Toby Amodio, Chief Information Security Officer, Australian Taxation Office

Dr Stephenie Andal, Head of Strategic Policy, Cyber Security Cooperative Research Centre

Daniel Comarmond, Security Software Engineer, Thycotic

Simon Cowley, Principal Cybersecurity Officer, Department of Health Victoria

Dr Tobias Feakin, Ambassador For Cyber Affairs and Critical Technology, Australian Department of Foreign Affairs and Trade

Chris Goldsmid, Commander Cybercrime Operations, Australian Federal Police

Sam Grunhard, First Assistant Secretary, Critical Infrastructure Security Division, Department of Home Affairs

Lesley Honeyman, Director Cyber Security Operations, Cyber Security NSW, NSW Department of Customer Service

Budd Ilic, Regional Director, ANZ, Government, Zscaler

Helge Janicke, Research Director, Cyber Security Cooperative Research Centre

Mark Jobbins, Vice President & Field Chief Technology Officer, Asia Pacific & Japan, Pure Storage Inc.

Abbas Kudrati, Chief Cyber Security Advisor, Microsoft Asia

Patricia Lebreton, Cyber Security Influence & Awareness Manager, Transport for NSW

Ryan Macfarlane, Assistant Legal Attaché, U.S. Federal Bureau of Investigation

Barney Oconnell, User Experience Section, Aust. Dept Foreign Affairs and Trade

Barney Oconnell |  | Aust. Dept Foreign Affairs and Trade » speaking at Tech in Gov

John O'Driscoll, Chief Information Security Officer, Department of the Premier and Cabinet - Victoria

Clive Reeves, Deputy CISO AsiaPac, Telstra

Abu Barkat Ullah, Associate Professor in Cyber Security, University of Canberra

Abu Barkat Ullah |  | University of Canberra » speaking at Tech in Gov

Monica Whitty, Director, UNSW Institute for Cyber Security

last published: 05/Aug/21 23:55 GMT

Cyber Security, Wednesday 9 February 2022

Chris Goldsmid
Cyber Security

Recognising the expanding cyber threat in 2021 and responding with sophisticated anti-cybercrime operations

  • Cybercrime strategy / approach.
  • Operation Ruthven as a case study.
  • Cybercrime NPI and recruiting.
Sam Grunhard
Cyber Security

A national security strategy to protect Australia's Critical Infrastructure

Panel discussion
Cyber Security

Reviewing new and emerging cyber threats and challenges

  • Understanding new threats and setting a strategy
  • How the latest security trends are influencing cyber policy
  • Responding to the evolving cyber security landscape
Dr Stephenie Andal
Cyber Security

Current legislative and regulatory trends: board and executive-level awareness

  • Attackers are currently benefitting from organisational indecision on cyber risk, with high-profile debilitating attacks happening globally, the most prominent globally cyber threats.
  • Encouragingly, cyber risk is increasingly at the top of executive and board agendas, with increasing demands that programs prove their value in risk-reducing terms. Still, more can be done.
  • What are the current global and Australian legislative and regulatory trends which boards should be aware of and how can organisations formulate and implement effective cyber security policies?
last published: 06/Aug/21 00:55

Cyber Security, Thursday 10 February 2022

John O'Driscoll
Cyber Security

Delivering a whole-of-government cyber security strategy to strengthen business operations

Panel discussion
Cyber Security

The Modern Network and Zero Trust: What it Means for Government

  • Addressing the security expectations to ensure a reliable collaboration platform across organisations
  • Strengthening your enterprise systems with a robust security posture that responds to sophisticated attacks
  • Empowering work from anywhere with a better user experience and more visibility
Barney Oconnell, User Experience Section, Aust. Dept Foreign Affairs and Trade
Monica Whitty
Cyber Security

Considering the human factors in improving your workforce’s cyber hygiene

  • The COVID 19 pandemic sent many workers to work from home without proper cyber security guidance or training.
  • Organisation’s policy and educational programmes often do not account for individual differences.
  • Cyber security awareness raising is not sufficient if organisations wish to change employees’ cyber security behaviours.
Daniel Comarmond
Cyber Security

Ransomware on the rise – how to reduce risks and respond to attacks

With an increase in remote working, ransomware attacks have reached record levels given increased remote working - in frequency, sophistication and success. Learn how you can become more resilient to avoid being the next ransomware victim. We'll discuss:
  • Why the new affiliate model for ransomware, “Ransomware-as-a-Service,” is driving the increase in attacks
  • Best practices recommended by the US Cybersecurity and Infrastructure Security Agency (CISA)
  • PAM strategies that fortify your security controls and make your organization more resilient against ransomware
Helge Janicke
Cyber Security

How cybersecurity research can help your organisation innovate and provide leadership

  • Securing your organisation against fast evolving cyberthreats is essential and a lot can be achieved by following current best cyber security practices.
  • Best practices need to continuously adapt to keep up with the evolving nature of cyber threats, and the fast-paced change of technology in business operations.
  • Can a coalition of cyber security researchers and practitioners deliver new insights and technologies to lead this transformation and what are the opportunities and challenges?
Lesley Honeyman
Cyber Security

Strengthening Cyber Incident Response in your Organisation

Simon Cowley
Cyber Security

Medical Device Security: Challenges and Practical Solutions

Medical devices are a regulated health technology, extensively used for the diagnostic, monitoring and treatment of patients in health services. As medical device technology advances, the capabilities and functionality of medical devices has become more digitised and interconnected. This increase in digital complexity also increases the cybersecurity risk through hardware and software vulnerabilities, along with increased exposure to network and internet-based threats.This presentation will provide an overview of the threat landscape and risk to patient safety of insecure medical devices, dispel myths on what can and can't be done to secure medical devices and provide practical solutions for medical device security that can be implemented at a health service
Patricia Lebreton
Cyber Security

Fostering a cyber risk aware culture

  • What is a cyber risk aware culture and why is it important – nearly all successful attacks take advantage of poor decisions and behaviours within the organisation
  • Setting and assessing a target state – what does good look like and how can you measure it
  • Issues and approaches in fostering culture change – it’s more than training completions and awareness campaigns
Abu Barkat Ullah
Cyber Security

Data Breaches: it’s not too late to be proactive

  • Data breaches represent a continuous threat to all types of organizations and individuals.
  • Recent survey data shows data breaches through 2020 more than doubled compared with the previous year.
  • This talk will dig deeper into data breaches and focus on organisational and individual responsibilities.
Dr Tobias Feakin
Cyber Security

Australia’s International Cyber & Critical Tech Engagement Strategy

  • Why Australia has an international cyber and critical tech engagement strategy
  • How to operationalise our values, security and prosperity in cyber and critical technologies
  • Engaging international partners, industry, civil society and academia to achieve our goals
Ryan Macfarlane
Cyber Security

Combating Global Cyber Crime

  • How we got here - the rise of global cyber-crime threats
  • Challenges we face combating global cyber-crime - and what we are doing about it
  • The future - what does it hold and how best to navigate it
last published: 06/Aug/21 00:55

Join the Tech in Gov community


Bryan Davis
+61 2 8908 8515


Benton Ng
+61 2 8908 8527


Emma Golding
+61 2 8908 8523