Deakin’s Cyber Leadership Team
Damien Manuel is the Director of the Centre for Cyber Security Research & Innovation (CSRI) at Deakin University and Chairman of the Australian Information Security Association (AISA). Damien has more than 25 years of experience in cyber security, business governance, compliance and risk management.
In his former role as the Chief Information Security Officer (CISO) for Symantec Australia and New Zealand, Damien worked with senior executives in the region to align security architectures to industry best practices. He also worked as a senior information security governance manager and later as an enterprise IT and security risk manager at National Australia Bank (NAB), where he was responsible for managing the bank’s information security standard globally. He also held senior roles at RSA, Telstra and Melbourne IT.
Damien has helped develop and write industry certification such as Server+, Network+, Security+ and CompTIA’s Advanced Security Practitioner certification and sits on the Board of the Oceania Cyber Security Centre (OCSC) and CompTIA’s Executive Advisory Committee in the USA.
Damien’s passion for making a difference motivated him to establish Information Technology community resource centres to improve literacy and skills in impoverished and disadvantaged communities in Kenya, Laos, Uganda and Cambodia. Underpinning his experience is a diverse educational grounding ranging from the highest security, audit and governance certifications complemented by an Executive MBA with an international business focus.
Professor Matt Warren is Deputy Director of the Deakin University Centre for Cyber Security Research and Innovation and also a Cyber Security Professor in the School of Information Technology in Deakin University. He completed his PhD in Information Security in 1996 in the United Kingdom and he has been at Deakin since 1998 working across a range of areas involving cyber security and information technology.
Matt understands the importance of Cyber Security and has worked with government and industry in dealing with the complexity of cyber security. This research has focused upon policy development, security risk analysis and the impact of Cyber Security Technology.
Matt is also the Cloud Branch Executive for the Australian Information Security Association (AISA) and a Fellow with the ACS. He is also the lead researcher for a cyber security research theme with the Cyber Security Cooperative Research Centre.
Debi Ashenden is Professor of Cyber Security and Human Behaviour at Deakin University and a Director of Industry Research for Deakin’s Centre for Cyber Security Research and Innovation (CSRI). In addition Debi is a Professor of Cyber Security at the University of Portsmouth (UK) and a visiting Professor at Royal Holloway, University of London (UK). She is Programme Director for Protective Security & Risk at CREST (the Centre for Research & Evidence for Security Threats - www.crestresearch.ac.uk) – a research hub funded by the UK’s security and intelligence community. Other current projects focus on understanding cyber security risk perceptions across the lifespan and exploring the conceptual foundations of algorithm design for AI/ML. Debi was previously Head of the Centre for Cyber Security at Cranfield University at the Defence Academy of the UK and was a member of the UK MOD’s Defence Science Expert Committee. She is an Academic Fellow at the UK’s National Cyber Security Centre.
Debi’s research interests are in the social and behavioural aspects of cyber security – particularly in finding ways of ‘patching with people’ as well as technology. She has worked extensively across the public and private sector for organisations such as UK MOD, GCHQ, Cabinet Office, Home Office, Euroclear, Prudential, Barclaycard, Reuters and Close Bros. She has had a number of articles on cyber security published, presented at a range of conferences and co-authored a book for Butterworth Heinemann, Risk Management for Computer Security: Protecting Your Network & Information Assets.
Chang-Tsun Li received the BSc degree in electrical engineering from National Defence University, Taiwan, the MSc degree in computer science from U.S. Naval Postgraduate School, USA, and the PhD degree in computer science from the University of Warwick, UK. He is currently Professor of Cyber Security at Deakin University and Director of Research at the Centre for Cyber Security Research and Innovation (CSRI). He is also Professor of the Department of Computer Science at the University of Warwick, leading a multinational EU funded project on Computer Vision Enabled Multimedia Forensics and People Identification.
Chang-Tsun has had over 20 years research experience in multimedia forensics and security, biometrics, data mining, machine learning, data analytics, computer vision, image processing, pattern recognition, and content-based image retrieval. The outcomes of his research have been translated into award-winning commercial products protected by a series of international patents and have been used by a number of law enforcement and national security agencies around the world, including INTERPOL, UK Home Office, Metropolitan Police Service (UK), Sussex Police Service (UK), Guildford Crown Court (UK), US Department of Homeland Security, and companies in the UK and Iceland. In addition to his 200 publications, Chang-Tsun is also actively contributing to international cyber security communities. He is currently Vice Chair of Computational Forensics Technical Committee of the International Association of Pattern Recognition (IAPR), Member of IEEE Information Forensics and Security Technical Committee, Associate Editor of IEEE Access, the EURASIP Journal of Image and Video Processing and IET Biometrics. In the past 8 years, Chang-Tsun has been active in facilitating the cross-fertilisation of multimedia forensics and biometrics through his leadership in a number of multinational EU projects.
CSRI has world leading capability in:
- Protective Security & Information Warfare
- Cyber Analytics and AI
- Cyber Physical Systems and IoT
- Organisational Security
- Privacy, Identity and Trust Management
- Forensics and Incident Management
Our team is particularly interested in conducting research in areas important to industry such as security and privacy in big data, cloud security, security in social networks, security predictive analytics, cyber physical systems, security and dependability, business applications, trust, privacy and cyber security risks, decision making and human behaviour.
CSRI takes a holistic approach to cyber which is why our researchers come from four faculties (Art & Education, Business & Law, Health & Science and Engineering & Built Environment), enabling a truly multidisciplinary approach to solving cyber challenges of tomorrow, in innovate and collaborative ways today.
At the Centre for Cyber Security Research and Innovation our expertise, state-of-the-art facilities and vast industry network means we are uniquely positioned to deliver the value of research to industry.
Mr Damien Manuel
Director, Centre for Cyber Security Research and Innovation (CSRI)
Protective Security & Information Warfare
Threat actors increasingly operate in the ‘grey zone’ between peace and war with attacks on our critical infrastructure becoming more prevalent. Potential targets encompass Government, business, academia and citizens, often with the aim of undermining our way of life by building and exploiting cognitive ambiguity. In this scenario Protective Security and Information Warfare are inextricably linked. Both have the aim of fusing a number of capabilities to achieve greater impact. Protective Security brings together personnel, physical and cyber security, recognising that an attack on organisations will exploit vulnerabilities wherever they exist. Information Warfare brings together cyber security, electronic warfare and information operations to disrupt the decision-making processes of adversaries and to protect our own.
To build resilience we need to collaborate innovatively and creatively across organisations and sectors. The Protective Security and Information Warfare theme bridges expertise in working with the military and national security agencies with expertise in working with critical infrastructure organisations. We focus on an interdisciplinary approach to addressing security problems and building capability. We bring together an understanding of human behaviour with an appreciation of social context and interactions, as well as technology. For Information Warfare we aim to develop ways of fusing technical and non-technical capabilities to achieve effects. For Protective Security we aim to find ways to ‘patch with people’ rather than just technology.
Privacy, Identity and Trust Management
Today people heavily rely on the effective operations of cyber systems such as cloud systems, data centres, and networking systems. They provide people with an infrastructure on top of which information can be stored and processed. However, the potential impact of vulnerabilities is huge. The current generation of cyber infrastructures do not provide sufficient security against untrusted operators and external threats, making them unsuitable for storing and processing sensitive information such as medical records, financial records or high impact business data.
Our goal is to develop new technologies for protecting cyber systems that are resilient to unknown and persistent cyber threats and attacks. Resilience is underpinned by security, trustworthiness, dependability, availability, surveillance, and automation. To achieve the goal, we design novel mechanisms that provide protection levels beyond those of today's cyber systems. We are carrying out research that ranges from theory to practice, such as security for heterogeneous cyber environments, trust evaluation in cyber systems, and secure storage and networking systems.
Cyber Analytics and AI
People generate exponential amounts of information every day, which impacts numerous aspects of our society, including government, finance, security and climate. Data is now becoming so complex that it's beyond the capacity of existing database management tools or traditional data processing applications. Security analytics is the process of ingesting, inspecting, cleaning, transforming and modelling data such that information, relationships and interdependencies are discovered and analysed to develop knowledge and understanding of the security problems in cyberspace.
Our goal is to take multi-disciplinary approach and seeks to integrate the technological, informational, psychological and social dimensions to solve the performance, structure, security, privacy and risk assessment in cyberspace. Due to their scale, complexity and heterogeneity, a number of technical and social challenges around security and privacy in cyberspace need to be addressed. Machine Learning and predictive behaviour will be key to solving these complex data problems.
Cyber Physical Systems & IoT
Cyber Physical Systems (CPS) and the Internet of Things (IoT) are emerging as promising service platforms for a next-generation Internet. By integrating different devices into a cohesive system, CPS exhibits tremendous capability to meet the information-processing demands of smart environments. CPS enables the development of smart, autonomous environments by allowing billions of devices to communicate. These devices will provide services in fields such as business, healthcare, social networks, logistics, agriculture, and e-commerce. However, security is the key element to meet the demands of CPS for context analysis, automated decision making and the generation of dynamic and intelligent responses in ever-changing environments. Global connectivity means CPS is open to malicious attacks and the subversion of normal operations and trust. Privacy is yet another critical concern for CPS. In addition, the heterogeneity and ubiquity of connected devices exacerbates the complexity of design and deployment of security methodologies.
Our goal is to develop secure and dependable CPS and IoT systems that can operate in complex, uncertain, unexpected and hostile environments where humans are unable to act in a timely and effective manner. We develop technologies that support systems that are self-managing, resilient and complex (autonomous) and able to perform operations at machine speeds. We are carrying out research on the protocols for communication, threat analysis, modelling and simulation of security systems, and interoperability and processing mechanisms.
A key issue for many organisations involved with the operation of critical infrastructure systems is that they do not fully understand the complexity of the systems they're controlling, or the associated security risks or policy and governance issues. A lack of awareness around emerging security risks, vulnerabilities and how these could impact an organisation are becoming a worrying trend. For example, the security issue of knowledge leakage isn't fully understood, but could potentially result in the disclosure of sensitive organisational or operational data. How can organisations deal with these emerging security risks? How can decision makers within organisations make effective security decisions? How can organisations deal with the legislative impacts or the data retention and management issues of cyber security? What is the impact of cybersecurity threats upon the economy and supply chains. How do you improve cyber security for small businesses?
Our goal is to take the approaches considering risk and context, including business objectives and situational awareness derived from a wide range of data sources. On one hand, we develop technologies of data analytics, decision sciences, cognitive science, and trusted ways of sharing data and intelligence within and between organisations. On the other hand, we focus on the non-technological elements, such as the human element and social, legal, policy and economic considerations. We are carrying research on human behaviours and how those behaviours could affect security decision making. This will give decision makers the required tools to make the most appropriate security decision in an ever-changing security environment.
Forensics and Incident Management
A cyber security incident can take the forms of policy violations, an emerging threat, an attempted attack, a successful compromise or security breach. Cyber security incident management is the process of detecting, documenting, reporting, assessing, responding to and mitigating cybersecurity incidents in real-time. Organizations need to devise effective cyber security incident management plans and adopt practices that allow them to rapidly become more responsive, resilient and protected against future incidents. At a more technical level, digital forensic skills and tools need to be available for actually carrying out the post-incident investigations. An equally important but often less emphasised aspect is the organisations’ pre-incident digital forensic readiness frameworks, which should guide the preparation for handling cyber security incidents.
Our goals are to devise pre-incident digital forensics readiness frameworks, which allow organisations to be properly prepared for handling incidents and to develop post-incident forensic investigation technologies. As such, our work includes, but is not limited to, digital forensics readiness policy and procedures, evidence preservation and collection mechanisms, evidence based legal assessment, cyber crime, potential threats and incidents identification, incident management and investigation, provenance identification, source device identification, integrity authentication and verification.
CSRI engages with industry and government through collaborative research projects, in order to provide protection from major cyber threats facing Australia and the world. Through its research and outreach activities, CSRI models and informs cyber policy development for government and business as well as raising cyber safety awareness levels in the community.
Deakin also established the Executive Advisory Board for Cyber (EABC) which is comprised of over 35 leading organisations across a number of industry verticals including banking, insurance, retail, mining, critical infrastructure, super, health and government agencies. CIO, CSO and CISO from these organisations meet quarterly to help identify and shape the research conducted by Deakin. In addition to research, these thought leaders also provide advice to Deakin on course directions and updates to ensure student are industry ready when they graduate.
The EABC also enables participating organisations to share experiences and challenges confidentially with peers from other sectors.
If you are interested in participating in the EABC program, please contact Damien Manuel.
Director, Centre for Cyber Security Research (CSRI)
Mr Damien Manuel
+61 0 439 319 603
Email Damien Manuel
Deputy Director, Centre for Cyber Security Research and Innovation (CSRI)
Professor Matt Warren
+61 3 9244 6567
Email Matt Warren
Director of Industry Research, Centre for Cyber Security Research and Innovation (CSRI)Professor Debi Ashenden
Email Debi Ashenden
Director of Research, Centre for Cyber Security Research and Innovation (CSRI)
Professor Chang-Tsun Li
+61 61 3 5227 3559 (Extension 73559)
Email Chang-Tsun Li
General enquiries to the leadership team, please email Cyber.Research.Innovation@deakin.edu.au