No results found.
No results found.
No results found.

Podcasts

Episode 350 Deep Dive: George Barnes | Journey from the NSA to the Private Sector
byKBI.Media

Mr. George C. Barnes is the President of Red Cell Partner’s Cyber Practice and a Partner at the firm. In this role, he oversees the pursuit of new-start incubations that are focused on cybersecurity opportunities spanning commercial and government sectors. He ensures optimized market gap responsiveness of new incubations and guides Red Cell’s platform team support as young cybersecurity companies progress through their early-stage business life cycles. As a Red Cell Partner, Mr. Barnes applies his national security and cybersecurity domain expertise to Red Cell’s incubation activities and oversees the company’s overall cyber-related investment strategy.

Prior to joining Red Cell, Mr. Barnes served as the Deputy Director and senior civilian leader of the U.S. National Security Agency (NSA) from April 2017 through September 2023. In this role, Mr. Barnes served as NSA’s chief operating officer, overseeing strategy, policy, and operations.  As an agency deputy in the U.S. national security system, Mr. Barnes supported the U.S. defense and intelligence enterprise in national security strategy execution and the formulation of supporting policies.  He positioned NSA as an integrated mission partner enabling U.S. decision advantage and security against foreign threats.

Over his 36-year career at the NSA, Mr. Barnes held numerous technical and organizational leadership roles spanning intelligence collection operations, intelligence target analysis, foreign liaison and industrial partnership management, workforce support, and global enterprise governance.

U.S. Government Service Recognition Includes:

Department of Defense Distinguished Civilian Service Medal

Joint Chiefs of Staff Joint Meritorious Civilian Service Medal

National Intelligence Distinguished Service Medal

Under Secretary of Defense for Intelligence & Security Distinguished Service Medallion

National Security Agency Distinguished Civilian Service Medal

Central Intelligence Agency Seal Medal

National Reconnaissance Office Medal of Distinguished Performance

National Geospatial Intelligence Agency Medallion for Excellence

National Intelligence Medal of Achievement

Distinguished Executive Presidential Rank Award

Meritorious Executive Presidential Rank Awards (2)

Mr. Barnes received a Bachelor of Science in Electrical Engineering from the University of Maryland in 1986. In 2020, he was honored as a Distinguished Alumni by the University of Maryland’s College of Electrical and Computer Engineering.

No results found.
Five Telecom Habits Of Smart Small Businesses

Five Telecom Habits Of Smart Small Businesses

Introduction Small businesses often grow quickly, but if their telecommunications setup doesn’t support this growth, productivity and service can suffer. With a few strategic habits, SMEs can avoid tech growing pains. Here are the top telecom habits that the savviest Australian small businesses adopt early on. Consolidate Where It Makes Sense It’s easy for businesses to end up with multiple vendors for phone, mobile, internet and IT services. While price-shopping can yield short-term savings, managing too many bills and support lines is ...
No results found.

Business News ↓

Three Cybersecurity Predictions That Will Define the CISO Agenda in 2026

As we head into 2026, cybersecurity leaders are facing a paradox. Organisations have never invested more in security tools, data and talent – yet many CISOs admit they have less confidence in their true risk posture than ever before.  The problem isn’t a lack of signals. It’s an excess of them.   Fragmented tools, disconnected data, accelerating AI adoption and rising board expectations have created an environment...

How to Build Secure Communications Beyond “End-to-End” Network Encryption

For governments and critical infrastructure operators, secure communications are essential to national governance, operational continuity, and crisis response. Secure communication is the process of safeguarding communication channels and taking full control over critical information. It involves methods and technologies to ensure that all data exchanged between two or more parties remains confidential, authentic,...

NIAP-Certified Security – A Foundation for Trusted Communications

In government and critical infrastructure, security is not an optional feature, it is the foundation of operational integrity. For organizations responsible for protecting sensitive data and ensuring mission continuity, trust in communication systems must be earned through independent, rigorous validation. Relying on unvetted software introduces unacceptable risks to national security and public safety. As a...

Streamlining Cyber Operations

Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing pressure to protect, adapt, and enable innovation. For many organisations, cyber operations are buckling under the weight of manual tasks, legacy tools, and cross-functional bottlenecks. The result is a reactive security posture that struggles to keep up with business demands. To address this, tech...

Containing the Inevitable: What Cyber Leaders Must Prepare for in 2026

As we head into 2026, I am thinking of a Japanese idiom, Koun Ryusui (行雲流水), to describe how enterprises should behave when facing a cyberattack. Koun Ryusui means “to drift like clouds and flow like water.” It reflects calm movement, adaptability, and resilience. For enterprises, this is an operating requirement. Cyber incidents are no longer isolated disruptions. They are recurring tests of how well an...

Continuous Compliance Isn’t An Option

Introduction For today’s Chief Information Security Officers (CISOs), compliance is no longer a once-a-year headache, it’s a continuous, evolving mandate. As threat landscapes shift and regulatory frameworks grow more complex, businesses are being called to do more than tick boxes at audit time. Instead, they must embrace a model of continuous compliance, an approach that provides ongoing assurance, improves...

Trust, Power, People: Hybrid AI’s 2026 Imperative 

Over the past year across Asia Pacific, conversations with customers, from fast-growing digital natives to highly regulated banks and healthcare providers, all have shared a common thread: AI has moved from experimentation to execution. The question is no longer “if” but “how” to scale responsibly, efficiently, and with clear business outcomes. As we look to 2026, the organisations that lead will be those that...

Can AI Ever Really Outpace AI-Powered Cyberattacks?

Introduction There's this question that keeps coming up in cybersecurity circles, and honestly, it feels a bit like asking whether we can outrun our own shadow. Can defensive AI actually stay ahead of AI-powered attacks? The short answer is probably not in any permanent way, but that doesn't mean we're doomed to lose this fight. The thing about AI in cybersecurity: it's fundamentally playing both offense and...

Putting Your Money Where Your Money Is

Introduction Fintech companies occupy a unique position at the intersection of finance and technology. They handle extremely sensitive customer information, personal identities, payment data, transaction histories, and therefore represent a high‑value target for cyber‑criminals. In the Asia‑Pacific region, nearly 80 percent of executives anticipate that financial crime risks, including AI‑driven attacks, will...

ISACA Sydney Conference 2025 – Event Recap

Overview Walking into the ISACA Sydney Chapter Conference as “the student voice”, I knew I was surrounded by some of the heaviest hitters in cyber, audit and technology leadership. My job for the day was simple but huge: ask the questions students and early-career professionals are scared to ask and bring those answers back to our community. By the end, one theme kept looping in my head: it’s not enough to just be...

Disruption Demands Coordination: Why Secure Communications Solutions are Key to Disrupting the Illegal Fentanyl Trade

Introduction The Government of Canada is taking concrete and bold action to strengthen border security and disrupt the illegal fentanyl trade. It has announced an investment of $1.3 billion to enhance operations. The funding will support hiring additional personnel and purchasing advanced technology and equipment. This includes state-of-the-art imaging systems, drones, and AI tools. The plan also involves creating...

Shifting the Burden of ID Crime from Victims to Institutions

Introduction Australia’s growing epidemic of identity crime has exposed a critical flaw in the nation’s cyber security response: the victims of data breaches are too often left to clean up the mess alone. As cyberattacks rise and personal information circulates through criminal networks, calls are mounting for a co-ordinated, government-led framework to replace today’s fragmented, victim-driven recovery model. At...

Avoiding Security Operation Chokepoints

Introduction Security operations often become inadvertent chokepoints. When every vendor relationship triggers an extensive security review, and teams rely on spreadsheets and email chains to gather responses, progress grinds to a halt. For resource‑constrained organisations, particularly in the fintech, SaaS and technology spaces, these bottlenecks can delay product launches, strain customer relationships and...

2026 Predictions: The Year Identity Becomes the Ultimate Control Point for an Autonomous World

Introduction The collision between technological acceleration and human adaptability will define the cybersecurity landscape in 2026. Identity and trust will sit at the centre of this struggle — as the proliferation of machine and AI identities exposes the fragility of traditional controls and the limits of human oversight.  As organisations race to deploy autonomous agents and machine-led systems to drive...

Why 9 In 10 IT Teams Overestimate Their Operational Resilience

Introduction How confident are you that your operations are resilient enough to tackle today’s challenges while preparing for tomorrow’s? If your answer is ‘very confident’, you’re not alone. According to SolarWinds' 2025 IT Trends Report, over 90% of IT professionals believe their organisations are resilient in the face of today’s demands. Of those, 38% say their resilience is ‘very strong’, while 55% describe it...

Cybersecurity in Manufacturing: Why It’s More Important Now Than Ever

Manufacturing has always depended on stable operations. That used to mean keeping machines running, maintaining quality, and hitting delivery schedules. Today it also means defending the environment from attacks that can shut down production, corrupt data, or compromise customer trust. Plants are now connected in ways they weren’t ten years ago, and that connection has created real exposure. The stakes are higher...
No results found.
No results found.
No results found.
Streamlining Cyber Operations

Streamlining Cyber Operations

Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing ...
No results found.
No results found.

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

NIAP-Certified Security – A Foundation for Trusted Communications

In government and critical infrastructure, security is not an optional feature, it is the foundation of operational integrity. For organizations responsible for protecting sensitive data and ensuring mission continuity, trust in communication systems must be earned through independent, rigorous validation. Relying on unvetted software introduces unacceptable risks to national security and public safety. As a...

Streamlining Cyber Operations

Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing pressure to protect, adapt, and enable innovation. For many organisations, cyber operations are buckling under the weight of manual tasks, legacy tools, and cross-functional bottlenecks. The result is a reactive security posture that struggles to keep up with business demands. To address this, tech...

Containing the Inevitable: What Cyber Leaders Must Prepare for in 2026

As we head into 2026, I am thinking of a Japanese idiom, Koun Ryusui (行雲流水), to describe how enterprises should behave when facing a cyberattack. Koun Ryusui means “to drift like clouds and flow like water.” It reflects calm movement, adaptability, and resilience. For enterprises, this is an operating requirement. Cyber incidents are no longer isolated disruptions. They are recurring tests of how well an...

Trust, Power, People: Hybrid AI’s 2026 Imperative 

Over the past year across Asia Pacific, conversations with customers, from fast-growing digital natives to highly regulated banks and healthcare providers, all have shared a common thread: AI has moved from experimentation to execution. The question is no longer “if” but “how” to scale responsibly, efficiently, and with clear business outcomes. As we look to 2026, the organisations that lead will be those that...
No results found.
No results found.
No results found.
It’s Time to Hack the Hackers

It’s Time to Hack the Hackers

Introduction Cybercrime in Australia is rising rapidly. From the major breachers that held headlines hostage for months, ...
No results found.
No results found.
No results found.
No results found.
Streamlining Cyber Operations

Streamlining Cyber Operations

Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing ...
No results found.
No results found.
No results found.