Toby Amodio, Assistant Secretary, Cyber Security Branch, Department of Parliamentary Services, Australia

Dr Stephenie Andal, Head of Strategic Policy, Cyber Security Cooperative Research Centre, Australia

Daniel Comarmond, Security Software Engineer, Thycotic, Australia

Simon Cowley, Principal Cybersecurity Officer, Department of Health Victoria, Australia

Dr Tobias Feakin, Ambassador For Cyber Affairs and Critical Technology, Australian Department of Foreign Affairs and Trade, Australia

Chris Goldsmid, Commander Cybercrime Operations, Australian Federal Police, Australia

Sam Grunhard, First Assistant Secretary, Critical Infrastructure Security Division, Department of Home Affairs, Australia

Lesley Honeyman, Director Cyber Security Operations, Cyber Security NSW, NSW Department of Customer Service, Australia

Budd Ilic, Regional Director, Government, Zscaler, Australia

Helge Janicke, Research Director, Cyber Security Cooperative Research Centre, Australia

Mark Jobbins, Vice President & Field Chief Technology Officer, Asia Pacific & Japan, Pure Storage Inc., Australia

Abbas Kudrati, Chief Cyber Security Advisor, Microsoft Asia, Australia

Patricia Lebreton, Cyber Security Influence & Awareness Manager, Transport for NSW, Australia

Ryan Macfarlane, Assistant Legal Attaché, U.S. Federal Bureau of Investigation, Australia

Shane Moffitt, Assistant CISO, Department of the Premier and Cabinet - Victoria, Australia

Barney Oconnell, User Experience Section, Aust. Dept Foreign Affairs and Trade, Australia

Barney Oconnell |  | Aust. Dept Foreign Affairs and Trade » speaking at Tech in Gov

Suvo Rakkhit, ANZ Director of Sales Engineering, Netscout Systems Inc, Australia

Suvo Rakkhit |  | Netscout Systems Inc » speaking at Tech in Gov

Clive Reeves, Deputy CISO AsiaPac, Telstra, Australia

Abu Barkat Ullah, Associate Professor in Cyber Security, University of Canberra, Australia

Abu Barkat Ullah |  | University of Canberra » speaking at Tech in Gov

Monica Whitty, Director, UNSW Institute for Cyber Security, Australia

last published: 19/Jan/22 03:35 GMT

Cyber Security, Wednesday 11 May 2022

Chris Goldsmid
Cyber Security

Recognising the expanding cyber threat in 2021 and responding with sophisticated anti-cybercrime operations

  • Cybercrime strategy / approach.
  • Operation Ruthven as a case study.
  • Cybercrime NPI and recruiting.
Sam Grunhard
Cyber Security

A national security strategy to protect Australia's Critical Infrastructure

Panel discussion
Cyber Security

Reviewing new and emerging cyber threats and challenges

  • Understanding new threats and setting a strategy
  • How the latest security trends are influencing cyber policy
  • Responding to the evolving cyber security landscape
Suvo Rakkhit
Cyber Security

Contact tracing for your security events

As COVID has shown us the importance of having data to assess the potential impact of exposure events, so security teams need the ability assess the potential breadth and depth of security event impacts.
Dr Stephenie Andal
Cyber Security

Current legislative and regulatory trends: board and executive-level awareness

  • Attackers are currently benefitting from organisational indecision on cyber risk, with high-profile debilitating attacks happening globally, the most prominent globally cyber threats.
  • Encouragingly, cyber risk is increasingly at the top of executive and board agendas, with increasing demands that programs prove their value in risk-reducing terms. Still, more can be done.
  • What are the current global and Australian legislative and regulatory trends which boards should be aware of and how can organisations formulate and implement effective cyber security policies?
last published: 19/Jan/22 03:35

Cyber Security, Thursday 12 May 2022

Shane Moffitt
Cyber Security

Delivering a whole-of-government cyber security strategy to ensure safe and reliable delivery of government services

Panel discussion
Cyber Security

The Modern Network and Zero Trust: What it Means for Government

  • Addressing the security expectations to ensure a reliable collaboration platform across organisations
  • Strengthening your enterprise systems with a robust security posture that responds to sophisticated attacks
  • Empowering work from anywhere with a better user experience and more visibility
Barney Oconnell, User Experience Section, Aust. Dept Foreign Affairs and Trade
Monica Whitty
Cyber Security

Considering the human factors in improving your workforce’s cyber hygiene

  • The COVID 19 pandemic sent many workers to work from home without proper cyber security guidance or training.
  • Organisation’s policy and educational programmes often do not account for individual differences.
  • Cyber security awareness raising is not sufficient if organisations wish to change employees’ cyber security behaviours.
Daniel Comarmond
Cyber Security

Ransomware on the rise – how to reduce risks and respond to attacks

With an increase in remote working, ransomware attacks have reached record levels given increased remote working - in frequency, sophistication and success. Learn how you can become more resilient to avoid being the next ransomware victim. We'll discuss:
  • Why the new affiliate model for ransomware, “Ransomware-as-a-Service,” is driving the increase in attacks
  • Best practices recommended by the US Cybersecurity and Infrastructure Security Agency (CISA)
  • PAM strategies that fortify your security controls and make your organization more resilient against ransomware
Helge Janicke
Cyber Security

How cybersecurity research can help your organisation innovate and provide leadership

  • Securing your organisation against fast evolving cyberthreats is essential and a lot can be achieved by following current best cyber security practices.
  • Best practices need to continuously adapt to keep up with the evolving nature of cyber threats, and the fast-paced change of technology in business operations.
  • Can a coalition of cyber security researchers and practitioners deliver new insights and technologies to lead this transformation and what are the opportunities and challenges?
Lesley Honeyman
Cyber Security

Strengthening Cyber Incident Response in your Organisation

Simon Cowley
Cyber Security

Medical Device Security: Challenges and Practical Solutions

Medical devices are a regulated health technology, extensively used for the diagnostic, monitoring and treatment of patients in health services. As medical device technology advances, the capabilities and functionality of medical devices has become more digitised and interconnected. This increase in digital complexity also increases the cybersecurity risk through hardware and software vulnerabilities, along with increased exposure to network and internet-based threats.This presentation will provide an overview of the threat landscape and risk to patient safety of insecure medical devices, dispel myths on what can and can't be done to secure medical devices and provide practical solutions for medical device security that can be implemented at a health service
Patricia Lebreton
Cyber Security

Fostering a cyber risk aware culture

  • What is a cyber risk aware culture and why is it important – nearly all successful attacks take advantage of poor decisions and behaviours within the organisation
  • Setting and assessing a target state – what does good look like and how can you measure it
  • Issues and approaches in fostering culture change – it’s more than training completions and awareness campaigns
Abu Barkat Ullah
Cyber Security

Data Breaches: it’s not too late to be proactive

  • Data breaches represent a continuous threat to all types of organizations and individuals.
  • Recent survey data shows data breaches through 2020 more than doubled compared with the previous year.
  • This talk will dig deeper into data breaches and focus on organisational and individual responsibilities.
Dr Tobias Feakin
Cyber Security

Australia’s International Cyber & Critical Tech Engagement Strategy

  • Why Australia has an international cyber and critical tech engagement strategy
  • How to operationalise our values, security and prosperity in cyber and critical technologies
  • Engaging international partners, industry, civil society and academia to achieve our goals
Ryan Macfarlane
Cyber Security

Combating Global Cyber Crime

  • How we got here - the rise of global cyber-crime threats
  • Challenges we face combating global cyber-crime - and what we are doing about it
  • The future - what does it hold and how best to navigate it
last published: 19/Jan/22 03:35

Join the Tech in Gov community


Bryan Davis
+61 2 7208 7871



Meg O'Brien
+61 2 7208 8162


Benton Ng
+61 2 7208 8737


Jayden Kong
+61 2 7208 9264