Story image

NT Govt & Charles Darwin Uni to fund Associate Professorship in Cyber Security

12 Oct 2017

The Northern Territory Labor Government is jointly investing $700,000 as part of an agreement with Charles Darwin University (CDU) to fund a new Associate Professorship in Cyber Security, which is expected to kick off in 2018.

The professorship will run for five years and will allow for local talent to become more involved in cyber security for both the university and for the Northern Territory as a whole.

“This is an exciting initiative that will enhance CDU’s ability to carry out research in cyber security, improve our capacity to provide advice to government and local businesses and improve the skill-base in the Northern Territory,” comments CDU’s associate professor of engineering, Krishnan Kannoorpatti.

Northern Territory Government’s Minister for Corporate and Information Services, Lauren Moss, says the investment is also about protecting businesses from growing cyber risks.

“We need to make sure we have the local knowledge and talent to keep the hard earned income of local Territory business safe from cyber criminals and other digital threats,” Moss says.

“This is a significant development for the Territory in protecting Territory businesses, creating jobs, developing our own and providing future opportunities for our children,” she continues.

CDU will also launch three new courses in security: The Graduate Diploma of IT Cyber Security; the Graduate Certificate of IT Cyber Security and the Master of IT Cyber Security.

“This important investment will enable local students to study this highly sought after skill locally here at CDU, which means meeting local demand with local talent, a win-win situation,” comments CDU’s head of the School of Engineering and IT, Friso De Boer.

“Graduates will be equipped with cutting-edge skills that are highly sought after in the fields of security analysis and ICT network security, and they will be trained to undertake the internationally recognised Certified Information Systems Security Professional certification, recognised by many employers in the industry,” comments Kannoorpatti.

The government will help local businesses by delivering ‘Cyber Security for Your Business’ presentations around NT and participating in the inaugural October Cyber Security month.

The Australian Cyber Security Centre (ACSC) found that 90% of businesses across Australia had faced a cyber breach of some sort between 2015-2016.

The Australian Information Security Association (AISA) Branch Chair Sharmila Pakiaraja says the NT Government should be commended for its efforts to tackle cyber threats through a variety of initiatives.

Businesses can register for the Cyber Security for Your Business Presentations at

“Cybercrime can affect any business, no matter how small the enterprise, and it is important that business owners have the tools to recognise the threats and avoid being the next victim,” Moss concludes.

Aerohive launches guide to cloud-managed network access control
NAC for Dummies teaches the key aspects of network access control within enterprise IT networks and how you can secure all devices on the network.
Sungard AS named DRaaS leader by Forrester
It was noted for its disaster-recovery-as-a-service solution’s ability to “serve client needs at all stages of their need for business continuity.”
Gartner: The five priorities of privacy executives
The priorities highlight the need for strategic approaches to engage with shifting regulatory, technology, customer and third-party risk trends.
emt Distribution adds risk intelligence vendor
Flashpoint has signed emt Distribution to provide channel partners in Oceania and South East Asia a solution for illicit threat actor communities.
CrowdStrike: Improving network security with cloud computing solutions
Australian spending on public cloud services is expected to reach $6.5 billion this year according to Gartner
Thycotic debunks top Privileged Access Management myths
Privileged Access encompasses access to computers, networks and network devices, software applications, digital documents and other digital assets.
Veeam reports double-digit Q1 growth
We are now focussed on an aggressive strategy to help businesses transition to cloud with Backup and Cloud Data Management solutions.
Paving the road to self-sovereign identity using blockchain
Internet users are often required to input personal information and highly-valuable data from contact numbers to email addresses to make use of the various platforms and services available online.