No results found.
No results found.

Podcasts

Episode 331 Deep Dive: Christian Morin | Cyber Security and Organisational Resilience Across ANZ
byKBI.Media

In this episode, we sit down with Christian Morin, Chief Security Officer and Vice President of Product Engineering at Genetec, as he shares his insights on the critical importance of moving beyond a “checkbox” approach to incident response, emphasising the value of regular tabletop exercises and fostering genuine security muscle memory within teams. He highlights the convergence between physical security and cybersecurity, arguing for a unified approach that bridges silos and enhances both protection and response capabilities. Christian also reflects on the growing risks posed by connected IoT and OT devices, the challenges of asset inventory, and the cultural shifts required to improve cyber awareness.

Christian Morin is the Chief Security Officer at Genetec. With over 20 years of experience in IT, telecommunications and physical security industries, Chris has a keen ability to anticipate technological trends and drive meaningful organizational growth. He is a multidisciplinary business leader, having managed the Operations, Customer Service, Sales Engineering, Technical Support, Professional Services, and IT Teams since joining Genetec in 2002. Chris’ executive leadership continues to support the strategic direction and success of the company.

No results found.
Microsoft Announces A$5 Billion Investment In Computing Capacity And Capability To Help Australia Seize The AI Era

Microsoft Announces A$5 Billion Investment In Computing Capacity And Capability To Help Australia Seize The AI Era

WASHINGTON, D.C. – 23 October 2023 – Today Microsoft announced major digital infrastructure, skilling and cybersecurity investments in Australia to help the nation seize the artificial intelligence (AI) era to strengthen its economic competitiveness, create high-value jobs and protect the nation from the increasing threat of cyberattacks. Microsoft will invest A$5 billion in expanding its hyperscale cloud computing and AI infrastructure in Australia over the next two years – the single largest investment in its forty- year history in the ...
No results found.

Business News ↓

Why You Need Speed and Trust for Modern Software Delivery

Introduction Businesses are creating and launching software faster than ever to keep pace with competitors and drive innovation. The focus on increased speed has created a few trends: Developer productivity is no longer only measured by speed, but quality and security as well Many development teams rely on platform engineering to build tools that enable developer autonomy Cloud adoption has become an enabling...

Is GenAI Outsmarting Us or Just Making Us Lazy?

 Is AI turning our brains to mush? Hosts Phoebe Goh and Mekka Williams are joined by Karissa “KB” Breen, the sharp-tongued cybersecurity journalist behind the popular podcast, KBKast, for a no-holds-barred look at how AI is rewriting the rules of the game. From the sneaky rise of unsanctioned “shadow AI” tools to the unnervingly convincing world of deepfakes, KB doesn’t shy away from calling out the dangers this...

The Growing Tug-of-War Between Scammers and Defenders: What Australian Businesses Need to Do to Stay Safe

Scams are no longer on the fringes of criminal activity. They have become a mainstream threat for Australians, targeting both consumers and businesses with increasing sophistication. According to Scamwatch, Australians lost $2.03 billion to scams in 2024. This year’s Scams Awareness Week (25-29 August 2025) highlights this escalating issue and shows that as scams evolve in type and scale, our strategies to combat...

Cyber-securing Enterprises, the AI Way

“...Therefore, send not to know For whom the bell tolls, It tolls for thee.” John Donne, “No man is an island” Introduction No enterprise is an island of security when it comes to cyber-attacks. Australia suffered a staggering 47 million data breaches in 2024 — equivalent to one attack every second — representing a twelvefold increase from the previous year. With breach costs reaching a record high of A$ 4.26...

AI Coding Assistants Boost Productivity … But At What Cost to Security?

Since OpenAI’s ChatGPT burst onto the tech scene in late 2022, artificial intelligence (AI) tools have rapidly become embedded in the workflows of software developers. Praised for their speed, efficiency, and ability to assist with complex tasks, AI coding assistants are now a mainstay in development environments globally. By mid-2023, a GitHub survey revealed that more 90% of developers were already using AI tools...

How Emerging Technologies In Critical Infrastructure Are Expanding Cyber Risks

Introduction Emerging technologies like industrial Internet of Things, unified platform architectures, and cloud-integrated operational technology are transforming the critical infrastructure landscape. This transformation, driven by the need for greater agility and pursuit of competitive advantage, is unlocking unprecedented levels of automation, operational efficiency, and data-driven decision-making. However,...

Rethinking Security: Why Ethical Curiosity Belongs at the Core of Cyber Defence

Introduction  In 2023, the Latitude Financial cyberattack exposed over 14 million customer records, including driver  licences, passport numbers, and financial details. While remediation focused on containment and  response, one quiet question lingered for many defenders:  "Why didn’t we ask, 'what if?' sooner?"  That single moment underscores the critical role of ethical curiosity-a mindset that's often missing...

How Wargaming is Shaping Business Resilience and Cyber Security Strategies

Most organisations plan for the future through a best attempt at guessing what’s coming and hoping they’re right. Wargaming flips that—letting you test the future, pressure-test your plans, and uncover what breaks before it breaks you. Once the preserve of military strategy rooms and war colleges, wargaming is now being used across government, critical infrastructure, and enterprise to build clarity in the face of...

Five Essential Factors to Future-Proof Physical Access Control Systems

As digital and physical workplaces continue to converge, Australian organisations face challenges with maintaining the safety of both work environments. For example, while an abundance of cloud-based services and AI agents makes updating security systems faster and easier than ever, many physical access control solutions (PACS) may struggle to facilitate those updates, leaving security gaps that have the potential...

Fortifying Australia’s Data Centres: A Cybersecurity Imperative

As AI continues to drive digital transformation around the world, data centres are taking on a new role. They're no longer just back-end infrastructure - they’re fast becoming prime targets in a shifting cybersecurity landscape. With the rapid rise of AI, cloud computing, and edge technologies, Australia is emerging as a key player in the Asia-Pacific’s data centre boom. But with that growth comes greater risk....

The Future of Access Control: Embracing Edge Intelligence, Cyber Hardened Hardware and Ecosystem Resilience

As global security threats evolve, so must the approach to access control. According to the 2025 Trends in Access Controllers Report conducted by Mercury Security, a subsidiary of HID, three transformational currents emerged: edge intelligence and embedded applications; rigorous cybersecurity hardening; and an expanding ecosystem that values openness, resilience and scalability. Edge intelligence: From ‘dumb’...

Why Separation of Duties Is Vital to Cybersecurity

In an era where cyber threats loom large over organisations of all sizes, one of the most effective strategies for mitigating internal risks is the principle of Separation of Duties (SoD). Traditionally associated with financial management and compliance, SoD is now firmly entrenched as a cybersecurity best practice, helping businesses bolster their defences against fraud, data breaches, and regulatory lapses. At...

Why CISOs Are Now Strategic Leaders in Cyber Preparedness

In an age where digital infrastructure underpins nearly every facet of corporate operations, operational resilience has become a non-negotiable priority for Australian businesses. Increasingly, the responsibility for embedding this resilience is falling to the Chief Information Security Officer (CISO), whose role is fast evolving from technical overseer to strategic leader. Traditionally viewed as gatekeepers of...

Why Digital Identity Is the Key to a Fairer, Safer Financial System

Verifying identity during tax time shouldn't be a hassle. But for many Australians, outdated systems and limited ID options turn a simple process into a frustrating one. That’s why One Click has integrated ConnectID®, a digital identity solution developed by Australian Payments Plus (AP+), to streamline verification, reduce errors, and help users get through tax season faster and with more confidence. Financial...

Shifting Left to Tap Into Untapped Revenue

Introduction In the past, security and revenue were considered two sides of a coin; one a business enabler, the other a compliance necessity. But that mindset is quickly becoming obsolete. The most forward-thinking software companies are now embedding security into their go-to-market strategies early and often. By “shifting left”, they’re not only improving software reliability, they’re accelerating sales, reducing...

The Countdown to Quantum Has Begun

Introduction Cybersecurity, as we know it, could be facing an extinction-level event—one that will reshape and rebuild the entire industry. Innovations like AI are already transforming threat landscapes and defences, while quantum computing looms as a seismic shift just over the horizon. Even now, organisations are being pushed to adapt, with drastically reduced certificate lifespans (47 days to be exact) forcing...
No results found.
No results found.
No results found.
No results found.
No results found.

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

Why You Need Speed and Trust for Modern Software Delivery

Introduction Businesses are creating and launching software faster than ever to keep pace with competitors and drive innovation. The focus on increased speed has created a few trends: Developer productivity is no longer only measured by speed, but quality and security as well Many development teams rely on platform engineering to build tools that enable developer autonomy Cloud adoption has become an enabling...

Is GenAI Outsmarting Us or Just Making Us Lazy?

 Is AI turning our brains to mush? Hosts Phoebe Goh and Mekka Williams are joined by Karissa “KB” Breen, the sharp-tongued cybersecurity journalist behind the popular podcast, KBKast, for a no-holds-barred look at how AI is rewriting the rules of the game. From the sneaky rise of unsanctioned “shadow AI” tools to the unnervingly convincing world of deepfakes, KB doesn’t shy away from calling out the dangers this...

The Growing Tug-of-War Between Scammers and Defenders: What Australian Businesses Need to Do to Stay Safe

Scams are no longer on the fringes of criminal activity. They have become a mainstream threat for Australians, targeting both consumers and businesses with increasing sophistication. According to Scamwatch, Australians lost $2.03 billion to scams in 2024. This year’s Scams Awareness Week (25-29 August 2025) highlights this escalating issue and shows that as scams evolve in type and scale, our strategies to combat...

Claroty Team82 Uncovers Critical Vulnerabilities in Axis Video Surveillance Products

Executive Summary Team82 has disclosed four vulnerabilities in Axis Communications’ popular line of video surveillance products. Axis published an urgent advisory. The vulnerabilities could expose thousands of organisations to attack. Team82 developed an exploit chain specifically targeting vulnerabilities in Axis Communications’ proprietary Axis.Remoting communication protocol which results in pre-auth RCE on Axis...
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.