GovPitch 2020

Connect with our companies

Australia is rapidly building an innovative, globally competitive cyber security sector, capable of contributing to national economic growth and exporting scaled solutions globally.

Increasingly, agencies are looking for unique cyber security solutions that protect and defend their sensitive data, complex networks, and people. This is achieved through systems security, software and platform security, and infrastructure security in an integrated way. The COVID-19 pandemic has only reinforced this need.

GovPitch 2020 features 11 innovative Australian cyber security companies with cutting edge, deep-tech solutions.

Glenn Mahney

Glenn Mahney

Sales Director

Phone

0450 628 091

www.airlockdigital.com

Airlock Digital

Airlock Digital was created in the belief that a fundamentally different approach was needed to combat the risk posed by adversaries, such as cyber criminals and nation state attackers. While most organisations find it difficult to even reduce the risk of intruders, Airlock Digital provides the capabilities to reduce the risk of both targeted and un-sophisticated attacks towards zero. Airlock Digital is a specialist application whitelisting and control software provider, developed for the sole purpose of making the application whitelisting process much simpler and more efficient to implement and maintain. Ultimately, Airlock Digital makes it possible for organisations and government agencies to implement one of the more difficult cyber mitigation strategies as defined in the ACSC Essential 8.

linkedin twitter
Stas Filshtinskiy

Stas Filshtinskiy

Co-Founder and Director

Phone

0400 662 991

www.attackforge.com

AttackForge

AttackForge is a Melbourne-based software startup and provider of a unique solution – the only sovereign Australian-built and fully-owned pentest management and collaboration platform. AttackForge was founded in 2014 and went global in 2018. By 2019, AttackForge had paying customers on every continent except Antarctica. AttackForge was selected by the BlackHat Arsenal Review Board to present the community version of AttackForge at one of the most prestigious security conferences in the world – BlackHat Europe, BlackHat Asia and BlackHat USA. This recognition validated AttackForge at a global level, across different industries, markets and continents.

Jonathan Horne

Jonathan Horne

Chief Executive Officer

Phone

1300 29 29 67

www.cyberaware.com

CyberAware

CyberAware.com is a next-generation security awareness training platform that empowers technology and security professionals to change an organisation’s culture and address their human risk. Fun and engaging training videos combined with realistic real-world phishing simulations, with a focus on starting a conversation, not scaring and shaming people. Get people talking about security, foster a safe and open cyber culture, free from trickery and finger-pointing. Empower your staff to make better decisions with a greater understanding of what cyber security is and how it impacts them in both their personal and professional lives.

Dr Vaughan Shanks

Dr Vaughan Shanks

CEO

Phone

1300 293 276

www.cydarm.com

Cydarm

Cydarm is a secure case management platform for cyber security operations that makes incident response better and faster. Cydarm uses best practice to enable SOC analysts to record and share information at different levels of trust, guided by workflow and playbooks. The platform integrates with existing enterprise software, using orchestration to reduce the burden of manual data entry. Metrics capture and the automated production of tactical and operational reports drive constant improvement through evidence-based security. Cydarm's customers include state and federal government departments, an ASX50-listed utility, educational institutions, and managed security service providers (MSSPs). The platform is available as enterprise or on a hosted platform.

Tan Huynh

Tan Huynh

Co-Founder and Chief Executive Officer

Phone

0432 653 936

www.detexian.com

Detexian

Detexian is a single pane of glass across Office 365, G Suite, Atlassian, Salesforce, and other platforms. It detects critical user misconfigurations, audits SaaS permissions and more. This means Detexian eliminates SaaS risk blind spots and gives you peace of mind you need to run a safe IT operation. With Detexian, regulatory compliance is made easy. You can generate audit reports to demonstrate evidence of control effectiveness over time that your auditors and regulators want.

Tony Smales

Tony Smales

Founder and Chief Executive Officer

Phone

0426 810 490

www.forticode.com

Forticode

Forticode are an Australian cyber security deep-tech company based in Melbourne that eradicates illicit access and account take over for employees and customers. Designed to be a transparent and excellent user experience, Cipherise removes passwords entirely from cloud services such as Office 365 or G-Suite, all the way through to deep integration into proprietary applications. Internal actors a concern? Not with Cipherise! Cipherise scales to support large user bases across multiple use cases with a single solution, whether you have 5 users or 5 million.

Martin Buckland

Martin Buckland

General Manager APAC

Phone

(02) 9419 3200

www.huntsmansecurity.com

Huntsman

Huntsman Security is an Australian software vendor that has provided next generation SIEM security monitoring capabilities to Australian Government agencies since 2006. In 2018, they developed an entirely new set of products aimed at providing visibility of an organisation’s performance against the ACSC Essential Eight security controls. The Essential 8 Scorecard continuously monitors an environment, to deliver automated compliance reporting and cyber maturity measurement. It has been recognised in Australia and the UK: best new cyber security product at the 2019 Australian Technologies Competition and best compliance product at the February 2020 UK TEISS Awards in London. In April 2020, the Essential 8 Auditor was released; a self-install security audit tool that executes point-in-time audits, it enables organisations to conduct self-assessments objectively, comprehensively and systematically. Results are exportable, for inclusion in audit reports or for sharing with colleagues and remote stakeholders.

Josh Bolton

Josh Bolton

Director of Defence and Intelligence

Phone

0476 476 000

www.penten.com

Penten

Penten is an Australian based cyber security company focused on innovation in secure mobility and applied artificial intelligence (AI). Penten challenges themselves to solve some of the most difficult cyber challenges, by creating new security technologies to deliver a sovereign advantage for Australia. Their AltoCrypt family of secure mobility solutions enable remote secure access to classified information for government and defence. This access provides the workforce with assured accessibility and flexibility of a modern workplace, enhancing interoperability with other departments and agencies. Their Applied AI solutions solve cyber problems with practical applications of machine learning for the government sector. They create realistic decoys to trick and trap the adversary and protect sensitive information. Their innovations have won them high profile awards including 2018 Business of the Year at the Telstra Business Awards, Most Innovative Company at the AFR and Boss awards, 2019 and Cyber Business of the Year at the Australian Defence Industry Awards, 2019.

Peter Hill

Peter Hill

Chief Executive Officer

Phone

0417 065 888

www.rightcrowd.com

RightCrowd

RightCrowd makes it possible to ensure in real-time, that everyone in a meeting room has the security clearance to hear the next piece of information, ensure that everyone in an open office has authorisation to be there, and ensure that every visitor is with their host and to efficiently monitor social distancing and perform contact tracing. The insider threat has forced secure organisations to shift from perimeter security, to continuously monitoring who is authorised to be present. RightCrowd Presence Control makes physical security privileges visible, auditable and traceable. Based on a secure, cryptographic chip-set, it ensures that everyone on site is right. RightCrowd was founded 16 years ago, with its headquarters on the Gold Coast, Australia, and offices in the United States, Belgium and The Philippines. Working with large multi-nationals, RightCrowd developed software that intelligently controls the access of people into facilities and makes security privileges visible.

Mike Simpson

Mike Simpson

Co-founder and Chief Executive Officer

Phone

0432 545 256

www.truuth.id

Truuth

Truuth has a mission to deliver the world’s most secure, accurate, and user-friendly digital identity services. To deliver on this mission, they employ Artificial Intelligence (AI) and Machine Learning (ML) to verify the authenticity of identity documents and to test for ‘liveness’ in human interactions. Their technology captures multiple biometrics to enable higher levels of accuracy for user identification (up to 99.999%) and ensure identity security through fragmenting, salting, encrypting and sharding of user credentials. These technologies mitigate the risk from a range of cyber-attacks including presentation attacks, insider threats, man-in-the-middle attacks, and ransomware attacks.

Dan Holman

Dan Holman

Co-Founder and Chief Executive Officer

Phone

0409 662 562

www.worldstack.net

WorldStack

Founded in 2014, WorldStack creates solutions that turn public data such as web, social media, deep and dark net into actionable intelligence. They are experts in open source intelligence. Their team of analysts and engineers have extensive experience planning and conducting intelligence operations for private and public-sector clients in Australia and abroad. National security organisations rely on them to train their analysts in intelligence tradecraft. All of their personnel have backgrounds in security, intelligence and cyber security, working with Federal Government, intelligence agencies and Defence. They have an intimate understanding of the requirements of both data security and operational security required to work in these environments. Their open source intelligence solutions automate the collection, and analysis of data from the surface deep and dark web to generate actionable intelligence at scale. Applications include background screening, data breach detection, security monitoring, and fraud detection.