Monday, 08 July 2019 07:26

Tech veteran Coroneos appointed to cyber security advisers' network

Peter Coroneos with CyAN president Jean-Christophe Le Toquin. Peter Coroneos with CyAN president Jean-Christophe Le Toquin. Supplied

Australian Internet policy adviser Peter Coroneos has been appointed as the international vice-president of the Paris-based Cybersecurity Advisers' Network.

Announcing the appointment, CyAN president and former director of Internet Safety for Microsoft EMEA, Jean-Christophe Le Toquin said in a statement: “In a world worryingly tempted by fragmentation, this is an incredible chance for CyAN to benefit from Peter’s experience, vision and leadership.

"His appointment as international vice-president of CyAN is a recognition of his hard and successful work to build a strong CyAN community in the Asia Pacific.

"More importantly, Peter will significantly enhance our global perspective and help shape the future of CyAN.”

Coroneos was behind the development of icode, an industry-wide botnet mitigation program developed while he was head of Australia’s Internet Industry Association. He has advised the Obama Administration on the scheme, which was later adapted by major US broadband providers.

He has served as CyAN’s regional head APAC since 2018. CyAN officially launched in Australia in February 2019 and has attracted skilled cyber professionals working in diverse areas.

Coroneos replaces Christian Aghroum, the former head of the French police cyber crime unit.

“Regional tensions call for a greater understanding of our inter-dependencies as a common, connected humanity," Coroneos said.

"I hope my new role will underline the importance of coordinated international action and information sharing. Promoting trust will remain a core, defining principle of our efforts. We will innovate in critical cyber skills, capacity building and behavioural change while supporting the business, professional and personal development of our members.”

Along with tech veteran Peter Kazacos, Coroneos runs a venture known as Icon Cyber that earlier this year launched @STAKE, an immersive simulation of a cyber attack, part of a portfolio to be developed which is called Decision Rehearsal.


As part of our Lead Machine Methodology we will help you get more leads, more customers and more business. Let us help you develop your digital marketing campaign

Digital Marketing is ideal in these tough times and it can replace face to face marketing with person to person marketing via the phone conference calls and webinars

Significant opportunity pipelines can be developed and continually topped up with the help of Digital Marketing so that deals can be made and deals can be closed

- Newsletter adverts in dynamic GIF slideshow formats

- News site adverts from small to large sizes also as dynamic GIF slideshow formats

- Guest Editorial - get your message out there and put your CEO in the spotlight

- Promotional News and Content - displayed on the homepage and all pages

- Leverage our proven event promotion methodology - The Lead Machine gets you leads

Contact Andrew our digital campaign designer on 0412 390 000 or via email



Security requirements such as confidentiality, integrity and authentication have become mandatory in most industries.

Data encryption methods previously used only by military and intelligence services have become common practice in all data transfer networks across all platforms, in all industries where information is sensitive and vital (financial and government institutions, critical infrastructure, data centres, and service providers).

Get the full details on Layer-1 encryption solutions straight from PacketLight’s optical networks experts.

This white paper titled, “When 1% of the Light Equals 100% of the Information” is a must read for anyone within the fiber optics, cybersecurity or related industry sectors.

To access click Download here.


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.



Recent Comments