Blogs2021-09-24T18:53:33+10:00

Lisa Jiggetts

By |28/04/2023|

I’m a pentester, aka an ethical hacker. I assess an organisation’s system/network to find and exploit vulnerabilities for the purpose of identifying any weak spots that malicious attackers could take advantage of. I enjoy the hunt, and the challenge of finding misconfigurations and vulnerabilities: knowing I am directly helping [...]

Noushin Shabab

By |28/04/2023|

I’m a Senior Security Researcher at Kaspersky ANZ, which means I have to keep across the latest advances in malware and attack techniques, solve the puzzle of a new cyber threat and share the knowledge gained from my investigation with others. It’s challenging, but it’s what I love the [...]

Christina Keing

By |28/04/2023|

 I am a director in Deloitte Australia’s Cyber team, a strategic cyber leader enabling rapid and secure delivery of digital innovations under a cloud-first and agile strategy. I work with clients as their trusted cybersecurity partner to solve complex security problems, drive progress in a dynamic and digital world, [...]

Gergana Winzer

By |28/04/2023|

 I ’m the Industry Director CyberSecurity APAC at Unisys,and I I report to the global Vice president of Security who is based out of California in the US. Unisys is a systems integrator and a technology and services company, so cyber risk has a very high priority. However, I [...]

Amy Roberts

By |28/04/2023|

 I can’t remember a time when I wasn’t fighting for women’s voices to be heard, or for social equity and equality generally, so it makes complete sense I’ve ended up where I am today. In my role within the Corporate and Capability Group of the Australian Signals Directorate (ASD), [...]

Dr Lesley Seebeck

By |28/04/2023|

There’s a story about former British prime minister, Harold MacMillan: when asked what his biggest challenge was, he is said to have responded, “Events, dear boy, events.” That rings true in cybersecurity. It is full of constant movement, noise and magic, or on a dark day, fear, uncertain and [...]

Shelly Mills

By |28/04/2023|

 I ’m a business analyst and program coordinator in the data strategy and governance team at the University of Queensland. That at least is my title. In reality, my role is much wider. I do a bit of everything: project management, change management, communications and business analysis activities to [...]

Giulia Traverso

By |28/04/2023|

How do you become a “cybersecurity expert”? The journey that would lead me into working in this field started more than fifteen years ago, when nobody was taking about cybersecurity. I wasn’t aware of it either. I stumbled upon cybersecurity by chance. My journey began fifteen years ago when, [...]

Jo Stewart-Rattray

By |28/04/2023|

 I head a South Australia based advisory practice,  BRM Advisory, focussed on technology and security, but since 2019 I have been on secondment as chief security officer to Silver Chain Group, a provider of in-home health and aged care services with over 100,000 clients across Western Australia, South Australia, [...]

Go to Top