwan, 17–19 April

48.     Choo K-K R 2014. Technical Keynote Speaker. Cloud and Mobile Forensics. Anti-Phishing Working Group (APWG)’s Counter-eCrime Operations Summit (CeCOS VIII), Mira Hong Kong Hotel, Hong Kong, 8–10 April

49.     Choo K-K R 2014. Forensics and Incident Response in the Cloud. International Conference on Cyberlaw & Cybercrime, India International Centre (IIC), New Delhi, India

50.     Choo K-K R 2014. Mobile devices and their implications for forensic investigations in Australia. Police Technology Forum, Canberra, 12–13 March

51.     Choo K-K R 2014. Cyber crime and digital forensics. Dagstuhl Seminar,"Digital Evidence and Forensic Readiness", Leibniz Center for Informatics, 23–28 February

52.     Choo K-K R 2013. Panel Discussion: Technical measure to combat cybercrime. ANU Cybercrime Observatory Workshop 2013, Australian National University, Hotel Realm, Canberra, 7–8 November

53.     Choo K-K R 2013. Panel Discussion: The emerging trend of AML risk in the financial services industry?. 4th Pan-Asian Regulatory Summit, Ritz-Carlton, Millenia Singapore, 25–26 September

54.     Choo K-K R, Martini B and Quick D 2013. Cloud Forensics - Challenges for Investigators and Lawyers. Australian Association of Crown Prosecutors Conference 2013, the Royal Science Exchange, Adelaide, 3 – 5 July

55.     Choo K-K R 2013. Cloud Forensics. World Crime Forum: 1st Asian Regional Conference, Korean Institute of Criminology, Seoul, South Korea, 20 June

56.     Choo K-K R 2013. Crime in Cyberspace. Toorak Gardens Men's Probus Club, Adelaide, Australia, 4 June

57.     Choo K-K R 2013. Cloud (Storage) Forensics. Kaspersky Lab’s Cyber Security for the Next Generation – Asia Pacific & MEA Cup 2013, National University of Singapore, Singapore, 21–23 March

58.     Choo K-K R 2013. Panel Discussion: Can we keep up with the Cyber Arms Race?”. Kaspersky Lab’s Cyber Security for the Next Generation – Asia Pacific & MEA Cup 2013, National University of Singapore, Singapore, 21 – 23 March

59.     Martini B, Quick D and Choo K-K R 2012. Digital Forensics: The Implications of Cloud Computing. New South Wales Crime Commission, Sydney, Australia, 21 November

60.     Choo K-K R 2012. Cloud Forensics: The Need for an Evidence Based Framework. Cyber Security Law Australia 2012, Sydney Convention and Exhibition Centre, Australia, 12 September

61.     Choo K-K R 2012. Invited Lecture: Securing our cyber space and future. Bangladesh Institute of International and Strategic Studies, Dhaka, Bangladesh, 14 August

62.     Choo K-K R 2012. My life of in crime: From a police officer to international student to … cyber crime researcher. National Library of Australia 'Innovative Ideas Talk', Canberra, National Library of Australia, 23 May

63.     Choo K-K R 2012. Panel Discussion: Is the security forecast cloudy or is the worse yet to come?. Kaspersky Lab’s IT Security for the Next Generation - Asia Pacific & MEA Cup 2012, City University of Hong Kong, Hong Kong, 14–16 March

64.     Choo K-K R 2012. Cyber crime prevention strategies: A Routine Activity Theory approach. The Inaugural Cyber Crime Symposium, Sydney Harbour Marriott, Australia, 1–2 March

65.     Choo K-K R 2011. Transnational organized groups and Cybercrime. United Nations Office on Drugs and Crime–International Telecommunication Union (UNODC-ITU) Asia-Pacific Regional Workshop on Fighting Cybercrime, Supreme Prosecutors' Office, Seoul, Republic of Korea, 21–23 September

66.     Choo K-K R 2011. Cyberspace: Our new front-line. (Ministerial-level) Korea-Australia-New Zealand (KANZ) Broadband Summit 2011: Digital Futures, Hotel Grand Chancellor Hobart, Tasmania, Australia, 28–29 April

67.     Choo K-K R 2011. Keynote Speaker. Economic Crime Asia Conference, Nanyang Technological University, Singapore, 25–26 April

68.     Choo K-K R 2011. Panel Moderator: Cloud computing challenges and future directions. Cloud Computing Forum 2011, Hotel Realm Canberra, 23–24 February

69.     Lindley J & Choo K-K R 2010. Regulatory pluralism and defeating organised cyber fraud networks. 2nd Illicit Networks Workshop 2010, University of Wollongong, Australia, 6–7 December

70.     Choo K-K R 2010. Plenary Speaker: Does it matter how we describe cybercrime?. International Conference on Applied Linguistics 2010, National Chiayi University, Taiwan, 26–27 November

71.     Choo K-K R 2010. The organised cyber crime threat landscape. CPA congress, Adelaide Convention Centre, Adelaide, 5 November

72.     Choo K-K R 2010. The organised cybercrime threat landscape. International Serious and Organised Crime Conference 2010, Melbourne Convention Centre, 18–19 October

73.     Choo K-K R 2010. The evolving cyberthreat landscape. GovernmentWare 2010 conference, Suntec Singapore International Convention & Exhibition Centre, Singapore, 28–30 September

74.     Choo K-K R 2010. Is a PhD (in IT) for everyone?. Australian Computer Society’s Young IT in the Pub, The Academy Club, Canberra, 27 August

75.     Choo K-K R 2010. Online child exploitation. Presentation to JERA International & Convention on the Elimination of all forms of Discrimination Against Women (CEDAW) implementation program in China delegations, Australian Institute of Criminology, 4 August

76.     Choo K-K R 2010. Cybercrime 101. AIC student criminology forum 2010, Australian Institute of Criminology, 30 July

77.     Choo K-K R 2010. Challenges in regulating politically exposed persons. Presentation to Commonwealth Government Anti-Corruption Discussion, Australian Government Attorney-General's Department, 22 March.

78.     Choo K-K R 2010. The Cyber Crime Threat Environment. National Security Australia 2010 Conference, Sydney, 25–26 February

79.     Choo K-K R 2009. Cybercrime research: An overview.  Palo Alto Research Center (PARC), 21 October

80.     Choo K-K R 2009. Criminal exploitation of ICT for grooming children for sexual offences.  Centre international de criminologie comparée, Université de Montréal, 8 October

81.     Choo K-K R 2009. High tech crime research. Presentation to Ministry of Public Security of the People’s Republic of China delegation, Australian Institute of Criminology, 3 July

82.     Choo K-K R 2009. Anti-Money Laundering / Counter-Terrorism Financing research. Presentation to Taiwan's Public Prosecutors delegation, Australian Institute of Criminology, 1 July

83.     Choo K-K R & Russell RG 2009. Nature and extent of syntactic and semantic of online personal fraud attacks. 2009 Online Fraud & E-Crime Forum, Sydney, 23–24 June

84.     Choo K-K R 2009. Criminal exploitation of ICT for child abuse. Presentation to The Hon Sussan Ley MP Shadow Minister for Justice and Customs, Australian Institute of Criminology, 23 June

85.     Choo K-K R 2009. Criminal exploitation of social networking for online child grooming. Australian High Tech Crime Conference 2009, University of Technology Sydney, 9–11 June

86.     Choo K-K R 2009. Organised crime groups in cyberspace: a typology. National Security Australia Conference 2009, Sydney, 23–24 March

87.     Choo K-K R 2009. High tech criminal threats to the national Information Infrastructure. Global Security Asia 2009, Singapore, 17–19 March

88.     Choo K-K R 2008. Politically exposed persons (PEPs): risk and mitigation. 2008 Conference on Criminal Problems and Intervention Strategy (2008年犯罪問題與對策國際研討會), Department of Criminology, National Chung-Cheng University (国立中正大学犯罪学研究所), Taipei, Taiwan, 22–23 November

89.     Choo K-K R 2008. Anti-money laundering and counter terrorism financing research. Information Security Institute workshop, Queensland University of Technology, Brisbane, Australia, 19 November

90.     Choo K-K R 2008. Keynote Speaker:  Criminal exploitation of ICT for child abuse. 2008 Conference on Criminal Problems and Intervention Strategy (2008年保護兒少上網安全國際研討會), End Children Prostitution, Child Pornography & trafficking of Children for Sexual Purposes (ECPAT) Taiwan (台灣終止童妓協會), Taiwan, 6–7 November

91.     Choo K-K R 2008. The use of technology to facilitate the transfer/flow of funds. China Anti-Money Laundering Monitoring and Analysis Center (中国反洗钱监测分析中心), Beijing, China, 8 April

92.     Choo K-K R 2008. Anti-money laundering and counter terrorism financing research. Department of Criminology, National Chung-Cheng University (国立中正大学犯罪学研究所), Taipei, Taiwan, 19 March

93.     Choo K-K R 2008. The cyber crime in and from China. National Security Australia Conference 2008, Sydney, 6–7 March

94.     Choo K-K R 2007. The use of technology to facilitate the transfer/flow of funds. Presentation to the “Proceeds of Crime Working Group” at Australian Federal Police Sydney Headquarters, Australia, 27 November

95.     Choo K-K R 2007. Criminal exploitation of online systems by organised crime groups. Organised Crime in Asia: Governance and Accountability colloquium, Singapore, 28–29 June

Comments