No results found.
No results found.

Podcasts

Episode 328 Deep Dive: Rob Clyde & Jamie Norton | Quantum Computing – How Can Cyber Professionals Prepare?
byKBI.Media

In this episode, we sit down with Jamie Norton, Board Director at ISACA, and Rob Clyde, Crypto Quantique and past ISACA Board Chair, as they discuss the impact of quantum computing on cybersecurity and how professionals can prepare for imminent change. Jamie shares insights from a recent ISACA global survey revealing that 95% of organizations lack a quantum computing roadmap, highlighting both a general awareness of the concept and a significant gap in practical action. Rob emphasizes the urgency of understanding and adopting new post-quantum cryptography standards, noting the risks posed by “harvest now, decrypt later” attacks and the likelihood of nation states leading the charge in exploiting quantum capabilities. Together, they explore the need for continuous education, the evolving skills landscape—including the increasing value of quantum and AI literacy, and practical first steps organisations should take to assess risk, build strategy, and transition critical assets to post-quantum security measures.

Rob Clyde, Chairman, Crypto Quantique, and past ISACA board chair

Rob Clyde is a distinguished cybersecurity and technology leader with over three decades of experience in executive, board, and advisory roles. He currently serves as Chairman of the Board at Crypto Quantique, a company specialising in quantum-driven IoT cybersecurity solutions. He is also the Executive Chair of White Cloud Security and a long-term board member of ISACA, where he previously held the position of Chair.

Rob’s career includes notable positions such as Chief Technology Officer at Symantec, CEO of Adaptive Computing, and co-founder of Axent Technologies. As Managing Director of Clyde Consulting LLC, he provides strategic advisory services to cybersecurity software companies. Rob is also a Certified Information Security Manager (CISM) and holds the NACD Directorship Certification.

A frequent speaker at global cybersecurity conferences, Rob brings a wealth of knowledge and leadership to discussions on digital trust, governance and emerging technologies.

Jamie Norton, ISACA Board Director

Jamie Norton is a leading cybersecurity expert with over 25 years of experience across government, commercial and international sectors. He is Chief Information Security Officer at Australian Securities and Investment Commission (ASIC) and Board Director at ISACA. He is a Partner at McGrathNicol, where he advises executives and boards on cyber risk, resilience and strategic performance. Jamie also serves on the Advisory Board of Avertro, a cybersecurity start-up focused on informed, data-driven decision-making around cyber resilience and AI safety. He previously held leadership roles at NEC, Tenable, Check Point and the World Health Organisation.

Jamie is the former Chief Information Security Officer at the Australian Taxation Office (ATO), one of Australia’s largest federal agencies. He has chaired and contributed to numerous interdepartmental and industry committees on cyber strategy, and represented Australia at international government forums on cybercrime. He holds degrees in accounting and IT from the Australian National University and is a respected speaker and media commentator.

No results found.
The Scattered Spider, Airline Attacks and How to Be Breach Ready!

The Scattered Spider, Airline Attacks and How to Be Breach Ready!

Introduction On July 2, 2025, Qantas, Australia's flagship airline, disclosed a cyberattack that compromised the personal information of up to six million customers, first detected on June 30, 2025. Touted as one of the most significant data breaches in Australia's recent history, the attack is suspected to be the work of the notorious Scattered Spider cybercriminal group. According to the information currently available, the hackers targeted a third-party customer service platform used by Qantas's contact centre - specifically, a Manila-based ...
No results found.

Business News ↓

How Emerging Technologies In Critical Infrastructure Are Expanding Cyber Risks

Introduction Emerging technologies like industrial Internet of Things, unified platform architectures, and cloud-integrated operational technology are transforming the critical infrastructure landscape. This transformation, driven by the need for greater agility and pursuit of competitive advantage, is unlocking unprecedented levels of automation, operational efficiency, and data-driven decision-making. However,...

Rethinking Security: Why Ethical Curiosity Belongs at the Core of Cyber Defence

Introduction  In 2023, the Latitude Financial cyberattack exposed over 14 million customer records, including driver  licences, passport numbers, and financial details. While remediation focused on containment and  response, one quiet question lingered for many defenders:  "Why didn’t we ask, 'what if?' sooner?"  That single moment underscores the critical role of ethical curiosity-a mindset that's often missing...

How Wargaming is Shaping Business Resilience and Cyber Security Strategies

Most organisations plan for the future through a best attempt at guessing what’s coming and hoping they’re right. Wargaming flips that—letting you test the future, pressure-test your plans, and uncover what breaks before it breaks you. Once the preserve of military strategy rooms and war colleges, wargaming is now being used across government, critical infrastructure, and enterprise to build clarity in the face of...

Five Essential Factors to Future-Proof Physical Access Control Systems

As digital and physical workplaces continue to converge, Australian organisations face challenges with maintaining the safety of both work environments. For example, while an abundance of cloud-based services and AI agents makes updating security systems faster and easier than ever, many physical access control solutions (PACS) may struggle to facilitate those updates, leaving security gaps that have the potential...

Fortifying Australia’s Data Centres: A Cybersecurity Imperative

As AI continues to drive digital transformation around the world, data centres are taking on a new role. They're no longer just back-end infrastructure - they’re fast becoming prime targets in a shifting cybersecurity landscape. With the rapid rise of AI, cloud computing, and edge technologies, Australia is emerging as a key player in the Asia-Pacific’s data centre boom. But with that growth comes greater risk....

The Future of Access Control: Embracing Edge Intelligence, Cyber Hardened Hardware and Ecosystem Resilience

As global security threats evolve, so must the approach to access control. According to the 2025 Trends in Access Controllers Report conducted by Mercury Security, a subsidiary of HID, three transformational currents emerged: edge intelligence and embedded applications; rigorous cybersecurity hardening; and an expanding ecosystem that values openness, resilience and scalability. Edge intelligence: From ‘dumb’...

Why Separation of Duties Is Vital to Cybersecurity

In an era where cyber threats loom large over organisations of all sizes, one of the most effective strategies for mitigating internal risks is the principle of Separation of Duties (SoD). Traditionally associated with financial management and compliance, SoD is now firmly entrenched as a cybersecurity best practice, helping businesses bolster their defences against fraud, data breaches, and regulatory lapses. At...

Why CISOs Are Now Strategic Leaders in Cyber Preparedness

In an age where digital infrastructure underpins nearly every facet of corporate operations, operational resilience has become a non-negotiable priority for Australian businesses. Increasingly, the responsibility for embedding this resilience is falling to the Chief Information Security Officer (CISO), whose role is fast evolving from technical overseer to strategic leader. Traditionally viewed as gatekeepers of...

Why Digital Identity Is the Key to a Fairer, Safer Financial System

Verifying identity during tax time shouldn't be a hassle. But for many Australians, outdated systems and limited ID options turn a simple process into a frustrating one. That’s why One Click has integrated ConnectID®, a digital identity solution developed by Australian Payments Plus (AP+), to streamline verification, reduce errors, and help users get through tax season faster and with more confidence. Financial...

Shifting Left to Tap Into Untapped Revenue

Introduction In the past, security and revenue were considered two sides of a coin; one a business enabler, the other a compliance necessity. But that mindset is quickly becoming obsolete. The most forward-thinking software companies are now embedding security into their go-to-market strategies early and often. By “shifting left”, they’re not only improving software reliability, they’re accelerating sales, reducing...

The Countdown to Quantum Has Begun

Introduction Cybersecurity, as we know it, could be facing an extinction-level event—one that will reshape and rebuild the entire industry. Innovations like AI are already transforming threat landscapes and defences, while quantum computing looms as a seismic shift just over the horizon. Even now, organisations are being pushed to adapt, with drastically reduced certificate lifespans (47 days to be exact) forcing...

Five Telecom Habits Of Smart Small Businesses

Introduction Small businesses often grow quickly, but if their telecommunications setup doesn’t support this growth, productivity and service can suffer. With a few strategic habits, SMEs can avoid tech growing pains. Here are the top telecom habits that the savviest Australian small businesses adopt early on. Consolidate Where It Makes Sense It’s easy for businesses to end up with multiple vendors for phone,...

Rethinking The Office Phone: Why Cloud PBX Is The Future For SMBs

Overview For many small to medium-sized enterprises (SMBs), the office phone system can be treated as a set-and-forget utility. Yet business needs have changed, particularly with the advent of hybrid work and rising customer service expectations, and traditional phone setups are starting to show their age.  Cloud-based PBX (Private Branch Exchange) systems are a compelling solution, offering flexibility, cost...

The Scattered Spider, Airline Attacks and How to Be Breach Ready!

Introduction On July 2, 2025, Qantas, Australia's flagship airline, disclosed a cyberattack that compromised the personal information of up to six million customers, first detected on June 30, 2025. Touted as one of the most significant data breaches in Australia's recent history, the attack is suspected to be the work of the notorious Scattered Spider cybercriminal group. According to the information currently...

NBN Or Mobile Broadband? How To Choose The Right Business Internet Setup

Introduction Setting up internet for your business is not a one size fits all exercise. Whether you're running a solo consultancy, managing a busy retail outlet, or coordinating a remote team, choosing between NBN and mobile broadband can significantly impact your daily operations. With digital connectivity now critical for everything from cloud storage to video conferencing, it’s worth getting the setup right....

Alleged Russian Hackers Target Norwegian Dam

Overview This wasn’t a super sophisticated cyber attack; it was someone logging into a control system with too little security and opening a dam valve all the way. While the impact was minimal - 447 litres/second of flooding - it’s a reminder that the same digital world that provides us so many societal benefits has a soft underbelly if not properly secured. Just like you wouldn’t leave your front door unlocked,...
No results found.
No results found.
No results found.
No results found.
No results found.

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

How Emerging Technologies In Critical Infrastructure Are Expanding Cyber Risks

Introduction Emerging technologies like industrial Internet of Things, unified platform architectures, and cloud-integrated operational technology are transforming the critical infrastructure landscape. This transformation, driven by the need for greater agility and pursuit of competitive advantage, is unlocking unprecedented levels of automation, operational efficiency, and data-driven decision-making. However,...

Privacy by Design: Future-proofing Data Security From the Ground Up

Introduction As AI reshapes how many of today’s enterprises operate, concerns over data privacy are accelerating. The pace of innovation is outstripping the capabilities of many legacy systems, and Australian businesses are grappling with issues related to transparency, access control and data security as a result. The core issue isn’t just the misuse of data, it’s  the data infrastructure and governance gaps that...

The Price of Going Mobile App Viral

When you're trying to grow the next big mobile app, going viral is one of the key signs of success. But, going app-viral costs more than people first realise. On the surface, that might make sense. More users mean more costs, it's just part of doing business, right? Kind of. But ask any company that's had one of its apps go viral, and they'll tell you, that not all users are created equal. While most users are...

Rethinking Security: Why Ethical Curiosity Belongs at the Core of Cyber Defence

Introduction  In 2023, the Latitude Financial cyberattack exposed over 14 million customer records, including driver  licences, passport numbers, and financial details. While remediation focused on containment and  response, one quiet question lingered for many defenders:  "Why didn’t we ask, 'what if?' sooner?"  That single moment underscores the critical role of ethical curiosity-a mindset that's often missing...
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.