Delivering the Digital Future, Securely – for Western Australia

Data#3, proudly sponsored by Cisco, Microsoft and Palo Alto Networks, are pleased to present to you: Delivering the Digital Future, Securely – for Western Australia.

Did you know 80% of Australian organisations have experienced a ransomware attack, compared to the global average of 68%1? Cyber security challenges continue to evolve, compliance obligations increase and skills shortages stress your teams – what if we could reframe our mindset towards cyber security?

During global cyber security awareness month, Data#3 customers joined us for a thought-provoking cyber security state seminar at The Westin Perth. Guests were treated with a keynote address from Peter Boulhas, WA Chief Information Security Officer at the Office of Digital Government, to hear how Project Fortify plays an important role in accelerating the cyber security posture of WA.

Attendees were then treated to an interactive panel discussion with Mr Boulhas and security experts from our sponsors.

  • Carl Solder, Chief Technology Officer, Cisco
  • George Coldham, Microsoft Security Advocate and Cloud Architect, Microsoft
  • Martyn Young, Senior Manager System Engineering, Palo Alto Networks

Enjoy this short video of what the day held for our attendees.


To learn more about Data#3’s security solutions, please speak to your Data#3 Account Manager or submit your enquiry online today.

Sponsor Logos

1 Proofpoint (2022). Email cyber attacks on businesses soar. [ONLINE] Available at: https://www.mybusiness.com.au/resources/news/email-cyber-attacks-on-businesses-soar



Information protection in an age of information theft

Managing and safeguarding data across various apps, clouds, and endpoints is an uphill battle. It’s led to organisations relying on…

Customer Story: Knight Frank

Cloud Transition an Azure Success Story for Knight Frank Download Customer Story Contact a Specialist Objective…

3CX Desktop App Critical Vulnerability Alert

The Australian Cyber Security Centre has issued a warning about a new supply chain attack that has targeted a…

Managed Services eBook
Your guide to Data#3 Managed Services

Digital disruption is causing significant changes in the workplace, leading to higher expectations for access, security, and support regardless of…

JuiceIT Guest Blog | How XDR can help when time is of the essence

The only thing worse than cyber threats is an inability to detect those threats in time. Organisations need the…

JuiceIT Guest Blog | Veeam Platform: Reliable and Fast Recovery from Ransomware in a Hybrid World.

Ransomware attacks have become a growing concern for organisations of all sizes in Australia and New Zealand, resulting in significant…

Customer Story: Pernod Ricard Winemakers

Azure Migration gives Pernod Ricard Greater Flexibility and Improved Performance Download Customer Story Contact a Specialist…

Why would you deploy SASE?
If Secure Access Software Edge (SASE) with Cisco Meraki is the destination, what does the journey to get there look like?

Firstly, let’s set the scene. The term SASE was first mentioned by Gartner Analysts in July 2019 and Gartner continues…