Skip to menu Skip to content Skip to footer
Professor Ryan Ko
Professor

Ryan Ko

Email: 
Phone: 
+61 7 336 51092

Overview

Background

Professor Ryan Ko is Chair and Director of UQ Cyber and a member of the Academic Board at the University of Queensland, Australia. He holds a Bachelor of Engineering (Computer Engineering)(Hons.) (2005), and PhD (2011) from Nanyang Technological University, Singapore.

Ko has held senior scientific leadership, executive, and directorship roles across industry and academia, and has more than a decade of board, governance and advisory experience across government, industry and NGOs across Australia, New Zealand, Singapore, and USA.

He currently serves on the Audit and Risk Committee for the board of the global not-for-profit ORCID, and has served on boards and advisory groups for AustCyber, Queensland Government, Meat and Livestock Australia (MLA), and the NZX-listed (NZE:LIC) Livestock Improvement Cooperation (LIC).

He has also served as expert advisor to INTERPOL, the government of Tonga, NZDF, NZ Minister for Communications' Cyber Security Skills Taskforce, and one of four nationally-appointed Technical Adviser for the Harmful Digital Communications Act 2015, Ministry of Justice. He has also served as independent technical expert for court cases.

He is also Adjunct Professor at the Singapore Institute of Technology, and Affiliate Faculty Member at NIATEC at the Idaho State University, USA.

He is co-founder of Cyber Security Certification Australia (CSCAU), CyberCert, and First Watch Ltd (NZ) – an industrial cybersecurity spin-off based on his patented OT security and provenance research at the University of Waikato.

Since joining UQ in 2019, he has served as:

  • Deputy Head of School (External Engagement) (2021-2022)
  • Founding Discipline Leader of the Cyber Security and Software Engineering discipline (2020-2021)
  • Group Leader - Cyber Security (2019)

Ko has successfully established several university-wide, multi-disciplinary academic research and education programmes, including establishing and leading:

  • UQ Cyber - interdisciplinary cyber scurity research centre involving 60+ academics and their respective teams from the 6 Schools (EECS, Business, Economics, Law, Social Science, Mathematics & Physics), the Centre for Policy Futures, and 4 Faculties since 2019.
  • UQ's interdisciplinary postgraduate programme (MCyber, PGDipCyber, GCertCyber) involving four UQ faculties in 2019,
  • NZ's first cyber security graduate research programme and lab (Cybersecurity Researchers of Waikato (CROW)) in 2012,
  • NZ's first Master of Cyber Security (encompassing technical and law courses), the NZ Cyber Security Challenge since 2014, and
  • NZ Institute for Security and Crime Science – Te Puna Haumaru as its founding director, the Evidence Based Policing Centre (at Wellington with NZ Police and ESR), and Master of Security and Crime Science in 2017 with the University of Waikato, NZ.

Over his academic career, Ko has been awarded A$20+million in competitive grants as lead Chief Investigator, and ~A$40+million as co-investigator. Prior to UQ, he was the highest funded computer scientist in New Zealand, as Principal Investigator and Science Leader of the largest MBIE-awarded cloud security research funding for STRATUS (NZ$12.2 million; 2014-2018). STRATUS' research was awarded 'Gold' by MBIE (i.e. top performing project, 2017), adopted by INTERPOL and featured in NZ's Department of Prime Minister and Cabinet's NZ Cyber Security Strategy 2016 annual report.

Ko has a track record developing international and national cyber security curricula, including:

  • Co-creation of the gold-standard (ISC)2 Certified Cloud Security Professional (CCSP) curriculum (2014-2015)
  • Authoring the draft of the NZQA's Level 6 Cybersecurity Diploma qualification as part of the NZ Cyber Security Skills Taskforce on behalf of the Department of Prime Minister and Cabinet.

Ko has also experience developing competitions and coaching competitive cyber security teams, including:

  • Co-founding the NZ Cyber Security Challenge in 2014, and leading the NZCSC from 2014 to 2018. NZCSC is now the premier national cyber security competition in NZ.
  • Co-founding the Oceania Cybersecurity Challenge (OCC) in 2020, and leading the competition from 2022 to present. OCC is now the regional qualifiers for the International Cybersecurity Challenge
  • Co-founding the International Cybersecurity Challenge (ICC) as part of the Steering Committee in 2022. ICC has been held in Athens (2022) and San Diego (2023). It is aiming to be the world cup of cyber competitions.
  • Head Coach of Team Oceania for the ICC. 2022 Results: Overall 4th; 2023 Results: Overall 2nd in the world.

He contributed to the establishment of the Government of Tonga CERT and CERT NZ, and has spoken regularly on cyber and cloud security research across the globe, including the OECD, Republic of Korea National Assembly (2018), INTERPOL (2017), TEDx Ruakura (2017), and the NZ Members of Parliament (2016).

Within the ISO/IEC JTC 1/SC 27, Prof Ko was Head of Delegation for the Singapore national body, served as Editor, ISO/IEC 21878 “Security guidelines for design and implementation of virtualized servers”, and hosted the ISO/IEC JTC 1/SC 27 meetings at Hamilton, NZ, in 2017. He is currently one of the editors of the ISO/IEC PWI 5181 Data Provenance Reference Model. In 2022, Ko co-chaired the development of the Singapore standard TR 106:2022 Tiered cybersecurity standards for enterprises in collaboration with the SPSTC and Singapore Cyber Security Agency.

Ko serves as an assessor for the Australian Research Council (ARC), Irish Research Council, Nederlandse Organisatie voor Wetenschappelijk Onderzoek (NWO), and NZ MBIE College of Assessors (since 2015).

He is also an external expert for the Tertiary Education Quality and Standards Agency (TEQSA).

Ko has externally examined 11 PhD and 3 Masters theses for universities in Australia, New Zealand, Canada, Hong Kong and Singapore.

For his contributions to the field, he was elected Fellow of the Australian Computer Society, Fellow of the Queensland Academy of Arts and Sciences, and Fellow of Cloud Security Alliance (CSA) (2016). He was awarded the Singapore Government (Enterprise Singapore)’s Young Professional Award (2018) for his leadership at ISO, and awarded the inaugural CSA Ron Knode Service Award 2012 for the establishment of Cloud Data Governance and Cloud Vulnerabilities Research Working Groups. He is also recipient of the 2015 (ISC)2 Information Security Leadership Award.

For his research and teaching excellence, he was awarded the University of Queensland Awards for Excellence - Leadership (Commendation) (2023), EAIT Nominations for Most Effective Teacher (both semesters of 2020, 2021, 2022, 2023), University of Waikato's Early Career Excellence Award (2014), Faculty Teaching Excellence Awards (2014, 2015, 2018), and the Nola Campbell eLearning Excellence Award (2014). During his PhD, he was also awarded A*STAR SIMTech's Best Student Award (2009), and clinched the 1st Prize of the IEEE Services Cup 2009 at IEEE ICWS (CORE A*) in Los Angeles, CA.

Earlier in his career, Ko was a systems engineer, and subsequently founded two start-ups (one was a social enterprise which became an events/conventions management contractor with IMG at mega-events in Singapore, including the inaugural Youth Olympics in 2010).

He is an active science communicator and is regularly interviewed and featured by Australian (ABC News, SBS News, 7 News, 9 News, Courier Mail, Network 10, AFR), Singaporean (Channel NewsAsia, CNA Radio938), NZ (NZ Herald, Dominion Post, Stuff.co.nz, Waikato Times, TVNZ, Central TV) and international media on topics of cyber security, cybercrime and data privacy.

Availability

Professor Ryan Ko is:
Available for supervision
Media expert

Qualifications

  • Bachelor (Honours) of Computer Engineering, Nanyang Technological University
  • Doctor of Philosophy, Nanyang Technological University
  • Certificate of Management, Harvard University
  • Fellow, Australian Computer Society, Australian Computer Society
  • Fellow, Cloud Security Alliance, Cloud Security Alliance
  • Fellow, Queensland Academy of Arts and Sciences, Queensland Academy of Arts and Sciences

Research interests

  • Automating Cyber Security for Critical Infrastructure

    Designing cyber autonomy to empower all end-users.

  • Operational Technology (OT) Security

    Focusing on Industrial Control Systems (ICS) and related protocols.

  • Provenance and Traceability

    Applications into AgTech, IoT, Edge, Cloud Computing and OT environments.

  • Trusted Computing Applications

    Applications into agriculture, regulatory, auditing and media.

  • Data Privacy and Privacy Enhancing Technologies

    Enabling secure and private multi-party computation.

  • AI Planning/ Automated Planning

    Adapting classical AI planning approaches into cyber security.

  • Applying Situation Crime Prevention to Cybercrime Prevention

    Applying SCP techniques into processes and controls to prevent cybercrime.

  • Board and Organisational Structures for Cyber Resilience

    Understanding how factors and pressures (e.g. board composition and organisational structures, external pressures) affect an organisation's cyber resilience.

  • Creating Measurable Indicators of Cyber Resilience

    Developing a framework to quantify factors allowing senior executives to understand and make decisions about cyber resilience.

Research impacts

Ko's research in cyber security focuses on returning control of data to users. His research reduces users' reliance on trusting third-parties and focusses on (1) provenance logging and reconstruction, traceability and (2) privacy-preserving data processing. His research is adopted internationally (e.g. CERN, INTERPOL, and HP clients such as Apple, Nasa, US Treasury/IRS). His papers have received conference Best Paper Awards (2011, 2015, 2017), and resulted in several technology transfers (e.g. HP), open source contributions (e.g. Kali Linux THC) and spin-offs (e.g. First Watch). He has published in top venues including WWW (The Web), NeurIPS, DCC, ESORICS, IEEE TrustCom, IEEE Comms Surveys and Tutorials, IEEE ICWS, IEEE TDSC, IEEE TSC, Computers & Security, IEEE Trans on Smart Grid, and more than 100 publications including books, refereed conference papers, journal papers, book chapters, encyclopaedia entries, technical reports and international patents (PCT).

Recently, he is researching information integrity and cyber autonomy in critical infrastructure sectors such as energy, manufacturing, regulatory and agriculture sectors. He has served in technical programme committees for more than 30 IEEE conferences/workshops, associate editor for 6 journals, and as series editor for Elsevier's security books.

Works

Search Professor Ryan Ko’s works on UQ eSpace

165 works between 2007 and 2024

61 - 80 of 165 works

2019

Other Outputs

Security systems, methods and devices

Ko, Ryan Kok Leong , Choi, Taejun and Anderson-Scott, Christian (2019). Security systems, methods and devices. 756876.

Security systems, methods and devices

2019

Conference Publication

Message from IEEE TrustCom 2019 General Chairs

Ko, Ryan, Chen, Liqun and Zhu, Liming (2019). Message from IEEE TrustCom 2019 General Chairs. 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), Rotorua, New Zealand, 5-8 August 2019. Piscataway, NJ USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/trustcom/bigdatase.2019.00005

Message from IEEE TrustCom 2019 General Chairs

2018

Other Outputs

Towards one global privacy law

Ryan Ko, Mark Rodrigues, Aleksey Ladur and Craig Scoon (2018, 01 04). Towards one global privacy law AsiaGlobal Online

Towards one global privacy law

2018

Book Chapter

Data Provenance for Big Data Security and Accountability

Phua, Thye Way and Ko, Ryan K. L. (2018). Data Provenance for Big Data Security and Accountability. Encyclopedia of Big Data Technologies. (pp. 1-6) Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-63962-8_237-1

Data Provenance for Big Data Security and Accountability

2018

Conference Publication

A full-scale security visualization effectiveness measurement and presentation approach

Garae, Jeffery, Ko, Ryan K. L. and Apperley, Mark (2018). A full-scale security visualization effectiveness measurement and presentation approach. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, New York, NY, United States, 31 July - 3 August 2018. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers . doi: 10.1109/TrustCom/BigDataSE.2018.00095

A full-scale security visualization effectiveness measurement and presentation approach

2018

Conference Publication

MetropolJS: Visualizing and debugging large-scale javascript program structure with treemaps

Scarsbrook, Joshua D., Ko, Ryan K. L., Rogers, Bill and Bainbridge, David (2018). MetropolJS: Visualizing and debugging large-scale javascript program structure with treemaps. 26th Conference on Program Comprehension ICPC '18, Gothenburg, Sweden, 28-29 May 2018. New York, United States: ACM. doi: 10.1145/3196321.3196368

MetropolJS: Visualizing and debugging large-scale javascript program structure with treemaps

2018

Conference Publication

Security visualization intelligence model for law enforcement investigations

Garae, Jeffery, Ko, Ryan K. L ., Apperley, Mark and Schlickmann, Silvino J. (2018). Security visualization intelligence model for law enforcement investigations. 2018 Cyber Forensic & Security International Conference (2018 CFSIC), Nuku'alofa, Tonga, 21-23 August 2018. Nuku'alofa, Tonga:

Security visualization intelligence model for law enforcement investigations

2017

Book Chapter

Security visualization for cloud computing: an overview

Garae, Jeffery, Ko, Ryan K. and Apperley, Mark (2017). Security visualization for cloud computing: an overview. Data security in cloud computing. (pp. 277-295) edited by Vimal Kumar , Sivadon Chaisiri and Ryan Ko. London, United Kingdom: Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch13

Security visualization for cloud computing: an overview

2017

Book Chapter

Data provenance in cloud

Yu Shyang Tan, Alan, Chaisiri, Sivadon, Leong, Ryan Ko, Holmes, Geoff and Rogers, Bill (2017). Data provenance in cloud. Data security in cloud computing. (pp. 261-275) edited by Vimal Kumar, Sivadon Chaisiri and Ryan Ko. London, United Kingdom: Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch12

Data provenance in cloud

2017

Other Outputs

Turning the tide with cyber toolmakers

Ko, Ryan (2017, 09 01). Turning the tide with cyber toolmakers The National Business Review (NZ) 101-127.

Turning the tide with cyber toolmakers

2017

Other Outputs

Opinion: ransomware attack needs global solution

Burton, Joe and Ko, Ryan (2017, 05 22). Opinion: ransomware attack needs global solution Waikato Times 1-1.

Opinion: ransomware attack needs global solution

2017

Conference Publication

Returning control of data to users with a personal information crunch - a position paper

Will, Mark A., Garae, Jeffery, Tan, Yu Shyang, Scoon, Craig and Ko, Ryan K. L. (2017). Returning control of data to users with a personal information crunch - a position paper. 5th International Conference on Cloud Computing Research and Innovation (ICCCRI), Singapore, 11-12 April 2017. Piscataway, NJ, United States: IEEE. doi: 10.1109/ICCCRI.2017.12

Returning control of data to users with a personal information crunch - a position paper

2017

Conference Publication

Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography

Will, Mark A., Ko, Ryan K. L. and Schlickmann, Silvino J. (2017). Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography. 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, NSW Australia, 1-4 August 2017. Piscataway, NJ United States: IEEE. doi: 10.1109/trustcom/bigdatase/icess.2017.347

Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography

2017

Conference Publication

Visualizing the New Zealand cyber security challenge for attack behaviors

Garae, Jeffery, Ko, Ryan K. L., Kho, Janice, Suwadi, Saidah, Will, Mark A. and Apperley, Mark (2017). Visualizing the New Zealand cyber security challenge for attack behaviors. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, NSW, Australia, 1 -4 August 2017. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.362

Visualizing the New Zealand cyber security challenge for attack behaviors

2017

Conference Publication

Attribution using keyboard row based behavioural biometrics for handedness recognition

Shute, Sam, Ko, Ryan K. L. and Chaisiri, Sivadon (2017). Attribution using keyboard row based behavioural biometrics for handedness recognition. 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, NSW, Australia, 1 - 4 August 2017. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.363

Attribution using keyboard row based behavioural biometrics for handedness recognition

2017

Conference Publication

User-centric intelligence visualizations for ransomware propagation, bitcoin transactions and early cybercrime detection

Ko, Ryan K. L. and Garae, Jeffery (2017). User-centric intelligence visualizations for ransomware propagation, bitcoin transactions and early cybercrime detection. 3rd INTERPOL Digital Security Research Seminar, Singapore, 12-13 September 2017. Singapore: INTERPOL.

User-centric intelligence visualizations for ransomware propagation, bitcoin transactions and early cybercrime detection

2017

Book Chapter

A data-centric view of cloud security

Kumar, Vimal, Chaisiri, Sivadon and Ko, Ryan (2017). A data-centric view of cloud security. Data security in cloud computing. (pp. 1-17) Hertfordshire, United Kingdom: Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch1

A data-centric view of cloud security

2017

Book

Data Security in Cloud Computing

Vimal Kumar, Sivadon Chaisiri and Ryan Ko eds. (2017). Data Security in Cloud Computing. London, United Kingdom: Institution of Engineering and Technology. doi: 10.1049/pbse007e

Data Security in Cloud Computing

2017

Book Chapter

The Waikato Data Privacy Matrix

Scoon, Craig and Ko, Ryan K. L. (2017). The Waikato Data Privacy Matrix. Data security in cloud computing. (pp. 243-259) edited by Vimal Kumar, Sivadon Chaisiri and Ryan Ko. London, United Kingdom: The Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch11

The Waikato Data Privacy Matrix

2017

Book Chapter

Distributing encoded data for private processing in the cloud

Will, Mark A. and Ko, Ryan K. L. (2017). Distributing encoded data for private processing in the cloud. Data security in cloud computing. (pp. 89-115) edited by Vimal Kumar, Sivadon Chaisiri and Ryan Ko. London, United Kingdom: The Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch5

Distributing encoded data for private processing in the cloud

Funding

Current funding

  • 2023 - 2026
    Secure and Ethical XR Based HSE Training for First Responders in Crisis Situations
    CSIRO
    Open grant
  • 2021 - 2024
    Linking Digital Payments to Crime Using Bid Data Machine Learning Tools (ONI NISDRG grant administered by Griffith University)
    Griffith University
    Open grant

Past funding

  • 2024
    Quality Assurance & Testing of Classic A. I. Based Password Assessment Mechanisms
    DETACK GmbH
    Open grant
  • 2022 - 2023
    Algorand Centre of Excellence (ACE) on Sustainability Informatics for the Pacific (administered by Monash University)
    Monash University
    Open grant
  • 2022 - 2023
    Lean design workshop to understand future challenges for horticulture production in tropical and subtropical regions of Australia
    Horticulture Innovation Australia Limited
    Open grant
  • 2021
    Development of quality assurance technologies for meat processing plants
    Innovation Connections
    Open grant
  • 2020 - 2023
    Massive static and real-time datasets for cyber security research and digital competitiveness
    Data 61 - University Collaboration Agreement (DUCA)
    Open grant

Supervision

Availability

Professor Ryan Ko is:
Available for supervision

Before you email them, read our advice on how to contact a supervisor.

Supervision history

Current supervision

Completed supervision

Media

Enquiries

Contact Professor Ryan Ko directly for media enquiries about:

  • AI for Cyber Security
  • Cloud Computing Security
  • Critical infrastructure security
  • Cyber Attack Attribution
  • Cyber Crime
  • Cyber Security
  • Cybersecurity
  • Data Accountability
  • Data Control
  • Data Privacy
  • Data Provenance
  • Data Tracking
  • ICS Security
  • Industrial control systems security
  • Information Security
  • Privacy enhancing technologies

Need help?

For help with finding experts, story ideas and media enquiries, contact our Media team:

communications@uq.edu.au