No results found.
No results found.
No results found.

Podcasts

From 2020Partners 2025 – KB On The Go | Paul Maddison and Jeff Lindholm (Part 2)
byKBI.Media

The 2020 Partners Dialogue sits at the edge of possibility, where security meets technological ambition. In this special bonus episode, KB explores how nations can move beyond simply consuming innovation to actively co-creating strategic dominance. Anchored by AUKUS and empowered by cross-sector collaboration, this conversation features insights from industry leaders Paul Maddison (Australia &New Zealand Country Manager, Strider Technologies) and Jeff Lindholm (Chief Revenue Officer at Lookout).

Paul Maddison, Australia & New Zealand Country Manager, Strider Technologies

Paul Maddison is the Australia & New Zealand Country Manager at Strider Technologies, where he is responsible for leading Strider’s market expansion and strategic partnerships with Australian universities, corporations, and governments.

Prior to joining Strider, Paul worked at the University of New South Wales in Sydney and Canberra as Director of the UNSW Defence Research Institute. This was preceded by a four-year appointment as  Canada’s High Commissioner for Australia. Paul also spent over 35 years in Canadian naval service. As a surface warfare officer, he commanded at all levels culminating in his appointment as Commander of the Royal Canadian Navy at the rank of Vice
Admiral. A graduate of Canada’s Royal Military College, and a dual national since 2020, Paul is from Canada but has chosen to make Australia his home.

Jeff Lindholm, Chief Revenue Officer at Lookout

As the Chief Revenue Officer at Lookout, Jeff oversees all aspects of the company’s global sales, including the Americas, EMEA, and APAC regions, as well as Channel Sales, Commercial Sales and Sales Engineering. He brings a wealth of experience in networking and security sales leadership, having previously served as President and CEO of Plixer, a company focused on network traffic analysis and visibility solutions. Before that, Jeff led sales operations at both Brocade and Juniper Networks. As the Senior Vice President of Worldwide Sales at Brocade, he oversaw a $2.5 billion global sales operation until the company’s acquisition by Broadcom Inc. At Juniper Networks, he served as Chief Revenue Officer, managing $2.5 billion in revenue.” He has also held significant global sales roles at Arbor Networks (the security division of NETSCOUT) and BigBand Networks. Jeff is based in Boston and holds a Bachelor of Science in Marketing from the Carroll School of Management at Boston College.

No results found.
AI in Defence – A Partner, Not a Quick Fix

AI in Defence – A Partner, Not a Quick Fix

​AI has been making waves for years now. It has moved from the pages of science fiction into the control rooms of our defence and security agencies and critical infrastructures, watching over networks and inspecting traffic. Why wouldn’t it be when it promises to work faster than humans and spot the tiniest anomaly possible? For defence and cybersecurity, where every second counts, this is a tempting offer. The Transition to AI The push toward AI stems from the needs and demands of the cybersecurity space. Threats are now multiplying at a rate ...
No results found.

Business News ↓

NIAP-Certified Security – A Foundation for Trusted Communications

In government and critical infrastructure, security is not an optional feature, it is the foundation of operational integrity. For organizations responsible for protecting sensitive data and ensuring mission continuity, trust in communication systems must be earned through independent, rigorous validation. Relying on unvetted software introduces unacceptable risks to national security and public safety. As a...

Streamlining Cyber Operations

Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing pressure to protect, adapt, and enable innovation. For many organisations, cyber operations are buckling under the weight of manual tasks, legacy tools, and cross-functional bottlenecks. The result is a reactive security posture that struggles to keep up with business demands. To address this, tech...

Containing the Inevitable: What Cyber Leaders Must Prepare for in 2026

As we head into 2026, I am thinking of a Japanese idiom, Koun Ryusui (行雲流水), to describe how enterprises should behave when facing a cyberattack. Koun Ryusui means “to drift like clouds and flow like water.” It reflects calm movement, adaptability, and resilience. For enterprises, this is an operating requirement. Cyber incidents are no longer isolated disruptions. They are recurring tests of how well an...

Continuous Compliance Isn’t An Option

Introduction For today’s Chief Information Security Officers (CISOs), compliance is no longer a once-a-year headache, it’s a continuous, evolving mandate. As threat landscapes shift and regulatory frameworks grow more complex, businesses are being called to do more than tick boxes at audit time. Instead, they must embrace a model of continuous compliance, an approach that provides ongoing assurance, improves...

Trust, Power, People: Hybrid AI’s 2026 Imperative 

Over the past year across Asia Pacific, conversations with customers, from fast-growing digital natives to highly regulated banks and healthcare providers, all have shared a common thread: AI has moved from experimentation to execution. The question is no longer “if” but “how” to scale responsibly, efficiently, and with clear business outcomes. As we look to 2026, the organisations that lead will be those that...

Can AI Ever Really Outpace AI-Powered Cyberattacks?

Introduction There's this question that keeps coming up in cybersecurity circles, and honestly, it feels a bit like asking whether we can outrun our own shadow. Can defensive AI actually stay ahead of AI-powered attacks? The short answer is probably not in any permanent way, but that doesn't mean we're doomed to lose this fight. The thing about AI in cybersecurity: it's fundamentally playing both offense and...

Putting Your Money Where Your Money Is

Introduction Fintech companies occupy a unique position at the intersection of finance and technology. They handle extremely sensitive customer information, personal identities, payment data, transaction histories, and therefore represent a high‑value target for cyber‑criminals. In the Asia‑Pacific region, nearly 80 percent of executives anticipate that financial crime risks, including AI‑driven attacks, will...

ISACA Sydney Conference 2025 – Event Recap

Overview Walking into the ISACA Sydney Chapter Conference as “the student voice”, I knew I was surrounded by some of the heaviest hitters in cyber, audit and technology leadership. My job for the day was simple but huge: ask the questions students and early-career professionals are scared to ask and bring those answers back to our community. By the end, one theme kept looping in my head: it’s not enough to just be...

Disruption Demands Coordination: Why Secure Communications Solutions are Key to Disrupting the Illegal Fentanyl Trade

Introduction The Government of Canada is taking concrete and bold action to strengthen border security and disrupt the illegal fentanyl trade. It has announced an investment of $1.3 billion to enhance operations. The funding will support hiring additional personnel and purchasing advanced technology and equipment. This includes state-of-the-art imaging systems, drones, and AI tools. The plan also involves creating...

Shifting the Burden of ID Crime from Victims to Institutions

Introduction Australia’s growing epidemic of identity crime has exposed a critical flaw in the nation’s cyber security response: the victims of data breaches are too often left to clean up the mess alone. As cyberattacks rise and personal information circulates through criminal networks, calls are mounting for a co-ordinated, government-led framework to replace today’s fragmented, victim-driven recovery model. At...

Avoiding Security Operation Chokepoints

Introduction Security operations often become inadvertent chokepoints. When every vendor relationship triggers an extensive security review, and teams rely on spreadsheets and email chains to gather responses, progress grinds to a halt. For resource‑constrained organisations, particularly in the fintech, SaaS and technology spaces, these bottlenecks can delay product launches, strain customer relationships and...

2026 Predictions: The Year Identity Becomes the Ultimate Control Point for an Autonomous World

Introduction The collision between technological acceleration and human adaptability will define the cybersecurity landscape in 2026. Identity and trust will sit at the centre of this struggle — as the proliferation of machine and AI identities exposes the fragility of traditional controls and the limits of human oversight.  As organisations race to deploy autonomous agents and machine-led systems to drive...

Why 9 In 10 IT Teams Overestimate Their Operational Resilience

Introduction How confident are you that your operations are resilient enough to tackle today’s challenges while preparing for tomorrow’s? If your answer is ‘very confident’, you’re not alone. According to SolarWinds' 2025 IT Trends Report, over 90% of IT professionals believe their organisations are resilient in the face of today’s demands. Of those, 38% say their resilience is ‘very strong’, while 55% describe it...

Cybersecurity in Manufacturing: Why It’s More Important Now Than Ever

Manufacturing has always depended on stable operations. That used to mean keeping machines running, maintaining quality, and hitting delivery schedules. Today it also means defending the environment from attacks that can shut down production, corrupt data, or compromise customer trust. Plants are now connected in ways they weren’t ten years ago, and that connection has created real exposure. The stakes are higher...

AI to Supercharge Cyber Threats Across Australia

AI is fundamentally changing the economics of cyberattacks in Australia. Adversaries are no longer scaling through the workforce, but rather through automation. Leaders can’t rely on human-paced defences in a machine-paced threat environment.  Here are the top security trends to watch out for in 2026 and beyond: Compressed Attack Timelines Due to Autonomous AI In 2026, the rapid acceleration of autonomous AI-driven...

‘Tis the Season to Stay Secure: Safeguarding Your Business this Festive Period

This holiday shopping season can make or break many Australian businesses. While consumers are shopping for bargains, attackers are searching for vulnerabilities.  The surge in shopping traffic during Black Friday, Cyber Monday and Christmas sales provides cybercriminals with the perfect cover to launch scams and fraud campaigns, exploiting the rise in digital transactions to hide malicious activity.  The Perfect...
No results found.
No results found.
No results found.
No results found.
No results found.

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

NIAP-Certified Security – A Foundation for Trusted Communications

In government and critical infrastructure, security is not an optional feature, it is the foundation of operational integrity. For organizations responsible for protecting sensitive data and ensuring mission continuity, trust in communication systems must be earned through independent, rigorous validation. Relying on unvetted software introduces unacceptable risks to national security and public safety. As a...

Streamlining Cyber Operations

Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing pressure to protect, adapt, and enable innovation. For many organisations, cyber operations are buckling under the weight of manual tasks, legacy tools, and cross-functional bottlenecks. The result is a reactive security posture that struggles to keep up with business demands. To address this, tech...

Containing the Inevitable: What Cyber Leaders Must Prepare for in 2026

As we head into 2026, I am thinking of a Japanese idiom, Koun Ryusui (行雲流水), to describe how enterprises should behave when facing a cyberattack. Koun Ryusui means “to drift like clouds and flow like water.” It reflects calm movement, adaptability, and resilience. For enterprises, this is an operating requirement. Cyber incidents are no longer isolated disruptions. They are recurring tests of how well an...

Trust, Power, People: Hybrid AI’s 2026 Imperative 

Over the past year across Asia Pacific, conversations with customers, from fast-growing digital natives to highly regulated banks and healthcare providers, all have shared a common thread: AI has moved from experimentation to execution. The question is no longer “if” but “how” to scale responsibly, efficiently, and with clear business outcomes. As we look to 2026, the organisations that lead will be those that...
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.