Faculty

Summit

Scott Flower

Associate Professor
University of Western Australia

Biography

Flower is global intelligence offier, Asia Pacific, at FS-ISAC. He has been based in Singapore over the last decade and his most recent role was leading the Asia Pacific largest cyber threat fusion analysis cell protecting the global financial sector. Prior to that role, he has worked in senior positions responsible for international security research and intelligence analysis in government, academia, and the private sector.

Company

The University of Western Australia (UWA) is a leading Australian research university and has an international reputation for excellence, innovation and enterprise. A member of the Australian ‘Group of Eight’​ research universities, it is also among Australia’s leading research universities. Sitting on the banks of the Swan River, the UWA Perth campus is the oldest in Western Australia and among the most picturesque in the nation with its grand limestone and terracotta buildings sitting among elegant heritage-listed gardens. The University of Western Australia acknowledges the custodians and traditional owners of land on which any of its campuses are located. At the main campus, Crawley, the University acknowledges the Whadjuk Noongar people as the traditional owners of the land on which it is situated. The Whadjuk Noongar remain the spiritual and cultural custodians of their land, and continue to practise their value, languages, beliefs and knowledge.

Associate Professor, University of Western Australia

Future Events

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

February 12, 2025

Have We Shifted Too Far Left? Engineering, InfoSec, and Customer Identity Ownership

February 20, 2025

MLOPs and the Role of Gen AI in Securing the Software Supply Chain

Future Events

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

February 12, 2025

Have We Shifted Too Far Left? Engineering, InfoSec, and Customer Identity Ownership

February 20, 2025

MLOPs and the Role of Gen AI in Securing the Software Supply Chain

February 20, 2025

Managing Your Expanded Attack Surface Using Automation: The Security Promise

February 20, 2025

Securing the Modern Payment Rails