Coming Soon

The 2FA Show On-demand security-based streaming content. A new initiative from KBI:

Security Roles

Brought to you by:

IAM Manager
Manly, NSW, Australia

Security Director
VIC, Australia

Cyber Risk Analyst
NSW, Australia

VP Cybersecurity
Singapore, Singapore

Cyber Security Engineer
VIC, Australia

Security Governance Lead
NSW, Australia

Senior Security Analyst
NSW, Australia

Account Executive
Singapore, Singapore

Regional Account Manager
NSW, Australia

Network Security Analyst
Boston, MA, United States

SOC Lead
VIC, Australia

Software Engineer
NSW, Australia

Business

The Collateral Damage of Carpet Bombing

HISTORY The attention of consumers has always been an arms race. Historically you needed the biggest papyrus on the wall in the forum, or TV spots, or billboards, or postal campaigns to reach consumers – a prohibitively costly exercise for most. This saw a...

Burgers and Privacy – Interview with Jon Lawrence

Since I got in the middle of the privacy community in Sydney, I am particularly interested the challenges both vulnerable individuals and organisations face. Just a few weeks ago, I had an unpleasant experience at the doctor whereby my sensitive health...

The Home Of The Free*

*Terms and Conditions apply. SITUATION Cambridge Analytica was involved in a firestorm recently following reports spearheaded by The New York Times that it'd obtained and used data on over 50 million Facebook consumers with the goal to promote the...

ISACA ANZ | Cyber-safe Christmas

Introduction: It’s that time of year, again; Christmas! This isn’t always a happy and joyous time for everyone, especially with what we've all been through to one degree or tuther in 2020. We wanted to ensure that retailers are improving their security...
Infoxchange, Putting The Change In People

Infoxchange, Putting The Change In People

I don't think I am the best public speaker, however, I was lucky enough to speak to these students. I presented to the students about my career so far. For any recruiter who would read my CV, they would always say that I have a "unique" background. For those who don't know me personally, I was born in Queensland, with parents who owned cane farms and I went to Agricultural College. I was also a competitive horse rider and I was inseparable from my horses. All I wanted ... Read More

Critical Communications

Critical Communications

Topic: Communication for internal teams on the importance of understanding risk If all communication was abolished, society would crumble. Fast. Yet one area that I have noticed in the security industry which I believe needs a lot of attention - and often goes unmentioned - is how we communicate internally to our teams on the importance of understanding risk in the face of change. Through my work, I’ve lately had a huge volume of conversations with IT security ... Read More

Newest Podcasts

Community Events

Infoxchange, Putting The Change In People

I don't think I am the best public speaker, however, I was lucky enough to speak to these students. I presented to the ... Read More

What’s up Doc?

So I am pretty bad at going to the doctor on time, yes I am one of those people who get the overdue notifications on the weekly. I finally had ... Read More

KBI Twitter Feed

DO YOU KNOW?
95% of cybersecurity breaches are due to human error.

Explore deciphercyber’s vendors and make your business safer.

Find out more: https://buff.ly/3Fqz4mg

#deciphercyber #jenny #cybersecurity #cybersec #cyberfacts #cybercuriosity #cybersecurityservices

First time I've seen a visual security maturity model from AWS https://maturitymodel.security.aws.dev/en/model/

The more colours the better! 😁

Business Email Compromise costs organization $130 million in the middle of merger & acquisition activities: https://bit.ly/3LdkOyK

Very slowly, very gradually, we’re getting there… https://www.cnet.com/tech/services-and-software/apple-google-microsoft-back-fido-tech-to-dump-passwords-on-websites-and-apps/

Editor’s Picks

The Collateral Damage of Carpet Bombing

The Collateral Damage of Carpet Bombing

HISTORY The attention of consumers has always been an arms race. Historically you needed the biggest papyrus on the wall in the forum, or TV spots, or billboards, or postal campaigns to reach consumers – a prohibitively costly exercise for most. This saw a concentration of high-value and (hopefully) well produced advertising. It was designed to not be objectionable (even if irrelevant), and though a broadcast, it was easy to behaviourally avoid on TV or cognitively ignore if traditional print. We all made peace with it and got on with our lives.   CHANGE The early days of digital were not much of a departure with banner ads and the like just digital facsimiles of the analogue world. Then the ubiquity of email and spam saga that lead to ‘peak spam’ being 80% of email traffic saw filters come into play and legislation ... Read More

Recent Podcasts

Technology

The Home Of The Free*

The Home Of The Free*

*Terms and Conditions apply. SITUATION Cambridge Analytica was involved in a firestorm recently following reports spearheaded by The New York Times that it'd obtained and used data on over ... Read More

ISACA ANZ | Cyber-safe Christmas

ISACA ANZ | Cyber-safe Christmas

Introduction: It’s that time of year, again; Christmas! This isn’t always a happy and joyous time for everyone, especially with what we've all been through to one degree or tuther in 2020. We ... Read More

How AI is Improving Value Perception within the Retail Sector

How AI is Improving Value Perception within the Retail Sector

AI for Retail I have been attending a few events within the retail sector and a lot of touched on artificial intelligence. Knowing Jo and his background, I wanted him to share his thoughts and ... Read More

Phishing Is the Top Reason Behind Australian Data Breaches

Phishing Is the Top Reason Behind Australian Data Breaches

The latest Notifiable Data Breaches Quarterly Statistics Report by the Office of the Australian Information Commissioner (OAIC) confirms that half of the reported data breaches in July to ... Read More

How Economists Can Help Protect Personal Data

How Economists Can Help Protect Personal Data

If you are about to hand over your private details in exchange for a store loyalty card, are you confident that your data remains in safe hands? It can be difficult to predict if the ... Read More

TikTok – Not a Shock?

TikTok – Not a Shock?

The new app on the block; TikTok has been on our radar for a while; in a way that was questionable in terms of the value it provided, but even bigger concerns about the security and privacy side of it. Read More

What’s up Doc?

What’s up Doc?

So I am pretty bad at going to the doctor on time, yes I am one of those people who get the overdue notifications on the weekly. I finally had enough courage to turn up to get my regular ... Read More

Five Ways to Identify Phishing Emails

Five Ways to Identify Phishing Emails

As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before ... Read More

Coming Soon

The 2FA Show On-demand security-based streaming content. A new initiative from KBI: read more

News

The Collateral Damage of Carpet Bombing

HISTORY The attention of consumers has always been an arms race. Historically you needed the biggest papyrus on the wall in the forum, or TV spots, or billboards, or postal campaigns to reach consumers – a prohibitively costly exercise for most. This saw a...

Burgers and Privacy – Interview with Jon Lawrence

Since I got in the middle of the privacy community in Sydney, I am particularly interested the challenges both vulnerable individuals and organisations face. Just a few weeks ago, I had an unpleasant experience at the doctor whereby my sensitive health...

The Home Of The Free*

*Terms and Conditions apply. SITUATION Cambridge Analytica was involved in a firestorm recently following reports spearheaded by The New York Times that it'd obtained and used data on over 50 million Facebook consumers with the goal to promote the...

ISACA ANZ | Cyber-safe Christmas

Introduction: It’s that time of year, again; Christmas! This isn’t always a happy and joyous time for everyone, especially with what we've all been through to one degree or tuther in 2020. We wanted to ensure that retailers are improving their security...

Technology

How Economists Can Help Protect Personal Data

How Economists Can Help Protect Personal Data

If you are about to hand over your private details in exchange for a store loyalty card, are you confident that your data remains in safe hands? It can be difficult to predict if the ... Read More

TikTok – Not a Shock?

TikTok – Not a Shock?

The new app on the block; TikTok has been on our radar for a while; in a way that was questionable in terms of the value it provided, but even bigger concerns about the security and privacy side of it. Read More

What’s up Doc?

What’s up Doc?

So I am pretty bad at going to the doctor on time, yes I am one of those people who get the overdue notifications on the weekly. I finally had enough courage to turn up to get my regular ... Read More

Five Ways to Identify Phishing Emails

Five Ways to Identify Phishing Emails

As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before ... Read More

Business

The Collateral Damage of Carpet Bombing

The Collateral Damage of Carpet Bombing

HISTORY The attention of consumers has always been an arms race. Historically you needed the biggest papyrus on the wall in the forum, or TV spots, or billboards, or postal campaigns to reach ... Read More

The Home Of The Free*

The Home Of The Free*

*Terms and Conditions apply. SITUATION Cambridge Analytica was involved in a firestorm recently following reports spearheaded by The New York Times that it'd obtained and used data on over ... Read More

Infoxchange, Putting The Change In People

Infoxchange, Putting The Change In People

I don't think I am the best public speaker, however, I was lucky enough to speak to these students. I presented to the students about my career so far. For any recruiter who would read my CV, ... Read More

Critical Communications

Critical Communications

Topic: Communication for internal teams on the importance of understanding risk If all communication was abolished, society would crumble. Fast. Yet one area that I have noticed in the ... Read More

KBI Twitter Feed

DO YOU KNOW?
95% of cybersecurity breaches are due to human error.

Explore deciphercyber’s vendors and make your business safer.

Find out more: https://buff.ly/3Fqz4mg

#deciphercyber #jenny #cybersecurity #cybersec #cyberfacts #cybercuriosity #cybersecurityservices

First time I've seen a visual security maturity model from AWS https://maturitymodel.security.aws.dev/en/model/

The more colours the better! 😁

Security Roles

Brought to you by:

IAM Manager | Manly, NSW, Australia

Security Director | VIC, Australia

Cyber Risk Analyst | NSW, Australia

VP Cybersecurity | Singapore, Singapore

Cyber Security Engineer | VIC, Australia

Security Governance Lead | NSW, Australia

Senior Security Analyst | NSW, Australia

Account Executive | Singapore, Singapore

Regional Account Manager | NSW, Australia

Network Security Analyst | Boston, MA, United States

SOC Lead | VIC, Australia

Software Engineer | NSW, Australia

Want amazing content for your audience?

KBI.Digital

Get Talking