Security Roles
IAM Manager
Manly, NSW, Australia
Security Director
VIC, Australia
Cyber Risk Analyst
NSW, Australia
VP Cybersecurity
Singapore, Singapore
Cyber Security Engineer
VIC, Australia
Security Governance Lead
NSW, Australia
Senior Security Analyst
NSW, Australia
Account Executive
Singapore, Singapore
Regional Account Manager
NSW, Australia
Network Security Analyst
Boston, MA, United States
SOC Lead
VIC, Australia
Software Engineer
NSW, Australia
Business
Communication for Internal Teams On the Importance of Understanding Risk
If all communication was abolished, society would crumble. Fast. Yet one area that I have noticed in the security industry, which I believe needs a lot more attention - and often goes unmentioned - is how we communicate internally to our teams on the importance of understanding risk in the face of change. Through my work, I’ve lately had a huge volume of conversations with IT Security leaders across the globe, and the same discussion points keep appearing. Namely, ... Read More
The Collateral Damage of Carpet Bombing
HISTORY The attention of consumers has always been an arms race. Historically you needed the biggest papyrus on the wall in the forum, or TV spots, or billboards, or postal campaigns to reach consumers – a prohibitively costly exercise for most. This saw a concentration of high-value and (hopefully) well produced advertising. It was designed to not be objectionable (even if irrelevant), and though a broadcast, it was easy to behaviourally avoid on TV or cognitively ... Read More
Newest Podcasts

Media Releases
KBI Twitter Feed
Market Movements
Editor’s Picks
OCI User Access Review Made Easy
I’m sure we can all agree, adopting a cloud strategy is awesome. The opportunities and benefits it affords are many. However cloud governance is an ongoing problem that plagues security, compliance, and management teams, which cloud vendors like Oracle are continually trying to solve. If you’re reading this, you’ve probably been asked, or heard at least once: Who has access to what in our environment? Any Security / Compliance Manager The answer should be easy and simple. However the reality is likely lots of manual time & work, spreadsheets, and endless clicking in a cloud console. If you’re doing this manually then I agree, it’s time that you could be dedicating to more important tasks. The challenge in trying to answer these questions: What users exist and what groups do they belong to? What does my OCI ... Read More
Recent Podcasts
Technology
Why Renewal of Your Privacy Practice is Critical
It is without doubt that the COVID-19 pandemic forced some of the most significant changes in society, business and workforce practices in the last century. With billions of consumers and ... Read More
Communication for Internal Teams On the Importance of Understanding Risk
If all communication was abolished, society would crumble. Fast. Yet one area that I have noticed in the security industry, which I believe needs a lot more attention - and often goes ... Read More
Burgers and Privacy – Interview with Jon Lawrence
Since I got in the middle of the privacy community in Sydney, I am particularly interested the challenges both vulnerable individuals and organisations face. Just a few weeks ago, I had an ... Read More
The Home Of The Free*
*Terms and Conditions apply. SITUATION Cambridge Analytica was involved in a firestorm recently following reports spearheaded by The New York Times that it'd obtained and used data on over ... Read More
ISACA ANZ | Cyber-safe Christmas
Introduction: It’s that time of year, again; Christmas! This isn’t always a happy and joyous time for everyone, especially with what we've all been through to one degree or tuther in 2020. We ... Read More
How AI is Improving Value Perception within the Retail Sector
AI for Retail I have been attending a few events within the retail sector and a lot of touched on artificial intelligence. Knowing Jo and his background, I wanted him to share his thoughts and ... Read More
Phishing Is the Top Reason Behind Australian Data Breaches
The latest Notifiable Data Breaches Quarterly Statistics Report by the Office of the Australian Information Commissioner (OAIC) confirms that half of the reported data breaches in July to ... Read More
How Economists Can Help Protect Personal Data
If you are about to hand over your private details in exchange for a store loyalty card, are you confident that your data remains in safe hands? It can be difficult to predict if the ... Read More
Coming Soon
The 2FA Show On-demand security-based streaming content. A new initiative from KBI: read more
News
KBI Twitter Feed
Security Roles
IAM Manager | Manly, NSW, Australia
Security Director | VIC, Australia
Cyber Risk Analyst | NSW, Australia
VP Cybersecurity | Singapore, Singapore
Cyber Security Engineer | VIC, Australia
Security Governance Lead | NSW, Australia
Senior Security Analyst | NSW, Australia
Account Executive | Singapore, Singapore
Regional Account Manager | NSW, Australia
Network Security Analyst | Boston, MA, United States
Software Engineer | NSW, Australia
Technology
ISACA ANZ | Cyber-safe Christmas
Introduction: It’s that time of year, again; Christmas! This isn’t always a happy and joyous time for everyone, especially with what we've all been through to one degree or tuther in 2020. We ... Read More
How AI is Improving Value Perception within the Retail Sector
AI for Retail I have been attending a few events within the retail sector and a lot of touched on artificial intelligence. Knowing Jo and his background, I wanted him to share his thoughts and ... Read More
Phishing Is the Top Reason Behind Australian Data Breaches
The latest Notifiable Data Breaches Quarterly Statistics Report by the Office of the Australian Information Commissioner (OAIC) confirms that half of the reported data breaches in July to ... Read More
How Economists Can Help Protect Personal Data
If you are about to hand over your private details in exchange for a store loyalty card, are you confident that your data remains in safe hands? It can be difficult to predict if the ... Read More
Business
The Collateral Damage of Carpet Bombing
HISTORY The attention of consumers has always been an arms race. Historically you needed the biggest papyrus on the wall in the forum, or TV spots, or billboards, or postal campaigns to reach ... Read More
The Home Of The Free*
*Terms and Conditions apply. SITUATION Cambridge Analytica was involved in a firestorm recently following reports spearheaded by The New York Times that it'd obtained and used data on over ... Read More
Infoxchange, Putting The Change In People
I don't think I am the best public speaker, however, I was lucky enough to speak to these students. I presented to the students about my career so far. For any recruiter who would read my CV, ... Read More
Critical Communications
Topic: Communication for internal teams on the importance of understanding risk If all communication was abolished, society would crumble. Fast. Yet one area that I have noticed in the ... Read More