A Legal Take On The Cybersecurity Strategy 2023-2030

A Legal Take On The Cybersecurity Strategy 2023-2030

The Cybersecurity Strategy 2023-2030 (the Strategy) is Australia's blueprint for cyber-safety by 2030, with three horizons to get there. The Action Plan for the first horizon (2023-2025) sets the foundations for the rest of the strategy to follow, and unsurprisingly includes a lot of legal and regulatory elements to support horizons two and three. For the legal community, there is something for everyone: migration law, procurement, consumer, corporate and commercial, in-house, and of course government. For those hoping the Strategy would provide ...

Podcasts

Episode 286 Deep Dive: Dean Frye | IT, IoT And OT Security As A Business Continuity Problem
byKBI.Media

In this episode, we sit down with Dean Frye, Solutions Architect at Nozomi Networks, as he discusses the complex landscape of IT, IoT, and OT security challenges.

Dean delves into the critical importance of avoiding an โ€œus vs. themโ€ mentality between IT and OT teams, and how security interruptions can severely impact business continuity. We explore industry-specific vulnerabilities, such as those in factory chicken farming and Tasmanian salmon farming, and emphasize the necessity for executives to have a deeper technical understanding of cybersecurity. Dean also highlights the value of telemetry and real-time reporting, the evolving role of cloud solutions in OT environments, and the importance of a well-integrated, multidisciplinary team to effectively manage cyber risks.

Dean Frye is a Solutions Architect for Nozomi Networks in Australia and New Zealand. Dean is an experienced security professional with a demonstrated history of providing compliance strategy, pragmatic risk mitigation, security project delivery, threat abatement and vendor interface solutions with a significant commercial background. Covering more than twenty years, his previous roles span consulting and senior leadership, including a stint at Armis as solutions architect, and another tenure at Cisco as director of security for the APJ region.

Business News โ†“

When Post-Quantum Cryptography Is No Longer Post-Quantum

In an era where quantum computing edges closer to practicality, the cryptographic protocols we rely on must evolve to meet emerging challenges. Post-Quantum Cryptography (PQC) represents a proactive step towards safeguarding sensitive information against quantum-powered threats. However, as with any technology at the frontier of innovation, PQC standards are not set in stone. The Changing Face of PQC Standards The...

Proactive Measures for Businesses to Achieve Effective Cyber Hygiene Practices

Cybercrime rates in Australia have surged, with online attacks averaging out to one every six minutes, according to the Australian Signals Directorate (ASD).(1) For organisations, one of the most common attacks is email compromise, which involves manipulating individuals into unauthorised financial transactions or the disclosure of sensitive company data.(2) This rise in cyber incidents translates into significant...

Antifragility – The Essential Strategy for Modern Cyber Defense

This blog is dedicated to one of the most influential thinkers of the modern era: mathematical genius, statistician, former options trader, risk analyst, and aphorist Nassim Nicholas Taleb. His noteworthy work, which addresses fundamental issues of randomness, probability, complexity, and uncertainty, is not only critical for risks in financial planning and life in general but is also very relevant to the context...

The Five Step Journey To Securing Australiaโ€™s Most Important Data Assets

Financial institutions are leading the way in their pursuit of adaptive protections against evolving information-stealing threats. Securing information assets to be resilient against a broad spectrum of threats is a journey many Australian organisations find themselves on. A steady stream of data breach disclosures - and a desire not to join that list - is keeping them motivated to stay the course. For banks and...

AI’s Transformative Role In Corporate Governance

Introduction Corporate governance is on the brink of a major transformation driven by artificial intelligence (AI), which is already reshaping the way organisations operate. As we move deeper into the Fifth Industrial Revolution, AI is no longer a distant concept, but a central force that has fundamentally altered how companies are making strategic decisions, managing risks, and ensuring compliance. The opportunity...

Secure-By-Design Is A Significant Exercise, But The Rewards Are Significant, Too

Concerted multilateral efforts are underway to influence and change developer behaviour when it comes to secure software creation. The idea of baking security into software right from the start of the development lifecycle is going from strength to strength, having gained important buy-in from cybersecurity agencies and vendors in the past year. Over 250 vendors supplying the US government have now signed a...

Cloud-Based Post-Quantum Cryptography (PQC) vs Local PQC: Not as Straightforward as You’d Think

Introduction As the quantum computing era approaches, organisations must adopt Post-Quantum Cryptography (PQC) to safeguard their data against future quantum threats. A critical decision in this transition is whether to implement PQC through cloud-based services or rely on local deployment. Each approach offers distinct advantages and challenges, and the right choice depends on the organisationโ€™s specific needs,...

Claroty 2025 Cyber Security Predictions

The use of cyberattacks in executing modern warfare, which is already happening, will enter public awareness A major cyberattack will be executed on critical infrastructure as part of a wartime scenario and this will enter mainstream news, as world leaders recognise the need to protect their domestic critical infrastructure from being attacked by an act of war from their enemies. Proposed legislation to protect...

AI Ethics: Developing AI models with intent, transparency and diversity

Introduction As humans, we all walk through the world with a certain level of uncious bias. It makes sense then that anything we โ€˜inventโ€™ is inherently riddled with this bias whether we think so or not. Itโ€™s no surprise that the development of AI has come with a laundry list of ethical concerns. Recently I spoke with Vini Cardoso, Field CTO of Cloudera as part of Tickerโ€™s โ€˜Tech Edgeโ€™ series to understand some of...

Why The First Stage Of Cyber Incident Response Is No Longer To Hit The Killswitch

Containing an incident often means disconnecting whole environments, but technology is giving IR teams more optimal choices. A recent survey found 63% of Australians had been caught up in a cyber attack or data breach in the past year, with half finding themselves in more than one. With ransomware and other types of attacks playing out so often in Australia and around the world, the cyber incident response playbook...

Why Microsegmentation is the Key to Containing Breaches in Todayโ€™s Cybersecurity Landscape

The Rise of Breach Readiness in Modern Cybersecurityย  Businesses today are navigating an increasingly complex digital environment where cyber threats evolve relentlessly. In recent years, cybersecurity has transformed from a niche technical concern to a strategic priority that sits firmly on the boardroom agenda. The rapid rise in the sophistication of cybercrime has left organizations grappling with how best to...

Navigating Cybersecurity Decision-making In The Age Of AI: Insights Into Operational, Tactical, And Strategic Influences

KBI Media is bringing you a preview of presentations from the upcoming Australian Cyber Security Conference in Melbourne. On 28 November 2024, Dr Ivano Bongiovanni, General Manager, AUSCERT will be unveiling insights from cutting edge research to unpack how decisions are being made in cybersecurity Dr Bongiovanni recently undertook research to discover what are the driving factors that influence cybersecurity...

Why Breaking Down Identity Silos Has Become An Imperative For Business

Many businesses today rely on hybrid IT environments that integrate a complex array of applications, datacentres, and cloud services. While these diverse ecosystems offer flexibility, they also present a critical challenge: identity silos. Fragmented identity and access management (IAM) creates security vulnerabilities, reduces efficiency, and raises operational costs. To mitigate these risks, organisations need a...

Post-Quantum Cryptography And Compliance: Where Are We Now?

As quantum computing continues to advance, its implications for cybersecurity are increasingly apparent. Quantum technology has the potential to disrupt widely used cryptographic protocols, exposing sensitive information to new vulnerabilities. In response, governments and regulatory bodies worldwide are urging organisations to adopt quantum-safe measures to protect data against future quantum threats. Post-Quantum...

Cybersecurity Shortfalls Threaten Australia’s Push to Boost Tech Exports

Introduction Australian policymakers are converging on a few challenging issues simultaneously. With a growing population and the tail end of an inflation outbreak, the housing crisis seems set to persist, affecting affordability for years to come. In this context, finding solutions to foster economic stability and growth is crucial. One viable path to address these challenges is through high-productivity jobs that...
NetApp's Innovation Unveiled. Key Areas Driving the Future of Data Management - Security is a Priority. cover

N-Powered Change – What Can We Learn from NetApp INSIGHT 2024

NetApp INSIGHT 2024, held in Las Vegas in September, served as a pivotal event for data management and cloud innovation professionals worldwide, particularly those focused on driving efficiency and harnessing the power of Artificial Intelligence (AI) within enterprise systems, and in the development of cyber resilience. The conference highlighted NetAppโ€™s innovative strides in building an interconnected data...
๏‚€

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News โ†“

Keeping The Public Safe From Festive Scams

"While the festive season should be a period of joy and goodwill, hackers are particularly active in Australia and have the ability toย employ new, sophisticated tactics on consumers. One emerging trend we're seeing is the use of AI-powered tools, with deepfake technologies allowing hackers to create convincing face-swapped videos and the ability to emulate voices on the telephone. They might impersonate a family...

Modernising Privileged Access Management To Combat Advanced ID-Based Cyber Threats

As cybersecurity threats become more sophisticated, businesses find themselves facing attackers who exploit increasingly complex identity trusts. The proliferation of digital transformation, accelerated by cloud adoption and remote work trends, has expanded organisational attack surfaces and complicated cybersecurity efforts. Today, identity-based attacks are so prevalent that roughly 90%[1] of organisations have...

Proactive Measures for Businesses to Achieve Effective Cyber Hygiene Practices

Cybercrime rates in Australia have surged, with online attacks averaging out to one every six minutes, according to the Australian Signals Directorate (ASD).(1) For organisations, one of the most common attacks is email compromise, which involves manipulating individuals into unauthorised financial transactions or the disclosure of sensitive company data.(2) This rise in cyber incidents translates into significant...

Antifragility – The Essential Strategy for Modern Cyber Defense

This blog is dedicated to one of the most influential thinkers of the modern era: mathematical genius, statistician, former options trader, risk analyst, and aphorist Nassim Nicholas Taleb. His noteworthy work, which addresses fundamental issues of randomness, probability, complexity, and uncertainty, is not only critical for risks in financial planning and life in general but is also very relevant to the context...