Skip to main content
Cookies Policy
Detailed information on the use of cookies on this website is provided in our Privacy Policy. By closing this message and proceeding, you consent to our use of cookies in accordance with our Cookies Policy.
  • icon-facebook
  • icon-linkedin
  • icon-twitter

ACS Emerging and Deep Tech Webinar: Where Privacy meets Cybersecurity

Join us for a discussion with international guest speaker, Mr Chris Moschovitis, Chairman & CEO of tmg-emedia New York

Registration End Date:

Mon, 15 Mar, 05:00 PM

  • when

  • Event Start:
    Wed, 17 Mar, 09:30 AM

    Event Finish:
    Wed, 17 Mar, 10:30 AM
  • event price

  • -

<img alt="User-added image" src=";oid=00D90000000o5NE&amp;lastMod=1612483465000"></img><br><br><br><b><i>Where Privacy meets Cybersecurity</i></b><br><br><span style="font-size: 10pt;"><span><span style="font-family: Arial,sans-serif;"><span style="font-size: 11.0pt;"><span><span>The average business struggles to navigate the new privacy legislation and its impact on business operations, much less its impact on IT and cybersecurity, frequently relegated to be an “IT problem”. This is not only inaccurate, but dangerous, leading to at best a “checklist approach” to privacy and cybersecurity, and complete misalignment between business goals, regulatory requirements, IT enablement of these goals, and cybersecurity alignment with both.</span></span></span></span></span></span><br><br><span style="font-size: 10pt;"><span><span style="font-family: Arial,sans-serif;"><span style="font-size: 11.0pt;"><span><span>Hosted by ACS National Vice-President, Jo Stewart-Rattray FACS CP (Cyber) with guest speaker, Chris Moschovitis joining us all the way from New York, this presentation will review the essential steps in establishing a pragmatic privacy and cybersecurity program alignment for business. Starting with ways to identify goals, how to communicate with executive teams, align and partner with IT, and covering privacy asset valuation, threat and vulnerability assessments, environmental considerations (cloud, IoT, distributed workforce), control selection, incident response, people and cybersecurity, and program management, this is a presentation not to be missed!</span></span></span></span></span></span><br><br><span style="font-size: 10pt;"><span><span style="font-family: Arial,sans-serif;"><span style="font-size: 11.0pt;"><span><span>Western Australian participants – we know it is an early start for you – but set the alarm, grab a cup of coffee and start your day learning more about cybersecurity, privacy, governance, risk and IT alignment!</span></span></span></span></span></span><br><br><br><br><br><br><br><b>Notice for all attendees including ACS Professional Year Students</b><br>When attending virtual events, in order to claim and qualify for the required CPD hours, Professional Year students need to attend the online event in its entirety which will be tracked by the ACS events team.<br><br>If a cloaking software program is used when connecting to an online event, your attendance cannot be recorded and CPD hours cannot be allocated. This does not include the use of VPN.<br><br><u><b>Please allow up to 2 weeks for CPD hours to be allocated to your membership profile.</b></u><br><br><i>For the sole purpose of registering you for this event, your registration details have been shared with Redback conferencing. Please refer to the Redback Data Policy at for confirmation that the data will not be used for any other purpose outside of this webinar.</i>

Contact Details

Share this event:




Emerging technology monitoring (EMRG) -> Level 5

Keynote Speaker

Chris Moschovitis

Chris Moschovitis

Based in New York City, Chris is the Founder, Chairman & Chief Executive Officer of tmg-emedia, inc. where he leads a team of experts in providing strategic consulting, custom software development, project management, cyber security, and technology management services to clients across the USA.
Over its history, tmg-emedia has had the privilege of working with several prestigious clients in various industry sectors, and the non-profit world including, Bayer, Harvard Business Publishing, Highline Data, Kellogg, National Institutes of Health, Oxford University and Tonix Pharma.
Chris' book "Cybersecurity Program Development for Business: The Essential Planning Guide" was published to critical acclaim by Wiley in 2018. His second book "Privacy, Regulations, and Cybersecurity: The Essential Planning Guide" will be published by Wiley in 2021. Additionally, Chris is the co-author of the critically acclaimed “History of the Internet: 1843 to the Present” as well as a contributor to the “Encyclopedia of Computers and Computer History” and the “Encyclopedia of New Media.”
Chris is certified in Cybersecurity (CSXF, CISM), Enterprise IT governance (CGEIT), and Data Privacy Solutions Engineering (CDPSE). He is a member of several organizations including ISACA, IAPP, and ISSA.

Show More


Jo Stewart-Rattray

Jo Stewart-Rattray

Jo Stewart-Rattray FACS CP (Cyber)
ACS National Vice-President

Jo has over 25 years’ experience in the IT field some of which were spent as CIO in the Utilities and as Group CIO in the Tourism space, and with significant experience in the Information Security arena including as CISO in the healthcare sector. She underpins her information technology and security background with her qualifications in education and management. She specializes in consulting in risk and technology issues with a particular emphasis on governance and security in both the commercial and operational areas of businesses. Jo provides strategic advice to organisations across a number of industry sectors including banking and finance, utilities, manufacturing, tertiary education, retails, healthcare and government. Jo has extensive board and committee experience. She has chaired a number of ISACA’s international committees including the Board Audit & Risk Committee, Leadership Development and Professional Influence & Advocacy. She served as an Elected Director on ISACA’s international Board of Directors for seven years and was the founder of its global women’s leadership initiative, SheLeadsTech.

Show More
ACS Emerging and Deep Tech Webinar: Where Privacy meets Cybersecurity

Recommended Events

Event Terms and Conditions


  • ACS reserves the right to change the program at any time. Every effort will be made to ensure a program of equivalent standard and members are updated with changes.
  • All dietary requirements are considered, however we cannot guarantee a 100% allergen free environment.
  • ACS reserves the right to prohibit entry or eject any person from an ACS event based on behaviour deemed inappropriate by ACS staff, its agents and/or others working under its authority.
  • Filming or streaming by attendees is not permitted. If an attendee is found to be doing so they will be asked to leave the event immediately and further action may be taken.
  • Photography and/or filming may take place during this event, by accepting these terms you consent to this. Please let a member of ACS know if you do not want your picture taken.

COVID-19 Event Attendance Compliance

By registering to attend an ACS in person event you are agreeing to the below terms and conditions

  • If an attendee is displaying flu or cold like symptoms in the days leading up to the event and therefore is not able to attend, ACS will refund the registration fee.
  • If an attendee comes to an event and is displaying flu or cold like symptoms they will be asked to leave
  • We ask all ACS members to respect the social distancing guidelines, if an attendee repeatedly disregards these guidelines, they may be asked to leave
  • ACS reserves the right to cancel the event within 24 hours' notice if either the speaker or the event host has advised us that they are exhibiting flu or cold like symptoms
  • All attendees must provide a valid phone number and email address to be contacted on if there is reason to notify about a possible COVID-19 exposure

Personal information collection notice

By registering for this event, you are providing personal information to the Australian Computer Society. In accordance with the ACS Privacy Policy, ACS collects personal information through registrations and attendances at its events for the purposes of:

  • organising and providing the various professional development events held by the ACS (including for example, courses, conferences, seminars, workshops, launches);
  • processing and managing event registrations (including catering for dietary requirements);
  • maintaining event attendance records;
  • contacting registered event guests with information in regard to the event and seeking post-event feedback;
  • communicating with you to in relation to future events or ACS products, courses, services, promotions or other products or services that ACS reasonably thinks may be of interest to attendees;
  • processing and responding to attendee inquiries; and
  • conducting research to improve its events and better understanding needs. 

If the required information is not provided, we or any involved third parties, may not be able to respond to you, update you, or provide appropriate services or events to you.

We may obtain personal information directly from you or from someone who registers for the event on your behalf. If you provide us with personal information about another person, you must do so only with their consent and agree to make them aware of this privacy notice.

ACS may share your personal information with third parties for the collection purposes noted above or as set out in our Privacy Policy, where it is reasonably necessary for, or directly related to, one or more of our activities, or required by law.

When you register to participate in an overseas event, we may send personal information we collect overseas.

See our Privacy Policy at for more information about our privacy practices.