{"id":2,"date":"2023-04-27T12:34:00","date_gmt":"2023-04-27T12:34:00","guid":{"rendered":"https:\/\/kbiwp.kbi.media\/?page_id=2"},"modified":"2026-04-20T19:53:12","modified_gmt":"2026-04-20T09:53:12","slug":"home","status":"publish","type":"page","link":"https:\/\/kbi.media\/","title":{"rendered":"Home"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; specialty=&#8221;on&#8221; padding_top_1=&#8221;0px&#8221; padding_top_2=&#8221;0px&#8221; padding_bottom_1=&#8221;0px&#8221; padding_bottom_2=&#8221;0px&#8221; padding_bottom_3=&#8221;0px&#8221; padding_left_2=&#8221;4px&#8221; padding_top_bottom_link_1=&#8221;false&#8221; padding_top_bottom_link_2=&#8221;false&#8221; padding_top_bottom_link_3=&#8221;false&#8221; padding_left_right_link_1=&#8221;false&#8221; padding_left_right_link_2=&#8221;false&#8221; padding_left_right_link_3=&#8221;false&#8221; _builder_version=&#8221;4.24.1&#8243; _module_preset=&#8221;default&#8221; z_index=&#8221;24&#8243; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; inner_width=&#8221;100%&#8221; inner_max_width=&#8221;100%&#8221; inner_module_alignment=&#8221;center&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_margin_tablet=&#8221;0px||0px||false|false&#8221; custom_margin_phone=&#8221;12px||||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;0px|4px|0px|4px|false|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_blurb title=&#8221;From Our Contributors&#8221; url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjU1In19@&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf0c5;||fa||400&#8243; icon_color=&#8221;#FFFFFF&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;22px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.24.1&#8243; _dynamic_attributes=&#8221;url,link_option_url&#8221; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjU1In19@&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;contributor&#8221; post_number=&#8221;1&#8243; sticky_posts=&#8221;on&#8221; thumbnail_size=&#8221;dfg_full&#8221; use_overlay=&#8221;off&#8221; author_prefix_text=&#8221;From &#8221; show_terms=&#8221;on&#8221; read_more=&#8221;on&#8221; read_more_text=&#8221;Read&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-fullwidth&#8221; items_skin=&#8221;dp-dfg-skin-none&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;14px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on|on|||||&#8221; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; custom_read_more_button=&#8221;on&#8221; read_more_button_text_size=&#8221;10px&#8221; read_more_button_text_color=&#8221;#000000&#8243; read_more_button_border_width=&#8221;0px&#8221; read_more_button_font=&#8221;||||on||||&#8221; read_more_button_alignment=&#8221;right&#8221; filter_saturate=&#8221;0%&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;on|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_blurb icon_placement=&#8221;left&#8221; image_icon_width=&#8221;22px&#8221; content_max_width=&#8221;100%&#8221; disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;contributor&#8221; use_taxonomy_terms=&#8221;on&#8221; post_number=&#8221;3&#8243; offset_number=&#8221;1&#8243; thumbnail_size=&#8221;300&#215;300&#8243; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;128&#8243; truncate_excerpt=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;93px&#8221; thumb_width=&#8221;20%&#8221; column_gutter=&#8221;1em&#8221; row_gutter=&#8221;1em&#8221; admin_label=&#8221;Divi FilterGrid&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; child_filter_saturate=&#8221;0%&#8221; border_width_all=&#8221;0px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|hover&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjU1In19@&#8221; button_text=&#8221;More From our Contributors&#8221; button_alignment=&#8221;right&#8221; _builder_version=&#8221;4.24.0&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;12px&#8221; button_text_color=&#8221;#000000&#8243; button_border_width=&#8221;0px&#8221; button_font=&#8221;Poppins||||on|||#000000|&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_horizontal__hover=&#8221;2px&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; specialty_columns=&#8221;2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_row_inner make_equal=&#8221;on&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column_inner saved_specialty_column_type=&#8221;1_2&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;In The News&#8221; url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjUxIn19@&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf1ea;||fa||400&#8243; icon_color=&#8221;#FFFFFF&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;22px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.23.1&#8243; _dynamic_attributes=&#8221;url,link_option_url&#8221; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px|4px|false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjUxIn19@&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column_inner][\/et_pb_row_inner][et_pb_row_inner column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px|6px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column_inner type=&#8221;1_2&#8243; saved_specialty_column_type=&#8221;1_2&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;press-release&#8221; use_taxonomy_terms=&#8221;on&#8221; post_number=&#8221;1&#8243; thumbnail_size=&#8221;300&#215;300&#8243; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_date=&#8221;on&#8221; show_terms=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-fullwidth&#8221; admin_label=&#8221;Divi FilterGrid&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; custom_read_more_button=&#8221;on&#8221; read_more_button_text_size=&#8221;12px&#8221; read_more_button_bg_color=&#8221;RGBA(255,255,255,0)&#8221; read_more_button_border_color=&#8221;RGBA(255,255,255,0)&#8221; read_more_button_font=&#8221;||||on||||&#8221; read_more_button_use_icon=&#8221;off&#8221; read_more_button_alignment=&#8221;right&#8221; child_filter_saturate=&#8221;0%&#8221; border_width_all=&#8221;0px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|hover&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][\/et_pb_column_inner][et_pb_column_inner type=&#8221;1_2&#8243; saved_specialty_column_type=&#8221;1_2&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|||6px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;press-release&#8221; use_taxonomy_terms=&#8221;on&#8221; post_number=&#8221;3&#8243; offset_number=&#8221;1&#8243; thumbnail_size=&#8221;300&#215;300&#8243; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;128&#8243; truncate_excerpt=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;93px&#8221; thumb_width=&#8221;20%&#8221; column_gutter=&#8221;1em&#8221; row_gutter=&#8221;1em&#8221; admin_label=&#8221;Divi FilterGrid&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; child_filter_saturate=&#8221;0%&#8221; border_width_all=&#8221;0px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|hover&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjUxIn19@&#8221; button_text=&#8221;More News&#8221; button_alignment=&#8221;right&#8221; _builder_version=&#8221;4.24.0&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;12px&#8221; button_text_color=&#8221;#000000&#8243; button_border_width=&#8221;0px&#8221; button_font=&#8221;Poppins||||on|||#000000|&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_horizontal__hover=&#8221;2px&#8221;][\/et_pb_button][\/et_pb_column_inner][\/et_pb_row_inner][\/et_pb_column][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;24px||12px||false|false&#8221; border_width_top=&#8221;1px&#8221; border_color_top=&#8221;#EDEDED&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; filter_saturate=&#8221;0%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.23.1&#8243; _dynamic_attributes=&#8221;link_option_url&#8221; _module_preset=&#8221;default&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#000000&#8243; custom_margin=&#8221;12px||||false|false&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjgyIn19@&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Podcasts<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;0px|0px|||false|false&#8221; custom_padding=&#8221;0px|4px||4px|false|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Newest Episode&#8221; url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjgyIn19@&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf3c9;||fa||900&#8243; icon_color=&#8221;#FFFFFF&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;22px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.23.1&#8243; _dynamic_attributes=&#8221;url,link_option_url&#8221; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjgyIn19@&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_image src=&#8221;https:\/\/kbi.media\/wp-content\/uploads\/2025\/05\/V2-2025-KBKast-VANTA-Artwork-scaled-e1747283527342.jpg&#8221; title_text=&#8221;V2-2025-KBKast-VANTA-Artwork&#8221; url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3MCJ9fQ==@&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _dynamic_attributes=&#8221;url&#8221; _module_preset=&#8221;default&#8221; filter_saturate=&#8221;0%&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;on|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221;][\/et_pb_image][et_pb_code disabled_on=&#8221;off|off|off&#8221; module_id=&#8221;kbkast_fp_player&#8221; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; text_orientation=&#8221;left&#8221; width=&#8221;76%&#8221; width_tablet=&#8221;76%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;right&#8221; custom_margin=&#8221;-196px||||false|false&#8221; custom_margin_tablet=&#8221;-196px||||false|false&#8221; custom_margin_phone=&#8221;-180px||48px||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;|6px|||false|false&#8221; filter_opacity=&#8221;80%&#8221; module_alignment_tablet=&#8221;right&#8221; module_alignment_phone=&#8221;center&#8221; module_alignment_last_edited=&#8221;on|phone&#8221; custom_css_main_element=&#8221;#pp-podcast-1042 .pp-podcast__wrapper {||    background-color: #ED00000;||}||||.ppjs__list-reveal {||display: none;||}||||.ppjs__seek-slider {||display: none;||}||||.ppjs__episode-title {||font-family: &#8216;Libre Baskerville&#8217;;font-size: 12px; ||  }&#8221; global_colors_info=&#8221;{}&#8221; width__hover_enabled=&#8221;on|desktop&#8221; width__hover=&#8221;76%&#8221;]\t\t\t<style type=\"text\/css\">#pp-podcast-4514 a, .pp-modal-window .modal-4514 a, .pp-modal-window .aux-modal-4514 a, #pp-podcast-4514 .ppjs__more { color: #000; } #pp-podcast-4514:not(.modern) .ppjs__audio .ppjs__button.ppjs__playpause-button button *, #pp-podcast-4514:not(.modern) .ppjs__audio .ppjs__button.ppjs__playpause-button button:hover *, #pp-podcast-4514:not(.modern) .ppjs__audio .ppjs__button.ppjs__playpause-button button:focus *, .pp-modal-window .modal-4514 .ppjs__audio .ppjs__button.ppjs__playpause-button button *, .pp-modal-window .modal-4514 .ppjs__audio .ppjs__button.ppjs__playpause-button button:hover *, .pp-modal-window .modal-4514 .ppjs__audio .ppjs__button.ppjs__playpause-button button:focus *, .pp-modal-window .aux-modal-4514 .pod-entry__play *, .pp-modal-window .aux-modal-4514 .pod-entry__play:hover * { color: #000 !important; } #pp-podcast-4514.postview .episode-list__load-more, .pp-modal-window .aux-modal-4514 .episode-list__load-more, #pp-podcast-4514:not(.modern) .ppjs__time-handle-content, .modal-4514 .ppjs__time-handle-content { border-color: #000 !important; } #pp-podcast-4514:not(.modern) .ppjs__audio-time-rail, #pp-podcast-4514.lv3 .pod-entry__play, #pp-podcast-4514.lv4 .pod-entry__play, #pp-podcast-4514.gv2 .pod-entry__play, #pp-podcast-4514.modern.wide-player .ppjs__audio .ppjs__button.ppjs__playpause-button button, #pp-podcast-4514.modern.wide-player .ppjs__audio .ppjs__button.ppjs__playpause-button button:hover, #pp-podcast-4514.modern.wide-player .ppjs__audio .ppjs__button.ppjs__playpause-button button:focus, .pp-modal-window .modal-4514 button.episode-list__load-more, .pp-modal-window .modal-4514 .ppjs__audio-time-rail, .pp-modal-window .modal-4514 button.pp-modal-close { background-color: #000 !important; } #pp-podcast-4514 .hasCover .ppjs__audio .ppjs__button.ppjs__playpause-button button { background-color: rgba(0, 0, 0, 0.5) !important; } .pp-modal-window .modal-4514 button.episode-list__load-more:hover, .pp-modal-window .modal-4514 button.episode-list__load-more:focus, .pp-modal-window .aux-modal-4514 button.episode-list__load-more:hover, .pp-modal-window .aux-modal-4514 button.episode-list__load-more:focus { background-color: rgba( 0,0,0, 0.7 ) !important; } #pp-podcast-4514 .ppjs__button.toggled-on, .pp-modal-window .modal-4514 .ppjs__button.toggled-on, #pp-podcast-4514.playerview .pod-entry.activeEpisode, .pp-modal-window .modal-4514.playerview .pod-entry.activeEpisode { background-color: rgba( 0,0,0, 0.1 ); } #pp-podcast-4514.postview .episode-list__load-more { background-color: transparent !important; } #pp-podcast-4514.modern:not(.wide-player) .ppjs__audio .ppjs__button.ppjs__playpause-button button *, #pp-podcast-4514.modern:not(.wide-player) .ppjs__audio .ppjs__button.ppjs__playpause-button button:hover *, #pp-podcast-4514.modern:not(.wide-player) .ppjs__audio .ppjs__button.ppjs__playpause-button button:focus * { color: #000 !important; } #pp-podcast-4514.modern:not(.wide-player) .ppjs__time-handle-content { border-color: #000 !important; } #pp-podcast-4514.modern:not(.wide-player) .ppjs__audio-time-rail { background-color: #000 !important; } #pp-podcast-4514, .modal-4514, .aux-modal-4514 { --pp-accent-color: #000; } #pp-podcast-4514 .ppjs__share-button, .modal-4514 .ppjs__share-button { display: none; }<\/style>\n\t\t\t<div id=\"pp-podcast-4514\" class=\"pp-podcast no-header header-hidden legacy special-style playerview media-audio hide-share hide-description\"  data-teaser=\"\" data-elength=\"0\" data-eunit=\"\" data-ppsdata=\"{&quot;ppe-4514-1&quot;:{&quot;title&quot;:&quot;Episode 364 Deep Dive: Malcolm Turnbull | Balancing Innovation, Security, and Risk&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Malcolm Turnbull, former Prime Minister of Australia, current Chairman of Fortescue Future Industries, Senior Advisor to KKR, and Strategic Advisor at Semperis. Malcolm reflects on his leadership in launching Australia\\u2019s first national cybersecurity strategy and examines the evolution of cyber as a vital component of national security and statecraft. He shares insights into the challenges faced by governments and businesses in raising digital awareness, the necessity of mandatory breach reporting, and the importance of sharing intelligence to combat cybercrime. The conversation covers Australia\\u2019s approach to critical infrastructure protection, foreign interference reforms, and the nuances of risk management in telecom and utility sectors. Malcolm also discusses the legal landscape around cybersecurity liabilities and the growing impact of class actions on corporate accountability, emphasizing adaptability, setting realistic expectations, and continual vigilance as key lessons for future leaders.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;The Honourable Malcolm Turnbull AC&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Australia\\u2019s 29th Prime Minister (2015-2018) had international careers in law, business and the media before entering politics at the age of 50.&lt;\\\/p&gt;\\n&lt;p&gt;As Prime Minister, he reformed Australia\\u2019s personal income tax, education and childcare systems, oversaw the legalisation of same sex marriage and announced the construction of Snowy Hydro 2.0 the biggest pumped hydro scheme in the southern hemisphere. Mr Turnbull embarked on the largest peacetime investment in Australian defence capabilities and set out Australia\\u2019s first national cybersecurity strategy.&lt;\\\/p&gt;\\n&lt;p&gt;Globally, Mr Turnbull played a leading role in reviving the Trans Pacific Partnership (TPP-11 or CPTPP) after the United States withdrew. He also struck deals with US Presidents Obama and Trump to accept refugees who tried to arrive in Australia illegally by boat.&lt;\\\/p&gt;\\n&lt;p&gt;As a young lawyer, Mr Turnbull successfully defended former MI5 agent Peter Wright against the British Government in the 1986 \\u201cSpycatcher\\u201d trial before entering business where he ran his own investment banking firm for a decade before joining Goldman Sachs as a partner in 1997. Both before and after his political career, Mr Turnbull has been a successful venture capitalist. He co founded OzEmail Limited, the first Australian tech company to be listed on the NASDAQ.&lt;\\\/p&gt;\\n&lt;p&gt;Since leaving politics, Mr Turnbull has resumed his business career. He is a senior adviser to KKR and an investor in, and adviser to, many Australian technology businesses. He is a director of the International Hydropower Association and Chairman of Australian Fortescue Future Industries. Mr Turnbull speaks and writes on a range of issues including cyber security, geopolitics and renewable energy.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 22, 2026&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-364-deep-dive-malcolm-turnbull-balancing-innovation-security-and-risk&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2426704\\\/c1e-6wnpc773g8indop0-ww46gomwi7pp-ho5i7k.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;46:51&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1776837637,&quot;key&quot;:&quot;349b027f4897764f2884a8f62354b400&quot;},&quot;ppe-4514-2&quot;:{&quot;title&quot;:&quot;Episode 363 Deep Dive: Nathan Thomas &#8211; Inside Oracle\\u2019s Multi-Cloud Strategy&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Nathan Thomas, Senior Vice President of Product Management at Oracle Cloud Infrastructure (OCI), to explore Oracle\\u2019s evolving multi cloud strategy and the major trends shaping the cloud landscape. Nathan discusses the company\\u2019s shift from an Oracle-first approach to a multi cloud reality, driven by customer expectations for flexibility, governance, and sovereignty of data. He highlights the persistent demand for sovereign solutions, the impact of AI on accelerating multi cloud adoption, and the need for seamless integration and portability as customer loyalty becomes more fluid. Nathan also delves into the complexities of cloud migration, Oracle\\u2019s focus on delivering efficient and cost-effective infrastructure, and how maintaining a narrow focus on core services differentiates OCI in a crowded marketplace. Finally, he emphasizes the importance of holding cloud vendors accountable for innovation, value, and enabling truly multi cloud operations.&lt;\\\/p&gt;\\n&lt;p&gt;Nathan Thomas\\u00a0is senior vice president of Product Management at Oracle Cloud Infrastructure (OCI), overseeing product strategy and development of Oracle\\u2019s cloud and multicloud services. His organization is responsible for providing secure, reliable, and high-performance solutions that enable customers to run Oracle\\u2019s industry-leading services across their preferred cloud environments, addressing complex technical challenges and promoting long-term innovation and growth.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to Oracle,\\u00a0Nathan\\u00a0held senior product and engineering leadership roles at Amazon Web Services, Epic Games, Google Cloud, and Red Hat. His work has been instrumental in promoting enterprise adoption of open-source technologies, driving the commercialization of cloud computing, and broadening the application of real-time 3D technology across multiple industries.&lt;\\\/p&gt;\\n&lt;p&gt;Nathan\\u00a0is based in Nashville, Tennessee.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 15, 2026&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-363-deep-dive-nathan-thomas-inside-oracles-multi-cloud-strategy&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2422563\\\/c1e-6wnpc7724wundop0-rkgdxnnxux8w-whqfzt.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;44:52&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1776238005,&quot;key&quot;:&quot;edcff958f3ff35bdb6262b48c885b5d2&quot;},&quot;ppe-4514-3&quot;:{&quot;title&quot;:&quot;Episode 362 Deep Dive: C\\u00e9sar Cernuda | Trust, Trade &amp; the New Data Diplomacy&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with C\\u00e9sar Cernuda, President at NetApp, as he explores the growing significance of data and the evolving role of trust, governance, and transparency in managing this strategic asset. C\\u00e9sar discusses how organizations and nations must build intelligent data infrastructures to enable AI and navigate complex regulatory landscapes, emphasizing the importance of cybersecurity, interoperability, and modernizing data lakes. We also examine the balance between protection and openness, the resurgence of sovereign cloud requirements, and the pressure for leaders to cultivate a data-first mindset to stay competitive.&lt;\\\/p&gt;\\n&lt;p&gt;C\\u00e9sar Cernuda has led NetApp\\u2019s integrated go-to-market organization since July 2020, delivering on the company\\u2019s promise to meet customers wherever they are on their digital-transformation journeys by providing the superior products, specialist skills, and services they need to architect, build, and manage their data fabrics.&lt;\\\/p&gt;\\n&lt;p&gt;C\\u00e9sar joined NetApp following a long career at Microsoft, where he served as President of Microsoft Asia Pacific, President of Microsoft Latin America, and Global Corporate Vice President of the brand. Having walked in the shoes of NetApp\\u2019s enterprise customers, he brings a customer-centric perspective to all he does as president. C\\u00e9sar serves as the non-executive director and Chairman of the\\u202fESG\\u202fcommittee at Gestamp, an international organization dedicated to the automotive industry; as an advisory board member of Georgetown University\\u2019s McDonough School of Business; and as an international advisory board member of IESE Business School \\u2013 University of Navarra.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 8, 2026&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-362-deep-dive-cesar-cernuda-trust-trade-the-new-data-diplomacy&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2416061\\\/c1e-n439hzdw75c9z48r-okp71008fopp-wh7vyx.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;38:35&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1775628003,&quot;key&quot;:&quot;5ad669c697527686ad8d05cfcfa67769&quot;},&quot;ppe-4514-4&quot;:{&quot;title&quot;:&quot;Episode 361 Deep Dive: Richard Stiennon | Why AI Security Will Define The Future Of Digital Defence&quot;,&quot;description&quot;:&quot;&lt;p&gt;Richard Stiennon is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 3,051+ vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 31 countries on six continents. He was a lecturer at Charles Sturt University in Australia. He is the author of&lt;em&gt; Surviving Cyberwar&lt;\\\/em&gt; (Government Institutes, 2010) and Washington Post Best Seller, &lt;em&gt;There Will Be Cyberwar&lt;\\\/em&gt;.\\u00a0 Stiennon was Chief Strategy Officer for Blancco Technology Group, the Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner. He has a B.S. in Aerospace Engineering and his MA in War in the Modern World from King\\u2019s College, London. His latest book &lt;em&gt;Security Yearbook 2022&lt;\\\/em&gt; was released in June, 2022. Get a copy &lt;a href=\\&quot;https:\\\/\\\/it-harvest.com\\\/shop\\\/security-yearbook-2022\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;here&lt;\\\/a&gt;.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 1, 2026&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-361-deep-dive-richard-stiennon-why-ai-security-will-define-the-future-of-digital-defence&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2411039\\\/c1e-z9w7f37dkqaokrwj-dm1761nzt24q-vsreqj.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;43:27&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1775019357,&quot;key&quot;:&quot;66f1fac6309b4cf2a7c3f62e7f06c537&quot;},&quot;ppe-4514-5&quot;:{&quot;title&quot;:&quot;From Elastic{ON} Sydney 2026 \\u2013 KB On The Go |  Mandy Andress&quot;,&quot;description&quot;:&quot;&lt;p&gt;Data is exploding. Environments are getting noisier and the line between observability and security, it\\u2019s basically gone. Search isn\\u2019t just a feature anymore, it\\u2019s infrastructure. It\\u2019s how you see, how you detect, and ultimately how you defend from ai, power detection, engineering to unified visibility across logs, metrics, t races and security telemetry. We\\u2019re officially in a world where if you can\\u2019t search it in real time, you can\\u2019t secure it.&lt;\\\/p&gt;\\n&lt;p&gt;This bonus episode features Mandy Andress, CISO at Elastic, live from Elastic{ON} Sydney 2026. As Australia navigates its unique, sector-led approach to AI regulation, Karissa Breen and Mandy Andress explore the challenges\\u2014and opportunities\\u2014facing CISOs on the front lines of the agentic AI revolution.&lt;\\\/p&gt;\\n&lt;p&gt;Mandy Andress is currently the CISO of Elastic and has a long career focused on information risk and security.\\u202c Prior to Elastic, Mandy led the information security function at MassMutual and established and built information security programs at TiVo, Evant, and Privada. She worked as a security consultant with Ernst &amp; Young and Deloitte &amp; Touche, focusing on energy, financial services, and Internet technology clients with global operations. She also founded an information security consulting company with clients ranging from Fortune\\u202c 100 companies to start up organizations.\\u202c&lt;\\\/p&gt;\\n&lt;p&gt;\\u202dShe is a published author, with her book Surviving Security having two editions and used at multiple\\u202c universities around the world as the textbook for foundation information security courses. Mandy also tested\\u202c and reviewed information security products for multiple publications as well as serving as the author for the weekly InfoWorld security column. She has been a sought after expert in the field, speaking at signature\\u202c security conferences such as BlackHat and Networld+Interop. In addition, she has taught a graduate level\\u202c Information Risk Management course for UMass Amherst in the College of Information and Computer\\u202c Sciences.\\u202c&lt;\\\/p&gt;\\n&lt;p&gt;Mandy has a JD from Western New England University, a Master\\u2019s in Management Information Systems from Texas A&amp;M University, and a B.B.A in Accounting from Texas A&amp;M University. Mandy is a CISSP, CPA, and\\u202c member of the Texas Bar.\\u202c&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 27, 2026&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/from-elasticon-2026-kb-on-the-go-mandy-andress&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2406025\\\/c1e-d5v7aomrvrcpd4gq-5z384w7zczzk-umyqck.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;41:44&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1774587645,&quot;key&quot;:&quot;07cdfb3ac4daaddbebf2f78d2a82ffce&quot;},&quot;ppe-4514-6&quot;:{&quot;title&quot;:&quot;Episode 360 Deep Dive: Simon Cook | The Right To Be Forgotten, Navigating GDPR, IRAP and Global Standards in Physical and Cybersecurity&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Simon Cook, Director of New Offerings at Genetec, as he discusses the convergence between physical and cybersecurity, and the impact of global standards such as GDPR and IRAP on industry practices. Simon details the shift from siloed teams to collaborative approaches, highlighting how increased connectivity and advancements like generative AI have expanded the attack surface, making cyber risks a broader business concern. He explores the ongoing challenges of device security\\u2014from consumer cameras to enterprise solutions\\u2014and the market\\u2019s growing awareness of attack vectors stemming from seemingly innocuous network devices. Simon also unpacks the complexities of privacy legislation, especially the right to be forgotten, emphasizing the need for technology providers to embed privacy and trust by design at every stage of product development. Finally, he offers insight into the future direction of physical security, predicting the acceleration of proactive, technology-driven systems and deeper integration of compliance frameworks worldwide.&lt;\\\/p&gt;\\n&lt;p&gt;Simon is a highly motivated, innovative and creative security professional with almost 20 years\\u2019 experience in the Pre-Sales and design space working with hardware, software and cloud solutions. Leadership experience and a proven track record of success growing and evolving teams in both medium and large organisations and on a global scale. Accustomed to speaking up to C- Level, in public forums and to press. A commercial techie that is inspired by good products, and passionate and motivated people.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 25, 2026&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-360-deep-dive-simon-cook-the-right-to-be-forgotten-navigating-gdpr-irap-and-global-stan&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2404237\\\/c1e-2k31bq85rdt67jo4-2502d7oqc7nk-8ykzbp.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;38:53&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1774414812,&quot;key&quot;:&quot;786111aa1a8a176672eb1179058f4806&quot;},&quot;ppe-4514-7&quot;:{&quot;title&quot;:&quot;Episode 359 Deep Dive: Omar Khawaja | Data Intelligence for Cybersecurity&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Omar Khawaja, Vice President of Security and Field CISO at Databricks, as he explores the intersection of data, AI, and cybersecurity defense. Omar addresses the real fatigue facing CISOs amidst rising AI hype, emphasizing that combining high-quality data with AI\\u2014not just AI alone\\u2014is pivotal to effective cyber defense. He shares insights on the growing need for organizations to get their data in order, challenges in adapting operating models for AI, and the importance of reducing security tool sprawl through robust, unified platforms. Omar also discusses the increasing role of AI agents in automating routine tasks, the evolving skills required to leverage AI securely, and why mature frameworks and a growth mindset are critical as organizations navigate the complexities and risks of AI adoption.&lt;\\\/p&gt;\\n&lt;p&gt;Omar Khawaja is the VP, Field CISO at Databricks where he gets to work with CISOs to help them securely shepherd their organisations\\u2019 data+AI journey. He leads Databricks\\u2019 Field Security practice globally, teaches at Carnegie Mellon\\u2019s CISO program, sits on the boards of HITRUST and FAIR Institute, spent 9 years as CISO of a $26B enterprise and is leading a team that developed an actionable AI security framework for 11,000 enterprise data platform customers at Databricks.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 18, 2026&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-359-deep-dive-omar-khawaja-data-intelligence-for-cybersecurity&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2398201\\\/c1e-2k31bq8vd9a67jo4-xx72g4vwsqkj-4mducd.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;46:50&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1773810059,&quot;key&quot;:&quot;8b0457afa35ed9d756d90d5b23be97ba&quot;},&quot;ppe-4514-8&quot;:{&quot;title&quot;:&quot;Episode 358 Deep Dive: Lisa Black | How Leaders Survive Major System Failures&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Lisa Black, Director of Public Sector at Aeon Nexus Corporation, as she shares her perspectives on crisis leadership and organizational resilience when critical systems fail. Lisa draws from her extensive background leading government operations to highlight how real risk in a crisis is often less about technology and more about maintaining trust, clear communication, and effective decision-making under pressure.&lt;\\\/p&gt;\\n&lt;p&gt;We explore the pitfalls of traditional and predictable crisis training, the importance of cross-training team members, and the value of embedding continuous improvement and consequence-based learning into daily operations. Lisa also discusses the crucial role of cadence in incident communications, the need to manage rumor mills and public scrutiny, consequences of over-reliance on technology, and why true collaboration between public and private sectors is essential to strengthen defenses against modern threats.&lt;\\\/p&gt;\\n&lt;p&gt;Lisa Black is the Director of Public Sector at Aeon Nexus Corporation where she consults with government clients who are committed to enhancing justice through modernizing technology. Utilizing Aeon\\u2019s legal case management solution to deliver a single, secure, centralized, cloud-based system to public sector entities Lisa and her company work with public safety agencies, the offices of District Attorneys, Public Defenders, mediators and courts throughout the US.&lt;\\\/p&gt;\\n&lt;p&gt;With over two decades of government experience, Lisa previously served as the Chief Deputy County Executive in Suffolk County, NY. There she managed the daily operations of a local government that served 1.5 million residents with a $4 Billion budget and a workforce of approximately 12,000 staff. Lisa has also held leadership roles with two NY State Senate Majority Leaders, two New York City Mayors and a NY Governor serving as Senior Advisor at the NYS Division of Homeland Security and Emergency Services.&lt;\\\/p&gt;\\n&lt;p&gt;Lisa\\u2019s advantage in serving in both republican and democratic governments has been instrumental in her ability to communicate across the aisle where she has been involved in crisis and emergency management for over half of her career. Formerly trained in emergency management and operational decision-making during crisis, Lisa has also earned certificates in Government Leadership and Cybersecurity Policy and Technology from the JFK School of Government at Harvard University Executive Education Program. Importantly, her skills and training helped her lead the Unified Command Incident Response to a 2022 countywide ransomware attack including incident identification, containment, eradication and operational recovery.&lt;\\\/p&gt;\\n&lt;p&gt;She has spoken publicly about the experience at conferences and forums across the US including those with the NY State Association of Counties (NYSAC), the US Secret Service Cyber Fraud Task Force, NY State Local Government Information Technology Directors Association (NYSLGITDA), the National Federation of Municipal Analysts (NFMA), the International Association of Emergency Manager\\u2019s (IAEM) Region II Inaugural Conference, the National Association of Counties (NACo) Chief Information Officer Forum, the FBI &amp; Fordham Law School\\u2019s International Cyber Security Summit and the 2020Partners Counterterrorism, Counter-Narcotics &amp; Cyber Security Miami Conference.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 11, 2026&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-358-deep-dive-lisa-black-how-leaders-survive-major-system-failures&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2389314\\\/c1e-x8jpi1p2dzcn7wz6-47o0rx0di438-qlenbn.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;47:03&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1773205222,&quot;key&quot;:&quot;3fb642ed8465f25612570f889c05f7e0&quot;},&quot;ppe-4514-9&quot;:{&quot;title&quot;:&quot;From The SimSpace Summit 2026 \\u2013 KB On The Go | Rushell Hopkins and Stanley McChrystal (Part 2)&quot;,&quot;description&quot;:&quot;&lt;p&gt;Karissa Breen [00:00:10]:&lt;br \\\/&gt;\\nWelcome to KB On The Go. I\\u2019m coming to you from my new place of residence, Orlando, Florida. And today I\\u2019m being hosted at the SimSpace Summit. Cybersecurity is hitting a breaking point, compliance checklists, tabletop exercises, and confidence claims. Aren\\u2019t enough anymore, especially as AI accelerates both attack and defense. This summit is about something different, proving readiness under real pressure, real tools, real teams, real-world chaos. Today, I\\u2019m speaking with leaders and former US government officials pushing cyber training testing and validation out of theory and into reality. Because when the next incident hits, what matters isn\\u2019t what looks good on paper, it\\u2019s what actually holds up.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen [00:00:57]:&lt;br \\\/&gt;\\nStay with me, we\\u2019re diving into the conversations that matter. This is KB On The Go from SYNSPACE Summit 2026.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen [00:01:04]:&lt;br \\\/&gt;\\nLet\\u2019s get into it. Joining me now in person is Rochelle Hopkins, Professor, Computer Science and Cybersecurity at Florida Southwestern State College, and today we\\u2019re discussing the future of cyber workforce. So, Rochelle, thanks for joining and welcome.&lt;\\\/p&gt;\\n&lt;p&gt;Rushell Hopkins [00:01:23]:&lt;br \\\/&gt;\\nWell, thanks for having me.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen [00:01:24]:&lt;br \\\/&gt;\\nOkay. So Rochelle, I\\u2019m really interested in the work that you do. And when we were talking before, you were sort of describing like how things are nowadays. And I think it\\u2019s really interesting to explore that a little bit more. So I want to start perhaps with your view on the growing concern about cognitive atrophy in the younger generation. And what are your thoughts here?&lt;\\\/p&gt;\\n&lt;p&gt;Rushell Hopkins [00:01:46]:&lt;br \\\/&gt;\\nAbsolutely. One of the things I also didn\\u2019t share with you is I\\u2019m part of a cohort or consortium called the AAC&amp;U, which is the American Association of Colleges and Universities. And I\\u2019m in this cohort where we\\u2019re trying to bring AI into higher education and kind of look at what that\\u2019s going to do. I share concerns with many of the educators in what they\\u2019re calling cognitive offloading or cognitive atrophy in our younger generation. In cybersecurity, I tend to have really remarkable, creative, compassionate, and technically advanced students. But what I\\u2019m seeing and the shift that I\\u2019m seeing is that these students are using AI at a level where it\\u2019s eroding their patience, their deep focus, and their willingness to wrestle with the deeper problems. And learning, especially in cybersecurity, requires discomfort. We have to think outside the box.&lt;\\\/p&gt;\\n&lt;p&gt;Rushell Hopkins [00:02:33]:&lt;br \\\/&gt;\\nIt really requires us to sit with something, and if we don\\u2019t understand it, we are breaking it down and we\\u2019re building up that mental endurance, right, to solve it. And when their answer is just one click away, right, to these problems, that muscle greatly weakens.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen [00:02:50]:&lt;br \\\/&gt;\\nThis is where I think it gets really interesting as well, because I\\u2019m a millennial, and even when we were learning things, it\\u2019s still fundamentally different. Doesn\\u2019t feel that long ago. But when you\\u2019re talking about what you\\u2019re describing versus when I came up through the ranks, it\\u2019s not that long ago, but it does feel a lot longer. So I\\u2019m curious to see What does this sort of mean now for how people are actually learning things? You mentioned before 15-minute to 20-minute blocks before you had to say, right, we\\u2019re gonna get up, go for a walk, we\\u2019re gonna do something else. That\\u2019s a very short period of time when you think about it. How, what\\u2019s going on here?&lt;\\\/p&gt;\\n&lt;p&gt;Rushell Hopkins [00:03:32]:&lt;br \\\/&gt;\\nSo there\\u2019s a lot, there\\u2019s a lot of things. People are starting to do a lot of research on attention span, right? And I don\\u2019t wanna go down too much that down that road because I don\\u2019t have any degrees in psychology or, you know, I teach computer science and cybersecurity. But I\\u2019ve watched a lot of content, and I don\\u2019t mean social media content, I mean research, where shows like Cocomelon, right, that we put our kids in front of, the screens are changing every 1 to 1.5 seconds. You get to 2 seconds before there is a color change, a scene change, or something\\u2019s happening. And what\\u2019s happening from a very young age when we put children in front of TVs, we are literally breaking down their attention span from birth. Okay? And so when these college kids are coming in, we\\u2019ve already done a number on them in terms of by the time they get to the situation, their attention span, they don\\u2019t really have the same attention span that I have. I\\u2019m a Gen Xer, right? I didn\\u2019t have the same experiences or I wasn\\u2019t subjected to a lot of TV or these flashing lights or Cocomelon. We just, we didn\\u2019t have that, right? So my ability to sit with something is a little bit, is a little bit different than the younger generation.&lt;\\\/p&gt;\\n&lt;p&gt;Rushell Hopkins [00:04:37]:&lt;br \\\/&gt;\\nWhat I\\u2019m finding is that it\\u2019s relatively new, like you said, over the past 5 years, I\\u2019m just seeing it. I can see it. And so when you\\u2019re looking at a classroom, I can tell within the first 5 or 10, 15 minutes that I need to either go down a rabbit hole, tell a joke, and I call it microdosing my lectures. My students are no longer able to sit through an hour and a half, 2-hour, 3-hour lecture, like the ones I sat through when I went through college. And so, what I\\u2019ll do is I\\u2019ll talk for 15 minutes about a topic, fundamental cybersecurity foundational language, and then I\\u2019ll tell a joke or I\\u2019ll be like, you know, this one time, and I\\u2019ll bring them back and I can see I can bring them back in. And so, the world\\u2019s trained that their, you know, their attention differently. And so, I would say that shorter segments I see kind of as on-ramps, right, to that deeper learning. And then, things like SimSpace, right, why we\\u2019re here, I will microdose that lecture and then we\\u2019ll jump right into a hands-on.&lt;\\\/p&gt;\\n&lt;p&gt;Rushell Hopkins [00:05:33]:&lt;br \\\/&gt;\\nRight? So instead of listening, now I\\u2019ve got them acting. And so I\\u2019ll do a 15-minute lecture. Hey, let\\u2019s solve this knowledge check. Hey, let\\u2019s, you know, let me talk about this foundational skill and then let\\u2019s jump on and do that. My goal is to stretch their attention span, not succumb to it, right? So I think it\\u2019s really about growing that sustained concentration over time, like an athlete, right? Building that muscle memory.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen [00:05:57]:&lt;br \\\/&gt;\\nSo one of the things I\\u2019m curious to hear, well, whilst you were speaking, You said before when you would sit through lectures, hour and a half, and now it\\u2019s obviously these 15, 20-minute bursts before you could do something else. Do you think the outcome\\u2019s still the same though in terms of the learning and the knowledge?&lt;\\\/p&gt;\\n&lt;p&gt;Rushell Hopkins [00:06:13]:&lt;br \\\/&gt;\\nThis is really probably the first year, maybe year and a half that I\\u2019ve been seeing this. So I don\\u2019t have a really good litmus test yet in terms of what the outcome\\u2019s gonna be and how much they\\u2019re retaining. I would say that retention, again, when I was going through school, there wasn\\u2019t this one-click-away answer, right? It wasn\\u2019t this solution set at my fingertips, right? Everything had to be figured out. And so those lectures, I would take notes, I would be on it. I didn\\u2019t have a device, right? It would be me just writing and studying. And now my students are recording it or they\\u2019re just going back to it at a later date, or they\\u2019re using agentic AI to answer the questions. So I don\\u2019t really know. The answer to that is going to come down the road.&lt;\\\/p&gt;\\n&lt;p&gt;Rushell Hopkins [00:06:55]:&lt;br \\\/&gt;\\nSadly, I\\u2019m not really optimistic about that answer. To be honest, but I think we need to give a little bit more time to see how these students are coming out workforce ready. So there\\u2019s one thing to get through a course and take the class and pass it. And there\\u2019s another to take the course, pass it, and actually be employable and have employable skills where you retain the knowledge when you get out. I don\\u2019t know what that\\u2019s going to look like yet, or the answer to that yet.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen [00:07:16]:&lt;br \\\/&gt;\\nAnd speaking of retention of knowledge, one thing, Emma, you would know this more, Michelle, than I would, like writing things down, it actually imprints it more in your brain to learn something versus typing it. So Do you think as well that even if all these things that you\\u2019re explaining, it\\u2019s still not perhaps being imprinted into this is how we do the thing? So it becomes to your point before around it\\u2019s a muscle memory because perhaps people aren\\u2019t going and taking notes and highlighting and going to library and using encyclopedias like we used to do. It\\u2019s not like that anymore. Everything\\u2019s so instant, so quick, so quick and it wants the next thing nowadays. Curious on your thoughts.&lt;\\\/p&gt;\\n&lt;p&gt;Rushell Hopkins [00:07:56]:&lt;br \\\/&gt;\\nSo technology is both a gift and a risk, right? It gives my students access to tools that I could only have dreamed of when I was in their position, but it also is a substitute for thinking, right? The future professionals simply accept what a system tells them. My students are, instead of challenging it, thinking outside the box, they\\u2019re just accepting the output of the AI. Do you see what I\\u2019m saying? And so that We are not creating a group of cyber defenders. We\\u2019re really creating a group of individuals that rely on AI to defend.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen [00:08:29]:&lt;br \\\/&gt;\\nSo I have a question then. So with going back to the AI and then discerning the answer, there\\u2019s a group of people in the world that believe the Earth is flat. So if you said, is the Earth flat? And hypothetically ChatGPT says, yes, people would believe it, or they wouldn\\u2019t go, I\\u2019m gonna challenge that and think, Is it a threat or not?&lt;\\\/p&gt;\\n&lt;p&gt;Rushell Hopkins [00:08:47]:&lt;br \\\/&gt;\\nSo that\\u2019s one of the things I challenge my students to do is do a lot of critical thinking, right? Because it all boils down to critical thinking. It\\u2019s about challenging the process, challenging the answer. Love to tell you I get a lot of students that do that, but sadly I don\\u2019t see a lot of that spark, that willingness to do a deeper dive to confirm. I think a lot of students now, and again, I think that social media has really created this environment where students are more willing to accept data or information that fits their narrative rather than doing the deeper dive and saying, well, if this happens, if this happened and this happened, then that couldn\\u2019t have happened, right? And they\\u2019re not willing to put in the research or the work. They just simply fall victim. And so one of the things the general was talking about, general gave this analogy about the blind man and the elephant, how you have a bunch of different blind men touching different parts of an elephant. And one man is holding the tail and he says, this is a snake. Another gentleman is touching the legs and he\\u2019s like, well, this is a tree.&lt;\\\/p&gt;\\n&lt;p&gt;Rushell Hopkins [00:09:40]:&lt;br \\\/&gt;\\nWell, with all of this, all the social media, and the disinformation, how do you convince students that totality is an elephant when they\\u2019re only being fed pieces of information to the whole? Does that make sense? And so my students are seeing things and they\\u2019ll say, well, that guy says it\\u2019s a snake, so it\\u2019s a snake. And that guy says it\\u2019s a tree, it\\u2019s a tree. And they\\u2019re not evaluating the whole entire, they\\u2019re not looking at the information as a whole and coming to a conclusion. They\\u2019re letting the information that they\\u2019re given dictate the outcome. Or their theory.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen [00:10:10]:&lt;br \\\/&gt;\\nThen if we zoom out and look at that as a theory, how does that help? Like, as cybersecurity, when I was a practitioner by trade, curious, ask questions, break things. That\\u2019s how I got into it because I\\u2019m curious. And it\\u2019s ironic now I\\u2019m a media person in this space because I\\u2019m genuinely curious. I want to understand how you think. So how do we get to a point then? Because we\\u2019re going to need, like, eventually my generation, we\\u2019re all going to retire. We\\u2019re going to need these younger folks to do the work. So how does that stack up?&lt;\\\/p&gt;\\n&lt;p&gt;Rushell Hopkins [00:10:40]:&lt;br \\\/&gt;\\nI think that\\u2019s one of the ones that keeps me up at night. I would tell you 5 years ago that we were churning out some pretty amazing\\u2014 my career was, I was really doing good as a force for good, right? Because we do absolutely need these generations to protect our nation, right? These are\\u2014 I\\u2019m supposed to be churning out workforce-ready students. A lot of that\\u2019s why I brought SimSpace on, right, to start giving them more real-world, hands-on scenarios and getting out of that lecture environment, right, where I\\u2019m just verbatim spitting out information. If we think about where all these attack surfaces we\\u2019re looking at now, especially in Southwest Florida, you know, we need to look at our hospitals, our power grids, our schools, our military. It\\u2019s going to depend on them, not algorithms. And I worry about the future of AI in education. That\\u2019s a lot of why I joined that consortium, looking at how AI is brought into higher education, not just in cybersecurity, but as a whole, because we still need nurses and doctors. And one of the philosophies that we have, or we call, is like the pixie dust approach to AI.&lt;\\\/p&gt;\\n&lt;p&gt;Rushell Hopkins [00:11:35]:&lt;br \\\/&gt;\\nWhich is all these different educators are sprinkling AI into their curriculum or into their course development, or some are what we call conscious abstainers, where they choose to not allow the students to use AI in the classroom. Neither approach is great, right? We don\\u2019t have any type of structure. We don\\u2019t have any rules. You know, this AI right now is kind of the Wild West, right? We didn\\u2019t create any. It\\u2019s like putting the genie back in the bottle at this point. And then in higher education, you have a lot of people that are kind of there sitting out their career, they\\u2019re in that retirement phase, right? Maybe an older kind of pedagogy or ideas. And then you have these other individuals like me or myself teaching cybersecurity technology where AI is embedded in everything that we do. So our students have to come out and be workforce ready with this heavy AI.&lt;\\\/p&gt;\\n&lt;p&gt;Rushell Hopkins [00:12:19]:&lt;br \\\/&gt;\\nAnd so one of the concepts we\\u2019re talking about is like, how do we shoot that gap? How do we teach them how to use AI to better themselves in their career field without actually doing that cognitive offload? And That\\u2019s really where you really have to teach them the difference between when to use it and how to use it. And the when to use it\\u2019s the most important because for cognitive offload, as educators, we use it all the time. I\\u2019m helping, you know, I have Gronk, I have Gemini, they\\u2019re helping me build curriculum, they\\u2019re streamlining my mapping. We would do course mapping. It takes a lot of time and does a lot of the heavy lifting and things that I don\\u2019t really need to do. And so we need to teach our students that yes, AI is incredibly helpful and it can take a ton of workload off of us.. But we have to make sure that we\\u2019re using the AI in the way that we\\u2019re still learning the skill to become a subject matter expert in our industry, but using that to take off some of the stuff that we don\\u2019t really need to learn.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen [00:13:13]:&lt;br \\\/&gt;\\nSo one thing I\\u2019m curious to understand from your perspective, Rochelle, would be recently I interviewed the former Deputy Director of the NSA, George Barnes, and he spoke a lot about the new generation and what concerns him. And maybe you can answer this. He said, I\\u2019m concerned that people aren\\u2019t taking up roles in this period, but also from a government perspective, service to our nation, because YouTubers and TikTokers XYZ, these roles that people want to do over protecting the nation from a public-private sector perspective?&lt;\\\/p&gt;\\n&lt;p&gt;Rushell Hopkins [00:13:43]:&lt;br \\\/&gt;\\nYeah, that\\u2019s something we definitely wrestle with.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen [00:13:44]:&lt;br \\\/&gt;\\nAnd it\\u2019s\\u2014&lt;\\\/p&gt;\\n&lt;p&gt;Rushell Hopkins [00:13:45]:&lt;br \\\/&gt;\\nI\\u2019m not gonna lie, I would teach a lot of gen ed courses where I had students in different disciplines, right? And one of the courses that I taught was computer literacy. And computer literacy, most, you know, students think that when they come in, they\\u2019re like, I don\\u2019t need this, I\\u2019m computer literate. And they really have no idea what goes on in the background, right? They don\\u2019t really know what goes on behind the algorithms and the social media and how those algorithms get into their phone and the security behind it and why social media is eroding our students\\u2019 concentration. And they don\\u2019t see that aspect. And there\\u2019s one assignment that I would, I\\u2019d book into my students where there\\u2019s a security module and it asks them to go through their phone and find 3 of the most commonly used applications in their phone. I want them to read the terms of service and tell me what they learned. And after they read the terms of service and learned about what these apps are using in terms of their personal data, how do they feel about it, and were they still going to use it or they were gonna delete it? The overwhelming majority of our students said that, wow, I didn\\u2019t realize how intrusive they were or how much information they were gathering. I don\\u2019t feel comfortable with it, but I\\u2019m still gonna keep it \\u2019cause I like watching puppy videos.&lt;\\\/p&gt;\\n&lt;p&gt;Rushell Hopkins [00:14:53]:&lt;br \\\/&gt;\\nSo this is where I get nervous, and this is where I guess a little bit of the pessimism comes in because in cybersecurity, we know that end user\\u2019s our biggest threat. Our end user, all these demographics outside of cybersecurity, right? So people that are gonna get corporate world marketing, Hospitals, nurses, everybody is our users in our networks, right? And so if at this level we can\\u2019t get them to understand basic cybersecurity concepts and get them to realize what they\\u2019re giving up, they always say if you\\u2019re not paying for the product, you are the product, right? If I can\\u2019t get them at this level to take accountability and responsibility and understand the threat landscape, I don\\u2019t know what that\\u2019s gonna look like for us. And that\\u2019s the part I think that keeps me up at night is how do I, be that water droplet, that effect, invoke change, and get some of these kids to understand the repercussions of their actions. So, I don\\u2019t know what that\\u2019s going to do for our workforce. I think it also creates that conundrum of, you know, in my PhD program, I\\u2019m a PhD student, and my dissertation was focusing on how to shorten the cybersecurity skills gap using agentic AI. It\\u2019s a self-fulfilling prophecy. So, if we have students that aren\\u2019t workforce ready, that are outsourcing their critical thinking to AI, it just makes sense for companies to use AI to close that cybersecurity skills gap because the students that are coming out of higher education are critically offloading to their agentic AI and making their agentic AI more capable than they are to join the workforce.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen [00:16:16]:&lt;br \\\/&gt;\\nSo then how can anyone complain to say, well, we don\\u2019t have a job and there\\u2019s no entry-level jobs? That shouldn\\u2019t be a complaint then. It\\u2019s valid.&lt;\\\/p&gt;\\n&lt;p&gt;Rushell Hopkins [00:16:22]:&lt;br \\\/&gt;\\nYou\\u2019re right.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen [00:16:26]:&lt;br \\\/&gt;\\nJoining me now in person is retired General Stanley McChrystal, former commander of Joint Special Operations Command, and today we\\u2019re discussing winning the cyber war without a map. So Stan, thanks for joining and welcome.&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:16:37]:&lt;br \\\/&gt;\\nThanks for having me.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen [00:16:38]:&lt;br \\\/&gt;\\nOkay, so before we sort of got on the record today, I was saying I\\u2019ve been watching some of your YouTube videos, some of your interviews, just to understand a little bit more on how you\\u2019ve previously interviewed and getting more familiar with your approach to certain things. So I want to start today, Stan, with you\\u2019ve said that modern warfare moved from fixed battlefields to the everyday fast tech world. So what I\\u2019m curious to know is how does this directly mirror what cyber defenders are dealing with today?&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:17:08]:&lt;br \\\/&gt;\\nIf we talk about war, it used to be sort of geographically bounded. If you go way back, it was where the armies were. And then you expanded that. The armies could have a greater effect on countryside as they marched through it. Then we got to world wars, and suddenly the ability to reach with military things like submarines or aircraft, it basically brought the war close to civilians in a pretty real way. Now the war can be everywhere because information technology allows you to get both information and disinformation everywhere, but also cyber activities allow you to have impact everywhere. So whereas it might not have been possible to reach across an ocean and bomb an enemy\\u2019s factory, now we can reach across an ocean and attack it with cyber pretty simply. So the reality is the battle space, as the military would call it, has just expanded.&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:18:06]:&lt;br \\\/&gt;\\nIt\\u2019s almost limitless now. And so there is no front of the battle line, middle, and there\\u2019s no rear anymore. I don\\u2019t think we\\u2019ve really felt that yet. I don\\u2019t think we\\u2019ve digested the meaning of that because we still have an idea that if something is kinetic and it blows up, then it\\u2019s war. And if it\\u2019s cyber, that it is maybe espionage or maybe crime or maybe just irritating. But we haven\\u2019t had power stations turned off in the United States or Great Britain yet. We haven\\u2019t had that real impact felt on everyday lives from enemies yet. They\\u2019ve done some of it in Ukraine, but we think of that as battlespace.&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:18:48]:&lt;br \\\/&gt;\\nSo I think we are mentally not yet prepared for the fact that war is and can be everywhere, which then expands the idea of who\\u2019s a combatant. And then the question is, is someone sitting on a keyboard targetable kinetically, meaning if you hack me, can I bomb you? Is that fair? And I think we haven\\u2019t come to grips with that philosophical question yet, but we\\u2019re getting close because there will be an appetite to do that.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen [00:19:20]:&lt;br \\\/&gt;\\nYeah, okay, so this is really interesting. So I\\u2019ve come from a cyber background as practitioner before doing this sort of stuff today. And what\\u2019s interesting is, do you think now as we move forward with everything that\\u2019s happening in the world, of course there\\u2019s a rise of geopolitics, but you said before you can attack from anywhere, right? And then what I\\u2019m also seeing interviewing people across the globe with how it traverses into the kinetic warfare. And whilst you said nothing major has happened, and I hate to sort of raise it, do you think we\\u2019re going to unfortunately start seeing these sort of incidents now?&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:19:51]:&lt;br \\\/&gt;\\nI think we will. I think in the past what we\\u2019ve seen in the case of big powers is cyber-enabled killing, meaning we will find a targetable person by cyber, but then we will kill them kinetically. And that feels traditional. And so cyber was part of it. It was maybe the critical part, but the reality is we use traditional means. What if we turn off their pacemaker? What if we disable the hospital? What if we cause water or food to be contaminated, which I think we\\u2019ll be able to do all through cyber. And we\\u2019re killing people or we\\u2019re causing really damaging effects. We didn\\u2019t do anything that felt traditional.&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:20:39]:&lt;br \\\/&gt;\\nWe\\u2019re going to have to come to grips with, if you hit the keyboard, is that the same as pulling the trigger? And I don\\u2019t think right now we think of it that way.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen [00:20:48]:&lt;br \\\/&gt;\\nDo you think as well it\\u2019s because out of sight, out of mind? What I mean by that is, I worked in a bank as a practitioner. Someone\\u2019s money gets stolen, we would just replenish it back in your bank account. It\\u2019s a bit different to back in the day when people could physically go to a bank and, you know, rob some cash and run away. Do you think it\\u2019s because people can\\u2019t see it as much? Perhaps it\\u2019s not tangible. You can\\u2019t feel the impact?&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:21:09]:&lt;br \\\/&gt;\\nI think that\\u2019s right. I think we can\\u2019t feel the impact. But of course, if somebody effectively bilks you out of a large amount of money, you will feel the impact at some point because you\\u2019ll have less. But I think that\\u2019s right. It\\u2019s different than being mugged on the street where someone takes your purse or wallet. Which, or even being your home invaded and your jewelry and money stolen from your home, you feel violated. But I think that as people start to do identity theft and other, you will feel violated in the same visceral way, which will start to cause people to want to respond in the same visceral way.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen [00:21:46]:&lt;br \\\/&gt;\\nSo respond with force? We don\\u2019t. Right. Yeah, because I\\u2019ve always wondered this as well, because it\\u2019s like If someone upsets me online, for example, it\\u2019s not the same as someone coming up and punching me in the street, right? So where do you think the shift\\u2019s going to happen, or what do you think the catalyst is? Is it going to be, unfortunately, one of these incidents where people may lose their life as a result of cyber warfare that connects into kinetic warfare and then something bad really happens?&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:22:11]:&lt;br \\\/&gt;\\nOf course I\\u2019m not sure, but my sense is it will be a cumulative number of events like that get so painful, like identity theft or even just extreme inconvenience. So, for example, suppose someone disables TSA at the airport and you go to the airport and you can\\u2019t board your flight because no one can get through TSA. I think people will get much more angry far quicker than we have so far, particularly if it\\u2019s en masse. If someone hacks your account, I feel sorry for you. But I\\u2019m glad it wasn\\u2019t me. If they hack a bunch of us together, we are outraged and we\\u2019re willing to do something. I think something at scale, or cumulatively at scale, enough things happening, people are going to want to act. And again, some cases are going to act kinetically.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen [00:23:03]:&lt;br \\\/&gt;\\nSo given your background, do you think people are starting to really focus on this now, like governments, etc.? I mean, like, well, people may start to respond this way. You think it\\u2019s on the radar?&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:23:13]:&lt;br \\\/&gt;\\nI think theoretically it is, but practically it\\u2019s not because we\\u2019ve been warned about this so long. We know the cases of it so much. We\\u2019ve seen big hacks of government data. We\\u2019ve seen big hacks of business data. We\\u2019ve seen individuals suffer different cyber impacts, but it hasn\\u2019t affected our life. Look at any of the big cases and you go, wow, that\\u2019s bad. But it really didn\\u2019t change my life at all. I think one that turns out to have a big military effect or a big financial effect, that will be the tipping point.&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:23:48]:&lt;br \\\/&gt;\\nAnd I think it has to come pretty soon. And it doesn\\u2019t have to come from a nation-state. In fact, it\\u2019s probably likely not to, as a nation-state can be held at risk. You can threaten a nation-state. You can\\u2019t threaten an individual that doesn\\u2019t care. So I think it\\u2019s more likely that someone is able to do the equivalent of a weapon of mass destruction on cyber, but without, you know, the national assets. And we just haven\\u2019t seen it. And I\\u2019m, I\\u2019m frankly surprised that we haven\\u2019t seen that yet.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen [00:24:17]:&lt;br \\\/&gt;\\nSo you think back to the Colonial Pipeline attack that happened, obviously that caused outrage for people. Do you think that even if it\\u2019s something like that, there\\u2019s going to have this flow-on effect for people, there\\u2019s a group of people who are going to be agitating, concerned, start acting in a certain way, or to your point earlier, if it\\u2019s water gets contaminated, people start dying because they\\u2019re drinking it, and then emergency services go down, people can\\u2019t go through. Like, it\\u2019s going to have a\\u2014 it\\u2019s, from my understanding, interviewing people like yourself there, Stan, can happen quite quickly. Not like weeks, like hours.&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:24:53]:&lt;br \\\/&gt;\\nYeah, I think that if you\\u2014 and I use this word carefully\\u2014 inconvenience our society enough, I would argue that if you were able to turn the electricity off in a city for 12 hours and people didn\\u2019t know when that electricity would come back on in 12 hours, you\\u2019d start to see society break down. I think if it was longer than that, it would be even greater. So I think you\\u2019d have this groundswell response. Colonial Pipeline inconvenienced some people, but the resilience of our society, in fact, mitigated much of it. And that\\u2019s a good thing. We want our society to be very resilient, but we don\\u2019t want us to be so resilient that all of these things can happen and we start to just accept them. We\\u2019ve got to understand we must be resilient to survive them, but there\\u2019s got to be a decision made on the part of society of what\\u2019s acceptable and what isn\\u2019t and what we are going to actively going to stop, try to stop.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen [00:25:53]:&lt;br \\\/&gt;\\nSo one thing I\\u2019m curious then You said before we don\\u2019t want to accept it because we\\u2019re so resilient. Do you think people, even with like cyber breaches, people seem a little bit desensitized, like, oh well, another breach happened? Do you think this will become, oh well, another power plant blew up and people died? Do you think it will unfortunately become like that because so much of this could be happening?&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:26:13]:&lt;br \\\/&gt;\\nI think it could. I don\\u2019t think so. I think once you get into those things that affect people directly, that will be a point it tips. And I use, for example, So right now, we know that there are these scam centers in some of the Asian countries where they literally have created little factories of people who reach out around the world and do scamming. We know it. We even know where they are, but we don\\u2019t do anything directly. I think the difference would be those kinds of activities, if they rise to enough inconvenience, suddenly you get a strike on them. Either a cyber strike or a kinetic strike, and you say, we\\u2019re not putting up with that, and the host country refuses or is unable to do something about it, suddenly that\\u2019s a new dynamic because you\\u2019re violating national sovereignty to pursue things.&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:27:06]:&lt;br \\\/&gt;\\nBut yet, if you think that those nations are unwilling to do that, then you say that they don\\u2019t deserve their sovereignty if they\\u2019re unwilling to respect international law.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen [00:27:16]:&lt;br \\\/&gt;\\nSo with that thought for a moment, one thing I\\u2019ve observed and spoken to like ex-law enforcement folks is if I commit a cyber crime in a non-country that doesn\\u2019t have a treaty with the US or Australia or whoever, it\\u2019s hard to really go after. First of all, it\\u2019s hard to track them down, but then it\\u2019s really hard to do anything. Where does that\\u2014 what happens now? I can\\u2019t really bring them back and do something. There\\u2019s no treaty.&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:27:43]:&lt;br \\\/&gt;\\nYeah, that\\u2019s going to be, I think, a bold new frontier. You know, we just went and took the president of Venezuela out of his palace because he was doing things we didn\\u2019t like. Now, you could argue it was geopolitical, but our argument was he had done illegal things. I think the respect for national boundaries\\u2014 think of the predator strikes that occurred in sovereign countries inside places like Pakistan against terrorism, I think we could easily find an appetite grow for doing operations inside sovereign countries that are either unable or unwilling to take action, that we suddenly don\\u2019t respect national boundaries as much as before. I\\u2019m not advocating this because there\\u2019s a lot of complications that come with that. Once you violate national sovereignty, you take away from them their perceived responsibility to do it. They go, okay, if you\\u2019re going to go after people in my country, we\\u2019re not going to do that, we\\u2019re not going to help you. That\\u2019s a different relationship than the international community that we want.&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:28:50]:&lt;br \\\/&gt;\\nBut I think that once you get cyber activities that reach a level of damage, I think the appetite for that will be so great that it will force that. Now, I\\u2019d like to believe that international Alliances, United Nations, NATO, other places could be very helpful there because international law is critical here because we have the ability for crime to reach so far. And so international law, in my view, becomes increasingly important. And we\\u2019re not there yet, but I think we\\u2019ll get there. And I also think you described earlier, if someone does a cybercrime from country X and we identify them, You know, we still say, well, they\\u2019re guilty of cybercrime. They didn\\u2019t kill anyone. They didn\\u2019t hold a gun on someone. We almost put them in a different category, like white-collar crime.&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:29:40]:&lt;br \\\/&gt;\\nI think we\\u2019ll stop doing that. I think we\\u2019ll start saying it\\u2019s the impact that you create.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen [00:29:45]:&lt;br \\\/&gt;\\nDo you think from your experience, Stan, it\\u2019s better to go on the offensive or on the defensive? Good and bad to both, but I\\u2019m curious to hear your thoughts.&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:29:53]:&lt;br \\\/&gt;\\nObviously, what we\\u2019ve largely done is the defensive. We\\u2019ve done it imperfectly, but it\\u2019s getting better. Just people are becoming more resilient because more organizations get better at it and we can take a punch. I think there\\u2019s going to have to be a more aggressive offensive part, but it is going to have to be very controlled. I was with a corporation\\u2014 it\\u2019s been a decade now\\u2014 when they were exploring developing their own offensive capability against actors around the world. They stepped back and didn\\u2019t do it. But they were\\u2014 their theory was they would have the equivalent of mercenaries. And so anyone who came after their organization was going to be punished offensively.&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:30:35]:&lt;br \\\/&gt;\\nAnd again, they stopped. But I can understand the appetite for doing that. And I can understand, say, big banks get together and they say, we got to stop this stuff. And they decide to create or hire capabilities to do that because national governments are unwilling or unable. And they say, well, we\\u2019ve got to protect the international financial system. And they\\u2019re not wrong, but now you\\u2019ve created extralegal military or law enforcement capabilities. And again, that\\u2019s problematic.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen [00:31:07]:&lt;br \\\/&gt;\\nSo talking of problematic, what about now adding AI into the mix, accelerating a lot of these problems you discussed here today?&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:31:13]:&lt;br \\\/&gt;\\nYeah, we\\u2019re not ready for AI. It\\u2019s funny, we weren\\u2019t ready for social media. We got social media. We didn\\u2019t understand how powerful it would be, and it changed our society, and we\\u2019re still not mature enough to deal with it. We are polluting a lot of young people\\u2019s minds and whatnot. And what seemed like a good thing\\u2014 I didn\\u2019t see it coming\\u2014 has turned out to have a downside that\\u2019s so huge. I think AI is similar. We\\u2019re just, as mankind, we are not Maybe we are in the Prometheus phase.&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:31:47]:&lt;br \\\/&gt;\\nSomebody goes and takes fire and suddenly gives man fire and we\\u2019re not ready for it because we don\\u2019t have the rules in place. We have the whole idea of a capitalist economy is each person does their best. Now they operate hopefully within rules, but they do their best to get the most they can. And in an earlier age where you were reliant on your personal wits or your strength of your body The difference between you and I couldn\\u2019t be that much. In an AI world, the difference between you and I could be incalculable. And suddenly you could gather wealth, you can gather influence, you can gather power, and I could have none. You essentially can win Monopoly. You get everything on the first move of the game.&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:32:36]:&lt;br \\\/&gt;\\nAnd AI offers that potential for individuals, for companies, and for nations. And the problem is we\\u2019re still programmed to pursue that because, you know, you pursue in your best interest. And that has worked well in capitalist economies because it made people work hard and be effective. I don\\u2019t know that it works hard when suddenly people are empowered to a degree we never thought imaginable. And so I\\u2019m worried that we\\u2019re gonna get not just wealth inequality, we\\u2019re going to have inequality of everything to a massive scale. We\\u2019ll have a group of, a small group of empowered people who control everything. And we say, well, that\\u2019s not possible. Well, it is, I think.&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:33:25]:&lt;br \\\/&gt;\\nAnd at least I worry.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen [00:33:27]:&lt;br \\\/&gt;\\nI think it\\u2019s interesting. So we\\u2019re not ready for social media. Even if you look back to when the internet started and people are saying we\\u2019re not ready for that. How are governments, society, companies, private, public, whatever, going to police all of this? What I mean by that is if I go through a red light here, I\\u2019m going to get fined. There is repercussion. But hey, someone might think, well, I don\\u2019t like Chris Breen\\u2019s comment or the story that she\\u2019s written about Stan. So I\\u2019m going to say something horrible to her. There\\u2019s no real repercussions.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen [00:33:55]:&lt;br \\\/&gt;\\nOh, but it was online. So, and now we\\u2019re adding AI into it. So it\\u2019s like, well, you know, we could be fighting people with AI and all of the things. So it\\u2019s like, Are people going to start to become deluded in what\\u2019s real and what\\u2019s not real? What\\u2019s a fake world fabricated? Like, how do we find that line? Is there a line?&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:34:13]:&lt;br \\\/&gt;\\nI think they are already challenged by that. At least the people who are informed enough, they know that much of what they read is not true and it\\u2019s designed to influence. A lot of people still aren\\u2019t really aware, but increasingly they are. Whether I think there\\u2019s hope, and I\\u2019ve done some thinking about this, but I\\u2019m not an expert. The potential to use AI for governance. Because if you think about it, a lot of the problems in our governments are inefficiency, but also corruption and things. And we all believe a representative democracy is a good thing, but AI could do a lot of things to make things fair. If you create AI and set up rules and understanding, You say, we\\u2019re not going to do something that\\u2019s not fair.&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:35:02]:&lt;br \\\/&gt;\\nAnd you put policies in AI and it comes back and it says, that\\u2019s not fair. And suddenly it\\u2019s the equivalent of having wise men or women, you know, great people, the gods who say, okay, here are the rules and the road. Now the danger there is it\\u2019s almost like an old science fiction movie or something where you have this machine that gives everybody the rules. But perhaps we could use AI to take some of the uncertainty and foolishness out of what we see. What if AI fact checks everything that politicians say and do? And then suddenly, in a best case, what that would do, it would be a shaping to stop them from lying. Because every time they talk, if a red light\\u2019s going off over their shoulder that says this person\\u2019s lying, boom, It\\u2019s hard on them. If we could use it for things like that, then there\\u2019s some potential that we shape ourselves into better behavior. You hope we don\\u2019t become lab rats that only do what the machine tells us to do, but we need something that brings us back to what is true.&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:36:13]:&lt;br \\\/&gt;\\nRemember the old alternate facts kind of thing? We\\u2019ve got to have something that says, no, there aren\\u2019t alternate facts, there are facts. There are interpretations, and We accept that, but some things are true, some things are not true.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen [00:36:26]:&lt;br \\\/&gt;\\nSo then on that note, and maybe to conclude today\\u2019s interview, do you think given everything you talked about with there\\u2019ll be a few players that own the power and the distribution, do you think those companies, people, whoever will use that AI for their advantage or to disadvantage people? So like you said, it actually could be used for good and maybe it gets distributed evenly. Or do you think perhaps these people, these companies would be more selfish in looking after themselves? So therefore there\\u2019s only the top 10% and the rest is a huge polarization.&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:36:57]:&lt;br \\\/&gt;\\nI think what we\\u2019re already seeing is they use it for themselves, for individuals and for the power of corporations. I mean, if you look at some of the conduct of some of the major entities, at the end of the day, they\\u2019re about survival and profitability of the entity. And they\\u2019ve got a lot of verbiage and narrative that says trying to make the world a better place, but they\\u2019re making it very much better for them. And a little bit theoretically better for everyone else. And then you look at the oligarchs, and I use the term pejoratively, intentionally. We have created a class of absurdly wealthy people who live absurdly wealthy lifestyles. And I don\\u2019t believe that\\u2019s healthy for any society. I think that, I think that\\u2019s not sustainable in a healthy way long term.&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:37:52]:&lt;br \\\/&gt;\\nAnd so that\\u2019s either going to get worse if it\\u2019s not addressed, or we\\u2019re going to have some kind of climactic crash-up about it.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen [00:38:00]:&lt;br \\\/&gt;\\nAnd then lastly, Stan, what would you like to leave our audience with today? Perhaps one takeaway that you\\u2019re thinking about.&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:38:06]:&lt;br \\\/&gt;\\nI think we need to think broadly about cyber. Nuclear weapons emerged at the end of the Second World War, but it took about 15 years before a doctrine of nuclear weapons really emerged where people started to say, okay, a bunch of people have the ability to destroy the world. How are we going to manage these? How are we going to think about them? And you started to have the doctrine of mutually assured destruction and mutual deterrence, all those things which people hate, but they were actually necessary adaptations to the reality that a small group of nations could destroy the world at any moment. And it worked. We need the equivalent for the march of technology, because first it was cyber information technology, and I would argue that that got ahead of us. And now artificial intelligence. We are going to need to develop a doctrine of thought, common understanding, what\\u2019s right, what\\u2019s wrong, what\\u2019s not allowed. And we\\u2019re going to have to do it pretty quickly.&lt;\\\/p&gt;\\n&lt;p&gt;Stan McChrystal [00:39:14]:&lt;br \\\/&gt;\\nAnd it\\u2019s not just a few legal rules. It is you know, how we think broadly about it. And so society\\u2019s got to mature faster than we have been maturing.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen [00:39:26]:&lt;br \\\/&gt;\\nAnd there you have it. This is KB On The Go. Stay tuned for more.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 6, 2026&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/from-the-simspace-summit-2026-kb-on-the-go-rushell-hopkins-and-stanley-mcchrystal-part-2&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2384066\\\/c1e-m1o3c4zjw0swqkqp-xx79g123a8j1-38onma.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;39:33&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1772773221,&quot;key&quot;:&quot;d00f451f7f84e799b5b0388b404f5e29&quot;},&quot;ppe-4514-10&quot;:{&quot;title&quot;:&quot;From The SimSpace Summit 2026 \\u2013 KB On The Go | Peter Lee and Ernie Ferraresso (Part 1)&quot;,&quot;description&quot;:&quot;&lt;p&gt;Cybersecurity is hitting a breaking point. Compliance checklists, tabletop exercises and confidence claims aren\\u2019t enough anymore, especially as AI accelerates both attack and defense. In this bonus episode, KB sits down with Peter Lee, Chief Executive Officer and President of SimSpace, and Ernie Ferraresso, Senior Director of Cyber Florida. Together they discuss cyber readiness and why Florida treats cyber like a mission.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;&lt;a href=\\&quot;https:\\\/\\\/www.linkedin.com\\\/in\\\/peter-lee-8a022011\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Peter Lee, Chief Executive Officer and President of SimSpace&lt;\\\/a&gt;&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Peter serves as the Chief Executive Officer and President of SimSpace, the realistic, intelligent cyber range that strengthens teams, technologies, and processes to outsmart adversaries before the fight begins.&lt;\\\/p&gt;\\n&lt;p&gt;Previously, Peter was co-founder and CEO of DataSynapse, an infrastructure software company acquired by TIBCO; and CEO of RapidMiner, an open source machine learning platform acquired by Altair. At TIBCO, Peter served as Executive Vice President responsible for multiple businesses including the security, cloud computing, B2B, CX, and analytics product groups. Before launching his career in software, Peter was a strategy consultant with Deloitte and an investment banker with JP Morgan.&lt;\\\/p&gt;\\n&lt;p&gt;Peter has extensive Board experience collaborating with top tier investors to grow innovative software companies, serving as Chairman for Attivio (acquired by ServiceNow), WorldQuant Predictive, and ActiveState, and as Director for Ektron (acquired by Accel-KKR), Vesta (acquired by TINT), Infomatix (acquired by EPAM), OpenAssemby (acquired by Fulcrum), BlogTalkRadio (acquired by iHeartRadio), Entrio and Chattermill. Peter also serves on the investment committees of Advanced Finance &amp; Investment Group and Communitas Capital Partners.&lt;\\\/p&gt;\\n&lt;p&gt;Peter graduated from Harvard College with an AB degree in Government (cum laude), received an MBA degree from The Wharton School in Entrepreneurial Management and an MA degree from The University of Pennsylvania in International Affairs.&lt;\\\/p&gt;\\n&lt;p&gt;Peter has been invited twice to speak at the World Economic Forum in Davos and four times at The Milken Institute Global Conferences in LA and Singapore, explaining the impact of AI in terms of its business value and key use cases. Peter is a former Board member of Upwardly Global, alumnus of YPO and a member of the Development Board for Phillips Academy Andover.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;a href=\\&quot;https:\\\/\\\/www.linkedin.com\\\/in\\\/ernestferraresso\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;&lt;strong&gt;Ernie Ferraresso, Senior Director of Cyber Florida&lt;\\\/strong&gt;&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&lt;p&gt;As the senior director of Cyber Florida, Ernie drives the organization\\u2019s strategic vision while overseeing the center\\u2019s day-to-day operations. He started with Cyber Florida in 2017 as associate director of programs and partnerships and brings decades of technology expertise and leadership experience to his role.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to Cyber Florida, Ernie worked for a small technology design and integration firm as the Director of Operations, overseeing the design and implementation of cybersecurity and emergency operations center technology solutions in the U.S. and throughout Latin America.&lt;\\\/p&gt;\\n&lt;p&gt;He is a retired U.S. Marine Intelligence Officer who served in the U.S. and abroad. His work included assignments with the U.S. Special Operations Forces, the intelligence community, the George C. Marshall European Center for Security Studies, and U.S. Cyber Command.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 5, 2026&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/from-the-simspace-summit-2026-kb-on-the-go-peter-lee-and-ernie-ferraresso-part-1&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2382290\\\/c1e-d5v7aokop7cpd4gq-kpj8znmriq4d-avxgmn.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;49:25&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1772686854,&quot;key&quot;:&quot;846723dd0ff3a3a0d96f9d6d8c0e470a&quot;},&quot;ppe-4514-11&quot;:{&quot;title&quot;:&quot;Episode 357 Deep Dive: James Tennant | Why does AUKUS Need Sovereign Capital?&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with James Tennant, Partner and Head of JAPAC at Boka Capital, as he discusses why AUKUS needs sovereign capital to successfully deliver on its strategic ambitions. James explores the disparity between the headline-grabbing investments of AUKUS Pillar 1 and the overlooked capital shortfalls of Pillar 2, emphasizing the urgent need to build a unified capital architecture across Australia, the UK, and the US. He highlights the challenges faced by defense technology startups, such as the \\u201cvalley of death\\u201d funding gap and ESG constraints that lock out institutional investment, and draws valuable lessons from international examples like In-Q-Tel and Israel\\u2019s Yozma. Throughout the conversation, James argues for a coordinated sovereign capital framework, increased public education about dual-use technologies, and transparent government action to move from strategic announcements to real capital deployment, ensuring AUKUS can compete effectively on a global stage.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;James Tennant, Partner \\u2013 Head of JAPAC, BOKA Capital&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;James Tennant is a Fellow with ASPI\\u2019s Cyber, Technology and Security Program and a Partner at BOKA Capital, a leading AUKUS Investment House in London, Sydney and New York.&lt;\\\/p&gt;\\n&lt;p&gt;His key role at BOKA is complemented by his service as an Officer in the Australian Army, where he specialises in Capability Development. He is also a Senior Partner at Gilmour Space Technologies, an Australian-based rocket company innovating in the field of low-cost small satellite launch vehicles.&lt;\\\/p&gt;\\n&lt;p&gt;James is a seasoned investor and corporate leader with deep interests and investments in diverse fields such as Quantum, Artificial Intelligence, Space, CyberSec, Machine Learning, Internet of Things, Drones, Enterprise Infrastructure, and Autonomous Vehicles. His professional journey, spanning across different continents and industries, uniquely positions him at the intersection of finance, defence, and technology including artificial intelligence.&lt;\\\/p&gt;\\n&lt;p&gt;James holds a Bachelor of Commerce degree with a specialisation in International Business from the University of Sydney, is a Graduate of Applied Finance at Macquarie University, and holds management courses in Private Equity and Venture Capital from Harvard Business School. He has also completed the Company Directors Course at the Australian Institute of Company Directors.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 4, 2026&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-357-deep-dive-james-tennant-why-does-aukus-need-sovereign-capital&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2381226\\\/c1e-kdkxsd4gz6c941jo-kpj83ddrad9n-zyhi4e.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:18&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1772600405,&quot;key&quot;:&quot;166c1e7a09d886f1d97718000aae964e&quot;},&quot;ppe-4514-12&quot;:{&quot;title&quot;:&quot;Episode 356 Deep Dive: Simon Hodgkinson | The Burnout Crisis in the Cybersecurity Community&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Strategic Advisor at Semperis, as he shares his personal experience with burnout during his tenure as CISO at BP. Simon provides a candid look into the immense pressures and responsibilities of overseeing cybersecurity across a massive, global organisation, highlighting the challenges of balancing work with personal well-being and family life. He discusses the emotional toll of always being \\u201con,\\u201d the importance of transparent communication about risks, and the necessity of setting clear boundaries\\u2014what he calls \\u201cred lines\\u201d\\u2014to safeguard health and relationships. Simon also reflects on the industry-wide burnout crisis, the tendency for CISOs to prioritize work over their own needs, and the critical role of organisational support and personal maturity in sustaining a long career in cybersecurity leadership.&lt;\\\/p&gt;\\n&lt;p&gt;Simon Hodgkinson is a Strategic Advisor at cybersecurity firm Semperis, and a former Chief Information Security Officer at multinational energy company BP. In his 18 year tenure at BP, Simon held several senior IT leadership roles and was responsible for the company\\u2019s cybersecurity strategy, governance, architecture, education, counter threat operations, and incident response. \\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;During this time, he drove a significant improvement in IT operational integrity, led a transformation\\u00a0program\\u00a0and spearheaded the commitment to improve employees\\u2019 IT experience. He led the CISO function in\\u00a0BP\\u00a0Supply &amp; Trading, where he delivered a program to improve cyber-controls, many of which have been implemented across the\\u00a0BP\\u00a0group. Before joining bp, Simon worked in IT for a dotcom, an investment bank, and commercial software companies&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 25, 2026&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-356-deep-dive-simon-hodgkinson-the-burnout-crisis-in-the-cybersecurity-community&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2373197\\\/c1e-5k0vb7g3gms0xmvo-okpdg1qnij0z-n3sozh.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;41:56&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1771995624,&quot;key&quot;:&quot;3fdc138e646c11b64d4d575da5cff6da&quot;},&quot;ppe-4514-13&quot;:{&quot;title&quot;:&quot;Episode 355 Deep Dive: Sam Cummings | Will we see current LLM technology reach it&#8217;s limits in 2026?&quot;,&quot;description&quot;:&quot;&lt;p&gt;Samuel J. Cummings III is an award-winning data scientist, keynote speaker, and renowned thought leader in AI, specializing in complex reasoning and memory architecture. In his recent work he has created AI model architecture that runs 94% less tokens than standard LLMs. As Director of Education at Gen AI Works, Sam brings over a decade of expertise in AI and runs a podcast called Gen AI Talks.&lt;\\\/p&gt;\\n&lt;p&gt;In this episode, we sit down with Sam Cummings, Director of Education at Gen AI Works, as he explores the current and future landscape of large language models (LLMs) and their impact on cybersecurity. Sam unpacks the technical and economic limitations of LLMs, highlighting issues such as model cost, scalability, hallucination, and the looming challenges around reasoning and memory management. The conversation delves into the shift from universal LLMs to specialized models, the inevitability of market monopolization by big tech firms, and the environmental cost of massive data centers. Sam also paints a vivid picture of the \\u201carms race\\u201d in the cybersecurity sector, predicting a boom in both offensive and defensive capabilities powered by AI, and offers actionable insights for professionals and entrepreneurs looking to thrive in this rapidly-evolving environment.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 18, 2026&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-355-deep-dive-sam-cummings-will-we-see-current-llm-technology-reach-its-limits-in-2026&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2365567\\\/c1e-vzj8a5rno5awz1vk-6z9npj72aogq-a2g6sm.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;52:55&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1771390836,&quot;key&quot;:&quot;e2e1246adb0bd1e47b7a9a222b111fcf&quot;},&quot;ppe-4514-14&quot;:{&quot;title&quot;:&quot;Episode 354 Deep Dive: Lili Infante | The Growing Prevalence of Crime in the Crypto Space&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Lili Infante, CEO of CAT Labs, as she discusses the evolving landscape of crime in the crypto space and her work combating crypto-enabled criminal activity. Lili, drawing from her experience as a former DOJ and DEA agent who pioneered the DEA Cyber Investigations Task Force, explains the rise of crypto as both a tool for criminals and a unique opportunity for law enforcement due to its traceability. She highlights the challenges surrounding self-custody private keys, the increased risks and opportunities for asset seizure, and the emerging insider threat within law enforcement agencies handling crypto evidence. Lili also shares her perspective on regulatory debates between banks and crypto exchanges, the necessity for policy grounded in technological understanding, and the innovations CAT Labs is bringing to government agencies, including tools for key management, data scanning, and digital asset recovery.&lt;\\\/p&gt;\\n&lt;p&gt;Lili Infante is the CEO and Founder of CAT Labs, a technology company helping government agencies find, seize and secure illicit cryptocurrency assets hidden in their seized evidence.&lt;\\\/p&gt;\\n&lt;p&gt;As a former DEA Special Agent, she pioneered the first federal task force focused on Dark Web and crypto investigations, leading landmark cases including the takedown of Hydra Market, the world\\u2019s largest dark-web marketplace. Her work has earned national awards for cybercrime investigation and helped establish the investigative and policy frameworks now used by law-enforcement agencies worldwide.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 11, 2026&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-354-deep-dive-lili-infante-the-growing-prevalence-of-crime-in-the-crypto-space&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2354536\\\/c1e-5k0vb7z7q3a0xmvo-5z3z110wcmk9-s4llry.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;45:54&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1770786052,&quot;key&quot;:&quot;107466330ba2a618be0b0d7839836572&quot;},&quot;ppe-4514-15&quot;:{&quot;title&quot;:&quot;Episode 353 Deep Dive: River Nygryn | Trust, Test, Transform: Executive Playbook for AI Leadership&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with River Nygryn, CISO and AI thought leader, as she explores the critical concepts outlined in the executive playbook for AI leadership: Trust, Test, and Transform. River provides a comprehensive overview of AI\\u2019s evolution\\u2014from its historical roots in early automated machines and neural networks to the development of large language models (LLMs) and generative assistants. She emphasizes the importance of \\u201ctrust but verify\\u201d in deploying AI, warning against overreliance and the risk of diminishing critical thinking skills. River introduces the 4Ds\\u2014dull, dangerous, difficult, and dirty work\\u2014where AI delivers the greatest value, and cautions about the loss of creativity and authenticity with widespread use of AI-generated content. She encourages organizations to leverage their unique data sets, underscoring that human judgment and oversight are essential for harnessing AI\\u2019s transformative opportunities.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;River&lt;\\\/strong&gt; is a visionary cybersecurity and technology leader with a dynamic career spanning traditional banking, cutting-edge blockchain innovation, and Web3 transformation. As a Chief Information Security Officer (CISO) and fractional C-suite executive, River has driven security and operational excellence across highly regulated industries, including healthcare, financial services, and emerging tech.&lt;\\\/p&gt;\\n&lt;p&gt;Renowned for bridging the gap between strategic leadership and hands-on execution, River has played a pivotal role in modernising risk and security frameworks, scaling secure systems, and advising on crypto, digital asset infrastructure, and decentralized technologies. Her influence extends beyond the boardroom \\u2013 she is a powerful voice in the tech community, advocating for digital trust, innovation, and ethical leadership in the AI era.&lt;\\\/p&gt;\\n&lt;p&gt;In 2025, River was named one of &lt;em&gt;The CEO Magazine\\u2019s&lt;\\\/em&gt; &lt;strong&gt;Top 50 Women of Influence&lt;\\\/strong&gt;, recognised not only for her technical expertise but for her commitment to shaping a more secure and inclusive digital future. She is a sought-after speaker, frequently appearing on stage at leading conferences, panels, and keynotes to share insights on cybersecurity resilience, leadership, and the evolving Web3 landscape.&lt;\\\/p&gt;\\n&lt;p&gt;With a storytelling style that blends bold insights with deep reflection, River continues to inspire the next generation of cyber leaders and disruptors.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 4, 2026&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-353-deep-dive-river-nygryn-trust-test-transform-executive-playbook-for-ai-leadership&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2347036\\\/c1e-d5v7aordzkfpd4gq-47o4on48fj6z-eh0wdw.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;38:07&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1770181225,&quot;key&quot;:&quot;304b89be622c74e44fe7eb58504834a1&quot;},&quot;ppe-4514-16&quot;:{&quot;title&quot;:&quot;Episode 352 Deep Dive: Alex Loizou | The Human Impact of a Cyber Incident&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Alex Loizou, Managing Director at Intrinsic Security and former CISO of Medibank, as he shares firsthand insights into the human impact of navigating a major cyber breach. Alex walks us through the initial moments of discovery, the emotional and psychological toll on teams, and the importance of staying calm under pressure. He dives into Medibank\\u2019s approach to incident response, including the use of multiple IR partners for comprehensive investigations and the challenges of coordinating large incident teams in real time. The conversation highlights the value of practical, repeated exposure to incident scenarios, the pitfalls of \\u201cambulance chasing\\u201d in the security industry, and the vital role of transparent, evidence-based communication during sensitive events. Alex emphasizes lessons learned about organisational preparedness, collaboration across the cybersecurity community, and the importance of building strong relationships with external media and government agencies.&lt;\\\/p&gt;\\n&lt;p&gt;Alex Loizou is a seasoned cybersecurity leader with a proven track record of building and leading high-performing security teams. He has extensive experience as a Chief Information Security Officer (CISO) for major organisations such as Medibank, Flybuys, and Bupa. Notably, he served as the CISO at Medibank during their 2022 cyber incident, where he played a crucial role in leading the response and recovery efforts.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 28, 2026&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-352-deep-dive-alex-loizou-the-human-impact-of-a-cyber-incident&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2340159\\\/c1e-gkvqbrgm1oh249gq-250mpd5waq5m-oxwom6.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;41:44&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1769576453,&quot;key&quot;:&quot;887fef91f86081450273e9b71e860d58&quot;},&quot;ppe-4514-17&quot;:{&quot;title&quot;:&quot;Episode 351 Deep Dive: Tammy Klotz | Leading with Empathy and Grace&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Tammy Klotz, cybersecurity and IT executive and author of &lt;em&gt;&lt;a href=\\&quot;https:\\\/\\\/www.amazon.com\\\/Leading-Empathy-Grace-Developing-Performing\\\/dp\\\/1950336573\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Leading with Empathy and Grace&lt;\\\/a&gt;,&lt;\\\/em&gt;\\u00a0as she explores the critical role of intentional empathy in leadership. Tammy unpacks the misconception that empathy and accountability are opposites, arguing they are essential partners for building trust within teams. She discusses the impact of technology on our ability to be present, the importance of transparency during organizational challenges, and the pitfalls of viewing empathy as a \\u201csoft skill\\u201d in cybersecurity. Tammy also addresses how leaders can be more intentional in their interactions, foster stronger human connections despite remote and hybrid work environments, and why self-care is foundational for personal and professional success.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Tammy Klotz&lt;\\\/strong&gt; is a vibrant and accomplished executive and best-selling author with over three decades of diverse experience in the manufacturing industry, specializing in cybersecurity and transformational leadership. She offers keen expertise in navigating mergers, acquisitions, and divestitures within both publicly-traded and privately-held companies and is seasoned in security, risk, and compliance leadership. Tammy brings a dynamic and positive approach to problem solving, excelling in simplifying intricate IT and cybersecurity concepts and facilitating pragmatic, non-technical dialogues that resonate with business executives. She is recognized as a strong, knowledgeable, thoughtful security executive who excels in public speaking and thought leadership, striving to empower others through knowledge sharing.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 21, 2026&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-351-deep-dive-tammy-klotz-leading-with-empathy-and-grace&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2331443\\\/c1e-3g92cwr66qskq027-rk247dooamww-hao3aj.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;42:18&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1768971633,&quot;key&quot;:&quot;e967402f5e619f854796552a4d60a975&quot;},&quot;ppe-4514-18&quot;:{&quot;title&quot;:&quot;Episode 350 Deep Dive: George Barnes | Journey from the NSA to the Private Sector&quot;,&quot;description&quot;:&quot;&lt;p&gt;Mr. George C. Barnes is the President of Red Cell Partner\\u2019s Cyber Practice and a Partner at the firm. In this role, he oversees the pursuit of new-start incubations that are focused on cybersecurity opportunities spanning commercial and government sectors.\\u202fHe ensures optimized market\\u202fgap\\u202fresponsiveness of new incubations and guides Red Cell\\u2019s platform team support as young cybersecurity companies\\u202fprogress through their\\u202fearly-stage business life cycles.\\u202fAs a Red Cell Partner, Mr. Barnes applies his\\u202fnational security and cybersecurity domain expertise\\u202fto Red Cell\\u2019s incubation activities and oversees the company\\u2019s overall cyber-related investment strategy.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to joining Red Cell, Mr. Barnes served as the Deputy Director and senior civilian leader of the U.S. National Security Agency (NSA) from April 2017 through September 2023. In this role, Mr. Barnes served as NSA\\u2019s chief operating officer, overseeing strategy, policy, and operations.\\u202f As an agency deputy in the U.S. national security system, Mr. Barnes supported the U.S. defense and intelligence enterprise in national security strategy execution and the formulation of supporting policies.\\u202f He positioned NSA as an integrated mission partner enabling U.S. decision advantage and security against foreign threats.&lt;\\\/p&gt;\\n&lt;p&gt;Over his 36-year career at the NSA, Mr. Barnes held numerous\\u202ftechnical and organizational leadership roles spanning intelligence collection operations, intelligence target analysis, foreign liaison and industrial partnership management, workforce support, and global enterprise governance.&lt;\\\/p&gt;\\n&lt;p&gt;U.S. Government Service Recognition Includes:&lt;\\\/p&gt;\\n&lt;p&gt;Department of Defense Distinguished Civilian Service Medal&lt;\\\/p&gt;\\n&lt;p&gt;Joint Chiefs of Staff Joint Meritorious Civilian Service Medal&lt;\\\/p&gt;\\n&lt;p&gt;National Intelligence Distinguished Service Medal&lt;\\\/p&gt;\\n&lt;p&gt;Under Secretary of Defense for Intelligence &amp; Security Distinguished Service Medallion&lt;\\\/p&gt;\\n&lt;p&gt;National Security Agency Distinguished Civilian Service Medal&lt;\\\/p&gt;\\n&lt;p&gt;Central Intelligence Agency Seal Medal&lt;\\\/p&gt;\\n&lt;p&gt;National Reconnaissance Office Medal of Distinguished Performance&lt;\\\/p&gt;\\n&lt;p&gt;National Geospatial Intelligence Agency Medallion for Excellence&lt;\\\/p&gt;\\n&lt;p&gt;National Intelligence Medal of Achievement&lt;\\\/p&gt;\\n&lt;p&gt;Distinguished Executive Presidential Rank Award&lt;\\\/p&gt;\\n&lt;p&gt;Meritorious Executive Presidential Rank Awards (2)&lt;\\\/p&gt;\\n&lt;p&gt;Mr. Barnes received a Bachelor of Science in Electrical Engineering from the University of Maryland in 1986. In 2020, he was honored as a Distinguished Alumni by the University\\u202fof Maryland\\u2019s College of Electrical and Computer Engineering.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 14, 2026&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-350-deep-dive-george-barnes-journey-from-the-nsa-to-the-private-sector&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2322516\\\/c1e-89g7fv77qnf1d8wj-jpqj0vx8sr79-6syihw.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:08&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1768366706,&quot;key&quot;:&quot;94ef2b866467d2b46e8a6a043baf70a7&quot;},&quot;ppe-4514-19&quot;:{&quot;title&quot;:&quot;From 2020Partners 2025 \\u2013 KB On The Go | Paul Maddison and Jeff Lindholm (Part 2)&quot;,&quot;description&quot;:&quot;&lt;p&gt;The 2020 Partners Dialogue sits at the edge of possibility, where security meets technological ambition. In this special bonus episode, KB explores how nations can move beyond simply consuming innovation to actively co-creating strategic dominance. Anchored by AUKUS and empowered by cross-sector collaboration, this conversation features insights from industry leaders Paul Maddison (Australia &amp;New Zealand Country Manager, Strider Technologies) and Jeff Lindholm (Chief Revenue Officer at Lookout).&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Paul Maddison, Australia &amp; New Zealand Country Manager, Strider Technologies&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Paul Maddison is the Australia &amp; New Zealand Country Manager at Strider Technologies, where he is responsible for leading Strider\\u2019s market expansion and strategic partnerships with Australian universities, corporations, and governments.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to joining Strider, Paul worked at the University of New South Wales in Sydney and Canberra as Director of the UNSW Defence Research Institute. This was preceded by a four-year appointment as\\u00a0 Canada\\u2019s High Commissioner for Australia. Paul also spent over 35 years in Canadian naval service. As a surface warfare officer, he commanded at all levels culminating in his appointment as Commander of the Royal Canadian Navy at the rank of Vice&lt;br \\\/&gt;\\nAdmiral. A graduate of Canada\\u2019s Royal Military College, and a dual national since 2020, Paul is from Canada but has chosen to make Australia his home.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Jeff Lindholm, Chief Revenue Officer at Lookout&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;As the Chief Revenue Officer at Lookout, Jeff oversees all aspects of the company\\u2019s global sales, including the Americas, EMEA, and APAC regions, as well as Channel Sales, Commercial Sales and Sales Engineering. He brings a wealth of experience in networking and security sales leadership, having previously served as President and CEO of Plixer, a company focused on network traffic analysis and visibility solutions. Before that, Jeff led sales operations at both Brocade and Juniper Networks. As the Senior Vice President of Worldwide Sales at Brocade, he oversaw a $2.5 billion global sales operation until the company\\u2019s acquisition by Broadcom Inc. At Juniper Networks, he served as Chief Revenue Officer, managing $2.5 billion in revenue.\\u201d He has also held significant global sales roles at Arbor Networks (the security division of NETSCOUT) and BigBand Networks. Jeff is based in Boston and holds a Bachelor of Science in Marketing from the Carroll School of Management at Boston College.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 9, 2026&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/from-2020partners-2025-kb-on-the-go-paul-maddison-and-jeff-lindholm-part-2&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2318140\\\/c1e-m1o3cqrp6ztwqk4n-kpj2v5kmbog-mjtga9.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;42:49&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1767934823,&quot;key&quot;:&quot;f8eb46ee4dd614c1e167ff41ec70c1f7&quot;},&quot;ppe-4514-20&quot;:{&quot;title&quot;:&quot;From 2020Partners 2025 \\u2013 KB On The Go | Neha Idnani, James Tennant, and Simon Hodgkinson (Part 1)&quot;,&quot;description&quot;:&quot;&lt;p&gt;The 2020 Partners Dialogue sits at the edge of possibility, where security meets technological ambition. In this special bonus episode, KB explores how nations can move beyond simply consuming innovation to actively co-creating strategic dominance. Anchored by AUKUS and empowered by cross-sector collaboration, this conversation features insights from industry leaders Neha Idnani (Regional Vice President \\u2013 APAC, Eutelsat OneWeb), James Tennant (Partner \\u2013 Head of JAPAC, BOKA Capital), and Simon Hodgkinson (Strategic Advisor at Semperis).&lt;\\\/p&gt;\\n&lt;p&gt;Neha delves into the significance of operating one of only two global LEO satellite constellations, emphasizing how satellite networks power resilient connectivity, complement terrestrial infrastructure, and enable sovereign national capabilities amid rising geopolitical tensions. James offers a global investment perspective, highlighting how Australia and other key regions are rapidly adapting to strategic defense imperatives, the challenge of nurturing deep-tech startups, and the necessity of scaling defense technology within complex regulatory frameworks. Simon rounds out the discussion with expert insights on cybersecurity, examining the impact of economic uncertainty, increased insider risk during major corporate events and layoffs, and the criticality of robust cyber operations\\u2014even as organizations strive to balance resource constraints and work-life demands.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Neha Idnani, &lt;\\\/strong&gt;&lt;strong&gt;Regional Vice President \\u2013 APAC, Eutelsat OneWeb&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Neha Idnani is an accomplished leader in the Technology, Media, and Telecom (TMT) sector, currently serving as the Regional Vice President for APAC at Eutelsat OneWeb. With over 18 years of experience across the telecom, space, and infrastructure industries, she leads the Asia Pacific and ANZ business for Eutelsat Group, the world\\u2019s first multi-orbit satellite connectivity provider. Prior to her current role, she spent over a decade with Bharti Enterprises and Bharti Airtel, notably serving as Vice President and Chief of Staff to the Chairman\\u2019s Office. In that capacity, she managed multi-billion dollar fundraising transactions and drove significant global expansion initiatives.&lt;\\\/p&gt;\\n&lt;p&gt;Beyond her corporate leadership, Neha is deeply involved in industry governance and the arts. She serves as a Board Director for OneWeb Communications India, is a Founding Member of the Indian Space Association (ISpA), and acts as a Board Trustee for Improbable, a UK-based non-profit. Academically, she holds an MBA from NMIMS, Mumbai, and a Bachelor\\u2019s in Commerce (Honours) from Shri Ram College of Commerce (SRCC), Delhi University. Throughout her career, she has remained a passionate advocate for driving the future of global connectivity through innovation and strategic collaboration.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;James Tennant, Partner \\u2013 Head of JAPAC, BOKA Capital&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;James Tennant is a Fellow with ASPI\\u2019s Cyber, Technology and Security Program and a Partner at BOKA Capital, a leading AUKUS Investment House in London, Sydney and New York.&lt;\\\/p&gt;\\n&lt;p&gt;His key role at BOKA is complemented by his service as an Officer in the Australian Army, where he specialises in Capability Development. He is also a Senior Partner at Gilmour Space Technologies, an Australian-based rocket company innovating in the field of low-cost small satellite launch vehicles.&lt;\\\/p&gt;\\n&lt;p&gt;James is a seasoned investor and corporate leader with deep interests and investments in diverse fields such as Quantum, Artificial Intelligence, Space, CyberSec, Machine Learning, Internet of Things, Drones, Enterprise Infrastructure, and Autonomous Vehicles. His professional journey, spanning across different continents and industries, uniquely positions him at the intersection of finance, defence, and technology including artificial intelligence.&lt;\\\/p&gt;\\n&lt;p&gt;James holds a Bachelor of Commerce degree with a specialisation in International Business from the University of Sydney, is a Graduate of Applied Finance at Macquarie University, and holds management courses in Private Equity and Venture Capital from Harvard Business School. He has also completed the Company Directors Course at the Australian Institute of Company Directors.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Simon Hodgkinson, Strategic Advisor, Semperis&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Simon is an experienced technology leader who has worked in the software sector, financial services, energy sector and has worked in a financial services startup company.&lt;\\\/p&gt;\\n&lt;p&gt;Simon is currently a Strategic Advisor at cybersecurity firm Semperis, and prior to this, he spent 18 years working for BP in a variety of global roles, the last being CISO. Simon transformed BP\\u2019s cyber security with a strategy of embedding security to simplify and accelerate adoption. Simon advised the BP board and has shared his expertise on numerous technology and diversity forums.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to the CISO role, Simon was the VP of Infrastructure and Integration Services where he initiated the programme to move BP to the cloud, significantly improving time to market and user experience. Simon was accountable for a complex technology infrastructure in 80 countries, supporting 75,000 users across 600 offices and included critical national infrastructure.&lt;\\\/p&gt;\\n&lt;p&gt;Simon has led globally diverse teams in excess of 500, an annual budget in excess of $0.5bn and has negotiated and managed significant outsourced contracts. His brand is building highly inclusive, capable and successful technical teams, leading with empathy and performance edge.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 7, 2026&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/from-2020partners-2025-kb-on-the-go-neha-idnani-james-tennant-and-simon-hodgkinson-part-1&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2316702\\\/c1e-m1o3cqr7kqiwqk4n-kpj247nzc4rg-xfwhwz.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;01:04:09&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1767762021,&quot;key&quot;:&quot;62c84f004d1b4cfcf3a4940eb033f581&quot;},&quot;ppe-4514-21&quot;:{&quot;title&quot;:&quot;Episode 349 Deep Dive: Mike Worth | Why Legal SMBs Overlook Cybersecurity&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Mike Worth, Founder of Indi-tech Consultancy, as he unpacks the unique cybersecurity challenges facing small and medium-sized legal firms. Mike highlights a major misconception in the industry\\u2014treating cybersecurity solely as an IT problem rather than a broader business risk\\u2014and explains why investing in the human aspect of cybersecurity is more effective than relying on tools alone. He discusses the billable hours mindset prevalent in professional services, the opportunity cost of security training, and the importance of creating a positive, engaging, and competitive security culture tailored to staff demographics. Mike also shares insights into common pitfalls SMBs face, such as overspending on ineffective security tools, gaps in cyber insurance coverage, and the pitfalls of generic training programs. He closes with actionable advice on building a resilient cybersecurity culture, measuring progress through behaviour-based metrics, and fostering open, honest risk discussions within the organisation.&lt;\\\/p&gt;\\n&lt;p&gt;Mike is a proud Londoner now living in Hampshire, UK. He has worked across various industries covering local and central Government, manufacturing and more recently 11 years of Legal professional services as an IT professional.&lt;\\\/p&gt;\\n&lt;p&gt;Mike\\u2019s passion has recently seen him start his own IT consultancy targeting support for SMB\\u2019s on Cyber security &amp; virtual IT management.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 2, 2026&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-349-deep-dive-mike-worth-why-legal-smbs-overlook-cybersecurity&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2310758\\\/c1e-41r8c1p0o2bopgxk-v6p8kpwoh86r-vdbc0z.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;35:26&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1767329975,&quot;key&quot;:&quot;7424c02c049c62e645400ce734a1e28e&quot;},&quot;ppe-4514-22&quot;:{&quot;title&quot;:&quot;Episode 348 Deep Dive: Alex Tilley | DPRK IT Workers Go Global&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Alex Tilley, Global Threat Research Coordinator at Okta, as he unpacks the evolving threat landscape posed by North Korean IT workers infiltrating global organizations. Alex shares insights from his recent research, emphasizing that this is not just a US big tech problem but a widespread issue affecting various industries\\u2014including healthcare, automotive, and construction\\u2014across multiple countries. He highlights the sophistication of fake applicants, their use of advanced techniques to bypass hiring filters, and the alarming success rate, even if only for short periods. The conversation explores the challenges companies face in verifying remote candidates, the necessity for ongoing identification checks, and the implementation of least privilege access for new hires.&lt;\\\/p&gt;\\n&lt;p&gt;Alex Tilley is a Cyber Intelligence and investigation guy with over 25 years of experience spanning the private sector and federal law enforcement. As the Australian Federal Police\\u2019s first Senior Cybercrime Senior Technical Analyst, he specialised in unmasking and prosecuting sophisticated threat actors in global cybercrime and child protection. In his current role as Global Threat Research Coordinator at Okta, he leads law enforcement liaison efforts and drives critical threat research for the world\\u2019s leading identity company.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 24, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-348-deep-dive-alex-tilley-dprk-it-workers-go-global&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2303777\\\/c1e-z9w7f70pvofokrwj-xxgqrdzxhqn2-psj5uv.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;42:55&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1766552425,&quot;key&quot;:&quot;534f3d530e2f44b2cc4238f275c84691&quot;},&quot;ppe-4514-23&quot;:{&quot;title&quot;:&quot;Episode 347 Deep Dive: Rajesh Ganesan | AI Anxiety and the Global Cyber Balancing Act&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Rajesh Ganesan, CEO of ManageEngine, as he explores the complexities of AI anxiety within organisations and the global challenges of balancing cybersecurity, privacy, and rapid technological change. Rajesh discusses the uneven pace of AI adoption among businesses of different sizes, the critical role of regulation and capital investment by region, and the growing necessity for upskilling in an evolving digital environment. He highlights the persistent anxiety surrounding job displacement, the shift in workforce requirements, and emphasises the importance of resilience and adaptability. Rajesh concludes by stressing the need for businesses to keep customer needs at the centre and to use technology as an enabler to solve real problems in an age defined by both opportunity and uncertainty.&lt;\\\/p&gt;\\n&lt;p&gt;Rajesh Ganesan is the CEO of ManageEngine, a division of Zoho Corp. and a leading provider of enterprise IT management solutions. With over two decades of experience at the company, he plays a pivotal role in shaping ManageEngine\\u2019s strategy, direction, and product management while also serving as a key evangelist for the brand. Beyond strategy, his day-to-day work involves being a mentor and coach to teams across various business functions. With deep institutional knowledge and market insight, he helps them navigate decisions with clarity and perspective, ensuring they are equipped to handle the challenges of today\\u2019s IT market.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 19, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-347-deep-dive-rajesh-ganesan-ai-anxiety-and-the-global-cyber-balancing-act&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2294149\\\/c1e-o39rf28z87a8n0xz-wwp1vj98s78p-ncsmtr.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:54&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1766120453,&quot;key&quot;:&quot;14899bacf258386c35b99676feca25ec&quot;},&quot;ppe-4514-24&quot;:{&quot;title&quot;:&quot;From AWS re:Invent 2025 \\u2013 KB On The Go | CJ Moses, Hart Rossman, and Mark Ryland&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this bonus episode, KB sits down with CJ Moses, CISO at Amazon, Hart Rossman, VP of Global Security Services at AWS, and Mark Ryland, Director, AWS Security. Together they discuss the realities of \\u201cplanetary scale security,\\u201d AI-powered defenses, and the shifting mindset that\\u2019s driving organizations to adopt automation and agentic technologies faster than ever before.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;CJ Moses, CISO, Amazon&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;CJ Moses, CISO at Amazon, leads security engineering and operations across the company. His mission is to enable Amazon businesses by making the benefits of security the path of least resistance. CJ joined Amazon in December 2007, holding various roles including Consumer CISO and AWS CISO, before becoming CISO of Amazon in September 2023.&lt;\\\/p&gt;\\n&lt;p&gt;Before Amazon, CJ led the technical analysis of computer and network intrusion efforts at the Federal Bureau of Investigation\\u2019s Cyber Division and served as a Special Agent with the Air Force Office of Special Investigations (AFOSI). CJ led several computer intrusion investigations seen as foundational to the security industry today.&lt;\\\/p&gt;\\n&lt;p&gt;CJ holds degrees in Computer Science and Criminal Justice and is an active SRO GT America GT2 Race car driver.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Hart Rossman, VP of Global Security Services, AWS&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Hart Rossman is the VP of Global Security Services at AWS. He leads a team of geographically distributed AWS builders who help customers realise the benefits of planetary-scale security solutions in the cloud, with a focus on innovating with internal teams and partners. Prior to AWS, he was VP &amp; CTO of Cyber Security Services &amp; Solutions at SAIC.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Mark Ryland, Director, AWS Security&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Mark Ryland is a Director, AWS Security, reporting to the CISO of AWS, and engaging with a variety of external and internal stakeholders on behalf of the AWS Security leadership team. Externally, he focuses on public policy initiatives and public sector regulators and customers on issues related to cloud and AI security. Internally, he works with AWS service teams by channelling the perspectives of external stakeholders to influence their plans and priorities. In addition, Ryland works with industry partners to enhance the security of the broader information technology ecosystem as Amazon\\u2019s representative on the governing board of the Open Source Security Foundation (OpenSSF), as well as in industry groups focusing on the security and reliability of cutting-edge artificial intelligence systems such as the Frontier Model Forum (FMF) and the Coalition for Secure AI (CoSAI).Ryland has more than 34 years of experience in the technology industry across a wide range of leadership roles in information security, software engineering, distributed systems, technical standardisation, and public policy. Most recently he founded and ran AWS\\u2019s Office of the CISO from 2018 to 2023, a team with which he still collaborates closely on a variety of matters. Prior to that, he was the Director of Solutions Architecture and Professional Services for the AWS Worldwide Public Sector team, founding the team in 2011 and growing it to a large global organisation through early 2018. Before joining AWS, Ryland worked for Microsoft for 13 years in two different stints (1991-2000 and 2008-2011) in multiple roles including Lead Program Manager for COM\\\/DCOM, and founder and Director, Standards Strategy Group. In between work at Microsoft, he was co-founder and CTO of two start-ups, and served as vice president and director of the Washington DC office of a public policy think tank.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 17, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/from-aws-reinvent-2025-kb-on-the-go-cj-moses-hart-rossman-and-mark-ryland&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2290518\\\/c1e-n439hdr6xdf9z48r-34mp4618fjzg-qhlwrt.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;55:47&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1765947437,&quot;key&quot;:&quot;4815e0c3509ccad50800b3158b4ee23c&quot;},&quot;ppe-4514-25&quot;:{&quot;title&quot;:&quot;Episode 346 Deep Dive: Amberley Brady | Everyone is Protecting My Password but Who is Protecting My Toilet Paper?&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Amberley Brady, founder at Realfoodprice, as she explores the urgent issue of food security as a national security crisis in Australia. Amberley discusses the four pillars of food security\\u2014availability, access, utilization, and stability\\u2014emphasising how fragile supply chains, economic shocks, climate events, and cyber incidents threaten the nation\\u2019s access to safe and affordable food. She recounts the disruptions experienced during COVID-19 and highlights the risks of over-reliance on large supermarket conglomerates and lack of support for local farmers. The conversation covers the need for greater policy coordination, strategic food reserves, improved data transparency, and the integration of technology to strengthen domestic resilience. Amberley urges for accountability, innovation, and collaboration between government, industry, and the tech community to ensure that access to nutritious food remains a right, not a privilege, for all Australians.&lt;\\\/p&gt;\\n&lt;p&gt;Amberley, an astute industry professional with extensive experience in public policy, founded Realfoodprice in 2024 in response to identified structural inefficiencies within Australia\\u2019s food supply chain. Recognizing the critical need for market transparency, she established this data-driven platform to address the competitive imbalance affecting both producers and consumers.&lt;\\\/p&gt;\\n&lt;p&gt;Through rigorous market analysis and comparative price assessment, Amberley developed a methodology to clearly communicate authentic food value throughout the supply chain. Her strategic initiative to \\u201cun-supermarket\\u201d represents a paradigm shift in how agricultural commodities are valued and traded within the Australian market.&lt;\\\/p&gt;\\n&lt;p&gt;Realfoodprice exemplifies Amberley\\u2019s innovative approach to economic challenges, leveraging data analytics to foster equitable commercial relationships between farming communities and end consumers. The platform serves as both an advocacy tool and a practical market mechanism designed to ensure the long-term sustainability of Australia\\u2019s agricultural sector and strengthen national economic resilience.&lt;\\\/p&gt;\\n&lt;p&gt;Under Amberley\\u2019s leadership, &lt;a href=\\&quot;https:\\\/\\\/realfoodprice.com.au\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Realfoodprice&lt;\\\/a&gt; continues to advance data transparency as an essential component in creating a more competitive and balanced food system for all stakeholders.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 10, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-346-deep-dive-amberley-brady-everyone-is-protecting-my-password-but-who-is-protecting-my&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2280221\\\/c1e-89g7fo3jg9f1d8wj-5zdnmon1towv-hzfucv.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;49:05&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1765342516,&quot;key&quot;:&quot;687ac920f99e8f40372fee4060f77f3e&quot;},&quot;ppe-4514-26&quot;:{&quot;title&quot;:&quot;From Oracle AI World 2025 \\u2013 KB On The Go | Jenny Tsai-Smith, Rand Waldron, and Arman Ashouriha&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this bonus episode, KB sits down with Jenny Tsai-Smith, SVP, Overall Database Product Management at Oracle, Rand Waldron, VP at Oracle, and Arman Ashouriha, Head of Oracle Cloud Infrastructure Modernisation Programme at Vodafone. Together they discuss Oracle\\u2019s move towards supporting modern workloads and their AI play, Oracle\\u2019s position in the public and private sector, and Vodafone\\u2019s journey to modernisation on Oracle Cloud.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Jenny Tsai-Smith, SVP, Overall Database Product Management, Oracle&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Since joining Oracle in 1993, Jenny Tsai-Smith has held leadership roles spanning technical support, content development, education delivery, plus Oracle Cloud acceleration of startups and scientific research. As the leader for database product management, Jenny works with release and development management to take products and services from design through development to production. Her team runs the customer advisory board, drives technology adoption partners, performs field enablement, assists with migrations to Oracle Database, and works directly with a wide range of customers. She meets regularly with customers, partners, press, and analysts to better understand existing and emerging data management requirements, and to discuss how database innovations can be applied to solve real-world challenges.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Rand Waldron, VP at Oracle&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Rand Waldron is vice president of Oracle Cloud Infrastructure product development, responsible for the Global Government Sector team and leading the strategy, development and deployment of Oracle\\u2019s National Security Region product line. Prior to joining Oracle in 2018, he was Deputy Assistant Director at the Federal Bureau of Investigation, responsible for the FBI\\u2019s enterprise software and data\\u2014including investigative and intelligence analytics, records and evidence management, large scale custom software development and business operations systems. Prior to the FBI, Waldron served at the U.S. Department of Justice.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Arman Ashouriha, Head of Oracle Cloud Infrastructure Modernisation Programme at Vodafone&lt;br \\\/&gt;\\n&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;As the Head of the Oracle Cloud Infrastructure Modernisation Programme at Vodafone, Arman Ashouriha leads the strategic effort to modernize and migrate thousands of key systems to a dedicated region within the Oracle Cloud Infrastructure (OCI). Arman is continually driving towards platform support, system modernization, and scaling crucial operations across complex, high-stakes infrastructure environments.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 5, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/from-oracle-ai-world-2025-kb-on-the-go-jenny-tsai-smith-rand-waldron-and-arman-ashouriha&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2232455\\\/c1e-q40nhd3xm5a0v2x4-gp9105wmcwxq-xviiit.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;01:08:21&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1764910555,&quot;key&quot;:&quot;1452aeb1314ecef2421ad72df090604e&quot;},&quot;ppe-4514-27&quot;:{&quot;title&quot;:&quot;Episode 345 Deep Dive: David Bloxham | Changing Face of Work Around AI, Skills and the Future of Employment&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with David Bloxham, CEO of GCS Recruitment Specialist, as he unpacks the impact of AI on the changing face of work and the tech talent landscape. David shares his perspective on how AI-driven disruption differs from previous waves like cloud and mobile transformations, highlighting the rapid decline in traditional software engineering and process-driven roles as automation takes hold. He explores the challenges and opportunities for jobseekers at all levels, emphasizing the need to specialize within industry verticals, build adaptable skill sets, and nurture strong professional networks. David also provides valuable insights into the evolving nature of technical and functional roles, the linkage between AI and cybersecurity investment, and the importance of human connection in recruitment practices as organisations and candidates adapt to a more automated future.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;em&gt;David Bloxham is the CEO of GCS Recruitment Specialists, where he has been a key player since 1996, with a brief hiatus from 2004 to 2008. Starting as a fresh graduate, he quickly rose through the ranks, becoming a manager in 1999, a director in 2004, and the MD in 2008. In 2017, he led a management buyout with nGAGE. David is passionate about recruitment, strategic leadership, and making a positive impact. He is also the host of the GCS Leaders Series Podcast, where he engages with industry thought leaders to share insights and drive conversations around innovation and excellence.&lt;\\\/em&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 3, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-345-deep-dive-david-bloxham-changing-face-of-work-around-ai-skills-and-the-future-of-emp&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2265163\\\/c1e-3g92ck14g1akq027-xxg98w03trwj-qxua2n.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;47:36&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1764738032,&quot;key&quot;:&quot;089f670ef2638caec83a3ece8aae2473&quot;},&quot;ppe-4514-28&quot;:{&quot;title&quot;:&quot;Episode 344 Deep Dive: Steven Grossman | Cybersecurity and Compliance in regulated Small and Medium Sized Businesses (SMBs)&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Steven Grossman, CISO \\\/ CIO at Standard &amp; Preferred Insurance, as he talks about the challenges small and medium-sized businesses face in securing their environment, especially in view of growing regulatory requirements, and how he brings his enterprise consulting experience to bear in driving change. Steven discusses the unique challenges faced by SMBs\\u2014such as limited budgets, smaller IT teams, and a general lack of prioritization around cyber risk\\u2014while emphasizing the importance of leadership, education, and investing in the right resources like MSPs and fractional CISOs. The conversation covers the regulatory pressures driving security improvements, the pitfalls of treating cybersecurity as a box-ticking exercise, and strategies for building a resilient risk management culture. Steven also shares his perspective on balancing regulatory burden and genuine security, the dangers of under-resourcing IT, and the reasons why proactive approaches to cyber risk are essential for business continuity and consumer trust.&lt;\\\/p&gt;\\n&lt;p&gt;Steven is a cross-functional cybersecurity and information technology leader with experience working in startup to large enterprise environments. After 2 decades of management consulting with international firms like PwC, smaller boutiques and independently on his own, Steven jumped into the cyber and tech startup ecosystem, bringing to bear his knowledge and experience in cybersecurity, risk management, regulatory regimes, data analytics and business process management. Throughout his career, Steven has also held numerous industry executive positions, including his current role as CISO\\\/CIO of Standard &amp; Preferred and the Graph Group, a Workers Comp insurance carrier based in the NY\\\/NJ tri state area.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 28, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episdoe-344-deep-dive-steven-grossman-cybersecurity-and-compliance-in-regulated-small-and-medium&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2247365\\\/c1e-rdnmsw374jc2kwqj-v6p93q0nbgod-r2sj2r.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;35:30&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1764306016,&quot;key&quot;:&quot;997192a2460fc87fb6e394c6d92e363d&quot;},&quot;ppe-4514-29&quot;:{&quot;title&quot;:&quot;From Commvault SHIFT 2025 \\u2013 KB On The Go | Danielle Sheer and Avi Boru&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this bonus episode, KB sits down with Danielle Sheer, Chief Trust Officer at Commvault, and Avi Boru, Senior Director, Cloud Engineering, Network &amp; Telecom at Lennar. Together they discuss building trust by design and how AI, transparency, and authentic relationships are shaping the future of business continuity and cyber recovery.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Danielle Sheer, Chief Trust Officer, Commvault&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Modern compliance, legal and security teams need to be predictive, proactive, and data-driven to meet the speed, agility, and growth of global business in a world of constant cyberattacks. Danielle Sheer, Chief Trust Officer, enables Commvault to do just that.&lt;\\\/p&gt;\\n&lt;p&gt;Danielle Sheer is a strategic leader with deep expertise managing complex global privacy systems. She has repeatedly scaled Corporate Trust operations for public technology companies, led IPOs and other transformative strategic transactions, and counselled leaders and boards on significant governance and activist shareholder matters.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to joining Commvault, Danielle served as General Counsel at financial technology services company Bottomline (NASDAQ:EPAY) and at cloud-backup SaaS solutions provider Carbonite (NASDAQ:CARB).&lt;\\\/p&gt;\\n&lt;p&gt;She currently serves as Global Chair of The L Suite; as well as a director on the Boards of\\u00a0&lt;a href=\\&quot;https:\\\/\\\/linksquares.com\\\/\\&quot; target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;LinkSquares&lt;\\\/a&gt;;\\u00a0&lt;a href=\\&quot;https:\\\/\\\/www.breachrx.com\\\/\\&quot; target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;BreachRx&lt;\\\/a&gt;;\\u00a0&lt;a href=\\&quot;https:\\\/\\\/formally.ai\\\/\\&quot; target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;Formally&lt;\\\/a&gt;; and the\\u00a0&lt;a href=\\&quot;https:\\\/\\\/www.netzero-institute.org\\\/\\&quot; target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;NetZero Institute&lt;\\\/a&gt;; and the Board of Trustees at\\u00a0&lt;a href=\\&quot;https:\\\/\\\/www.bidmc.org\\\/\\&quot; target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;Beth Israel Deaconess Medical Center&lt;\\\/a&gt;.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Avi Boru, Senior Director, Cloud Engineering, Network &amp; Telecom at Lennar Corp.&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;As Senior Director of Cloud Engineering at Lennar, Avi leads Lennar\\u2019s enterprise cloud vision and strategy to drive the company\\u2019s digital transformation. With expertise spanning Strategic Planning, &amp; Integration, Digital Transformation, Cloud Computing, and more, Avi is continually driving towards excellence, scalability, and reliability, especially in fast- paced settings.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 26, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/from-commvault-shift-2025-kb-on-the-go-danielle-sheer-and-avi-boru&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2245048\\\/c1e-z9w7f76dpnbokrwj-z3pmkqo1fgpj-dtjyje.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;42:43&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1764133212,&quot;key&quot;:&quot;63f864576c53440cc1018105f90821c8&quot;},&quot;ppe-4514-30&quot;:{&quot;title&quot;:&quot;Episode 343 Deep Dive: Rajesh Khazanchi | Breach Ready is More Than Just A Mindset&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Rajesh Khazanchi, CEO and co-founder of ColorTokens, as he explores what it truly means to be \\u201cbreach ready\\u201d in today\\u2019s cybersecurity landscape. Rajesh emphasises the shift from perimeter-based defences to a proactive containment strategy, highlighting the importance of assuming breaches are inevitable and minimising damage through micro segmentation and Zero Trust principles. He discusses how evolving business pressures and sophisticated AI-driven attacks are raising expectations for swift decision-making and rapid recovery from disruptions. The conversation covers practical approaches for bridging knowledge gaps, the role of continuous compliance and visibility, and how organisations can leverage existing EDR technologies to achieve stronger resilience without increasing tool sprawl. Rajesh also shares insights on building customer trust through quicker recovery times, the impact of business continuity on competitive advantage, and the importance of design thinking for both organisational and personal cyber safety.&lt;\\\/p&gt;\\n&lt;p&gt;Rajesh Khazanchi is the CEO and Co-Founder of ColorTokens, a company that provides a zero-trust segmentation SaaS platform that spans across IT, OT, Industrial Control Systems (ICS), Devices and Users. Under Rajesh\\u2019s leadership company has accelerated to grown over 300% annual in last 3 years deployed over 100+ large enterprise customers in Insurance, Healthcare, Retail, Manufacturing, Oil &amp; Gas and Pharma. Rajesh leads a team of 400+ people worldwide and drives the vision, strategy, and execution of the company\\u2019s products and services. As an accomplished technology leader, Rajesh has led product teams at VMware, BMC, HP, and Oracle, and has been on the front lines of the battle against cyberattacks for more than two decades. He has been awarded six patents for his innovations in cloud automation and cybersecurity, and is a member of YPO and TiE, two global networks of entrepreneurs and executives. Rajesh is passionate about solving complex problems, creating value for customers, and building a culture of excellence and innovation at ColorTokens.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 19, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-343-deep-dive-rajesh-khazanchi-breach-ready-is-more-than-just-a-mindset&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2229578\\\/c1e-d5v7amzm57bpd4gq-rkp13gj8cgz-f9chll.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;38:22&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1763528450,&quot;key&quot;:&quot;bf24d9551d1037c0a6c4fe89b5a2b1dc&quot;},&quot;ppe-4514-31&quot;:{&quot;title&quot;:&quot;Episode 342 Deep Dive: Daniel Churches | The Impact of Personal Liability in Cybersecurity and Security Professionals&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Daniel Churches, Director in Sydney at ColorTokens, as he explores the sweeping impact of new Australian legislation imposing personal liability on company directors for cybersecurity breaches. Daniel breaks down the shifting landscape for CISOs and senior security leaders, the end of self-regulation, and how shared risk at the board and executive levels is altering market behaviour. He discusses the challenges around resource constraints in security teams, the crucial role of business continuity planning, and the importance of articulating measurable value to organisational leadership. We also examine how the legislation is driving changes in funding priorities, motivating cross-functional engagement, and preparing organisations to better withstand breaches in an evolving threat environment. Daniel shares his optimism about the future, emphasising both the increased pressure and potential for positive, industry-wide change.&lt;\\\/p&gt;\\n&lt;p&gt;Dan is an Australian and Asia Pacific Sales Leader with over 25 years\\u2019 IT experience in Hardware and Software Solutions and Services, Business Development, GTM planning and implementation, Large Complex Negotiations and Executive Relationships. He has worked for IBM, NTT Global and Verizon Enterprise Solutions driving business and building teams in Hardware, Software, Professional Services, Managed Services, Hybrid Cloud, PaaS, SaaS, Data Analytics, Security and Digital Transformation solution sales.&lt;\\\/p&gt;\\n&lt;p&gt;As a Sales Director with ColorTokens, Dan is driving market penetration, brand development, partner engagement and client services and support. He is responsible for industry and buyer alignment and understanding of the ColorTokens \\u201cBreach Ready\\u201d messaging focusing on halting the spread of ransomware and malware attacks across IT\\\/OT, IoT and Legacy environments providing customers a viable Cyber Resilience \\u2018Uptime\\u2019 compliance capability they can report to market.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 11, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-342-deep-dive-daniel-churches-the-impact-of-personal-liability-in-cybersecurity-and-secur&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2202115\\\/c1e-3g92ck6wx1fkq027-8dod8m90f3z-ppstqn.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;41:30&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1762837252,&quot;key&quot;:&quot;7723b7b91801acf894aea58a16e0c854&quot;},&quot;ppe-4514-32&quot;:{&quot;title&quot;:&quot;Episode 341 Deep Dive: Anshuman Sharma | A Critical Infrastructure Approach to Cyber Security&quot;,&quot;description&quot;:&quot;&lt;p&gt;Anshuman Sharma is the Director of Verizon Threat Research Advisory Centre (VTRAC), Cybersecurity Consulting Services at Verizon Business. Anshuman has more than 17 years\\u2019 experience as a well-rounded and seasoned Cyber Security Professional.&lt;\\\/p&gt;\\n&lt;p&gt;VTRAC is a specialized division within Verizon\\u2019s Cyber Security Consulting organisation, helping customers regain control and mitigate cyber threats from their networks, applications and devices. VTRAC team members are located across the globe, bringing together professionals with military, law enforcement and IT expertise who are well-versed in criminal and civil investigative requirements.\\u00a0 The organisation is a globally-approved PCI Forensic Investigator (PFI).&lt;\\\/p&gt;\\n&lt;p&gt;As a regional leader for the investigative response team and a global capability lead for VTRAC, Anshuman is responsible for business portfolio management for professional services, especially focused on digital forensics, incident response, and threat intelligence in the APJ region while working for several top global enterprises and government organisations.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 5, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-341-deep-dive-anshuman-sharma-a-critical-infrastructure-approach-to-cyber-security&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2192902\\\/c1e-1dogs516gxaxv9nj-rkpgx8noi46o-2519xy.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;44:15&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1762318559,&quot;key&quot;:&quot;43afde968964d8d43ec73fb964fe5574&quot;},&quot;ppe-4514-33&quot;:{&quot;title&quot;:&quot;Episode 340 Deep Dive: Paul Davis | JFrog\\u2019s First Step Towards AppTrust and DevGovOps&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Paul Davis, Field CISO at JFrog, as he explores JFrog\\u2019s approach to building trust in software development pipelines and the evolution towards DevGovOps. Paul shares his perspective on elevating trust from the granular level of software releases to the broader application layer, emphasising the need for consistent, automated, and reliable methodologies in development. He discusses the critical role of automation in balancing speed and security, tackling tool sprawl, and mitigating risks posed by open source dependencies. The conversation touches on the realities of legacy tech debt, the challenges of integrating and consolidating security tooling, and the importance of having a single source of truth.&lt;\\\/p&gt;\\n&lt;p&gt;Paul is an experienced IT Security Executive who, as Field CISO at JFrog, works to help CISOs, IT execs and security teams, enhance protection of their software supply chain. Additionally, he advises IT security startups, mentors security leaders, and provides guidance on various IT security trends.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 29, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-340-deep-dive-paul-davis-jfrogs-first-step-towards-apptrust-and-devgovops&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2173754\\\/c1e-41r8c1d4vnfopgxk-pkvvowrpamwk-vssko1.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;44:00&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1761714054,&quot;key&quot;:&quot;ab789a1b434a405eef7f46a69a6a3520&quot;},&quot;ppe-4514-34&quot;:{&quot;title&quot;:&quot;Episode 339 Deep Dive: M.K. Palmore | Leading Through Uncertainty: Security, Safety, and Cyber Awareness in a Time of Crisis&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with M.K. Palmore, Chief Executive Officer at Apogee Global RMS, as he explores strategies for leading through uncertainty with a focus on security, safety, and cyber awareness in times of crisis. M.K. emphasises the critical importance of practicing security response scenarios, noting that organisations truly respond better in real-world incidents when they\\u2019ve regularly rehearsed decision-making with their teams. He discusses the value of people-centric leadership, the need for strong relationships with both internal stakeholders and external partners, and the dangers of letting practice fall to the bottom of the priority list. As security concerns grow globally\\u2014particularly for government officials and public leaders\\u2014M.K. reflects on the heightened threat landscape, the impact of political divisiveness, and the role of leadership in lowering tensions. He concludes by highlighting the enduring need for leaders to maintain humanity and remain diligent, ensuring decisions are always made with people at the centre.&lt;\\\/p&gt;\\n&lt;p class=\\&quot;p1\\&quot;&gt;M.K. Palmore is an award-winning cybersecurity executive, military veteran, public speaker, and leadership advisor with more than 30 years of combined public- and private-sector experience. He is the Founder and CEO of Apogee Global RMS, a veteran-owned enterprise risk management advisory firm delivering solutions across cyber and physical risk landscapes. Through Apogee, he also leads the Apogee Speakers Bureau, a premier platform showcasing more than 40 diverse experts at the intersection of technology, leadership, and security.&lt;\\\/p&gt;\\n&lt;p class=\\&quot;p3\\&quot;&gt;Palmore\\u2019s distinguished career includes service as a commissioned officer in the U.S. Marine Corps, leadership as head of the Cyber Security Branch at the FBI\\u2019s San Francisco Field Office, and senior executive roles in the private sector, including VP\\\/Field CSO at Palo Alto Networks and Director in Google Cloud\\u2019s Office of the CISO.&lt;\\\/p&gt;\\n&lt;p class=\\&quot;p1\\&quot;&gt;A graduate of the U.S. Naval Academy, Palmore also holds an MBA from Pepperdine University. His expertise spans cybersecurity strategy, executive risk management, leadership, digital transformation, cloud security, and national security. He is widely sought after as a keynote speaker and advisor to boards and senior executives navigating today\\u2019s complex threat landscape.&lt;\\\/p&gt;\\n&lt;p class=\\&quot;p3\\&quot;&gt;Through Apogee Global RMS and its Speakers Bureau, Palmore is advancing his mission to amplify diverse voices and perspectives shaping the future of technology, leadership, and security.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 22, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-339-deep-dive-mk-palmore-leading-through-uncertainty-security-safety-and-cyber-aware&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2169673\\\/c1e-z9w7f7x0k2iokrwj-25m4kg51ixp8-tgzhkt.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;39:59&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1761109107,&quot;key&quot;:&quot;560ccb9134375584e8e527fac0e61312&quot;},&quot;ppe-4514-35&quot;:{&quot;title&quot;:&quot;Episode 338 Deep Dive: Eric Stride | Securing the Aviation Industry in the Modern Age&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Eric Stride, Chief Security Officer at Huntress, to discuss the escalating cybersecurity challenges facing the aviation industry. Eric highlights the alarming 600% year-over-year surge in cyberattacks targeting the sector, emphasising how attackers are exploiting the interconnected and fragile aviation supply chain\\u2014most notably seen in recent incidents like the ransomware strike on Collins Aerospace. He explores the growing risk posed by both IT and OT system convergence, the shift in regulation tying cybersecurity readiness directly to airworthiness, and the increasing adoption of robust frameworks to mitigate operational disruptions and data breaches. Eric also highlights the critical need for holistic supply chain security, the importance of regulatory enforcement, and a cultural shift in the industry toward prioritising safety and cyber resilience to restore public trust in air travel.&lt;\\\/p&gt;\\n&lt;p&gt;Eric Stride is the Chief Security Officer at Huntress, where he oversees the company\\u2019s 24\\\/7 Global Security Operations Center, Detection Engineering, Adversary Tactics, IT Operations, and Internal Security. A 20+ year cybersecurity leader, Eric has held senior roles spanning the U.S. Air Force, NSA, and private sector.\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;During his 12 years on active duty, Eric helped architect the Air Force\\u2019s first cyber combat mission team, co-authored its first offensive cyber operations manual, and rose to Deputy Chief for Cyber Operations at NSA Georgia. He continues to serve as a Colonel in the Air Force Reserve, where he established its first cyber range squadron.\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;In the private sector, Eric co-founded Atlas Cybersecurity, advised defense and enterprise clients as an independent consultant, and led Deloitte\\u2019s Advanced Cyber Training portfolio, generating $135M+ in new business. He holds an M.S. in Information Technology Management, a B.S. in Computer Science, and multiple cybersecurity certifications (CISSP, GCIH, CEH).\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 15, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-338-deep-dive-eric-stride-securing-the-aviation-industry-in-the-modern-age&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2164527\\\/c1e-7km5b97x06ad6vxo-jpn2jgz3sggz-qpgd1l.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;38:12&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1760504459,&quot;key&quot;:&quot;ae1c56cc11b903802b6ab2c95238e463&quot;},&quot;ppe-4514-36&quot;:{&quot;title&quot;:&quot;Episode 337 Deep Dive: Christine Gadsby | Why Mobile Espionage is a Critical National Security Threat to Australia and Globally&quot;,&quot;description&quot;:&quot;&lt;p class=\\&quot;cvGsUA direction-ltr align-start para-style-body\\&quot;&gt;In this episode, we sit down with Christine Gadsby, Chief Security Advisor at BlackBerry, as she explores why mobile espionage has become a critical national security threat in Australia and globally. Christine unpacks the mounting risks posed by outdated telco infrastructure, the vulnerability of mobile communications, and the rapid evolution of attacker tactics\\u2014fueled by AI, automation, and the expansive attack surface created by free messaging apps. She highlights the real-world impact of scams, cultural differences in social engineering, and the challenges faced by both consumers and organizations in protecting sensitive information.&lt;\\\/p&gt;\\n&lt;p&gt;Christine Gadsby is the Vice President and Chief Information Security Officer for BlackBerry Secure Communications. With over 20 years of experience in mobile and information security, Christine is known for her strategic vision and leadership skills, with a proven track record of developing and implementing robust strategies that protect organizations from evolving risks and digital threats \\u2013 particularly in the areas of communications security and critical event management.&lt;br \\\/&gt;\\nGadsby is a visionary who helped pioneer secure software supply chain efforts and SDLC capabilities influencing industry and government-driven security frameworks in use by the world\\u2019s most security-conscious industries.&lt;\\\/p&gt;\\n&lt;p&gt;She is a sought-after panelist, moderator, and keynote speaker with several awards for challenging security mindsets and leading Diversity efforts, including Cybersecurity Woman of the Year, Power 100 Women in Security, and Top 10 Women Leading Cybersecurity. She is a well-known contributor, including RSA, CES, Black Hat and has been quoted in notable media outlets Fox News, CBS, Yahoo, MSN, CSO Magazine, CyberScoop, and Dark Reading.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 8, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-337-deep-dive-christine-gadsby-why-mobile-espionage-is-a-critical-national-security-threa&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2159599\\\/c1e-3g92ckp5wwfkq09n-rkp03x7dhmro-tepyq5.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:57&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1759899611,&quot;key&quot;:&quot;4d3eeb4ef1be87a7453ddbd6205fd1fc&quot;},&quot;ppe-4514-37&quot;:{&quot;title&quot;:&quot;Episode 336 Deep Dive: Joe Cozzupoli | The Boardroom View of CTI and Speaking the Language of Risk&quot;,&quot;description&quot;:&quot;&lt;p&gt;Joe Cozzupoli is a Principal Security Advisor \\\/ Field CISO at Cosive with a focus on helping clients operationalise Cyber Threat Intelligence and Security Operations to reduce risk and deliver measurable business outcomes. With over 20 years in cyber security, Joe has led strategy and delivery for enterprises and government, translating board priorities into executable security programs and aligning identity, data protection, and cloud controls with organisational goals. Equally comfortable in the boardroom and at the whiteboard, he bridges business, architecture, and operations across Australia and internationally.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to joining Cosive, Joe held senior roles at Microsoft, Citrix, Palo Alto Networks, and Cisco where he focused on AI and Data Security, cloud security, risk management, and executive engagement. He has served as a Virtual CISO and Security Architecture Advisor for complex transformations, including industrial and mining clients undergoing separation programs and Azure cloud migrations. Joe works extensively with Australian frameworks and regulations including the ACSC Essential Eight, APRA CPS 234, the SOCI Act, the PSPF, and ISO\\\/IEC 27001, and partners with boards, CISOs, and delivery teams to operationalise pragmatic controls. A committed mentor to the next generation of practitioners, Joe has also completed ISACA training in AI Governance, AI Risk, and Auditing AI.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 1, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-336-deep-dive-joe-cozzupoli-the-boardroom-view-of-cti-and-speaking-the-language-of-risk&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2154095\\\/c1e-z9w7f74koqtokrwj-8dq7jov1i0zv-kzfsiy.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;38:32&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1759298231,&quot;key&quot;:&quot;11bab28f387b45638601320267c8e38f&quot;},&quot;ppe-4514-38&quot;:{&quot;title&quot;:&quot;Episode 335 Deep Dive: Anne-Marie Paterson | The Changing Face of Risk&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Anne-Marie Paterson, a profound risk executive, to explore the evolving role of the Chief Risk Officer and the changing face of risk management. Anne-Marie shares her perspective on how risk now has a real seat at the C-suite table, emphasising the shift from being a business roadblock to serving as an enabler of strategy. She addresses the traditional stereotypes of risk professionals, contrasts conservative legacy approaches with the need for creativity and relevance, and highlights the increasing focus on non-financial risks such as conduct, reputation, and operational challenges\\u2014especially in light of rapidly advancing technologies like AI. Anne-Marie also provides insights into Australia\\u2019s regulatory landscape, discusses the balance between regulation and innovation, and underscores the importance of fostering a proactive risk culture throughout organisations.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;&lt;strong&gt;&lt;em&gt;Blending legal expertise with executive leadership to deliver risk transformation and regulatory uplift at scale.&lt;\\\/em&gt;&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;Anne-Marie Paterson is a risk executive and former legal partner with more than two decades of experience spanning risk management, governance, and legal services. Beginning her career in top-tier law firms before founding and leading her own practice, Anne-Marie has gone on to hold senior executive roles across ASX-listed companies and the financial services sector. Recognised as both a strategist and a problem-solver, she has built and led teams that deliver lasting impact in risk management, compliance, legal services, and organisational integrity.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;Anne-Marie has shaped enterprise-wide risk culture strategies recognised by APRA, designed whistleblowing and investigation frameworks for ASX-listed companies, and steered some of the largest regulatory uplift programs in the financial services sector. Her career highlights include establishing AMP\\u2019s inaugural Group Integrity Office, uplifting governance for Colonial First State post-demerger, and most recently leading Bendigo and Adelaide Bank\\u2019s largest multi-stream risk transformation program.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;Equally comfortable in the boardroom and at the front line of crisis management, Anne-Marie is known for her values-based leadership, her ability to influence stakeholders from directors to regulators, and her focus on embedding sustainable change. A qualified lawyer, and graduate of the Australian Institute of Company Directors, she is also a regular keynote speaker on risk, governance, and whistleblowing.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 24, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-335-deep-dive-anne-marie-paterson-the-changing-face-of-risk&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2148027\\\/c1e-3g92ckq250hkq027-1p5m6590i3x3-q7xnwq.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;42:35&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1758693516,&quot;key&quot;:&quot;9c77f4579f6674ae511348e17f8c9874&quot;},&quot;ppe-4514-39&quot;:{&quot;title&quot;:&quot;Episode 334 Deep Dive: Brad Jones | Securing AI Deployments and Mitigating LLM-Powered Attacks&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Brad Jones, CISO at Snowflake, as he unpacks the evolving challenges of securing AI deployments and defending against large language model (LLM) powered attacks.&lt;\\\/p&gt;\\n&lt;p&gt;Brad explores the complexities enterprises face in keeping up with the rapid pace of AI innovation, especially as traditional policy frameworks struggle to adapt. He outlines the growing use of LLMs in both consumer and enterprise environments, the unique risks of agentic workflows, and the blurred boundaries between public and private AI deployments.&lt;\\\/p&gt;\\n&lt;p&gt;He also highlights the increased sophistication of social engineering threats fueled by LLMs and discusses strategies for observability, governance, and keeping security teams ahead of the curve in a fast-changing landscape.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;Brad\\u00a0serves as the Chief Information Security Officer and has been with the company since 2023. Prior to joining Snowflake,\\u00a0Brad\\u00a0was the CISO and VP of Information Security at Seagate for over six years. Before his tenure at Seagate,\\u00a0Brad\\u00a0oversaw Information Security at Synopsys and SanDisk. Additionally, he has actively participated in a number of customer advisory boards and is currently part of the CISO Advisor Council at NightDragon.\\u00a0Brad\\u00a0earned his Bachelor of Science in Mechanical Engineering from the University of California, Davis.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 17, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-334-deep-dive-brad-jones-securing-ai-deployments-and-mitigating-llm-powered-attacks&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2142543\\\/c1e-7km5b98dn6cd6vkn-gpz8464zfo9d-8flfyi.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:18&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1758088525,&quot;key&quot;:&quot;7f9f4bbd8e727ddf86ef76ae644fc889&quot;},&quot;ppe-4514-40&quot;:{&quot;title&quot;:&quot;Episode 333 Deep Dive: Prashant Vadlamudi | Building Secure Foundations for Agentic AI&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Prashant Vadlamudi, Senior Vice President of Product Security at Salesforce, as he explores how organisations can build secure foundations for agentic AI. Prashant offers a holistic view of agentic AI, highlighting its shift from simple generative models to autonomous agents capable of reasoning, sequencing complex tasks, and performing actions\\u2014while emphasising the productivity benefits and the imperative for strong trust and security principles. The conversation covers the balance between fostering innovation and maintaining robust governance and security, the evolving nature of guardrails as AI models mature, and the importance of ongoing policy updates to keep pace with rapid technological changes. Prashant also discusses Salesforce\\u2019s approach to deploying AI responsibly, the role of trust metrics such as bias and hallucination scores, the necessity for data governance as the backbone of AI strategies, and the shared responsibility between providers and customers to ensure that agentic AI operates securely and transparently.&lt;\\\/p&gt;\\n&lt;p&gt;Prashant Vadlamudi is a strategic leader with two decades of experience driving transformative information security and compliance initiatives. As Senior Vice President of Product Security at Salesforce, he is responsible for safeguarding the company\\u2019s products and ensuring adherence to global standards. His career is marked by pivotal leadership roles, including Vice President of Information Security and Cloud Compliance at Cisco, where he established robust security baselines for SaaS offerings, and Director of Technology GRC at Adobe, where he architected the Adobe Common Controls Framework (CCF), a cornerstone of their global trust strategy. Prashant\\u2019s expertise spans cloud security, global certifications, and data-driven risk management, allowing him to navigate and mitigate complex security challenges in today\\u2019s dynamic landscape. He utilises a risk-based approach to decision-making and focuses on operational efficiency. He has experience in team development and mentoring, with individuals he has mentored holding security leadership positions across the industry. His professional experience includes strategic planning, technical implementation, and team management within the field of information security.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 10, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-333-deep-dive-prashant-vadlamudi-building-secure-foundations-for-agentic-ai&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2136705\\\/c1e-pjr0h1xddocmo95v-xx41zzdgckpv-6gn6dt.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:39&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1757483782,&quot;key&quot;:&quot;b5eb2376a2687b960b88b54cef05f79e&quot;},&quot;ppe-4514-41&quot;:{&quot;title&quot;:&quot;Episode 332 Deep Dive: Emilio Escobar | The Modern CISO&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Emilio Escobar, Chief Information Security Officer at Datadog, as he explores the evolving definition of the modern CISO and what it means to lead security programs in today\\u2019s technology-driven organisations. Emilio delves into the transition of CISOs from traditional audit and IT backgrounds to deeply technical and business-savvy leaders, emphasising the importance of being part of the C-suite and understanding both regulatory and technological risks. We discuss the growing need for CISOs to embrace failure as part of innovation, the increasing accountability and liability facing security leaders, and the shift in expectations as companies fine-tune their search for security executives with both operational expertise and business acumen. Emilio also shares his views on the \\u201ctechnical enough\\u201d debate within the industry, the potential splitting of the CISO role, and the value of fostering trust and adaptability in security leadership.&lt;\\\/p&gt;\\n&lt;p&gt;Emilio Escobar is Chief Information Security Officer (CISO) at observability and security company Datadog (NASDAQ: DDOG). With two decades of experience in Information Security and Compliance, Emilio has worked at large enterprises, medium-sized companies, and government organizations. Before Datadog, Emilio served as the VP of Information Security for Hulu, where he played a pivotal role in setting up key security functions. Prior to that, Emilio worked for PlayStation, where he built and ran the software security teams. Emilio\\u2019s unique approach to security and compliance has always prioritized partnerships and people\\u2014hiring the right talent to build the processes, procedures, and technologies that unite Security, Engineering, and Operations teams. Emilio holds a BS in Computer Science from the University of Puerto Rico.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 3, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-332-deep-dive-emilio-escobar-the-modern-ciso&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2130389\\\/c1e-7km5b98qk4fd6vxo-kp965k5rhv7-i4hr9e.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;39:10&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1756878908,&quot;key&quot;:&quot;5439b2a0d8bf5a271501e2873ba3c000&quot;},&quot;ppe-4514-42&quot;:{&quot;title&quot;:&quot;Episode 331 Deep Dive: Christian Morin | Cyber Security and Organisational Resilience Across ANZ&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Christian Morin, Chief Security Officer and Vice President of Product Engineering at Genetec, as he shares his insights on the critical importance of moving beyond a \\u201ccheckbox\\u201d approach to incident response, emphasising the value of regular tabletop exercises and fostering genuine security muscle memory within teams. He highlights the convergence between physical security and cybersecurity, arguing for a unified approach that bridges silos and enhances both protection and response capabilities. Christian also reflects on the growing risks posed by connected IoT and OT devices, the challenges of asset inventory, and the cultural shifts required to improve cyber awareness.&lt;\\\/p&gt;\\n&lt;p&gt;Christian Morin is the Chief Security Officer at Genetec. With over 20 years of experience in IT, telecommunications and physical security industries, Chris has a keen ability to anticipate technological trends and drive meaningful organizational growth. He is a multidisciplinary business leader, having managed the Operations, Customer Service, Sales Engineering, Technical Support, Professional Services, and IT Teams since joining Genetec in 2002. Chris\\u2019 executive leadership continues to support the strategic direction and success of the company.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;August 27, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-331-deep-dive-christian-morin-cyber-security-and-organisational-resilience-across-anz&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2124644\\\/c1e-41r8c1jm2rbopgxk-xx4058m0t1j2-btwatx.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:34&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1756274282,&quot;key&quot;:&quot;0b614f47a03d0d808c6e5b523fdbe846&quot;},&quot;ppe-4514-43&quot;:{&quot;title&quot;:&quot;Episode 330 Deep Dive: Marco Pereira | The Day Encryption Breaks: Are We Ready for the Quantum Threat?&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Marco Pereira, Executive Vice President and Global Head of Cybersecurity at Capgemini, as he explores the looming risk posed by quantum computing to current encryption standards. Marco breaks down what could happen the day encryption breaks\\u2014referred to as \\u201cQ Day\\u201d\\u2014and highlights why the urgency to prepare for quantum threats is so critical, especially given the uncertainty about when this shift might occur. He discusses the widespread reliance on RSA-based encryption, the potential for a sudden cyber \\u2018Armageddon\\u2019 if organisations are not proactive, and the immense challenge of transitioning global digital infrastructure to post-quantum cryptography. Marco also addresses the current lack of urgency and crypto expertise in the industry, emphasises the need for crypto agility, and draws parallels to the rapid adoption challenges seen with cloud computing and AI.&lt;\\\/p&gt;\\n&lt;p&gt;Marco is an industry-recognised cybersecurity thought leader and strategist with over 25 years of leadership and hands-on experience. He has a proven track record of successfully implementing highly complex, large-scale IT transformation projects. Known for his visionary approach, Marco has been instrumental in shaping and executing numerous strategic cybersecurity initiatives. Marco holds a master\\u2019s degree in information systems and computer engineering, as well as a Master of Business Administration (MBA). His unique blend of technical expertise and business acumen enables him to bridge the gap between technology and strategy, driving innovation and achieving organisational goals.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;August 20, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-330-deep-dive-marco-pereira-the-day-encryption-breaks-are-we-ready-for-the-quantum-threa&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2115021\\\/c1e-2k31bmko33h67jo4-xx4r179mcrxn-n9wpvh.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;39:59&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1755669499,&quot;key&quot;:&quot;a97ee3345c7f23191738ae02317ab588&quot;},&quot;ppe-4514-44&quot;:{&quot;title&quot;:&quot;Episode 329 Deep Dive: John Hultquist | An Overview of Australia\\u2019s Threat Landscape&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with John Hultquist, Chief Analyst at Mandiant Intelligence, now part of Google Cloud, as he shares his insights on Australia\\u2019s evolving cybersecurity threat landscape. John explores the increasing complexity and velocity of threats, spotlighting both nation-state actors\\u2014particularly from China\\u2014and financially motivated cybercriminal groups like Scattered Spider. He addresses the psychological and structural drivers behind rising attacks, including the troubling pattern of minors engaging in increasingly aggressive cybercrime. The discussion further examines the targeting of critical sectors such as healthcare, the growing use of advanced techniques to evade detection, and the influence of geopolitics and emerging technologies like AI on intelligence operations.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;John Hultquist \\u2013 Chief Analyst, Mandiant Threat Intelligence&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;John Hultquist serves as the Chief Analyst at &lt;strong&gt;Mandiant Intelligence&lt;\\\/strong&gt;, now part of Google Cloud. In this senior leadership role, he oversees global threat intelligence operations\\u2014tracking cyber espionage, hacktivism, ransomware, and state-aligned threat actors. He regularly advises C-suite and public-sector leaders on cyber risk strategy and prioritisation.&lt;\\\/p&gt;\\n&lt;p&gt;John\\u2019s unique background\\u2014spanning military intelligence, U.S. government service, private sector leadership, and real-time cyber conflict analysis\\u2014positions him as one of the most respected voices in global threat intelligence. He brings a strategic mindset focused equally on technical insights, geopolitical awareness, and operational impact.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;August 13, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-329-deep-dive-john-hultquist-an-overview-of-australias-threat-landscape&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2111282\\\/c1e-wmjvu37podu0gmpo-1p5pmggvc34w-msiwgn.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:43&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1755064677,&quot;key&quot;:&quot;b2c55c6f21315a70e332162d9ba81b66&quot;},&quot;ppe-4514-45&quot;:{&quot;title&quot;:&quot;Episode 328 Deep Dive: Rob Clyde &amp; Jamie Norton | Quantum Computing \\u2013 How Can Cyber Professionals Prepare?&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Jamie Norton, Board Director at ISACA, and Rob Clyde, Crypto Quantique and past ISACA Board Chair, as they discuss the impact of quantum computing on cybersecurity and how professionals can prepare for imminent change. Jamie shares insights from a &lt;a href=\\&quot;https:\\\/\\\/www.isaca.org\\\/resources\\\/quantum-pulse-poll\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;recent ISACA global survey&lt;\\\/a&gt; revealing that 95% of organizations lack a quantum computing roadmap, highlighting both a general awareness of the concept and a significant gap in practical action. Rob emphasizes the urgency of understanding and adopting new post-quantum cryptography standards, noting the risks posed by \\u201charvest now, decrypt later\\u201d attacks and the likelihood of nation states leading the charge in exploiting quantum capabilities. Together, they explore the need for continuous education, the evolving skills landscape\\u2014including the increasing value of quantum and AI literacy, and practical first steps organisations should take to assess risk, build strategy, and transition critical assets to post-quantum security measures.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;&lt;a href=\\&quot;https:\\\/\\\/www.linkedin.com\\\/in\\\/robclyde\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Rob Clyde&lt;\\\/a&gt;, Chairman, Crypto Quantique, and past ISACA board chair&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Rob Clyde is a distinguished cybersecurity and technology leader with over three decades of experience in executive, board, and advisory roles. He currently serves as Chairman of the Board at Crypto Quantique, a company specialising in quantum-driven IoT cybersecurity solutions. He is also the Executive Chair of White Cloud Security and a long-term board member of ISACA, where he previously held the position of Chair.&lt;\\\/p&gt;\\n&lt;p&gt;Rob\\u2019s career includes notable positions such as Chief Technology Officer at Symantec, CEO of Adaptive Computing, and co-founder of Axent Technologies. As Managing Director of Clyde Consulting LLC, he provides strategic advisory services to cybersecurity software companies. Rob is also a Certified Information Security Manager (CISM) and holds the NACD Directorship Certification.&lt;\\\/p&gt;\\n&lt;p&gt;A frequent speaker at global cybersecurity conferences, Rob brings a wealth of knowledge and leadership to discussions on digital trust, governance and emerging technologies.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;&lt;a href=\\&quot;https:\\\/\\\/www.linkedin.com\\\/in\\\/jamienorton\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Jamie Norton&lt;\\\/a&gt;, ISACA Board Director&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Jamie Norton is a leading cybersecurity expert with over 25 years of experience across government, commercial and international sectors. He is Chief Information Security Officer at Australian Securities and Investment Commission (ASIC) and Board Director at ISACA. He is a Partner at McGrathNicol, where he advises executives and boards on cyber risk, resilience and strategic performance. Jamie also serves on the Advisory Board of Avertro, a cybersecurity start-up focused on informed, data-driven decision-making around cyber resilience and AI safety. He previously held leadership roles at NEC, Tenable, Check Point and the World Health Organisation.&lt;\\\/p&gt;\\n&lt;p&gt;Jamie is the former Chief Information Security Officer at the Australian Taxation Office (ATO), one of Australia\\u2019s largest federal agencies. He has chaired and contributed to numerous interdepartmental and industry committees on cyber strategy, and represented Australia at international government forums on cybercrime. He holds degrees in accounting and IT from the Australian National University and is a respected speaker and media commentator.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;August 6, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-328-deep-dive-rob-clyde-jamie-norton-quantum-computing-how-can-cyber-professionals-pr&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2105089\\\/c1e-pjr0h1m1jpumo9x0-6z30wwg5inzm-qtewkb.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;44:20&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1754459895,&quot;key&quot;:&quot;88b01243bc820365e1624676dd64b7c0&quot;},&quot;ppe-4514-46&quot;:{&quot;title&quot;:&quot;Episode 327 Deep Dive: David Wiseman | Do You Really Know Who You&#8217;re Speaking To?&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with David Wiseman, Vice President, Secure Communications at BlackBerry, as he explores the growing challenges of authenticating identity in digital communication channels. David discusses recent high-profile incidents\\u2014including compromised government messaging apps and political deep fakes\\u2014that highlight vulnerabilities in platforms like Signal and WhatsApp. He highlights the risks associated with AI-powered voice and message spoofing, and emphasizes the importance of maintaining clear boundaries between business and personal communications to prevent data leaks and blackmail. David also explains how evolving AI tools are making targeted spam, phishing attacks, and metadata mining more effective, and calls for stronger controls, technological safeguards, and user awareness to preserve trust in digital communications.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Experience&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;David has 25+ years of experience in software, security, information management, mobility and communications at BlackBerry, IBM, SAP, Sybase, and the US Navy. His expertise in Secure Communications leads BlackBerry in the vision of securing a connected future you can trust, helping governments to augment and fortify digital defences to strengthen national security&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Notable Achievements&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;David helped design the world\\u2019s first large-scale environmental geo-spatial database for NASA. He also helped design the software for one of the first shipboard radar data fusion systems for the US Navy.\\u00a0\\u00a0 At BlackBerry, David and his team have helped NATO and multiple global governments operating in challenging geo-political environments to establish trusted, secure communications channels from the battlefield to the boardroom \\u2013 using military-grade software to ensure classified conversations and messages remain private.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 30, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-327-deep-dive-david-wiseman-do-you-really0so&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2099410\\\/c1e-5k0vb1748dt0xmvo-ww8pgz31tzqd-typc0r.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:09&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1753855095,&quot;key&quot;:&quot;20d4ee412ad4a81e9efeb55d30026998&quot;},&quot;ppe-4514-47&quot;:{&quot;title&quot;:&quot;Episode 326 Deep Dive: James Blake | Assessing Your Organisation\\u2019s Cyber Resilience&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with James Blake, Vice President, Global Cyber Resiliency Strategy at Cohesity, as he shares his insights on assessing and building organizational cyber resilience. James emphasizes the importance of pragmatism and preparedness, urging companies to address their weakest resiliency links rather than over-focusing on a single area or relying entirely on technology for prevention and detection. He discusses the growing sophistication of cyber threats, particularly ransomware and wiper attacks, and highlights the need for a shared responsibility model between IT and security teams.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;James leads cyber resilience strategy at Cohesity. He brings extensive hands-on experience in leading incident response in dozens of ransomware and wiper incidents; as the former CISO of Mimecast and Global Director of Cyber Transformation at JPMorgan Chase; and having led a consultancy practice that built the end-to-end security operation center capability for over 91 organizations including over two dozen in the FORTUNE 100.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 28, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-326-deep-dive-james-blake-assessing-youretk&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2098405\\\/c1e-jjvwh54xm6tn1k29-47xm3mgwf8ok-tjysx0.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;54:15&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1753682305,&quot;key&quot;:&quot;a1ac9c57a39e0edfc26bd2f3d2be4cba&quot;},&quot;ppe-4514-48&quot;:{&quot;title&quot;:&quot;Episode 325 Deep Dive: Federico Torreti | Organisations Getting Choice and Flexibility for AI Experimentation&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Federico Torreti, Senior Director of Product for AI &amp; ML at Oracle, as he discusses the company\\u2019s latest partnership with xAI to bring the Grok 3 model to Oracle Cloud Infrastructure (OCI). Federico explores the importance of offering curated model choice to enterprises, emphasizing that there is no one-size-fits-all approach to AI solutions. He highlights the challenges organizations face in evaluating AI models, managing decision fatigue, and moving from experimentation to production. The conversation also covers the critical role of data security, privacy, and sovereignty when implementing AI, as well as Oracle\\u2019s differentiated approach to embedding AI across its entire technology stack.&lt;\\\/p&gt;\\n&lt;p&gt;Federico Torreti leads the vision, strategy, and delivery of generative AI services, enabling enterprises to build, deploy, and scale large language model applications on Oracle\\u2019s cloud platform. Prior to Oracle, he spent over 20 years at Amazon Web Services, Eaton Corporation, and Rolls-Royce, leading AI product teams and launching corporate ventures.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 23, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-325-deep-dive-federico-torreti-organisatiadf&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2095160\\\/c1e-n439hdz7o8a9z48r-1p55pzdgbjvj-zffmvg.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;36:41&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1753250443,&quot;key&quot;:&quot;fcb8f4a4d2124f85e02fee9ed1b7b1bc&quot;},&quot;ppe-4514-49&quot;:{&quot;title&quot;:&quot;Episode 324 Deep Dive: Kate Healy | Successfully Engaging and Selling to a CISO&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Kate Healy, Founder of Empowered Cyber, as she shares her insights on how to successfully engage and sell to CISOs. Kate highlights the challenges salespeople face in a market where traditional tactics, such as cold calls, unsolicited emails, and LinkedIn pitches, often fall flat and can damage long-term relationships. She emphasizes the importance of building genuine trust, creating value, and truly understanding a CISO\\u2019s unique challenges rather than launching straight into product pitches. Kate also discusses how effective sales strategies in Australia hinge on relationship-building and mutual respect, and offers practical advice on leveraging existing customer introductions, participating in industry events, and communicating with authenticity and transparency. She strongly advocates for marketing, PR, and sales teams to align more closely and for both sides, vendor and client, to treat each other with empathy, honesty, and a human-centric approach.&lt;\\\/p&gt;\\n&lt;p&gt;Awarded Australia\\u2019s Most Outstanding in IT Security 2024, Fellow of AISA, and Graduate Australian Institute of Company Directors, Kate is a distinguished cyber security executive with over 25 years global experience. She has served in influential roles including Interim CISO The Lottery Corporation, Head of Security Google Cloud ANZ, Head of Risk, Wholesale Banking, Standard Chartered Bank and has been a volunteer Board Director. This diverse experience positions her uniquely, having been both an operator and a vendor, she understands the industry from both sides. Kate brings not only deep expertise but also a passion for making this knowledge accessible to everyone through her company Empowered Cyber.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 18, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-324-deep-dive-kate-healy-successfully-engb9f&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2092153\\\/c1e-02xmsk7mjrfgm3k5-0vpk59rpioz1-w59mjb.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:21&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1752818411,&quot;key&quot;:&quot;b2f5e24c7016088bc17adfdce49bafd4&quot;},&quot;ppe-4514-50&quot;:{&quot;title&quot;:&quot;Episode 323 Deep Dive: Jadee Hanson | Is Compliance A Minimum Standard Or A Strategic Enabler In Cybersecurity Governance?&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Jadee Hanson, Chief Information Security Officer at Vanta, as she explores whether compliance is simply a minimum standard or a strategic enabler in cybersecurity governance. Jadee shares insights on how compliance, when approached with transparency and accountability, can build customer trust and drive business success. She discusses the shift from outdated, manual audit practices to a model of continuous, automated compliance monitoring, emphasizing the efficiency and assurance provided by real-time controls. Jadee also highlights the importance of going beyond compliance \\u201ccheckboxes,\\u201d advocating for proactive security measures, such as bug bounty programs and responsible disclosure processes, that strengthen organizational resilience.&lt;\\\/p&gt;\\n&lt;p&gt;Jadee Hanson, Chief Information Security Officer&lt;\\\/p&gt;\\n&lt;p&gt;Jadee is Vanta\\u2019s Chief Information Security Officer leading the organization\\u2019s security program and overseeing Security, Enterprise Engineering and Privacy, Risk and Compliance (PRC). Prior to joining Vanta, Jadee served as CISO and CIO for Code42, where she elevated the Security team within Code42, helping internal teams and customers adopt right-sized risk management and increasing the company\\u2019s cyber detection, response, and recovery capabilities.Previously, Jadee held a number of senior leadership roles in the security department of Target Corporation including serving as the security leader for the acquisition of software development and online retail companies, and the sale of Target Pharmacies to CVS Health. Before joining Target, Jadee worked at Deloitte as a security consultant for companies across diverse industries such as healthcare, manufacturing energy, retail and more. Hanson received her Bachelor of Science, Information Systems from the University of North Dakota.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 16, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-323-deep-dive-jadee-hanson-is-compliancejqm&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2089879\\\/c1e-n439hdz3dza9z48r-47xd3j3kfnmq-euzbwf.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;33:43&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1752645633,&quot;key&quot;:&quot;56a87c51841775c92d86659fcc9ea6d6&quot;},&quot;ppe-4514-51&quot;:{&quot;title&quot;:&quot;Episode 322 Deep Dive: Courtney Guss | Resilience in Real Time: Women, Leadership and the Frontlines of Cyber Crisis&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Courtney Guss, Director of Crisis Response at Sempris, as she sheds light on why a crisis plan alone won\\u2019t always save organizations in moments of disruption. Courtney unpacks surprising research showing that despite 97% of organizations regularly planning and training for crises, 76% still suffer significant impacts during incidents. She discusses how misaligned training, outdated and irrelevant scenarios, and a \\u201ccheckbox\\u201d mentality frequently undermine preparedness. Courtney emphasizes the need for organizations to tailor crisis exercises to their specific business context, practice more frequently in smaller, relevant groups, and prioritize adaptability with backup plans when things go awry. She also highlights the importance of having accessible contact information and robust communication channels, as well as clearly defined decision triggers and justifications for pivoting during an incident.&lt;\\\/p&gt;\\n&lt;p&gt;Courtney Guss, Semperis, Director of Crisis Management\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;Courtney Guss brings over 20 years of experience in cybersecurity, crisis response, and business resilience. She began her career in the insurance and risk management sector, working with FEMA and the NFIP, where she developed a strong foundation in emergency preparedness and crisis communications before transitioning into cybersecurity leadership roles.\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;Courtney has led cyber crisis management initiatives for a wide range of organizations, including global enterprises, government agencies, and Fortune 500 companies. She previously served as a senior consultant at IBM Security, where she specialized in cyber risk quantification using the FAIR framework and advised clients on regulatory compliance, incident response, and stakeholder management.\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;Her work has included developing and running executive-level tabletop exercises, supporting ransomware recovery efforts, advising organizations on SEC, DORA, CCOP, and CIRCIA reporting obligations, and orchestrating cross-functional response plans to major incidents. Courtney is passionate about turning chaos into order and equipping teams with the clarity, tools, and playbooks they need to act decisively under pressure.\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 11, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-322-deep-dive-courtney-guss-resilience-inuml&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2085474\\\/c1e-kdkxsggn36u941jo-mkj14k3xhd9r-90iepi.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;41:43&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1752213471,&quot;key&quot;:&quot;70aa1b19b93b7800ca78c0e0ad308f27&quot;},&quot;ppe-4514-52&quot;:{&quot;title&quot;:&quot;KBI.Media Update | KBKast Partners with Vanta as First Exclusive Sponsor&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;strong&gt;&lt;a href=\\&quot;https:\\\/\\\/kbi.media\\\/\\&quot;&gt;KBI.Media&lt;\\\/a&gt;&lt;\\\/strong&gt;\\u00a0is proud to announce a landmark partnership between\\u00a0KBKast, the flagship security podcast for leadership, and\\u00a0&lt;a href=\\&quot;https:\\\/\\\/vanta.com\\\/kbkast\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Vanta&lt;\\\/a&gt;, the leading trust management platform.&lt;\\\/p&gt;\\n&lt;p&gt;In a dynamic and rapidly evolving media landscape, companies like Vanta are exploring innovative platforms to amplify their presence and impact. This partnership enables KBKast to:&lt;\\\/p&gt;\\n&lt;ul&gt;\\n&lt;li&gt;Invest in content development: Improve production quality and explore new formats to engage listeners more deeply&lt;\\\/li&gt;\\n&lt;li&gt;Foster brand trust: Support brands in reaching security-minded audiences through authentic, expert-driven conversations&lt;\\\/li&gt;\\n&lt;li&gt;Enhance cybersecurity awareness: Continue providing valuable, accessible insights to a global audience&lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&lt;p&gt;With Vanta\\u2019s involvement, KBKast will introduce:&lt;\\\/p&gt;\\n&lt;ul&gt;\\n&lt;li&gt;Expert insights: Timely discussions on the evolving compliance and security landscape&lt;\\\/li&gt;\\n&lt;li&gt;Real-world case studies: Practical lessons from businesses navigating compliance challenges&lt;\\\/li&gt;\\n&lt;li&gt;Resource-rich learning: Access to best-in-class materials and frameworks via Vanta\\u2019s expertise&lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 10, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/kbimedia-update-kbkast-partners-with-vanta-as-firgop&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2085059\\\/c1e-02xmskkn4vsgm3k5-7z9k4xo0fmd1-nlnmwp.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;01:02&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1752127399,&quot;key&quot;:&quot;77ae0f3307ab5ef528a99af9a0c1cc13&quot;},&quot;ppe-4514-53&quot;:{&quot;title&quot;:&quot;Episode 321 Deep Dive: Graeme Neilson | How the Security Industry Ignores the Halting Problem&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Graeme Neilson, Founder and Chief Research Officer at Siege, as he unpacks why the security industry often ignores the halting problem\\u2014a foundational concept in computer science that explains why software will always contain bugs and vulnerabilities. Graeme challenges the efficacy of awareness training programs, arguing that fundamental flaws in protocols like email and the complexity of software itself, not user behaviour, are the real culprits behind persistent cyber risks. The discussion explores the ongoing frustrations around password management and multifactor authentication, the dangers of concentrating credentials in cloud-based password managers, and the risks introduced by abstracted and AI-generated code. Graeme also emphasises that the true security challenge lies in managing identity\\u2014both human and machine\\u2014as digital systems become more pervasive and embedded in our daily lives, advocating for a move towards treating cybersecurity issues more like safety concerns in other industries.&lt;\\\/p&gt;\\n&lt;p&gt;Graeme was born in Scotland, learnt cracking, reverse engineering and security from the Internet. Emigrated to NZ in early 2000\\u2019s and was one of the founders of Aura Information Security (pen testing company and RedShield (web defence company). He has presented original offensive security research at many international conferences including Blackhat, H2HC, Troopers, Ruxcon and Kiwicon. Now he is head of research for Siege Ltd, an NZ based company specialising in testing denial of service and bot mitigations.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 9, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-321-deep-dive-graeme-neilson-how-the-secuwee&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2084275\\\/c1e-02xmskkxzntgm3k5-xx4v2g8kfvq1-xwo5y7.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:10&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1752040707,&quot;key&quot;:&quot;d8932a76060a15178cef56bd47dbe24d&quot;},&quot;ppe-4514-54&quot;:{&quot;title&quot;:&quot;Episode 320 Deep Dive: Kavitha Mariappan | The Future of Data Protection&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Kavitha Mariappan, Chief Transformation Officer at Rubrik, as she unpacks data protection and the critical importance of cyber resilience. Kavitha challenges the industry\\u2019s tendency to hyper-focus on prevention and detection, advocating instead for a holistic approach that integrates resilience and recovery as boardroom imperatives. She shares insights from Rubrik Zero Labs on the real-world challenges organizations face when recovering from ransomware attacks, and highlights the often-overlooked need to make backup, recovery, and risk mitigation a core part of business continuity and security strategy. The conversation covers the business impact of breaches\\u2014including monetary loss, reputational risk, and regulatory implications\\u2014while emphasizing the growing complexity of identity management in the age of AI and the need for interoperability between security domains. Kavitha also stresses the role of executive leadership in driving change and the importance of public-private collaboration to shape standards and frameworks for a secure digital future.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Kavitha Mariappan, Chief Transformation Officer, Rubrik&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Kavitha leads Rubrik\\u2019s efforts to accelerate enterprise transformation and deepen executive engagement, with a focus on expanding Rubrik\\u2019s footprint across the Global 2000 and public sector decision-makers. She partners across the GTM organization, shaping Rubrik\\u2019s CXO narrative, championing value economics, and unlocking new revenue streams. Prior to Rubrik, Kavitha was EVP of Customer Experience &amp; Transformation at Zscaler, where she built and scaled the company\\u2019s CXO and Transformation Practice. She holds a B.Eng. in Communication Engineering from the Royal Melbourne Institute of Technology, Australia, and an M.S. in Cybersecurity Risk and Strategy from NYU School of Law and Tandon School of Engineering.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 4, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-320-deep-dive-kavitha-mariappan-the-futuriud&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2080517\\\/c1e-gkvqbmm943h249gq-jpd0xd32u71-1vglja.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;39:16&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1751608439,&quot;key&quot;:&quot;7d226386ee78c0a17695db825732b164&quot;},&quot;ppe-4514-55&quot;:{&quot;title&quot;:&quot;From JFrog EveryOps Day &#8217;25 Sydney \\u2013 KB On The Go | Sunny Rao, Craig Wilson, and Tal Zarfati&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this bonus episode, KB sits down with Sunny Rao, SVP, Asia Pacific at JFrog, Craig Wilson, Principal Cloud Platform Engineer at Iress, and Tal Zarfati, Architect Lead at JFrog Security. Together they discuss how to strengthen software supply chain security, modernising infrastructure through cloud migration to overcome legacy constraints, and the CISA-MITRE CVE funding scare.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Sunny Rao, SVP, Asia Pacific at JFrog&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Sunny Rao is SVP, Asia Pacific at JFrog and brings almost three decades of business management experience in information technology and enterprise software. Rao has vast experience and deep expertise in the global expansion of emerging technologies and is passionate about helping customers and partners enhance, secure, and accelerate their entire software supply chain with JFrog.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Craig Wilson, Cloud Platform Principal Engineer at Iress&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Craig Wilson is a Cloud Platform Principal Engineer at Iress, where he focuses on cloud architecture and developer tools, and champions \\u2018shift-left\\u2019 practices to implement secure software delivery platforms.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Tal Zarfati, Architect Lead, JFrog Security&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Tal Zarfati is the Architect Lead at JFrog Security, bringing over 20 years of expertise in software engineering and cybersecurity. With a strong background in leading R&amp;D teams focused on Supply Chain security, he has since spearheaded the development of core SCA and SBOM capabilities and owned the JFrog OSS Catalog product, leading multiple teams to bring it to life.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 2, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/from-jfrog-everyops-day-25-sydney-kb-on-the-go-jm4&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2079361\\\/c1e-kdkxsggvmzb941jo-ndn99qqxs14p-knphp5.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;01:20:48&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1751436015,&quot;key&quot;:&quot;ca01139cfd3461b53955828205ae6ca5&quot;},&quot;ppe-4514-56&quot;:{&quot;title&quot;:&quot;Episode 319 Deep Dive: Paul O&#8217;Rourke | The New Function Of A CRO And What This Actually Means&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Paul O\\u2019Rourke, Chief Risk Officer at TabCorp, as he explores the evolving function of the Chief Risk Officer (CRO) and what it means for organizations today. Paul highlights the growing necessity for CROs to possess deep technology and cyber risk skills, emphasizing that these competencies are rapidly becoming non-negotiable in tech-reliant industries. He reflects on the historical divide between business and tech risk functions, the importance of alignment and integrated approaches such as fusion centers, and how risk professionals must now balance traditional domains with new challenges like cybercrime, AI, and rapidly emerging threats.&lt;\\\/p&gt;\\n&lt;p&gt;Paul O\\u2019Rourke commenced as Chief Risk Officer in June 2024.&lt;\\\/p&gt;\\n&lt;p&gt;Paul brings a great depth of experience in risk management, including with respect to cybersecurity and technology risk management.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to joining Tabcorp, Paul was Managing Director and Partner of Boston Consulting Group where he led their Global Cyber and Digital Risk practice, and was also the Australian Risk Leader.&lt;\\\/p&gt;\\n&lt;p&gt;He was previously the Global and Asia Pacific Cybersecurity Leader at PwC, and was Chief Information Security Officer of ANZ Bank Limited.&lt;\\\/p&gt;\\n&lt;p&gt;Paul holds a Bachelor of Commerce (Economics) and is a Graduate Member of AICD.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 27, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-319-deep-dive-paul-orourke-the-new-function-of-a-cro-and-what-this-actually-means&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2076637\\\/c1e-jjvwh55q56fn1k29-7z37jk26sngv-nqvfrd.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;33:22&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1751003768,&quot;key&quot;:&quot;808440616400593aeec833ff8ad649e8&quot;},&quot;ppe-4514-57&quot;:{&quot;title&quot;:&quot;Episode 318 Deep Dive: Chuck Herrin | Staying Ahead of Surging API Attacks&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Chuck Herrin, Field CISO and Customer Advocate at F5, as he unpacks the evolving threat landscape around APIs and AI in today\\u2019s organizations. Chuck explores how APIs have transformed from simple plumbing into the primary attack surface, often outpacing defenders due to historic silos between security and development teams. He highlights the acceleration of vulnerabilities and the widening gap created by tech debt, skill shortages, and the relentless push for innovation. Chuck also discusses the enormous pressure businesses face to adopt AI rapidly, often at the expense of security, and emphasizes the importance of leadership, board-level engagement, and foundational policy shifts to balance speed and safety.&lt;\\\/p&gt;\\n&lt;p&gt;Chuck Herrin is the Field CISO of F5. Prior to F5,\\u00a0Chuck\\u00a0was the CTO of Wib, an API security firm that created the second generation of API security solutions designed from the ground up to provide end to end visibility, testing, and context to discover, test, and secure all APIs across a customer ecosystem. Prior to Wib,\\u00a0Chuck\\u00a0spent 19+ years as a CISO in financial services and banking, including SVP and Head of IT Security, Risk, and Compliance for all of AIG\\u2019s consumer-facing divisions and EVP and CISO of Texas Capital Bank prior to being named \\u201cMost Trusted Bank in America\\u201d by Newsweek in 2022.&lt;\\\/p&gt;\\n&lt;p&gt;A lifelong learner,\\u00a0Chuck\\u00a0holds a litany of industry certifications gathered over the last 25 years, as well as a bachelor\\u2019s degree in biology from Lenoir Rhyne University. When not traveling to events and customer locations,\\u00a0Chuck\\u00a0is based out of his ranch in North Dallas.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 25, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-318-deep-dive-chuck-herrin-staying-ahead-of-surging-api-attacks&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2075083\\\/c1e-rdnmswwn76a2kwqj-1pk14d7qt3r6-76qrto.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;39:23&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1750831166,&quot;key&quot;:&quot;534f7757ffaf7fb5365abd741210fa60&quot;},&quot;ppe-4514-58&quot;:{&quot;title&quot;:&quot;Episode 317 Deep Dive: Norbert Kiss | The Importance Of Securing Machine Identities As Part Of Cybersecurity Strategies&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Norbert Kiss, Senior Vice President, Asia Pacific, from Delinea, as he unpacks the critical role of securing machine identities within a modern cybersecurity strategy. Norbert explores the immense growth of non-human identities\\u2014such as bots, AI agents, and APIs\\u2014that now vastly outnumber human identities, and the major risks this brings for organizations. He underscores the importance of starting with visibility and least privilege, noting that many companies lack awareness of just how many machine identities exist in their networks. Norbert discusses the need for parity between human and machine identity governance, the challenges posed by rapid AI adoption, and the importance of balancing robust controls with organizational productivity.&lt;\\\/p&gt;\\n&lt;p&gt;Norbert Kiss has been Senior Vice President for Asia Pacific (APAC) at Delinea since January 2024, bringing over 30 years of experience in scaling and leading technology businesses across the region. A seasoned executive, he has a proven track record of driving growth, expanding market presence, and building strategic partnerships in the cybersecurity and technology sectors.&lt;\\\/p&gt;\\n&lt;p&gt;Before joining Delinea, Norbert was Vice President, APAC at Grafana Labs, where he significantly expanded the company\\u2019s footprint, driving growth and spearheading entry into new geographic markets. Prior to that, as Vice President, APAC at NGINX, he played a pivotal role in establishing the company\\u2019s presence in the region, leading its expansion across key markets and overseeing its integration into F5 Networks following its acquisition.&lt;\\\/p&gt;\\n&lt;p&gt;Throughout his career, Norbert has held leadership roles at Kemp, WatchGuard, and other prominent technology and cybersecurity firms, consistently demonstrating his expertise in market expansion, business transformation, and navigating the complexities of the APAC region.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 20, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-317-deep-dive-norbert-kiss-the-importance-of-securing-machine-identities-as-part-of-cyber&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2070520\\\/c1e-z9w7f7m6pncokrwj-qdm55v1db99r-6wpils.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;35:53&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1750399185,&quot;key&quot;:&quot;81c502bf6be46a942bf5dbea0e3cca63&quot;},&quot;ppe-4514-59&quot;:{&quot;title&quot;:&quot;Episode 316 Deep Dive: Martin Creighan | The Critical Move Towards A Cyber Resilient Future&quot;,&quot;description&quot;:&quot;&lt;p&gt;Martin Creighan (\\u201cMartin\\u201d) is Vice President, Asia Pacific at Commvault. He is responsible for organisational leadership, change management, business development and human resources for Commvault\\u2019s dynamic team in APAC.\\u00a0\\u00a0\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;Martin is a highly experienced professional with a stellar record of achievement in senior leadership roles across the Australian technology sector. Having begun his professional life with the United States Navy, he applied his skills to the cyber security and cloud storage landscape across a range of roles, consistently finding success in sales growth and business development.\\u00a0\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;Martin worked at AT&amp;T for 16 years, rising from the Business Development team to become Vice President and Managing Director for the A\\\/NZ region. He moved from there to a similar leadership position at Citrix, before joining Commvault as the Vice President for Sales in A\\\/NZ.\\u00a0\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;Martin was quickly elevated to the Asia Pacific Vice President role, having gained immense success at elevating the Commvault brand and developing the business at a critical juncture in the company\\u2019s evolution.\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 18, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-316-deep-dive-martin-creighan-the-critical-move-towards-a-cyber-resilient-future&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2068450\\\/c1e-pjr0h15zpximo9x0-wwxo79rxad23-u8z4le.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;45:57&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1750226446,&quot;key&quot;:&quot;b029ba19301390e7fea43d3bf99e33fb&quot;},&quot;ppe-4514-60&quot;:{&quot;title&quot;:&quot;Episode 315 Deep Dive: Matt Watts | The Journey From Storage To Intelligent Data Infrastructure&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Matt Watts, Global Data Expert, as he explores the journey from storage to intelligent data infrastructure. Matt walks us through the four major technology waves that have shaped the industry: modular technologies, virtualization, cloud computing, and the dawn of intelligent data infrastructure driven by AI. He shares insights from his book, reflecting on how each wave brought greater flexibility, innovation, and technical complexity, while also introducing new challenges around data management and technical debt. Matt unpacks the persistent struggle organizations face in managing legacy data, the evolving role of storage in cybersecurity with autonomous ransomware protection, and the impact of regulations like GDPR. He concludes with forward-looking perspectives on quantum computing as the potential fifth wave, detailing its implications for security, networking, and computational power, and emphasizing both the opportunities and responsibilities that come with rapid technological advancement.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Matt Watts&lt;br \\\/&gt;\\n&lt;\\\/strong&gt;Matt is increasingly in demand as a keynote speaker, combining his knowledge of the IT industry with anecdotes and stories that bring technology to life with witty, easily understandable examples. Matt project Managed a number of significant IT projects; managed System Engineers responsible for providing installation and onsite support; as well as overseeing IT outsourcing contracts. This experience has given him contact with all levels of Leadership, enabling him to understand, communicate with and support clients with their IT and transformation Strategies.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 13, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-315-deep-dive-matt-watts-the-journey-from-storage-to-intelligent-data-infrastructure&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2063884\\\/c1e-kdkxsgjdx4f941jo-1pk9nzn4ad13-cawft7.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;49:45&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1749794224,&quot;key&quot;:&quot;93b0cda78608bf34d349aca5b07201f0&quot;},&quot;ppe-4514-61&quot;:{&quot;title&quot;:&quot;Episode 314 Deep Dive: Imran Husain | Cybersecurity Threats in the Manufacturing World&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Imran Husain, Chief Information Security Officer at MillerKnoll, as he discusses the evolving landscape of cybersecurity threats in the manufacturing sector. Imran explores the challenges that arise as manufacturing increasingly integrates with online technologies and IoT, highlighting the unique vulnerabilities posed by legacy systems and operational technology (OT). He shares insights on high-profile incidents like the Norsk Hydro ransomware attack, emphasizing the importance of cyber resilience, data backup, and incident recovery. Imran also offers a candid look at why critical tasks like backing up data are often neglected, the complexities of securing aging infrastructure, and the need for creative solutions such as network segmentation and IT\\\/OT convergence.&lt;\\\/p&gt;\\n&lt;p&gt;A dedicated and trusted senior Cyber security professional,\\u00a0Imran\\u00a0Husain has over 22 years of Fortune 1000 experience that covers a broad array of domains which includes risk management, cloud security, SecDevOps, AI Security and OT Cyber practices. A critical, action-oriented leader\\u00a0Imran\\u00a0brings strategic and technical expertise with a proven ability to build cyber program to be proactive in their threat detection, identifying and engaging in critical areas to the business while upholding their security posture. He specializes in Manufacturing and Supply Chain Distribution focusing on how to best use security controls and processes to maximize coverage and reduce risk in a complex multi-faceted environment. A skilled communicator and change agent with bias to action who cultivates an environment of learning and creative thinking,\\u00a0Imran\\u00a0champions open communication and collaboration to empower and inspire teams to exceed in their respective cyber commitments. He is currently the Global Chief Information Security Officer (CISO) at MillerKnoll, a publicly traded American company that produces office furniture, equipment, and home furnishings.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 11, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-314-deep-dive-imran-husain-cybersecurity-threats-in-the-manufacturing-world&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2062042\\\/c1e-kdkxsgjx2va941jo-z32gv631t4v1-vydfso.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;41:35&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1749621615,&quot;key&quot;:&quot;f514b3b69941410d8f7d2f0490941e7b&quot;},&quot;ppe-4514-62&quot;:{&quot;title&quot;:&quot;Episode 313 Deep Dive: Rose Alvarado &amp; Jenna Eagle | Security Data Pipeline and the Future of SOC&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Rose Alvarado, Regional Sales Manager, and Jenna Eagle, Solutions Engineer Lead, from Cribl as they unpack the evolving role of the security data pipeline and the future of the SOC. Rose and Jenna discuss the increasing demand for flexibility and control over data management, highlighting how organizations are moving away from vendor lock-in to gain better cost efficiencies and visibility. They examine the challenges of managing explosive data growth, the shift from traditional SIEM solutions to data pipelines for pre-processing, and the importance of routing high-value data to appropriate platforms.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;a href=\\&quot;https:\\\/\\\/www.linkedin.com\\\/in\\\/rose-alvarado-18602a47\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Rose Alvarado&lt;\\\/a&gt; is an accomplished security specialist with more than eleven years of experience in the Australian Enterprise IT industry who partners with CISOs, CIOs and IT Managers to provide them with the best IT security and data solutions that meet their needs. Currently, she is the Regional Sales Manager for NSW at Cribl, helping organisations adopt a better data management strategy, improving their security and observability operations while reducing their cost of ownership. She is passionate about cybersecurity and data management, she constantly seeks to expand her professional skills and learn from industry experts.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;a href=\\&quot;https:\\\/\\\/www.linkedin.com\\\/in\\\/jennameagle\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Jenna&lt;\\\/a&gt;\\u2019s cyber journey began at Accenture Federal Services, where she collaborated with U.S. federal agencies on mission-critical projects. She then transitioned to Splunk as a Public Sector Solutions Engineer, specializing in compliance, automation, and IT and security modernisation. Now, as a Solutions Engineering Manager for ANZ at Cribl, she helps organisations take control of data growth through optimisation, data tiering, and breaking vendor lock-in. When she\\u2019s not \\u201cCribbling,\\u201d you\\u2019ll find her exploring her new home in Australia or spending time with her American Bulldog.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 6, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-313-deep-dive-rose-alvarado-jenna-eagle-security-data-pipeline-and-the-future-of-soc-1&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2059000\\\/c1e-rdnmswzgv4f2kwqj-kp4v95o5b1d9-aognie.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:48&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1749189610,&quot;key&quot;:&quot;b9d8cadb5af8c8b0c52be9b032b7e23c&quot;},&quot;ppe-4514-63&quot;:{&quot;title&quot;:&quot;Episode 312 Deep Dive: Agnidipta Sarkar | Why Should We Have Invested in Cyber Defence Yesterday&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Agnidipta Sarkar, Chief Evangelist at ColorTokens, as he explores why organizations should have invested in cyber defense yesterday. Agnidipta highlights the increasing pace and impact of cyberattacks despite rising cybersecurity spending, emphasizing that the real challenge is a matter of mindset rather than budget. He discusses the evolving role of boards and leadership in prioritizing digital resilience, the need to treat cyber defense as a fundamental business cost, and the critical distinction between risk and danger, especially for sectors like critical infrastructure.&lt;\\\/p&gt;\\n&lt;p&gt;Agni is a CxO Advisor specializing in digital resilience and cyber defense, with a primary focus on strengthening digital environments to ensure that organizations are adequately prepared for cyber attacks as they reap the benefits of digital business. With over three decades of insightful experience in the fields of cybersecurity, continuity, crisis management, privacy, and risk optimization, he actively advocates for and promotes zero-trust principles across complex systems, including on-premises, cloud, and operational technology\\\/industrial control systems (OT\\\/ICS) environments. Agni is a highly regarded speaker and thought leader, contributing his expertise to various industry forums and standards organizations, such as ISO and the Cloud Security Alliance, where he plays a pivotal role in shaping the future of cybersecurity practices for a safer digital landscape.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 4, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-312-deep-dive-agnidipta-sarkar-why-should-we-have-invested-in-cyber-defence-yesterday-1&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2057732\\\/c1e-o39rf29kmkb8n0xz-v6doo7m8tqxv-uu2el5.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;38:01&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1749016998,&quot;key&quot;:&quot;008cb9ae4313e5b4f16b172b2e59fa44&quot;},&quot;ppe-4514-64&quot;:{&quot;title&quot;:&quot;From AUSCERT Cyber Security Conference \\u2013 KB On The Go | Ivano Bongiovanni&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Ivano Bongiovanni, General Manager at AUSCERT, as he unpacks the evolving landscape of the cybersecurity profession. Ivano discusses the shift towards developing complementary skills beyond technical expertise, emphasizing the value of communication, stakeholder management, and project leadership alongside core technical abilities. He explores the concept of T-shaped professionals and advocates for hands-on, experiential learning to build these diverse skill sets. The conversation delves into the ongoing debate around the professionalization of cybersecurity, with Ivano highlighting the pros and cons of structuring the industry with formal certifications versus a more open, experience-based approach. He stresses the importance of open, constructive dialogue within the community to address these issues, ultimately focusing on the shared goal of strengthening cybersecurity and fostering a more mature, collaborative industry.&lt;\\\/p&gt;\\n&lt;p&gt;Ivano is a researcher, consultant, author, and speaker whose work focuses on the\\u00a0&lt;strong&gt;managerial and business implications of Cybersecurity&lt;\\\/strong&gt;.&lt;\\\/p&gt;\\n&lt;p&gt;He is the\\u00a0&lt;strong&gt;General Manager of AUSCERT&lt;\\\/strong&gt;, a not-for-profit organisation affiliated with UQ that delivers cybersecurity services to public and private sector organisations across Australia and New Zealand.&lt;\\\/p&gt;\\n&lt;p&gt;Ivano is also a\\u00a0&lt;strong&gt;Senior Lecturer in Cybersecurity Management&lt;\\\/strong&gt;\\u00a0with the UQ Business School and a member of\\u00a0&lt;strong&gt;UQ Cyber.&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Ivano helps business leaders and executives make evidence-based decisions in cybersecurity. With a professional background in risk and security management, Ivano\\u2019s work bridges the gap between technical cybersecurity and its repercussions across organisations. He has advised ministers, policy-makers, board members, and senior executives on strategies, governance structures, policies, and training programs for\\u00a0&lt;strong&gt;effective cybersecurity management&lt;\\\/strong&gt;. Ivano is also an experienced facilitator in the fields of\\u00a0&lt;strong&gt;Design Thinking and Design-Led innovation&lt;\\\/strong&gt;, having run since 2015 more than 50 design-led workshops and longer projects for public and private sector organisations.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to AUSCERT and UQ, Ivano worked as a Research Fellow with the Adam Smith Business School (University of Glasgow) and a Postdoctoral Fellow with the PwC Chair in Digital Economy (QUT). In this role, he worked with public and private sector organisations in projects aimed at facilitate their transition into the Digital Age. Ivano obtained his PhD from QUT in 2016, with a thesis on\\u00a0&lt;strong&gt;safety and security management&lt;\\\/strong&gt;\\u00a0in Australian airports. His academic career includes stints with Bocconi University and SDA Bocconi School of Management (Milan), where he worked as a faculty member and consultant for three years.&lt;\\\/p&gt;\\n&lt;p&gt;He also worked as a\\u00a0&lt;strong&gt;Deputy Venue Security Manager&lt;\\\/strong&gt;\\u00a0at the XX Winter Olympic Games \\u2013 Turin 2006 and as a\\u00a0&lt;strong&gt;Police Officer&lt;\\\/strong&gt;\\u00a0for the Italian Ministry of Interior.&lt;\\\/p&gt;\\n&lt;p&gt;He has a double MSc in Management of Public Administrations and International Institutions (Bocconi University, Milan) and International Security (Sciences Po, Paris).&lt;\\\/p&gt;\\n&lt;p&gt;A father of one and an eager snowboarder, Ivano loves soccer, American football, and writing novels and poems.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 30, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/from-auscert-cyber-security-conference-kb-on-the-go-ivano-bongiovanni&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2053145\\\/c1e-m1o3cqz8j2cwqk4n-7z3o876oim88-dolodi.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;20:33&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1748584949,&quot;key&quot;:&quot;e6787d89c7e3ef438faa39cc05bdb743&quot;},&quot;ppe-4514-65&quot;:{&quot;title&quot;:&quot;Episode 311 Deep Dive: Keith Dorsey | Charting an Intentional Path Toward Corporate Board Service&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Dr. Keith Dorsey, founder and executive advisor at Boardroom Journey, as he discusses charting an intentional path toward corporate board service. Keith explores how board recruitment has evolved from a \\u201cclub\\u201d of familiar faces to a more skills and strategy-based process, emphasizing the importance of self-reflection, understanding one\\u2019s unique value, and being intentional about board aspirations. He shares insights on how uncertainty reduction theory influences board selection, the growing demand for diverse expertise, especially in areas like technology and cybersecurity, and the need for corporate athletes who can contribute broadly. Keith also addresses the complexities of diversity, equity, and inclusion on boards, dispelling myths about meritocracy versus diversity, and encourages aspiring board members to ensure alignment with board cultures before committing.&lt;\\\/p&gt;\\n&lt;p&gt;Dr. Keith D. Dorsey is a researcher, author, advisor, and active board member focused on issues\\u00a0 of diversity, governance, and strategic growth for private and public corporate boards. His recent\\u00a0 research examined women executives\\u2019 pathways to securing corporate board seats, yielding\\u00a0 powerful insights about the barriers and facilitators unique to women candidates seeking these\\u00a0 positions. His book, The Boardroom Journey: Practical Guidance for Women to Secure a\\u00a0 Seat at the Table, combines his research insights with his extensive executive, board, and\\u00a0 industry experience. He speaks on topics related to governance and navigating the path to the C\\u00a0suite and boardroom. As an executive advisor, he is focused on increasing Optimal\\u00a0 DiversityTM within corporate senior management, executive, and board-level roles.\\u00a0\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Board Experience and Certification\\u00a0\\u00a0&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Keith is a National Association of Corporate Directors (NACD) Certified Director and was\\u00a0 recognized as an honoree of the 2023 NACD Directorship 100, an annual recognition of 100\\u00a0 leading corporate directors and corporate governance experts who impact boardroom practices and\\u00a0 performance. He serves as a board member at Vimly Benefit Solutions, a private technology and\\u00a0 third-party administration company; Continu, a private learning management system SaaS\\u00a0 company; Pepperdine University\\u2019s Graziadio Business School, Pacific Crest Trail Association;\\u00a0 and the Chair of the City of La Quinta\\u2019s Financial Advisory Commission. Former Board Member,\\u00a0 Orion Talent, a recruitment process outsourcing and talent acquisition firm. Keith is also an\\u00a0 Executive Leadership Council (ELC) member and a graduate, mentor, and advisor of Santa Clara\\u00a0 University\\u2019s Black Corporate Board Readiness program.\\u00a0\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Corporate Experience\\u00a0\\u00a0&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Keith founded the Boardroom Journey, a leadership development consultancy dedicated to\\u00a0 helping professionals access board education, gain needed certifications, and make efficient\\u00a0 progress to the C-suite and the boardroom. As a senior advisor at Boyden, a global executive search\\u00a0 and consulting firm, he also helps executive teams and boards enhance their governance quality\\u00a0 through a comprehensive set of board consulting services, including full-scale governance review,\\u00a0 board, committee, and director assessments, M&amp;A governance planning, board refreshment, and\\u00a0 CEO succession planning.\\u00a0\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;In his former role as President and Executive Advisor for Dorsey Management Consulting, he\\u00a0 mentored and advised CxOs on their sales growth and go-to-market strategies, helped businesses\\u00a0 align their strategies with sales expectations, aggressively grew their bottom line and shareholder\\u00a0 value during significant periods of change, and optimized leadership and sales team effectiveness.\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;He has over 25 years of sales leadership experience in the Human Capital Management industry,\\u00a0 such as at Alight Solutions (formerly Aon Hewitt and Hewitt Associates), a $2.3B leading provider\\u00a0 of human capital solutions where he served as the Executive Vice President, Global Head of Sales\\u00a0 responsible for the overall sales growth strategy and execution. Under Keith\\u2019s executive\\u00a0 leadership, his sales teams consistently produced double-digit annual growth. Prior to joining\\u00a0 Hewitt Associates, Keith worked with Paychex, Inc., a Fortune 1000 payroll and HR outsourcing\\u00a0 company, for 16 years. He was a Zone Sales Manager responsible for the growth and delivery of\\u00a0 revenue in their Human Resource Service Division. Before Paychex, Keith spent three years in the\\u00a0 insurance industry and five years serving his country in the U.S. Air Force.\\u00a0\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Education\\u00a0\\u00a0&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Keith has a Doctor of Education in Organizational Change and Leadership at the University of\\u00a0 Southern California. His dissertation research examined gender and ethnic diversity on corporate\\u00a0 boards. He also holds an MBA from Pepperdine University and a BS in Business Administration\\u00a0 from Charter Oak State College.\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 28, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-311-deep-dive-keith-dorsey-charting-an-intentional-path-toward-corporate-board-service&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2050387\\\/c1e-02xmsk872nagm3k5-wwxro51muord-dftr8x.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;47:36&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1748412057,&quot;key&quot;:&quot;b79af6be70bba761da981fb16268b3c7&quot;},&quot;ppe-4514-66&quot;:{&quot;title&quot;:&quot;Episode 310 Deep Dive: Sam Mackenzie | Securing Society and the Future&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Sam Mackenzie, cybersecurity committee member from the Australian Computer Society (ACS), as he explores the converging worlds of cyber and physical security and what it means for securing society into the future. Sam highlights the growing risks faced by critical infrastructure, emphasizing the importance of cross-functional collaboration between IT, operational technology, and engineering teams. We dig into why many organizations still fail to capture cyber-physical risks in their enterprise risk registers, how leadership and purposeful collaboration can bridge longstanding disciplinary gaps, and why regular practice, scenario exercises, and embedded cyber champions are essential to build resilience. Sam also discusses his work with the Australian Control Rooms Network Association (ACRNA), the increasing pressures faced by control rooms due to more frequent severe weather events, and the impact of regulations and \\u201csecure by design\\u201d principles on product development and security investment.&lt;\\\/p&gt;\\n&lt;p&gt;Sam Mackenzie is a driven technology and cybersecurity leader with 25 years of experience dedicated to protecting and advancing critical infrastructure. As a valued committee member of both the Australian Control Rooms Network Association and the Australian Computer Society, Sam is known for his structured thinking, his talent for simplifying complex challenges, and his ability to harness culture as a catalyst for meaningful change. Sam\\u2019s career spans leadership roles with global brands and household names in Australia, where he has built high-performance teams across sectors including health, telecoms, energy, and local government. With hands-on expertise in seven of the eleven Security of Critical Infrastructure (SOCI) Act sectors, Sam\\u2019s straightforward approach and thought leadership\\u2014evident through his frequent speaking engagements, panel hosting, and published works\\u2014continue to drive high-quality technology and security outcomes.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 23, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-310-deep-dive-sam-mackenzie-securing-society-and-the-future&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2044885\\\/c1e-02xmsko0o1fgm3k5-jpdgg08kbj09-8dn9z0.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;33:38&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1747979818,&quot;key&quot;:&quot;33ec0150bef599e075da7fb44658aa90&quot;},&quot;ppe-4514-67&quot;:{&quot;title&quot;:&quot;Episode 309 Deep Dive: Helmut Dansachmueller | Passwordless Authentication To Help Australia&#8217;s Healthcare Industry&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Helmut Dansachmueller, VP RFID Products Identification Technologies at HID, as he explores the growing need for passwordless authentication in safeguarding Australia\\u2019s healthcare industry. Helmut highlights the global nature of security threats, emphasizing that seamless, user-accepted MFA and FIDO-based systems are critical for protecting patient data without imposing extra burdens on employees. The discussion covers the frustrations employees face with password management\\u2014including frequent changes and insecure storage and the importance of user education and acceptance for successful security adoption. Helmut also addresses practical challenges in clinical environments, such as the need for fast, reliable access during emergencies and robust processes for lost credentials, and looks forward to future innovations like biometrics to further streamline secure authentication in healthcare.&lt;\\\/p&gt;\\n&lt;p&gt;Helmut has been in the security business for more than 25 years in various management roles for some of the leading suppliers of a broad range of security solutions. He also holds some patents. Within the last 20 years he has successfully led different engineering, global product management and marketing teams. His portfolio includes one of the first VPN products ever as well as solutions for HW-based encryption solutions in combination with RFID technologies managed by his various teams. He has been with HID now for more than 15 years with a focus on RFID technologies, and is used to challenging the status quo in seeking more customer-friendly solutions and services.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 21, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-309-deep-dive-helmut-dansachmueller-passwordless-authentication-to-help-australias-healt&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2043659\\\/c1e-7km5b9205wsd6vxo-47kqvq0ja77v-tjxi0o.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;35:39&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1747807209,&quot;key&quot;:&quot;71ddf3068f88eb14636a4b9298a4e564&quot;},&quot;ppe-4514-68&quot;:{&quot;title&quot;:&quot;Episode 308 Deep Dive: Samuel Tseitkin | The &#8220;Golden&#8221; Age of Cybersecurity: The Quantum Era&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Samuel Tseitkin, Founder of ExiQuantum, as he explores the profound impact of the quantum era on cybersecurity. Samuel explains the basics of quantum computing, highlighting how quantum bits (qubits) differ from classical bits, and delves into the unique opportunities and challenges quantum technology presents. The discussion covers quantum\\u2019s unparalleled ability to solve complex optimization problems, its looming threat to existing cryptographic systems, and the exponential pace of change reminiscent of AI breakthroughs. Samuel also addresses industry skepticism, the importance of early preparation, and crypto agility in the face of pending quantum advancements. We examine real-world efforts by tech giants and governments, potential timelines for widespread adoption, and the promise of a \\u201cgolden age\\u201d of cybersecurity where quantum may ultimately bolster defenses against cyber threats.&lt;\\\/p&gt;\\n&lt;p&gt;Samuel Tseitkin is a passionate advocate for emerging technologies, with a strong foundation in artificial intelligence and cybersecurity. During his university years, he co-founded the Artificial Intelligence Student Society (AISSOC), a hub for students collaborating on AI projects, where he contributed to and facilitated multiple initiatives.&lt;\\\/p&gt;\\n&lt;p&gt;After completing his Cybersecurity studies at Monash University, Samuel became deeply interested in quantum computing and its implications for digital security. Recognising the urgent need to adapt cybersecurity strategies for a post-quantum world, he founded ExeQuantum to not only raise awareness of the quantum threat but also provide cutting-edge cryptographic solutions.&lt;\\\/p&gt;\\n&lt;p&gt;Since then, Samuel has established himself as a thought leader in post-quantum cybersecurity, delivering lectures, leading panels, and driving discussions across Australia\\u2019s top innovation and technology hubs, including Stone &amp; Chalk, the University of Melbourne, and Monash University. His mission is clear: to ensure businesses and institutions are prepared for the next era of digital security.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 16, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-308-deep-dive-samuel-tseitkin-the-golden-age-of-cybersecurity-the-quantum-era&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2040783\\\/c1e-6wnpcow6g6fndop0-v6djm115ujr7-ml51h1.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;38:26&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1747375213,&quot;key&quot;:&quot;a364d2eb260a3545588e36cf9fbcf616&quot;},&quot;ppe-4514-69&quot;:{&quot;title&quot;:&quot;From Oracle CloudWorld Tour 2025 Sydney \\u2013 KB On The Go | Juan Loaiza and Chris Chelliah&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this bonus episode, we sit down with Juan Loaiza, Executive Vice President, Mission-Critical Database Technologies, and Chris Chelliah, Senior Vice President, Technology and Customer Strategy JAPAC. Together they discuss the how enterprises are leveraging AI and cloud infrastructure, and updates on the Oracle Cloud Infrastructure (OCI) strategy in the JAPAC region.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Juan Loaiza, Executive Vice President, Database Technologies, Oracle&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;He is responsible for leading product strategy, development, and management for the world\\u2019s leading transaction processing and engineered systems technologies, in the cloud and on-premises. His team is focused on automating and converging database technologies to make application development and operations dramatically easier, saving customers time and money and allowing them to focus on what matters most to them.&lt;\\\/p&gt;\\n&lt;p&gt;Juan holds BS and MS degrees in computer science from the Massachusetts Institute of Technology. In 1988, he left the MIT doctoral program to join the Oracle Database engineering team and has been an innovator in database technologies ever since. In his free time, Juan is an active supporter of more than 15 organisations around the world that work to conserve wildlife and wild places, including WildAid and Wildlife Conservation Network.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Chris Chelliah, Senior Vice President, Technology and Customer Strategy, Oracle JAPAC&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Chris Chelliah leads Oracle\\u2019s digital transformation strategy across Japan and Asia Pacific, driving hypergrowth in cloud infrastructure and autonomous databases. He oversees cloud specialist sales teams, industry architects, and Oracle Insight experts to deliver a consultative, customer-focused approach that helps businesses achieve their goals.&lt;\\\/p&gt;\\n&lt;p&gt;Chris has nearly 30 years of experience across a variety of portfolios in Asia Pacific, Europe, and North America. Previously at Oracle, he focused on customer success with consulting and implementation services in global projects in the telecommunications, financial services, and government sectors. He\\u2019s a frequent industry speaker and contributes regularly to trade and industry journals and opinion pieces on applications for emerging technologies.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 14, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/from-oracle-cloudworld-tour-2025-sydney-kb-on-the-go-juan-loaiza-and-chris-chelliah&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2039615\\\/c1e-89g7foqn55c1d8wj-jpdvdr80u04d-vumaba.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;54:11&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1747202249,&quot;key&quot;:&quot;8381a8163b4b1e99faebc125eb48460d&quot;},&quot;ppe-4514-70&quot;:{&quot;title&quot;:&quot;Episode 307 Deep Dive: Simon Hodgkinson | Current Affairs Of State-Sponsored Cyber Attacks And Their Evolving Tactics&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Simon Hodgkinson, Strategic Advisor at Semperis, as he shares his insights on the persistent and evolving tactics of state sponsored cyber actors targeting Australian organizations. Simon explores motivations behind these attacks, emphasizing that their primary drivers are often espionage and the prepositioning of access in critical infrastructure rather than financial gain. He discusses the persistent targeting of Australia due to its geopolitical alliances, the growing desensitization to data breaches, and the rising threats to sectors like healthcare. Simon also highlights the dual-edged role of AI in both defending against and enabling sophisticated cyberattacks, the importance of speed in responding to incidents, and the necessity of robust foundational controls to manage growing risks.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Simon Hodgkinson, Strategic Advisor at Semperis&lt;br \\\/&gt;\\n&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Simon Hodgkinson is the former Chief Information Security Officer (CISO) at bp. He was responsible for cybersecurity including strategy, governance, architecture, education, counter threat operations, and incident response. He joined bp in 2002 and has held several senior IT leadership roles.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to becoming CISO, he was the VP for Infrastructure &amp; Integration Services at bp. During this time, he drove a significant improvement in IT operational integrity, led a transformation program and spearheaded the commitment to improve employees\\u2019 IT experience. He led the CISO function in bp Supply &amp; Trading, where he delivered a program to improve cyber-controls, many of which have been implemented across the bp group. Before joining bp, Simon worked in IT for a dotcom, an investment bank, and commercial software companies.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 9, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-307-deep-dive-simon-hodgkinson-current-affairs-of-state-sponsored-cyber-attacks-and-their&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2028261\\\/c1e-41r8c1no1vsopgxk-gp3do875snjx-hjvgpt.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;39:52&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1746770420,&quot;key&quot;:&quot;186c7469855a7684334092f0d7b872e3&quot;},&quot;ppe-4514-71&quot;:{&quot;title&quot;:&quot;Episode 306 Deep Dive: Reuben Koh | How to Defend Against Cyberattacks on Networks and Systems&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Reuben Koh, Director of Security Strategy APJ at Akamai, as he explores the rapidly evolving landscape of cyber threats and strategies for defense. Reuben sheds light on the significant rise in sophisticated ransomware attacks, the increased targeting of industries like healthcare and finance, and the shifting tactics of threat actors, including data theft and extortion without encryption. He also highlights the surge of hacktivism linked to geopolitical events, the growing role of AI both as a weapon for attackers and a tool for defenders, and the challenges organizations face in balancing fast-paced innovation with cybersecurity preparedness.&lt;\\\/p&gt;\\n&lt;p&gt;Reuben Koh is a Director of Security Technology &amp; Strategy at Akamai Technologies where he provides deep thought leadership and advisory in helping clients align security strategies with their core business initiatives and digital transformation processes.&lt;\\\/p&gt;\\n&lt;p&gt;He also works with Fortune 1000 enterprises and business partners across Asia Pacific &amp; Japan in providing cybersecurity guidance and expertise, especially in domains such as Web Security, Zero Trust, SASE, XDR, network security and Security Operations.&lt;\\\/p&gt;\\n&lt;p&gt;With close to 20 years of experience in cyber security, Reuben previously held prominent leadership roles with industry leaders such as Symantec, CA Technologies, VMware and Cisco Systems. Reuben also holds various industry certifications such as CISSP, CISA, CISM and&lt;br \\\/&gt;\\nITIL.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 7, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-306-deep-dive-reuben-koh-how-to-defend-against-cyberattacks-on-networks-and-systems&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2026347\\\/c1e-901kfdwgkqfdv65r-gp3djqqztdqk-gupbmo.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;44:35&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1746597613,&quot;key&quot;:&quot;d64fb2b8bd700d3c5c8db840ce50122f&quot;},&quot;ppe-4514-72&quot;:{&quot;title&quot;:&quot;Episode 305 Deep Dive: Chris Peake | What&#8217;s Ahead for Cyber Security in Australia and Its Impact on Businesses in 2025&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Chris Peake, Chief Information Security Officer (CISO) and Senior Vice President of Security at Smartsheet, as he explores what lies ahead for cybersecurity in Australia and its impact on businesses in 2025. Chris discusses the evolving role of AI\\u2014both as a tool for cyber adversaries and as an advantage for defenders\\u2014and highlights how AI-driven attacks are likely to decrease the time to exploit vulnerabilities. Chris also shares insights on communicating business enablement and risk with executives, the shift towards integrating security across all business functions, and the need for organisations to use security as a foundational business strategy in order to drive growth and customer confidence.&lt;\\\/p&gt;\\n&lt;p&gt;Chris Peake is the Chief Information Security Officer (CISO) and Senior Vice President of Security at Smartsheet. Since joining in September of 2020, he is responsible for leading the continuous improvement of the security program to better protect customers and the company in an ever-changing cyber environment, with a focus on customer enablement and a passion for building great teams.&lt;\\\/p&gt;\\n&lt;p&gt;Chris holds a PhD in cloud security and trust, and has over 20 years of experience in cybersecurity during which time he has supported organizations like NASA, DARPA, the Department of Defense, and ServiceNow. He enjoys biking, boating, and cheering on Auburn football.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 30, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-305-deep-dive-chris-peake-whats-ahead-for-cyber-security-in-australia-and-its-impact-on&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2022244\\\/c1e-vzj8a7n7m8twz1vk-mk4g2kpqt86x-c85ptg.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:21&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1745992815,&quot;key&quot;:&quot;75b08ef432204a4d22b2d0a6a58196f9&quot;},&quot;ppe-4514-73&quot;:{&quot;title&quot;:&quot;Episode 304 Deep Dive: David Wiseman | The Eroding Trust in Consumer Messaging Apps&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with David Wiseman, Vice President of Secure Communications at BlackBerry, as he discusses the growing challenges around digital sovereignty and trust in consumer messaging apps. David explores the limitations and risks of using platforms like Signal, WhatsApp, and Telegram for sensitive or official communications, highlighting issues such as identity spoofing, loss of data control, and the collection of valuable metadata by adversaries. He explains BlackBerry\\u2019s shift to software-based secure communications that provide governments and enterprises with the necessary controls for confidentiality, compliance, and usability\\u2014delivering \\u201cconsumer app\\u201d simplicity with enterprise-level security.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;BlackBerry Role&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;In his role as the Vice President of Secure Communications, David is a seasoned international public speaker, whose responsibilities include leading the Secure Government Communications business in the Americas and APAC. He specializes in applying technology to real life mission critical business systems with a focus in communications, security, and safety.&lt;\\\/p&gt;\\n&lt;p&gt;David and his team support our customers in understanding how to secure their mobile communications from the most advanced adversaries, especially in complex and highly secure sectors such as defense and military, including &lt;a href=\\&quot;https:\\\/\\\/www.blackberry.com\\\/us\\\/en\\\/company\\\/newsroom\\\/press-releases\\\/2022\\\/nato-clears-blackberry-secusuite-for-global-nato-secure-communications\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;NATO&lt;\\\/a&gt;. David has been with BlackBerry for ten years, joining the organization in November 2014.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Experience&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;David has 25+ years of experience in software, security, information management, mobility and communications at BlackBerry, IBM, SAP, Sybase, and the US Navy. His expertise in Secure Communications leads BlackBerry in the vision of securing a connected future you can trust, helping governments to augment and fortify digital defences to strengthen national security&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Notable Achievements&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;David helped design the world\\u2019s first large-scale environmental geo-spatial database for NASA. He also helped design the software for one of the first shipboard radar data fusion systems for the US Navy.\\u00a0\\u00a0 At BlackBerry, David and his team have helped NATO and multiple global governments operating in challenging geo-political environments to establish trusted, secure communications channels from the battlefield to the boardroom \\u2013 using military-grade software to ensure classified conversations and messages remain private.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 23, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-304-deep-dive-david-wiseman-the-eroding-trust-in-consumer-messaging-apps&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2018182\\\/c1e-5k0vb1nwj2c0xmvo-dmz20kp8f6pg-gg8nbt.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;41:28&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1745388010,&quot;key&quot;:&quot;3b1df2cfaf05aff81ca1f2cba2299e0b&quot;},&quot;ppe-4514-74&quot;:{&quot;title&quot;:&quot;Episode 303 Deep Dive: Anand Pashupathy | Securing the Future &#8211; Confidential AI &amp; Cyber Threats&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Anand Pashupathy, Vice President and General Manager of Product Assurance and Security at Intel, as he discusses the current state of enterprise security, emphasizing growing concerns around data exfiltration, IP leakage, and the increasing sophistication of cyber attacks fueled by AI. He provides insight into how technologies such as Intel SGX and TDX are setting new standards for data protection in use, particularly as AI transitions from cloud-centric to enterprise-wide applications. Anand also highlights the industry\\u2019s journey towards ubiquitous confidential computing, the importance of ecosystem collaboration, and the growing need to create greater awareness and education as the security landscape rapidly evolves.&lt;\\\/p&gt;\\n&lt;p&gt;Anand Pashupathy is Vice President and General Manager of Security Software &amp; Services (S3) Division in the Office of the Corporate Technology Officer organization where he leads a team of senior leaders whose purpose is to deliver security software technologies, services, and practices that empower our customers to achieve their security objectives. His organization\\u2019s product portfolio includes Confidential Compute, Ecosystem Enabling, Security Corporate Technology Initiative, Open Source Security Supply Chain, etc. Anand is also responsible for Intel\\u2019s Confidential Compute vision, strategy, and execution. Previously Anand has held many engineering, program wide and GM leadership roles at Intel. Additionally, Anand has been granted six patents and currently serves a governing board member of the Confidential Computing Consortium.&lt;\\\/p&gt;\\n&lt;p&gt;Anand is a strong advocate for women and underrepresented people in technology, he serves as the Executive Sponsor for an internal employee resource group. For his advocacy and leadership contributions to diversity and inclusion, Anand received the 2023 Global Diversity and Inclusion Achievement Award for Executive Advocate for D&amp;I. Outside of work, Anand and his family love to travel and experience cultures from around the world. He earned his MBA from the Kellogg School of Management, and a Master\\u2019s degree in Computer Science and has been with Intel since the nineties.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 21, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-303-deep-dive-anand-pashupathy-securing-the-future-confidential-ai-cyber-threats&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2016610\\\/c1e-z9w7f72r2jcokrwj-7z39919jigzg-3yby7s.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:11&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1745215071,&quot;key&quot;:&quot;35899419130c911eb168dcd02e4efbf7&quot;},&quot;ppe-4514-75&quot;:{&quot;title&quot;:&quot;Episode 302 Deep Dive: Doris Spielthenner | How Cybersecurity Can Take Australia To Net Zero&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Doris Spielthenner, Managing Director and Regional Manager APAC from SMA Australia, as she discusses the intersection of cybersecurity and Australia\\u2019s push towards net zero energy. Doris emphasizes the need for harmonization of cybersecurity standards across Australia and explores how decentralized renewable energy networks require robust cybersecurity measures to prevent potential threats. She discusses Australia\\u2019s leading position in rooftop solar penetration and the social challenges of transitioning to large-scale renewable infrastructure.&lt;\\\/p&gt;\\n&lt;p&gt;As Managing Director of SMA Australia and Regional Manager APAC, Doris Spielthenner heads the Residential, C&amp;I and Large Scale Utility business across ANZ, India, China and Taiwan, South East Asia, Japan and Korea. Doris Spielthenner joined SMA from senior management positions in the software and professional services industries across APAC, Europe, and the US.&lt;\\\/p&gt;\\n&lt;p&gt;Doris is passionate about building and growing businesses, with strong leadership across B2B and B2C, recently in the Greentech industry. She is a dynamic, results-focused leader with a top tier consulting background and strong planning and execution experience. She is also the co-founder of a global software business.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 9, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-302-deep-dive-doris-spielthenner-how-cybersecurity-can-take-australia-to-net-zero&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2009895\\\/c1e-5k0vb1n006i0xmvo-8dr99wrjcogm-psyefd.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;34:44&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1744178434,&quot;key&quot;:&quot;39cf7ec5efb5591db62abd2818d96ed7&quot;},&quot;ppe-4514-76&quot;:{&quot;title&quot;:&quot;Episode 301 Deep Dive: Ginny Badanes | Threats, AI and Influence Operations Around Elections&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Ginny Badanes, General Manager of Democracy Forward at Microsoft, as she discusses the multifaceted threats posed by nation-state actors around elections, particularly the use of AI in influence operations. Ginny highlights the critical need for society to adopt a healthy skepticism toward information, scrutinizing the trustworthiness of sources and the potential for AI manipulation. We delve into the activities of significant nation-state actors like China, Russia, and Iran in recent elections, and the emergence of AI-driven fake news sites used for propaganda. Additionally, Ginny provides insights into the deceptive use of AI beyond political contexts, including its impact on women and financial fraud schemes.&lt;\\\/p&gt;\\n&lt;p&gt;Ginny Badanes is the General Manager of Microsoft\\u2019s Democracy Forward program, an initiative within Microsoft\\u2019s Technology for Fundamental Rights organisation. At Microsoft, protecting fundamental rights means promoting responsible business practices, expanding accessibility and connectivity, and advancing fair and inclusive societies. Ginny\\u2019s team is focused on addressing challenges to global democratic stability, with efforts aimed at safeguarding open and secure elections, promoting a healthy information ecosystem, and advocating for corporate civic responsibility. In 2024, a key focus of her team\\u2019s work was raising awareness about the deceptive uses of AI in elections and combating these cyber and AI enabled threats.&lt;\\\/p&gt;\\n&lt;p&gt;Ginny has spent her career at the intersection of politics and technology, advising presidential and senate campaigns on leveraging data and technology. She was named among Washingtonian\\u2019s 2021 &amp; 2022 \\u201cMost Influential People\\u201d list for national security and defense.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 2, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-301-deep-dive-ginny-badanes-threats-ai-and-influence-operations-around-elections&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2004844\\\/c1e-pjr0h1p4z9bmo9x0-okwr7z29u1j3-5ws9x0.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:32&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1743569900,&quot;key&quot;:&quot;b0cd851408d0b83ae2357e3b22290421&quot;},&quot;ppe-4514-77&quot;:{&quot;title&quot;:&quot;From Microsoft AI Tour 2024 \\u2013 KB On The Go | Mick Dunne, Ben Lamont &amp; Helen Schneider, and Leigh Williams&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this bonus episode, we sit down with Mick Dunne, Chief Security Advisor at Microsoft, Ben Lamont, Chief Data Officer &amp; Helen Schneider Commander, ACCCE and Human Exploitation for the Australian Federal Police and Leigh Williams, Chief Information Officer, Information and Technology Executive at Brisbane Catholic Education. Together they discuss the function of the Customer Security Officer team, how the AFP is using AI to protect Australia and its people, and the impact AI has on education.&lt;\\\/p&gt;\\n&lt;p&gt;Mick Dunne heads the new Customer Security Officer team across Asia who are part of a global team for over 40 former CISOs, CTOs and deeply experienced SMEs. They are focused on providing trusted, deep expertise and advice to customers, Microsoft area leadership and to feedback key strategic investments and product roadmap. Prior to Microsoft Mick was the CISO at AustralianSuper, bringing a long history as a security leader and also one of the first organisations to adopt Security Copilot.&lt;\\\/p&gt;\\n&lt;p&gt;Ben Lamont is the Chief Data Officer at the Australian Federal Police (AFP). In this role, he is responsible for developing and implementing the AFP\\u2019s technology strategy and data management initiatives. Ben\\u2019s work focuses on addressing capability gaps and leveraging opportunities to enhance the AFP\\u2019s operational effectiveness. His leadership ensures that the AFP remains at the forefront of technological advancements in law enforcement.&lt;\\\/p&gt;\\n&lt;p&gt;Helen Schneider is a Commander with the Australian Federal Police (AFP). She leads the Australian Centre to Counter Child Exploitation (ACCCE), which focuses on combating online child sexual exploitation and abuse. Commander Schneider has been instrumental in coordinating significant operations, such as Operation Bakis, which led to the arrest of numerous offenders and the rescue of children from harm. Her work involves collaborating with both national and international law enforcement agencies to tackle complex and sensitive cases, ensuring the safety and protection of children.&lt;\\\/p&gt;\\n&lt;p&gt;Leigh Williams is the Chief Information Officer at Brisbane Catholic Education. With a career that began in teaching, Leigh has held various leadership roles, including CEO, Executive Director, and COO. She oversees digital, information, and IT infrastructure for hundreds of locations and over 13,000 staff. A passionate advocate for digital innovation and education, Leigh is a published researcher and has led keynotes and workshops globally. She holds multiple post-graduate qualifications in Education, IT, Leadership, Management, and Business.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 28, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/from-microsoft-ai-tour-2024-kb-on-the-go-mick-dunne-ben-lamont-helen-schneider-and-leigh-wil&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2000890\\\/c1e-41r8c19owxfopgxk-ndomxq18h749-2yvox5.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;01:01:54&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1743138015,&quot;key&quot;:&quot;32bfdde9e05ee3632720a811ef2fb0e0&quot;},&quot;ppe-4514-78&quot;:{&quot;title&quot;:&quot;From Microsoft AI Tour 2024 \\u2013 KB On The Go | Bret Arsenault, Janice Le, and Chris Lloyd-Jones&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this bonus episode, we sit down with Bret Arsenault, Corporate Vice President and Chief Cybersecurity Advisor at Microsoft, Janice Le, GM of Microsoft Security, Compliance, Identity &amp; Privacy, and Chris Lloyd-Jones, Head of Architect &amp; Strategy in the Office of the CTO from Avanade. Together they discuss Microsoft\\u2019s Secure Future Initiative (SFI), securing AI, and the culture and change program needed with AI.&lt;\\\/p&gt;\\n&lt;p&gt;Bret Arsenault is the Corporate Vice President and Chief Cybersecurity Advisor at Microsoft. With over 30 years at the company, he leads global efforts in information security, compliance, and business continuity. Bret oversees a team dedicated to protecting Microsoft\\u2019s assets and advises Fortune 100 leaders on cybersecurity strategies. He is also the Chairman of Microsoft\\u2019s Information Risk Management Council and a founding member of the Executive Security Action Forum (ESAF).&lt;\\\/p&gt;\\n&lt;p&gt;Janice Le is the General Manager of Microsoft Security, Compliance, Identity &amp; Privacy. Based in the San Francisco Bay Area, she leads a global team dedicated to safeguarding Microsoft\\u2019s customers and their data. With a strong background in software development and cybersecurity, Janice drives innovation and strategic initiatives to enhance security and compliance across Microsoft\\u2019s vast ecosystem.&lt;\\\/p&gt;\\n&lt;p&gt;Chris Lloyd-Jones is the Head of Architect &amp; Strategy in the Office of the CTO at Avanade. He leads strategic initiatives and architectural frameworks to drive innovation and digital transformation. With a strong background in technology and leadership, Chris plays a crucial role in shaping Avanade\\u2019s technological direction and ensuring alignment with business goals.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 26, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/from-microsoft-ai-tour-2024-kb-on-the-go-bret-arsenault-janice-le-and-chris-lloyd-jones&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1999175\\\/c1e-x8jpi95qzjfn7wz6-1p417vk0so4m-ewhuiq.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;59:00&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1742964926,&quot;key&quot;:&quot;ba25771bb4cf6746927a440321e75ecf&quot;},&quot;ppe-4514-79&quot;:{&quot;title&quot;:&quot;Episode 300 Deep Dive: Tom Gillis | The Future Of Cybersecurity and the Network&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Tom Gillis, SVP and General Manager of the Security, Data Center, Internet and Cloud Infrastructure Group at Cisco, as he explores the future of cybersecurity and networking. Tom discusses the transformative impact of AI on the industry, highlighting the unprecedented level of innovation it brings alongside the potential challenges, such as cybercriminals leveraging AI for attacks. He emphasizes the need for companies to embrace AI fully to remain competitive and not fall into the \\u201closer\\u201d category as the industry evolves. Additionally, Tom shares insights into the integration of security and networking, the implications of AI-powered security measures, and how these advancements might create a significant shift in the IT and infrastructure landscape.&lt;\\\/p&gt;\\n&lt;p&gt;Tom Gillis is the Senior Vice President and General Manager of the Cisco Security Business Group (SBG). A respected security industry leader with strong executive management skills and in-depth knowledge of the challenges surrounding secure enterprise computing, Tom is responsible for the company\\u2019s global security business to fundamentally simplify the security experience.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to Cisco, Tom was the SVP\\\/GM of the Network and Advanced Security Business Group at VMware, where he led the endpoint, networking, load balancing and network security businesses. He was also the CEO\\\/co-founder of Bracket Computing which was acquired by VMware.&lt;\\\/p&gt;\\n&lt;p&gt;Before Bracket Computing, Tom was the GM of the Security Technology Group at Cisco where he led the company\\u2019s businesses for security management, appliances, applications, and endpoint services. Tom was also part of the founding team at IronPort Systems and served as senior vice president of marketing when the company was acquired by Cisco. Under his guidance, IronPort grew an average of 100 percent year-on-year for seven years. During his tenure, IronPort rose to become the leading provider of antispam, antivirus, and antimalware appliances for organizations ranging from small businesses to the Global 2000.&lt;\\\/p&gt;\\n&lt;p&gt;Tom has also worked at iBEAM Broadcasting, Silicon Graphics, and Boston Consulting Group in various technical and leadership roles. He is also a noted advisor to startups and venture capital companies and is a member of several boards of directors.&lt;\\\/p&gt;\\n&lt;p&gt;Tom holds an M.B.A. degree from Harvard University, and graduated Magna Cum Laude with an M.S.E.E. degree from Northwestern University and a B.S.E.E. from Tufts University.&lt;\\\/p&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 19, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-300-deep-dive-tom-gillis-the-future-of-cybersecurity-and-the-network&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1994872\\\/c1e-89g7fo7vvdf1d8wj-47d69kj4c0x1-g6m2db.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;31:05&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1742360355,&quot;key&quot;:&quot;286a2d85fe86150efb1a317dcd270af0&quot;},&quot;ppe-4514-80&quot;:{&quot;title&quot;:&quot;Episode 299 Deep Dive: Gerry Sillars | Attackers Don&#8217;t Take Holidays&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Gerry Sillars, Vice President APJ from Semperis, as he discusses &lt;strong&gt;&lt;a href=\\&quot;https:\\\/\\\/kbi.media\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/semperis_holiday_ransomware_report_-_anz_-_final_-_12.4.24_1.pdf\\&quot;&gt;Semperis\\u2019 Holiday Ransomware Report&lt;\\\/a&gt;&lt;\\\/strong&gt;. Gerry delves into the constant threat posed by attackers who don\\u2019t take holidays, emphasizing the need for organizations to protect their networks and systems at all times. He highlights the startling statistics from the report, such as 69% of ransomware attacks occurring on weekends or holidays, and the surprising 83% of organizations targeted by ransomware in the last year alone. We also explore the challenges of striking a balance between maintaining adequate cybersecurity measures and managing business costs, as well as the importance of having a comprehensive disaster recovery plan, especially during significant corporate events.&lt;\\\/p&gt;\\n&lt;p&gt;Gerry Sillars is the Vice President of Asia Pacific at Semperis, a leading provider of enterprise identity protection, threat research, and incident response services headquartered in Hoboken, New Jersey. In this role, he heads the APAC operations and focuses on expanding Semperis\\u2019 footprint in Australia, ASEAN, Japan, Korea, and India while evolving the company\\u2019s channel business.&lt;\\\/p&gt;\\n&lt;p&gt;Gerry Sillars has over 20 years of experience building and scaling software businesses in APAC. Before joining Semperis, he played pivotal roles in Commvault Systems, Alcatel Lucent, UpGuard, and Fortanix.&lt;\\\/p&gt;\\n&lt;p&gt;Gerry lives in Singapore with his wife, is an Australian citizen and a native of Scotland.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 5, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-299-deep-dive-gerry-sillars-attackers-dont-take-holidays-1&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1986113\\\/c1e-7km5b4dnqzbd6vxo-6z1jpqonsp16-haf5sl.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;34:56&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1741150826,&quot;key&quot;:&quot;259a4f528abe2b742dab4f71b77f979f&quot;},&quot;ppe-4514-81&quot;:{&quot;title&quot;:&quot;Episode 298 Deep Dive: Grant Bourzikas | Future-proofing Security&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Grant Bourzikas, Chief Security Officer from Cloudflare, as he shares what lessons he learned from 2024. Grant emphasizes the industry\\u2019s need to move beyond outdated technology to enhance security postures and reduce complexities. He discusses the impact of artificial intelligence on security, the challenges of leveraging AI, and the necessity for organizations to embrace it strategically. Furthermore, Grant highlights the importance of modernizing security infrastructures, simplifying environments, and the critical need to cultivate new talent in the field to tackle the evolving landscape.&lt;\\\/p&gt;\\n&lt;p&gt;Grant Bourzikas joined Cloudflare as the Chief Security Officer in 2023, where he is a driving force in helping the company achieve its mission to build a better Internet. As a critical component within Cloudflare\\u2019s ecosystem, Grant\\u2019s primary role is to protect the company from sophisticated adversaries to stay ahead in today\\u2019s cybersecurity landscape. He oversees Cloudflare\\u2019s threat intelligence services, which successfully mitigate 170+ billion attacks daily, in addition to acting as \\u201cCustomer Zero\\u201d to help foster innovation across all Cloudflare products and services.&lt;\\\/p&gt;\\n&lt;p&gt;Grant is a seven-time CSO with over 20 years experience leading global security programs that span the private sector, having worked at a Fortune 500 critical infrastructure company, an online trading organization and within the gaming space. Most notably, Grant spent several years in the financial services industry at both HSBC and Silicon Valley Bank. Grant holds a Master\\u2019s in Data Science and Artificial Intelligence from Southern Methodist University, and a Bachelor of Science in Accounting from the University of Missouri in St. Louis. He is a CPA (Certified Public Accountant) and CISSP (Certified Information Systems Security Professional).&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 26, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-298-deep-dive-grant-bourzikas-future-proofing-security&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1982007\\\/c1e-3g92c59n96ikq027-9jn9nz3zt4qv-qmhprs.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:40&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1740546055,&quot;key&quot;:&quot;bade98e40f4289fda201a56ba8723349&quot;},&quot;ppe-4514-82&quot;:{&quot;title&quot;:&quot;Episode 297 Deep Dive: David Gee | Career Guide for Aspiring CISOs&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with David Gee, advisor at JS Careers, Bain &amp; Company, and Emertel, as he shares insights on aspiring and growing into a CISO. David delves into the importance of international experiences, driving change, and effectively communicating with boards as key traits of a true leader. He reflects on personal experiences that shaped his leadership journey, emphasizing the need for continuous learning and adaptability. We also explore corporate dynamics, discussing the challenges of genuine leadership and the nuances of climbing the corporate ladder, as well as how to effectively navigate and implement leadership strategies in different environments.&lt;\\\/p&gt;\\n&lt;p&gt;David has just retired in July 2024 and is building out his portfolio. He is an Advisor with Bain Advisory Network and also an Advisor to JS Careers (Cyber Recruitment) and Emertel (Software Commercialization).&lt;\\\/p&gt;\\n&lt;p&gt;He is a seasoned technology executive with significant experience and has over 25 years\\u2019 experience in CIO and CISO roles across different industries and countries.\\u00a0 At Macquarie Group David served as Global Head Technology, Cyber and Data Risk. Previously was CISO for HSBC Asia Pacific.\\u00a0 His career as a CIO spans across multiple industries and geographies including \\u2013 Metlife, Eli Lilly and Credit Union Australia. He was winner CIO of the Year 2014, at CUA where he successfully completed a significant Transformation of Core Banking, Online and Mobile Banking systems.&lt;\\\/p&gt;\\n&lt;p&gt;David is past Chairman for the FS-ISAC Strategy Committee and awarded Global Leaders Award in 2023 for his contributions to the cybersecurity industry. A regular conference keynote speaker and 150+ published articles for CIO Australia, Computerworld, ITNews and CSO (Cyber Security), David now writes for Foundry CIO.com and AICD.&lt;\\\/p&gt;\\n&lt;p&gt;His most recent book \\u2013 the Aspiring CIO &amp; CISO was published in July 2024 and David is writing his second \\u2013 A Day in the Life of a CISO with a number of CISOs from around the world for 2025.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 21, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-297-deep-dive-david-gee-career-guide-for-aspiring-cisos&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1978286\\\/c1e-q40nh25zj9s0v2x4-v625x96whprv-yh1z4c.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;38:32&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1740114037,&quot;key&quot;:&quot;7b1801255db1f4b361fa9b5f15fa5867&quot;},&quot;ppe-4514-83&quot;:{&quot;title&quot;:&quot;KBI.Media Update | Cordant launches DevSecOops&quot;,&quot;description&quot;:&quot;&lt;p&gt;We are thrilled to announce the arrival of a new addition to our podcast family on KBI.FM: DevSecOps, brought to you by Cordant.&lt;\\\/p&gt;\\n&lt;p&gt;Hosted by the insightful trio of Tom Walker (the infrastructure tragic), Scott Fletcher (the security ninja), and James Vincent (the cloud alchemist), this show promises to deliver a deep dive into the world of cloud, security, and infrastructure.&lt;\\\/p&gt;\\n&lt;p&gt;Here are 3 key takeaways for you:&lt;\\\/p&gt;\\n&lt;ul&gt;\\n&lt;li&gt;&lt;strong&gt;Comprehensive Expertise&lt;\\\/strong&gt;: Engage with content that combines expertise in infrastructure, security, and cloud, providing a holistic view of today\\u2019s technological environment.&lt;\\\/li&gt;\\n&lt;li&gt;&lt;strong&gt;Diverse Perspectives&lt;\\\/strong&gt;: Hosted by industry specialists, the podcast brings together various outlooks, giving listeners a rich and varied understanding of complex topics.&lt;\\\/li&gt;\\n&lt;li&gt;&lt;strong&gt;Part of KBI FM Network&lt;\\\/strong&gt;: As a part of the respected KBI.FM podcast network, expect well-curated content designed to inform and inspire.&lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 19, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/kbimedia-update-cordant-launches-devsecoops-1&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1977023\\\/c1e-n439h5kmzks9o1jp-xxw5jrzmbr3k-6wt8rq.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;00:46&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1740002400,&quot;key&quot;:&quot;b6b12943881565cc0e817d5c978d2ac5&quot;},&quot;ppe-4514-84&quot;:{&quot;title&quot;:&quot;Episode 296 Deep Dive: Vishwanath Nair | Emergence of IT\\\/ Cyber Leaders as Trusted Advisors and Business Value Creators&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;em&gt;\\u201cThe views, thoughts, and opinions expressed in this interview are solely Vishwanath Nair\\u2019s and do not necessarily reflect the views, policies, or positions of his employer, clients, or any affiliated organizations.\\u201d&lt;\\\/em&gt;&lt;\\\/p&gt;\\n&lt;p&gt;In this episode, we sit down with Vishwanath Nair, Head of Cyber Risk and Compliance at Baptist Care, as he explores the evolving partnership between IT and business. Vishwanath discusses the critical role of IT in digital transformation, the importance of data as a key business asset, and the proliferation of AI tools in enhancing IT-business alignment. He addresses the historical lack of trust between IT and business, emphasizing the need for effective communication and co-design to improve this relationship.&lt;\\\/p&gt;\\n&lt;p&gt;With over 25 years of experience, Vishwanath (Vish) is a leading authority in Risk Management, specializing in Information Security (InfoSec), IT Service Management, and Business Resilience on a global scale. He has led multi-million-dollar transformation initiatives across key sectors such as Public Sector, Critical Infrastructure, Healthcare, and Manufacturing.&lt;\\\/p&gt;\\n&lt;p&gt;Vish\\u2019s recent work as the inaugural Chief Information Security Officer (CISO) at the NSW Electoral Commission earned him the prestigious CSO30 Business Value Award 2024 by Foundry. His role was critical in safeguarding the Commission\\u2019s cybersecurity, where he developed security services from the ground up, embedding them into the organization\\u2019s processes to support the delivery of secure and transparent elections.&lt;\\\/p&gt;\\n&lt;p&gt;Currently, Vish serves as the Head of Cyber Risk and Compliance at BaptistCare NSW\\\/ACT, one of Australia\\u2019s leading Aged Care providers, where he oversees the security and compliance frameworks that protect critical services.&lt;\\\/p&gt;\\n&lt;p&gt;Previously, as Global Continuity Lead at Emirates Airlines, Vish was responsible for enhancing IT and Business Continuity practices globally. He also established Cyber\\\/IT Trusted Advisory services, aligning business and IT strategies for optimal results across the airline\\u2019s operations.&lt;\\\/p&gt;\\n&lt;p&gt;Known for his collaborative, inclusive leadership style, Vish has built and nurtured high-performing teams, maintaining exceptional retention rates. His commitment to professional development and industry advancement is reflected in his active contributions to organizations like ISACA, AISA, and BCI, where he has served on the Board of Directors for ISACA UAE and BCI UAE.&lt;\\\/p&gt;\\n&lt;p&gt;Vish is also a prolific public speaker and has earned numerous industry accolades, solidifying his position as a trusted leader and influential voice in the cybersecurity and risk management sectors.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 19, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-296-deep-dive-vishwanath-nair-emergence-of-it-cyber-leaders-as-trusted-advisors-and-busi-1&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1976699\\\/c1e-q40nh215mxc0v2x4-jp2gxj4dhjq1-jsbln1.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;36:34&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1739941219,&quot;key&quot;:&quot;3470f0508f4616c1512d16feb958f431&quot;},&quot;ppe-4514-85&quot;:{&quot;title&quot;:&quot;Episode 295 Deep Dive: Shannon Murphy | C-Suite Security Challenges&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Shannon Murphy, Senior Manager, Global Security and Risk Strategy from Trend Micro, as she explores the C-suite security challenges facing organizations today. Shannon emphasizes the importance of proactivity in cybersecurity, highlighting the shift from a reactive to a predictive approach to anticipate and counteract adversary strategies. We delve into the pressures from infrastructure shifts and adversary ingenuity, discuss global cybersecurity trends, and examine the increasing customization in social engineering attacks.&lt;\\\/p&gt;\\n&lt;p&gt;Shannon also shares insights on the evolving role of AI in cybersecurity and the need for greater integration and proactive practices within organizations to reduce the risk of breaches.&lt;\\\/p&gt;\\n&lt;p&gt;Shannon brings a decade in enterprise, consumer, and cybersecurity technology experience across high-growth industries focusing on the role of security in business and the workforce of the future. A subject matter expert in emerging security operations technologies including XDR, generative AI, exposure management and Zero Trust implementations, she is at the forefront of innovations that help organisations stay ahead of evolving threats.&lt;\\\/p&gt;\\n&lt;p&gt;Shannon is a security champion for business leaders, helping organisations translate and validate the business value of a resilient risk posture and culture that puts security first. As a strategist, she works with cybersecurity leaders and partners to develop scalable solutions that address unique and emerging threat models.&lt;\\\/p&gt;\\n&lt;p&gt;Further reading:&lt;br \\\/&gt;\\n&lt;a href=\\&quot;https:\\\/\\\/www.trendmicro.com\\\/explore\\\/thecisocredibilitygap\\\/2608-tl-en-rpt\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;How a Communication Breakdown in the Boardroom is Hurting Cyber-Resilience&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 14, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-295-deep-dive-shannon-murphy-c-suite-security-challenges&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1973793\\\/c1e-d5v7a6pdzjbpd4gq-7z2m75m8sv3x-in6nqc.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:59&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1739509162,&quot;key&quot;:&quot;24783fbd7f485ded014d83bb092a9e7a&quot;},&quot;ppe-4514-86&quot;:{&quot;title&quot;:&quot;Episode 294 Deep Dive: Fred Thiele | Importance of Cyber Security for Business Resilience&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Fred Thiele, Chief Information Security Officer from Interactive, as he discusses the importance of cybersecurity for business resilience. Fred delves into the concept of business resilience, emphasizing the need to prepare for worst-case scenarios to ensure continuity during crises. He explains that understanding critical systems and establishing a clear decision-making framework are essential for effective business continuity management. We also discuss the increasing reliance on technology systems, the importance of scenario training to build muscle memory for real-life incidents, and the challenges companies face in adapting to dynamic cyber threats.&lt;\\\/p&gt;\\n&lt;p&gt;As Interactive\\u2019s Chief Information Security Officer, Fred is responsible for Interactive\\u2019s organisational cyber security and supporting Interactive\\u2019s customers to build resilient cyber security solutions.&lt;\\\/p&gt;\\n&lt;p&gt;Fred has always been interested in systems: whether it\\u2019s the mechanics of a car or the application layers of network architecture, he enjoys understanding the end-to-end process and enhancing their capabilities.&lt;\\\/p&gt;\\n&lt;p&gt;Whether defending a small business or a national grid, Fred focuses on proactively building the \\u2018castle walls\\u2019 of cyber defence to prevent incursions, rather than relying on ad-hoc threat responses.&lt;\\\/p&gt;\\n&lt;p&gt;Over three decades in the industry, Fred has found that cyber security isn\\u2019t just about protocols; he sees it as a holistic mindset that empowers us to thwart threats at every level, safeguarding our digital landscape.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 12, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-294-deep-dive-fred-thiele-importance-of-cyber-security-for-business-resilience-1&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1971082\\\/c1e-1dogsjx17dbxv9nj-47drrzdji78-nneeap.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;39:30&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1739336407,&quot;key&quot;:&quot;f284e60309770d89a732636234d2d2a9&quot;},&quot;ppe-4514-87&quot;:{&quot;title&quot;:&quot;Episode 293 Deep Dive: David Trossell | How To Move Data Faster Over WANs&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with David Trossell, CEO and CTO of Bridgeworks, as he discusses the advancement of WAN acceleration technology and its impact on data transfer speeds. David explores the historical evolution from broadband connectivity to modern-day WAN acceleration, highlighting the limitations of traditional WAN optimization methods. He explains how AI-driven parallelization can address latency issues and significantly enhance data throughput across networks.&lt;\\\/p&gt;\\n&lt;p&gt;Additionally, David provides insights into misconceptions about WAN acceleration and optimization, emphasizing the importance of secure backups, air-gapped systems, and the resurgence of tape technology for robust data protection against cyber threats.&lt;\\\/p&gt;\\n&lt;p&gt;David Trossell is a recognised leader in the storage technology industry. He is CEO and CTO of award-winning WAN Acceleration company Bridgeworks, where he holds 18 technology patents. David is also committed to supporting British STEM initiatives and developing technology leaders through UK university and college apprenticeship programmes.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 7, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-293-deep-dive-david-trossell-how-to-move-data-faster-over-wans&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1968345\\\/c1e-2k31b85wmwu67jo4-qdwdm801ix1-oymmff.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;35:50&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1738904090,&quot;key&quot;:&quot;68c0025d1fd3bf74d441a3dc0ad76903&quot;},&quot;ppe-4514-88&quot;:{&quot;title&quot;:&quot;KBI.Media Update | The Launch of KBI.FM&quot;,&quot;description&quot;:&quot;&lt;p&gt;We\\u2019re thrilled to announce the launch of KBI.FM, our dedicated podcast network and channel aimed at creating a specialized precinct for cybersecurity podcasts.&lt;\\\/p&gt;\\n&lt;p&gt;Here\\u2019s what you need to know:&lt;\\\/p&gt;\\n&lt;ul&gt;\\n&lt;li&gt;Expanding Beyond KBKAST: While our flagship podcast, KBKAST, remains a key focus, KBI,FM allows us to introduce a variety of valuable content outside of our own podcast, shedding light on areas that need attention in cybersecurity.&lt;\\\/li&gt;\\n&lt;li&gt;Experience That Sets Us Apart: With our podcasting journey beginning in 2018, KBI.FM benefits from years of experience. We know what it takes to build and succeed in the podcast world, offering high-quality content tailored for our audience.&lt;\\\/li&gt;\\n&lt;li&gt;Client Show Debuts: We\\u2019re excited to premiere some of our client shows soon, adding diverse voices and perspectives to our network. Stay tuned for releases that promise to bring insightful discussions to your ears!&lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&lt;p&gt;As we continue this journey, we\\u2019re here to deliver top-notch cybersecurity content that keeps you informed and engaged.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 6, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/kbimedia-update-the-launch-of-kbifm&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1967655\\\/c1e-41r8c4qk76uo2xg7-0v54mdnqurzq-sb7vub.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;00:58&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1738819711,&quot;key&quot;:&quot;bd3676689fdff499c4370234047ec415&quot;},&quot;ppe-4514-89&quot;:{&quot;title&quot;:&quot;Episode 292 Deep Dive: Mark Squirrell | From Arafat to Everest&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Mark \\u201cSquiz\\u201d Squirrell, keynote speaker from Global Frontline, as he shares insights from his journey from Arafat to Everest. Mark emphasizes the importance of making early decisions and being flexible when dealing with unforeseen variables. He discusses the critical role of soft skills in building effective relationships, both within and outside organizations, to mitigate crises. Mark also highlights how training and preparation under simulated pressures can enhance decision-making abilities and resilience. He delves into managing stress in high-pressure situations, advocating for recognizing stress levels and ensuring time for recovery.&lt;\\\/p&gt;\\n&lt;p&gt;From car bombings, the Ebola Outbreak to meeting Yasser Arafat and making it to the summit of Mount Everest, Mark \\u2018Squiz\\u2019 Squirrell OAM has experienced more than many can dream about.&lt;\\\/p&gt;\\n&lt;p&gt;Squiz was awarded the coveted \\u201cGreen Beret\\u201d whilst serving with the Australian Commando\\u2019s.\\u00a0 His tenure with the military provided him with the skills and&lt;strong&gt; courage&lt;\\\/strong&gt; to succeed amongst &lt;strong&gt;adversity &lt;\\\/strong&gt;and &lt;strong&gt;turmoil&lt;\\\/strong&gt;. It was the perfect grounding for a career as an International Aid Worker.&lt;\\\/p&gt;\\n&lt;p&gt;Squiz escorted food convoys through the Gaza Strip, negotiated with the Liberation Tigers of Tamel Eelam (Tamil Tigers) and brokered deals with Somali Clansmen to ensure the safe delivery of United Nations food aid.\\u00a0 In doing so, he has mastered the challenges of &lt;strong&gt;performing under pressure&lt;\\\/strong&gt;, &lt;strong&gt;communicating&lt;\\\/strong&gt; effectively and &lt;strong&gt;building relationships&lt;\\\/strong&gt;.&lt;\\\/p&gt;\\n&lt;p&gt;In addition to this, Squiz has taken the concept of being &lt;strong&gt;motivated&lt;\\\/strong&gt; at work to an all new high.\\u00a0 He was inspired by his organisation, the United Nations World Food Programme (WFP), and the impoverished people that it feeds, to climb to the top of the world to help raise awareness of the global hunger crisis. After a gruelling six week ordeal, Squiz raised the WFP flag on the summit of Mount Everest. The &lt;strong&gt;inspiring and thrilling&lt;\\\/strong&gt; recount across glaciers and up exposed cliffs reveal the motivation, habits and adversity skills that facilitated his success.&lt;\\\/p&gt;\\n&lt;p&gt;Squiz has a Bachelor of Business (HRM) and has published a memoire titled &lt;em&gt;From Arafat to Everest&lt;\\\/em&gt;. In 2019 Squiz was recognised in the Australia Day Honours List with an Order of Australia Medal (OAM) for \\u201cservice to the international community through humanitarian aid\\u201d. He continues to deploy on short term assignments to emergency zones, such as the Ebola Outbreak in West Africa and Nepal Earthquake.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;Now based out of Melbourne, Squiz provides &lt;strong&gt;keynotes, workshops and team building activities&lt;\\\/strong&gt; to develop workplace performance.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 5, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-292-deep-dive-mark-squirrell-from-arafat-to-everest&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1966657\\\/c1e-rdnmsjgwdxc2kwqj-okw8d5kkijmz-6iq0cc.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;51:34&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1738731337,&quot;key&quot;:&quot;81d94f78ec93161741b4807c34488251&quot;},&quot;ppe-4514-90&quot;:{&quot;title&quot;:&quot;Episode 291 Deep Dive: Kobi Leins and Kate Carruthers | How AI Brings A New Set Of Risks To The Threat Landscape&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Kobi Leins and Kate Carruthers, directors from Info Sphere Education, as they delve into the intertwining issues of artificial intelligence and cybersecurity. Kobi discusses how AI can expedite security breaches and the need for cybersecurity professionals to understand and mitigate AI-induced vulnerabilities. Kate expands on this by highlighting the utilization of generative AI by attackers and the importance of data and AI governance within organizations. They both explore the challenges companies face in managing these technologies, emphasizing the necessity of upskilling and proper communication between AI and cybersecurity professionals.&lt;\\\/p&gt;\\n&lt;\\\/p&gt;\\n&lt;p&gt;&lt;a href=\\&quot;https:\\\/\\\/katecarruthers.com\\\/about-kate-carruthers\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Kate Carruthers&lt;\\\/a&gt;\\u00a0is an experienced data and technology leader who has expertise in analytics, AI, data management, Data Governance and AI governance. She is a passionate educator who loves sharing her knowledge and helping people to develop their own AI and data expertise.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;a href=\\&quot;https:\\\/\\\/kobileins.com\\\/about\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Kobi Leins&lt;\\\/a&gt;\\u00a0is a reformed lawyer, academic in tech and law, and is a technical expert for Standards Australia. She loves to teach, learn and be challenged at the edges of tech and governance.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;The Essential Eight&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;The mitigation strategies that constitute the Essential Eight are:&lt;\\\/p&gt;\\n&lt;ul class=\\&quot;ak-ul\\&quot;&gt;\\n&lt;li&gt;\\n&lt;p&gt;patch applications&lt;\\\/p&gt;\\n&lt;\\\/li&gt;\\n&lt;li&gt;\\n&lt;p&gt;patch operating systems&lt;\\\/p&gt;\\n&lt;\\\/li&gt;\\n&lt;li&gt;\\n&lt;p&gt;multi-factor authentication&lt;\\\/p&gt;\\n&lt;\\\/li&gt;\\n&lt;li&gt;\\n&lt;p&gt;restrict administrative privileges&lt;\\\/p&gt;\\n&lt;\\\/li&gt;\\n&lt;li&gt;\\n&lt;p&gt;application control&lt;\\\/p&gt;\\n&lt;\\\/li&gt;\\n&lt;li&gt;\\n&lt;p&gt;restrict Microsoft Office macros&lt;\\\/p&gt;\\n&lt;\\\/li&gt;\\n&lt;li&gt;\\n&lt;p&gt;user application hardening&lt;\\\/p&gt;\\n&lt;\\\/li&gt;\\n&lt;li&gt;\\n&lt;p&gt;regular backups.&lt;\\\/p&gt;\\n&lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 31, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-291-deep-dive-kobi-leins-and-kate-carruthers-how-ai-brings-a-new-set-of-risks-to-the-thre&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1954679\\\/c1e-kdkxsj9qpou941jo-kpwo5jpquqq-pgip8t.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;41:06&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1738299524,&quot;key&quot;:&quot;4cc27fc78e3011e01b6b4b36fe106f27&quot;},&quot;ppe-4514-91&quot;:{&quot;title&quot;:&quot;Episode 290 Deep Dive: Dr. Ivano Bongiovanni | How To Get The Most From Maturity-Based And Risk-Based Approaches To Cybersecurity&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Dr. Ivano Bongiovanni, General Manager at AUSCERT, as he discusses how to get the most from maturity-based and risk-based approaches in the cybersecurity arena. Ivano delves into the importance of balancing both approaches to enhance cyber resilience, the role of organizational size and industry mandates, and the need for critical assessment of cyber risks. We also explore the challenges of decision-making in risk management, the impact of subjective judgment, and the significance of quality data sources. Ivano emphasizes a collaborative approach involving various organizational constituencies and the crucial role of effective communication and storytelling in cybersecurity leadership.&lt;\\\/p&gt;\\n&lt;p class=\\&quot;AbstractBookBaseParagraph\\&quot;&gt;Ivano is the General Manager of AUSCERT. He is also a researcher, consultant, author, and speaker whose work focuses on the managerial and business implications of Cybersecurity.&lt;\\\/p&gt;\\n&lt;p class=\\&quot;AbstractBookBaseParagraph\\&quot;&gt;A Lecturer in Information Security, Governance and Leadership with the UQ Business School and a member of UQ Cyber, Ivano helps business leaders and executives make evidence-based decisions in cybersecurity. With a professional background in risk and security management, Ivano\\u2019s work bridges the gap between technical cybersecurity and its repercussions across organisations. He has advised ministers, policy-makers, board members, and senior executives on strategies, governance structures, policies, and training programs for effective cybersecurity management. Ivano is also an experienced facilitator in the fields of Design Thinking and Design-Led innovation, having run since 2015 more than 50 design-led workshops and longer projects for public and private sector organisations.&lt;\\\/p&gt;\\n&lt;p class=\\&quot;AbstractBookBaseParagraph\\&quot;&gt;Prior to UQ, Ivano worked as a Research Fellow with the Adam Smith Business School (University of Glasgow) and a Postdoctoral Fellow with the PwC Chair in Digital Economy (QUT). In this role, he worked with public and private sector organisations in projects aimed at facilitate their transition into the Digital Age. Ivano obtained his PhD from QUT in 2016, with a thesis on safety and security management in Australian airports. His academic career includes stints with Bocconi University and SDA Bocconi School of Management (Milan), where he worked as a faculty member and consultant for three years.&lt;\\\/p&gt;\\n&lt;p class=\\&quot;AbstractBookBaseParagraph\\&quot;&gt;He also worked as a Deputy Venue Security Manager at the XX Winter Olympic Games \\u2013 Turin 2006 and as a Police Officer for the Italian Ministry of Interior.&lt;\\\/p&gt;\\n&lt;p class=\\&quot;AbstractBookBaseParagraph\\&quot;&gt;He has a double MSc in Management of Public Administrations and International Institutions (Bocconi University, Milan) and International Security (Sciences Po, Paris).&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 29, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-290-deep-dive-dr-ivano-bongiovanni-how-to-get-the-most-from-maturity-based-and-risk-base&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1953434\\\/c1e-vzj8a9o5knawz1vk-6z1964w4bd4p-iwngbr.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;42:22&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1738126628,&quot;key&quot;:&quot;f88b01af04cfe221b41293106a0d9516&quot;},&quot;ppe-4514-92&quot;:{&quot;title&quot;:&quot;Episode 289 Deep Dive: Jarrod Lucia | Securing AI-centric Infrastructures&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Jarrod Lucia, Evangelist Architect, AI and SP Infrastructure, APJC from F5, as he discusses securing AI-centric infrastructures, specifically the emerging AI factories powering today\\u2019s workload. Jarrod delves into the rise of AI factories, large data centers purpose-built for AI workloads, and the advanced sustainability measures being considered in their design, such as green energy mandates and innovative water recirculation systems.&lt;\\\/p&gt;\\n&lt;p&gt;We also explore the unique security demands of AI factories, explaining the need for both traditional data center precautions and modern zero-trust models. Jarrod shares insights on the various stages of AI factory development and integration, emphasizing the importance of securing data throughout its lifecycle within these specialized environments.&lt;\\\/p&gt;\\n&lt;p&gt;As a seasoned industry professional with over 25 years of experience in Service Provider and Cloud Engineering, Jarrod has developed a unique blend of technical expertise and leadership skills. His background in Mobile and Satellite technologies has equipped him with a deep understanding of network design, implementation, and troubleshooting.&lt;\\\/p&gt;\\n&lt;p&gt;He\\u2019s passionate about staying at the forefront of emerging technologies, particularly Artificial Intelligence (AI) and its applications in Cloud, Service Providers, and IoT at scale. The convergence of Edge Networks, Cloud capabilities, and AI Factories will revolutionise industry and how applications are delivered and he\\u2019s excited to explore the potential of AI infrastructure and its impact on the future of technology and business.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 22, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-289-deep-dive-jarrod-lucia-securing-ai-centric-infrastructures&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1946988\\\/c1e-o39rfvkk95s8n0xz-okwz75xjs71v-0gowpy.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;39:42&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1737521903,&quot;key&quot;:&quot;db69efe42ff2bd772a34354603eaf992&quot;},&quot;ppe-4514-93&quot;:{&quot;title&quot;:&quot;Episode 288 Deep Dive: Venkat Balakrishnan | Platformisation And Solving The Real Problem&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Venkat Balakrishnan, CISO from TAL Australia, as he discusses the evolving concept of platformization in cybersecurity. Venkat explores how consolidating various cyber functions and tools into single platforms can drive efficiencies, reduce costs, and simplify management efforts. He emphasizes the maturity of network security and endpoint security operations as key areas ready for platformization, while also discussing the fragmented nature of identity and access management.&lt;\\\/p&gt;\\n&lt;p&gt;Venkat is an experienced cyber security and technology risk executive with expertise in building cyber resilience, safely enabling business growth and inspiring customer trust. Adept in building relationships and influencing stakeholders at all levels across organisations with strong customer focus to deliver pragmatic and innovative solutions to derive business value. Passionate people leader with demonstrated success of developing diverse and high performing teams. Experienced in building security practices from grassroots with innovative approaches for modernisation and by accelerating into scalable and sustainable operations.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 17, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-288-deep-dive-venkat-balakrishnan-platformisation-and-solving-the-real-problem&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1941689\\\/c1e-gkvqb3k0q5i249gd-8dwrg2qgc8dw-mb4qzn.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;44:07&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1737090019,&quot;key&quot;:&quot;fb7ed09b56cfd614c91e776a1848db1c&quot;},&quot;ppe-4514-94&quot;:{&quot;title&quot;:&quot;From AUKUS Advanced Technology Dialogue Australia \\u2013 KB On The Go | Paddy McGuinness, Former UK Deputy National Security Advisor (Intelligence Security and Resilience); Senior Advisor at Brunswick Group, Toby Jones, Founder from TJC, and Beth Sanner, Fo&#8230;&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, KB brings us the inside track at the AUKUS Advanced Technology Dialogue in Australia. Starting off with 2020Partners\\u2019 Founding Partner Greg Sim, who shares the significance of this strategic collaboration, KB also sits down with Paddy McGuinness, Former UK Deputy National Security Advisor (Intelligence Security and Resilience); Senior Advisor at Brunswick Group, Toby Jones, Founder from TJC, and Beth Sanner, Former Deputy Director for Mission Integration (ODNI); Director, Geopolitics and Strategy, International Capital Strategies as they discuss what it means to be \\u2018quantum-ready\\u2019, the convergence between government and industry, and the \\u2018Grey Zone\\u2019.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Paddy McGuinness, Former UK Deputy National Security Advisor (Intelligence Security and Resilience); Senior Advisor at Brunswick Group&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Paddy McGuinness is a Senior Adviser at Brunswick Group, supporting clients on crisis and resilience and the interplay between geopolitics, national security and their transactions. He works closely with the Firm\\u2019s regional and specialist leads across Technology, Cyber, Aerospace and Defence, Litigation, Geopolitical, Activism and Competition and Regulatory Affairs.&lt;\\\/p&gt;\\n&lt;p&gt;From 2014 \\u2013 2018, Paddy was the UK\\u2019s Deputy National Security Advisor for Intelligence, Security and Resilience and Government Chief Security Officer advising two successive British Prime Ministers on UK Homeland Security policy, capabilities and related legislation. This included the UK\\u2019s National Risk Assessment and ability to respond to and recover from all hazards and threats, national crisis response and coordination, cyber strategies and programmes, counter terrorism and approach to managing hostile state activities, including the resilience of Critical National Infrastructure. He chaired the Investment Security Group reviewing FDI and M&amp;A for National Security purposes.&lt;\\\/p&gt;\\n&lt;p&gt;As a Foreign Service officer Paddy led variously on Counter Terrorism, aspects of Cyber, the Middle East, Iran, Counter Proliferation and Africa. He served overseas in the Middle East and Europe and was an envoy on matters as diverse as Yemen, Counter Terrorism, and National Security and Law Enforcement access to data.&lt;\\\/p&gt;\\n&lt;p&gt;Away from Brunswick Paddy works with Governments on their Resilience and with Private Equity on emerging technologies, nuclear energy and space. He is a&lt;br \\\/&gt;\\nco- founder of Oxford Digital Healthcare and of Venari Security. He sits on the advisory board of PoolRe, the UK\\u2019s Counter Terrorism Reinsurance Pool. Until the recent UK General Election he was a special advisor to the UK Parliament\\u2019s Joint Committee on the National Security Strategy.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Toby Jones, Founder from TJC&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Toby is CEO of TJC and until recently was Head of UK\\u2019s Accelerated Capability Environment (ACE). TJC founded, mobilised and led ACE for the UK Home Office from&lt;br \\\/&gt;\\n2017 \\u2013 2024. ACE is a Home Office capability which is highly regarded cross-sector for its mission-led innovation platform. ACE has expedited the development and deployment of \\u00a3150M+ of cutting-edge capability driving forward diverse public missions in counter-terrorism and&lt;br \\\/&gt;\\nhomeland security, cybersecurity, pandemic response, healthcare, law enforcement and justice.&lt;\\\/p&gt;\\n&lt;p&gt;Toby is known as an inspiring and innovative leader who created ACE and who has had a multi-faceted career, grounded in national security and public safety, as a senior civil servant, in private sector with a global professional services firm and founder of a successful values-&lt;br \\\/&gt;\\nbased UK SME synonymous with powerful innovation.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Beth Sanner, Former Deputy Director for Mission Integration (ODNI); Director, Geopolitics and Strategy, International Capital Strategies&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Beth Sanner is the Director of Geopolitics and Strategy at International Capital Strategies. She has held a wide range of national security positions for over 35 years, including in the Office of the Director of National Intelligence, the Central Intelligence Agency, the National Security&lt;br \\\/&gt;\\nCouncil, and the U.S. Department of State.&lt;\\\/p&gt;\\n&lt;p&gt;Beth\\u2019s last government role was as the Deputy Director of National Intelligence for Mission Integration, where she oversaw the integration of Intelligence Community collection, analysis, and programs and served as the President Trump\\u2019s intelligence briefer.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to this role, Beth was the Director of the President\\u2019s Daily Brief, Vice Chair of the National Intelligence Council, and a senior executive in CIA\\u2019s Directorate of Analysis. Beth continues to inform both business and government leaders and everyday Americans about foreign affairs through consulting, speaking engagements, writings, and as a CNN national security contributor.&lt;\\\/p&gt;\\n&lt;p&gt;She also is a Distinguished Fellow at the German Marshall Fund, a Non-Resident Senior Fellow with the Intelligence Program at Harvard University\\u2019s Belfer Center, and a Senior Fellow at the U.S. Chamber Foundation.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 9, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/from-aukus-advanced-technology-dialogue-australia-kb-on-the-go-paddy-mcguinness-former-uk-deput&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1936976\\\/c1e-d5v7a6q759cpd4gq-gpwkm4g3idr0-jp07ql.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;01:11:41&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1736398412,&quot;key&quot;:&quot;0a4fcbdd87497f42bae1fd1f716e497e&quot;},&quot;ppe-4514-95&quot;:{&quot;title&quot;:&quot;From AUKUS Advanced Technology Dialogue Australia \\u2013 KB On The Go | Antony Reynolds, Vice President, Federal and National Security, Bridgeworks, Malcom Purcell, Vice President APAC, Fivecast, and Jeff Lindholm, Chief Revenue Officer, Lookout Technologie&#8230;&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, KB brings us the inside track at the AUKUS Advanced Technology Dialogue in Australia. Starting off with 2020Partners\\u2019 Founding Partner Greg Sim, who shares the significance of this strategic collaboration, KB also sits down with Antony Reynolds, Vice President, Federal and National Security at Bridgeworks, Malcom Purcell, Vice President APAC, at Fivecast, and Jeff Lindholm, Chief Revenue Officer at Lookout Technologies as they discuss faster data delivery, how OSINT can address and ultimately reduce national security challenges, and why the the \\u2018bad guys\\u2019 are focusing on mobile edge.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Antony Reynolds, Vice President, Federal and National Security at Bridgeworks&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Tony leads Public Sector and Global Channels for British AI Data Software Vendor,Bridgeworks Ltd and has extensive knowledge of enterprise software and high performance and super computing solutions. He previously worked in a variety of leadership positions with IBM to include Global&lt;br \\\/&gt;\\nStrategic Alliance Director, North America and EMEA and was Systems Solution lead at IBM for Coca-Cola, Nike and Santander Leasing. Tony served in the Royal Air Force Reserve for 18 years until June 2024.&lt;\\\/p&gt;\\n&lt;p&gt;He supported deployment of Air Traffic Control and Interception Cells, (QRA), during the 2012 London Olympic Games. As well as detachments to the prestigious RAF Aerobatic Display Team, (The Red Arrows), and 32, The Royal Squadron, Tony deployed on J-2 Operations in Afghanistan, pre-deployment exercises in Africa and a humanitarian mission in the Caribbean. One of Tony\\u2019s final ceremonial duties was to represent the Royal Air Force at the parade of the Coronation of King Charles III on 6 May 2024 at Buckingham Palace.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Malcolm Purcell, Vice President APAC, at Fivecast&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Malcolm is an experienced strategy and business development executive with broad experience working in the defence, security and intelligence sectors. Commencing his career as an Army Officer he had operational service in Iraq with the Combined Joint Special Operations Taskforce in 2003. Following a short period working for the Attorney-General\\u2019s Department, he has spent the past 18 years in sales leadership roles with multinational organizations including WSP Parsons Brinckerhoff and KPMG. Malcolm moved to Washington DC in 2020 and was instrumental in establishing Fivecast\\u2019s open-source intelligence business in North America \\u2013 working closely with US &amp; Canadian Government agencies. He currently leads the Canberra office for Fivecast, with market responsibilities across Asia Pacific region.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Jeff Lindholm, Chief Revenue Officer at Lookout Technologies&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;As the Chief Revenue Officer at Lookout, Jeff oversees all aspects of the company\\u2019s global sales, including the Americas, EMEA, and APAC regions, as well as Channel Sales, Commercial Sales and Sales Engineering. He brings a wealth of experience in networking and security sales leadership, having previously served as President and CEO of Plixer, a company focused on network traffic analysis and visibility solutions. Before that, Jeff led sales operations at both Brocade and Juniper Networks. As the Senior Vice President of Worldwide Sales at Brocade, he oversaw a $2.5 billion global sales operation until the company\\u2019s acquisition by Broadcom Inc. At Juniper Networks, he served as Chief Revenue Officer, managing $2.5 billion in revenue.\\u201d He has also held significant global sales roles at Arbor Networks (the security division of NETSCOUT) and BigBand Networks. Jeff is based in Boston and holds a Bachelor of Science in Marketing from the Carroll School of Management at Boston College.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 8, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/from-aukus-advanced-technology-dialogue-australia-kb-on-the-go-antony-reynolds-vice-president&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1936372\\\/c1e-5k0vbm4njkh0xmvo-pkgj8284s1v5-e3v4jf.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;01:16:14&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1736312406,&quot;key&quot;:&quot;43789e745665330b1640319c655e1fe9&quot;},&quot;ppe-4514-96&quot;:{&quot;title&quot;:&quot;From AUKUS Advanced Technology Dialogue Australia \\u2013 KB On The Go | Michael Loewy, Co-Founder at Tide, Daniel Churches, Sales Director at ColorTokens, Simon Hodgkinson, Advisor at Semperis&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, KB brings us the inside track at the AUKUS Advanced Technology Dialogue in Australia. Starting off with 2020Partners\\u2019 Founding Partner Greg Sim, who shares the significance of this strategic collaboration, KB also sits down with Michael Loewy, Co-Founder at Tide, Daniel Churches, Sales Director, at ColorTokens, and Simon Hodgkinson, Advisor at Semperis as they discuss why the industry is broken, \\u2018breach-readiness\\u2019, and identity being the foundation of the digital ecosystem.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Michael Loewy, Co-Founder at Tide&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Michael is a Co-founder of Tide Foundation, a deep tech start-up reimagining trust in the digital world. He\\u2019s a seasoned entrepreneur with a rich C-Level history leading the productization and commercialization of transformational software for organizations like Dell, Yahoo!, News Limited, NetRegistry, Telstra, Motorola through to greenfield startups. Michael was an academic professional at the University of Illinois, and currently serves on the advisory board of the Children\\u2019s Medical Research Institute.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Daniel Churches, Sales Director, at ColorTokens&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Dan is an Australian and Asia Pacific Sales Leader with over 25 years\\u2019 IT experience in Hardware and Software Solutions and Services, Business Development, Enterprise engagements and Executive Relationships. He has worked for IBM, NTT Global and Verizon Enterprise Solutions driving business and building teams in Hardware, Software, Professional Services, Managed Services, Hybrid Cloud, PaaS, SaaS, Data Analytics, Security and Digital Transformation.&lt;\\\/p&gt;\\n&lt;p&gt;With ColorTokens, Dan is driving market penetration, brand development, partner engagement and client services and support. He is responsible for industry and buyer alignment and understanding of the ColorTokens \\u201cBreach Ready\\u201d messaging focusing on halting the spread of ransomware and malware attacks across IT\\\/OT, IoT and Legacy environments providing customers a viable Cyber Resilience \\u2018Uptime\\u2019 compliance capability they can report to market.&lt;\\\/p&gt;\\n&lt;p&gt;Dan brings a wealth of experience to his role and to startup growth. He has worked with several startups as well as global organisations from around the world. His grasp of industry, cultural relevancies, and buying behavior are proven assets when winning trust and rapport with employees, partners and customers. He has built and delivered IT sales and coaching development programs in India, Singapore, Malaysia, Indonesia, Thailand, China, Japan, Philippines, Australian, New Zealand, England and Germany.&lt;\\\/p&gt;\\n&lt;p&gt;Dan grew up in Denver, Colorado, lived in Bavaria, Germany for many years and is now an Australian citizen, living in Sydney, Australia. Dan continues to learn and build leadership skills and insights taking courses with Harvard Business Review and MIT Sloan. In addition to this, he finds time to travel with his wife and family, drink red wine and make homemade pasta.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;&lt;br \\\/&gt;\\nSimon Hodgkinson, Advisor at Semperis&lt;br \\\/&gt;\\n&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Simon Hodgkinson is the former Chief Information Security Officer (CISO) at bp. He was responsible for cybersecurity including strategy, governance, architecture, education, counter threat operations, and incident response. He joined bp in 2002 and has held several senior IT leadership roles.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to becoming CISO, he was the VP for Infrastructure &amp; Integration Services at bp. During this time, he drove a significant improvement in IT operational integrity, led a transformation program and spearheaded the commitment to improve employees\\u2019 IT experience. He led the CISO function in bp Supply &amp; Trading, where he delivered a program to improve cyber-controls, many of which have been implemented across the bp group. Before joining bp, Simon worked in IT for a dotcom, an investment bank, and commercial software companies.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 7, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/from-aukus-advanced-technology-dialogue-australia-kb-on-the-go-michael-loewy-co-founder-at-tide&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1935605\\\/c1e-m1o3cn9w1nbwqk4n-dm454r67b9k-fzyamo.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;01:00:05&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1736226032,&quot;key&quot;:&quot;40b88520a987e410f44ccbab903f556b&quot;},&quot;ppe-4514-97&quot;:{&quot;title&quot;:&quot;Episode 287 Deep Dive: Leon Langlais | Sovereign Data Capability For The Physical Security Technology In The Modern World&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Leon Langlais, Chief Product Officer APAC at Genetec, as he discusses the pervasive cybersecurity gaps in both home and corporate networks. Leon delves into the consequences of inadequate updates and the critical need for secure, trusted devices, especially for critical infrastructures. We also explore regulatory debates, the role of state-owned vendors, and the integration of security from a product\\u2019s inception.&lt;\\\/p&gt;\\n&lt;p&gt;Leon has been with Genetec for five years having previously served in a multitude of technology leadership roles at Tyco across a near fifteen year tenure. Leon has previously worked as Senior Director of Growth Markets and Regional Strategy at Tyco Security Products, and Director of Product Management at Tyco Safety Products. Leon is an alumnus of the prestigious Universite de Sherbrooke and Polytechnique Montreal.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 1, 2025&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-287-deep-dive-leon-langlais-sovereign-data-capability-for-the-physical-security-technolog-1&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1932178\\\/c1e-5k0vbm8jvdt0xmvo-pkjd2vdoi31g-rphih9.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:47&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1735707418,&quot;key&quot;:&quot;854c3fdead60a1ad8c2dadf3ff084999&quot;},&quot;ppe-4514-98&quot;:{&quot;title&quot;:&quot;Episode 286 Deep Dive: Dean Frye | IT, IoT And OT Security As A Business Continuity Problem&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Dean Frye, Solutions Architect at Nozomi Networks, as he discusses the complex landscape of IT, IoT, and OT security challenges.&lt;\\\/p&gt;\\n&lt;p&gt;Dean delves into the critical importance of avoiding an \\u201cus vs. them\\u201d mentality between IT and OT teams, and how security interruptions can severely impact business continuity. We explore industry-specific vulnerabilities, such as those in factory chicken farming and Tasmanian salmon farming, and emphasize the necessity for executives to have a deeper technical understanding of cybersecurity. Dean also highlights the value of telemetry and real-time reporting, the evolving role of cloud solutions in OT environments, and the importance of a well-integrated, multidisciplinary team to effectively manage cyber risks.&lt;\\\/p&gt;\\n&lt;p&gt;Dean Frye is a Solutions Architect for Nozomi Networks in Australia and New Zealand. Dean is an experienced security professional with a demonstrated history of providing compliance strategy, pragmatic risk mitigation, security project delivery, threat abatement and vendor interface solutions with a significant commercial background. Covering more than twenty years, his previous roles span consulting and senior leadership, including a stint at Armis as solutions architect, and another tenure at Cisco as director of security for the APJ region.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 18, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-286-deep-dive-dean-frye-it-iot-and-ot-security-as-a-business-continuity-problem&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1922199\\\/c1e-z9w7fmk25pcokrwj-pkjpq353h3xp-oskild.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;38:20&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1734498026,&quot;key&quot;:&quot;1dbff79c552df2b966d873bd253fb663&quot;},&quot;ppe-4514-99&quot;:{&quot;title&quot;:&quot;From Cisco Live 2024 Melbourne \\u2013 KB On The Go | Guy Diedrich, SVP &amp; Global Innovation Officer, Country Digital Acceleration (CDA), Cisco Networking Academy &amp; Learning &amp; Certification and Anupam Trehan, Vice President, People and Communities APJC, Cisco&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, KB sits down with Guy Diedrich, SVP &amp; Global Innovation Officer, Country Digital Acceleration (CDA), Cisco Networking Academy &amp; Learning &amp; Certification, and Anupam Trehan, Vice President for People and Communities APJC on the ground at Cisco Live 2024 in Melbourne. Together they discuss the impact of AI on the future workforce and the evolving landscape of remote and hybrid work in the digital age.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Guy Diedrich&lt;br \\\/&gt;\\nSVP &amp; Global Innovation Officer, Country Digital Acceleration (CDA), Cisco Networking Academy &amp; Learning &amp; Certification&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Dr. Guy Diedrich is a Senior Vice President and the Global Innovation Officer at Cisco, where he is responsible for its Country Digital Acceleration (CDA) and Networking Academy programs, as well as Learning and Certifications (L&amp;C). In this role, Dr. Diedrich collaborates closely with government and industry leaders around the world to drive mass-scale digitization and skilling initiatives that help increase GDP, create millions of next-generation jobs, and develop sustainable innovation ecosystems around the world. Dr. Diedrich continues to grow and evolve the programs into new markets, building trust with government, industry and academic stakeholders along the way.&lt;\\\/p&gt;\\n&lt;p&gt;Dr. Diedrich is also a member of the Board of Directors of the Cisco Foundation, which supports nonprofits and NGOs with grants, technology donations and expertise to help solve global challenges in communities around the world.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to his current role at Cisco Systems, Dr. Diedrich was a Vice Chancellor at the Texas A&amp;M University System where he was responsible for research, commercialization, federal government relations, state government relations and strategic initiatives.&lt;\\\/p&gt;\\n&lt;p&gt;Before joining Texas A&amp;M, Dr. Diedrich served as President and CEO of GRA Inc., a software development and consulting company that he co-founded and grew from a start-up to a firm employing more than 130 professionals. The company was sold to a publicly-traded technology company.&lt;\\\/p&gt;\\n&lt;p&gt;Dr. Diedrich holds a Bachelor of Science degree from Texas A&amp;M University, a Master\\u2019s degree from the University of Cambridge (Kings College) and a Ph.D. from Swansea University where he studied the economics of trust in organizations. Dr. Diedrich is a published author in cost accounting and medical psychology, and has worked extensively throughout Europe, the Americas, Asia, and the Middle East for more than two decades.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Anupam Trehan&lt;\\\/strong&gt;&lt;br \\\/&gt;\\n&lt;strong&gt;Vice President, People and Communities APJC, Cisco&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Anupam is the People &amp; Communities Leader for APJC. Anupam has been a strategic part of Cisco\\u2019s operations for a decade, having worked across different roles. Anupam is particularly passionate about talent &amp; leadership development, organizational transformation, promoting an inclusive and diverse workplace and has been a strong voice in this space sharing her thought leadership in various forums both internal and external to Cisco.&lt;\\\/p&gt;\\n&lt;p&gt;She has previously worked with JP Morgan, Delphi Technical Centre &amp; Tata AutoComp across various functions in HR. Anupam describes herself as a Mother, Traveler, Reader and an avid foodie.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 12, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/from-cisco-live-2024-melbourne-kb-on-the-go-guy-diedrich-svp-global-innovation-officer-count-1&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1919446\\\/c1e-gkvqb31kn8f249gq-pkj3nmxpizz0-qmf7fb.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:15&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1733979403,&quot;key&quot;:&quot;ef1aa0567cf4c806a61881eee4a43612&quot;},&quot;ppe-4514-100&quot;:{&quot;title&quot;:&quot;From Cisco Live 2024 Melbourne \\u2013 KB On The Go | Raj Chopra, SVP &amp; Chief Product Officer, Security Business Group, Cisco, Angelique Medina, Head of Internet Intelligence at Cisco ThousandEyes, and Matt Caulfield, VP of Product for Duo and Identity, Cisc&#8230;&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, KB sits down with Raj Chopra, SVP &amp; Chief Product Officer, Security Business Group, Cisco, Angelique Medina, Head of Internet Intelligence at Cisco ThousandEyes, and Matt Caulfield, VP of Product for Duo and Identity, Cisco on the ground at Cisco Live 2024 in Melbourne. Together they discuss Cisco\\u2019s vision of being an AI first company, data in flight, and the concept of \\u2018identity is the new spam\\u2019.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Raj Chopra, &lt;\\\/strong&gt;&lt;strong&gt;SVP &amp; Chief Product Officer, Security Business Group, Cisco&lt;br \\\/&gt;\\n&lt;\\\/strong&gt;&lt;br \\\/&gt;\\nRaj Chopra is SVP and Chief Product Officer of the Cisco Security Product Management organization, where he leads strategy and execution for Cisco Security and SD-WAN products, ensuring comprehensive security for all users, from any device to any network or application.|&lt;\\\/p&gt;\\n&lt;p&gt;Raj is a seasoned executive with a proven record of delivering market-leading innovation in security with a strong focus on user-first experiences. He is a strong advocate of supporting diverse teams and equitable environments that bring out the best in everyone.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to taking on this role, Raj led product, design, and strategy for Proofpoint\\u2019s flagship Email Security portfolio, helping grow that business nearly 3-fold in 4 years.&lt;\\\/p&gt;\\n&lt;p&gt;Before Proofpoint, Raj was part of the founding team of Netskope. He built both the product and new market category of CASB (Cloud Access Security Broker) and spurred its growth into SASE (Secure Access Service Edge) and SSE (Security Services Edge). During his career, he launched more than a dozen cybersecurity products, including several in the past 15 years that rose to $250M+ in product revenue.&lt;\\\/p&gt;\\n&lt;p&gt;Raj holds an MBA from the Haas School of Business, UC Berkeley, and a BS in Computer Science from NIT (National Institutes of Technology) India and has a growing eagerness to go deeper into in his yoga practice.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Angelique Medina, Head of Internet Intelligence, Cisco ThousandEyes&lt;br \\\/&gt;\\n&lt;\\\/strong&gt;&lt;br \\\/&gt;\\nAngelique Medina is Head of Internet Intelligence at Cisco ThousandEyes, where she reports on all things Internet related, from BGP routing and outages to the performance of edge and cloud-based services. She has more than a decade of experience in the networking industry.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Matt Caulfield, Vice President of Product for Duo and Identity, Cisco&lt;br \\\/&gt;\\n&lt;\\\/strong&gt;&lt;br \\\/&gt;\\nMatt Caulfield is VP of Product for Duo and Identity at Cisco, where he leads Cisco\\u2019s strategy and thought leadership in all things identity. Previously, Matt was the Founder &amp; CEO of Oort, a venture-backed Identity Threat Detection &amp; Response (ITDR) pioneer, which was founded in 2019 and acquired by Cisco in 2023. Matt has a technical background and is an expert in identity, networking, cloud, and security domains. Until 2018, he led the Cisco Boston Innovation Team focusing on new product initiatives.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 11, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/from-cisco-live-2024-melbourne-kb-on-the-go-raj-chopra-svp-chief-product-officer-security-bu-1&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1918584\\\/c1e-m1o3cnvvgwhwqk4n-z39v99n9f4kn-8nlynv.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;56:01&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1733892990,&quot;key&quot;:&quot;ed1cad44862b6e341d3ad7f74d645a0c&quot;},&quot;ppe-4514-101&quot;:{&quot;title&quot;:&quot;From Cisco Live 2024 Melbourne \\u2013 KB On The Go | Tom Gillis, SVP and General Manager, Security Business Group, AJ Shipley, Vice President, Product Management, Threat Detection &amp; Response, and Tom Casey, Senior Vice President and GM, Products &amp; Technolog&#8230;&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, KB is joined by Tom Gillis, SVP and General Manager, Security Business Group, AJ Shipley, Vice President, Product Management, Threat Detection &amp; Response, and Tom Casey, Senior Vice President and GM, Products &amp; Technology, Splunk, a Cisco company on the ground at Cisco Live 2024 in Melbourne. Together they dive into critical topics such as Cisco\\u2019s innovative HyperShield solution for patch management, Cisco\\u2019s acquisition of Splunk, and how they plan to integrate and enhance their products.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Tom Gillis&lt;\\\/strong&gt;&lt;br \\\/&gt;\\n&lt;strong&gt;SVP and General Manager, Security Business Group&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Tom Gillis is the Senior Vice President and General Manager of the Cisco Security Business Group (SBG). A respected security industry leader with strong executive management skills and in-depth knowledge of the challenges surrounding secure enterprise computing, Tom is responsible for the company\\u2019s global security business to fundamentally simplify the security experience.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to Cisco, Tom was the SVP\\\/GM of the Network and Advanced Security Business Group at VMware, where he led the endpoint, networking, load balancing and network security businesses. He was also the CEO\\\/co-founder of Bracket Computing which was acquired by VMware.&lt;\\\/p&gt;\\n&lt;p&gt;Before Bracket Computing, Tom was the GM of the Security Technology Group at Cisco where he led the company\\u2019s businesses for security management, appliances, applications, and endpoint services. Tom was also part of the founding team at IronPort Systems and served as senior vice president of marketing when the company was acquired by Cisco. Under his guidance, IronPort grew an average of 100 percent year-on-year for seven years. During his tenure, IronPort rose to become the leading provider of antispam, antivirus, and antimalware appliances for organizations ranging from small businesses to the Global 2000.&lt;\\\/p&gt;\\n&lt;p&gt;Tom has also worked at iBEAM Broadcasting, Silicon Graphics, and Boston Consulting Group in various technical and leadership roles. He is also a noted advisor to startups and venture capital companies and is a member of several boards of directors.&lt;\\\/p&gt;\\n&lt;p&gt;Tom holds an M.B.A. degree from Harvard University, and graduated Magna Cum Laude with an M.S.E.E. degree from Northwestern University and a B.S.E.E. from Tufts University.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;AJ Shipley&lt;\\\/strong&gt;&lt;br \\\/&gt;\\n&lt;strong&gt;Vice President, Product Management, Threat Detection &amp; Response&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Think big. Start small. Move fast. These three values drive AJ Shipley, Vice President, Product, Threat Detection &amp; Response at Cisco Security Business Group. In this role, AJ is responsible for Extended Detection and Response (Cisco SecureX, Advanced Malware Protection), Risk-Based Vulnerability Management (Kenna Security), Endpoint Detection and Response (Cisco Secure Endpoint), Network Detection and Response (Cisco Secure Analytics, Talos), and Cisco Secure Email.&lt;\\\/p&gt;\\n&lt;p&gt;A dedicated product executive, AJ is passionate about creating phenomenal products that solve customers\\u2019 acute cyber-security business problems. He is equally enthusiastic about building and nurturing winning teams. That combination boded well in his previous position leading Cisco\\u2019s Customer Experience (CX) product management team, where he was&lt;br \\\/&gt;\\nresponsible for managing the technical support team and offers aligned to Cisco\\u2019s security and collaboration product portfolios.&lt;\\\/p&gt;\\n&lt;p&gt;Having experienced both the trenches and the board room, AJ leverages his diverse background to inform his career journey and that of others. Prior to joining Cisco, AJ served as Vice President of Product Management for Palo Alto Networks Cloud Delivered Security Subscriptions, leading successful launches that he credits to the strength of the individuals and teams committed to those customer outcomes.&lt;\\\/p&gt;\\n&lt;p&gt;AJ has led various disciplines at multiple public and private companies \\u2014 all honing his purpose and passion for developing the best products and bringing out the best in people while ensuring the teams and individuals responsible for those successes have the opportunity to achieve their career aspirations.&lt;\\\/p&gt;\\n&lt;p&gt;AJ is a Certified Information System Security Professional (CISSP), fluent in multiple cyber security disciplines, including email security, network security gateways, threat intelligence, encryption &amp; PKI, network access control, security standards and certifications. He is a past TS\\\/SCI clearance holder.&lt;\\\/p&gt;\\n&lt;p&gt;AJ holds undergraduate and graduate technical degrees in Electrical Engineering and Computer Science and a graduate degree in Business Administration from The University of North Carolina.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Tom Casey&lt;\\\/strong&gt;&lt;br \\\/&gt;\\n&lt;strong&gt;Senior Vice President and GM, Products &amp; Technology, Splunk&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Tom Casey is the Senior Vice President and GM, Products &amp; Technology for Splunk. With over 25 years of experience, Tom is responsible for evolving Splunk\\u2019s market-leading unified security and observability platform. Prior to joining Splunk, he served as Senior Vice President, Engineering at DocuSign, where he led the company\\u2019s product strategy, including development, execution and delivery of all products worldwide. Prior to DocuSign, Tom served as Vice President, Platform and Infrastructure at Apptio, where he helped scale the Company\\u2019s SaaS platform from a single offering to a multi-product portfolio. Before that, he spent 16 years at Microsoft in a number of leadership positions in product and engineering. He holds a B.S. from the University of Arizona.&lt;\\\/p&gt;\\n&lt;p&gt;Executive Sponsor: &lt;a href=\\&quot;https:\\\/\\\/splunkbenefits.com\\\/us\\\/your-wellbeing\\\/splunk-employee-resource-groups-and-community-groups#Neurodiversity@Splunk\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Neurodiversity Employee Resource Group&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 10, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/from-cisco-live-2024-melbourne-kb-on-the-go-tom-gillis-svp-and-general-manager-security-busine&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1917439\\\/c1e-wmjvurwg2vb0gmpo-ok356w64f7qj-br07jm.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;56:21&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1733806738,&quot;key&quot;:&quot;73e751b004758cf63847177da081e119&quot;},&quot;ppe-4514-102&quot;:{&quot;title&quot;:&quot;KBI.Media Update | Mark Anderson: Microsoft AI Tour 2024&quot;,&quot;description&quot;:&quot;&lt;p&gt;Join KB as she sits down with Mark Anderson, National Security Officer \\u2013 Australia and New Zealand from Microsoft, who will give us an exclusive sneak peek into what you can expect from &lt;a href=\\&quot;https:\\\/\\\/aitour.microsoft.com\\\/en-US\\\/sydney\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Microsoft AI Tour 2024&lt;\\\/a&gt; happening in Sydney at the ICC on December 11th. Mark shares insights into the event\\u2019s focus on real-world AI implementations by leading Australian organizations, highlights the tour\\u2019s comprehensive cybersecurity content, including Microsoft\\u2019s Secure Future Initiative, and the establishment of a local base of the Microsoft Threat Intelligence Center (MSTIC) in Australia.&lt;\\\/p&gt;\\n&lt;p&gt;Mark has over 28 years\\u2019 experience in the IT industry with 18 of those at Microsoft in various roles across the globe. As the National Security Officer for Microsoft Australia &amp; New Zealand, Mark is responsible for working with customers, partners, governments, and industry regulators to ensure that the Microsoft platforms are not only understood by policymakers but also adhere to their security, compliance and risk management requirements. In addition, Mark is accountable for the PROTECTED level assessment of Azure, Office 365, and Dynamics. Mark holds a Master of Cyber Security degree with high distinction from Edith Cowan University and is a Visiting Associate Professor at Macquarie University.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 9, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/kbimedia-update-mark-anderson-microsoft-ai-tour-2024-1&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1917302\\\/c1e-1dogsjz461fxv9nj-jpj1gg4ka700-tvs8l4.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;08:10&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1733704423,&quot;key&quot;:&quot;83d470bf6b02d6b794ce72e95b30bd72&quot;},&quot;ppe-4514-103&quot;:{&quot;title&quot;:&quot;Episode 284 Deep Dive: Kelly Sabo | Cybersecurity Essentials for SMBs&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Kelly Sabo, Head of SMB and Mid Market ANZ at Cisco, as she discusses cybersecurity essentials for small and medium businesses (SMBs). Kelly delves into the misconceptions SMB owners have about their vulnerability to cyber attacks, the alarming statistic that up to 60% of SMBs risk going out of business within 6 months post-attack, and the critical need for a comprehensive approach that goes beyond IT. We also explore how SMBs can tackle these challenges with limited resources, the benefits of outsourcing cybersecurity to experts, and the role of AI in automating security tasks to enhance protection. Additionally, Kelly emphasizes practical steps SMBs can take, like implementing multi-factor authentication and conducting risk assessments, to bolster their security without incurring enterprise-level costs.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Kelly Sabo, Leader \\u2013 Small &amp; Medium Business and Commercial Mid-Market, Cisco Australia &amp; New Zealand&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;With over a decade of experience in the technology sector,\\u00a0Kelly\\u00a0is dedicated to empowering small and medium businesses (SMBs) and commercial mid-market enterprises to thrive in today\\u2019s digital\\u00a0backdrop. As the\\u00a0leader\\u00a0for SMB and\\u00a0mid-market sized customers\\u00a0at Cisco ANZ,\\u00a0Kelly\\u00a0is deeply committed to\\u00a0leveraging\\u00a0Cisco\\u2019s\\u00a0cutting-edge\\u00a0technologies to drive growth,\\u00a0efficiency, and competitiveness for businesses of all sizes.&lt;\\\/p&gt;\\n&lt;p&gt;Kelly\\u2018s\\u00a0expertise\\u00a0lies in understanding the unique challenges and opportunities faced by SMBs and mid-market enterprises, particularly in an environment where the adoption of cloud and\\u00a0software as a service\\u00a0solution\\u00a0has reshaped\\u00a0the industry landscape. She is passionate about helping organisations harness the power of cloud managed networking, security, and collaboration to meet the demands of the modern business world.\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;Kelly\\u2019s experience covers multiple technology\\u00a0companies including\\u00a0Oracle, NetApp and now\\u00a0Cisco,\\u00a0\\u00a0from\\u00a0sales leadership, managing partners, distributors, account management and sales operations.&lt;\\\/p&gt;\\n&lt;p&gt;Since joining Cisco in 2015,\\u00a0Kelly\\u00a0has held various leadership, channel, and sales roles, gaining valuable insights into the dynamic nature of the technology ecosystem. Her extensive knowledge of the channel space provides her with a unique perspective in helping partners adapt and evolve in a rapidly changing environment.&lt;\\\/p&gt;\\n&lt;p&gt;As a leader in the industry\\u00a0who\\u00a0can\\u00a0distil complexity and boil it down to clear actions,\\u00a0Kelly\\u00a0is\\u00a0frequently\\u00a0sought after to share her insights and\\u00a0expertise\\u00a0at industry events and conferences.\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 4, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-284-deep-dive-kelly-sabo-cybersecurity-essentials-for-smbs&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1911907\\\/c1e-6wnpc2k7ovtndop0-6zwjg5xxt5wg-tjglsz.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:28&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1733288445,&quot;key&quot;:&quot;f1a317892d2fedae20634c74094ada70&quot;},&quot;ppe-4514-104&quot;:{&quot;title&quot;:&quot;Episode 284 Deep Dive: Ana Forsyth | Cyber Education \\u2013 How early do we start?&quot;,&quot;description&quot;:&quot;&lt;p&gt;\\u201cThe views reflected in this podcast are the views of the author and do not necessarily reflect the views of KPMG Australia\\u201d.&lt;\\\/p&gt;\\n&lt;p&gt;In this episode, we sit down with Ana Forsyth, Associate Director from KPMG, as she discusses the fragmented state of Australia\\u2019s education system in relation to cyber education. Ana highlights the significant gaps between schools, vocational training, and higher education, stressing the need for cohesive national strategies and government accountability.&lt;\\\/p&gt;\\n&lt;p&gt;Ana also covers the critical role of teachers in cybersecurity education, the necessity of early cyber safety awareness, and the challenges parents face in navigating their children\\u2019s digital lives. She shares her views on current parenting trends in relation to children\\u2019s access to technology and the imperative for systemic educational reforms to build a resilient cybersecurity workforce in Australia.&lt;\\\/p&gt;\\n&lt;p&gt;For the past eight years, Ana has been a cyber professional consulting to Federal Government and Defence clients. Ana previously worked in event sales and hospitality management for almost a decade, but took the leap into cyber security and never looked back, successfully transferring her leadership and stakeholder engagement skills.&lt;\\\/p&gt;\\n&lt;p&gt;Ana completed a PhD in cyber security strategy, entitled \\u2018Educational pathways to national cyber resilience: the Australian story\\u2019 (ANU, 2020); the thesis focused on growing Australia\\u2019s future cyber workforce by enhancing its pipeline. She argued for strengthened higher and vocational cyber security education, but also for the need to drive more interest in STEM in primary\\\/secondary school, bringing along not just the students, but also their teachers and carers. The research highlighted the need for support from government, academia and industry, seamlessly integrated at every level.&lt;\\\/p&gt;\\n&lt;p&gt;Ana also holds a Master of Arts in Strategy and Security (UNSW at ADFA, 2012), a Master of International Affairs (ANU, 2011), and a Bachelor of Business Administration and Hospitality Management (Northwood University and Hotel Institute Montreux, Switzerland, 2009). She grew up in the Middle East, and did most of her schooling in the French system.&lt;\\\/p&gt;\\n&lt;p&gt;[NB: if Ana could study forever, she would.]&lt;\\\/p&gt;\\n&lt;p&gt;Passionate about the human risk management facet of her industry, Ana is a firm believer in not only growing Australia\\u2019s future cyber workforce, but also uplifting the level of cyber skills across the board for the nation\\u2019s generations to come. She is dedicated to sparking conversation and raising awareness of the fact that future Australia needs support from us today to be the best that they can tomorrow \\u2013 and as secure as possible.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 27, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-284-deep-dive-ana-forsyth-cyber-education-how-early-do-we-start-1&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1908583\\\/c1e-02xmsjxrz7hgm3k5-1pdwompvud5-q5vyor.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;33:30&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1732683636,&quot;key&quot;:&quot;f8059282442d5e669d99ae368862b034&quot;},&quot;ppe-4514-105&quot;:{&quot;title&quot;:&quot;Episode 283 Deep Dive: John Hare | How AI Shapes the Future of Corporate Security&quot;,&quot;description&quot;:&quot;&lt;p&gt;\\u201cThe views reflected in this podcast are the views of the author and do not necessarily reflect the views of the global EY organization or its member firms.\\u201d&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;In this episode, we sit down with John Hare, Associate Partner, Cyber Security from EY as he discusses the latest EY research on what those organisations that achieve the best security outcomes (\\u201cSecure Creators\\u201d) do differently to their less secure peers (\\u201cProne Enterprises\\u201d).&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;We also explore how Secure Creators are responding to the recent surge in AI and GenAI use \\u2013 both in the cyber function (AI for Cyber) and throughout the enterprise (Cyber for AI). John provides insights into how AI presents an opportunity for astute cyber teams to cement themselves as the true enablers of technology transformation, rather than \\u201cthe department of no\\u201d.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;John\\u00a0has 25 years of professional experience, spanning cybersecurity, diplomacy and law.\\u00a0John\\u00a0began his career as an M&amp;A lawyer in London and Tokyo, before serving as a British diplomat for 9 years.\\u00a0John\\u00a0has spent the last decade working on cybersecurity, as a consultant, inside a major bank, and as a regional executive for a technology company.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;John\\u00a0advises Australia\\u2019s leading financial services organisations on their cybersecurity strategies, adopting global better practice, and making cybersecurity a value creation driver.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;Articles:&lt;\\\/p&gt;\\n&lt;p&gt;&lt;a href=\\&quot;https:\\\/\\\/www.ey.com\\\/en_gl\\\/insights\\\/consulting\\\/transform-cybersecurity-to-accelerate-value-from-ai#:~:text=The%202023%20EY%20Global%20Cybersecurity%20Leadership%20Insights%20Study,defense%2C%20including%20the%20use%20of%20AI%20and%20automation.\\&quot; target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;Cybersecurity an AI accelerator across the business | EY \\u2013 Global&lt;\\\/a&gt;&lt;br \\\/&gt;\\n&lt;a href=\\&quot;https:\\\/\\\/www.ey.com\\\/en_gl\\\/ciso\\&quot; target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;Cyber and privacy leaders\\u2019 agenda | EY \\u2013 Global&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Listen to Decrypting The Future episodes &lt;a href=\\&quot;https:\\\/\\\/podcasts.apple.com\\\/us\\\/podcast\\\/decrypting-the-future\\\/id1756190024\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;here&lt;\\\/a&gt;.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 13, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-283-deep-dive-john-hare-how-ai-shapes-the-future-of-corporate-security&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1885559\\\/c1e-1dogsj4v8rcxv9nj-qd409v81upv5-dgmdwu.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:29&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1731474015,&quot;key&quot;:&quot;d5747af25f19c55356d31d6b71c43bb7&quot;},&quot;ppe-4514-106&quot;:{&quot;title&quot;:&quot;Episode 282 Deep Dive: Skeeve Stevens |  Future of Cybersecurity&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Skeeve Stevens, Director of Future Crime Agency, as he discusses the increasing desensitization to data breaches and the critical need for proactive government action in cybersecurity. Skeeve dives into the consequences of frequent cyber incidents, the potential for more advanced AI-powered attacks, and the urgent requirement for systemic changes to better manage personal data. We explore the inadequacies of current cybersecurity legislation, the challenges in educating the public about cyber risks, and the looming dangers posed by AI and home automation vulnerabilities. Skeeve also highlights the dire need for improved cybersecurity awareness and education to keep pace with technological advancements.&lt;\\\/p&gt;\\n&lt;p&gt;Skeeve Stevens is a leading authority in Australia and the APAC region on the Weaponisation of Technology. He specialises in identifying the risks and threats posed by emerging technologies and navigating the ever-evolving landscape of future technology-driven crime.&lt;\\\/p&gt;\\n&lt;p&gt;Future Crime transcends traditional concepts of cybercrime, representing a vast, complex, and rapidly expanding threat landscape with global reach and immediate, far-reaching consequences.&lt;\\\/p&gt;\\n&lt;p&gt;Skeeve provides expert advice to a diverse range of professionals, including government officials, politicians, legal advisors, lawyers, judges, law enforcement agencies, defence forces, the security sector, and businesses alike. His expertise has earned him hundreds of media appearances as a subject-matter expert, featuring on television, radio, newspapers, and podcasts across the globe.&lt;\\\/p&gt;\\n&lt;p&gt;Skeeve is, above all, a visionary Futurist, accomplished entrepreneur, highly sought-after keynote speaker, and renowned technology architect. As a trusted advisor to C-Level executives, he delivers exceptional insights across a broad spectrum of cutting-edge domains, including Future Crime, Artificial Intelligence, Futurism, Internet Architecture and Critical Infrastructure, the Internet of Things, and Automation. His expertise also spans Micro and Personal Robotics, as well as the sociology and psychology of human interaction with emerging technologies, offering a comprehensive perspective on how these innovations will shape society and our future.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;\\u00a0&lt;\\\/strong&gt;Skeeve is the author of the Threat Matrix, a restricted publication where he discusses potential risks using current, near Future, and emerging technologies and methodologies.&lt;\\\/p&gt;\\n&lt;p&gt;Skeeve is the founder of the Future Crime Agency (FCA) which specialises in the weaponisation of advanced and emerging technology and creating awareness for Law Enforcement, Military, First Responders, Private Security, and enterprises who work within those sectors.&lt;\\\/p&gt;\\n&lt;p&gt;Skeeve guest lectures on Cybersecurity, Technology Crime, Technology Terrorism, Infrastructure Protection, 1st Principal Thinking and Inversion Thinking at multiple academic institutions in departments such as Computer Science, Political Science,\\u00a0Psychology, National Security, and International Studies.&lt;\\\/p&gt;\\n&lt;p&gt;Skeeve is a former Director of the Internet Society of Australia and former chair of APNIC (Internet Governance) Policy Committee.\\u00a0 He has also represented Australia in Internet Governance issues and policy across the world.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 6, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-282-deep-dive-skeeve-stevens-future-of-cybersecurity&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1875034\\\/c1e-vzj8a9zz7xtwz1vk-jpjk1vwot1gx-0seggj.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;01:16:58&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1730868972,&quot;key&quot;:&quot;dbd3cc38f44523cba439b122f8f0f791&quot;},&quot;ppe-4514-107&quot;:{&quot;title&quot;:&quot;Episode 281 Deep Dive: Yuri Miloslavsky | Risks of Digital Footprint in Information Sharing&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Yuri Miloslavsky, CEO of Sharepass, as he discusses the risks associated with digital footprints in information sharing. Yuri delves into the importance of awareness about the vulnerabilities introduced by our online activities and the challenges of balancing security with user convenience. We explore the cybersecurity industry\\u2019s need to simplify security processes like multi-factor authentication (MFA) to enhance user adoption, and the pivotal role of education in improving security practices. Yuri also addresses corporate privacy policies, the trade-off between convenience and security, and the necessity for tighter compliance and regulation to ensure transparent data management.&lt;\\\/p&gt;\\n&lt;p&gt;Yuri Miloslavsky is an IT professional and entrepreneur with over 15 years of experience in the industry. As the co-founder and CEO of SharePass, a cutting-edge digital footprint management and privacy protection platform, Yuri is at the forefront of developing secure solutions for the modern digital communication landscape. His expertise extends to building and running a successful Managed Service Provider (MSP) specializing in IT consulting and cloud services.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 30, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-281-deep-dive-yuri-miloslavsky-risks-of-digital-footprint-in-information-sharing-1&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1869231\\\/c1e-5k0vbm6mk6t0xmvo-471ovgmqan71-ohn1q0.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:17&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1730264413,&quot;key&quot;:&quot;644391b67aa80d4e1bb96cf1552444dc&quot;},&quot;ppe-4514-108&quot;:{&quot;title&quot;:&quot;Episode 280 Deep Dive: Mary D&#8217;Angelo | The Power of Dark Web Threat Intelligence&quot;,&quot;description&quot;:&quot;&lt;p dir=\\&quot;ltr\\&quot;&gt;In this episode, we sit down with Mary D\\u2019Angelo, Cyber Threat Intelligence Solutions Lead from Filigran, to explore cyber threat intelligence. Mary dives into the challenges of decision-making fatigue and discusses the essential role of integrating threat intelligence across organizational silos. She emphasizes the importance of a top-down cultural shift, advocating to demonstrate threat intelligence\\u2019s ROI to C-level executives. Highlighting real-world examples, such as the LockBit ransomware attacks on US hospitals, Mary reinforces the urgent need to democratize and streamline intelligence sharing. She also discusses the potential of AI in improving threat intelligence processes while noting the necessity for human oversight in decision-making.&lt;\\\/p&gt;\\n&lt;p dir=\\&quot;ltr\\&quot;&gt;Mary D\\u2019Angelo is a Dark Web Threat Advisor dedicated to empowering organizations with the knowledge and tools needed to effectively combat cyber threats. With a strong focus on threat intelligence, Mary guides businesses in leveraging advanced security strategies to thwart malicious actors.&lt;\\\/p&gt;\\n&lt;p dir=\\&quot;ltr\\&quot;&gt;Her commitment to raising awareness about cybersecurity risks is evident through her extensive work, including insightful interviews and thought-provoking blog posts aimed at educating the public.&lt;\\\/p&gt;\\n&lt;p dir=\\&quot;ltr\\&quot;&gt;Mary holds a Bachelor\\u2019s degree from the University of Washington. Actively engaged in the InfoSec community, Mary is a familiar face at industry events, contributing her expertise and staying abreast of emerging trends.&lt;\\\/p&gt;\\n&lt;p dir=\\&quot;ltr\\&quot;&gt;Beyond her professional endeavors, Mary is deeply invested in nurturing the next generation of cybersecurity professionals. She dedicates time to mentoring university students, sharing invaluable insights and guiding them toward successful careers in the field.&lt;\\\/p&gt;\\n&lt;p dir=\\&quot;ltr\\&quot;&gt;Mary\\u2019s influence extends beyond traditional realms, as she actively participates in esteemed think tanks such as the Dagstuhl Seminar 2024 and the Tortora Bradya Institute. Through collaborative efforts with leading experts, Mary continues to shape the discourse and advance cybersecurity strategies on a global scale.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 23, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-280-deep-dive-mary-dangelo-the-power-of-dark-web-threat-intelligence-1&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1847933\\\/c1e-901kfng1nncdv65r-kp2mq8x7i78g-uaja4x.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;39:34&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1729659658,&quot;key&quot;:&quot;90373da06ea482334255c322df217738&quot;},&quot;ppe-4514-109&quot;:{&quot;title&quot;:&quot;From NetApp INSIGHT \\u2013 KB On The Go | Pravjit Tiwana, Senior Vice President &amp; General Manager, Cloud Storage Business Unit, Jeff Baxter, Vice President, Product Marketing, and Krish Vitaldevara, Senior Vice President, Shared Platform&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this bonus episode, KB is joined by Pravjit Tiwana, NetApp\\u2019s Senior Vice President &amp; General Manager, Cloud Storage Business Unit, Jeff Baxter, Vice President, Product Marketing, and Krish Vitaldevara, Senior Vice President, Shared Platform on the ground at NetApp Insight 2024. Together, they dive into the critical topics like cloud services, unifying customer data, and the future of intelligent data infrastructure.&lt;\\\/p&gt;\\n&lt;p&gt;The discussion delves into the importance of building strong relationships with hyperscalers, the impact of AI on enterprises, and the challenges of data governance. Join us as we explore strategies for integrating AI with data, addressing customer needs, and effectively managing data security and insights.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Pravjit Tiwana, Senior Vice President &amp; General Manager, Cloud Storage Business Unit&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Pravjit Tiwana is NetApp\\u2019s GM and SVP of Cloud Storage. In his role, Pravjit is responsible for continuing the acceleration of our market leading first-party services in all three public clouds.&lt;\\\/p&gt;\\n&lt;p&gt;Pravjit brings over 25 years of experience to the role, many of those in the cloud space. Most recently, he served as the CEO of Gemini APAC, leading a 1000 person team across engineering, product, program management, sales and Business Development functions. Prior to that, he held a variety of general manager roles at Amazon\\\/AWS, leading the Productivity Applications business and then their Edge &amp; Network Services business. Pravjit lives in Bellevue, Washington with his wife and two teenage daughters (and his best friend, golden doodle Nemo). He is an avid golfer and marathon runner (when it isn\\u2019t raining in Seattle).&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Jeff Baxter, Vice President, Product Marketing&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Jeff Baxter is Vice President, Product Marketing at NetApp. In this role, Jeff leads the team responsible for core product &amp; solutions marketing at NetApp. Previously, Jeff has held a variety of technical and strategy roles at NetApp, including serving Sr. Director of Product Management for ONTAP, Chief Evangelist for ONTAP, and Field Chief Technology Officer for the Americas at NetApp. Before joining NetApp, Jeff worked as an Associate at Booz Allen Hamilton advising multiple government clients and performing numerous in-depth storage assessments. Prior to Booz Allen, Jeff was Manager of Enterprise Systems at George Washington University, where he led a team of 15+ storage and systems administrators. He had responsibility for enterprise systems including collaboration and virtualization environments, as well as a complex storage system spanning multiple Data Centers. Jeff holds an MBA and BA from George Washington University. He is a NetApp Certified Data Management Administrator (NCDA). He has also has held VCP, SNIA, PMP, ITIL, and CISSP certifications.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Krish Vitaldevara, Senior Vice President, Shared Platform&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Krish Vitaldevara is a passionate product leader and engineer with demonstrated success at building compelling multiyear strategies for large platform and product teams and delivering significant impact for large enterprises and billions of consumers. Krish is the SVP for Shared Platform at NetApp, responsible for unified storage platform, manageability platform, Customer eXperience Office (CXO), and Chief Design Office (CDO). His team enables delivery of various NetApp offerings across On-Premise, Hybrid Cloud, and Data Services. Prior to joining NetApp, Krish spent six+ years at Google in multiple roles, including leading product for Android and Plays Trust and Safety and Product for Google Maps. Krish joined Google after a long stint at Microsoft where he led product teams for O365 Foundations, Outlook.com, and Microsoft Consumer Trust and Safety teams. Early in his career, Krish worked at startups such as LoudCloud, started by Ben Horowitz and Marc Andreesen, and Brience, which enabled enterprises to customize customer experiences on mobile. Krish is also a proven innovator and hacker with more than 30 patents, primarily in distributed systems and spam-detection models, using graphs and networks for anomaly detection.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 18, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/from-netapp-insight-kb-on-the-go-pravjit-tiwana-senior-vice-president-general-manager-cloud&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1856063\\\/c1e-02xmsjgk7pcgm3k5-jpj24nv0bqd6-kthg1n.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;48:45&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1729227601,&quot;key&quot;:&quot;57aed6a0cc83e06935be5d05800b2ea7&quot;},&quot;ppe-4514-110&quot;:{&quot;title&quot;:&quot;From NetApp INSIGHT &#8211; KB On The Go | Haiyan Song, Executive Vice President &amp; General Manager, CloudOps and Sandeep Singh, Senior Vice President &amp; General Manager, Enterprise Storage&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this bonus episode, KB is joined by Haiyan Song, NetApp\\u2019s EVP &amp; GM, CloudOps and Sandeep Singh, Senior Vice President and General Manager, Enterprise Storage on the ground at NetApp Insight 2024. Together, they dive into the critical topics of data management, cloud operations, and cybersecurity. This conversation explores the groundbreaking shifts in technology and strategy at NetApp, focusing on the integration of intelligent services in data infrastructure, the critical role of enterprise storage, and the future of AI.&lt;\\\/p&gt;\\n&lt;p&gt;Tune in to discover how NetApp is not only redefining the cloud operating model but also tackling the crucial challenges of data security and ransomware protection.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Haiyan Song, EVP &amp; GM, CloudOps \\u2013 NetApp&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Haiyan Song is an experienced cloud, security, engineering, and database-management leader, with a track record of successfully integrating acquisitions and scaling them by connecting with and leveraging larger company ecosystem capabilities to accelerate success. Haiyan has held several leadership roles throughout her career tenure, including Splunk, HPE and Arcsight, all of which represent richly diverse technical experience. While her achievements are vast, one of the most notable during her time at Splunk includes her leadership in building and scaling a transformative business area that resulted in an increase in revenue of more than 15x over a seven-year period. Not only does she have a wide breadth of technical skills, but she has also worked in management roles within smaller companies, large-scale enterprises, and acquired businesses, and is experienced in change-readiness and organisational transformation.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Sandeep Singh, Senior Vice President and General Manager, Enterprise Storage \\u2013 NetApp&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Sandeep Singh is a driven, passionate, creative business leader with a proven track record of leading business and product strategy, building innovative products, managing high-performance organisations, and delivering business results at startups and Fortune 500 technology companies. Prior to joining NetApp, Sandeep spent four years at Hewlett Packard Enterprise (HPE) in multiple roles, including Vice President of Product Management for Data Infrastructure, Vice President of Marketing for HPE Storage, and CMO for Zerto, an HPE company. Sandeep joined HPE from Pure Storage, where he led product marketing for FlashArray, and helped the company scale from pre-IPO $100M run rate to a public company with greater than $1B in revenue. Prior to Pure, Sandeep led product management and strategy for 3PAR, an enterprise storage company, from pre-revenue to greater than $1B in revenue, including four-year tenure at HP post-3PAR acquisition. Sandeep resides in the Bay Area with his wife, two daughters, and their family dog. He has completed several marathons and ultra-marathons, including a 50-mile race, and his family has backpacked more 75 miles of the John Muir Trail.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 16, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/from-netapp-insight-kb-on-the-go-haiyan-song-executive-vice-president-general-manager-cloudo&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1856057\\\/c1e-2k31b8zmq4c67jo4-gpkw2zq1bd6z-rido8g.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;28:19&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1729054855,&quot;key&quot;:&quot;6409aa87d59885b7e37840242e78ca19&quot;},&quot;ppe-4514-111&quot;:{&quot;title&quot;:&quot;From NetApp INSIGHT \\u2013 KB On The Go | Ashish Dhawan, Senior Vice President\\\/General Manager &amp; Chief Revenue Officer, Cloud Business Unit and Gagan Gulati, General Manager, Data Services&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this bonus episode, KB is joined by Ashish Dhawan, NetApp\\u2019s Senior Vice President\\\/General Manager &amp; Chief Revenue Officer, Cloud Business Unit and Gagan Gulati, General Manager, Data Services, on the ground at NetApp Insight 2024. Together, they dive into the critical topics shaping the future of data and AI.&lt;\\\/p&gt;\\n&lt;p&gt;Join us as we explore the accelerating drive towards enterprise cloud adoption with Ashish and discover the obstacles enterprises face and the strategies necessary for successful cloud integration.&lt;\\\/p&gt;\\n&lt;p&gt;Later in the episode, we shift focus to data protection and governance with Gagan as we discuss the crucial role of understanding and safeguarding your data in today\\u2019s digital landscape.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Ashish Dhawan, SVP\\\/GM and Chief Revenue Officer, Cloud Business Unit&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Ashish Dhawan is NetApp\\u2019s Senior Vice President of Global Cloud Sales. Ashish Dhawan is a highly respected leader in the technology industry, currently serving as the Managing Director for Global Enterprise Workloads at Amazon Web Services (AWS). With a career spanning over two decades, he has been the architect of several successful businesses across the world.&lt;\\\/p&gt;\\n&lt;p&gt;Driving Enterprise Cloud Adoption at AWS:&lt;br \\\/&gt;\\nSince joining AWS in 2018, Dhawan has played a pivotal role in driving cloud adoption in enterprises. He began in Asia Pacific where he built the enterprise sales team and in 3 years helped the enterprise business grow 6X. He built and nurtured lasting C-level relationships, hired and mentored talented people, and was a change agent with a focus on strategic planning and disciplined execution. He then went on to lead the Global Enterprise Workloads team which focused on migrating and modernising key enterprise workloads like Microsoft and VMware. Under his leadership, the enterprise workloads business consistently grew &gt;30% and he helped AWS achieve leadership in infrastructure and application modernization.&lt;\\\/p&gt;\\n&lt;p&gt;Early Career and Industry Expertise:&lt;br \\\/&gt;\\nDhawan began his career in technology sales, quickly establishing himself as a top performer. He honed his skills at companies like Wipro, Microsoft and Juniper, where he built businesses from scratch, created strong teams and left a legacy of strong relationships with customers and partners. Prior to joining AWS, Ashish was VP Sales at Juniper in Asia Pacific, Japan and China based out of Singapore. This experience gave him invaluable insights into the needs and challenges of enterprise customers, which has proven crucial in his current role.&lt;\\\/p&gt;\\n&lt;p&gt;A Visionary Leader and Motivator:&lt;br \\\/&gt;\\nDhawan is known for his strategic thinking, ability to build high-performing teams, and passion for innovation. He is an Amazon Bar Raiser and a highly respected leader within AWS, known for his motivational approach and commitment to employee development. He is also a frequent speaker at industry events, sharing his insights on the future of cloud computing and the impact it will have on businesses globally.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Gagan Gulati, General Manager, Data Services \\u2013 NetApp&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Gagan\\u2019s team focuses on building best-in-class data protection and governance products for NetApp enterprise and cloud storage. This portfolio includes backup, disaster recovery, ransomware protection, data classification and governance and CVO. Prior to NetApp, Gagan was Chief Product Officer at Behavox, a security and compliance company where he helped guide the vision, strategy, and roadmap for their product portfolio. Prior to that, Gagan was at Microsoft for 16 years. He was partner and director for PM for Data Protection and Governance products, where he took multiple products\\u2014including Azure RMS, Azure Information Protection, Microsoft Information Protection, and Azure Purview\\u2014 from incubation to their incredible growth, usage, and success.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 11, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/from-netapp-insight-kb-on-the-go-ashish-dhawan-senior-vice-presidentgeneral-manager-chief-re-1&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1856052\\\/c1e-q40nh29d7ji0v2x4-ok3w4mo5a5-jnsr7g.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;22:52&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1728622828,&quot;key&quot;:&quot;8d67187d57ac46f18f95759bb0ed4c0c&quot;},&quot;ppe-4514-112&quot;:{&quot;title&quot;:&quot;KB On The Go: Oracle CloudWorld Las Vegas&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this bonus episode, KB is on the go at Oracle CloudWorld in Las Vegas to find more about Oracle\\u2019s latest cloud technology, AI advancements, and innovative strategies. She sits down with Oracle executives Stephen Bovis, Stephanie Trunzo, and Pradeep Vincent as they explore Oracle\\u2019s shift from product-focused origins to a service-oriented approach, the vital role of AI in industry applications, and their efforts to bridge the gap between technological advancements and customer engagement.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Stephen Bovis, Regional Managing Director, Australia and New Zealand, Oracle&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Stephen Bovis is responsible for Oracle\\u2019s overall business in Australia and New Zealand and ensuring it delivers on its values of trust, customer success, innovation, and equality for its customers, partners, and communities across the region.&lt;\\\/p&gt;\\n&lt;p&gt;Stephen has more than 30 years of experience in the IT industry across a wide range of roles, functions, and marketing segments. Most recently, he was at Hewlett Packard Enterprise, where he was vice president and managing director of the South Pacific region.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to that, he was based in Singapore leading HP\\u2019s Enterprise Group sales account management team for Asia Pacific, whose portfolio included hardware, services, and software.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Stephanie Trunzo, Senior Vice President &amp; General Manager, Oracle Industries&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Expanding upon the success of launching Oracle Health as a complete portfolio that spans Oracle\\u2019s applications and infrastructure, Stephanie leads an industry-informed approach to Applied AI, Industry Clouds, and One Oracle model. In addition to Health and Life Sciences, Stephanie\\u2019s team drives Go To Market strategies for Financial Services, Retail, Hospitality, Restaurants\\\/F&amp;B, Energy &amp; Water, Communications, Engineering &amp; Construction, and Public Safety. Stephanie\\u2019s scope spans an $8B business with over 50k employees, including multiple acquisitions and organic growth.&lt;\\\/p&gt;\\n&lt;p&gt;Oracle\\u2019s Global Industries organisation solves some of industries\\u2019 toughest challenges with innovative yet practical applications built as best-practice examples of Oracle\\u2019s technology stack. By partnering with our clients, and hiring industry experts, we are building the most flexible and robust industry clouds in the market.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Pradeep Vincent, Senior Vice President &amp; Chief Technical Architect, OCI, Oracle&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Pradeep Vincent is the Chief Technical Architect and Senior Vice President at Oracle Cloud Infrastructure (OCI). He is a technology and software architect with more than 20 years of experience in tech companies such as Oracle, AWS, and IBM. He has a deep understanding of Cloud Infrastructure, Compute, Storage and Networking. Pradeep has been with Oracle for more than eight years leading a team of architects and software engineers building Oracle\\u2019s Public Cloud. He also leads OCI\\u2019s Architecture and Engineering Community initiatives.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 9, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/kb-on-the-go-oracle-cloudworld-las-vegas-1&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1854080\\\/c1e-pjr0h538kmbmo9x0-xx88r13vi6dg-ouqzxa.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;01:14:03&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1728450018,&quot;key&quot;:&quot;a51b0cd5bfa2ddceeaea3523b43f1589&quot;},&quot;ppe-4514-113&quot;:{&quot;title&quot;:&quot;Episode 279 Deep Dive: Courtenay Farquharson | The Final Cog In DevOps Data Protection&quot;,&quot;description&quot;:&quot;&lt;p&gt;Courtenay Farquharson is the founder and Chief Technology Officer of Backrightup and has over 20 years experience in the cybersecurity, backup and devops specifically. Backrightup was founded by Courtenay Farquharson in 2021 to address the data protection, compliance and business continuity challenges with storing your important code and associated metadata in the cloud (GitHub, Azure Devops and GitLab).\\u00a0\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;In a world where unintended cloud data loss scenarios like UniSuper in May 2024 are a very real possibility, Courtenay is passionate about educating organizations in shift-left DevSecOps processes and integrating backup into the SDLC together with other Developer Security Platforms (SAST, ASPM etc)&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 8, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-279-deep-dive-courtenay-farquharson-the-final-cog-in-devops-data-protection&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1854088\\\/c1e-wmjvur1d2gf0gmpo-dm55ngwph32d-ntqwgk.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:21&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1728428442,&quot;key&quot;:&quot;6fc315ea181e237468c6da988efc6cb8&quot;},&quot;ppe-4514-114&quot;:{&quot;title&quot;:&quot;KB On The Go: ISACA Beyond Tomorrow&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this bonus episode, KB is on the go at ISACA\\u2019s Beyond Tomorrow Conference in Melbourne. KB sits down with industry leaders like Erik Prusch, CEO of ISACA, as he discusses the organization\\u2019s expanding global influence and their pivotal role in career development for their 180,000 members. They also delve into the critical topics of AI\\u2019s transformative power across sectors, the intricacies of third-party risk management, and the indispensable importance of mastering basic cybersecurity practices. Erik is joined by fellow experts such as Jamie Norton, Chirag Joshi, Francine Hoo, Kate Raulings, Richard Magalad, Sam Mackenzie, and Wayne Rodriguez, who also bring their expertise and stories to the table, sharing the newest developments and challenges in cybersecurity and critical infrastructure.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Erik Prusch&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Erik is an experienced CEO and board director for major tech companies. Prior to joining ISACA, he was most recently chief executive officer at Harland Clarke Holdings Corp., a provider of integrated payment solutions and integrated marketing services. He has also served as CEO for Outerwall, Lumension, NetMotion Wireless, Clearwire and Borland Software Corporation. Additionally, he has been a board member for RealNetworks, WASH, Calero Software and Keynote Systems. Previously in his career, Erik served as chief financial officer for a number of public companies, such as Identix and Borland, and for divisions of public companies, such as Gateway Computers and PepsiCo. He began his career at Deloitte &amp; Touche (then Touche Ross). Erik holds a bachelor\\u2019s degree from Yale University and an MBA from NYU\\u2019s Stern School of Business.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Jamie Norton&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Jamie Norton, CISA, CISM, CGEIT, CISSP, CIPM is a Partner at McGrathNicol, a specialist Advisory and Restructuring firm committed to helping businesses improve performance, manage risk, and achieve stability and growth. He also serves on the Advisory Board at Avertro, a cybersecurity startup enabling informed and defensible data-driven decisions about organisational cyber resilience and AI safety. He has over 25 years\\u2019 experience in managing security resilience for State and Federal Government agencies and commercial organisations. He is the former Chief Information Security Officer (CISO) at the Australian Taxation Office (ATO), one of Australia\\u2019s largest federal government agencies, where he led the security governance, risk, intelligence &amp; operations, testing and forensics teams. He has chaired and supported several senior industry and interdepartmental committees on cyber strategy and resilience and the senior Australian representative at international government forums on cybercrime. He has previously held leadership roles at NEC, Tenable, Check Point, and the World Health Organization.&lt;\\\/p&gt;\\n&lt;p&gt;Jamie has been involved with ISACA for nearly 20 years, at the local chapter board, conference organiser and most recently with the CISM Certification Working Group. He holds degrees in accounting and information technology from the Australian National University and is an affiliate member of Chartered Accountants Australia and New Zealand. Jamie is a regular and accomplished industry speaker and media commentator on cyber security. He is based in Australia.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Chirag Joshi&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Chirag Joshi, a multi-award winning cyber security executive, brings extensive experience in leading cyber security and risk management programs across various industries, including critical infrastructure sectors such as financial services and energy. His expertise in both IT and OT environments, coupled with his experience in managing cyber security through mergers and acquisitions, makes him uniquely qualified to address the challenges of the SOCI Act. As the author of bestselling books on cyber security and a recognised thought leader, Chirag offers valuable insights into practical implementation strategies and behavioural aspects of security awareness. His role as Founder and CISO at 7 Rules Cyber, combined with his experience in leading multi-million-dollar cyber transformation initiatives, positions him to provide actionable advice on navigating the complex landscape of critical infrastructure protection, supply chain resilience, and cyber risk management in the context of the SOCI Act and beyond.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Francine Hoo&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Francine is a Director with KPMG\\u2019s Data team focusing on building trusted data practices. She has helped build, assure and audit multiple frameworks including governance, data management, data analytics practices, privacy, risk and compliance. Having started in audit, she leverages her combined experience to help build evidenced based, human centric, ethical and trustworthy data practices. She\\u2019s helped teams build AI Assurance frameworks to ensure safer and reliable deployment of AI based outcomes. She passionately believes that humans are accountable for the right use of data and therefore the sufficient and appropriate risk management of data operations in all its forms \\u2013 including AI and automation. The future of data driven outcomes including AI is dependent and strengthened by the partnership of a diversity of thinking, where humans collaborate with tech.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Kate Raulings&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Kate didn\\u2019t start her career in cyber security. Computers and internet connected devices weren\\u2019t common at the time. She has a deep understanding of business imperatives developed over a decade\\u2019s experience in senior communications and innovation roles before focusing on IT strategy, governance and cyber security for the last 8 years. She regularly briefs senior executive, audit and risk committees and boards on privacy and cyber security matters and has supported numerous organisations through notifiable data breaches. Kate has a Masters in Marketing and an MBA from the University of Melbourne as well as CISM certification. She has won local and global recognition for her success in digital communication and was a finalist in the Women in ICT Awards in 2022 and 2023. She is a member of the Australian Women in Security Network and an ISACA member. Kate is the CISO at EPA Victoria.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Richard Magalad&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Richard is a 30 year veteran of the ICT industry starting at the Commonwealth bank and was a 10-year IT director from 2010 at a mining company with gold and diamond projects in Australia, Laos and Canada.&lt;br \\\/&gt;\\nCurrent projects are systems integration for two of the large Telcos, several agencies in the Australian Federal Government. He is a hands-on tech with a philosophy to never separate Cyber Security from Information Technology, just as he was trained in highly secure arena in banking and government&lt;br \\\/&gt;\\nHe consulted and trained cyber security in SE Asia to governments and critical infrastructure enterprises on missions for Dept of Foreign Affairs and Trade and with RMIT University, where he now lectures cyber security to professional students.&lt;br \\\/&gt;\\nHe was an executive committee and secretary at the Australia Computer Society (Victoria) until 2022 and the current chairperson of Cloud Branch with the Australian Information Security Association.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Sam Mackenzie&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Sam Mackenzie, is a Cybersecurity committee member with ACS Victoria Branch and brings 25 years of experience, where he speaks straightforward cybersecurity and technology with business leaders.&lt;br \\\/&gt;\\nHaving worked with global brands overseas and household names in Australia, he\\u2019s known for creating high-performance teams across the sectors of health, telecoms, energy and more recently local government. His approach is characterised by structured thinking, simplifying complexity and developing culture as a catalyst for change.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Wayne Rodrigues&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Wayne Rodrigues is currently a Security Architect at Insignia Financial and an active member of the cybersecurity community.&lt;\\\/p&gt;\\n&lt;p&gt;Having been involved with ISACA Melbourne in the very early stages of his career, he has remained an active member and volunteer for the past 12 years. He is also part of various other initiatives such as the Purple Team Australia mentoring program and the EC-Council Career mentoring program. Being a keen advocate for continuous learning and growth, he loves mentoring others in the industry. Wayne believes these initiatives an excellent opportunity to give back to the community and help mould the next generation of industry professionals.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 4, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/kb-on-the-go-isaca-beyond-tomorrow-1&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1850403\\\/c1e-o39rfv7k50i8n0xz-mk10qk9kh4x3-8lfyoz.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;47:53&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1728014456,&quot;key&quot;:&quot;4c1b91d2ec2ad030c62d5f8c87126a71&quot;},&quot;ppe-4514-115&quot;:{&quot;title&quot;:&quot;From NetApp INSIGHT &#8211; KB On The Go | Mignona Cot\\u00e9, Global Chief Security Officer and Matt Watts, Chief Technology Evangelist&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this bonus episode, KB is joined by Mignona Cot\\u00e9, NetApp\\u2019s Global Chief Security Officer, and Matt Watts, NetApp\\u2019s Chief Technology Evangelist, on the ground at NetApp Insight 2024. Together, they dive into the critical topics shaping the future of technology and business. Cot\\u00e9 brings her three decades of cybersecurity experience to discuss autonomous anti-ransomware systems, highlighting both the emotional and technical challenges faced by IT professionals in securing data and ensuring business continuity. She also delves into the importance of backup testing and the regulatory landscape that drives preparedness across industries. Watts, on the other hand, sheds light on the evolving role of sustainability within tech enterprises, emphasizing concrete measures NetApp is taking to support environmental goals while addressing the challenges of data waste. The episode explores the intersection of cybersecurity, sustainability, and emerging technologies like AI, offering listeners valuable insights into managing data efficiently while staying ahead of disruptive trends.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Mignona Cot\\u00e9, Global Chief Security Officer \\u2013 NetApp&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Mignona Cote, SVP and chief security officer at NetApp, has become a world leader in multi-cloud security, building solutions in high-tech, healthcare, insurance, and large financial institutions. Under her leadership, her team has unified security accountability internally to protect NetApp as well as externally to protect customers ultimately by moving NetApp to a SuperCloud architecture, which combines edge computing, multi-cloud, and multi-location recourses to create a powerful computing environment. She holds a Bachelor of Science in Computer and Information Systems from Northwestern State University and a MBA from Louisiana State University.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Matt Watts, Chief Technology Evangelist \\u2013 NetApp&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;As Chief Technology Evangelist, Matt Watts provides guidance on NetApp\\u2019s overall strategy and technology solutions to a wide base of customers and the global partner community. Matt is also part of the portfolio leadership team, providing advice and guidance on technology and transformation.&lt;\\\/p&gt;\\n&lt;p&gt;Matt is increasingly in demand as a keynote speaker, combining his knowledge of the IT industry with anecdotes and stories that bring technology to life with witty, easily understandable examples.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to this role, Matt Project Managed a number of significant IT projects; managed System Engineers responsible for providing installation and onsite support; as well as overseeing IT outsourcing contracts. This experience has given him contact with all levels of Leadership, enabling him to understand, communicate with and support clients with their IT and transformation Strategies.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 3, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/from-netapp-insight-kb-on-the-go-mignona-cote-global-chief-security-officer-and-matt-watts-chi&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1848741\\\/c1e-901kfngvr8idv65r-xxvzqxdjto30-ezsyoq.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;39:09&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1727935239,&quot;key&quot;:&quot;f85cf2a91388813975811c1332d1d294&quot;},&quot;ppe-4514-116&quot;:{&quot;title&quot;:&quot;From NetApp INSIGHT &#8211; KB On The Go | Kristen Verderame, Vice President, Global Government Relations and Michelle Rudnicki, President, US Public Sector&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this bonus episode, KB is on the go at the NetApp Insight 2024 Conference in the MGM Grand, Las Vegas. KB sits down with two remarkable leaders from NetApp\\u2014Kristen Verderame, Vice President of Global Government Relations, and Michelle Rudnicki, President of the U.S. Public Sector.&lt;\\\/p&gt;\\n&lt;p&gt;Kristen shares her expertise on the intricate landscape of government relations and public affairs, explaining how NetApp supports various government missions across the globe, from AI strategies to the U.S. Space Force. Later, Michelle delves into leadership in the U.S. public sector, highlighting the importance of data security and the role of NetApp\\u2019s intelligent data infrastructure in enhancing data governance.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Kristen Verderame, Vice President, Global Government Relations \\u2013 NetApp&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Based in Washington DC, Kristen currently serves as the Vice President of Global Government Relations for NetApp, a $20B market cap technology company based in San Jose, CA. In that role, Kristen represents the company in front of Congress and Executive Branch agencies as well as government bodies around the world to support NetApp\\u2019s policy positions and enhance business development opportunities for the company. Kristen has spent over twenty-five years working in government relations and public affairs, and has extensive experience in cyber security, telecommunications and technology, and designing and running international lobbying campaigns and programs to support business objectives.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to joining NetApp, Kristen worked with a number of other Fortune 100 companies to build their Government Relations functions through her firm, Pondera International LLC, including BT (British Telecom) Americas, Booz Allen Hamilton, Mandiant and FireEye. As an attorney, Ms. Verderame also worked through her firm to provide outside general counsel and business consulting services to major corporates, startups and small businesses.&lt;\\\/p&gt;\\n&lt;p&gt;Before founding her own firm, Kristen spent over ten years in a variety of roles within BT (British Telecom) Group plc. Her most recent role was Vice President and General Counsel for the company\\u2019s US operations where she was a leading member of the management team that drove 150% revenue growth (to US$3B) and a quadrupling of the workforce, with the non-organic growth requiring numerous reviews with the Committee on Foreign Investment in the US (CFIUS) which she led. Also throughout her tenure, Kristen served as the head of BT\\u2019s lobbying and government affairs office in Washington, D.C. in which she was the senior advocate for the company\\u2019s interests in front of U.S. Government agencies and Washington-based policymakers and led the company\\u2019s international trade policy efforts.&lt;\\\/p&gt;\\n&lt;p&gt;Kristen holds several advisory roles outside of NetApp. She currently serves as an officer on the IT Sector Coordinating Council at the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security, having served on its Executive Committee for the last several years, and serves on the National Risk Management ICT Supply Chain Task Force. She also currently serves on the board of TPG Corporation Ltd. (Australia) as its Security Director responsible for ensuring compliance with US Government national security requirements. Over the years she has been actively involved in the network of British-American organisations in the US and UK, serving as board member, Vice President and general counsel of the British American Business Council, the international umbrella organisation that represents over 2,500 British and American businesses across 25 chapters in the US and the UK, and also serving as President of the Washington, D.C. chapter. Kristen has also served as the General Counsel to the Transatlantic Business Council, as the CEO of the European-American Business Council, and as a US Non-Executive Director for UK Trade &amp; Investment.&lt;\\\/p&gt;\\n&lt;p&gt;Kristen received her Juris Doctor from the University of Michigan Law School, and her BA degree from Albion College, Summa Cum Laude, Phi Beta Kappa, with Honors. Kristen has also completed post-JD course work at the Georgetown University Law Center. Kristen holds a Top-Secret security clearance. She has two young-adult children, and in her spare time teaches yoga and races in duathlons.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Michelle Rudnicki, President, US Public Sector \\u2013 NetApp&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Michelle Rudnicki serves as Vice President of NetApp\\u2019s U.S. Public Sector business where she focuses on supporting government\\u2019s important and complex missions. She is passionate about and dedicated to helping public sector clients find technology solutions to manage their data most effectively and migrate to the cloud in this era of distributed, dynamic, and diverse data. She is responsible for leading the team to achieve strategic, financial, operational, and business objectives as they relate to NetApp\\u2019s public sector customers and channels.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to NetApp, Michelle served as the vice president of Public Sector at Virtustream. Before that, she enjoyed a long tenure at IBM in leadership roles \\u2013 including VP of Federal Systems \\u2013 that spanned decades working with public sector clients to transform the way they interacted with their clients, citizens, and patients, progressing their digital services through the use of technology such as analytics, cognitive computing, mobile, and cloud.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 2, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/from-netapp-insight-kb-on-the-go-kristen-verderame-vice-president-global-government-relations&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1848737\\\/c1e-2k31b8d4z4s67jo4-z3z5x3nrfd5q-ny6xey.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;28:21&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1727848803,&quot;key&quot;:&quot;bed78c1f3c5f8b980fb9d13edab8f55e&quot;},&quot;ppe-4514-117&quot;:{&quot;title&quot;:&quot;Episode 278 Deep Dive: William Glazier | Why Is There A Focus on API Security in 2024?&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Will Glazier, Head of the Cequence Prime Threat Research Team from Cequence Security, as he discusses the intricate landscape of API security in 2024. Will delves into the essential intertwining of API security and bot management, emphasizing why these cannot be handled independently. The conversation covers the diverse nature of API security issues, from inventory and compliance to active threat protection, and the industry\\u2019s shift towards consolidated security tools. Will also highlights the often-overlooked but critical importance of API security, compared to more tangible threats like business email compromise, and stresses the necessity of integrating security within CI\\\/CD pipelines to mitigate risks.&lt;\\\/p&gt;\\n&lt;p&gt;William Glazier \\u00a0is Head of Cequence Security\\u2019s new Cequence Prime Threat Research Team, whose mission is to help the security industry better understand how cybercriminals execute automated, malicious bot attacks against web, mobile, and API-based applications. As Head of CQ Research, Will focuses on the rapidly escalating problems of account takeover, fake account creation and content scraping at scale. He has an extensive background in fraud and abuse prevention, as well as building threat intelligence systems and databases. He has also extensively studied the shared attacker infrastructure and network fingerprints of tools used by cybercriminals to carry out these attacks, and has presented research at various security conferences such as BotConf, Hack.lu and GreHack.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 25, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-278-deep-dive-william-glazier-why-is-there-a-focus-on-api-security-in-2024-1&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1842303\\\/c1e-n439h57dogu9z48n-qdrnrx27svwm-ki2eea.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;41:54&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1727244046,&quot;key&quot;:&quot;c774922a5ce5f9cc3c3f2049eb89cb68&quot;},&quot;ppe-4514-118&quot;:{&quot;title&quot;:&quot;KB On The Go: Zenith Live 2024 (Part 2)&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this bonus episode, we\\u2019re joined by Claudionor Coelho, Chief AI Officer, and Deepen Desai, Chief Security Officer &amp; Head of Security Research at Zscaler as they share the latest in zero trust networking and AI security to protect and enable organizations. Claudionor discusses the societal implications of AI, the fears of obsolescence, and the generational changes in communication, providing a comprehensive look at the future of AI in both the digital and human landscapes. Deepen highlights the incredible potential of AI in transforming cybersecurity through initiatives like Zscaler\\u2019s \\u201ccopilot\\u201d technology and the use of predictive models to foresee and mitigate breaches and the pivotal shift from reactive to proactive cybersecurity measures, underscoring the necessity of a zero trust architecture to minimize breach impacts.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Claudionor Coelho, Chief AI Officer, Zscaler&lt;br \\\/&gt;\\n&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Claudionor Coelho brings a wealth of expertise to help Zscaler deliver a competitive technology advantage through the development of AI and ML innovations. Prior to joining Zscaler, Coelho served as the Chief AI Officer and SVP of Engineering at Advantest, where he spearheaded the development of a Zero Trust private cloud solution tailored for the semiconductor manufacturing market. Before Advantest, Coelho was the VP\\\/Fellow of AI and the Head of AI Labs at Palo Alto Networks where he led the charge in AI, AIOps and Neuro-symbolic AI, an advanced form of AI that enables reasoning, learning, and cognitive modeling, to help revolutionize time series analysis tools on a massive scale. Coelho\\u2019s career also includes vital roles in ML and Deep Learning at Google, where he developed a state-of-the-art Deep Learning technology designed for automatic quantization and model compression which played a pivotal function in the search for subatomic particles at CERN..&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Deepen Desai, Chief Security Officer &amp; Head of Security Research, Zscaler&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;As Chief Security Officer &amp; Head of Security Research at Zscaler, Deepen Desai is responsible for running the global security research operations as well as working with the product group to ensure that the Zscaler platform and services are secure. Deepen has been actively involved in the field of cybersecurity for the past 15 years. Prior to joining Zscaler, he held a security leadership role at Dell SonicWALL.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 19, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/kb-on-the-go-zenith-live-2024-part-2-1&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1835341\\\/c1e-pjr0h5qgmdamo9x2-1p068rrmc34j-kaivg7.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;43:13&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1726711244,&quot;key&quot;:&quot;45e63ce0dc5e0a431d16683e9e58f078&quot;},&quot;ppe-4514-119&quot;:{&quot;title&quot;:&quot;Episode 277 Deep Dive: Jagdish Mahapatra | Microsegmentation and the Path Forward&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode of KBKast, we\\u2019re joined by Jagdish Mahapatra, Chief Revenue Officer of ColorTokens, as he discusses the imperative of achieving digital resilience against cyber attacks. Jag delves into the critical role of the right partners in business digital security, the importance of microsegmentation in preventing lateral movement within networks, and why businesses should focus on breach containment rather than just prevention. He also\\u00a0sheds light on the importance of maintaining business continuity through digital resiliency, the need for ongoing support from vendors, and how businesses can better prepare for inevitable cyber breaches.&lt;\\\/p&gt;\\n&lt;p&gt;Jagdish Mahapatra is the Chief Revenue Officer of ColorTokens, a leader in Cybersecurity\\u00a0 industry in helping organisations \\u201c Be Breach Ready\\u201d. He is responsible for the Global Go to\\u00a0 Market strategy of ColorTokens.\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;Prior to joining ColorTokens Jagdish Mahapatra was the Vice President for CrowdStrike for\\u00a0 Asia Region which included South East Asia, North Asia and South Asia. His key responsibilities\\u00a0 included Building a Strong Business for Asia Region with the focus on providing next Gen\\u00a0 Cybersecurity solutions to Enterprise customer and Govt. and build Strategic Alliances for\\u00a0 CrowdStrike. Aside from growing business in hypergrowth mode which made Asia one of the\\u00a0 fastest growing regions in the world for CrowdStrike, he topk a lot of pride in incubating a\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;culture of a highly engaged team with CrowdStrike Singapore being amongst the Top 5 Workplaces of 2022 and CrowdStrike India in Top 10 Workplaces in 2023. ( GPTW).\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;Jagdish has previously worked for Cisco and McAfee. In Cisco he built a Strong Enterprise\\u00a0 business of 250M USD when he took charge as the Managing Director for McAfee India.\\u00a0 Having built a successful business and culture in McAfee India, he went to run the Strategic\\u00a0 Alliances for APJ for McAfee before joining CrowdStrike.\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;He was recognized as one of the Top 40 Executives in India Inc under 40 in 2011 by Business\\u00a0 World.\\u00a0\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;He has delivered a TED talk for Star TV which was aired in Jan 2018 where he spoke about how\\u00a0 we should keep our kids safe in the online world. He has also spoken as TEDx speaker in Feb\\u00a0 2018 on Cybersecurity and impact of Digital footprints.\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;In the formative part of his career, he was instrumental in creating the manufacturing off\\u00a0 shoring model in India which emerged as a significant game changing industry phenomenon\\u00a0 during his stint at Larsen and Toubro, a large Engineering Conglomerate in India.\\u00a0\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;On the academic front, Jagdish is an Electrical Engineer with MBA in Marketing and Finance.\\u00a0 Jagdish loves to explore travel to experience cultures, food and local mythology and loves to\\u00a0 relate the stories to work. Born in the holy city of Puri, one of the 4 top pilgrimages of India,\\u00a0 he finds Indian mythology inspiring to fulfil todays\\u2019 life. He is an avid reader from fiction to\\u00a0 Business and Technology and loves to blog regularly on all topics on Social media. Right now,\\u00a0 his passion is to rekindle his music desires with Piano and Drums.\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 18, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-277-deep-dive-jagdish-mahapatra-microsegmentation-and-the-path-forward-1&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1835360\\\/c1e-m1o3cn8v5dcwqk4n-wwzo1wx4bx1g-mlb5rh.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;39:30&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1726639239,&quot;key&quot;:&quot;bd3a78150fd5842482a59961b7af2d94&quot;},&quot;ppe-4514-120&quot;:{&quot;title&quot;:&quot;KB On The Go: Zenith Live 2024 (Part 1)&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this bonus episode, we sit down with Kavitha Mariappan, Executive Vice President, Customer Experience &amp; Transformation and Dhawal Sharma, Senior Vice President &amp; General Manager as they share the latest in zero trust networking and AI security to protect and enable organizations. Kavitha provides insights into the rising use of AI in cybersecurity, both defensively and offensively, and the challenges organizations face transitioning to zero trust environments. Dhawal delves into the concept of adaptive access and its role in real-time anomaly detection and zero trust security models, emphasizing the need for geo-location aware policies and the integration of step-up authentication. They also explore the impacts of recent cyber incidents in the ANZ region, the significance of network segmentation, and the collaborative efforts with industry giants like Google and NVIDIA to enhance security capabilities through AI technologies.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Kavitha Mariappan, Executive Vice President, Customer Experience &amp; Transformation, Zscaler&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Kavitha Mariappan is a seasoned go-to-market executive with a penchant for rapidly translating technology into customer-centric value, mobilizing global teams and operations, and transforming them into high-growth businesses. Over her 20+ year tenure spanning enterprise software and service providers, she has held various high-impact roles spanning marketing, product management, and engineering at industry-leading companies including Databricks, Riverbed, Cisco, and Philips Electronics.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to joining Zscaler, she served as CMO at Split Software, a venture-backed startup where she built the company\\u2019s go-to-market engine from the ground up and was instrumental in defining a new category for product decisions. Kavitha is responsible for driving global transformation and innovation across all facets of Zscaler\\u2019s business, customers, strategy, products, and operations, with a strong focus on customer value creation.&lt;br \\\/&gt;\\nKavitha holds a Bachelor of Engineering in Communication Engineering from the Royal Melbourne Institute of Technology, Australia, and a Master of Science in Cybersecurity Risk and Strategy from New York University School of Law and Tandon School of Engineering.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Dhawal Sharma, Senior Vice President &amp; General Manager, Product Management, Zscaler&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Dhawal Sharma is Senior Vice President &amp; General Manager of Product Management at Zscaler. He led all core product management from 2012 to 2018 and currently leads all emerging product and core platform responsibilities. His specialties are in cloud security, networking, data path, IoT, NFV, NPM, DLP, and compliance.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to joining Zscaler, he has worked in product management, product marketing and head of sales roles in the space of security, networking, compliance and network management at large companies such as Cisco as well as in tech startups.&lt;\\\/p&gt;\\n&lt;p&gt;Dhawal has a technical MBA degree from Symbiosis Center for IT where he achieved the best academic performance with a specialization in Networking and IT Infrastructure and he also holds a Bachelors in Engineering degree specializing in Computer Science. Dhawal also holds multiple patents in the security space along with many technical certifications in the past.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 17, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/kb-on-the-go-zenith-live-2024-part-1-1&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1835286\\\/c1e-02xmsjzxkkfgm3k5-gp2r82ogbo0n-d7vkwk.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;42:14&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1726538427,&quot;key&quot;:&quot;b3103da713e56855034b74072443b878&quot;},&quot;ppe-4514-121&quot;:{&quot;title&quot;:&quot;Episode 276 Deep Dive: Mahesh Thiagarajan | Oracle&#8217;s Approach to the Cloud&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Mahesh Thiagarajan, Executive Vice President at Oracle Cloud Infrastructure (OCI), as he discusses the evolving landscape of cloud security and cloud adoption. Mahesh delves into the shared responsibility model of cloud security, emphasizing the critical roles played by both customers and cloud providers in maintaining secure environments. He also discusses the various challenges developers face, the innovative solutions offered by Oracle Cloud to prevent misconfigurations, and the significant advantages Oracle gains from its later entry into the cloud market.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Oracle CloudWorld 2024 is happening on September 9 to 12, 2024. Learn more about the event &lt;a href=\\&quot;https:\\\/\\\/www.oracle.com\\\/cloudworld\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;here&lt;\\\/a&gt;.&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Mahesh Thiagarajan serves as the Executive Vice President at Oracle Cloud Infrastructure (OCI), overseeing the development of core infrastructure services that includes Hardware, Supply Chain, Datacenter, Compute, Networking, and Storage. His team is devoted to constructing a distributed cloud infrastructure that offers customers a comprehensive, high-performance cloud computing environment. The primary objective is to empower customers to innovate, scale efficiently, and manage costs effectively.&lt;\\\/p&gt;\\n&lt;p&gt;Mahesh was pivotal in the 2016 launch of Oracle Cloud Infrastructure, contributing to strategic planning and overseeing various product launches related to security, application development, computing, database, and big data services. He also played a crucial role in establishing partnerships with Microsoft and VMware.&lt;\\\/p&gt;\\n&lt;p&gt;In his prior role as EVP for Security &amp; Developer Platform, Mahesh led a team in developing security and observability products, cloud security measures, privacy solutions, compliance features, and services tailored for cloud-native applications development.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 11, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-276-deep-dive-mahesh-thiagarajan-oracles-approach-to-the-cloud&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1832094\\\/c1e-wmjvurqqp3s0gmpo-v61g2q5dug9n-0hzfpb.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:11&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1726030849,&quot;key&quot;:&quot;31a3c9a9a1872f87d042db815f1d6723&quot;},&quot;ppe-4514-122&quot;:{&quot;title&quot;:&quot;KBI.Media Update | Gabie Boko: NetApp INSIGHT 2024&quot;,&quot;description&quot;:&quot;&lt;p&gt;Join KB as she sits down with Gabie Boko, Chief Marketing Officer of NetApp, who will give us an exclusive sneak peek into what you can expect from &lt;a href=\\&quot;https:\\\/\\\/insight.netapp.com\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;NetApp INSIGHTS 2024&lt;\\\/a&gt;. Gabie explores topics such as sustainability, cloud technology, and how AI is revolutionizing the way businesses manage data. Gabie also highlights the exciting new announcements, partner collaborations, and customer success stories that will be showcased at the event.&lt;\\\/p&gt;\\n&lt;p&gt;Gabie Boko is a business trailblazer currently serving as Chief Marketing Officer (CMO) at NetApp. She draws on her deep experience as a business, marketing, and technology leader to help shape NetApp\\u2019s evolution as the industry leader in intelligent data infrastructure.&lt;\\\/p&gt;\\n&lt;p&gt;A 25-year veteran in the tech industry, Gabie is known for her work spearheading business transformations at high-impact companies such as HPE, SAP, Sage, and Cognos. Prior to becoming NetApp CMO in January 2023, Gabie led the company\\u2019s Portfolio Marketing organization.&lt;\\\/p&gt;\\n&lt;p&gt;As a visionary business leader, Gabie relentlessly prioritizes a customer-first mindset. Among traditional marketing practices, she applies distinct strategies that anticipate future trends and adeptly navigate uncharted territories. This is driven by her proven certitude that marketing is much more than promotion and branding, it is about driving high impact outcomes and thinking for the business and industry as a whole. Gabie is resolute in her commitment to revolutionize the face of marketing and amplify its influence on business growth, strategy and vision.&lt;\\\/p&gt;\\n&lt;p&gt;Having grown up in the beautiful state of Alaska, Gabie is a strong advocate for the protection of rural communities.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 5, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/kbimedia-update-gabie-boko-netapp-insight-2024&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1829520\\\/c1e-6wnpc2pqogundop0-pk9op3wdh8gk-42wudu.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;07:23&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1725544833,&quot;key&quot;:&quot;43597e7de43991d546ff6584461ecfe4&quot;},&quot;ppe-4514-123&quot;:{&quot;title&quot;:&quot;Episode 275 Deep Dive: Shannon Sedgwick | Geopolitics and Cyber Risk&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, Shannon Sedgwick, Partner \\u2013 National Cybersecurity Practice from MinterEllison, comes back on the show to talk about cyber warfare and its potential to precede physical warfare, especially targeting critical infrastructure. He also shares his insights on the intersection of geopolitics, technology, and cybersecurity, exploring the potential for AI to exacerbate global divisions and influence economic landscapes. The conversation also dives into the impact of increasing cyber threats, the challenges of AI regulation, and Australia\\u2019s position in the international technology landscape.&lt;\\\/p&gt;\\n&lt;p&gt;After two decades of working globally, consulting on risk and cybersecurity, Shannon has keen insight into what makes an organisation both protected and resilient from cyber threats. Shannon\\u2019s focus is on cyber risk governance and providing strategic advice to executive leadership and boards. Shannon works with government and corporate clients to develop solutions to incorporate cyber risk into their strategies. Shannon helps clients meet risk-reduction and compliance objectives and advises on the implementation of new and evolving technologies by ensuring they are secure, fit-for-purpose, scalable, and continually driving efficiencies. By employing his unique blend of experience in finance and cybersecurity, he assists in uplifting internal due diligence capabilities, focused on reducing risks and increasing return on investment.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 4, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-275-deep-dive-shannon-sedgwick-geopolitics-and-cyber-risk&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1827853\\\/c1e-2k31b8x8kda67jon-mk0595x0boo-ctobae.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;43:18&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1725429630,&quot;key&quot;:&quot;94691c403dbbcc08d86e2e2559903936&quot;},&quot;ppe-4514-124&quot;:{&quot;title&quot;:&quot;Episode 274 Deep Dive: Josh Goldfarb | Visibility and Blindness in Complex Environments&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we\\u2019re joined by Josh Goldfarb, Global Solutions Architect \\u2013 Security at F5, as he delves into the challenges of getting buy-in for security initiatives from management and executives. Josh discusses the struggle of presenting informative metrics to decision-makers and the need to bridge the gap between security professionals and business leaders. He also talks about the importance of modernizing security guidance to addressing the visibility challenge in complex environments.&lt;\\\/p&gt;\\n&lt;p&gt;Josh (Twitter: @ananalytical) is Global Solutions Architect \\u2013 Security, at F5. Previously, Josh served as VP, CTO \\u2013 Emerging Technologies at FireEye and as Chief Security Officer for nPulse Technologies until its acquisition by FireEye. Prior to joining nPulse, Josh worked as an independent consultant, applying his analytical methodology to help enterprises build and enhance their network traffic analysis, security operations, and incident response capabilities to improve their information security postures. He has consulted and advised numerous clients in both the public and private sectors at strategic and tactical levels. Earlier in his career, Josh served as the Chief of Analysis for the United States Computer Emergency Readiness Team (US-CERT) where he built from the ground up and subsequently ran the network, endpoint, and malware analysis\\\/forensics capabilities for US-CERT. In addition to Josh\\u2019s blogging and public speaking appearances, he is also a regular contributor to DarkReading and SecurityWeek.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;August 30, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-274-deep-dive-josh-goldfarb-visibility-and-blindness-in-complex-environments&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1823234\\\/c1e-3g92c5qvnxckq02n-pk9q7n6rtmp6-kujec1.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;39:04&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1724997605,&quot;key&quot;:&quot;9b972c281bd23f45b833fb1090fd3fa2&quot;},&quot;ppe-4514-125&quot;:{&quot;title&quot;:&quot;KB On The Go: TechLeaders 2024&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this bonus episode, we dive into the world of tech leadership and the challenges and opportunities surrounding the adoption of generative AI, ethical considerations, and data security at TechLeaders 2024.&lt;\\\/p&gt;\\n&lt;p&gt;Chris Diffley from Optus, announces the launch of the Optus managed threat monitoring service powered by Devo Technology, emphasizing the use of AI and ML to automate threat monitoring and detection. Chris \\u201cGonzo\\u201d Gondek from NetApp highlights the importance of data storage conversations, storage technology flexibility, and autonomous ransomware protection. Gavin Jones from Elastic addresses the evolving nature of technology and the lag in Australia\\u2019s adoption of generative AI, while Geoff Schomburgk emphasizes the importance of a positive approach to encourage MFA adoption.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Chris Diffley, Senior Director for Client Security, Enterprise and Business,Optus&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Chris is an experienced Information Security Manager and Security Director with over 20 years of experience in Telecommunications, Security, Operations and Consulting. He\\u2019s lead teams across enterprise, midmarket and small businesses and has deep understanding of implementing and upholding a number of frameworks and standards across businesses.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Chris \\u201cGonzo\\u201d Gondek, Solutions Engineer Manager, Australia &amp; New Zealand, NetApp&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Chris \\u201cGonzo\\u201d Gondek is a technology evangelist who plays a crucial role in driving NetApp\\u2019s technical solutions specialists (TSS) to greater heights. As our TSS Leader, Chris and his team collaborate closely with our sales and channel business units to drive innovation, develop new opportunities, enhance our solution offerings, and ensure that our customers\\u2019 needs are not just met, but exceeded. Chris spent the past 4 years working in the NetApp Partner eco-system as a Technical Partner Manager, as well as spokesperson at our channel and alliance events. Prior to NetApp, Chris partnered with us at Commvault and worked as a solutions specialist at Symantec. With 25 years in the tech sector, Chris is a seasoned industry leader with a proven track record of delivering innovative solutions and driving customer success.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Gavin Jones, Area Vice President and Country Manager, Australia &amp; New Zealand, Elastic&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Gavin brings over two decades of enterprise software experience, with a track record of leadership in banking and financial services, telecommunications, and public sector verticals. Joining Elastic as an Area Vice President and Country Manager in Australia and New Zealand (ANZ), he assumes a pivotal role in overseeing ANZ market operations, driving business development, and shaping the company\\u2019s strategy. Prior to joining Elastic, Gavin served as Vice President of ANZ at Confluent, where he spearheaded their transition towards vision and value-based selling. His focus was on high-value and priority use cases for the clientele. Preceding this role, he held the position of Country Manager for Tableau Software ANZ for two and a half years. In this capacity, he played a key role in shaping the BI\\\/analytics category as a leader and a subsidiary of salesforce.com. His responsibilities included developing and executing the ANZ go-to-market strategy, as well as navigating the integration with Salesforce. Gavin is motivated by his ambition to lead a dynamic and inspired team within an innovative, growth-oriented organisation. His expertise spans strategic account management, new business development, and the skillful negotiation of large-scale, complex deals and partnerships.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Geoff Schomburgk, Vice President, Asia Pacific and Japan (APJ), Yubico&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;At Yubico, Geoff is responsible for driving the Yubico business across the Asia Pacific and Japan (APJ) region, working with partners and enterprise customers to implement modern phishing-resistant authentication, helping make the internet safer for all.&lt;\\\/p&gt;\\n&lt;p&gt;Geoff brings a strong customer focus and a proven ability to implement complex technology solutions across various industries, including telecommunications, utility and transport sectors across Australia, Asia and Europe. Critical to the success of these projects is the definition and realisation of tangible business value, where the combination of Geoff\\u2019s business consulting approach and project delivery experience consistently delivers business value.&lt;\\\/p&gt;\\n&lt;p&gt;Geoff is an experienced senior executive with a background in engineering and strategy consulting and over 30 years of experience in the global information and communications technology (ICT) industry. Geoff has a Bachelor of Engineering (Honours) and an MBA. He is also a qualified Company Director (FAICD) with current Board and business mentor roles for several Not-for-profit (NFP) organisations.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;August 28, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/kb-on-the-go-techleaders-2024-1&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1819553\\\/c1e-02xmsjvg05igm3kp-wwzr59v9ugqj-uicg2d.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:44&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1724824838,&quot;key&quot;:&quot;379ce1e70f9a71b69e5cd34a78f416dd&quot;},&quot;ppe-4514-126&quot;:{&quot;title&quot;:&quot;Episode 273 Deep Dive: Jeetu Patel | The Future of Security&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we welcome Jeetu Patel, Executive Vice President and Chief Product Officer at Cisco, to delve into the future of cybersecurity and its impact on cloud-based software. Jeetu shares his insights on the detrimental effects of monopolies in the industry and the complexities faced by Chief Information Security Officers (CISOs). He emphasizes the importance of resilience, updates, and collaboration in addressing security challenges and predicting exponential innovation.&lt;\\\/p&gt;\\n&lt;p&gt;Jeetu Patel is Cisco\\u2019s Executive Vice President and General Manager of Security and Collaboration. He leverages a diverse set of capabilities to lead the strategy and development for these businesses and also owns P&amp;L responsibility for this multibillion-dollar portfolio. Jeetu combines a bold vision, steeped in product design and development expertise, operational rigor and innate market understanding to create high growth Software as a Service (SaaS) businesses.&lt;\\\/p&gt;\\n&lt;p&gt;A member of the Executive Leadership Team, Jeetu is helping to redefine Cisco\\u2019s SaaS business and strategy to further accelerate the company\\u2019s transformation and growth. His mission is to build world class, subscription-based products that solve Cisco customers\\u2019 biggest problems. His team is creating and designing meaningfully differentiated products that diverge in the way they\\u2019re conceived, built, priced, packaged and sold.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to joining Cisco, Jeetu was the Chief Product Officer (CPO) and Chief Strategy Officer (CSO) at Box, a role he pioneered. He led the company\\u2019s product and platform strategy, setting the company\\u2019s long-term vision and roadmap for cloud content management in the enterprise. He transformed Box from a single product application to a multi-product platform used by 100K customers representing 69% of the Fortune 500. The discipline, quality standards, performance metrics, and stability Jeetu instilled fueled the platform\\u2019s growth \\u2013 nearly quadrupling revenues to $700M+. Box\\u2019s growth scaled to reach over 60M users with over 50% of customers using multiple products. He also created the Box Platform business unit where he led product strategy, marketing and developer relations \\u2013 driving products from incubation stage to mature offerings.&lt;\\\/p&gt;\\n&lt;p&gt;Before joining Box, Jeetu was General Manager and Chief Executive of EMC\\u2019s newly acquired Syncplicity business unit, a cloud service for Enterprise File Sync Sharing (EFSS) and collaboration. One of the first SaaS-based solutions offered by EMC, Jeetu spearheaded the company\\u2019s acquisition. He created a world class leadership team, secured some of the market\\u2019s largest customers and led the group to become one of the fastest growing EFSS companies in a highly competitive market. Other key roles at EMC included CMO for the Information Intelligence Group and Chief Strategy Officer, where he drove the organic and inorganic strategy for the division\\u2019s cloud and mobile growth.&lt;\\\/p&gt;\\n&lt;p&gt;Previously, Jeetu was President of Doculabs, a research and advisory firm co-owned by Forrester Research. The firm focused on collaboration and content management across a range of industries including financial services, insurance, energy, manufacturing and life sciences.&lt;\\\/p&gt;\\n&lt;p&gt;He currently serves on the boards of JLL, an American commercial real estate services company, and Equinix, the world\\u2019s digital infrastructure company.&lt;\\\/p&gt;\\n&lt;p&gt;Jeetu holds a B.S. in Information Decision Sciences from the University of Illinois, Chicago, and lives in the San Francisco Bay Area with his family.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;August 23, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-273-deep-dive-jeetu-patel-the-future-of-security-1&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1819320\\\/c1e-41r8c452d9hopgxj-ok429x0ds2z-pjeoff.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;43:09&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1724387522,&quot;key&quot;:&quot;2296f8d18a344ee1ecb2c02f94210160&quot;},&quot;ppe-4514-127&quot;:{&quot;title&quot;:&quot;Episode 272 Deep Dive: Wendy Thomas | Rethinking Trust and Security&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we\\u2019re joined by Wendy Thomas, CEO of Secureworks, as she talks about\\u00a0the pivotal importance of truth and consistency in executive and marketing communications, emphasizing the need for companies to demonstrate genuine change and sustained effort over time. She elaborates on the key elements of a sincere apology and recovery, pointing out the importance of understanding, action, and compensation to rebuild trust with customers. Wendy further emphasizes the economic lens through which trust and security should be viewed, underlining the interconnectedness and dependence on technology in daily life. Additionally, she addresses the harm of giving away personal data, the impact of data breaches, and the trade-off between security and convenience for businesses, ultimately calling for shared responsibility and collective investment in building trust and enhancing security.&lt;\\\/p&gt;\\n&lt;p&gt;As CEO, Wendy Thomas leads Secureworks to fulfill their purpose of securing human progress via innovative, battle-tested security solutions. She first joined Secureworks in 2008 leading Financial Planning &amp; Analysis (FP&amp;A), where she helped to execute strategic acquisitions that scaled the business and Secureworks\\u2019 IPO in 2016. As Strategy lead and Chief Product Officer, she developed the vision for Secureworks\\u2019 future, fueling the team that built and launched Secureworks\\u00ae Taegis\\u2122. Prior to becoming CEO, Wendy served as President of Customer Success, where she drove a customer-centric approach to help organizations achieve better security outcomes. In this role, Wendy was recognized in the number one position in The Software Report\\u2019s \\u201cTop 25 Women Leaders in Cybersecurity of 2021.\\u201d&lt;\\\/p&gt;\\n&lt;p&gt;Wendy leverages over 25 years of experience in strategic and functional leadership roles, and has worked across multiple technology-driven companies such as FirstData, BellSouth, and Internap Network Services, Inc. Wendy is a graduate of the University of Virginia, with a double major in Economics and Foreign Affairs, and she holds an International MBA from the University of South Carolina School of Business.&lt;\\\/p&gt;\\n&lt;p&gt;Wendy currently serves on the Board at IonQ, an industry leader in quantum computing. Additionally, she serves as a Liaison for AFS Intercultural Programs, an international youth exchange organization, and is a member of The Executive Committee of the Metro Atlanta Chamber of Commerce. Wendy is an alumna of Leadership Midtown Atlanta, a program designed to propel established leaders to further serve their communities.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;About Secureworks&lt;\\\/p&gt;\\n&lt;blockquote&gt;\\n&lt;div&gt;\\n&lt;div dir=\\&quot;ltr\\&quot;&gt;\\n&lt;div dir=\\&quot;ltr\\&quot; align=\\&quot;left\\&quot;&gt;\\n&lt;table&gt;\\n&lt;tbody&gt;\\n&lt;tr&gt;\\n&lt;td&gt;\\n&lt;div&gt;\\n&lt;blockquote&gt;\\n&lt;div class=\\&quot;gmail_quote\\&quot;&gt;\\n&lt;blockquote class=\\&quot;gmail_quote\\&quot;&gt;\\n&lt;div&gt;&lt;span style=\\&quot;color:#000000\\&quot;&gt;Secureworks Taegis\\u2122, is a SaaS-based, open XDR platform built on 20+ years of real-world detection data, security operations expertise, and threat intelligence and research. Taegis is embedded in the security operations of thousands of organisations around the world including in Australia who use its advanced, AI-driven capabilities to detect advanced threats, streamline and collaborate on investigations, and automate the right actions.\\u00a0&lt;\\\/span&gt;&lt;\\\/div&gt;\\n&lt;p&gt;&lt;span style=\\&quot;color:#000000\\&quot;&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;div&gt;&lt;span style=\\&quot;color:#000000\\&quot;&gt;Secureworks generated $85.7 million in revenue for Q1FY25, with revenue from its Taegis platform growing 10% year-over-year in the first quarter, to $69.1 million. Taegis adoption in Australia is accelerating.\\u00a0The company processes approximately five trillion cybersecurity-related events across its global customer base each week, giving Secureworks a rapidly growing and diverse security telemetry of more than 50 petabytes across endpoint, network, cloud, identity and other business systems.\\u00a0&lt;\\\/span&gt;&lt;\\\/div&gt;\\n&lt;\\\/blockquote&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/blockquote&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/td&gt;\\n&lt;\\\/tr&gt;\\n&lt;\\\/tbody&gt;\\n&lt;\\\/table&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/blockquote&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;August 9, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-272-deep-dive-wendy-thomas-rethinking-trust-and-security&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1800122\\\/c1e-jjvwhqgqq0bn1k2x-47g7g1zji5o7-h56ioo.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;39:53&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1723219211,&quot;key&quot;:&quot;07caf3615c0bb2ca0f30b93477da77ca&quot;},&quot;ppe-4514-128&quot;:{&quot;title&quot;:&quot;Episode 271 Deep Dive: Nathan Wenzler | The Dangers of Public Sector Employees Using AI Tools Privately&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode of KBKast, Nathan Wenzler, Chief Security Strategist at Tenable, joins us once again to discuss the critical importance of ensuring the accuracy and legitimacy of data within back-end databases to provide reliable responses from AI tools. We explore the shift towards AI reliance and the associated concerns about data integrity. Nathan emphasizes the need for purpose-built AI tools to ensure data accuracy, especially within government organizations. Additionally, we uncover the potential for AI to automate low-level tasks and emphasize the value of AI as a skills augmentation rather than job replacement. We also address the challenges of balancing AI innovation with security concerns and the need for practical implementations of AI tools to mitigate risks.&lt;\\\/p&gt;\\n&lt;p&gt;Nathan Wenzler is the Chief Security Strategist at Tenable, the Exposure Management company. he has over two decades of experience designing, implementing and managing both technical and non-technical security solutions for IT and information security organizations. He has helped government agencies and Fortune 1000 companies alike build new information security programs from scratch, as well as improve and broaden existing programs with a focus on process, workflow, risk management and the personnel side of a successful security program.&lt;\\\/p&gt;\\n&lt;p&gt;As the Chief Security Strategist for Tenable, he brings his expertise in vulnerability management and Cyber Exposure to executives and security professionals around the globe in order to help them mature their security strategy, understand their cyber risk and measurably improve their overall security posture.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;August 7, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-271-deep-dive-nathan-wenzler-the-dangers-of-public-sector-employees-using-ai-tools-privately&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1799347\\\/c1e-2k31b870g2t67jon-6zd062jvho33-ybwqtn.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;42:34&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1723046430,&quot;key&quot;:&quot;798fa6a45592d5ccd86edca55da975b9&quot;},&quot;ppe-4514-129&quot;:{&quot;title&quot;:&quot;Episode 270 Deep Dive: Richard Seiersen | How to Measure and Communicate What Matters in Cybersecurity Risk&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, Richard Seiersen, Chief Risk Technology Officer from Qualys, joins us to talk about the critical topic of third-party risks in business operations. Richard emphasizes the need for risk management professionals to measure and mitigate these risks, as well as understand the necessity of business resilience through risk transfer and capital reserves, particularly in the context of increasing third-party usage. He advocates for a shift in the security industry towards a more business-aligned approach, stressing the need for better measurement practices and the integration of concepts such as understanding the impact of breaches on customer attrition and brand trust.&lt;\\\/p&gt;\\n&lt;p&gt;Richard is focused on cybersecurity risk management \\u2013 as a modern enterprise practice and leadership skill. His books, speaking, and work support security leaders who need to align security practice with business goals. That alignment is at the heart of cybersecurity risk management.&lt;\\\/p&gt;\\n&lt;p&gt;As the Chief Risk Technology Officer at Qualys, Richard helps customers and the broader security community measure, communicate, and eliminate risk. With over 10 years of experience as a CISO, he has led and supported security strategy, operations, and governance across various industries and orgs, including Twilio, GE, and LendingClub.&lt;\\\/p&gt;\\n&lt;p&gt;He is also a published author and a faculty member at IANS, where he share his insights and knowledge on security metrics and risk management. His books, \\u201cHow To Measure Anything In Cybersecurity Risk\\u201d and \\u201cThe Metrics Manifesto: Confronting Security With Data\\u201d, provide practical and innovative approaches to quantifying and reducing security risk.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 31, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-270-deep-dive-richard-seiersen-how-to-measure-and-communicate-what-matters-in-cybersecurity-risk&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1795047\\\/c1e-q40nh2kgk8i0v2x1-dm6jzqgqc281-ts09ce.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;48:14&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1722441608,&quot;key&quot;:&quot;4f67b5273b8f893e39fd36554244f00a&quot;},&quot;ppe-4514-130&quot;:{&quot;title&quot;:&quot;Episode 269 Deep Dive: Sam Mackenzie | Critical Infrastructure Defence is Doable&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, Sam Mackenzie, cybersecurity committee member from the Australian Computer Society, sheds light on the crucial aspects of protecting essential services from cyber threats. Offering valuable insights, Sam emphasizes the need for good practice, sharing learnings, threat intelligence, network segmentation, and clear communication of risk to address leadership challenges. Sam highlights the challenges and importance of protecting society from cyber-physical outcomes, the evolving threat landscape for professionals in critical infrastructure, and the significance of defending against social engineering attacks.&lt;\\\/p&gt;\\n&lt;p&gt;Sam speaks straightforward cybersecurity and technology with business leaders in critical infrastructure. With 25 years\\u2019 experience at international corporations and household names in Australia, he\\u2019s created and led high performance teams in health, telecoms, energy and more recently in local government, focusing on using structured thinking and making the complex simple.&lt;\\\/p&gt;\\n&lt;p&gt;Sam\\u2019s recent research project involves interviewing leaders of critical infrastructure in Australia to gain valuable industry insights. Sam also serves on the Cybersecurity Committee for the Australian Computer Society (ACS) and is building a new community of driven professionals, passionate about protecting critical infrastructure and keeping society safe.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 26, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-269-deep-dive-sam-mackenzie-critical-infrastructure-defence-is-doable&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1791545\\\/c1e-41r8c4j28ouopgxj-47gm0rg0f0q-h8mp30.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;39:42&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1722009612,&quot;key&quot;:&quot;a31b67f5f38c8f5aee2c79cbb8be7f54&quot;},&quot;ppe-4514-131&quot;:{&quot;title&quot;:&quot;Episode 268 Deep Dive: Matt Preswick | Democratising Cloud Security \\u2013 Will Security Become the Enabler to AI Usage?&quot;,&quot;description&quot;:&quot;&lt;p&gt;In today\\u2019s episode, we\\u2019re joined by Matt Preswick, Principal Solutions Engineer from Wiz, in the company\\u2019s first podcast appearance, to talk about cloud security and the intersection of AI with security in organizations. Matt emphasizes the critical need for evaluating security risks and compliance states within cloud infrastructure, addressing the potential for false positives in identifying security vulnerabilities. He also sheds light on the challenges posed by cloud-native threats, urging organizations to integrate security into early-stage application and infrastructure design cycles for efficient prevention of incidents. Matt\\u2019s insights underscore the importance of collaboration between security and AI teams, aligning initiatives with organizational goals and customer needs.&lt;\\\/p&gt;\\n&lt;p&gt;Matt Preswick is the Principal Solutions Engineer from Wiz in APJ, with experience in network, email and cloud security at leading security vendors in EMEA and APAC. Before joining Wiz, he lead operations at a Sydney based network analytics startup before returning to Cloud security with Wiz.&lt;\\\/p&gt;\\n&lt;p&gt;Matt is passionate about developing scalable and actionable security practices within APJs largest organisations.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 12, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-268-deep-dive-matt-preswick-democratising-cloud-security-will-security-become-the-enabler-to-ai-usage&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1783560\\\/c1e-kdkxsjqmwmu941jk-gp2wzq77boxg-fjua6f.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;41:32&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1720800038,&quot;key&quot;:&quot;8bcb2120ab1b80b32a1d93f5a60a6681&quot;},&quot;ppe-4514-132&quot;:{&quot;title&quot;:&quot;Episode 267 Deep Dive: Alex Tilley | Digital Estate Planning&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode of KBKast, we welcome back Alex Tilley, Intelligence and Research Lead, APJ from Secureworks, to explore the often overlooked topic of digital estate planning. Alex shares personal experiences and highlights the challenges of accessing digital assets after a loved one\\u2019s passing. He dives into the complexities of managing deceased loved ones\\u2019 digital accounts, the importance of notarized copies of death certificates, and the challenges posed by 2-factor authentication and security practices. Alex also stresses the need for open discussions and better preparation for managing digital estates, especially in the context of an aging population, urging individuals to start the estate planning conversation and document important digital information for their loved ones.&lt;\\\/p&gt;\\n&lt;p&gt;With over 20 years of experience in computer security and cybercrime, Alex Tilley is a highly awarded cybercrime researcher. Beginning his career in the online casino industry on Australia\\u2019s Gold Coast, Alex went on to implement and administer many varieties of network security technologies within Australia\\u2019s banking industry. Alex was on the forefront of research and countermeasures when phishing and malware first began to attack banking platforms and customers. When he later became the Australian Federal Police\\u2019s senior cybercrime technical analyst, he combined his technical background with an analytical approach to discover \\u201cwho\\u201d the cybercriminals were, why they were attacking specific targets, and what they were looking for. This included identifying exposing online child predators as well as cybercriminals. \\u00a0During this time Alex become a key member of the operations team responsible for many high profile cases.&lt;\\\/p&gt;\\n&lt;p&gt;Alex is now head\\u00a0of\\u00a0Threat Intelligence and research for Asia Pacific Japan (APJ) for Secureworks a global IT security and research leading company. Where we uses his wealth\\u00a0of\\u00a0experience to help organisations at all levels from the board to operational techs understand the organisational and technical aspects\\u00a0of\\u00a0State-sponsored cyber attacks as well as\\u00a0cybercrime\\u00a0in all its forms.&lt;\\\/p&gt;\\n&lt;p&gt;Find more about Security2Cure &lt;a href=\\&quot;https:\\\/\\\/www.security2cure.com.au\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;here&lt;\\\/a&gt;.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 10, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-267-deep-dive-alex-tilley-digital-estate-planning&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1782362\\\/c1e-n439h58n24s9z48n-rk0dxg3guqk-cil6fk.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;45:40&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1720627230,&quot;key&quot;:&quot;9f6f15f6b535db74cd0ba4a9887c4f95&quot;},&quot;ppe-4514-133&quot;:{&quot;title&quot;:&quot;Episode 266 Deep Dive: Poornima DeBolle | Enhancing Browser Security&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, Poornima DeBolle, Co-founder and Chief Product Officer of Menlo Security, joins us as we tackle the evolving landscape of web browser security. Poornima sheds light on the potential risks associated with trusting links from popular email and file hosting services, urging enterprises to reevaluate their security stack and adapt to the current technological landscape. She also emphasizes the need for organizations to manage browsers as applications and highlights the gap in control and understanding between endpoint security and network security.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;b&gt;Poornima DeBolle&lt;\\\/b&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;b&gt;&lt;i&gt;Co-founder &amp; Chief Product Officer&lt;\\\/i&gt;&lt;\\\/b&gt;&lt;b&gt;&lt;i&gt;&lt;br \\\/&gt;\\n&lt;\\\/i&gt;&lt;\\\/b&gt;&lt;b&gt;&lt;i&gt;Official Member \\u2013 Forbes Technology Council&lt;\\\/i&gt;&lt;\\\/b&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Poornima co-founded Menlo Security, bringing years of product management experience to the table. Before Menlo, she was a product management executive at Juniper Networks, responsible for cloud security, security management, and security analytics. She joined Juniper via its acquisition of Altor Networks, where she was vice president of product management and business development. Prior to that, she was head of business development at Check Point in product management and engineering roles. Poormina holds an MSCS from Arizona State University.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;ul&gt;\\n&lt;li style=\\&quot;font-weight:400\\&quot;&gt;&lt;a href=\\&quot;https:\\\/\\\/www.linkedin.com\\\/in\\\/poornima-debolle-b0428\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;https:\\\/\\\/www.linkedin.com\\\/in\\\/poornima-debolle-b0428\\\/&lt;\\\/span&gt;&lt;\\\/a&gt;&lt;\\\/li&gt;\\n&lt;li style=\\&quot;font-weight:400\\&quot;&gt;&lt;a href=\\&quot;https:\\\/\\\/www.menlosecurity.com\\\/management\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;https:\\\/\\\/www.menlosecurity.com\\\/management\\\/&lt;\\\/span&gt;&lt;\\\/a&gt;&lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&lt;p&gt;&lt;b&gt;&lt;i&gt;Recent Accolades:&lt;\\\/i&gt;&lt;\\\/b&gt;&lt;\\\/p&gt;\\n&lt;ul&gt;\\n&lt;li style=\\&quot;font-weight:400\\&quot;&gt;&lt;a href=\\&quot;https:\\\/\\\/www.forbes.com\\\/profile\\\/poornima-debolle\\\/?sh=684a3da01f45\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Forbes: 50 Over 50: Entrepreneurs (2022)&lt;\\\/span&gt;&lt;\\\/a&gt;&lt;\\\/li&gt;\\n&lt;li style=\\&quot;font-weight:400\\&quot;&gt;&lt;a href=\\&quot;https:\\\/\\\/www.inc.com\\\/profile\\\/poornima-debolle\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Inc.: 200 Female Founders (2023)&lt;\\\/span&gt;&lt;\\\/a&gt;&lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 3, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-266-deep-dive-poornima-debolle-enhancing-browser-security&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1776701\\\/c1e-o39rfvn57vf8n0xg-v0nnmo02sqg9-3w6c4b.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;39:06&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1720022431,&quot;key&quot;:&quot;6224fc0d5025903ee2021ce289460771&quot;},&quot;ppe-4514-134&quot;:{&quot;title&quot;:&quot;KB On The Go: Insights from the Oracle CloudWorld Tour Singapore (Part 2)&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this bonus episode, KB is on the go at the 2024 Oracle CloudWorld Tour in Singapore where she sits down for a quickfire interview with Oracle executives Ashish Ray (Vice President, Product Management) and Sunil Wahi (Vice President, Fusion Cloud Applications) to get their insights on Oracle\\u2019s solution to solve business challenges.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Ashish Ray, Vice President, Product Management&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Ashish Ray is Vice President, Product Management within Oracle\\u2019s core database development organisation. His product responsibilities include Exadata, Zero Data Loss Recovery Appliance, Oracle Database\\u2019s High Availability Solutions (Maximum Availability Architecture), and all associated Platform as a Service (PaaS) Cloud Services.&lt;\\\/p&gt;\\n&lt;p&gt;His team is responsible for all technical product management and product strategy for Oracle\\u2019s mission-critical database technologies, including Exadata and Autonomous Database, across on-premises, public cloud, and cloud at customer. Team responsibilities include defining and driving product strategies, corralling requirements and framing roadmap based on market\\\/business demands, articulating product positioning and value proposition, launching and evangelising products and cloud services that solve complex enterprise problems, building and managing cross-functional teams and strategic partnerships.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Sunil Wahi, Vice President, Fusion Cloud Applications&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Sunil is a Vice President and Head of Solution Engineering at Oracle, where he leads the Cloud Solutions Innovation Portfolio for ERP, Supply Chain, CX, and Human Capital across Asia Pacific. He is also heading the Strategy and Execution of the Large Deals Program. He is a Chicago Booth MBA Graduate, a Certified Information Systems Auditor (CISA) with over 25 years of experience in enterprise software sales and consulting.&lt;\\\/p&gt;\\n&lt;p&gt;As part of the APAC Senior Leadership Team at Oracle heading Fusion Applications Large Deals Strategy and Execution, Sunil advises and executes the Go to Market Plans and Business Strategy for the Fusion Cloud Applications Business, driving revenue growth, customer satisfaction, and market share. He also leverages his industry expertise and business process re-engineering knowledge to help customers achieve excellence and embrace world-class solutions. He specialises in Finance Transformations, Supply Chain &amp; Logistics Strategies. He has exposure and advisory work in entrepreneurial technology startup business plans, investment, and funding strategies.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 1, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/kb-on-the-go-insights-from-the-oracle-cloudworld-tour-singapore-part-ii&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1772066\\\/c1e-vzj8a9p8qncwz1vx-mq83kg9jimr0-n9b6ia.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;45:46&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1719835213,&quot;key&quot;:&quot;cf5b209cc82f4160f08fba5bc851da38&quot;},&quot;ppe-4514-135&quot;:{&quot;title&quot;:&quot;KB On The Go: Insights from the Oracle CloudWorld Tour Singapore (Part 1)&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this bonus episode, KB is on the go at the 2024 Oracle CloudWorld Tour in Singapore where she sits down for a quickfire interview with Oracle executives Jae Evans (Global Chief Information Officer and Executive Vice President) and Chris Chelliah (Senior Vice President, Technology and Customer Strategy) to get their insights on Oracle\\u2019s solution to solve business challenges.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Chris Chelliah, Senior Vice President, Technology and Customer Strategy, Oracle JAPAC&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Chris Chelliah is responsible for driving digital transformation for Oracle\\u2019s customers in the Japan and Asia Pacific region. He\\u2019s accountable for the organisation\\u2019s hypergrowth in cloud infrastructure and autonomous database. Chris leads cloud specialist sales teams, industry architects, and the Oracle Insight team to bring together the expertise needed to provide a collaborative, consultative approach to help customers achieve their objectives.&lt;\\\/p&gt;\\n&lt;p&gt;Chris has nearly 30 years of experience across a variety of portfolios in Asia Pacific, Europe, and North America. Previously at Oracle, he focused on customer success with consulting and implementation services in global projects in the telecommunications, financial services, and government sectors, implementing disruptive and innovative software solutions.&lt;\\\/p&gt;\\n&lt;p&gt;Chris holds a postgraduate degree in computer science and mathematics from the University of Western Australia. He\\u2019s a frequent industry speaker and contributes regularly to trade and industry journals and opinion pieces on applications for emerging technologies.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Jae Evans, Global Chief Information Officer and Executive Vice President, Oracle&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Jae Evans is Oracle\\u2019s global chief information officer and executive vice president of Oracle Cloud Infrastructure (OCI) Platform Services. She\\u2019s responsible for accelerating Oracle IT\\u2019s cloud transformation across thousands of environments, and her team provides IT services to Oracle\\u2019s 170,000 employees and developers worldwide.&lt;\\\/p&gt;\\n&lt;p&gt;Jae also leads OCI\\u2019s platform services consisting of commercial systems including billing, subscription management, and cost management, as well as other core platforms such as console services and marketplace. In addition, her organisation is responsible for ensuring the highest level of security, compliance, operations and support for OCI.&lt;\\\/p&gt;\\n&lt;p&gt;She has more than 20 years of experience building and leading global teams and managing mission-critical production services across various industries, including ecommerce, enterprise cloud, online gaming, retail, and telecommunications. Jae is passionate about bringing diversity and inclusion (D&amp;I) into the workplace. She\\u2019s the executive sponsor of D&amp;I for OCI, a member of Oracle\\u2019s Executive D&amp;I Council, and an active participant in and champion of various Oracle Professional Asian Leadership and Women in Tech events.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 28, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/kb-on-the-go-insights-from-the-oracle-cloudworld-tour-singapore-part-1&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1772055\\\/c1e-o39rfvn9p1b8n0xg-qxjn7590tx6n-lqrwma.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;47:58&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1719576057,&quot;key&quot;:&quot;b744c0e6fba4005903b47ded0d5b3d5a&quot;},&quot;ppe-4514-136&quot;:{&quot;title&quot;:&quot;Episode 265 Deep Dive: Luke Hargreaves | Sustainable Technology \\u2013 What Really Matters&quot;,&quot;description&quot;:&quot;&lt;p&gt;In today\\u2019s episode, we\\u2019re joined by with Luke Hargreaves, Founder &amp; CEO of Aquainnis, as we discuss sustainability and its crucial role in modern businesses. He discusses the economic benefits of sustainability, including cost savings and improved brand awareness, as well as the introduction of legislation and shareholder accountability in reporting. We delve into the concept of greenwashing and the significance of education, emphasizing that sustainability is not just an environmental issue, but also an economic and social one.&lt;\\\/p&gt;\\n&lt;p&gt;A highly driven technical professional with 20+ years of experience in the IT industry. Luke believes in the limitless potential of technology to sustainably transform the lives of people, and the world as a whole. He derives genuine joy to be doing what he is doing, and brings this enthusiasm everywhere he goes..&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 21, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-265-deep-dive-luke-hargreaves-sustainable-technology-what-really-matters&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1765662\\\/c1e-x8jpim17v9an7wz4-04rnq0qdfvnz-crpsv9.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:42&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1718985605,&quot;key&quot;:&quot;2a4e2828be426b3589de9f4595ad9076&quot;},&quot;ppe-4514-137&quot;:{&quot;title&quot;:&quot;Episode 264 Deep Dive: Christy Wyatt | Cyber Resilience In Today\\u2019s Threat Environment&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, Christy Wyatt, President and CEO of Absolute Security, brings attention to the lack of maturity in the cybersecurity ecosystem compared to the regulatory environment. Her discussion delves into the disparity between the accountability on a Chief Security Officer (CSO) and a Chief Financial Officer (CFO), and the importance of responsible behavior, accountability, and conversations about risk tolerance and investments to mitigate risks in cybersecurity. Christy also emphasizes the need for continuous testing, measuring impact and probability, building roadmaps, aligning risk appetite, and maintaining resilience in the cybersecurity journey. She tackles the significance of cyber resilience in maintaining security posture and responding to incidents, along with the key steps involved.&lt;\\\/p&gt;\\n&lt;p&gt;Christy is President and CEO of Absolute, the only provider of self-healing, intelligent security solutions and the only endpoint provider embedded in over 600 million devices globally.&lt;\\\/p&gt;\\n&lt;p&gt;A Silicon Valley veteran, Christy has deep experience and expertise spanning cybersecurity, enterprise mobility, embedded platforms, IoT, enterprise software, and data science. Prior to Absolute, she served as the CEO of Dtex Systems and Chairman, President, and CEO of Good Technology (acquired by Blackberry). Christy has also held a variety of technology leadership roles at Citigroup, Motorola, Apple, Palm, and Sun Microsystems. She currently serves on the board of directors of LM Ericsson and Silicon Labs, and has previously served on the boards of Quotient Technologies, Good Technology, Dtex, Centrify, and the Linux Foundation.&lt;\\\/p&gt;\\n&lt;p&gt;Christy was recently recognized as CEO of the Year by Globe and Mail. She has also been awarded one of the Top 50 Women Leaders in SaaS in 2019, and has been named one of Inc. Magazine\\u2019s Top 50 Women Entrepreneurs of America, Information Security\\u2019s CEO of the Year, and a Fierce Wireless \\u201cMost Influential Women in Wireless.\\u201d&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 19, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-264-deep-dive-christy-wyatt-cyber-resilience-in-todays-threat-environment&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1764010\\\/c1e-vzj8a95gqxswz1vx-9247n86wcq2p-omp0at.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;43:53&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1718812840,&quot;key&quot;:&quot;41e936c47bce2231fb2c048200c4af66&quot;},&quot;ppe-4514-138&quot;:{&quot;title&quot;:&quot;Episode 263 Deep Dive: Naran McClung | The Benefits of In-House SOCs vs Outsourcing&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Naran McClung, Head of Azure, Macquarie Cloud Services from Macquarie Technology Group, as he shares invaluable insights into the world of Security Operations Centers (SOCs). Naran discusses the pros and cons of in house SOCs versus outsourcing, shedding light on the expectations businesses have for outsourced SOC services and the challenges of maintaining an in-house SOC. He emphasizes the importance of efficiency in building runbooks, standing up SOC operations, and the significance of minimal downtime. Stay tuned as Naran McClung provides a wealth of knowledge on managing 24\\\/7 operations, structuring SLAs, and much more. So, let\\u2019s jump right into this fascinating discussion on SOC operations, security posture, and the evolving landscape of cybersecurity.&lt;\\\/p&gt;\\n&lt;p&gt;Naran McClung is an experienced IT professional and business leader, with an international career spanning over 20 years. He has defined and led significant technology transformation programmes within Finance and Media verticals, and has executed strategic engagements throughout the UK, Europe and the US.&lt;\\\/p&gt;\\n&lt;p&gt;Naran McClung runs the Azure business for Macquarie Cloud Services (MCS). The business was incepted in 2019 and publicly launched February of 2020 to coincide with the inking of a unique and strategic agreement with Microsoft.&lt;\\\/p&gt;\\n&lt;p&gt;MCS has consciously chosen to only work with the Azure Cloud Platform, believing in strength in depth and a truly committed Partnership with Microsoft. MCS is now the fastest growing Azure Managed Services business in Australia, and the only Azure Expert MSP to also be a Microsoft Intelligent Security Association (MISA) member.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 14, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-263-deep-dive-naran-mcclung-the-benefits-of-in-house-socs-vs-outsourcing&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1762166\\\/c1e-z9w7fm343vfokrw5-p8dpjomph5mj-xynmuz.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;38:25&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1718380852,&quot;key&quot;:&quot;9909d503de4462342e51e01006f8adbe&quot;},&quot;ppe-4514-139&quot;:{&quot;title&quot;:&quot;Episode 262 Deep Dive: Chris Hockings | IBM\\u2019s latest X-Force Data Reveals Top Spam Trends, Campaigns, and Cyber Weapons of Choice in 2023&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sit down with Chris Hockings, CTO Security Asia Pacific, from IBM as he discusses IBM\\u2019s X-Force Threat Intelligence Index 2024. Chris delves into the shifting tactics of ransomware groups, the need for quick innovation in response to cyber threats, and the importance of mitigating vulnerabilities in critical infrastructure. We also discuss the rising use of valid accounts by cybercriminals, the challenges of implementing advanced detection and response mechanisms at scale, and the fundamental building blocks of cybersecurity. Join us as we uncover key insights from IBM\\u2019s X-Force Threat Intelligence Index 2024 and gain valuable knowledge on cybersecurity trends and strategies to address today\\u2019s biggest security challenges.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;em&gt;Chris Hockings is the CTO for IBM Security Asia Pacific.\\u00a0 He represents the IBM global security strategy and vision across the region and in doing so engages with leaders across government, industry, and partnerships. Chris has been a leader across all facets of software, including global research and development, support, service, and market engagement.&lt;\\\/em&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Read the &lt;a href=\\&quot;https:\\\/\\\/www.ibm.com\\\/reports\\\/threat-intelligence\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;IBM Security X-Force Threat Intelligence Index 2024&lt;\\\/a&gt;.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 12, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-262-deep-dive-chris-hockings-ibms-latest-x-force-data-reveals-top-spam-trends-campaigns-and-cyber-weapons-of-choice-in-2023&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1760038\\\/c1e-901kfn22rzfdv65n-mq8do58ju2j-9c9pwb.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;36:01&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1718208054,&quot;key&quot;:&quot;266b20ea834583e149391f6823251edd&quot;},&quot;ppe-4514-140&quot;:{&quot;title&quot;:&quot;Episode 261 Deep Dive: Thomas Fikentscher | The Executive Leadership\\u2019s (C-Suite) Role in Staying Informed and Ensuring the Right Investment is in place to comply with the Critical Infrastructure Risk Management Program (CIRMP) requirements&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we\\u2019re joined by Thomas Fikentscher, Area Vice President ANZ from CyberArk, as we delve into the critical topic of effective communication in the context of government concerns and cybersecurity risks for businesses. With a focus on the evolving landscape of legislation and compliance, Thomas shares invaluable insights on the proactive strategies, challenges, and collaboration needed for organizations to navigate and implement robust security architectures and risk management programs. Join us as we explore the complexities, uncertainties, and promising developments in this crucial area of business operations.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;Thomas Fikentscher is responsible for driving strong customer and partner engagement and expanding CyberArk\\u2019s emerging cloud business in the region.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;Prior to joining CyberArk, Thomas was Chief Revenue Officer at JXT Global, and has more than 20 years\\u2019 experience in the IT industry, including significant stints at Oracle, Ingram Micro and Sun Microsystems. His extensive industry and leadership experience \\u2013 particularly in the cloud domain \\u2013 has been invaluable to CyberArk, helping grow demand for Identity Security solutions.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;When it comes to cybersecurity, Thomas sees a significant opportunity to bridge the gap between technology jargon and business language. A big part of this is helping company leaders understand the importance of identity security to organisational risk management.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 7, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-261-deep-dive-thomas-fikentscher-the-executive-leaderships-c-suite-role-in-staying-informed-and-ensuring-the-right-investment-is-in-place-to-comply-with-the-critical-infrastructure-risk&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1757797\\\/c1e-pjr0h5w06damo9x2-60kgqvg0c3xm-n7w4y6.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;33:44&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1717776033,&quot;key&quot;:&quot;3d452c7fd0172d3254f025f77849c80d&quot;},&quot;ppe-4514-141&quot;:{&quot;title&quot;:&quot;Episode 260 Deep Dive: Christina Arcane | Guiding Your Cyber Champions with Cyber Risk Education&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, Christina Arcane, Director from Inspire Cyber, sits down with us to discuss the crucial topic of cybersecurity awareness and training. She discusses the importance of aligning training with an organization\\u2019s brand and culture, distinguishing between cyber risk and awareness, and the challenges in effectively engaging employees in training. The conversation covers a wide range of issues, such as the need for comprehensive, personalized training, the impact of poorly executed online modules, and the critical role of engaging and effective delivery in cybersecurity training. Tune in to gain valuable insights into cybersecurity training strategies and the importance of driving behavioral change across organizations.&lt;\\\/p&gt;\\n&lt;p&gt;For her entire cyber security career Christina has been translating cyber security concepts and providing high quality awareness and training to all roles \\u2013 from the company graduates right up to the board.&lt;\\\/p&gt;\\n&lt;p&gt;With a wide range of experiences across financial services and technology industries, working with startups, SMB\\u2019s and large multinational organisations, Christina has built a career on the intersection of cyber threats, risk and business objectives. In 2016 she co-founded cyber security SaaS startup &lt;em&gt;BreachAware&lt;\\\/em&gt;, leading its operations right through to acquisition in 2020. Recently she dived back into the world of entrepreneurship to reimagine security awareness offerings and provide her expertise through her new company, Inspire Cyber.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 5, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-260-deep-dive-christina-arcane-guiding-your-cyber-champions-with-cyber-risk-education&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1756796\\\/c1e-d5v7a6or0qcpd4g2-60kmvv5qsnww-4xxzsu.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;46:26&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1717603225,&quot;key&quot;:&quot;ce52526cb089931483290f585baeea6c&quot;},&quot;ppe-4514-142&quot;:{&quot;title&quot;:&quot;Episode 259 Deep Dive: Dima Postnikov | Why Digital ID is Changing How We Think About Fraud Prevention and Defence&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sat down with Dima Postnikov (Head of Identity Strategy and Architecture \\u2013 ConnectID) as we explore the challenges and potential of digital identity technologies in Australia. From fraud prevention to data privacy, Dima discusses the complexities and opportunities in the evolving landscape of digital identities, shedding light on the importance of trust, security, and consumer education.&lt;\\\/p&gt;\\n&lt;p&gt;Dima is an identity industry leader 20+ years of experience who is influential in the advancement of digital identity ecosystems globally.&lt;\\\/p&gt;\\n&lt;p&gt;Dima has a passion for digital identity, open banking and trust ecosystem design, having spent the last 10+ years focused on architecture, design and implementation of the technology platforms that underpin online systems of Commonwealth Bank of Australia (CBA), Westpac and Australian Securities Exchange (ASX).&lt;\\\/p&gt;\\n&lt;p&gt;Dima has significant technical experience in developing customer identity solutions in the areas of identity proofing, authentication, authorisation, application and API security, Digital identity, Open Banking.&lt;\\\/p&gt;\\n&lt;p&gt;As an active member of standard and industry organisations globally, Dima has been heavily involved with OpenID Foundation, IDPro, Trust Over IP, FIDO, Kantara and Open Wallet Foundation and ISO.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 31, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-259-deep-dive-dima-postnikov-why-digital-id-is-changing-how-we-think-about-fraud-prevention-and-defence&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1752282\\\/c1e-x8jpim9z8zsn7wz4-924xg1pjad8n-p0rgvy.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;35:38&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1717171238,&quot;key&quot;:&quot;e8be6b6e443a595a110603cd2b61680f&quot;},&quot;ppe-4514-143&quot;:{&quot;title&quot;:&quot;Episode 258 Deep Dive: Aaron Bugal | Addressing Cybersecurity Burnout&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we\\u2019re joined by Aaron Bugal (Field Chief Technology Officer \\u2013 APJ for Sophos) as he delves into the crucial yet often overlooked topic of burnout in the cybersecurity industry. We\\u00a0 explore how burnout and apathy can contribute to major breaches, stressing the need for organizations to support their cybersecurity professionals effectively. From the impact of the pandemic to the prevalence of lip service in the industry, Aaron shares insights on improving mental health support, fostering a positive cybersecurity culture, and the significance of addressing burnout for a more resilient defense against cyber threats.&lt;\\\/p&gt;\\n&lt;p&gt;With close to 18 years experience at Sophos, and over 20 years in the cybersecurity industry, Aaron Bugal has spent his time helping organisations throughout Asia Pacific and Japan effectively understand and deploy strong cybersecurity measures to keep their business safe.&lt;\\\/p&gt;\\n&lt;p&gt;As Field Chief Technology Officer for APJ, he is able to flawlessly articulate to business leaders, partners, and companies the ever evolving cybersecurity landscape and emerging cyber threats.&lt;\\\/p&gt;\\n&lt;p&gt;His humorous demeanour and witty analogies has shined in discussions with a range of media, conferences, and events, where he provides practical insights for both business and consumers audiences to take on board.&lt;\\\/p&gt;\\n&lt;p&gt;Read the report &lt;a href=\\&quot;https:\\\/\\\/www.sophos.com\\\/en-us\\\/whitepaper\\\/the-future-of-cybersecurity-in-apj-edition\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;here&lt;\\\/a&gt;.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 24, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-258-deep-dive-aaron-bugal-addressing-cybersecurity-burnout&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1748597\\\/c1e-rdnmsjwk3ju2kwq0-zo5mgkoocgmj-muc9tq.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:30&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1716566401,&quot;key&quot;:&quot;7502742b4993120eddbbfcd1b41ffca9&quot;},&quot;ppe-4514-144&quot;:{&quot;title&quot;:&quot;Episode 257 Deep Dive: Min Livanidis | Shaping Responsible AI Policy&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we sat down with Min Livanidis \\u2013 Head of Digital Trust, Cyber, and Data Policy, AWS ANZ, as she provides insights into the intersection of AI, cybersecurity, and public policy, emphasizing their impact on society. From Australia\\u2019s cybersecurity strategy to responsible AI policies, we explore the collaborative nature of policy development, the role of diverse perspectives, and the potential for individuals to influence change.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;Min Livanidis leads AWS public policy across some of Australia\\u2019s most pressing technology areas, including cybersecurity, artificial intelligence, and critical infrastructure. Min lead AWS\\u2019s collaboration with the government during the development of the 2023-2030 Cybersecurity Strategy. She is currently leading AWS\\u2019s engagement around safe and responsible AI in Australia, working closely with Minister Ed Husic and industry to develop best practice regulation frameworks. In 2023 she appeared at the Senate Inquiry for the use of Generative AI in the Australia Education Sector. Min regularly engages with the most senior level of government on key policy areas including AI, cybersecurity, privacy, data and digitization strategy, electronic surveillance, critical and emerging technology, and critical infrastructure.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;Outside AWS, she is Non-Executive Director of the Oceania Cyber Security Centre, a registered charity developed in partnership with the eight Victorian universities, the Victorian Government, and Oxford University to deliver cyber maturity assessments for Pacific Island nations; Non-Executive Director of the Australian Cyber Collaboration Centre, established by the South Australian Government with a focus on domestic cyber capacity building and home to key partnerships with the MITRE Corporation and NATO; and an Industry Professor with the School of Information Technology at Deakin University, affiliated with the Centre for Cyber Resilience and Trust (CREST).&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 22, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-257-deep-dive-min-livanidis-shaping-responsible-ai-policy&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1745607\\\/c1e-7km5b499x6ad6vxn-1xnq9dqws8qz-wlv4je.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;44:23&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1716393642,&quot;key&quot;:&quot;8bb6add2cc97fc5035cc3a5a92582511&quot;},&quot;ppe-4514-145&quot;:{&quot;title&quot;:&quot;Episode 256 Deep Dive: Andre Durand | Verify More, Trust Less&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Andre Durand, CEO and founder of Ping Identity, as we explore the need to shift from \\u201ctrust\\u201d to \\u201cverify\\u201d in today\\u2019s interconnected digital world. Andre dives into the complexities and challenges of this shift, discussing the implications for security, user experience, and the ongoing battle against fraud. From balancing security with user convenience to the importance of quantifying security investments, this episode provides valuable insights into the evolving landscape of digital verification.&lt;\\\/p&gt;\\n&lt;p&gt;Founded in 2002, Ping Identity has become a leading provider of enterprise identity security, serving more than half of the Fortune 100 and protecting\\u00a0more than\\u00a03 billion identities worldwide.\\u00a0In 2016, Ping Identity was acquired by Vista Equity Partners and in 2019, became the first Vista company to IPO on the New York Stock Exchange, trading under the symbol PING. In 2022, Thoma Bravo acquired PING and took the company private for US$2.8B.\\u00a0Prior to Ping Identity, Durand\\u00a0founded Jabber to commercialise the Jabber open source instant messaging platform which was acquired by Cisco in 2008.&lt;\\\/p&gt;\\n&lt;p&gt;Durand serves on the board of Jamf (NASDAQ: JAMF) and in his spare time focuses on causes related to children in the foster care system, building great culture and creating opportunities for entrepreneurs. Durand holds a BA in Biology and Economics from the University of California at Santa Barbara and lives in Denver, Colorado, with his wife Kim and two daughters.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 15, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-256-deep-dive-andre-durand-verify-more-trust-less&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1741949\\\/c1e-d5v7a6mw66bpd4g2-k5m39oonu701-vhve7c.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;41:22&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1715788803,&quot;key&quot;:&quot;df9d20eacb6920906c52320fa1455e0b&quot;},&quot;ppe-4514-146&quot;:{&quot;title&quot;:&quot;Episode 255 Deep Dive: Jason Baden | Simplifying API Security: The Impact and Evolution of Secure Application Development&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we\\u2019re joined by Jason Baden (Regional Vice President \\u2013 F5) as he shares his insights on the evolving landscape of cybersecurity,\\u00a0 simplifying API security, and the critical need for education around security spending. Jason also discusses the challenges and opportunities in API security, the impact of security spending on businesses, and the growing collaboration between developers and security professionals.&lt;\\\/p&gt;\\n&lt;p&gt;Jason has almost 20 years\\u2019 experience as a senior executive in the IT and telecommunications industry. Prior to joining F5, he was Country Manager at Ruckus Networks and was responsible for leading the ANZ team strategy, as well as the smooth integration of ARRIS following its acquisition of Ruckus Networks. He has also previously held roles at Juniper Networks, AXS-One, Airwide Solutions, and Optus.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 8, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-255-deep-dive-jason-baden-simplifying-api-security-the-impact-and-evolution-of-secure-application-development&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1736351\\\/c1e-901kfnnrpkbdv65n-p8dkkkg2c5k5-ff6vjs.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;35:53&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1715184026,&quot;key&quot;:&quot;074aa2c3d62559318821365300430ad2&quot;},&quot;ppe-4514-147&quot;:{&quot;title&quot;:&quot;KB On The Go: Insights from the AWS Summit Sydney&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this bonus episode, KB is on the go at the 2024 AWS Summit Sydney where she sits down for a quickfire interview with AWS experts Min Livanidis (Head of Digital Trust, Cyber, and Data Policy) and Phil Rodrigues (Global Head of Customer Security Outcomes, Global Services Security) to get their insights on hot topics in the media and cyber space.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 6, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/kb-on-the-go-insights-from-the-aws-summit-sydney&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1735351\\\/c1e-pjr0h55qgwamo9x2-7nqzk9v3izr6-wni8ht.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;27:33&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1715011200,&quot;key&quot;:&quot;3585be19bae90d55b41504ac02a439ff&quot;},&quot;ppe-4514-148&quot;:{&quot;title&quot;:&quot;Episode 254 Deep Dive: Bob Huber | Deep Fakes and Election Interference: Tackling the Threat of Manipulated Content&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we\\u2019re joined by Bob Huber (Chief Security Officer and Head of Research \\u2013 Tenable) as he delves into the pressing issue of misinformation on social media. From the impact on critical situations like elections and natural disasters to the proliferation of deepfake technology, we explored the difficulty of discerning authentic content. Bob shared insights on the challenges of identifying and combating misinformation, emphasizing the need for international norms and proactive measures.&lt;\\\/p&gt;\\n&lt;p&gt;Robert Huber, Tenable\\u2019s chief security officer, head of research and president of Tenable Public Sector, LLC, oversees the company\\u2019s global security and research teams, working cross-functionally to reduce risk to the organization, its customers and the broader industry. He has more than 25 years of cyber security experience across the financial, defense, critical infrastructure and technology sectors. Prior to joining Tenable, Robert was a chief security and strategy officer at Eastwind Networks. He was previously co-founder and president of Critical Intelligence, an OT threat intelligence and solutions provider, which cyber threat intelligence leader iSIGHT Partners acquired in 2015. He also served as a member of the Lockheed Martin CIRT, an OT security researcher at Idaho National Laboratory and was a chief security architect for JP Morgan Chase. Robert is a board member and advisor to several security startups and served in the U.S. Air Force and Air National Guard for more than 22 years. Before retiring in 2021, he provided offensive and defensive cyber capabilities supporting the National Security Agency (NSA), United States Cyber Command and state missions.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 3, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-254-deep-dive-bob-huber-deep-fakes-and-election-interference-tackling-the-threat-of-manipulated-content&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1732814\\\/c1e-o39rfvvnnot8n0xg-33z3x5kxipd-mo7esc.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;42:06&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1714752022,&quot;key&quot;:&quot;5bd5c4bbbd50f0dc78074ede9ef0c3f5&quot;},&quot;ppe-4514-149&quot;:{&quot;title&quot;:&quot;Episode 253 Deep Dive: Mike Hanley | The Role of AI in Addressing Software Security Challenges&quot;,&quot;description&quot;:&quot;&lt;div&gt;\\n&lt;p class=\\&quot;f4-mktg col-6-max\\&quot;&gt;Mike Hanley is the Chief Security Officer and SVP of Engineering at GitHub. Prior to GitHub, Mike was the Vice President of Security at Duo Security, where he built and led the security research, development, and operations functions. After Duo\\u2019s acquisition by Cisco for $2.35 billion in 2018, Mike led the transformation of Cisco\\u2019s cloud security framework and later served as CISO for the company. Mike also spent several years at CERT\\\/CC as a Senior Member of the Technical Staff and security researcher focused on applied R&amp;D programs for the US Department of Defense and the Intelligence Community. When he\\u2019s not talking about security at GitHub, Mike can be found enjoying Ann Arbor, MI with his wife and eight kids.&lt;\\\/p&gt;\\n&lt;\\\/div&gt;\\n&lt;div&gt;&lt;\\\/div&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 5, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-253-deep-dive-mike-hanley-the-role-of-ai-in-addressing-software-security-challenges&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1712733\\\/c1e-jjvwhq1djdun1k2x-1xn2qxdpi96v-og2bqx.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:26&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1712335041,&quot;key&quot;:&quot;e5a9f6a672b62e6ead8ebeb9d73950a0&quot;},&quot;ppe-4514-150&quot;:{&quot;title&quot;:&quot;Episode 252 Deep Dive: Mario Duarte | Navigating Cloud Complexity: The Evolution of Infrastructure&quot;,&quot;description&quot;:&quot;&lt;p&gt;Mario has 20 years of experience as a security professional working across the retail, healthcare, and financial sectors. He has built and managed security teams, developed and implemented security programs, and managed PCI and HIPAA compliance initiatives for medium and large organizations. He also currently serves as both an advisor and investor at Silicon Valley CISO Investments (SVCI) and SYN Ventures.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 29, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-252-deep-dive-mario-duarte-navigating-cloud-complexity-the-evolution-of-infrastructure&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1705688\\\/c1e-7km5b42m9rhd6vxn-nj997gw2bdwk-bj5ofh.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;39:54&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1711728026,&quot;key&quot;:&quot;b0155c5b383399b1492ba3d2179e936e&quot;},&quot;ppe-4514-151&quot;:{&quot;title&quot;:&quot;Episode 251 Deep Dive: Mandy Andress | Charting the Path of AI Innovation and Security&quot;,&quot;description&quot;:&quot;&lt;p&gt;Mandy\\u00a0Andress\\u00a0is currently the CISO of Elastic and has a long career focused on information risk and security. Prior to Elastic, Mandy led the information security function at MassMutual and established and built information security programs at TiVo, Evant, and Privada. She worked as a security consultant with Ernst &amp; Young and Deloitte &amp; Touche, focusing on energy, financial services, and Internet technology clients with global operations. She also founded an information security consulting company with clients ranging from Fortune 100 companies to start up organizations.&lt;\\\/p&gt;\\n&lt;p&gt;She is a published author, with her book Surviving Security having two editions and used at multiple universities around the world as the textbook for foundation information security courses. Mandy also tested and reviewed information security products for multiple publications as well as serving as the author for the weekly InfoWorld security column. She has been a sought-after expert in the field, speaking at signature security conferences such as BlackHat and Networld+Interop. In addition, she has taught a graduate level Information Risk Management course for UMass Amherst in the College of Information and Computer Sciences.&lt;\\\/p&gt;\\n&lt;p&gt;Mandy has a JD from Western New England University, a Master\\u2019s in Management Information Systems from Texas A&amp;M University, and a B.B.A in Accounting from Texas A&amp;M University. Mandy is a CISSP, CPA, and member of the Texas Bar.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 27, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-251-deep-dive-mandy-andress-charting-the-path-of-ai-innovation-and-security&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1705650\\\/c1e-n439h5123wh9z48n-v088mroqsjkd-4xhwvz.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;38:41&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1711571591,&quot;key&quot;:&quot;b120e486fc73ff8f1d1bde03cb3fc3b0&quot;},&quot;ppe-4514-152&quot;:{&quot;title&quot;:&quot;Episode 250 Deep Dive: Mark Anderson | Unveiling The Microsoft Digital Defence Report: Cybercrime Trends and Critical Cybersecurity Challenges&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Mark Anderson (National Security Officer \\u2013 Microsoft ANZ) as we discuss insights from the Microsoft Digital Defense Report, shedding light on the rise of cybercrime, the surge in sophisticated attacks, and the pressing need for enhanced cybersecurity capabilities across all business sizes.&lt;\\\/p&gt;\\n&lt;p&gt;From open source vulnerabilities to the significance of software bill of materials (SBOMs), this episode offers practical examples and advice on building robust cyber defenses. Join us as we navigate through the complexities of cybersecurity, uncovering how technology intersects with societal and business issues, and exploring the compelling data shaping the future of cybersecurity.&lt;\\\/p&gt;\\n&lt;p&gt;Mark has over 28 years\\u2019 experience in the IT industry with 18 of those at Microsoft in various roles across the globe. As the National Security Officer for Microsoft Australia &amp; New Zealand, Mark is responsible for working with customers, partners, governments, and industry regulators to ensure that the Microsoft platforms are not only understood by policymakers but also adhere to their security, compliance and risk management requirements. In addition, Mark is accountable for the PROTECTED level assessment of Azure,&lt;br \\\/&gt;\\nOffice 365, and Dynamics. Mark holds a Master of Cyber Security degree with high distinction from Edith Cowan University and is a Visiting Associate Professor at Macquarie University&lt;\\\/p&gt;\\n&lt;p&gt;Take a look at the MDDR Report &lt;a href=\\&quot;https:\\\/\\\/kbi.media\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/MDDR_FINAL_2023_1004.pdf\\&quot;&gt;here&lt;\\\/a&gt;.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 22, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-250-deep-dive-mark-anderson-unveiling-the-microsoft-digital-defence-report-cybercrime-trends-and-critical-cybersecurity-challenges&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1694304\\\/c1e-6wnpc2z3pghndopx-04mg0zw4ir5-yipac2.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;47:16&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1711123212,&quot;key&quot;:&quot;907d77d96d5b329c1faf5cfe0d16ea1c&quot;},&quot;ppe-4514-153&quot;:{&quot;title&quot;:&quot;Episode 249 Deep Dive: Chris Cochran | Resonating Stories: The Power of Creativity and Authenticity in Cybersecurity&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Chris Cochran (Co-Founder and Chief Creative Officer \\u2013 Hacker Valley Media), as we delve into the world of content creation in cybersecurity. We explore the power of authentic storytelling and creativity in content, and its potential to shape the cybersecurity industry.&lt;\\\/p&gt;\\n&lt;p&gt;Chris shares personal anecdotes, underlining the importance of diversity and inclusivity in this field, and advocates for a shift towards a more positive mindset.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Chris Cochran is Hacker Valley Media\\u2019s co-founder\\\/ Chief Creative Officer and the Advisory Chief Information Security Officer\\\/ Chief Evangelist for Huntress Labs. Chris also serves on the Board of Governors for the Podcast Academy. He is a cybersecurity leader turned award-winning content creator and speaker, earning two Anthem Awards and one Webby nomination. Chris started his career in technology during his active duty service in the US Marine Corps as an intelligence analyst at the National Security Agency.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;&lt;br \\\/&gt;\\n&lt;\\\/span&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Chris spent over a decade leading advanced cybersecurity and intelligence missions at organizations such as the US House of Representatives, US Cyber Command, Mandiant, Booz Allen Hamilton, United Technologies, and Netflix. His passion is finding and amplifying human stories in cybersecurity and technology to inspire and empower our community.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 20, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-249-deep-dive-chris-cochran-resonating-stories-the-power-of-creativity-and-authenticity-in-cybersecurity&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1692581\\\/c1e-5k0vbmzd5ms0xmv3-dd7wo3zzim0z-nwwogp.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;44:33&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1710950454,&quot;key&quot;:&quot;a09c1a0a3023de5f5471b3877be7981f&quot;},&quot;ppe-4514-154&quot;:{&quot;title&quot;:&quot;KB On The Go | Cybersecurity Challenges and Innovations: Expert Conversations from Cisco&quot;,&quot;description&quot;:&quot;&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 15, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/kb-on-the-go-cybersecurity-challenges-and-innovations-expert-conversations-from-cisco&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1688921\\\/c1e-901kfnwoqvs0kp47-5rv6462wcnr9-djaiti.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;44:03&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1710518450,&quot;key&quot;:&quot;963bdc0bea4b99e524a3ae5e8200db29&quot;},&quot;ppe-4514-155&quot;:{&quot;title&quot;:&quot;Episode 248 Deep Dive: Corien Vermaak | The Future of Cybersecurity: Expert Insights on Challenges and Opportunities Presented by A.I.&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Corien Vermaak\\u00a0 (Head of Cybersecurity \\u2013 Cisco ANZ) shares insights on the evolving role of AI in cybersecurity. From early threat detection to ethical considerations, we explore the potential and challenges of AI in safeguarding digital environments. Corien discusses how AI can proactively identify anomalies and augment human skills, enhancing security measures and response times. Join us as we delve into the integration of AI in cybersecurity and the impact on job roles, and a thought-provoking discussion on the ethical implications of AI decision-making.&lt;\\\/p&gt;\\n&lt;p&gt;Corien Vermaak started her career as a technology law specialist within the telecommunication space and soon fell in love with data privacy and the legal structures governing cybercrime. In her career,\\u00a0 Corien specialised in cybercrime legislation and data privacy while representing large multinationals on these matters.&lt;\\\/p&gt;\\n&lt;p&gt;She holds a master\\u2019s degree in law specialising in cybercrime and data privacy. She has been involved in the writing of legislation in this regard as well as consulting to Africa Union and Interpol on issues relating to cybercrimes and privacy.&lt;\\\/p&gt;\\n&lt;p&gt;Corien is a Qualified Digital Forensic Auditor, Lead ISO 27001 auditor and C|CISO. Corien has been a CISO Advisor for the Cisco Security Centre of Excellence in the Asia Pacific, Japan and China region where she has led market.&lt;\\\/p&gt;\\n&lt;p&gt;KB has previously interviewed Corien, but asked for a more in-depth interview. This is likely to be followed with an in-depth interview with Jeetu Patel, Global Exec for Cybersecurity at Cisco.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 13, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-248-deep-dive-corien-vermaak-the-future-of-cybersecurity-expert-insights-on-challenges-and-opportunities-presented-by-a-i&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1682619\\\/c1e-901kfn3vnqidv65n-7n51o7q9a2q7-qssmcf.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;50:09&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1710345651,&quot;key&quot;:&quot;e52fb6c28fe05363df61c0f70ab881f7&quot;},&quot;ppe-4514-156&quot;:{&quot;title&quot;:&quot;Episode 247 Deep Dive: Alex Trafton | Strategic Partnerships and Cybersecurity Compliance for Global Defense and Trade Relations&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by with Alex Trafton (Managing Director of National Security, Trade, &amp; Technology \\u2013 Ankura) to unravel the complex dynamics of cybersecurity, government regulations, and the landscape of defense and technology at a global scale. We explore the challenges and opportunities for small companies, the impact of strategic cooperation between democratic nations, and the crucial role of integrity and innovation in the industry. Join us for a candid conversation that sheds light on the future of cybersecurity and the call for collaboration between nations.&lt;\\\/p&gt;\\n&lt;p class=\\&quot;IntroductionTest\\&quot;&gt;Alex Trafton is a Managing Director in the National Security, Trade, &amp; Technology practice at Ankura Consulting Group, based in Los Angeles, CA, USA. He has over 15 years of experience in finance, risk management, and cybersecurity. Alex leads the NSTT cybersecurity function and serves as a subject matter expert in cybersecurity program design, implementation, and assessment with a focus in foreign investment control and oversight (CFIUS), Defense Industrial Base (DIB) cybersecurity requirements, and international trade control compliance program support (ITAR\\\/EAR). Alex is focused on working with multi-national defense contractors to help them meet cybersecurity and export control requirements before, during, and after mergers and acquisitions.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 6, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-247-deep-dive-alex-trafton-strategic-partnerships-and-cybersecurity-compliance-for-global-defense-and-trade-relations&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1681049\\\/c1e-6wnpc25dj0sndopx-k5xzw93du03x-ggqnfl.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;47:54&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1709740857,&quot;key&quot;:&quot;b6f869d69d86ce81c976e24da074ce94&quot;},&quot;ppe-4514-157&quot;:{&quot;title&quot;:&quot;Episode 246 Deep Dive: David Batch | Demystifying Privacy by Design, Understanding Its Challenges, and Identifying Solutions&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by David Batch (Executive Director, Privacy Advisory \\u2013 CyberCX) as we delve into the principles of Privacy by Design and the need for organizations to prioritise privacy as a pillar of trust. From data retention challenges to the impact of data erasure on regulated industries, we navigate through the complexities of privacy management. Join us as we explore the potential catalysts for change, the role of regulatory frameworks, and the innovative solutions for empowering individuals to take control of their privacy.&lt;\\\/p&gt;\\n&lt;p&gt;David leads the Privacy Advisory Practice at CyberCX and brings to the role over 25 years of government and industry experience.\\u202f Prior to entering the consulting sector, David was responsible for privacy risk management at State Street Corporation across APAC, built and led the CBA\\u2019s first dedicated privacy team, led the privacy function at NEHTA (now the ADHA) and was the online safety, security and privacy lead for\\u00a0&lt;a title=\\&quot;smartCard-inline\\&quot; href=\\&quot;https:\\\/\\\/myspace.com\\\/\\&quot; target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;https:\\\/\\\/MySpace.com&lt;\\\/a&gt;\\u00a0in Australia\\\/NZ. Prior to his privacy focused roles, David was a Federal Agent with the Australian Federal Police and held a number of investigative, legal policy and training roles during his 9 year tenure with the agency.\\u200b&lt;\\\/p&gt;\\n&lt;p&gt;In addition to these roles, David was the creator of the annual consumer and organisation privacy research, the Deloitte Australian Privacy Index and its principal author for four editions. David also launched the annual &lt;a href=\\&quot;https:\\\/\\\/cybercx.com.au\\\/privacybydesignawards\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Australian Privacy by Design Research and Awards&lt;\\\/a&gt; in 2022, for which he and the team were awarded by the Australian Information Security Association as \\u2018Cybersecurity Researcher of the Year\\u2019 in 2022.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 1, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-246-deep-dive-david-batch-demystifying-privacy-by-design-understanding-its-challenges-and-identifying-solutions&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1677537\\\/c1e-jjvwhqm877in1k2x-60pj6gpqc57r-hxkik4.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;46:23&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1709308831,&quot;key&quot;:&quot;89c44f72f82a033b87280fe59232fa52&quot;},&quot;ppe-4514-158&quot;:{&quot;title&quot;:&quot;Episode 245 Deep Dive: Dali Kaafar | Distracting Scammers: Leveraging AI to Protect Against Unwanted and Malicious Calls&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Prof. Dali Kaafar (Executive Director \\u2013\\u00a0 Macquarie University Cyber Security Hub, CEO and Founder of\\u00a0&lt;a href=\\&quot;https:\\\/\\\/apate.ai\\\/\\&quot; target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;APATE.AI&lt;\\\/a&gt;) as he discusses the innovative use of conversational AI in combating phone scams. From the manipulation and trust-building tactics employed by scammers to the pressing need for proactive defense measures, Dali sheds light on disrupting scammers\\u2019 profits and protecting potential victims. This captivating conversation explores the intersection of technology, psychology, and security, offering valuable perspectives on safeguarding against phone scams in today\\u2019s digital landscape.&lt;\\\/p&gt;\\n&lt;p&gt;Dali Kaafar is a Professor at the Faculty of Science and Engineering and serves as the Executive Director of [The Macquarie University Cyber Security Hub]. In addition to his role as the director of the Data Security and Privacy R&amp;D Program, he oversees the Cyber Range Training Centre (CRTC) and Cyber Security Curriculum at the Institute of Applied Technology-Digital.&lt;\\\/p&gt;\\n&lt;p&gt;Leading a team of collaborators, Professor Kaafar is actively engaged in extensive Research and Development activities within the field of Cyber Security in Emerging Technologies, with a vision to enable Explicit Trust in the Digital Economy. His primary research interests revolve around Data Security and Privacy, specifically focusing on Privacy-Preserving (or Enhancing) technologies, Information Security for Web and Mobile applications, (Provably) private data sharing, and Trustworthy Secure and Private Machine learning techniques.&lt;\\\/p&gt;\\n&lt;p&gt;Before joining Macquarie University, Professor Kaafar served as the group leader and founder of the Information Security and Privacy group at CSIRO Data61. He was previously a principal researcher at National ICT Australia (NICTA) and held a permanent researcher position at the Privatics team at INRIA in France.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 28, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-245-deep-dive-dali-kaafar-distracting-scammers-leveraging-ai-to-protect-against-unwanted-and-malicious-calls&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1673265\\\/c1e-q40nh2no5kh0v2x1-mq36zj85inmo-qydkvf.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:58&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1709136052,&quot;key&quot;:&quot;dab165b237b8b086a3bf22d6ac3c941c&quot;},&quot;ppe-4514-159&quot;:{&quot;title&quot;:&quot;Episode 244 Deep Dive: Mark McClain | Enhancing Security Resilience: Identity as the Key Accelerant for Business Success&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Mark McClain (CEO and Founder of SailPoint), as we dive deep into the pivotal role of identity as a fundamental control point and lens for understanding security in organizations. Mark emphasises that while traditional security measures such as firewalls and network security remain vital, identity security is equally critical for protecting data and driving business momentum. Moreover, the conversation delves into the challenges of balancing convenience and security, particularly with the rise of AI and machine learning in security measures. Mark highlights the limitations of current security tools in being \\u201cidentity blind,\\u201d stressing the need for better tooling and processes to identify and respond to security threats more efficiently.&lt;\\\/p&gt;\\n&lt;p&gt;In his role as CEO and Founder of SailPoint, Mark brings almost 35 years of experience in technology, with over 20 years as a founder and leader of innovative identity management companies. Under Mark\\u2019s direction, the company has grown into a publicly recognized leader in its market. Mark directs and drives the overall vision and strategy for SailPoint, which is underpinned by his commitment and passion for building top-performing teams, creating a collaborative and innovative work environment, and focusing continuously on the needs of customers.&lt;\\\/p&gt;\\n&lt;p&gt;Teaming is a concept that Mark promotes throughout the company: teaming with forward-thinking customers to understand their needs, with partners to ensure customer success, and ultimately within SailPoint to develop innovative, market-leading solutions. Mark is passionate about maintaining the spirit of teamwork, even as SailPoint grows its employee base and its global presence to offices around the world.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to SailPoint, he co-founded Waveset Technologies, which was ultimately acquired by Sun Microsystems. Mark\\u2019s career also includes diverse experience in international sales and marketing with Hewlett-Packard and IBM\\\/Tivoli Systems.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 21, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-244-deep-dive-mark-mcclain-enhancing-security-resilience-identity-as-the-key-accelerant-for-business-success&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1666460\\\/c1e-rdnmsjp7m5h2kwq0-qxn7gjgkbvn1-z8slxi.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:34&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1708531201,&quot;key&quot;:&quot;777136da7ad9862e132abc564c2cb0bf&quot;},&quot;ppe-4514-160&quot;:{&quot;title&quot;:&quot;Episode 243 Deep Dive: Dean Houari | Addressing Vulnerabilities and Data Exposure: Expert Insights on the Evolution of the API Attack Surface&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Dean Houari from Akamai, as we dive deep into the continuously evolving landscape of API security. The discussion delves into the growing concern of API attacks and the increasing recognition of the need for \\u201csecurity by design\\u201d at the board level. Dean shares insights on the shifting nature of application architecture, the vulnerabilities of APIs, and the impact of cloud-native and modern applications on security measures. The conversation emphasizes the need for a comprehensive approach to securing API attack surfaces and preparing for potential breaches. Tune in as Dean provides practical advice and expert perspectives on navigating the complexities of API security.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Dean Houari is the Director of Security Technology and Strategy for Akamai\\u2019s Asia-Pacific and Japan region. He is a patent awarded technologist with over two decades of experiences in various engineering and architecture leadership roles.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;\\u00a0&lt;\\\/span&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;At Akamai, Dean is responsible for product and go-to-market strategy for Akamai\\u2019s security portfolio, which includes both established and emerging areas in security. His work focuses on encouraging customers to a strategic view of their security programs, and articulating key security design principles that position customers for long-term success in their security strategy.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Prior to Akamai, Dean led the architecture and development of DevSecOps, cloud and cyber security initiatives and innovations. He holds an inventor patent with Cisco Systems, as well as certifications from CCIE, Terraform, and AWS. He is also an avid powerlifter who has lifted a personal best of 650kg.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Dean attended Carnegie Mellon University and is currently based in Tokyo, Japan.\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 16, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-243-deep-dive-dean-houari-addressing-vulnerabilities-and-data-exposure-expert-insights-on-the-evolution-of-the-api-attack-surface&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1662870\\\/c1e-wmjvurj353f0gmpv-498pxz4ns4od-uglzoo.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:20&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1708099202,&quot;key&quot;:&quot;88912567c28bd7597eb6c2c07252f703&quot;},&quot;ppe-4514-161&quot;:{&quot;title&quot;:&quot;Episode 242 Deep Dive: Nick Schneider | Unpacking Challenges: A Discussion on Legacy Approaches, Talent Shortage, Alert Fatigue, and Over-layered Security Systems&quot;,&quot;description&quot;:&quot;&lt;div class=\\&quot;elementor-element elementor-element-b1f3841 elementor-widget elementor-widget-text-editor\\&quot;&gt;\\n&lt;div class=\\&quot;elementor-widget-container\\&quot;&gt;\\n&lt;p&gt;In this episode, we are joined by Nick Schneider, as we explore the challenges organizations face in managing cybersecurity with multiple point solutions. Nick discusses the complexity of handling 30-50 different tools, and the necessity of integrating and aggregating telemetry and alerts onto a centralized platform. The episode delves into the evolution of cybersecurity, the use of AI, addressing talent shortages, and combating alert fatigue. Join us as we unravel the complexities of cybersecurity and the strategic approach needed to mitigate risks in a rapidly changing landscape.&lt;\\\/p&gt;\\n&lt;p&gt;As President and CEO of Arctic Wolf, Nick Schneider brings more than 15 years of experience in building global, high-growth technology companies spanning both emerging and established markets. As a veteran in the security industry, Nick has developed expertise in creating best-of-breed technology platforms and world-class sales organizations, which have been the driving force behind Arctic Wolf\\u2019s explosive growth and leadership position in the security operations market.&lt;\\\/p&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;div class=\\&quot;elementor-element elementor-element-2acd1b8 elementor-widget elementor-widget-text-editor\\&quot;&gt;\\n&lt;div class=\\&quot;elementor-widget-container\\&quot;&gt;\\n&lt;p&gt;Before being named CEO, Nick served as Arctic Wolf\\u2019s President and Chief Revenue Officer, where he helped lead the company to eight consecutive years of 100% sales growth, spearheaded the company\\u2019s international expansion, and oversaw Arctic Wolf\\u2019s transition to a 100% channel go-to-market model.&lt;\\\/p&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;div class=\\&quot;elementor-element elementor-element-f5e26ed elementor-widget elementor-widget-text-editor\\&quot;&gt;\\n&lt;div class=\\&quot;elementor-widget-container\\&quot;&gt;\\n&lt;p&gt;Prior to Arctic Wolf, Nick served as the Vice President of North American Sales for Code42, an industry-leading endpoint data protection company. Before Code42, Nick led high-performing sales teams at Compellent Technologies, where he helped the company grow to a successful IPO and eventual acquisition by Dell. Nick holds a Bachelor of Arts and Sciences degree from Duke University in public policy and economics.&lt;\\\/p&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 14, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-242-deep-dive-nick-schneider-unpacking-challenges-a-discussion-on-legacy-approaches-talent-shortage-alert-fatigue-and-over-layered-security-systems&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1661186\\\/c1e-n439h5m3m4s9z48n-mq3r5d2pf5m-ffaulu.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:05&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1707926426,&quot;key&quot;:&quot;d7ceff299885a9aaec2a41370d538e1a&quot;},&quot;ppe-4514-162&quot;:{&quot;title&quot;:&quot;Episode 241 Deep Dive: Mary Carmichael | Workplace Evolution: Addressing AI Skepticism, Embracing Advancements, and Navigating New Realities&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Mary Carmichael (Vice President \\u2013 ISACA Vancouver) as we dive deep into the Generative AI 2023: An ISACA Pulse Poll. Mary\\u00a0discusses addressing vulnerabilities and biases in AI, the societal impact on jobs and the need for upskilling, and the importance of responsible AI deployment and ethical considerations.&lt;\\\/p&gt;\\n&lt;p&gt;Mary Carmichael, CISA, CFE, CPA, is Director, Risk Advisory, at Momentum Technology (Vancouver Canada), and member of ISACA\\u2019s Emerging Trends Working Group and Risk Advisory Committee.&lt;\\\/p&gt;\\n&lt;p&gt;Read more about it:&lt;br \\\/&gt;\\n&lt;a href=\\&quot;https:\\\/\\\/www.isaca.org\\\/resources\\\/artificial-intelligence\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Gain a Clearer Understanding of AI&lt;\\\/a&gt;&lt;br \\\/&gt;\\n&lt;a href=\\&quot;https:\\\/\\\/www.isaca.org\\\/resources\\\/infographics\\\/generative-ai-2023-an-isaca-pulse-poll-infographic\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Generative AI 2023: An ISACA Pulse Poll infographic&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 9, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-241-deep-dive-mary-carmichael-workplace-evolution-addressing-ai-skepticism-embracing-advancements-and-navigating-new-realities&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1658071\\\/c1e-41r8cgpq28fopgxj-5rv0z2m1smkm-47ane1.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:20&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1707494436,&quot;key&quot;:&quot;2f0c8512e8879b8100f531222ec77cd2&quot;},&quot;ppe-4514-163&quot;:{&quot;title&quot;:&quot;Episode 240 Deep Dive: Cricket Liu | The Past, Present, and Future of DNS: Security Evolution, Collaboration, and Maximizing Infrastructure Efficiency&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Cricket Liu (EVP Engineering, Chief DNS Architect \\u2013 Infoblox) as we dive deep into the critical role of Domain Name System (DNS) security in closing the gap in today\\u2019s interconnected world. Cricket sheds light on the importance of protecting critical infrastructure and the significant role DNS plays in enhancing visibility and blocking threats. Brought about by his unexpected entry into the field of DNS, his extensive experience in the evolution of the internet from its nascent stages brings historical context to the dialogue, uncovering parallels between the apprehension surrounding generative AI technology and early sentiments toward the internet\\u2019s unknown prospects.&lt;\\\/p&gt;\\n&lt;p&gt;Cricket Liu is one of the world\\u2019s leading experts on the Domain Name System (DNS), and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an Internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \\u201cDNS and BIND,\\u201d one of the most widely used references in the field, now in its fifth edition.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 7, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-240-deep-dive-cricket-liu-the-past-present-and-future-of-dns-security-evolution-collaboration-and-maximizing-infrastructure-efficiency&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1656284\\\/c1e-02xms8pnv9bgm3kp-p80k19j1i0j-bnam5x.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;35:45&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1707321633,&quot;key&quot;:&quot;fbc9901785a58dab6b3ec04900eb7c30&quot;},&quot;ppe-4514-164&quot;:{&quot;title&quot;:&quot;Episode 239 Deep Dive: James Campbell | Cloud Security Complexity and the Role of Automation in Digital Forensics&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by James Campbell (CEO and Co-Founder of Cado Security) as we explore modern digital forensics and the complexity of the cloud. They discuss the transition from on-premise to cloud operations, the unique risks associated with ephemeral cloud infrastructure, and the growing need for automation in digital forensics to streamline routine tasks and enable security professionals to focus on advanced problem-solving. Join us as we unravel the intricacies of cloud security, automation in digital forensics, and the continuous learning and adaptation necessary to stay ahead in the rapidly evolving industry.&lt;\\\/p&gt;\\n&lt;p&gt;With over 15 years experience helping global organisations tackle sophisticated cyber espionage and criminal campaigns, James has a deep passion for cyber incident response, forensics and cyber crisis. Prior to founding Cado Security, Campbell served as a Director at PwC building the Cyber Incident Response service. Campbell\\u2019s background also includes a career in intelligence previously leading Australia\\u2019s National Incident Response capability as the Assistant Director of Operations at the Australian Signals Directorate. James is an active thought leader having spoken at various conferences including Blackhat, Cloudsec, Crestcon, and the Forensics Europe Expo.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 31, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-239-deep-dive-james-campbell-cloud-security-complexity-and-the-role-of-automation-in-digital-forensics&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1648896\\\/c1e-5k0vbkw13rh0xmv3-dd7d6965t15v-p8muba.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;36:22&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1706716827,&quot;key&quot;:&quot;1378b2a30ce8862d1fc40176f1684da9&quot;},&quot;ppe-4514-165&quot;:{&quot;title&quot;:&quot;Episode 238 Deep Dive: Alex Tilley | Building a Stronger Cyber Culture: Expert Advice on Collaboration and Ownership in Security&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Alex Tilley (Head of Threat Intelligence, Asia Pacific and Japan \\u2013 Secureworks) as we dive deep into the challenges that come with fostering a strong security culture within organizations. We explore the importance of cross-departmental collaboration, the need for clear and engaging cybersecurity training, and the emotional hurdles of dealing with security incidents.&lt;\\\/p&gt;\\n&lt;p&gt;Alex shares valuable insights in handling crises, addressing ego-driven conflicts, and the crucial role of the board in cyber. Join us as we unravel the intricate layers of today\\u2019s security culture and learn from his experiences and expertise.&lt;\\\/p&gt;\\n&lt;p&gt;With over 20 years of experience in computer security and cybercrime, Alex Tilley is a highly awarded cybercrime researcher. Beginning his career in the online casino industry on Australia\\u2019s Gold Coast, Alex went on to implement and administer many varieties of network security technologies within Australia\\u2019s banking industry. Alex was on the forefront of research and countermeasures when phishing and malware first began to attack banking platforms and customers. When he later became the Australian Federal Police\\u2019s senior cybercrime technical analyst, he combined his technical background with an analytical approach to discover \\u201cwho\\u201d the cybercriminals were, why they were attacking specific targets, and what they were looking for. This included identifying exposing online child predators as well as cybercriminals. \\u00a0During this time Alex become a key member of the operations team responsible for many high profile cases.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 24, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-238-deep-dive-alex-tilley-building-a-stronger-cyber-culture-expert-advice-on-collaboration-and-ownership-in-security&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1640598\\\/c1e-q40nh41wddi0v2wv-jkwq3m0mb7gp-4mbi6i.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;45:18&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1706112012,&quot;key&quot;:&quot;b53e07a047c86ed8900a00d338bd117f&quot;},&quot;ppe-4514-166&quot;:{&quot;title&quot;:&quot;Episode 237 Deep Dive: Rachael Greaves | From Compliance to Consequences: Safeguarding Records in Today\\u2019s Virtual Environment&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Rachael Greaves (CEO and Co-Founder at Castlepoint Systems) as she sheds light on the far-reaching consequences of records mismanagement and the integration of artificial intelligence (AI) in decision-making processes. The discussion delves into the ramifications of mishandling information, the advent of new privacy regulations, and the imperative need for efficient records governance in the age of evolving technology.&lt;\\\/p&gt;\\n&lt;p&gt;Rachael highlights the need for a new approach to managing information, acknowledging the challenges of audits and their impact on users and systems. She emphasised the potential of AI technology in managing information and its effects on regulators and businesses, particularly as noncompliance in audits and increased pressure from regulators due to cybersecurity and privacy concerns become prevalent.&lt;\\\/p&gt;\\n&lt;p&gt;Rachael Greaves is CEO and Co-Founder at Castlepoint Systems, and has consulted on large-scale records, security and audit projects in government and regulated industries with complex integrated environments. Rachael\\u2019s credentials include: Certified Information Systems Auditor (CISA), PRINCE2 (Practitioner), Certified Data Privacy Systems Engineer (CDPSE) ITIL v3 (Foundation), AIIM Certified Information Professional (CIP), and AIIM SharePoint Information Management Specialist. She is also an IIBA member.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 19, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-237-deep-dive-rachael-greaves-from-compliance-to-consequences-safeguarding-records-in-todays-virtual-environment&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1637569\\\/c1e-jjvwh29jwmtn1k71-92kqkwx0b3qx-km3xjz.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;41:08&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1705680056,&quot;key&quot;:&quot;2d2f98f438f21f97dc3b4e3e0290c888&quot;},&quot;ppe-4514-167&quot;:{&quot;title&quot;:&quot;Episode 236 Deep Dive: Jenai Marinkovic | AI Governance Unveiled: Managing Risks, Setting Policies, and Upholding Ethical Standards&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Jenai Marinkovic (Executive Director &amp; Chairman of the Board \\u2013 GRC for Intelligent ecosystems or GRCIE) as we discuss &lt;a href=\\&quot;https:\\\/\\\/www.isaca.org\\\/resources\\\/white-papers\\\/2023\\\/the-promise-and-peril-of-the-ai-revolution\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;ISACA\\u2019s White Paper \\u2013 The Promise and Peril of the AI Revolution: Managing Risk&lt;\\\/a&gt;. We discuss the risks, challenges, and societal impact of generative AI, while also touching on the urgent need for policies, frameworks, and control structures to address these evolving concerns. Jenai also talks about the crucial role of ethical standards in the deployment of AI, the implications of job displacement and skills adaptation, and the future of AI through the lens of governance, cybersecurity, and training.&lt;\\\/p&gt;\\n&lt;p&gt;Jenai Marinkovic is a multidisciplinary technologist and strategist with 20 years of experience in architecting, building and securing systems at scale. She has designed and operated in real-time over the top streaming ecosystems that power live sports, gaming, and entertainment. She\\u2019s also worked in biomedical manufacturing and laboratory diagnostics, healthcare tech and robotics in agriculture.&lt;\\\/p&gt;\\n&lt;p&gt;Jenai\\u2019s worked with artificial intelligence, its impact on diversity and inclusion as well as improving human empathy towards machines. She has expertise in designing the next generation security experiences necessary to support digital transformation She has built and run design, architecture, innovation, engineering, security and operations teams. Her security expertise spans security architecture, engineering, defense, and forensics and invented a cyber defense framework for large scale breaches based on American football. Jenai has worked for large enterprise brands including DIRECTV, Electronic Arts, Beckman Coulter and international investigations firms such as Kroll.&lt;\\\/p&gt;\\n&lt;p&gt;Now she serves as the Executive Director &amp; Chairman of the Board at GRC for Intelligent ecosystems or GRCIE (Pronounced Gracie).&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 10, 2024&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-236-deep-dive-jenai-marinkovic-ai-governance-unveiled-managing-risks-setting-policies-and-upholding-ethical-standards&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1630023\\\/c1e-x8jpipnnnoun7w97-1xg4w4p2ajdk-velktd.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:37&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1704902438,&quot;key&quot;:&quot;823a99da5aec14654813bd44448d7c09&quot;},&quot;ppe-4514-168&quot;:{&quot;title&quot;:&quot;Episode 235 Deep Dive: Dan Elliott | Understanding Cyber Risk Management: Strategies for Effective Communication&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Dan Elliott (Principal for Cyber Security Risk Consulting \\u2013 Zurich Resilience Solutions) as we delve into the critical topic of aligning cyber leaders with business objectives. We explore the challenges of communicating cyber risks effectively, dissect the need for a common language in cybersecurity, and discuss the evolving role of CISOs as business enablers. Join us as we tackle the intricacies of cyber risk management, the importance of understanding business goals, and the quest for a universal language in the cyber world.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;Dan Elliott is the Principal for Cyber Security Risk Consulting at Zurich Resilience Solutions (ZRS) Canada and is responsible for supporting ZRS\\u2019s clients in making risk-based cybersecurity decisions to improve their overall organizational resilience. Dan has over 15 years of experience in national security and risk management and brings a unique perspective to cyber risk, having spent six years as an Intelligence Officer with the Canadian Security Intelligence Service (CSIS). Prior to that, he spent nearly a decade in law enforcement and intelligence, investigating multinational criminal organisations both online and in person. He evaluates cyber risk with the knowledge of international threat actors and the potential impact they pose to businesses and critical infrastructure, helping organizations improve their overall risk posture.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;Dan is also trained in multiple cyber risk management frameworks and holds specialized expertise in stakeholder management and strategic program design. He speaks internationally about the communication challenges that exist between traditional technical professionals and business leaders. He is a regional board member of the Risk and Insurance Management Society (RIMS), a Risk Fellow (RF) and is a Certified Risk Management Professional (CRMP and CRM). Dan is a contributing member of the Cybersecurity Advisors Network (CyAN), a volunteer member with ISACA and is accredited as Certified in Risk and Information Systems Controls (CRISC).&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 20, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-235-deep-dive-dan-elliott-understanding-cyber-risk-management-strategies-for-effective-communication&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1618554\\\/c1e-kdkxs49zo6f941v4-ddqq4qxzu1x9-nkrwdk.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;41:05&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1703088018,&quot;key&quot;:&quot;ca3cb7db2d644c462e9c02243bc33dc0&quot;},&quot;ppe-4514-169&quot;:{&quot;title&quot;:&quot;Episode 234 Deep Dive: Tulin Sevgin | Tackling Third-Party Risk Management: Crucial Insights for Effective Due Diligence&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Tulin Sevgin (Director \\u2013 National Cyber Security Practice, MinterEllison) as we unravel the complexities and potential oversights in working with vendors. Tulin sheds light on the critical need for due diligence in the procurement process to mitigate future risks, emphasising the impact of vendor changes on data access and infrastructure. Tulin navigates the labyrinth of vendor risk governance and emphasizes the significance of ongoing monitoring. Join us as we delve into the intricacies of vendor assessments, the challenges involved, and the supply chain landscape.&lt;\\\/p&gt;\\n&lt;p&gt;Tulin Sevgin is a strategic thinker and cyber risk management specialist with experience in public and private sectors. Tulin has held senior positions with Commonwealth Bank, Westpac, Optiver and Deloitte.&lt;\\\/p&gt;\\n&lt;p&gt;Amongst Tulin\\u2019s career she has successfully started up and led a cybersecurity practice at a boutique consultancy and is now leading the TPRM team at UpGuard growing the CyberRisk product and services.&lt;\\\/p&gt;\\n&lt;p&gt;Tulin specializes in cyber risk management including TPRM, cyber risk threat analysis, prevention,&lt;br \\\/&gt;\\ncontrol and assurance. Tulin\\u2019s past working experience spans enterprise risk management, business&lt;br \\\/&gt;\\ncontinuity, risk culture analysis, project management, issues management, IT audit, data analytics,&lt;br \\\/&gt;\\ninternal audit and external audit.&lt;br \\\/&gt;\\nTulin has worked across multiple projects from:&lt;\\\/p&gt;\\n&lt;ul&gt;\\n&lt;li&gt;Developing and implementing successful Third-Party Risk Management Frameworks&lt;\\\/li&gt;\\n&lt;li&gt;APRA Prudential Standard CPS234, GDPR, CCPA, NDB scheme readiness&lt;\\\/li&gt;\\n&lt;li&gt;Information Security Officer positions&lt;\\\/li&gt;\\n&lt;li&gt;Cyber Security Incident response exercises&lt;\\\/li&gt;\\n&lt;li&gt;Creating and exercising data breach response plans&lt;\\\/li&gt;\\n&lt;li&gt;Developing, managing and testing IT disaster recovery plans&lt;\\\/li&gt;\\n&lt;li&gt;Enhancing cyber risk frameworks for various clients&lt;\\\/li&gt;\\n&lt;li&gt;Facilitating cyber security awareness training&lt;\\\/li&gt;\\n&lt;li&gt;Post cyber incident reviews&lt;\\\/li&gt;\\n&lt;li&gt;Social engineering projects&lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 15, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-234-deep-dive-tulin-sevgin-tackling-third-party-risk-management-crucial-insights-for-effective-due-diligence&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/cb3ef1c1-8d08-4fa5-902e-8f9140601895-KBKAST-EP-Tulin-Sevgin.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:34&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1702656043,&quot;key&quot;:&quot;53f30fc4082336e7871e062c2df6719d&quot;},&quot;ppe-4514-170&quot;:{&quot;title&quot;:&quot;Episode 233 Deep Dive: Geoff Schomburgk | Securing Digital Identity: A Discussion on The Use of Passwords and Their Future&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Geoff Schomburgk (Regional Vice President, Asia Pacific &amp; Japan \\u2013 Yubico) as we explore the transition from traditional username and password systems to passwordless experiences. Together, we discuss the frustrations with current security methods, the need for consumer awareness, and the importance of businesses and government setting the standard for security measures. From practicality and usability to the business value of security technologies, Geoff delves into the evolving conversation around cybersecurity and the potential for multifaceted benefits. Tune in for a deep dive into the future of digital identity protection and the impact of modern authentication methods.&lt;\\\/p&gt;\\n&lt;p&gt;At Yubico, Geoff is responsible for driving the Yubico business across Australia and New Zealand, working with partners and enterprise customers to implement secure modern authentication, helping make the internet safer for all.&lt;\\\/p&gt;\\n&lt;p&gt;Geoff brings a strong customer focus and a proven ability to implement complex technology solutions across a range of industries, including telecommunications, utility and transport sectors across Australia, Asia and Europe.\\u00a0 Critical to the success of these projects is the definition and realisation of tangible business value, where the combination of Geoff\\u2019s business consulting approach and project delivery experience consistently deliver business value.&lt;\\\/p&gt;\\n&lt;p&gt;Geoff is an experienced senior executive with a background in engineering and strategy consulting and over 30 years\\u2019 experience in the global information and communications technology (ICT) industry.\\u00a0 Geoff has a Bachelor of Engineering and MBA and is also a Non-Executive Director and business mentor to several Not For Profit (NFP) organisations. He is a Fellow of the Australian Institute of Company Directors (GAICD), with B.E. (Hons) and M.B.A.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 13, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-233-deep-dive-geoff-schomburgk-securing-digital-identity-a-discussion-on-the-use-of-passwords-and-their-future&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/9b506dcc-b1e8-425a-bf57-fffe73af5cbf-KBKAST-EP-Geoff-Schomburgk.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;38:18&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1702483201,&quot;key&quot;:&quot;9979decb47dfe0bea73a4c506a53678e&quot;},&quot;ppe-4514-171&quot;:{&quot;title&quot;:&quot;Episode 232 Deep Dive: Pierre Liddle | Future-Proofing Security: Unpacking Cloud Native Application Protection Platforms (CNAPP)&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Pierre Liddle (Co-Founder, Plerion) dive deep into the ever-evolving landscape of cloud security, tackling misconceptions, and examining the potential of cloud native application protection platforms (CNAPP) as a line of defense against attacks. We shed light on the dynamic nature of security threats, the benefits of cloud technology, and the strategic importance of finding the right partners.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Pierre Liddle is a distinguished expert with over 20 years of dedicated experience in the dynamic field of security. As the Co-founder and CTO of Plerion, he serves as the guiding force behind the company\\u2019s strategic vision. Pierre\\u2019s extensive career includes an impressive seven-year tenure at AWS, where he played a crucial role in driving global internal security programs and collaborating with customers to design, build, and manage secure cloud workloads. This direct and hands-on engagement has equipped him with an unparalleled understanding of the precise challenges and pain points that organisations encounter in the realm of cloud security.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;With a profound commitment to enhancing cloud security practices, and a vision to make the world a safer place by empowering customers to conquer the future, Pierre brings his wealth of knowledge to the forefront at Plerion. His leadership and domain expertise empower the company to provide cutting-edge solutions that address the evolving needs of businesses in an increasingly digital world. Pierre\\u2019s invaluable insights and dedication to innovation underscore his role as a driving force behind Plerion\\u2019s mission to revolutionise cloud security.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 8, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-232-deep-dive-pierre-liddle-future-proofing-security-unpacking-cloud-native-application-protection-platforms-cnapp&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/730291c5-eb61-4159-8dbe-491bb3dfaf48-KBKAST-EP-Pierre-Liddle.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;41:05&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1702051224,&quot;key&quot;:&quot;5f788d9d9e0f749a96eb0f9725d5c539&quot;},&quot;ppe-4514-172&quot;:{&quot;title&quot;:&quot;Episode 231 Deep Dive: Ashwin Ram | Overcoming Evolving Threats: Expert Advice for Executive Cyber Awareness&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Ashwin Ram (Office of the Chief Technology Officer \\u2013 Check Point) as he dives deep into the need for clear communication of cyber risks, addresses the challenges faced by security practitioners, and highlights the importance of credibility in cybersecurity strategies. From leveraging diverse threat intelligence sources to staying updated on emerging threats and attack strategies, this episode provides valuable guidance for executives and board members. Stay ahead of cyber threats, understand the evolving landscape, and ensure comprehensive cybersecurity strategies for your organization\\u2019s success. Tune in now to gain valuable, actionable insights.&lt;\\\/p&gt;\\n&lt;p&gt;Ashwin Ram is a seasoned cyber security expert and thought leader with a unique blend of CISO consulting experience and technical know-how. He is widely regarded as a trusted advisor by industry titans, startups, and industry collectives due to his ability to translate technical threats into business contexts to evaluate overall risk to organisations.&lt;\\\/p&gt;\\n&lt;p&gt;With his deep security knowledge, Ashwin can switch effortlessly between \\u201ctech talk\\u201d and \\u201cbusiness talk,\\u201d making him a go-to person for organisations looking to bolster their cyber resilience. In his current role at Check Point Software Technologies, Ashwin assists cyber executives understand, prioritise, communicate, and address cyber risks.&lt;\\\/p&gt;\\n&lt;div&gt;&lt;\\\/div&gt;\\n&lt;div&gt;&lt;\\\/div&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 6, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-231-deep-dive-ashwin-ram-overcoming-evolving-threats-expert-advice-for-executive-cyber-awareness&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/dda12036-6a01-4af6-92ba-0b86350920f2-KBKAST-EP-Ashwin-Ram.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:21&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1701878415,&quot;key&quot;:&quot;c525d1bd958f6e66046c84e035f7c4c4&quot;},&quot;ppe-4514-173&quot;:{&quot;title&quot;:&quot;Episode 230 Deep Dive: Alen Zenicanin | Perspectives on Vendor and Third-Party Risk Management&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we dive deep and explore the intricate cat-and-mouse game between third-party vendors and clients in the cybersecurity realm. They discuss the challenges of ensuring that vendors fulfill cybersecurity contracts and the importance of clearly stipulating cybersecurity requirements to reduce the risk of breaches. Alen stresses the significance of vetting and continuously assessing vendors to ensure a robust security posture.&lt;\\\/p&gt;\\n&lt;p&gt;The conversation delves into the complexities of data classification, due diligence on third-party vendors, and the importance of transparency and accountability in handling breaches. Join us as we unravel the nuances of third-party risk management, cybersecurity marketing, and the potential risks and benefits of AI in the cybersecurity landscape.&lt;\\\/p&gt;\\n&lt;p&gt;Hailing from Eastern Europe, Alen arrives in Australia in 1996 and has been a daily contributor to Australia\\u2019s Cybersecurity scene for a over 15 years now. Having helped hundreds of organisations improve their threat landscape and avoid costly breaches, Alen is a leader in the spaces of cyber security, information security, risk management and governance\\\/compliance. Being a regular guest speaker at webinars, summits and industry events \\u2013 Alen is considered a valuable asset in helping non-technical people understand the value of technology risk management. Experienced across various industries including aerospace, renewable energies, legal, and our government; Alen is highly sought after as an industry subject-matter expert.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 1, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-230-deep-dive-alen-zenicanin-perspectives-on-vendor-and-third-party-risk-management&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/fd890f21-806e-4daa-8d04-754ebbfc6f25-KBKAST-EP-Alen-Zenicanin.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;44:13&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1701446449,&quot;key&quot;:&quot;0db069c29435a9304e86d37390cafdb5&quot;},&quot;ppe-4514-174&quot;:{&quot;title&quot;:&quot;Episode 229 Deep Dive: Rad Kanapathipillai | Enhancing Security Posture: Prioritising Data Protection in Organisations&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Rad Kanapathipillai (Head of Engineering at DevOps1) as he sheds light on the critical importance of safeguarding sensitive data right from the development phase through to production. The discussion delves into the challenges organisations encounter in protecting sensitive information and the pressing need for encryption, compliance, and code and password protection to prevent data breaches. Rad also emphasizes the urgency of prioritising data protection and implementing strategies that elevate its significance. Moreover, the conversation touches on the evolving focus on security in agile environments and the empowerment of developers to code securely. Throughout the episode, Rad presents insightful solutions, including the use of automation and AI to address security issues.&lt;\\\/p&gt;\\n&lt;p&gt;Rad, Head of Engineering at DevOps1, is a seasoned tech expert with 15+ years in the industry.&lt;\\\/p&gt;\\n&lt;p&gt;Specialising in Platforms and Security, Rad has led platform and devsecops transformations at organisations like Spark New Zealand, ANZ Government, and top financial institutions.&lt;\\\/p&gt;\\n&lt;p&gt;With a strong track record in project management and ethics, Rad has also contributed significantly at Ampion\\\/Wipro\\u2019s cybersecurity division, Shelde where he was a Cloud Consulting partner.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 29, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-229-deep-dive-rad-kanapathipillai-enhancing-security-posture-prioritising-data-protection-in-organisations&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/4ea00ebc-1d16-46b8-b5ed-026ba07205f4-KBKAST-EP-229-Rad-Kanapathipillai.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:50&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1701275419,&quot;key&quot;:&quot;866fad0f7abae0168efffaa8d54ef46b&quot;},&quot;ppe-4514-175&quot;:{&quot;title&quot;:&quot;Episode 228 Deep Dive: Rob Rashotte | Diversifying the Cybersecurity Talent Pool: A Discussion on Making Cybersecurity Roles Inclusive and Accessible to All&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Rob Rashotte as we dive deep into workforce culture and the skills gap. Rob talks about the need for organisations to prioritize upskilling programs and foster a new workforce culture to address skills gaps in cybersecurity. Rob highlights the importance of considering underrepresented groups and economically disadvantaged individuals, as viable candidates for cybersecurity roles.&lt;\\\/p&gt;\\n&lt;p&gt;One crucial theme that we also talk about is the misconception that a university degree is necessary for all cybersecurity jobs. Rob challenges this notion, emphasising that there are many skilled individuals without degrees who can effectively contribute to the field. However, the lack of standardised job roles and descriptions in cybersecurity makes recruiting difficult, leading to the use of a degree as a filtering criteria. To tackle this issue, Rob also emphasises the need for a structured framework for cybersecurity roles. By developing such a framework, the recruiting process can be made easier, and educational pathways can be established that may or may not require a degree. Throughout the episode, we touch upon the role of HR, the use of AI in creating inclusive job descriptions, and the importance of promoting cybersecurity careers to younger candidates.&lt;\\\/p&gt;\\n&lt;p&gt;Rob Rashotte is the Vice President of the Fortinet Training Institute and the Fortinet Technical Field Enablement Program. Rob has more than 20 years of experience developing training and education strategies for startups as well as complex global organisations. He also has more than 15 years of experience working with some of the most innovative, fast-paced companies in the cybersecurity field. Rob has an Executive MBA from the University of Ottawa and is a regular speaker at a number of business schools on the topic of cyber risk and corporate impact.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 24, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-228-deep-dive-rob-rashotte-diversifying-the-cybersecurity-talent-pool-a-discussion-on-making-cybersecurity-roles-inclusive-and-accessible-to-all&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/114e44d9-1cac-4c07-8645-2eb1ec6313f5-KBKAST-EP-ROB-RASHOTTE.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;34:04&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1700841645,&quot;key&quot;:&quot;519f6f629001a76ba5878c24f36984b9&quot;},&quot;ppe-4514-176&quot;:{&quot;title&quot;:&quot;Episode 227 Deep Dive: Jaya Baloo | Discussing New Cyber Disclosure Rules, Understanding the Cost of Breaches, and Building a Long-term Security Strategy for Organisations&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Jaya Baloo, Chief Security Officer of Rapid7, as we dive deep into the crucial topic of cybersecurity and its impact on revenue retention and the overall success of organisations. Jaya emphasises the importance of the security team making their contributions visible to the rest of the enterprise, rather than expecting others to figure it out on their own. They discuss the purpose of the security function, the cost of breaches, and the challenges faced by CISOs in communicating the value of cybersecurity to CFOs. Jaya also shares her predictions for the future of cybersecurity, the need for industry standards, and the importance of bringing the cybersecurity industry together to make a significant difference.&lt;\\\/p&gt;\\n&lt;p&gt;Jaya Baloo is the CSO of Rapid7 and has been working in the field of Info Security with a focus on secure network architecture for more than 20 years. She is the former CISO of Avast, and prior to that was CISO at KPN, the largest telco carrier in The Netherlands. Jaya serves on the boards of the NL\\u2019s National Cyber Security Centre, TIIN Capital, the NOS, and was former Vice Chair of the EU Quantum flagship. Shie is also on the faculty of the Singularity University. Jaya is recognised as a top 100 security influencer worldwide. In 2019, she was selected as one of the 50 most inspiring Fifty. In 2022 she received an honorary doctorate from the Uni of Twente for her contributions to the field of Cybersecurity.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 22, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-227-deep-dive-jaya-baloo-discussing-new-cyber-disclosure-rules-understanding-the-cost-of-breaches-and-building-a-long-term-security-strategy-for-organisations&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/eb99c55d-786d-41e9-88f4-05e04250360d-KBKAST-EP-Jaya-Baloo.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;41:35&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1700668819,&quot;key&quot;:&quot;540f8b7d335a20dfb10e1a6e8d12c1e5&quot;},&quot;ppe-4514-177&quot;:{&quot;title&quot;:&quot;Episode 226 Deep Dive: Raj Sharma | Rethinking the Reseller Role: Adapting to the Shifting Dynamics of the Technology Market&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Raj Sharma, District Sales Manager of Palo Alto, as we delve into the importance of strategic partners versus transactional partners, the shift in customer preferences, and the role of resellers in delivering exceptional value to customers. We explore how transparency, empathy, and understanding drive successful partnerships, and the challenges faced by resellers in managing multiple vendors and services. Join us as we uncover the keys to relevance, trust, and success in the ever-changing world of technology partnerships.&lt;\\\/p&gt;\\n&lt;p&gt;Raj Sharma, a seasoned professional in the realm of cybersecurity and enterprise sales, boasts nearly two decades of invaluable experience in these domains. Throughout his illustrious career, Raj has consistently demonstrated his prowess by not only navigating the complex landscape of cybersecurity but also by excelling in the dynamic field of enterprise sales.&lt;\\\/p&gt;\\n&lt;p&gt;At present, Raj holds a pivotal role as the leader of a high-performance sales team, where his strategic vision and leadership skills have contributed significantly to the team\\u2019s success. His commitment to fostering a collaborative and results-driven environment has positioned the team as a force to be reckoned with in the industry.&lt;\\\/p&gt;\\n&lt;p&gt;Raj is driven by a deep-seated passion for helping clients, partners, and his own team achieve their respective goals. His client-centric approach and keen understanding of the ever-evolving cybersecurity landscape have earned him a reputation as a trusted advisor in the industry.&lt;\\\/p&gt;\\n&lt;p&gt;What sets Raj apart is not only his professional acumen but also his unwavering commitment to continuous self-development and a growth mindset. He believes in the power of ongoing learning and embraces challenges as opportunities for personal and professional growth. Raj\\u2019s enthusiasm for learning and adapting to new technologies ensures that he remains at the forefront of industry trends.&lt;\\\/p&gt;\\n&lt;p&gt;Beyond his individual success, Raj finds fulfillment in witnessing the flourishing of others around him. His leadership style is characterized by mentorship and empowerment, reflecting his genuine desire to see his team members reach their full potential. In every endeavor, Raj Sharma exemplifies the qualities of a dynamic and visionary leader who not only excels in his own journey but also inspires others to thrive in their pursuits.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 16, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-226-deep-dive-raj-sharma-rethinking-the-reseller-role-adapting-to-the-shifting-dynamics-of-the-technology-market&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1598780\\\/KBKAST-EP-Raj-Sharma.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;43:14&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1700150405,&quot;key&quot;:&quot;2259582580af4a315242dc8266a23ead&quot;},&quot;ppe-4514-178&quot;:{&quot;title&quot;:&quot;Episode 225 Deep Dive: Toby Jones | Discussing a Game-Changing Approach to Private and Public Sector Collaboration&quot;,&quot;description&quot;:&quot;&lt;div dir=\\&quot;ltr\\&quot;&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div dir=\\&quot;ltr\\&quot;&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;\\n&lt;div&gt;In this episode, we dive deep into the ACE initiative, and how it acts as a facilitator for the public sector, encouraging diversity and collaboration among businesses to deliver the required outcomes. Toby shares how the platform has changed the dynamic with larger companies, leading to adaptations and a shift towards acquiring smaller companies for innovation. We also explore the impact of ACE on smaller businesses, the importance of protecting intellectual property, and the role of collaborations between businesses, academia, and mission customers in addressing shared problems and creating commercial opportunities. Toby also takes us on a journey from the UK to Australia, discussing the opportunities for collaboration and knowledge exchange between countries and the plans to expand ACE\\u2019s platform overseas.&lt;\\\/div&gt;\\n&lt;div&gt;&lt;\\\/div&gt;\\n&lt;div&gt;Toby Jones, a former UK senior civil servant, leads the UK Home Office\\u2019s transformation of mission-led innovation for public safety and security with science, digital technology and data. He co-founded ACE, the UK\\u2019s Accelerated Capability Environment, a Home Office-sponsored partnership between industry, academia and government, to push smart technologies and skills to front-line public services with operational tempo. He brings experience from the national security and resilience sector, combined with public policy development including legislation for investigatory powers and telecommunications regulation and compliance. His professional background is in systems engineering and computer science.&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 15, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-225-deep-dive-toby-jones-discussing-a-game-changing-approach-to-private-and-public-sector-collaboration&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1598676\\\/KBKAST-EP-Toby-Jones.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;36:40&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1700064051,&quot;key&quot;:&quot;b0443fd7ef9bd2d1325b6e73d7858dd6&quot;},&quot;ppe-4514-179&quot;:{&quot;title&quot;:&quot;Episode 224 Deep Dive: Ben Gestier | Understanding Converging Threats: A Discussion on Cyber and Physical Security Awareness&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Ben Gestier (Senior Intelligence Analyst and Team Lead APAC\\\/EMEA \\u2013 Flashpoint) as we dive deep into the complex and often underappreciated intersection of cyber and physical security. We explore the challenges of understanding and addressing cyber threats in the Australian context and the need to educate and empower individuals and organizations to navigate these evolving dangers. From the use of open source forums by threat actors to the convergence of online communication on real-world actions, Ben sheds light on the vital importance of collaboration and awareness in combating cyber and physical security threats. Tune in as Ben Gestier shares insights and experiences that highlight the critical nexus between the digital and physical realms, and learn from his call to action to enhance our understanding and preparedness in the face of converging security risks.&lt;\\\/p&gt;\\n&lt;p&gt;Ben is Senior Intelligence Analyst and Team Lead APAC\\\/EMEA with risk intelligence firm Flashpoint. He\\u2019s former intelligence with Australian Federal Police and Australian Defence Force.&lt;\\\/p&gt;\\n&lt;p&gt;In his current role, Ben seeks to synchronise efforts across time zones and threat types to assist in protecting businesses and government elements from threats. This can include identification of risks, vulnerabilities, advanced persistent threats, and how these can manifest in the real world.&lt;\\\/p&gt;\\n&lt;p&gt;The nexus between the online threat and the physical world is where Flashpoint strives to provide assistance to its clients to help in protecting people, assets, information, and infrastructure.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to joining Flashpoint, Ben was a Criminal Intelligence Analyst with the Australian Federal Police. As part of his work with AFP, Ben established the Aviation Protection Assessment Team (APAT), which was responsible for undertaking physical vulnerability assessments at airports across Australia. An integral part of this role included understanding the online communication methodology of criminal and threat elements. During his time with the ADF, Ben worked as part of the intelligence capability, in operations both domestically and internationally.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 10, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-224-deep-dive-ben-gestier-understanding-converging-threats-a-discussion-on-cyber-and-physical-security-awareness&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1598677\\\/KBKAST-EP-Ben-Gestier.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;36:23&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1699632037,&quot;key&quot;:&quot;4da674f5ff56ebc29be23b3aebe83260&quot;},&quot;ppe-4514-180&quot;:{&quot;title&quot;:&quot;Episode 223 Deep Dive: Puneeta Chellaramani | The Road to Smart Cities: Challenges, Sustainability, and Citizen Impact&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we delve into the dynamic landscape of smart cities with a captivating discussion featuring Puneeta Chellaramani. Puneeta enlightens us on the potential benefits, ethical implications, and the evolving challenges associated with the implementation of smart city initiatives. We explore every angle from the increasing threat landscape to the potential impact on sustainability and citizens. Tune in now and learn more about digital twins, spatial services, and the implications of smart cities to everyday life.&lt;\\\/p&gt;\\n&lt;p&gt;Puneeta offers management consulting and cyber security experience with a pragmatic approach in implementing sustainable change. She is both a coach and advisor to clients across diverse industries advocating a 2-speed approach when navigating through their cyber, digital and innovation journey.&lt;\\\/p&gt;\\n&lt;p&gt;Connecting vision and reality \\u2013 she helps organisations move with confidence to overcome the challenges of an ever changing threat landscape, and work with them all the way from business intent to value realisation &amp; combat business risks.&lt;\\\/p&gt;\\n&lt;p&gt;Puneeta has been a cyber security Practitioner helping CISOs &amp; CROs adopt pragmatic solutions that Reduce business &amp; Compliance Risks; harnessing her exuberant skills &amp; experience across consultative selling, building security business solutions, customer management, security advisory &amp; roadmaps across large transformation programs.&lt;\\\/p&gt;\\n&lt;p&gt;She has provided leadership and managed large and distributed teams, managing a multi-vendor and rightshore delivery model, be seen as a cyber\\\/technology enablement advisor in a diverse and geographically dispersed working environment partnering seamlessly across business and IT.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 8, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-223-deep-dive-puneeta-chellaramani-the-road-to-smart-cities-challenges-sustainability-and-citizen-impact&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1598678\\\/KBKAST-EP-Puneeta-Ramani.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;41:12&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1699419640,&quot;key&quot;:&quot;93605c2b7d25b712cecb12dd27bd2c7f&quot;},&quot;ppe-4514-181&quot;:{&quot;title&quot;:&quot;Episode 222 Deep Dive: David Chow | A Conversation on the Impact of Geopolitics on Cybersecurity&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we dive deep into the intersection of global events and issues and cybersecurity. David discusses the impact of geopolitical risks on cybersecurity, the urgent need for collaboration, comprehensive risk management, and the adoption of security strategies such as zero-trust.&lt;\\\/p&gt;\\n&lt;p&gt;From international trade tension to the Ukraine-Russia conflict, David and KB delve into the complex interdependencies and challenges in safeguarding organizations worldwide.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;b&gt;David Chow&lt;\\\/b&gt;\\u00a0brings over 20 years of experience in the federal government to his role as Chief Technology Strategy officer. His focus includes analysing, managing, and implementing technologies to assist with building and maintaining a global cybersecurity strategy. Much of his expertise stems from working alongside the Federal Housing Administration (FHA) to modernise the agency\\u2019s mortgage loan systems and mature its cybersecurity program. He served on a number of additional roles within the federal government, including executive and leadership positions at the Department of Transportation and the White House. Prior to joining Trend Micro, David demonstrated success in accelerated digital transformation through secured cloud adoption as the Global SVP on NextGen Solutions at CoreLogic, a FinTech data company. David Chow is on the Advisory Board of George Mason College of Engineering and Computing.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 3, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-222-deep-dive-david-chow-a-conversation-on-the-impact-of-geopolitics-on-cybersecurity&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1598679\\\/KBKAST-EP-David-Chow-1.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;43:42&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1699028479,&quot;key&quot;:&quot;5cf674257f6be93c128220c209988316&quot;},&quot;ppe-4514-182&quot;:{&quot;title&quot;:&quot;Episode 221 Deep Dive: Mike Zachman | Rethinking Metrics: From Activity to Outcomes, Leveraging Automation in Security Reporting&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Mike Zachman (VP &amp; CISO \\u2013 Zebra Technologies), as we delve into the untapped potential of automation in security processes. Mike discusses how automation enhances data protection by reducing human error and facilitating faster threat detection and response. He emphasizes the importance of consistency in processes and the need to free up resources for more strategic tasks. The conversation explores challenges in implementing automation, the value of accurate and timely reporting, and the relevance of high fidelity signals in automation. Tune in to discover the key takeaways and insights on driving change and leveraging automation for improved security measures.&lt;\\\/p&gt;\\n&lt;p&gt;Mike Zachman is currently the Chief Security Officer (CSO) at Zebra Technologies, where he has global responsibility for its enterprise-wide product security, information security, corporate security and business continuity programs. Zachman is an experienced global leader with over 30 years of information security, risk management and information technology expertise.&lt;\\\/p&gt;\\n&lt;p&gt;Previously, Zachman was Chief information Security Officer (CISO) at Caterpillar, Ecolab, and Forsythe Technologies. Zachman holds an undergraduate degree in management information systems from Millikin University, and a master\\u2019s degree in business administration from Bradley University. He is a Certified Information Security Manager, Certified Internal Auditor and is Certified in the Governance of Enterprise IT. He is an active volunteer with Junior Achievement and Easter Seals.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 1, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-221-deep-dive-mike-zachman-rethinking-metrics-from-activity-to-outcomes-leveraging-automation-in-security-reporting&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1598680\\\/KBKAST-EP-Mike-Zachman.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;38:07&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1698854424,&quot;key&quot;:&quot;e4b5e4f8329c1b6f584ef4af8b7bfc90&quot;},&quot;ppe-4514-183&quot;:{&quot;title&quot;:&quot;Episode 220 Deep Dive: Jamil Farshchi | Going Back to Basics, Breaking Barriers, and Nurturing Partnerships: A Discussion on Effective Leadership with Cyber in Focus&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;span class=\\&quot;block mb-4\\&quot;&gt;In this episode, we are joined by Jamil Farshchi (EVP &amp; CISO \\u2013 Equifax), as we dive deep into the world of leadership and the importance of driving the right behaviors in your team. We also explored the strategic partnerships between the government and corporate community, focusing on improving public-private collaboration to tackle cybersecurity threats. &lt;\\\/span&gt;&lt;span class=\\&quot;block mb-4\\&quot;&gt;We discuss the challenges and progress made in information sharing, especially for small to medium-sized businesses. Jamil also shares their groundbreaking initiatives, including their open and honest approach to security reporting and real-time visibility for customers. Jamil emphasises&lt;\\\/span&gt;&lt;span class=\\&quot;block mb-4\\&quot;&gt; the need for dialogue, diverse perspectives, and breaking down barriers in the security field, and highlights how cybersecurity has become a top priority for organizations worldwide, stressing the importance of investing proactively to avoid breaches.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Jamil Farshchi is EVP and Chief Information Security Officer of Equifax (NYSE: EFX). Farshchi joined Equifax in the aftermath of one of the most consequential data breaches in history. During his tenure, he led an unprecedented $1.5 billion transformation and has built what is regarded as one of the most advanced, effective, and transparent cybersecurity and privacy programs in business today.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to Equifax, Farshchi was Chief Information Security Officer of The Home Depot, Chief Information Security Officer of Time Warner, Vice President of Global Information Security for Visa, Chief Information Security Officer of the Los Alamos National Laboratory, and Deputy Chief Information Assurance Officer of NASA.&lt;\\\/p&gt;\\n&lt;p&gt;Farshchi serves on the Board of Directors for UKG, is a Strategic Advisor for the FBI and serves on the Board of Directors for the National Technology Security Coalition. He was named a Top Voice in Technology and Innovation by LinkedIn.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 25, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-220-deep-dive-jamil-farshchi-going-back-to-basics-breaking-barriers-and-nurturing-partnerships-a-discussion-on-effective-leadership-with-cyber-in-focus&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1598681\\\/0fb0b1c4-686c-4566-908f-ec8c0738c510-KBKAST-EP-Jamil-Farschi.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;36:07&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1698249650,&quot;key&quot;:&quot;ba74e674d807bbdfb2481bb463079244&quot;},&quot;ppe-4514-184&quot;:{&quot;title&quot;:&quot;Episode 219 Deep Dive: Amy Meyer | Assessing Value and Overcoming Challenges: A Journey from Sydney to San Francisco&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we take a deep dive into the fascinating world of international careers and the challenges and triumphs that come with them. KB sits down with Amy Meyer (Founder \\u2013 Aussie Recruit), who shares her experiences and insights, reflecting on how Australians can navigate the US job market, capitalize on their unique value proposition, and build successful careers across various industries. From cultural nuances to visa processes and the power of networking, this episode is a goldmine of advice for anyone considering making the move from Down Under to the land of opportunity. If you\\u2019ve been thinking about taking the leap necessary for your own international career breakthrough, tune in.&lt;\\\/p&gt;\\n&lt;p&gt;Amy is the founder of Aussie Recruit and has supported thousands of Australians with their US job search. She specializes in connecting Australians with jobs in the US at companies hiring Aussies on E-3 visas. Amy has 7+ years of experience recruiting in the US market.&lt;\\\/p&gt;\\n&lt;p&gt;Amy is a dual Australian-American. She relocated from Sydney to San Francisco 10 years ago. She has first-hand experienced and overcome the challenges Australians face getting jobs in the US.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to starting Aussie Recruit,\\u00a0she was Head of People at an early-stage tech company and hired many Australians on E-3 visas. She also started and runs the &lt;a href=\\&quot;https:\\\/\\\/www.facebook.com\\\/groups\\\/AustraliansInSanFrancisco\\\/\\&quot; target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;Australians In San Francisco Bay Area&lt;\\\/a&gt;.&lt;\\\/p&gt;\\n&lt;p&gt;You can find Amy\\u00a0sharing tips &amp; stories on &lt;a href=\\&quot;https:\\\/\\\/www.instagram.com\\\/aussierecruitsf\\\/\\&quot; target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;Instagram&lt;\\\/a&gt; almost every day.&lt;\\\/p&gt;\\n&lt;p&gt;Amy is also a full-time mum of 3 and started Aussie Recruit when her 1st child was just a few months old.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 20, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-219-deep-dive-amy-meyer-assessing-value-and-overcoming-challenges-a-journey-from-sydney-to-san-francisco&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1598698\\\/4ae95733-ec20-42aa-a243-da31932d53db-KBKAST-EP-Amy-Meyer.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;51:36&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1697817605,&quot;key&quot;:&quot;e327045974f22dd6cf8ba242e9d413a9&quot;},&quot;ppe-4514-185&quot;:{&quot;title&quot;:&quot;Episode 218 Deep Dive: Annie Haggar | Putting Together A Complex and Evolving Jigsaw Puzzle: A Discussion on the Intersection of Cyber and the Law&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we dive deep into the intersection of cybersecurity and the legal world, as Annie Haggar of Cyber GC takes us through the pros and cons of additional barriers to entry in the industry, the impact of regulations on quality assurance, diversity, and the existing skills gap. Annie also discusses how businesses can navigate and strategise in terms of compliance with industry-specific legislations, and how governments can strike a balance between effective regulation and reasonable costs for compliance.&lt;\\\/p&gt;\\n&lt;p&gt;Annie is the founder and principal of Cyber GC \\u2013 a legal and consulting practice dedicated to helping Australian businesses prepare for and fight cyberattacks. Annie is a multi-award-winning cybersecurity lawyer and was recently awarded General Counsel of the Year (Australian Law Awards \\u2013 Lawyers Weekly \\u2013 2021).&lt;\\\/p&gt;\\n&lt;p&gt;She brings to Cyber GC the experience gained in 20 years as a technology lawyer, 12 years working for one of the largest technology companies in the world and 6 years as global legal counsel for Accenture Security, one of the largest security companies in the world. She specialises in advising on enterprise security risk, cyber regulation, procurement risk management, and the impact on the whole organisation of cybersecurity issues.&lt;\\\/p&gt;\\n&lt;p&gt;Based in Canberra, Australia, she lives with her two little girls (3 and 5), husband Tony and fur baby, Scout the Jack Russell-Foxy cross. Outside of work and volunteering, you will find her tending to her bees, cooking Ottolenghi, tending her veggie patch and sewing, quilting, knitting and crafting.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 18, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-218-deep-dive-annie-haggar-putting-together-a-complex-and-evolving-jigsaw-puzzle-a-discussion-on-the-intersection-of-cyber-and-the-law&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1598684\\\/44fa9676-aaed-426f-8eec-de0ce55ed90b-KBKAST-EP-Annie-Haggar.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;44:41&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1697644842,&quot;key&quot;:&quot;fa4ced8a37af5c6a0a7ef965242c5789&quot;},&quot;ppe-4514-186&quot;:{&quot;title&quot;:&quot;Episode 217 Deep Dive: EJ Wise | Beyond Policies: Creating a Culture of Cybersecurity Awareness and Engagement&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by\\u00a0&lt;a class=\\&quot;ql-mention\\&quot; href=\\&quot;https:\\\/\\\/www.linkedin.com\\\/company\\\/81901216\\\/admin\\\/feed\\\/posts\\\/#\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;EJ WISE&lt;\\\/a&gt; (Principal and Founder \\u2013 &lt;a class=\\&quot;ql-mention\\&quot; href=\\&quot;https:\\\/\\\/www.linkedin.com\\\/company\\\/81901216\\\/admin\\\/feed\\\/posts\\\/#\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Wise Law&lt;\\\/a&gt;). From tailoring preparedness measures for different audiences to the importance of customizing business continuity plans, EJ Wise highlights the pitfalls of generic templates and the need for proper training. She also explores the parallel between physical safety measures and cyber security preparedness, challenging organizations to identify their cyber wardens. Plus, we\\u2019ll discuss the potential HR and morale problems associated with neglecting policy updates and the importance of keeping policies relevant and engaging. Don\\u2019t miss out on the valuable advice EJ has to offer as she addresses the legal aspect of cyber preparedness, the role of communication teams during incidents, and the necessity of regular practice in handling cyber incidents effectively.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span&gt;Professor EJ Wise (she\\\/her) is Principal and Founder of Wise Law in &lt;\\\/span&gt;&lt;span&gt;Melbourne&lt;\\\/span&gt;&lt;span&gt; and:&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;ul&gt;\\n&lt;li&gt;&lt;span&gt;Adjunct Professor, Faculty of Science, Engineering &amp; Built Environment, Deakin University&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/li&gt;\\n&lt;li&gt;&lt;span&gt;Lecturer, School of Law, Society and Criminology, Faculty of Law and Justice, UNSW&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/li&gt;\\n&lt;li&gt;&lt;span&gt;Lecturer, Melbourne Business School (Public Policy)&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&lt;ul&gt;\\n&lt;li&gt;&lt;span&gt;Sessional Academic, Thomas More Law School, ACU&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/li&gt;\\n&lt;li&gt;&lt;a href=\\&quot;https:\\\/\\\/cybercentre.org.au\\\/profile\\\/ej-wise-2\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;&lt;span&gt;Member&lt;\\\/span&gt;&lt;\\\/a&gt;&lt;span&gt;, Executive Advisory Board for Cyber, Deakin University&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/li&gt;\\n&lt;li&gt;&lt;span&gt;Member, Industry Advisory Board for Cyber, RMIT&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/li&gt;\\n&lt;li&gt;&lt;span&gt;Member, Advisory Committee of the UNSW Institute of Cyber Security, UNSW&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/li&gt;\\n&lt;li&gt;&lt;span&gt;Founding Chair, Australasian Cyber Security Institute&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/li&gt;\\n&lt;li&gt;&lt;span&gt;Founding Director &amp; Treasurer, National Institute of Strategic Resilience&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/li&gt;\\n&lt;li&gt;&lt;span&gt;Member Law Council of Australia International Law Section&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/li&gt;\\n&lt;li&gt;&lt;span&gt;Member Belgium Avenue Neighbourhood House Executive Committee&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&lt;p&gt;&lt;span&gt;EJ has 29 years legal experience in Australian Federal and State Governments as well as in private practice and academia, specialising in cyber law, policy, strategy, governance, international law &amp; international humanitarian law and is an internationally recognized cyber law expert.&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span&gt;EJ\\u2019s 21 years of service in uniform as a Legal Officer with the Royal Australian Air Force includes postings in the RAAF\\u2019s cyber and information operations squadron and on exchange with the United States Air Force\\u2019s JAG Corps in the Pentagon for three years.\\u00a0 EJ is a decorated veteran who served twice in the Middle East during Australia\\u2019s engagement in international armed conflict.\\u00a0 EJ\\u2019s volunteer roles have ranged from working in a Community Legal Centre to providing CPD to the Federation of Community Legal Centres in Victoria, being on the International Humanitarian Law Committee of the International Committee of the Red Cross to membership of Cyber Security Advisory Boards and Committees.&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span&gt;EJ has assisted in drafting laws, relevant texts and manuals in Australian, International and US jurisdictions. She has assisted in law enforcement as well as cyber operations. EJ has strong community values and gives her time to community and not for profit organisations as her contribution to a fairer, more inclusive and equitable society for everyone.&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;table&gt;\\n&lt;tbody&gt;\\n&lt;tr&gt;\\n&lt;td&gt;&lt;span&gt;Areas of Expertise&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/td&gt;\\n&lt;td&gt;&lt;span&gt;Qualifications&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/td&gt;\\n&lt;\\\/tr&gt;\\n&lt;tr&gt;\\n&lt;td&gt;&lt;span&gt;Cyber Law&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span&gt;Cyber Security Law&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span&gt;Cyber Operations&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span&gt;Cyber Warfare&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span&gt;Information Operations&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span&gt;International Humanitarian Law&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span&gt;Cyber Policy, Risk, Strategy &amp; Governance&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span&gt;Military Law&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;\\\/td&gt;\\n&lt;td&gt;&lt;span&gt;B.App.Sc (Ecology &amp; Natural Resources)&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span&gt;LLB&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span&gt;LLM&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span&gt;MA (Policy &amp; Strategy)&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span&gt;Grad Dip (Legal Practice)&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span&gt;Grad Dip (Strategic planning &amp; management)&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span&gt;Grad Dip (Defence studies)\\u00a0&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;\\\/td&gt;\\n&lt;\\\/tr&gt;\\n&lt;\\\/tbody&gt;\\n&lt;\\\/table&gt;\\n&lt;p&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;i&gt;&lt;span&gt;Using tech without cybersecurity is like driving a car without a seatbelt and with no idea of its service history&lt;\\\/span&gt;&lt;\\\/i&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;i&gt;&lt;span&gt;\\u2013 EJ Wise, founder of Wise Law&lt;\\\/span&gt;&lt;\\\/i&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 13, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-217-deep-dive-ej-wise-beyond-policies-creating-a-culture-of-cybersecurity-awareness-and-engagement&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1598685\\\/2b89744f-50b6-4281-9921-c8d37f35500b-KBKAST-EP-EJ-Wise.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;44:41&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1697212838,&quot;key&quot;:&quot;4d74054b89baa50bce46ddd4dd07ce77&quot;},&quot;ppe-4514-187&quot;:{&quot;title&quot;:&quot;Episode 216 Deep Dive: Adam O\\u2019Donnell | Balancing Usability and Complexity: The Eternal Dilemma in Cybersecurity&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Special Forces team commander, Adam O\\u2019Donnell (CEO, Convergence Systems), as we explore the challenges and opportunities faced by SMBs in understanding their cybersecurity needs and finding affordable solutions. Together, we explore the complex ecosystem of cyber and the intricacies in finding the right balance between usability and security, which is no easy feat!&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;As a Special Forces team commander, Adam O\\u2019Donnell successfully led high-performing teams in some of the most hostile and volatile places on earth.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;Looking back, he\\u2019d be the first to agree that his transition into the world of cybersecurity was something of an accident but he soon found that the decision-making, planning and leadership skills that served him so well leading combat operations and peacekeeping missions around the world also paved the way to a very successful corporate career leading cyber resilience uplift programs across government and large enterprise.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;The challenge, he realised, was that his work was actually creating another problem \\u2013 small and medium enterprises were being left behind in the cyber arms race and becoming increasingly vulnerable to attackers who only ever seem to grow in their sophistication and numbers.\\u00a0 As CEO of Convergence Systems, a Melbourne-based startup, he\\u2019s leading the creation of an eXtended Detection &amp; Response system designed specifically for the cloud-based SME market and delivered at a price they can afford.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 11, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-216-adam-o-donnell-balancing-usability-and-complexity-the-eternal-dilemma-in-cybersecurity&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1598686\\\/5478329e-0c0a-483c-9c2c-1ba2eae314ac-KBKAST-EP-Adam-O-Donnell-Final2.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;42:08&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1697040027,&quot;key&quot;:&quot;f9997626da4a6ad00c6fdbac2e9bf9f9&quot;},&quot;ppe-4514-188&quot;:{&quot;title&quot;:&quot;Episode 215 Deep Dive: Edwin Kwan | Navigating the Wild West: Tools and Techniques to Assess the Security and Integrity of Open Source Software&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Edwin Kwan (Head of Application Security and Advisory \\u2013 Tyro Payments), as he sheds light on the meticulous risk acceptance process and shares his insights on using open source software to build applications swiftly with freely available parts. We explore the challenges of ensuring the security of open source software and the need for due diligence when downloading such software. Edwin raises thought-provoking questions about software verification, maintenance, and security, highlighting the tricky balance between maintaining security protocols and accommodating a wide range of individuals in the workplace.&lt;\\\/p&gt;\\n&lt;p&gt;Stay tuned as we examine the potential risks of using open source software and the complexities of explaining security issues to individuals who may not fully grasp their implications. Edwin shares captivating stories and real-life examples, including incidents where businesses chose to accept high-severity risks rather than investing in their mitigation.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span&gt;Edwin a cybersecurity specialist whose approach towards security is to raise awareness, provide light touch controls to the software development life cycle to increase visibility of security issues, and work closely with engineering teams to quickly develop secure applications. &lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;He started out as a software engineer and transitioned into application and information security to lead a range of security initiatives when the company was working towards obtaining an unrestricted banking licence.&lt;\\\/p&gt;\\n&lt;p&gt;He has presented at several events, including RSA, AISA, All Day Dev Ops, AppSec Day, OWASP and DevSecOps Leadership Forums.&lt;\\\/p&gt;\\n&lt;p&gt;Edwin is also a contributing journalist to the It\\u2019s 5:05 Podcast, a daily podcast on open source and cybersecurity news.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 6, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-215-deep-dive-edwin-kwan-navigating-the-wild-west-tools-and-techniques-to-assess-the-security-and-integrity-of-open-source-software&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1598687\\\/4db7e6db-2480-4ee0-91c6-3eb8ac9e742a-KBKAST-EP-215-Edwin-Kwan.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;42:05&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1696608053,&quot;key&quot;:&quot;58da9c73574327d399a378a645c9190a&quot;},&quot;ppe-4514-189&quot;:{&quot;title&quot;:&quot;Episode 214 Deep Dive: Syed Ubaid Ali Jafri | Understanding the Banking Industry: Regulations, PCI DSS Compliance, and Additional Controls Against Breaches&quot;,&quot;description&quot;:&quot;&lt;p&gt;Protecting customer data has become a critical priority for banking and financial institutions worldwide. With the ever-increasing threat landscape and the potential devastating consequences of data breaches, organizations are taking significant steps to enhance their data security measures. In this episode, we dive deep into the world of banking compliance and cybersecurity regulations as Syed Ubaid Ali Jafri brings us his expertise as the (Head of Cyber Defense &amp; Offensive Security \\u2013 HBL), one of the leading banks in Pakistan. Ubaid shares insights on achieving Payment Card Industry Data Security Standard (PCI DSS) compliance, the challenges faced by banks in meeting these strict requirements, and the importance of trust and verification in the zero-trust model. We also explore the banking regulations in Pakistan, the measures taken to reduce the threat landscape and potential attacks, and the additional controls that have significantly reduced breaches.&lt;\\\/p&gt;\\n&lt;p&gt;Ubaid Jafri is a dynamic and talented motivational speaker renowned for his distinctive ability to seamlessly weave real-life experiences into captivating presentations. With over 12 years of invaluable experience in the commercial banking and risk management consultancy sectors, he has carved a niche as an expert in Information Security. His speaking engagements are not only entertaining but also deeply enriching, offering audiences practical insights into real-world work scenarios across diverse industries.&lt;\\\/p&gt;\\n&lt;p&gt;Ubaid Jafri\\u2019s professional journey encompasses leadership roles that define his expertise. Currently serving as the Head of Cyber Defense and Offensive Security at Habib Bank Limited, he previously held the position of Senior Manager Cyber Security &amp; Forensic Technology at KPMG. His proficiency extends to Cyber Defense, Offensive Security, Red Teaming, Cyber Analytics, IoT, Digital Forensics, Incident Handling &amp; Response, and various other crucial areas.&lt;\\\/p&gt;\\n&lt;p&gt;Ubaid Jafri\\u2019s impact on the cybersecurity landscape is marked by a series of achievements that demonstrate his tenacity and expertise. He has conducted numerous communication and cybersecurity intrusions, as well as penetration red-team attacks, for a diverse array of organizations, including utilities, power companies, Banking &amp; Financial Institutions, and more. These proactive initiatives have consistently unearthed critical vulnerabilities, thwarting unauthorized access, system compromises, sensitive information disclosures, and control hijackings. His vigilant approach has significantly contributed to safeguarding organizations from the looming threat of massive cyber breaches.&lt;\\\/p&gt;\\n&lt;p&gt;Ubaid Jafri\\u2019s speaking engagements, fueled by engaging narratives, practical insights, and heroic anecdotes, position him as an exceptional motivational speaker. His mission is to empower audiences with the tools to navigate the digital era confidently, equipped with the knowledge to safeguard against evolving cybersecurity challenges.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 4, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-214-deep-dive-syed-ubaid-ali-jafri-understanding-the-banking-industry-regulations-pci-dss-compliance-and-additional-controls-against-breaches&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1598688\\\/8cc0c659-ec8d-4b8a-98e1-62eb3af3d853-KBKAST-EP-Syed-Ubaid-Ali-Jafri.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;41:34&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1696435238,&quot;key&quot;:&quot;e52c686dd6eb64251e06dc6749837958&quot;},&quot;ppe-4514-190&quot;:{&quot;title&quot;:&quot;Episode 213 Deep Dive: Karissa Breen | Weathering the Storms: KB\\u2019s Secrets to Resilience Against All Odds, Reciprocity in Business, and Building a Legacy&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this bonus episode, we turn the tables around and feature KB as the guest of her own show. Jay Hira (Founder and Executive Director of\\u00a0&lt;a href=\\&quot;https:\\\/\\\/www.linkedin.com\\\/company\\\/makecybersimple\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;MakeCyberSimple&lt;\\\/a&gt;), an industry expert and long-time peer, takes the host\\u2019s seat and asks KB about her rollercoaster journey into the industry. From a belief in the transformative power of challenges to the importance of consistency and evolution, KB has navigated the ups and downs of entrepreneurship with determination. With gratitude for the support she\\u2019s given and the invaluable life lessons learned along the way, KB reflects on the wild and crazy ride of building her business and her brand. Join us as we delve into the power of perseverance, the impact of recognizing and believing in one\\u2019s identity, and the unwavering commitment to continual (and sometimes gradual) improvement. Get ready for an inspiring and honest conversation about triumphs, setbacks, and the exhilarating unpredictability of the entrepreneurial path.&lt;\\\/p&gt;\\n&lt;p&gt;Karissa Breen, more commonly known as KB, is a serial entrepreneur that founded KBI.Media, the independent &amp; agnostic global cybersecurity media company. KB has been crowned LinkedIn Top Voice in Technology. KB is a Cybersecurity Investigative Journalist that hosts the flagship podcast, KBKast, interviewing cybersecurity practitioners from around the globe about security and the problems business executives face.&lt;\\\/p&gt;\\n&lt;p&gt;KB is known for asking hard-hitting questions and getting real answers from her guests, providing a unique yet neutral position on these topics. KB is also the Producer &amp; Host of the streaming show, 2Fa.tv, where she asks questions to demystify the world of cybersecurity, providing insight into the world of security to business executives, and focuses on the downstream impacts these cybersecurity events have on our markets.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 29, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-213-deep-dive-karissa-breen-weathering-the-storms-kbs-secrets-to-resilience-against-all-odds-reciprocity-in-business-and-building-a-legacy&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/a254f72a-eb5d-4feb-8504-864699ddf14b-KBKAST-EP-Karissa-Breen.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;47:09&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1696003244,&quot;key&quot;:&quot;24798946c806f9540e06722ecfd17976&quot;},&quot;ppe-4514-191&quot;:{&quot;title&quot;:&quot;Episode 212 Deep Dive: Nathan Wenzler | Cybersecurity\\u2019s Prominent Place in the ESG Conversation: Protecting the Planet and Society&quot;,&quot;description&quot;:&quot;&lt;p&gt;As the world starts focusing on sustainability and ethical business practices intensifies, organizations are increasingly embracing ESG initiatives to demonstrate their commitment to the environment, social responsibility, and good governance. While ESG programs encompass a wide range of considerations, one aspect that should not be overlooked is cybersecurity. In today\\u2019s digital age, the integration of technology and cybersecurity is paramount to the success and integrity of ESG programs. In this episode, we discuss the intersection of technology and ESG, highlighting how cybersecurity protects against potential damage and disruption to green energy production and efficiency improvement. Additionally, we address the growing demand for ethical behavior from companies, the risks of focusing solely on media attention and neglecting proper security practices, and how breaches in trust can have long-lasting negative effects on reputation.&lt;\\\/p&gt;\\n&lt;p&gt;ESG initiatives were among the winners in this year\\u2019s Federal Budget, with $4 billion in new funding commitments aimed at accelerating Australia\\u2019s clean energy sector. However, it is important for businesses to not overlook cybersecurity as a crucial component of their ESG strategy moving forward. While companies often prioritise social and environmental initiatives, they tend to neglect cybersecurity in those areas, viewing it as only a part of the governance initiative. It\\u2019s often left to regulators or insurance providers to handle, despite the fact that cyberattacks can have a direct material impact on social and environmental matters whether through critical infrastructure compromise, data privacy violations, the loss of social trust and other impacts to partner organisations. The risk from cyberattacks can then result in potentially weakening every aspect of an ESG strategy, and not solely in technical matters or governance.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 28, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-212-deep-dive-nathan-wenzler-cybersecuritys-prominent-place-in-the-esg-conversation-protecting-the-planet-and-society&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1598689\\\/3426cbdd-0445-480d-b92b-94bcb1d870bd-KBKAST-EP-Nathan-Wenzler.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;45:57&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1695916814,&quot;key&quot;:&quot;51c3896403b1cddee3ee479a3b377456&quot;},&quot;ppe-4514-192&quot;:{&quot;title&quot;:&quot;Episode 211 Deep Dive: Fernando Serto | AI in the Hot Seat: Examining the Unknown Threats, Mitigating Risks, and Exploring Opportunities in Cybersecurity&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this deep dive, we are joined by Fernando Serto, Chief Technologist and Evangelist of Cloudflare. With a deep understanding of the potential risks posed by accelerating climate change and fast-paced advancements in artificial intelligence (AI), he advocates for a careful and balanced approach to development. Fernando emphasizes the need to reflect on the consequences of our actions and the urgency to reduce our carbon footprint. He highlights the interconnectedness of today\\u2019s world, where people increasingly rely on AI-powered devices. While acknowledging the potential risks associated with AI, he believes that we are not yet at the point of no return. As an advisor, Fernando encourages individuals and organizations to exercise caution and approach AI development with a sense of responsibility. He highlights the positive aspects of AI when implemented correctly, emphasizing its ability to simplify and enhance our lives. Finally, we also uncover the importance of patching vulnerabilities quickly, the need for better cybersecurity practices, and the challenges faced by organizations in securing their networks.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Fernando Serto \\u2013 Field CTO for Asia Pacific, Japan and China at Cloudflare \\u2013 is a highly qualified IT and Security expert with over 27 years of work experience. Fernando has held a variety of technical positions during his career, including Web Development, Unix, Networking, and Security. Fernando had the privilege of being involved with offensive security in the beginning of his career, and as a result, he has since gained a thorough understanding of both offensive and defensive security methods.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Fernando has spent the last ten years working with top technology vendors, where he has established a reputation for his skill in explaining difficult technical security issues to both technical and non-technical audiences. He has a demonstrated history of assisting Product and Engineering teams in creating cutting-edge security solutions based on client input.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Fernando is dedicated to remaining on the cutting edge of new security technology and has a thorough understanding of how businesses can use security to achieve their goals. He is passionate about assisting businesses in creating and putting into practise security plans that allow them to safeguard their assets and accomplish their objectives in the rapidly changing security environment of today.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 22, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-211-deep-dive-fernando-serto-ai-in-the-hot-seat-examining-the-unknown-threats-mitigating-risks-and-exploring-opportunities-in-cybersecurity&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1598690\\\/2035bdc1-e566-4e3a-95ff-259e9316470e-KBKAST-EP-Fernando-Serto.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:02&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1695398403,&quot;key&quot;:&quot;364f0350aaa25030292050f5844bc7fe&quot;},&quot;ppe-4514-193&quot;:{&quot;title&quot;:&quot;Episode 210 Deep Dive: Mike Mengell | Strategic Secure Coding: Matching Skilled Problem Solvers to the Right Challenges&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Mike Mengell (CTO &amp; Co-Founder \\u2013 CTO Labs) as we dive deep into the challenges and solutions in the security specialist field, with a spotlight on the APAC region.&lt;\\\/p&gt;\\n&lt;p&gt;Mike is a passionate technologist.&lt;\\\/p&gt;\\n&lt;p&gt;He has over 20 years experience within IT and has worked in both corporate and start-up environments, often adapting technical engineering practices to varying clients, cultures and product requirements.&lt;\\\/p&gt;\\n&lt;p&gt;Mike has a keen understanding that successful teams are a culmination of culture, behaviours, technology, architecture and development techniques. One particular area of interest is the challenge for tech leaders \\u2013 and pragmatic strategies available to them across people, platforms and processes \\u2013 in pursuing a deeply secure, fast and productive core engineering capability, critical for enterprise cyber resilience today.&lt;\\\/p&gt;\\n&lt;p&gt;Mike is highly proficient in a range of software engineering practices and has held the role of CTO in a number of companies. He believes in removing waste through repeatable processes and automation.&lt;\\\/p&gt;\\n&lt;p&gt;Mike believes in contributing positively to those around him.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 20, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-210-deep-dive-mike-mengell-strategic-secure-coding-matching-skilled-problem-solvers-to-the-right-challenges&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/920d0df5-15ac-49f1-86a9-9a9f9e7e471d-KBKAST-EP-210-Mike-Mengell-1.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;47:19&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1695225620,&quot;key&quot;:&quot;252fba07402d631ee6fbeb951743468f&quot;},&quot;ppe-4514-194&quot;:{&quot;title&quot;:&quot;Episode 209 Deep Dive: Rock Lambros | Business Fundamentals, Communication Strategies, and CFO Engagement: Exploring the Evolving Role of CISOs&quot;,&quot;description&quot;:&quot;&lt;p&gt;Kyriakos \\u201cRock\\u201d Lambros is the CEO and Founder of RockCyber. He is a seasoned Cybersecurity and Information Technology executive with expertise in aligning Cybersecurity and technology strategy with enterprise business goals to reduce the risk of revenue to the organization. This experience includes building multi-framework security programs, policy and standards development, architecture, operations, threat intelligence, governance, risk management, compliance, and incident response for (multi-billion dollar) global organizations with exceptional security and requirements. The frameworks Rock has supported include the NIST Cybersecurity Framework, CMMC, NERC\\\/CIP, NIST 800-53, NIST 800-171, NIST 800-207 (Zero Trust), ISO 27001, SOC2, PCI, and others. Rock\\u2019s enterprise experience has spanned industries with vastly differing security and privacy requirements, including energy, eCommerce, government, banking, and manufacturing.&lt;\\\/p&gt;\\n&lt;p&gt;Rock has served in several senior Cybersecurity and technology roles for global, multi-billion-dollar companies such as MPLX (a subsidiary of Marathon Petroleum Corporation), eBay, Honeywell, General Dynamics Information Technology, Wells Fargo, and Agilent Technologies. He built security programs from the ground up on multiple occasions. Rock was a pivotal contributor to M&amp;A activities at numerous companies, including eBay\\u2019s acquisition of Shopping.com and Skype and Marathon Petroleum Corporation\\u2019s acquisition of MarkWest Energy Partners. Rock oversaw multi-million dollar budgets, led successful defenses against highly-publicized denial-of-service attacks, and built and managed large Security and Network Operations Centers.&lt;\\\/p&gt;\\n&lt;p&gt;Rock serves on the board of several stealth-mode startups as a corporate strategy and Cybersecurity advisor. He is also a member of the Secure Smart Cities Advisory Board at the National Cybersecurity Center and co-chaired the Rocky Mountain Information Security Conference from 2015 to 2017,&lt;\\\/p&gt;\\n&lt;p&gt;A sought-after speaker, Rock has spoken at the annual RSA Security conference, which is the Cybersecurity industry\\u2019s seminal yearly event. He has also spoken at the CIO Energy Summit, the Future of Data Security conference, the American Council for Technology, the ISSA CISO Mentorship series, and several industry association chapter meetings.&lt;\\\/p&gt;\\n&lt;p&gt;Rock is a member of ISSA, ISC2, the Cloud Security Alliance, and OWASP. He graduated with an MBA in Finance and Entrepreneurship from Arizona State University and received his BS in Management Information Systems from the University of Nevada, Las Vegas.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 15, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-209-deep-dive-rock-lambros-business-fundamentals-communication-strategies-and-cfo-engagement-exploring-the-evolving-role-of-cisos&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1598691\\\/12cc6cf7-6293-41aa-a712-e30900aed1a4-KBKAST-EP-Rock-Lambros.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;38:32&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1694793630,&quot;key&quot;:&quot;51c6516e2f61e09ca88c60f9ef7ed50c&quot;},&quot;ppe-4514-195&quot;:{&quot;title&quot;:&quot;Episode 208 Deep Dive: Ben Doyle | Purposeful Leadership: Essential Conversations Cyber Executives Should Focus On&quot;,&quot;description&quot;:&quot;&lt;p&gt;Ben is an accomplished information security executive with over 20 years of international information security experience. Due to his many years of providing strategic C-level\\\/board advice, he is able to apply technical threats into appropriate business contexts to determine overall risk to organisations. During this time Ben has been required to manage complex environments that requires balancing local and global organisational policies, domestic regulations, national security requirements, export control and international trade control restrictions, and applying the process, people and technology to ensure successful compliance.&lt;\\\/p&gt;\\n&lt;p&gt;Ben maintains his strong passion for the technical aspects of information security and recently has been focusing on creating new business opportunities by working across the breath of the global organisation\\u2019s capabilities while teaming and supporting small innovative start up technology companies.&lt;\\\/p&gt;\\n&lt;p&gt;Ben speaks regularly at international, interstate and local conferences, seminars and round tables&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 13, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-208-deep-dive-ben-doyle-purposeful-leadership-essential-conversations-cyber-executives-should-focus-on&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1598692\\\/e3c8cf70-a932-4dba-83ae-cc6f85d850fc-KBKAST-EP-Ben-Doyle.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;43:03&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1694620837,&quot;key&quot;:&quot;8cd0e5a7a7ca6cbd03cb6a4635316d44&quot;},&quot;ppe-4514-196&quot;:{&quot;title&quot;:&quot;Episode 207 Deep Dive: Mark Anderson | Staying Ahead of the Game: Cyber Preparedness for Executives&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Mark Anderson (National Security Officer \\u2013 Microsoft ANZ), as we dive deep into the challenges that executives face in today\\u2019s ever-evolving landscape. We discuss the importance of picking the right sources for insights, the non-IT ramifications of incidents, and the need for transparency and communication in the face of cyber attacks. Mark also shares his expertise on the commercialization of cybercrime, human-operated ransomware, and business email compromise that affect both small businesses and large enterprises. We also touch on the true cost of cybercrime and the importance of resilience-building through drills and scenario practice.&lt;\\\/p&gt;\\n&lt;p&gt;Mark has over 28 years\\u2019 experience in the IT industry with 18 of those at Microsoft in various roles across the globe. As the National Security Officer for Microsoft Australia &amp; New Zealand, Mark is responsible for working with customers, partners, governments, and industry regulators to ensure that the Microsoft platforms are not only understood by policymakers but also adhere to their security, compliance and risk management requirements. In addition, Mark is accountable for the PROTECTED level assessment of Azure, Office 365, and Dynamics. Mark holds a Master of Cyber Security degree with high distinction from Edith Cowan University and is a Visiting Associate Professor at Macquarie University.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 8, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-207-deep-dive-mark-anderson-staying-ahead-of-the-game-cyber-preparedness-for-executives&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1598693\\\/8cd42831-872e-4f1c-aa9b-6e9f7b61c838-KBKAST-EP-Mark-Anderson.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;42:15&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1694188807,&quot;key&quot;:&quot;075c2fa7610ca272aa5d09be329c6d85&quot;},&quot;ppe-4514-197&quot;:{&quot;title&quot;:&quot;KB On The Go: Expert Insights from the Tech Leaders Media and Journalism Conference&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this bonus episode, KB is on the go at the 2023 Tech Leaders Media and Journalism Conference, where she sits down for quickfire interviews with industry experts and gets their insights on hot topics in the media and cyber space. In this special segment, we are joined by the following experts:&lt;\\\/p&gt;\\n&lt;ol&gt;\\n&lt;li&gt;Phil Sim \\u2013 CEO, Influencing&lt;\\\/li&gt;\\n&lt;li&gt;Anthony Woodward \\u2013 CEO, Logicalis Australia&lt;\\\/li&gt;\\n&lt;li&gt;Zach Zeus \\u2013 CEO, BizCubed&lt;\\\/li&gt;\\n&lt;li&gt;Matt Hurford \\u2013 Managing Director \\u2013 Australia &amp; New Zealand, NetApp&lt;\\\/li&gt;\\n&lt;li&gt;Kurt Hansen \\u2013 CEO, Tesserent&lt;\\\/li&gt;\\n&lt;li&gt;Stela Solar \\u2013 Director, National Artificial Intelligence Centre&lt;\\\/li&gt;\\n&lt;\\\/ol&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 7, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/kb-on-the-go-expert-insights-from-the-tech-leaders-media-and-journalism-conference&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/93fd9203-6096-40b8-aba2-56855e798453-KB-On-The-Go-Tech-Leaders-Conference.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;38:27&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1694084434,&quot;key&quot;:&quot;5b89b1bb4c407442aef4921724895cfd&quot;},&quot;ppe-4514-198&quot;:{&quot;title&quot;:&quot;Episode 206 Deep Dive: Gergana Winzer | From Fragmentation to Integration: Collaborative Solutions for a  Secure Cyber Future&quot;,&quot;description&quot;:&quot;&lt;p&gt;An IT and cybersecurity professional, Gergana works with clients to develop creative approaches to reduce their cyber and data security risks. She assists organisations to improve their cyber security posture and supports them to achieve cyber resilient outcomes. Gergana believes that cyber is a business enabler; an intrinsic part of developing the business that can help organisations become more competitive in today\\u2019s world.&lt;\\\/p&gt;\\n&lt;p&gt;Gergana is an experienced and respected member of the cybersecurity community in Australia and Asia and an engaging keynote and public speaker on cyber security and privacy matters, risks and issues to the business community. In her spare time, she mentors young professionals and is an advocate for diversity.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to KPMG, Gergana worked for a global IT solutions company as Industry Director Cyber Security for the Asia Pacific region. She was a member of the Australian Information Security Association (AISA) national board and ISACA Sydney board.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 6, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-206-deep-dive-gergana-winzer-from-fragmentation-to-integration-collaborative-solutions-for-a-secure-cyber-future&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/e2dd58e8-3fe7-4b81-8697-271fc49be459-KBKAST-EP-Gergana-Winzer.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:14&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1694016016,&quot;key&quot;:&quot;81c558367530f85aab4baa6b772aa6d9&quot;},&quot;ppe-4514-199&quot;:{&quot;title&quot;:&quot;Episode 205 Deep Dive: Phillip Campbell | Unlocking Your Cyber Mind: Using Brain Science to Approach Security Training Differently&quot;,&quot;description&quot;:&quot;&lt;p style=\\&quot;font-weight:400\\&quot;&gt;Phillip is the CEO of enigmaFIT, a global brain coaching and training company. He has a Master of Cognitive Science and is committed to developing cognitive excellence for clients. Over the past 25 years, he has provided his programs to Fortune 500 executives and entrepreneurs in the USA, Europe, and Asia-Pacific.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;The enigmaFIT program is based on over 50 years of research into the CHC Theory of Human Cognitive Abilities. It creates Brain Balance, where the conscious mind and subconscious brain work together to optimally increase an individual\\u2019s cognitive capability, a very important aspect in the cybersecurity space.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;Phillip is a USA Today and Wall Street Journalist best-selling Author for his contribution to \\u2018Habits of Success\\u2019 and has just completed his new work, \\u2018Brain Habits: The Science of Subconscious Success\\u2019 which has reached Amazon #1 Best Seller in Developmental Biology&lt;\\\/p&gt;\\n&lt;p class=\\&quot;m_-7812065148990480490Default\\&quot;&gt;&lt;b&gt;Purchasing book&lt;\\\/b&gt;\\u00a0\\u2013 Brain Habits: The Science of Subconscious Success. Click on this Amazon link:\\u00a0&lt;a href=\\&quot;https:\\\/\\\/www.amazon.com\\\/Brain-Habits-Science-Subconscious-Success-ebook\\\/dp\\\/B0BNXRMMPJ\\\/ref=tmm_kin_swatch_0?_encoding=UTF8&amp;qid=1689049309&amp;sr=8-1\\&quot; target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;Brain Habits Book&lt;\\\/a&gt;&lt;u&gt;&lt;\\\/u&gt;&lt;u&gt;&lt;\\\/u&gt;&lt;\\\/p&gt;\\n&lt;p class=\\&quot;m_-7812065148990480490Default\\&quot;&gt;&lt;b&gt;To understand more about your Focused Thinking capability, try Phillip\\u2019s free assessment:&lt;\\\/b&gt;\\u00a0\\u00a0&lt;a href=\\&quot;https:\\\/\\\/www.enigmafit.com\\\/focusedtest\\&quot; target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;Complimentary Focused Thinking Assessment&lt;\\\/a&gt;&lt;u&gt;&lt;\\\/u&gt;&lt;u&gt;&lt;\\\/u&gt;&lt;u&gt;&lt;\\\/u&gt;&lt;u&gt;&lt;\\\/u&gt;&lt;\\\/p&gt;\\n&lt;p class=\\&quot;m_-7812065148990480490Default\\&quot;&gt;&lt;b&gt;To contact Phillip Campbell, email&lt;\\\/b&gt;:\\u00a0&lt;a href=\\&quot;mailto:info@enigmafit.com\\&quot; target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;info@enigmafit.com&lt;\\\/a&gt;\\u00a0or visit website:\\u00a0&lt;a href=\\&quot;https:\\\/\\\/www.enigmafit.com\\\/\\&quot; target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;www.enigmaFIT.com&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 1, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-205-deep-dive-phillip-campbell-unlocking-your-cyber-mind-using-brain-science-to-approach-security-training-differently&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/0dd053dc-4733-4f79-8309-7dc66e7e8454-KBKAST-EP-Phillip-Campbell-edited.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:20&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1693584025,&quot;key&quot;:&quot;e33944c59c7bf05cd11edee473746191&quot;},&quot;ppe-4514-200&quot;:{&quot;title&quot;:&quot;Episode 204 Deep Dive: Kurt Hansen | Discussing the Three Major Pillars and Envisioning The World\\u2019s Most Cyber Secure Country by 2030&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, we are joined by Kurt Hansen (CEO \\u2013 Tesserent) as we dive deep and envision Australia as the world\\u2019s most cyber secure country by 2030. Kurt addresses the three major pillars when formulating and implementing strategies, and highlights that there is no silver bullet here \\u2013 we are doing the best we can but keeping the conversation going is also key.&lt;\\\/p&gt;\\n&lt;p&gt;Kurt is the CEO of Australi\\u2019a largest ASX listed cybersecurity company,\\u00a0 Tesserent Limited (ASX: TNT).&lt;\\\/p&gt;\\n&lt;p&gt;Kurt previously lead the Security Division at PS+C Group ASX:PSZ. Prior to that, Kurt was responsible at Tesserent ASX:TNT for defining the start up Sales Strategy GTM and building the initial team at Tesserent a newly listed ASX company.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to Tesserent, Kurt was at Check Point Software responsible for $80MAUD Cyber Security Solution Sales and Services in Australia and New Zealand.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to Check Point, Kurt was MD at F5 Networks for almost 5 years and grew the local subsidiary from $20m to $75m during 2009 to 2013, and the team from 17 to 70 people. In FY 2010\\\/11 A\\\/NZ was rated as the fastest growing subsidiary globally and has the highest attach rate of advanced application software and security solutions.&lt;\\\/p&gt;\\n&lt;p&gt;In 2011\\\/12 he also led the Carrier and Service\\\/Cloud provider virtual sales team across Asia Pacific and Japan.&lt;\\\/p&gt;\\n&lt;p&gt;Hansen\\u2019s career in the IT industry spans over 20 years. Before joining F5, Hansen was the CEO of AirData Pty Ltd, where he grew top line revenues by 250 percent in over 18 months.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to AirData, he gained extensive sales and operational leadership experience while at Symbol Technologies, Telstra Wholesale, Cisco Systems, and Ericsson. In these positions he was responsible for increasing revenue and managing costs whilst building a senior high performing sales and delivery team.&lt;\\\/p&gt;\\n&lt;p&gt;Hansen commenced his career in IT as an Army Apprentice and later as an officer in the Royal Australian Signal Corps, finishing with the commissioned rank of Captain.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;August 30, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-204-deep-dive-kurt-hansen-discussing-the-three-major-pillars-and-envisioning-the-worlds-most-cyber-secure-country-by-2030&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2b9e0a61-e66c-49fb-99dd-5af8f214f2d6-KBKAST-EP-Kurt-Hansen-V2.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;41:58&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1693411213,&quot;key&quot;:&quot;84c7fd6dd90bfe3a0c491fb1f609d255&quot;},&quot;ppe-4514-201&quot;:{&quot;title&quot;:&quot;Episode 203 Deep Dive: Chester Wisniewski | Understanding the Modern Ransomware Era: The Impact on Organisations and the Urgency for Awareness and Preparation&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode of KBKast, we are joined by Chester Wisniewski as we dive deep into the modern era of ransomware and discuss the &lt;a href=\\&quot;https:\\\/\\\/www.sophos.com\\\/en-us\\\/content\\\/state-of-ransomware\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;2023 Ransomware Report&lt;\\\/a&gt; by Sophos. We delve into the ever-evolving challenges of negotiating with cybercriminals for encryption keys, the high cost of recovery, and the potential loss of data even if ransom is paid. Chester also imparts insights on the role of cyber insurance and its implications, and ultimately, highlights that preparation is key to prevention. It is high time for organisations to invest in infrastructure and to stay vigilant to limit any type of future damage and to protect sensitive information.&lt;\\\/p&gt;\\n&lt;p class=\\&quot;paragraph\\&quot;&gt;&lt;span class=\\&quot;normaltextrun\\&quot;&gt;Chester Wisniewski is a field chief technology officer in applied research at next-generation security leader Sophos. With more than 20 years of professional experience, &lt;\\\/span&gt;&lt;span class=\\&quot;eop\\&quot;&gt;\\u00a0&lt;\\\/span&gt;&lt;span class=\\&quot;normaltextrun\\&quot;&gt;Chester analyses the massive amounts of attack data gathered by SophosLabs to distill and share relevant information in an effort to improve the industry\\u2019s understanding of evolving threats, attacker behaviours and effective security defences. He\\u2019s\\u202fhelped organisations design enterprise-scale defence strategies, served as the primary technical lead on architecting Sophos\\u2019 first email security appliance, and consulted on security planning with some of the largest global brands.&lt;\\\/span&gt;&lt;span class=\\&quot;eop\\&quot;&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p class=\\&quot;paragraph\\&quot;&gt;&lt;span class=\\&quot;normaltextrun\\&quot;&gt;Chester regularly speaks at industry events, including RSA Conference, Virus Bulletin, Security BSides (Vancouver, London, Wales, Perth, Austin, Detroit, Los Angeles, Boston, and Calgary) and others. He\\u2019s widely recognised as one of the industry\\u2019s top security researchers and is regularly consulted by press, appearing on BBC News, ABC, NBC, Bloomberg, CNBC, CBC, NPR, and more.&lt;\\\/span&gt;&lt;span class=\\&quot;eop\\&quot;&gt;\\u00a0 &lt;\\\/span&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;August 23, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-203-deep-dive-chester-wisniewski-understanding-the-modern-ransomware-era-the-impact-on-organisations-and-the-urgency-for-awareness-and-preparation&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/87082fc3-ae5d-4247-94ad-79877e66be00-KBKAST-EP-Chester-Wisniewski.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:15&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1692806403,&quot;key&quot;:&quot;87c44ff4e0b2467725b15e7a0dd76d86&quot;},&quot;ppe-4514-202&quot;:{&quot;title&quot;:&quot;Episode 202 Deep Dive: Kavitha Mariappan | No Sector Is Safe: The Importance of Ransomware Awareness and Protection Across Industries&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode of KBKast, we are joined by Kavitha Mariappan, as we dove deep into the ever-evolving sophistication of ransomware attacks and consequently, the growing importance of budget and resource allocation for cybersecurity, strategy reassessments, and intentional actions based on cybersecurity reports, such as Zscaler\\u2019s 2023 Ransomware Report. We discuss how no sector is exempt from attacks, and that while historically, industries like finance and healthcare are targeted, arts, entertainment, education, manufacturing, and even the maritime sector are not immune. Organizations across these industries must recognize the value of information they hold and take steps to protect it.&lt;\\\/p&gt;\\n&lt;p&gt;Kavitha Mariappan is Executive Vice President of Customer Experience and Transformation at Zscaler. With more than 20 years of technology and go-to-market experience, she is responsible for driving transformation and innovation across all facets of the company\\u2019s business, customers, strategy, products, and operations&lt;\\\/p&gt;\\n&lt;p&gt;&lt;a href=\\&quot;https:\\\/\\\/kbi.media\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/zscaler-threatlabz-ransomware-report-R5-27Jun23.pdf\\&quot;&gt;Read the entire 2023 Ransomware Report by Zscaler here&lt;\\\/a&gt;.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;August 16, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-202-deep-dive-kavitha-mariappan-no-sector-is-safe-the-importance-of-ransomware-awareness-and-protection-across-industries&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/e68e684f-397e-4c44-81e1-e1798b17a902-KBKAST-EP-Kavitha-Mariappan.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;30:44&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1692201606,&quot;key&quot;:&quot;69ff1d12ccb099f63b5d8d15baa06bc8&quot;},&quot;ppe-4514-203&quot;:{&quot;title&quot;:&quot;Episode 201 Deep Dive: Glenn Maiden | A Cyber Defense Mission: Uniting Stakeholders and Sharing Expertise&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode of KBKast, we are joined by Glenn Maiden, as we dive deep into the gaps of cyber and shine the light on the importance of connections \\u2013 between cybersecurity professionals, businesses, government agencies, law enforcement, and other stakeholders. We uncover challenges faced by the industry and how strategic investments, shared expertise, and tactical partnerships can be used to make the lives of cybercriminals a lot more difficult.&lt;\\\/p&gt;\\n&lt;p&gt;Glenn Maiden is the director of threat intelligence operations at Fortinet\\u2019s FortiGuard Labs Australia and New Zealand. Glenn has more than 20 years\\u2019 experience in different roles across the technology sector with a solid background in defence, federal cybersecurity, and Australian intelligence. Glenn\\u2019s role with FortiGuard Labs focuses on sharing threat intelligence to help organisations protect against current and emerging threats with advanced security technologies such as artificial intelligence, intrusion prevention, antivirus, and email security.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;August 11, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-201-deep-dive-glenn-maiden-a-cyber-defense-mission-uniting-stakeholders-and-sharing-expertise&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/ced6d5dd-7df0-4b9c-9005-5d913cee212d-KBKAST-EP-Glenn-Maiden.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;34:26&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1691769615,&quot;key&quot;:&quot;2c54f80e2775cdd5c03f36674ab1b178&quot;},&quot;ppe-4514-204&quot;:{&quot;title&quot;:&quot;Episode 200 Deep Dive: Phil Rodrigues | Safeguarding the Cloud: AWS\\u2019s Approach to Security, Best Practices, and Customer Responsibilities&quot;,&quot;description&quot;:&quot;&lt;p&gt;In the 200th episode of KBKAST, we are joined by Phil Rodrigues (Head of Security, AWS, APJ Commercial) as we highlight key facts about security in the cloud, including the importance of strong identity measures like MFA, the need for organizations to prioritize security culture, and the role of AWS in providing guidance, security tools, and partner services to help customers make informed security decisions. Phil also touches on the responsibilities of both AWS and customers in ensuring security, and we explore the larger context of cloud technology in the current climate of the technology landscape.&lt;\\\/p&gt;\\n&lt;p&gt;Phil works with AWS customers across Asia-Pacific to improve their security, risk, and compliance in the cloud. He is an information security professional with over 20 years of experience working in top tier research, military, finance and corporate environments in the US, Europe and Asia-Pacific. Before AWS, Phil worked as an Information Operations Specialist in the US Army, as a Penetration Tester on Wall Street and as the regional Vice-President for a global managed security provider.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;August 4, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-200-deep-dive-phil-rodrigues-safeguarding-the-cloud-awss-approach-to-security-best-practices-and-customer-responsibilities&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/5dbc5d9c-23f4-443e-b4a7-0762030cbb84-KBKAST-EP-Phil-Rodrigues.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;35:37&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1691143207,&quot;key&quot;:&quot;a1c843e77ba7daa1fdbf3a2e323bcae4&quot;},&quot;ppe-4514-205&quot;:{&quot;title&quot;:&quot;Episode 199 Deep Dive: Wayne Williamson | Navigating Agile Environments, Executive Involvement, and Risk Prioritisation&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode of KBKast, Wayne Williamson shares his insights on agile security structures and the importance of prioritizing cybersecurity within organizations. Wayne also highlights the challenges of navigating traditional, centralized structures and emphasizes the need for organizations to pivot and make tweaks to their structures and approaches when undergoing transformation.&lt;\\\/p&gt;\\n&lt;p&gt;Wayne Williamson joined Equifax in August 2020. Wayne has over 20 years\\u2019 experience across Information Security and Cyber Resilience spanning large financial organisations within Australia, UK and Europe.&lt;\\\/p&gt;\\n&lt;p&gt;An experienced executive, Wayne is passionate about delivering the right level of oversight, being pragmatic in addressing threats \\u2013 without compromising cost and user experience, as well as embedding a culture of information security protection \\u2018by design\\u2019 that delivers measured business value and buys-down risk in a cost-effective manner.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to joining Equifax, Wayne held senior roles at Allianz Australia as the Chief Information Security Officer, the Commonwealth Bank of Australia as an Executive Security Officer and abroad at KPMG (UK) and Royal Dutch Shell (UK\\\/Netherlands) as a Security Executive advisor focusing on information protection, business resilience and cyber strategy delivery.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 26, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-199-deep-dive-wayne-williamson-navigating-agile-environments-executive-involvement-and-risk-prioritisation&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/dffa991f-ac54-48aa-872f-c519f9f3700e-KBKAST-EP-Wayne-Williamson.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;39:36&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1690387203,&quot;key&quot;:&quot;1b06d1f8b75cdc10c245454135453908&quot;},&quot;ppe-4514-206&quot;:{&quot;title&quot;:&quot;Episode 198 Deep Dive: Pancho Mehrotra | The Path to Improved Sales Performance&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode of KBKast, we are joined by Pancho Mehrotra as we delve into the key to sales success and why accepting rejection is crucial. Pancho discusses the importance of focusing on the process of having meaningful conversations and qualifying clients, rather than just aiming for immediate results. Drawing on the analogy of competitive sports, he highlights the significance of learning from losses and practicing to improve.&lt;\\\/p&gt;\\n&lt;p&gt;Pancho Mehrotra, sales and negotiator trainer, has been helping business leaders and sales teams take their businesses to new levels of sales success since 1991. Pancho is a sales and communications expert who brings a unique set of skills, training, and experience to the table. He is the most experienced and results oriented trainer and has developed his own proprietary sales method that uses psychology and negotiation with amazing results.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Pancho has:&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;ul&gt;\\n&lt;li&gt;Over 30 years of hands-on sales and training experience&lt;\\\/li&gt;\\n&lt;li&gt;Trained over 5,000 salespeople&lt;\\\/li&gt;\\n&lt;li&gt;Set records for selling in past sales positions (in the insurance industry, he sold over 100 policies in one week!)&lt;\\\/li&gt;\\n&lt;li&gt;Personally, made over 220,000 cold calls in his career&lt;\\\/li&gt;\\n&lt;li&gt;Developed his own Emotional Intelligence profiling tool&lt;\\\/li&gt;\\n&lt;li&gt;His clients have sold over $146 billion in goods and services&lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&lt;p&gt;Additionally, he has a background in Cognitive Behavioural Therapy and went to Harvard Business School to undertake a specialised course in Negotiation.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 21, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-198-deep-dive-pancho-mehrotra-the-path-to-improved-sales-performance&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/8688bb14-fa63-4e9d-9656-310da3335c59-KBKAST-EP-Pancho-Mehrotra.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;45:30&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1689955252,&quot;key&quot;:&quot;91a5d6431ee8722134e38055ded7c40b&quot;},&quot;ppe-4514-207&quot;:{&quot;title&quot;:&quot;Episode 197 Deep Dive: Vaile Mexted | The Immediate, Irrevocable, and Unstoppable Rise of Real-Time Payments&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode of KBKast, we are joined by Vaile Mexted as we delve into the world of real-time payments and the rapid growth of digital payment options. Vaile discusses the evolving customer expectations and the need for banks to invest heavily in digital tools to stay ahead of fraud and scam risks, and\\u00a0 the importance of building trust in the fraud, cyber, and scam space, and how banks can effectively manage the customer experience while ensuring security.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;&lt;strong&gt;Vaile Mexted is the New Zealand Country Manager for FICO\\u00a0&lt;\\\/strong&gt;and Senior Account Director for the Australian market. He has over 25 years\\u2019 experience across the technology and financial services sectors delivering enterprise data and analytic solutions, with a particular focus on credit risk management. He is an evangelist for the power of enterprise-wide analytics and decision management, and works to deliver true business value to leading organisations across New Zealand and Australia and their customers. Vaile joined FICO from the Bank of New Zealand, where he was Manager Decision Strategy and then Retail Models programme manager. Based in Wellington, New Zealand, Vaile holds both commerce and science degrees, with a focus on decision management, statistics and operations research.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;Founded in 1956, FICO is a pioneer in the use of predictive analytics, AI and data science to improve operational decisions.\\u00a0As a unified platform for fraud and compliance, Fraud Prevention on the FICO Platform helps financial institutions detect and\\u00a0prevent criminal activity before real-time transfer occurs.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 19, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-197-deep-dive-vaile-mexted-the-immediate-irrevocable-and-unstoppable-rise-of-real-time-payments&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1598694\\\/493da1ff-b589-4c15-9b6f-3330fcf09970-KBKAST-EP-Vaile-Mexted.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;36:12&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1689782443,&quot;key&quot;:&quot;b361c62746fcc8ba294a406e63721a14&quot;},&quot;ppe-4514-208&quot;:{&quot;title&quot;:&quot;Episode 196 Deep Dive: James Maude | 2023 Microsoft Vulnerabilities Report: Mindsets, Innovations,  and Future Evolution&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode of KBKast, we are joined by James Maude as we dive deep into the 2023 Microsoft Vulnerabilities report. James talks about the rapid increase of vulnerabilities, the impact of the COVID-19 pandemic, as well as a societal technological shift and concerns about foundational security measures and fundamental knowledge.&lt;\\\/p&gt;\\n&lt;p&gt;You can read the full 2023 Microsoft Vulnerabilities report\\u00a0&lt;a href=\\&quot;https:\\\/\\\/www.beyondtrust.com\\\/resources\\\/whitepapers\\\/microsoft-vulnerability-report\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;&lt;strong&gt;here.&lt;\\\/strong&gt;&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;James Maude is Lead Cyber Security Researcher at BeyondTrust, the worldwide leader in intelligent identity and access security.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;James has broad experience in security research, conducting in-depth analysis of malware and cyber threats to identify attack vectors and trends in the evolving security landscape. His background in forensic computing and active involvement in the security research community makes him an expert voice on cybersecurity. He regularly presents at international events and hosts webinars to discuss threats and defense strategies.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 17, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-196-deep-dive-james-maude-2023-microsoft-vulnerabilities-report-mindsets-innovations-and-future-evolution&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/f7a056fe-3545-4b35-9bb9-4914a0e17e37-KBKAST-EP-James-Maude.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:55&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1689609634,&quot;key&quot;:&quot;e6ec2c05eaea63d69c8bcaadf9baeff0&quot;},&quot;ppe-4514-209&quot;:{&quot;title&quot;:&quot;Episode 195 Deep Dive: Christopher Pogue | Breaking Stereotypes, Challenging the Status Quo, and Exploring the US Cybersecurity Market&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode of KBKast, we are once again joined by Chris Pogue (CyberCX \\u2013 US Director of Digital Forensics and Incident Response), as we dive deep into the world of cybersecurity, with a focus on the challenges faced by Australian companies and the potential benefits of breaking through the US market.&lt;\\\/p&gt;\\n&lt;p&gt;Chris Pogue is the Director of Digital Forensics and Incident Response (DFIR) for CyberCX in the Americas and is a member of the global DFIR leadership team.&lt;\\\/p&gt;\\n&lt;p&gt;Over his 25-year career, Chris has led multiple professional security and services organizations to investigate data breaches, secure corporate computing assets and critical value data, implement wide-scale compliance regimes, and help executives and boards of directors both qualify and quantify security risks.&lt;\\\/p&gt;\\n&lt;p&gt;His extensive experience is drawn from careers as a cybercrimes investigator, ethical hacker, military officer, law enforcement and military instructor, university professor, business executive, and board advisor.&lt;\\\/p&gt;\\n&lt;p&gt;Chris served in the United States Army as a Signal Corps Warrant Officer, participating in multiple joint task force missions is support of Operation Enduring Freedom, and the Global War on Terror.\\u00a0 He distinguished himself as an Honor Graduate from a variety of Army Academies and Schools and received multiple awards and commendations for excellence.&lt;\\\/p&gt;\\n&lt;p&gt;Chris was also an active member of the United States Secret Service Electronic Crimes Task Force in multiple field offices as well as the Headquarters Division.\\u00a0 He has also been the recipient of multiple Secret Service Certificates of Appreciation.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 14, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-195-deep-dive-christopher-pogue-breaking-stereotypes-challenging-the-status-quo-and-exploring-the-us-cybersecurity-market&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/3de83b49-d9e3-4552-91ac-f0c6619ef2c7-KBKAST-EP-Chris-Pogue.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;43:26&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1689350414,&quot;key&quot;:&quot;45aac9aa61f1e13935c7f2b6628097b0&quot;},&quot;ppe-4514-210&quot;:{&quot;title&quot;:&quot;Episode 194 Deep Dive: Jo Stewart-Rattray | Bridging the Gender Digital Gap and a Holistic Approach for a Safer Online Environment&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode of KBKast, we are once again joined by expert Jo Stewart-Rattray as we delve into the importance of holding organizations accountable for their actions and addressing online gender-based violence. Jo also shares her key takeaways from her recent attendance to a conference held by the United Nations Commission on the Status of Women, and gives valuable insights on &lt;a href=\\&quot;https:\\\/\\\/kbi.media\\\/new-research-digital-trust-is-integral-to-innovation-and-resilience-but-major-gaps-threaten-business-operations-and-reputations\\\/\\&quot;&gt;ISACA\\u2019s 2023 State of Digital Trust Report&lt;\\\/a&gt; as compared to last year\\u2019s.&lt;\\\/p&gt;\\n&lt;p&gt;Jo has over 25 years\\u2019 experience in the security industry. She consults in risk and technology issues with a particular emphasis on governance and IT security in businesses as a Director with BRM Advisory. She regularly provides strategic advice and consulting to the banking and finance, utilities, healthcare, manufacturing, tertiary education, retail, and government sectors.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 12, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-194-deep-dive-jo-stewart-rattray-bridging-the-gender-digital-gap-and-a-holistic-approach-for-a-safer-online-environment&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/669f17b7-9fca-4e39-8fc5-def87b4c8990-KBKAST-EP-Jo-Stewart-Rattray.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;25:16&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1689177618,&quot;key&quot;:&quot;b6c85be89383e1b8d6d18b5607dae3a2&quot;},&quot;ppe-4514-211&quot;:{&quot;title&quot;:&quot;Episode 193 Deep Dive: Dr. Jordan Plotnek | The Intersecting Worlds of Critical Infrastructure and Space Security&quot;,&quot;description&quot;:&quot;&lt;p&gt;Securing space technology is no longer a luxury but a necessity for the smooth functioning of our increasingly interconnected world. In this episode of KBKast, we delve into the fascinating world of space technology and its connection to critical infrastructure. Dr. Jordan Plotnek talks about his journey, the challenges of space security, and emphasizes the need for a tailored and collaborative global approach to managing space system security that has humanity at its core.&lt;\\\/p&gt;\\n&lt;p class=\\&quot;Notesoncontributors\\&quot;&gt;&lt;span lang=\\&quot;en-gb\\&quot; xml:lang=\\&quot;en-gb\\&quot;&gt;Dr Jordan Plotnek received a PhD in space systems security and resilience from the University of South Australia and a Bachelor of Engineering in Telecommunications and Electronics from Swinburne University in Melbourne. Jordan is an Australian Air Force veteran and has held senior Operational Technology security positions for private and public sector organisations internationally. Jordan is currently a space security researcher at the University of South Australia and the Lead Partner for Critical Infrastructure at Anchoram Consulting. Jordan\\u2019s research and professional interests are centred around space systems security, critical infrastructure resilience, and cyber-physical conflict.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 10, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-193-deep-dive-dr-jordan-plotnek-the-intersecting-worlds-of-critical-infrastructure-and-space-security&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/5b92c071-098c-4823-bcbc-1cc02a126887-KBKAST-EP-Jordan-Plotnek.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;39:11&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1689004832,&quot;key&quot;:&quot;d19b8083a93eb8ff1d231c58c0284dfc&quot;},&quot;ppe-4514-212&quot;:{&quot;title&quot;:&quot;Episode 192 Deep Dive: Pieter Danhieux | AI\\u2019s Role in Cyber: Challenges and Opportunities&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, Pieter Danhieux joins us in learning the balance between speed and security and the potential impact of AI in various industries, acknowledging that AI is not a magical solution but a tool for assisting with heavy work. Join Karissa Breen and Pieter Danhiuex as they delve into the world of AI and its implications for security analysts and developers alike.&lt;\\\/p&gt;\\n&lt;p&gt;Pieter Danhieux is the Chief Executive Officer, Chairman, and Co-Founder of Secure Code Warrior. He started SCW in 2015 and built this company out to a global cyber security company from Australia with 220+ staff, helping more than 500 Enterprises with building secure coders and software.&lt;\\\/p&gt;\\n&lt;p&gt;In 2020, Pieter was recognised as a finalist in the Diversity Champion category for the SC Awards Europe 2020. In 2016, he was No. 80 on the list of Coolest Tech people in Australia (Business Insider), awarded Cyber Security Professional of the Year (AISA \\u2013 Australian Information Security Association) and is member of the Forbes Technology Council.&lt;\\\/p&gt;\\n&lt;p&gt;\\u200dPieter has been a Principal instructor for the SANS Institute since 20o7 teaching military, government and private organisations offensive techniques on how to target and assess organisations, systems and individuals for security weaknesses. Before starting his own company, Pieter co-founder NVISO in Belgium, worked at Ernst &amp; Young and BAE Systems. He is also one of the Co-Founders of BruCON, one of the most awesome hacking conferences on this planet.&lt;\\\/p&gt;\\n&lt;p&gt;\\u200dHe started his information security career early in life and obtained the Certified Information Systems Security Professional (CISSP) certification in 2004 as one of the youngest persons ever in Belgium. On his way, he collected a whole range of cyber security certificates (CISA, GCFA, GCIH, GPEN, GWAP) and is currently one of the select few people worldwide to hold the top certification GIAC Security Expert (GSE).&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 7, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-192-deep-dive-pieter-danhieux-ais-role-in-cyber-challenges-and-opportunities&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/6ca25622-0fef-486e-afee-08f2c666acab-KBKAST-EP-Pieter-Danhiuex.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;34:56&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1688745649,&quot;key&quot;:&quot;c06709c1efe49fb4c45b00a9ca465d09&quot;},&quot;ppe-4514-213&quot;:{&quot;title&quot;:&quot;Episode 191 Deep Dive: Fabian Partigliani | Breaking it Down into Buckets: Simplifying Cybersecurity for Boards&quot;,&quot;description&quot;:&quot;&lt;p dir=\\&quot;ltr\\&quot;&gt;In this episode of KBKast, we are joined by cybersecurity expert Fabian Partigliani. They dive into the world of cybersecurity risk management and how to effectively communicate these risks to the board of a business. Throughout the episode, KB and Fabian stress the importance of making cybersecurity information easy for the board to understand, identifying critical issues, and considering the right level of investment in cybersecurity. The conversation concludes with Fabian sharing insights on how to approach the topic when presenting to a board and the importance of justifying security investments and scrutinizing team performance.&lt;\\\/p&gt;\\n&lt;p dir=\\&quot;ltr\\&quot;&gt;Fabian Partigliani is an experienced Global CEO and Chair\\\/Director, with multi-sector experience in tech, agritech, manufacturing, and fast-moving consumer goods. Fabian has worked across all types of organizations, from blue-chip listed companies to public sector not-for-profits and start-ups. Fabian has always been passionate about helping people and businesses scale to fulfill their potential. Currently, Fabian is the CEO of RedShield Security, an enterprise web application security solution operating in North America, Europe, and Asia Pacific, and Chairman of plant-based food company Smartfoods.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 5, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-191-deep-dive-fabian-partigliani-breaking-it-down-into-buckets-simplifying-cybersecurity-for-boards&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/4d22da62-e119-457f-998d-cf06b6ce47a7-KBKAST-EP-191-Fabian-Partigliani.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;33:24&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1688572827,&quot;key&quot;:&quot;30f29517d785bb508dd3f084a9bb5fa5&quot;},&quot;ppe-4514-214&quot;:{&quot;title&quot;:&quot;Episode 190 Deep Dive: Pete Murray | Backup and Recovery: Challenges in Protection and Access Management&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode of KBKast, Pete Murray dives deep into the world of data management and recovery, sharing valuable insights on determining data residence, the significance of backup and recovery when other security measures fail, and the importance of managing access to data with the right tools to determine who has access and whether said access is necessary.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span class=\\&quot;ui-provider gp b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\\&quot; dir=\\&quot;ltr\\&quot;&gt;An industry veteran with over 30 years of experience, Pete Murray is responsible for leading Veritas\\u2019 overall strategy, sales operations and new business growth in the ANZ region. Pete is passionate about making a difference by giving back to the IT community. In 2017, he co-founded the Jack Edge Connected Classroom Foundation, which provides secure video connectivity from homes to classrooms for terminally ill children.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 28, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-190-deep-dive-pete-murray-backup-and-recovery-challenges-in-protection-and-access-management&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/4db56183-9879-4165-b796-ba0b03888dd2-KBKAST-EP-Pete-Murray.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;32:23&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1687968058,&quot;key&quot;:&quot;016e41757c44173d618977153e8cd3c9&quot;},&quot;ppe-4514-215&quot;:{&quot;title&quot;:&quot;Episode 189 Deep Dive: Jason Murrell | Mentoring and Education: Revolutionising Australia\\u2019s Cybersecurity Landscape&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode of KBKast, Jason Murell talks about the challenges facing the cybersecurity startup ecosystem in Australia. They discuss the funding and support available for startups, the need for a cultural mindset change, and the importance of mentoring and education. Jason also talks about his groundbreaking initiative set to revolutionise the cybersecurity landscape in Australia. Additionally, they explore the opportunities in other countries, such as Israel and Canada, and the need for collaboration and open sharing of information within the cybersecurity community.&lt;\\\/p&gt;\\n&lt;p&gt;Jason Murrell is Group Executive at AustCyber and has been a long-time supporter of Australian start-ups for over 20 years, particularly in the cyber security space for the past 6 years. His accomplishments include helping to launch Cyber Aware in 2017, and most recently with Cyber Hive, after previously contributing to the growth of GRC platform 6clicks.&lt;\\\/p&gt;\\n&lt;p&gt;With a passion for championing, mentoring, and connecting Australia\\u2019s cyber networks, Jason is well-placed unite the Australian cyber community and get us as a nation to where we need to be \\u2013 connected with cyber safety as a priority.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 21, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-189-deep-dive-jason-murrell-mentoring-and-education-revolutionising-australias-cybersecurity-landscape&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/34ab2353-8a34-4def-900e-3dbd3230d755-KBKAST-EP-Jason-Murell.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;47:14&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1687363215,&quot;key&quot;:&quot;ef11de237f0d9c6b1a7156bffc575553&quot;},&quot;ppe-4514-216&quot;:{&quot;title&quot;:&quot;Episode 188 Deep Dive: Darren Reid | Prioritising Protection: Why Endpoint Security  Should be a Top Priority&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, Darren delves into the challenges facing the security industry, with fragmented tools and technologies making it difficult for organisations to keep up with the overwhelming volume of data being produced. Bringing together endpoint, network, and identity detection can help pre-correlate and line up activity against a toolset to present legitimate intelligence to SoC teams, thus helping to reduce alert fatigue and enable quick response to potential threats. This episode also discusses the growing popularity of XDR, an extension to traditional cybersecurity tools designed to provide a single console view of network, endpoint, and identity telemetry. While not every organisation will deploy XDR, more and more will move towards its use to better prevent and respond to cyber attacks.&lt;\\\/p&gt;\\n&lt;p&gt;Darren is currently the Senior Director of the Security Business Unit for Asia-Pacific &amp; Japan at VMWare. He has over 25 years\\u2019 experience in leading organisations in the Information Technology industry. With both domestic and international experience, Darren has helped build and grow a number of organisations in a wide variety of countries.&lt;\\\/p&gt;\\n&lt;div&gt;\\n&lt;p class=\\&quot;Default\\&quot;&gt;As companies move to benefit from a multi-cloud world, ensuring their data and applications are secured while still providing an outstanding user experience becomes paramount. VMWare helps organisations of all sizes embrace multi-cloud while delivering a single, holistic, security experience to protect and enable their organisational transformation. From on-premise through private cloud, public cloud, and containers, Carbon Black supports all the different ways a customer may deploy their applications.&lt;\\\/p&gt;\\n&lt;\\\/div&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 14, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-188-deep-dive-darren-reid-prioritising-protection-why-endpoint-security-should-be-a-top-priority&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/8f521726-1aa9-4643-a5f6-3ddf1c2a15ba-KBKAST-EP-Darren-Reid-edited.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;41:34&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1686758492,&quot;key&quot;:&quot;16f12b7917d0da419b3ea566c5075c8a&quot;},&quot;ppe-4514-217&quot;:{&quot;title&quot;:&quot;Episode 187 Deep Dive: Brian Grant | Securing Your Data: A Social Responsibility&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, Brian Grant shares his insights on data security and why organizations should prioritise securing their data before anything else. He emphasises that effective data security starts with a fundamental change in how organizations approach the issue as a social responsibility, not just a business concern. The discussion also delves into the consequences of data breaches, including the potential for life-threatening outcomes, and the need for everyone to prioritise safety in the digital age. Additionally, Grant discusses the critical role of education and consulting in putting cybersecurity controls and investments in context, and how raising awareness can lead to a tipping point where organizations and individuals prioritize it as a foundational value.&lt;\\\/p&gt;\\n&lt;p&gt;Brian Grant is the Thales Regional Director with responsibility for the Data Protection business in Australia and New Zealand. He started his career in technology when he enlisted in the Royal Australian Air Force, working on critical air traffic control systems. He has had extensive hands on and leadership experience in delivering innovative and unique solutions for organisations, with a particular emphasis on networking and cybersecurity. He has held regional leadership roles for a number of technology start-ups and is passionately committed to helping clients embed data security to better deliver confidentiality, integrity and availability in our data dependent world.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 7, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-187-deep-dive-brian-grant-securing-your-data-a-social-responsibility&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/fa896f64-0054-4a56-930e-ae1700b1a433-KBKAST-EP-Brian-Grant-edited.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;39:29&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1686153647,&quot;key&quot;:&quot;90862cfb85c4c9ea5982f5a029dbe9a8&quot;},&quot;ppe-4514-218&quot;:{&quot;title&quot;:&quot;Episode 186: Deep Dive: Raj Samani | Cybersecurity as a Team Sport: How Transparency Can Reduce the Likelihood of Breaches&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode of KBKast, we delve into the world of cybersecurity and the impact of breaches on organizations and society. Raj provides insights into his experience with past cases, emphasizing the importance of being open and transparent in handling breaches and reducing the impact on customers. We uncover the risks posed by social media, the challenge of managing expectations from regulators, and the economic impact of breaches. We also explore how cybersecurity extends beyond computer viruses and IT systems, and how the rise of autonomous vehicles and growing technology dependence increases the risk of attacks. Join us as we discuss the need for transparency and information sharing to improve the collective defense of the industry.&lt;\\\/p&gt;\\n&lt;p&gt;Raj Samani is a computer security expert responsible for extending the scope and reach of Rapid7\\u2019s research initiatives. He joins Rapid7 from McAfee where he served as McAfee Fellow and Chief Scientist after serving as VP and Chief Technical Officer in EMEA.&lt;\\\/p&gt;\\n&lt;p&gt;Raj has assisted multiple law enforcement agencies in cybercrime cases, and is special advisor to the European Cybercrime Centre (EC3) in The Hague.&lt;\\\/p&gt;\\n&lt;p&gt;Raj has been recognized for his contributions to the computer security industry through numerous awards, including the Infosecurity Europe hall of Fame, Peter Szor award, Intel Achievement Award, among others. He also co-authored the book \\u2018Applied Cyber Security and the Smart Grid\\u2019 as well as the CSA Guide to Cloud computing, and he has served as technical editor for numerous other publications. In addition to speaking at myriad cybersecurity industry events, Raj is sought after for his commentary on breaking news such as major security breaches and emerging threats. His commentary has appeared in Forbes, The Wall Street Journal, Business Insider, The Daily Beast, and more. He can be found on twitter @Raj_Samani.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 31, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/deep-dive-raj-samani-cybersecurity-as-a-team-sport-how-transparency-can-reduce-the-likelihood-of-breaches&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/7b97bf9a-b3da-47e7-874d-8db6f415aae6-KBKAST-EP-Raj-Samani.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:45&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1685548805,&quot;key&quot;:&quot;b2373ff2c49d57294a40922308e93c74&quot;},&quot;ppe-4514-219&quot;:{&quot;title&quot;:&quot;Security Round-up: Marty Edwards | Compliance Costs and Enhanced Protections: Australia\\u2019s New Cybersecurity Protocol&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode of KBKast, we take a look into the recent announcement from the Australian government about their new cybersecurity regulations for businesses. The new risk management protocol covers cybersecurity, physical security, personnel security, and supply chain security, all aimed at encouraging companies to enhance overall protection measures rather than punishing directors for noncompliance. Marty points out that Australia\\u2019s situation with cybersecurity is similar to other countries in the world, with many governments implementing baseline standards to encourage better cybersecurity practices. However, some organizations have made progress in cybersecurity, while others need more government intervention to ensure critical infrastructure security. He also touches on the importance of investing in operational technology systems, including industrial control systems, which have been underinvested in cybersecurity, despite their vital role in operating electricity, gas, water, and transportation systems. As more governments require cybersecurity standards for these systems, both public and private sector organizations should invest in the security of these systems.&lt;\\\/p&gt;\\n&lt;p&gt;Marty Edwards is a globally recognised Operational Technology (OT) and Industrial Control System (ICS) cybersecurity expert who collaborates with industry, government and academia to raise awareness of the growing security risks impacting critical infrastructure and the need to take steps to mitigate them. As Vice President of Operational Technology Security at Tenable, Edwards works with government and industry leaders throughout the world to broaden understanding and implementation of people, process and technology solutions to reduce their overall cyber risk. Prior to joining Tenable in 2019, Edwards\\u2014a 30\\u2010year industry veteran\\u2014served as the Global Director of Education at the International Society of Automation (ISA). While at ISA, he was recognized by his industry peers with the SANS ICS 2019 Lifetime Achievement Award. Prior to ISA, Edwards was the longest\\u2010serving Director of the U.S. Department of Homeland Security\\u2019s Industrial Control Systems Cyber Emergency Response Team (ICS\\u2010CERT). Edwards also served as a program manager focused on control systems security at the Department of Energy\\u2019s (DOE\\u2019s) Idaho National Laboratory (INL) and has held a variety of roles in the instrumentation and automation fields. Edwards holds a diploma of technology in Process Control and Industrial Automation (Magna cum Laude) from the British Columbia Institute of Technology (BCIT), and in 2015 received the institute\\u2019s Distinguished Alumni Award. In 2016, Edwards was recognized by FCW in its \\u201cFederal 100 Awards\\u201d as being one of the top IT professionals in the U.S. federal government.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 29, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/security-round-up-marty-edwards-compliance-costs-and-enhanced-protections-australias-new-cybersecurity-protocol&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/ecc141b8-71c2-4e04-ac92-77009a242e90-Security-Round-up-Marty-Edwards-Compliance-Costs-and-Enhanced-Protections-Australia-s-New-Cyber.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;03:59&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1685376021,&quot;key&quot;:&quot;11771ce4e0e69eb8d1a38cba64883ba4&quot;},&quot;ppe-4514-220&quot;:{&quot;title&quot;:&quot;Episode 185: Rajesh Ganesan&quot;,&quot;description&quot;:&quot;&lt;table&gt;\\n&lt;tbody&gt;\\n&lt;tr&gt;\\n&lt;td&gt;Rajesh Ganesan is President at ManageEngine, the IT management division of Zoho Corporation. He is a part of the leadership team overseeing product strategy and direction for the overall suite. Rajesh has been with Zoho Corp. for over 20 years developing software products in various domains including telecommunications, network management, and IT security. He is currently focussed on delivering enterprise IT management solutions as SaaS.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;\\\/td&gt;\\n&lt;\\\/tr&gt;\\n&lt;\\\/tbody&gt;\\n&lt;\\\/table&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 24, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-185-rajesh-ganesan&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/ac3e9b54-67d4-4436-a66f-bd986a4e6cd4-KBKAST-EP-Rajesh-Ganesan.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;48:14&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1684944002,&quot;key&quot;:&quot;b5ff8697492d61443f49afad7e22a13d&quot;},&quot;ppe-4514-221&quot;:{&quot;title&quot;:&quot;Episode 184: Eugene Shablygin&quot;,&quot;description&quot;:&quot;&lt;p&gt;Gene Shablygin is a former nuclear physicist and current computer security storyteller. Life-long ham radio operator, relatively young (just under 1000 flight hours) private pilot. Loves classical live music, high-end audio, and fast cars from Zuffenhausen.&lt;\\\/p&gt;\\n&lt;p&gt;As a founder and CEO of WWPass, Gene is focused on freeing individuals and enterprises from ineffective, insecure password systems that can\\u2019t protect their data from increasingly sophisticated security threats.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 17, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-184-eugene-shablygin&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/3a6f248f-4b87-4a5a-9510-e7afe3ea1522-KBKAST-EP-Eugene-Shablygin-edited.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:30&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1684339216,&quot;key&quot;:&quot;fd08e766811a618467002728031f1cd5&quot;},&quot;ppe-4514-222&quot;:{&quot;title&quot;:&quot;Episode 183: Rik Ferguson&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;span&gt;Rik Ferguson is the Vice President of Security Intelligence at Forescout. He is also a Special Advisor to Europol\\u2019s European Cyber Crime Centre (EC3), a multi-award-winning producer and writer, and a Fellow of the Royal Society of Arts. In April 2011 Rik was inducted into the Infosecurity Hall of Fame.&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span&gt;Rik is a researcher, storyteller, and futurist. He helps governments, law enforcement, businesses and individuals to understand the complexities of technology, and its intersection with cybercrime, contributing to global initiatives to combat cybercrime and reduce risk through participation at the United Nations, European and national Parliaments.&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span&gt;Over his twenty-five plus years of professional practice, he has taken deep dives into the cybercriminal underground and helped the wider world understand the threats of today and how those threats might evolve over time.\\u00a0&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span&gt;A recognised futurist and world-renowned speaker, Rik has spoken at global events including RSA Conference, Mobile World Congress, Milken Institute, RUSI, GITEX, Infosecurity, Virus Bulletin, e-Crime Congress, IPExpo, CloudExpo, Webit, GovSec, and many more, and is often quoted by media around the world.&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span&gt;Rik joined Forescout in 2022. Prior to assuming his current role, he served as Vice President Security Research at Trend Micro for 15 years&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span&gt;Rik Ferguson holds a Bachelor of Arts degree from the University of Wales and has qualified as a Certified Ethical Hacker (&lt;\\\/span&gt;&lt;i&gt;&lt;span&gt;C|EH&lt;\\\/span&gt;&lt;\\\/i&gt;&lt;span&gt;), Certified Information Systems Security Professional (&lt;\\\/span&gt;&lt;i&gt;&lt;span&gt;CISSP&lt;\\\/span&gt;&lt;\\\/i&gt;&lt;span&gt;) and an Information Systems Security Architecture Professional (&lt;\\\/span&gt;&lt;i&gt;&lt;span&gt;ISSAP&lt;\\\/span&gt;&lt;\\\/i&gt;&lt;span&gt;)&lt;\\\/span&gt;&lt;span&gt;.&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 10, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-183-rik-ferguson&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/25a4ee5a-28d2-4199-8458-9e80838670c4-KBKAST-EP-Rik-Ferguson.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;48:14&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1683734413,&quot;key&quot;:&quot;88dd6f6a2d01f008f707361aa63d09a3&quot;},&quot;ppe-4514-223&quot;:{&quot;title&quot;:&quot;Episode 182: Thomas Fikentscher&quot;,&quot;description&quot;:&quot;&lt;p style=\\&quot;font-weight:400\\&quot;&gt;Thomas Fikentscher is responsible for driving strong customer and partner engagement and expanding CyberArk\\u2019s emerging cloud business in the region.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;Prior to joining CyberArk, Thomas was Chief Revenue Officer at JXT Global, and has more than 20 years\\u2019 experience in the IT industry, including significant stints at Oracle, Ingram Micro and Sun Microsystems. His extensive industry and leadership experience \\u2013 particularly in the cloud domain \\u2013 has been invaluable to CyberArk, helping grow demand for Identity Security solutions.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;When it comes to cybersecurity, Thomas sees a significant opportunity to bridge the gap between technology jargon and business language. A big part of this is helping company leaders understand the importance of identity security to organisational risk management.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 4, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-182-thomas-fikentscher&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/0a38003b-c287-4c00-9908-8dadecda7947-KBKAST-EP-Thomas-Fikentscher.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;33:36&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1683216054,&quot;key&quot;:&quot;7909b8d6cd020e3b4e7f2b3a2804490b&quot;},&quot;ppe-4514-224&quot;:{&quot;title&quot;:&quot;Episode 181: Mark Thomas&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;i&gt;Mark Thomas, Director, Security Services, ANZ at Arctic Wolf, aims to build, direct and mature the operations of Arctic Wolf\\u2019s security services within the region. For the past 21 years, Mark has worked in the Cyber Security field establishing pragmatic, business-aligned risk minimisation strategies and cyber defenses to reduce losses, protect brand reputation, and achieve return on investment. Mark has held senior leadership and technical management roles, driving mission-critical SOC operations in geographically dispersed matrix environments, enabling greater business resilience and security agility. His previous roles include Senior Director, Threat Intelligence at NTT Ltd Global Threat Intelligence Centre (GTIC), and prior to that, Senior Director, Cybersecurity at Dimension Data.&lt;\\\/i&gt;&lt;\\\/p&gt;\\n&lt;p&gt;See also:&lt;a href=\\&quot;https:\\\/\\\/cybersecurity.arcticwolf.com\\\/2023-Arctic-Wolf-Labs-Threat-Report.html\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt; 2023 Arctic Wolf Labs Threat Report&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 2, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-181-mark-thomas&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/f5eb5692-1603-455c-aa7d-34ac98ba623b-KBKAST-EP-Mark-Thomas.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:09&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1683043247,&quot;key&quot;:&quot;154b1d673697d01eb983d5a0a884a04d&quot;},&quot;ppe-4514-225&quot;:{&quot;title&quot;:&quot;Episode 180: Sean Duca&quot;,&quot;description&quot;:&quot;&lt;p&gt;Sean is the Regional chief security officer for Asia Pacific and Japan at Palo Alto Networks. In this role, Sean spearheads the development of thought leadership, threat intelligence and security best practices for the cybersecurity community and business executives. With more than 20 years of experience in the IT and security industry, he acts as a trusted advisor to organisations across the region and helping them improve their security postures and align security strategically with business initiatives.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to joining Palo Alto Networks, he spent 15 years in a variety of roles at Intel Security (McAfee), with his last position as the Chief Technology Officer for Asia Pacific. Before this, Sean was involved in software development, technical support and consulting services for a range of Internet security solutions. Sean actively discusses security issues in mainstream media, including television, radio, print and security related broadcasts. He regularly participates in forums, conferences and panels, and provides intelligence on cybersecurity matters to the public and private sector.&lt;\\\/p&gt;\\n&lt;p&gt;Read the report &lt;a href=\\&quot;https:\\\/\\\/start.paloaltonetworks.com\\\/2023-unit42-ransomware-extortion-report\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;here&lt;\\\/a&gt;.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 27, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-180-sean-duca&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/3d0ef136-0a5a-425b-a66a-3e2e6f830b2d-KBKAST-EP-Sean-Duca.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;41:18&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1682611256,&quot;key&quot;:&quot;9e646f013bffed4e1a2d41c93ce295c5&quot;},&quot;ppe-4514-226&quot;:{&quot;title&quot;:&quot;Episode 179: David Fairman&quot;,&quot;description&quot;:&quot;&lt;p style=\\&quot;font-weight:400\\&quot;&gt;David Fairman is an experienced CIO\\\/CSO\\\/CISO, strategic advisor and investor.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;David has extensive experience in the global financial services sector. David is currently the APAC CIO &amp; CSO for Netskope helping customers manage their digital and cyber risk programs in addition to working across industry with the aim of making the digital economy a safer place to do business. Furthermore, David is a Partner and CISO-in-residence at SixThirty Ventures, driving innovation and helping build great technology companies.\\u00a0 Previously, David was the Chief Security Officer (CSO) at NAB owning all aspects of Physical Security, Fraud, Investigations and Cyber Security. Prior to NAB, he was the Group Chief Information Security Officer (CISO) for the Royal Bank of Canada. David has been a senior leader at JP Morgan Chase &amp; Co and the Royal Bank of Scotland (RBS) having held several regional CISO and Global Head roles.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;David has lived and worked in Australia, the UK, the Netherlands and the USA.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;David was raised and educated in Australia where he received his Bachelor of Information Technology in Software Engineering and Computer Science. He holds a Masters of Business Administration and a Masters of Project Management. David began his career in Information Security while serving in the Royal Australian Air Force\\u2019s Electronic Warfare and Communications group, where he gained valuable experience in the technology, policy and process aspects of security and risk management. \\u00a0Subsequently, David worked in a variety of roles in technology and cyber, including in the utilities sector (gas and electricity).&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;David holds a number of positions on boards of directors and was a founding member of the Security Advisor Alliance (&lt;a href=\\&quot;https:\\\/\\\/www.securityadvisoralliance.org\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;www.securityadvisoralliance.org&lt;\\\/a&gt;), and the Canadian Cyber Threat Exchange. During his tenure at NAB, David was the Chair for the Board of Directors for the Australian Financial Crimes Exchange and spear headed the formation of a taskforce involving the big 4 banks, AFP, ASD and ACSC to detect and disrupt cyber-crime impacting Australia. David also advises a number of VC funds and Cyber Security companies.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;Recently, David was recognised in the Top 50 Australian Professionals, as profiled by the Top 100 Magazine. David has also been named as one of the &lt;a href=\\&quot;https:\\\/\\\/www.information-management.com\\\/gallery\\\/Chief-Information-Security-Officer-CISO-List-Trends-10027134-1.html\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Top 10 CISOs to know&lt;\\\/a&gt;, and is recognised as a thought leader in the cyber security industry as profiled by K-Logix &lt;a href=\\&quot;https:\\\/\\\/www.klogixsecurity.com\\\/blog\\\/david-fairman-ciso-royal-bank-of-canada\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;here&lt;\\\/a&gt;.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;David co-authored \\u201cCyber Risk\\u201d (2016) and co-edited \\u201cFintech: Growth and Deregulation\\u201d (2018) published by &lt;em&gt;Risk Books &lt;\\\/em&gt;and was the Technical Editor for \\u201cZero Trust Journey Across The Digital Estate\\u201d (2022) published CRC Press.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;David is passionate about education. He has held Adjunct Professorships at both the University of New York and the University of Toronto and is currently working with Deakin University in Australia.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400\\&quot;&gt;David currently resides in both Melbourne and Brisbane, Australia.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 25, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-179-david-fairman&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/5fd6a098-4627-47ab-a50f-46a4c47645b2-KBKAST-EP-David-Fairman.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;38:49&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1682438411,&quot;key&quot;:&quot;3c4e1b0a362b4671e95e1f1b5ffcc7cb&quot;},&quot;ppe-4514-227&quot;:{&quot;title&quot;:&quot;Episode 178: Kunal Anand&quot;,&quot;description&quot;:&quot;&lt;p&gt;Chief Technology Officer and Chief Information Security Officer&lt;\\\/p&gt;\\n&lt;p&gt;Kunal joined Imperva when Prevoty, a company he co-founded in 2013 and where he served as CTO, was acquired by Imperva in August 2018. Before joining Prevoty, he was the Director of Technology at BBC Worldwide. Kunal has a deep history of innovation and technical expertise, and has held roles leading security, data, technology, and engineering teams at Gravity, MySpace, and the NASA Jet Propulsion Lab.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;He holds a BS from Babson College.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 20, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-178-kunal-anand&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/cee76f4b-f6a8-49b1-8487-cc149817c8dc-KBKAST-EP-Kunal-Anand.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;50:32&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1682006459,&quot;key&quot;:&quot;37d974a73b810c3b23153a0f960f6c32&quot;},&quot;ppe-4514-228&quot;:{&quot;title&quot;:&quot;Episode 177: Riccardo Galbiati&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Riccardo Galbiati is the Chief Technology Office for Australia and New Zealand at Palo Alto Networks. With 15+ years of experience in the cyber-security industry, he is able to offer strategic advice to CISOs, CTOs and executives, especially when it comes to rationalising technology adoption and leveraging a Zero Trust approach that aims at business resilience in spite of cyber-attacks.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 18, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-177-riccardo-galbiati&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/5e3333c0-2a8e-48ea-868a-078166179dec-KBKAST-EP-Riccardo-Galbiati.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;45:35&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1681833611,&quot;key&quot;:&quot;da8fc97269e39abdb8c39ba37e345109&quot;},&quot;ppe-4514-229&quot;:{&quot;title&quot;:&quot;Episode 176: David Chow&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;b&gt;David Chow&lt;\\\/b&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt; brings over 20 years of experience in the federal government to his role as Chief Technology Strategy officer. His focus includes analysing, managing, and implementing technologies to assist with building and maintaining a global cybersecurity strategy. Much of his expertise stems from working alongside the Federal Housing Administration (FHA) to modernise the agency\\u2019s mortgage loan systems and mature its cybersecurity program. He served on a number of additional roles within the federal government, including executive and leadership positions at the Department of Transportation and the White House. Prior to joining Trend Micro, David demonstrated success in accelerated digital transformation through secured cloud adoption as the Global SVP on NextGen Solutions at CoreLogic, a FinTech data company. David Chow is on the Advisory Board of George Mason College of Engineering and Computing.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 13, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-176-david-chow&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/da05c6f3-4660-4ef5-9525-4fecca39c995-KBKAST-EP-David-Chow.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;44:53&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1681401654,&quot;key&quot;:&quot;c78ec88725e071ca1d7c93a397f2a71d&quot;},&quot;ppe-4514-230&quot;:{&quot;title&quot;:&quot;Episode 175: William Gooderson&quot;,&quot;description&quot;:&quot;&lt;p&gt;William Gooderson is a high-performance coach and speaker who has worked across Australia and the Asia Pacific region providing coaching and workshops to multiple public and private sector organisations. He focuses on training around personal well-being, building resilience in self and others, leading high performing teams in complex environments, and overcoming cultural challenges in the workplace.&lt;\\\/p&gt;\\n&lt;p&gt;William\\u2019s experience has been developed over two decades that included: serving as a British Army officer, paratrooper, and engineer, across Europe and the Middle East leading large multinational teams in both the special forces and human intelligence communities; and working in the Australian private and public sectors developing leaders and team\\u2019s capabilities on the skills required to lead self and others, whilst adapting to the challenges of evolving workforces and a hybrid pandemic environment.&lt;\\\/p&gt;\\n&lt;p&gt;William is an Adjunct Lecturer on resilience at the University of Tasmania\\u2019s school of medicine and is a frequent speaker with multiple National and State groups. In his spare time, he has enjoyed coaching his son\\u2019s rugby and basketball teams, is a member of societal relevance projects that educate refugee schoolchildren and disadvantaged individuals on how to take ownership of their circumstances and runs a mental health and wellbeing group for local Dads.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 11, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-175-william-gooderson&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/f8dff82c-1390-490a-a4d4-b23b1b55e42f-KBKAST-EP-William-Gooderson.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;56:13&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1681228808,&quot;key&quot;:&quot;e8a5903a0554e2f2b1ff3d0e7f36a25e&quot;},&quot;ppe-4514-231&quot;:{&quot;title&quot;:&quot;Episode 174: Peter Bauer&quot;,&quot;description&quot;:&quot;&lt;p&gt;Peter Bauer is the CEO, Co-founder and Board Member at Mimecast, which he launched in 2003 with fellow Board Member and Co-founder, Neil Murray.&lt;\\\/p&gt;\\n&lt;p&gt;He is the visionary behind Mimecast\\u2019s SaaS strategy, which empowers businesses across the globe with comprehensive cyber resilience for email. Mimecast\\u2019s security, archiving, business continuity and risk mitigation products and services are all delivered from a single cloud platform. This home-grown, pure-cloud delivery mechanism enables an intuitive user experience, suited to the way people interact with email today.&lt;\\\/p&gt;\\n&lt;p&gt;The combination of next-generation technology and seamless integration with existing email systems, is the driving force behind Mimecast\\u2019s success in its mission to transform the way people remain productive, collaborative and efficient in today\\u2019s ever-changing threat landscape.&lt;\\\/p&gt;\\n&lt;p&gt;Peter was born and raised in South Africa, trained as a Microsoft systems engineer, and began working with corporate messaging systems in the mid-1990s. He moved to the UK where Mimecast was founded and then moved once more, arriving in Boston, Massachusetts in 2011, to lead Mimecast\\u2019s aggressive push into North America. Since that time, Mimecast has been one of the strongest performers in its market segment in terms of customer acquisition and top-line growth, making Peter one of only a handful of CEOs to have lead a pure-Saas company for over 15 years while acquiring tens of thousands of customers worldwide.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 6, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-174-peter-bauer&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/a86c63f3-97f8-4f3c-8f9b-d8567572de8d-KBKAST-EP-Peter-Bauer.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;34:19&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1680796818,&quot;key&quot;:&quot;dd46ac06e7e2fafd84be7aab40a26e34&quot;},&quot;ppe-4514-232&quot;:{&quot;title&quot;:&quot;Episode 173: Dr. Kevin Tham&quot;,&quot;description&quot;:&quot;&lt;p&gt;Kevin is a CISO leader in the Australian Digital Banking sector and a seasoned\\u00a0information security veteran in the financial services industry. \\u00a0Kevin\\u2019s practical approach to Cyber\\u00a0Security is often seen as pushing the boundaries and balance between user centric design and effective controls.&lt;\\\/p&gt;\\n&lt;p&gt;Kevin began his career as an academia researcher in the late 90s, an educator, and\\u00a0a security\\u00a0engineer, slowly climbing his way through organisations, developing and implementing security controls, when many organisations do not regard information security as a risk.&lt;\\\/p&gt;\\n&lt;p&gt;Today, Kevin is the CISO of a fintech organisation, which is aiming to make a difference to individuals through well thought out banking solutions and products.&lt;\\\/p&gt;\\n&lt;p&gt;During his spare time, Kevin devotes his time by volunteering and giving his time back to the Security industry through his involvement with the ISACA Sydney Chapter. He served on the ISACA Sydney Chapter Board for 8 years and was also a former President, dedicated to serving its over 1600 Chapter\\u00a0members.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 4, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-173-dr-kevin-tham&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/f9c97275-8865-4979-be40-c5224daeddde-KBKAST-EP-Kevin-Tham.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;38:35&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1680624033,&quot;key&quot;:&quot;76615795baa1986b53279cfb3b8b8ae4&quot;},&quot;ppe-4514-233&quot;:{&quot;title&quot;:&quot;Episode 172: Richard Stiennon&quot;,&quot;description&quot;:&quot;&lt;p&gt;Richard Stiennon is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 3,051+ vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 31 countries on six continents. He was a lecturer at Charles Sturt University in Australia. He is the author of&lt;em&gt; Surviving Cyberwar&lt;\\\/em&gt; (Government Institutes, 2010) and Washington Post Best Seller, &lt;em&gt;There Will Be Cyberwar&lt;\\\/em&gt;.\\u00a0 Stiennon was Chief Strategy Officer for Blancco Technology Group, the Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner. He has a B.S. in Aerospace Engineering and his MA in War in the Modern World from King\\u2019s College, London. His latest book &lt;em&gt;Security Yearbook 2022&lt;\\\/em&gt; was released in June, 2022. Get a copy &lt;a href=\\&quot;https:\\\/\\\/it-harvest.com\\\/shop\\\/security-yearbook-2022\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;here&lt;\\\/a&gt;.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 30, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-172-richard-stiennon&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/ed6eb24f-66a7-449a-b46b-893e8a9c975c-KBKAST-EP-172-Richard-Stiennon.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;52:08&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1680192049,&quot;key&quot;:&quot;d0d4ee59caaf9945605f0ae96c1c5f1b&quot;},&quot;ppe-4514-234&quot;:{&quot;title&quot;:&quot;Episode 171: Glen Pendley&quot;,&quot;description&quot;:&quot;&lt;p&gt;Glen Pendley is chief technology officer (CTO) at Tenable, where he is responsible for driving the company\\u2019s long-term vision, strategy and continued product innovation. Glen has over 20 years of experience in the industry and deep roots leading cutting-edge engineering, research and product teams for global cybersecurity brands. Before his role as CTO, Glen served as Tenable\\u2019s deputy CTO and senior vice president of research &amp; development where he led the global engineering and security research teams. Prior to joining Tenable, he was director for research, development and product Management at McAfee, Inc., where he oversaw engineering and product functions across the globe. Glen serves as an executive advisor to a number of companies and began his career in the United States Marines Corps.&lt;\\\/p&gt;\\n&lt;p&gt;Resource:&lt;br \\\/&gt;\\n&lt;a href=\\&quot;https:\\\/\\\/www.tenable.com\\\/blog\\\/exposure-management-our-vision-for-securing-the-modern-attack-surface\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;&lt;em&gt;Exposure Management: Our Vision for Securing the Modern Attack Surface&lt;\\\/em&gt;&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 28, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-171-glen-pendley&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/d425661d-d872-4a57-908a-a87059052f8f-KBKAST-EP-171-Glen-Pendley.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;49:55&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1680019220,&quot;key&quot;:&quot;c581b7b0f1ed9dd820567c887f816e67&quot;},&quot;ppe-4514-235&quot;:{&quot;title&quot;:&quot;Episode 170: Adam P. Henry&quot;,&quot;description&quot;:&quot;&lt;p&gt;Adam P. Henry is a cyber security thought leader, published author, international speaker and executive. He has developed research and programs focused on addressing the education, skills and workforce gaps, cyber disaster response\\\/resilience, and cyber warfare. His research and initiatives have focused on developing strategies and effective responses to these key issues. He is Senior Advisor at the Social Cyber Institute and an Adjunct Lecturer at the UNSW Canberra.&lt;\\\/p&gt;\\n&lt;p&gt;Adam has participated in national and international projects and programs and also spoken at major conferences in Australia and internationally. Adam has established strong collaborative networks while in search of impactful partnerships in providing innovative solutions to our biggest technological challenges.&lt;\\\/p&gt;\\n&lt;p&gt;Adam has extensive experience in digital and cyber leadership including transformation, developing, leading and executing technology business solutions and strategies. He is a new thought leader in this field, pushing the boundaries with his research while implementing practical solutions to these global issues.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 23, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-170-adam-p-henry&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/5ce11bb0-34d1-476b-ad89-f60068517784-KBKAST-EP-Adam-Henry.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;53:04&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1679587205,&quot;key&quot;:&quot;10f52816b31f8248f4783ff49cc32e47&quot;},&quot;ppe-4514-236&quot;:{&quot;title&quot;:&quot;Episode 169: Lori MacVittie&quot;,&quot;description&quot;:&quot;&lt;p&gt;Lori MacVittie is Principal Technical Evangelist, Office of the CTO, for application security and delivery company, F5. She and F5 CTO, Geng Lin, recently published their book, \\u2018&lt;a href=\\&quot;https:\\\/\\\/www.amazon.com\\\/Enterprise-Architecture-Digital-Business-Transforming\\\/dp\\\/1098121457\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Enterprise Architecture for Digital Business&lt;\\\/a&gt;\\u2019, which outlines how to modernise IT for a digital-first world.&lt;\\\/p&gt;\\n&lt;p&gt;The book clarifies why companies struggle with digital transformation, and what it takes to transform IT to become a data-driven, AI-supported digital business.&lt;\\\/p&gt;\\n&lt;p&gt;The book outlines an architecture framework for transitioning IT to operate as a digital business, support innovation and address today\\u2019s biggest IT challenges. Each chapter focuses on a specific domain and analyses the trends and technologies driving change, as well as provides recommendations to help organisations adapt.&lt;\\\/p&gt;\\n&lt;p&gt;Lori is a technologist and principal technical evangelist in F5\\u2019s Office of the CTO with an emphasis on emerging architectures and technologies including cloud and edge computing, digital transformation, automation and orchestration, microservices, and application delivery.&lt;\\\/p&gt;\\n&lt;p&gt;She has more than 25 years of industry experience spanning application development, IT architecture, and network and systems operation. She co-authored the CADD profile for ANSI NCITS 320-1998 and holds a US patent for application delivery provisioning. MacVittie is a contributing author of books on cloud security and object-oriented development and has authored books on application security and XAML.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 21, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-169-lori-macvittie&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/5da5230a-d27d-4346-85ef-c5889128a486-KBKAST-EP-Lori-Macvittie.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;34:52&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1679414429,&quot;key&quot;:&quot;0c628d7d75d5049f621403196aa08de7&quot;},&quot;ppe-4514-237&quot;:{&quot;title&quot;:&quot;Episode 168: Ryan O\\u2019Kell&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;span lang=\\&quot;en-us\\&quot; xml:lang=\\&quot;en-us\\&quot;&gt;Ryan has almost 10 years\\u2019 experience within the Cyber Security and IT space. With a lifelong love of IT and Cyber Security, Ryan built his career with the goal of exposing himself to as many environments and unique technologies as possible, preparing himself for a successful pivot into the Cyber Security space.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span lang=\\&quot;en-us\\&quot; xml:lang=\\&quot;en-us\\&quot;&gt;After pivoting in 2020, Ryan quickly grew into the role of Head of Cyber Security (APAC) for Waterstons Australia and now leads a small team of security engineers. He is known for being an innovative, empathic leader who is focused on continuing to build the Australian team and services through the adoption of bleeding edge training, technologies and techniques.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span lang=\\&quot;en-us\\&quot; xml:lang=\\&quot;en-us\\&quot;&gt;Passionate about everything tech, Ryan has deep experience in cyber security. His strengths include Open Source Investigation, Security Operations, Incident Management and Penetration Testing.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span lang=\\&quot;en-us\\&quot; xml:lang=\\&quot;en-us\\&quot;&gt;Eager to share his knowledge and insight wherever possible, Ryan frequently provides mentoring and training within the industry to colleagues and students alike, having previously\\u00a0&lt;\\\/span&gt;&lt;span lang=\\&quot;en-us\\&quot; xml:lang=\\&quot;en-us\\&quot;&gt;led workshops, presentations and competitive hacking teams through Cyber Security competitions.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span lang=\\&quot;en-us\\&quot; xml:lang=\\&quot;en-us\\&quot;&gt;Having joined Waterstons Australia in it\\u2019s infancy, Ryan has leveraged his knowledge and team to build and deliver new services to clients globally,\\u00a0&lt;\\\/span&gt;&lt;span lang=\\&quot;en-us\\&quot; xml:lang=\\&quot;en-us\\&quot;&gt;including intelligence led scanning, penetration testing and BAU Security Operations.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span lang=\\&quot;en-us\\&quot; xml:lang=\\&quot;en-us\\&quot;&gt;Deeply curious and fascinated with the Internet and Cyber Security, Ryan spends large amounts of his spare time contributing to bug bounties, participating in\\u00a0&lt;\\\/span&gt;&lt;span lang=\\&quot;en-us\\&quot; xml:lang=\\&quot;en-us\\&quot;&gt;competitive hacking with his team, attending talks and presentations and eagerly exploring the Internet.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 16, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-168-ryan-okell&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/c2bcfded-27da-4603-b792-d2eaa3957d9b-KBKAST-EP-Ryan-OKell.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;38:39&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1678982416,&quot;key&quot;:&quot;a1f125980d8a336a3000436c133dafaf&quot;},&quot;ppe-4514-238&quot;:{&quot;title&quot;:&quot;Episode 167: Satnam Narang&quot;,&quot;description&quot;:&quot;&lt;p&gt;In this episode, Satnam explores the dangers of pig butchering scams, which are a type of investment fraud that typically involve romance and human trafficking, originating in Southeast Asia. He discusses elaborate scams using romance platforms, and how criminals use stolen images of real women to present themselves as real people. He also explores the dangers of online dating scams and the repercussions which can be severe. Finally, He suggests people should always question if something seems too good to be true.&lt;\\\/p&gt;\\n&lt;p&gt;Satnam Narang is Sr. Staff Research Engineer at Tenable with over 14 years of experience in the industry (M86 Security and Symantec). He contributed to the Anti-Phishing Working Group, helped develop a Social Networking Guide for the National Cyber Security Alliance, uncovered a huge spam botnet on Twitter and was the first to report on spam bots on Tinder.&lt;\\\/p&gt;\\n&lt;p&gt;He\\u2019s appeared on NBC Nightly News, Entertainment Tonight, Bloomberg West, and the Why Oh Why podcast.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 10, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-167-satnam-narang&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/3a27a5cd-8c7e-439d-97a8-7bfecb87825f-KBKAST-EP-Satnam-Narang.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;39:04&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1678464050,&quot;key&quot;:&quot;1592767049d608647b9197df9adf9e31&quot;},&quot;ppe-4514-239&quot;:{&quot;title&quot;:&quot;Episode 166: Jane Frankland&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Jane Frankland is an award-winning leader, best-selling author, speaker and change agent. Through her company, collaborations and partnerships, Jane is solving the problem of making women standard in male dominated industries like cyber, as she believes if you\\u2019re short on women, you are less safe, happy and prosperous.\\u00a0&lt;\\\/span&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Having spent over two decades in cybersecurity, Jane has become one of the industry\\u2019s most celebrated female influencers and UNESCO has called her a trailblazing woman in tech. She started in tech by building her own hacking firm in the late 90s but has also worked as a senior executive for world renown consultancies. She regularly shares her thought leadership in the media, including the top broadsheets, at events, as a university guest lecturer and board adviser. She is known for spotting trends, bringing teams together for mutual wins, solving root problems fast, plus all the work she does with women. &lt;\\\/span&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;She is driven by her three children, an obsession to deliver outstanding quality and to make a positive difference in the world.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 8, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-166-jane-frankland&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/e6ca5c8a-1c1b-46c1-a9b9-7b0349ba774e-KBKAST-EP-Jane-Frankland.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;45:51&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1678291230,&quot;key&quot;:&quot;d2a24e0ecfa5038b8b1b27c6b03c0490&quot;},&quot;ppe-4514-240&quot;:{&quot;title&quot;:&quot;Episode 165: Brenton Cooper&quot;,&quot;description&quot;:&quot;&lt;p&gt;As leader of Fivecast, Brenton is responsible for driving innovation in the security industry through the application of world leading data science techniques to the field of open-source intelligence (OSINT). Brenton was formerly CTO of the Data To Decisions CRC, a $100 million collaborative research initiative to address data analysis challenges facing Australia\\u2019s national security agencies. This work led to the formation and spin-out of Fivecast, where he and the team are working toward their mission to enable a safer world by providing digital intelligence solutions that help protect global communities. Brenton has a Ph.D. in neural networks and his 20+ year career spans technology and management roles for companies including BAE Systems, Tenix Defence and Motorola.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 2, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-165-brenton-cooper&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/3e521f9e-48bf-433f-b2b5-8305a0364e44-KBKAST-EP-Brenton-Cooper.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:24&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1677772848,&quot;key&quot;:&quot;6d8ee3f2b31e156fc1163a639ac94352&quot;},&quot;ppe-4514-241&quot;:{&quot;title&quot;:&quot;Episode 164: Liam Ryan&quot;,&quot;description&quot;:&quot;&lt;p&gt;Liam RYAN is the CEO of GM Risk Group, a Intelligence Solutions and High Risk Consultancy firm with its Head Office in Australia and entities in both The US and Netherlands. He\\u00a0 has 15 + years industry experience ranging from operational surveillance, close personal protection and logistics in high risk and conflict zones around the globe, to executive security and risk management, corporate advisory and the provision of complex security solutions for large multinationals and ultra-high net worth entities.&lt;\\\/p&gt;\\n&lt;p&gt;Operational experience though out Australia, South East Asia, North, East, South and West Africa, the Americas,\\u00a0 Middle East and most recently Ukraine.&lt;\\\/p&gt;\\n&lt;p&gt;Liam has recently returned after multiple deployments in Ukraine where GM Risk Group have been providing Security Advisory, Logistics, Close Protection and Emergency Management for media clients covering the ongoing conflict with Russia.&lt;\\\/p&gt;\\n&lt;p&gt;Liam and GM Risk Group first deployed to Ukraine in early January 2022, and in the following months had over 15 teams across the country. They maintained a presence since and have also been providing civilian evacuations, safe access for NGO\\u2019s and supply chains of aid.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 28, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-164-liam-ryan&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/34f27af6-a931-4d74-89e5-6262393cd1b5-KBKAST-EP-Liam-Ryan-Final.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;32:27&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1677600029,&quot;key&quot;:&quot;6461b6845be15a1ad0df999225269cb6&quot;},&quot;ppe-4514-242&quot;:{&quot;title&quot;:&quot;Episode 163: Helen Hamilton-James&quot;,&quot;description&quot;:&quot;&lt;p&gt;Helen Hamilton-James has over 28 years of experience providing assurance and advisory services to clients across many sectors in Australia, Papua New Guinea and the UK. Having started her career as a graduate in Deloitte\\u2019s London office, Helen moved to Sydney in 1997 as part of a global development program.&lt;\\\/p&gt;\\n&lt;p&gt;Since becoming Partner in 2004, Helen has held multiple leadership roles including Office Managing Partner for Papua New Guinea, Chief Operating Officer of Deloitte Private and Assurance and Advisory Leader in Deloitte\\u2019s Western Sydney and Canberra offices.&lt;\\\/p&gt;\\n&lt;p&gt;In her current role as Office Managing Partner for Western Sydney, Helen is a passionate advocate for the region and all that it has to offer. She is focused on providing exceptional service to our clients across the area and creating a great place to work for partners and employees based in our Western Sydney office.&lt;\\\/p&gt;\\n&lt;p&gt;Outside of work, Helen is currently a non-executive director serving on the boards of SDN Children\\u2019s Services and Good360 Australia&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 23, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-163-helen-hamilton-james&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/dcd38e6e-b304-483b-a8ca-0c28640cbfcf-KBKAST-EP-Helen-Hamilton-James.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;35:08&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1677168002,&quot;key&quot;:&quot;36171e9d0094c6e3069eeaad24dd775c&quot;},&quot;ppe-4514-243&quot;:{&quot;title&quot;:&quot;Episode 162: Steve Singer&quot;,&quot;description&quot;:&quot;&lt;p&gt;Stephen is a proven sales and business leader with over 15 years\\u2019 experience in cloud-based IT. He has led high growth businesses in both North America and ANZ from small to enterprise software organisations&lt;\\\/p&gt;\\n&lt;p&gt;His passion and ability to recruit, motivate and lead extraordinary teams is the key to consistently exceeding business goals. His leadership style is a transparent and consultative approach that focuses on driving value for the customer first and working from the front lines with his team. In every engagement from clients, to partners and colleagues, he demands high ethics and integrity each step of the way.&lt;\\\/p&gt;\\n&lt;p&gt;Within Zscaler, Steve helps organisations secure their business, clients, and staff with world-leading technology.&lt;\\\/p&gt;\\n&lt;p&gt;Access the report here: &lt;a href=\\&quot;https:\\\/\\\/info.zscaler.com\\\/resources-industry-report-2022-vpn-risk-report-by-cybersecurity-insiders-zscaler\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;2022 VPN Risk Report Industry report by Cybersecurity Insiders&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 21, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-162-steve-singer&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1f3978e4-fc9c-49e4-90fb-2973fbbf9720-KBKAST-EP-Steve-Singer.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:01&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1676995208,&quot;key&quot;:&quot;f7d2f8ce8ae1b7415ac2bba633e23bbd&quot;},&quot;ppe-4514-244&quot;:{&quot;title&quot;:&quot;Episode 161: Mike Johnson&quot;,&quot;description&quot;:&quot;&lt;p&gt;Mike Johnson joined Fastly as Chief Information Security Officer in 2019 and has more than 20 years\\u2019 experience in the security industry having previously been CISO at Lyft and at Salesforce for nine years where his leadership was instrumental in building and growing the company\\u2019s detection and response organisation. At Fastly, Mike is focused on supporting the company\\u2019s mission to build a more trustworthy Internet and bolstering security alongside performance, scale and edge functionality as the company continues to grow its edge computing offerings.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 17, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-161-mike-johnson&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/e09e4baf-4fd0-43ae-9574-cd1c6715b520-KBKAST-EP-Mike-Johnson-edited.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;45:06&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1676649647,&quot;key&quot;:&quot;60ff77742ece2b893a1ee04550a259f6&quot;},&quot;ppe-4514-245&quot;:{&quot;title&quot;:&quot;Episode 160: Mark Guntrip&quot;,&quot;description&quot;:&quot;&lt;p&gt;Mark Guntrip leads cybersecurity strategy at Menlo Security. He brings over twenty years experience in the enterprise security market where, through a range of roles including engineering, product management and product marketing. He has a proven track record of building success in new markets as well as promoting growth within more established areas. Prior to Menlo Security, Guntrip held various management roles within companies including Proofpoint, Symantec and Cisco. Guntrip earned his Master\\u2019s degree in Electronic Engineering from Southampton University, UK.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 15, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-160-mark-guntrip&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/18a9247a-a883-4e28-af80-4d631d33182d-KBKAST-EP-Mark-Guntrip.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;44:01&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1676476826,&quot;key&quot;:&quot;dd58cfae520761ac60cfc9ec533a1186&quot;},&quot;ppe-4514-246&quot;:{&quot;title&quot;:&quot;Epsiode 159: Rosie Anderson&quot;,&quot;description&quot;:&quot;&lt;p&gt;Rosie Anderson has worked in tech recruitment since 2002, and cyber security recruitment for over 7 years. After having a second baby right at the start of the pandemic, she decided to leave a stable career in recruitment and joined a start up recruitment business in Manchester, called Honeypot Digital at the beginning of 2021.&lt;\\\/p&gt;\\n&lt;p&gt;Rosie prides herself on being open and transparent, which sometimes means asking tough questions \\u2013 either about a person\\u2019s career or about a company hiring process and culture. Having worked in recruitment for two decades now, Rosie has built many successful relationships with companies and candidates and looks to share her advice on how to get recruitment right and how to avoid costly mistakes.&lt;\\\/p&gt;\\n&lt;p&gt;Businesses need great talent management to grow, and Rosie looks to partner with her customers to be that integral function of their business, often representing clients and candidates exclusively. She strives to not only resolve recruitment and career challenges but to safeguard both parties interests and deliver real solutions while doing so.&lt;\\\/p&gt;\\n&lt;p&gt;As a working parent, working working in a start-up Rosie knows how to juggle like the best of them. She also heads up the Industry Mentoring Programme for Capslock, a cyber training provider that retrains adult learners into future cyber security talent in as little as 16 weeks.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 8, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/epsiode-159-rosie-anderson&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2f7208bf-171e-44f0-961e-48698851ab60-KBKAST-EP-Rosie-Anderson.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;45:26&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1675872022,&quot;key&quot;:&quot;68d6de9f7feb018189d919d350e30a39&quot;},&quot;ppe-4514-247&quot;:{&quot;title&quot;:&quot;Episode 158: Alton Johnson&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;b&gt;ALTON JOHNSON&lt;\\\/b&gt;&lt;b&gt;&lt;br \\\/&gt;\\n&lt;\\\/b&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Founder &amp; Principal Security Consultant&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Alton Johnson is the Founder and Principal Security Consultant for Vonahi Security. Prior to Vonahi Security, Alton worked at several large and small cybersecurity consulting firms as a Principal Security Consultant. Throughout his professional career, he has performed hundreds of security assessments for organizations ranging from small businesses to Fortune 10. He is proficient in performing both traditional security assessments, such as network, physical, and application penetration testing, as well as advanced security assessments, such as red team engagements.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;With over a decade of experience as a security consultant and over 10 industry-related certifications, Alton has helped hundreds of organizations requiring unique, modern-day approaches to solve today\\u2019s most complex security challenges.\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;As the Founder of Vonahi Security, Alton regularly conducts research to identify ways to help organizations combat ever-changing cyber threats through efficient, automated, cost-effective, and non-traditional security assessments.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;&lt;b&gt;Notable Accomplishments&lt;\\\/b&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Alton has developed several penetration testing tools and scripts that are used widely within the information security industry. Alton also developed and published several open-source tools to platforms such as GitHub, Metasploit Framework, as well as Kali Linux (formerly known as Backtrack Linux), all of which are the most recognized and used tools and operating systems within the information security consulting industry.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;The penetration testing tools that were developed by Alton were written in multiple scripting languages, which provides him the ability to quickly and efficiently develop exploits and scripts that can be used for network traffic analysis, protocol\\\/service fuzzing, exploitation, and quick completion of extremely time-consuming network-related tasks.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;&lt;b&gt;Certifications &amp; Training&lt;\\\/b&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Alton successfully obtained some of the industry\\u2019s most challenging and respected security certifications, including Offensive Security Certified Expert (OSCE), Offensive Security Certified Professional (OSCP), as well as eLearnSecurity\\u2019s Certified Professional Penetration Tester (eCPPT). He also regularly attends information security conferences and has spoken at DerbyCon, Podcasts, and local community events.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;&lt;b&gt;Areas of Expertise&lt;\\\/b&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Cybersecurity, automated penetration testing, vulnerability research, exploit development, coding, cryptography, malware, phishing, social engineering, and technology innovation.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;&lt;b&gt;Non-Hacking Hobbies&lt;\\\/b&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Aside from cybersecurity, Alton is also a car enthusiast. He enjoys modifying and racing his car on the tracks. He\\u2019s also into photography, especially automotive photography, and shooting pool as often as possible.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;&lt;b&gt;Connect with Alton&lt;\\\/b&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Email: &lt;\\\/span&gt;&lt;a href=\\&quot;mailto:alton@vonahi.io\\&quot;&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;alton@vonahi.io&lt;\\\/span&gt;&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Website: &lt;\\\/span&gt;&lt;a href=\\&quot;https:\\\/\\\/www.altonj.io\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;www.altonj.io&lt;\\\/span&gt;&lt;\\\/a&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Linkedin: &lt;\\\/span&gt;&lt;a href=\\&quot;https:\\\/\\\/www.linkedin.com\\\/in\\\/altonjx\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;https:\\\/\\\/www.linkedin.com\\\/in\\\/altonjx\\\/&lt;\\\/span&gt;&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Twitter: &lt;\\\/span&gt;&lt;a href=\\&quot;https:\\\/\\\/twitter.com\\\/altonjx\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;https:\\\/\\\/twitter.com\\\/altonjx&lt;\\\/span&gt;&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 1, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-158-alton-johnson&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/edfea182-4618-41bf-9f26-5369b01ceaa4-KBKAST-EP-Alton-Johnson.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;38:59&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1675267251,&quot;key&quot;:&quot;09975c5edaae4721c8593b73b7dc8ea9&quot;},&quot;ppe-4514-248&quot;:{&quot;title&quot;:&quot;Episode 157: Thomas Kinsella&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Thomas Kinsella is the Co-founder and COO of Tines, a no-code automation platform for security teams. Before Tines, Thomas led security teams in companies like Deloitte, eBay, and DocuSign. As COO, Thomas is responsible for customer success, professional services, and more. Thomas has a degree in Management Science and Information Systems Studies from Trinity College in Dublin.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 25, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-157-thomas-kinsella&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/0278cae2-6a27-4abe-afba-de536785bb67-KBKAST-EP-Thomas-Kinsella.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;42:55&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1674662442,&quot;key&quot;:&quot;1e8f24dff268d52453ec6930afeb7bc9&quot;},&quot;ppe-4514-249&quot;:{&quot;title&quot;:&quot;Episode 156: Dave Maunsell&quot;,&quot;description&quot;:&quot;&lt;p&gt;Dave is an accomplished executive with a strong affinity for technology and a keen business sense for the application of emerging solutions. He has a proven talent for identifying core business needs and translating them into outcomes.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to joining Haventec, Dave spent ~20 years at Accenture where he occupied a number of geographic leadership, account leadership and delivery leadership roles including Managing Director for Accenture Digital (AU and NZ), Inclusion and Diversity Lead (AU), Capital Markets Lead (AU) as well as Client Leadership roles for a number of Accenture\\u2019s Financial Services clients.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to joining Accenture, Dave spent five years at the Australian Stock exchange in a number of roles including the Internet and Information Security Lead.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 18, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-156-dave-maunsell&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/d98875e7-4f9b-4804-bd0f-f6e3a3f7b94b-KBKAST-EP-Dave-Maunsell.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;38:29&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1674036044,&quot;key&quot;:&quot;b2b28193424bb0074eb46206e46e6f50&quot;},&quot;ppe-4514-250&quot;:{&quot;title&quot;:&quot;Episode 155: Elliot Dellys and Daniel Hood&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;a href=\\&quot;https:\\\/\\\/www.linkedin.com\\\/in\\\/elliot-dellys\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Elliot Dellys&lt;\\\/a&gt; (PCI QSA, CISSP, CISM, CIS LA) is the founder and Chief Realist (CEO) of Phronesis Security, Australia\\u2019s first B Corp certified cyber security consultancy, with a mission to do \\u2018cyber security for good\\u2019. Previously, Elliot worked for the Australian Signals Directorate and a global managed service provider, where he led the Strategic Consulting division across the Europe, Middle East and Africa region. Elliot is also an industry-recognised information security content publisher, with articles appearing in Computerworld, CSO, Australian Cyber Security Magazine, and InfoSecurity Magazine, covering topics such as cyber security in diplomacy, threat forecasts, and the challenges of coordinating cyber security efforts across government and private industry.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;a href=\\&quot;https:\\\/\\\/www.linkedin.com\\\/in\\\/daniel-hood-71904216\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Daniel Hood&lt;\\\/a&gt; is the Chief Optimist (CTO) at Phronesis Security, Australia\\u2019s first B Corp certified cyber security consultancy. But more importantly, when Daniel isn\\u2019t helping organisations build secure architectures or sitting on the boards of charities, he is playing hockey in his tuxedo for nachos. A former Director for a global MSSP, Daniel has seen it all \\u2013 from misconfigured security technology to out-of-control cyber incidents to misspent budgets. As the Chief Optimist, Daniel runs the Penetration Testing and Security Architecture teams and believes deeply in helping his clients reduce wastage and headaches. He has been in the industry for over a decade in a variety of roles, ranging from network security engineer for Australia\\u2019s largest network to a security architect performing an uplift to the cyber security of a few small nation\\u2019s governments.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 11, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-155-elliot-dellys-and-daniel-hood&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/9c6b8df4-2f88-4cfc-8ebb-a8f7b4707948-KBKAST-EP-Elliot-Dellys-Daniel-Hood.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:39&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1673452852,&quot;key&quot;:&quot;0cd13e4f793d03f758dfeeda273fa32f&quot;},&quot;ppe-4514-251&quot;:{&quot;title&quot;:&quot;Episode 154: Shishir Singh&quot;,&quot;description&quot;:&quot;&lt;p&gt;Shishir Singh is the Executive Vice President and Chief Technology Officer for the BlackBerry Cybersecurity business. A seasoned senior executive, Shishir brings 15+ years of cybersecurity leadership. With his wealth of experience and expertise, Shishir works across the entire organization to set a clear vision roadmap for our next-generation cybersecurity products and services. He engages with our customer base on strategic direction, and identify key partnerships to implement a market-winning technical strategy and vision. Shishir is a passionate advocate for customer-centric design and the use of data and analytics to create compelling offerings that thrill customers.&lt;\\\/p&gt;\\n&lt;p&gt;Before BlackBerry, Shishir served as Senior Vice President and Chief Product Officer, Enterprise Business Group at McAfee. In this role, he was responsible for product strategy, execution, and delivering cutting-edge cybersecurity offerings that protect Enterprise customers from threats to their applications, networks, data, devices, and other critical assets. During his tenure, he transformed the company into a true cloud company and pioneered the teams that delivered McAfee\\u2019s XDR, CNAPP, and SASE (Unified Cloud Edge) solutions in the industry. These products are offered in both on-premises and cloud form factors. They have a footprint across the entire gamut of industry segments, ranging from fledgling start-ups to established banks, Fortune 500 Enterprises, and federal institutions across the globe.&lt;\\\/p&gt;\\n&lt;p&gt;Shishir has also held various engineering, development, and product leadership positions at Cyphort (acquired by Juniper), Cisco, IronPort Systems (acquired by Cisco), Bluecoat Systems (acquired by SYMC\\\/Broadcom), and Silicon Graphics. At the onset of his career, Shishir worked for the Defense Research and Development Organization, (DRDO), a public service undertaking that develops advanced avionics systems for India\\u2019s vast defense sector. He was nominated for the Young Scientist of the Year award for his contribution to the indigenous AWACS project for India.&lt;\\\/p&gt;\\n&lt;p&gt;Shishir holds master\\u2019s degrees in Computer Science from Allahabad University and Electrical Engineering from the Indian Institute of Science, Bangalore, India. Additionally, he has published and presented multiple academic papers for IEEE and holds several patents in the fields of Neural Networks, Artificial Intelligence, and behavior-based modeling for malware analysis. Apart from his boundless passion for his work, in his free time, Shishir enjoys keeping himself active. He loves hot yoga, playing squash, and hiking.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 4, 2023&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-154-shishir-singh&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/8c73aba5-cdba-425e-9bbc-4bc1b90c3e3c-KBKAST-EP-Shishir-Singh.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:38&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1672841964,&quot;key&quot;:&quot;046912265cde17ca0ee0e45ee2c2cd57&quot;},&quot;ppe-4514-252&quot;:{&quot;title&quot;:&quot;Episode 153: Chrystal Taylor&quot;,&quot;description&quot;:&quot;&lt;p&gt;Chrystal Taylor is a dedicated technologist with nearly a decade of experience and has built her career by leveraging curiosity to solve problems, no matter the size, industry, or client. Whether tinkering with the family computer, or inflicting general destruction in MS-DOS Tank Wars, Chrystal has always been a geek.&lt;\\\/p&gt;\\n&lt;p&gt;Chrystal is a SolarWinds deployment veteran who\\u2019s built a successful IT career by translating client needs into optimised and performant systems. She loves customising current deployments to ensure systems grow in tandem with user needs. She\\u2019s achieved several SolarWinds certifications. A THWACK&lt;sup&gt;\\u00ae&lt;\\\/sup&gt;\\u00a0MVP since 2011, she understands the power of community and the SolarWinds commitment to its users.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 28, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-153-chrystal-taylor&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/18bb4dd4-9aee-4e9e-9999-815e3eaf1b9e-KBKAST-EP-Chrystal-Taylor-edited.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:58&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1672243212,&quot;key&quot;:&quot;985f4ac4ff07cb8e747ce3a6a27b62d7&quot;},&quot;ppe-4514-253&quot;:{&quot;title&quot;:&quot;Episode 152: Remy Coll and Simon Smalley&quot;,&quot;description&quot;:&quot;&lt;p&gt;Remy is a blue team cyber security expert with a decade of experience in Federal Government, Private Sector, Law Enforcement, and the Military. He holds a Diploma in Networking, and a Diploma in Systems Administration. He is a GIAC certified security leader, ISO 27001 lead auditor, and IRAP assessor #194.&lt;\\\/p&gt;\\n&lt;p&gt;Remy has been awarded a commendation for his cyber training programs, commanded the first Army Cyber Protection Team, and MC\\u2019s the ADF Cyber Skills Challenge conference every year. He studied Acting at Victorian College of the Arts and has performed in theatres nationally. Every training program, workshop, or presentation that involves him is always more engaging and entertaining than anything involving cyber security has the right to be.&lt;\\\/p&gt;\\n&lt;p&gt;Find Remy on Linkedin: &lt;a href=\\&quot;https:\\\/\\\/www.linkedin.com\\\/in\\\/remy-coll-809946203\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;https:\\\/\\\/www.linkedin.com\\\/in\\\/remy-coll-809946203\\\/&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Simon is a red team cyber security expert with experience in National Intelligence, the Military, and Law Enforcement. He holds a Master of Cyber Security (Advanced Tradecraft) with Excellence from UNSW ADFA. He is an OSCP, eCPPT, a GIAC certified security leader, GIAC certified systems auditor, and IRAP assessor #1308.&lt;\\\/p&gt;\\n&lt;p&gt;A former NSW Police officer, Simon has worked in counter-terrorism &amp; special tactics, investigations, and digital forensics. More recently, Simon has been working directly for the Australian Government within the National Intelligence Community. He has spoken at a number of cyber security conferences, on both technical subjects and case studies on technical investigations, and is a mentor on the ADF Cyber Gap Program.&lt;\\\/p&gt;\\n&lt;p&gt;Find Simon on Linkedin: &lt;a href=\\&quot;https:\\\/\\\/www.linkedin.com\\\/in\\\/simon-smalley-b673a2233\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;https:\\\/\\\/www.linkedin.com\\\/in\\\/simon-smalley-b673a2233\\\/&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 22, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-152-remy-coll-and-simon-smalley&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/3eaa6cd7-52bb-4914-adfe-dd3010a2bcff-KBKAST-EP-Remy-Coll-Simon-Smalley.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;44:42&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1671724825,&quot;key&quot;:&quot;c0ffc0f541bb6424ac61be0023f330ab&quot;},&quot;ppe-4514-254&quot;:{&quot;title&quot;:&quot;Episode 151: Torsten George&quot;,&quot;description&quot;:&quot;&lt;p&gt;Torsten George is currently a cyber security evangelist at\\u00a0&lt;a href=\\&quot;https:\\\/\\\/www.absolute.com\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;&lt;strong&gt;Absolute Software&lt;\\\/strong&gt;&lt;\\\/a&gt;, which helps organizations establish resilient security controls on endpoints. He also serves as strategic advisory board member at vulnerability risk management software vendor, NopSec. He is an internationally recognized IT security expert, author, and speaker. Torsten has been part of the global IT security community for more than 27 years and regularly provides commentary and publishes articles on data breaches, insider threats, compliance frameworks, and IT security best practices. He is also the co-author of the Zero Trust Privilege For Dummies book. Torsten has held executive level positions with Centrify, RiskSense, RiskVision (acquired by Resolver, Inc.), ActivIdentity (acquired by HID\\u00ae Global, an ASSA ABLOY\\u2122 Group brand), Digital Link, and Everdream Corporation (acquired by Dell).&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 21, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-151-torsten-george&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/5b27f2ef-c908-48e4-ad30-e135e9ebb228-KBKAST-EP-Torsten-George.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;39:41&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1671638427,&quot;key&quot;:&quot;dc635282a2af8b6b839097de62abc4f4&quot;},&quot;ppe-4514-255&quot;:{&quot;title&quot;:&quot;Episode 150: Edgard Capdevielle&quot;,&quot;description&quot;:&quot;&lt;p class=\\&quot;xm2695081588078953269m6720636871701313085gmail-m-8348018691133588858xmsonormal\\&quot;&gt;Edgard Capdevielle is President, CEO and co-founder of operational tech and IoT firm Nozomi Networks.\\u00a0Edgard brings an extensive background in successfully managing and expanding markets for both start-ups and established technology companies to his role as CEO. Previously he was Vice President of Product Management and Marketing for Imperva, where he led teams that made the company\\u2019s web and data security products leaders in their space. Prior to that he was a key executive at storage companies Data Domain and EMC.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 14, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-150-edgard-capdevielle&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/21d83864-b0cc-47a5-8767-946a602d150b-KBKAST-EP-Edgard-Capdevielle.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:20&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1671033609,&quot;key&quot;:&quot;9e0cbfb078bc50649960e51132581fc5&quot;},&quot;ppe-4514-256&quot;:{&quot;title&quot;:&quot;Episode 149: Matt Johnston&quot;,&quot;description&quot;:&quot;&lt;div class=\\&quot;page\\&quot; title=\\&quot;Page 1\\&quot;&gt;\\n&lt;div class=\\&quot;section\\&quot;&gt;\\n&lt;div class=\\&quot;layoutArea\\&quot;&gt;\\n&lt;div class=\\&quot;column\\&quot;&gt;\\n&lt;p&gt;Born in Sydney, Australia, and having lived in the United States for the past 12 years, Matt Johnston has had an international career as an entrepreneur and founder, creating and leading companies in verticals including service, manufacturing, distribution and direct to consumer. Johnston\\u2019s early career was in Security Risk Management and Investigation, working as a Security Consultant and other related roles.&lt;\\\/p&gt;\\n&lt;p&gt;With a passion for furthering society through innovation and technology, Johnston currently works with founder-led companies and private and institutional investors to create value for all stakeholders through Venture Capital, Private Equity and other investment. His track record of excellence and his balance of business acumen, technology knowledge and finance experience, sees Johnston advising startups, securing startup finance, advising established companies on exit strategies, as well as executing for them on mergers and acquisitions.&lt;\\\/p&gt;\\n&lt;p&gt;In addition to his core business activities, he works with a number of US based startup accelerators in vetting and selecting startup companies for investment and\\\/or engagement in accelerator programs.&lt;\\\/p&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 7, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-149-matt-johnston&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/bf9cc918-305e-403d-b7a1-af17047b8a6e-KBKAST-EP-Matt-Johnston.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;41:01&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1670428814,&quot;key&quot;:&quot;c0736aa047e9845f6c5c71860b89bd4c&quot;},&quot;ppe-4514-257&quot;:{&quot;title&quot;:&quot;Episode 148: Lena Smart&quot;,&quot;description&quot;:&quot;&lt;p&gt;Lena joined MongoDB in March 2019, with more than 20 years of cybersecurity experience. Before joining MongoDB, she was the Global Chief Information Security Officer for the international fintech company, Tradeweb, where she was responsible for all aspects of cybersecurity. She also served as CIO and Chief Security Officer for the New York Power Authority, the largest state power organization in the country. Lena is a founding member of Cybersecurity at MIT Sloan, formerly the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity, which allows security leaders in academia and the private sector to collaborate on tackling the most challenging security issues. Lena is a member of IT-ISAC, frequently speaks at industry events and has been featured in Fortune, Dark Reading and CSO Online.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 2, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-148-lena-smart&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/124aac00-17d4-43e9-916a-83d9982a7afa-KBKAST-EP-Lena-Smart-edited.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;44:46&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1669996847,&quot;key&quot;:&quot;5e3212e1dd4d70907cf1e47ddaa41b19&quot;},&quot;ppe-4514-258&quot;:{&quot;title&quot;:&quot;Episode 147: Sean Duca&quot;,&quot;description&quot;:&quot;&lt;p&gt;Sean is the Regional chief security officer for Asia Pacific and Japan at Palo Alto Networks. In this role, Sean spearheads the development of thought leadership, threat intelligence and security best practices for the cybersecurity community and business executives.&lt;br \\\/&gt;\\nWith more than 20 years of experience in the IT and security industry, he acts as a trusted advisor to organisations across the region and helping them improve their security postures and align security strategically with business initiatives.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to joining Palo Alto Networks, he spent 15 years in a variety of roles at Intel Security (McAfee), with his last position as the Chief Technology Officer for Asia Pacific. Before this, Sean was involved in software development, technical support and consulting services for a range of Internet security solutions.&lt;br \\\/&gt;\\nSean actively discusses security issues in mainstream media, including television, radio, print and security related broadcasts. He regularly participates in forums, conferences and panels, and provides intelligence on cybersecurity matters to the public and private sector.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 29, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-147-sean-duca&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/86251671-ab8d-4095-96fb-f28d015ba7c8-KBKAST-EP-Sean-Duca.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;29:24&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1669723218,&quot;key&quot;:&quot;b47ecead91cf235db98d6b32ddc08e75&quot;},&quot;ppe-4514-259&quot;:{&quot;title&quot;:&quot;Episode 146: Dan Woods&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;b&gt;Dan\\u00a0Woods\\u00a0is the Global Head of Intelligence at F5&lt;\\\/b&gt;. Prior to F5,\\u00a0Dan\\u00a0spent more than 20 years with local, state, and federal law enforcement and intelligence organizations including the FBI as a special agent and the CIA as a cyber operations officer.&lt;\\\/p&gt;\\n&lt;p&gt;See also:&lt;\\\/p&gt;\\n&lt;ul&gt;\\n&lt;li&gt;&lt;a href=\\&quot;https:\\\/\\\/www.f5.com\\\/company\\\/blog\\\/bot-traffic-percentage-fake-accounts-expert\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt; I\\u2019m a former CIA cyber-operations officer who studies bot traffic. Here\\u2019s why it\\u2019s plausible that more than 80% of Twitter\\u2019s accounts are actually fake\\u2014and Twitter is not alone.&lt;\\\/a&gt;&lt;\\\/li&gt;\\n&lt;li&gt;&lt;a href=\\&quot;https:\\\/\\\/www.tesmanian.com\\\/blogs\\\/tesmanian-blog\\\/former-fbi-agent-confirms-elon-musks-claim-of-undercounting-bot-accounts-on-twitter-by-conducting-his-own-research\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Former FBI Agent Confirms Elon Musk\\u2019s Claim of Undercounting Bot Accounts on Twitter by Conducting His Own Research&lt;\\\/a&gt;&lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 25, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-146-dan-woods&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/5995c590-2dd6-44a6-b27a-0fb7f5fd09f5-KBKAST-EP-Dan-Woods.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;50:24&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1669392038,&quot;key&quot;:&quot;0250fc3ac9330ad485c7858f7cd68f0d&quot;},&quot;ppe-4514-260&quot;:{&quot;title&quot;:&quot;Episode 145: Nathan Wenzler&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Nathan Wenzler is the Chief Security Strategist at Tenable, the Cyber Exposure company. Nathan has over two decades of experience designing, implementing and managing both technical and non-technical security solutions for IT and information security organizations. He has helped government agencies and Fortune 1000 companies alike build new information security programs from scratch, as well as improve and broaden existing programs with a focus on process, workflow, risk management and the personnel side of a successful security program.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;As the Chief Security Strategist for Tenable, Nathan brings his expertise in vulnerability management and Cyber Exposure to executives and security professionals around the globe in order to help them mature their security strategy, understand their cyber risk and measurably improve their overall security posture.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;See also: &lt;a href=\\&quot;https:\\\/\\\/www.proofpoint.com\\\/us\\\/resources\\\/threat-reports\\\/cost-of-insider-threats\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;2022 Ponemon Cost of Insider Threats Global Report&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 23, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-145-nathan-wenzler&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/3d4638c4-2066-48f7-b593-7d1141ec17eb-KBKAST-EP-Nathan-Wenzler.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;47:09&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1669219216,&quot;key&quot;:&quot;f4d8716feb832bb06a1321a9a3f95f6a&quot;},&quot;ppe-4514-261&quot;:{&quot;title&quot;:&quot;Episode 144: Dane Meah&quot;,&quot;description&quot;:&quot;&lt;p&gt;Dane\\u2019s first business adventure was at aged 18 where he developed and sold digital information products from his home, via online stores. This experience gave Dane a taste for business and pursued a career in sales. After several years in the recruitment and pharmaceutical sectors, Dane relocated to Australia and entered the cybersecurity industry with an early cloud provider called MessageLabs.&lt;\\\/p&gt;\\n&lt;p&gt;Dane played a key role in MessageLabs becoming the market leader in Australia, earning regular accolades along the way, including \\u201cglobal top performer\\u201d.\\u00a0 In this role, he worked with senior IT executives from many of Australia\\u2019s largest businesses to secure their network from cybercrime.&lt;\\\/p&gt;\\n&lt;p&gt;In 2014, Dane identified a gap in the market in the way organisations were addressing security management and co-founded InfoTrust. InfoTrust are a specialised cybersecurity practice, that supports their clients to become secure and more productive.&lt;\\\/p&gt;\\n&lt;p&gt;InfoTrust has evolved to over 40 staff to develop deep expertise that combines internally developed products, professional services, managed services and third party technologies, across a range of cybersecurity domains.&lt;\\\/p&gt;\\n&lt;p&gt;In 2021, InfoTrust split off a SaaS platform project to incorporate MyCISO. MyCISO simplifies the journey for organisations and their IT providers to assess, improve and manage their cybersecurity improvement journey.&lt;\\\/p&gt;\\n&lt;p&gt;As at July 2022, the MyCISO team consists of 12 staff made up of Product and Software Engineers (9) Operational (2), Sales and Pre-Sales (2).&lt;\\\/p&gt;\\n&lt;p&gt;Dane is married, a father to 3 children and lives between Sydney and a farm in the hunter valley.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 18, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-144-dane-meah&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/c0f150b7-b69f-4bf7-b6a2-a6aa34c75786-KBKAST-EP-Dane-Meah-edited.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:20&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1668787223,&quot;key&quot;:&quot;f7247f299d03035d27b331f307698e2c&quot;},&quot;ppe-4514-262&quot;:{&quot;title&quot;:&quot;Episode 143: Arun Vishwanath&quot;,&quot;description&quot;:&quot;&lt;p&gt;Dr. Arun Vishwanath studies the \\u201cpeople problem\\u201d of cybersecurity.&lt;\\\/p&gt;\\n&lt;p&gt;His research focuses on improving individual, organizational, and national resilience to cyber attacks by focusing on the weakest links in cyber security\\u2014Internet users.&lt;\\\/p&gt;\\n&lt;p&gt;His particular interest is in understanding why people fall prey to social engineering attacks that come in through email and social media, and on ways we can harness this understanding to secure cyberspace.&lt;\\\/p&gt;\\n&lt;p&gt;Dr. Vishwanath is an alumnus of the\\u00a0&lt;a href=\\&quot;https:\\\/\\\/cyber.harvard.edu\\\/people\\\/avish\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Berkman Klein Center at Harvard University&lt;\\\/a&gt;. \\u00a0He was a tenured associate professor at the University at Buffalo and was faculty at Indiana University, Bloomington. \\u00a0He serves as the CTO of\\u00a0&lt;a href=\\&quot;https:\\\/\\\/www.avantresearchgroup.com\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Avant Research Group (ARG)&lt;\\\/a&gt;\\u2014a Buffalo, New York based cyber security research and advisory firm, where he\\u00a0consults for major corporations and government agencies on issues ranging from cybersecurity to consumer protection. He also serves as a distinguished expert for the &lt;a href=\\&quot;https:\\\/\\\/cps-vo.org\\\/group\\\/sos\\\/papercompetition\\\/reviewers\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;NSA\\u2019s Science of Security &amp; Privacy&lt;\\\/a&gt;\\u00a0directorate.&lt;\\\/p&gt;\\n&lt;p&gt;Dr. Vishwanath\\u2019s research on improving cyber resilience against online social engineering has been funded by the National Science Foundation. He has published &lt;a href=\\&quot;https:\\\/\\\/www.arunvishwanath.us\\\/https;\\\/\\\/www.arunvishwanath.us\\\/publications\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;close to 50 articles on technology users and cybersecurity issues&lt;\\\/a&gt; and his research &lt;a href=\\&quot;https:\\\/\\\/www.arunvishwanath.us\\\/https;\\\/\\\/www.arunvishwanath.us\\\/invited-talks\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;has been presented to principals at national security and law enforcement agencies around the world&lt;\\\/a&gt;. He has also presented his work at &lt;a href=\\&quot;https:\\\/\\\/www.arunvishwanath.us\\\/https;\\\/\\\/www.arunvishwanath.us\\\/conference-papers\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;leading global security conferences, multiple times by invitation at the US Senate\\\/SSA and House, as well as four consecutive times at BlackHat&lt;\\\/a&gt;.&lt;\\\/p&gt;\\n&lt;p&gt;Here\\u2019s the link to the book and the discount code. Anyone ordering the book with a US address can get 15% off The Weakest Link when you enter the discount code \\u201cREADMIT15\\u201d here:&lt;\\\/p&gt;\\n&lt;div class=\\&quot;js-react-root\\&quot;&gt;&lt;span class=\\&quot;loader-wrapper\\&quot;&gt;&lt;span&gt;&lt;a class=\\&quot;css-11f6v4u\\&quot; href=\\&quot;https:\\\/\\\/www.penguinrandomhouse.com\\\/search\\\/site\\\/?q=9780262047494\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;&lt;span class=\\&quot;css-1awfwlv\\&quot;&gt;&lt;span class=\\&quot;css-1n3444m\\&quot;&gt;&lt;img class=\\&quot;smart-link-icon css-qq5phv\\&quot; src=\\&quot;https:\\\/\\\/www.penguinrandomhouse.com\\\/favicon.ico\\&quot; alt=\\&quot;favicon.ico\\&quot; \\\/&gt;&lt;\\\/span&gt;&lt;span class=\\&quot;smart-link-title-wrapper css-0\\&quot;&gt;The Weakest Link by Arun Vishwanath: 9780262047494 | PenguinRandomHouse.com: Books&lt;\\\/span&gt;&lt;\\\/span&gt;&lt;\\\/a&gt;&lt;\\\/span&gt;&lt;\\\/span&gt;&lt;\\\/div&gt;\\n&lt;div class=\\&quot;wp-caption alignleft\\&quot;&gt;&lt;\\\/div&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 16, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-143-arun-vishwanath&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/4dba50bd-d4f9-4321-a1cd-a41f1cf43d2c-KBKAST-EP-Arun-Vishwanath.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;01:00:01&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1668614447,&quot;key&quot;:&quot;8ab9ce75c70d92c6e502ea2b95bdadf6&quot;},&quot;ppe-4514-263&quot;:{&quot;title&quot;:&quot;Episode 142: Alastair Dickson&quot;,&quot;description&quot;:&quot;&lt;p&gt;Alastair has spent the last 20 years working in Cyber Security and Risk Management. He is a passionate believer that security solutions should enable a business to take advantage of all the benefits of the digital world, while not putting the organisation\\u2019s data or productivity at risk.&lt;\\\/p&gt;\\n&lt;p&gt;From working within start-ups to established vendors Alastair has the knowledge to launch and grow markets for technology that cuts through the noise to recommend a methodology that really moves his clients forward, maturing the approach they take.&lt;\\\/p&gt;\\n&lt;p&gt;Having 4 children means he knows what it takes to keep teams focused on the right challenges to delight their customers every day. Building trust at all levels is crucial to this success.&lt;\\\/p&gt;\\n&lt;p&gt;Helping to de-mystify the Cyber market is Alastair\\u2019s a key objective, as he believes it can only help the cause if we work together and share intelligence to keep the bad guys out and businesses operating smoothly.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 9, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-142-alastair-dickson&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/5901345e-a854-49ba-8bb9-bb9c4f73a227-KBKAST-EP-Alastair-Dickson.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;41:17&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1668009602,&quot;key&quot;:&quot;8bbccc9a23dcd46e0f2fcca31a5650c9&quot;},&quot;ppe-4514-264&quot;:{&quot;title&quot;:&quot;Episode 141: Sarah Sloan&quot;,&quot;description&quot;:&quot;&lt;p&gt;Sarah Sloan is the Head of Government Affairs &amp; Public Policy for Australia and New Zealand at Palo Alto Networks. She advises the company\\u2019s leadership on a range of cyber and technology policy\\\/regulatory issues, builds strategic relationships across all tiers of government and acts as a trusted private sector adviser to governments in the region.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to her role with Palo Alto Networks, Sarah worked at Accenture Security on a number of government projects and quickly developed a formidable reputation for delivery and stakeholder management in challenging and nationally significant programs..&lt;\\\/p&gt;\\n&lt;p&gt;Sarah has spent 10+ years working in the Federal Government, predominantly in cyber crime and cyber security. She has a proven track record of delivering results at the operational and strategic levels of government and is passionate about improving Australia and New Zealand\\u2019s cyber security posture.&lt;\\\/p&gt;\\n&lt;p&gt;Sarah is a graduate of the Australian National University with a Bachelor of Laws (Hons.) and Bachelor of Asia and the Pacific Studies. She also holds a Graduate Diploma of Asia and the Pacific Studies (Japanese), Graduate Diploma of Legal Practice, and a Master of International Laws, where she wrote her thesis on international norms and cyber security.&lt;\\\/p&gt;\\n&lt;p&gt;Sarah is Chair of the Australian Information Industry Association (AIIA) Cyber Security Policy Advisory Network and is an elected member of the AIIA ACT\\\/Federal Council. She is also a member of the AmCham Digital Economy and Innovation Committee.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 4, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-141-sarah-sloan&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/83a70d7c-c2cd-49fb-b956-b919e0619068-KBKAST-EP-Sarah-Sloan.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;30:29&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1667577646,&quot;key&quot;:&quot;671b7e8dd48c82225e943a2caab78fb2&quot;},&quot;ppe-4514-265&quot;:{&quot;title&quot;:&quot;Episode 140: Chad Skipper&quot;,&quot;description&quot;:&quot;&lt;p&gt;Chad Skipper serves as global security technologist at VMware. With more than 25 years in information security, Chad has served in many executive security technologist and strategist roles of endpoint, network, cloud, and hosted security services at Lastline, acquired by VMware, Cylance, acquired by Blackberry, Dell, Cisco, Symantec and is a USAF veteran.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 2, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-140-chad-skipper&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/018554c2-aabc-493d-8c63-c845255c8816-KBKAST-EP-Chad-Skipper.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;38:37&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1667404810,&quot;key&quot;:&quot;8e1e2185760337dafd7a151f00da72d5&quot;},&quot;ppe-4514-266&quot;:{&quot;title&quot;:&quot;Episode 139: Jo Stewart-Rattray&quot;,&quot;description&quot;:&quot;&lt;div&gt;Jo is a member of ISACA\\u2019s Information Security Advisory Board and Global Ambassador for ANZ. Her areas of expertise include information security governance and strategy, development of policy, security awareness and education, ISO 27000 series implementation and advice, risk assessment, systems audit.&lt;\\\/div&gt;\\n&lt;div&gt;&lt;\\\/div&gt;\\n&lt;div&gt;See also: &lt;a href=\\&quot;https:\\\/\\\/kbi.media\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/State-of-Digital-Trust-2022.pdf\\&quot;&gt;State of Digital Trust 2022&lt;\\\/a&gt;&lt;\\\/div&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 27, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-139-jo-stewart-rattray&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/611340c5-5e72-48e9-951f-959ddf5e24de-KBKAST-EP-Jo-Stewart-Rattray.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;28:47&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1666886441,&quot;key&quot;:&quot;fd737c5f093eec9620e7e11ba28ff426&quot;},&quot;ppe-4514-267&quot;:{&quot;title&quot;:&quot;Episode 138: Nicholas Boyle&quot;,&quot;description&quot;:&quot;&lt;p&gt;Nick Boyle is a partner in the IP &amp; Technology team at DLA Piper, and is based in Sydney. He advises clients on data protection and cyber-security related matters, as well as digital transformation, IT procurement and implementation and other complex procurement projects.\\u00a0 Nick\\u2019s clients range from start-up companies, to large listed and private Australian corporations, to multi-national organisations.&lt;\\\/p&gt;\\n&lt;p&gt;Nick has experience and expertise in advising clients on issues arising in connection with the Privacy Act 1988 (Cth) and State and Territory privacy legislation, including in relation to the collection, use, processing and cross-border transfers of data, cyber security risks and mitigations. This includes assisting clients in navigating these issues in both pre- and post-incident scenarios and information and security related regulatory issues, including as part of digital transformation and BPO projects and in response to cyber incidents.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 25, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-138-nicholas-boyle&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/9a8aa4fd-0829-4393-8ea3-d9e0abfa1a42-KBKAST-EP-Nicholas-Boyle.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;48:19&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1666692018,&quot;key&quot;:&quot;7956f951e848f5fa6829184493225a52&quot;},&quot;ppe-4514-268&quot;:{&quot;title&quot;:&quot;Episode 137: Jason Van der Schyff&quot;,&quot;description&quot;:&quot;&lt;p&gt;Jason Van der Schyff is Chief Operating Officer of slightly controversial, quietly confident\\u2019 venture-backed company &lt;a href=\\&quot;https:\\\/\\\/softiron.com\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;&lt;strong&gt;SoftIron&lt;\\\/strong&gt;&lt;\\\/a&gt; \\u2013 a global leader in purpose-built and performance-optimised data centre solutions.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;SoftIron is about to change the game when it comes to Australian business and government cyber control of sensitive data (and better storage of massive amounts of data).&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;Soon this year, SoftIron will be launching the first-ever base-level computer manufacturing facility on Australian soil. The facility is set to supply \\u2018clean\\u2019 computer servers for firms and government agencies needing assurance there is no malicious or unknown code in their data centres. SoftIron builds and manufactures hardware designed with totally-auditable provenance. SoftIron is the only company in the world that provides fully auditable processes.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;Jason brings both technical and operational experience to SoftIron having previously held roles in R&amp;D engineering, sales and marketing roles with Heliox Technologies, James Fisher Defence and a number of early-stage Silicon Valley companies.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;With extensive manufacturing experience both domestically and abroad in both consumer and B2B high volume products, Jason leads SoftIron\\u2019s efforts in vertically integrated manufacturing and domestic assembly.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;Jason recently published his first book, Asymmetric Advantage, available for purchase physically and digitally.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 19, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-137-jason-van-der-schyff&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/4525839e-9969-47c6-b2e1-be1cdd20bb9e-KBKAST-Jason-Van-Der-Schyff.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;42:52&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1666195247,&quot;key&quot;:&quot;9b6d242f0964d3444cfff4c009660dda&quot;},&quot;ppe-4514-269&quot;:{&quot;title&quot;:&quot;Episode 136: Ashkan Tashvir&quot;,&quot;description&quot;:&quot;&lt;p&gt;Ashkan Tashvir built and launched the first of several businesses at the age of fifteen and subsequently led a series of businesses to become thriving and successful enterprises across various industries. With a master\\u2019s degree in information systems management, he was amongst the youngest Certified Microsoft Trainers at the time and has worked on various technology projects for government bodies and a range of sectors, including legal, finance and hospitality. During this time, his interest in business and entrepreneurship continued to evolve and he led or advised several startups and SMEs to become sustainable, scalable ventures before becoming an investor and venture builder himself.&lt;\\\/p&gt;\\n&lt;p&gt;In addition to his extensive business and technological engineering qualifications and experience, Ashkan is a deep thinker, voracious reader and philosopher with a profound interest in and knowledge of Western and Eastern philosophy.&lt;\\\/p&gt;\\n&lt;p&gt;For more than a decade, he was driven by a quest to discover why there is so much dysfunction and suffering in the world and to find the answer to a burning question, \\u2018Why are we human beings the way we are and what drives our decisions, behaviours and actions?\\u2019 His quest led him to a crossroads between the realms of technology, business, leadership and philosophy.&lt;\\\/p&gt;\\n&lt;p&gt;Observing a distinct lack of logical, ontological and systematic thinking in the areas of human consciousness, transformation and leadership, particularly in terms of how they empower people to generate opportunity and wealth for themselves and others, Ashkan set his mind to using his newly discovered knowledge to devise a series of practical frameworks, tools and methodologies, one of which is the Being Framework\\u2122. The framework is laid out in his best-selling books BEING and Human Being.&lt;\\\/p&gt;\\n&lt;p&gt;This framework, which incorporates the Being Profile\\u00ae assessment tool and the Transformation Methodology\\u2122, is now supporting people from all over the world to create significant economic and social benefits in their organisations and personally derive fulfilment from their contribution in life. He has since also designed and built the Genesis Framework\\u2122, a revolutionary business venture building paradigm.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;div&gt;&lt;b&gt;Obtain a copy of Human Being, by Ashkan Tashvir:&lt;\\\/b&gt;\\u00a0&lt;a href=\\&quot;https:\\\/\\\/humanbeingbook.net\\\/\\&quot; target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;https:\\\/\\\/humanbeingbook.net\\\/&lt;\\\/a&gt;&lt;\\\/div&gt;\\n&lt;div&gt;&lt;b&gt;Article about the Being Framework within organisations:&lt;\\\/b&gt;\\u00a0&lt;a href=\\&quot;https:\\\/\\\/engenesis.com\\\/a\\\/how-the-integrity-of-our-being-is-critical-to-an-organisations-performance-the-application-of-the-being-framework-in-the-workplace\\&quot; target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;https:\\\/\\\/engenesis.com\\\/a\\\/how-the-integrity-of-our-being-is-critical-to-an-organisations-performance-the-application-of-the-being-framework-in-the-workplace&lt;\\\/a&gt;&lt;\\\/div&gt;\\n&lt;div&gt;&lt;b&gt;More resources from Ashkan:\\u00a0&lt;\\\/b&gt;&lt;a href=\\&quot;https:\\\/\\\/ashkan.engenesis.com\\\/\\&quot; target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;ashkan.engenesis.com&lt;\\\/a&gt;&lt;\\\/div&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 14, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-136-ashkan-tashvir&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/922fbc29-43d7-45da-8743-18c05f937812-KBKAST-EP-Ashkan-Tashvir-Edited.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;39:39&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1665763208,&quot;key&quot;:&quot;52f6554a5aaec1cc4a6eaacd20421aaf&quot;},&quot;ppe-4514-270&quot;:{&quot;title&quot;:&quot;Episode 135: Anthony Woodward&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;strong&gt;Anthony Woodward \\u2013\\u00a0 Chief Executive Officer, Founder &amp; Director | Mentor &amp; Advisor | Digital Transformation | Cloud | Growth | M&amp;A&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;For more than 25 years, Anthony has built, scaled and run technology companies in the internet and cloud services space. By helping businesses to understand how to use technology to advance strategic objectives and enable performance, he has converted game-changing market opportunities into leading businesses as a CEO, Executive Director and Entrepreneur.&lt;\\\/p&gt;\\n&lt;p&gt;Leveraging access technologies to create Zip World in 1995, the market-leading retail and wholesale provider was sold to NASDAQ listed Pacific Internet (now Telstra) in 1999. He then founded Bulletproof, which he grew to be the leading end-to-end Cloud Services provider in ANZ, took public through a listing on the ASX in 2014, and led a rapid growth trajectory to c.$50m revenues in FY17 before its acquisition by AC3 in 2018. Anthony joined Logicalis Australia in July 2021, as Chief Executive Officer.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 12, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-135-anthony-woodward&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/42db4866-fff8-41e0-a52c-0eb0d3339282-KBKAST-EP-Anthony-Woodward.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;41:05&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1665590428,&quot;key&quot;:&quot;a67cd476289e227ce34dbcfe2e67b2e5&quot;},&quot;ppe-4514-271&quot;:{&quot;title&quot;:&quot;Episode 134: Tony Jarvis&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;a href=\\&quot;https:\\\/\\\/sg.linkedin.com\\\/in\\\/tony-jarvis\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;&lt;strong&gt;Tony Jarvis&lt;\\\/strong&gt;&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Director of Enterprise Security, Asia Pacific Japan&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Based in Singapore&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Tony Jarvis is a CISO advisor and cybersecurity strategist who has advised Fortune 500 clients across the world and served as a thought leader within the industry. Tony has held a variety of leadership and advisory roles with leading brands such as FireEye, Standard Chartered Bank and Telstra, and has an acute understanding of how to successfully deliver cybersecurity engagements which strategically align with business objectives. He is passionate about educating audiences on the risks posed by modern cyber threats and advises business leaders as they undertake major cybersecurity transformation projects and initiatives. Tony holds a BA of Information systems from the University of Melbourne.&lt;\\\/p&gt;\\n&lt;p&gt;See also: &lt;a href=\\&quot;https:\\\/\\\/www.dfat.gov.au\\\/sites\\\/default\\\/files\\\/minisite\\\/static\\\/4ca0813c-585e-4fe1-86eb-de665e65001a\\\/fpwhitepaper\\\/foreign-policy-white-paper\\\/chapter-five-keeping-australia-and-australians-safe-secure-and-free-0.html\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Guarding Against Foreign Interference&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 5, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-134-tony-jarvis&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/7129698b-7fec-48a1-88af-095772978c2b-KBKAST-EP-Tony-Jarvis.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;43:54&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1664985655,&quot;key&quot;:&quot;d22bda9f5d30e2ec27943977b72a82e0&quot;},&quot;ppe-4514-272&quot;:{&quot;title&quot;:&quot;Episode 133: Scott Fletcher and Tom Walker&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;strong&gt;Scott Fletcher&lt;\\\/strong&gt; is a Cloud Security Engineer at Oracle. His background includes Penetration Testing, Software Development &amp; Security Consulting. He has also held Principal Consultant roles in both Australia &amp; New Zealand, and worked for a number of enterprise and financial services organisations.&lt;\\\/p&gt;\\n&lt;p&gt;In an IT career spanning two decades across a range of technical implementation, architecture and leadership roles for some of Australia\\u2019s most recognised brands, &lt;strong&gt;Tom Walker&lt;\\\/strong&gt; has established a reputation for delivering the improbable whilst embedding significant and impactful organisational change on the teams he has led. An advocate for a security first culture, Tom takes a pragmatic approach to transformation, and always challenges the status quo believing \\u201cbetter\\u201d is only a transient state to \\u201cbest\\u201d.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;a href=\\&quot;https:\\\/\\\/www.linkedin.com\\\/in\\\/scotti-fletcher\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Scott\\u2019s LinkedIn&lt;\\\/a&gt; | &lt;a href=\\&quot;https:\\\/\\\/www.oracle.com\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Oracle&lt;\\\/a&gt;&lt;br \\\/&gt;\\n&lt;a href=\\&quot;https:\\\/\\\/www.linkedin.com\\\/in\\\/tomcwalker\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Tom\\u2019s LinkedIn&lt;\\\/a&gt; | &lt;a href=\\&quot;https:\\\/\\\/www.kelima.com.au\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Kelima&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 30, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-133-scott-fletcher-and-tom-walker&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/4d76c774-66c0-46b4-8068-8d3d102f46fb-KBKAST-EP-Scott-Fletcher-and-Tom-Walker.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;44:48&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1664553640,&quot;key&quot;:&quot;47542393f2aa24a2928c72ec4faf8b7f&quot;},&quot;ppe-4514-273&quot;:{&quot;title&quot;:&quot;Episode 132: Alan Jenkins&quot;,&quot;description&quot;:&quot;&lt;p&gt;Alan is a highly confident, effective and adaptable leader, manager &amp; team player, with some 30 years experience in all facets of security, particularly cyber and enterprise security risk management, with a focus on \\u2018value-at-risk\\u2019. Currently, Alan is the Director of Advisory Services for Decipher Cyber, where he works with founder Tinesh Chhaya to grow their business and deliver quality outcomes at a reasonable cost based on the value of change required in a transparent manner.&lt;\\\/p&gt;\\n&lt;p&gt;During his career as a senior RAF Police officer, he has accrued extensive operational exposure in the UK &amp; overseas, in both multi-national &amp; multi-agency environments, against the backdrop of a broad threat spectrum &amp; across all 3 of the so-called physical, personnel &amp; information security pillars.&lt;\\\/p&gt;\\n&lt;p&gt;Since leaving the RAF in 2006, he has added management consulting plus business development, delivery &amp; pre-sales experience in both Public &amp; Private sectors in the role of a Trusted Advisor &amp; SME. After spells at CSC &amp; T-Systems as UK Chief Security Officer and being responsible for end-end security governance, operations and risk, he joined Babcock International Group as their first CISO in 2013. He led the delivery of significant improvements in the Group\\u2019s cyber security capabilities to the benefit of the wider business &amp; its customers. After a year as an Independent, he later joined IBM Security in 2015 as an Associate Partner leading activities in the UK\\u2019s FinSvces Sector, where he also led the delivery of a \\u00a3multi-million security workstream as part of a \\u00a31.2 billion contract with a Tier 1 Bank. He returned to freelancing in 2018, working through Cybercorre &amp; then joining a start-up, Guardian Cyber Services, in 2019, before landing an all-too-brief role at 2-Sec Consulting. He has been on contract to Hitachi Europe\\u2019s Security Business Group since October 2019 and has also been CISO-in-Residence at CyLon Labs since March of even year, supporting 2 Cohorts of startup\\\/scale ups and supporting a CyLon Spark workshop in Oman in 2020.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 28, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-132-alan-jenkins&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/d4142262-d948-4ce5-aaa2-affc9c2d9cc0-KBKAST-EP-Alan-Jenkins.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;48:56&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1664380844,&quot;key&quot;:&quot;f50109310bdff6a75b9bf0d0e1023d8e&quot;},&quot;ppe-4514-274&quot;:{&quot;title&quot;:&quot;Episode 131: Kylie Watson&quot;,&quot;description&quot;:&quot;&lt;p&gt;Kylie is the Lead Client Partner for Defence and National Security in Australia and New Zealand at IBM with the remit to helping solve some of the nation\\u2019s more complex national security problems with consulting specialities in data, AI, automation, cyber security, hybrid cloud, openshift, innovative technologies and agile processes. Kylie previously ran Cybersecurity for IBM Consulting as well as Hybrid Cloud and Cloud Security for all industries across A\\\/NZ.\\u00a0 Prior to that she was a Risk Partner managing Cybersecurity and data analytics for government clients at Deloitte and a Lead Client Partner for Defence on Risk.&lt;\\\/p&gt;\\n&lt;p&gt;Kylie has a strong interest in human behaviour in regards to technologies including users and cyber criminal behaviour, and regularly advises clients on strengthening security based on her insights. She is both a Sociologist and a Technologist with experience and degrees in sociology, management, cyber and data. She has advised and managed clients across Australia, New Zealand, South Africa, Thailand, Singapore, Malaysia, Japan and Korea with innovation, data management, advanced analytics and security.&lt;\\\/p&gt;\\n&lt;p&gt;Her insights into cyber warfare and criminal activity hinge on the human side of malicious attacks with an intent to determine the intent of the actors, degree of maliciousness and to help teams prepare their cyber defence (or level of offence). Kylie holds a top secret Australian government security clearance. On top of that she loves exploring why people are drawn to cyber crime.&lt;\\\/p&gt;\\n&lt;p&gt;Kylie has won awards for innovation, new products\\\/services, business and community service and has a track record of leading large multifaceted teams of hundreds of people with deep technical expertise on technology projects and programs for consulting budgets as large as $300M+. In her spare time she is the Chair of a Charity Think Tank the National Institute for Strategic Resilience (NISR) that seeks to gather perspectives and encourage diversity of thought on national resilience and security policy\\u2026. and can be seen on the basketball court most weekends managing junior premier league teams, coaching, mentoring emerging coaches, and watching her children play.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 21, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/kylie-watson&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/a27514ae-1cde-4d81-8f89-7193c63f0be0-KBKAST-EP-Kylie-Watson.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;44:30&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1663776006,&quot;key&quot;:&quot;61f49e08c79bd17df751a50d5723ab6b&quot;},&quot;ppe-4514-275&quot;:{&quot;title&quot;:&quot;Episode 130: Apurva Chiranewala&quot;,&quot;description&quot;:&quot;&lt;p&gt;Apurva Chiranewala is the General Manager of fintech company Block Earner, where he oversees global operations, growth and expansion, and builds strategic partnerships.&lt;\\\/p&gt;\\n&lt;p&gt;Formerly head of shipping at eBay and chief development officer at fast-growing logistics scale-up Sendle, Chiranewala has worked in a number of high-profile leadership roles at large corporations and startups alike.&lt;\\\/p&gt;\\n&lt;p&gt;As an early pioneer in eCommerce, Chiranewala has closely witnessed the disruption of traditional retail and shipping industries globally during his career first at Snapdeal, one of India\\u2019s earliest eCommerce unicorns, at\\u00a0&lt;a class=\\&quot;c-link\\&quot; href=\\&quot;https:\\\/\\\/catch.com\\\/\\&quot; target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;Catch.com&lt;\\\/a&gt;\\u00a0and Sendle here in Australia. Chiranewala foresees a parallel path of disruption happening now due to blockchain technology in the traditional finance space.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 16, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-130-apurva-chiranewala&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/30b2f431-5c7b-44ef-be23-1b8229c8adc1-KBKAST-EP-Apurva-Chiranewala.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;54:12&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1663344059,&quot;key&quot;:&quot;dc46e9bc000718817725365b3b4cad7d&quot;},&quot;ppe-4514-276&quot;:{&quot;title&quot;:&quot;Episode 129: Jake Moore&quot;,&quot;description&quot;:&quot;&lt;div&gt;Jake Moore is the Global Cybersecurity Advisor for ESET. He helps businesses and employees understand cybersecurity and the risks involved to remain better protected. Jake previously worked for Dorset Police for 14 years investigating computer crime in the Digital Forensics Unit before being a cybersecurity advisor for the force delivering tailored advice to the public and local businesses.&lt;\\\/div&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 14, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-129-jake-moore&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/d91ef25b-1bd5-421c-93c8-3e6eaec64698-KBKAST-EP-Jake-Moore.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;43:00&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1663171234,&quot;key&quot;:&quot;3bd7022350f553f1c1f2e6b1915b3c88&quot;},&quot;ppe-4514-277&quot;:{&quot;title&quot;:&quot;Episode 128: Chirag Joshi&quot;,&quot;description&quot;:&quot;&lt;p&gt;Chirag\\u2019s ambitious goal is simple\\u2014to enable human progress through technology. To accomplish this, he wants to help build a world where there is trust in digital systems, protection against cyber threats, and a safe environment online for communication, commerce, and engagement. He is especially passionate about the safety of children and vulnerable sections of society online. This goal has served as a motivation that has led Chirag to become a sought-after speaker and advocate at various industry-leading conferences and events. Chirag is respected as a thought leader in cyber security with keynotes and presentations at forums in United States, Australia, and Asia. His podcast features insights from distinguished professionals in a wide range of disciplines including media, entrepreneurship, executive leadership, and futurology.&lt;\\\/p&gt;\\n&lt;p&gt;He is the author of the highly successful book \\u201c7 Rules to Influence Behaviour and Win at Cyber Security Awareness\\u201d which has been purchased in over 11 countries across the world and became an Amazon Australia Best-Seller in its category.&lt;\\\/p&gt;\\n&lt;p&gt;During the course of his career spanning across multiple sectors and countries, he has built, implemented, and successfully managed cyber security, risk management, compliance, and awareness programs. The success of these programs was a result of unyielding focus on business priorities, a pragmatic approach to cyber threats, and most importantly, effective stakeholder engagement. Chirag has held senior leadership positions in large, complex organisations and excels at the art of translating business and technical speak in a manner that optimises value.&lt;\\\/p&gt;\\n&lt;p&gt;Chirag has also conducted several successful cyber security education sessions for executives and non-technical audiences in diverse industries such as finance, energy, healthcare, and higher education. He has led teams, managed multi-million-dollar budget and transformation programs. He has experience in both IT and OT environments, and leading cyber security through de-mergers and divestments.&lt;\\\/p&gt;\\n&lt;p&gt;Chirag has extensive experience with a wide range of standards, frameworks and regulations including NIST CSF, APRA CPS 234, AESCSF, PCI DSS, Health Insurance Portability and Accountability Act (HIPAA) and ISO 27001\\\/2.&lt;\\\/p&gt;\\n&lt;p&gt;Chirag\\u2019s academic qualifications include a master\\u2019s degree in telecommunications management from Oklahoma State University and a bachelor\\u2019s degree in electronics and telecommunications engineering from the University of Mumbai. He holds multiple certifications, including Certified Information Security Manager, Certified Information Systems Auditor, Certified in Risk and Information Systems Control, and Certified Data Privacy Solutions Engineer.&lt;\\\/p&gt;\\n&lt;p&gt;His areas of expertise include strategic cyber advisory to executives, cyber risk management, cyber strategy and architecture, security and technology governance, cyber transformation programs and security awareness training.&lt;\\\/p&gt;\\n&lt;p&gt;Get a copy of &lt;strong&gt;7 Rules to Become Exceptional At Cyber Security: A Practical, Real-world Perspective For Cyber Security Leaders and Professionals &lt;\\\/strong&gt;on &lt;a href=\\&quot;https:\\\/\\\/www.amazon.com.au\\\/dp\\\/0648662381\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Amazon&lt;\\\/a&gt; and &lt;a href=\\&quot;https:\\\/\\\/www.chiragdjoshi.com\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Chirag\\u2019s website&lt;\\\/a&gt;.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 7, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-128-chirag-joshi&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/dde52840-5cc2-4ecc-b415-b1d8e810f14e-KBKAST-EP-Chirag-Joshi.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;36:13&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1662566453,&quot;key&quot;:&quot;8e4fcd47fd29dfc9f816329fdc4d611c&quot;},&quot;ppe-4514-278&quot;:{&quot;title&quot;:&quot;Episode 127: John Pironti&quot;,&quot;description&quot;:&quot;&lt;p&gt;With over 20 years experience in information technology, John is an accomplished consulting practice leader, management and sales consultant, published author and writer, global thought leader in information risk management and security, governance, risk, and compliance.\\u00a0 John addresses business, technology, and compliance issues on a global scale.&lt;\\\/p&gt;\\n&lt;p&gt;See also: &lt;a href=\\&quot;https:\\\/\\\/kbi.media\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/ISACA_SupplyChain_Block_Infographic_INI_copy.pdf\\&quot;&gt;ISACA Supply Chain Block Infographic&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 2, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-127-john-pironti&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/fecf8e45-8393-46b6-8936-b9218c7d9183-KBKAST-EP-127-John-Pironti.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;50:00&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1662134416,&quot;key&quot;:&quot;1d34cad2f2763093e3c77ee5d012e3dc&quot;},&quot;ppe-4514-279&quot;:{&quot;title&quot;:&quot;Episode 126: Andrew Slater&quot;,&quot;description&quot;:&quot;&lt;p dir=\\&quot;ltr\\&quot;&gt;Starting his career in Army Signals, Andrew has spent the last 20+ years working across a variety of ICT roles. As a Technologist, with a passion for security Andrew has designed and delivered secure solutions across Government and Private organisations.&lt;\\\/p&gt;\\n&lt;p dir=\\&quot;ltr\\&quot;&gt;In his current role as the Director of AUSHIELD, Andrew leads Cybermerc\\u2019s technical teams to deliver sovereign cyber threat intelligence solutions along with protecting Australian organisations.&lt;\\\/p&gt;\\n&lt;p dir=\\&quot;ltr\\&quot;&gt;Andrew is regularly engaged for bespoke technical research and enjoys giving back to the industry through volunteer work and technical presentations at conferences.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;August 31, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-126-andrew-slater&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/0f34e992-689f-4348-93a2-a80bba391030-KBKAST-EP-Andrew-Slater.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:30&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1661961618,&quot;key&quot;:&quot;250422c7e2f1a3a3cd0608220fdb23c8&quot;},&quot;ppe-4514-280&quot;:{&quot;title&quot;:&quot;Episode 125: William Makdessi&quot;,&quot;description&quot;:&quot;&lt;p&gt;William is an IT Professional and ISACA-certified Cyber Security Auditor with over 15 years experience in Networks and Information Technology across a broad range of industries including local government, insurance, public health, construction, automotive and commercial design.&lt;\\\/p&gt;\\n&lt;p&gt;William is the Cyber Risk Lead at InConsult, helping organisations to develop or improve their Cyber Resilience. In recent years, he has worked with a large number of Local Government Areas, State Government, Insurers and Health Insurers to assess maturity, aid in continual improvement and even develop complete frameworks from scratch in line with ISO 27001, APRA CPS 234 and the NIST Cyber Security Framework.&lt;\\\/p&gt;\\n&lt;p&gt;With a highly technical background, William provides a uniquely personal point of view having dealt with threats first hand. Through framework development, awareness training, phishing campaigns and much more, he is on a mission to help critical areas of Australian business better prepare rather than waiting around to respond.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;August 24, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-125-william-makdessi&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/c72467c2-36e8-412e-8ef4-eabb144cd9de-KBKast-EP-125-William-Makdessi-final.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:24&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1661356805,&quot;key&quot;:&quot;889eb0edf7f86b6947b01019916e70f5&quot;},&quot;ppe-4514-281&quot;:{&quot;title&quot;:&quot;Episode 124: Kevin Chen&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Kevin Chen is one of the pioneer preachers of the Chinese blockchain industry and a well experienced international investor in the Fintech industry. He has achieved successful business investment and management experience in China, Malaysia, Hong Kong, Dubai and Australia. Kevin is the founder of Australia KJ Strategic Investment Pty Ltd and CloudTech Group and served as the Chief Strategic Officer of China Fortune Holdings Limited during 2017-2019 and the Financial Director of Country Heights Holding Berhad, Malaysia, from 2020-2022. As one of the most well-known institutional investors in the blockchain industry, Kevin is actively involved in project incubation and early investment. He has been an angel investor in many well-known projects, such as Binance, VeChain and aelf cloud network. After founding CloudTech Group in Dubai and Australia, he led the team to successfully establish the Blockchain World Summit and host the DCS 2021 summit in Dubai.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;August 19, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-124-kevin-chen&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/3d0fc07e-7aac-4b15-988d-bfabba25210b-KBKast-EP-Kevin-Chen.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;39:44&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1660924805,&quot;key&quot;:&quot;b8633db09ff1777a53e3d6a6a5aca47f&quot;},&quot;ppe-4514-282&quot;:{&quot;title&quot;:&quot;Episode 123: Jim Bates&quot;,&quot;description&quot;:&quot;&lt;p&gt;Jim Bates, PMP (certified Project Management Professional) is the founder, President and CEO of Business Improvement Group, Inc. (&lt;a href=\\&quot;https:\\\/\\\/www.go-big.com\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;BIG&lt;\\\/a&gt;) and an Adjunct Professor in several schools at the University of Alaska Anchorage (UAA), including the Master of Science in Project Management (&lt;a href=\\&quot;https:\\\/\\\/www.uaa.alaska.edu\\\/academics\\\/college-of-engineering\\\/departments\\\/engineering-science-project-management\\\/degree-programs-espm\\\/pm\\\/ms-project-management.cshtml\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;MSPM&lt;\\\/a&gt;) program. Jim has served in various volunteer roles with the Project Management Institute Alaska Chapter (PMIAK) Since 2011 and served as Chapter President from October 2019 through December 2021.&lt;\\\/p&gt;\\n&lt;p&gt;Jim\\u2019s vast career spans 40+ years with proficiencies in Business Management, Project Management, and Information Technology. Jim is a certified leadership coach with &lt;a href=\\&quot;https:\\\/\\\/www.giant.tv\\\/jimbates\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;GiANT&lt;\\\/a&gt;, a Lean Six Sigma Master Black Belt, and holds Master Certificates in Business Analysis, Lean Six Sigma, and Project Management from Villanova University. Jim has been published in &lt;a href=\\&quot;https:\\\/\\\/magazine.cioreview.com\\\/July-2014\\\/PublicSector\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;&lt;strong&gt;&lt;em&gt;CIO Review&lt;\\\/em&gt;&lt;\\\/strong&gt;&lt;\\\/a&gt; and &lt;a href=\\&quot;https:\\\/\\\/www.govtech.com\\\/state\\\/Alaska-Monitors-Lights-Out-Data-Center-via-the-Cloud.html\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;&lt;strong&gt;&lt;em&gt;Government Technology&lt;\\\/em&gt;&lt;\\\/strong&gt;&lt;\\\/a&gt; magazines among various other publications, and is a public speaker and renown expert on leadership, business process improvement, project management, and information technology.&lt;\\\/p&gt;\\n&lt;p&gt;Jim is an experienced executive and consultant who is passionate about leading business transformation and offering innovative, high-value solutions to everyday business challenges. He has a proven ability to successfully analyze an organization\\u2019s critical business requirements, identify deficiencies and potential opportunities, and align and integrate technology. He strives to help companies develop innovative and cost-effective solutions for enhancing competitiveness, increasing revenues, and improving customer service offerings.&lt;\\\/p&gt;\\n&lt;p&gt;Jim and his wife, Mechelle, (both life-long Alaskans) live in Eagle River, Alaska where they raised seven children. They now enjoy 15 grandchildren. Jim likes outdoor activities, woodworking, and reading. He enjoys giving back, and in addition to his contributions to local charities, has been involved in numerous missions to Africa and the Philippine Islands contributing to, promoting, and implementing quality-of-life improvement.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;August 17, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-123-jim-bates&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/7a02e76f-53ad-454a-b23b-856f543179e7-KBKast-EP-123-Jim-Bates.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;01:03:35&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1660752049,&quot;key&quot;:&quot;6c58cfb2529bc0a86318bf269bb7bb9c&quot;},&quot;ppe-4514-283&quot;:{&quot;title&quot;:&quot;Episode 122: Asaf Katz&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Asaf helps cyber security and SaaS companies land their first $1M ARR.\\u00a0&lt;\\\/span&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Asaf has tackled this challenge for his own companies and multiple clients.\\u00a0&lt;\\\/span&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;He has co-founded education, software and telehealth businesses and is now working with Cyber security, InsurTech and automation startups in Israel, US and Australia.\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Struggling to get sales results in his startup in 2013, Asaf had to figure out that \\u201cmarketing and sales thing\\u201d.\\u00a0 As a Major in the Israeli Air Force in a Cyber Security Unit, Asaf has learnt that nothing is done without proper intelligence.\\u00a0&lt;\\\/span&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;He quickly realised the current marketing and sales approaches lacked fundamental elements to be effective.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;So he developed a framework that has allowed him to land for his own companies and his clients over $46M in revenue, win multiple awards and unlock growth for clients globally.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Asaf is the Co-Founder of Cannvalate, Managing Director of Ducere Global Business School, Faculty of Cyber (acquired), and is working with public and private companies globally.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;August 10, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-122-asaf-katz&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/2e6106f3-0930-4ecc-851c-79a7d3fa66d2-KBKAST-EP-119-Asaf-Katz.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;52:48&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1660147247,&quot;key&quot;:&quot;f5c893a04b583b563707adaa3e2e67c4&quot;},&quot;ppe-4514-284&quot;:{&quot;title&quot;:&quot;Episode 121: Louay Saleh&quot;,&quot;description&quot;:&quot;&lt;p&gt;Louay Saleh is a Cyber Security Senior Manager with more than 13 years of experience in the domain and overall experience of more than 21 years. When he was at his junior year at the university, Louay started to develop his passion for Cyber Security and realized that this is the field in which he wants to specialize.&lt;\\\/p&gt;\\n&lt;p&gt;Starting his career in the Software Development area and then moving to the IT Support and Operations, Louay was always aiming to advance his knowledge and experience in different IT areas in order to move to the Cyber Security. It was when he joined one of the Big 4 firms; Deloitte, that Louay was finally able to start working in that area. He worked in both Security Consulting and IT Audit; where he advised large customers mainly in the Banking, Financial, and Telecommunication fields. He then moved to Ernst &amp; Young for a few months and similarly working with the same type of customers, before joining the National Bank of Egypt. Louay was responsible for building and leading the team in charge of the technical assessment activities such as the Vulnerability Management and Penetration Testing, in addition to the Incident Handling and Cyber Threat Intelligence. Louay considers those areas as his main specializations so he always tries to advance his knowledge and skills. A great deal of that is through doing the hands-on himself; whether during the work assignments or during the leisure time, as he always believes in building a good technical foundation and enhancing it whatever the job position one reaches. However, he also believes in balancing the technical expertise with the excellent leadership and business skills.&lt;\\\/p&gt;\\n&lt;p&gt;Louay acquired a few certificates such as GWAPT, CISSP, CISM, CRISC, and C|EH, and attended many hands-on trainings. Louay is also a seasonal Capture The Flag (CTF) player.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;August 5, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-121-louay-saleh&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/b2e0f8fd-c171-4440-98c8-a6105d96ff71-KBKast-EP-121-Louay-Saleh-FINAL.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;30:42&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1659715208,&quot;key&quot;:&quot;f90185dff22f40fa5a9c85d56954b622&quot;},&quot;ppe-4514-285&quot;:{&quot;title&quot;:&quot;Episode 120: Jasun Tate&quot;,&quot;description&quot;:&quot;&lt;div class=\\&quot;page\\&quot; title=\\&quot;Page 9\\&quot;&gt;\\n&lt;div class=\\&quot;section\\&quot;&gt;\\n&lt;div class=\\&quot;layoutArea\\&quot;&gt;\\n&lt;div class=\\&quot;column\\&quot;&gt;\\n&lt;p&gt;Sailor, Soldier, Hacker, Spy, Advisor, Alchemist&lt;\\\/p&gt;\\n&lt;p&gt;Jasun Tate is the founder of Black Alchemy Solutions Group a boutique privacy solutions development and cyber crisis management firm. He maintains a total of 17 years of actionable Cyber Warfare, Exploitation, and Defense experience both with the United States government and with a number foreign governmental agencies across the globe. Some of the agencies Mr. Tate has given his time, life and space working with include (but are not limited to)&lt;\\\/p&gt;\\n&lt;p&gt;\\u2022 National Geo-spacial Intelligence Agency \\u2022 Department of Defense&lt;br \\\/&gt;\\n\\u2022 US Army Research Laboratories&lt;br \\\/&gt;\\n\\u2022 National Security Agency&lt;br \\\/&gt;\\n\\u2022 US Army Special Operations Command&lt;\\\/p&gt;\\n&lt;p&gt;With his Public Sector career spanning between various Department of Defense entities and US Intelligence Agencies. Having worked directly in countries all around the world in both advisory and operational capacities he has seen the world from a cyber lens of exploitation unlike many others.&lt;\\\/p&gt;\\n&lt;p&gt;Mr. Tate\\u2019s unique blend of cyber and tactical operation experience and delivers a unique blend of cyber security, intelligence operations, and tactical situational awareness with a level of relevance only obtained in the field. Beyond his public sector career, he has held senior officer positions with Fortune 100 companies.&lt;\\\/p&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;div class=\\&quot;layoutArea\\&quot;&gt;\\n&lt;div class=\\&quot;column\\&quot;&gt;\\n&lt;p&gt;Want inside my head? Listen to this podcast about my view on Cyber!&lt;\\\/p&gt;\\n&lt;\\\/div&gt;\\n&lt;div class=\\&quot;column\\&quot;&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;Yes Im in the news a simple Google of \\u201cJasun Tate Cyber\\u201d works \\u2022 instagram @blackalchemysolutions&lt;\\\/p&gt;\\n&lt;p&gt;\\u2022 Twitter @bitsdigits &amp; @blackalchemyso2&lt;\\\/p&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&lt;\\\/div&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;August 3, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-120-jasun-tate&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/04afd2e7-eba0-49b4-82cb-8dae00ab3777-KBKast-EP-120-Jasun-Tate.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;58:17&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1659542449,&quot;key&quot;:&quot;c1ebdeafc6fd8a548bb07c9393322c99&quot;},&quot;ppe-4514-286&quot;:{&quot;title&quot;:&quot;Episode 119: Lachlan Feeney&quot;,&quot;description&quot;:&quot;&lt;p&gt;Lachlan Feeney is the Founder and CEO of Labrys \\u2013 Australia\\u2019s leading provider of blockchain development and consulting services. Lachlan founded Labrys out of his bedroom at the age of 19. He was an early adopter of cryptocurrencies and blockchain technology and immediately realised the potential to build a better, more democratised future, with the technology. Labrys has worked with ASX listed Downer EDI, The Government of the Solomon Islands and global blockchain platform NEM Group, among others. Lachlan is on a mission to turn Labrys into a global blockchain-consulting authority as the technology moves further into the mainstream. Prior to starting Labrys, Lachlan has worked as a developer at fellow blockchain agency; Civic Ledger and as a cryptocurrency researcher at the Student Trading and Investment Association. Lachlan is also a co-author of The Handbook of Board Governance (2nd Edition).&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 27, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-119-lachlan-feeney&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/a6e9ac93-0606-4e31-8ed6-7744b0d9269f-KBKast-EP-119-Lachlan-Feeney.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;58:29&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1658937648,&quot;key&quot;:&quot;7feee6f87d9c669e2c2a9b1f18e4cbba&quot;},&quot;ppe-4514-287&quot;:{&quot;title&quot;:&quot;Episode 118: Satnam Narang&quot;,&quot;description&quot;:&quot;&lt;p&gt;Satnam Narang is Staff Research Engineer at Tenable with over 14 years of experience in the industry (M86 Security and Symantec). He contributed to the Anti-Phishing Working Group, helped develop a Social Networking Guide for the National Cyber Security Alliance, uncovered a huge spam botnet on Twitter and was the first to report on spambots on Tinder.&lt;\\\/p&gt;\\n&lt;p&gt;He\\u2019s appeared on NBC Nightly News, Entertainment Tonight, Bloomberg West, and the Why Oh Why podcast.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 20, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-118-satnam-narang&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/693962b8-070b-494a-8aac-a611344a025f-KBKAST-EP-118-Satnam-Narang.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;46:10&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1658332840,&quot;key&quot;:&quot;898c25ed821aa0f80b33bdf8ba03d731&quot;},&quot;ppe-4514-288&quot;:{&quot;title&quot;:&quot;Episode 117: Marilise de Villiers&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;strong&gt;Marilise de Villiers, Founder&lt;\\\/strong&gt;&lt;strong&gt; &amp; CEO, ROAR! Coaching &amp; Consulting.&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Marilise is a Performance Coach, Best-selling Author, TEDx Speaker &amp; award-winning Behaviour Change Consultant that specialises in Finance, Technology &amp; Cyber Security Awareness, Culture &amp; Talent.\\u00a0She\\u2019s a podcast host, international keynote speaker &amp; regular podcast guest.&lt;\\\/p&gt;\\n&lt;p&gt;ROAR! is passionate about people living successful, healthy, and happy lives. It\\u2019s about making your whole life work and becoming your whole self.&lt;\\\/p&gt;\\n&lt;p&gt;Marilise combines over two decades of experience as a chartered accountant and change consultant in finance, audit and cyber security awareness, culture and talent. She\\u2019s led the design and roll-out of global behaviour change programmes in consulting, research and operational delivery roles, across a broad range of industries and disciplines. Over the last decade, she\\u2019s been specialising in addressing cyber security behaviours and culture, encouraging organisations to move away from compliance-led\\u201a tick box approaches, towards risk-based, people-centric approaches that embed secure mindsets and habits into organisational culture. She emphasises the need for a speak-up culture that allows suspicious behaviour and mistakes to be surfaced and addressed.&lt;\\\/p&gt;\\n&lt;p&gt;Marilise\\u2019s coaching curriculum is science backed and centred on the strategies and thought processes of the\\u00a0world\\u2019s highest performers. It focuses on\\u00a0clarity, energy, courage, productivity, influence, and purpose.&lt;\\\/p&gt;\\n&lt;p&gt;Her signature ROAR! Blueprint is designed to:&lt;\\\/p&gt;\\n&lt;ol&gt;\\n&lt;li&gt;Ignite your authentic purpose&lt;\\\/li&gt;\\n&lt;li&gt;Win your inner game (thoughts, feelings)&lt;\\\/li&gt;\\n&lt;li&gt;Win your outer game (words, actions)&lt;\\\/li&gt;\\n&lt;li&gt;Unleash your authentic voice \\u2013 your ROAR!&lt;\\\/li&gt;\\n&lt;\\\/ol&gt;\\n&lt;p&gt;ROAR is a four-step process to having courageous conversations \\u2013 with others and with yourself. It stands for Recognise, Observe, Assert, Redirect.&lt;\\\/p&gt;\\n&lt;p&gt;Marilise is South African-British, married to Heinie and they have two boys, Heinrich (14) and Andreas (12).&lt;\\\/p&gt;\\n&lt;p&gt;Her motto is: work hard, play hard &amp; be kind.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 13, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-117-marilise-de-villiers&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/b34c62aa-e374-40fb-9fc9-418153c27ff1-KBkast-EP-Marilise-deVilliers.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;59:20&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1657728032,&quot;key&quot;:&quot;7a78a06729765c86bae36a759a815cb2&quot;},&quot;ppe-4514-289&quot;:{&quot;title&quot;:&quot;Episode 116: Shinesa Cambric&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Shinesa Cambric (CCSP, CISSP, CISA, CISM, CDPSE) is a Cloud Security, Compliance, and Identity Architect with strategic expertise in technical design and implementation of security architecture and controls. Her experience includes designing identity management and governance solutions for cloud-based platforms, building insider threat programs, and providing unique subject matter expertise on the intersection of governance, risk, and compliance with IT and application security.\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;As a Principal Program Manager within Microsoft\\u2019s Intelligent Protections team,\\u00a0 Shinesa currently focuses on architecting solutions for global organizations to identify, detect, protect, and respond to threats against identity and access. She is a task and certification content advisor for CertNexus and CompTIA, on the content review committee for Cloud Security Alliance, and her work has been included in global IT industry forums such as SANS, ITSPMagazine Podcast, RSAC, BrightTALK, Secure Software Summit, Devops.com, and Plan4Privacy.\\u00a0 As an active mentor, she volunteers with several organizations, including as the training lead for the Dallas chapter of Women\\u2019s Society of Cyberjutsu.\\u00a0 Shinesa is an active member of several other organizations, including Cloud Girls, Women in Cyber Security (WiCyS), ISACA, ISC2, Information Systems Security Association (ISSA), International Association of Privacy Professionals (IAPP), and AnitaB, and serves as an occasional host for the OWASP DevSlop YouTube and Twitch show.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 6, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-116-shinesa-cambric&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/3a02085b-878c-44b6-b415-b18b652fccc4-KBKAST-EP-Shinesa-Cambric.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;46:20&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1657123214,&quot;key&quot;:&quot;c484728be15df7ad4610f5ec0d01d0b8&quot;},&quot;ppe-4514-290&quot;:{&quot;title&quot;:&quot;Episode 115: Ian Murphy&quot;,&quot;description&quot;:&quot;&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;Ian is a veteran in the security industry stretching back to the early 1990\\u2019s. He began with the UK Ministry of Defence before moving into the dot com bubble. Having spent 5 years with a leading security vendor he began his life as an entrepreneur offering contracting services to major industries and government departments. His new venture now breathes life into the dull world of security awareness. Mixing his blend of humour and vast experience his aim is to raise everyone\\u2019s cyber savvy so they can enjoy a safer online experience.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 29, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-115-ian-murphy&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/04254a99-48f0-4610-bff7-4f71153c4cae-KBKAST-EP-112-Ian-Murphy.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;54:52&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1656518422,&quot;key&quot;:&quot;fff71745b65c2bb4eb762b4ca89a2c76&quot;},&quot;ppe-4514-291&quot;:{&quot;title&quot;:&quot;Episode 114: Bob Huber&quot;,&quot;description&quot;:&quot;&lt;p&gt;Bob Huber, Chief Security Officer and Head of Research, Tenable&lt;\\\/p&gt;\\n&lt;div class=\\&quot;field field--name-field-user-title field--type-string field--label-hidden field__item\\&quot;&gt;&lt;strong&gt;Chief Security Officer&lt;\\\/strong&gt;&lt;\\\/div&gt;\\n&lt;div&gt;&lt;\\\/div&gt;\\n&lt;div class=\\&quot;clearfix text-formatted field field--name-field-bio field--type-text-long field--label-hidden field__item\\&quot;&gt;Robert Huber, Tenable\\u2019s chief security officer and head of research, oversees the company\\u2019s global security and research teams, working cross-functionally to reduce risk to the organisation, its customers and the broader industry. He has more than 20 years of information security experience across the financial, defence, and critical infrastructure sectors. Prior to joining Tenable, Robert was a chief security and strategy officer at Eastwind Networks, where he focused on growing the company\\u2019s business and delivering omni-environment security solutions. He was previously co-founder and president of Critical Intelligence, an OT threat intelligence and solutions provider, which cyber threat intelligence leader iSIGHT Partners acquired in 2015. He also served as a member of the Lockheed Martin CIRT, an OT security researcher at Idaho National Laboratory and was a chief security architect for JP Morgan Chase. Robert is a board member and advisor to several security startups and served in the Air National Guard for over 22 years. Before retiring in 2021, he served in a cyber operations squadron supporting federal and state mission&lt;\\\/div&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 23, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-114-bob-huber&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/420512d6-7a9a-4e5c-a9a4-e9f9d0dea9dd-KBKast-EP-114-Bob-Huber.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;26:31&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1656000055,&quot;key&quot;:&quot;f93ac92ffb2f21203106d13ecf3e1123&quot;},&quot;ppe-4514-292&quot;:{&quot;title&quot;:&quot;Episode 113: Rebecca Herold&quot;,&quot;description&quot;:&quot;&lt;p&gt;Rebecca Herold, CDPSE, FIP, CISSP, CIPM, CIPP\\\/US, CIPT, CISM, CISA, FLMI, Ponemon Institute Fellow, has over 25 years of IT, info sec, &amp; privacy experience; CEO &amp; Founder (2004) of Rebecca Herold, LLC, aka The Privacy Professor(R); CEO &amp; Founder (2020) of Privacy &amp; Security Brainiacs; and host of the radio\\\/podcast show \\u201c&lt;a href=\\&quot;https:\\\/\\\/www.voiceamerica.com\\\/show\\\/2733\\\/data-security-and-privacy-with-the-privacy-professor\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Data Security &amp; Privacy with the Privacy Professor&lt;\\\/a&gt;\\u201c. Founder (2014) &amp; Engineer\\\/Architect, and Owner of all IP for content, specifications and architecture of SIMBUS, LLC and all derivatives thereof.&lt;\\\/p&gt;\\n&lt;p&gt;Rebecca is an entrepreneur, author &amp; was an Adjunct Professor for the Norwich University Master of Science in Information Security &amp; Assurance Program for 9 years where she also created program curriculum. Rebecca led the NIST Smart Grid privacy group for 7 years and is a founding member of the IEEE P1912 Privacy and Security Architecture for Consumer Wireless Devices Working Group (June 2015). Rebecca has received numerous awards and recognitions for her work throughout the course of her career. Rebecca has is currently finishing her 20th published book to date, plus chapters in many books and hundreds of articles. Some of Rebecca\\u2019s books include:&lt;\\\/p&gt;\\n&lt;ul&gt;\\n&lt;li&gt;Security &amp; Privacy when Working from Home &amp; Travelling&lt;\\\/li&gt;\\n&lt;li&gt;The Practical Guide to HIPAA Privacy and Security Compliance (2 editions)&lt;\\\/li&gt;\\n&lt;li&gt;Data Privacy for the Smart Grid&lt;\\\/li&gt;\\n&lt;li&gt;The Privacy Papers&lt;\\\/li&gt;\\n&lt;li&gt;Managing an Information Security and Privacy Awareness and Training Program (2 editions)&lt;\\\/li&gt;\\n&lt;li&gt;Link to ISACA report: &lt;a href=\\&quot;https:\\\/\\\/kbi.media\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Privacy_in_Practice_2022_R3_FINAL.pdf\\&quot;&gt;Privacy in Practice 2022&lt;\\\/a&gt;&lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&lt;p&gt;Rebecca has a B.S. in Math &amp; Computer Science &amp; an M.A. in Computer Science &amp; Education. Rebecca is a longtime member of ISACA, Infragard, IAPP, ISSA, (ISC)2, IEEE &amp; ACM.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 22, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-113-rebecca-herold&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/e562348a-4048-4da2-a212-b4a8e0ee93cc-KBKAST-EP-Rebecca-Herold.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;33:22&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1655913656,&quot;key&quot;:&quot;9ca12c6fc40e03073cb070efb234317c&quot;},&quot;ppe-4514-293&quot;:{&quot;title&quot;:&quot;Episode 112: Satnam Narang&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Satnam Narang is Staff Research Engineer at Tenable with over 14 years of experience in the industry (M86 Security and Symantec). He contributed to the Anti-Phishing Working Group, helped develop a Social Networking Guide for the National Cyber Security Alliance, uncovered a huge spam botnet on Twitter and was the first to report on spambots on Tinder.\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;He\\u2019s appeared on NBC Nightly News, Entertainment Tonight, Bloomberg West, and the Why Oh Why podcast.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 15, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-112-satnam-narang&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/e9a3923e-da1e-458b-b7e6-5361b9c1d877-KBKAST-EP-Satnam-Narang.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;48:04&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1655308853,&quot;key&quot;:&quot;1639d8073f1d68ee44783e4ca65abcbc&quot;},&quot;ppe-4514-294&quot;:{&quot;title&quot;:&quot;Episode 111: Peter Soulsby&quot;,&quot;description&quot;:&quot;&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;Peter advises CISOs on how to increase their business\\u2019s Cyber Resilience by transforming their Cybersecurity landscape. Peter is similarly passionate about building high performing teams with an emphasis on people and culture. To achieve this, he relies on his three key strengths: leadership, logic and numbers.&lt;\\\/p&gt;\\n&lt;p&gt;Peter has been fortunate enough to hold senior leadership positions in both the Cybersecurity and Applications industries. This has given him experience on how organizations function and what applications enable this, together with the inherent Cybersecurity risks that exist from infrastructure through to core business and client facing applications.&lt;\\\/p&gt;\\n&lt;p&gt;Peter is at his best when given the opportunity to overcome a challenge, together with the resources, space and support to get it done.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 8, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-111-peter-soulsby&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/e74b3164-ab9d-4278-b451-3c13d2ff9bab-KBKAST-EP-111-Peter-Soulsby.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;45:56&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1654704020,&quot;key&quot;:&quot;df0deec0162191efb5f0c4d74ec95e9f&quot;},&quot;ppe-4514-295&quot;:{&quot;title&quot;:&quot;Episode 110: Russell Weir&quot;,&quot;description&quot;:&quot;&lt;p&gt;Russell is a seasoned and respected Information Technology leader with over 20 years of experience who has held leadership positions globally, including the USA, China, Europe, and the UK.&lt;\\\/p&gt;\\n&lt;p&gt;He holds several industry certifications, including the OSCP and an MBA in Technology and Innovation.&lt;\\\/p&gt;\\n&lt;p&gt;His expertise extends to cybersecurity, strategy, technology innovation management, governance, risk, and compliance across various industries, including Casino and Gaming, Entertainment and leisure, Australian Defence Force, Local Government, and start-ups.&lt;\\\/p&gt;\\n&lt;p&gt;Russell also serves as a board member of a Not-For-Profit and is a Guest lecturer and Mentor across several universities in the fields of Information Technology and Cybersecurity.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 1, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-110-russell-weir&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/6be3c762-6734-445a-b814-c14379508ed2-KBKAST-EP-110-Russell-Weir.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;53:58&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1654099254,&quot;key&quot;:&quot;718e262909f28bca02d7bf968383be47&quot;},&quot;ppe-4514-296&quot;:{&quot;title&quot;:&quot;Episode 109: Anne Leslie&quot;,&quot;description&quot;:&quot;&lt;ul&gt;\\n&lt;li&gt;Anne Leslie is Cloud Risk and Controls Leader for IBM Cloud for Financial Services in Europe. Prior to joining IBM, her career spanned the intersection of financial services, European regulatory policy, blockchain and operational security in leadership roles in both sales and advisory.&lt;\\\/li&gt;\\n&lt;li&gt;Bilingual in French and English, she holds an Executive MBA from HEC Business School in Paris and the CCSP in Cloud Security from (ISC)\\u00b2 in addition to multiple technical platform certifications. Today, her focus is on enabling Europe\\u2019s banks to secure and de-risk their journey to public cloud, and she regularly contributes her thought leadership to industry conferences and working groups.&lt;\\\/li&gt;\\n&lt;li&gt;Determined to debunk the notion that the human element is the weakest link in cybersecurity, Anne also leads the application of Design Thinking to some of the most wicked problems facing practitioners and is a fervent champion of human-centered approaches to improving enterprise and ecosystem security outcomes.&lt;\\\/li&gt;\\n&lt;li&gt;Irish by nature and French by design, Anne was born and raised in the Republic of Ireland and lives happily with her three children in Paris, France which has been her home now for over twenty years.&lt;\\\/li&gt;\\n&lt;li&gt;Antifragile by Nassim Taleb:\\u00a0&lt;a href=\\&quot;https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/Antifragile_(book)\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;For Reference&lt;\\\/a&gt;&lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 25, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-109-anne-leslie&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/4f0dac2e-1696-417b-b84f-d6013cf1917f-KBKAST-EP-108-Anne-Leslie.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;01:01:56&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1653494443,&quot;key&quot;:&quot;92f7717036e99e8049a6a7a5cb73d94f&quot;},&quot;ppe-4514-297&quot;:{&quot;title&quot;:&quot;Episode 108: Marty Edwards&quot;,&quot;description&quot;:&quot;&lt;p&gt;Marty Edwards is a globally recognised Operational Technology (OT) and Industrial Control System (ICS) cybersecurity expert who collaborates with industry, government and academia to raise awareness of the growing security risks impacting critical infrastructure and the need to take steps to mitigate them. As Vice President of Operational Technology Security at Tenable, Edwards works with government and industry leaders throughout the world to broaden understanding and implementation of people, process and technology solutions to reduce their overall cyber risk. Prior to joining Tenable in 2019, Edwards\\u2014a 30\\u2010year industry veteran\\u2014served as the Global Director of Education at the International Society of Automation (ISA). While at ISA, he was recognized by his industry peers with the SANS ICS 2019 Lifetime Achievement Award. Prior to ISA, Edwards was the longest\\u2010serving Director of the U.S. Department of Homeland Security\\u2019s Industrial Control Systems Cyber Emergency Response Team (ICS\\u2010CERT). Edwards also served as a program manager focused on control systems security at the Department of Energy\\u2019s (DOE\\u2019s) Idaho National Laboratory (INL) and has held a variety of roles in the instrumentation and automation fields. Edwards holds a diploma of technology in Process Control and Industrial Automation (Magna cum Laude) from the British Columbia Institute of Technology (BCIT), and in 2015 received the institute\\u2019s Distinguished Alumni Award. In 2016, Edwards was recognized by FCW in its \\u201cFederal 100 Awards\\u201d as being one of the top IT professionals in the U.S. federal government.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 18, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-108-marty-edwards&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/fe588f54-c346-40fc-b7e7-cd0f57cb03ed-KBKAST-EP-108-Marty-Edwards.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;42:29&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1652889604,&quot;key&quot;:&quot;cc9e353f3c03106da80899cd17ad6b00&quot;},&quot;ppe-4514-298&quot;:{&quot;title&quot;:&quot;Episode 107: Sean Duca&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;strong&gt;Sean Duca&lt;\\\/strong&gt;&lt;br \\\/&gt;\\nVice President and Regional Chief Security&lt;br \\\/&gt;\\nOfficer, Asia Pacific &amp; Japan&lt;br \\\/&gt;\\nPalo Alto Networks&lt;\\\/p&gt;\\n&lt;p&gt;Sean is vice president and regional chief security officer for Asia Pacific and Japan at Palo Alto Networks. In this role, Sean spearheads the development of thought leadership, threat intelligence and security best practices for the cybersecurity community and business executives.&lt;br \\\/&gt;\\nWith more than 20 years of experience in the IT and security industry, he acts as a trusted advisor to organisations across the region and helping them improve their security postures and align security strategically with business initiatives.&lt;br \\\/&gt;\\nPrior to joining Palo Alto Networks, he spent 15 years in a variety of roles at Intel Security (McAfee), with his last position as the Chief Technology Officer for Asia Pacific. Before this, Sean was involved in software development, technical support and consulting services for a range of Internet security solutions.&lt;br \\\/&gt;\\nSean actively discusses security issues in mainstream media, including television, radio, print and security related broadcasts. He regularly participates in forums, conferences and panels, and provides intelligence on cybersecurity matters to the public and private sector.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 11, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-107-sean-duca&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/7c92afad-7aef-4740-b832-a11c3514557f-KBKAST-EP-107-Sean-Duca.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;49:41&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1652284802,&quot;key&quot;:&quot;db7427d94db8388c2a01953be18dad0b&quot;},&quot;ppe-4514-299&quot;:{&quot;title&quot;:&quot;Episode 106: Kim Coetzer &amp; Fred Venter&quot;,&quot;description&quot;:&quot;&lt;div&gt;Kim Coetzer has more than two decades of experience in the delivery of projects within complex organisations, delivering outcomes by applying expert knowledge in Information Management, Leadership as well as wide ranging business expertise. His experience has been with a diverse array of business initiatives with a focus on the Financial Services, Mining, Oil &amp; Gas, Energy, and Insurance industries. He is well versed in modern information technology and business environments and has a broad range of skills including Problem Solving, Leadership, People Management, Strategic Insights, Stakeholder Management and Innovation.&lt;\\\/div&gt;\\n&lt;div&gt;&lt;\\\/div&gt;\\n&lt;div&gt;A passionate Information Management Specialist and Program Manager with extensive experience in the delivery of projects within complex organisations, Frederick Venter has a proven track record of leading diverse teams. He thrives in environments that challenge conventional thinking, and his leadership achieves the ultimate goal of generating assets where previously only data existed while establishing governance structures to ensure ongoing value. A key focus for Fred is on the delivery of increased performance in organisations through successful implementation of business-driven outcomes supported by a commitment to stakeholder management.&lt;\\\/div&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 4, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-106-kim-coetzer-frederick-venter&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/848bf685-da30-4943-8607-d0d5cc0213ae-KBKAST-EP-106-Kim-Coetzer-Fred-Venter.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;44:12&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1651680043,&quot;key&quot;:&quot;54e10167ccf6e8d951e23c3dd1353d95&quot;},&quot;ppe-4514-300&quot;:{&quot;title&quot;:&quot;Episode 105: Reinhart Hansen&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;b&gt;Reinhart Hansen, Director of Technology, Office of the CTO, Imperva\\u00a0&lt;\\\/b&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Reinhart is an experienced Information Technology and Cyber Security leader with over 25 years of experience.\\u00a0 His career is founded by a degree in Computer Science from the Royal Melbourne Institute of Technology (RMIT) where he majored in Data Security and Communications.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Initially developing applications and security middleware for the Financial Services industry his career quickly became focused on helping organisations manage cyber risk by securing their applications, infrastructure and data using a wide variety of vendor technology combined with industry best security practices. \\u00a0 He has a demonstrated history of working in technology advisory, architecture, solution design and pre-sales roles.\\u00a0\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Reinhart is passionate about all aspects of cyber security and has been with Imperva since 2015.\\u00a0 Initially working as a principal SE in the APJ region, he is currently a Director of Technology within Imperva\\u2019s CTO Office and reports to Kunal Anand, Imperva\\u2019s CTO.\\u00a0 &lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 27, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-105-reinhart-hansen&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/697a7ccd-2d63-44a1-b87c-345445c52cd5-KBKAST-EP-105-Reinhart-Hansen.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;51:12&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1651077031,&quot;key&quot;:&quot;43a874b40f6b0631a7f65de8849cf0b0&quot;},&quot;ppe-4514-301&quot;:{&quot;title&quot;:&quot;Episode 104: Trent Telford&quot;,&quot;description&quot;:&quot;&lt;p&gt;A seasoned entrepreneur with deep experience in the technology sector, Trent is a seasoned data and security expert, often called upon by the government and enterprise to help advise on how to manage regulated data in complex environments.&lt;\\\/p&gt;\\n&lt;p&gt;Trent founded two technology companies in the U.S. and London with one culminating in an IPO. Today, Trent today is the CEO and Chairman of Cocoon Data and holds two board positions as a Non-Executive Director.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to Cocoon Data, Trent founded and led the IPO of technology cyber security company Covata on the ASX. Prior to this, he ran a successful start-up specializing in telco\\\/mobile marketing in partnership with STW\\\/WPP (premium SMS voting on TV\\\/radio\\\/consumer products) and was Chairman of an Australian ASX listed Bio-tech company.&lt;\\\/p&gt;\\n&lt;p&gt;His foundation years in the technology industry was as a Business Analyst and Solutions Architect at one of the world\\u2019s first NASDAQ listed global technology consulting companies \\u2013 Seranova. With graduate years spent with Bankers Trust and Deutsch Bank in London in global middle office and projects (FX\\\/Euro conversion\\\/Y2K)&lt;\\\/p&gt;\\n&lt;p&gt;Today, Trent and the Cocoon Data team leverage their secure object, patented technology to help keep companies and sovereign data safe, from harm\\u2019s way.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 20, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-104-trent-telford&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/b72b7144-308c-421d-9491-a4216ac42c88-KBKAST-EP-104-Trent-Telford.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;53:54&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1650472207,&quot;key&quot;:&quot;a9918f6777e1b364e009e8eb034acd03&quot;},&quot;ppe-4514-302&quot;:{&quot;title&quot;:&quot;Episode 103: Michael Livingstone&quot;,&quot;description&quot;:&quot;&lt;p&gt;Michael is a strategic leader with more than 20 years\\u2019 experience in Financial Services and Defence markets. He has demonstrable success in bringing early stage companies to market, utilising skills across Application Development, Product Management, Marketing and Sales. He operates collaboratively to distil technology solutions into customer value propositions, sales strategies and delivery models that are field enabled, integrated and commercially relevant.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 17, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-103-michael-livingstone&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/08c7d9b6-d600-4053-91b5-bded8febadfc-KBKAST-Episode-103-Michael-Livingstone.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;01:02:56&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1650209498,&quot;key&quot;:&quot;36bfb124a512150e8053e5f2f493e734&quot;},&quot;ppe-4514-303&quot;:{&quot;title&quot;:&quot;Episode 102: John Karabin&quot;,&quot;description&quot;:&quot;&lt;p&gt;John Karabin is the Senior Director of Cybersecurity for NTT Ltd in Australia, and is responsible for Australia\\u2019s security strategic direction, capability and go-to-market. He builds trusted partnerships with clients and technologists, bringing a keen focus to customer-centric delivery and operations.&lt;\\\/p&gt;\\n&lt;p&gt;John specialises in risk-based information security, combining a consulting led approach to meet the practical security needs for organisations increasingly dealing with a growing threat landscape and organisational change.&lt;\\\/p&gt;\\n&lt;p&gt;John has more than 25 years\\u2019 experience in information and communications technology (ICT), working in various locations around the world. He has dealt with a wide range of organisations, having worked with government and commercial entities across many geographies.&lt;\\\/p&gt;\\n&lt;p&gt;Before joining NTT, John was a Partner at EY leading their government risk and information security practice. Prior to this, he was the APAC Managing Director for Security at Verizon and also ran their Australian Telecommunications business.&lt;\\\/p&gt;\\n&lt;p&gt;John holds a Graduate Diploma in Technology Management from Deakin University and a bachelor\\u2019s degree from Curtin University in Communication Engineering, Electronics and Computer Science.&lt;\\\/p&gt;\\n&lt;p&gt;In his spare time, John is a volunteer firefighter with the NSW Rural Fire Service and a board member with Cyrise, Australia\\u2019s premier Cybersecurity start-up incubator.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;a href=\\&quot;https:\\\/\\\/kbi.media\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/GTIC_Monthly_Threat_Report_January_2022.pdf\\&quot;&gt;GTIC_Monthly_Threat_Report_January_2022&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 6, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-102-john-karabin&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/3af4a76f-bc9e-4004-84ea-c089a6899166-KBKAST-EP-103-John-Karabin.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;54:30&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1649260815,&quot;key&quot;:&quot;9006772b07b84800ddcafdecabcea68b&quot;},&quot;ppe-4514-304&quot;:{&quot;title&quot;:&quot;Episode 101: Eugene Fedorchenko&quot;,&quot;description&quot;:&quot;&lt;p&gt;My career is an example of professional shifts and huge amount of change. It started with the global legal consultancy names like Baker &amp; McKenzie, Chadbourne &amp; Parke. Following the completion of an internship at Deloitte (Zurich, Switzerland), I\\u2019ve spent around 8 years in Corporate Law, Tax Structuring and Digital Law across the EU and CEE.&lt;\\\/p&gt;\\n&lt;p&gt;I had my legal\\\/management consulting business as a co-founder, based in Switzerland for three years and completed my Masters\\u2019 Degree in International Law and an Advanced Degree in the EU Commercial and Economical Law from the University of Lausanne (Switzerland) in 2010.&lt;\\\/p&gt;\\n&lt;p&gt;I brought my multifaceted global experience to the Australian soil in 2017, with an accompanying skillset and understanding of management, marketing and product strategy within the walls of the Melbourne Business School as an Enterprise Management Specialist. At the time I was working on the GTM for the cyber security and renewable energy startups internationally.&lt;\\\/p&gt;\\n&lt;p&gt;Currently I am developing the Regulation Technology business partnerships at Fastlane Solutions (Sydney\\\/Melbourne) as a Business Development Partner, maintaining account management functions and growing major strategic partnership\\\/vendor relationships. I run a think tank\\\/advisory hub called IntFinite which provides business development avenues based on and subject to a Why? question and a robust Purpose of the organisation.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 30, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-101-eugene-fedorchenko&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/28964798-1148-443c-bbef-4ebad923279d-KBKAST-EP-106-Eugene-Fedorchenko.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;54:50&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1648656031,&quot;key&quot;:&quot;5d5a18eb761ae55eec1c80d9d160573e&quot;},&quot;ppe-4514-305&quot;:{&quot;title&quot;:&quot;Episode 100: Mukesh Kapadia&quot;,&quot;description&quot;:&quot;&lt;p&gt;Executive with over 20 years of experience leading IT functions and teams across different global markets, delivering complex digital and business transformation to improve customer service and employee experience. These include large scale technology programs and consolidation of IT Teams across different markets to drive efficiency and standardization of IT operating model and processes. Over the past 4 years, as the General Manager\\\/Deputy CISO, has led the cybersecurity strategy and implementation of a multi-year roadmap across global FMCG organisation operating in 6 countries across Asia Pacific to mitigate the evolving risk against Cyber Threats.&lt;br \\\/&gt;\\nProven track record and passionate about building and inspiring teams to deliver customer centric IT services&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 23, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-100-mukesh-kapadia&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/f555bb42-2d15-4ef5-8c8d-287f24efc5ab-KBKAST-EP-100-Mukesh-Kapadia.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;49:31&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1648051255,&quot;key&quot;:&quot;a2571d37d69cc1638cbf29a8688d38ba&quot;},&quot;ppe-4514-306&quot;:{&quot;title&quot;:&quot;Episode 99: Rebecca Herold&quot;,&quot;description&quot;:&quot;&lt;p&gt;Rebecca Herold, CDPSE, FIP, CISSP, CIPM, CIPP\\\/US, CIPT, CISM, CISA, FLMI, Ponemon Institute Fellow, has over 25 years of IT, info sec, &amp; privacy experience; CEO &amp; Founder (2004) of Rebecca Herold, LLC, aka The Privacy Professor(R); CEO &amp; Founder (2020) of Privacy &amp; Security Brainiacs; and host of the radio\\\/podcast show \\u201c&lt;a href=\\&quot;https:\\\/\\\/www.voiceamerica.com\\\/show\\\/2733\\\/data-security-and-privacy-with-the-privacy-professor\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Data Security &amp; Privacy with the Privacy Professor&lt;\\\/a&gt;\\u201c. Founder (2014) &amp; Engineer\\\/Architect, and Owner of all IP for content, specifications and architecture of SIMBUS, LLC and all derivatives thereof.&lt;\\\/p&gt;\\n&lt;p&gt;Rebecca is an entrepreneur, author &amp; was an Adjunct Professor for the Norwich University Master of Science in Information Security &amp; Assurance Program for 9 years where she also created program curriculum. Rebecca led the NIST Smart Grid privacy group for 7 years and is a founding member of the IEEE P1912 Privacy and Security Architecture for Consumer Wireless Devices Working Group (June 2015). Rebecca has received numerous awards and recognitions for her work throughout the course of her career. Rebecca has is currently finishing her 20th published book to date, plus chapters in many books and hundreds of articles. Some of Rebecca\\u2019s books include:&lt;br \\\/&gt;\\n* Security &amp; Privacy when Working from Home &amp; Travelling&lt;br \\\/&gt;\\n* The Practical Guide to HIPAA Privacy and Security Compliance (2 editions)&lt;br \\\/&gt;\\n* Data Privacy for the Smart Grid&lt;br \\\/&gt;\\n* The Privacy Papers&lt;br \\\/&gt;\\n* Managing an Information Security and Privacy Awareness and Training Program (2 editions)&lt;\\\/p&gt;\\n&lt;p&gt;Rebecca has a B.S. in Math &amp; Computer Science &amp; an M.A. in Computer Science &amp; Education. Rebecca is a longtime member of ISACA, Infragard, IAPP, ISSA, (ISC)2, IEEE &amp; ACM.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 16, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-99-rebecca-herold&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/0eec23df-b010-4f21-9efd-811f0e99a65c-KBKAST-EP-99-Rebecca-Herold.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;50:15&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1647446420,&quot;key&quot;:&quot;2803317e14ceb3891e1c2b5dfc12ce5a&quot;},&quot;ppe-4514-307&quot;:{&quot;title&quot;:&quot;Episode 98: Belinda McEachern M. Ed.&quot;,&quot;description&quot;:&quot;&lt;p&gt;\\u201cI do not want you to be impressed by me, I want you to be blessed by me\\u201d is Belinda McEachern\\u2019s personal motto. And it\\u2019s a motto that she\\u2019s put to good use both professionally and personally, within all walks of life. Originally from Greenwood SC, Belinda now lives in Blythewood SC (suburb of Columbia) with her husband Danny (of 20 years) and her two children (Aaron \\u2013 age 16 &amp; Camille \\u2013age 12).&lt;\\\/p&gt;\\n&lt;p&gt;Belinda is truly an individual that epitomizes the essence of selfless leadership and the true meaning of a leader. She possesses outstanding leadership traits (e.g., confidence, commitment, communication, and dedication that all persons seek and need in the 21st century). Belinda has had the privilege of holding a variety of leadership roles, both personally and professionally. Moreover, Belinda has had a stellar career in the fields of Education Leadership, Technology, Cyber Security, and Volunteerism.&lt;\\\/p&gt;\\n&lt;p&gt;Currently, Belinda is the Chapter President for one of the \\u201cBIT\\u201d Blacks In Technology Foundations\\u201d newest Chapters: \\u201cBlacks In Technology Columbia!\\u201d Blacks In Technology Columbia is the official Chapter for the Metro Columbia, SC region of the dynamic, growing, vibrant Blacks In Technology 501 (c)(3) non-profit organization. The purpose of this group is to network, learn best industry practices, and to advance Information Technology careers. The goal and mission is to \\u201cstomp the divide\\u201d between Black Tech workers and to fundamentally influence and effect change on an industry that has historically not sought parity with respect to Black workers. The intent of BIT Columbia is to level the playing field through training, education, networking, and mentorship with the support of allies, partners, sponsors, and most importantly their global members!&lt;br \\\/&gt;\\nBelinda has impressive academic and professional credentials. She holds a Master of Education from Columbia College and a Bachelor of Arts in Art Education from the historical SC HBCU, Benedict College. Belinda has recently completed academic studies at the Institute for Veterans and Military Families (IVMF) at Syracuse University, with a concentration in Cybersecurity and continuing her Doctorate (EDD. ET) program with a concentration in Educational Leadership &amp; Educational Technology. Her ethical values and professionalism are above reproach.&lt;\\\/p&gt;\\n&lt;p&gt;Belinda exemplifies public service through her many volunteer endeavors, alongside Blacks In Technology Columbia. Her commitment to public service is manifested in her numerous volunteer and membership efforts. Belinda holds memberships with The National Coalition of 100 Black Women Inc., Columbia (SC) Chapter, whose mission is to advocate on behalf of black women and girls to promote leadership development and gender equity in the areas of health, education and economic empowerment; SC SkillsUSA Executive Board (currently Vice Chair): serving thousands of high school, college and middle school career and technical students and professional members enrolled in training programs in trade, technical and skilled service occupations, including health occupations.; Grow with Google Business Partner; NIST \\u2013 NICE (National Initiative For Cybersecurity Education) Apprenticeship Subgroup\\\/ Working Group; Career &amp; Technology Education (CTE) Advisory Council for SC School District Five of Lexington and Richland Counties; \\u201cBIC\\u201d- Blacks in Cybersecurity; SANS Women in Cybersecurity; SC Associationof School Administrators (SCASA); Women of Distinction Toastmasters (Toastmasters International); SC Codes (S.C. Department of Commerce\\u2019s Office of Innovation); mediaspace.global (The independent global social network for professionals in media, marketing, technology and regulation); siberX (Curating a global community of cybersecurity professionals and enthusiasts); \\u201cAYA\\u201d \\u2013 Ally of the Year Awards 2021 (Judge\\\/ Selection Committie), and Women\\u2019s Cyberjutsu; The Anti-Human Trafficking Alliance (Lexington,&lt;\\\/p&gt;\\n&lt;p&gt;SC); Carolina Alliance for Technology Parents in Partnership (CAT PIP), Columbia, SC; and IT-ology (K-12 STEAM), Columbia, SC.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 10, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-98-belinda-mceachern-m-ed-1&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/992e7c0a-b8fa-4f4d-be0e-cb08863836cb-KBKAST-Episode-98-Belinda-McEachern.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;54:55&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1646888239,&quot;key&quot;:&quot;31784810bde41b94b2f306ea2328f5e3&quot;},&quot;ppe-4514-308&quot;:{&quot;title&quot;:&quot;Episode 97: Abhijeth Dugginapeddi&quot;,&quot;description&quot;:&quot;&lt;p&gt;Abhijeth Dugginapeddi is a security practitioner, heads an AppSec team and an Adjunct lecturer at UNSW in Australia. Previously worked with CBA, Adobe Systems, TCS and Sourcenxt. Security Enthusiast in the fields of Penetration Testing, Application\\\/Mobile\\\/Infrastructure Security. Believes in need for more security awareness and free responsible disclosures. Got lucky in finding few vulnerabilities with Google, Yahoo, Facebook, Microsoft, Ebay, Dropbox, etc and one among Top researchers in Synack a bug bounty platform. Got a chance to speak at Defcon, Blackhat, OWASP AppSec USA, c0c0n, Secure-2018 Poland, CISO Summit, etc.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 3, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-97-abhijeth-dugginapeddi&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/9d0c1448-5e7a-497c-b000-5c702c35cb10-KBKAST-EP-97-Abhijeth-Dugginapeddi.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;58:41&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1646323243,&quot;key&quot;:&quot;179ef05c3f82d1107bc33b3028dd560f&quot;},&quot;ppe-4514-309&quot;:{&quot;title&quot;:&quot;Episode 96: Jason Yakencheck&quot;,&quot;description&quot;:&quot;&lt;p&gt;Jason is a Associate Partner at IBM with a strong background in project management, cybersecurity, cloud, and strategic planning. He\\u2019s leads IBM\\u2019s cybersecurity initiatives across Department of Homeland Security, Department of Justice, and Foreign Affairs. Jason designed and led many client security programs to drive success and innovation in areas such as vulnerability management programs, security operations, risk management, identity and access management, and solution architecture design efforts. Jason is adept at leading project teams, cyber capacity building, and implementing solutions in complex environments. He holds the following certifications: PMP, ITIL, CISSP-ISSAP, CISM, CISA, SAFe 5 Architect.&lt;\\\/p&gt;\\n&lt;p&gt;Jason received multiple leadership awards for his contributions to the technology sector both in the Washington, D.C. region and globally. He served as the President of the ISACA Greater Washington, D.C. Chapter (GWDC) from 2018-2020. He is a featured writer for Govloop and an ISACA Expert Speaker. Jason is a sought-after industry expert in the cybersecurity field. He is a frequent conference speaker and has been interviewed by news outlets such as Politico, FedTechMagazine, and TechTarget. He previously served as Vice President and Director of Professional Outreach and Development for GWDC. He was part of many working groups for ISACA Global such as the Leadership Development Advisory Council. He is a key contributor to the CISA and CISM online review courses and exam content creation.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 22, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-96-jason-yakencheck&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/a0a08898-5402-4b96-95f4-ad3e0634dd68-KBKAST-EP-96-Jason-Yakencheck.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;36:43&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1645533236,&quot;key&quot;:&quot;a010430287db662a3e870107c256d77f&quot;},&quot;ppe-4514-310&quot;:{&quot;title&quot;:&quot;Episode 95: Jon Brandt&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;strong&gt;Jonathan Brandt, CISM, CDPSE, CCISO, CISSP, CySA+, CPI, PMP&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;A senior information security practice manager in ISACA\\u2019s Knowledge and Research department. In this role, he contributes thought leadership by generating ideas and deliverables relevant to ISACA\\u2019s constituents. He serves ISACA\\u00ae departments as a subject matter expert on information security projects and leads author management teams whenever external resources are necessary. Brandt is a highly accomplished US Navy veteran with more than 25 years of experience spanning multidisciplinary security, cyberoperations and technical workforce development. Prior to joining ISACA, Brandt was a project manager for classified critical infrastructure projects across the globe.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;a href=\\&quot;https:\\\/\\\/store.isaca.org\\\/s\\\/store#\\\/store\\\/browse\\\/detail\\\/a2S4w000004Kti2EAC\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;ISACA Portal&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 15, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-95-jon-brandt&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/486e079b-0eca-4e66-93aa-0dc1dc27e356-KBKAST-EP-95-Jon-Brandt.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;44:55&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1644926433,&quot;key&quot;:&quot;9c95607698f250a68a496db465472b71&quot;},&quot;ppe-4514-311&quot;:{&quot;title&quot;:&quot;Episode 94: Jean-Michel Ferat&quot;,&quot;description&quot;:&quot;&lt;p&gt;Jean-Michel Ferat is a Senior Managing Director at Ankura with over 20 years of experience in the specialized fields of forensic accounting, fraud detection, and data analytics. He has applied his skills in a variety of cases involving corruption, kickbacks, collusive bidding rings, money laundering, embezzlement, asset misappropriation, terrorist financing, and financial statement fraud. He has led or participated in reactive investigations and proactive compliance engagements, including Foreign Corrupt Practices Act monitorships, across the United States and in over 25 countries around the world.\\u00a0 Jean-Michel served two terms as the forensic accounting expert on the audit and finance committee of the board of directors of the Global Fund to Fight Aids, Tuberculosis and Malaria and currently serves on the international advisory board of the CEELI Institute where he advises the organization on anti-corruption initiatives.&lt;\\\/p&gt;\\n&lt;p&gt;Jean-Michel has led or participated in numerous high-profile and complex projects across the United States and in international locations including Burkina Faso, Cambodia, Cameroon, Chile, China, Djibouti, Guinea, Holland, India, Indonesia, Iraq, Japan, Jordan, Kenya, Kuwait, Latvia, Liberia, Madagascar, Mali, Mauritania, Mexico, Pakistan, Senegal, South Africa, Trinidad and Tobago, United Arab Emirates, and Vietnam.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 20, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-94-jean-michel-ferat&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/5b5d6e98-d1dd-4c62-9f1a-92c6ce14ca34-KBKAST-EP-94-Jean-Michel.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;46:06&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1642693369,&quot;key&quot;:&quot;61a4d7af83ba8029a08d178b07c08a96&quot;},&quot;ppe-4514-312&quot;:{&quot;title&quot;:&quot;Episode 93: Ian Sorbello&quot;,&quot;description&quot;:&quot;&lt;p&gt;Ian has dedicated his IT career to identity and access management, working in and around banking and finance for the last 19 years. In this time, Ian has worked as a software engineer, security architect, and identity product owner. He has led IAM programmes for major banks such as the Commonwealth Bank of Australia, and ran the digital transformation programme as Head of Technology, Security for HSBC Global in the UK. After a number of years independently consulting in Europe around PSD2 and Open Banking, Ian joined Transmit Security in 2019 as Sales Engineer across APAC, before moving into a global role in 2021 covering technical evangelism and marketing.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 10, 2022&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-93-ian-sorbello&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/26989236-db3c-4c41-8b8e-770ebba0d220-KBKAST-EP-93-Ian-Sorbello.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;56:31&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1641804919,&quot;key&quot;:&quot;f60470c2adc4bf9ef1ebc01a3e144c0e&quot;},&quot;ppe-4514-313&quot;:{&quot;title&quot;:&quot;Episode 92: Sawan Joshi&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Sawan&lt;\\\/span&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt; is an IT Risk Management Professional with over 15 years\\u2019 experience in multi industry organisations that have grown by acquisitions and mergers where he created and delivered strategically aligned IT Transformation programmes while managing risk that improved scalability, agility and provided new business enablement.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Sawan\\u2019s career has been well travelled, built upon collaborative and flexible approaches that have ensured people are at the centre of all initiatives as the main asset thus building Information Security and Privacy principles in every table discussion.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;As a qualified architect, one of his biggest strengths is to be an effective communicator and translate complex to a simple explanation and vice versa while focusing on the value of the work and how it contributes to business growth.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 18, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-92-sawan-joshi&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/0ffa78e5-6a28-4429-8bf4-9bca404f4bf1-KBKAST-Episode-92-Sawan-Joshi.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;52:46&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1639852319,&quot;key&quot;:&quot;ce51f6bb50b4a86adb0b02217e17bb82&quot;},&quot;ppe-4514-314&quot;:{&quot;title&quot;:&quot;Episode 91: Tinesh Chhaya&quot;,&quot;description&quot;:&quot;&lt;p&gt;Tinesh has 15 years of successful cyber corporate and 5 years of start-up entrepreneurial cyber experience.&lt;br \\\/&gt;\\nHe has built and exited 2 start-ups and currently sits on the board as an advisor to start ups within Cyber, EdTech, Software Development and Social Tech.&lt;\\\/p&gt;\\n&lt;p&gt;Tinesh is a mentor, motivator and advises individuals who are considering an entrepreneurial career as well as being a mental health advocate, keen supporter of mindfulness and self care.&lt;\\\/p&gt;\\n&lt;p&gt;He is a Forbes Technology Council member, part time lecturer at Brunel University and aspiring author.&lt;\\\/p&gt;\\n&lt;p&gt;Tinesh is also a advocate of helping young learners find their place in the working world and helps over 30 young learners a year with his personal time to encourage and motivate them to follow their dreams and achieve their goals.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 8, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-91-tinesh-chhaya&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/865c2797-ebc4-429f-8fee-2b06b2a64544-KBKAST-Episode-91-Tinesh-Chhaya.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;01:09:42&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1638971651,&quot;key&quot;:&quot;475e2fbaa53f18b24e625be6b33f79ab&quot;},&quot;ppe-4514-315&quot;:{&quot;title&quot;:&quot;Episode 90: Scott Fletcher&quot;,&quot;description&quot;:&quot;&lt;p&gt;Scott Fletcher is a Cloud Security Engineer at Whispir&lt;\\\/p&gt;\\n&lt;p&gt;Scott\\u2019s background includes Penetration Testing, Software Development &amp; Security Consulting. He has held Principal Consultant rules in both Australia &amp; New Zealand, and worked for a number of enterprise and financial services organisations.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 1, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-90-scott-fletcher&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/d97bf61a-81fa-4197-98fb-bbdfe0c19618-KBKAST-Episode-90-Scott-Fletcher.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;58:39&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1638351448,&quot;key&quot;:&quot;4485d4378758e598d554798e5ecbaf45&quot;},&quot;ppe-4514-316&quot;:{&quot;title&quot;:&quot;Episode 89: Phillip Campbell&quot;,&quot;description&quot;:&quot;&lt;p&gt;Phillip Campbell is the founder and CEO of enigmaFIT, a global executive brain coaching company. As a cognitive scientist, he continues to extensively research the brain and cognition.&lt;\\\/p&gt;\\n&lt;p&gt;He has developed a framework of how to optimize the integration of the left-hemisphere and right-hemisphere working together to create Brain Balance. Phillip has pioneered leadership development and learning agility areas approaches by leveraging the concepts of Fluid Thinking and Crystallized Knowledge, and providing the Fluid Thinking Development Program to the brightest leaders in our global business environment.&lt;\\\/p&gt;\\n&lt;p&gt;Phillip\\u2019s program is a refreshing and quantifiable approach to unlocking and harnessing the power of cognitive capability of individuals and organizations. His team at enigmaFIT provide cognitive development programs to C-suite and senior executives of global multinational companies across the USA, UK, Europe, Australia, and Asia, and also to successful entrepreneurs.&lt;\\\/p&gt;\\n&lt;p&gt;His methodology ensures that the best leaders become elite leaders, and exceed their potential by exponentially increasing their performance.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;h5&gt;&lt;a href=\\&quot;\\\/What_is_Fluid_Thinking_V1.1.pdf\\&quot;&gt;Download \\u2018Fluid Thinking\\u2019 PDF&lt;\\\/a&gt;&lt;\\\/h5&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 25, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-89-phillip-campbell&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/96b0ea67-5df8-4b1c-bd45-847021ab9458-KBKAST-Episode-89-Phillip-Campbell.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;01:09:46&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1637870082,&quot;key&quot;:&quot;fe82a9af59a1c066d50e298bfb34d0d3&quot;},&quot;ppe-4514-317&quot;:{&quot;title&quot;:&quot;Episode 88: Saaim Khan&quot;,&quot;description&quot;:&quot;&lt;p&gt;Saaim Khan is a cybersecurity professional with 20 years of experience in client-facing roles. He has worked with organisations in APAC, ranging from small businesses to large enterprises.&lt;\\\/p&gt;\\n&lt;p&gt;Saaim holds multiple security certifications (CISM, ISO 27001 LI\\\/LA, CTT+) and degrees in Computer Science and Project Management and qualifications in Cybersecurity Management, Cyber Law and Cyber Warfare.&lt;\\\/p&gt;\\n&lt;p&gt;Saaim has previously built and let security consulting practices, while working as an interim-CISO, security advisor and strategy consultant with organisations both big and small. He has helped organisations achieve compliance and certification with ISO 27001, SOC2 and PCI-DSS, and conform to GDPR, CCPA, MAS-TRM and PDPA requirements.&lt;\\\/p&gt;\\n&lt;p&gt;Saaim is passionate about reducing cybersecurity inequity for businesses. A regular media commentator and podcaster, Saaim promotes the need for greater transparency in cybersecurity engagements.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 18, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-88-saaim-khan&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/e3e3abbc-ae8e-4bec-b433-fcbd0aa3d77d-KBKAST-EP-89-Saaim-Khan.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;51:10&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1637248305,&quot;key&quot;:&quot;b90353f7130c1c3047031cef44458ea2&quot;},&quot;ppe-4514-318&quot;:{&quot;title&quot;:&quot;Episode 87: Lisa Lorenzin&quot;,&quot;description&quot;:&quot;&lt;p&gt;Lisa Lorenzin is Senior Director of Transformation Strategy at Zscaler, specializing in secure application access and digital transformation. For more than 25 years, she has worked in a variety of network and information security roles and has contributed to open standards for endpoint integrity and network security from the Trusted Computing Group (TCG) and Internet Engineering Task Force (IETF).&lt;\\\/p&gt;\\n&lt;p&gt;Lisa\\u2019s current focus is on helping customers achieve their security goals and create a seamless user experience across cloud and mobile environments through the use of cloud-delivered zero trust access solutions.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 11, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-87-lisa-lorenzin&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1f3d8eef-a4cf-408b-a7a3-11b4374af5ca-KBKAST-Episode-87-Lisa-Lorenzin.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;53:37&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1636643026,&quot;key&quot;:&quot;513446235858169ec553eff6825d911c&quot;},&quot;ppe-4514-319&quot;:{&quot;title&quot;:&quot;Episode 86: Lani Refiti&quot;,&quot;description&quot;:&quot;&lt;p&gt;Lani is a technologist, amassing 20+ years experience in fields such as cybersecurity, startups, IoT, AI and robotics.\\u00a0 \\u00a0He has worked for some of the largest organisations globally \\u2013 Intel Corporation, Cisco Systems, PwC and Deloitte and is currently the ANZ Director for Claroty.\\u00a0 He also has an interest in the startup sector, and is part of the founding team at Cybermetrix and Azcende.&lt;\\\/p&gt;\\n&lt;p&gt;In 2017 he co-founded and currently serves as CEO of IoTSec Australia, an industry initiative to advocate for safe and secure practices in the emerging Internet of Things area with a focus on critical infrastructure and smart cities.\\u00a0 Lani is also a practicing Psychotherapist after completing his Masters in 2015 and it gives him an uncommon approach when looking at the intersection of humanity and emerging technology.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 4, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-86-lani-refiti&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/84c06267-ef48-42e9-aa33-70e3b54e7e07-KBKAST-Episode-86-Lani-Refiti.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;44:36&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1636023738,&quot;key&quot;:&quot;26519eb2db3a82e40a235efab4afccdb&quot;},&quot;ppe-4514-320&quot;:{&quot;title&quot;:&quot;Episode 85: Dominic Vogel&quot;,&quot;description&quot;:&quot;&lt;p&gt;As Founder &amp; Chief Strategist at CyberSC, Dominic Vogel holds a proven track record within cyber security across multitude of industries (financial services, logistics, transportation, healthcare, government, telecommunications, and critical infrastructure). Dominic actively participates in the Vancouver security community and is a well-respected cyber security expert for appearing on media news outlets across North America and Internationally on BBC World News. Dominic is highly regarded as a cyber security thought leader and was recently appointed to the BC Provincial Cyber Security Advisory Committee.&lt;\\\/p&gt;\\n&lt;p&gt;Dominic focuses much of his energy on providing strategic security leadership to technology start-ups and small\\\/midsize businesses to proactively solve their cyber risk challenges. He strives to provide practical cyber security advice to his clients and actively turning the security consulting world upside down.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 28, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-85-dominic-vogel&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/f2c9ec01-1279-4c70-9ce3-52a7b450663a-KBKAST-Episode-85-Dom-Vogel.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;49:49&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1635446529,&quot;key&quot;:&quot;1b15fa5a08ee89d8a1f6c24e2e08bce3&quot;},&quot;ppe-4514-321&quot;:{&quot;title&quot;:&quot;Episode 84: Ed Badawi&quot;,&quot;description&quot;:&quot;&lt;p&gt;Having thrived as an investment advisor at an independent investment firm in the harsh post-GFC climate, Ed quickly learned that the &lt;i&gt;\\u2018old-school\\u2019&lt;\\\/i&gt; approach to selling, which has been glorified in popular culture, was counterproductive and downright destructive over the long-term. This motivated Ed to breakdown the nuances and processes required for transparent, effective and scalable commercial strategies.&lt;\\\/p&gt;\\n&lt;p&gt;Since 2013, Ed has helped grow and scale multiple businesses across various sectors, ranging from financial markets advisories to digital agencies. He\\u2019s also led the successful launch of multiple start-ups while consulting for organisations in both the private and public sectors. In 2017, Ed and his longtime associate\\\/client, Nicholas Forsyth, joined forces to take Sales Inc from a consultancy to a company that offers Sales as a Service. The aim\\u2026helping business reach their commercial objectives, whilst raising industry standards and awareness around best practice.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 21, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-84-ed-badawi&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/967121b3-163f-4f7a-8efc-7445a1ba720e-KBKAST-Episode-83-Ed-Badawi.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;01:15:17&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1634839991,&quot;key&quot;:&quot;d1af8f95e5e117f80ef5425df22b8549&quot;},&quot;ppe-4514-322&quot;:{&quot;title&quot;:&quot;Episode 83: Ted Ipsen&quot;,&quot;description&quot;:&quot;&lt;p&gt;Ted Ipsen is the President and COO of Positroniq, a strategic security and risk consultancy. He is an experienced executive manager with over 20 years of experience specializing in high-tech crime investigation, digital forensics, and the delivery and oversight of consulting and advisory services in the areas of information security, secure development, security assessment, information risk management, IT governance, compliance, business continuity management, and aligning strategic IT and security goals with business objectives.&lt;\\\/p&gt;\\n&lt;p&gt;He was recruited out of law enforcement by a global \\u201cBig 4\\u201d audit and professional services firm, and has since moved progressively to more technical, and focused security consultancies.&lt;\\\/p&gt;\\n&lt;p&gt;Mr. Ipsen has worked with organizations across many industries, reviewing security and IT programs against industry leading practices, standards, and regulatory frameworks, integrating security operational processes, and providing security training to infosec practitioners, software developers, and executives.&lt;\\\/p&gt;\\n&lt;p&gt;He has served as the interim-CISO for a major airline, and built security programs for organizations of all sizes.&lt;\\\/p&gt;\\n&lt;p&gt;He has spoken at many national and international security conferences, and is the co-author of \\u201cLaw Enforcement Challenges in Digital Forensics,\\u201d presented at the National Colloquium for Information Systems Security Education. He has contributed to a number of security publications, including \\u201cSecuring Linux, Step by Step\\u201d and \\u201cDisaster Recovery, Step by Step\\u201d, issued by the SANS Institute, and \\u201cPractical Cybersecurity Architecture\\u201d, from Packt Publishing.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;&lt;strong&gt;Resources Mentioned:&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;a href=\\&quot;https:\\\/\\\/www.provendatarecovery.com\\\/blog\\\/what-is-digital-forensics\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;https:\\\/\\\/www.provendatarecovery.com\\\/blog\\\/what-is-digital-forensics\\\/&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;a href=\\&quot;https:\\\/\\\/www.cisostreet.com\\\/effective-board-communication-for-cisos\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;https:\\\/\\\/www.cisostreet.com\\\/effective-board-communication-for-cisos\\\/&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 13, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-83-ted-ipsen&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/bafb5f0b-15b5-494f-b6d8-44a7b8a016e8-KBKAST-Episode-83-Ted-Ipsen.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;55:58&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1634150100,&quot;key&quot;:&quot;5e5f8c7aeea0fe586d287823510a6fed&quot;},&quot;ppe-4514-323&quot;:{&quot;title&quot;:&quot;Episode 82: Gail Bray&quot;,&quot;description&quot;:&quot;&lt;p&gt;Gail is responsible for leading a team to create the digital division of VU Polytechnic the TAFE arm of VU.\\u00a0 This includes leading three strategic initiatives, the Wyndham Tech School, Sunshine Skills Hub and Cybersecurity Training Centre to provide STEM training from Year 7 right up to mature age adults.\\u00a0 Gail engages in regular speaking events and podcasts to increase the visibility of careers that involve STEM and to educate education leaders on the skills required for the future of work.\\u00a0 Gail is passionate about promoting the growing job opportunities available to the young people of Melbourne\\u2019s West and believes anything is possible if you put your mind to it!&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 6, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/gail-bray&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/65659dd9-ff2e-42ba-a997-3371c4282d79-KBKAST-Episode-82-Gail-Bray.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;54:10&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1633551002,&quot;key&quot;:&quot;e33a6ce06f29fb0edc7c4472dcc996e4&quot;},&quot;ppe-4514-324&quot;:{&quot;title&quot;:&quot;Episode 81: Jay Hira&quot;,&quot;description&quot;:&quot;&lt;p&gt;From an early age, Jay has been interested in computers, and is still fascinated by them and the impact they continue to have on our society. His first job out of university was at Wipro as a pen-tester, but he quickly and consistently climbed the ranks \\u2013 or sometimes took a sideways move \\u2013 to broaden his experience. As a result, Jay has had many different roles, ranging from technical, strategic, delivery, and customer-facing.&lt;\\\/p&gt;\\n&lt;p&gt;Jay moved continents and had to adapt to an entirely new city, a new way of life and a new culture. This taught him many things, such as personal resilience, the importance of building strong relationships, and how to pick new things up quickly. It\\u2019s also given him an incredibly diverse and broad perspective, which helps him get results.&lt;\\\/p&gt;\\n&lt;p&gt;Jay has been very strategic and proactive in his career moves, seeking opportunities to build out his skillset to help organisations protect and defend against cyber threats. I\\u2019m a team player and have always believed that teams can achieve more together than they can as individuals, which is very important to him as a leader. Jay has also discovered how fulfilling it can be to help others achieve their goals, which has fueled his passion for working with educators to help students develop skills to transition to the workforce successfully.&lt;\\\/p&gt;\\n&lt;p&gt;Jay wants to help organisations strengthen and shape their approach to cybersecurity through the alignment of cybersecurity outcomes with business success. Jay\\u2019s excited by what the future holds, which he believes puts him in a fantastic position to lead his teams and customers into the future.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 28, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-81-jay-hira&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKAST-Episode-81-Jay-Hira.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;53:07&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1632861740,&quot;key&quot;:&quot;f74b5e47260201b91d464e2870620d76&quot;},&quot;ppe-4514-325&quot;:{&quot;title&quot;:&quot;Episode 80: Andy Walker&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Andy Walker is the co-founder and Chief Executive Officer of ditno, a Network Security Policy Management Software company that enables organisations to build a Governed Zero Trust Network for improved and simplified security.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;After completing an apprenticeship and signing a professional football contract in England, Andy studied Information Technology and quickly developed a passion for cyber security, specifically network security. He gained a number of industry qualifications including CCNA, CCNP, CCVP, MCSA and ITIL.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Over the last 20 years, Andy has designed and engineered interconnected networks for large enterprises including financial services and global logistics organisations, ensuring their IT services are connected securely, reducing the impact of cyber threats.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;font-weight:400\\&quot;&gt;Before working on ditno, he was managing the delivery of large Network Security projects at the Commonwealth Bank of Australia. As ditno\\u2019s CEO, Andy has built a culture of innovation and collaboration to deliver leading-edge and beneficial solutions to their customers.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 13, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-80-andy-walker&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKAST-Episode-80-Andy-Walker.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:39&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1631552516,&quot;key&quot;:&quot;b69a1ca852ae078cb63fa17d2ccf9136&quot;},&quot;ppe-4514-326&quot;:{&quot;title&quot;:&quot;Episode 79: Michael Loewy&quot;,&quot;description&quot;:&quot;&lt;p&gt;Michael is a Co-founder of Tide Foundation, a deep tech start-up developing technology to enable cyber-herd immunity. He\\u2019s a seasoned entrepreneur with a rich history leading the development and go-to-market of enterprise software. He spent over a decade growing a decorated digital agency before merging to become a full services agency and successfully exiting. Michael holds a degree in Information Systems and Accounting, UNSW; was an academic professional at the University of Illinois and currently serves on the advisory board of the Children\\u2019s Medical Research Institute.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 7, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-79-michael-loewy&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/Ep-80-KBKAST-Mike-Loewy.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;45:27&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1631035854,&quot;key&quot;:&quot;4b490046b474fcd7078497d4436da0d1&quot;},&quot;ppe-4514-327&quot;:{&quot;title&quot;:&quot;Episode 78: Jacqui Loustau&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;strong&gt;Jacqui Loustau&lt;\\\/strong&gt; \\u2013 is the Founder and Executive Manager for the Australian Women in Security Network (AWSN).&lt;\\\/p&gt;\\n&lt;p&gt;She is a cybersecurity expert, with over 2 decades of\\u00a0 experience in IT and Information Security. She has worked on large projects internationally across a wide range of security domains and in cybercrime. She is passionate about security and collaborating with others to drive innovation and change within industry. This includes educating small businesses and individuals on improving their cybersecurity practices. She has written a number of white papers and contributed to books, podcasts, webinars and is regularly requested to speak at industry events.&lt;\\\/p&gt;\\n&lt;p&gt;As the Founder of the Australian Women in Security Network (AWSN) since 2015, she has been working on several initiatives to connect, support and inspire more talent from all industries and diverse backgrounds to pursue a career in security and to stay. For this work she has received several awards including global recognition as an IFSEC top influencer #9 for security thought leadership (2018), AUSCERT Information Security Excellence (2021), AISA 2016 Diversity in Cybersecurity, ISACA Oceania CACS 2018 Women in Technology Leadership, 2019 Best Volunteer winner and Highly commended for IT Security Breaker.&lt;\\\/p&gt;\\n&lt;p&gt;CyberShift2 Alliance on Eventbrite for now \\u2013 &lt;a href=\\&quot;https:\\\/\\\/www.eventbrite.com.au\\\/e\\\/cybershift2-tickets-163133064387\\&quot; target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;https:\\\/\\\/www.eventbrite.com.au\\\/e\\\/cybershift2-tickets-163133064387&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 1, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-78-jacqui-loustau&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKAST-Episode-78-Jacqui-Loustau.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;50:04&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1630496556,&quot;key&quot;:&quot;7c48d053e235f9826418ca323f4956a3&quot;},&quot;ppe-4514-328&quot;:{&quot;title&quot;:&quot;Episode 77: Andrew Scully&quot;,&quot;description&quot;:&quot;&lt;p&gt;Andrew Scully is an information security professional with over 15 years\\u2019 experience building and delivering security and technical outcomes aligned for both the commercial, military and government sectors.&lt;\\\/p&gt;\\n&lt;p&gt;Previously, Andrew has successfully led large scale structural, technical, and cultural security transformations for Blue Coat Systems, Symantec, Telstra Defence and the Royal Australian Air Force. These roles have included responsibility for;&lt;\\\/p&gt;\\n&lt;ul&gt;\\n&lt;li&gt;Security program oversight as CISO for the Defence Terrestrial Communication Network delivered under JP2047, and&lt;\\\/li&gt;\\n&lt;li&gt;Operational risk management aspects of Symantec\\u2019s internal information security practice including the Joint Security Operations Centre, Incident Response, Forensics, Threat Intelligence, eDiscovery and Red Teaming.&lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&lt;p&gt;Currently, Andrew is the head of Cyber Security at Ampion (formerly Shelde). Andrew\\u2019s oversight includes more than 40 technical staff delivering complex cyber solutions across Sydney, Canberra and Melbourne.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;August 23, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-77-andrew-scully&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKAST-Episode-77-Andrew-Scully.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;42:42&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1629715420,&quot;key&quot;:&quot;6845b9448f5ff3733c4c61f76faa43b0&quot;},&quot;ppe-4514-329&quot;:{&quot;title&quot;:&quot;Episode 76: Michael F. D. Anaya&quot;,&quot;description&quot;:&quot;&lt;p&gt;Michael is the Head of Attack Surface Analysis at Palo Alto Networks. He leads a large team of analysts who identify vulnerabilities in large Fortune 500 companies and government agencies\\u2019 vast online presence. He also has 14 years of FBI experience as a Special Agent, leading extensive investigations and overseeing countless arrests, search warrants, and dismantlements of cyber threat actor sets. Michael has spoken on cybersecurity topics over 500 times around the world and was considered \\u201cone of the FBI\\u2019s most talented presenters.\\u201d Michael is driven by his family, making people laugh, and a desire to help others.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;August 12, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-76-michael-f-d-anaya&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKast-Episode-76-Michael-Anaya-Cyber-Leadership.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;42:56&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1628790249,&quot;key&quot;:&quot;cc9422cdd0d10aca85956d13595f8b9f&quot;},&quot;ppe-4514-330&quot;:{&quot;title&quot;:&quot;Episode 75: Sean Duca&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;strong&gt;Sean Duca&lt;\\\/strong&gt;&lt;br \\\/&gt;\\nVice President and Regional Chief Security&lt;br \\\/&gt;\\nOfficer, Asia Pacific &amp; Japan&lt;br \\\/&gt;\\nPalo Alto Networks&lt;\\\/p&gt;\\n&lt;p&gt;Sean is vice president and regional chief security officer for Asia Pacific and Japan at Palo Alto Networks. In this role, Sean&lt;br \\\/&gt;\\nspearheads the development of thought leadership, threat intelligence and security best practices for the cybersecurity community and business executives.&lt;br \\\/&gt;\\nWith more than 20 years of experience in the IT and security industry, he acts as a trusted advisor to organisations across the region and helping them improve their security postures and align security strategically with business&lt;br \\\/&gt;\\ninitiatives.&lt;br \\\/&gt;\\nPrior to joining Palo Alto Networks, he spent 15 years in a variety of roles at Intel Security (McAfee), with his last position as the Chief Technology Officer for Asia Pacific. Before this, Sean was involved in software development, technical support and consulting services for a range of Internet security solutions.&lt;br \\\/&gt;\\nSean actively discusses security issues in mainstream media, including television, radio, print and security related broadcasts. He regularly participates in forums, conferences and panels, and provides intelligence on cybersecurity matters to the public and private sector.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;August 4, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-75-sean-duca&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKAST-Episode-75-Sean-Duca.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;46:52&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1628109203,&quot;key&quot;:&quot;499fbff6fe80eaeb7cba46bb76f02ed4&quot;},&quot;ppe-4514-331&quot;:{&quot;title&quot;:&quot;Episode 74: Laura Hartley&quot;,&quot;description&quot;:&quot;&lt;p&gt;Laura is a criminologist specialising in cyber safety. She has worked in NAB\\u2019s Enterprise Security team for seven years, and previously worked in Personal, and Institutional Banking. Laura leads NAB\\u2019s Security Advisory &amp; Awareness team, which works with NAB\\u2019s employees, customers, and the community to empower them to keep themselves safe online and in the physical world. Laura has a Bachelor of Arts with double majors in Criminology and Political Science from The University of Melbourne\\\/Queen Mary College University of London, and a Masters in Criminology from the University of Melbourne.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;a href=\\&quot;https:\\\/\\\/www.nab.com.au\\\/about-us\\\/security\\\/online-safety-tips-business\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;https:\\\/\\\/www.nab.com.au\\\/about-us\\\/security\\\/online-safety-tips-business&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 28, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-74-laura-hartley&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKAST-Episode-74-Laura-Hartley.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;25:52&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1627498495,&quot;key&quot;:&quot;794e1e5e603b5e80e25c4f86a5fd3a67&quot;},&quot;ppe-4514-332&quot;:{&quot;title&quot;:&quot;Episode 73: Dustin Brewer&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;em&gt;Dustin Brewer, CISM, CSX-P, CDPSE, CEH, is ISACA\\u2019s Senior Director, Emerging Technology and Innovation, a role in which he explores and produces content for the ISACA\\u00ae community on the utilisation benefits and possible threats to current infrastructure posed by emerging technologies. He has 20 years of experience in the IT field, beginning with networks, programming and hardware specialisation. He excelled in cybersecurity while serving in the US military and, later, as an independent contractor and lead developer for defence contract agencies, he specialised in computer networking security, penetration testing, and training for various US Department of Defence (DoD) and commercial entities.&lt;\\\/em&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Emerging Technology Report: &lt;a href=\\&quot;https:\\\/\\\/www.isaca.org\\\/go\\\/emerging-tech-2021\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;https:\\\/\\\/www.isaca.org\\\/go\\\/emerging-tech-2021&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 23, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-73-dustin-brewer&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKAST-Episode-73-Dustin-Brewwer.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;48:08&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1627050228,&quot;key&quot;:&quot;e79c19301168b51d0ab3180509a017aa&quot;},&quot;ppe-4514-333&quot;:{&quot;title&quot;:&quot;Episode 72: Ramses Gallego&quot;,&quot;description&quot;:&quot;&lt;p&gt;With an MBA and Law education, Rams\\u00e9s is a +22 year security professional with deep expertise in the Risk Management and Governance areas. Rams\\u00e9s is now\\u00a0&lt;span class=\\&quot;Apple-converted-space\\&quot;&gt;\\u00a0&lt;\\\/span&gt;International Chief Technology Officer with CyberRes, a Micro Focus line of business, where he defines the vision and mission, purpose and promise of the division. He has recently been Strategist &amp; Evangelist for the office of the CTO with Symantec and holds the following professional accreditations: CISM, CGEIT, CISSP, SCPM, CCSK, ITIL and COBIT Foundations. An internationally recognized public speaker, has visited +24 different countries in the past 12 months and has been awarded \\u2018Best Speaker\\u2019 in the four continents. He is also a Six Sigma Black Belt professional and is proud of being Past International VP for ISACA\\u2019s Board of Directors and Immediate Past President and now Ambassador of the Barcelona Chapter. Rams\\u00e9s is also Executive Vice President of the Quantum World Association and has had the US flag flown on his honor at The Capitol, in Washington DC, USA. With already 14 Marathons \\u2013 and other crazy adventures on his legs \\u2013 he lives in Barcelona, Spain, with his wonderful wife, and his two loved kids.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 16, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-72-ramses-gallego&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKAST-Episode-72-Ramses-Gallego.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;50:43&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1626422406,&quot;key&quot;:&quot;0c9ad330f8cc82982e738ccffe25a0da&quot;},&quot;ppe-4514-334&quot;:{&quot;title&quot;:&quot;Episode 71: Sam Crowther&quot;,&quot;description&quot;:&quot;&lt;p class=\\&quot;p1\\&quot;&gt;Sam Crowther is the founder of Kasada, a cybersecurity company with a mission to restore trust in the Internet. Sam\\u2019s passion in the security industry began as a high school student when he worked with the team at Australia\\u2019s Signals Intelligence Agency. From there, he moved to a red team role at Macquarie Group, an experience that inspired him to start his own company.&lt;\\\/p&gt;\\n&lt;p class=\\&quot;p1\\&quot;&gt;With funding from leading U.S. and Australian investors, Crowther launched Kasada in 2015 to provide innovative application security to companies around the world. Based in New York and Sydney, Crowther loves creating simple technical solutions to complex problems and is motivated by challenging preconceived ideas and beliefs in order to have a positive impact on the world.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 7, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-71-sam-crowther&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKAST-71-Sam-Crowther.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;35:01&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1625681089,&quot;key&quot;:&quot;ce63271871e61ae3352137de57fc8e9e&quot;},&quot;ppe-4514-335&quot;:{&quot;title&quot;:&quot;Episode 70: Jenai Marinkovic&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;strong&gt;Jenai Marinkovic, vCTO\\\/CISO, Tiro Security; Technology &amp; Information Security Consultant, Beyond; member, ISACA Emerging Trends Working Group&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Jenai Marinkovic is a multidisciplinary technologist and strategist with 20 years of experience in architecting, building and securing systems at scale. She has designed and operated in real-time over the top streaming ecosystems that power live sports, gaming, and entertainment. She\\u2019s also worked in biomedical manufacturing and laboratory diagnostics, healthcare tech and robotics in agriculture.&lt;\\\/p&gt;\\n&lt;p&gt;Jenai\\u2019s worked with artificial intelligence, its impact on diversity and inclusion as well as improving human empathy towards machines. She has expertise in designing the next generation security experiences necessary to support digital transformation She has built and run design, architecture, innovation, engineering, security and operations teams. Her security expertise spans security architecture, engineering, defense, and forensics and invented a cyber defense framework for large scale breaches based on American football. Jenai has worked for large enterprise brands including DIRECTV, Electronic Arts, Beckman Coulter and international investigations firms such as Kroll.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;a href=\\&quot;https:\\\/\\\/www.isaca.org\\\/state-of-cybersecurity-2021\\&quot; target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;www.isaca.org\\\/state-of-cybersecurity-2021&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 28, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-70-jenai-marinkovic&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKast-Episode-70-Jenai-Marinkovic.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;59:46&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1624885748,&quot;key&quot;:&quot;ac9f2dd7c76a9fccefcbc764ab8cfeca&quot;},&quot;ppe-4514-336&quot;:{&quot;title&quot;:&quot;Episode 69: Rainer Runge&quot;,&quot;description&quot;:&quot;&lt;p&gt;Rainer has a long history in applications, data and enabling data driven decision amassed through years of experience in the data warehousing, business intelligence and information management. This has been at many levels, including strategy, project management, solution design, deployment, review and application support.&lt;\\\/p&gt;\\n&lt;p&gt;At Alex Solutions, Rainer brings this knowledge to the data management arena, leading the product direction to help organisations find, understand, share and take action on their data assets.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 7, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-69-rainer-runge&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKast-Episode-69-Rainer-Runge-Data-Security.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;33:55&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1623095420,&quot;key&quot;:&quot;05fe6779fdc05ae4eba3529e24471992&quot;},&quot;ppe-4514-337&quot;:{&quot;title&quot;:&quot;Episode 68: Kyla Guru&quot;,&quot;description&quot;:&quot;&lt;p&gt;Kyla is the founder and Chief Executive Officer of Bits N\\u2019 Bytes Cybersecurity Education, an NGO that sustains international partnerships with school districts, corporations including Facebook and IBM, and educational platforms like Discovery Education, all in efforts to increase awareness and fluency in privacy and cybersecurity.&lt;\\\/p&gt;\\n&lt;p&gt;Through these efforts, Kyla has worked with teams across Apple, Facebook, and Google, and gained experience working in Threat Intelligence Research, Cybersecurity\\\/Privacy Program Management, and Governance, Risk, and Compliance (GRC). Kyla has also obtained the CDPSE, Certified Data Privacy Solutions Engineer Certification, from ISACA.&lt;\\\/p&gt;\\n&lt;p&gt;Kyla has also had the privilege of sharing her passion on stages including TEDxChicago, NIST\\u2019s NICE K12 Conference, RSAC-US 2019, and RSA-APJ 2019 in Singapore. She strives to be an advocate for both cybersecurity education as well as the critical mobilization of Gen-Z youth. With this, Kyla is also the co-founder and co-director of GirlCon Chicago, Chicago\\u2019s premiere high-school tech conference that unites 300+ industry professionals and students annually to discuss bridging the gender-gap in tech.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 20, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-68-kyla-guru&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKast-Episode-68-Kyla-Guru.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;47:44&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1621531833,&quot;key&quot;:&quot;1a4707cbfa179a57bb8facc7ef197e55&quot;},&quot;ppe-4514-338&quot;:{&quot;title&quot;:&quot;Episode 67: Wallon Walusayi&quot;,&quot;description&quot;:&quot;&lt;p&gt;Serial Entrepreneur Wallon Walusayi is the Co-Founder &amp; CEO of 3Data Analytics, a 3D platform for Operations &amp; Security. 3Data Analytics provided the first commercially available cloud-based XR platform 3Data Cloud and is now working with Large Enterprise &amp; Aerospace\\\/Defense companies. Before becoming an entrepreneur, Wallon worked as a Data Analyst with Nike and in the Front office of the Milwaukee Brewers. His entrepreneurial journey began in 2015, founding one of the first 360 video live streaming companies and developing VR training simulators for RSA and Johnson Controls. In 2016 Wallon was NBC\\u2019s \\u201cSXSW featured entrepreneur\\u201d in 2017 he was named \\u201cTop 20 XR Person To Watch\\u201d and in 2018 named \\u201cSXSW Top 25 Startup\\u201d by Tech co.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 13, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-67-wallon-walusayi&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKast-Episode-67-Wallon-Walusayi.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;43:44&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1618313761,&quot;key&quot;:&quot;ba99ce2259cadd96d169178b328c2311&quot;},&quot;ppe-4514-339&quot;:{&quot;title&quot;:&quot;Episode 66: Neil Royle&quot;,&quot;description&quot;:&quot;&lt;p&gt;Neil is a Cyber Security Consultant at Kaspersky with over 20 years\\u2019 experience.\\u00a0 He delivers large complex technology programs within industrial, airports, aviation and buildings technology sectors across Australia, New Zealand, the UK, Europe and Middle East.\\u00a0 His passion for innovation and digital transformation has helped customers across the globe drive result oriented business transformation.\\u00a0\\u00a0Neil is \\u201cGlobal Industrial Cyber Security Professional\\u201d certified and is focused on helping businesses within the industrial sector across Australia and New Zealand to improve their overall cyber security posture and embrace Industry 4.0 Technologies.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 8, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-66-neil-royle&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKast-66-Neil-Royle.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;41:05&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1617892073,&quot;key&quot;:&quot;2c96239fb2cd503dffd95082e2d448a7&quot;},&quot;ppe-4514-340&quot;:{&quot;title&quot;:&quot;Episode 65: Blair Crawford&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;b&gt;&lt;span&gt;BLAIR CRAWFORD&lt;\\\/span&gt;&lt;\\\/b&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;b&gt;&lt;span&gt;Founder and\\u00a0&lt;\\\/span&gt;&lt;\\\/b&gt;&lt;b&gt;&lt;span&gt;Managing Director, Daltrey&lt;\\\/span&gt;&lt;\\\/b&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span&gt;Blair Crawford is a biometrics and identity management specialist with extensive experience\\u00a0&lt;\\\/span&gt;&lt;span&gt;helping\\u00a0&lt;\\\/span&gt;&lt;span&gt;global\\u00a0&lt;\\\/span&gt;&lt;span&gt;organisations&lt;\\\/span&gt;&lt;span&gt;\\u00a0solve their most pressing cyber security, risk and compliance challenges. Leveraging this wealth of experience, he recently established Daltrey \\u2013 a unique security solution that delivers biometrics as a service for workforce authentication, across all physical and digital access scenarios.&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span&gt;Throughout&lt;\\\/span&gt;&lt;span&gt;\\u00a0his time working with diverse international companies and federal government agencies, Blair witnessed key industry developments that now make it possible for\\u00a0&lt;\\\/span&gt;&lt;span&gt;organisations&lt;\\\/span&gt;&lt;span&gt;\\u00a0to integrate biometrics as a viable, scalable authentication method&lt;\\\/span&gt;&lt;span&gt;\\u00a0and a solution to increased cyber threats and physical security breaches.\\u00a0&lt;\\\/span&gt;&lt;span&gt;The\\u00a0&lt;\\\/span&gt;&lt;span&gt;socialisation&lt;\\\/span&gt;&lt;span&gt; of biometric technology with Apple Touch ID was a huge advancement, but it was just the start. A more critical development was the increased accountability of C-Suite executives for the control and protection of user and client data, as per GDPR and CPAA. Identity access management is now &lt;\\\/span&gt;&lt;span&gt;recognised&lt;\\\/span&gt;&lt;span&gt;\\u00a0as a core part of any\\u00a0&lt;\\\/span&gt;&lt;span&gt;organisation\\u2019s&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;span&gt;cyber security\\u00a0&lt;\\\/span&gt;&lt;span&gt;strategy, with severe implications in place for failing to do so. The final enabler for Daltrey was the\\u00a0&lt;\\\/span&gt;&lt;span&gt;standardisation\\u00a0of interface specifications. This created a pathway for Blair and his team to build a system that establishes a\\u00a0&lt;\\\/span&gt;&lt;span&gt;centralised&lt;\\\/span&gt;&lt;span&gt;, trusted biometric identity, capable of being integrated across all access scenarios in a cost-effective way.&lt;\\\/span&gt;&lt;span&gt;\\u00a0&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span&gt;Blair\\u00a0&lt;\\\/span&gt;&lt;span&gt;is an industry thought leader, regular guest speaker and the host of industry podcast,\\u00a0&lt;\\\/span&gt;&lt;a href=\\&quot;https:\\\/\\\/daltrey.com\\\/podcast\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;&lt;span&gt;IDentity Today&lt;\\\/span&gt;&lt;\\\/a&gt;&lt;span&gt;. He\\u00a0&lt;\\\/span&gt;&lt;span&gt;believes biometric technology is a convenient, powerful tool that can be used to create safer and more secure workplaces. He\\u2019s an firm advocate for self-sovereign identity and is driven to developing solutions that give users control over how their identity is used.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 25, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-65-blair-crawford&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKast-Episode-65-Blair-Crawford.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;50:53&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1616673445,&quot;key&quot;:&quot;e6e02857de4d6d679fa1a49b39b3734a&quot;},&quot;ppe-4514-341&quot;:{&quot;title&quot;:&quot;Episode 64: Rachael Greaves&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;span&gt;Rachael Greaves is a records and information management thought leader,\\u00a0&lt;\\\/span&gt;&lt;span&gt;who\\u00a0&lt;\\\/span&gt;&lt;span&gt;designed the Castlepoint command and control product. Rachael has consulted on large-scale records, security and audit projects in government and regulated industries with complex integrated environments, and developed Castlepoint in response to the tension seen in organisations between compliance, usability, sustainability and cost. Rachael is a Certified Information Professional (CIP), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Data Privacy Systems Engineer (CDPSE), and is certified in project, change, and records management. With a cultural anthropology and linguistics background, Rachael brings ethical, global and sustainable practices to the sector. Her innovative technology concept has transformed the compliance and risk management outcomes of multiple organisations, by automating the application of complex and multi-layered regulatory obligations to their data holdings. Rachael\\u2019s mission is to improve outcomes for citizens and stakeholders by helping governments and organisations to provide better, more accountable services.&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 12, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-64-rachael-greaves&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKast-Episode-64-Rachael-Greaves-.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;50:07&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1615555421,&quot;key&quot;:&quot;0d26452cb494bcda749ae225478fece3&quot;},&quot;ppe-4514-342&quot;:{&quot;title&quot;:&quot;Episode 63: Prof. Lisa Harvey-Smith&quot;,&quot;description&quot;:&quot;&lt;p&gt;&lt;a href=\\&quot;https:\\\/\\\/www.smh.com.au\\\/national\\\/lisa-harvey-smith-the-unorthodox-rise-of-a-top-australian-astronomer-20180509-p4ze6w.html\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Professor Lisa Harvey-Smith&lt;\\\/a&gt;\\u00a0is the Australian Government\\u2019s Women in STEM Ambassador and a Professor of Practice at the University of New South Wales. In her role as\\u00a0&lt;a href=\\&quot;https:\\\/\\\/womensagenda.com.au\\\/latest\\\/astrophysicist-lisa-harvey-smith-named-australias-first-women-in-stem-ambassador\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Women in STEM Ambassador&lt;\\\/a&gt;, Lisa is responsible for increasing the participation of women and girls in Science, Technology, Engineering and Mathematics (STEM) studies and careers across Australia.&lt;\\\/p&gt;\\n&lt;p&gt;She is an award-winning astrophysicist with\\u00a0&lt;a href=\\&quot;https:\\\/\\\/ui.adsabs.harvard.edu\\\/search\\\/filter_property_fq_property=AND&amp;filter_property_fq_property=property%3A%22refereed%22&amp;fq=%7B!type%3Daqp%20v%3D%24fq_property%7D&amp;fq_property=(property%3A%22refereed%22)&amp;q=harvey-smith%2C%20Lisa&amp;sort=date%20desc%2C%20bibcode%20desc&amp;p_=0\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;research interests&lt;\\\/a&gt;\\u00a0in the birth and death of stars and supermassive black holes. Lisa serves on the Australian Space Agency\\u2019s Advisory Group and previously worked on the\\u00a0&lt;a href=\\&quot;https:\\\/\\\/skatelescope.org\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Square Kilometre Array&lt;\\\/a&gt;\\u00a0\\u2013 a continent-spanning next-generation radio telescope that will survey billions of years of cosmic history. Lisa has written three popular science books:\\u00a0&lt;em&gt;When Galaxies Collide,&lt;\\\/em&gt;\\u00a0the children\\u2019s book\\u00a0&lt;em&gt;Under the Stars: Astrophysics for Bedtime\\u00a0&lt;\\\/em&gt;and&lt;em&gt;\\u00a0The Secret Life of Stars&lt;\\\/em&gt;.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 10, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-63-prof-lisa-harvey-smith&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKast-Episode-63-Prof-Lisa-Harvey-Smith-.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;01:01:06&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1615383938,&quot;key&quot;:&quot;49ea557b61840b849bce2954813434e3&quot;},&quot;ppe-4514-343&quot;:{&quot;title&quot;:&quot;Episode 62: Jo Stewart-Rattray&quot;,&quot;description&quot;:&quot;&lt;p&gt;Jo Stewart-Rattray CISM CGEIT CISA CRISC CP&lt;br \\\/&gt;\\nDirector, BRM Advisory&lt;br \\\/&gt;\\nISACA member&lt;\\\/p&gt;\\n&lt;p&gt;Adelaide business leader and information security veteran, Jo Stewart-Rattray, has been recognised for her tireless work educating and mentoring future generations of IT professionals and breaking down gender barriers in the IT industry, taking out Highly Commended in the Australian Women in Security Network\\u2019s 2020 Award of the Year.&lt;\\\/p&gt;\\n&lt;p&gt;For over 25 years Jo has championed gender equality in the security industry culminating in the establishment of SheLeadsTech, a program Jo pioneered with global professional association, ISACA, aimed at educating, mentoring and empowering women in tech. In under four years, SheLeadsTech has grown from a base of zero, to being embraced on five continents, and now is one of the core programs of ISACA\\u2019s newly launched One In Tech foundation. Over 10,000 community professionals have engaged in SheLeadsTech events and online platforms to promote gender equality, address the gender pay gap, enhance the careers of women in IT and offer a safe space to discuss their experiences.&lt;\\\/p&gt;\\n&lt;blockquote&gt;\\n&lt;p&gt;\\u201cEven as technology transforms the global economy at a staggering pace, we are still dealing with the gender bias that hampered our mothers and grandmothers,\\u201d said Stewart-Rattray. \\u201cA challenge this large and this persistent can feel overwhelming, but there are steps each of us can take to make meaningful progress. If we are resolute, the day will come when our classrooms, offices and board rooms are filled with empowered women and girls ready to make their mark on the technology workforce.\\u201cI am honoured to have received the Highly Commended Award amongst the amazing finalists for this year\\u2019s award. There is still much to do, and working together we can all help to break down these archaic barriers.\\u201d&lt;\\\/p&gt;\\n&lt;\\\/blockquote&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 8, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-62-jo-stewart-rattray&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKast-Episode-62-Jo-Stewart-Rattray-.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;45:29&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1615217903,&quot;key&quot;:&quot;7673f2c34aae8713829059e040b2c340&quot;},&quot;ppe-4514-344&quot;:{&quot;title&quot;:&quot;Episode 61: Kris Poria &amp; Jeff Penrose&quot;,&quot;description&quot;:&quot;&lt;p&gt;Kris has an extensive experience both running his own businesses as well as a successful corporate career across Asia, Europe, North America and then in Australia. Kris has started and run businesses successfully as well as cases of learnings from his adventures. He also has corporate career including internal transformations as well as leading customer engagements and sales for small to large multi-million dollar programs. He is ongoing early adopter for continuous personal productivity and learning \\u2013 MBA from Macquarie Graduate School of Management.&lt;br \\\/&gt;\\n&lt;strong&gt;&lt;a href=\\&quot;https:\\\/\\\/www.linkedin.com\\\/in\\\/krisporia\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;LinkedIn&lt;\\\/a&gt;&lt;\\\/strong&gt;&lt;\\\/p&gt;\\n&lt;p&gt;Jeff is an ICT domain specialist, with significant international business development, sales and delivery experience in the private and public sectors. He has held executive management and technical roles in both commercial and large government organisations. Jeff has extensive experience in defining and understanding business needs from clients and delivering creative outcomes. He is a detailed problem solver, with the ability to engage across a broad cross section of an organisation. Jeff is married with four adult children and an appetite for continuous learning of business and technology trends and issues \\u2013 Graduate Diploma on Executive Leadership.&lt;br \\\/&gt;\\n&lt;a href=\\&quot;https:\\\/\\\/www.linkedin.com\\\/in\\\/jeffpenrose\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;&lt;strong&gt;LinkedIn&lt;\\\/strong&gt;&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 26, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-61-kris-poria-jeff-penrose&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKast-Episode-61-EarlyBirds-.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;56:58&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1614346078,&quot;key&quot;:&quot;f0159931f8162e8e1d1748bca83d4bf8&quot;},&quot;ppe-4514-345&quot;:{&quot;title&quot;:&quot;Episode 60: Jason Duerden&quot;,&quot;description&quot;:&quot;&lt;p&gt;As Managing Director for BlackBerry\\u2019s Spark Division, Jason Duerden is responsible for building and executing the business in Australia and New Zealand (ANZ). In this region, he drives strategy, operations and growth of BlackBerry\\u2019s next-generation platform, BlackBerry Spark. Jason brings over 10 years of leadership and business management and technology acumen experience to BlackBerry with domain knowledge in the cyber arena.&lt;\\\/p&gt;\\n&lt;p&gt;Following the acquisition of Cylance in Feb 2019, the BlackBerry Spark platform is the realisation of BlackBerry\\u2019s successful pivot to AI software and cybersecurity leader, offering a new unified endpoint security (UES) layer which can work with BlackBerry\\u00ae unified endpoint management (UEM) to deliver zero trust security. Leveraging artificial intelligence, machine learning and automation, BlackBerry Spark offers improved cyberthreat prevention and remediation, and provides visibility across desktop, mobile, server, and IoT (including automotive) endpoints.&lt;\\\/p&gt;\\n&lt;p&gt;Jason leads a team that brings together sales and technical experts to deliver a unified platform and cyber services, offering a wide range of skills and expertise for the ANZ market to help navigate the demands of secure workplace mobility, business continuity and cyber threats to ensure operational resiliency. Prior to this, Jason was the Regional Director for BlackBerry Cylance responsible for building and leading the supply chain for BlackBerry Cylance in Australia and New Zealand. He was recognised as a CRN top Channel Chief in 2018.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 22, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-60-jason-duerden&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKast-Ep-60-Jason-Duerden.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;54:01&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1614036242,&quot;key&quot;:&quot;d17a27d122b832905ae671c0db55a734&quot;},&quot;ppe-4514-346&quot;:{&quot;title&quot;:&quot;Episode 59: Mandy Turner&quot;,&quot;description&quot;:&quot;&lt;p&gt;Mandy is a firm believer that diversity in all its forms should be encouraged to promote innovation and find solutions to challenges facing the world.&lt;\\\/p&gt;\\n&lt;p&gt;She herself has had a diverse career ranging from musician, artist, fraud investigator, risk assessor, trainer and analyst. She is currently the Manager of The University of Queensland Cyber Security Operation Centre, and prior to that was a Senior Cyber Crime Intelligence Analyst with the Australian Government.&lt;\\\/p&gt;\\n&lt;p&gt;She has held various roles in information security and investigations including security incident response, malware analysis, communications, and fraud investigator. With 20 years of specialist experience in the Australia Public Service, she has expertise in information security, cybercrime in emerging technologies, risk assessment, digital forensics, cybercrime analysis and fraud investigation.&lt;\\\/p&gt;\\n&lt;p&gt;In her own time, she volunteers at the Australian Information Security Association (AISA) as the Brisbane branch Executive Chair, is the co-founder and Australian Director of Cyber Century Mentoring, is a Justice of the Peace, and an Adjunct Lecturer in Criminology at The University of Queensland.&lt;\\\/p&gt;\\n&lt;p&gt;Mandy mentors students and those new to the infosec industry, speaks at conferences and events, has guest lectured at both The University of Queensland and Griffith University and writes about cybercrime and security awareness. She tweets as\\u00a0&lt;span class=\\&quot;atMention\\&quot; title=\\&quot;empressbat\\&quot;&gt;@empressbat and&lt;\\\/span&gt; plays MMORPG. Her drink of choice is coffee.&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 5, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-59-mandy-turner&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP59-KBKast-Amanda-Turner.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;36:07&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1612530310,&quot;key&quot;:&quot;bcc9d6e44b72cb12184d68e82765b151&quot;},&quot;ppe-4514-347&quot;:{&quot;title&quot;:&quot;Episode 58: Gus Clarke&quot;,&quot;description&quot;:&quot;&lt;p&gt;Gus began his security journey almost 20 years ago by hacking schools library system to remove fines and had against his name. After he realised he could compromise and manipulate computer systems he continued his journey, albeit illicitly. He was later recruited directly out of high school by the Special Investigating Unit, a government agency, and thus began his professional career. Since then he\\u2019s worked also directly for government, specifically heading up security for a Province. He\\u2019s headed up red teaming and R&amp;D for PwC South Africa. Since then he was Head of Security for Africa\\u2019s first digital bank, and lately he\\u2019s part of a team building an entirely new blockchain protocol focused on privacy.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 1, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-58-gus-clarke&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP58-KBKast-Gus-Clarke.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;36:07&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1612171783,&quot;key&quot;:&quot;36bd15edaccde667b3fc668a179023a9&quot;},&quot;ppe-4514-348&quot;:{&quot;title&quot;:&quot;Episode 57: Chris Pogue&quot;,&quot;description&quot;:&quot;&lt;p&gt;Chris Pogue is the Head of Nuix Partner Connect, the global ecosystem of more than 150 partners representing 74 different countries. He is also a member of the US Secret Service Electronic Crimes Task Force, The International Association of Chiefs of Police, and the International Association of Financial Crimes Investigators.&lt;\\\/p&gt;\\n&lt;p&gt;Over his 25-year career, Chris has led multiple professional security and services organizations to investigate data breaches, secure corporate computing assets and critical value data, implement wide-scale compliance regimes, and help executives and boards of directors both qualify and quantify security risks.&lt;\\\/p&gt;\\n&lt;p&gt;His extensive experience is drawn from careers as a cybercrimes investigator, ethical hacker, military officer, law enforcement and military instructor, university professor, business executive, and board advisor.&lt;\\\/p&gt;\\n&lt;p&gt;Chris served in the United States Army as a Signal Corps Warrant Officer, participating in multiple joint task force missions is support of Operation Enduring Freedom, and the Global War on Terror.\\u00a0 He distinguished himself as an Honor Graduate from a variety of Army Academies and Schools and received multiple awards and commendations for excellence.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 27, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-57-chris-pogue&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKast-EP57-Chris-Pogue.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;43:43&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1611785428,&quot;key&quot;:&quot;5c76589041aa54f4c29f4ec2c9783c55&quot;},&quot;ppe-4514-349&quot;:{&quot;title&quot;:&quot;Episode 56: Benjamin Andrew&quot;,&quot;description&quot;:&quot;&lt;p&gt;Ben has an extensive background in cloud security and enterprise software, with over twenty years in enterprise software; primarily in Security and Compliance.&lt;\\\/p&gt;\\n&lt;p&gt;Starting his technical career building data centers as a Microsoft Certified Systems Engineer, Ben then secured data centers for Fortune 500 customers at McAfee. Learning common security challenges from customers, Ben moved into product management and was responsible for the data center and virtualization security product strategy and roadmap before moving on to work with strategic alliances at Intel Security identifying partners, defining and executing partner strategy, and driving alternate routes to market.&lt;\\\/p&gt;\\n&lt;p&gt;Ben moved to AWS in 2015 to AWS Marketplace which helps customers find, buy, and immediately start using software and services that run on the AWS Cloud. He spent 5 years driving partner integration as worldwide leader of Security, Networking, Open Source and Operating System categories, engaging directly with software vendors, influencing their product strategy and delivering software in a new cloud model. First as an individual contributor, then managing a team helped to bring vendor products to AWS Marketplace drive customer adoption and revenue.&lt;\\\/p&gt;\\n&lt;p&gt;Benjamin Andrew is now a Principal Technical PM for AWS in Migration, Marketplace &amp; Control Services coordinating the phased delivery of a set of prescriptive Service Management Frameworks to simplify cloud adoption helping enterprises improve the management and governance of their cloud environments. Providing end-to-end deployable patterns that include interoperability between third-party offerings from AWS Marketplace and AWS management and governance services.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 15, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-56-benjamin-andrew&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP56-KBKast-Benjamin-Andrew.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;54:25&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1610726258,&quot;key&quot;:&quot;9ca1b69ec0f708a997eff2245674b075&quot;},&quot;ppe-4514-350&quot;:{&quot;title&quot;:&quot;Episode 55: Tulin Sevgin&quot;,&quot;description&quot;:&quot;&lt;p&gt;Director of Cybersecurity TPRM, UpGuard,\\u00a0Tulin is a strategic thinker and cyber risk management specialist with experience in public and private sectors. Tulin has held senior positions with Commonwealth Bank, Westpac, Optiver and Deloitte.&lt;\\\/p&gt;\\n&lt;p&gt;Amongst Tulin\\u2019s career she has successfully started up and led a cybersecurity practice at a boutique consultancy and is now leading the TPRM team at UpGuard growing the CyberRisk product and services.&lt;\\\/p&gt;\\n&lt;p&gt;Tulin specializes in cyber risk management including TPRM, cyber risk threat analysis, prevention,&lt;br \\\/&gt;\\ncontrol and assurance. Tulin\\u2019s past working experience spans enterprise risk management, business&lt;br \\\/&gt;\\ncontinuity, risk culture analysis, project management, issues management, IT audit, data analytics,&lt;br \\\/&gt;\\ninternal audit and external audit.&lt;br \\\/&gt;\\nTulin has worked across multiple projects from:&lt;\\\/p&gt;\\n&lt;ul&gt;\\n&lt;li&gt;Developing and implementing successful Third-Party Risk Management Frameworks&lt;\\\/li&gt;\\n&lt;li&gt;APRA Prudential Standard CPS234, GDPR, CCPA, NDB scheme readiness&lt;\\\/li&gt;\\n&lt;li&gt;Information Security Officer positions&lt;\\\/li&gt;\\n&lt;li&gt;Cyber Security Incident response exercises&lt;\\\/li&gt;\\n&lt;li&gt;Creating and exercising data breach response plans&lt;\\\/li&gt;\\n&lt;li&gt;Developing, managing and testing IT disaster recovery plans&lt;\\\/li&gt;\\n&lt;li&gt;Enhancing cyber risk frameworks for various clients&lt;\\\/li&gt;\\n&lt;li&gt;Facilitating cyber security awareness training&lt;\\\/li&gt;\\n&lt;li&gt;Post cyber incident reviews&lt;\\\/li&gt;\\n&lt;li&gt;Social engineering projects&lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 11, 2021&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-55-tulin-sevgin&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP55-KBKast-Tulin-Sevgin.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;48:10&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1610380695,&quot;key&quot;:&quot;48159859f9c4450012a399a38d33d145&quot;},&quot;ppe-4514-351&quot;:{&quot;title&quot;:&quot;Episode 54: Dave Maunsell&quot;,&quot;description&quot;:&quot;&lt;p&gt;Dave is an accomplished executive with a strong affinity for technology and keen business sense for the application of emerging solutions. He has a proven talent for identifying core business needs and translating into outcomes.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to joining Haventec Dave spent ~20 years at Accenture where he occupied a number of geographic leadership, account leadership and delivery leadership roles including Managing Director for Accenture Digital (AU and NZ), Inclusion and Diversity Lead (AU), Capital Markets Lead (AU) as well as Client Leadership roles for a number of Accenture\\u2019s Financial Services clients.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to joining Accenture Dave spent five years at the Australian Stock exchange in a number of roles including the Internet and Information Security Lead.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 29, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-54-dave-maunsell&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKast-Ep54-Dave-Maunsell.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;32:31&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1609269341,&quot;key&quot;:&quot;2360d711696db01909e06ebcf7c74d8e&quot;},&quot;ppe-4514-352&quot;:{&quot;title&quot;:&quot;Episode 53: Ben Johnson&quot;,&quot;description&quot;:&quot;&lt;p&gt;Ben Johnson is CTO and co-founder of Obsidian Security. Prior to founding Obsidian, he co-founded Carbon Black and most recently served as the company\\u2019s Chief Security Strategist. As the company\\u2019s original CTO, he led efforts to create the powerful capabilities that helped define the next-generation endpoint security space.&lt;\\\/p&gt;\\n&lt;p&gt;Prior to Carbon Black, Ben was an NSA computer scientist, and later worked as a cyber engineer in an advanced intrusion operations division for the intelligence community.&lt;\\\/p&gt;\\n&lt;p&gt;Ben is active in the cybersecurity community, where he is a technical advisor to the US FISA Court and sits on the boards of multiple security startups. Ben earned a bachelor\\u2019s degree in computer science from the University of Chicago and a master\\u2019s degree in computer science from Johns Hopkins University. He lives in Newport Beach, CA with his wife and three sons.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 17, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-53-ben-johnson&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP53-KBKast-Ben-Johnson.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;46:31&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1608214125,&quot;key&quot;:&quot;fbc87c4143f2b50884b5dcc2b1068a40&quot;},&quot;ppe-4514-353&quot;:{&quot;title&quot;:&quot;Episode 52: Kavika Singhal&quot;,&quot;description&quot;:&quot;&lt;p&gt;My passion for cyber-security stems from my interest in mystery novels and crime shows since the age of 8. Somehow, I enjoyed the process of unravelling the unidentified. Being an ardent leaner, I explored my interest in computer science and being a consistent school topper, I was fortunate enough to secure the Vice-Chancellor scholarship at Western Sydney University. As an addition to my degree, I am working as research assistant with a Cyber-security Professor in WSU; assisting in her research in Ethical Hacking and Payment Fraud.&lt;\\\/p&gt;\\n&lt;p&gt;Outside my degree, I work as a volunteer for several institutions and non-profit organisations. To spread awareness about internet security and safety among elders, I undertook the role of a key speaker in the Digital Literacy Program for Senior Citizens at the Indian Support Center; a contribution to the senior citizens. I am recently selected for Microsoft Student Accelerator Program (MSA) to coordinate as Marketing Lead for my University (WSU); was successful in getting more than 1500 registrations for the program and currently head MSA\\u2019s Social Media team.&lt;\\\/p&gt;\\n&lt;p&gt;Cyber-security is expected to continue to boom in future and become a necessity for every company. As a student, it\\u2019s my duty to raise cyber awareness among the common kin and understand each aspect of security As an entrant in Cyber-security, I am overwhelmed by the plethora of opportunities in Cyber-security hence, I grab every chance to interact with veterans in the field.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 9, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-52-kavika-singhal&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP52-Kavika-mixdown.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;30:58&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1607512540,&quot;key&quot;:&quot;98ce902c73b77cd2238f88fdafbcc6fd&quot;},&quot;ppe-4514-354&quot;:{&quot;title&quot;:&quot;Episode 51: Todd Hubers&quot;,&quot;description&quot;:&quot;&lt;p&gt;Todd is a 33-year-old entrepreneur who started computer programming when he was 7 years of age. He earned a scholarship in 2004, and graduated with honours in 2006. He started an onsite computer repair business, to pay for fuel during University, and has since had a slew of start-ups that have been successful.&lt;\\\/p&gt;\\n&lt;p&gt;Todd is currently focused on a new cybersecurity business called Dull. With new technology, Dull helps customers and vendors build new solutions together more rapidly. The technology will ultimately be built-out as a unifying platform for enterprises.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 4, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-51-todd-hubers&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP51-KBKAST-Todd-Hubers.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;31:26&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1607061714,&quot;key&quot;:&quot;1bea397620390b1efa3f3f7733932fb1&quot;},&quot;ppe-4514-355&quot;:{&quot;title&quot;:&quot;Episode 50: Garrett O\\u2019Hara&quot;,&quot;description&quot;:&quot;&lt;p&gt;Garrett O\\u2019Hara is the Principal Technical Consultant at Mimecast having joined in 2015 with the opening of the Sydney office, leading the growth and development of the local team. With over 20 years of experience across development, UI\\\/UX, technology communication, training development and mentoring, Garrett now works to help organisations understand and manage their cyber resilience strategies and is a regular industry commentator on the cyber security landscape, data assurance approaches and business continuity.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 26, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-50-garrett-ohara&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP51-KBKAST-Gar-Ohara.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;51:36&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1606355138,&quot;key&quot;:&quot;3ce08565be829986d80ccfc9b50a707f&quot;},&quot;ppe-4514-356&quot;:{&quot;title&quot;:&quot;Episode 49: Sam Crowther&quot;,&quot;description&quot;:&quot;&lt;p&gt;Sam is a young technology enthusiast who\\u2019s found passion in cybersecurity at an early age. He was recruited to work for the Australian government while still in high school. He founded Kasada before turning 20 and has been able to raise USD 7 million at the end of 2019 with CIA backed In-Q-Tel as its latest investor. Kasada provides a solution that helps organisations protect from user account takeovers, fraud, data scraping and other disruptive attacks.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 18, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-49-sam-crowther&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKBAST-Ep-49-Sam-Crowther.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;43:19&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1605696466,&quot;key&quot;:&quot;bcd6738e2008c0aac45554820a39a0fa&quot;},&quot;ppe-4514-357&quot;:{&quot;title&quot;:&quot;Episode 48: Adam de Jong&quot;,&quot;description&quot;:&quot;&lt;p&gt;Adam is an high-energy leader, military veteran, and business executive with practical leadership experience working in diverse and complex environments. As CEO of CyAmast, an Australian founded technology company \\u2013 specialising in IoT network security solutions, he is steering the company through a dramatic and successful scale-up period.&lt;\\\/p&gt;\\n&lt;p&gt;Their technology sits at the intersection of Machine Learning, Artificial Intelligence, and Software Defined Networking and is game changer in the way organisations can get visibility over their connected devices, and the defence against the pervasive threat of cyberattacks.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 10, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-48-adam-de-jong&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP48-Adam-de-Jong.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;26:38&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1604982815,&quot;key&quot;:&quot;613fcc28983de96631c3f4ede3bb31a5&quot;},&quot;ppe-4514-358&quot;:{&quot;title&quot;:&quot;Episode 47: Jacqueline Jayne&quot;,&quot;description&quot;:&quot;&lt;p&gt;Jacqueline Jayne (JJ) currently serves as Security Awareness Advocate for the APAC region for KnowBe4, the world\\u2019s most popular security awareness and simulated phishing platform. With over 20 years\\u2019 experience as a conduit between people and technology, she has mastered the art of communication and influence. Previously, she led a successful cybersecurity education and awareness program that changed behaviour and culture, aimed at helping users make better cybersecurity decisions. Cybersecurity is everyone\\u2019s responsibility, and there is a gap in how to go about engaging hearts and minds across an entire organisation, regardless of its size. Her insights on the human condition and how to engage at all levels in this space are invaluable as many people struggle to understand the cyberthreat landscape and equally, tech people struggle to understand engage the people to create change. Humans are innately curious which in this climate causes major issues.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 26, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-47-jacqueline-jayne&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP47-KBKast-Jacqueline-Jayne.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;48:18&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1603714522,&quot;key&quot;:&quot;467cebe622ba0e053157cf4d2dddd016&quot;},&quot;ppe-4514-359&quot;:{&quot;title&quot;:&quot;Episode 46: Mark Luckin&quot;,&quot;description&quot;:&quot;&lt;p&gt;Mark works for Lockton Companies Australia, the worlds largest privately owned insurance brokerage and risk advisor.&lt;\\\/p&gt;\\n&lt;p&gt;Mark is the Head of Lockton\\u2019s Australian Cyber &amp; Technology Practice, and works with the Global Cyber and Technology team advising clients on the insurable nature of their associated cyber, privacy and technology risks. His experience encompasses advising small business to ASX top 200 companies, across a diverse range of industries.&lt;\\\/p&gt;\\n&lt;p&gt;Mark is a regular contributor to the Cyber Insurance area through both the regular publication of White Papers and appearance on panels on the topic. Mark compliments this area additionally advising clients on their Directors and Officers Liability, IT Liability, Professional Indemnity, Crime and Statutory Liability Insurance risks.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 21, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-46-mark-luckin&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP46-Mark-Luckin.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;26:10&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1603306477,&quot;key&quot;:&quot;35c7b56c2ad02db0e062b1cb674eec6c&quot;},&quot;ppe-4514-360&quot;:{&quot;title&quot;:&quot;Episode 45: Mike Thompson&quot;,&quot;description&quot;:&quot;&lt;p&gt;Mike Thompson is the CTO and Co-founder of HackHunter. HackHunter protects organisations by detecting and tracking malicious WiFi and WiFi-operated drones. Mike is an IoT expert with an extensive background in Information and Cyber Security.&lt;\\\/p&gt;\\n&lt;p&gt;Amongst Mike\\u2019s many roles, he has:&lt;\\\/p&gt;\\n&lt;ul&gt;\\n&lt;li&gt;Worked as a CISO for an Insurance Company&lt;\\\/li&gt;\\n&lt;li&gt;Consulted to over 50 organisations, including Telstra, NAB and the Privacy Commission&lt;\\\/li&gt;\\n&lt;li&gt;Uncovered computer fraud&lt;\\\/li&gt;\\n&lt;li&gt;Legally hacked organisations&lt;\\\/li&gt;\\n&lt;li&gt;Designed and developed international award-winning software solutions&lt;\\\/li&gt;\\n&lt;li&gt;Provided investigation and advisory services at the highest levels in government across topics as diverse as biometrics and satellite surveillance systems.&lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&lt;p&gt;Mike is a smart home and 3D printing fanatic with a passion for unlocking the potential of IoT to make our lives richer, safer and sustainable. After the successful exit of his previous business, Mike combined his skills and experience in IoT and cyber security to start the HackHunter journey.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 12, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-45-mike-thompson&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/Ep45-KBkast-Mike-Thompson.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;43:03&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1602544347,&quot;key&quot;:&quot;d8999546a8ba224a140bcc2e5ceed762&quot;},&quot;ppe-4514-361&quot;:{&quot;title&quot;:&quot;Episode 44: Dr. Alana Maurushat&quot;,&quot;description&quot;:&quot;&lt;p&gt;Dr. Alana Maurushat is Professor of Cybersecurity and Behaviour at Western Sydney University where she holds a joint position in the School of Computer Science &amp; Mathematics, and in the School of Social Sciences and Criminology, and is Key Researcher with the CRC Smart Satellites. She is currently researching on Payment Diversion Fraud and Ransomware, Tracking Money-Laundering through Bitcoin Blenders, distributed extreme edge computing for micro-clustered satellites, and Ethical Hacking. She previously was Senior Lecturer in Law, Key Researcher on the CRC Data to Decisions \\u2013 Big Data in National Security, and Senior Fellow with the Australian CyberSecurity Centre for Research and Education all at UNSW. She is the Cyber-Ambassador for the NSW Cybersecurity Network. She is on the Board of Directors for the cybercrime investigation company IFW Global. She lectures &amp; researches in Cybersecurity, Privacy and Security by Design, Cyber Risk Management, and Artificial Intelligence across the disciplines of law, criminology, business, political science and information communications technology. Alana has done consultancy work on cyber security, open data, big data, technology and civil liberties for both the Australian and Canadian governments, industry and NGOs. Alana has done media with 60 Minutes, the New York Time, Insight, ABC, and 730 Report, and is the author of many books and articles.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;October 2, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-44-dr-alana-maurushat&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP44-AlanaMaurushat-KBKAST.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;52:43&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1601643485,&quot;key&quot;:&quot;e998af15ef5bbcee7b24eda269ba571f&quot;},&quot;ppe-4514-362&quot;:{&quot;title&quot;:&quot;Episode 43: Dan Graves&quot;,&quot;description&quot;:&quot;&lt;p&gt;Daniel Graves is currently Chief Technology Officer at Delphix, responsible for strategy technology partnerships including AWS, GCP, IBM, Oracle, SAP and Microsoft. Graves is a software and cloud industry veteran of over 20 years with a diverse background in other functions including technology partnerships, business development, marketing, CTO, sales management, program management, presales, and as a developer.&lt;\\\/p&gt;\\n&lt;p&gt;At Delphix Graves assists with defining the overall partner and alliance strategy, and hiring and managing the team of business development, channel sales, and technical partner development staff. Previously at Delphix, Daniel built the Product organization from the ground up, including Product Management, Product Marketing, Program Management, and Delphix Labs. Prior to Delphix, Graves served as Cloud CTO at Symantec, leading technical and product strategy for the Cloud.&lt;\\\/p&gt;\\n&lt;p&gt;Over his career, he has led product groups at a variety of leading technology firms including NeXT \\\/ Apple, Sun Microsystems, NetDynamics, and Rockwell International\\u2019s AI labs. Graves has a Masters in Computer Engineering from Stanford University.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 18, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-43-dan-graves&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP43-KBKAST-Dan-Graves.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;44:17&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1600435837,&quot;key&quot;:&quot;8af404a7f373a73664b18fd7ee5eb44b&quot;},&quot;ppe-4514-363&quot;:{&quot;title&quot;:&quot;Episode 42: Alice Almeida&quot;,&quot;description&quot;:&quot;&lt;p&gt;\\u2022 Experienced Researcher \\u2013 20 years experience holding senior positions in research at Channel Nine, Seven Network, News Corp and Fairfax Media.&lt;br \\\/&gt;\\n\\u2022 Held representative roles on the IAB Research and Measurement Councils, working on major industry projects.&lt;br \\\/&gt;\\n\\u2022 Developed multiple market-first research pieces throughout my career; notably the Online Video Research and Mobile Internet Research, the first conducted&lt;br \\\/&gt;\\nin Australia, and research around Amazon entering the Australian market in 2017 which was picked up by major Australian publishers.&lt;br \\\/&gt;\\n\\u2022 Presented my research and insight projects at over 60 conferences within APAC.&lt;br \\\/&gt;\\n\\u2022 Strong knowledge of how research works; from understanding my client\\u2019s objectives, designing questionnaires to achieve complete results and interpreting&lt;br \\\/&gt;\\nthose results into actionable insights.&lt;br \\\/&gt;\\n\\u2022 A very strong profile with an excellent reputation within the industry as being passionate, knowledgeable and an industry expert.&lt;br \\\/&gt;\\n\\u2022 Continuously invited to participate on panels, be interviewed on podcasts, write opinion and thought leadership pieces and to present at conferences.&lt;br \\\/&gt;\\nHighlight was being invited to participate in a panel discussion at SXSW in Austin, Texas and to provide evidence and insights at the senate inquiry into Public&lt;br \\\/&gt;\\nInterest Journalism in 2017.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 10, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-42-alice-almeida&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKast-EP42-Alice-Almeida.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;45:18&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1599750958,&quot;key&quot;:&quot;2e2050d7d1cb6fe8bc6f755fcb9f78c4&quot;},&quot;ppe-4514-364&quot;:{&quot;title&quot;:&quot;Episode 41: Elias Manousos&quot;,&quot;description&quot;:&quot;&lt;p&gt;Co-Founder and Chief Executive Officer, RiskIQ, Elias Manousos is a security technology expert and experienced executive with over 20 years of delivering enterprise security solutions. Prior to co-founding RiskIQ, Elias was VP of R&amp;D at Securant Technologies (acquired by RSA), an Internet leader in authorization and single sign-on (SSO).&lt;\\\/p&gt;\\n&lt;p&gt;At Securant, he was instrumental in pioneering the now commonplace technologies providing increased browser security. Elias bootstrapped RiskIQ from zero to 100 employees and more than 100 customers in just 5 years. Today eight of the 10 largest financial institutions in the U.S. and five of the nine leading Internet companies in the world rely on RiskIQ to protect their websites, mobile apps and customers from malware and fraud.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 4, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-41-elias-manousos&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKast-EP41-Lou-Manousos.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;34:29&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1599220372,&quot;key&quot;:&quot;3cc0ec5e402c49e7b1a98d7f6190873f&quot;},&quot;ppe-4514-365&quot;:{&quot;title&quot;:&quot;Episode 40: Nithin Thomas&quot;,&quot;description&quot;:&quot;&lt;p&gt;Nithin has scaled and led SQR Systems to design and deliver critical secure communications solutions for defence, national security and financial services on a global scale. His patented encryption technology is used in heavily regulated sectors.&lt;\\\/p&gt;\\n&lt;p&gt;He is an active contributor and thought leader in some of the world\\u2019s leading information security research and development communities and his contributions are featured in many high profile publications. He has been actively promoting simplicity in security and the need to consider user experience as a core part of security development.&lt;\\\/p&gt;\\n&lt;p&gt;Over the past 3 years, Nithin has established several research and commercial programmes in government, private sector and academia exploring emerging technologies to protect privacy from the threat of quantum computing.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;August 26, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-40-nithin-thomas&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP40-KBKast-Nithin-Thomas.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;41:27&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1598449381,&quot;key&quot;:&quot;2f98237865ab6ce5797f0ace58cb98dd&quot;},&quot;ppe-4514-366&quot;:{&quot;title&quot;:&quot;Episode 39: Rinske Geerlings&quot;,&quot;description&quot;:&quot;&lt;p&gt;Rinske was awarded Risk Consultant of the Year by RMIA (2017), Outstanding Security Consultant Finalist in the OSPAs (2019) and BPW Business Woman of the Year (2010-2013). She is an internationally leading consultant, speaker and certified Business Continuity Planning (BCP), Information Security &amp; Risk Management trainer. Her firm, Business As Usual (BAU), since 2006, has worked with SMEs as well as prestigious clients such as 14 Central Banks and 100s of other public and private organisations worldwide. She draws on more than 20 years\\u2019 experience gained across Australasia, Africa, South America and Europe.&lt;\\\/p&gt;\\n&lt;p&gt;Rinske has been changing the way organisations \\u2018plan for the unexpected\\u2019. Her powerful facilitation skills enable organisations to prioritise, cut through information quickly and simplify their processes. She applies a fresh, energetic, fun, practical, easy-to-apply, innovative approach to BCP, Security, Risk and Disaster Recovery\\u2026 topics often perceived as dull and cumbersome.&lt;\\\/p&gt;\\n&lt;p&gt;Her alter ego includes being lead singer and manager of SophieG, which is involved in major music projects \\u2013 including those contributing to the global charity Playing For Change, which provides music education to children in disadvantaged regions.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;August 19, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-39-rinske-geerlings&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP39-Rinske-Geerlings-KBKast.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;50:20&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1597862868,&quot;key&quot;:&quot;a1c0e0687ec718087b5c744df13207b8&quot;},&quot;ppe-4514-367&quot;:{&quot;title&quot;:&quot;Episode 38: Tanya Janca&quot;,&quot;description&quot;:&quot;&lt;p&gt;Tanya Janca, also known as \\u2018SheHacksPurple\\u2019, is the founder, security trainer and coach of SheHacksPurple.dev, specialising in software and cloud security. Her obsession with securing software runs deep, from starting her company, to running her own OWASP chapter for 4 years in Ottawa, co-founding a new OWASP chapter in Victoria, and co-founding the OWASP DevSlop open-source and education project.&lt;\\\/p&gt;\\n&lt;p&gt;With her countless blog articles, workshops and talks, her focus is clear. Tanya is also an advocate for diversity and inclusion, co-founding the international women\\u2019s organisation WoSEC, starting the online #CyberMentoringMonday initiative, and personally mentoring, advocating for and enabling countless other women in her field. As a professional computer geek of 20+ years, she is a person who is truly fascinated by the \\u2018science\\u2019 of computer science.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 23, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-38-tanya-janca&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP38-Tanya-Janca-KBKast.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;56:09&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1595520845,&quot;key&quot;:&quot;a066b5b31401a1d1a06df2a413b729d1&quot;},&quot;ppe-4514-368&quot;:{&quot;title&quot;:&quot;Episode 37: Chris Sant&quot;,&quot;description&quot;:&quot;&lt;p&gt;Christopher Sant is a Cyber Security leader who has been helping secure Australian organisations for the last 15 years. He has held various roles across Penetration testing, Privacy Compliance, Consulting, Security Operations, Risk Management and most recently focusing on Cyber Culture and Awareness. He is very passionate about using clear and simple messaging to make Cyber easily accessible to everyone, and describes his secret ninja skill as being able to cut through technical jargon to explain complex terms in ways that everyone can understand.&lt;\\\/p&gt;\\n&lt;p&gt;Chris has recently created a startup, ClearView Cyber Services, where he helps clients to build strong cyber cultures and get engagement at ALL levels of the organisation. His company\\u2019s focus is to strengthen businesses\\u2019 greatest asset in their Cyber defence; their people.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 15, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-37-chris-sant&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP37-KBKast-Chris-Sant.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:49&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1594832252,&quot;key&quot;:&quot;c9527f5aa42fc5b9fb474d279a4668be&quot;},&quot;ppe-4514-369&quot;:{&quot;title&quot;:&quot;Episode 36: Clint Marsden&quot;,&quot;description&quot;:&quot;&lt;p&gt;Clint started his career in Microsoft level 1 support at the age of 16 in 2003. Since that time he has held helpdesk &amp; server administrator roles with the past 7 years focusing on Cyber Security, Digital Forensics and Incident Response. He believes in continuing education, sharing knowledge with peers and providing mentoring to people interested in starting out in Cyber\\\\, or pursuing goals within their existing Cyber career.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 9, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-36-clint-marsden&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP36-CMarsden-mixdown.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:22&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1594306882,&quot;key&quot;:&quot;7c5e10d1e3613e70ef607f0e88952086&quot;},&quot;ppe-4514-370&quot;:{&quot;title&quot;:&quot;Episode 35: David Chou&quot;,&quot;description&quot;:&quot;&lt;p&gt;David Chou is the SVP, Chief Information Officer for a fully integrated healthcare system in the United States. Previously, Chou advised many different Fortune 500 technology solution companies while also serving as the CIO for an international life science company with 50+ sites throughout Australia, Singapore, and China. Chou has held executive roles with the Cleveland Clinic Abu Dhabi, Children\\u2019s Mercy Hospital, University Of Mississippi Medical Center, AHMC Healthcare, and Prime Healthcare.&lt;\\\/p&gt;\\n&lt;p&gt;David is a dynamic keynote speaker and industry commentator working with clients to transform their business models using technology. He has spoken around the world at healthcare tech-related conference including keynotes for leading industry events and intimate executive settings. Chou is also one of the most mentioned CIOs in the media and well quoted in outlets such as the Wall Street Journal, Modern Healthcare, HIMSS Media, ZDNet, &lt;a href=\\&quot;https:\\\/\\\/cio.com\\\/\\&quot; target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;CIO.com&lt;\\\/a&gt;, Huffington Post, and Becker\\u2019s Healthcare. David is an active member of both ACHE and HIMSS while serving on the board for CHIM.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 1, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-35-david-chou&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP35-David-Chou-KBKast.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;37:22&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1593605617,&quot;key&quot;:&quot;ff8d4e6f2f648c3a5401b42407ae3f67&quot;},&quot;ppe-4514-371&quot;:{&quot;title&quot;:&quot;Episode 34: Lee Kagan&quot;,&quot;description&quot;:&quot;&lt;p&gt;Based in Toronto, Canada, Lee has been in the information security space since 2010. Working and consulting in various industries from financial, manufacturing, national services and government, Lee currently works as:&lt;\\\/p&gt;\\n&lt;p&gt;\\u00b7 Director, Adversarial Collaboration with Lares&lt;\\\/p&gt;\\n&lt;p&gt;\\u00b7 Co-founder of RedBlack Security \\u2013 Toronto-based offensive security testing shop&lt;\\\/p&gt;\\n&lt;p&gt;Lee also is involved with initiatives such as:&lt;\\\/p&gt;\\n&lt;p&gt;\\u00b7 Co-founder of the Canadian Collegiate Cyber Exercise (C3X) \\u2013\\u00a0&lt;a href=\\&quot;https:\\\/\\\/thec3x.com\\\/\\&quot; target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;thec3x.com&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&lt;p&gt;\\u00b7 Organizer of DerbyCon Communities Toronto Chapter (DerbyComTOR)&lt;\\\/p&gt;\\n&lt;p&gt;\\u00b7 Instructor for the Offensive Insights for Security Professionals (OISP) training program (launching Q1 2020)&lt;\\\/p&gt;\\n&lt;p&gt;Lees area of expertise is tailored primarily around Microsoft technologies and the abuses for them. Lee is also a Command and Control (C2) designer and infrastructure maintainer for offensive teams.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 25, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-34-lee-kagan&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP34-Lee-Kagan.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;39:05&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1593107586,&quot;key&quot;:&quot;faf81f7b77db33f507261c388f29c69e&quot;},&quot;ppe-4514-372&quot;:{&quot;title&quot;:&quot;Episode 33: Jen Willmer&quot;,&quot;description&quot;:&quot;&lt;p&gt;Jen has extensive experience and expertise in Corporate and Commercial Law, and Cyber Security and IT, with a background in Dispute Resolution and Litigation.&lt;\\\/p&gt;\\n&lt;p&gt;From a corporate and commercial perspective, Jen has worked on numerous transactions, ranging from restructures to large complex multi-million dollar cross-border M&amp;A deals. She works with businesses at all sizes, ranging from small family-owned businesses and private companies to ASX-listed companies. Jen also assists with all legal aspects of running a business, from structuring, capital raising, to daily operations, directors\\u2019 duties, risk management, corporate governance, and compliance with regulatory requirements.&lt;\\\/p&gt;\\n&lt;p&gt;In terms of cyber security, Jen assists companies to prepare for data breaches by drafting data breach response plans and pre-drafted notification statements, and guiding them through the relevant steps to comply with their legal obligations and manage their crisis communication to regulators, counterparties, customers and other stakeholders.\\u00a0 Jen also works with companies to draft relevant cyber security and privacy contracts, drafting policies, and advising on compliance requirements.&lt;\\\/p&gt;\\n&lt;p&gt;Jen regularly works with cyber security companies to assist them with establishing their own business, drafting terms and conditions and contracts with their clients, and managing their own risk and potential liability in providing their security products and services to clients.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 10, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-33-jen-willmer&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP33-Jen-Willmer-KBKast.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;31:39&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1591813745,&quot;key&quot;:&quot;070b496028c91959a1a4b8286281b27e&quot;},&quot;ppe-4514-373&quot;:{&quot;title&quot;:&quot;Episode 32: Mitchell Parker&quot;,&quot;description&quot;:&quot;&lt;p&gt;Mitchell Parker, CISSP, is the Executive Director of Information Security and Compliance at IU Health. Mitch has done a significant amount of work in researching the effects of cloud and distributed computing, network-based threats, compliance, and privacy and security requirements on connected health devices. Mitch works collaboratively with a number of EMR and biomedical equipment vendors to improve their security postures and provide a better quality of service. He currently resides in Carmel, IN, with his wife, two children, and two cats.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;June 4, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-32-mitchell-parker&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP32-MitchParker-mixdown.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;36:15&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1591274554,&quot;key&quot;:&quot;f4225ef06b409de56d35b59d306aed3e&quot;},&quot;ppe-4514-374&quot;:{&quot;title&quot;:&quot;Episode 31: Rafael Chiang&quot;,&quot;description&quot;:&quot;&lt;p&gt;Rafael Chiang is a skilled information security strategic leader, having worked in the information security industry for a variety of multinational and global organisations, for more than 20 years\\u2019. Dedicated to supporting and sustaining business growth through brand and value protection, Rafael\\u2019s specialty is communicating and collaborating at all organisational levels, creating tailored security cultures and experiences. Aside from spending time with his family, Rafael\\u2019s interests are learning and communication methods, meditation, neuroscience and psychosensory therapies.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 22, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-31-rafael-chiang&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP31-RafaelChiang-mixdown.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;52:33&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1590163138,&quot;key&quot;:&quot;f747c9535a65384a379fdc0b2b90ac4e&quot;},&quot;ppe-4514-375&quot;:{&quot;title&quot;:&quot;Episode 30: Greg van der Gaast&quot;,&quot;description&quot;:&quot;&lt;p&gt;Starting as a teenage hacker in the 1990\\u2019s, having been involved in the largest mass hack of the time and setting off an international incident after hacking into a nuclear weapons facility, Greg has over two decades of technical, management, and leadership experience in Information Security.&lt;\\\/p&gt;\\n&lt;p&gt;A frequent speaker about bringing leadership, visibility, care, and accountability to the Information Security field and breaking out of today\\u2019s reactive status quo, he is an expert in building efficient and effective InfoSec organisations by harnessing human potential and addressing the often cultural root causes within management, IT, and InfoSec itself.&lt;\\\/p&gt;\\n&lt;p&gt;He is currently the Head of Information Security at the University of Salford, a freelance security strategy advisor, guest lecturer, mentor, author, and creator of the UoS Information Security Leadership Programme.&lt;\\\/p&gt;\\n&lt;p&gt;As for the book, \\u2018&lt;em&gt;Rethinking InfoSec&lt;\\\/em&gt;\\u2018 the review:&lt;\\\/p&gt;\\n&lt;p&gt;\\u201cIf you are ready to make a fundamental change to the way you operate, that will save you money yet allow you to achieve so much more, this book is a must read!\\u201d&lt;\\\/p&gt;\\n&lt;p&gt;&lt;a target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;-cybersecurity-professionals.com&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 20, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-30-greg-van-der-gaast&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP30-GregVDG-mixdown.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;01:05:07&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1589988127,&quot;key&quot;:&quot;95be97d2b57f21a7e1dedb7fff105536&quot;},&quot;ppe-4514-376&quot;:{&quot;title&quot;:&quot;Episode 29: Melissa Wingard&quot;,&quot;description&quot;:&quot;&lt;p&gt;Melissa Wingard is a senior commercial technology lawyer, with almost 15 years\\u2019 experience, assisting software, cybersecurity, and technology companies, across the Asia Pacific region, grow their business and meet strategic aims, whilst managing risk and regulatory compliance.&lt;\\\/p&gt;\\n&lt;p&gt;Melissa works as Special Counsel for Phillips Ormonde Fitzpatrick, a specialist IP firm. She has extensive experience in relation to commercialising intellectual property, information security, data protection and privacy across APAC. She holds an LLB (Hons), BA (Hist &amp; Eng), Grad Dip Applied Finance &amp; Investment and is presently studying a Masters of CyberSecurity Operations&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 14, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-29-melissa-wingard&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP29-MelissaWingard-mixdown.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;38:54&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1589479604,&quot;key&quot;:&quot;689b6f56c4d1c5e90143a1a0469b35b5&quot;},&quot;ppe-4514-377&quot;:{&quot;title&quot;:&quot;Episode 28: Matt Flannery&quot;,&quot;description&quot;:&quot;&lt;p&gt;Matthew is the founder of Ayenem (&lt;a href=\\&quot;https:\\\/\\\/www.ayenem.com.au\\\/\\&quot; target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;www.ayenem.com.au&lt;\\\/a&gt;), a DevSecOps consultancy and founder of DevSecOps Sydney meet up.&lt;\\\/p&gt;\\n&lt;p&gt;Matt gets a kick out of rapidly becoming an expert in new and emerging technologies and pushing past the limits. It might be the joy of winning or just seeing people\\u2019s face go oohhh that\\u2019s impressive that drives him but, either way he gets results quickly and enjoys mentoring and up-skilling others along the way.&lt;\\\/p&gt;\\n&lt;p&gt;Matt most recently comes from a background at Deloitte where he built out Defensive and Offensive Cloud Security and Security Automation tooling for the DevOps practice, quickly becoming a leader in the DevSecOps \\\/ DevOps space where he then went on to build a software engineering powerhouse for a Network Security company. He has delivered robust software delivery pipelines with security automation for FSI, FinTech and large Enterprise companies and is passionate about Security automation and moving away from traditional penetration testing towards an Agile Security Testing and Continuous Security methodology.&lt;\\\/p&gt;\\n&lt;p&gt;He has presented live technical demonstrations and talks on a range of topics such as AWS Security, Docker Security, Serverless Security, DevSecOps and Kubernetes at different Industry events and conferences.&lt;\\\/p&gt;\\n&lt;p&gt;Matt\\u2019s core technical skills lie within Cloud Architecture across the big 3 (AWS, Azure, GCP), Platform Development &amp; Engineering, Automation, Container Orchestration, DevOps, Information Security and is presently working with companies to introduce DevSecOps and embrace Continuous Security.&lt;\\\/p&gt;\\n&lt;p&gt;If you have questions for Matt or just want to chat DevSecOps look out for the next DevSecOps Sydney (&lt;a href=\\&quot;https:\\\/\\\/www.meetup.com\\\/en-AU\\\/DevSecOps-Sydney\\\/\\&quot; target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;https:\\\/\\\/www.meetup.com\\\/en-AU\\\/DevSecOps-Sydney\\\/&lt;\\\/a&gt;) meetup.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 11, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-28-matt-flannery&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP28-KBKast-Matt-Flannery.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;35:55&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1589226138,&quot;key&quot;:&quot;1e9f0aab5d762e24eb001a1a704c1cf7&quot;},&quot;ppe-4514-378&quot;:{&quot;title&quot;:&quot;Episode 27: Laura Lees&quot;,&quot;description&quot;:&quot;&lt;p&gt;Laura was appointed the Head of Information Security role in April 2019 for a large Financial Services organisation that is head quartered in Sydney. She is responsible for Information Security strategy execution. security reviews, assessments, testing and control assurance, detailed design, security architecture and project review in the APAC region. Laura and her team work with the rest of the Information Security team to ensure effective security controls across the APAC region as well as globally.&lt;\\\/p&gt;\\n&lt;p&gt;Laura has over 20 years experience in the technology, security and risk management industries with a focus on financial services. Her roles have included senior security roles at one of Australia\\u2019s big 4 banking institutions and Australia\\\/NZ\\u2019s largest general insurer. Outside of the Link Group Laura is well regarded in the security industry having performed many volunteer roles including the current treasurer of the Sydney Chapter for ISACA, a long term member of the AISA Sydney Branch Committee, and a foundational member of the Sydney Chapter committee for the FAIR institute.&lt;\\\/p&gt;\\n&lt;p&gt;Laura is also a member of the security workstream for the IOTAA. Laura holds an MBA from MGSM and a Bachelor of Science majoring in Computer Science from Macquarie University along with industry certifications such as CISSP, CISM and SABSA. Laura has been nominated for a number of industry awards including being the 2019 recipient of the Jo Stewart-Rattray award for Women in Leadership from ISACA International.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 5, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-27-laura-lees&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP27-LauraLees-mixdown.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;34:29&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1588704794,&quot;key&quot;:&quot;c64776bef45d8eaf5530ed4a94b05375&quot;},&quot;ppe-4514-379&quot;:{&quot;title&quot;:&quot;Episode 26: Tony Vizza&quot;,&quot;description&quot;:&quot;&lt;p&gt;Tony Vizza has been involved in the information technology and information security fields for more than 25 years.&lt;\\\/p&gt;\\n&lt;p&gt;Tony completed a Bachelor of Science in Computing Science from the University of Technology, Sydney, Global Executive MBA from the University of Sydney which included study at Stanford University, The London School of Economics and the Indian Institute of Management, Bangalore. He is currently studying for a Juris Doctor degree at the University of New South Wales.&lt;\\\/p&gt;\\n&lt;p&gt;His information security credentials include CISSP (Certified Information Systems Security Professional), CCSP (Certified Cloud Security Professional), CRISC (Certified in Risk and Information Systems Controls), CISM (Certified Information Security Manager) and he is a certified ISO\\\/IEC 27001 Senior Lead Auditor.&lt;\\\/p&gt;\\n&lt;p&gt;Tony is a member of the board of directors for the Australian Information Security Association (AISA), Cyber Security Ambassador for the NSW Government, a member of the Cybersecurity Industry Advisory Committee for the NSW Government, a member of the Technology and Business Services Industry Skills Reference Group for NSW TAFE, a member of the Data Security Standards Committee for Blockchain Australia and has provided expert services to the Australian Government\\u2019s Australian Prudential Regulation Authority (APRA), the Law Society of NSW, the Australian Security Industry Association Limited (ASIAL) as well as numerous boards.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 27, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-26-tony-vizza&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP26-Tony-Vizza.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;26:17&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1587994937,&quot;key&quot;:&quot;5cf86a9e42bdc21741a5ba6fe99cf311&quot;},&quot;ppe-4514-380&quot;:{&quot;title&quot;:&quot;Episode 25: Cat Coode&quot;,&quot;description&quot;:&quot;&lt;p&gt;Cat Coode is the founder of Binary Tattoo. Binary, for the language of all things digital. Tattoo, for the permanence of what goes online. Her mission is to help you safeguard your data and protect your digital identity. Backed by two decades of experience in mobile development and software architecture, as well as a certification in data privacy law, Cat helps corporations and individuals better understand cybersecurity and data privacy. She specializes in guiding companies through end-to-end Global Privacy Regulation compliance and delivering privacy education seminars.&lt;\\\/p&gt;\\n&lt;p&gt;Cat is an engineer, speaker, consultant, author, and, above all else, a parent. Her motivation to help others was born out of her concern for her kids and our ever-changing digital landscape.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 20, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-25-cat-coode&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/EP25-Cat-BinaryTattoo-mixdown.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;33:45&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1587408273,&quot;key&quot;:&quot;90b0a4a755ce2fc3a1b34b2d9a3e7fc3&quot;},&quot;ppe-4514-381&quot;:{&quot;title&quot;:&quot;Episode 24: Paul Heaton&quot;,&quot;description&quot;:&quot;&lt;p&gt;As an innovative and results-driven senior IT professional with 20 years in the field, Paul has gained extensive cross-industry experience in senior management roles within global teams across the Asia Pacific, multinational organisations, and Australian Government, including Telstra, IBM, Westpac, CBA, Qantas, and both Federal and State Government agencies.&lt;\\\/p&gt;\\n&lt;p&gt;Paul has a proven track record of managing and leading multi-million dollar restructure and development programs and projects, including the installation and management of enterprise and industry-scale technologies and services.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 15, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-24-paul-heaton&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/PAUL-CYNTERA-mixdown.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;30:27&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1586973614,&quot;key&quot;:&quot;bef58694e499b75a0dcf788a6eec7eb2&quot;},&quot;ppe-4514-382&quot;:{&quot;title&quot;:&quot;Episode 23: Ross McNaughton&quot;,&quot;description&quot;:&quot;&lt;p&gt;Ross is a seasoned Chief Information Security Officer (CISO) &amp; Cyber Security professional. He provides the strategic framework and direction in Cyber Security &amp; Technology Risk, providing robust security protection and management assurance. Ross has over 19 years of specialized experience dedicated to leading financial institutions in security policy design, cyber security implementation and security transformation for large financial institutions.&lt;\\\/p&gt;\\n&lt;p&gt;In his previous role at Gulf International Bank, Ross was brought in to modernise and transform the group Information &amp; Cyber Security function for the organisation across multiple international locations, as well as their retail online digital bank, meem. Ross has worked in over 12 countries accelerating cybersecurity adoption and modernisation programmes and speaks two languages. An industry Influencer, he has worked with more than 30 companies and 15 banks. He is consistently sought as one of the most influential CISO\\u2019s, throughout his industry and in thought leadership circles. His accreditations include CISSP, CISA, CISM, CRISC and many more. He has been a guest speaker in Cyber Security at Glasgow University in the UK and also contributes to panels and conferences around the world, as well as runs private closed door peer forums for CISO\\u2019s in the middle east.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 31, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-23-ross-mcnaughton&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/Ross-McNaughton.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;46:54&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1585665904,&quot;key&quot;:&quot;6d0dc2084dec0d4760c5df31ab7ac1b7&quot;},&quot;ppe-4514-383&quot;:{&quot;title&quot;:&quot;Episode 22: Martin McGregor&quot;,&quot;description&quot;:&quot;&lt;p&gt;Martin has twenty years of experience as an innovator at the leading edge of technology. A deep technical understanding of the security and privacy implications of storing sensitive customer information allows him to help guard against the security vulnerabilities and risks any modern organisation might face.&lt;\\\/p&gt;\\n&lt;p&gt;Through his customer-centric approach, Martin helps businesses innovate to improve the performance and security of his clients. Devicie (formally Secure Measure at time of recording) has recently become both a Cyrise and AustCyber supported company.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 26, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-22-martin-mcgregor&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/22-Martin-McGregor.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;30:47&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1585257585,&quot;key&quot;:&quot;1836c22facd51f7914203439214b5335&quot;},&quot;ppe-4514-384&quot;:{&quot;title&quot;:&quot;Episode 21: Bastien Treptel&quot;,&quot;description&quot;:&quot;&lt;p&gt;Bastien is the co-founder of CTRL Group \\u2013 Australia\\u2019s progressive information security firm, protecting businesses from cyber risk. CTRL Group offer best in class security solutions ranging from audits, hacking, monitoring, advisory and education.&lt;\\\/p&gt;\\n&lt;p&gt;With operations in Singapore, Thailand and Australia, CTRL Group are on a mission to safeguard organisations from brand and reputational damage, as well as increasing public awareness about the importance of cybersecurity to their financial and personal well-being. Bastien is dedicated to inspiring everyone to appreciate security as it starts to become an essential part of our lives as we move into a hyper digitised world.&lt;\\\/p&gt;\\n&lt;p&gt;Bastien has developed a progressive security methodology to enable CTRL Group clients to achieve a respectable level of cyber maturity, effectively helping them mitigate critical risks posed to their stakeholders and shareholders.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 18, 2020&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-21-bastien-treptel&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/Bastien-Treptel-KBKAST.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;27:27&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1584558150,&quot;key&quot;:&quot;e4e64ba7f9b5a2b585361e9bea074376&quot;},&quot;ppe-4514-385&quot;:{&quot;title&quot;:&quot;Episode 20: Thomas Mynott&quot;,&quot;description&quot;:&quot;&lt;p&gt;At 19 years old I left my small country town to join the Army. I began my military career in Canberra being trained as a military manager and soldier. 2 years later I found myself in East-Timor managing a team of 34 maintenance and transportation staff and supporting the military operations for the 500+ strong Australian Defence Force contingent in the country. As a 22-year-old at the time, I felt that this was a normal experience and thought that any 22 years old would be able to do what I was doing, of course I know now that is not really the case. However, In my context, the Army was willing to give me all the responsibility and trust to do the job, and I loved it.&lt;\\\/p&gt;\\n&lt;p&gt;I continued in the Army for another 6 years, had so many more incredible experiences and learnt so many skills. I even completed a Masters in Business during my final years. Then finally one day, like so many others in the Army, I decided I had achieved everything I wanted to achieve and decided to transition out of the military in my next career. The biggest problem I now faced was, I didn\\u2019t know what I wanted to do next.&lt;\\\/p&gt;\\n&lt;p&gt;Once leaving Defence I landed in Recruiting and found that I was good at it, though I struggled to get the same level of satisfaction and purpose from my new role as I did in the military. That is when I decided to join the WithYouWithMe team, because here was a business with the ambitious goal of solving military veteran underemployment. At that time I joined it was only Tom Moore, our co-founder and CEO, a marketing intern and myself working out of a living room. Since then we have helped over 1000 veteran gain new jobs, have been awarded the Priminister\\u2019s Veteran Award, been named the second-fastest growing Tech company in Australia for 2018 and have now opened up and Office in the US to help American Veterans.&lt;\\\/p&gt;\\n&lt;p&gt;Nowadays, I am the Head of Sales for Australia and am still just as passionate and dedicated to our mission, which is to solve underemployment for all people in Australia. My key role is to connecting growing and transforming the business to our veterans and non-veterans, who are being trained and deployed into high-demand and high-growth careers such as Cybersecurity.&lt;\\\/p&gt;\\n&lt;p&gt;I just recently turned 30, am married to my beautiful and very supportive wife, Anne, and have a son called Archie who, at the time of writing this, is 7 weeks old, and next to me sleeping soundly.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 1, 2019&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-20-thomas-mynott&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/Thomas-Mynott-mixdown.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;42:49&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1572626808,&quot;key&quot;:&quot;a97927f235eb2be732a3c577ece20adb&quot;},&quot;ppe-4514-386&quot;:{&quot;title&quot;:&quot;Episode 19: Casey Ellis&quot;,&quot;description&quot;:&quot;&lt;div style=\\&quot;text-align:justify\\&quot;&gt;Casey is the Founder, Chairman, and CTO of Bugcrowd. He is an 18 year veteran of information security, servicing clients ranging from startups to multinational corporations as a pen tester, security and risk consultant and solutions architect, then most recently as a career entrepreneur.&lt;\\\/div&gt;\\n&lt;div style=\\&quot;text-align:justify\\&quot;&gt;&lt;\\\/div&gt;\\n&lt;div style=\\&quot;text-align:justify\\&quot;&gt;Casey pioneered the Crowdsourced Security as a Service model launching the first bug bounty programs on the Bugcrowd platform in 2012, and co-founded the &lt;a href=\\&quot;https:\\\/\\\/disclose.io\\\/\\&quot; target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;https:\\\/\\\/disclose.io&lt;\\\/a&gt; vulnerability disclosure standardization project in 2016.&lt;\\\/div&gt;\\n&lt;div style=\\&quot;text-align:justify\\&quot;&gt;&lt;\\\/div&gt;\\n&lt;div style=\\&quot;text-align:justify\\&quot;&gt;A proud ex-pat of Sydney Australia, Casey lives with his wife and two kids in the San Francisco Bay Area. He is happy as long as he\\u2019s in the passionate pursuit of potential.&lt;\\\/div&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 26, 2019&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-19-casey-ellis&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKAST-Casey-Ellis-mixdown.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;35:22&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1569511507,&quot;key&quot;:&quot;18e84e3b3ec3ea47077773c0e807796f&quot;},&quot;ppe-4514-387&quot;:{&quot;title&quot;:&quot;Episode 18: Phil Zongo&quot;,&quot;description&quot;:&quot;&lt;div style=\\&quot;text-align:justify\\&quot;&gt;Phil Zongo is the author of The Five Anchors of Cyber Resilience, an Amazon best-selling book that strips away the complexity of cyber security and provides practical guidance to business executives.&lt;\\\/div&gt;\\n&lt;div style=\\&quot;text-align:justify\\&quot;&gt;&lt;\\\/div&gt;\\n&lt;div&gt;&lt;\\\/div&gt;\\n&lt;div style=\\&quot;text-align:justify\\&quot;&gt;In 2017, Phil was invited to Chicago, USA, where he was honoured with ISACA\\u2019s International Best Book \\\/ Article Award for his paper, The Automation Conundrum. This is one of ISACA\\u2019s highest global honours that recognises individuals who have made major contributions to publications in the field of IS audit, control and\\\/or security. He has received several other awards in recognition for his thought leadership.&lt;\\\/div&gt;\\n&lt;div style=\\&quot;text-align:justify\\&quot;&gt;&lt;\\\/div&gt;\\n&lt;div&gt;&lt;\\\/div&gt;\\n&lt;div style=\\&quot;text-align:justify\\&quot;&gt;Phil is a Director and Co-Founder of the Cyber Leadership Institute, an organisation that develops the next generation of cyber leaders. Phil is a voice in demand for several stratgic matters, such as cyber resilience, machine learning, blockchain, cloud computing, etc and has keynoted several high profile conferences.&lt;\\\/div&gt;\\n&lt;div style=\\&quot;text-align:justify\\&quot;&gt;&lt;\\\/div&gt;\\n&lt;div&gt;&lt;\\\/div&gt;\\n&lt;div style=\\&quot;text-align:justify\\&quot;&gt;Over the last 15 years, Zongo has advised numerous business leaders on how to manage critical risks within complex transformation programs as well as rapidly build cost effective and high-impact cyber resilience programs.&lt;\\\/div&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 17, 2019&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-18-phil-zongo&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/Phil-Z-RELEASE.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;45:39&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1568731258,&quot;key&quot;:&quot;2a8f6138656786abd71ad2918e96325c&quot;},&quot;ppe-4514-388&quot;:{&quot;title&quot;:&quot;Episode 17: Nathan Clarke&quot;,&quot;description&quot;:&quot;&lt;p style=\\&quot;font-weight:400;text-align:justify\\&quot;&gt;Nathan enlisted in the Army in 1996 and worked in many different roles supporting the various information systems supporting ADF operations. Late in his career he served in the ADFCIRT and decided then that cyber security was going to be the mainstay of his post-military career.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400;text-align:justify\\&quot;&gt;Since Leaving the defence force Nathan has raised two SOCs, one dedicated to defence, another for multiple commercial tenants where he is now, at Verizon. Nathan\\u2019s focus in his cyber security career is on incident response, leadership, and detection development. He publicly speaks on various topics related to SOCs.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;August 28, 2019&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-17-nathan-clarke&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/Nathan-Clarke-mixdown.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;30:17&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1567029003,&quot;key&quot;:&quot;2e4def2705bf04254c1a166564f50ffc&quot;},&quot;ppe-4514-389&quot;:{&quot;title&quot;:&quot;Episode 16: Dan Holman &amp; Eric Flis&quot;,&quot;description&quot;:&quot;&lt;p style=\\&quot;font-weight:400;text-align:justify\\&quot;&gt;Dan Holman is the CEO and Eric Flis the COO of WorldStack; the leading Australian Open Source Intelligence (OSINT) company.&lt;\\\/p&gt;\\n&lt;p&gt;They founded WorldStack to create the tools that enhance the decision-making of their clients with actionable intelligence. This is fuelled by freely available, but hard to filter data that sits on the open web, deep, and dark web, and WorldStack\\u2019s solutions provide the tools to turn that data into genuine insight.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 11, 2019&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-16-dan-holman-eric-flis&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/WorldStack-mixdown.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;29:10&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1562864822,&quot;key&quot;:&quot;f3cf4a0e9a1eaa07477824a727623142&quot;},&quot;ppe-4514-390&quot;:{&quot;title&quot;:&quot;Episode 15: Nicole Stephensen&quot;,&quot;description&quot;:&quot;&lt;p style=\\&quot;text-align:justify\\&quot;&gt;Nicole Stephensen is a Privacy Specialist with extensive local and international experience in operational and strategic privacy matters. She is Principal Consultant at &lt;a href=\\&quot;https:\\\/\\\/www.groundupprivacy.com.au\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Ground Up Consulting&lt;\\\/a&gt;, a boutique firm she established in 2011.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;text-align:justify\\&quot;&gt;Nicole is also the Executive Director for Privacy and Data Protection at the &lt;a href=\\&quot;https:\\\/\\\/iotsecurityinstitute.com\\\/iotsec\\\/index.php\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;Internet of Things Security Institute&lt;\\\/a&gt;, where she is co-author of the IoTSI Security Framework for Smart Cities and Critical Infrastructure and hosts a bi-weekly podcast,&lt;a href=\\&quot;https:\\\/\\\/podcasts.apple.com\\\/au\\\/podcast\\\/privacy-matters-with-nicole-stephensen\\\/id1451572716\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;&lt;em&gt; \\u2018Privacy Matters&lt;\\\/em&gt;&lt;\\\/a&gt;\\u2018.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;text-align:justify\\&quot;&gt;With nearly 20 years in the privacy profession, Nicole believes in building organisational capacity around privacy and embedding best practice into organisational culture. In her private practice, she assists government, private and not for profit sectors to unlock the strategic value of privacy and enhance community trust. She also helps to find, unpack and address privacy risk, via formal Privacy Impact Assessments and more collaborative on-site reviews of policies, processes and \\u2018on the ground\\u2019 handling of personal information. In consultation with her clients, she develops and delivers bespoke training for staff and executive levels.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;July 2, 2019&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-15-nicole-stephensen&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/Nicole-Stephensen-KBKAST.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;28:40&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1562095736,&quot;key&quot;:&quot;65f508378a1837fda3adb86652ce67a2&quot;},&quot;ppe-4514-391&quot;:{&quot;title&quot;:&quot;Episode 14: Shannon Sedgwick&quot;,&quot;description&quot;:&quot;&lt;p style=\\&quot;font-weight:400;text-align:justify\\&quot;&gt;Shannon provides future-focused leadership to government and private enterprise executives and boards to maximise the benefits of implementing new technologies, align that implementation with their strategic intent, and future-proof their organisations against cyber threats. After spending nearly a decade working across the world consulting on technology, cyber security, and risk management, Shannon has unique and unparalleled insight into what makes an organisation successful and resilient.&lt;\\\/p&gt;\\n&lt;p style=\\&quot;font-weight:400;text-align:justify\\&quot;&gt;Shannon has landed coverage in print and broadcast outlets around the world, including the Today Show, Seven News, Sky News, ITV, KBPS, ABC, 60 Minutes, 2GB, and Sunday Night. His articles have been featured in the Asia Pacific Security Magazine, AFR, The Australian,\\u00a0news.com.au, and university journals.&lt;\\\/p&gt;\\n&lt;h4&gt;SHOW NOTES&lt;\\\/h4&gt;\\n&lt;p&gt;&lt;a href=\\&quot;https:\\\/\\\/youtu.be\\\/9B8PHOL3CxU\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;ISIS Drone Footage&lt;\\\/a&gt;&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;May 7, 2019&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-14-shannon-sedgwick&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/Shannon-S-mixdown2.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;46:30&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1557266072,&quot;key&quot;:&quot;d6c8738b4b18d55ab02da0c5ffdf7c92&quot;},&quot;ppe-4514-392&quot;:{&quot;title&quot;:&quot;Episode 13: Dr. Lydia Kostopoulos&quot;,&quot;description&quot;:&quot;&lt;p&gt;Dr. Lydia Kostopoulos\\u2019 work is at the intersection of people, strategy, technology, education, and national security. She addressed the United Nations member states on the military effects panel at the Convention of Certain Weapons Group of Governmental Experts (GGE) meeting on Lethal Autonomous Weapons Systems (LAWS). Formerly the Director for Strategic Engagement at the College of Information and Cyberspace at the National Defense University, a Principal Consultant for PA and higher education professor teaching national security at several universities, her professional experience spans three continents, several countries, and multi-cultural environments.&lt;\\\/p&gt;\\n&lt;p&gt;She speaks and writes on disruptive technology convergence, innovation, tech ethics, and national security. She lectures at the National Defense University, Joint Special Operations University, is a member of the IEEE-USA AI Policy Committee, participates in NATO\\u2019s Science for Peace and Security Program, and during the Obama administration has received the U.S. Presidential Volunteer Service Award for her pro bono work in cybersecurity. In efforts to raise awareness on AI and ethics she is working on a reflectional art series [#ArtAboutAI], and a game about emerging technology and ethics called\\u00a0&lt;a href=\\&quot;https:\\\/\\\/www.sapien2-0.com\\\/\\&quot; target=\\&quot;_blank\\&quot; rel=\\&quot;noreferrer noopener\\&quot;&gt;Sapien2.0&lt;\\\/a&gt;.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 11, 2019&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/dr-lydia-kostopoulos&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/Lydia-Kostopoulos-mixdown.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;39:22&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1555008494,&quot;key&quot;:&quot;1fabc15c9b5aac189b8721cea52b3220&quot;},&quot;ppe-4514-393&quot;:{&quot;title&quot;:&quot;Episode 12: Greg van der Gaast&quot;,&quot;description&quot;:&quot;&lt;p&gt;Greg is a 20+ year cyber veteran. Veteran may be an accurate term considering he\\u2019s been at war with the way the sector has worked for much of that time. From teenage hacker to covert government operator, to architect, manager, and head of security, he\\u2019s never accepted anything without understanding how the pieces fit together, without asking \\u201cwhy?\\u201d&lt;\\\/p&gt;\\n&lt;p&gt;The answers led him to realisations about the true root causes of issues and the fact that not only are they not even on most people\\u2019s radar, but that many of the industry\\u2019s solutions and approaches are counterproductive, requiring a new approach he\\u2019s been perfecting over the last decade. He\\u2019s on a mission to pull InfoSec away from dealing with symptoms and to start addressing the true origins of problems, dramatically boosting assurance while slashing costs and complexity.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 25, 2019&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/greg-van-der-gaast&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKast-Greg-van-der-Gaast.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;38:06&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1553542953,&quot;key&quot;:&quot;ce2422c5a02cd93d29b4913a583b0d83&quot;},&quot;ppe-4514-394&quot;:{&quot;title&quot;:&quot;Episode 11: Dr Rebecca Wynn&quot;,&quot;description&quot;:&quot;&lt;p&gt;Named 2017 Cybersecurity Professional of the Year \\u2013 Cybersecurity Excellence Awards, Chief Privacy Officer (CPO) SC Magazine, Global Privacy and Security by Design (GPSbyDesign) International Council Member, and finalist Women in Technology Business Role Model of the Year 2018; Dr. Rebecca Wynn is lauded as a \\u201cgame-changer who is ten steps ahead in developing and enforcing cybersecurity and privacy best practices and policies.\\u201d She is a \\u201cbig picture\\u201d thinker who brings nearly 20 years of experience in Information Security, Assurance &amp; Technology.&lt;\\\/p&gt;\\n&lt;p&gt;Recently, Rebecca led the information security, privacy, and compliance pre-acquisition, acquisition and post-acquisition of LearnVest, Inc. to Northwestern Mutual Life Insurance Company \\u2013 a Fortune 100 company. She is well known for being a gifted polymath, having deep understanding of current cyber security challenges and privacy issues. She has a proven track record of taking companies to the next level of excellence in many sectors including government, financial services, fintech, healthcare, information technology, legal, semiconductors, and retail.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;March 12, 2019&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/dr-rebecca-wynn&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/Rebecca-Wynn-mixdown.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;43:14&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1552424189,&quot;key&quot;:&quot;d0a4054aa4ffdd52bb79d82a17ae4150&quot;},&quot;ppe-4514-395&quot;:{&quot;title&quot;:&quot;Episode 10: Jasun Tate&quot;,&quot;description&quot;:&quot;&lt;p&gt;Jasun Tate is a career Cyber Intelligence professional with over 21 years experience in the US Intelligence and Cyber Operations Community. Having worked in some of the most critical and sensitive operations for the US Government at Home and Abroad his unique perspective on the reality of the Cyber threat is unique in and of itself. After serving with the US Navy, National Geospatial-Intelligence Agency and Army Research Laboratories Jasun left the classified field of operations and traded it in for distinguished positions with a few Fortune 100 companies as the Public Sector Business Information Security Officer for the largest Data Broker and Credit Agency in the world Experian.&lt;\\\/p&gt;\\n&lt;p&gt;After seeing the disparity between the Cyber Intelligence capabilities in contrast to the security capabilities of the world today he started a unique and agile boutique firm named &lt;a href=\\&quot;https:\\\/\\\/bitsdigits.news\\\/\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;bits&amp;digits&lt;\\\/a&gt;. Initially developed as a Cyber Solutions and Development consulting firm, it has since matured into one of the worlds most bespoken Crisis Mitigation and Information Awareness outfits today.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 11, 2019&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-10-jasun-tate&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/Jasun-Tate-mixdown.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;38:23&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1549919188,&quot;key&quot;:&quot;2f3c19122de1502ae0e68783ec83df78&quot;},&quot;ppe-4514-396&quot;:{&quot;title&quot;:&quot;Episode 9: Andrew Bycroft&quot;,&quot;description&quot;:&quot;&lt;p&gt;After 18 years of working in cybersecurity he realised most of the solutions being implemented were falling short. With four years of extensive research, he found the real reason why cybercrime was so prevalent was mostly due to a lack of knowledge at the CEO and Director level.&lt;\\\/p&gt;\\n&lt;p&gt;In 2018, Andrew co-founded the International Cyber Resilience Institute, with the goal of educating CEOs and Directors about cybercrime. The company now offers advice to executives around the globe covering cybersecurity, including risk mitigation and how to properly handle a security breach.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;February 6, 2019&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-9-andrew-bycroft&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/Andrew-Bycroft.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;24:38&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1549451520,&quot;key&quot;:&quot;5f673c01826e7d6474144c567a40a733&quot;},&quot;ppe-4514-397&quot;:{&quot;title&quot;:&quot;Episode 8: Scott Fletcher&quot;,&quot;description&quot;:&quot;&lt;p&gt;Scott Fletcher is a Solutions Architect and Security Researcher at RedShield Security. Scott\\u2019s background includes Penetration Testing, Software Development, and Security Consulting. Previously he was Principal Consultant at Aura Information Security and worked for a number of enterprise and financial services organisations.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;January 29, 2019&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-8-scott-fletcher&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/Scott-F-mixdown-FIN-Mono.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;31:02&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1548785422,&quot;key&quot;:&quot;5372a53d10e19165c84f9d125c734b77&quot;},&quot;ppe-4514-398&quot;:{&quot;title&quot;:&quot;Episode 7: Jenny Radcliffe&quot;,&quot;description&quot;:&quot;&lt;p&gt;Jenny speaks, consults and trains people in the skills of \\u2018people hacking\\u2019 and explains how \\u201cSocial Engineering\\u201d using psychological methods can be a huge threat to organisations of all sizes. She reveals how that same knowledge is a valuable tool for security professionals of all types in the prevention of these attacks, scams and cons of all kinds.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;December 14, 2018&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-7-jenny-radcliffe&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKAST-Episode-7-Jenny-Radcliffe.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:24&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1544808256,&quot;key&quot;:&quot;4c151872f289cfb1c51bb2a1e9c5ec9f&quot;},&quot;ppe-4514-399&quot;:{&quot;title&quot;:&quot;Episode 6: Eric Flis&quot;,&quot;description&quot;:&quot;&lt;p&gt;Eric Flis is the Co-Founder and COO of Worldstack, an Open Source Intelligence (OSINT) company that has created solutions to distil insights from the oceans of data that surround our modern existence. With a background in security, counter-terrorism, and policing, Eric has experiences firmly rooted in the physical world, not just the virtual. This pragmatic experience has fuelled an equally practical approach to new digital intelligence methods.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 22, 2018&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-6-eric-flis&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/Ep6-Eric-Flis.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;31:03&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1542930624,&quot;key&quot;:&quot;c60e30d68c9aa5caeb886f08f8ebfe9c&quot;},&quot;ppe-4514-400&quot;:{&quot;title&quot;:&quot;Episode 5: Steve McLaughlin&quot;,&quot;description&quot;:&quot;&lt;p&gt;Steve McLaughlin is a security specialist based in Sydney, Australia. His record as a subject matter expert, particularly in the realm of pentesting, supports his growing and successful presence online.&lt;\\\/p&gt;\\n&lt;p&gt;Steve and his company, Core Sentinel, provide detailed security technical assessments in a digestible and actionable manner to their clients, and led by Steve\\u2019s dedicated approach to continual education, are always evolving.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;November 21, 2018&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-5-steve-mclaughlin&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/Steve-M-FINAL.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;40:32&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1542843391,&quot;key&quot;:&quot;eb6added2c7a129a05491af7c8e65a5e&quot;},&quot;ppe-4514-401&quot;:{&quot;title&quot;:&quot;Episode 4: Gabriel Gomez&quot;,&quot;description&quot;:&quot;&lt;p&gt;Gabriel Gomez II is an IT Professional with a demonstrated record of achievement at overseeing all facets of the project life-cycle. Outstanding communication skills with the ability to build strong working relationships and to communicate with technical and non-technical audiences at all levels of the organisation. Gabriel is dedicated to life-long learning, and has a passion for building high performing teams.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;September 25, 2018&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-4-gabriel-gomez&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/Gabriel-Gomez-Mixdown.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;32:47&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1537908948,&quot;key&quot;:&quot;f92558378f3982e2164c5d13d5cb9b37&quot;},&quot;ppe-4514-402&quot;:{&quot;title&quot;:&quot;Episode 3: Alec Fry&quot;,&quot;description&quot;:&quot;&lt;p&gt;We were joined by Alec Fry for this episode \\u2013 a man that knows more about Identity &amp; Access Management than anyone probably should!\\u00a0He is a subject matter expert across various modes of authentication, and it was great to pull apart many of the challenges and ideas that security \\u2013 particularly IAM \\u2013 is trying to tackle today in the wake of personal privacy spilling into the wider public realm.&lt;\\\/p&gt;\\n&lt;p&gt;&lt;span style=\\&quot;color:#000000\\&quot;&gt;&lt;a style=\\&quot;color:#000000\\&quot; href=\\&quot;https:\\\/\\\/www.museumoffailure.se\\&quot; rel=\\&quot;noopener noreferrer nofollow\\&quot; target=\\&quot;_blank\\&quot;&gt;The Museum of Failure&lt;\\\/a&gt;&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 12, 2018&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-3-alec-fry-kbkast&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/AlecFry-KBKAST-ep3-audio-01.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;27:35&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1523493622,&quot;key&quot;:&quot;a0a96b722e022ba1441775ac0834b61d&quot;},&quot;ppe-4514-403&quot;:{&quot;title&quot;:&quot;Episode 2: Dominic Vogel&quot;,&quot;description&quot;:&quot;&lt;p&gt;\\u00a0&lt;\\\/p&gt;\\n&lt;p&gt;We had a rewarding chat with Dominc Vogel \\u2013 a security professional at the forefront of the changing face of the industry. His thought-leadership around the broader, more encompassing, inclusive aspects of security is captured well in this episode of KBKAST.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 11, 2018&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-2-dominic-vogel&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1598695\\\/KBKAST-DOMINIC-VOGEL.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;32:05&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1523490263,&quot;key&quot;:&quot;16275911ac821ecc9961405c674710c6&quot;},&quot;ppe-4514-404&quot;:{&quot;title&quot;:&quot;Episode 2: Dominic Vogel&quot;,&quot;description&quot;:&quot;&lt;p&gt;We had a rewarding chat with Dominc Vogel &#8211; a security professional at the forefront of the changing face of the industry. His thought-leadership around the broader, more encompassing, inclusive aspects of security is captured well in this episode of KBKAST.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 11, 2018&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-2-dominic-vogel&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKAST-DOMINIC-VOGEL.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;32:05&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1523454263,&quot;key&quot;:&quot;c7121d0c435b49ec369b4b0883d13edb&quot;},&quot;ppe-4514-405&quot;:{&quot;title&quot;:&quot;Episode 1: Duncan McAlynn&quot;,&quot;description&quot;:&quot;&lt;p&gt;We spoke with Duncan this week; a veteran with more than 20 years\\u2019 experience in cyber security, systems management, and solutions architecture. He\\u2019s a technical evangelist, skilled at championing thought-leadership, and an articulate communicator, explaining complex, technical information to non-technical audiences. It was a pleasure talking with him about the modern face of security.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 10, 2018&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-1-duncan-mcalynn&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/1598696\\\/KBKAST-DUNCAN-MCALYNN2.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;32:42&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1523320038,&quot;key&quot;:&quot;dec63332a2b87abd021edafa9f230e38&quot;},&quot;ppe-4514-406&quot;:{&quot;title&quot;:&quot;Episode 1: Duncan McAlynn&quot;,&quot;description&quot;:&quot;&lt;p&gt;We spoke with Duncan this week; a veteran with more than 20 years\\u2019 experience in cyber security, systems management, and solutions architecture. He\\u2019s a technical evangelist, skilled at championing thought-leadership, and an articulate communicator, explaining complex, technical information to non-technical audiences. It was a pleasure talking with him about the modern face of security.&lt;\\\/p&gt;\\n&quot;,&quot;author&quot;:&quot;KBI.Media&quot;,&quot;date&quot;:&quot;April 9, 2018&quot;,&quot;link&quot;:&quot;https:\\\/\\\/kbkast.castos.com\\\/episodes\\\/episode-1-duncan-mcalynn&quot;,&quot;src&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/KBKAST-DUNCAN-MCALYNN2.mp3&quot;,&quot;mediatype&quot;:&quot;audio&quot;,&quot;season&quot;:0,&quot;categories&quot;:[],&quot;duration&quot;:&quot;32:41&quot;,&quot;episodetype&quot;:&quot;full&quot;,&quot;timestamp&quot;:1523284038,&quot;key&quot;:&quot;a97a841c646ad47d7e218acd8f57a924&quot;},&quot;load_info&quot;:{&quot;loaded&quot;:406,&quot;displayed&quot;:0,&quot;offset&quot;:0,&quot;maxItems&quot;:406,&quot;src&quot;:&quot;5a51e049b422462c663697a3ea822086&quot;,&quot;step&quot;:0,&quot;sortby&quot;:&quot;sort_date_desc&quot;,&quot;filterby&quot;:&quot;&quot;,&quot;fixed&quot;:&quot;&quot;,&quot;args&quot;:{&quot;imgurl&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/images\\\/podcast\\\/covers\\\/c1a-5k0v-dmzvvqwwi6rj-7xy2lr.jpg&quot;,&quot;imgset&quot;:&quot;&quot;,&quot;display&quot;:&quot;legacy&quot;,&quot;hddesc&quot;:0,&quot;hdfeat&quot;:1,&quot;oricov&quot;:&quot;https:\\\/\\\/episodes.castos.com\\\/kbkast\\\/images\\\/podcast\\\/covers\\\/c1a-5k0v-dmzvvqwwi6rj-7xy2lr.jpg&quot;,&quot;elength&quot;:0}},&quot;rdata&quot;:{&quot;permalink&quot;:&quot;https:\\\/\\\/kbi.media&quot;,&quot;fprint&quot;:&quot;5a51e049b422462c663697a3ea822086&quot;,&quot;from&quot;:&quot;feedurl&quot;,&quot;elen&quot;:0,&quot;eunit&quot;:&quot;&quot;,&quot;teaser&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;autoplay&quot;:&quot;&quot;}}\"><div class=\"pp-podcast__wrapper\"><div class=\"pp-podcast__content pod-content\"><div class=\"pp-podcast__single\"><div class=\"pp-podcast__player\"><div class=\"pp-player-episode\"><audio id=\"pp-podcast-4514-player\" preload=\"none\" class=\"pp-podcast-episode hide-audio\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"https:\/\/episodes.castos.com\/kbkast\/2426704\/c1e-6wnpc773g8indop0-ww46gomwi7pp-ho5i7k.mp3\" \/><\/audio><\/div><\/div><div class=\"pod-content__episode episode-single\"><button class=\"episode-single__close\" aria-expanded=\"false\" aria-label=\"Close Single Episode\"><span class=\"btn-icon-wrap\"><svg class=\"icon icon-pp-x\" aria-hidden=\"true\" role=\"img\" focusable=\"false\"><use href=\"#icon-pp-x\" xlink:href=\"#icon-pp-x\"><\/use><\/svg><\/span><\/button><div class=\"episode-single__wrapper\"><div class=\"episode-single__header\"><div class=\"episode-single__title\">Episode 364 Deep Dive: Malcolm Turnbull | Balancing Innovation, Security, and Risk<\/div><div class=\"episode-single__author\"><span class=\"byname\">by<\/span><span class=\"single-author\">KBI.Media<\/span><\/div><\/div><div class=\"episode-single__description\"><p>In this episode, we sit down with Malcolm Turnbull, former Prime Minister of Australia, current Chairman of Fortescue Future Industries, Senior Advisor to KKR, and Strategic Advisor at Semperis. Malcolm reflects on his leadership in launching Australia\u2019s first national cybersecurity strategy and examines the evolution of cyber as a vital component of national security and statecraft. He shares insights into the challenges faced by governments and businesses in raising digital awareness, the necessity of mandatory breach reporting, and the importance of sharing intelligence to combat cybercrime. The conversation covers Australia\u2019s approach to critical infrastructure protection, foreign interference reforms, and the nuances of risk management in telecom and utility sectors. Malcolm also discusses the legal landscape around cybersecurity liabilities and the growing impact of class actions on corporate accountability, emphasizing adaptability, setting realistic expectations, and continual vigilance as key lessons for future leaders.<\/p><p><strong>The Honourable Malcolm Turnbull AC<\/strong><\/p><p>Australia\u2019s 29th Prime Minister (2015-2018) had international careers in law, business and the media before entering politics at the age of 50.<\/p><p>As Prime Minister, he reformed Australia\u2019s personal income tax, education and childcare systems, oversaw the legalisation of same sex marriage and announced the construction of Snowy Hydro 2.0 the biggest pumped hydro scheme in the southern hemisphere. Mr Turnbull embarked on the largest peacetime investment in Australian defence capabilities and set out Australia\u2019s first national cybersecurity strategy.<\/p><p>Globally, Mr Turnbull played a leading role in reviving the Trans Pacific Partnership (TPP-11 or CPTPP) after the United States withdrew. He also struck deals with US Presidents Obama and Trump to accept refugees who tried to arrive in Australia illegally by boat.<\/p><p>As a young lawyer, Mr Turnbull successfully defended former MI5 agent Peter Wright against the British Government in the 1986 \u201cSpycatcher\u201d trial before entering business where he ran his own investment banking firm for a decade before joining Goldman Sachs as a partner in 1997. Both before and after his political career, Mr Turnbull has been a successful venture capitalist. He co founded OzEmail Limited, the first Australian tech company to be listed on the NASDAQ.<\/p><p>Since leaving politics, Mr Turnbull has resumed his business career. He is a senior adviser to KKR and an investor in, and adviser to, many Australian technology businesses. He is a director of the International Hydropower Association and Chairman of Australian Fortescue Future Industries. Mr Turnbull speaks and writes on a range of issues including cyber security, geopolitics and renewable energy.<\/p><p>\u00a0<\/p><\/div><\/div><\/div><\/div><div class=\"pod-content__list episode-list\"><div class=\"episode-list__wrapper\"><div class=\"episode-list__search-results episode-search\"><span class=\"ppjs__offscreen\">Search Results placeholder<\/span><\/div><\/div><\/div><div class=\"ppjs__list-reveal\"><div class=\"ppjs__button\"><button class=\"pp-prev-btn\"><span class=\"ppjs__offscreen\">Previous Episode<\/span><span class=\"btn-icon-wrap\"><svg class=\"icon icon-pp-previous\" aria-hidden=\"true\" role=\"img\" focusable=\"false\"><use href=\"#icon-pp-previous\" xlink:href=\"#icon-pp-previous\"><\/use><\/svg><\/span><\/button><\/div><div class=\"ppjs__button\"><button class=\"pp-list-btn\"><span class=\"ppjs__offscreen\">Show Episodes List<\/span><span class=\"btn-icon-wrap\"><svg class=\"icon icon-pp-show-list\" aria-hidden=\"true\" role=\"img\" focusable=\"false\"><use href=\"#icon-pp-show-list\" xlink:href=\"#icon-pp-show-list\"><\/use><\/svg><svg class=\"icon icon-pp-hide-list\" aria-hidden=\"true\" role=\"img\" focusable=\"false\"><use href=\"#icon-pp-hide-list\" xlink:href=\"#icon-pp-hide-list\"><\/use><\/svg><\/span><\/button><\/div><div class=\"ppjs__button\"><button class=\"pp-next-btn\"><span class=\"ppjs__offscreen\">Next Episode<\/span><span class=\"btn-icon-wrap\"><svg class=\"icon icon-pp-next\" aria-hidden=\"true\" role=\"img\" focusable=\"false\"><use href=\"#icon-pp-next\" xlink:href=\"#icon-pp-next\"><\/use><\/svg><\/span><\/button><\/div><\/div><\/div><\/div><\/div>[\/et_pb_code][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;podcast&#8221; post_number=&#8221;1&#8243; show_thumbnail=&#8221;off&#8221; use_overlay=&#8221;off&#8221; show_title=&#8221;off&#8221; show_post_meta=&#8221;off&#8221; custom_content_container=&#8221;off&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-fullwidth&#8221; grid_font_size=&#8221;12px&#8221; bg_items=&#8221;rgba(255,255,255,0)&#8221; bg_filters=&#8221;RGBA(255,255,255,0)&#8221; bg_filter_active=&#8221;RGBA(255,255,255,0)&#8221; bg_sorting=&#8221;RGBA(255,255,255,0)&#8221; bg_sorting_active=&#8221;RGBA(255,255,255,0)&#8221; bg_pagination=&#8221;RGBA(255,255,255,0)&#8221; bg_pagination_active=&#8221;RGBA(255,255,255,0)&#8221; grid_font_size_tablet=&#8221;12px&#8221; grid_font_size_phone=&#8221;0px&#8221; grid_font_size_last_edited=&#8221;on|phone&#8221; disabled_on=&#8221;on|off|off&#8221; admin_label=&#8221;Divi FilterGrid&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_font=&#8221;Poppins||||||||&#8221; dpdfg_entry_title_text_align=&#8221;left&#8221; dpdfg_entry_title_text_color=&#8221;#FFFFFF&#8221; dpdfg_entry_title_font_size=&#8221;14px&#8221; dpdfg_entry_title_line_height=&#8221;1.4em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_align=&#8221;center&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;0em&#8221; background_enable_color=&#8221;off&#8221; background_enable_image=&#8221;off&#8221; background_size=&#8221;contain&#8221; background_position=&#8221;center_left&#8221; width=&#8221;72%&#8221; width_tablet=&#8221;80%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|phone&#8221; max_width_tablet=&#8221;&#8221; max_width_phone=&#8221;100%&#8221; max_width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;right&#8221; custom_margin=&#8221;-63px|-10px|-64px|12px|false|false&#8221; custom_margin_tablet=&#8221;-212px|-10px||12px|false|false&#8221; custom_margin_phone=&#8221;24px|-12px||12px|false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;|24px|0px|24px|false|true&#8221; dpdfg_entry_title_font_last_edited=&#8221;off|phone&#8221; dpdfg_entry_title_font_size_tablet=&#8221;14px&#8221; dpdfg_entry_title_font_size_phone=&#8221;12px&#8221; dpdfg_entry_title_font_size_last_edited=&#8221;on|phone&#8221; border_width_all=&#8221;0px&#8221; border_color_top=&#8221;#000000&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/dpdfg_filtergrid][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|||4px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;KBKast &#8211; Recent Episodes&#8221; url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3MCJ9fQ==@&#8221; image=&#8221;https:\/\/kbi.media\/wp-content\/uploads\/2023\/10\/KBI-White-NoR-Logo.svg&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;32px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.24.0&#8243; _dynamic_attributes=&#8221;url&#8221; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; z_index=&#8221;12&#8243; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px|0px|false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; custom_padding_tablet=&#8221;12px||2px|12px|false|false&#8221; custom_padding_phone=&#8221;|||12px|false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;podcast&#8221; use_taxonomy_terms=&#8221;on&#8221; multiple_taxonomies=&#8221;series&#8221; include_terms=&#8221;102&#8243; exclude_taxonomies=&#8221;series&#8221; post_number=&#8221;4&#8243; offset_number=&#8221;1&#8243; thumbnail_size=&#8221;dfg_full&#8221; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_terms=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_width=&#8221;23%&#8221; column_gutter=&#8221;0.6em&#8221; items_skin=&#8221;dp-dfg-skin-none&#8221; bg_items=&#8221;#000000&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_level=&#8221;h1&#8243; dpdfg_entry_title_font=&#8221;|300|||||||&#8221; dpdfg_entry_title_text_align=&#8221;center&#8221; dpdfg_entry_title_text_color=&#8221;#FFFFFF&#8221; dpdfg_entry_title_font_size=&#8221;10px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_align=&#8221;center&#8221; dpdfg_entry_meta_text_color=&#8221;#FFFFFF&#8221; dpdfg_entry_meta_font_size=&#8221;10px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; custom_margin=&#8221;24px||||false|false&#8221; custom_padding=&#8221;0px||||false|false&#8221; child_filter_saturate=&#8221;0%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|desktop&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;podcast&#8221; use_taxonomy_terms=&#8221;on&#8221; multiple_taxonomies=&#8221;series&#8221; include_terms=&#8221;102&#8243; exclude_taxonomies=&#8221;series&#8221; post_number=&#8221;4&#8243; offset_number=&#8221;5&#8243; thumbnail_size=&#8221;dfg_full&#8221; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_terms=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_width=&#8221;23%&#8221; column_gutter=&#8221;0.6em&#8221; items_skin=&#8221;dp-dfg-skin-none&#8221; bg_items=&#8221;#000000&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_level=&#8221;h1&#8243; dpdfg_entry_title_font=&#8221;|300|||||||&#8221; dpdfg_entry_title_text_align=&#8221;center&#8221; dpdfg_entry_title_text_color=&#8221;#FFFFFF&#8221; dpdfg_entry_title_font_size=&#8221;10px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_align=&#8221;center&#8221; dpdfg_entry_meta_text_color=&#8221;#FFFFFF&#8221; dpdfg_entry_meta_font_size=&#8221;10px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; custom_margin=&#8221;24px||||false|false&#8221; custom_padding=&#8221;0px||||false|false&#8221; child_filter_saturate=&#8221;0%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|desktop&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][et_pb_button button_url=&#8221;https:\/\/kbi.media\/kbkast\/&#8221; button_text=&#8221;KBKast Archives&#8221; button_alignment=&#8221;right&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;12px&#8221; button_text_color=&#8221;#000000&#8243; button_border_width=&#8221;0px&#8221; button_font=&#8221;Poppins||||on|||#000000|&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_horizontal__hover=&#8221;2px&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;0px|0px|||false|false&#8221; custom_padding=&#8221;0px|4px||4px|false|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|||4px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Destination Cyber&#8221; url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0MCJ9fQ==@&#8221; image=&#8221;https:\/\/kbi.media\/wp-content\/uploads\/2023\/05\/MercSec-Logo_Inline_Full-Colour-1.svg&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;97px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.22.2&#8243; _dynamic_attributes=&#8221;url,link_option_url&#8221; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; z_index=&#8221;12&#8243; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;6px||0px||false|false&#8221; custom_padding=&#8221;12px||0px|12px|false|false&#8221; child_filter_saturate=&#8221;0%&#8221; child_filter_brightness=&#8221;200%&#8221; child_filter_contrast=&#8221;0%&#8221; child_filter_invert=&#8221;100%&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0MCJ9fQ==@&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;podcast&#8221; use_taxonomy_terms=&#8221;on&#8221; multiple_taxonomies=&#8221;series&#8221; include_terms=&#8221;122&#8243; include_children_terms=&#8221;off&#8221; post_number=&#8221;4&#8243; thumbnail_size=&#8221;dfg_full&#8221; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_terms=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_width=&#8221;23%&#8221; column_gutter=&#8221;0.6em&#8221; items_skin=&#8221;dp-dfg-skin-none&#8221; bg_items=&#8221;RGBA(255,255,255,0)&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_font=&#8221;||||||||&#8221; dpdfg_entry_title_text_align=&#8221;center&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;10px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_align=&#8221;center&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;10px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; custom_margin=&#8221;4px||||false|false&#8221; custom_padding=&#8221;0px||||false|false&#8221; child_filter_saturate=&#8221;0%&#8221; border_color_bottom=&#8221;#EDEDED&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|desktop&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][et_pb_button button_url=&#8221;https:\/\/kbi.media\/destination-cyber\/&#8221; button_text=&#8221;DC Archives&#8221; button_alignment=&#8221;right&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;12px&#8221; button_text_color=&#8221;#000000&#8243; button_border_width=&#8221;0px&#8221; button_font=&#8221;Poppins||||on|||#000000|&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;15px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_horizontal__hover=&#8221;2px&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|||4px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;KBI.FM&#8221; url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjgyIn19@&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf519;||fa||900&#8243; icon_color=&#8221;#FFFFFF&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;21px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.23.1&#8243; _dynamic_attributes=&#8221;url,link_option_url&#8221; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; z_index=&#8221;12&#8243; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;6px||0px||false|false&#8221; custom_padding=&#8221;12px||0px|12px|false|false&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjgyIn19@&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;kbifm-podcast&#8221; use_taxonomy_terms=&#8221;on&#8221; include_terms=&#8221;122&#8243; include_children_terms=&#8221;off&#8221; post_number=&#8221;4&#8243; orderby=&#8221;rand&#8221; thumbnail_size=&#8221;dfg_full&#8221; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_terms=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_width=&#8221;23%&#8221; column_gutter=&#8221;0.6em&#8221; items_skin=&#8221;dp-dfg-skin-none&#8221; bg_items=&#8221;RGBA(255,255,255,0)&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_font=&#8221;||||||||&#8221; dpdfg_entry_title_text_align=&#8221;center&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;10px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_align=&#8221;center&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;10px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; custom_margin=&#8221;4px||||false|false&#8221; custom_padding=&#8221;0px||||false|false&#8221; child_filter_saturate=&#8221;0%&#8221; border_color_bottom=&#8221;#EDEDED&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|desktop&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][et_pb_button button_url=&#8221;https:\/\/kbi.media\/destination-cyber\/&#8221; button_text=&#8221;KBI.FM Network&#8221; button_alignment=&#8221;right&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;12px&#8221; button_text_color=&#8221;#000000&#8243; button_border_width=&#8221;0px&#8221; button_font=&#8221;Poppins||||on|||#000000|&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_horizontal__hover=&#8221;2px&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;5px||5px|||&#8221; hover_enabled=&#8221;0&#8243; dbpp_show_on_password_page=&#8221;all_pages&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;4px||0px|4px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Atmos SPHERE 2026&#8243; url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI1NTYyODI0In19@&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf017;||fa||400&#8243; icon_color=&#8221;#FFFFFF&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;22px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.27.6&#8243; _dynamic_attributes=&#8221;url,link_option_url&#8221; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI1NTYyODI0In19@&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_5,3_5,1_5&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;17px||7px|||&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px||4px|false|true&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI1NTYyODI0In19@&#8221; _dynamic_attributes=&#8221;link_option_url&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_image src=&#8221;https:\/\/kbi.media\/wp-content\/uploads\/2026\/03\/SPHERE-2026-Banner-Post-Event-Banner.svg&#8221; title_text=&#8221;SPHERE-2026-Banner-Post-Event-Banner&#8221; url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI1NTYyODI0In19@&#8221; _builder_version=&#8221;4.27.6&#8243; _dynamic_attributes=&#8221;url&#8221; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI1NTYyODI0In19@&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Watch Recaps&#8221; button_alignment=&#8221;center&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.27.6&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;12px&#8221; button_text_color=&#8221;#000000&#8243; button_border_width=&#8221;0px&#8221; button_font=&#8221;Poppins||||on|||#000000|&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;-20px||12px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_horizontal__hover=&#8221;2px&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; make_equal=&#8221;on&#8221; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; specialty=&#8221;on&#8221; padding_top_1=&#8221;0px&#8221; padding_top_2=&#8221;0px&#8221; padding_bottom_1=&#8221;0px&#8221; padding_bottom_2=&#8221;0px&#8221; padding_bottom_3=&#8221;0px&#8221; padding_top_bottom_link_1=&#8221;false&#8221; padding_top_bottom_link_2=&#8221;false&#8221; padding_top_bottom_link_3=&#8221;false&#8221; padding_left_right_link_1=&#8221;false&#8221; padding_left_right_link_2=&#8221;false&#8221; padding_left_right_link_3=&#8221;false&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; inner_width=&#8221;100%&#8221; inner_max_width=&#8221;100%&#8221; inner_module_alignment=&#8221;center&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_margin_tablet=&#8221;0px||0px||false|false&#8221; custom_margin_phone=&#8221;48px||||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;0px|4px|0px|4px|false|true&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_blurb title=&#8221;Start-Up Spotlight&#8221; url=&#8221;https:\/\/kbi.media\/topic\/business-news\/start-up-spotlight\/&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf091;||fa||900&#8243; icon_color=&#8221;#FFFFFF&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;22px&#8221; content_max_width=&#8221;100%&#8221; admin_label=&#8221;Blurb&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; link_option_url=&#8221;https:\/\/kbi.media\/topic\/business-news\/start-up-spotlight\/&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;spotlight&#8221; use_taxonomy_terms=&#8221;on&#8221; post_number=&#8221;1&#8243; orderby=&#8221;rand&#8221; thumbnail_size=&#8221;300&#215;300&#8243; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_terms=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-fullwidth&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_align=&#8221;center&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font=&#8221;||on|on|||||&#8221; dpdfg_entry_meta_text_align=&#8221;center&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;10px&#8221; dpdfg_entry_meta_line_height=&#8221;1em&#8221; width=&#8221;72%&#8221; module_alignment=&#8221;center&#8221; child_filter_saturate=&#8221;0%&#8221; border_width_all=&#8221;0px&#8221; global_colors_info=&#8221;{}&#8221; child_filter_saturate__hover_enabled=&#8221;on|desktop&#8221; child_filter_saturate__hover=&#8221;100%&#8221; filter_saturate__hover_enabled=&#8221;on|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_blurb title=&#8221;Recent Interviews&#8221; url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjM0In19@&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf008;||fa||900&#8243; icon_color=&#8221;#FFFFFF&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;22px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.27.6&#8243; _dynamic_attributes=&#8221;url,link_option_url&#8221; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; z_index=&#8221;12&#8243; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px|4px|false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjM0In19@&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;challenger-interview&#8221; post_number=&#8221;1&#8243; orderby=&#8221;rand&#8221; thumbnail_size=&#8221;300&#215;300&#8243; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_terms=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-fullwidth&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_align=&#8221;center&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font=&#8221;||on|on|||||&#8221; dpdfg_entry_meta_text_align=&#8221;center&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;10px&#8221; dpdfg_entry_meta_line_height=&#8221;1em&#8221; width=&#8221;72%&#8221; module_alignment=&#8221;center&#8221; child_filter_saturate=&#8221;0%&#8221; border_width_all=&#8221;0px&#8221; global_colors_info=&#8221;{}&#8221; child_filter_saturate__hover_enabled=&#8221;on|desktop&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; specialty_columns=&#8221;2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_row_inner make_equal=&#8221;on&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px||0px|4px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column_inner saved_specialty_column_type=&#8221;1_2&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Top Stories&#8221; url=&#8221;https:\/\/kbi.media\/editors-picks\/&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf7b6;||fa||900&#8243; icon_color=&#8221;#FFFFFF&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;22px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; z_index=&#8221;12&#8243; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; link_option_url=&#8221;https:\/\/kbi.media\/editors-picks\/&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;post,challenger-interview,contributor,kbifm-podcast,press-release,threat_alert&#8221; use_taxonomy_terms=&#8221;on&#8221; multiple_taxonomies=&#8221;post_tag&#8221; taxonomies_relation=&#8221;AND&#8221; include_terms=&#8221;142&#8243; post_number=&#8221;1&#8243; orderby=&#8221;rand&#8221; thumbnail_size=&#8221;300&#215;300&#8243; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_terms=&#8221;on&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;560&#8243; read_more=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;117px&#8221; thumb_width=&#8221;48%&#8221; items_skin=&#8221;dp-dfg-skin-default dp-dfg-skin-itemsinoverlay&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;14px&#8221; dpdfg_entry_title_line_height=&#8221;1.6em&#8221; dpdfg_entry_meta_font=&#8221;||on|on|||||&#8221; dpdfg_entry_meta_font_size=&#8221;10px&#8221; dpdfg_entry_summary_font_size=&#8221;10px&#8221; custom_read_more_button=&#8221;on&#8221; read_more_button_text_size=&#8221;10px&#8221; read_more_button_text_color=&#8221;#000000&#8243; read_more_button_border_width=&#8221;0px&#8221; read_more_button_font=&#8221;||||on|||#000000|&#8221; read_more_button_use_icon=&#8221;off&#8221; read_more_button_alignment=&#8221;right&#8221; read_more_button_custom_margin=&#8221;53px||||false|false&#8221; child_filter_saturate=&#8221;0%&#8221; border_width_all=&#8221;0px&#8221; global_colors_info=&#8221;{}&#8221; child_filter_saturate__hover_enabled=&#8221;on|desktop&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][\/et_pb_column_inner][\/et_pb_row_inner][\/et_pb_column][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; disabled_on=&#8221;on|on|on&#8221; admin_label=&#8221;Main Site Top Content&#8221; _builder_version=&#8221;4.23.1&#8243; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;48px||48px||false|false&#8221; border_width_top=&#8221;1px&#8221; border_color_top=&#8221;#EDEDED&#8221; disabled=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; filter_saturate=&#8221;0%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text module_class=&#8221;pa-hamburger-menu&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#000000&#8243; custom_margin=&#8221;12px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><A href=\"https:\/\/kbi.media\/threat-alerts-reports\/\">Threats &Amp; Alerts<\/A><\/h2>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px|4px|1px|4px|false|true&#8221; filter_saturate=&#8221;0%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Threat Alerts&#8221; url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1NzcyMzIzIn19@&#8221; url_new_window=&#8221;on&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe062;||divi||400&#8243; icon_color=&#8221;#FFFFFF&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;22px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.22.2&#8243; _dynamic_attributes=&#8221;url,link_option_url&#8221; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1NzcyMzIzIn19@&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][dipi_blog_slider author_align=&#8221;left&#8221; posts_number=&#8221;8&#8243; select_post_type=&#8221;threat_alert&#8221; select_custom_tax=&#8221;alert-type&#8221; include_term_ids_of_alert-type=&#8221;current,69,73,76,70,74,98,66,71,72,67,75,68&#8243; use_thumbnail_height=&#8221;on&#8221; thumbnail_height=&#8221;100%&#8221; use_thumbnails=&#8221;on&#8221; date_circle_color=&#8221;rgba(255,255,255,0.48)&#8221; show_excerpt=&#8221;off&#8221; columns=&#8221;3&#8243; space_between=&#8221;6&#8243; container_padding=&#8221;0px|0px|0px|0px|true|true&#8221; item_padding=&#8221;0px|0px|0px|0px|false|false&#8221; speed=&#8221;501&#8243; loop=&#8221;on&#8221; autoplay=&#8221;on&#8221; autoplay_speed=&#8221;2001&#8243; dynamic_bullets=&#8221;off&#8221; centered=&#8221;on&#8221; navigation_position_left=&#8221;0px&#8221; navigation_position_right=&#8221;0px&#8221; image_animation=&#8221;zoomin&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#000000&#8243; header_font_size=&#8221;12px&#8221; header_line_height=&#8221;1em&#8221; body_font_size=&#8221;12px&#8221; cat_font=&#8221;Poppins||||||||&#8221; cat_text_align=&#8221;center&#8221; cat_text_color=&#8221;#000000&#8243; cat_font_size=&#8221;12px&#8221; cat_line_height=&#8221;1.2em&#8221; author_font=&#8221;||||||||&#8221; author_text_color=&#8221;#000000&#8243; date_font=&#8221;Libre Baskerville||||||||&#8221; date_text_color=&#8221;#000000&#8243; custom_margin=&#8221;||0px||false|false&#8221; filter_saturate=&#8221;0%&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;on|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221;][\/dipi_blog_slider][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Reports &#038; Advisory&#8221; url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1NzcyMzIzIn19@&#8221; url_new_window=&#8221;on&#8221; image=&#8221;https:\/\/kbi.media\/wp-content\/uploads\/2023\/05\/DCCP.png&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;64px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.22.2&#8243; _dynamic_attributes=&#8221;url,link_option_url&#8221; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; child_filter_brightness=&#8221;200%&#8221; child_filter_contrast=&#8221;0%&#8221; link_option_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1NzcyMzIzIn19@&#8221; link_option_url_new_window=&#8221;on&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;threat_alert&#8221; use_taxonomy_terms=&#8221;on&#8221; multiple_taxonomies=&#8221;alert-type&#8221; include_terms=&#8221;99&#8243; post_number=&#8221;3&#8243; thumbnail_size=&#8221;dfg_full&#8221; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;128&#8243; truncate_excerpt=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;93px&#8221; thumb_width=&#8221;20%&#8221; column_gutter=&#8221;1em&#8221; row_gutter=&#8221;1em&#8221; items_skin=&#8221;dp-dfg-skin-none&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; filter_saturate=&#8221;0%&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;on|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1NzcyMzIzIn19@&#8221; button_text=&#8221;Threats &#038; Reports&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.21.0&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;12px&#8221; button_text_color=&#8221;#000000&#8243; button_border_width=&#8221;0px&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;1px||||false|false&#8221; box_shadow_style=&#8221;preset4&#8243; box_shadow_horizontal=&#8221;-2px&#8221; box_shadow_vertical=&#8221;2px&#8221; box_shadow_color=&#8221;#000000&#8243; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover=&#8221;2px&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;48px||||false|false&#8221; border_width_top=&#8221;1px&#8221; border_color_top=&#8221;#EDEDED&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; filter_saturate=&#8221;0%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text module_class=&#8221;business-min&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#000000&#8243; custom_margin=&#8221;12px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Business News \u2193<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px|4px|0px|4px|false|true&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;News &#038; Insights &#8211; Business&#8221; url=&#8221;https:\/\/kbi.media\/topic\/business-news\/&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf1ea;||fa||400&#8243; icon_color=&#8221;#FFFFFF&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;24px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; link_option_url=&#8221;https:\/\/kbi.media\/topic\/business-news\/&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221;][\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|||4px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Work &#038; Careers&#8221; url=&#8221;https:\/\/kbi.media\/topic\/business-news\/work-careers&#8221; image=&#8221;https:\/\/kbi.media\/wp-content\/uploads\/2023\/05\/MercSec-Logo_Inline_Full-Colour-1.svg&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;96px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; child_filter_saturate=&#8221;0%&#8221; child_filter_brightness=&#8221;200%&#8221; child_filter_contrast=&#8221;0%&#8221; link_option_url=&#8221;https:\/\/kbi.media\/topic\/business-news\/work-careers&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px|4px||4px|false|true&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|||4px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_post_slider posts_number=&#8221;16&#8243; include_categories=&#8221;2&#8243; show_arrows=&#8221;off&#8221; use_manual_excerpt=&#8221;off&#8221; excerpt_length=&#8221;420&#8243; show_meta=&#8221;off&#8221; image_placement=&#8221;left&#8221; use_bg_overlay=&#8221;off&#8221; use_text_overlay=&#8221;off&#8221; dot_nav_custom_color=&#8221;#000000&#8243; module_id=&#8221;kbi-slider&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#000000&#8243; header_font_size=&#8221;16px&#8221; header_line_height=&#8221;1.6em&#8221; body_text_align=&#8221;left&#8221; body_text_color=&#8221;#000000&#8243; body_font_size=&#8221;11px&#8221; meta_font=&#8221;||on||||||&#8221; meta_text_align=&#8221;center&#8221; meta_text_color=&#8221;#000000&#8243; meta_font_size=&#8221;12px&#8221; background_enable_color=&#8221;off&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;12px&#8221; button_text_color=&#8221;#000000&#8243; button_border_width=&#8221;0px&#8221; button_border_color=&#8221;#FFFFFF&#8221; button_letter_spacing=&#8221;4px&#8221; button_use_icon=&#8221;off&#8221; button_alignment=&#8221;center&#8221; button_custom_margin=&#8221;24px||||false|false&#8221; background_layout=&#8221;light&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;96px||128px||false|false&#8221; filter_saturate=&#8221;0%&#8221; child_filter_saturate=&#8221;0%&#8221; auto=&#8221;on&#8221; box_shadow_style_button=&#8221;preset4&#8243; box_shadow_horizontal_button=&#8221;-2px&#8221; box_shadow_vertical_button=&#8221;2px&#8221; box_shadow_color_button=&#8221;#000000&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal_button__hover_enabled=&#8221;on|desktop&#8221; box_shadow_horizontal_button__hover=&#8221;2px&#8221; child_filter_saturate__hover_enabled=&#8221;on|desktop&#8221; child_filter_saturate__hover=&#8221;100%&#8221; filter_saturate__hover_enabled=&#8221;on|hover&#8221; filter_saturate__hover=&#8221;100%&#8221;][\/et_pb_post_slider][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|||8px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;post,contributor,podcast,press-release,job-ad&#8221; use_taxonomy_terms=&#8221;on&#8221; include_terms=&#8221;13&#8243; post_number=&#8221;3&#8243; thumbnail_size=&#8221;300&#215;300&#8243; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;128&#8243; truncate_excerpt=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;93px&#8221; thumb_width=&#8221;20%&#8221; column_gutter=&#8221;1em&#8221; row_gutter=&#8221;1em&#8221; admin_label=&#8221;Divi FilterGrid&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; child_filter_saturate=&#8221;0%&#8221; border_width_all=&#8221;0px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|hover&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][et_pb_button button_url=&#8221;https:\/\/kbi.media\/open-roles&#8221; button_text=&#8221;Explore Work &#038; Careers&#8221; button_alignment=&#8221;right&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;12px&#8221; button_text_color=&#8221;#000000&#8243; button_border_width=&#8221;0px&#8221; button_font=&#8221;Poppins||||on|||#000000|&#8221; button_use_icon=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_horizontal__hover=&#8221;2px&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;12px||||false|false&#8221; custom_padding=&#8221;0px|4px|0px|4px|false|true&#8221; border_width_top=&#8221;1px&#8221; border_color_top=&#8221;#EDEDED&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Secure Communications&#8221; url=&#8221;https:\/\/kbi.media\/topic\/business-news\/secure-communications\/&#8221; image=&#8221;https:\/\/kbi.media\/wp-content\/uploads\/2025\/03\/blackberry-white-logomark.svg&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;34px&#8221; admin_label=&#8221;Blurb&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; link_option_url=&#8221;https:\/\/kbi.media\/topic\/business-news\/secure-communications\/&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;post,contributor&#8221; use_taxonomy_terms=&#8221;on&#8221; include_terms=&#8221;178&#8243; post_number=&#8221;3&#8243; thumbnail_size=&#8221;300&#215;300&#8243; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;128&#8243; truncate_excerpt=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;93px&#8221; thumb_width=&#8221;20%&#8221; column_gutter=&#8221;1em&#8221; row_gutter=&#8221;1em&#8221; admin_label=&#8221;Divi FilterGrid&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; child_filter_saturate=&#8221;0%&#8221; border_width_all=&#8221;0px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|hover&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Continuous Business&#8221; url=&#8221;https:\/\/kbi.media\/topic\/business-news\/continuous-business\/&#8221; image=&#8221;https:\/\/kbi.media\/wp-content\/uploads\/2025\/03\/commvault-prpl-logomark.svg&#8221; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;-9px||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; filter_saturate=&#8221;0%&#8221; filter_brightness=&#8221;101%&#8221; child_filter_brightness=&#8221;200%&#8221; link_option_url=&#8221;https:\/\/kbi.media\/topic\/business-news\/continuous-business\/&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;on|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_brightness__hover_enabled=&#8221;on|desktop&#8221; child_filter_brightness__hover=&#8221;100%&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;post,contributor,podcast&#8221; use_taxonomy_terms=&#8221;on&#8221; include_terms=&#8221;177&#8243; post_number=&#8221;3&#8243; thumbnail_size=&#8221;300&#215;300&#8243; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;128&#8243; truncate_excerpt=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;93px&#8221; thumb_width=&#8221;20%&#8221; column_gutter=&#8221;1em&#8221; row_gutter=&#8221;1em&#8221; admin_label=&#8221;Divi FilterGrid&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; child_filter_saturate=&#8221;0%&#8221; border_width_all=&#8221;0px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|hover&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Compliance &#038; Legal&#8221; url=&#8221;https:\/\/kbi.media\/topic\/business-news\/Compliance-Legal\/&#8221; image=&#8221;https:\/\/kbi.media\/wp-content\/uploads\/2025\/03\/vanta-llama.svg&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;32px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;-12px||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; link_option_url=&#8221;https:\/\/kbi.media\/topic\/business-news\/Compliance-Legal\/&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;post,contributor,podcast&#8221; use_taxonomy_terms=&#8221;on&#8221; include_terms=&#8221;5&#8243; post_number=&#8221;3&#8243; thumbnail_size=&#8221;300&#215;300&#8243; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;128&#8243; truncate_excerpt=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;93px&#8221; thumb_width=&#8221;20%&#8221; column_gutter=&#8221;1em&#8221; row_gutter=&#8221;1em&#8221; admin_label=&#8221;Divi FilterGrid&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; child_filter_saturate=&#8221;0%&#8221; border_width_all=&#8221;0px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|hover&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Mergers &#038; Acquisitions&#8221; url=&#8221;https:\/\/kbi.media\/topic\/business-news\/mergers-acquisitions\/&#8221; image=&#8221;https:\/\/kbi.media\/wp-content\/uploads\/2023\/11\/MRGD-Logo-Primary-1.svg&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;36px&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; child_filter_saturate=&#8221;0%&#8221; child_filter_brightness=&#8221;90%&#8221; child_filter_invert=&#8221;100%&#8221; link_option_url=&#8221;https:\/\/kbi.media\/topic\/business-news\/mergers-acquisitions\/&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;post,contributor,podcast&#8221; use_taxonomy_terms=&#8221;on&#8221; include_terms=&#8221;13&#8243; post_number=&#8221;3&#8243; thumbnail_size=&#8221;300&#215;300&#8243; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;128&#8243; truncate_excerpt=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;93px&#8221; thumb_width=&#8221;20%&#8221; column_gutter=&#8221;1em&#8221; row_gutter=&#8221;1em&#8221; admin_label=&#8221;Divi FilterGrid&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; child_filter_saturate=&#8221;0%&#8221; border_width_all=&#8221;0px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|hover&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][et_pb_button button_url=&#8221;https:\/\/kbi.media\/topic\/business-news\/mergers-acquisitions\/&#8221; button_text=&#8221;Explore M&#038;A&#8221; button_alignment=&#8221;right&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;12px&#8221; button_text_color=&#8221;#000000&#8243; button_border_width=&#8221;0px&#8221; button_font=&#8221;Poppins||||on|||#000000|&#8221; button_use_icon=&#8221;off&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_horizontal__hover=&#8221;2px&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;|4px||4px|false|false&#8221; filter_saturate=&#8221;0%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Markets &#038; Trading&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf080;||fa||400&#8243; icon_color=&#8221;#FFFFFF&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;22px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_code _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; scroll_horizontal_motion=&#8221;0|54|54|100|4|0|-4&#8243; motion_trigger_start=&#8221;top&#8221; global_colors_info=&#8221;{}&#8221;]<!-- TradingView Widget BEGIN --><!-- [et_pb_line_break_holder] --><\/p>\n<div class=\"tradingview-widget-container\"><!-- [et_pb_line_break_holder] -->  <\/p>\n<div class=\"tradingview-widget-container__widget\"><\/div>\n<p><!-- [et_pb_line_break_holder] -->  <\/p>\n<div class=\"tradingview-widget-copyright\"><a href=\"https:\/\/www.tradingview.com\/markets\/\" rel=\"noopener\" target=\"_blank\"><span class=\"blue-text\">Markets<\/span><\/a> by TradingView<\/div>\n<p><!-- [et_pb_line_break_holder] -->  <script type=\"text\/javascript\" src=\"https:\/\/s3.tradingview.com\/external-embedding\/embed-widget-ticker-tape.js\" async><!-- [et_pb_line_break_holder] -->  {<!-- [et_pb_line_break_holder] -->  \"symbols\": [<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->      \"proName\": \"BITSTAMP:BTCUSD\",<!-- [et_pb_line_break_holder] -->      \"title\": \"Bitcoin\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->      \"proName\": \"BITSTAMP:ETHUSD\",<!-- [et_pb_line_break_holder] -->      \"title\": \"Ethereum\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->      \"description\": \"Prophercy Intl\",<!-- [et_pb_line_break_holder] -->      \"proName\": \"ASX:PRO\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->       {<!-- [et_pb_line_break_holder] -->      \"description\": \"Senetas Corp\",<!-- [et_pb_line_break_holder] -->      \"proName\": \"ASX:SEN\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->      \"description\": \"Archtis Ltd\",<!-- [et_pb_line_break_holder] -->      \"proName\": \"ASX:AR9\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->      \"description\": \"Whitehawk Ltd\",<!-- [et_pb_line_break_holder] -->      \"proName\": \"ASX:WHK\"<!-- [et_pb_line_break_holder] -->    },  <!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->      \"description\": \"Palo Alto\",<!-- [et_pb_line_break_holder] -->      \"proName\": \"NASDAQ:PANW\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->      \"description\": \"Tenable\",<!-- [et_pb_line_break_holder] -->      \"proName\": \"NASDAQ:TENB\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->      \"description\": \"IBM\",<!-- [et_pb_line_break_holder] -->      \"proName\": \"NYSE:IBM\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->      \"description\": \"Broadcom\",<!-- [et_pb_line_break_holder] -->      \"proName\": \"NASDAQ:AVGO\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->      \"description\": \"Fortinet\",<!-- [et_pb_line_break_holder] -->      \"proName\": \"NASDAQ:FTNT\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->      \"description\": \"Crowdstrike\",<!-- [et_pb_line_break_holder] -->      \"proName\": \"NASDAQ:CRWD\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->      \"description\": \"Zscaler\",<!-- [et_pb_line_break_holder] -->      \"proName\": \"NASDAQ:ZS\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->      \"description\": \"Checkpoint\",<!-- [et_pb_line_break_holder] -->      \"proName\": \"NASDAQ:CHKP\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->      \"description\": \"Cisco Systems\",<!-- [et_pb_line_break_holder] -->      \"proName\": \"NASDAQ:CSCO\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->      \"description\": \"Okta\",<!-- [et_pb_line_break_holder] -->      \"proName\": \"NASDAQ:OKTA\"<!-- [et_pb_line_break_holder] -->    },   <!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->      \"description\": \"Trend Micro\",<!-- [et_pb_line_break_holder] -->      \"proName\": \"OTC:TMICF\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->    \t\"description\": \"Gen Digital\",<!-- [et_pb_line_break_holder] -->\t\t\t\"proName\": \"NASDAQ:GEN\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->    \t\"description\": \"Akamai Technologies\",<!-- [et_pb_line_break_holder] -->\t\t\t\"proName\": \"NASDAQ:AKAM\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->    \t\"description\": \"Qualys\",<!-- [et_pb_line_break_holder] -->\t\t\t\"proName\": \"NASDAQ:QLYS\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->\t\t\t\"description\": \"SentinelOne\",<!-- [et_pb_line_break_holder] -->\t\t\t\"proName\": \"NYSE:S\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->\t\t\t\"description\": \"CyberArk\",<!-- [et_pb_line_break_holder] -->\t\t\t\"proName\": \"NASDAQ:CYBR\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->\t\t\t\"description\": \"Rapid7\",<!-- [et_pb_line_break_holder] -->\t\t\t\"proName\": \"NASDAQ:RPD\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->    \t\"description\": \"Varonis\",<!-- [et_pb_line_break_holder] -->\t\t\t\"proName\": \"NASDAQ:VRNS\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->\t\t\t\"description\": \"OneSpan\",<!-- [et_pb_line_break_holder] -->\t\t\t\"proName\": \"NASDAQ:OSPN\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->\t\t\t\"description\": \"Telos\",<!-- [et_pb_line_break_holder] -->\t\t\t\"proName\": \"NASDAQ:TLS\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->\t\t\t\"description\": \"Radware\",<!-- [et_pb_line_break_holder] -->\t\t\t\"proName\": \"NASDAQ:RDWR\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->\t\t\t\"description\": \"F5\",<!-- [et_pb_line_break_holder] -->\t\t\t\"proName\": \"NASDAQ:FFIV\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->\t\t\t\"description\": \"archTIS\",<!-- [et_pb_line_break_holder] -->\t\t\t\"proName\": \"ASX:AR9\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->\t\t\t\"description\": \"Prophecy International\",<!-- [et_pb_line_break_holder] -->\t\t\t\"proName\": \"ASX:PRO\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->\t\t\t\"description\": \"Senetas\",<!-- [et_pb_line_break_holder] -->\t\t\t\"proName\": \"ASX:SEN\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->\t\t\t\"description\": \"FirstWave Cloud Technology\",<!-- [et_pb_line_break_holder] -->\t\t\t\"proName\": \"ASX:FCT\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->\t\t\t\"description\": \"Qoria\",<!-- [et_pb_line_break_holder] -->\t\t\t\"proName\": \"ASX:QOR\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->\t\t\t\"description\": \"Cognyte Software\",<!-- [et_pb_line_break_holder] -->\t\t\t\"proName\": \"NASDAQ:CGNT\"<!-- [et_pb_line_break_holder] -->    },<!-- [et_pb_line_break_holder] -->    {<!-- [et_pb_line_break_holder] -->\t\t\t\"description\": \"BlackBerry\",<!-- [et_pb_line_break_holder] -->\t\t\t\"proName\": \"NYSE:BB\"<!-- [et_pb_line_break_holder] -->    }<!-- [et_pb_line_break_holder] -->  ],<!-- [et_pb_line_break_holder] -->  \"showSymbolLogo\": true,<!-- [et_pb_line_break_holder] -->  \"colorTheme\": \"light\",<!-- [et_pb_line_break_holder] -->  \"isTransparent\": true,<!-- [et_pb_line_break_holder] -->  \"displayMode\": \"compact\",<!-- [et_pb_line_break_holder] -->  \"locale\": \"en\"<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] -->  <\/script><!-- [et_pb_line_break_holder] --><\/div>\n<p><!-- [et_pb_line_break_holder] --><!-- TradingView Widget END -->[\/et_pb_code][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjIyMjkifX0=@&#8221; button_text=&#8221;See More&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.21.0&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;12px&#8221; button_text_color=&#8221;#000000&#8243; button_border_width=&#8221;0px&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;||||false|false&#8221; box_shadow_style=&#8221;preset4&#8243; box_shadow_horizontal=&#8221;-2px&#8221; box_shadow_vertical=&#8221;2px&#8221; box_shadow_color=&#8221;#000000&#8243; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover=&#8221;2px&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#000000&#8243; custom_padding=&#8221;6px||5px||false|false&#8221; global_module=&#8221;15772548&#8243; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.22.2&#8243; text_font=&#8221;||||||||&#8221; header_font=&#8221;||||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;3em&#8221; header_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;|||on|||||&#8221; header_2_font_size=&#8221;24px&#8221; header_2_letter_spacing=&#8221;0.4em&#8221; header_2_line_height=&#8221;1.3em&#8221; header_4_font=&#8221;Poppins|||on|||||&#8221; header_4_font_size=&#8221;12px&#8221; header_4_letter_spacing=&#8221;0.8em&#8221; background_layout=&#8221;dark&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|tablet&#8221; header_font_size_tablet=&#8221;60px&#8221; header_font_size_phone=&#8221;30px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;18px&#8221; header_2_font_size_phone=&#8221;14px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>YOUR SECURITY NEWSFEED<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_3_text_color=&#8221;#FFFFFF&#8221; header_4_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>The KBI Dossier<\/h2>\n<p>The Cybersecurity news feed delivered straight to your Inbox.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc0In19@&#8221; button_text=&#8221;Join Free&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.23.1&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_border_width=&#8221;0px&#8221; button_icon=&#8221;&#xf1ea;||fa||400&#8243; button_icon_color=&#8221;#FFFFFF&#8221; button_on_hover=&#8221;off&#8221; background_layout=&#8221;dark&#8221; custom_margin=&#8221;48px||||false|false&#8221; custom_padding=&#8221;|||12px|false|false&#8221; box_shadow_style=&#8221;preset4&#8243; box_shadow_horizontal=&#8221;-2px&#8221; box_shadow_vertical=&#8221;2px&#8221; box_shadow_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|desktop&#8221; box_shadow_horizontal__hover=&#8221;2px&#8221; button_text_color__hover_enabled=&#8221;on|desktop&#8221; button_text_color__hover=&#8221;#EDEDED&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;48px||||false|false&#8221; border_width_top=&#8221;1px&#8221; border_color_top=&#8221;#EDEDED&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; filter_saturate=&#8221;0%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text module_class=&#8221;tech-min&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#000000&#8243; custom_margin=&#8221;12px||||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Technology News \u2193<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px|4px|0px|4px|false|true&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;News &#038; Insights &#8211; Technology&#8221; url=&#8221;https:\/\/kbi.media\/topic\/business-news\/&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf1ea;||fa||400&#8243; icon_color=&#8221;#FFFFFF&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;24px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; link_option_url=&#8221;https:\/\/kbi.media\/topic\/business-news\/&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221;][\/et_pb_blurb][et_pb_post_slider posts_number=&#8221;4&#8243; include_categories=&#8221;3&#8243; show_arrows=&#8221;off&#8221; use_manual_excerpt=&#8221;off&#8221; excerpt_length=&#8221;420&#8243; show_meta=&#8221;off&#8221; image_placement=&#8221;left&#8221; use_bg_overlay=&#8221;off&#8221; use_text_overlay=&#8221;off&#8221; dot_nav_custom_color=&#8221;#000000&#8243; module_id=&#8221;kbi-slider&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#000000&#8243; header_font_size=&#8221;16px&#8221; header_line_height=&#8221;1.6em&#8221; body_text_align=&#8221;left&#8221; body_text_color=&#8221;#000000&#8243; body_font_size=&#8221;11px&#8221; meta_font=&#8221;||on||||||&#8221; meta_text_align=&#8221;center&#8221; meta_text_color=&#8221;#000000&#8243; meta_font_size=&#8221;12px&#8221; background_enable_color=&#8221;off&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;12px&#8221; button_text_color=&#8221;#000000&#8243; button_border_width=&#8221;0px&#8221; button_border_color=&#8221;#FFFFFF&#8221; button_letter_spacing=&#8221;4px&#8221; button_use_icon=&#8221;off&#8221; button_alignment=&#8221;center&#8221; button_custom_margin=&#8221;24px||||false|false&#8221; background_layout=&#8221;light&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;96px||128px||false|false&#8221; filter_saturate=&#8221;0%&#8221; child_filter_saturate=&#8221;0%&#8221; auto=&#8221;on&#8221; box_shadow_style_button=&#8221;preset4&#8243; box_shadow_horizontal_button=&#8221;-2px&#8221; box_shadow_vertical_button=&#8221;2px&#8221; box_shadow_color_button=&#8221;#000000&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal_button__hover_enabled=&#8221;on|desktop&#8221; box_shadow_horizontal_button__hover=&#8221;2px&#8221; child_filter_saturate__hover_enabled=&#8221;on|desktop&#8221; child_filter_saturate__hover=&#8221;100%&#8221; filter_saturate__hover_enabled=&#8221;on|hover&#8221; filter_saturate__hover=&#8221;100%&#8221;][\/et_pb_post_slider][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|||0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb icon_placement=&#8221;left&#8221; image_icon_width=&#8221;22px&#8221; content_max_width=&#8221;100%&#8221; disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px|4px|2px|12px|false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;post,contributor&#8221; use_taxonomy_terms=&#8221;on&#8221; include_terms=&#8221;3&#8243; post_number=&#8221;3&#8243; offset_number=&#8221;4&#8243; thumbnail_size=&#8221;300&#215;300&#8243; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;128&#8243; truncate_excerpt=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;93px&#8221; thumb_width=&#8221;20%&#8221; column_gutter=&#8221;1em&#8221; row_gutter=&#8221;1em&#8221; admin_label=&#8221;Divi FilterGrid&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; child_filter_saturate=&#8221;0%&#8221; border_width_all=&#8221;0px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|hover&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][et_pb_button button_url=&#8221;https:\/\/kbi.media\/topic\/technology-news\/&#8221; button_text=&#8221;More in Technology&#8221; button_alignment=&#8221;right&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;12px&#8221; button_text_color=&#8221;#000000&#8243; button_border_width=&#8221;0px&#8221; button_font=&#8221;Poppins||||on|||#000000|&#8221; button_use_icon=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_horizontal__hover_enabled=&#8221;on|hover&#8221; box_shadow_horizontal__hover=&#8221;2px&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;12px|4px|1px|4px|false|true&#8221; border_color_top=&#8221;#EDEDED&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Artificial Intelligence&#8221; url=&#8221;https:\/\/kbi.media\/topic\/technology-news\/artificial-intelligence\/&#8221; image=&#8221;https:\/\/kbi.media\/wp-content\/uploads\/2025\/10\/Snowflake_idCkdSg0B6_0.svg&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;24px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;-4px||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; child_filter_saturate=&#8221;0%&#8221; child_filter_brightness=&#8221;200%&#8221; link_option_url=&#8221;https:\/\/kbi.media\/topic\/technology-news\/artificial-intelligence\/&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; child_filter_saturate__hover_enabled=&#8221;on|hover&#8221; child_filter_saturate__hover=&#8221;100%&#8221; child_filter_brightness__hover_enabled=&#8221;on|hover&#8221; child_filter_brightness__hover=&#8221;100%&#8221; child_filter_invert__hover_enabled=&#8221;off|desktop&#8221; child_filter_invert__hover=&#8221;0%&#8221; image__hover_enabled=&#8221;off|desktop&#8221; image__hover=&#8221;https:\/\/kbi.media\/wp-content\/uploads\/2025\/10\/Snowflake_idCkdSg0B6_0.svg&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;post,contributor&#8221; use_taxonomy_terms=&#8221;on&#8221; include_terms=&#8221;19&#8243; post_number=&#8221;3&#8243; thumbnail_size=&#8221;300&#215;300&#8243; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;128&#8243; truncate_excerpt=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;93px&#8221; thumb_width=&#8221;20%&#8221; column_gutter=&#8221;1em&#8221; row_gutter=&#8221;1em&#8221; admin_label=&#8221;Divi FilterGrid&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; child_filter_saturate=&#8221;0%&#8221; border_width_all=&#8221;0px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|hover&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|||4px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Identity &#038; Access Management&#8221; url=&#8221;https:\/\/kbi.media\/topic\/technology-news\/identity-access-management\/&#8221; image=&#8221;https:\/\/kbi.media\/wp-content\/uploads\/2025\/10\/ManageEngine_idS-RVoMEd_0.svg&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;22px&#8221; image_last_edited=&#8221;off|desktop&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;|6px|6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; child_filter_saturate=&#8221;0%&#8221; child_filter_brightness=&#8221;0%&#8221; child_filter_invert=&#8221;100%&#8221; link_option_url=&#8221;https:\/\/kbi.media\/topic\/technology-news\/identity-access-management\/&#8221; global_colors_info=&#8221;{}&#8221; child_filter_saturate__hover_enabled=&#8221;on|desktop&#8221; child_filter_saturate__hover=&#8221;100%&#8221; child_filter_brightness__hover_enabled=&#8221;on|desktop&#8221; child_filter_brightness__hover=&#8221;100%&#8221; child_filter_invert__hover_enabled=&#8221;on|hover&#8221; child_filter_invert__hover=&#8221;0%&#8221; title__hover_enabled=&#8221;off|desktop&#8221; image__hover_enabled=&#8221;on|hover&#8221; image__hover=&#8221;https:\/\/kbi.media\/wp-content\/uploads\/2025\/10\/ManageEngine_idpYbvIeWo_0.svg&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;post,contributor&#8221; use_taxonomy_terms=&#8221;on&#8221; include_terms=&#8221;169&#8243; post_number=&#8221;3&#8243; thumbnail_size=&#8221;300&#215;300&#8243; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;128&#8243; truncate_excerpt=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;93px&#8221; thumb_width=&#8221;20%&#8221; column_gutter=&#8221;1em&#8221; row_gutter=&#8221;1em&#8221; admin_label=&#8221;Divi FilterGrid&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; child_filter_saturate=&#8221;0%&#8221; border_width_all=&#8221;0px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|hover&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Application Security&#8221; url=&#8221;https:\/\/kbi.media\/topic\/technology-news\/application-security\/&#8221; image=&#8221;https:\/\/kbi.media\/wp-content\/uploads\/2024\/01\/F5-Logo.svg&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;46px&#8221; _builder_version=&#8221;4.24.1&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;-12px||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; child_filter_saturate=&#8221;0%&#8221; child_filter_brightness=&#8221;0%&#8221; child_filter_invert=&#8221;100%&#8221; link_option_url=&#8221;https:\/\/kbi.media\/topic\/technology-news\/application-security\/&#8221; global_colors_info=&#8221;{}&#8221; child_filter_hue_rotate__hover_enabled=&#8221;off|desktop&#8221; child_filter_saturate__hover_enabled=&#8221;on|desktop&#8221; child_filter_saturate__hover=&#8221;100%&#8221; child_filter_invert__hover_enabled=&#8221;on|hover&#8221; child_filter_invert__hover=&#8221;0%&#8221; child_filter_contrast__hover_enabled=&#8221;off|hover&#8221; child_filter_brightness__hover_enabled=&#8221;on|desktop&#8221; child_filter_brightness__hover=&#8221;100%&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;post,contributor&#8221; use_taxonomy_terms=&#8221;on&#8221; include_terms=&#8221;18&#8243; post_number=&#8221;3&#8243; thumbnail_size=&#8221;300&#215;300&#8243; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;128&#8243; truncate_excerpt=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;93px&#8221; thumb_width=&#8221;20%&#8221; column_gutter=&#8221;1em&#8221; row_gutter=&#8221;1em&#8221; admin_label=&#8221;Divi FilterGrid&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; child_filter_saturate=&#8221;0%&#8221; border_width_all=&#8221;0px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|hover&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;12px|4px|1px|4px|false|true&#8221; border_color_top=&#8221;#EDEDED&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Data Security&#8221; url=&#8221;https:\/\/kbi.media\/topic\/technology-news\/data-security\/&#8221; image=&#8221;https:\/\/kbi.media\/wp-content\/uploads\/2026\/04\/Forcepoint-Logo-sqr.svg&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;22px&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; filter_saturate=&#8221;0%&#8221; link_option_url=&#8221;https:\/\/kbi.media\/topic\/technology-news\/data-security\/&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; child_filter_saturate__hover_enabled=&#8221;off|hover&#8221; child_filter_saturate__hover=&#8221;100%&#8221; child_filter_brightness__hover_enabled=&#8221;off|desktop&#8221; child_filter_brightness__hover=&#8221;100%&#8221; child_filter_invert__hover_enabled=&#8221;off|desktop&#8221; child_filter_invert__hover=&#8221;0%&#8221; image__hover_enabled=&#8221;off|hover&#8221; image__hover=&#8221;https:\/\/kbi.media\/wp-content\/uploads\/2024\/08\/Cohesity-Green-Logomark.svg&#8221; filter_saturate__hover_enabled=&#8221;on|hover&#8221; filter_saturate__hover=&#8221;100%&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;post,contributor&#8221; use_taxonomy_terms=&#8221;on&#8221; include_terms=&#8221;186&#8243; post_number=&#8221;3&#8243; thumbnail_size=&#8221;300&#215;300&#8243; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;128&#8243; truncate_excerpt=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;93px&#8221; thumb_width=&#8221;20%&#8221; column_gutter=&#8221;1em&#8221; row_gutter=&#8221;1em&#8221; admin_label=&#8221;Divi FilterGrid&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; child_filter_saturate=&#8221;0%&#8221; border_width_all=&#8221;0px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|hover&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|0px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Microsegmentation&#8221; url=&#8221;https:\/\/kbi.media\/topic\/technology-news\/microsegmentation\/&#8221; image=&#8221;https:\/\/kbi.media\/wp-content\/uploads\/2024\/07\/ColorTokens-Logomark.svg&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;22px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; child_filter_saturate=&#8221;0%&#8221; child_filter_brightness=&#8221;0%&#8221; child_filter_invert=&#8221;100%&#8221; link_option_url=&#8221;https:\/\/kbi.media\/topic\/technology-news\/microsegmentation\/&#8221; global_colors_info=&#8221;{}&#8221; child_filter_saturate__hover_enabled=&#8221;on|desktop&#8221; child_filter_saturate__hover=&#8221;100%&#8221; child_filter_brightness__hover_enabled=&#8221;on|desktop&#8221; child_filter_brightness__hover=&#8221;100%&#8221; child_filter_invert__hover_enabled=&#8221;on|hover&#8221; child_filter_invert__hover=&#8221;0%&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;post,contributor&#8221; use_taxonomy_terms=&#8221;on&#8221; include_terms=&#8221;169&#8243; post_number=&#8221;3&#8243; thumbnail_size=&#8221;300&#215;300&#8243; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;128&#8243; truncate_excerpt=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;93px&#8221; thumb_width=&#8221;20%&#8221; column_gutter=&#8221;1em&#8221; row_gutter=&#8221;1em&#8221; admin_label=&#8221;Divi FilterGrid&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; child_filter_saturate=&#8221;0%&#8221; border_width_all=&#8221;0px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|hover&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|||4px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Physical Security&#8221; url=&#8221;https:\/\/kbi.media\/topic\/technology-news\/physical-security\/&#8221; image=&#8221;https:\/\/kbi.media\/wp-content\/uploads\/2025\/11\/Genetec-Logomark.svg&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;24px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;-4px||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; link_option_url=&#8221;https:\/\/kbi.media\/topic\/technology-news\/physical-security\/&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;post,contributor&#8221; use_taxonomy_terms=&#8221;on&#8221; include_terms=&#8221;172&#8243; post_number=&#8221;3&#8243; thumbnail_size=&#8221;300&#215;300&#8243; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;128&#8243; truncate_excerpt=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;93px&#8221; thumb_width=&#8221;20%&#8221; column_gutter=&#8221;1em&#8221; row_gutter=&#8221;1em&#8221; admin_label=&#8221;Divi FilterGrid&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; child_filter_saturate=&#8221;0%&#8221; border_width_all=&#8221;0px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|hover&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;12px|4px|1px|4px|false|true&#8221; border_width_top=&#8221;1px&#8221; border_color_top=&#8221;#EDEDED&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Security Operations&#8221; url=&#8221;https:\/\/kbi.media\/topic\/technology-news\/security-operations\/&#8221; image=&#8221;https:\/\/kbi.media\/wp-content\/uploads\/2025\/07\/Slipstream-Cyber-WHT-Logomark.svg&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;36px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;-4px||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; link_option_url=&#8221;https:\/\/kbi.media\/topic\/technology-news\/security-operations\/&#8221; global_colors_info=&#8221;{}&#8221; child_filter_invert__hover_enabled=&#8221;off|hover&#8221; child_filter_invert__hover=&#8221;72%&#8221; image__hover_enabled=&#8221;on|hover&#8221; image__hover=&#8221;https:\/\/kbi.media\/wp-content\/uploads\/2025\/07\/Slipstream-Cyber-Logomark.svg&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;post,contributor&#8221; use_taxonomy_terms=&#8221;on&#8221; include_terms=&#8221;32&#8243; post_number=&#8221;3&#8243; thumbnail_size=&#8221;300&#215;300&#8243; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;128&#8243; truncate_excerpt=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;93px&#8221; thumb_width=&#8221;20%&#8221; column_gutter=&#8221;1em&#8221; row_gutter=&#8221;1em&#8221; admin_label=&#8221;Divi FilterGrid&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; child_filter_saturate=&#8221;0%&#8221; border_width_all=&#8221;0px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|hover&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;OT Security&#8221; url=&#8221;https:\/\/kbi.media\/topic\/technology-news\/ot-security\/&#8221; image=&#8221;https:\/\/kbi.media\/wp-content\/uploads\/2024\/03\/Nozomi-Minimal-Logo.svg&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;36px&#8221; _builder_version=&#8221;4.24.1&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;-10px||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; child_filter_saturate=&#8221;0%&#8221; child_filter_brightness=&#8221;200%&#8221; link_option_url=&#8221;https:\/\/kbi.media\/topic\/technology-news\/ot-security\/&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; child_filter_saturate__hover_enabled=&#8221;on|desktop&#8221; child_filter_saturate__hover=&#8221;100%&#8221; child_filter_brightness__hover_enabled=&#8221;on|desktop&#8221; child_filter_brightness__hover=&#8221;100%&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;post,contributor&#8221; use_taxonomy_terms=&#8221;on&#8221; include_terms=&#8221;166&#8243; post_number=&#8221;3&#8243; thumbnail_size=&#8221;300&#215;300&#8243; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;128&#8243; truncate_excerpt=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;93px&#8221; thumb_width=&#8221;20%&#8221; column_gutter=&#8221;1em&#8221; row_gutter=&#8221;1em&#8221; admin_label=&#8221;Divi FilterGrid&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; child_filter_saturate=&#8221;0%&#8221; border_width_all=&#8221;0px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|hover&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Exposure Management&#8221; url=&#8221;https:\/\/kbi.media\/topic\/business-news\/exposure-management\/&#8221; image=&#8221;https:\/\/kbi.media\/wp-content\/uploads\/2024\/03\/Tenable-Minimal-Logo.svg&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;32px&#8221; _builder_version=&#8221;4.24.1&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;-8px||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; child_filter_saturate=&#8221;0%&#8221; child_filter_brightness=&#8221;0%&#8221; child_filter_invert=&#8221;100%&#8221; link_option_url=&#8221;https:\/\/kbi.media\/topic\/business-news\/exposure-management\/&#8221; global_colors_info=&#8221;{}&#8221; child_filter_saturate__hover_enabled=&#8221;on|desktop&#8221; child_filter_saturate__hover=&#8221;100%&#8221; child_filter_brightness__hover_enabled=&#8221;on|desktop&#8221; child_filter_brightness__hover=&#8221;100%&#8221; child_filter_invert__hover_enabled=&#8221;on|hover&#8221; child_filter_invert__hover=&#8221;8%&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;post,contributor&#8221; use_taxonomy_terms=&#8221;on&#8221; include_terms=&#8221;160&#8243; post_number=&#8221;3&#8243; orderby=&#8221;rand&#8221; thumbnail_size=&#8221;300&#215;300&#8243; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;128&#8243; truncate_excerpt=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;93px&#8221; thumb_width=&#8221;20%&#8221; column_gutter=&#8221;1em&#8221; row_gutter=&#8221;1em&#8221; admin_label=&#8221;Divi FilterGrid&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; child_filter_saturate=&#8221;0%&#8221; border_width_all=&#8221;0px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|hover&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; disabled_on=&#8221;on|on|on&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;48px||||false|false&#8221; border_width_top=&#8221;1px&#8221; border_color_top=&#8221;#EDEDED&#8221; disabled=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; filter_saturate=&#8221;0%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text module_class=&#8221;global-min&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#000000&#8243; custom_margin=&#8221;12px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Global News \u2193<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px|4px|1px|4px|false|true&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_post_slider posts_number=&#8221;4&#8243; include_categories=&#8221;4&#8243; show_pagination=&#8221;off&#8221; excerpt_length=&#8221;180&#8243; use_text_overlay=&#8221;on&#8221; text_overlay_color=&#8221;rgba(0,0,0,0.64)&#8221; text_border_radius=&#8221;0px&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;16px&#8221; body_text_align=&#8221;left&#8221; body_text_color=&#8221;#FFFFFF&#8221; meta_font=&#8221;||on||||||&#8221; meta_text_align=&#8221;center&#8221; meta_text_color=&#8221;#FFFFFF&#8221; meta_font_size=&#8221;12px&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_border_width=&#8221;0px&#8221; button_border_color=&#8221;#FFFFFF&#8221; button_use_icon=&#8221;off&#8221; button_alignment=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;396px||24px||false|false&#8221; filter_saturate=&#8221;0%&#8221; child_filter_brightness=&#8221;60%&#8221; filter_saturate_last_edited=&#8221;off|desktop&#8221; box_shadow_style_button=&#8221;preset4&#8243; box_shadow_horizontal_button=&#8221;-2px&#8221; box_shadow_vertical_button=&#8221;2px&#8221; box_shadow_color_button=&#8221;#FFFFFF&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|hover&#8221; filter_saturate__hover=&#8221;100%&#8221; box_shadow_horizontal_button__hover=&#8221;2px&#8221; box_shadow_horizontal_button__hover_enabled=&#8221;on|hover&#8221;][\/et_pb_post_slider][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Global Updates&#8221; url=&#8221;https:\/\/kbi.media\/topic\/global-news\/&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf0ac;||fa||900&#8243; icon_color=&#8221;#FFFFFF&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;24px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; link_option_url=&#8221;https:\/\/kbi.media\/topic\/global-news\/&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;post,contributor&#8221; use_taxonomy_terms=&#8221;on&#8221; include_terms=&#8221;4&#8243; post_number=&#8221;4&#8243; offset_number=&#8221;4&#8243; thumbnail_size=&#8221;dfg_full&#8221; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;128&#8243; truncate_excerpt=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;93px&#8221; thumb_width=&#8221;20%&#8221; column_gutter=&#8221;1em&#8221; row_gutter=&#8221;1em&#8221; items_skin=&#8221;dp-dfg-skin-none&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; child_filter_saturate=&#8221;0%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|desktop&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;||||false|false&#8221; custom_margin_tablet=&#8221;||||false|false&#8221; custom_margin_phone=&#8221;||||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;12px|4px|0px|4px|false|true&#8221; border_width_top=&#8221;1px&#8221; border_color_top=&#8221;#EDEDED&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;ANZ Updates&#8221; url=&#8221;https:\/\/kbi.media\/topic\/global-news\/australia-new-zealand\/&#8221; image=&#8221;https:\/\/kbi.media\/wp-content\/uploads\/2023\/07\/ANZ.svg&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;36px&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; link_option_url=&#8221;https:\/\/kbi.media\/topic\/global-news\/australia-new-zealand\/&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;post,contributor&#8221; use_taxonomy_terms=&#8221;on&#8221; include_terms=&#8221;37&#8243; post_number=&#8221;5&#8243; thumbnail_size=&#8221;dfg_full&#8221; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;128&#8243; truncate_excerpt=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;93px&#8221; thumb_width=&#8221;20%&#8221; column_gutter=&#8221;1em&#8221; row_gutter=&#8221;1em&#8221; items_skin=&#8221;dp-dfg-skin-none&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; child_filter_saturate=&#8221;0%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|desktop&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221; East Asia and Pacific&#8221; url=&#8221;https:\/\/kbi.media\/topic\/global-news\/east-asia-and-pacific\/&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf57e;||fa||900&#8243; icon_color=&#8221;#FFFFFF&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;22px&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; link_option_url=&#8221;https:\/\/kbi.media\/topic\/global-news\/east-asia-and-pacific\/&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;post,contributor&#8221; use_taxonomy_terms=&#8221;on&#8221; include_terms=&#8221;38&#8243; post_number=&#8221;3&#8243; thumbnail_size=&#8221;dfg_full&#8221; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;128&#8243; truncate_excerpt=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;93px&#8221; thumb_width=&#8221;20%&#8221; column_gutter=&#8221;1em&#8221; row_gutter=&#8221;1em&#8221; items_skin=&#8221;dp-dfg-skin-none&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; child_filter_saturate=&#8221;0%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|desktop&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Europe and Central Asia&#8221; url=&#8221;https:\/\/kbi.media\/topic\/global-news\/europe-and-central-asia\/&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf7a2;||fa||900&#8243; icon_color=&#8221;#FFFFFF&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;22px&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; link_option_url=&#8221;https:\/\/kbi.media\/topic\/global-news\/europe-and-central-asia\/&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;post,contributor&#8221; use_taxonomy_terms=&#8221;on&#8221; include_terms=&#8221;39&#8243; post_number=&#8221;3&#8243; thumbnail_size=&#8221;dfg_full&#8221; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;128&#8243; truncate_excerpt=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;93px&#8221; thumb_width=&#8221;20%&#8221; column_gutter=&#8221;1em&#8221; row_gutter=&#8221;1em&#8221; items_skin=&#8221;dp-dfg-skin-none&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; child_filter_saturate=&#8221;0%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|desktop&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Latin America &#038; Caribbean&#8221; url=&#8221;https:\/\/kbi.media\/topic\/global-news\/latin-america-and-caribbean\/&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf57d;||fa||900&#8243; icon_color=&#8221;#FFFFFF&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;22px&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; link_option_url=&#8221;https:\/\/kbi.media\/topic\/global-news\/latin-america-and-caribbean\/&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;post,contributor&#8221; use_taxonomy_terms=&#8221;on&#8221; include_terms=&#8221;40&#8243; post_number=&#8221;3&#8243; thumbnail_size=&#8221;dfg_full&#8221; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;128&#8243; truncate_excerpt=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;93px&#8221; thumb_width=&#8221;20%&#8221; column_gutter=&#8221;1em&#8221; row_gutter=&#8221;1em&#8221; items_skin=&#8221;dp-dfg-skin-none&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; child_filter_saturate=&#8221;0%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|desktop&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;12px|4px|1px|4px|false|false&#8221; border_width_top=&#8221;1px&#8221; border_color_top=&#8221;#EDEDED&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Middle East and North Africa&#8221; url=&#8221;https:\/\/kbi.media\/topic\/global-news\/middle-east-and-north-africa\/&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf57c;||fa||900&#8243; icon_color=&#8221;#FFFFFF&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;24px&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; link_option_url=&#8221;https:\/\/kbi.media\/topic\/global-news\/middle-east-and-north-africa\/&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;post,contributor&#8221; use_taxonomy_terms=&#8221;on&#8221; include_terms=&#8221;41&#8243; post_number=&#8221;3&#8243; thumbnail_size=&#8221;dfg_full&#8221; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;128&#8243; truncate_excerpt=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;93px&#8221; thumb_width=&#8221;20%&#8221; column_gutter=&#8221;1em&#8221; row_gutter=&#8221;1em&#8221; items_skin=&#8221;dp-dfg-skin-none&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; child_filter_saturate=&#8221;0%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|desktop&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;North America&#8221; url=&#8221;https:\/\/kbi.media\/topic\/global-news\/north-america\/&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf57d;||fa||900&#8243; icon_color=&#8221;#FFFFFF&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;22px&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; link_option_url=&#8221;https:\/\/kbi.media\/topic\/global-news\/north-america\/&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;post,contributor&#8221; use_taxonomy_terms=&#8221;on&#8221; include_terms=&#8221;42&#8243; post_number=&#8221;3&#8243; thumbnail_size=&#8221;dfg_full&#8221; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;128&#8243; truncate_excerpt=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;93px&#8221; thumb_width=&#8221;20%&#8221; column_gutter=&#8221;1em&#8221; row_gutter=&#8221;1em&#8221; items_skin=&#8221;dp-dfg-skin-none&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; child_filter_saturate=&#8221;0%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|desktop&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|4px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;South Asia&#8221; url=&#8221;https:\/\/kbi.media\/topic\/global-news\/south-asia\/&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf57e;||fa||900&#8243; icon_color=&#8221;#FFFFFF&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;22px&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; link_option_url=&#8221;https:\/\/kbi.media\/topic\/global-news\/south-asia\/&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;post,contributor&#8221; use_taxonomy_terms=&#8221;on&#8221; include_terms=&#8221;43&#8243; post_number=&#8221;3&#8243; thumbnail_size=&#8221;dfg_full&#8221; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;128&#8243; truncate_excerpt=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;93px&#8221; thumb_width=&#8221;20%&#8221; column_gutter=&#8221;1em&#8221; row_gutter=&#8221;1em&#8221; items_skin=&#8221;dp-dfg-skin-none&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; child_filter_saturate=&#8221;0%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|desktop&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Sub-Saharan Africa&#8221; url=&#8221;https:\/\/kbi.media\/topic\/global-news\/sub-saharan-africa\/&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf57c;||fa||900&#8243; icon_color=&#8221;#FFFFFF&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;24px&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#000000&#8243; image_icon_custom_margin=&#8221;||||false|false&#8221; image_icon_custom_padding=&#8221;||||false|false&#8221; min_height=&#8221;42px&#8221; height=&#8221;42px&#8221; max_height=&#8221;42px&#8221; custom_margin=&#8221;||6px||false|false&#8221; custom_padding=&#8221;12px||2px|12px|false|false&#8221; link_option_url=&#8221;https:\/\/kbi.media\/topic\/global-news\/sub-saharan-africa\/&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][dpdfg_filtergrid custom_query=&#8221;advanced&#8221; multiple_cpt=&#8221;post,contributor&#8221; use_taxonomy_terms=&#8221;on&#8221; include_terms=&#8221;44&#8243; post_number=&#8221;3&#8243; thumbnail_size=&#8221;dfg_full&#8221; use_overlay=&#8221;off&#8221; title_link=&#8221;on&#8221; show_author=&#8221;off&#8221; show_content=&#8221;on&#8221; truncate_content=&#8221;128&#8243; truncate_excerpt=&#8221;on&#8221; show_filters=&#8221;off&#8221; show_pagination=&#8221;off&#8221; items_layout=&#8221;dp-dfg-layout-list&#8221; thumb_min_width=&#8221;93px&#8221; thumb_width=&#8221;20%&#8221; column_gutter=&#8221;1em&#8221; row_gutter=&#8221;1em&#8221; items_skin=&#8221;dp-dfg-skin-none&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; dpdfg_entry_title_text_color=&#8221;#000000&#8243; dpdfg_entry_title_font_size=&#8221;12px&#8221; dpdfg_entry_title_line_height=&#8221;1.2em&#8221; dpdfg_entry_meta_font=&#8221;||on||||||&#8221; dpdfg_entry_meta_text_color=&#8221;#000000&#8243; dpdfg_entry_meta_font_size=&#8221;12px&#8221; dpdfg_entry_meta_line_height=&#8221;1.6em&#8221; dpdfg_entry_summary_text_color=&#8221;#000000&#8243; dpdfg_entry_summary_font_size=&#8221;10px&#8221; dpdfg_entry_summary_line_height=&#8221;1.6em&#8221; child_filter_saturate=&#8221;0%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; filter_saturate__hover_enabled=&#8221;off|desktop&#8221; filter_saturate__hover=&#8221;100%&#8221; child_filter_saturate__hover_enabled=&#8221;on|desktop&#8221; child_filter_saturate__hover=&#8221;100%&#8221;][\/dpdfg_filtergrid][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p><div class=\"et_pb_module dpdfg_filtergrid dpdfg_filtergrid_0\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"et_pb_module_inner\">\n\t\t\t\t\t<!-- DPDFG Start Main Container --><div class=\"dp-dfg-container dp-dfg-layout-fullwidth dp-dfg-skin-none dp-dfg-skin-top-filters\" data-active-filter=\"all\" data-page=\"1\" data-found-posts=\"179\" data-post-number=\"1\" data-default-filter=\"All\" data-link-filter=\"\" data-cache=\"off\" data-ratio=\"1\" data-show-thumb=\"on\" data-action=\"link\" data-new-window=\"off\" data-filters=\"off\" data-date-filters=\"off\" data-multifilter=\"off|OR\" data-multilevel=\"off|AND|off\" data-sorting=\"off\" data-order=\"DESC\" data-orderby=\"date\" data-initorderby=\"date\" data-url-navigation=\"off\" data-url-history=\"on|reload\" data-ajax-filters=\"off\" data-doing-ajax=\"off\" data-module=\"dpdfg_filtergrid_0\" data-search=\"off\" data-search-position=\"above\" data-terms-tags=\"on\" data-pagination=\"off\" data-filter-method=\"default\" data-third-party=\"\" data-lightbox=\"on|||\" data-video-preview=\"off\" data-no-init=\"off\" data-st=\"on\" data-no-results=\"off\"><div class=\"dp-dfg-items\"><article id=\"post-25566960\" class=\"dp-dfg-item post-25566960 contributor type-contributor status-publish format-standard has-post-thumbnail hentry category-network-security category-security-awareness\"     data-position=\"0\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/contributor\/everything-has-changed-as-cyber-threats-explode-across-physical-world\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/04\/simon-cook-genetec_da137112954686742ec4a2a346ddbfd9_2000.jpg\" alt=\"\u2018Everything Has Changed\u2019 as Cyber Threats Explode Across Physical World\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">\u2018Everything Has Changed\u2019 as Cyber Threats Explode Across Physical World<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><span class=\"author vcard\"><a href=\"https:\/\/kbi.media\/author\/kb\/\">From  Karissa Breen<\/a> | <\/span><span class=\"terms\"><a href=\"https:\/\/kbi.media\/topic\/technology-news\/network-security\/\" class=\"term-link network-security taxonomy-category\" data-term-id=\"29\">Network Security<\/a><span class=\"term-separator\">,<\/span> <a href=\"https:\/\/kbi.media\/topic\/technology-news\/security-awareness\/\" class=\"term-link security-awareness taxonomy-category\" data-term-id=\"31\">Security Awareness<\/a><\/span><\/div><div class=\"et_pb_button_wrapper read-more-wrapper\"><a class=\"et_pb_button dp-dfg-more-button\" href=\"https:\/\/kbi.media\/contributor\/everything-has-changed-as-cyber-threats-explode-across-physical-world\/\" data-icon=\"&#x35;\" >Read<\/a><\/div><\/article><!-- DPDFG End Post Item Container --><\/div><div class=\"dp-dfg-announcer screen-reader-text\" aria-live=\"polite\" aria-atomic=\"true\"><\/div><\/div><!-- DPDFG End Main Container --><div class=\"dp-dfg-data dp-dfg-hide\"><div class=\"dp-dfg-ajax-data\" data-ajax=\"{&quot;custom_query&quot;:&quot;advanced&quot;,&quot;support_for&quot;:&quot;sfp&quot;,&quot;sfp_id&quot;:&quot;&quot;,&quot;include_categories&quot;:&quot;&quot;,&quot;current_post_type&quot;:&quot;on&quot;,&quot;multiple_cpt&quot;:&quot;contributor&quot;,&quot;use_taxonomy_terms&quot;:&quot;off&quot;,&quot;multiple_taxonomies&quot;:&quot;category&quot;,&quot;taxonomies_relation&quot;:&quot;OR&quot;,&quot;include_terms&quot;:&quot;&quot;,&quot;terms_relation&quot;:&quot;IN&quot;,&quot;include_children_terms&quot;:&quot;on&quot;,&quot;exclude_taxonomies&quot;:&quot;category&quot;,&quot;exclude_taxonomies_relation&quot;:&quot;OR&quot;,&quot;exclude_terms&quot;:&quot;&quot;,&quot;meta_query&quot;:&quot;off&quot;,&quot;meta_cf_key&quot;:&quot;&quot;,&quot;meta_cf_value&quot;:&quot;&quot;,&quot;meta_cf_compare&quot;:&quot;Equal To&quot;,&quot;meta_cf_type&quot;:&quot;CHAR&quot;,&quot;related_taxonomies&quot;:&quot;&quot;,&quot;related_criteria&quot;:&quot;one_in_one&quot;,&quot;posts_ids&quot;:&quot;&quot;,&quot;post_number&quot;:&quot;1&quot;,&quot;offset_number&quot;:&quot;0&quot;,&quot;order&quot;:&quot;DESC&quot;,&quot;orderby&quot;:&quot;date&quot;,&quot;meta_key&quot;:&quot;&quot;,&quot;meta_type&quot;:&quot;CHAR&quot;,&quot;show_private&quot;:&quot;off&quot;,&quot;current_author&quot;:&quot;off&quot;,&quot;sticky_posts&quot;:&quot;on&quot;,&quot;remove_current_post&quot;:&quot;off&quot;,&quot;no_results&quot;:&quot;No results found.&quot;,&quot;thumbnail_action&quot;:&quot;link&quot;,&quot;gallery_cf_name&quot;:&quot;&quot;,&quot;lightbox_elements&quot;:&quot;on|||&quot;,&quot;show_thumbnail&quot;:&quot;on&quot;,&quot;thumbnail_size&quot;:&quot;dfg_full&quot;,&quot;t_alt&quot;:&quot;title&quot;,&quot;use_overlay&quot;:&quot;off&quot;,&quot;show_title&quot;:&quot;on&quot;,&quot;title_link&quot;:&quot;off&quot;,&quot;show_post_meta&quot;:&quot;on&quot;,&quot;meta_separator&quot;:&quot; | &quot;,&quot;show_author&quot;:&quot;on&quot;,&quot;author_prefix_text&quot;:&quot;From &quot;,&quot;show_date&quot;:&quot;off&quot;,&quot;date_format&quot;:&quot;F j, Y&quot;,&quot;show_terms&quot;:&quot;on&quot;,&quot;show_terms_taxonomy&quot;:&quot;category&quot;,&quot;terms_separator&quot;:&quot;,&quot;,&quot;terms_links&quot;:&quot;on&quot;,&quot;show_comments&quot;:&quot;off&quot;,&quot;show_content&quot;:&quot;off&quot;,&quot;content_length&quot;:&quot;excerpt&quot;,&quot;truncate_content&quot;:&quot;120&quot;,&quot;truncate_excerpt&quot;:&quot;off&quot;,&quot;strip_html&quot;:&quot;on&quot;,&quot;action_button&quot;:&quot;off&quot;,&quot;action_button_text&quot;:&quot;Click Action Button&quot;,&quot;read_more&quot;:&quot;on&quot;,&quot;read_more_text&quot;:&quot;Read&quot;,&quot;read_more_window&quot;:&quot;off&quot;,&quot;show_custom_fields&quot;:&quot;off&quot;,&quot;custom_fields&quot;:&quot;&quot;,&quot;show_custom_content&quot;:&quot;off&quot;,&quot;custom_content_container&quot;:&quot;on&quot;,&quot;custom_url&quot;:&quot;off&quot;,&quot;custom_url_field_name&quot;:&quot;&quot;,&quot;custom_url_target&quot;:&quot;same&quot;,&quot;show_video_preview&quot;:&quot;off&quot;,&quot;video_module&quot;:&quot;off&quot;,&quot;video_action&quot;:&quot;play&quot;,&quot;video_action_priority&quot;:&quot;on&quot;,&quot;video_overlay&quot;:&quot;on&quot;,&quot;video_overlay_icon&quot;:&quot;on&quot;,&quot;video_icon&quot;:&quot;&amp;#x49;||divi||400&quot;,&quot;video_icon_color&quot;:&quot;#ffffff&quot;,&quot;video_overlay_color&quot;:&quot;rgba(0,0,0,0.6)&quot;,&quot;show_filters&quot;:&quot;off&quot;,&quot;multilevel&quot;:&quot;off&quot;,&quot;multilevel_hierarchy&quot;:&quot;off&quot;,&quot;multilevel_hierarchy_tax&quot;:&quot;[{\\&quot;name\\&quot;:\\&quot;category\\&quot;,\\&quot;label\\&quot;:\\&quot;\\&quot;,\\&quot;all\\&quot;:\\&quot;\\&quot;}]&quot;,&quot;multilevel_relation&quot;:&quot;AND&quot;,&quot;multilevel_tax_data&quot;:&quot;[{\\&quot;name\\&quot;:\\&quot;category\\&quot;,\\&quot;label\\&quot;:\\&quot;\\&quot;,\\&quot;all\\&quot;:\\&quot;\\&quot;}]&quot;,&quot;filter_children_terms&quot;:&quot;on&quot;,&quot;use_custom_terms_filters&quot;:&quot;off&quot;,&quot;filter_taxonomies&quot;:&quot;category&quot;,&quot;filter_terms&quot;:&quot;&quot;,&quot;default_filter&quot;:&quot;All&quot;,&quot;filters_order&quot;:&quot;ASC&quot;,&quot;filters_sort&quot;:&quot;id&quot;,&quot;filters_custom&quot;:&quot;&quot;,&quot;hide_all&quot;:&quot;off&quot;,&quot;all_text&quot;:&quot;All&quot;,&quot;s_df&quot;:&quot;off&quot;,&quot;df_col&quot;:&quot;post_date&quot;,&quot;s_df_y&quot;:&quot;on&quot;,&quot;s_df_m&quot;:&quot;on&quot;,&quot;filter_layout&quot;:&quot;button&quot;,&quot;multifilter&quot;:&quot;off&quot;,&quot;multifilter_relation&quot;:&quot;OR&quot;,&quot;show_sort&quot;:&quot;off&quot;,&quot;cf_ob_name&quot;:&quot;&quot;,&quot;cf_ob_type&quot;:&quot;CHAR&quot;,&quot;ajax_filters&quot;:&quot;off&quot;,&quot;cache_on_page&quot;:&quot;off&quot;,&quot;show_pagination&quot;:&quot;off&quot;,&quot;pagination_type&quot;:&quot;paged&quot;,&quot;ajax_load_more_text&quot;:&quot;Load More&quot;,&quot;previous_icon&quot;:&quot;&amp;#x34;||divi||400&quot;,&quot;next_icon&quot;:&quot;&amp;#x35;||divi||400&quot;,&quot;previous_text&quot;:&quot;&quot;,&quot;next_text&quot;:&quot;&quot;,&quot;pagination_pages&quot;:&quot;2&quot;,&quot;items_layout&quot;:&quot;dp-dfg-layout-fullwidth&quot;,&quot;thumb_width&quot;:&quot;33%&quot;,&quot;items_width&quot;:&quot;20%&quot;,&quot;items_skin&quot;:&quot;dp-dfg-skin-none&quot;,&quot;primary_view&quot;:&quot;[{\\&quot;name\\&quot;:\\&quot;thumbnail\\&quot;,\\&quot;show\\&quot;:\\&quot;on\\&quot;},{\\&quot;name\\&quot;:\\&quot;overlay\\&quot;,\\&quot;show\\&quot;:\\&quot;on\\&quot;},{\\&quot;name\\&quot;:\\&quot;title\\&quot;,\\&quot;show\\&quot;:\\&quot;off\\&quot;},{\\&quot;name\\&quot;:\\&quot;meta\\&quot;,\\&quot;show\\&quot;:\\&quot;off\\&quot;},{\\&quot;name\\&quot;:\\&quot;ext\\&quot;,\\&quot;show\\&quot;:\\&quot;off\\&quot;},{\\&quot;name\\&quot;:\\&quot;content\\&quot;,\\&quot;show\\&quot;:\\&quot;off\\&quot;},{\\&quot;name\\&quot;:\\&quot;action_button\\&quot;,\\&quot;show\\&quot;:\\&quot;off\\&quot;},{\\&quot;name\\&quot;:\\&quot;read_more_button\\&quot;,\\&quot;show\\&quot;:\\&quot;off\\&quot;},{\\&quot;name\\&quot;:\\&quot;custom_content\\&quot;,\\&quot;show\\&quot;:\\&quot;off\\&quot;}]&quot;,&quot;secondary_view&quot;:&quot;[{\\&quot;name\\&quot;:\\&quot;thumbnail\\&quot;,\\&quot;show\\&quot;:\\&quot;off\\&quot;},{\\&quot;name\\&quot;:\\&quot;title\\&quot;,\\&quot;show\\&quot;:\\&quot;on\\&quot;},{\\&quot;name\\&quot;:\\&quot;meta\\&quot;,\\&quot;show\\&quot;:\\&quot;on\\&quot;},{\\&quot;name\\&quot;:\\&quot;ext\\&quot;,\\&quot;show\\&quot;:\\&quot;on\\&quot;},{\\&quot;name\\&quot;:\\&quot;content\\&quot;,\\&quot;show\\&quot;:\\&quot;on\\&quot;},{\\&quot;name\\&quot;:\\&quot;action_button\\&quot;,\\&quot;show\\&quot;:\\&quot;on\\&quot;},{\\&quot;name\\&quot;:\\&quot;read_more_button\\&quot;,\\&quot;show\\&quot;:\\&quot;on\\&quot;},{\\&quot;name\\&quot;:\\&quot;custom_content\\&quot;,\\&quot;show\\&quot;:\\&quot;on\\&quot;}]&quot;,&quot;popup_template&quot;:&quot;default&quot;,&quot;popup_link_target&quot;:&quot;none&quot;,&quot;popup_code&quot;:&quot;&quot;,&quot;use_overlay_icon&quot;:&quot;on&quot;,&quot;hover_icon&quot;:&quot;&amp;#xe050;||divi||400&quot;,&quot;overlay_icon_color&quot;:&quot;#2ea3f2&quot;,&quot;hover_overlay_color&quot;:&quot;rgba(255,255,255,0.9)&quot;,&quot;show_search&quot;:&quot;off&quot;,&quot;search_position&quot;:&quot;above&quot;,&quot;orderby_search&quot;:&quot;on&quot;,&quot;relevanssi&quot;:&quot;off&quot;,&quot;bg_items&quot;:&quot;&quot;,&quot;admin_label&quot;:&quot;&quot;,&quot;module_id&quot;:&quot;&quot;,&quot;module_class&quot;:&quot;&quot;,&quot;dpdfg_entry_title_level&quot;:&quot;h2&quot;,&quot;read_more_button_icon&quot;:&quot;&quot;,&quot;action_button_icon&quot;:&quot;&quot;,&quot;the_ID&quot;:0,&quot;the_author&quot;:1,&quot;seed&quot;:5695,&quot;query_context&quot;:&quot;initial_query&quot;,&quot;conditional_tags&quot;:{&quot;is_user_logged_in&quot;:&quot;off&quot;,&quot;is_front_page&quot;:&quot;off&quot;,&quot;is_singular&quot;:&quot;off&quot;,&quot;is_archive&quot;:&quot;off&quot;,&quot;is_search&quot;:&quot;off&quot;,&quot;is_tax&quot;:&quot;off&quot;,&quot;is_author&quot;:&quot;off&quot;,&quot;is_date&quot;:&quot;off&quot;,&quot;is_post_type&quot;:&quot;off&quot;},&quot;query_var&quot;:{&quot;s&quot;:&quot;&quot;,&quot;year&quot;:&quot;&quot;,&quot;monthnum&quot;:&quot;&quot;,&quot;day&quot;:&quot;&quot;,&quot;post_type&quot;:&quot;&quot;},&quot;custom_data&quot;:[]}\"><\/div><div class=\"dp-dfg-no-results-data\"><div class=\"dp-dfg-no-results\">No results found.<\/div><\/div><div class=\"dp-dfg-loader-data\"><\/div><\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div><div class=\"et_pb_module dpdfg_filtergrid dpdfg_filtergrid_1\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"et_pb_module_inner\">\n\t\t\t\t\t<!-- DPDFG Start Main Container --><div class=\"dp-dfg-container &#8221;dp-dfg-layout-list&#8221; dp-dfg-skin-default dp-dfg-skin-top-filters\" data-active-filter=\"all\" data-page=\"1\" data-found-posts=\"743\" data-post-number=\"0\" data-default-filter=\"All\" data-link-filter=\"\" data-cache=\"off\" data-ratio=\"0\" data-show-thumb=\"on\" data-action=\"link\" data-new-window=\"off\" data-filters=\"off\" data-date-filters=\"off\" data-multifilter=\"off|OR\" data-multilevel=\"off|AND|off\" data-sorting=\"off\" data-order=\"DESC\" data-orderby=\"date\" data-initorderby=\"date\" data-url-navigation=\"off\" data-url-history=\"on|reload\" data-ajax-filters=\"off\" data-doing-ajax=\"off\" data-module=\"dpdfg_filtergrid_1\" data-search=\"off\" data-search-position=\"above\" data-terms-tags=\"on\" data-pagination=\"&#8221;off&#8221;\" data-filter-method=\"default\" data-third-party=\"\" data-lightbox=\"on|||\" data-video-preview=\"off\" data-no-init=\"off\" data-st=\"on\" data-no-results=\"off\"><div class=\"dp-dfg-items\"><article id=\"post-25567034\" class=\"dp-dfg-item post-25567034 post type-post status-publish format-standard has-post-thumbnail hentry category-banking-finance category-continuous-business category-crypto-blockchain-quantum\"     data-position=\"0\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/why-trust-is-reshaping-digital-assets\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/04\/Hai-Nakash-NAX-Capital.jpg\" alt=\"Why Trust Is Reshaping Digital Assets\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Why Trust Is Reshaping Digital Assets<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">Introduction\r\n\r\nFor years, digital assets have been spoken about in extremes. Either as the future of finance, or as a space filled with risk and uncertainty. In my view, the truth sits somewhere in the middle.\r\n\r\nOver the past decade, digital assets have delivered extraordinary returns. Entire fortunes were built in a relatively short period. Yet many investors entered without the knowledge or protection required to navigate the space properly. Losses were not only the result of volatility, but of poor security, weak systems, and a lack of trusted guidance.\r\n\r\nCyber security, custody, compliance and education have moved to the centre of the discussion.\r\n\r\nSerious investors are no longer simply asking what to buy. They are asking how their capital is protected, how risk is managed, and who stands behind the system.\r\n\r\nIn Melbourne, we have been building quietly around these exact questions.\r\nThe Beginning\r\nI founded NAX Capital to provide digital asset solutions for family offices, high net worth individuals and sophisticated investors built on institutional grade security. And while digital assets tend to be cryptocurrencies, the term digital asset solutions reflects a deliberate shift away from the language of crypto trading towards a broader, more institutional approach to digital finance.\r\n\r\nThis positioning better reflects our multi-service offering, which includes brokerage, exchange services, asset management and investor education, all under one umbrella.\r\n\r\nAt the core of our model is something rarely seen in Australia. A closed loop investment environment, where brokerage, custody, and execution sit within one controlled system. It is a structure more commonly associated with global platforms such as Robinhood in the United States or Wealthsimple in Canada, but applied here with a far heavier emphasis on security and investor protection.\r\n\r\nOver the past three years, this approach has delivered a consistent outcome. Zero breaches, zero successful fraud incidents. In a sector where that is far from the norm, it is not a small detail.\r\n\r\nIn a market like Australia, and within communities where trust is built carefully over time, that difference matters.\r\n\r\nWe started the company on a purpose-built technology platform and a strict operational model designed to protect clients from cyber threats, phishing and impersonation. At a time when Australians are losing billions annually to scams, the emphasis on prevention is central to the company\u2019s identity.\r\n\r\nCapital protection sits at the centre of our model. Assets are secured in institutional grade cold storage, supported by advanced cyber security systems designed to safeguard portfolios across the entire investment cycle. The objective is clear. Remove avoidable risk, while maintaining exposure to opportunity.\r\nOperating Securely\r\nIn order to sustain a trading platform, you need the highest level of cyber security. Our infrastructure is built to integrate with major financial institutions, positioning it closer to traditional banking standards than many crypto-native platforms.\r\n\r\nRecent scam data underscores why that matters. In figures just released by the ACCC, Australians lost $2.18 billion to scams in 2025 with the top five being investment scams at $837 million in losses, payment redirection scams $166 million, romance scams $139 million, phishing scams $97 million, and remote access scams for $69 million.\r\n\r\nOur focus on security and trust is deeply personal. In 2014, my grandmother in Israel lost the equivalent of $150,000 Australian dollars in a so-called \u201cpig butchering\u201d scam, a long-term fraud in which victims are manipulated into making increasingly large investments before perpetrators disappear.\r\nConclusion\r\nThat\u2019s why I moved into this space \u2013 to protect people and make it safer for them to invest.\r\n\r\nBecause in the end, the divide is not between those who invest and those who do not. It is between those who understand the system they are entering, and those who do not.\r\n\r\nThe opportunity remains significant. But it will increasingly belong to those who combine ambition with education, and who choose to operate within environments designed not just for stability, but for protection.\r\n\r\nFor more information visit naxcapital.com.au.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25563996\" class=\"dp-dfg-item post-25563996 post type-post status-publish format-standard has-post-thumbnail hentry category-encryption-cipher category-europe-and-central-asia category-government-policy category-identity-access-management category-secure-communications category-security-operations\"     data-position=\"1\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/how-blackberry-uem-enables-trusted-mobile-operations-across-the-german-federal-government\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2024\/07\/Blackberry-Logo.svg\" alt=\"How BlackBerry UEM Enables Trusted Mobile Operations Across the German Federal Government\" width=\"0\" height=\"0\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">How BlackBerry UEM Enables Trusted Mobile Operations Across the German Federal Government<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">Government in Constant Motion\r\nFederal government work now extends beyond offices to secure facilities, international forums, temporary work sites and even on the daily commute. Mobility has shifted from a supporting function into a core pillar of daily operations while expectations around security, sovereignty, and regulatory compliance have intensified.\r\nThis creates tension as officials need to act quickly and access information from anywhere while security teams want to maintain strict control over sensitive data. It's well known that when mobile access isn\u2019t managed effectively, small gaps begin to emerge that put data governance at risk. Devices drift out of policy, applications are configured inconsistently, and over time these gaps erode confidence and increase exposure.\r\nConsider a common scenario where a senior official reviews a time-sensitive protected briefing on a government device while in transit. In that moment, security can\u2019t become a separate task or hinder the timely review of the senior official. The device receiving the content for review must already be authenticated and encrypted, so access is immediately secure. The experience degrades when controls are fragmented and not an inherent part of the user experience. Issues of slow access, multiple validation steps, and technical inconsistencies turn operational friction into institutional risk.\r\nFor mobile government work to function at scale and wherever government officials need to work, security must be embedded directly into how devices, applications, and access are governed from the start. This is where BlackBerry\u00ae Unified Endpoint Management (UEM) comes in. Certified by the German Federal Office for Information Security, or BSI, BlackBerry UEM enables mobile devices, applications, and data to operate within clearly defined governance boundaries through architecture that embeds security into every layer.\r\n\r\nTrust, Certification, and the German Federal Context\r\nLike many of the large governments, Germany\u2019s federal environment operates under strict requirements for data protection, auditability, and sovereign control. The BSI certification serves as the central authority for defining and validating information security standards across public institutions and critical infrastructure. Its certification programs are among the most rigorous in Europe.\r\nBSI certification is not a procedural checkbox. Platforms are assessed against detailed security profiles, architecture integrity, cryptographic implementation, and the ability to enforce policy reliably under real world conditions. For federal institutions, this certification functions as a gate of trust. Systems that meet BSI standards can be relied upon because their security controls are independently validated and verifiable. This assurance becomes foundational as mobile work expands. The question becomes how to maintain sovereign control without creating bureaucratic bottlenecks. The answer lies in maintaining consistent governance, visibility, and compliance across the entire mobile environment.\r\n\r\nA Day in the Life of Secure Mobile Operations\r\nAt 6:45 a.m., a senior official boards a train to Berlin and looks at their device. Secure briefings appear instantly, without loading screens or authentication prompts. Identity checks, encryption, and policy validation have already been handled in the background, all unseen and uncompromising.\r\nThat experience is the result of enrollment during provisioning. From first power-on, security policies are built in, with encryption, authentication standards, and compliance requirements operating silently. Administrators retain full visibility across thousands of devices from a single console, while the official simply uses a device that works.\r\nBy mid-morning, collaboration is in full swing across ministries. Officials review and annotate documents in real time as secure messages move effortlessly through approved applications. Managed containers quietly separate government and personal data, allowing people to move between apps and share information as naturally as they would in any modern workspace, while sensitive content remains encrypted and governed at every step.\r\nThe afternoon brings movement, from ministry offices in Berlin to a secure facility outside of Berlin and travel to a venue in Brussels. Networks and locations change, but the experience does not. Whether connecting over public transit Wi-Fi or a classified government network, the device operates under the same consistent policies. Geography shifts but security remains constant.\r\nThroughout the day, BlackBerry UEM works quietly in the background. Devices are continuously evaluated against defined standards, configuration drift is identified and corrected before it becomes visible, and compliance reports generate automatically. Audits become routine oversight rather than disruptive events, and updated policies deploy across the entire fleet without manual effort. And when BSI standards evolve, BlackBerry UEM responds.\r\nBy day\u2019s end, collaboration has persisted, decisions have advanced, coordination has remained fluid, and operational continuity has been preserved. Security has remained largely invisible, yet it has governed every interaction.\r\n\r\nMobility Without Compromise\r\nThis is what secure mobility looks like at a federal scale when it is architected correctly. With BlackBerry UEM, administrators and users get the speed and flexibility modern government needs while preserving the control and sovereignty it requires. The platform supports regulatory compliance through automated enforcement and continuous verification. It maintains institutional trust through BSI certified security controls that are independently validated and consistently applied. It enables reliable mobile operations by eliminating the gaps and inconsistencies that turn mobile work into operational risk.\r\nEndpoint management is no longer a backend technical function. It is a strategic foundation for modern government operations, one that determines whether mobility becomes a force multiplier or a persistent vulnerability.\r\nWhen security is embedded directly into how devices, applications, and access are governed, mobility becomes a strength rather than a risk. BlackBerry UEM delivers this through architecture that makes security automatic, governance continuous, and trust verifiable across the entire mobile environment.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25566657\" class=\"dp-dfg-item post-25566657 post type-post status-publish format-standard has-post-thumbnail hentry category-application-security category-cyber-resilience\"     data-position=\"2\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/is-this-the-end-of-the-road-for-appsec\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/04\/ff-32b8f7059cc9244f8cf8ec0c9652155f-ff-Danhieux_Pieter_016-sf808880-scaled.jpg\" alt=\"Is This the End of the Road for AppSec?\" width=\"1200\" height=\"1200\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Is This the End of the Road for AppSec?<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">Maintaining a clear line of sight over the AI coding tools and model control platforms in use, alongside a realistic assessment of the security capabilities of the developers deploying them, is becoming a critical requirement for enterprises.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25563994\" class=\"dp-dfg-item post-25563994 post type-post status-publish format-standard has-post-thumbnail hentry category-crypto-blockchain-quantum category-cyber-resilience category-encryption-cipher category-secure-communications category-security-operations\"     data-position=\"3\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/the-mission-critical-standard-why-mission-certified-communications-are-the-future-of-high-stakes-operations\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2024\/07\/Blackberry-Logo.svg\" alt=\"The Mission-Critical Standard: Why Mission-Certified Communications Are the Future of High-Stakes Operations\" width=\"0\" height=\"0\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">The Mission-Critical Standard: Why Mission-Certified Communications Are the Future of High-Stakes Operations<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">Mission-certified communications deliver secure, unified support in high-stakes operations.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25566550\" class=\"dp-dfg-item post-25566550 post type-post status-publish format-standard has-post-thumbnail hentry category-continuous-business category-identity-access-management category-leadership category-security-operations\"     data-position=\"4\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/break-glass-accounts-essential-security-or-a-cyber-risk\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2025\/03\/scott-hesford.jpg\" alt=\"Break Glass Accounts: Essential Security or a Cyber Risk?\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Break Glass Accounts: Essential Security or a Cyber Risk?<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">Enterprises need a zero trust mindset to emergency access: least privilege, continuous monitoring and no implicit trust, even in a crisis. Break glass accounts should be treated as exceptions, not shortcuts, and governed accordingly.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25563992\" class=\"dp-dfg-item post-25563992 post type-post status-publish format-standard has-post-thumbnail hentry category-encryption-cipher category-security-operations category-threat-intelligence\"     data-position=\"5\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/the-latest-security-vulnerability-exploit-doesnt-break-your-encryption-it-bypasses-it\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2024\/07\/Blackberry-Logo.svg\" alt=\"The Latest Security Vulnerability Exploit Doesn&#8217;t Break Your Encryption. IT Bypasses IT.\" width=\"0\" height=\"0\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">The Latest Security Vulnerability Exploit Doesn&#8217;t Break Your Encryption. IT Bypasses IT.<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">A zero-day vulnerability exploit shows device compromises can bypass encryption entirely.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25563948\" class=\"dp-dfg-item post-25563948 post type-post status-publish format-standard has-post-thumbnail hentry category-data-management category-data-security category-governance-risk category-identity-access-management\"     data-position=\"6\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/building-secure-automation-three-core-pillars-that-make-an-ipaas-enterprise-ready\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/04\/ff-3f0c6f61053dafd2479ec1764d305014-ff-John-Deeb-Workato.jpg\" alt=\"Building Secure Automation: Three Core Pillars That Make an iPaaS Enterprise-ready\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Building Secure Automation: Three Core Pillars That Make an iPaaS Enterprise-ready<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">Introduction\r\nSecurity and governance are no longer back-office concerns, and in Australia, the stakes have never been higher. After a record 1,113 notifiable data breaches in 2024, the OAIC logged more than 530 additional breaches in the first half of 2025, with malicious attacks continuing to dominate. At the same time, major privacy reforms (e.g. updates to the Privacy Act 1988) that took effect this year have expanded enforcement powers and increased the cost of failure. For many enterprises adopting integration platforms as a service (iPaaS), the question isn\u2019t how quickly they can automate, but whether they can do so safely and with confidence.\r\n\r\nThe term \u201centerprise-grade\u201d is often used loosely, but when it comes to an integration platform as a service (iPaaS) solution, the distinction matters. An iPaaS connects your critical business systems to ensure data, processes, and workflows stay consistent across the organisation. As a platform that connects with vast amounts of information, a business\u2019s iPaaS naturally becomes one of the most data-sensitive platforms.\r\n\r\nHere are three foundational features that are essential for an iPaaS that scales securely.\r\n\r\n \t\r\nRole-based Access Controls That Protect Without Slowing Teams Down\r\n\r\n\r\nAs an organisation\u2019s automation program matures, more employees are building and managing workflows. This creates opportunity, but also risks, as anyone could alter a critical integration or view sensitive data.\u00a0\r\n\r\nTo keep them secure, a modern iPaaS solution must provide granular, pre-defined system roles and follow the principle of least privilege. Users should only have access to the information necessary to perform their role. For example, an \u201cAdmin\u201d should be able to perform any set of actions, while an \u201cOperator\u201d can only view assets and test specific automations.\r\n\r\nStrong governance doesn\u2019t have to limit agility. When done well, it empowers teams to innovate safely within clear boundaries.\r\n\r\n \t\r\nEnterprise Key Management (EKM) and External Secrets Management That Enables Control Over Data\r\n\r\n\r\nFor highly regulated industries, such as financial services or healthcare, enterprise key management (EKM) is a non-negotiable. Provided via an iPaaS like Workato, EKM gives organisations full control over how their data is encrypted and who can access it.\r\n\r\nUsing EKM, businesses can use their preferred key management service, such as AWS Key Management Service, and have full control over a key\u2019s lifecycle. This ensures encryption, rotation, and deletion are all managed internally, meeting strict compliance frameworks such as SOC 2, GDPR and IRAP.\u00a0\r\n\r\nEKM reinforces a simple but powerful idea: data ownership should remain with the organisation, not the vendor.\r\n\r\nCompliance frameworks such as SOC 2 and ISO 27001 mandate proper credential lifecycle management, including regular rotation. iPaaS management features can make these requirements achievable at scale by replacing hardcoded credentials with references to your central secrets vault. This architecture ensures you can rotate passwords and API keys according to policy without the operational burden of manually updating every integration that depends on them.\r\n\r\n \t\r\n100% Data Residency and Processing Flexibility That Supports Global Scale\r\n\r\n\r\nAs organisations expand, data sovereignty becomes a strategic issue. Where data is stored and processed can influence everything from compliance to user experience.\r\n\r\nA truly enterprise-grade iPaaS should provide flexibility in data residency, with data centres across regions such as North America, Europe, Asia and Australia. Each should deliver consistent performance and identical capabilities, allowing organisations to meet local privacy requirements without sacrificing reliability or speed.\r\n\r\nRecent moves in the market demonstrate how essential this has become. In Australia, for example, platforms are now hosting full AI processing entirely within local data centres. This shift is driven by demand from highly regulated industries that need to adopt AI while keeping all data within national borders.\r\n\r\nFor enterprises, this means they should choose an iPaaS provider that not only offers global coverage but delivers full feature parity and in-region processing, particularly for AI workloads. This ensures you can scale internationally while confidently meeting local privacy, regulatory, and performance requirements.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25563956\" class=\"dp-dfg-item post-25563956 post type-post status-publish format-standard has-post-thumbnail hentry category-identity-access-management category-security-operations\"     data-position=\"7\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/identity-management-day\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/04\/Sean-Deuby.jpg\" alt=\"Identity Management Day\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Identity Management Day<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">The sixth Identity Management Day highlights the evolving nature of identity.\r\n\r\nThe meteoric rise of AI in general and its impact on nonhuman identities (NHIs) has focused attention on identity security as never before. But in the long view, it simply highlights the same issues we have seen in identity management since it was called \u201cidentity management.\u201d And discovery has always been a part of it.\r\n\r\nEnabling the business has always been the priority for IT. Managing the identity pieces you have created for the business has not, because e it does not directly benefit the business.\r\n\r\nDo you need this group created, populated, and added to an application? Sure. Do you need this service account immediately? Right away. Let\u2019s give it some extra privileges because we know we will not have to troubleshoot permission problems in the future.\r\n\r\nBut ask yourself: how often have you seen \u201cPlease remove this account because we\u2019re not using it anymore\u201d? Rarely. Unless you\u2019re a regulated business, identity governance and administration (IGA) is usually an afterthought. This has been the reality of IT as long as there\u2019s been IT.\r\n\r\nI lump this into the identity security category I call \u201ceat your vegetables\u201d: you know it\u2019s good for you, but you don\u2019t do it enough. Even after 26 years of general availability, identity governance is far from a given in Active Directory environments, especially smaller ones.\r\n\r\nSince identity systems such as Active Directory have very long lifespans, these daily decisions accumulate over years or decades of production. Organisations find they have thousands or tens of thousands of under-regulated NHIs (we call them service accounts on premises). This is one of many reasons identity systems are a favourite target of threat actors; they know very well these NHIs are overprivileged, underprotected, and neglected.\r\n\r\nTake these same factors, surround them with the tinder of cloud services\u2019 ease of use, pour the gasoline of AI onto it, and give developers the match. That\u2019s the dumpster fire we\u2019re looking at today, with NHIs outpacing human identities at what seems like a geometric progression. We\u2019re right to be concerned.\r\n\r\nHow does \u201cfinding identity\u201d fit into this? We can\u2019t just wring our hands about the situation; we need to take steps immediately. We must put controls in place as soon as possible. And we must discover what\u2019s already out there, using any tools we have, so we know the scope. You don\u2019t know the size of your dumpster fire until you\u2019ve looked.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25563985\" class=\"dp-dfg-item post-25563985 post type-post status-publish format-standard has-post-thumbnail hentry category-encryption-cipher category-executive-communication category-personal-security category-secure-communications\"     data-position=\"8\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/encryption-alone-is-not-a-security-strategy\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2024\/07\/Blackberry-Logo.svg\" alt=\"Encryption Alone Is Not a Security Strategy\" width=\"0\" height=\"0\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Encryption Alone Is Not a Security Strategy<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">Consumer apps lack identity and device controls, risking sensitive data.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25563958\" class=\"dp-dfg-item post-25563958 post type-post status-publish format-standard has-post-thumbnail hentry category-artificial-intelligence category-government-policy\"     data-position=\"9\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/responsible-esg-ai-enablement-could-become-australias-next-great-export-if-we-start-now\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/04\/Peter-Cardassis-Logicalis.jpg\" alt=\"Responsible ESG AI Enablement Could Become Australia&#8217;s Next Great Export If We Start Now\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Responsible ESG AI Enablement Could Become Australia&#8217;s Next Great Export If We Start Now<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">Introduction\r\nLogicalis Australia is calling for a shift in how Australia approaches artificial intelligence (AI), warning that the country risks missing a major global opportunity if it continues to focus primarily on policy and access to compute rather than infrastructure.\r\n\r\nPeter Cardassis, technical services director, Logicalis Asia Pacific, said, \"Australia is having the wrong conversation about AI, and it risks missing the next phase of global advantage because of it.\r\n\"Our national debate is focused on policy frameworks, ethics, guardrails, and access to compute. Those issues matter; however, they are not the real constraint on Australia's AI future. The real bottleneck is sustainable infrastructure. If Australia acts now, responsible environmental, social and governance (ESG) AI enablement could become our next great export.\"\r\nChanging Requirements\r\nAs AI workloads accelerate and data centre demand intensifies, the constraint is shifting from ambition to infrastructure readiness.\r\nPeter Cardassis said, \"Power availability, cooling efficiency, land access, and long-term ESG accountability will determine which countries really capitalise on AI investment. If Australia acts now, we have a rare opportunity. Responsible ESG AI enablement could become one of Australia's most valuable export markets if we plan, position, and design for this transition now.\"\r\nThe global AI arms race is increasingly defined by infrastructure. Training models and running advanced AI workloads drives dramatically higher energy consumption, greater heat density, and more demanding computing environments. This is already changing the conversation in boardrooms.\r\nPeter Cardassis said, \"ESG is no longer a reputational issue. It has become a factor in AI investment decisions.\"\r\nESG considerations are also becoming central to investment decisions, shifting AI from a purely technical discussion to a broader infrastructure and risk conversation. For boards and investors, this shifts AI from a technology discussion to a long-term infrastructure and risk decision.\r\nPeter Cardassis said, \"Organisations want AI capability, yet they also want to know how it will be powered, how sustainable it is, and whether it aligns with long-term environmental commitments.\"\r\nThis is where Australia has a structural advantage that is often overlooked.\r\nPeter Cardassis said, \"Few countries have the combination of renewable energy potential, available land, and political stability required to scale AI sustainably.\r\n\"Australia has an abundance of solar, wind, and open space. If we design our infrastructure correctly, these assets could underpin a new category of digital infrastructure: sustainable sovereign AI infrastructure.\"\r\nA Distinct Advantage\r\nCountries that can demonstrate sustainable AI scaling will attract more capital. They will attract hyperscaler investment. They will also attract regulated workloads from industries such as financial services, healthcare, and government that require stable, trusted operating environments.\r\nPeter Cardassis said, \"This is the competitive differentiator that is not yet widely understood. While many assume AI leadership will be defined by technology capability alone, infrastructure will play an equally critical role. The next phase of the AI economy will depend just as heavily on who can power those systems responsibly.\r\n\"Physical capacity matters, power availability matters, cooling efficiency matters, and land matters. This is Australia's unique advantage.\"\r\nAustralia already has the foundations to lead if we act deliberately. Our renewable energy resources are world class. Our geographic scale provides space for infrastructure development. Australia's regulatory and political stability makes it an attractive environment for global investment.\r\nPeter Cardassis said, \"If these advantages are aligned with the expansion of AI infrastructure, Australia could become a global hub for responsible ESG AI enablement. This shift could redefine Australia's role in the global digital economy. Historically, Australia has been a major exporter of natural resources and energy.\u201d\r\n\"In the AI era, we can export something new: sustainable compute capacity that underpins global AI systems. Renewable energy powering AI infrastructure could let Australia host the workloads that power the global AI economy. The economic implications are significant.\"\r\nPotential benefits include increased hyperscaler investment, job creation, and the development of new technology ecosystems.\r\nPeter Cardassis said, \"Australia would not simply adopt AI technologies developed elsewhere; we would help power them for the world economy. This becomes another Australian export and, in the future, may be more valuable to our country than the mining industry.\"\r\nRealising this opportunity requires a shift in national strategy, particularly in how AI policy is framed.\r\nPeter Cardassis said, \"Australia's National AI Plan should be seen as a signal of how seriously we take the infrastructure and energy foundations of AI not just as a digital policy framework. Embedding sustainability metrics into the national AI plan as a source of national and global competitiveness, not as compliance requirements, would position Australia to lead globally in responsible AI scaling.\"\r\nThis does not mean slowing down innovation. Acknowledging the infrastructure challenge early lets Australia design smarter systems.\r\nPeter Cardassis said, \"Integrating renewable energy, storage, and modern grid capacity into AI expansion plans will ensure growth is sustainable rather than reactive.\"\r\nConclusion\r\nFor business leaders and boards, the implications are clear. AI adoption can no longer be viewed only through the lens of software capability or experimentation with new tools. Organisations must also understand the infrastructure footprint of the AI systems they deploy.\r\nPeter Cardassis said, \"Energy demand, sustainability metrics, cooling requirements, and long-term ESG accountability will increasingly shape how AI strategies are designed. The companies that scale AI successfully will be those that treat infrastructure and sustainability as central elements of their technology strategy.\"\r\nAustralia faces a critical decision point in how it approaches AI.\r\nPeter Cardassis said, \"Australia now has a choice. We can continue to treat AI as primarily a software conversation. Or we can recognise that the next phase of the AI economy will be defined by infrastructure, energy, land, cooling, and sustainability, and plan accordingly.\"<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25563886\" class=\"dp-dfg-item post-25563886 post type-post status-publish format-standard has-post-thumbnail hentry category-national-security category-network-security category-physical-security category-security-operations\"     data-position=\"10\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/we-need-to-rethink-what-airport-security-means-in-australia\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/04\/David-Hope-Nozomi.jpg\" alt=\"We Need to Rethink What Airport Security Means in Australia\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">We Need to Rethink What Airport Security Means in Australia<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">Introduction\r\nIn Australia, the intensity of our airport and aviation security is strangely famous worldwide. It even has its own reality television show; Border Security \u2013 Australia\u2019s Front Line.\r\nThe scene is always similar: drug sniffing dogs, x-ray machines and baggage searches used to investigate the latest security threat. But there is an underlying threat to airport security that doesn\u2019t ever make it onto the show \u2013 cybersecurity.\r\nTechnology has changed the way we gather intelligence on potential threats. The CCTV cameras, thermal cameras and body scanners are now a typical part of the airport security experience.\r\nBut what if each of these devices, invented to keep us safe, could actually be the catalyst for a major cyber breach?\r\n\r\nA New Reality\r\nThis is the reality of modern-day smart devices, and it\u2019s not just security-related technology. Automated bag drops, self-check-in, inflight Wi-Fi, and air conditioning units all have vulnerabilities that can be exploited by cyber criminals.\r\nEven modern airplanes, propellers, and engines are increasingly connected to external or internal data networks through smart sensors.\r\nThese smart devices, that have gradually been embedded at every point of the airport and in-flight experience, often have inherent security vulnerabilities, creating an easy entry point for hackers.\r\nThe inter-connected nature of these devices means a breach doesn\u2019t stop at the smart device. Instead, its connection to a broader wireless network, could serve as a potential gateway for infiltrators to gain access to more sensitive systems.\r\nThe impact? Well, it would bring an airline or airport to a standstill \u2013 causing significant financial loss, reputational damage and even human harm.\r\nA successful cybercriminal attack on airport could disrupt check-in services, delay all aviation, disrupt air traffic control or even halt physical signals. Even if flights were able to continue, passengers would need to be physically screened, causing widespread delays.\r\nWhile these scenarios may seem far-fetched for many, airlines and airports are frequently targeted by threat actors. The EATM-CERT\u00a0Aviation Cyber Events Map\u00a0recorded over 60 cyber attacks on airports across the globe in 2025.\r\nIn 2023,\u00a0pro-Russia hacker group Killnet\u00a0and its affiliate AnonymousSudan publicly targeted Australian universities and called for additional attacks against eight universities, ten airports, and eight hospital websites.\r\nThe risk and increasing occurrence of these cyber incidents have been the catalyst for regulators across the globe to tighten cybersecurity legislation and recommendations across critical infrastructure, including the aviation industry.\r\n\r\nThe Change Abroad\r\nIn the USA,\u00a0the Federal Aviation Administration (FAA)\u00a0has issued \u2018special conditions\u2019 related to cybersecurity since 2009. Requirements include identifying all threat conditions associated with the system, architecture and external or internal interfaces.\r\nIn Europe,\u00a0the NIS2 directive, a set of mandatory security measures and reporting obligations, aims to achieve a high level of protection from information security threats to Aviation organisations.\r\nLocally, the\u00a0Defence Aviation Safety Authority\u00a0guidance material outlines airworthiness design requirements for cyber security in advance of formal implementation of Cyber regulation.\r\nThese frameworks are urging the aviation industry to invest in a robust cybersecurity strategy.\r\nIn a recent conversation with Nozomi Networks, Air Canada\u2019s OT Security Manager, Richard Szymborski, Sr. explained how\u00a0Bill C26, now C-8, was the catalyst for the teams evaluation of its operational technology assets. The airline went from figuring out what OT security represents, to building a comprehensive program.\r\nFor most airlines and airports, the biggest challenge is creating visibility across breach able assets, to be able to monitor the health of each device.\r\n\r\nConclusion\r\nUnsurprisingly, this modern conundrum is becoming increasingly difficult as the popularity and use of IoT devices increases across the aviation sector. But with the right tools and assistance securing an organisations OT architecture and having oversight of vulnerable assets doesn\u2019t have to be a wild goose chase.\r\nInstead, like Air Canada, we can audit our assets and take the necessary steps to a more secure and stable environment. And while it may seem like an overwhelming journey to embark on, it is critical for the safety and security of staff, customers and the public.\r\nBecause if we want to be safe during a flight, or at the airport, we need to take the security of operational technology just as seriously as we do baggage check ins and passengers.\r\nIf we don\u2019t, it could be a major cybersecurity breach that features on the next season of Border Security.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25563706\" class=\"dp-dfg-item post-25563706 post type-post status-publish format-standard has-post-thumbnail hentry category-application-security category-artificial-intelligence category-cloud-security category-cyber-resilience\"     data-position=\"11\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/world-cloud-security-day\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2025\/01\/ff-a169f24e9d3f3ccfac818ed6960ae4b4-ff-Reuben-Koh-portrait_04-e1775007591282.jpg\" alt=\"World Cloud Security Day\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">World Cloud Security Day<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">This World Cloud Security Day, the message is clear for Australian organisations: security and resilience must be embedded as foundational elements\u00a0of any AI and cloud strategy, never\u00a0an afterthought.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25563759\" class=\"dp-dfg-item post-25563759 post type-post status-publish format-standard has-post-thumbnail hentry category-risk-management category-security-operations\"     data-position=\"12\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/the-hidden-risk-inside-australias-expanding-it-inventory\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2025\/11\/MJ-Robotham-NinjaOne.jpg\" alt=\"The Hidden Risk Inside Australia\u2019s Expanding IT Inventory\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">The Hidden Risk Inside Australia\u2019s Expanding IT Inventory<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">As the number of technologies and platforms balloons in organisations, so does an often-overlooked cybersecurity challenge. Like too many ingredients in a dish, organisations no longer have a clear, accurate understanding of what they are running, where it lives, and how it is secured. For organisations operating in Australia's increasingly regulated and cyber-aware environment, the ability to track and manage this technology estate has shifted from an operational task to a critical security and business capability.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25563692\" class=\"dp-dfg-item post-25563692 post type-post status-publish format-standard has-post-thumbnail hentry category-artificial-intelligence category-governance-risk category-leadership\"     data-position=\"13\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/australias-ai-shift-from-capability-to-control\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2024\/09\/Kumar-Mitra.jpg\" alt=\"Australia\u2019s AI Shift From Capability to Control\u00a0\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Australia\u2019s AI Shift From Capability to Control\u00a0<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">Introduction\r\nConversations with CIOs across Australian industries tell a consistent story. AI has decisively moved beyond pilots and proofs of concept. The question is no longer whether AI works, but whether it delivers measurable returns while operating within clear boundaries of trust, governance, and accountability. As Australian enterprises look ahead, success will depend on treating AI not as a technology experiment, but as a system that is engineered for scale, responsibility, and real business outcomes.\u00a0\r\nFrom Experimentation to Trusted Execution\r\nWhile AI investment is accelerating across Australia, adoption\u00a0remains\u00a0measured, with many organisations still in evaluation or planning stages. This is not hesitation. It reflects a sharper understanding of risk, ROI, and long-term impact. Australian CIOs are increasingly clear that AI must be grounded in enterprise-grade data, aligned to defined outcomes, and explainable in its decisions. Trust is no longer an abstract concept. It is operational.\u00a0\r\n\r\nIn regulated sectors such as banking and financial services, healthcare, and government, explainability and data integrity are becoming non-negotiable. Leaders want AI systems that can justify recommendations, respect privacy, and stand up to regulatory scrutiny. Australia\u2019s evolving AI governance landscape makes this event more pressing. The government\u2019s Responsible AI framework, the\u00a0ASD\u2019s AI security guidance, and\u00a0APRA\u2019s risk model\u00a0for the financial services sector are actively shaping how enterprises approach AI deployment. \u00a0In Australia\u2019s context, where regulatory obligations and data sovereignty requirements are\u00a0tightening,\u00a0trusted AI is the only\u00a0viable\u00a0path forward.\u00a0\r\nHybrid AI as the Architecture of Choice\r\nOne of the strongest signals we are seeing across the Asia Pacific region is a clear preference for hybrid and\u00a0on-premise\u00a0AI architectures. This is particularly pronounced in Australia, driven by data sovereignty requirements, latency sensitivity, cost control, and resilience. This is a pragmatic decision, not a conservative one.\u00a0\r\n\r\nAI workloads in Australia are increasingly spanning centralised data centres, edge environments, and public cloud platforms within the same workflow. Training may occur in core infrastructure, while inference takes place closer to where the data is generated: in a hospital ward, on a factory floor or at a remote mining operation. This distributed approach allows organisations to scale AI responsibly without overspending or compromising control. For Australian enterprises, hybrid AI is not optional. It is foundational.\u00a0\r\nPower, Sustainability, and the Reality of Scale\r\nAI growth brings with it a hard constraint that Australian CIOs can no longer ignore.\u00a0The Australian Energy Market Operator (AEMO) has flagged surging data centre electricity demand as a material factor in national grid planning. Energy availability and efficiency are\u00a0emerging\u00a0as strategic considerations in AI planning - not just corporate sustainability commitments. It is\u00a0directly linked\u00a0to the ability to expand AI initiatives over time.\u00a0\r\n\r\nDenser systems, advanced cooling technologies, and right-sized infrastructure are enabling organisations to extract more performance per watt. At the same time, moving inference closer to the edge reduces data movement, lowers latency, and cuts energy consumption. Australian enterprises that embed sustainability into their AI infrastructure decisions today will be better positioned to scale tomorrow without hitting power or cost ceilings that increasingly constrain data centre growth in the region.\u00a0\r\nGovernance as a Business Priority, Not a Checkbox\r\nPerhaps the\u00a0most critical challenge facing Australian CIOs is the gap between AI governance awareness and actual implementation. Governance, risk, and compliance are a top priority for CIOs in the Asia Pacific region, yet full implementation\u00a0remains\u00a0limited- and Australia is not immune to this pattern\u00a0\r\n\r\nThis gap carries real consequences. Responsible AI cannot be retrofitted. It must be designed into systems from the outset, through clear governance models, ethical frameworks, human oversight, and strong data protection.\u00a0\u00a0\r\n\r\nOrganisations that move early on AI governance will not only reduce regulatory and reputational risk but also accelerate adoption by building confidence among boards, regulators, employees, and customers. In an Australian market where high-profile data breaches have fundamentally shifted public trust, governance-first AI is a competitive differentiator, not just a compliance burden.\u00a0\r\nPutting People at the Centre of AI Adoption\r\nAI\u2019s real impact in Australia will come from how widely it can be applied across roles and functions. Natural language interfaces, agentic AI, and more intuitive tools are lowering the barrier to participation. Specialists in mining, agriculture, financial service, and healthcare can now shape AI-driven workflows without being AI specialists.\u00a0\r\n\r\nThe leadership challenge is clear. CIOs must create environments where people can use AI confidently and responsibly. That means investing in skills, building a culture of accountability, and partnering where internal capabilities need to scale faster.\u00a0\r\n\r\nAs Australia enterprises look ahead, AI is no longer a standalone initiative or a future bet. It is becoming integral to how organisations\u00a0operate, compete, and grow. The leaders will be those who build AI systems that are trusted by design, hybrid by default, sustainable at scale, and governed with intent, always keeping human judgment at the core of the transformation.\r\n\r\n&nbsp;<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25563678\" class=\"dp-dfg-item post-25563678 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-resilience category-leadership category-security-operations\"     data-position=\"14\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/resilience-at-scale-how-modern-organisations-stay-fast-without-increasing-risk\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/04\/James-Greenwood-Tanium.jpg\" alt=\"Resilience at Scale: How Modern Organisations Stay Fast Without Increasing Risk\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Resilience at Scale: How Modern Organisations Stay Fast Without Increasing Risk<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">Australian organisations are not taking resilience seriously enough. According to BDO\u2019s Tectonic States report, only 62 per cent of Australian business leaders ranked resilience as their top organisational priority, this is compared to 78 per cent of leaders in other countries, including the UK and Spain. This signals an opportunity for Australian organisations to build resilience, starting with maintaining speed at scale. In 2026, it\u2019s not only downtime that hurts organisations, but any incident that impacts speed or service delivery can be disastrous.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25563729\" class=\"dp-dfg-item post-25563729 post type-post status-publish format-standard has-post-thumbnail hentry category-artificial-intelligence category-leadership category-risk-management category-security-operations tag-editors-picks\"     data-position=\"15\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/taming-the-gallop-on-rising-cybersecurity-risk\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/04\/Kavya-Shastry-ManageEngine-1.jpg\" alt=\"Taming the Gallop on Rising Cybersecurity Risk\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Taming the Gallop on Rising Cybersecurity Risk<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">Introduction\r\nAs the Lunar New Year ushers in a new cycle of The Horse, we can look to the traits of the traditional Chinese zodiac, which provide an admirable framework for cybersecurity objectives.\r\n\r\nHorses are commonly known for unbridled speed, agility, and making forward strides. These aren't just symbolic of cyber resilience: they are the new requirements for digital survival.\r\n\r\nWith AI and automation in play the digital world is moving at a gallop. Attacks are no longer slow, manual, or opportunistic. They are continuous, adaptive, and executed at machine speed. The battleground has shifted from isolated breaches to an environment of constant pressure, where systems are probed, tested, and targeted without pause.\r\n\r\nIn this reality, static security strategies are obsolete. Building higher walls is not enough when adversaries can instantly analyse, iterate, and strike again. Resilience now depends on anticipation, agility, and the ability to respond in real time.\r\n\r\nOrganisations must embrace the mobility and instinct of the animal and move as dynamically as the threats they face \u2013 learning, adapting, and evolving continuously to stay ahead.\r\nThe Trojan Horse Paradox\r\nEveryone knows the tale of the Trojan Horse, but most don\u2019t realise the tactic is still very much in use. What began as a wooden statue used as a shield in the Trojan war in 1200 BCE has evolved in 2026 to where the disguise is digital. Hyper-realistic deepfakes mimic familiar faces, messages mirror trusted voices, and strategically crafted social engineering lure.\r\n\r\nAlthough the method has changed the principle of the modern Trojans exploit the one thing security tech struggles to patch: trust. We are moving away from the old security model of strengthening the perimeter by building higher walls. The new reality demands something different. Instead of assuming what\u2019s inside is safe, we now have to question every interaction. No message, file, or signal should be given implicit trust. Implementing a Zero Trust approach \u2013 where access is earned through continuous validation, not granted based on location or assumption \u2013 reflects this shift.\r\nHolding the Reins\r\nIn many organisations, innovation and security often feel at odds. Innovation is the horse \u2013 fast, powerful, and eager to run. Security is the rider, responsible for guidance and control, sometimes seen as holding the reins too tightly. If the rider pulls too hard, momentum stalls and frustration builds. But if the reins are dropped completely, the horse chooses its own path, and the outcome may be far from the intended destination.\r\n\r\nThe goal for 2026 is to strike the right balance between agility and speed by shifting from restraint to guidance. Security shouldn't stop the horse from running, but rather ensures it stays on course, and corrects its direction when needed. Leveraging AI-automation and extended detection and response (XDR) as the reins, allows for high-velocity business operations without sacrificing control.\r\nGetting Back in the Saddle\r\nThe Year of the Horse goes beyond speed alone \u2013 as it extends to endurance. Through a cybersecurity lens, this journey is a marathon and not a sprint. True cyber resilience isn't just about staying in the saddle; it\u2019s about how quickly you can recover and get back in the race.\r\n\r\n\u200bFocusing on incident response ensures that when a breach does occur, the gallop to recovery is swift and decisive. We must build a culture of vigilance, training employees with the awareness and training they need. Just as a horse senses danger before it appears, a well-prepared workforce can sense the subtle signs of a deep-fake or phishing attempt and would avoid taking the bait.\r\nRiding to Success\r\nToday\u2019s CISOs are shaping a new era defined by cyber resilience. They face increasingly sophisticated attacks, deepfakes, and breaches threatening even the strongest encrypted defences, while trying to keep pace in the AI race.\r\n\r\nTo lead in 2026, CISOs and business leaders must embrace strong traits inspired by the horse: agility, strength, endurance and sharp reflexes. The age of building a fortress is over. The Year of the Horse will belong to those who can see beyond the blinders to anticipate threats, respond faster, and adapt in real time.\r\n\r\nSuccess won\u2019t come from outrunning attacks alone, but from being prepared to face them head-on. Building resilient teams, sharpening skills, and strengthening response capabilities will define the leaders who don\u2019t just defend against disruption, but rise above it.\r\n\r\n&nbsp;<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25563670\" class=\"dp-dfg-item post-25563670 post type-post status-publish format-standard has-post-thumbnail hentry category-artificial-intelligence category-executive-communication category-governance-risk\"     data-position=\"16\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/communication-as-infrastructure-why-dialogue-is-a-business-advantage\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/03\/Harshvendra-Soin-Tech-Mahindra.jpg\" alt=\"Communication as Infrastructure &#8211; Why Dialogue Is a Business Advantage\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Communication as Infrastructure &#8211; Why Dialogue Is a Business Advantage<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">Why global tech fails in APJ and how treating communication as infrastructure unlocks adoption and scale.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25563224\" class=\"dp-dfg-item post-25563224 post type-post status-publish format-standard has-post-thumbnail hentry category-application-security\"     data-position=\"17\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/three-critical-actions-for-achieving-an-optimal-sap-cybersecurity-budget\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/03\/Christoph-Nagy-SecurityBridge.jpg\" alt=\"Three Critical Actions for Achieving an Optimal SAP Cybersecurity Budget\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Three Critical Actions for Achieving an Optimal SAP Cybersecurity Budget<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">Any enterprise is subject to cyberattacks. The details about incidents concerning critical enterprise applications like SAP S\/4HANA are often internal, and hence, public awareness is not up to the mark of malware and phishing. As the attacks become more sophisticated, it is important to understand what your optimal budget should be to protect mission-critical applications.\u00a0\u00a0<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25563271\" class=\"dp-dfg-item post-25563271 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-resilience category-security-operations\"     data-position=\"18\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/from-398-to-200-days-understanding-the-tls-certificate-lifespan-reduction\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/03\/ff-2b319ab0041809c4e59082f1fc3bbed0-ff-Daniel-Sutherland-DigiCert.jpg\" alt=\"From 398 to 200 Days: Understanding the TLS Certificate Lifespan Reduction\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">From 398 to 200 Days: Understanding the TLS Certificate Lifespan Reduction<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">Digital trust is entering a new phase, and on March 15, 2026, a policy change will take effect that reshapes how organisations approach security.\r\n\r\nIn 2025, the CA\/Browser Forum, a consortium of browser vendors and certificate authorities, approved revisions to public TLS standards, introducing a phased reduction in certificate lifespans to better address modern threats. After extensive industry-wide debate, the timeline is now clear, and the first milestone is upon us.\r\n\r\nThe first of several milestones will occur today, on March 15, where the maximum allowable lifetime of a publicly trusted TLS certificate will halve, from 398 days to 200 days, with the ultimate goal to reduce eightfold to 47 days in March 2029.\r\n\r\nAt its core, it reflects a simple truth: \u00a0trust degrades over time. \u00a0And with the advent of AI, this process has accelerated rapidly. Businesses evolve, infrastructure changes, assets are reassigned, and security threats become more sophisticated.\r\n\r\nExpired certificates remain one of the most common and preventable causes of website outages and service disruptions. When certificates lapse, customers notice. Transactions fail, applications stop working, and trust erodes quickly. \u00a0At the same time, older certificates heighten security risk, creating opportunities for attackers to exploit overlooked weaknesses.\r\n\r\nBy shortening certificate lifespans, the industry increases the frequency of identity revalidation, which narrows the validity window and keeps certificate information aligned with current organisational and infrastructure details.\r\n\r\nThe change is significant, but the agreed timeline phases in the requirements, providing organisations with a defined period to plan and adjust.\r\nThe Transition to Ongoing Action\r\nFor businesses, today is when planning must turn into action. The halving of certificate validity from 398 days to 200 days effectively doubles renewal frequency. That alone may still be manageable using traditional approaches, but the subsequent reductions to 100 days and then 47 days accelerate the pace dramatically. What was once an annual, often manual administrative task will soon become a significant monthly operational process.\r\n\r\nManual tracking, email reminders, spreadsheets, and decentralised ownership may have been sufficient before today, but now such practices introduce significant risks in this new security landscape. Organisations need systems that automate the issuance, renewal, and deployment of certificates without manual intervention to keep up with shortening renewal cycles. This new normal also marks the transition towards \u2018Intelligent Trust\u2019 management, and the demands for clear visibility across all its certificates to avoid blind spots, close attack vectors, and maintain consistent policy compliance.\r\n\r\nBusinesses that act now will build organisational agility, gain powerful visibility across their security environments, strengthen key management practices, reduce operational burdens, and prepare for a rapidly accelerating future in which cryptographic standards evolve.\r\nSmarter, Automated Certificate Management\r\nAs leaders in Intelligent Trust, DigiCert works directly with organisations navigating increasingly complexm certificate environments. According to Forrester\u2019s Total Economic Impact\u2122 study of the DigiCert ONE platform, enterprises that centralised and automated certificate lifecycle processes achieved measurable outcomes over a three-year period: a 312 % return on investment (ROI) and payback in under six months compared with legacy approaches.\r\n\r\nTools such as Trust Lifecycle Manager and CertCentral provide centralised visibility and automation for all certificate types. In the Forrester study, this automation helped organisations reclaim more than 200,000 hours of manual effort, save roughly $7.9 million in labour costs related to renewal activities, and reduce incident-related costs by about $2.8 million over three years by minimising outages and security lapses linked to manual processes.\r\n\r\nThrough \u201cIntelligent Trust\u201d, businesses gain greater agility with their certificate remediation and adoption, while simultaneously reducing the risk of business disruption. This, coupled with DigiCert\u2019s local Australian DigiCert ONE instance, ensures businesses can meet both the trust and sovereignty considerations of today and prepare for the post-quantum future.\r\n\r\nShorter TLS certificate lifespans are becoming the industry baseline, and the CA\/Browser Forum has set a clear roadmap for the transition. Organisations that invest in automation and lifecycle management now will be better positioned to meet each milestone with resilience and continuity rather than urgency.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25563181\" class=\"dp-dfg-item post-25563181 post type-post status-publish format-standard has-post-thumbnail hentry category-identity-access-management category-physical-security\"     data-position=\"19\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/reducing-cyber-and-physical-risks-what-every-it-manager-should-know-about-access-control\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/02\/mathieu-chevalier_4e544881a4cb9266719ad3d53759d400_2000.jpg\" alt=\"Reducing Cyber and Physical Risks: What Every IT Manager Should Know About Access Control\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Reducing Cyber and Physical Risks: What Every IT Manager Should Know About Access Control<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">Access control has long been treated as a function of facilities teams, focused on unlocking and locking doors. As digital systems and physical spaces become more interconnected, that point of view needs to be rethought.\r\n\r\nAccess control is now playing an added role to cybersecurity and operational strategy. The systems that determine who can enter buildings and sensitive areas are linked with IT infrastructure, generating valuable data and influencing everything from cybersecurity compliance to how workspaces are used. Access control can provide business intelligence that reduces risk, improves decision-making, and keeps operations running smoothly. And with physical and digital systems converging, IT teams are in a unique position to take the lead.\r\nMoving From Reactive to Proactive Security\r\nTraditional access control systems are complex and designed to manage physical access and log entry attempts, but they offer limited visibility. While they could record who entered and when, extracting valuable insights was often difficult. When something suspicious occurred, teams had to dig through logs and piece events together manually. For security personnel, this meant physical security gaps were harder to detect and incidents took longer to resolve.\r\n\r\nModern access control platforms improve physical security enforcement and resolution. They\u2019re connected to the broader IT and security ecosystem, offering real-time insights through dashboards, automated alerts, and video integration. This makes it possible to spot anomalies as they happen, such as someone trying to access a restricted area. Permissions can be adjusted instantly and reports generated to support audits and investigations. These capabilities strengthen both physical security and IT coordination.\r\nCybersecurity and Access Control Go Hand in Hand\r\nSince physical security systems also connect to enterprise networks, they must be secured with the same standards as other IT infrastructure to prevent any cybersecurity gaps.\r\n\r\nThat\u2019s why modern access control platforms are designed with cybersecurity in mind, providing:\r\n\r\n \tEncrypted communication between controllers, servers, and readers\r\n \tStrong authentication and password enforcement\r\n \tGranular authorization features that allow teams to decide what features and data users can access in the system\r\n \tDevice monitoring tools that identify vulnerabilities and performance issues\r\n\r\nThese features help IT managers ensure physical security systems don\u2019t become cybersecurity liabilities, even when monitoring multiple sites.\r\nMaking the Most of Access Control Data\r\nAccess control systems generate a steady stream of useful data, but many organizations underuse it or lack a system that allows them to visualize or report on the data effectively. With the right tools, that data becomes a valuable resource for spotting trends, improving efficiency, and meeting cybersecurity compliance requirements. For example, access logs can highlight policy violations or identify security gaps.\r\n\r\nThe data can also be shared with departments, such as HR or facilities, to support initiatives like space planning or workforce management. In the case of facilities, sharing access control data on how many people use a specific room and when can help building operations teams optimize lighting usage and cleaning schedules. By sharing and analyzing this data, IT teams can deliver value far beyond physical security.\r\nKey Areas for Modernization\r\nAccess control is becoming a foundation for faster, smarter decision-making. Organizations and IT managers looking to modernize access control infrastructure should focus on the following areas:\r\n\r\n \tUpgrading credentials and authentication: With an open, unified access control system, IT teams have the opportunity to adopt secure credential options that meet their needs, while improving user experience and reducing operational costs. Some are shifting toward mobile credentials via Bluetooth or NFC, which reduce reliance on physical cards and enable touchless, secure entry for users. Others are layering in biometrics, such as fingerprint and facial recognition, providing an additional layer of security, especially in sensitive areas or high-risk industries. The value lies in being able to choose and combine the approaches that align best with each organization\u2019s priorities.\r\n \tAutomating identity and access management: Manual provisioning of physical access can slow down operations and create unnecessary risk. By automating the creation, modification, and revocation of access rights, IT managers can ensure physical access rights are accurately aligned with job roles and policies. Digitizing response policies and tasks related to security issues also plays a vital role, enabling consistent incident response and supporting continuous improvement through post-event data analysis.\r\n \tBuilding scalable, flexible infrastructure: With an open access control architecture, IT managers can build systems that evolve alongside organizational needs with easier updates and system expansions. This includes ingesting new data sources, integrating with emerging tech, and aligning with five- or ten-year digital transformation roadmaps. IT managers can also integrate physical security systems with their existing tech stack, helping the organization save on costs.\r\n\r\nThe most effective access control solutions give organizations the flexibility to choose what works best \u2013 whether that\u2019s cloud-based management, on-premises, or a hybrid mix. Cloud services like Access Control as a Service (ACaaS) make it easier to manage systems remotely, automate software updates, and enhance cybersecurity. At the same time, on-premises or hybrid approaches can offer advantages for organizations with specific regulatory, operational, or infrastructure requirements.\r\n\r\nAdditionally, integrating access control with Internet of Things (IoT) systems, such as HVAC, lighting, elevator controls, and environmental sensors, enables centralized building management and unlocks additional automation opportunities that extend beyond security.\r\n\r\nBy investing in a secure, scalable access control system, organizations can reduce physical and cyber risks, support regulatory compliance, and improve operational efficiency. For IT managers, this empowers them to protect infrastructure and advance the organization\u2019s overall resilience and intelligence.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25563148\" class=\"dp-dfg-item post-25563148 post type-post status-publish format-standard has-post-thumbnail hentry category-physical-security category-security-operations\"     data-position=\"20\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/how-modern-search-technology-is-changing-video-investigations-for-security-teams\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/03\/Lee-Shelford-Genetec.jpg\" alt=\"How Modern Search Technology Is Changing Video Investigations for Security Teams\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">How Modern Search Technology Is Changing Video Investigations for Security Teams<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">Intelligent search reflects a practical evolution in how video is used during investigations. Rather than changing what security teams do, it changes how quickly and confidently they can do it. By simplifying review workflows and reducing manual effort, intelligent search helps teams manage investigation workloads more effectively.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25563011\" class=\"dp-dfg-item post-25563011 post type-post status-publish format-standard has-post-thumbnail hentry category-iwd\"     data-position=\"21\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/international-womens-day\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/03\/Praveena-Raman-Motorola.jpg\" alt=\"International Women\u2019s Day\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">International Women\u2019s Day<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">International Women\u2019s Day is a moment to celebrate progress, possibility and the incredible women shaping the future of our industry. Reflecting on my own journey from engineering into leadership within the technology sector, one thing stands out, growth rarely follows a straight line. It is built through curiosity, resilience and the willingness to keep stepping forward even when the path feels unfamiliar.\r\n\r\nTechnology today is evolving at an extraordinary pace. With AI and automation transforming how we work, there has never been a more exciting time to build a career in tech. The barriers that once felt impossible are becoming more flexible and new opportunities are emerging across every part of the industry, from infrastructure and data, to design, strategy and innovation.\r\n\r\nFor women looking to grow in this space, there are a few consistent practices that have helped me along my path.\r\n\r\nFirst, investing in transferable skills. Communication, adaptability and problem-solving are powerful foundations for leadership and influence. These capabilities travel across roles, industries and technologies.\r\n\r\nSecond, building digital confidence. Staying curious about emerging tools, particularly in areas like AI and gaining hands-on experience helps turn the prospect of change from uncertainty into opportunity.\r\n\r\nFinally, nurturing strong networks. Mentors, peers and industry communities provide perspective, encouragement and access to opportunities that might otherwise remain unseen.\r\n\r\nThis day is not only about recognising how far we\u2019ve come, but about inspiring the next generation to step into what\u2019s possible. When organisations foster inclusive environments and individuals take ownership of their growth, innovation accelerates.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25563072\" class=\"dp-dfg-item post-25563072 post type-post status-publish format-standard has-post-thumbnail hentry category-artificial-intelligence category-identity-access-management post_format-post-format-standard\"     data-position=\"22\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/how-verified-trust-is-redefining-digital-authentication-in-the-age-of-ai\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/03\/Ash-Diffey-Ping-Identity.jpg\" alt=\"How \u2018Verified Trust\u2019 Is Redefining Digital Authentication in the Age of AI\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">How \u2018Verified Trust\u2019 Is Redefining Digital Authentication in the Age of AI<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">When verified trust becomes embedded in every interaction, authentication transforms from a barrier into an enabler. It delivers not only protection against fraud and impersonation but also the confidence that underpins long-term relationships.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25563005\" class=\"dp-dfg-item post-25563005 post type-post status-publish format-standard has-post-thumbnail hentry category-artificial-intelligence\"     data-position=\"23\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/what-einstein-would-say-about-ai\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/03\/Owen-Lamont-1.jpg\" alt=\"What Einstein Would Say About AI\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">What Einstein Would Say About AI<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">Einstein was talking about the concept of \u201ctechnological unemployment,\u201d the idea that technology will destroy jobs and lead to disaster. Will AI cause mass unemployment? Probably not, because when it comes to economics, Einstein was no Einstein. The vast majority of economists, including me, do not think that automation was an important cause of the Great Depression. Historically, revolutionary technologies do not generally cause mass unemployment. Of course, it\u2019s always possible that AI will be different due to its rapid introduction. But the big picture is that innovation eventually makes society richer and not poorer.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25562995\" class=\"dp-dfg-item post-25562995 post type-post status-publish format-standard has-post-thumbnail hentry category-artificial-intelligence category-security-operations\"     data-position=\"24\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/the-ai-edge-in-edge-security\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2025\/08\/Vikas-Tatwani-Infosys.jpg\" alt=\"The AI Edge in Edge Security\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">The AI Edge in Edge Security<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">As Australian organisations expand into hybrid cloud and edge environments, their attack surface is rapidly growing beyond the traditional perimeter. This byline explores how AI-first, platform-led security enables real-time threat detection at the edge, strengthens Zero Trust enforcement and unifies protection across cloud, OT and endpoints. It argues that intelligent, integrated security architectures are critical to building resilience and meeting evolving regulatory expectations in a borderless digital landscape.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25562969\" class=\"dp-dfg-item post-25562969 post type-post status-publish format-standard has-post-thumbnail hentry category-artificial-intelligence category-offensive-security category-security-operations\"     data-position=\"25\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/ai-versus-ai-why-the-next-cyber-security-battle-will-be-fought-by-machines\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/03\/Raymond-Schippers-Check-Point.jpg\" alt=\"AI Versus AI: Why the Next Cyber Security Battle Will Be Fought by Machines\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">AI Versus AI: Why the Next Cyber Security Battle Will Be Fought by Machines<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">Artificial intelligence has evolved from being a technical novelty into a powerful business tool with remarkable speed. Companies are embedding generative AI into customer service, software development, and finance operations to unlock efficiency gains and accelerate innovation. However, as adoption deepens, cyber security leaders are confronting a new reality: AI is not just enhancing productivity but also fundamentally reshaping cyber risk. Indeed, as AI becomes both a growth engine and a threat vector, the fundamentals of cyber security will become increasingly important. Cyber resilience will depend on embedding secure-by-design and Zero Trust principles across the enterprise.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25562808\" class=\"dp-dfg-item post-25562808 post type-post status-publish format-standard has-post-thumbnail hentry category-product-development\"     data-position=\"26\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/eliminating-the-technical-debt-caused-by-ai-assisted-software-development\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2023\/11\/Madou-Matias.jpg\" alt=\"Eliminating the Technical Debt Caused by AI-Assisted Software Development\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Eliminating the Technical Debt Caused by AI-Assisted Software Development<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">The software development community is experiencing a near ubiquitous usage of AI coding tools as teams face pressure to generate more output in less time. While the huge efficiency gains from the tools help significantly, teams too often fail to incorporate adequate safety controls and practices into AI deployments. Industry leaders are pushing for comprehensive assessments that produce so\u2011called \u201ctrust scores\u201d. These are composite metrics that integrate tool usage, vulnerability data and secure\u2011coding proficiency to quantify how products and teams influence software\u2011development lifecycle (SDLC) risk.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25562708\" class=\"dp-dfg-item post-25562708 post type-post status-publish format-standard has-post-thumbnail hentry category-identity-access-management category-security-operations\"     data-position=\"27\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/why-identity-security-is-breaking-under-the-weight-of-silos\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/02\/ff-ac95e7390b2ab4af92029497d7a9b3a9-ff-Chris-Hills-Corp.jpg\" alt=\"Why Identity Security Is Breaking Under the Weight of Silos\" width=\"1200\" height=\"1200\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Why Identity Security Is Breaking Under the Weight of Silos<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">Identity has become the connective tissue of the modern enterprise, and the connective tissue of modern attacks. As digital environments grow more complex and AI-driven identities multiply, the cost of managing identity security in silos will only rise.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25562701\" class=\"dp-dfg-item post-25562701 post type-post status-publish format-standard has-post-thumbnail hentry category-personal-security category-security-awareness category-social-engineering category-threat-intelligence\"     data-position=\"28\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/inside-the-diy-scam-economy\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2024\/08\/Scott-Morris-Infoblox.jpg\" alt=\"Inside the DIY Scam Economy\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Inside the DIY Scam Economy<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">Introduction\r\nThe headquarters of the scam economy have always been elusive, shifting between countries, towns and cities like a shadow. Western Africa, once heralded as a hotbed for digital fraud operations, has now been superseded by Southeast Asia, where hundreds of major scam centres are scattered.\r\nThe operations of these criminal groups transcend the digital world, securing land to build cities and special economic zones dedicated to crime operations. They\u2019ve set up sophisticated money laundering and human trafficking networks dedicated to staffing operations across Southeast Asia, including scam bases in Cambodia, Laos, Myanmar and the Philippines.\r\nThe epidemic is named sha zhu pan, known in English as Pig Butchering, and it\u2019s spreading with targets across the globe, including in Australia and New Zealand.\u00a0A research deep dive\u00a0on the tools, infrastructure and expertise has shone a light on how these operations have been able to scale rapidly.\r\nThe expansion has been enabled by new crime-as-a-service offering. Namely, toolkits which offer customers access to the social operation and technical platforms at the heart of crime operations, creating an easy entry point for wannabe scammers.\r\nIn January,\u00a0a notorious pig butchering criminal, Kuong Li, was charged with illegal recruitment for exploitation, aggravated fraud, organised crime and money laundering relating to alleged offences committed in Cambodia and internationally since 2019.\r\n\r\nThe Tools of the Trade\r\nPreviously, cybercrime was only successful with highly skilled practitioners. These days, the sale of \u2018how to\u2019 toolkits, has substantially reduced the barrier to entry and, as a result, international law enforcement is struggling to keep up.\r\nFrom romance and investment scams to law enforcement impersonation and job or task scams, the tools necessary to run these operations are readily available on specific marketplaces. Australians lost $156.8 million to romance scams in 2024,\u00a0according to ScamWatch.\r\nSome of the organisational structure of pig butchering services are not too dissimilar to your typical, legal, organisations. They need communication equipment, compelling sales scripts, access to bank accounts, social media accounts, as well as a website to convert potential targets.\r\nHowever, cybercriminal organisations also need a reliable way to quickly launder stolen funds and cryptocurrencies, moving wealth without law enforcement catching on. This includes using pre-registered SIM cards, fake identities and stolen social media accounts, smuggled Starlink satellites and a rigged online investment platform.\r\nAll of these are available through the full packages and fraud kits now offered by nefarious actors, who openly advertise and sell these kits alongside scam templates and other solutions.\r\nOne particular distributer, known as Penguin, which began with sh\u00e8 g\u014dng k\u00f9 (\u793e\u5de5\u5e93), literally, a \u201csocial worker database\u201d, shares personally identifiable information taken through theft and resale, allowing aspiring cybercriminals to gain access to travel history, documentation of political leanings and information about relatives.\r\nThese groups also sell account data mined from social media platforms like Tinder and WhatsApp, as well as login information from sites like Adobe and Apple\u2019s developer platforms.\r\nWith this information at their fingertips, wannabe scammers still need one thing: a platform they can direct victims to, the actual pig butchering website and fraud content. Such platforms are easily provided by other nefarious organisations in the business.\r\nPremade templates for these websites include those geared towards crypto, forex or gold investment and the resulting website can also be easily geofenced in an effort to avoid law enforcement takedowns in high-risk jurisdictions.\r\nThe best part? The platform requires victims to upload proof of their identity, just like on a real trading website.\r\nThese toolkits offer everything needed to run a pig butchering operation. Some fraud syndicates even mix real transactions with fictional ones to disguise financial streams and confuse law enforcement. With access to valid trading accounts, scammers can move large sums of money, from both legitimate and illegitimate sources.\r\nAs if the barrier to entry needed to be any lower, these templates can cost as little as AU $75. Through this setup, an operation recently exposed in America and mentioned in\u00a0Jia vs. the United States case, for instance, could achieve a return on investment of approximately 70,000 per cent.\r\nThe low barrier to entry has, unsurprisingly, resulted in an explosion of cyber-enabled fraud in Southeast Asia and subsequently, billions of dollars in financial losses felt throughout the globe. Sophisticated Asian crime syndicates have created a global shadow economy from their safe havens in Southeast Asia.\r\n\r\nConclusion\r\nWhat once required technical expertise or an outlay for physical infrastructure, can now be purchased as an off-the-shelf service offering everything from stolen identities and front companies to turnkey scam platforms and mobile apps.\r\nSome of the world\u2019s network of underground powerhouses are now pivoting from drug dealing to scams and cybercrime, recognising its profitability and the lower risk of being apprehended. They know they are safe in their special economic zones, and that international investigations, when they happen, are often too slow to stop them.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25562587\" class=\"dp-dfg-item post-25562587 post type-post status-publish format-standard has-post-thumbnail hentry category-application-security\"     data-position=\"29\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/closing-the-human-gap-in-sap-security-the-case-for-cybersecurity-training\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/02\/Joris-van-de-Vis-SecurityBridge.jpg\" alt=\"Closing the Human Gap in SAP Security: The Case for Cybersecurity Training\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Closing the Human Gap in SAP Security: The Case for Cybersecurity Training<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">Cyber threats are happening at an overwhelming pace, and organizations using SAP systems have become favorite targets for cybercriminals. While specialized tools exist, there is a shortage of skilled professionals with expertise in SAP security. The need for training individuals in this area has never been greater.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25562568\" class=\"dp-dfg-item post-25562568 post type-post status-publish format-standard has-post-thumbnail hentry category-artificial-intelligence category-cyber-resilience category-data-management\"     data-position=\"30\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/navigating-ai-with-cyber-resilient-storage-use-cases-lead-infrastructure-enables\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/02\/Riccardo-diBlasio-NetApp.jpg\" alt=\"Navigating AI With Cyber-Resilient Storage: Use Cases Lead, Infrastructure Enables\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Navigating AI With Cyber-Resilient Storage: Use Cases Lead, Infrastructure Enables<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">This article discusses how intelligent data infrastructure enables AI adoption and innovation while providing robust cybersecurity protection through features like AI-powered ransomware detection and multi-layered security approaches. The piece emphasizes that while use cases drive technology adoption, secure and resilient data infrastructure is the essential foundation that makes AI initiatives viable and protects enterprises from evolving cyber threats.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25557751\" class=\"dp-dfg-item post-25557751 post type-post status-publish format-standard has-post-thumbnail hentry category-compliance-legal category-leadership category-security-operations\"     data-position=\"31\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/security-metrics-that-matter\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2025\/07\/Vanta_Logo.svg\" alt=\"Security Metrics That Matter\" width=\"0\" height=\"0\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Security Metrics That Matter<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">Introduction\r\nOrganisations must move beyond reactive security postures and embrace data-driven decision-making as the sophistication and prevalence of threat actors continues to increase. For start-ups, especially those scaling rapidly or navigating compliance requirements, understanding and tracking the right cybersecurity metrics is crucial.\r\n\r\nSecurity metrics provide clarity: they help prioritise risks, optimise resource allocation, satisfy auditors, and demonstrate trustworthiness to investors and customers alike. But with dozens of potential indicators available, which metrics actually matter?\r\n\r\nThis article outlines the key security metrics every modern organisation should be tracking\u2014particularly start-ups\u2014and why they serve as the foundation of a resilient cybersecurity programme.\r\nPreparedness: Are You Ready for a Breach?\r\nYour level of preparedness is your frontline defence against cyber incidents. This metric encompasses both technical and procedural readiness.\r\n\r\nStart-ups should ask:\r\n\r\n \tHow many devices are missing critical security patches?\r\n \tHow many high-risk vulnerabilities are currently unresolved?\r\n \tWhen was your last disaster recovery, incident response or business continuity test?\r\n\r\nPreparedness also includes non-technical elements such as staff training and policy enforcement. Frequent security awareness sessions, up-to-date policies, and enforced data retention schedules all strengthen your baseline posture.\r\n\r\nMonitoring preparedness metrics ensures you\u2019re not only reacting to threats, but actively building resistance into your infrastructure and culture.\r\nMean Time to Detect (MTTD) and Resolve (MTTR): The Clock Is Ticking\r\nDetection and resolution times are two of the most actionable metrics in security operations. Together, they help quantify your ability to recognise and respond to threats.\r\n\r\n \tMean Time to Detect (MTTD) measures how long it takes from the moment a threat occurs to when your team becomes aware of it.\r\n \tMean Time to Resolve (MTTR) tracks how long it takes to contain, remediate, and recover from that threat.\r\n\r\nWhy this matters: The longer a threat remains undetected, the more damage it can cause. A reduced MTTD and MTTR means your organisation is nimble, prepared, and less likely to suffer sustained damage.\r\n\r\nFor start-ups, these metrics are also critical in attracting enterprise customers or meeting the expectations of regulatory frameworks. They offer a quantifiable way to demonstrate operational maturity\u2014even with a lean team.\r\nAsset Visibility and Unauthorised Devices\r\nYou can\u2019t protect what you don\u2019t know exists. Having an up-to-date inventory of all authorised devices\u2014including laptops, servers, mobile devices, and IoT hardware\u2014is foundational.\r\n\r\nTrack metrics like:\r\n\r\n \tTotal number of assets on the network\r\n \tPercentage of assets with sensitive data\r\n \tNumber of unauthorised or rogue devices detected\r\n\r\nStart-ups often struggle here due to rapid onboarding and less mature asset management processes. But failing to identify and monitor all devices\u2014especially in a BYOD or hybrid work environment\u2014can leave security teams blind to breaches.\r\n\r\nImplementing network access controls, device lifecycle tracking, and monitoring policies can help reduce these risks significantly.\r\nIncident Tracking: Lessons From the Battlefield\r\nSecurity incidents will happen\u2014it\u2019s how you handle and learn from them that matters.\r\n\r\nCritical metrics to monitor include:\r\n\r\n \tNumber of incidents per quarter\r\n \tTypes of attacks (phishing, DDoS, malware, etc.)\r\n \tRoot causes and recurrence rates\r\n \tAverage downtime and associated cost per incident\r\n\r\nA good incident response programme should not only prioritise quick recovery but also include mechanisms for root cause analysis and continuous improvement. For example, if you find that the majority of incidents originate from misconfigured access permissions, that becomes a measurable improvement opportunity.\r\n\r\nDocumenting and tracking incident metrics over time helps identify trends, allocate budget more effectively, and refine staff training.\r\nVendor Security and Third-party Risk\r\nModern organisations, especially cloud-native start-ups, are heavily reliant on third-party vendors\u2014ranging from payment processors and SaaS tools to outsourced developers. Each vendor represents a potential attack vector.\r\n\r\nKey metrics include:\r\n\r\n \tNumber of vendors assessed for security\r\n \tPercentage of high-risk vendors\r\n \tVendor patching cadence and compliance\r\n \tMean time for vendor incident response\r\n\r\nUpGuard\u2019s checklist highlights that vendor-related breaches are increasing, and start-ups must incorporate third-party risk into their cybersecurity strategy. Regular risk assessments, clear contractual obligations, and continuous monitoring are essential\u2014not just best practice.\r\n\r\nStart-ups should also monitor fourth-party risks (the vendors your vendors use) and maintain security standards in vendor contracts. Poor vendor hygiene can directly affect your compliance standing.\r\nPatch Management Effectiveness\r\nOutdated systems and unpatched vulnerabilities remain among the most exploited attack surfaces. This is especially true in fast-paced environments where systems are spun up quickly and not always maintained.\r\n\r\nTrack patch management using:\r\n\r\n \tTime from patch release to deployment (especially for critical vulnerabilities)\r\n \tPercentage of systems running end-of-life (EOL) software\r\n \tNumber of exceptions or non-compliant systems\r\n\r\nMeasuring patching cadence ensures your environment remains hardened. Automating patch deployment and integrating it into your CI\/CD pipeline can improve both compliance and operational efficiency.\r\nAccess Management and Privileged Controls\r\nManaging who can access what\u2014and ensuring those permissions are appropriate\u2014is a top priority. Poor access control often leads to data breaches or insider threats.\r\n\r\nMetrics to track:\r\n\r\n \tPercentage of accounts with Multi-Factor Authentication (MFA) enabled\r\n \tNumber of orphaned (unused) accounts\r\n \tFrequency of access reviews and revocations\r\n \tNumber of privileged accounts and how they're monitored\r\n\r\nStart-ups, in particular, should watch for role creep\u2014where permissions grow informally over time\u2014as employees wear multiple hats. Applying the principle of least privilege and using identity governance tools can help.\r\nRegulatory Compliance and Audit Readiness\r\nStart-ups looking to raise capital, attract enterprise customers, or expand internationally must prove regulatory alignment. Security metrics support that narrative.\r\n\r\nEssential indicators:\r\n\r\n \tPercentage of controls compliant with relevant frameworks (e.g. ISO 27001, GDPR, SOC 2)\r\n \tNumber of outstanding audit findings or remediation tasks\r\n \tFrequency of internal assessments and policy reviews\r\n\r\nTracking these helps demonstrate to stakeholders\u2014especially investors and regulators\u2014that security is not being handled ad hoc but is embedded into company operations.\r\nConclusion\r\nSecurity isn\u2019t just about firewalls and antivirus software\u2014it\u2019s about measurable outcomes. The metrics discussed above\u2014from MTTD and asset visibility to third-party risk and access control\u2014offer a clear window into your organisation\u2019s cybersecurity health.\r\n\r\nFor start-ups, adopting these metrics early can:\r\n\r\n \tReduce exposure to preventable breaches\r\n \tBuild customer and investor confidence\r\n \tStreamline compliance readiness\r\n \tEnable security to scale alongside the business\r\n\r\nBy focusing on metrics that truly matter, security leaders can ensure their teams are spending time on the most impactful work\u2014and transforming security from a cost centre into a strategic asset.\r\n\r\n&nbsp;\r\n\r\nYou can read the full and detailed document here.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25562573\" class=\"dp-dfg-item post-25562573 post type-post status-publish format-standard has-post-thumbnail hentry category-artificial-intelligence category-cyber-resilience\"     data-position=\"32\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/rethinking-cyber-resilience-in-the-age-of-ai\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/01\/Gagan-Gulati-NetApp.jpg\" alt=\"Rethinking Cyber Resilience in the Age of AI\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Rethinking Cyber Resilience in the Age of AI<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">AI is transforming both innovation and risk, driving advancements while enabling more sophisticated cyber threats. To achieve true cyber resilience, organizations must shift from passive data storage to intelligent, proactive defense, integrating AI-driven detection and recovery directly into the data layer to anticipate, withstand, and recover from attacks seamlessly.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25562658\" class=\"dp-dfg-item post-25562658 post type-post status-publish format-standard has-post-thumbnail hentry category-artificial-intelligence category-network-security category-product-development\"     data-position=\"33\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/ciscos-bid-to-anchor-the-agentic-enterprise\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2025\/11\/Cam-Perry-HS-1-e1764896971167.jpg\" alt=\"Cisco\u2019s Bid to Anchor the Agentic Enterprise\" width=\"1200\" height=\"1200\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Cisco\u2019s Bid to Anchor the Agentic Enterprise<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">The Shift to Agentic Enterprise AI\r\nArtificial Intelligence (AI) now alters the commercial world with a speed that feels less evolutionary and more tectonic. Infrastructure strains, security models stretch, collaboration tools morph. In that context, Cisco has positioned itself not merely as a participant, but as a structural layer in what it sees as the next phase of enterprise computing.\r\n\r\nDuring a recent company presentation by Cisco, senior executives set out a coordinated view of how AI reshapes networks, data centres, security architecture, and the workplace. The tone was less promotional than directional. From an analyst\u2019s standpoint, Cisco appears intent on anchoring AI not as a feature set, but as an operating assumption for the modern enterprise.\r\n\r\nThe emphasis was consistent: advantage will not stem from AI experimentation alone, but from embedding intelligence into infrastructure, governance, and operational design in ways that produce measurable business outcomes.\r\nFrom Chatbots to Agentic AI\r\nA clear inflection point framed the discussion. The early wave of AI in enterprise environments centred on chat interfaces and query-based models. The emerging phase, executives argued, revolves around autonomous, task-performing agents.\r\nAs Jeff Schultz put it,\u00a0\u201cWe are firmly moving from the era of chatbots\u2026to a world of agentic AI where workflows are\u2026automated and agents are able to actually perform tasks on behalf of human workers.\u201d\r\nThis distinction matters as reactive information retrieval becomes proactive execution, and AI shifts from assistant to (largely) independant initiator.\r\n\r\nFor executive teams, the promise lies in scalable productivity and accelerated workflows, yet the constraints are almost equally tangible. Schultz identified three structural barriers; infrastructure limits, trust deficits, and an impending data gap. Each represents not just a technical friction point, but a strategic risk. If infrastructure cannot sustain persistent inferencing workloads, or if governance cannot contain autonomous behaviour, competitive advantage may stall before it materialises.\r\nInfrastructure as the AI Substrate\r\nAI workloads differ fundamentally from traditional enterprise applications. Continuous inferencing, distributed processing, and data-heavy interactions reshape utilisation patterns. Elasticity becomes mandatory. Latency tolerances shrink. Energy demands rise.\r\n\r\nCisco\u2019s response is to frame itself as what Schultz described as the \u201c...next critical infrastructure layer for the AI era\u201d. That ambition rests on four pillars:\r\n\r\n \tAI-ready data centres\r\n \tFuture-proof workplaces\r\n \tSecure global connectivity\r\n \tDigital resilience\r\n\r\nFor leadership teams allocating capital, this layered model signals alignment between technology refresh cycles and board-level outcomes: speed to market, cost efficiency, employee experience, and risk management.\r\n\r\nThe subtext is clear. Infrastructure modernisation cannot remain incremental. It must anticipate agent-driven workloads at scale.\r\nAgenticOps and the Operating Model Question\r\nOne of the more substantive ideas introduced was \u201cAgenticOps\u201d, an operating construct in which AI systems observe, reason, decide, and act across enterprise environments.\r\nDJ Sampath described it succinctly, \u201cAI just doesn\u2019t observe these systems, but they start to reason, decide, and act on them to ultimately deliver customer outcomes.\u201d\r\nAutomation here shifts from static scripts to context-aware decision engines. That evolution carries three immediate executive implications:\r\n\r\n \tOperational efficiency expands beyond isolated tasks into cross-domain orchestration\r\n \tWorkforce capability shifts as repetitive functions fall away\r\n \tOrganisational agility improves when systems adapt in near real time\r\n\r\nNotably, the company emphasised that these capabilities are already in pilot environments with customers and design partners. That suggests experimentation has moved beyond theory into operational validation.\r\nRebuilding the Data Centre for AI Scale\r\nThe architectural detail offered during the session underscored how far infrastructure requirements have moved.\u00a0Kevin Wallenweber highlighted the hyperscaler reality: massive GPU clusters, liquid cooling systems, rack-level scale. Yet he also acknowledged a more complex middle tier, (sovereign builders, NeoCloud providers, and enterprise operators) who require solutions that integrate cleanly rather than merely scale aggressively.\r\n\r\nNew silicon platforms, high-throughput switching, and energy-efficient optics were framed not simply as performance upgrades, but as drivers of total cost of ownership and sustainability gains. Integrated management layers, such as unified control planes, aim to reduce misconfiguration risk and operational sprawl.\r\n\r\nFor boards that routinely ask whether technology estates can be simplified while simultaneously expanded, the integration narrative will resonate.\r\nSecurity as a Structural Control Point\r\nIf autonomous agents represent opportunity, they also represent exposure.\r\nTom Gillis captured the tension with a disarmingly human analogy, \u201cThese AI agents remind me\u2026of my kids when they were in high school; capable of doing great things, also capable of doing some crazy stuff.\u201d\r\nThe response articulated was platform-led security rooted in the network itself. Rather than treating security as an overlay, Cisco positions the network as a native enforcement layer.\r\nGillis noted, \u201cThe root of our platform is the network\u2026 the network can play a really important role in delivering security that is uniquely differentiated.\u201d\r\nFor executive leadership, that approach implies tighter governance over agent behaviour, reduced shadow AI proliferation, and real-time containment of anomalous activity. The urgency is palpable. As Gillis warned, agents are already appearing inside enterprises, often without formal approval.\u00a0Governance frameworks will struggle if visibility does not exist at the infrastructural core.\r\nData Without Drag\r\nAI\u2019s effectiveness correlates directly with data accessibility and quality. Yet wholesale data centralisation introduces privacy, sovereignty, and latency challenges. A federated, API-driven model designed to work across multiple data lakes while avoiding unnecessary data movement, was outlined, with great progress on the federated search, the federated approach seemingly made. The presentation also alludedd to a machine data lake initiative that's currently in alpha mode, further signaling investment in telemetry-driven insights.\r\n\r\nFor executive teams operating across jurisdictions, this federated design may prove decisive. Competitive advantage will depend less on raw data volume and more on the ability to interrogate distributed datasets intelligently and compliantly.\r\nCollaboration in an AI-Augmented Workplace\r\nInfrastructure discussions can obscure the human dimension. The presentation did not ignore it.\r\nAnurag Dhingra described AI extending from the data centre into daily collaboration, including real-time speech-to-speech translation within Webex environments,\u00a0\u201cLanguage will no longer be a bar. I could be speaking in English, and on the other side, a Spanish native speaker\u2026all in real time.\u201d\r\nThe practical effect is subtle but powerful. Barriers fall. Global teams operate with reduced friction. AI augments rather than replaces.\r\n\r\nFor leadership concerned about cultural cohesion and talent engagement, it's vital to identify that sustainable AI deployments amplify human capability.\r\nSignals for the Boardroom\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\nA number of themes surface on closer inspection. Integration appears to take precedence over fragmentation; network, security, data, and collaboration no longer sit in parallel silos but cohere within a single architectural frame. AI, meanwhile, is positioned in practical terms. The emphasis rests on productivity, cost discipline, operational resilience, and governance, rather than on spectacle or abstract promise. Trust, in this context, does not arrive as a finishing touch. It is designed into the infrastructure itself, with embedded security treated as a condition for scaling autonomous systems with any real credibility.\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\nJeff Schultz summarised the mood with characteristic optimism,\u00a0\u201cWe are massively optimistic about this change and think it's going to create a huge amount of productivity globally.\u201d\r\nOptimism, however, appears tethered to operational discipline.\r\nConclusion\r\nCisco\u2019s direction suggests an ambition to function as the foundational layer upon which enterprises construct their AI-driven futures. The emphasis on interoperability, embedded security, and infrastructure coherence indicates recognition that AI success depends less on isolated breakthroughs and more on systemic readiness.\r\n\r\nEnterprises that operationalise, secure, and scale with deliberation will likely define the next competitive tier. Those that treat AI as a peripheral enhancement may find themselves managing complexity rather than extracting value.\r\n\r\nIn that sense, the presentation was not simply an update, but rather a signal.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25562541\" class=\"dp-dfg-item post-25562541 post type-post status-publish format-standard has-post-thumbnail hentry category-artificial-intelligence category-personal-security\"     data-position=\"34\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/how-to-protect-your-professional-image-in-the-ai-age\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/02\/John-Square.jpg\" alt=\"How to Protect Your Professional Image in the AI Age\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">How to Protect Your Professional Image in the AI Age<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">When Canadian Jake Moffat\u2019s grandmother died in late 2022, he was at least comforted by an assurance from Air Canada\u2019s helpful AI chatbot that he could get a compassionate rebate for his airfare after the event. That was a nice thing for an airline to do, made all the easier with the help of a friendly AI, and it eased the sting of an unexpected expense.\r\n\r\nThere was just one problem.\r\n\r\nAir Canada never had a policy of rebating airfares after the event on compassionate grounds. Passengers were required to obtain the compassionate discount before the event, not afterwards. Air Canada duly refused the post-event rebate, and Jake Moffat took them to court. He won the case, and Air Canada won a big black eye.\r\n\r\nLess than two years later, British logistics company DPD\u2019s AI chatbot began giving strange answers to customers seeking updates on where their packages were. These answers included profanity, insults about their own company, and even a mocking poem criticizing DPD\u2019s service. Nobody sued DPD, but probably because we\u2019ve all experienced a package arriving late, it became fodder for bad jokes and conversation in every pub in England.\r\n\r\nThe fascinating thing about these events, and many others like them, is the narrative. Hardly anyone said, \u201cThe vendor-supplied AI was insufficiently programmed and hallucinated a response.\u201d Mostly, people said \u201cThe company was careless.\u201d The first of these responses is an understandable glitch that we all expect from computers. The second is a reputational disaster.\r\n\r\nWhen AI systems emulate humans, it\u2019s inevitable that we attach human qualities to them. We would not do this with a simple question-and-answer lookup table. But when an AI system goes out of its way to emulate human language, empathy, conversation\u00a0 and understanding, and especially when it goes wrong, it\u2019s also natural for us to attribute human qualities to it such as carelessness and laziness. The AI then becomes a spokesperson for the company, just as a human spokesperson would, and as such it carries the reputation of the business with everything it does and doesn\u2019t do.\r\n\r\nAs a senior manager, it\u2019s bad enough dealing with the fallout when human staff damage the reputation of the business. But a mis-programmed AI can do this a million times in a single night, creating a million bad customer interactions, each of them seeming deeply personal.\u00a0 It\u2019s a risk that can cascade out of control in a matter of hours.\r\n\r\nWhat\u2019s the solution? Do we just accept that reputational exposure to AI is inevitable?\u00a0 Do we ban AI from all customer interactions? Or do we find a middle path?\r\n\r\nThe answer varies with industry, and also with human expectation. There\u2019s a quantifiable difference between an AI at a large hospital giving advice on heart surgery options (bad idea), an AI at a law firm helping you find the right lawyer (possibly okay idea) and an AI at a department store helping you find the right pair of shoes (probably a good idea). As Air Canada and DPD found out the hard way, people care about their travel and their delivered packages, so a reputational exposure to AI in these areas needs deep thought.\r\n\r\nJust as no wise parent gives a two-year-old more orange juice than they\u2019re willing to clean up from the carpet, so no organization should lean on an AI or a chatbot harder than their reputation or industry can stand. It\u2019s the old trick of considering the worst-case scenario. If the worst outcome of an AI going wrong (and you must assume that the AI will go wrong at some point) is a dead patient or a massive lawsuit, then that\u2019s an initiative that the senior leadership needs to stop cold in its tracks, no matter how keen the young people are.\r\n\r\nAnd what about those other cases \u2013 the ones where the stakes don\u2019t seem quite so high? The truth here is that the world is full of risks and misinformation. The risks and misinformation that really make us angry are the ones that are unexpected, the wrong roads we end up on when we were sure that a trusted source would set us on the right roads. Nobody is too surprised when our Uncle Phil the road worker gives us bad legal advice, but when a lawyer does it, we get furious. It follows that a big part of the answer with reputational risk from AI, in cases where we feel we can tolerate some level of risk, is simply to tell the truth.\r\n\r\nEvery customer-facing AI should come with a clear warning, as medications do, delivered in a way that can\u2019t be skipped over. Simply tell people the facts. AI is experimental, often unreliable, very useful \u2013 especially if you need an answer at two in the morning \u2013 but in no way should it be treated as your sole source of advice. For the foreseeable future, and in critical situations, AI is no substitute for a professional opinion and should not be mistaken for one. It\u2019s all about making sure that there\u2019s clear labeling on the bottle.\r\n\r\nDo that, and you\u2019re protecting your customers and yourself from a bad reaction.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25562537\" class=\"dp-dfg-item post-25562537 post type-post status-publish format-standard has-post-thumbnail hentry category-personal-security category-social-engineering\"     data-position=\"35\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/love-bombing-and-pig-butchering-how-romance-scams-are-evolving\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/02\/Ritesh-Chugh.jpg\" alt=\"Love-bombing and Pig-butchering: How Romance Scams Are Evolving\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Love-bombing and Pig-butchering: How Romance Scams Are Evolving<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">As Valentine\u2019s Day approaches, millions of Australians will be encouraged to swipe, match and message online in the search for romance. Dating apps and social platforms typically see a surge in activity during this period, driven by the promise of companionship, intimacy and connection. But alongside genuine relationships, this heightened activity also creates fertile ground for romance scams, where emotional vulnerability is deliberately exploited using increasingly sophisticated digital techniques.\r\n\r\nRomance scams in Australia increasingly combine emotional manipulation, investment fraud and emerging technologies. Understanding how these scams unfold helps explain why warning signs are often missed.\r\n\r\nRomance scams are a form of fraud in which a scammer pretends to form a genuine romantic relationship in order to exploit trust for financial gain. They most often begin on dating apps, social media platforms, or messaging services and typically develop over time rather than through immediate requests for money.\r\n\r\nScammers usually create convincing fake profiles and invest significant time in building an emotional connection before introducing financial requests. This process, often referred to as\u00a0love-bombing, involves frequent messaging, expressions of affection and discussions about future plans designed to establish trust and emotional dependence.\r\n\r\nAs trust builds, the scam shifts. Victims may be asked to help with an emergency, send money temporarily, or participate in what appears to be a legitimate financial opportunity. These requests are structured to discourage outside scrutiny and normalise secrecy, making the scam difficult to recognise while it is unfolding.\r\n\r\nRomance scams are also referred to as dating scams or\u00a0romance fraud. In recent years, Australian authorities have increasingly used the term\u00a0pig-butchering\u00a0to describe long-term romance scams that transition into investment fraud, particularly involving cryptocurrency or offshore trading platforms. In these cases, losses are escalated over time and recovery is unlikely.\r\nCurrent Romance Scam Trends in Australia\r\nIn 2025, Australians\u00a0reported\u00a03432 dating and romance scams, with total losses of about $28.7 million (AUD), and an average loss per victim of about $8360. Losses are concentrated among older Australians, particularly those aged 55\u201364 and 65 and over. Women account for nearly two-thirds (about 63 per cent) of the total financial losses.\r\n\r\nState-level reporting shows New South Wales (877 reports) and Queensland (854 reports) recorded the highest number of cases, followed by Victoria (641) and Western Australia (331). Smaller jurisdictions such as the Northern Territory (23) and the ACT (57) report far fewer cases, largely reflecting population size rather than lower risk.\r\n2025 ScamWatch dating and romance scam statistics (Author supplied image)\r\nOne evolving pattern is the integration of emotional trust with financial deception. Scammers may encourage victims not only to send money, but also to invest jointly in what appears to be profitable opportunities, such as\u00a0cryptocurrency trading\u00a0or offshore ventures. The Australian Federal Police warned Australians about\u00a0organised fraud syndicates that lure people through dating apps before encouraging investment transfers to scam accounts.\r\n\r\nAnother emerging trend is the use of\u00a0AI-assisted impersonation, including deepfakes. Europol has documented how deepfakes can support fraud and social engineering. The\u00a0Europol Innovation Lab\u00a0warns that advances in AI now make it technically possible to manipulate audio and video content in near real time, including in videoconferencing environments. As a result, voice messages, images and even live video interactions can\u00a0no longer\u00a0be assumed to provide definitive proof of identity.\r\nKey Red Flags People Often Miss\r\nMany red flags are difficult to identify while a relationship is unfolding because manipulation begins with emotional engagement rather than obvious requests for money.\r\n\r\nOne common feature is unusually rapid emotional\u00a0intimacy. Expressions of affection and commitment appear early, creating trust before meaningful verification occurs.\r\n\r\nAnother frequently missed signal is repeated avoidance of video calls and in-person meetings. Scammers typically provide plausible explanations, such as travel, busy schedules or technical issues, as part of a broader\u00a0social engineering strategy\u00a0used to avoid identity exposure. Individually, these explanations may not raise alarm. It is their persistence that matters.\r\n\r\nThese scams deliberately\u00a0avoid\u00a0face-to-face verification, relying instead on sustained text-based communication to build emotional attachment before any financial request is made.\r\n\r\nFinancial escalation is often gradual. Requests for help or suggestions to invest together tend to be framed as temporary, shared, or confidential rather than urgent or exploitative.\u00a0Secrecy\u00a0is often positioned as trust or loyalty, discouraging individuals from discussing the relationship with others.\r\n\r\nOnce the relationship feels established, requests for financial help and personal financial information are gradually introduced. Concerningly, scammers may suggest \u201cinvestment opportunities,\u201d often framed with\u00a0assurances\u00a0of shared benefit, which can normalise financial risk and delay scepticism.\r\n\r\nA further trend is the rapid movement of\u00a0conversations away\u00a0from dating apps and mainstream social media. Once communication shifts to private messaging services such as WhatsApp, Telegram, Signal or WeChat, platform-level safeguards weaken. This reduces opportunities for moderation and reporting and limits the chance that friends, family, or moderators might notice inconsistencies or raise concerns.\r\nA Simple Checklist to Protect Yourself and Report Early\r\nPractical actions can reduce harms from romance scams and support early intervention:\r\n\r\n \tDo not send money, gift cards, cryptocurrency or financial details to someone you have not met in person.\r\n \tBe cautious if a relationship becomes emotionally intense very quickly or if video contact is consistently avoided.\r\n \tTreat any move towards financial help or shared investment with caution, particularly before meeting face to face.\r\n \tKeep records of messages, profiles and requests rather than deleting conversations immediately.\r\n \tReport suspicious behaviour within the app or platform before blocking the account.\r\n \tIf money or personal information has been shared, report it early to the Australian Government\u2019s\u00a0ScamWatch\u00a0and\u00a0cybersecurity website.\r\n\r\nEarly reporting is not an admission of error. It is a preventative cybersecurity action that supports national scam intelligence and helps protect others.\r\n\r\nRomance scams persist in Australia not because people are careless, but because emotional trust is exploited. As online platforms increasingly mediate personal relationships and AI tools lower the cost of impersonation, cybersecurity must be understood as a shared responsibility that includes protecting the social spaces where trust is formed.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25562494\" class=\"dp-dfg-item post-25562494 post type-post status-publish format-standard has-post-thumbnail hentry category-crypto-blockchain-quantum category-cyber-resilience category-data-management\"     data-position=\"36\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/future-proofing-your-data-infrastructure-with-post-quantum-cryptography\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/02\/ff-fa3b29fefd07378d612efa366290053f-ff-Screenshot-2026-02-09-at-9.27.47-PM-e1770721879664.png\" alt=\"Future-Proofing Your Data Infrastructure With Post-Quantum cryptography\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Future-Proofing Your Data Infrastructure With Post-Quantum cryptography<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">Quantum computing poses a significant threat to current encryption systems, making sensitive data vulnerable to future decryption by cybercriminals using \"harvest now, decrypt later\" tactics. To mitigate this risk, organizations must adopt post-quantum cryptography (PQC) standards, such as those developed by NIST, and integrate them into their data infrastructure to ensure long-term security and maintain trust in a quantum-powered future.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25562486\" class=\"dp-dfg-item post-25562486 post type-post status-publish format-standard has-post-thumbnail hentry category-critical-infrastructure category-leadership category-security-operations\"     data-position=\"37\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/rising-cybersecurity-vulnerabilities-in-increasingly-interconnected-it-ot-environments\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/02\/David-Magee-Turtle.jpg\" alt=\"Rising Cybersecurity Vulnerabilities in Increasingly Interconnected IT\/OT Environments\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Rising Cybersecurity Vulnerabilities in Increasingly Interconnected IT\/OT Environments<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">From Outage to Infiltration: Cybersecurity Risk and the Evolving Threat to Electrical Infrastructure\r\nAs electrical infrastructure modernizes, its vulnerabilities evolve in parallel. From substation automation to AI-powered grid management, today\u2019s systems have developed from the isolated hardware of the past to converged digital ecosystems with data pathways, network connections, and embedded intelligence. Every connection point introduces new exposure. And in critical infrastructure, exposure carries real-world consequences.\r\n\r\nElectric power is foundational to nearly every aspect of modern life. Yet the same digital transformation improving efficiency and visibility has also opened the door to increasingly sophisticated cyber threats. Smart grids, connected assets, and distributed energy resources (DERs) enable performance gains, but also multiply the attack surface.\r\n\r\nIn 2024, ransomware attacks on energy infrastructure surged by over 80% year-over-year, with utilities being one of the most targeted sectors globally. According to Resecurity, nearly 67% of energy and utility organizations have experienced a ransomware incident within the last 12 months. These breaches can compromise operations, safety, and public trust beyond simply impacting data.\r\nBuilding Smart Systems That Defend Themselves\r\nIn this new era of intelligent electrical infrastructure, the systems that power our cities must also protect them. That means deploying layered defenses, enabling secure remote access, and continuously evaluating cyber risk across IT (information technology) and OT (operational technology) environments. It also means working with partners with teams who understand the intersection of electrical systems and cybersecurity and can align technology with field realities, system requirements, and compliance mandates.\r\n\r\nAn important point to note when building secure, connected infrastructure is that the convergence of IT and OT environments increases risk if the security controls are not harmonized. At times, disconnects between cybersecurity priorities across corporate vs. operational leadership, like prioritizing system uptime to drive revenue as opposed to comprehensive cybersecurity, elevates the risk for cyber attacks.\r\n\r\nBecause of this, the most effective programs extend beyond technology alone. They combine technical insight with operational execution, ensuring systems are monitored, threats are contained, and continuity is never compromised.\r\nDesigning Resilience Into Every Layer\r\nAddressing these challenges requires a proactive strategy rooted in visibility, architecture, and lifecycle defense that starts with knowing what\u2019s connected.\r\n\r\nProper cybersecurity posture must start with knowing exactly where risk lies in your infrastructure. Asset inventories, traffic mapping, and vulnerability assessments are the foundation of truly secure infrastructure. From there, real-time monitoring, penetration testing, and threat detection systems create the ongoing situational awareness needed to act before incidents escalate.\r\n\r\nFor example, even the securest, air-gapped OT is at risk of going down from cyberattack. Indirect attacks on IT, say on an organization\u2019s billing system, can directly impact OT and therefore uptime. In this case, if an organization is unable to bill their customers due to a ransomware attack, their leadership may shut down operations entirely\u2014not because of a direct attack on their operations, but because a lack of harmony across incidence response, disaster recovery, and business continuity required them to do so while they dealt with the fallout.\r\n\r\nOrganizations must implement security architectures tailored to their operational goals, meaning architectures that align policies and protocols without impeding uptime. Extended Detection and Response (XDR), zero-trust segmentation, and cyber-physical simulations (Purple Team exercises) are just some of the tools modern infrastructure leaders are using to build resilience.\r\n\r\nFrameworks like NERC CIP and DOE\u2019s new cybersecurity baselines for distribution systems provide important direction. But meeting compliance isn\u2019t enough. Security must become embedded in electrical infrastructure from design and deployment to maintenance and modernization.\r\nWhy Electrical Infrastructure Is a High-value Target\r\nAs grids evolve into intelligent networks, the boundaries between IT and OT continue to blur. Industrial control systems (ICS), smart meters, battery storage platforms, and microgrid controllers are increasingly connected, yet many were not designed with cyber resilience in mind. Legacy defenses, standalone devices, and siloed protocols cannot withstand coordinated, multi-vector attacks.\r\n\r\nThreat actors are exploiting this convergence. Malware like Industroyer and Triton have shown how attackers can penetrate control systems and disable safety functions in energy networks. Meanwhile, exposed solar PV systems and EV chargers are becoming new points of entry, as highlighted in TechRadar\u2019s recent report on the thousands of vulnerable devices that can be found online.\r\n\r\nThe implications are broad: compromised meters can distort grid data and billing; a shutdown of a substation could ripple across city blocks or regional networks. A single vulnerability, left unaddressed, can create failure across the entire system.\r\nWhat\u2019s at Stake\r\nPower sector cyber incidents don\u2019t just disrupt, they cascade. A targeted attack on a utility operator can result in prolonged outages, economic losses, or threats to emergency services. The World Economic Forum estimates that prolonged blackouts due to cyberattacks could cost national economies billions, with energy considered one of the most high-risk critical infrastructure sectors.\r\n\r\nOrganizations must now view cybersecurity as integral to their reliability planning. It is no longer a question of \u201cif\u201d a threat emerges, but how resilient systems are in containing and recovering from it.\r\n\r\nFor infrastructure leaders, the call is clear: Assess your risks. Build for performance. Operate for protection. Design for trust.\r\n\r\nBecause in the electrical sector, cybersecurity is the strategy that keeps the lights on.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25562351\" class=\"dp-dfg-item post-25562351 post type-post status-publish format-standard has-post-thumbnail hentry category-application-security category-executive-communication category-leadership category-security-operations\"     data-position=\"38\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/cyber-dashboards-are-making-boards-feel-saferand-thats-the-real-risk\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/02\/Ben-Mudie-Tenable.jpg\" alt=\"Cyber Dashboards Are Making Boards Feel Safer\u2026and That\u2019s the Real Risk\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Cyber Dashboards Are Making Boards Feel Safer\u2026and That\u2019s the Real Risk<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">Cyber dashboards could be driving complacency when it comes to cyber risk.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25562460\" class=\"dp-dfg-item post-25562460 post type-post status-publish format-standard has-post-thumbnail hentry category-artificial-intelligence category-cyber-resilience category-personal-security\"     data-position=\"39\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/knowbe4-experts-calls-for-digital-mindfulness-and-skepticism-as-ai-dominates-safer-internet-day-2026\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/02\/Erich-Kron-KnowBe4.jpg\" alt=\"KnowBe4 Experts Calls for \u2018Digital Mindfulness\u2019 and Skepticism as AI Dominates Safer Internet Day 2026\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">KnowBe4 Experts Calls for \u2018Digital Mindfulness\u2019 and Skepticism as AI Dominates Safer Internet Day 2026<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">As the world prepares for Safer Internet Day on 10 February 2026, KnowBe4 is encouraging individuals of all ages to adopt a mindset of \u2018digital mindfulness\u2019 to stay safe online. This year\u2019s theme, \u2018Smart tech, safe choices \u2013 Exploring the safe and responsible use of AI\u2019, highlights the urgent need for a new set of digital skills in the world of AI.\r\n\r\nWith Artificial Intelligence (AI) now a permanent fixture in the lives of children and young people, the ability to distinguish between authentic and AI-generated content is no longer just a technical skill - it is a core life skill. KnowBe4 is urging individuals to move beyond passive consumption and take an active, mindful role in their online safety.\r\n\r\nThe explosive use of AI for deepfake photos, audio, and videos has made it more important than ever to be cautious about what we believe. Whether it's an eager-to-please AI chatbot or a highly convincing social media scam, the best defence is to slow down and verify before acting.\r\n\r\nTo support Safer Internet Day, below are a set of guidelines to help individuals navigate this new landscape safely.\r\nNavigating the AI World\r\n\r\n \tTreat AI like an eager intern: AI is confident and its intention may be good but it doesn\u2019t always provide the right information. Approach AI-generated information with healthy skepticism. Before acting on its output, ask for sources and sanity-check any information involving money, safety or emotions with a trusted human or official site.\r\n \tVerify before you share: Social media algorithms often prioritise engagement over accuracy. Be aware that fake accounts use outrageous claims or AI-generated images to drive clicks - known as \u2018clickbait\u2019. Always double-check images or headlines before sharing them with your network.\r\n \tGuard your personal details: AI tools allow bad actors to analyse public data to create highly personalised, believable scams. Unless there is a specific reason to be public, keep social media accounts restricted to friends and family to limit the data available for these attacks.\r\n\r\nBuilding Digital Resilience\r\n\r\n \tPractice digital mindfulness: This practice involves doing one thing at a time and can help us make safer choices online. Many attacks succeed not because of a lack of knowledge, but because a user was distracted or frazzled in the moment. Digital mindfulness also means paying attention to our online safety, perhaps by proactively reviewing our privacy settings, enabling multi-factor authentication (MFA) and installing a password manager.\r\n \tMaster the \u2018Big Two\u2019: Most cyber exploits rely on two things: tricking a human (social engineering) or exploiting unpatched software. Individuals should concentrate on learning how to not be tricked because it\u2019s the easiest way to stay safe. Then make sure your software and firmware are patched in a timely manner.\r\n \tAdopt phishing-resistant MFA: Traditional passwords are no longer enough. Use phishing-resistant MFA to protect valuable data. For situations where a password is required, use a password manager to create and use truly random passwords that are as long and complex as possible, and unique for every site or service.\r\n \tThe 25-character rule: If you must make up a password out of your head then you need to create a 25-character or longer passphrase (e.g. rogerjumpedoverthebluecowandfish). This length provides a critical buffer against modern AI-driven password cracking and emerging quantum threats.\r\n\r\nSafer Internet Day 2026 is a reminder for young people and adults alike to rethink online safety in light of the impact of AI. By combining technical defences like MFA with behavioural changes such as digital mindfulness, individuals can navigate the modern digital landscape with greater security and confidence.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25562457\" class=\"dp-dfg-item post-25562457 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-resilience category-personal-security\"     data-position=\"40\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/safer-internet-day-2026\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/02\/Pat-Breen-Cloudflare.jpg\" alt=\"Safer Internet Day 2026\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Safer Internet Day 2026<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">Introduction\r\nOn Safer Internet Day, it\u2019s worth recognising a simple reality: AI is reshaping the Internet in two directions at once. The same tools accelerating productivity and innovation are also industrialising cybercrime, making attacks faster to launch, cheaper to run, and harder to spot.\r\nWe\u2019ve seen the impact in Australia. In 2024\u201325, the Australian Signals Directorate\u2019s Australian Cyber Security Centre responded to over 1,200 cyber security incidents, with incidents involving DoS\/DDoS attacks rising by more than 280%.\r\n\r\nThis matters because the Internet underpins almost every essential service Australians rely on\u2014banking, healthcare, education, transport, and government. When attacks disrupt availability or compromise trust, the consequences are immediate: outages, fraud, delayed care, lost productivity, and higher costs. The Office of the Australian Information Commissioner notes that IBM estimates the average cost to Australian businesses of a data breach was $4.26 million in 2024.\r\nThe AI Inflection\r\nSo, the question isn\u2019t whether AI will change the internet, it already has. The question is whether we respond at the same speed and scale as the threats.\r\n\r\nThis is where platforms like Cloudflare can help raise the baseline for everyone. With data centres in major Australian cities, Cloudflare stops threats closer to their source. In 2025, Cloudflare mitigated 47.1 million DDoS attacks globally, including a record 31.4 Tbps attack\u2014detected and blocked automatically. And as organisations deploy AI, capabilities like Cloudflare Email Security and Firewall for AI can help reduce phishing risk and protect AI applications from abuse and data exfiltration.\r\n\r\nAI will make the Internet both safer and riskier. What determines the outcome is how quickly we modernise our cyber defences to stay ahead.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25562391\" class=\"dp-dfg-item post-25562391 post type-post status-publish format-standard has-post-thumbnail hentry category-crypto-blockchain-quantum category-cyber-resilience category-data-management category-data-security\"     data-position=\"41\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/data-resilience-in-a-post-quantum-world\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/02\/ff-040eaa0275173afd7fdd958752144574-ff-thedigitalartist-ai-generated-7958893_1280-e1770596207380.jpg\" alt=\"Data Resilience in a Post-Quantum World\" width=\"958\" height=\"958\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Data Resilience in a Post-Quantum World<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">As cyber threats evolve and quantum computing looms, organizations are shifting from breach prevention to resilience-focused strategies that prioritize continuity, recovery, and adaptability. By adopting quantum-safe cryptography, tamper-proof backups, automated detection, and crypto-agile infrastructures, forward-thinking enterprises are building secure, efficient systems to mitigate risks and ensure long-term data integrity in a post-quantum world.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25562394\" class=\"dp-dfg-item post-25562394 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-resilience category-data-management category-personal-security category-security-awareness\"     data-position=\"42\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/securing-the-new-gaming-frontier-data-infrastructure-at-play\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/02\/ff-b6b0f60bc4ac08ac53dc2f185233a741-ff-ahmedalmaslamani-ai-generated-9161446_1280-e1770561233901.jpg\" alt=\"Securing the New Gaming Frontier: Data Infrastructure at Play\" width=\"731\" height=\"731\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Securing the New Gaming Frontier: Data Infrastructure at Play<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">The gaming industry is undergoing a transformative era, driven by immersive technologies, AI, and global online communities, but this evolution brings critical challenges in balancing innovation with security and scalability. To thrive, studios must adopt intelligent, resilient data infrastructures that ensure seamless gameplay, safeguard against cyber threats, and support the ever-expanding demands of modern gaming ecosystems.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25561956\" class=\"dp-dfg-item post-25561956 post type-post status-publish format-standard has-post-thumbnail hentry category-artificial-intelligence category-encryption-cipher category-identity-access-management category-secure-communications\"     data-position=\"43\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/deepfake-diplomacy-ai-impersonations-attack-on-sovereign-security\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2025\/07\/David-Wiseman-BlackBerry.jpg\" alt=\"Deepfake Diplomacy &#8211; AI Impersonation\u2019s Attack on Sovereign Security\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Deepfake Diplomacy &#8211; AI Impersonation\u2019s Attack on Sovereign Security<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">The rise of AI-powered impersonation\u2014ranging from synthetic voice deepfakes to algorithmically generated messages\u2014poses a critical threat to government, defense, and national infrastructure. A recent incident involving an AI-generated impersonation of a U.S. Secretary of State underscores the urgency of this threat.\r\n\r\nState-sponsored actors are increasingly exploiting consumer-grade messaging apps including Signal to infiltrate secure channels, extract sensitive data, and disrupt operations. These platforms, designed for mass-market use, lack the hardened security architecture required to withstand sophisticated AI-driven attacks. Their infrastructure, often reliant on commercial cloud services leaves organizations exposed to systemic vulnerabilities.\r\nConsumer Messaging Apps: Unfit for Critical Missions\r\nWhile many consumer apps offer basic end- to- end encryption, they fall short in several key areas essential for sovereign and mission-critical communications:\r\n\r\n \tLack of Global Certifications\r\nMost consumer-grade platforms do not meet government and defense standards such as Common Criteria certificates, NATO accreditations, NSA CSfC listing, Common Criteria (EAL4+), or FIPS 140-2 validation. Without these, they cannot reliably defend against state-level threats.\r\n \tReliance on Non-Sovereign Infrastructure\r\nThese apps typically operate on third-party cloud services, removing critical oversight including recordkeeping compliance and introducing uncontrolled external risk.\r\n \tWeak Identity Assurance\r\nAdvanced cryptographic authentication is often absent, making it easier for AI-generated impersonations to bypass identity checks.\r\n \tNo Zero Trust Enforcement\r\nConsumer apps rarely implement continuous risk assessment or least-privilege access controls, failing to meet the standards of a zero-trust security model.\r\n\r\nRecent AI-driven voice and message attacks have revealed that consumer-grade messaging platforms lack the security and operational architecture necessary to counter advanced threats, posing serious risks to national sovereignty and organizational integrity.\r\nBlackBerry SecuSUITE: Certified Protection Against AI Impersonation\r\nBlackBerry\u00ae SecuSUITE\u00ae is purpose-built to secure communications in environments where compromise is not an option. It offers sovereign-grade assurance and complete independence from third-party infrastructure, ensuring operational continuity and resilience against AI-driven threats.\r\n\r\nSecuSUITE excels where others fail:\r\n\r\n \tGlobal Certifications\r\n\r\n \tNATO and NSA CSfC listings\r\n \tCommon Criteria (EAL4+)\r\n \tFIPS 140-2 validated cryptographic modules\r\n\r\n\r\n \tEnd-to-End Sovereign Infrastructure\r\n\r\n \tFull control over deployment and operation\r\n \tNo reliance on external cloud providers\r\n\r\n\r\n \tAdvanced Identity and Access Assurance\r\n\r\n \tMulti-factor authentication with biometric and cryptographic verification\r\n \tMutual device and user validation before and after each session\r\n\r\n\r\n \tUniversal, Encrypted Communications\r\n\r\n \tSecures voice, messaging, files, and metadata across mobile, fixed, and satellite networks\r\n \tEnforces zero trust principles across all endpoints\r\n\r\n\r\n \tIntegrated Threat Intelligence and Auditability\r\n\r\n \tReal-time anomaly detection and forensic analytics\r\n \tAutomated alerts and audit logs for compliance and rapid incident response\r\n\r\n\r\n\r\nThe SecuSUITE platform\u2019s independently validated controls mitigate known vectors for AI impersonation, providing governments, agencies, and enterprises with the resilience needed for uninterrupted operations.\r\nThe Imperative for Immediate Action\r\nThe rapid evolution of AI-based impersonation tactics demands a decisive response. Governments and agencies responsible for national security and public trust must eliminate the risks posed by consumer-focused messaging platforms.\r\nHow BlackBerry Can Help\r\nBlackBerry SecuSUITE delivers the sovereign-grade protection required in today\u2019s high-risk environments. Trusted by governments and critical infrastructure operators worldwide, SecuSUITE ensures that communications remain secure, verified, and uncompromised\u2014where assurance is proven and AI impersonation has no place.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25562318\" class=\"dp-dfg-item post-25562318 post type-post status-publish format-standard has-post-thumbnail hentry category-artificial-intelligence category-cyber-resilience category-security-operations\"     data-position=\"44\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/building-resilience-through-ai-driven-security\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2024\/10\/Gagan-Gulati-NetApp.jpg\" alt=\"Building Resilience Through AI-Driven Security\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Building Resilience Through AI-Driven Security<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">The cybersecurity landscape is evolving, emphasizing the dual role of AI as both a tool for attackers and defenders. There is an urgent need for businesses to adopt resilient, security-first strategies, including AI-driven anomaly detection, data classification, and toolchain consolidation. As hybrid environments grow more complex, organizations must prioritize collaboration, proactive defense, and integrated security solutions to navigate emerging threats and build a secure future.<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25562270\" class=\"dp-dfg-item post-25562270 post type-post status-publish format-standard has-post-thumbnail hentry category-artificial-intelligence category-cyber-resilience category-data-management category-data-security category-governance-risk\"     data-position=\"45\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/the-transformative-role-of-ai-in-cybersecurity\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2026\/01\/Gagan-Gulati-NetApp.jpg\" alt=\"The Transformative Role of AI in Cybersecurity\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">The Transformative Role of AI in Cybersecurity<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">The integration of AI and cybersecurity is reshaping the digital landscape, with three key trends emerging: the rise of AI-powered security threats, the transformation of data governance through AI, and the elevation of cybersecurity as a C-suite priority. Cybercriminals are leveraging AI for sophisticated attacks, necessitating adaptive, AI-driven defenses. Simultaneously, AI-powered data governance ensures compliance, security, and trust in handling sensitive information. As cyber threats grow, cybersecurity has become a strategic imperative for executives, driving investments in AI solutions and fostering resilience. Organizations embracing these shifts will turn challenges into opportunities, securing a competitive edge in the digital-first era<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25562230\" class=\"dp-dfg-item post-25562230 post type-post status-publish format-standard has-post-thumbnail hentry category-personal-security category-security-awareness category-threat-intelligence\"     data-position=\"46\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/email-threat-radar-january-2026\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2024\/11\/Barracuda-Networks-Logo.svg\" alt=\"Email Threat Radar &#8211; January 2026\" width=\"0\" height=\"0\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">Email Threat Radar &#8211; January 2026<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">From QR code deception to callback phishing and more: An overview of emerging email threats and attack trends<\/div><\/article><!-- DPDFG End Post Item Container --><article id=\"post-25562109\" class=\"dp-dfg-item post-25562109 post type-post status-publish format-standard has-post-thumbnail hentry category-identity-access-management category-learning-education category-risk-management\"     data-position=\"47\"   data-new-tab=\"off\"   data-action-priority=\"item\"><figure class=\"dp-dfg-image entry-thumb\"><a href=\"https:\/\/kbi.media\/when-digital-names-collide-business-risk-follows\/\" class=\"dp-dfg-image-link\" ><img loading=\"lazy\" decoding=\"async\" class=\"dp-dfg-featured-image\" src=\"https:\/\/kbi.media\/wp-content\/uploads\/2023\/11\/Morey_Haber.jpg\" alt=\"When Digital Names Collide, Business Risk Follows\" width=\"512\" height=\"512\" data-ratio=\"1\"\/><\/a><\/figure><div class=\"dp-dfg-header entry-header\"><h2 class=\"entry-title\">When Digital Names Collide, Business Risk Follows<\/h2><\/div><div class=\"dp-dfg-meta entry-meta\"><\/div><div class=\"dp-dfg-content entry-summary\">In an era where trust is increasingly mediated by systems rather than people, ensuring that every digital identity maps cleanly to a real one is no longer optional. It is a prerequisite for doing business safely.<\/div><\/article><!-- DPDFG End Post Item Container --><\/div><div class=\"dp-dfg-announcer screen-reader-text\" aria-live=\"polite\" aria-atomic=\"true\"><\/div><\/div><!-- DPDFG End Main Container --><div class=\"dp-dfg-data dp-dfg-hide\"><div class=\"dp-dfg-ajax-data\" data-ajax=\"{&quot;custom_query&quot;:&quot;&amp;#8221;advanced&amp;#8221;&quot;,&quot;support_for&quot;:&quot;sfp&quot;,&quot;sfp_id&quot;:&quot;&quot;,&quot;include_categories&quot;:&quot;&quot;,&quot;current_post_type&quot;:&quot;on&quot;,&quot;multiple_cpt&quot;:&quot;&amp;#8221;contributor&amp;#8221;&quot;,&quot;use_taxonomy_terms&quot;:&quot;&amp;#8221;on&amp;#8221;&quot;,&quot;multiple_taxonomies&quot;:&quot;category&quot;,&quot;taxonomies_relation&quot;:&quot;OR&quot;,&quot;include_terms&quot;:&quot;&quot;,&quot;terms_relation&quot;:&quot;IN&quot;,&quot;include_children_terms&quot;:&quot;on&quot;,&quot;exclude_taxonomies&quot;:&quot;category&quot;,&quot;exclude_taxonomies_relation&quot;:&quot;OR&quot;,&quot;exclude_terms&quot;:&quot;&quot;,&quot;meta_query&quot;:&quot;off&quot;,&quot;meta_cf_key&quot;:&quot;&quot;,&quot;meta_cf_value&quot;:&quot;&quot;,&quot;meta_cf_compare&quot;:&quot;Equal To&quot;,&quot;meta_cf_type&quot;:&quot;CHAR&quot;,&quot;related_taxonomies&quot;:&quot;&quot;,&quot;related_criteria&quot;:&quot;one_in_one&quot;,&quot;posts_ids&quot;:&quot;&quot;,&quot;post_number&quot;:&quot;&amp;#8221;3&amp;#8243;&quot;,&quot;offset_number&quot;:&quot;&amp;#8221;1&amp;#8243;&quot;,&quot;order&quot;:&quot;DESC&quot;,&quot;orderby&quot;:&quot;date&quot;,&quot;meta_key&quot;:&quot;&quot;,&quot;meta_type&quot;:&quot;CHAR&quot;,&quot;show_private&quot;:&quot;off&quot;,&quot;current_author&quot;:&quot;off&quot;,&quot;sticky_posts&quot;:&quot;off&quot;,&quot;remove_current_post&quot;:&quot;off&quot;,&quot;no_results&quot;:&quot;No results found.&quot;,&quot;thumbnail_action&quot;:&quot;link&quot;,&quot;gallery_cf_name&quot;:&quot;&quot;,&quot;lightbox_elements&quot;:&quot;on|||&quot;,&quot;show_thumbnail&quot;:&quot;on&quot;,&quot;thumbnail_size&quot;:&quot;&amp;#8221;300&amp;#215;300&amp;#8243;&quot;,&quot;t_alt&quot;:&quot;title&quot;,&quot;use_overlay&quot;:&quot;&amp;#8221;off&amp;#8221;&quot;,&quot;show_title&quot;:&quot;on&quot;,&quot;title_link&quot;:&quot;&amp;#8221;on&amp;#8221;&quot;,&quot;show_post_meta&quot;:&quot;on&quot;,&quot;meta_separator&quot;:&quot; | &quot;,&quot;show_author&quot;:&quot;&amp;#8221;off&amp;#8221;&quot;,&quot;author_prefix_text&quot;:&quot;By &quot;,&quot;show_date&quot;:&quot;off&quot;,&quot;date_format&quot;:&quot;F j, Y&quot;,&quot;show_terms&quot;:&quot;off&quot;,&quot;show_terms_taxonomy&quot;:&quot;category&quot;,&quot;terms_separator&quot;:&quot;,&quot;,&quot;terms_links&quot;:&quot;on&quot;,&quot;show_comments&quot;:&quot;off&quot;,&quot;show_content&quot;:&quot;&amp;#8221;on&amp;#8221;&quot;,&quot;content_length&quot;:&quot;excerpt&quot;,&quot;truncate_content&quot;:&quot;&amp;#8221;128&amp;#8243;&quot;,&quot;truncate_excerpt&quot;:&quot;&amp;#8221;on&amp;#8221;&quot;,&quot;strip_html&quot;:&quot;on&quot;,&quot;action_button&quot;:&quot;off&quot;,&quot;action_button_text&quot;:&quot;Click Action Button&quot;,&quot;read_more&quot;:&quot;off&quot;,&quot;read_more_text&quot;:&quot;Read More&quot;,&quot;read_more_window&quot;:&quot;off&quot;,&quot;show_custom_fields&quot;:&quot;off&quot;,&quot;custom_fields&quot;:&quot;&quot;,&quot;show_custom_content&quot;:&quot;off&quot;,&quot;custom_content_container&quot;:&quot;on&quot;,&quot;custom_url&quot;:&quot;off&quot;,&quot;custom_url_field_name&quot;:&quot;&quot;,&quot;custom_url_target&quot;:&quot;same&quot;,&quot;show_video_preview&quot;:&quot;off&quot;,&quot;video_module&quot;:&quot;off&quot;,&quot;video_action&quot;:&quot;play&quot;,&quot;video_action_priority&quot;:&quot;on&quot;,&quot;video_overlay&quot;:&quot;on&quot;,&quot;video_overlay_icon&quot;:&quot;on&quot;,&quot;video_icon&quot;:&quot;&amp;#x49;||divi||400&quot;,&quot;video_icon_color&quot;:&quot;#ffffff&quot;,&quot;video_overlay_color&quot;:&quot;rgba(0,0,0,0.6)&quot;,&quot;show_filters&quot;:&quot;&amp;#8221;off&amp;#8221;&quot;,&quot;multilevel&quot;:&quot;off&quot;,&quot;multilevel_hierarchy&quot;:&quot;off&quot;,&quot;multilevel_hierarchy_tax&quot;:&quot;[{\\&quot;name\\&quot;:\\&quot;category\\&quot;,\\&quot;label\\&quot;:\\&quot;\\&quot;,\\&quot;all\\&quot;:\\&quot;\\&quot;}]&quot;,&quot;multilevel_relation&quot;:&quot;AND&quot;,&quot;multilevel_tax_data&quot;:&quot;[{\\&quot;name\\&quot;:\\&quot;category\\&quot;,\\&quot;label\\&quot;:\\&quot;\\&quot;,\\&quot;all\\&quot;:\\&quot;\\&quot;}]&quot;,&quot;filter_children_terms&quot;:&quot;on&quot;,&quot;use_custom_terms_filters&quot;:&quot;off&quot;,&quot;filter_taxonomies&quot;:&quot;category&quot;,&quot;filter_terms&quot;:&quot;&quot;,&quot;default_filter&quot;:&quot;All&quot;,&quot;filters_order&quot;:&quot;ASC&quot;,&quot;filters_sort&quot;:&quot;id&quot;,&quot;filters_custom&quot;:&quot;&quot;,&quot;hide_all&quot;:&quot;off&quot;,&quot;all_text&quot;:&quot;All&quot;,&quot;s_df&quot;:&quot;off&quot;,&quot;df_col&quot;:&quot;post_date&quot;,&quot;s_df_y&quot;:&quot;on&quot;,&quot;s_df_m&quot;:&quot;on&quot;,&quot;filter_layout&quot;:&quot;button&quot;,&quot;multifilter&quot;:&quot;off&quot;,&quot;multifilter_relation&quot;:&quot;OR&quot;,&quot;show_sort&quot;:&quot;off&quot;,&quot;cf_ob_name&quot;:&quot;&quot;,&quot;cf_ob_type&quot;:&quot;CHAR&quot;,&quot;ajax_filters&quot;:&quot;off&quot;,&quot;cache_on_page&quot;:&quot;off&quot;,&quot;show_pagination&quot;:&quot;&amp;#8221;off&amp;#8221;&quot;,&quot;pagination_type&quot;:&quot;paged&quot;,&quot;ajax_load_more_text&quot;:&quot;Load More&quot;,&quot;previous_icon&quot;:&quot;&amp;#x34;||divi||400&quot;,&quot;next_icon&quot;:&quot;&amp;#x35;||divi||400&quot;,&quot;previous_text&quot;:&quot;&quot;,&quot;next_text&quot;:&quot;&quot;,&quot;pagination_pages&quot;:&quot;2&quot;,&quot;items_layout&quot;:&quot;&amp;#8221;dp-dfg-layout-list&amp;#8221;&quot;,&quot;thumb_width&quot;:&quot;&amp;#8221;20%&amp;#8221;&quot;,&quot;items_width&quot;:&quot;20%&quot;,&quot;items_skin&quot;:&quot;dp-dfg-skin-default&quot;,&quot;primary_view&quot;:&quot;[{\\&quot;name\\&quot;:\\&quot;thumbnail\\&quot;,\\&quot;show\\&quot;:\\&quot;on\\&quot;},{\\&quot;name\\&quot;:\\&quot;overlay\\&quot;,\\&quot;show\\&quot;:\\&quot;on\\&quot;},{\\&quot;name\\&quot;:\\&quot;title\\&quot;,\\&quot;show\\&quot;:\\&quot;off\\&quot;},{\\&quot;name\\&quot;:\\&quot;meta\\&quot;,\\&quot;show\\&quot;:\\&quot;off\\&quot;},{\\&quot;name\\&quot;:\\&quot;ext\\&quot;,\\&quot;show\\&quot;:\\&quot;off\\&quot;},{\\&quot;name\\&quot;:\\&quot;content\\&quot;,\\&quot;show\\&quot;:\\&quot;off\\&quot;},{\\&quot;name\\&quot;:\\&quot;action_button\\&quot;,\\&quot;show\\&quot;:\\&quot;off\\&quot;},{\\&quot;name\\&quot;:\\&quot;read_more_button\\&quot;,\\&quot;show\\&quot;:\\&quot;off\\&quot;},{\\&quot;name\\&quot;:\\&quot;custom_content\\&quot;,\\&quot;show\\&quot;:\\&quot;off\\&quot;}]&quot;,&quot;secondary_view&quot;:&quot;[{\\&quot;name\\&quot;:\\&quot;thumbnail\\&quot;,\\&quot;show\\&quot;:\\&quot;off\\&quot;},{\\&quot;name\\&quot;:\\&quot;title\\&quot;,\\&quot;show\\&quot;:\\&quot;on\\&quot;},{\\&quot;name\\&quot;:\\&quot;meta\\&quot;,\\&quot;show\\&quot;:\\&quot;on\\&quot;},{\\&quot;name\\&quot;:\\&quot;ext\\&quot;,\\&quot;show\\&quot;:\\&quot;on\\&quot;},{\\&quot;name\\&quot;:\\&quot;content\\&quot;,\\&quot;show\\&quot;:\\&quot;on\\&quot;},{\\&quot;name\\&quot;:\\&quot;action_button\\&quot;,\\&quot;show\\&quot;:\\&quot;on\\&quot;},{\\&quot;name\\&quot;:\\&quot;read_more_button\\&quot;,\\&quot;show\\&quot;:\\&quot;on\\&quot;},{\\&quot;name\\&quot;:\\&quot;custom_content\\&quot;,\\&quot;show\\&quot;:\\&quot;on\\&quot;}]&quot;,&quot;popup_template&quot;:&quot;default&quot;,&quot;popup_link_target&quot;:&quot;none&quot;,&quot;popup_code&quot;:&quot;&quot;,&quot;use_overlay_icon&quot;:&quot;on&quot;,&quot;hover_icon&quot;:&quot;&amp;#xe050;||divi||400&quot;,&quot;overlay_icon_color&quot;:&quot;#2ea3f2&quot;,&quot;hover_overlay_color&quot;:&quot;rgba(255,255,255,0.9)&quot;,&quot;show_search&quot;:&quot;off&quot;,&quot;search_position&quot;:&quot;above&quot;,&quot;orderby_search&quot;:&quot;on&quot;,&quot;relevanssi&quot;:&quot;off&quot;,&quot;bg_items&quot;:&quot;&quot;,&quot;admin_label&quot;:&quot;&amp;#8221;Divi&quot;,&quot;module_id&quot;:&quot;&quot;,&quot;module_class&quot;:&quot;&quot;,&quot;dpdfg_entry_title_level&quot;:&quot;h2&quot;,&quot;read_more_button_icon&quot;:&quot;&quot;,&quot;action_button_icon&quot;:&quot;&quot;,&quot;the_ID&quot;:0,&quot;the_author&quot;:1,&quot;seed&quot;:6995,&quot;query_context&quot;:&quot;initial_query&quot;,&quot;conditional_tags&quot;:{&quot;is_user_logged_in&quot;:&quot;off&quot;,&quot;is_front_page&quot;:&quot;off&quot;,&quot;is_singular&quot;:&quot;off&quot;,&quot;is_archive&quot;:&quot;off&quot;,&quot;is_search&quot;:&quot;off&quot;,&quot;is_tax&quot;:&quot;off&quot;,&quot;is_author&quot;:&quot;off&quot;,&quot;is_date&quot;:&quot;off&quot;,&quot;is_post_type&quot;:&quot;off&quot;},&quot;query_var&quot;:{&quot;s&quot;:&quot;&quot;,&quot;year&quot;:&quot;&quot;,&quot;monthnum&quot;:&quot;&quot;,&quot;day&quot;:&quot;&quot;,&quot;post_type&quot;:&quot;&quot;},&quot;custom_data&quot;:[]}\"><\/div><div class=\"dp-dfg-no-results-data\"><div class=\"dp-dfg-no-results\">No results found.<\/div><\/div><div class=\"dp-dfg-loader-data\"><\/div><\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"<!-- wp:paragraph -->\r\n<p>This is an example page. It's different from a blog post because it will stay in one place and will show up in your site navigation (in most themes). Most people start with an About page that introduces them to potential site visitors. It might say something like this:<\/p>\r\n<!-- \/wp:paragraph --><!-- wp:quote -->\r\n<blockquote class=\"wp-block-quote\">\r\n<p>Hi there! I'm a bike messenger by day, aspiring actor by night, and this is my website. I live in Los Angeles, have a great dog named Jack, and I like pi\u00f1a coladas. (And gettin' caught in the rain.)<\/p>\r\n<\/blockquote>\r\n<!-- \/wp:quote --><!-- wp:paragraph -->\r\n<p>...or something like this:<\/p>\r\n<!-- \/wp:paragraph --><!-- wp:quote -->\r\n<blockquote class=\"wp-block-quote\">\r\n<p>The XYZ Doohickey Company was founded in 1971, and has been providing quality doohickeys to the public ever since. Located in Gotham City, XYZ employs over 2,000 people and does all kinds of awesome things for the Gotham community.<\/p>\r\n<\/blockquote>\r\n<!-- \/wp:quote --><!-- wp:paragraph -->\r\n<p>As a new WordPress user, you should go to <a href=\"https:\/\/kbi.media\/wp-admin\/\">your dashboard<\/a> to delete this page and create new pages for your content. Have fun!<\/p>\r\n<!-- \/wp:paragraph -->","_et_gb_content_width":"","sync_status":"","episode_type":"","audio_file":"","podmotor_file_id":"","podmotor_episode_id":"","castos_file_data":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","footnotes":""},"dipi_cpt_category":[],"class_list":["post-2","page","type-page","status-publish","hentry"],"acf":[],"ams_acf":[],"_links":{"self":[{"href":"https:\/\/kbi.media\/wp-json\/wp\/v2\/pages\/2","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kbi.media\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kbi.media\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kbi.media\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kbi.media\/wp-json\/wp\/v2\/comments?post=2"}],"version-history":[{"count":2,"href":"https:\/\/kbi.media\/wp-json\/wp\/v2\/pages\/2\/revisions"}],"predecessor-version":[{"id":25566602,"href":"https:\/\/kbi.media\/wp-json\/wp\/v2\/pages\/2\/revisions\/25566602"}],"wp:attachment":[{"href":"https:\/\/kbi.media\/wp-json\/wp\/v2\/media?parent=2"}],"wp:term":[{"taxonomy":"dipi_cpt_category","embeddable":true,"href":"https:\/\/kbi.media\/wp-json\/wp\/v2\/dipi_cpt_category?post=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}