Operational Technology and Industrial IoT

There has been significant standardisation across operational technology (OT) and Industrial Internet of Things (IIoT) networks in recent years, unlike in the past. Many networks now use common technologies, making attacks more versatile. An attack originally targeting an organisation in one country can now be effective across multiple organisations worldwide. This scalability has made OT networks more attractive to attackers, enabling state-sponsored groups to cause widespread disruption or pursue financial gains.

Our new era of IT and OT convergence brings both significant challenges and opportunities for Australian infrastructure and services providers. OT has evolved to be more IT-ready, benefiting businesses overall, but posing security challenges, due to its distinct requirements and approaches from IT. 

With this understanding as a foundation, Sekuro offers a comprehensive suite of services tailored to meet the unique challenges faced by anyone maintaining OT and critical infrastructure. 

From assessing your current infrastructure and spotting weaknesses to designing robust and resilient systems, as well as monitoring and compliance with pivotal regulations Sekuro has you covered.

Strategy and Architecture

  • We evaluate your cyber security strategy for IT and OT/IIoT and develop a comprehensive roadmap for improvement
  • We review your IoT DevSecOps practices and develop a roadmap for improvement

Assurance Services

  • We evaluate your organisation OT/IIoT posture from a people, process and technology perspective across different frameworks, standards and regulations (ISA 62443, NIST SP 800-82, NIST CSF, AECSF v2, SOCI, Cyber Security Act 2024)
  • We provide tailored and role-specific training for your team, including incident response tabletop exercises
  • We evaluate your physical security controls. We provide physical security intrusions and assessments

Technical OT / IIoT / IoT Assessments

  • We test and evaluate the network architecture, including IT/OT segmentation, hardware and software configuration and security controls in your OT network
  • We test and evaluate the complete IoT stack (cloud, mobile, hardware)

Modern Technology Uplift

  • We help you to procure, implement and deploy modern technologies to solve current and evolving challenges related to the IT/OT convergence

Managed Security Services

  • Through our comprehensive IT and OT specific technology services, we offer 24/7 monitoring, detection and response in your environment providing a unified IT/OT management solution*

*For more information, visit our Managed Security Services page.

Securing an Era of
IT and OT Convergence

Highlights from Dragos’
"OT Cybersecurity The 2023 Year in Review"

OT Threats on the rise

The way we build and maintain our infrastructure is changing. This is because operational technology (OT), like machinery, has converged with information technology (IT) to create smarter, more efficient systems. However, with this comes new risks. OT infrastructure and industrial control systems (ICS) no longer run in a closed and isolated system, and where there is connectivity, there are opportunities for attackers to exploit these technologies. 

Society’s growing reliance on converged IT and OT systems within our critical infrastructure has left the backbone of our society vulnerable. Research from Dragos found cyberattacks targeting critical OT and industrial organisations rose by 87% between 2021 and 2022. 

Cyberattacks on IT systems focus on exposing or withholding information for financial or personal gain, whilst OT cyber security focuses on protecting physical processes and machinery, where uptime and safety are critical. 

What makes attacks on OT different is that they can impact not just our online environment but also our physical one through service disruptions, economic damage, threats to public safety, and even lives. From attacks on Smart City infrastructure to healthcare system sabotage, water treatment facilities, nuclear facility breaches and agriculture sabotage, the consequences of OT attacks can be downright terrifying. 

Sekuro OT Capabilities

Whether you’re a utility company ensuring the lights stay on, a transport provider making sure trains run on time, or an industry organisation looking to fortify your OT systems, Sekuro is your trusted partner in securing what matters. 

We possess a deep understanding of the significance of every cog in your operational machinery and the importance of defending OT systems. With this understanding as a foundation, Sekuro offers a comprehensive suite of services tailored to meet the unique challenges faced by anyone maintaining OT and critical infrastructure. 

From assessing your current infrastructure and spotting weaknesses to designing robust and resilient systems, as well as monitoring and compliance with pivotal regulations, including the Australian 2018 Security of Critical Infrastructure (SOCI) Act, Sekuro has you covered.

  • We understand the unique challenges and requirements for OT and critical infrastructure environments, including minimal disruption and high reliability, as well as navigating different protocols, form factors, and manufacturers. 
  • Our cyber security solutions enhance operational continuity and safety. 
  • As an end-to-end cyber security and digital transformation consultancy, our holistic approach has enabled us to build the leading business platform for OT convergence in the market. 
  • We enter every conversation with a consultative mindset, focusing on understanding each organisation’s specific challenges and needs.
  • Our highly customisable subscription-based Cyber Resilience Program (CRP) is designed to enhance an organisation’s cyber maturity and reduce its cyber security risks, allowing immature organisations to step into the fold and get OT security that they might not have been able to before. 

The cyber security industry has long worked hand in hand with IT professionals, yet there is a lack of understanding of how to engage with engineers managing OT technology. We support customers in finding a common language between cyber security professionals and the OT engineers designing and maintaining the incredibly complex environments, ensuring they have the threat context they need to implement a suitable OT security strategy.

OT Security overview

Our partnership with Dragos

Securing the backbone of modern society isn’t just about deploying the latest cyber defence tools or patching vulnerabilities. It involves the intricate dance of understanding and safeguarding critical systems, mastering the nuances of OT stacks, and ensuring that every component functions in harmony, from top to bottom. It’s about the meticulous design and assurance of systems, continuous monitoring, and compliance with ever-evolving regulations. In Australia, this means navigating the intricacies of regulations such as the Australian SOCI Act. This is where Sekuro steps in.

As part of our commitment to curating our offerings in partnership with the world’s best vendors, we’ve partnered with Dragos, the industry’s most advanced OT cyber security platform, to strengthen our OT cyber security capabilities. 

The Dragos Platform gives you visibility into your ICS/OT assets, vulnerabilities, threats, and response actions and supports you with forensics and OT-specific playbooks.

  • Improve visibility of OT assets
  • Defend against ransomware in OT
  • Stay ahead of sophisticated industrial cyber security threats on a global scale
  • Operationalise MITRE ATT&ACK for ICS

Sekuro’s partnership with Dragos will enable new and existing customers to get the most out of the Dragos platform by leveraging Sekuro’s expertise and support.

Sekuro’s approach to OT security

At Sekuro, we understand that the OT landscape presents unique challenges and requires a bespoke approach to cyber security. As specialists in securing critical infrastructure, we offer a comprehensive suite of services designed to protect your operations from the ever-evolving spectrum of cyber threats. 

Our expertise spans Offensive Security, Governance, Risk, and Compliance (GRC), and Managed Security Services (MSS). Moreover, we take pride in facilitating our customers with the integration of the Dragos platform into their environments, thereby enhancing their cyber security posture and resilience.

When it comes to testing, our approach is distinct from traditional IT cyber security measures. Given OT systems’ often sensitive and mission-critical nature, our methodologies are designed to rigorously assess security without disrupting operational integrity. Unlike conventional IT environments, OT systems require a nuanced understanding of how digital networks interact with physical processes. Our testing strategies are, therefore, customised to address the unique challenges OT environments have. We recognise the potential fragility of these systems and adapt our testing to minimise any risk of impact, ensuring the safety and continuity of operations.

  • Sekuro offers a robust suite of active and passive testing services designed to enhance the cyber security posture of OT environments. Our active testing capabilities focus on OT penetration tests conducted in lab settings or during scheduled maintenance to ensure minimal disruption to production environments. These tests rigorously evaluate OT products, including smart devices and communication platforms, for vulnerabilities in areas such as traffic handling, authentication, and platform communication.
  • We take a passive approach to OT network assessments, conducting OT cyber security assessments (OTCA) and OT vulnerability assessments (OTVA) that offer a comprehensive review of your security from a people, process, and technology perspective. These evaluations include baselining exercises, program reviews, architecture analysis, and detailed assessments of host and application security. Our passive traffic analysis and physical security evaluations are designed to identify and address potential attack pathways and physical security gaps without impacting the network’s operational integrity.
  • At the network perimeter, our active approach includes IT/OT penetration and segmentation tests, phishing simulation assessments, and other scenario-based methods to test the resilience of the network’s defences. Once access to the OT environment is achieved, we work closely with the customer to plan the next steps without active exploitation.
  • Supporting regulatory compliance, Sekuro conducts SOCI assessments and OT gap analyses against standards such as AESCSF and NIST to ensure alignment with the SOCI Act and other critical industry benchmarks. Additionally, our OT tabletop exercises test an organisation’s response capabilities to cyber-attacks in OT environments, and we provide a Cyber Resilience Program (CRP) for ongoing OT environment maturity improvement.

Through this comprehensive testing suite, Sekuro not only demonstrates its high level of capability in assessing and improving the cyber security landscape of OT environments but also its ability to support organisations in maintaining compliance with industry regulations and standards.

Why choose Sekuro for your OT security?

Elite Expertise

At the heart of Sekuro lies a team of the industry's most seasoned security professionals. With a roster of experts who have sharpened their skills in real-world scenarios, we ensure our clients benefit from top-tier insights and techniques.

Strategic Alliances

Our world-class partnerships with leading tech companies and security innovators mean you don't just get our expertise – you get an entire ecosystem of technological innovation and security acumen.

Secure by Design

Recognising that every client has unique needs and challenges, Sekuro builds bespoke security architectures to precisely meet your needs. Our designs aren't just robust and resilient; they're tailor-made to fit your operational landscape, ensuring optimal functionality and protection.

Protective Monitoring and Response

In an era where regulations evolve, and threats dynamically change, Sekuro's SOC monitoring capability ensures you're always watching and predicting attacks before they cause any damage. Our retainer service affords you the surety that you're in good hands should the worst happen.

Compliance

Our GRC experts have intimate knowledge of the pivotal regulations and laws to which you must comply, including the Australian SOCI Act, and we can guide you to full compliance, shielding you from the potential fallout of failing an audit.

Frequently asked questions about OT

OT, or operational technology, specialises in controlling and monitoring physical devices and industrial processes, ensuring real-time precision and reliability. OT security relies heavily on understanding how the sector (Energy, Manufacturing, Chemical Engineering, etc) using OT operates, and we do this by having thorough, two-way communication with the sector’s OT engineers.

Cyber security in critical infrastructure is crucial because these systems are vital for its society’s functioning and security. A cyberattack on critical infrastructure, like power grids or water treatment facilities, can lead to severe consequences, including service disruptions, economic damage, and threats to public safety. Since OT is present in so many organisations,  the SOCI Act has changed many organisations’ requirements for uplifting cyber security.

Although similar in many ways to standard enterprise information security, securing an industrial network presents several unique challenges. Industrial systems are built for reliability and longevity. The systems and networks used are easily outpaced by the tools employed by an attacker. 

 

Systems in OT are often legacy ones, with a life cycle measured in decades rather than years. For example, it's not uncommon to find Windows 7 or Windows XP, which are obsolete, and therefore vulnerable, in IT environments. Given the emphasis on availability and the longer life cycle of these systems, updating an OS can sometimes bring down the entire process.

There is a myth surrounding OT cyber security, suggesting that OT is entirely segregated from the IT world, requiring a completely different set of skills to assess and audit these environments. While this may have been true 20 years ago when OT environments were completely separated from IT, in recent years, different business needs have forced OT to become more "IT-ready." This shift has made OT environments more IT-like, incorporating typical IT components such as Windows servers, active directory, firewalls, etc.

Despite the global infancy of OT cyber security regulations, Australia has taken proactive steps by introducing the SOCI Act, setting a precedent for legislative oversight. Alongside this, the Australian Energy Sector Cyber Security Framework (AESCSF) encourages entities to adopt a standardised security posture to be well-prepared against cyber-attacks. These initiatives reflect a commitment to strengthening the nation’s cyber resilience. For a comprehensive understanding of how these frameworks can be integrated into your cyber security strategy, contact Sekuro to discuss the optimal path forward for your operations.

In OT cyber security, the convergence of IT and OT expertise is essential, blending their unique environmental insights to bolster defences. A best practice approach includes establishing a nuanced ICS Incident Response Plan, conducting ICS-specific tabletop exercises, reinforcing network architecture with strategic segmentation, and ensuring secure remote access. Enhanced visibility and proactive monitoring, coupled with Risk-Based Vulnerability Management, are also pivotal in pre-emptively identifying and mitigating potential threats to maintain a secure and resilient OT infrastructure.

OT cyber security focuses on protecting physical processes and machinery, where uptime and safety are critical.  IT cyber security is about safeguarding data and information systems. What makes attacks on operational technology different is that they can impact our physical, not just online, environment through service disruptions, economic damage, and threats to public safety and even lives.

CONTACT US

We’ll give you a clear overview of availability and pricing and explain how our OT services can move your organisation forward resiliently. 

Chat with a Sekuro consultant to get a clear overview of availability and pricing. Find out how Sekuro can raise your organisation’s OT resilience.

Secure Your Digital Transformation with Our Experts Now!

We’ll give you a clear overview of availability and pricing and explain how our OT services can move your organisation forward resiliently.

Scroll to Top

Aidan Tudehope

Co-Founder of Macquarie Technology

Aidan Tudehope, Co-Founder of Macquarie Technology

Aidan is co-founder of Macquarie Telecom and has been a director since 1992. He is the Managing Director of Macquarie Government & Hosting Group with a focus on business growth, cyber security and customer satisfaction. 

Aidan has been responsible for the strategy and execution of the investment in Intellicentre 4 & 5 Bunkers, Macquarie Government’s own purpose-built Canberra data centre campus. This facility is leveraged to deliver Secure Cloud Services and Secure Internet Gateway.

With a unique pan-government view on the cyber security landscape, we are invested in leading the contribution from the Australian industry on all matters Cyber policy related.

Aidan holds a Bachelor of Commerce Degree.

James Ng

CISO, Insignia Financial

James Ng, CISO, Insignia Financial

James is a leader with a range of experience across various cyber security, technology risk and audit domains, bringing a global lens across a diverse background in financial services, telecommunications, entertainment, consulting and FMCG (Fast Moving Consumer Goods). He is currently the General Manager – Cyber Security at Insignia Financial and most recently was at AARNet (Australia’s Academic and Research Network) where he oversaw a managed Security Operations Centre (SOC) capability for Australian universities. Prior to this James was the acting Chief Information Security Officer for Belong and led the cyber governance and risk team at Telstra.

Noel Allnutt

CEO, Sekuro

Noel Allnutt CEO | Sekuro

Noel is a driven and award-winning IT leader. He has a passion for developing great teams and accelerating client innovation, and in enabling organisations to create a secure and sustainable competitive advantage in the digital economy. Noel also hosts the ‘Building Resilience Podcast,’ which explores the world of sport and deconstructs the tools and ethos of world-class athletes that can help create growth and optimise business and life.

Audrey Jacquemart

Bid Manager, Sekuro

Audrey Jacquemart, Bid Manager, Sekuro

Audrey is an innovative cybersecurity professional with a versatile profile spanning across Product Management, Presales and Delivery. She has worked within organisations from start-ups to large international organisations in Europe and APAC before joining Sekuro.

Nicolas Brahim

Principal Consultant, CRP and OT

Nicolas Brahim, Principal Consultant, CRP and OT

Nico leads Sekuro’s Cyber Resilience Program and OT Cybersecurity, ensuring continuous support and effective program execution for our clients. With over a decade in the security industry, including the creation and leadership of several Security Programs for IT and OT across Australia, New Zealand, Argentina, Chile and the US, his core philosophy emphasises an equal balance of people, process, and technology in delivering actionable and simple solutions.

Trent Jerome

Chief Financial Officer, Sekuro

Trent Jerome

Trent is a seasoned CFO with over 30 years’ experience in Finance. Trent has broad experiences across Capital raises, debt financing, M&A and business transformation. He is a CPA and member of AICD. Trent works with Boards around risk and risk mitigation plans and assists Boards in navigating the risk mitigation versus cost conversation.

Ada Guan

CEO and Board Director, Rich Data Co

Ada Guan, CEO and Board Director, Rich Data Co

Ada is the CEO and Co-founder of Rich Data Co (RDC). RDC AI Decisioning platform provides banks the ability to make high-quality business and commercial lending decisions efficiently and safely. With over 20 years of global experience in financial services, software, and retail industries, Ada is passionate about driving financial inclusion at a global scale.

Before launching RDC in 2016, Ada led a Global Client Advisor team at Oracle Corporation, where she advised Board and C-level executives in some of the largest banks globally on digital disruption and fintech strategy. She also drove Oracle’s thought leadership in banking digital transformation for Global Key Accounts. Previously, Ada implemented a multi-million dollar program to deliver a mission-critical services layer for Westpac Bank in Australia and formulated the IT strategy that was the basis of an $800m investment program to transform Westpac’s Product and Operation division and complete the merger with St. George Bank. Ada is an INSEAD certified international director and holds an EMBA from the Australia Graduate School of Management, and a Master of Computer Engineering from the University of New South Wales, Australia. She also graduated from the Executive Insight Program at Michigan University Ross Business School and IESE Business School.

Megan Motto

Chief Executive Officer, Governance Institute of Australia

Megan Motto, CEO, Governance Institute of Australia

Megan Motto is Chief Executive Officer of Governance Institute of Australia, a national education provider, professional association and leading authority on governance and risk management. The Institute advocates on behalf of professionals from the listed, unlisted, public and not-for profit sectors.

Megan has over 25 years of experience with large associations, as a former CEO of Consult Australia, as well as holding significant positions in Australia’s built environment sector and business chambers.

She is currently a director of Standards Australia, a member of the ASIC Corporate Governance Consultative Panel and a councillor of the Australian Chamber of Commerce and Industry (ACCI) where she chairs the Data, Digital and Cyber Security Forum.

Megan’s expertise spans governance, risk management, public policy and education. She holds a Bachelor of Arts/Bachelor of Education, a Masters of Communication Management and a Graduate Diploma of Corporate Governance and Risk Management. She is a Fellow of the Governance Institute of Australia, the Chartered Governance Institute and the Australian Institute of Company Directors and is also a member of Chief Executive Women. Megan is also an Honorary Life Trustee of the Committee for Economic Development of Australia (CEDA) and was a 2014 recipient of the AFR/Westpac 100 Women of Influence.

Shamane Tan

Chief Growth Officer, Sekuro

Shamane Tan, Chief Growth Officer, Sekuro

Sekuro’s Chief Growth Officer, Shamane Tan, is passionate about uniting minds and experiences, excelling in aligning C-Suite and Board members with cyber security imperatives. As the author of “Cyber Risk Leaders,” she unravels executive communication nuances and distils C-Suite expectations. 

Her work extends to “Cyber Mayday and the Day After,” a roadmap for navigating crises by mining the wisdom of C-level executives from around the globe. It’s filled with interviews with managers and leaders who’ve braved the crucible and lived to tell the tale. Her most recent book, “Building a Cyber Resilience: A Cyber Handbook for Executives and Boards,” was featured on Forbes Australia’s top list of books for CEOs. 

Shamane has also founded a transcontinental cyber risk and executive meetup spanning Sydney, Melbourne, Adelaide, Perth, Singapore, the Philippines, and Tokyo, fostering mentorship, women’s empowerment and thought leadership. As a strong advocate for the importance of having a voice and helping others use theirs, Shamane Tan has spoken at TEDx and global conferences, including FS-ISAC, RSA, Silicon Valley, Fortune 500 and ASX companies. 

Recipient of the IFSEC Global Top 20 Cybersecurity Influencer award and named among the 40 under 40 Most Influential Asian-Australians, Shamane leverages her unique fusion of technical prowess and business acumen to help organisations progress on their security maturity journey.

David Gee

David Gee, CIO, CISO, NED, Board Advisor & Author

 

David Gee, CIO, CISO, NED, Board Advisor & Author

David has just retired in July 2024 and is building out his portfolio. He is an Advisor with Bain Advisory Network and also an Advisor to JS Careers (Cyber Recruitment) and Emertel (Software Commercialisation).

He is a seasoned technology executive with significant experience and has over 25 years’ experience in CIO and CISO roles across different industries and countries. At Macquarie Group David served as Global Head Technology, Cyber and Data Risk. Previously was CISO for HSBC Asia Pacific. His career as a CIO spans across multiple industries and geographies including – Metlife, Eli Lilly and Credit Union Australia. He was winner CIO of the Year 2014, at CUA where he successfully completed a significant Transformation of Core Banking, Online and Mobile Banking systems.

David is past Chairman for the FS-ISAC Strategy Committee and awarded Global Leaders Award in 2023 for his contributions to the cyber security industry. A regular conference keynote speaker and 150+ published articles for CIO Australia, Computerworld, iTnews and CSO (Cyber Security), David now writes for Foundry CIO.com and AICD.

His most recent book – the Aspiring CIO & CISO was published in June 2024 and David is writing his second – A Day in the Life of a CISO with a number of CISOs from around the world for 2025.

Naomi Simson

Co-founder, Big Red Group and Former Shark Tank Judge

Naomi Simson, Co-founder, Big Red Group

INTRODUCTION

For 25 years as an entrepreneur, Naomi Simson has been bringing people together whether it’s with her business experience, her speaking or writing. Passionate about small business and local community, Naomi is considered a home grown success story.

Naomi had a corporate career with Apple, KPMG, IBM and Ansett Australia prior to becoming an entrepreneur. She is a prolific blogger, podcaster and business commentator, and appeared as the #RedShark in four seasons of Shark Tank Australia and she appears regularly on ABC The Drum. She is a non-executive director at Big Red Group, Australian Payments Plus, Colonial First State and Weebit Nano, as well as the Cerebral Palsy Research Foundation and the University of Melbourne Business and Economics Faculty.

A true business leader and influencer, with more than 2.7 million LinkedIn followers, Naomi is Australia’s most followed person on the business networking platform. She has four seasons of her podcast ‘Handpicked’, and she has authored two best-selling books Live What You Love, and Ready to Soar, and is sought after speaker.

FULL BIO

For 25 years Naomi has been bringing people together whether it’s with her business experience, her speaking or writing. She is a strong advocate of business owners.

Known as an entrepreneur and business leader; following the growth of RedBalloon which she founded in 2001, Naomi co-founded the Big Red Group (BRG) in 2017.

Naomi had a corporate career with Apple, KPMG, IBM and Ansett Australia prior to becoming an entrepreneur. She is a prolific blogger, podcaster and business commentator, and appeared as the #RedShark in four seasons of Shark Tank Australia. She is a non-executive director at Big Red Group, Australian Payments Plus, Colonial First State and Weebit Nano. As well as the Cerebral Palsy Research Foundation and the University of Melbourne Business and Economics Faculty.

A true business leader and influencer, with more than 2.7 million LinkedIn followers, Naomi is Australia’s most followed person on the business networking platform. She has authored two best-selling books Live What You Love, and Ready to Soar, and is an engaging, humorous and insightful speaker. She has four seasons of her Podcast – Handpicked.

Naomi is relatable across a broad variety of audiences and topics, often drawing on her personal experiences to provide thoughtful and valuable views into topics; including the customer obsession, intentional leadership, growth mindset, personal development. She is a regular panellist on ABC The Drum.

Peter Ngo

Product Line Manager, Global Certifications, Palo Alto Networks

Peter Ngo | Sekuro

Peter leads the Commercial Cloud, Global Certifications organisation at Palo Alto Networks which oversees global cloud security compliance efforts to various frameworks and standards including IRAP, SOC 2, ISO, PCI, C5, ISMAP, and IRAP and more for 25+ cloud products.

He has held many roles over the years covering areas of IT Operations, and Governance, Risk, & Compliance (GRC) for a wide range of industries including technology, insurance, and manufacturing.

Peter holds various security and professional certifications, including the CCSP, CISSP, PCI ISA, CISA, CISM, CDPSE & ISO Lead Auditor, in addition to a Master of Science degree in Information Assurance. 

Jack Cross

CISO, QUT

Jack Cross | Sekuro

Jack Cross is an experienced business leader with expertise in digital technologies and risk management. Through a steadfast commitment to integrating people, processes, and technology, he champions the fight against cyber threats while mitigating organisational risks. 

Over the past 15 years, Jack has navigated diverse leadership roles within the Defence and Education sectors, honing his skills in steering multidisciplinary teams through intricate and sensitive technical landscapes. In addition to this experience, he holds numerous formal qualifications such as: a Master of Systems Engineering (Electronic Warfare); CISSP; and CISM certifications.

Nadene Serman

Global CTO, Infotrack

Nadene Serman | Sekuro

Nadene Serman is a leading IT executive with a proven track record spearheading first-of-its-kind technology and business transformation for some of the most prominent organisations globally and in Australia. As the Global Chief Technology Officer of InfoTrack, she is a key protagonist of innovation as an enabler of InfoTrack’s next stage growth. Her energy, commercial acuity and strategic capability have fueled her success.

Nadene leads with clarity, transparency and urgency, uniting people in complex, multi-layered technology and business execution, and go-to-market transformation and innovation. She tackles and resolves complex and seemingly intractable challenges while building support and collaboration – even in times of crisis. Her people-first, ‘think straight, talk straight’ approach makes her a formidable force.

John Doe

President Great Technology

Cyber Resilience Program | Sekuro

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.