A Legal Take On The Cybersecurity Strategy 2023-2030

A Legal Take On The Cybersecurity Strategy 2023-2030

The Cybersecurity Strategy 2023-2030 (the Strategy) is Australia's blueprint for cyber-safety by 2030, with three horizons to get there. The Action Plan for the first horizon (2023-2025) sets the foundations for the rest of the strategy to follow, and unsurprisingly includes a lot of legal and regulatory elements to support horizons two and three. For the legal community, there is something for everyone: migration law, procurement, consumer, corporate and commercial, in-house, and of course government. For those hoping the Strategy would provide ...

Podcasts

Episode 258 Deep Dive: Aaron Bugal | Addressing Cybersecurity Burnout
byKBI.Media

With close to 18 years experience at Sophos, and over 20 years in the cybersecurity industry, Aaron Bugal has spent his time helping organisations throughout Asia Pacific and Japan effectively understand and deploy strong cybersecurity measures to keep their business safe.

As Field Chief Technology Officer for APJ, he is able to flawlessly articulate to business leaders, partners, and companies the ever evolving cybersecurity landscape and emerging cyber threats. 

His humorous demeanour and witty analogies has shined in discussions with a range of media, conferences, and events, where he provides practical insights for both business and consumers audiences to take on board. 

Business News ↓

Leading Cybersecurity Tech Trends Driving change

In an age of digital transformation, cybersecurity emerges as an essential consideration for organisations. Amidst the escalating threat of cybercrime and a string of high-profile attacks, current trends are leading Australian organisations to reassess their approach. These trends involve changing regulations, confusion about security products, and the drive to save costs through consolidation. Let's explore some...

Five Ways Enterprises Can Build Cyber Resilience With a Safety-first Approach

Ransomware, phishing, hackers, data loss - the list of cyber threats to enterprises goes on. Threats to cybersecurity have reached ground zero, with social engineering, system intrusion and basic web application attacks representing 93 percent of data breaches across the Asia Pacific, according to Verizon’s 2023 Data Breach Investigations Report (DBIR). As Australian national leaders continue to look for ways to...
Understanding the Growing Cybersecurity Threats and Challenges with Mark Anderson cover

Understanding the Growing Cybersecurity Threats and Challenges with Mark Anderson

In a recent episode of the KBKast, host Karissa Breen dove into details about current cyber landscape and critical cybersecurity challenges pertinent to small and medium businesses. The Microsoft executive, Mark Anderson. Anderson's extensive knowledge and illuminating known perspectives on the intricacies of cybercrime, the critical role of proactive measures, and the imperative for industry-wide collaboration and...

How the Security of Critical Infrastructure (SOCI) Act is strengthening Australia’s critical infrastructure cybersecurity posture

Critical infrastructure – including healthcare, financial infrastructure, telecommunications, energy infrastructure, water assets and more – are vital to Australia's national growth, underpinning social and economic prosperity. Unsurprisingly, they have become attractive targets for cyber criminals seeking financial gain intent on hampering essential services by stealing sensitive data or impeding operational...

The Importance of Undertaking Cyber Risk Quantification

According to Check Point Software’s Threat Intelligence Report on Australia & New Zealand, an organisation in the region has been attacked on average 879 times per week in the last six months. Adding to the complexity for cybersecurity practitioners is the ever-evolving threat landscape that includes a surge in ransomware attacks with over 5,000 victims reported in 2023, marking a 90 per cent increase from the...

Cyber Insurance Isn’t a Free Pass for Australian Businesses

After years of warnings and breaches, the business world has accepted that when it comes to cyber-attacks, it’s a matter of ‘when’, not ‘if’. Not a single organisation is immune to a breach – not even the most secretive and cautious. Down under, a KPMG report in 2023 found a third of Australian businesses – that’s 693,053 organisations – have experienced cybercrime, costing the economy AU$29 billion per year....
Cybersecurity Startup Space: Investing in Early-Stage Companies cover

Cybersecurity Startup Space: Investing in Early-Stage Companies

In a recent interview, Sergey Gribov, a Partner at Flint Capital, shared his opinion on investing in early-stage cybersecurity startups. More capital is being spent on investing and growing cybersecurity companies which naturally means more competition to grow a successful start-up.The Competitive Advantage and Sustainability of ProductsWith numerous companies addressing similar attack vectors, distinguishing...
Navigating the Australian Cybersecurity Market cover

Navigating the Australian Cybersecurity Market

In a recent interview, Marcus Thompson provided insights into the Australian cybersecurity industry, market consolidation, and the future of cybersecurity companies in the region. Thompson discussed the collaborative nature of the industry, market consolidation trends, challenges faced by startups, and the potential for new technologies to reshape the cybersecurity landscape.Collaborative Nature of the Australian...

Where Australian Organisations Go Wrong With Cyber Risk Quantification

In an age where boards and directors are more interested in cybersecurity than ever before - rated by Australian directors as the top-ranking issue keeping them ‘awake at night’ - the best way for CISOs and cybersecurity teams to communicate risk is in terms that the executive committee and directors will understand. As a security leader, that means understanding your audience and the way they prefer to take in...

Tenable Comment: CVE-2022-38028: GooseEgg EoP Exploit

The Russia-based threat actor, known as APT28 or Forest Blizzard, has recently been exploiting a vulnerability known as CVE-2022-38028 within the Windows Print Spooler service using a malware called GooseEgg. CVE-2022-38028 represents an elevation of privilege vulnerability which could enable attackers to install additional malware like a backdoor or they could use these elevated privileges to perform lateral...

The Conversations Boards Should Have About Cybersecurity

Phishing attacks, malware, social engineering, spear phishing, and credential stuffing are all cyber threats that have one alarming trait in common. They are now more rampant than ever, leaving Australian organisations at the mercy of their relentless and sophisticated tactics. This is why board members need to be more than just decision-makers; they need to be informed participants in cybersecurity discussions....

Artificial Intelligence in Academia

AI - An Overview Artificial Intelligence (AI) is a technology that creates intelligent systems to perform tasks which typically require human intelligence. While the use of this technology may replace some jobs, it offers new and emerging careers with Australia needing up to 161,000 additional specialist AI workers in the next 15 years^. Increasingly AI is being used across numerous industries such as healthcare,...

The Glimpse at the Future of Software Academia

Software is key to a computers’ functionality and in fact, a system can’t operate without it. As we continually become more reliant on computers, the demand for software and application developers will increase - by 27 per cent from 2021 to 2026.1 From the late 1940s through the 1970s, the concept of software development has its’ origins in simplistic terms - via code written on manual punch cards and then fed into...

Prioritise Foundational Cloud Security Before Leveraging Generative AI

Hybrid and multi-cloud management serve as the bedrock of modern business operations, leading the charge in harnessing the full potential of cloud technologies. Yet, according to a commissioned study conducted in 2023 by Forrester Consulting on behalf of Tenable, the vast majority of Australian cybersecurity and IT leaders (68%) view cloud infrastructure as the greatest source of cyber risk in their organisation....

The Real “People Problem” In Cybersecurity Is Not What You Think It Is

The idea that cybersecurity is a people problem is so often repeated that it has become a truism for the sector. A casual search of “Cybersecurity people problem” returns 341 million results and, unsurprisingly, a wide range of answers to the question: ‘Which people are the problem?’ Bosses, cybersecurity teams, users, employees, hackers: if a party exists to whom blame could be apportioned, it’s been done. But the...

CISOs in 2024: Embracing a Strategic Security Vision

In recent years, the role of the Chief Information Security Officer (CISO) has undergone a significant evolution. Once solely focused on technical components such as firewalls and network security, CISOs today are strategic leaders shaping cybersecurity across their entire organisation. This evolution reflects the ever-increasing complexity of the cyberthreat landscape, where sophisticated attacks target not just...
Episode 130: Apurva Chiranewala

Episode 130: Apurva Chiranewala

Apurva Chiranewala is the General Manager of fintech company Block Earner, where he oversees global operations, growth and ...
Episode 149: Matt Johnston

Episode 149: Matt Johnston

Born in Sydney, Australia, and having lived in the United States for the past 12 years, Matt Johnston has had an ...

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

Layers of Defence Needed to Combat AI-powered Phishing Surge

The rapid transformation of the technological landscape by artificial intelligence (AI) is having a significant impact on cybersecurity. This is most evident in the rise of AI phishing attacks, which pose a growing threat due to their enhanced efficiency and sophistication. Cybercriminals, once reliant on manual tactics, now leverage AI to orchestrate exploit attempts and scams with increased efficiency and...

Essential Approaches for Securing the Multi-cloud

From pandemic impacts to the shift to hybrid working, geopolitical and economic pressures continue to disrupt global markets and as a result create significant challenges to sustaining business operating models. For the modern organisation that aims to have built in resiliency to better ride the waves of change in an effective, yet cost-conscious way, multi-cloud is becoming increasingly popular as it offers more...

Data Resilience in the Age of Cyber Warfare: A Seven-Layered Approach

The digital age has ushered in an era of unprecedented connectivity, however it has also created a vast digital landscape ripe for exploitation by cybercriminals. Organisations that once relied on reactive data protection measures like backup and recovery in the face of natural disasters are now confronting a far more insidious threat: cyber warfare. For decades, businesses viewed data protection primarily through...

Five Ways Enterprises Can Build Cyber Resilience With a Safety-first Approach

Ransomware, phishing, hackers, data loss - the list of cyber threats to enterprises goes on. Threats to cybersecurity have reached ground zero, with social engineering, system intrusion and basic web application attacks representing 93 percent of data breaches across the Asia Pacific, according to Verizon’s 2023 Data Breach Investigations Report (DBIR). As Australian national leaders continue to look for ways to...
Critical Infrastructure and IoT

Critical Infrastructure and IoT

The term ‘critical infrastructure’ was first used to refer to public works such as transportation infrastructure and ...