You are on page 1of 36

AUSTRALIAN CYBER SECURITY

MISSION TO THE
SAN FRANCISCO BAY AREA
12-17 February 2017
2 Australian Cyber Security Mission to the San Francisco Bay Area
WELCOME

WELCOME
The Australian Cyber Security Mission to the San Francisco Bay Area,
coinciding with the RSA Conference 2017, is an initiative of the Australian
Trade and Investment Commission to showcase Australia’s world-class
cyber security capabilities and opportunities to the United States of America.

Cyber security is an The Government has The Australian Cyber


increasingly prominent committed A$30 million Security Mission to the San
industry, and one that is vital to to create the industry-led Francisco Bay Area provides
ensuring we can all enjoy the Australian Cyber Security an outstanding opportunity
benefits of an open, free and Growth Network (ACSGN). to collaborate, learn, build
secure internet. The Australian The ACSGN will coordinate partnerships and promote
Government is committed cyber security research and Australia’s cyber security
to ensuring Australia’s cyber innovation for national benefit credentials. I am excited by
security future and released and enable Australia to become the quality of companies
Australia’s Cyber Security a global leader in cyber security joining me on this mission.
Strategy in April 2016. solutions and services. They have innovative solutions
The strategy sets out five across the spectrum of cyber
themes of action over the Our task to grow and build security demands, ranging
years to 2020: Australia’s cyber security from encryption technologies,
capability is made easier by to authentication, penetration
1. A national cyber partnership Australia’s strong track record testing, and the growing need
2. Strong cyber defences of innovation, our fast growing of education awareness.
3. Global responsibility and highly advanced digital
and influence economy, a highly skilled I look forward to working with
4. Growth and innovation workforce and world-class you to forge the links between
5 A cyber smart nation research and development Australia and the United States
infrastructure. in this important sector.

Craig Davies
Chief Executive Officer, Australian Cyber Security Growth Network

1
ABOUT
AUSTRADE
The Australian Trade and Investment Commission
– Austrade – contributes to Australia’s economic
prosperity by helping Australian businesses,
education institutions, tourism operators,
governments and citizens as they:
›› develop international markets
›› win productive foreign direct investment
›› promote international education
›› strengthen Australia’s tourism industry
›› seek consular and passport services.
Austrade helps companies around the world to
identify and take up investment opportunities in
Australia as well as to source Australian goods and
services. Our assistance includes:
›› providing insight on Australian capabilities
›› identifying potential investment projects and
strategic alliance partners
›› helping you identify and contact Australian suppliers.

Austrade Contact
Frances van Ruth
Trade and Investment Commissioner
USA and Canada Cyber Security Lead
Telephone: +1 415 664 3627
Email: frances.vanruth@austrade.gov.au
Address: 575 Market Street, Suite 1800.
San Francisco, CA 94105
Web: www.austrade.gov.au

2 Australian Cyber Security Mission to the San Francisco Bay Area


AUSTRALIAN CYBER SECURITY
GROWTH NETWORK
Commencing operations in 2017, the Australian Cyber Security Growth Network
(ACSGN) is an industry-led, not-for-profit company that aims to position Australia
as an attractive location for cyber security research and innovation.

The ACSGN was created to cyber security activities and Agenda in December 2015, and
support the development bridge capability and expertise is a key measure of Australia’s
of a vibrant and globally across the country. Cyber Security Strategy,
competitive Australian cyber released in April 2016.
security industry to enhance The ACSGN is one of six Growth
Australia’s economic growth Centres established under The ACSGN is co-chaired by
and help protect Australia’s the Australian Government’s Doug Elix AO, former Senior
interests online. It will operate Industry Growth Centres Vice President and Group
out of several nodes established Initiative. It was first announced Executive, IBM, and Adrian
across Australia, which will as part of the Government’s Turner, Chief Executive Officer,
provide a way of connecting National Innovation and Science Data61.

Craig Davies is the Chief Executive Officer of the


Australian Cyber Security Growth Network Ltd (ACSGN).

Prior to joining the ACSGN, Services and the Westpac IT


Craig was Head of Security for Group.
Atlassian where he lead the
security program supporting all Craig is passionate about
aspects of Atlassian’s business the importance of people in
from product security, to their security programs and the role
Cloud operations and the of security leaders in delivering
protection of Atlassian itself. pragmatic solutions that
support business growth.
Before joining Atlassian, Craig Craig Davies
Chief Executive Officer
was at CSO of Cochlear Craig has 20+ years’
Ltd. He started his career in experience in cyber security
Financial Services, initially and has worked in a number of
with the Commercial Bank fields including Infrastructure Web: www.acsgn.com
of Australia, then Westpac operations and management,
Banking Corporation, where he security architecture, and Email: craig@acsgn.com
worked across the organisation website development and Twitter: @crdavies (personal)
in Retail Banking, Legal operations. @AustCyber (ACSGN)

3
4 Australian Cyber Security Mission to the San Francisco Bay Area
MISSION PARTICIPANTS
Adelaide Business School, 7 Ionize 20
The University of Adelaide
JanusNET 21
archTIS 8
PS&C 22
Australian Computer Society 9
(ACS) Randtronics 23

Cogito Group 10 ResponSight 24

Covata Limited 11 Salt Group 25

Cryptsoft 12 SC8 Technologies Pty Ltd 26

Datacom TSS 13 Secure Code Warrior 27

Deloitte 14 Sense of Security 28

Enosys 15 Shearwater Solutions 29

EY 16 Shelde 30

Foresight 17 Tesserent Australia 31

FunCaptcha 18 Triskele Labs 32

Haventec 19

5
6 Australian Cyber Security Mission to the San Francisco Bay Area
Adelaide Business School, The University of Adelaide

Company Profile In the 2015 Excellence Mission Delegate


in Research for Australia Dr Cate Jerram,
The University of Adelaide results, more than 82 per Management & Systems
is one of Australia’s Group cent of the University’s Research
of Eight research-intensive research areas were rated
universities and is consistently ‘above’ or ‘well above’ world Address
ranked in the top one standard. The University of University of Adelaide,
per cent of universities Adelaide is a comprehensive South Australia 5005
in the world. Established university, offering a broad
in 1874, the University of range of undergraduate Web
Adelaide is Australia’s third and postgraduate programs www.business.adelaide.edu.au
oldest university and an underpinned by world-class
iconic Adelaide institution, research and placing high
contributing significantly to the priority on the student learning
health, wealth and wellbeing experience. There are more
of the state of South Australia than 27,000 students with 26
and a vital part of the cultural, per cent of them international
social and intellectual life of the students from more than 90
community. countries, all participating in a
vibrant campus life.

The University is home to the


Adelaide Business School
which is the leading provider
of Management Education in
South Australia. It offers the full
range including undergraduate
degrees, a world class MBA,
and comprehensive PhD
programs.

7
archTIS

Company Profile Our clients include the Mission Delegates


Australian Departments of Daniel Lai,
archTIS is an Australian-based Defence and Finance and Chief Executive Officer
firm that specialises in the the Australian Trade and Bruce Talbot,
design and development of Investment Commission. Chief Technology Officer
solutions and services for We were also recently
secure information sharing and accepted to the New Zealand Address
collaboration. These solutions Defence Panel. Level 3, 10 National Circuit,
have the ability to apply and Barton
enforce dynamic, policy-driven Australian Capital Territory 2600
access controls at the user
and information level utilizing Web
Attribute Based Access Control www.archtis.com
(ABAC).

In 2007 archTIS developed


the first US (NSA) and
Australian (ASD) accredited
ABAC solution for Top Secret
Compartment Information
Holdings, T360, which is now
a third generation solution. In
2014 archTIS was awarded the
Defence Excellence in Security
Award from the Australian
Department of Defence for
delivery of its ICT Security
Architecture.

8
ACS (Australian Computer Society)

Company Profile 1. A
 ccreditation of Australian Mission Delegates
University Degrees: Anthony Wong,
ACS is the largest community This includes cyber President
of ICT professionals in security undergraduate and Andrew Johnson,
Australia, with almost 23,000 postgraduate degrees. Chief Executive Officer
members working in business, 2. P rofessional Standards
education, government and the Legislation: Through ACS’s Address
community. There are almost efforts, the ICT profession Level 11, 50 Carrington Street,
1,000 ACS members living was gazetted in Professional Darling Harbour
overseas in over 90 different Standards legislation New South Wales 2000
countries worldwide. meaning that eligible ACS
members and those working Web
The ACS is passionate about in cyber security areas have www.acs.org.au
the ICT profession being capped liability.
recognised as a driver of 3. Skills profiling: Over the last
productivity, innovation, and decade ACS has assessed
business – able to deliver real, the skills of over 100,000 ICT
tangible outcomes. First and professionals including in
foremost, ACS’ core business cyber security areas.
is the establishment of 4. C ertification services:
professional benchmarks, and An ACS professional
the independent assessment certification is technology
and validation of these agnostic, recognising
benchmarks. transferable skills and
competencies. When
Services delivered that engaging a certified
demonstrate ACS holds a professional you know they
unique position in the Australia are committed to a code
ICT ecosystem include: of ethics, the primacy of
the public interest, and
participating in ongoing
continuing professional
development to ensure their
skills and knowledge remain
contemporary.

9
Cogito Group

Company Profile It provides efficiency and Mission Delegate


security improvements Richard Brown,
Cogito Group specialises in for provisioning and Managing Director
authentication and encryption de-provisioning, system
solutions. Cogito Group protects monitoring and integration of Address
data not only from unauthorised physical and logical access. Unit 5, 134-142 Hawker Place,
access and disclosure, but It is now a sought-after Hawker
also from being altered by an standalone product that Cogito Australian Capital Territory 2614
unauthorised third party or a Group markets and sells
trusted insider with malicious around the world. Web
intent. This assists in the www.cogitogroup.com.au
detection and prevention of Cogito Group provides
fraud or other malicious activities Authentication as a Service
by third parties or trusted (AaaS) solutions using Jellyfish
insiders. While many other to several New Zealand
companies identify risk, Cogito Government agencies.
specialises in practical ways to We also provide solutions to
mitigate that risk or issue. major Australian Government
agencies including the
Cogito Group has developed Australian Department of
Jellyfish®: a cyber security Defence.
command and control platform.
Jellyfish® provides a single pane Awards: 2016 Finalist Australian
of glass for multiple security Export Awards; 2016 winner
services. It is a streamlined, of Australian Capital Territory
adaptive and agile system of (ACT) Export Awards (Business
security, identity and access Services); 2015 winner of ACT
services. The integration of these Export Awards (Emerging
services reduces the exposure Exporter); 2014 winner ACT
to numerous risks vectors. Telstra Business Awards.

10
Covata Limited

Company Profile Our patented technology Mission Delegates


underpins two data security Trent Telford,
Covata is an ASX-listed data offerings: Chairman
security software company ›› Safe Share is a secure Ted Pretty,
that protects enterprise and file sharing solution with Chief Executive Officer
government entities from end-to-end encryption that
threats intrinsic to conducting secures data in an uncertain Address
business in the digital age. environment. Level 4,
We deliver innovative data- ›› Covata Delta is a data 154-156 Clarence Street
centric solutions that provide security cloud-based set of Sydney
true end-to-end security, tying application programming New South Wales 2000
identity to policy and key interfaces (APIs), software
management. With Covata, development kits (SDKs) Web
data is always protected and a developer framework www.covata.com
wherever it travels – inside a that enables anyone to
network, beyond the domain, incorporate security into
to mobile devices and to the new or existing applications,
cloud. With data-level security products and services, to
encryption, granular access facilitate secure data flow.
controls that extend to external
users, view-only restrictions, Covata’s software can be
real-time revocation and used by small, medium and
complete auditability, Covata large customers across
can be entrusted to ensure enterprise and government, in
data is protected and secure, verticals including healthcare,
however it is shared. automotive, financial services,
DevOps, cloud and other
industries where security and
compliance are mandated.
Covata has over 45 employees
across three offices in Australia,
the United Kingdom and the
United States of America.

11
Cryptsoft

Company Profile Cryptsoft’s solutions have been Mission Delegate


selected by prominent global Greg Scott,
Cryptsoft is an Australian companies for interoperable Chief Executive Officer
OEM Supplier that operates enterprise key management
worldwide in the enterprise and encryption technology in Address
key management security their storage, infrastructure and 22 Aylesford Street,
market and delivers OASIS Key security, and cloud products. Annerley
Management Interoperability Cryptsoft is committed to the Queensland 4103
Protocol (KMIP) technology, development of standards
services and designs for based security software and Web
simplified, lower-cost, trusted, participates in the OASIS www.cryptsoft.com
vendor-agnostic cryptographic interoperability process to
and interoperable key ensure that security products
management security solutions from a wide range of vendors
to global enterprises for their can interoperate together to
storage, security and cloud ensure customer satisfaction.
products.
Cryptsoft is an OASIS
Foundational Sponsor, and a
Storage Networking Industry
Association (SNIA) Storage
Security Industry Forum (SSIF)
Voting Member.

12
Datacom TSS

Company Profile Our security services assist our Mission Delegate


clients to anticipate, plan and Richard Byfield,
TSS is a leading Australian protect against cyber threats Managing Director
pure play cyber and rather than react to them.
information security company. We provide our clients with Address
TSS was established in 2011 niche and tailored intelligent Level 5,
by four former Australian security solutions. 71 Northbourne Avenue
Government security and Acton
intelligence personnel and has Our Managed Security Australian Capital Territory 2601
since grown to 25 permanent Services cover cyber threat
employees. management, vulnerability Web
management and full security www.datacomtss.com.au
We deliver business focussed incident lifecycle management.
cyber security across Australia
and New Zealand, and believe Our Security Assurance
security must be aligned Services are focused on
to business needs, and be optimising our clients’ cyber
practical, implementable security at the strategic,
and affordable to be truly operational and cultural levels.
successful. Our services help our clients
build a robust security baseline
With a level of expertise and and establish supporting
knowledge unmatched in programs to mitigate
the Australian market, we contemporary threats, while
proactively secure and defend minimising cost and disruption
our clients from contemporary to their business.
cyber threats around the world,
around the clock.

Our clients include some of the


world’s largest and best-known
brands, with whom we have
built long-term partnerships
across critical business sectors
in both the public and private
sectors.

13
Deloitte Risk Advisory

Company Profile Deloitte Advisory Cyber Risk Mission Delegate


Services works with our clients Puneet Kukreja,
Deloitte is the world’s leading worldwide to better align cyber Partner – Cyber Advisory
information technology security investments with
research and advisory strategic business priorities, Address
company. Gartner ranked establish improved threat 550 Bourke Street,
Deloitte number one globally awareness and visibility, Melbourne
in security consulting services and strengthen the ability of Victoria 3000
(based on revenue) for the organisations to thrive in the
fourth consecutive year in their face of cyber incidents. Web
April 2016 report Market Share: www2.deloitte.com/au/en.html
Security Consulting Services,
Worldwide, 2015.

Deloitte helps organisations


plan and execute an integrated
cyber approach to harness
the power of information
networks to enhance business
operations, increase mission
performance, and improve
customer support, without
compromising security or
privacy. Deloitte services
include, but are not limited
to, the protection of private
data, intellectual property,
and cyberinfrastructure. Even
military and national security
can be compromised by
deliberate attacks, inadvertent
security lapses, and the
vulnerabilities of a relatively
immature, unregulated global
internet.

14
Enosys

Company Profile We own our customers’ Mission Delegate


problems and deliver Joseph Mesiti,
Enosys Solutions was formed measurable outcomes. Sales Director
in 2011 by a group of highly
experienced professionals Enosys Solutions was formed Address
in networking, security and specifically to help customers Level 7, 56 Berry Street,
IT infrastructure. We are in the emerging area of North Sydney
a provider of professional infrastructure technology New South Wales 2060
services, software licensing, where applications meet
hardware, security and related networks for the following Web
IT services to corporate and reasons: www.enosys.com.au
public sector organisations
and operate in the advanced ›› Applications are increasingly
technology space “where looking to offload services
applications meet networksTM”. to the network and rafts of
infrastructure technologies
Enosys Solutions is closely are looking to fill this need.
partnered with leaders in ›› Traditional firewalls
enterprise security including F5, and network security
Splunk and Palo Alto Networks. technologies cannot offer
We are a trusted integrator protection from increasingly
specialising in end-to-end sophisticated application
next-generation infrastructure layer threats.
and security-enabled solutions ›› The relentless transition of
and services. With strong applications to web-based
technical expertise and cross infrastructure and delivery
industry know-how, we help onto mobile devices has
our customers enhance their caused organisations to
business performance in an strain at the additional
ever changing network, security burden.
and infrastructure environment.

15
EY

Company Profile ›› Managing identity and Mission Delegate


access effectively and Richard Watson,
EY is a global leader in efficiently: identity and Lead Cyber Partner
assurance, tax, transaction access management (IAM) Asia Pacific
and advisory services. Our processes are critical to
cyber professionals comprise meeting compliance needs Address
former CSOs, CIOs and and improving operational 200 George Street,
specialised subject matter efficiency. Companies Sydney
resources, including former continue to invest in point New South Wales 2000
military personnel. Drawing solutions without having a
on our in-depth knowledge complete vision. We can help Web
and extensive experience improve IAM capabilities to www.ey.com/au
across all sectors we work with deliver improved compliance
clients to deliver sustainable, and better management of
measurable results: systems.
›› Mitigating the risk of
›› Cyber Transformation: information loss and
EY’s IT and OT cyber addressing privacy
transformation capability regulations: Increased and
helps companies understand revised legislation is making
the multiple security companies rethink how they
challenges that confront manage, move and use
them every day. We can personal information and
help to effectively balance intellectual property. Our
people, processes and privacy and data protection
technology — enabling better professionals can help
security and risk decisions, develop new strategies
and a reduction in the cost of for securing information
managing security risk. that balance regulatory
›› Identifying and responding requirements with business
to cyber threats: with needs.
reputation and brand on
the line, companies can’t
afford to be compromised.
Our threat and vulnerability
team can help build the right
model to protect companies,
inside and out.

16
Foresight

Company Profile Our expertise addresses Mission Delegate


the architecture and Peter Baussmann,
Foresight is a specialist cyber implementation of preventative, Managing Director
security consultancy based detective and responsive
in Canberra, Australia. We security controls, which we Address
provide information assurance believe is a fundamental Level 6, 1 Hobart Place,
and security compliance capability in ensuring Canberra
services to help enterprise Australian networks become Australian Capital Territory 2601
and government agencies the hardest in the world to
secure their ICT environments. compromise. Web
Our capabilities and expertise www.foresight.net.au
include:

›› IRAP Assessments and


assessment preparation;
›› ISM/PSPF/PCI/ISO27001
compliance and the practical
application of security
standards;
›› Network, systems and
application security
architecture;
›› Cloud security assurance,
assisting organisations to
securely migrate to the cloud;
›› Security risk assessments
and threat modelling;
›› ASD Top 35 design/
implementation;
›› Security documentation;
›› Vulnerability management
and penetration testing; and
›› Security governance.

17
FunCaptcha

Company Profile FunCaptcha has been Mission Delegate


proven to be hundreds of Kevin Gosschalk,
FunCaptcha is a human times more effective than Chief Executive Officer
verification service that any other CAPTCHA solution and Founder
prevents spam and other on the market. FunCaptcha
forms of automated abuse. protects social networks, Address
Founded in 2013 by Kevin voting websites, ecommerce 131 Leichhardt Street,
Gosschalk and Matthew Ford, platforms and many other sites Spring Hill, Brisbane
the company’s flagship service seeking to prevent automated Queensland 4000
has grown to be the first line abuse.
of defence against spam for Web
companies such as Kik, IMVU www.funcaptcha.com
and CBSi.

Distinguished from traditional


CAPTCHAs, FunCaptcha uses
fun visual puzzles that are
highly usable, and configurable
in dozens of ways to custom-
fit any client’s needs. These
proprietary puzzles are backed
by patent-pending 3D image
technology, which make them
invulnerable to brute force
and proactive in outsmarting
machine learning.

18
Haventec

Company Profile Wallet permits users to Mission Delegates


manage and store PCI locally, Robert Morrish,
Haventec has three patented on their devices, in encrypted Chief Executive Officer
cyber security products that bundles. Payment processing Naveen Neti,
target protective and adaptive requires Haventec patented Chief Engineer
security solutions for user key technology to unlock credit
identity, device identity and card details. Keys are thrown Address
personal credit information away after each payment and Level 27, 1 Market Street,
transactions. new ones are generated to Sydney
ensure a continually evolving New South Wales 2000
Haventec Authenticate security ecosystem that
is a truly password-less protects user information. Web
authentication system. With it www.haventec.com
organisations can decentralise Blockchain Platinum locks the
user identity and eliminate blockchain wallet to the device
central password stores. It with patented key signature
never stores a user secret technologies, ensuring it
anywhere. Users reuse the cannot be copied, cloned or
same 4-digit pin across all hijacked. Blockchain Platinum
devices and applications, while incorporates an automated
enjoying a secure, trusted and bit token transmission system
frictionless user experience. that sends known machine
Authenticate uses patented identities to the other machines
rolling key technology to on the network. Through bit
ensure the user’s security token exchanges, Blockchain
environment evolves and Platinum builds an adaptive
adapts continuously to their ledger of trust between known
behaviour. machine identities. This
enables elimination of central
Haventec Secure Wallet device certificate stores (often
tackles security problems targeted by hackers) as well
created by centralised credit as the need for costly fixed
card stores and Merchant VPN connections between
Personal Credit Information businesses.
(PCI) compliance. Secure

19
Ionize

Company Profile We maintain strong capability Mission Delegate


in the following disciplines: Andrew Muller,
Ionize is a fast growing and Managing Director
highly-focused cyber security ›› security governance, risk and
company. Our 20 highly compliance; Address
skilled and experienced ›› security architecture, 9/40 Brisbane Avenue,
technical security personnel design and engineering Barton
serve a range of government, (deploying and managing Australian Capital Territory 2600
academic and commercial security information and
organisations in Canberra, event management (SIEM), Web
Melbourne and Sydney. In vulnerability management www.ionize.com.au
Canberra, we are one of and other security
only two Australian Signals technologies);
Directorate (ASD) endorsed ›› security operations, including
Information Security penetration testing, security
Registered Assessors Program monitoring and incident
(IRAP) training suppliers. We management;
are also a strong presence ›› security training and
in the security community, awareness (IRAP and secure
organising the Canberra coding training)
Sectalks, Canberra Bsides
conference and the Open Ionize currently services
Web Application Security financial, telecommunication,
Project (OWASP) Testing Guide government, education,
project. logistics and technology
sectors in the Australian
market. In an international
context, Ionize has serviced
Apptio, a US technology
company, and French Telecom,
a global telecommunications
company.

20
JanusNET

Company Profile The janusGATE suite augments Mission Delegate


special messaging and control Alan Schaverien,
janusNET’s janusSEAL suite requirements that extend the Director
enforces corporate security control of information where
classification policies by there are gaps in standard Address
allowing users to distinguish email platforms. U8.04, 6A Glen Street,
between – and better protect Milsons Point
– public, private and highly These products are designed New South Wales 2061
sensitive corporate information. to complement other security
technologies to maximise Web
janusNET was established customers’ existing security www.janusnet.com
in 2004 to enforce message infrastructure investment.
classification for government The combination of technology
use. The founding premise has solutions better manages risk.
stayed as true today as it ever
was: janusNET solutions are
Utilize the intelligence of deployed globally in both
your greatest asset – your public and private sector
people – to manually classify environments. Our customers
information, to dramatically are complex, connected
improve information security enterprises with thousands
outcomes simply, effectively, of employees, including:
and inexpensively. government departments,
law enforcement agencies
Requiring end-users to apply and commercial enterprises.
a security classification to all Our customers share the
email messages they send, recognition that access to
and to all documents they confidential and mission-
create enhances any data critical information must be
protection initiative by allowing controlled and managed at all
existing information security times.
systems to better manage
unstructured data.

21
P E O P L E S E C U R I T Y & C O M M U N I C AT I O N

LTD

PS&C

Company Profile ›› Configuration audit and Mission Delegate


control Teesaan Koo,
PS&C is an ICT professional ›› Exploitation tools Southern Practice Manager
services entity focused ›› Compliance and executive
on people, security and coaching training Address
communication. Its business ›› Security software sales and Level 10, 410 Collins Street,
units service a range of maintenance Melbourne
government and corporate Victoria 3000
organisations. PS&C People is a contractor
management and sourcing Web
PS&C’s business units were business that provides www.pscgroup.com.au
formed through acquisition of specialist resources to
the following companies: customers for medium to long
People: Systems & People and term projects. PS&C People
Bexton IT Services provides an end-to-end ICT
Security: Pure Hacking, professional recruitment
Hacklabs, Securus and service as well as:
Certitude ›› Technical and business
Communication: Allcom analysis
Networks ›› Technical services such
as enterprise and solution
PS&C Security offers a variety architecture, business
of Cyber security services system implementation
across a breadth of market and integration, information
segments, including: management, application
›› Managed security services development, and testing and
›› Penetration testing quality management.
›› Red teaming
›› Mobile application testing PS&C Communication
›› Payment card security manages, designs and deploys
systems and compliance unified communications,
tools IP telephony, network and
›› Vulnerability management business technology solutions
solutions for a wide range of corporate
›› Web application scanners and government clients.
and firewalls

22
Randtronics

Company Profile Randtronics is a privately Mission Delegate


owned company and delivers Bob Adhar,
Randtronics is a leading solutions worldwide via its President and
developer of data encryption offices located in Sydney, Chief Executive Officer
solutions that protect against Brisbane, San Francisco,
malicious intent from external London, New Delhi, Seoul and Address
hackers, internal employees Kuala Lumpur through global Suite 1, 1 Level 1,
and outsource contractors. OEM partners, distributors, 64 Talavera Road,
Randtronics has a global system integrators and North Ryde
presence and delivers resellers. Our customers New South Wales 2113
solutions to clients worldwide. include cloud hosting
providers, energy utilities, Web
Randtronics’ patent pending retailers, insurance companies, www.randtronics.com
core technology, Data payment processors,
Privacy Manager (DPM), government departments,
protects structured and banks, airlines, defence
unstructured data using agencies and manufacturers.
encryption, key management,
masking, tokenization and
anonymization with multi-factor
authentication, access control
and auditing. DPM’s offerings
are:

›› some of the easiest to install


and use
›› work on-premise or in the
cloud
›› use innovative data
encryption
›› leverage current staff and
skillsets
›› deploy quickly and easily,
with a rapid ROI

23
ResponSight

Company Profile that abnormal activity is Mission Delegate


occurring at the endpoint. Jeff Paine,
ResponSight is a data science- We focus on behavioural Chief Executive Officer
based software development profile management at an
company focusing on security individual endpoint level, and Address
breach and hacker detection will integrate with Security Level 2, 520 Bourke Street,
through behavioural analytics. Information and Event Melbourne
We work with large enterprises Management (SIEM) and Victoria 3000
that have significant endpoint other incident response and
fleets. We provide insight into forensics systems to add or Web
“abnormal” activity at the enhance priority identification www.responsight.com
edges of enterprise networks and rapid response to existing
and beyond, when users are implementations.
roaming and away from the
relative safety of the corporate ResponSight is currently
environment. undertaking a data analytics
pilot with a small group of
ResponSight’s unique invitation-only enterprises,
differentiator is that our refining our aglorithms and
analytics engines require no integration designs. We
access to private or sensitive expect to be commercially
data to profile the behaviour available in Q2 2017 (Mar-
represented by activity at the Jun), with an initial focus on
endpoint. We deliberately financial services, professional
avoid collecting anything services, and the critical
that could uniquely identify infrastructure, utilities and
the end user. Our technology telecommunications sectors.
differs significantly from other
security technologies in that ResponSight is a small team
we don’t need to know who of eight located in Melbourne,
a person is to determine Australia.

24
Salt Group Pty Ltd

Company Profile Salt has deployments in Mission Delegates


major Australian banks for Pedram Ghovonlou,
Salt Group is a Melbourne- both retail and institutional Chief Technology Officer
based IT security company banking applications, as well Trevor Horsfall,
of around 30 IT professionals as in government and law Security Consultant
focussed on delivery of enforcement agencies.
sophisticated identity Salt has offices in Indonesia Address
management and user and and has reseller partners in Level 30, 459 Collins Street,
transaction authentication the United States of America, Melbourne
solutions for banking, Vietnam, Singapore and Victoria 3000
government and corporate New Zealand.
sectors. Web
www.saltgroup.com.au
We achieve this through
provision of specialised security
design and integration services
along with deployment of
best-of-breed security products,
including Salt’s mobile
authentication technologies.
These technologies provide
our customers high-assurance
user and transaction
authentication with an intuitive
user experience as required for
mass market situations such
as banking. Increasingly, our
customers are migrating from
the use of smart cards and
specialised one-time password
(OTP) tokens as second factor
authentication mechanisms
to the use of Salt mobile
authentication which provides
them with more powerful
authentication strategies at a
fraction of the cost.

25
Sc8
Technologies

SC8 Technologies Pty Ltd

Company Profile Jindalee Partners Pty Ltd Mission Delegate


is a Perth-based boutique Harry Karelis,
SC8 Technologies Pty technology, merchant banking, Director
Ltd (“SC8”) was recently and corporate advisory firm
established by Jindalee established by seasoned Address
Partners in partnership with executives in the capital Level 5,
Edith Cowan University in markets and private equity 235 St Georges Terrace,
Perth. SC8 leverages the sectors. Its focus is to identify Perth WA 6000
world-class applied research early stage, world-class
reputation in various aspects Australian technologies and Web
of cybersecurity at Edith through its networks provide www.sc8.tech
Cowan University. SC8 capital and assistance in
recently closed its Series A building out the company’s
funding round and is ramping strategic planning including
up operations, including recruiting top tier talent
expanding its management and forming international
team and progressing with partnerships.
activities related to its pilot
customer – an ASX Top 100
company.

26
Secure Code Warrior

Company Profile Our customers are able track Mission Delegate


their skills and progress, and Pieter Danhieux,
Secure Code Warrior (SCW) benchmark different teams, Chief Executive Officer
is an early stage start-up that including assessing potential
provides awareness, training suppliers and new recruits. Address
and certification of software SCW is truly the first global 207 Darling Street,
engineers to allow them to platform that developers want Dubbo
build software faster and more to learn on and it allows clients New South Wales 2830
securely. SCW has trained to ensure a minimum baseline
more than 6,000 developers of security skills in their Web
with 20,000 hours of hands-on organisation. www.securecodewarrior.com
practice in the first 12 months
of being active in Australian,
European and US markets.
Our focus and success is in
the financial industry, with four
of the top 30 global banks and
two of the top five US credit
card companies as customers.

Unlike classic vocational


education, SCW provides
a fully hands-on, gamified
experience with metrics, leader
boards and badging that
enables developers to master
secure coding in different
development languages and
frameworks.

27
Sense of Security

Company Profile Our Directors and staff are Mission Delegate


well known thought leaders in Murray Goldschmidt,
Established in 2002, Sense of the IT Security industry and Chief Operating Officer
Security is a Sydney-based, speak regularly at relevant
specialist IT security and conferences, industry-related Address
risk management consulting meetings and corporate Level 8, 66 King Street,
practice delivering industry boardrooms. Sydney
leading services and research New South Wales 2000
to clients throughout Australia, We operate with full R&D
Asia Pacific and abroad. capabilities to support Web
development and innovation www.senseofsecurity.com.au
We provide expertise across of our services.
vulnerability management,
incident response, DevOps Each year, many large
security, security operations international companies
for cloud environments as well utilize our specialist
as a full range of technical technical security skillsets.
assurance security testing These include customised
services for networks, web penetration testing of hardware
applications, wireless and (i.e. telecommunication grade
mobile. equipment, cable operator
end-points and various
We also develop and medical devices) and bespoke
manage information security software (i.e. satellite control
governance programs, cyber systems, clinical and essential
risk management frameworks services infrastructure – power,
along with assessment for gas and water – environments).
compliance and reporting
against regulations and Our services are used by major
industry standards, including companies in the banking and
payment security, health and finance, insurance, healthcare,
personal information. retail, cloud service providers
as well as resources, utilities,
and telecommunications. In
the public arena we conduct
business with local, state and
federal governments.

28
Shearwater Solutions

Company Profile 3. S
 ecurity Consulting – Mission Delegate
Our consulting services are Mark Hofman,
Shearwater provides designed to meet business Chief Technology Officer
information security and security objectives,
services to mid and large including security reviews Address
enterprises across finance, against PCI DSS, ISM, PSPF Level 1, 6 Spring Street,
retail, manufacturing, and ISO 27001, Information Chatswood
telecommunications, and security health checks New South Wales 2067
utilities. and audits, threat and risk
assessments, and strategy Web
We concentrate on providing development. Shearwater www.shearwater.com.au
support to organisations in four is a PCI Qualified Security
key problem areas: Assessor (QSA) firm and has
a number of IRAP assessors
1. A
 pplication Security – and accredited ISO/IEC
Shearwater is a CREST 27001 Lead Auditors.
accredited penetration 4. E
 ducation and Skills
testing service provider. Our Uplift – Shearwater is
application security offerings the exclusive provider of
include: threat modelling, SANS technical security
architectural consulting, training courses in Australia.
source code reviews, Shearwater also developed
vulnerability assessment, Phriendly Phishing, an
and penetration testing. award-nominated security
2. O perational Security – awareness training solution.
Our operational security
services include all elements We have an extensive
of the Plan, Design, Build background in working in
and Run lifecycle. This federal government and high-
includes product selection, security environments with
procurement, deployment several staff members holding
and ongoing daily high levels of government
management. clearance.

29
Shelde

Company Profile Shelde is not a ‘body shop’ or Mission Delegates


contingent workforce provider. Bruce Williams,
Shelde is a specialist provider With very few exceptions, our Chief Executive Officer
of ICT security services and staff are full time employees, Brian Jamieson,
solutions. Our aim is to assist enabling us to invest in their Chief Technology Officer
large enterprise customers professional and personal
in the banking and finance, development over time. Many Address
telecommunications and of our staff were hand-picked Level 7, 440 Collins Street,
federal government sectors from around the world and are Melbourne
by maximising returns on recognised as experts in their Victoria 3000
technology investments, chosen disciplines. Shelde is
minimising operational risk proud that we can attract and Web
and improving visibility of their retain some of the best talent www.shelde.com
organisational activities. globally – we are also proud
of the cultural and gender
With a team of approximately diversity we have managed to
60 staff, located in Melbourne, achieve and maintain within
Sydney and Canberra, we our business.
are a highly experienced
and focused organisation. Key capability areas for Shelde
Our specialist team of include: application security,
practitioners is larger than cyber security, data acquisition,
the on-shore teams of many data analytics, process and
of our competitors. Our size workflow automation and
means that Shelde can provide orchestration.
the depth of capability our
enterprise customers’ need,
while offering a high degree of
flexibility and agility to respond
to changing business or
technology requirements.

30
Tesserent Australia

Company Profile Tesserent and its channel Mission Delegates


partners provide these Keith Glennan,
Tesserent is a Melbourne services to more than 350 Chief Executive Officer
based ASX-listed company that organisations located in 11 Karen Negus,
provides world-class managed countries and territories. Head of Marketing
security to organisations
throughout Australia and Our business is dedicated to Address
overseas. Our team of experts offering customers a cost- Level 2, 683 Burke Road,
use the Tesserent security effective, world-class managed Camberwell
platform and a range of partner security solution. Tesserent has Victoria 3124
products to tailor a network a proven record of improving
security solution specifically for return on IT investment, driving Web
our customers. efficiency and optimising www.tesserent.com
network performance. We
Tesserent has a MSSP also bundle connectivity and
Platform, enabling the colocation to optimise our
delivery of Security-as-a- customers’ network security
Service to small and large and deliver a total solution at
organisations. Industry sectors the best possible price.
serviced by Tesserent include
education, financial services,
transport, healthcare, religious
institutions, logistics, retail,
government (federal, state,
local), and professional
services.

31
Triskele Labs

Company Profile We work with clients across Mission Delegate


multiple verticals due to our Nick Morgan,
Triskele Labs is a cyber holistic and strategic approach. Managing Director
security professional services Our clients vary from 30-
company launched in October 15,000 staff, with needs and Address
2014 and headquartered in requirements based on their 220/480 Collins Street,
Melbourne. We provide a size. Triskele Labs understands Melbourne
holistic service to our clients that all organisations need Victoria 3000
across advisory, compliance, cyber security, not just the
technical (penetration big guys. Web
testing and code review) and www.triskelelabs.com
education. In recent times, At present, Triskele Labs
Triskele Labs has evolved to focuses on the Australian
provide a managed security market. However, we also
service provider including have several clients in South
managed SIEM, vulnerability East Asia, predominantly in
assessments and security Singapore. Our vision is to
advice with a product aptly reach out to a global audience,
named, DefenceShield. Our with our scalable products
most recent achievement DefenceShield and PhishAway.
has seen us develop and
release our own simulated
phishing platform, PhishAway,
to help our clients identify staff
requiring focussed training.

32
Australian Cyber Security Mission to the San Francisco Bay Area 33

You might also like