One of the most captivating American heroes of our time, Captain ‘Sully’ Sullenberger’s preparation and leadership enabled him to safely guide US Airways Flight 1549 to an emergency landing in New York City’s frigid Hudson River – an inspirational and iconic moment in modern history. His incredible personal story is captured in Sully, a major motion picture directed by Clint Eastwood and starring Tom Hanks as Captain Sullenberger. In his speeches, Captain Sullenberger shares timeless management principles – including his credo of “leadership by personal example” –and the lessons from his life which prepared him to handle the unprecedented crisis presented by the “Miracle on the Hudson”.
Say the name Erin Brockovich and you think, strong, tough and stubborn. Erin is all that and definitely more. She is a modern-day “David” who loves a good brawl with today’s “Goliaths.” She thrives on being the voice for those who don’t know how to yell. She is a rebel. She is a fighter. She is a mother. She is a woman. She is you and me.
It’s been over 15 years since Julia Roberts starred in the Oscar-winning tour de force, Erin Brockovich. The film turned an unknown legal researcher into a 20th century icon by showcasing how her dogged persistence was the impelling force behind the largest medical settlement lawsuit in history. Since then, Erin hasn’t been resting on her laurels – she continues to fight hard and win big!
This gutsy broad doesn’t apologize for who she is. She has always loved going head to head with the big boys and was never intimated by their bravado. She learned how to come out on top from her tight-knit mid-western family in Lawrence, Kansas. Erin was the youngest child of an industrial engineer father and journalist mother. Her parents always believed that she could do anything she set her mind to if she learned to focus her amazing energy.
After a few years roaming around at various colleges, Erin decided that she wanted to be a California girl. She first landed a job as a management trainee for K-Mart, but when that didn’t make her swagger, she decided to study electrical engineering. But that wasn’t enough for the Kansas beauty. On a fluke, she entered the Miss Pacific Coast beauty pageant, and, not surprisingly, won the title. When she realized that beauty pageants weren’t her thing, Erin, her husband, and her two children settled in Reno, Nevada. After divorcing, the single mother became a secretary at a brokerage firm where she met and married her second husband. But that marriage was short lived, and the now mother of three was solo again.
Up until this point, Erin was the average divorced single mother trying to make a living, until she crossed paths with lawyer, Ed Masry, and this meeting changed the course of both of their lives.
After being seriously injured in a traffic accident in Reno, Erin moved back to California’s San Fernando Valley and hired Masry & Vititoe to represent her. They won a small settlement, but she still needed work, so she got a job at the law firm as a file clerk. It was while organizing papers on a pro bono real estate case that Erin first found medical records that would explode into the largest direct action lawsuit in US history.
Erin’s exhaustive investigation uncovered that Pacific Gas & Electric had been poisoning the small town of Hinkley’s Water for over 30 years. It was because of Erin’s unwavering tenacity that PG&E had now been exposed for leaking toxic Chromium 6 into the ground water. This poison affected the health of the population of Hinkley. In 1996, as a result of the largest direct action lawsuit of its kind, spearheaded by Erin and Ed Masry, the utility giant was forced to pay out the largest toxic tort injury settlement in US history: $333 million in damages to more than 600 Hinkley residents.
The story and eventual film made “Erin Brockovich” a household name. Over time, Erin realized that she could use her notoriety to spread positive messages of personal empowerment and to encourage others to stand up and make a difference.
Erin Brockovich has conquered all forms of media. Her first TV project was ABCís 2001 Special, Challenge America With Erin Brockovich, where she helped motivate and organize the rebuilding of a dilapidated park in downtown Manhattan. This show is best described as “Extreme Make-Over Home Edition on steroids.” For three seasons, Erin hosted the Lifetime series, Final Justice With Erin Brockovich. The show celebrated everyday women who triumphed when faced with overwhelming adversity.
Erin then dominated the world of publishing with her New York Times Business Bestseller, Take It From Me: Life’s A Struggle, But You Can Win. She has also written two fiction novels, Rock Bottom and Hot Water.
Because of her fighting spirit, Erin has become the champion of countless women and men. She is this generation’s “Dear Abby”, and in fact receives thousands of “Dear Erin” letters and emails each year from people who are begging for help and support in their own personal struggles. Erin proudly answers every one of them.
As President of Brockovich Research & Consulting, she is currently involved in numerous environmental projects worldwide. She has requests for her help in ground water contamination complaints in every state of the US, Australia, and other international hot spots. She is currently working on cases in California, Texas, Florida, Michigan, Illinois, and Missouri.
Erin is one of the most requested speakers on the international lecture circuit and travels the world for personal appearances. She is a true American hero whose icon status and “stick-to-it-iveness” only fuels her determination to expose injustice and lend her voice to those who do not have one.
As Corporate Vice President of the Cybersecurity Solutions Group at Microsoft, Ann Johnson oversees the go-to-market strategies of cybersecurity and compliance solutions for one of the largest tech companies on our planet.
As part of this charter, she leads and drives the evolution and implementation of Microsoft’s short and long-term security and compliance solutions roadmap with alignment across the marketing, engineering and product teams. She has built and shaped one of the company’s highest performing teams whose digital transformation expertise leverages built-in cloud security capabilities.
As a recognized thought leader on cybersecurity, Johnson is a sought-after global speaker and digital author specializing in cyber resilience, online fraud, cyberattacks, compliance and mobile security.
Prior to joining Microsoft, her executive leadership roles included CEO of Boundless Spatial, President and COO of vulnerability management pioneer Qualys, Inc. and Vice President of World Wide Identity and Fraud Sales at RSA Security, a subsidiary of EMC Corporation. She holds a Bachelor of Science from Weber State University with a dual major in political science and communication. She has completed the majority of the required coursework toward her MBA with a concentration in statistics.
Dedicated to giving back to her community, Johnson currently serves on the boards and as a board advisor of the Security Advisor Alliance, the Financial Services Information Sharing and Analysis Center (FS-ISAC), Executive Women’s Forum, HYPR (a biometric security firm) as well as the Executive Sponsor of the Microsoft Women in Security Group and co-executive sponsor of Microsoft GLEAM. In addition, Johnson dedicates her philanthropy – in terms of time and fundraising – to animal and youth causes.
For over two decades, Adam Spencer has been one of Australia’s best and foremost event hosts, keynote speakers and facilitators. His attention to detail and ability to improvise are the hallmarks for which he has been regularly invited back to many events.
Adam has interviewed, among others, bestselling authors, astronauts and CEOs of some of the world’s largest companies; winners of Nobel Prizes, Academy Awards and AFL Grand Finals. He has shared the stage with every Australian Prime Minister since Whitlam but he is equally adept at bringing to life the everyday stories of ordinary people who deserve acknowledgement for their achievements.
Adam’s greatest strength is his versatility; there is virtually no topic he doesn’t enjoy getting his head around and presenting. That said, given his background in mathematics, Adam is particularly strong at presenting on science, technology, the digital world, medicine and health.
Adam’s 2013 TED Talk on massive prime numbers has received over 2 million views and was voted in as one of the 10 best ever TED talks on Mathematics. And after he interviewed the greatest chess player of all time, Garry Kasparov, they played a match. The result of that momentous event … is not important!
Ita Buttrose AC OBE is a truly exceptional Australian: a legendary media trailblazer, businesswoman, best-selling author, committed community and welfare contributor and former Australian of the Year.
In 2019 Ita became a Companion of the Order of Australia for her service to the community through leadership in the media, the arts, the health sector and as a role model.
Current work Ita is Chair of the Australian Broadcasting Corporation (ABC) and Chair of the Australian Mental Health Prize Advisory Group. She balances her high profile role with charitable responsibilities include serving as National Ambassador of Dementia Australia following her term as National President from 2011-2014. She is also Emeritus Director of Arthritis Australia and Ambassador for Breast Cancer Network Australia.
An accomplished communicator with a wealth of experience across a broad range of industry sectors, Ita works behind-the-scenes and in the public eye for major corporates, small business, governments and charities.
In 2019 Ita was chosen as a Shero Barbie, one of a collection of 20 Barbie Dolls that globally recognise female role models and achievers.
Previous experience Media: Ita was the founding editor of Cleo, the youngest ever editor of The Australian Women’s Weekly, the first woman to ever edit a major metropolitan newspaper in Australia as Editor-in-Chief of the Daily and Sunday Telegraphs, and the first female director of News Ltd Australia.
She has hosted prime time shows on radio and television. She later started her own company, Capricorn Publishing, and created ITA Magazine, a magazine for the woman who wasn’t born yesterday.
In 2011, her earlier career was immortalised in the acclaimed ABC mini-series ‘Paper Giants: The Birth of Cleo’.
Ita was inducted into the Australian Media Hall of Fame in 2017.
Author: Ita has written 11 successful books, including her best-selling autobiography ‘A Passionate Life’.
Awards: In 2018, Ita was conferred with the University of New South Wales’ highest honour – an honorary doctorate in medicine in recognition of her eminent service to health, being an inspirational role model for aspiring women in business and making a difference in society. In 2015 she was conferred an Honorary Doctor of Letters by the University of Wollongong, for her contribution to mental health and ageing. In 2014 Sydney’s Macquarie University conferred an Honorary Doctor of Letters on Ita in recognition of her contribution to the arts. She was the Inaugural NSW Excellence in Women’s Leadership award winner. (2014).
She received an AO in 1988 for her services to the community especially in the field of public health education when she spearheaded Australia’s HIV/AIDS Education Program, an OBE for her services to journalism, and a Centenary Medal for business leadership.
Steve Wozniak’s Key Accomplishments Include…
A Silicon Valley icon and philanthropist for more than thirty years, Steve Wozniak has helped shape the computing industry with his design of Apple’s first line of products the Apple I and II and influenced the popular Macintosh. In 1976, Wozniak and Steve Jobs founded Apple Computer Inc. with Wozniak’s Apple I personal computer. The following year, he introduced his Apple II personal computer, featuring a central processing unit, a keyboard, color graphics, and a floppy disk drive. The Apple II was integral in launching the personal computer industry.
In 1981, he went back to UC Berkeley and finished his degree in electrical engineering/computer science. For his achievements at Apple, Wozniak was awarded the National Medal of Technology by the President of the United States in 1985, the highest honor bestowed on America’s leading innovators.
In 2000, he was inducted into the Inventors Hall of Fame and was awarded the prestigious Heinz Award for Technology, The Economy and Employment for single-handedly designing the first personal computer and for then redirecting his lifelong passion for mathematics and electronics toward lighting the fires of excitement for education in grade school students and their teachers.
Through the years, Wozniak has been involved in various business and philanthropic ventures, focusing primarily on computer capabilities in schools and stressing hands-on learning and encouraging creativity for students. Making significant investments of both his time and resources in education, he adopted the Los Gatos School District, providing students and teachers with hands-on teaching and donations of state-of-the-art technology equipment. He founded the Electronic Frontier Foundation, and was the founding sponsor of the Tech Museum, Silicon Valley Ballet and Children’s Discovery Museum of San Jose.
Wozniak is a published author with the release of his New York Times best selling autobiography, iWoz: From Computer Geek to Cult Icon by Norton Publishing. His television appearances include reality shows “Kathy Griffin: My Life on the D-List”, ABC’s “Dancing with the Stars” and “The Big Bang Theory.” In 2014, he was awarded the Hoover Medal, a prestigious honor given for “outstanding extra-career services by engineers to humanity,” and was inducted into the IndustryWeek Manufacturing Hall of Fame.
Paula Januszkiewicz is a CEO and Founder of CQURE Inc. and CQURE Academy. She is also Enterprise Security MVP, honorable Microsoft Regional Director for CEE and a world class cybersecurity expert, consulting Customers all around the world. In 2017, she graduated from Harvard Business School. Paula
Paula has 15 years of experience in the cybersecurity field, performing penetration tests, architecture consulting, trainings and seminars. She has performed hundreds of security projects, including those for governmental organisations and big enterprises, at the same time being a top speaker and a keynote speaker at many well-known conferences, including Microsoft Ignite (rated No 1 Speaker among 1100 speakers at a conference with 26000 attendees), RSA (in 2017 in San Francisco her session was one of the 5 hottest sessions), Black Hat, TechEd North America, TechEd Europe, TechEd Middle East, CyberCrime etc., where she is often rated as No 1 speaker. She also creates security awareness programs for various organisations, including awareness sessions for top management (telecoms, banks, government etc.). She is passionate about sharing her knowledge with others.
In private, she enjoys working with her research team, converting the results of her findings to authored leading-edge trainings and tools used in practice in projects. She wrote a book about Threat Management Gateway and she’s currently working on the next one… so stay tuned for more. Recently, Paula has become a member of the Technical Advisory Board at Royal Bank of Scotland – helping to keep its security at the highest level possible!
She has access to a source code of Windows, an honor granted to just few people around the world!
Peter is a Cyber Security specialist with over 20 years experience in a range of roles spanning multiple security domains. He is a Certified Information Systems Security Professional (CISSP) and is experienced in engaging with large enterprises, telcos and government agencies throughout the Asia Pacific region. In addition to Security Intelligence, other focus areas over the past 10 years have included Network Forensics and Malware Analysis.If he’s not assisting customers to track down the bad guys, Peter is probably trekking somewhere in Australia’s wilderness areas. He believes in the power of volunteering to help the community and is a member of the specialist NSW SES Bush Search and Rescue Unit.
After getting her Honours degree in Telecommunications Engineering from Monash University, Tracy spent a decade within the IT industry working on various IT platforms that delivered entertainment digital content to many early mobile phones. After turning one of her side hobbies into a small business, she realised the size of the canyon that is separating the small business community and cybersecurity industry. She’s now doing research to try and actively bridge that gap.
Camille Singleton brings thirteen years of professional experience to cyber security topics, both in the US government and as an analyst at IBM. She specializes in strategic analysis that looks holistically at cyber security problems and potential solutions. With degrees from Brigham Young University, George Mason University, and Oxford University, she adds an academic depth to her analysis to complement her professional experience.
Yohann is a malware analysts at Check Point Software Technologies. He monitors everyday hundreds of suspicious files; perform short analysis on some of them with the help of dedicated tools, sandbox emulation, to identify suspicious campaigns and unique malwares. He also writes static and behavioral signatures in order to detect new threats.
Victoria Schiffer is an Agile Technology Leader in Cyber Security, and holds the GIAC Security Leadership (GSLC) certification. With a background and degrees in Computer Science, Commerce, Software Engineering and Professional Coaching she has been working in Technology & Leadership for over 15 years across Germany and Australia; since 2019 in Cyber Security. Victoria’s passion lies in fostering thriving Technology teams, helping people grow through mentoring, coaching and training sessions, breaking down complex problems into clear goals, innovative leadership, collaborating with the community, and continuous growth & learning.
Ganesha is a cyber security executive with over 15 years of experience in consulting and operations. As part of his role at CSL Limited he was responsible for identification, valuation and management of cyber risks associated with acquisitions and operations in Mainland China.This experience provided a strong understanding of the Chinese Cyber Security Law (CCSL), Multi Level Protection Scheme (MLPS) and the Regulation on Internet Security Supervision and Inspection by Public Security Organs.
Annette Peploe is passionate about people and holds a bachelor’s degree in Ministry. She is a Cyber Security Student as well as an Airport Chaplain and School Chaplain. Her mission, vision and calling are about inspiring positive change utilising her skills in technology to highlight and curtail the sex trafficking industry. As a Chaplain she utilizes her skills to educate the students in Schools about the importance of Cyber Safety. Annette is a prolific speaker. She encourages and advocates for people to use their Cybersecurity and Technolgy Skills as a tool in ending sex and human trafficking. Her focus in schools is to help students to be Cybersafe and be Mentally healthy.Annette’s previous resume includes: 15 years of telecommunication experience in Management, Key account management and New busines development. Her ethos is built around utilizing all your skill sets and to colour outside of the lines in order to bring about creative impactful change.
Sean Ofir is the CEO and managing direct or of SABASAI Sean has more than 20 years of local and international experience in helping organisations to solve the “human risk problem”
Sean developed a unique psychological methodology to approach high level stake holders and provide them with unique skills to approach the problem from the strategic angle and less from technology.
Dave Ormrod is Terra Schwartz’s Head of Cyber, with 24 years of international experience. Dave has experience in Defence, Government, Telecommunication and Academic sectors. Dave adopts a risk-based, intelligence-led and mission-focused approach, as a trusted partner for strategic cyber-security advice against various threats and across different ecosystems. Dave has a PhD in Computer Science, in addition to various post-graduate qualifications and certifications, including a Masters of Information Management, inclusion in the Australian Information Security Registered Assessors Program (IRAP), Certified Information Systems Security Professional (CISSP) and Certified Information Security Auditor (CISA). Dave enjoys collecting Scotch Whisky and books between adventures.
Maurits Lucas is Director of Intelligence Solutions at Intel 471, where he specialises in bridging the gap between technology and business. Maurits has held various positions in Cyber Threat Intelligence and IT Security over the past 17 years and is a subject matter expert on cybercrime, presenting his research and providing his thought-leadership to distinguished audiences around the world.
Dr. Roland Padilla is a Deputy Chief Security Officer with A9, an Australian-owned firm that delivers a range of security solutions across government and private sector. He has more than 20 years experience in the ICT domain working across various industries. For the last ten years, Roland has held various roles with the Australian Department of Defence as an Army member with the Royal Australian Corps of Signals, acting Assistant Director with the ICT Security Branch and resident Cyber Security Expert within Army Headquarters.
Roland specialises on security outcomes by providing strategic and organisational-wide oversight of protective security. Recently, he authored and led an approved publication of a Cyber Supply Chain Risk Management document focusing on the Australian-wide deployment of a land-based capability.
The Australian Computer Society recognised Roland as a leader in his profession and awarded him a senior Certified Professional in Cyber Security. The society further recognised him as a Fellow for demonstrating his industry leadership and distinguished contributions to the field of information technology with a focus on cloud computing security.
Roland holds a BSc in Physics, MIS (1st Class Honours), PhD(UMelb) in cloud computing, and MBA(ANU).
Glenn commenced his career with the Australian Defence Organisation in the mid-90’s. In Defence, Glenn conducted numerous cyber activities including penetration testing, systems engineering, risk assessment, threat analysis and reporting, and cyber operations. Glenn moved to the ATO in 2011 as the Agency’s Cyber Security Advisor. In the ATO, Glenn rebuilt the ATO’s GRC framework and cyber strategy to better match the ATO’s aggressive digitization agenda.After leaving government in 2014, Glenn ran Cyber Operations for Lockheed Martin’s Defence Centralised Processing project then moved to Cisco in 2016 to lead the Security & Trust Office for Australia and NewZealand. Glenn now works at FortiGuard Labs, heading up Threat Intelligence operations for Australia.FortiGuard Labs build the security intelligence that underpin advanced security technologies like AI, antivirus, intrusion prevention, and email & web security.Glenn works closely Fortinet front & back office teams, the Australian Cyber Organisations, CERTs, partners, and customers to build resilient defence systems via intelligence-led security fabrics.Glenn has degrees in Business (Management) and Science (ICT); and diplomas in Security Risk Management & Project Management. Glenn is married with two daughters and a son,and spends his free time on his farm near Canberra.
Tony Kitzelmann is the Australian Digital Health Agency’s Chief Information Security Officer and General Manager for the Agency’s Cyber Security Centre.
A strong believer that ‘cyber security is a team sport’, Tony is focused on promoting a sustainable, resilient and holistic approach to cyber security across the digital health ecosystem. Tony leads a team of dedicated cyber security professionals who work to embed security into the design of systems and services, undertake cyber security operations functions, and promote security awareness, education and engagement.
Tony’s experience in the digital health arena is complemented by his previous work in the private sector, most recently through his role as the Senior Cyber Security Executive and Chief Information Security Officer (APAC) at Lockheed Martin for five years from 2012. In this role, he was accountable for the strategic leadership and delivery of corporate cyber security functions within the ASIA Pacific region and provided functional leadership to the various business lines in the region.
Tony is always looking to further his knowledge and holds numerous industry and academic qualifications. He is currently studying a Masters in Cyber Security, Strategy and Diplomacy at UNSW.
Jacqueline Jayne (JJ) currently serves as Security Awareness Advocate for the APAC region for KnowBe4, the world’s largest security awareness and simulated phishing platform.
With over 20 years’ experience as a conduit between people and technology, she has mastered the art of communication and influence. Previously, she led a successful cybersecurity education and awareness program that changed behaviour and culture, aimed at helping users make better cybersecurity decisions. Cybersecurity is everyone’s responsibility, and there is a gap in how to go about engaging hearts and minds across an entire organisation, regardless of its size.
Her insights on the human condition and how to engage at all levels in this space are invaluable as many people struggle to understand the cyberthreat landscape and equally, tech people struggle to understand engage the people to create change. Humans are innately curious which in this climate causes major issues.
Ralf is a serial cyber entrepreneur with a passion for software technology. He obtained a PhD in computer science from the University of Kiel, Germany, and went on to become a Principal Scientist with DATA61, Australia, and Adjunct Associate Professor with USNW. In 2010 Ralf co-founded Goanna Software, as static analysis application security company, which got acquired by Synopsys, one of Silicon Valley’s largest AppSec enterprises in 2015. After having spearheaded Synopsys’ global business development for automotive cyber security for 4 years, he founded LOGILICA in 2019, focussing on bringing independent advise and solutions to fast moving DevOps teams. Ralf is a frequent speaker and author on the global events circuit.
Chris Hilton, Senior Support Engineer, is responsible for providing technical support to Blancco in Australia and New Zealand, and also supports special projects within the Asia Pacific region. Self-employed, Chris provided cyber security consultancy and solutions since 2005. He worked on solutions involving encryption, biometrics, authentication, secure erasure, secure storage, firewalls, secure proxies. With his vast experience and knowledge selling Blancco data erasure solutions since 2005, Chris was recruited to join Blancco in 2014 providing pre and post sales support. Prior to his journey into cybersecurity solutioning, Chris started his career with the Ministry of Agriculture and Fisheries in New Zealand in Goat breeding, and moved to international sales and marketing roles in the New Zealand Dairy Board. Making a career switch in 1995, Chris took on technical sales and marketing, and product management roles in Telecom NZ and Deltec Telesystems that manufactured advanced base station antennas,.Chris has a BSc (Microbiology), MSc (Biochemistry), Post-Grad Diploma Business Studies, and a Direct Marketing Diploma.During his free time, Chris enjoys reading, woodworking, walking, and singing, sometimes all at the same time!
John has over 35 years’ experience in Information Technology and Research areas across a broad range of areas. John has extensive Public Sector, Defence and Intelligence experience including postings into Australian and US Intelligence agencies in integrated Military and Civilian teams.
John worked in the Defence Science and Technology Organisation (DSTO) as a Senior Research Scientist leading teams undertaking cutting edge Image Analysis and Distributed Systems research.
Before joining AWS he had senior roles at Microsoft and IBM providing Architectural advice to Federal Government customers.
John is currently Head of Security Assurance for Australia and New Zealand at AWS in Canberra Australia. He is passionate about removing regulatory barriers of cloud adoption for customers. John has been working with Government customers at AWS for over 7 years, as the first employee for the ANZ Public Sector team.
Pouya Ghotbi is a security professional with over 20 years of experience in IT and 11 years focused on security. He has previously worked on the design, architecture, and implementation of complex security systems with Big Four Australian Banks, Telcos, and other tier-one companies. He has substantial experience in various areas of security including but not limited to Software Security, DevSecOps, Cloud Security, Network Security, Penetration Testing, Identity and Access Management (idAM) and Privileged Access Management (PAS). He currently works as a Systems Engineer for CyberArk, The Global Leader In Privileged Access Security(PAS).
Across 2020 Ajoy served as the interim CISO for the Australian Government owned company Healthdirect Australia. Already providing tele health and prototyping digital health solutions, Healthdirect had to rapidly establish, scale and sustain health emergency response services including the National Coronavirus Helpline, GP Video Consultation, Contact Tracing and others.Ajoy is an interim CISO and IRAP Assessor who also lectures in digital forensics the Australian Defence Force Academy/UNSW Canberra and the CBA-sponsored Secedu program at UNSW Sydney. He serves on the National Board of Amnesty International Australia, advocating for basic human rights for all, including digital rights and on the Advisory Body for the Defence Employer Partner Network (i.e. Defence Reserves Support), advising on the cyber reserve workforce.
Boaz Fischer is the CEO and Founder of CommsNet Group and several other businesses. Boaz helps organisations to develop strategies to help them identify, mitigate and disrupt insider threats. Boaz is the author of 4 books as well as over 100 articles relating to insider threats as well cybersecurity resiliency. Boaz is globally known speaker, haven spoken in Israel, US and Australia
Daniel Ehrenreich, BSc. is a consultant and lecturer acting at Secure Communications and Control Experts, periodically lecturing at industry conferences cyber defense for industrial control systems; Daniel has over 26 years’ experience with ICS systems for: electricity, water, gas and power plants as part of his activities at Tadiran, Motorola, Siemens and Waterfall Security. Reselected 5th time as the Chairman for ICS Cybersec 2020 taking place on 11-2-2021 in Israel
An avid reader since childhood, Gyle loved reading mysteries and whodunits. She’s been in the tech industry since the early 2000, starting from doing Cisco networking and moving into consultancy and training. She completed a Graduate Certificate in Incident Response from the SANS Institute and a master’s degree in Cyber Security with a focus on Digital Forensics from UNSW Canberra. She now engages her passion for figuring out what happened based on the digital evidence as a Cyber Threat Analyst for Cyber Research NZ Ltd. During her spare time, she volunteers for different organisations and speaks at grassroots security conferences.
Over the past 25 years Andrew has led technology vision for a series of Australian start-up companies including Comindico and IP Systems who pioneered the global adoption of IP communications. These projects developed new industry models to convert technology vision into real world applications. In recent years Andrew has consulted to Australian enterprises and government agencies on the procurement and adoption of disruptive technologies. Since 2016 his focus has sharpened toward adoption of active cyber defence measures as the most prospective approach to tilt the balance of power in the cyber realm back in favour of the defender.
Vasant Chinnipilli is a security enthusiast, speaker and currently serves as a Security Architect, DevSecOps Practitioner/learner and working towards securing code in a Continuous Deployment world at mx51.His technical abilities span a very wide range of technologies across various domains of information security such as Cloud Security, Container Security, penetration testing, Incident Analysis, Threat Analysis for protecting networks, systems and information assets for diverse companies and organisations.He is Passionate about Information Security, Cloud and containerisation Technology, DevSecOps and Security automation.Always a Learner and currently ramping up my DevOps skills to bridge the gap between the security and DevOps teams.
Stephen Chey is a consultant and representative for IBM’s security services business. Stephen focuses on operational and workforce development issues for IBM’s enterprise customers in critical national infrastructure industries. Stephen volunteers in support of IBM’s free Open P-Tech and Skills Build digital training platforms and is an ambassador for the NSW Cybersecurity Innovation Node.
Ricki is the Director and founder of CyberSec People, one of Australia’s leading cyber security recruitment companies. He has helped place over 100 people into cyber security-related roles and supports some of the most innovative companies across Australia and New Zealand in growing their security teams. He is embedded in the security community, presented at information security conferences around the country, published in various information security magazines and the host of the Hacking into Security podcast.
James is one of the world’s leading technical experts in AWS Cloud, as well as Linux and Open Source technology. He has lead technical teams across Europe, the US and Australia in the fields of Higher Education, Finance, Advertising, and Government; more recently he has lead the cloud-based design and deployment of the Advara Land Registry as a Service (LRaaS) for Landgate, the Western Australian Land Registry. As well as helping lead teams at Police, Transport, Education, and Health, he is also one of the (volunteer) Debian Linux developers, presents at various security and cloud conferences, and is passionate about IT, digital solutions and security. Holding 9 separate Amazon Web Services certifications, he has been appointed as one of the original AWS Partner Ambassadors – the leading group of Engineers across the Australian and New Zealand consulting partners. James is a Consulting Director at Modis in Australia, serves our customers as our National AWS Cloud Practice Lead and Cyber Security Lead, as well as being the global AWS Alliance Lead for Modis.
Dale Bowie is IBM Security’s worldwide product owner for QRadar Network Insights and Incident Forensics. He has a background in intrusion prevention systems and artificial intelligence and applies this to network security analytics.
Mark Arena is the CEO and founder of Intel 471 which is the premier provider of cybercrime intelligence. Mark was previously employed by iSIGHT Partners (now FireEye) as their Chief Researcher. Prior to this, Mark worked at the Australian Federal Police as a technical specialist within the High Tech Crime Operations function.
Daniel is a malware analysts at Check Point Software Technologies. He monitors everyday hundreds of suspicious files; perform short analysis on some of them with the help of dedicated tools, sandbox emulation, to identify suspicious campaigns and unique malwares. He also writes static and behavioral signatures in order to detect new threats.
Tracie Thompson is the CEO of HackHunter, a cyber security start-up ensuring WiFi is used for good. HackHunter helps organisations accurately detect, track and locate the source of unauthorised, and potentially malicious, WiFi in real-time.
Tracie has led HackHunter from idea through three accelerator programs (Startmate, CyRise and SBE Australia) to product launch, and is responsible for the commercialisation of the HackHunter technology.
Previously Tracie was co-owner and COO of a security consulting and software company with over 200 customers including Medibank, Centrelink, HostPlus, Village Roadshow and Allianz Insurance.
Tracie has over 15 years of experience in information security, cyber security and business management, including two successful business sales. She is also an industry and start-up mentor, championing women in tech.
Richard is a highly skilled and experienced IT security professional with over 20 years industry experience. He has a strong track record of working at the executive level in large enterprises, with resellers and integrators, and multinational security vendors.
Richard is comfortable discussing strategy with the C-suite, diving deep into the technology stack with engineers, or delivering a conference session to several hundred attendees.
When not educating people on why good password hygiene is so important, Richard can usually be found either on top of a motorcycle or behind a camera.
Daryl Sheppard has been in the security industry for over 10 years both in private enterprise and government. During that time he has performed a number of roles from penetration testing to governance risk and compliance. He is currently employed as a security engineer for a Defence contractor. Daryl is also PhD candidate at the University of Tasmania studying the human factors of cyber security.
Dr John Selby is an academic at Macquarie University in the Faculty of Business and Economics researching the spillover effects of new technologies on business. He teaches cybersecurity and privacy and is a member of the Optus-Macquarie Cybersecurity Hub. Dr Selby has been awarded multiple research grants, including: identity theft from mobile phone porting, analysing how company boards can build trust in the face of cybersecurity risks, and online browser privacy. Since 2000, Dr Selby has researched, written, trained and presented on many topics including: cyber-insurance, differences and tensions between cybersecurity and privacy, responding to data breaches and mitigating risks, privacy obligations locally and globally, data localisation laws globally, spam, biases in artificial intelligence (AI) and the governance risks of AI-based decisions. His audiences have included the UN Internet Governance Forum, the Asia Privacy Scholars Network, Australia-India Youth Dialogue, Australian Institute of Company Directors, Australian Internet Governance Forum, NSW Society for Computers & the Law, and many global Universities. He has been a Visiting Professor at the University of Oslo, Norway, the University of Zürich, Switzerland and was a Postel Research Fellow at the University of Southern California. He previously practiced as a lawyer at King & Wood Mallesons.
Rajiv Shah has worked in the cyber, intelligence and security business for over 20 years, over which time he has seen the internet evolve from an academic curiosity to today’s hyperconnected world.
He has held a broad range of senior leadership roles with major multinational companies and now leads his own consulting business, MDR Security, providing expert consulting advisory services to government and businesses to grow capacity and capability through building effective and mutually beneficial partnerships. He is also a regular speaker at industry conferences and contributor to industry publications.
Rajiv’s experience has spanned a broad range of business and technical domains, with roles that have included business analysis, technical architecture, program delivery, operational management, strategy, business transformation, client relationship management and more.
He has spent time working in the UK and the US, and since 2011 has been based in Canberra, Australia. Before joining the commercial world, Rajiv completed a PhD in quantum physics and retains a keen interest in mathematics and science.
Rodman Ramezanian has over 9 years’ experience in the Cyber Security industry, with the past 6 years spent with McAfee as an Enterprise Sales Engineer. Rodman looks after Australia’s Federal Government accounts based in Canberra, and specializes in the areas of Threat Intelligence, Data Protection, and Cloud Security. Rodman currently holds CISSP, CCSP, CISA, CDPSE, and Microsoft Azure industry certifications.
Murray Goldschmidt is the Co-Founder and Chief Operating Officer at Sense of Security, a founding member firm of CyberCX.
Murray is an industry-recognised information security expert providing advice across the spectrum, from the boardroom to the basement across the region’s elite corporate entities to government agencies.
Murray is frequently invited to present at conferences, workgroups and seminars and asked to provide expert comment for editorials and publications. He has presented on security topics at every leading conference locally, regionally and internationally.
His credentials include CISSP, IRAP and PCI QSA certifications and he is an active member of AISA, the AICD and RMIA. Murray has been instrumental in developing an expert and authoritative voice to the Australian media. A Cyber Security Thought Leader, Murray is frequently published as well as being a high-profile media commentator for both enterprise and consumer security trends, attacks and issues.
Emily Carr is the Managing Director of Parkour Consulting, a Strategy and Talent consultancy that provides a practical approach to strategy, culture, and people. Prior to launching Parkour Consulting, Emily worked at Macquarie Group for six years, where she was the global head of Strategy and People Enablement for the Financial Management Group. In the decade before joining Macquarie Group, Emily worked for companies such as Accenture and IBM as a consultant specialised in change management. She has worked in the Americas, Asia, ANZ, and EMEA across multiple industries, with a strong focus on pharmaceuticals and financial services.
Melissa specialises in information security culture programs. Her mission is to improve the security culture of her client organisations through effective education, change management and behaviour reinforcement. A ‘non techie’, Melissa’s CV includes ASX200 companies and household name corporations to prove she’s got what it takes to master the ‘human side’ of cyber security.
James Christiansen is Netskope’s vice president of cloud security transformation and leader of the Chief Strategy Office. He is focused on Netskope’s global strategy to drive thought leadership in cloud security transformation. James brings extensive expertise as a global leader in information security. Prior to joining Netskope, he was vice president CISO at Teradata where he led the global security, physical, and information security teams. Previously, James was vice president of information risk management at Optiv, chief information risk officer for Evantix, and CISO at Experian Americas, General Motors, and Visa International. As a sought-after expert speaker on security, James has been featured at numerous prestigious events, including the Business Roundtable, Research Board, American Bar Association, American Banker, the RSA Conference, BankInfoSecurity, ISSA, ISACA, HIMSS, and MIS Training Institute. He has also been featured in The New York Times and quoted as an expert in USA Today, The Wall Street Journal, Reuters, United States Cybersecurity Magazine, Bloomberg, and Healthcare IT News.James is a patent inventor and has received three innovation awards in cyber security, GRC, and cloud computing. He is the author of the Internet Survival Series and contributing author of CISO Essentials, as well as numerous industry papers.
Hardik Parekh is recognized thought leader and executive in security/privacy domain with hands-on contributions to SANS CWE Top 25, OWASP SAMM, BSIMM 1.0 to BSIMM 9; and SAFECode. Hardik is part of the core team which developed OWASP SAMM 2.0.Hardik has 16+ years of hands-on security experience with a track record of developing and maturing security programs in consumer and enterprise companies RSA/EMC, Intuit, Amazon, and Splunk. Hardik has built security programs in dynamic, fast-paced environments while partnering effectively across the company. Hardik has transformed DevOps organization to DevSecOps by integrating security engineering tools in CICD pipeline and delivered security at scale and speed in the Cloud.Hardik also serves on several advisory boards.
Avesta Hojjati is the Head of R&D at DigiCert, where he manages advanced development of cybersecurity products. Before joining DigiCert, Avesta was part of the Symantec and Yahoo security teams, as well as operating his own cybersecurity startup. Avesta focuses on applied cryptography, blockchain, post-quantum crypto, and IoT security. Avesta earned his Masters in computer science with a concentration on security from University of Illinois at Urbana Champaign, and he’s currently completing his PhD dissertation on applications of blockchain and IoT in manufacturing.
Gavin Reid is the Chief Security Officer for Recorded Future.His focus is on next-generation threats and the role that threat intelligence can play in identifying and combating them. Global responsibility for ensuring the protection, integrity, confidentiality, and availability of all customer-facing services, internal operational systems, and related information assets. Reid also works with cybersecurity groups to ensure Recorded Future has the needed sources of data and relationships to be the premier provider of threat intelligence.With over 25 years of experience in threat intelligence, he was a driving force behind the development of big data analytics and threat identification at Cisco. This experience is exemplified in his role at Cisco Systems as director of threat research for security intelligence operations, where he led a team that developed new data analytics technologies to detect and remediate advanced cybersecurity threats. Reid also created and led Cisco’s Computer Security Incident Response Team (CSIRT), a global organization of information security professionals responsible for monitoring, investigating, and responding to cybersecurity incidents.In addition to his time at Cisco, Reid also served as the vice president of the cyber threat intelligence group at Fidelity Investments and oversaw IT security at NASA’s Johnson Space Center
Joseph Carson has more than 25 years of experience in enterprise security, an InfoSec award winner, author of Privileged Account Management for dummies and Cybersecurity for dummies. He is a CISSP and an active member of the cyber community, speaking at conferences globally. He’s a cybersecurity advisor to several governments, as well as critical infrastructure, financial, and maritime industries.
Brett is recognized for his extensive and in-depth knowledge of the security landscape and has over 28 years’ working in IT & security. He has experience working across industry sectors including finance, government, law enforcement, healthcare and education. He works with clients to help them operationalise intelligence and assist in building threat intelligence programs. As Lead Solutions Architect at Flashpoint, Brett applies intelligence across various use cases including, insider, cybersecurity, fraud, e-crime and counter-terrorism. Brett also enjoys travelling, mountain biking and currently, if not slowly learning to fly light aircraft. He is also working to complete a Master’s degree in Management with a major in Forensics.
Chathura is a CREST Certified Infrastructure Tester, a red teamer based in Melbourne, Australia. He is an Associate Director within Cyber Defense services in KPMG Australia; with more than 15 years of hands-on industry experience in cyber security. He has worked with clients across the State & Federal Government, Power & Energy, Mining, Telco and FSI sectors, specializing in objective based penetration testing, red teaming and cyber security training.https://www.linkedin.com/in/abeydeera/
Frank Briguglio is a recognized thought leader and authority in Identity, Credentialing and Access Management (ICAM). Throughout his career he has been involved in the design and implementation of identity-centric technologies and the development of identity standards. As a Lead Architect for the Department of Homeland Security, Continuous Diagnostics and Mitigation Program – he was instrumental in the convergence of ancillary Federal programs and standards. Frank has supported the Federal ICAM Subcommittee (ICAMSC) as a Subject Matter Expert and was involved in the development of the FICAM Roadmap; the Federal and DoD Public Key Infrastructures and Federated Identity Standards. Frank has over 23 years’ experience supporting Federal Civilian, Department of Defence, and the Intelligence community in the deployment of identity and security solutions. He has worked for industry leaders in the Security, Identity and Access Management market segment and is currently the Public Sector Strategist at SailPoint. Frank is a frequent presenter and panellist at industry events such as Identiverse, ISACA, AFCEA, Federal Computing Weekly, Government Computing Network, Federal News Network Radio, and Cybersecurity in Government (Canberra, AUS).
Adrian is the Chief Technology Officer of SaaS Security Posture Manager Detexian; he has 18 years of IT and security experience primarily in IDAM and Cloud roles. The last 7 years of this experience have been spent in senior architecture positions, providing strategy and risk advisement services to senior and executive management. Adrian has consulted across a range of industries including some of the largest financial, utility and aviation companies in Australia and NZ. Adrian has spoken at regional conferences on topics such as security posture management and shifting security to the left to move from DevOps to DevSecOps.
Vanessa Teague is a cryptographer with a special interest in privacy and election security. She was part of the team (with Chris Culnane and others) that designed vVote, the first end-to-end verifiable election system to run at a state level anywhere in the world. Her security analysis of Internet voting systems in Australia and Switzerland has shown cryptographic weaknesses serious enough to allow for undetectable fraud, even in systems that were supposed to provide a cryptographic proof of correctness (joint work with Chris Culnane, Mark Eldridge, Aleks Essex, Sarah Jamie Lewis and Olivier Pereira). With Culnane and Rubinstein, she demonstrated the easy re-identifiability of ‘de-identified’ published records of Australian health and transport data. Her most recent achievement is the world’s first pilot Risk-Limiting Audit of a preferential election, for the city of San Francisco, having developed techniques which could be used immediately to improve election integrity in Australia too (joint work with Michelle Blom, Andrew Conway, Philip Stark and Peter Stuckey).
James is the Worldwide CTO and Garage Practice Lead for IBM Security Expert Labs. He is a thought leader in Identity and Access (IAM), Cloud Security, and Cybersecurity Solution.After completing an Honours Degree in Computer Science at the University of Queensland, James started his IT career as a software developer writing Unix device driver for a high-speed communication cards and devices. For the next 20 years, James has been designing, building and implementing IBM Security solutions across the globe, working extensively throughout Europe and Asia.
Heidi is an Australian professional currently specialising in cyber security risk management, incident management and operations. She has worked in IT project management, system administration, telecommunications and compliance, before making the switch to cyber security, where she has had the opportunity to experience both government and enterprise environments. She has a strong interest in offensive and deceptive security projects and has recently been delving into malware analysis and cyber threat intel. While also being a self-declared perpetual n00b, Heidi spends her time giving back to the community by volunteering at conferences across the globe, organising meet ups and CTFs, and running popular community projects to educate young and old on the joys of the infosec.
Dr Joanne Hall and Prof Asha Rao are engaged in redesigning the Master of Cybersecurity curriculum at RMIT. Dr Hall’s background is in mathematics and cryptography. Since Joining RMIT in 2017 she has focused both her teaching and research in cybersecurity. She enjoys bring industry guests into the classroom and sending student out into industry for internships.Prof Rao leads the mathematics discipline at RMIT. For many years she was the RMIT’s academic program leader for cybersecurity, and was instrumental in implementing the industry focus of the curriculum. Prof Rao is a Superstar of STEM, regular media commentator and contributor to the UN Centre for Drugs and Crime.
Dr. Stanley Shanapinda (B. Juris, LL.B – UNAM; MM ICT PR – Wits University Johannesburg SA, PhD Computer Science – UNSW Canberra), is a Research Fellow at the Optus La Trobe University Cyber Security Research Hub, in Melbourne Australia.
Stanley has over 15 years of experience in the mobile telecommunications regulatory sector as legal counsel, CEO and now as researcher.
Stanley is researching the dynamic relationship between the powers of law enforcement and national security agencies to access and use telecommunications metadata; the role of Telco’s to protect privacy, ensure cyber security, digital services, digital transformation, the digital economy and digital disruption; the development of communications technologies; and the role of oversight and governance.
David has been involved in the security industry for the last 20 years. During this time he has found many high-impact and novel vulnerabilities, handled security response for dozens of open source projects, led a Chinese startup that failed miserably, and wrote the core aviation meteorology system for the southern hemisphere. For the last 7 years he has managed technical security teams, and is currently the manager of Commonwealth Bank’s penetration testing team.
Gareth Phillips is an experienced IT security professional with over 18 years in the offensive and defensive disciplines of cyber security. Having made a number of contributions to the industry over the years, which includes co-authoring two internationally published books and presenting a number of ethical hacking courses at BlackHat, Gareth is currently a Cyber Security Research and Development specialist Kryptos Logic and founder of Scapecom Security Solutions.
Gareth is passionate about helping secure organisations, building robust pentest teams and developing unique solutions to improve the security for all organisations.
Tom is a Certified Information Systems Security Professional and Master Architect with many years’ experience in a wide range of industry sectors. His experience covers most aspects of security, risk, strategy and information technology systems through senior roles in multiple industry sectors. He is active in defining solutions for data, application and cloud security.
Originally from the United States, and now living in New Zealand, Sai Honig is a multipotentialite who has worked in differing roles in various industries. Prior to working in information security, Sai worked as a design engineer in the aerospace industry and worked on projects in the commercial, defense and space programs.
Sai has IT experience is in the governance, audit, supply chain, risk management, and security of IT. Her industrial experience includes manufacturing, healthcare, education and banking. Sai has volunteered for Grameen Foundation offering her skills and knowledge in internal auditing and IT operations. She assisted this foundation’s global efforts in providing microfinance and alternative methods for assisting those to access capital that would not normally have access. Sai’s volunteer efforts were recognized with The President’s Volunteer Service Award in May 2013 from then President Barack Obama.
Sai stumbled into a career in cybersecurity after working in accounting. Her current area of focus is cloud security.She has completed a term as board member of (ISC)2. She is cofounder of the New Zealand Network for Women in Security. This network is is a community that unites and supports the advancement of women in all areas of security.
Kylie is a Sociologist that specialises in technology (Cyber and Analytics). She has a strong interest in human behaviour in regards to technologies including users and cyber criminal behaviour and regularly advises federal government agencies on strengthening security based on her insights. Kylie has led technology teams across Australia, New Zealand, South Africa, Thailand, Singapore, Malaysia, Japan and Korea to assist clients with innovation, data management, advanced analytics and security. She is a recognised thought leader in human behaviour and recently developed a tool that is used by government to advise on automation risks including security and social impacts. She was welcomed in 2019 by special invitation to submit her opinions in the recent Federal Government Cyber Security Plan. Kylie has published a range of academic papers and general articles on human behaviour and technology including predictive analytics in healthcare with a focus on risks such as data privacy and security. Kylie leads the Cyber, Data and Analytics federal government teams in her current role with a focus on risk advisory, cyber security frameworks, cyber technologies and platforms, identity and access management, cyber analytics and big data. Kylie is completing her second Masters degree with a focus on cyber.
Roger A. Grimes, CPA, CISSP, CEH, MCSE, CISA, CISM, CNE, yada, yada, is the author of 11 books and over 1000 national magazine articles on computer security, specializing in host security and preventing hacker and malware attacks. Roger is a frequent speaker at national computer security conferences, and was the weekly security columnist at InfoWorld and CSO magazines 2005 – 2019. He has worked at some of the world’s largest computer security companies, including, Foundstone, McAfee, and Microsoft. Roger is frequently interviewed and quoted in the media including Newsweek, CNN, NPR, and WSJ. His presentations are fast-paced and filled with useful facts and recommendations.
Kelsey is an IT professional with more than 25 years experience, the last 5 of which have been focussed on Information Security, particularly in the Identity and Access Management Domain. Kelsey leads a globally distributed, remote first team, who deliver Identity as a product to more than 8000 technologists around the world. Kelsey’s goal is to reduce the friction which often results from trying to balance amenity and security, through making it easy to do the right thing in the first place.
CCS Cultural Cyber Security Executive Director – Brian Hay APM has a rare blend of cyber security skills and business attributes. Long considered a Thought Leader in the world of Cyber Security he learned his craft not from the technical demands of the industry but rather by focusing on the activities of organised crime and cyber criminals. He has served in both APAC and National security roles within the Cyber Security industry delivering operational and service excellence. A Detective Superintendent at Queensland Police, where he served 35 years working extensively in the area of financial, identity and cybercrime. Commander of the Queensland Police Fraud & Cyber Crime Group, Chair of the Australia New Zealand Police Advisory Agency’s eCrime Working Group, and driver of the Australian Cybercrime Online Reporting Network, and member of the Federal Attorney-General’s National Cybercrime Working Group. Was the recipient from McAfee for efforts in combating cybercrime – “The International Award for Cyber Crime Fighter of the Year”. Brian is also the recipient of the Australian Police Medal, and in 2010 he was the recipient of the National AusCERT Award for Individual Excellence in Information Security. He has a Masters in Public Policy and Administration.
Michael is a former Intelligence Officer for the Australian Army which he served in for the last 12 years. Within that time he gained a specialisation in Psychological Operations which he employed on operations in the Middle East as a PSYOPS Section commander and Senior planner for a US led multinational taskforce conducting information operations across the entire CENTCOM area of responsibility.
Ian is currently the Chief Information Security Officer (CISO) for the Australian Parliament. This includes all cyber security related responsibilities for the Parliamentary Service, House of Representatives, Senate and the Parliamentary Budget Office. The parliamentary network extends to over 250 sites nationally and services over 5000 users. Ian has maintained the responsibility for cyber security within the parliament during in his previous roles of CTO and acting CIO before moving in the newly created dedicated cyber security executive role. Prior to moving back to Australia to work for the parliament, Ian worked in senior ICT leadership roles in the Middle East and Europe.
Edward Farrell is a security consultant with over five years’ experience in information security and ten years’ experience in the IT industry. As the director of Mercury ISS, one of Australia’s few remaining independent security firms, he has conducted or overseen the delivery 300 security assessment activities and incident responses in the past 5 years. His professional highlights include lecturing at the Australian Defence Force Academy, being rated in the top 200 bug bounty hunters in 2015 and running an awesome team of security professionals.
Chirag is an established cyber security leader with extensive experience building and managing information security, risk management, compliance and awareness programs in multiple countries across various industries. He is the author of the bestselling book – 7 Rules to Influence Behaviour and Win at Cyber Security Awareness, which has been purchased in several countries around the world.
Chirag’s ambitious goal is to enable human progress through trust in technology, He his passionate about creating a safe world online for commerce, communication and entertainment. This vision has led him to become a sought-after speaker on a wide range of topics including cyber threat landscape, emerging technologies, cloud computing and security awareness. He has presented at numerous leading conferences and forums. In his current role as Head of Security and Technology Risk Governance at a large Australian organization, he leads the cyber and technology risk functions along with training and awareness.
Chirag’s academic qualifications include a Master’s degree in Telecommunications Management and Bachelor’s degree in Electronics and Telecommunications Engineering. He holds multiple certifications including Certified Information Security Manager, Certified Information Systems Auditor and Certified in Risk and Information Systems Control.
With 21 years under his belt, Ashwin is an experienced and qualified CISO responsible for running the delivery aspect of the Unisys security business within the APAC region. He is also responsible for leading and delivering security engagements to C level executives within the region ensuring the successful delivery of client security programs. Ashwin is able to bring strategic business value right through to technology level consultancy and implementation. Areas of expertise include IT security and risk management, IS Strategic Planning, IT Disaster Recovery, and enterprise level architecture across all aspects of security. Ashwin is also an accomplished public speaker and writer having featured in many security events and publications.