Home People Moves Cyber research centre appoints former Telstra lawyer as CEO

Cyber research centre appoints former Telstra lawyer as CEO

Rachael Falk will take over as chief executive of CSRC in July. Rachael Falk will take over as chief executive of CSRC in July. Supplied

The Australian Cyber Security Research Centre, a non-profit that promotes industry investment into cyber security research and development, has appointed an industry veteran, Rachael Falk, as it chief executive.

She will replace the interim chief executive, Dr Darrell Williamson, who has held the role during the establishment phase of the CSRC.

Falk is a former in-house lawyer at Telstra who became the company's general manager of cyber influence. Following this she has practised as a cyber security consultant and is the co-author of the Five Knows of Cyber Security.

CSRC chair David Irvine, a former head of ASIO, said: “Strong cyber security is a critical issue for our economy and for Australia’s prosperity. We are delighted to have Rachael as our chief

"Not only does she bring a wealth of industry knowledge, she will ensure that CSRC collaborates with academia, industry and government to deliver industry-driven cyber security outcomes. We want our research and work to have an impact benefitting Australia both now and well into the future."

Irvine acknowledged the Australian Government's support for CSRC. It will be contributing $50 million to a program in cash and $140 million in kind over seven years. The Western Australian government has provided substantial support for the CSRC initiative, along with support from the South Australian and NSW Governments.

With its head office in Western Australia, the CSRC will bring together seven universities and research institutions, nine industry partners and nine government agencies. The participants are:

Research institutions: Edith Cowan University, Adelaide University, Deakin University, Charles Sturt University, University of NSW, Queensland University of Technology, Data61 (a division of CSIRO)

Industry: Cisco Systems Australia, Singtel Optus, Jemena, ActewAGL Distribution, TATA Consultancy Services, Datacom Technical Security Services, PEN10 Services, Quintessencelabs, AARNet.

Federal Government: Department of Defence (Australian Signals Directorate), Attorney-General’s Department (CERT Australia, Critical Infrastructure Centre), Australian Federal Police, Australian Taxation Office, Australian Transaction Reports & Analysis Centre (AUSTRAC).

State Governments: Office of the Government Chief Information Office (WA), Canberra Data Centres (NSW Data Centres), NSW Department of Finance, Services & Innovation, DefenceSA.


Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips



Ransomware is a type of malware that blocks access to your files and systems until you pay a ransom.

The first example of ransomware happened on September 5, 2013, when Cryptolocker was unleashed.

It quickly affected many systems with hackers requiring users to pay money for the decryption keys.

Find out how one company used backup and cloud storage software to protect their company’s PCs and recovered all of their systems after a ransomware strike.


Sam Varghese

website statistics

A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.


Popular News