CISOs and the C-Suite: The Start of a Beautiful Relationship?

CISOs and the C-Suite: The Start of a Beautiful Relationship?

Introduction Cyber incidents are no longer distant threats, and the scale of challenge is clear - 94% of organisations globally have experienced a disruptive cyberattack, with more than half facing multiple incidents. In the past year alone, data breaches at major corporations and government agencies in Australia have dominated headlines, forcing leaders to rethink their approach to security. Meanwhile, cybercriminals are moving faster, using artificial intelligence (AI) and automation to exploit vulnerabilities faster than businesses can respond, ...

Podcasts

Episode 300 Deep Dive: Tom Gillis | The Future Of Cybersecurity and the Network
byKBI.Media

In this episode, we sit down with Tom Gillis, SVP and General Manager of the Security, Data Center, Internet and Cloud Infrastructure Group at Cisco, as he explores the future of cybersecurity and networking. Tom discusses the transformative impact of AI on the industry, highlighting the unprecedented level of innovation it brings alongside the potential challenges, such as cybercriminals leveraging AI for attacks. He emphasizes the need for companies to embrace AI fully to remain competitive and not fall into the “loser” category as the industry evolves. Additionally, Tom shares insights into the integration of security and networking, the implications of AI-powered security measures, and how these advancements might create a significant shift in the IT and infrastructure landscape.

Tom Gillis is the Senior Vice President and General Manager of the Cisco Security Business Group (SBG). A respected security industry leader with strong executive management skills and in-depth knowledge of the challenges surrounding secure enterprise computing, Tom is responsible for the company’s global security business to fundamentally simplify the security experience.

Prior to Cisco, Tom was the SVP/GM of the Network and Advanced Security Business Group at VMware, where he led the endpoint, networking, load balancing and network security businesses. He was also the CEO/co-founder of Bracket Computing which was acquired by VMware.

Before Bracket Computing, Tom was the GM of the Security Technology Group at Cisco where he led the company’s businesses for security management, appliances, applications, and endpoint services. Tom was also part of the founding team at IronPort Systems and served as senior vice president of marketing when the company was acquired by Cisco. Under his guidance, IronPort grew an average of 100 percent year-on-year for seven years. During his tenure, IronPort rose to become the leading provider of antispam, antivirus, and antimalware appliances for organizations ranging from small businesses to the Global 2000.

Tom has also worked at iBEAM Broadcasting, Silicon Graphics, and Boston Consulting Group in various technical and leadership roles. He is also a noted advisor to startups and venture capital companies and is a member of several boards of directors.

Tom holds an M.B.A. degree from Harvard University, and graduated Magna Cum Laude with an M.S.E.E. degree from Northwestern University and a B.S.E.E. from Tufts University.

Business News ↓

Securing Society: Cyber-Physical Safety in Australia’s Critical Infrastructure

Why Cyber-Physical Security Must Be a Leadership Priority   Australia’s critical infrastructure faces escalating cyber-physical threats, with adversaries targeting industrial control systems, operational technology (OT) and critical medical services. Security failures in these environments don’t just disrupt operations; they pose real risks to public safety, national security and our economic stability. This...

Zero Trust – The Secret Sauce Behind Breach Readiness

Introduction For years, organizations have invested heavily in firewalls, perimeter sensors, and intrusion detection to keep attackers at bay. But as we continue to see each day, adversaries always manage to slip past these defenses. And the problem doesn’t lie in the technology, but the way in which we operate them. Enter Zero Trust – The Only Way to Operate Cyber Defense Traditionally, once a user crossed the...

Generative AI: Striking a Balance between Innovation and Overreliance

Introduction As generative artificial intelligence (GenAI) continues to evolve at lightning speed, usage by businesses will become increasingly widespread. Its uses will include automating customer service through chatbots, generating marketing content, and analysing large datasets to produce valuable insights that drive business decisions. However, these applications, while great at streamlining processes and...

Bridging AI Readiness in Australia

Introduction With AI reshaping industries at unprecedented rates, findings from the 2024 CISCO Live Report suggest Australian companies are trailing, with only four percent ready to leverage the technology, a decline from the previous year. Across APAC use cases for AI and cloud adoption are countless including enhancing cybersecurity through to transforming network resiliency, but there’s much more to be leveraged...

How To Foster An Inclusive and Empowering Workplace This International Women’s Day 2025

On the occasion of International Women’s Day 2025, Ruma Balasubramanian, President Asia Pacific and Japan, Check Point Software Technologies, discusses her thoughts on workplace diversity and its impact on making an enterprise the best place it can be. Your journey from leadership roles at Google Cloud and Cisco to your current role at Check Point reflects a wealth of experience. Could you describe how these...

Compliance In Healthcare is Not a Security Strategy

Introduction Australia’s healthcare sector is failing at cybersecurity. The latest MediSecure breach, compromising the data of 12.9 million Australians, isn’t an isolated incident—it’s a symptom of a much larger, systemic problem. The industry’s outdated, compliance-driven approach to security is not working. Without a fundamental shift towards data-centric protection, healthcare providers will continue to be...

A Supercharged Security Culture is Needed to Navigate Australia’s Cybersecurity Rules

Introduction A success marker in cybersecurity has traditionally been for an organisation to have an uneventful year - but this has become much harder to pull off. Even if an organisation manages to navigate the threat landscape without incident, it must still meet an ever-growing list of requirements just to maintain its license to operate. Australian CISOs have never had to deal with a greater number of...

CISOs and the C-Suite: The Start of a Beautiful Relationship?

Introduction Cyber incidents are no longer distant threats, and the scale of challenge is clear - 94% of organisations globally have experienced a disruptive cyberattack, with more than half facing multiple incidents. In the past year alone, data breaches at major corporations and government agencies in Australia have dominated headlines, forcing leaders to rethink their approach to security. Meanwhile,...

Exploiting Medical Devices: Attack Vectors, Cyber Threats, and Advanced Defense Mechanisms

Imagine a scenario where a ransomware attack cripples a hospital’s ventilators, infusion pumps are manipulated to deliver incorrect dosages, or a CT scanner is hijacked to serve as a launchpad for a larger network breach. These are not hypothetical situations; they are real threats that healthcare organizations face today. As medical devices become increasingly interconnected, they also become prime targets for...

Bret Arsenault – CVP, Global Chief Security Advisor at Microsoft

Watch The Interview  Biography Bret Arsenault is Microsoft's Chief Cybersecurity Advisor, responsible for advancing critical security initiatives and escalating impact across the entire Microsoft ecosystem: company, partners, customers, government agencies, and important communities. As Chief Information Security Officer for 14 years, Bret was responsible for enterprise-wide digital security and resiliency. Bret...

Benjamin Lamont & Helen Schneider – Australian Federal Police

Watch The Interview Biography Benjamin (Ben) Lamont is the Manager of Technology Strategy and Data for the Australian Federal Police. He is responsible for developing the AFP Technology Strategy and associated roadmaps to address capability gaps and opportunities. Ben also oversees the development and deployment of the AFP’s information management, data science, and analytics platforms. His role includes delivering...

How to Outsmart Ransomware and Build Resilience Within Your Organisation

Ransomware is growing more dangerous every day. Strains like LockBit 3.0 are leading the attack, while other groups like Clop, BlackCat/ALPHV, and Royal are constantly changing their strategies to catch businesses off guard. These ransomware groups have evolved their tactics, shifting from single to double and even triple extortion models. For example, LockBit 3.0 uses a triple extortion strategy, demanding a...

The Strategic Transformation of IT: From Cost Center to Business Catalyst

The perception of IT has undergone a remarkable transformation in recent years. What was once viewed primarily as a cost centre has transformed into a pivotal force driving business innovation and market leadership. This shift hasn’t just been about changing mindsets—it's about tangible results. Research shows that digital leaders deliver average annual total shareholder returns of 8.1% vs. 4.9% for laggards,...

Mick Dunne – Chief Cybersecurity Advisor at Microsoft

Watch The Interview  Biography Mick Dunne is the Chief Cybersecurity Advisor at Microsoft where he is focused on ensuring alignment between Microsoft and their customers on cybersecurity challenges, product roadmaps and long-term security needs. Mick and his team bring deep industry experience as former CISOs and CTOs to enable them to work with customers with empathy and understanding of the challenges security...

Leigh Williams – CIO, Brisbane Catholic Education

Watch The Interview  Biography Leigh is currently the Chief Information Officer for Brisbane Catholic Education, overseeing all digital, information and IT infrastructure for hundreds of locations and over 13,000 staff. As a passionate, published researcher and advocator in digital innovation and education, Leigh has led keynotes and workshops around the world on digital transformation. Leigh has experience in...

Command Central: Holistic Control Room Design for Today’s Critical Infrastructure

If you’ve been leading critical infrastructure for a while, you’re no stranger to control rooms. You’ve seen your fair share—some meticulously designed for efficiency, others falling short of expectations. You know the ones: cramped spaces with lighting that’s either too harsh or too dim, screens that clash with the ambience, desks haphazardly arranged, a corner reluctantly repurposed as a managers office, and, of...

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

Securing Society: Cyber-Physical Safety in Australia’s Critical Infrastructure

Why Cyber-Physical Security Must Be a Leadership Priority   Australia’s critical infrastructure faces escalating cyber-physical threats, with adversaries targeting industrial control systems, operational technology (OT) and critical medical services. Security failures in these environments don’t just disrupt operations; they pose real risks to public safety, national security and our economic stability. This...

Zero Trust – The Secret Sauce Behind Breach Readiness

Introduction For years, organizations have invested heavily in firewalls, perimeter sensors, and intrusion detection to keep attackers at bay. But as we continue to see each day, adversaries always manage to slip past these defenses. And the problem doesn’t lie in the technology, but the way in which we operate them. Enter Zero Trust – The Only Way to Operate Cyber Defense Traditionally, once a user crossed the...

Generative AI: Striking a Balance between Innovation and Overreliance

Introduction As generative artificial intelligence (GenAI) continues to evolve at lightning speed, usage by businesses will become increasingly widespread. Its uses will include automating customer service through chatbots, generating marketing content, and analysing large datasets to produce valuable insights that drive business decisions. However, these applications, while great at streamlining processes and...

Bridging AI Readiness in Australia

Introduction With AI reshaping industries at unprecedented rates, findings from the 2024 CISCO Live Report suggest Australian companies are trailing, with only four percent ready to leverage the technology, a decline from the previous year. Across APAC use cases for AI and cloud adoption are countless including enhancing cybersecurity through to transforming network resiliency, but there’s much more to be leveraged...