Coming Soon

The 2FA Show On-demand security-based streaming content. A new initiative from KBI:

Security Roles

Brought to you by:

IAM Manager
Manly, NSW, Australia

Security Director
VIC, Australia

Cyber Risk Analyst
NSW, Australia

VP Cybersecurity
Singapore, Singapore

Cyber Security Engineer
VIC, Australia

Security Governance Lead
NSW, Australia

Senior Security Analyst
NSW, Australia

Account Executive
Singapore, Singapore

Regional Account Manager
NSW, Australia

Network Security Analyst
Boston, MA, United States

SOC Lead
VIC, Australia

Software Engineer
NSW, Australia

Business

Darktrace – Media Roundtable | Event Report

I was recently invited to a Roundtable Media Event held by Darktrace to unpack the new era of cyber security threats. Held on Thursday 16th June, it was led by Tony Jarvis, Director of Enterprise Security and Dave Palmer, Chief Product Officer. The following...

OCI User Access Review Made Easy

I’m sure we can all agree, adopting a cloud strategy is awesome. The opportunities and benefits it affords are many. However cloud governance is an ongoing problem that plagues security, compliance, and management teams, which cloud vendors like Oracle are...

Media Alert: Scammers Hack Twitter Accounts to Steal Popular NFTs and Digital Currencies

According to recent research, published by Tenable’s Staff Research Engineer, Satnam Narang, scammers have once again dug deep into their bag of tricks to capitalise on the fervour in non-fungible tokens (NFT) and cryptocurrencies. Many are hijacking...

Why Renewal of Your Privacy Practice is Critical

It is without doubt that the COVID-19 pandemic forced some of the most significant changes in society, business and workforce practices in the last century. With billions of consumers and workers driven online, businesses adapted and accelerated their...
Communication for Internal Teams On the Importance of Understanding Risk

Communication for Internal Teams On the Importance of Understanding Risk

If all communication was abolished, society would crumble. Fast. Yet one area that I have noticed in the security industry, which I believe needs a lot more attention - and often goes unmentioned - is how we communicate internally to our teams on the importance of understanding risk in the face of change. Through my work, I’ve lately had a huge volume of conversations with IT Security leaders across the globe, and the same discussion points keep appearing. Namely, ... Read More

The Collateral Damage of Carpet Bombing

The Collateral Damage of Carpet Bombing

HISTORY The attention of consumers has always been an arms race. Historically you needed the biggest papyrus on the wall in the forum, or TV spots, or billboards, or postal campaigns to reach consumers – a prohibitively costly exercise for most. This saw a concentration of high-value and (hopefully) well produced advertising. It was designed to not be objectionable (even if irrelevant), and though a broadcast, it was easy to behaviourally avoid on TV or cognitively ... Read More

KBI Twitter Feed

Children need to know that it's OK for them to have an emotional response to what they see and experience online. Our latest advice for parents focuses on Digital technologies and mental health; full video + audio to listen on the go available here: https://bit.ly/3AFZwnT

Is someone trying to blackmail you, threatening to share intimate images of you unless you give in to their demands? Here's what to do if you're a target of sexual extortion: https://bit.ly/3sXpeRV

Let’s talk business email compromise (BEC)! With tax time coming up, SME's are most at risk of being targeted. Yesterday the @AusFedPolice JPC3 Operation DOLOS team presented to our partners about the effects of BEC at our JCSC in Sydney. Learn more at http://cyber.gov.au/acsc/view-all-content/publications/protecting-against-business-email-compromise

Market Movements

Editor’s Picks

OCI User Access Review Made Easy

OCI User Access Review Made Easy

I’m sure we can all agree, adopting a cloud strategy is awesome. The opportunities and benefits it affords are many. However cloud governance is an ongoing problem that plagues security, compliance, and management teams, which cloud vendors like Oracle are continually trying to solve. If you’re reading this, you’ve probably been asked, or heard at least once: Who has access to what in our environment? Any Security / Compliance Manager The answer should be easy and simple. However the reality is likely lots of manual time & work, spreadsheets, and endless clicking in a cloud console. If you’re doing this manually then I agree, it’s time that you could be dedicating to more important tasks. The challenge in trying to answer these questions: What users exist and what groups do they belong to? What does my OCI ... Read More

Recent Podcasts

Technology

Why Renewal of Your Privacy Practice is Critical

Why Renewal of Your Privacy Practice is Critical

It is without doubt that the COVID-19 pandemic forced some of the most significant changes in society, business and workforce practices in the last century. With billions of consumers and ... Read More

Communication for Internal Teams On the Importance of Understanding Risk

Communication for Internal Teams On the Importance of Understanding Risk

If all communication was abolished, society would crumble. Fast. Yet one area that I have noticed in the security industry, which I believe needs a lot more attention - and often goes ... Read More

Burgers and Privacy – Interview with Jon Lawrence

Burgers and Privacy – Interview with Jon Lawrence

Since I got in the middle of the privacy community in Sydney, I am particularly interested the challenges both vulnerable individuals and organisations face. Just a few weeks ago, I had an ... Read More

The Home Of The Free*

The Home Of The Free*

*Terms and Conditions apply. SITUATION Cambridge Analytica was involved in a firestorm recently following reports spearheaded by The New York Times that it'd obtained and used data on over ... Read More

ISACA ANZ | Cyber-safe Christmas

ISACA ANZ | Cyber-safe Christmas

Introduction: It’s that time of year, again; Christmas! This isn’t always a happy and joyous time for everyone, especially with what we've all been through to one degree or tuther in 2020. We ... Read More

How AI is Improving Value Perception within the Retail Sector

How AI is Improving Value Perception within the Retail Sector

AI for Retail I have been attending a few events within the retail sector and a lot of touched on artificial intelligence. Knowing Jo and his background, I wanted him to share his thoughts and ... Read More

Phishing Is the Top Reason Behind Australian Data Breaches

Phishing Is the Top Reason Behind Australian Data Breaches

The latest Notifiable Data Breaches Quarterly Statistics Report by the Office of the Australian Information Commissioner (OAIC) confirms that half of the reported data breaches in July to ... Read More

How Economists Can Help Protect Personal Data

How Economists Can Help Protect Personal Data

If you are about to hand over your private details in exchange for a store loyalty card, are you confident that your data remains in safe hands? It can be difficult to predict if the ... Read More

Coming Soon

The 2FA Show On-demand security-based streaming content. A new initiative from KBI: read more

News

OCI User Access Review Made Easy

I’m sure we can all agree, adopting a cloud strategy is awesome. The opportunities and benefits it affords are many. However cloud governance is an ongoing problem that plagues security, compliance, and management teams, which cloud vendors like Oracle are...

Why Renewal of Your Privacy Practice is Critical

It is without doubt that the COVID-19 pandemic forced some of the most significant changes in society, business and workforce practices in the last century. With billions of consumers and workers driven online, businesses adapted and accelerated their...

Communication for Internal Teams On the Importance of Understanding Risk

If all communication was abolished, society would crumble. Fast. Yet one area that I have noticed in the security industry, which I believe needs a lot more attention - and often goes unmentioned - is how we communicate internally to our teams on the...

The Collateral Damage of Carpet Bombing

HISTORY The attention of consumers has always been an arms race. Historically you needed the biggest papyrus on the wall in the forum, or TV spots, or billboards, or postal campaigns to reach consumers – a prohibitively costly exercise for most. This saw a...

KBI Twitter Feed

Children need to know that it's OK for them to have an emotional response to what they see and experience online. Our latest advice for parents focuses on Digital technologies and mental health; full video + audio to listen on the go available here: https://bit.ly/3AFZwnT

Is someone trying to blackmail you, threatening to share intimate images of you unless you give in to their demands? Here's what to do if you're a target of sexual extortion: https://bit.ly/3sXpeRV

Security Roles

Brought to you by:

IAM Manager | Manly, NSW, Australia

Security Director | VIC, Australia

Cyber Risk Analyst | NSW, Australia

VP Cybersecurity | Singapore, Singapore

Cyber Security Engineer | VIC, Australia

Security Governance Lead | NSW, Australia

Senior Security Analyst | NSW, Australia

Account Executive | Singapore, Singapore

Regional Account Manager | NSW, Australia

Network Security Analyst | Boston, MA, United States

SOC Lead | VIC, Australia

Software Engineer | NSW, Australia

Technology

ISACA ANZ | Cyber-safe Christmas

ISACA ANZ | Cyber-safe Christmas

Introduction: It’s that time of year, again; Christmas! This isn’t always a happy and joyous time for everyone, especially with what we've all been through to one degree or tuther in 2020. We ... Read More

How AI is Improving Value Perception within the Retail Sector

How AI is Improving Value Perception within the Retail Sector

AI for Retail I have been attending a few events within the retail sector and a lot of touched on artificial intelligence. Knowing Jo and his background, I wanted him to share his thoughts and ... Read More

Phishing Is the Top Reason Behind Australian Data Breaches

Phishing Is the Top Reason Behind Australian Data Breaches

The latest Notifiable Data Breaches Quarterly Statistics Report by the Office of the Australian Information Commissioner (OAIC) confirms that half of the reported data breaches in July to ... Read More

How Economists Can Help Protect Personal Data

How Economists Can Help Protect Personal Data

If you are about to hand over your private details in exchange for a store loyalty card, are you confident that your data remains in safe hands? It can be difficult to predict if the ... Read More

Business

The Collateral Damage of Carpet Bombing

The Collateral Damage of Carpet Bombing

HISTORY The attention of consumers has always been an arms race. Historically you needed the biggest papyrus on the wall in the forum, or TV spots, or billboards, or postal campaigns to reach ... Read More

The Home Of The Free*

The Home Of The Free*

*Terms and Conditions apply. SITUATION Cambridge Analytica was involved in a firestorm recently following reports spearheaded by The New York Times that it'd obtained and used data on over ... Read More

Infoxchange, Putting The Change In People

Infoxchange, Putting The Change In People

I don't think I am the best public speaker, however, I was lucky enough to speak to these students. I presented to the students about my career so far. For any recruiter who would read my CV, ... Read More

Critical Communications

Critical Communications

Topic: Communication for internal teams on the importance of understanding risk If all communication was abolished, society would crumble. Fast. Yet one area that I have noticed in the ... Read More

Want amazing content for your audience?