Invited Presentations

Home || Publications || Media: In the News || Invited Presentations || Professional Activities

Invited Presentations

 

One Plenary Speech

12 Keynote Speeches

One Distinguished Lecture

 

 

1.        Choo K-K R 2017. Keynote Speaker. International Workshop on Security, Privacy, and Trustworthiness in Medical Cyber-Physical Systems (MedSPT 2017), in conjunction with IEEE/ACM CHASE 2017, Philadelphia, USA, 17–19 July

2.        Choo K-K R 2017. Blue Ribbon Panelist. National Workshop on Redefining Cyber Forensics (NWRCF 2017), New Haven, USA, 23–24 May

3.        Choo K-K R 2016 Cyber Security: Identification, Exploitation, Mitigation and Investigation. Wuhan University, Wuhan, China, 5 December

4.        Choo K-K R 2016 Cyber Security: Identification, Exploitation, Mitigation and Investigation. Hunan University of Science and Technology, Hunan, China, 3 December

5.        Choo K-K R 2016 Cyber Security: Identification, Exploitation, Mitigation and Investigation. Huazhong University of Science & Technology, Wuhan, China, 1 December

6.        Choo K-K R 2016 Cyber Security: Identification, Exploitation, Mitigation and Investigation. China University of Geosciences, Wuhan, China, 30 November

7.        Choo K-K R 2016. Cyber Security: Identification, Exploitation, Mitigation and Investigation. East China Normal University, Shanghai, China, 24 November

8.        Choo K-K R 2016. Distinguished Speaker. International Summer School on Computational Forensics (SuCoFo 2016), Norwegian University of Science and Technology, Gjevik, Norway, September

9.        Choo K-K R 2016. Big forensic data. Cyber Security Winter School, Deakin University, Melbourne, Australia, 7-8 July

10.     Choo K-K R 2016. Opening Session Keynote Speaker. Data exfiltration and collection from mobile and cloud. SERENE-RISC Spring 2016 Workshop, Vancouver BC, Canada, 27–28 April

11.     Choo K-K R 2015. Opening Keynote Speaker. Big forensic data challenges and future research directions. IEEE International Conference on Data Science and Data Intensive Systems (DSDIS 2015), Sydney, Australia, 11–13 December

12.     Choo K-K R 2015. Opening Keynote Speaker. Cloud security. Cloud Security Alliance New Zealand Summit (CSA NZ 2015), Wellington, New Zealand, 27 November

13.     Choo K-K R 2015. Cyber security and forensic research. Sun Yat-sen University (中山大学), FuZhou, China, 20 November

14.     Choo K-K R 2015. Cyber security and forensic research. Jinan University (暨南大学), FuZhou, China, 20 November

15.     Choo K-K R 2015. Cyber security and forensic research. Guangzhou University (广州大学), GuangZhou, China, 19 November

16.     Choo K-K R 2015. Cyber security and forensic research. Fujian Normal University (福建师范大学), FuZhou, China, 12 November

17.     Choo K-K R 2015. A Forensically Sound Adversary Model for Mobile Devices. University of Electronic Science and Technology of China (电子科技大学), ChengDu, China, 4 November

18.     Choo K-K R 2015. Covert data exfiltration from mobile devices. University of Electronic Science and Technology of China (电子科技大学), ChengDu, China, 2 November

19.     Choo K-K R 2015. Cyber security and forensic research. Hangzhou Dianzi University (杭州电子科技大学), HangZhou, China, 30 October

20.     Choo K-K R 2015. Cyber security and forensic research. Zhejiang GongShang University (浙江工商大学), HangZhou, China, 29 October

21.     Choo K-K R 2015. Cyber security and forensic research. Third Research Institute of China's Ministry of Public Security (公安部第三研究所), Shanghai, China, 28 October

22.     Choo K-K R 2015. Keynote Speaker. Cloud forensics: Challenges and opportunities. International Conference on Cloud Computing Research and Innovation (ICCCRI 2015), Singapore, 26–27 October, Co-organised by Infocomm Development Authority of Singapore

23.     Choo K-K R 2015. The use of data collection and exfiltration techniques in counter terrorism investigations. 2015 Taiwan International Symposium on Regional Security and Transnational Crimes, Taiwan, 18–23 October, Organised by Ministry of Justice Investigation Bureau

24.     Choo K-K R 2015. Keynote Speaker. Evidence / data collection for organisational cloud service users: Why and how?. CSO CXO Series Breakfast Event, Melbourne, Australia, 30 July, Organised by CSO Australia and Trend Micro

25.     Choo K-K R 2015. Keynote Speaker. Evidence / data collection for organisational cloud service users: Why and how?. CSO CXO Series Breakfast Event, Sydney, Australia, 31 July, Organised by CSO Australia and Trend Micro

26.     Choo K-K R 2015. Panel Discussion: Cloud forensics. ASEAN Cloud Security Alliance (CSA) Summit 2015, Bangkok, Thailand, 11–12 June

27.     Choo K-K R 2015. Data collection and exfiltration: Challenges and opportunities. Mahidol University, Thailand, 9 June

28.     Choo K-K R 2015. Invited Lecture. United Nations Asia and Far East Institute for the Prevention of Crime and the Treatment of Offenders (UNAFEI) Criminal Justice (Focus on Investigation, Prosecution, Adjudication, and International Cooperation)J15-04250Training, UNAFEI, Tokyo, Japan, 10 May–18 June

29.     Choo K-K R 2015. The evolving cyberthreat landscape: Challenges and future research direction. College of Economics, Nihon University, Japan, 26 May

30.     Choo K-K R 2015. Invited Lecture. Data collection and exfiltration, Deakin University, 14 May

31.     Choo K-K R 2015. Workshop Facilitator: Cyber Intelligence: Collation and Analytics Tools and Techniques for Cyber Resilience. Cyber Resilience in Financial Institutions, Hilton, Singapore, 9–11 March

32.     Choo K-K R 2015. Invited Lecture. INTERPOL Cyber Research Agenda Workshop,  INTERPOL Global Complex for Innovation, Singapore, 10 March

33.     Choo K-K R 2014. Invited Lecture: Cloud and mobile security and forensics. Cyber Wargame Centre, Singapore Polytechnic, 10 December

34.     Choo K-K R 2014. Workshop Faculty Director. Cloud Security: Exhilaration of Opportunities / Future Trends and Opportunities, Singapore, 8-9 December

35.     Choo K-K R 2014. Cloud and mobile security and forensics: Challenges and future research directions. Multimedia University, Malaysia, 24 November

36.     Choo K-K R 2014. Cloud and mobile security and forensics: Challenges and future research directions. Shanghai Jiao Tong University, China, 21 November

37.     Choo K-K R 2014. Panel Discussion: Strengthen international cooperation to combat cyber-terrorism'. World Internet Conference (Wuzhen Summit), Jointly Organized by the Cyberspace Administration of China and the People's Government of Zhejiang Province, China, 19–21 November

38.     Choo K-K R 2014. Keynote Speaker. Cloud and Mobile Security: Challenges and Future Research Directions. The International Conference on Cyber-Crime Investigation and Cyber Security (ICCICS 2014), Asia Pacific University of Technology and Innovation (APU), Kuala Lumpur, Malaysia, 17–19 November

39.     Choo K-K R 2014. Are crypto-currencies potential money laundering / terrorism financing instruments?. SKBI Cryptocurrency Workshop 2014, Singapore Management University, Singapore, 5 November

40.     Choo K-K R 2014. Panel Discussion: Cryptocurrency: Financial market, innovation and analytics. Inaugural CAIA-SKBI Crypto-currency Conference 2014, Singapore Management University, Singapore, 4 November

41.     Choo K-K R 2014. Cybercrime and Digital Forensics. Australian Institute of Professional Intelligence Officers (AIPIO)’s Intelligence 2014 - "Concept to Reality", Stamford Grand Adelaide, Australia, 28 August

42.     Choo K-K R 2014. If your corporate mobile is lost, what can I know about you?. Digital Fraud in Corporate & Government, Melbourne, Australia, 27 August

43.     Choo K-K R 2014. Mobile cloud nexus: Challenges and future research directions. 19th Annual SimTecT Conference, Adelaide Convention Centre, Adelaide, Australia, 26 August

44.     Choo K-K R 2014. Invited Lecture: Cyber crime and mobile (in)security. Cyber Security for Analysts and Policy-makers Professional Development Program, Australian Graduate School of Policing and Security, Canberra, 18–20 August

45.     Choo K-K R 2014. Cyber security and digital forensics. International Conference on Cyber Crime – Jointly organised by United Nations Asia and Far East Institute (UNAFEI) and UAE Government, Abu Dhabi, United Arab Emirates, 23–25 June

46.     Choo K-K R 2014. Keynote Speaker. Digital forensics and electronic evidence: How can we communicate concepts clearly and effectively?. 2014 International Conference on Applied Linguistics & Language Teaching, National Taiwan University of Science and Technology, Taipei, Taiwan, 17–19 April

47.     Choo K-K R 2014. Technical Keynote Speaker. Cloud and Mobile Forensics. Anti-Phishing Working Group (APWG)’s Counter-eCrime Operations Summit (CeCOS VIII), Mira Hong Kong Hotel, Hong Kong, 8–10 April

48.     Choo K-K R 2014. Forensics and Incident Response in the Cloud. International Conference on Cyberlaw & Cybercrime, India International Centre (IIC), New Delhi, India

49.     Choo K-K R 2014. Mobile devices and their implications for forensic investigations in Australia. Police Technology Forum, Canberra, 12–13 March

50.     Choo K-K R 2014. Cyber crime and digital forensics. Dagstuhl Seminar,"Digital Evidence and Forensic Readiness", Leibniz Center for Informatics, 23–28 February

51.     Choo K-K R 2013. Panel Discussion: Technical measure to combat cybercrime. ANU Cybercrime Observatory Workshop 2013, Australian National University, Hotel Realm, Canberra, 7–8 November

52.     Choo K-K R 2013. Panel Discussion: The emerging trend of AML risk in the financial services industry?. 4th Pan-Asian Regulatory Summit, Ritz-Carlton, Millenia Singapore, 25–26 September

53.     Choo K-K R, Martini B and Quick D 2013. Cloud Forensics - Challenges for Investigators and Lawyers. Australian Association of Crown Prosecutors Conference 2013, the Royal Science Exchange, Adelaide, 3 – 5 July

54.     Choo K-K R 2013. Cloud Forensics. World Crime Forum: 1st Asian Regional Conference, Korean Institute of Criminology, Seoul, South Korea, 20 June

55.     Choo K-K R 2013. Crime in Cyberspace. Toorak Gardens Men's Probus Club, Adelaide, Australia, 4 June

56.     Choo K-K R 2013. Cloud (Storage) Forensics. Kaspersky Lab’s Cyber Security for the Next Generation – Asia Pacific & MEA Cup 2013, National University of Singapore, Singapore, 21–23 March

57.     Choo K-K R 2013. Panel Discussion: Can we keep up with the Cyber Arms Race?”. Kaspersky Lab’s Cyber Security for the Next Generation – Asia Pacific & MEA Cup 2013, National University of Singapore, Singapore, 21 – 23 March

58.     Martini B, Quick D and Choo K-K R 2012. Digital Forensics: The Implications of Cloud Computing. New South Wales Crime Commission, Sydney, Australia, 21 November

59.     Choo K-K R 2012. Cloud Forensics: The Need for an Evidence Based Framework. Cyber Security Law Australia 2012, Sydney Convention and Exhibition Centre, Australia, 12 September

60.     Choo K-K R 2012. Invited Lecture: Securing our cyber space and future. Bangladesh Institute of International and Strategic Studies, Dhaka, Bangladesh, 14 August

61.     Choo K-K R 2012. My life of in crime: From a police officer to international student to … cyber crime researcher. National Library of Australia 'Innovative Ideas Talk', Canberra, National Library of Australia, 23 May

62.     Choo K-K R 2012. Panel Discussion: Is the security forecast cloudy or is the worse yet to come?. Kaspersky Lab’s IT Security for the Next Generation - Asia Pacific & MEA Cup 2012, City University of Hong Kong, Hong Kong, 14–16 March

63.     Choo K-K R 2012. Cyber crime prevention strategies: A Routine Activity Theory approach. The Inaugural Cyber Crime Symposium, Sydney Harbour Marriott, Australia, 1–2 March

64.     Choo K-K R 2011. Transnational organized groups and Cybercrime. United Nations Office on Drugs and Crime–International Telecommunication Union (UNODC-ITU) Asia-Pacific Regional Workshop on Fighting Cybercrime, Supreme Prosecutors' Office, Seoul, Republic of Korea, 21–23 September

65.     Choo K-K R 2011. Cyberspace: Our new front-line. (Ministerial-level) Korea-Australia-New Zealand (KANZ) Broadband Summit 2011: Digital Futures, Hotel Grand Chancellor Hobart, Tasmania, Australia, 28–29 April

66.     Choo K-K R 2011. Keynote Speaker. Economic Crime Asia Conference, Nanyang Technological University, Singapore, 25–26 April

67.     Choo K-K R 2011. Panel Moderator: Cloud computing challenges and future directions. Cloud Computing Forum 2011, Hotel Realm Canberra, 23–24 February

68.     Lindley J & Choo K-K R 2010. Regulatory pluralism and defeating organised cyber fraud networks. 2nd Illicit Networks Workshop 2010, University of Wollongong, Australia, 6–7 December

69.     Choo K-K R 2010. Plenary Speaker: Does it matter how we describe cybercrime?. International Conference on Applied Linguistics 2010, National Chiayi University, Taiwan, 26–27 November

70.     Choo K-K R 2010. The organised cyber crime threat landscape. CPA congress, Adelaide Convention Centre, Adelaide, 5 November

71.     Choo K-K R 2010. The organised cybercrime threat landscape. International Serious and Organised Crime Conference 2010, Melbourne Convention Centre, 18–19 October

72.     Choo K-K R 2010. The evolving cyberthreat landscape. GovernmentWare 2010 conference, Suntec Singapore International Convention & Exhibition Centre, Singapore, 28–30 September

73.     Choo K-K R 2010. Is a PhD (in IT) for everyone?. Australian Computer Society’s Young IT in the Pub, The Academy Club, Canberra, 27 August

74.     Choo K-K R 2010. Online child exploitation. Presentation to JERA International & Convention on the Elimination of all forms of Discrimination Against Women (CEDAW) implementation program in China delegations, Australian Institute of Criminology, 4 August

75.     Choo K-K R 2010. Cybercrime 101. AIC student criminology forum 2010, Australian Institute of Criminology, 30 July

76.     Choo K-K R 2010. Challenges in regulating politically exposed persons. Presentation to Commonwealth Government Anti-Corruption Discussion, Australian Government Attorney-General's Department, 22 March.

77.     Choo K-K R 2010. The Cyber Crime Threat Environment. National Security Australia 2010 Conference, Sydney, 25–26 February

78.     Choo K-K R 2009. Cybercrime research: An overview.  Palo Alto Research Center (PARC), 21 October

79.     Choo K-K R 2009. Criminal exploitation of ICT for grooming children for sexual offences.  Centre international de criminologie comparée, Université de Montréal, 8 October

80.     Choo K-K R 2009. High tech crime research. Presentation to Ministry of Public Security of the People’s Republic of China delegation, Australian Institute of Criminology, 3 July

81.     Choo K-K R 2009. Anti-Money Laundering / Counter-Terrorism Financing research. Presentation to Taiwan's Public Prosecutors delegation, Australian Institute of Criminology, 1 July

82.     Choo K-K R & Russell RG 2009. Nature and extent of syntactic and semantic of online personal fraud attacks. 2009 Online Fraud & E-Crime Forum, Sydney, 23–24 June

83.     Choo K-K R 2009. Criminal exploitation of ICT for child abuse. Presentation to The Hon Sussan Ley MP Shadow Minister for Justice and Customs, Australian Institute of Criminology, 23 June

84.     Choo K-K R 2009. Criminal exploitation of social networking for online child grooming. Australian High Tech Crime Conference 2009, University of Technology Sydney, 9–11 June

85.     Choo K-K R 2009. Organised crime groups in cyberspace: a typology. National Security Australia Conference 2009, Sydney, 23–24 March

86.     Choo K-K R 2009. High tech criminal threats to the national Information Infrastructure. Global Security Asia 2009, Singapore, 17–19 March

87.     Choo K-K R 2008. Politically exposed persons (PEPs): risk and mitigation. 2008 Conference on Criminal Problems and Intervention Strategy (2008年犯罪問題與對策國際研討會), Department of Criminology, National Chung-Cheng University (国立中正大学犯罪学研究所), Taipei, Taiwan, 22–23 November

88.     Choo K-K R 2008. Anti-money laundering and counter terrorism financing research. Information Security Institute workshop, Queensland University of Technology, Brisbane, Australia, 19 November

89.     Choo K-K R 2008. Keynote Speaker:  Criminal exploitation of ICT for child abuse. 2008 Conference on Criminal Problems and Intervention Strategy (2008年保護兒少上網安全國際研討會), End Children Prostitution, Child Pornography & trafficking of Children for Sexual Purposes (ECPAT) Taiwan (台灣終止童妓協會), Taiwan, 6–7 November

90.     Choo K-K R 2008. The use of technology to facilitate the transfer/flow of funds. China Anti-Money Laundering Monitoring and Analysis Center (中国反洗钱监测分析中心), Beijing, China, 8 April

91.     Choo K-K R 2008. Anti-money laundering and counter terrorism financing research. Department of Criminology, National Chung-Cheng University (国立中正大学犯罪学研究所), Taipei, Taiwan, 19 March

92.     Choo K-K R 2008. The cyber crime in and from China. National Security Australia Conference 2008, Sydney, 6–7 March

93.     Choo K-K R 2007. The use of technology to facilitate the transfer/flow of funds. Presentation to the “Proceeds of Crime Working Group” at Australian Federal Police Sydney Headquarters, Australia, 27 November

94.     Choo K-K R 2007. Criminal exploitation of online systems by organised crime groups. Organised Crime in Asia: Governance and Accountability colloquium, Singapore, 28–29 June

Comments