Lisa Jiggetts
I’m a pentester, aka an ethical hacker. I assess an organisation’s system/network to find and exploit vulnerabilities for the purpose of identifying any weak spots that malicious attackers could take advantage of. I enjoy the hunt, and the challenge of finding misconfigurations and vulnerabilities: knowing I am directly helping [...]
Noushin Shabab
I’m a Senior Security Researcher at Kaspersky ANZ, which means I have to keep across the latest advances in malware and attack techniques, solve the puzzle of a new cyber threat and share the knowledge gained from my investigation with others. It’s challenging, but it’s what I love the [...]
Christina Keing
I am a director in Deloitte Australia’s Cyber team, a strategic cyber leader enabling rapid and secure delivery of digital innovations under a cloud-first and agile strategy. I work with clients as their trusted cybersecurity partner to solve complex security problems, drive progress in a dynamic and digital world, [...]
Gergana Winzer
I ’m the Industry Director CyberSecurity APAC at Unisys,and I I report to the global Vice president of Security who is based out of California in the US. Unisys is a systems integrator and a technology and services company, so cyber risk has a very high priority. However, I [...]
Amy Roberts
I can’t remember a time when I wasn’t fighting for women’s voices to be heard, or for social equity and equality generally, so it makes complete sense I’ve ended up where I am today. In my role within the Corporate and Capability Group of the Australian Signals Directorate (ASD), [...]
Dr Lesley Seebeck
There’s a story about former British prime minister, Harold MacMillan: when asked what his biggest challenge was, he is said to have responded, “Events, dear boy, events.” That rings true in cybersecurity. It is full of constant movement, noise and magic, or on a dark day, fear, uncertain and [...]
Shelly Mills
I ’m a business analyst and program coordinator in the data strategy and governance team at the University of Queensland. That at least is my title. In reality, my role is much wider. I do a bit of everything: project management, change management, communications and business analysis activities to [...]
Giulia Traverso
How do you become a “cybersecurity expert”? The journey that would lead me into working in this field started more than fifteen years ago, when nobody was taking about cybersecurity. I wasn’t aware of it either. I stumbled upon cybersecurity by chance. My journey began fifteen years ago when, [...]
Jo Stewart-Rattray
I head a South Australia based advisory practice, BRM Advisory, focussed on technology and security, but since 2019 I have been on secondment as chief security officer to Silver Chain Group, a provider of in-home health and aged care services with over 100,000 clients across Western Australia, South Australia, [...]