Want to secure Your Business From Security Threats?

Meet our team



Jesse De Haan
Managing Director

Along with his father, Robert de Haan, Jesse founded Layer 8 Security, a Security enterprise that is quickly becoming a world leader in innovation and creativity.
With Jesse’s expertise is in the Field of Security Awareness and human behaviour, this allows the company to branch into areas that are previously untapped. Jesse developed many of the tools and advanced analytics that are used today in addressing the company’s speciality in Security Behaviour Programs.

LinkedInTwitterEmail to Jesse
Liz Buchanan
Marketing Manager

Liz Buchanan has been involved in different industries, throughout her career, starting in the financial industry in Australia and the UK, and then moving onto Not-for-profit state sporting organisations and to government. She has more than 20 years’ experience in the marketing area.

Liz focuses on digital communications and conducts social media and digital communications reviews, audits, and training.

LinkedInTwitterEmail to Liz
Duncan Murphy

Project Management Governance over Complex Portfolios of ICT projects, ICT projects, Information Security, ICT Investment Governance, ICT Service Delivery based on ITIL Frameworks, Information Security Management System (ISMS)

Tracey Fraser

Specialising in working with organisations to plan and manage information and cyber risk in both government and private sectors - delivering cyber security and information risk management, disaster recovery and business continuity planning, audit and review, governance initiatives, and broader deliverables across the information management realm.
Focus areas 27001, NIST, Resilience and Planning, Audit, Business Continuity, Information Governance, Cyber Security, Information Privacy, policy development

Graham Wittke
Business Development Manager

Sales Manager/Senior BDM, with extensive experience and success in IT business development, strategy and sales across both the public and private sectors. Energetic and results-oriented, Graham has a proven track record developing and steering high performing teams to excellence, simultaneously building and sustaining strong client and stakeholder relationships. 

Sonu Sharma

To succeed in an environment of growth and excellence and earn a job which provides me job satisfaction and self development and help me achieve personal as well as organizational goals

Tshering Wangdi
Software Engineer

Experienced Software Engineer with a demonstrated history of working in the Defense & Space industry. Skilled in PHP, HTML, CSS, MySQL, MSSQL, Java, JavaScript, Visio, Web Development, and WordPress Technology. He have an Honors in B.Sc in Computer Science from Sherubtse college, Bhutan and Master in Information Technology from CQUniversity, Australia.


You’ve come to the right place. layer8security is the place for next-generation Cyber-Security Awareness company protect their people, data and brand against advanced threats and compliance risks.

Layer 8 Security has developed Australia’s first fully measurable Security Behaviour Framework.

Layer 8 Security offers a complete suite of Cyber security awareness solutions that leverage progressive training techniques to effectively improve human response against cyber-attacks.

At Layer 8 Security, we believe that to be effective, training should leverage proven principles and it should be delivered continuously throughout the year. Unfortunately, much of the training delivered today consists of videos and PowerPoint presentations delivered once a year.

Board members, senior executive staff, Information security officers and risk managers should shift to a continuous, cyclical training approach, which offers measurable benefits.

Though we believe that PowerPoint presentations and videos can be informational, our experience has shown that they are seldom educational. These types of media can successfully inform end users of dangers, but they are not engaging or inspiring enough to bridge the gap between awareness and understanding.

Interactive cybersecurity awareness training methods help users absorb and appropriately recall the knowledge and tactics necessary to be aware of the tactics used by cyber criminals and then subsequently, avoid the attack.

We know the value of a balanced, thoughtful approach that draws on proven principles. That’s why our framework, which employs a cyclical model of assessment, education, reinforcement, and measurement, has helped our customers change behaviours within their organizations and reduce the effects from cyber criminals, malware infections and successful phishing attacks by up to 90%.

We are not advocating removing security technologies, but a true Defence in Depth approach requires all facets of the organization to be working together to address cyber security awareness.