Microsoft Announces A$5 Billion Investment In Computing Capacity And Capability To Help Australia Seize The AI Era

Microsoft Announces A$5 Billion Investment In Computing Capacity And Capability To Help Australia Seize The AI Era

WASHINGTON, D.C. – 23 October 2023 – Today Microsoft announced major digital infrastructure, skilling and cybersecurity investments in Australia to help the nation seize the artificial intelligence (AI) era to strengthen its economic competitiveness, create high-value jobs and protect the nation from the increasing threat of cyberattacks. Microsoft will invest A$5 billion in expanding its hyperscale cloud computing and AI infrastructure in Australia over the next two years – the single largest investment in its forty- year history in the ...

Podcasts

From Cisco Live 2024 Melbourne – KB On The Go | Raj Chopra, SVP & Chief Product Officer, Security Business Group, Cisco, Angelique Medina, Head of Internet Intelligence at Cisco ThousandEyes, and Matt Caulfield, VP of Product for Duo and Identity, Cisc…
byKBI.Media

In this episode, KB sits down with Raj Chopra, SVP & Chief Product Officer, Security Business Group, Cisco, Angelique Medina, Head of Internet Intelligence at Cisco ThousandEyes, and Matt Caulfield, VP of Product for Duo and Identity, Cisco on the ground at Cisco Live 2024 in Melbourne. Together they discuss Cisco’s vision of being an AI first company, data in flight, and the concept of ‘identity is the new spam’.

Raj Chopra, SVP & Chief Product Officer, Security Business Group, Cisco

Raj Chopra is SVP and Chief Product Officer of the Cisco Security Product Management organization, where he leads strategy and execution for Cisco Security and SD-WAN products, ensuring comprehensive security for all users, from any device to any network or application.|

Raj is a seasoned executive with a proven record of delivering market-leading innovation in security with a strong focus on user-first experiences. He is a strong advocate of supporting diverse teams and equitable environments that bring out the best in everyone.

Prior to taking on this role, Raj led product, design, and strategy for Proofpoint’s flagship Email Security portfolio, helping grow that business nearly 3-fold in 4 years.

Before Proofpoint, Raj was part of the founding team of Netskope. He built both the product and new market category of CASB (Cloud Access Security Broker) and spurred its growth into SASE (Secure Access Service Edge) and SSE (Security Services Edge). During his career, he launched more than a dozen cybersecurity products, including several in the past 15 years that rose to $250M+ in product revenue.

Raj holds an MBA from the Haas School of Business, UC Berkeley, and a BS in Computer Science from NIT (National Institutes of Technology) India and has a growing eagerness to go deeper into in his yoga practice.

Angelique Medina, Head of Internet Intelligence, Cisco ThousandEyes

Angelique Medina is Head of Internet Intelligence at Cisco ThousandEyes, where she reports on all things Internet related, from BGP routing and outages to the performance of edge and cloud-based services. She has more than a decade of experience in the networking industry.

Matt Caulfield, Vice President of Product for Duo and Identity, Cisco

Matt Caulfield is VP of Product for Duo and Identity at Cisco, where he leads Cisco’s strategy and thought leadership in all things identity. Previously, Matt was the Founder & CEO of Oort, a venture-backed Identity Threat Detection & Response (ITDR) pioneer, which was founded in 2019 and acquired by Cisco in 2023. Matt has a technical background and is an expert in identity, networking, cloud, and security domains. Until 2018, he led the Cisco Boston Innovation Team focusing on new product initiatives.

Business News ↓

The Five Step Journey To Securing Australia’s Most Important Data Assets

Financial institutions are leading the way in their pursuit of adaptive protections against evolving information-stealing threats. Securing information assets to be resilient against a broad spectrum of threats is a journey many Australian organisations find themselves on. A steady stream of data breach disclosures - and a desire not to join that list - is keeping them motivated to stay the course. For banks and...

Secure-By-Design Is A Significant Exercise, But The Rewards Are Significant, Too

Concerted multilateral efforts are underway to influence and change developer behaviour when it comes to secure software creation. The idea of baking security into software right from the start of the development lifecycle is going from strength to strength, having gained important buy-in from cybersecurity agencies and vendors in the past year. Over 250 vendors supplying the US government have now signed a...

Cloud-Based Post-Quantum Cryptography (PQC) vs Local PQC: Not as Straightforward as You’d Think

Introduction As the quantum computing era approaches, organisations must adopt Post-Quantum Cryptography (PQC) to safeguard their data against future quantum threats. A critical decision in this transition is whether to implement PQC through cloud-based services or rely on local deployment. Each approach offers distinct advantages and challenges, and the right choice depends on the organisation’s specific needs,...

Claroty 2025 Cyber Security Predictions

The use of cyberattacks in executing modern warfare, which is already happening, will enter public awareness A major cyberattack will be executed on critical infrastructure as part of a wartime scenario and this will enter mainstream news, as world leaders recognise the need to protect their domestic critical infrastructure from being attacked by an act of war from their enemies. Proposed legislation to protect...

AI Ethics: Developing AI models with intent, transparency and diversity

Introduction As humans, we all walk through the world with a certain level of uncious bias. It makes sense then that anything we ‘invent’ is inherently riddled with this bias whether we think so or not. It’s no surprise that the development of AI has come with a laundry list of ethical concerns. Recently I spoke with Vini Cardoso, Field CTO of Cloudera as part of Ticker’s ‘Tech Edge’ series to understand some of...

Why The First Stage Of Cyber Incident Response Is No Longer To Hit The Killswitch

Containing an incident often means disconnecting whole environments, but technology is giving IR teams more optimal choices. A recent survey found 63% of Australians had been caught up in a cyber attack or data breach in the past year, with half finding themselves in more than one. With ransomware and other types of attacks playing out so often in Australia and around the world, the cyber incident response playbook...

Why Microsegmentation is the Key to Containing Breaches in Today’s Cybersecurity Landscape

The Rise of Breach Readiness in Modern Cybersecurity  Businesses today are navigating an increasingly complex digital environment where cyber threats evolve relentlessly. In recent years, cybersecurity has transformed from a niche technical concern to a strategic priority that sits firmly on the boardroom agenda. The rapid rise in the sophistication of cybercrime has left organizations grappling with how best to...

Navigating Cybersecurity Decision-making In The Age Of AI: Insights Into Operational, Tactical, And Strategic Influences

KBI Media is bringing you a preview of presentations from the upcoming Australian Cyber Security Conference in Melbourne. On 28 November 2024, Dr Ivano Bongiovanni, General Manager, AUSCERT will be unveiling insights from cutting edge research to unpack how decisions are being made in cybersecurity Dr Bongiovanni recently undertook research to discover what are the driving factors that influence cybersecurity...

Why Breaking Down Identity Silos Has Become An Imperative For Business

Many businesses today rely on hybrid IT environments that integrate a complex array of applications, datacentres, and cloud services. While these diverse ecosystems offer flexibility, they also present a critical challenge: identity silos. Fragmented identity and access management (IAM) creates security vulnerabilities, reduces efficiency, and raises operational costs. To mitigate these risks, organisations need a...

Post-Quantum Cryptography And Compliance: Where Are We Now?

As quantum computing continues to advance, its implications for cybersecurity are increasingly apparent. Quantum technology has the potential to disrupt widely used cryptographic protocols, exposing sensitive information to new vulnerabilities. In response, governments and regulatory bodies worldwide are urging organisations to adopt quantum-safe measures to protect data against future quantum threats. Post-Quantum...

Cybersecurity Shortfalls Threaten Australia’s Push to Boost Tech Exports

Introduction Australian policymakers are converging on a few challenging issues simultaneously. With a growing population and the tail end of an inflation outbreak, the housing crisis seems set to persist, affecting affordability for years to come. In this context, finding solutions to foster economic stability and growth is crucial. One viable path to address these challenges is through high-productivity jobs that...
NetApp's Innovation Unveiled. Key Areas Driving the Future of Data Management - Security is a Priority. cover

N-Powered Change – What Can We Learn from NetApp INSIGHT 2024

NetApp INSIGHT 2024, held in Las Vegas in September, served as a pivotal event for data management and cloud innovation professionals worldwide, particularly those focused on driving efficiency and harnessing the power of Artificial Intelligence (AI) within enterprise systems, and in the development of cyber resilience. The conference highlighted NetApp’s innovative strides in building an interconnected data...

Overcoming Common Security Vulnerabilities In The Banking Sector

For as long as banks and financial institutions have existed, so too have those seeking to steal from them. The infamous bank robber Willie Sutton, active in the 1920s, famously quipped that he targeted banks “because that’s where the money is.” While the methods have evolved since Sutton’s time, the motivation remains largely the same. Today, the vast majority of wealth in these institutions is digital, and the...

Australian Enterprises Need An Exit Strategy For Tier-One Applications In Virtualised Environments

Escalating threats targeting the hypervisor are driving more enterprises to reconsider how they host their tier-one applications. Australian enterprises of all types have grown accustomed to running their application estates on virtualised server infrastructure. The trend towards server virtualisation grew out of a desire to reduce physical server sprawl, power costs and requirements for data centre space. This...

Cybercrime Is Soaring: Is Your Business Ready To Respond?

As cybercrime reaches unprecedented levels, the urgency for businesses to bolster their defences is strong. A report from Cybersecurity Ventures[1] predicts that global cybercrime costs will soar to $10.5 trillion annually by 2025, marking a 15% growth per year. This growth represents one of the largest transfers of economic wealth in history. In this climate, businesses must move beyond traditional security...

Are Aussie Networks Future-fit?

Introduction According to IDC’s recent Asia/Pacific Enterprise Connectivity and Telecom Services Survey, only 51% of ANZ companies believe their networks are equipped to handle the complex demands of today’s digital economy. Some might say that’s an alarming statistic. And yet my experience is that many Aussie enterprises are stuck in an ad-hoc or resistant technology mindset that’s stopping them from becoming...
Episode 130: Apurva Chiranewala

Episode 130: Apurva Chiranewala

Apurva Chiranewala is the General Manager of fintech company Block Earner, where he oversees global operations, growth and ...
Episode 149: Matt Johnston

Episode 149: Matt Johnston

Born in Sydney, Australia, and having lived in the United States for the past 12 years, Matt Johnston has had an ...

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

AI’s Transformative Role In Corporate Governance

Corporate governance is on the brink of a major transformation driven by artificial intelligence (AI), which is already reshaping the way organisations operate. As we move deeper into the Fifth Industrial Revolution, AI is no longer a distant concept, but a central force that has fundamentally altered how companies are making strategic decisions, managing risks, and ensuring compliance. The opportunity to harness...

Holiday Shopping and the Dark Market Parallel

As Black Friday and Cyber Monday deals continue throughout the holiday season, millions of consumers will log on to snag the best offers of the year. But they aren’t the only ones on the hunt for seasonal discounts. Cybercriminals, too, flock to dark markets, browsing for their version of ‘steals’ on an assortment of unconventional goods and services. In a digital underground that mirrors traditional e-commerce in...

Australian Businesses Reckon With The Rising Threat of Executives Being Deepfaked

Introduction Australia has seen an increasing procession of deepfakes causing real-world concern. An Australian man lost $80,000 in cryptocurrency after viewing a deepfake video of a public figure encouraging an investment that was in fact a scam - a common nefarious early use for the technology. Deepfakes have also entered Australian politics in recent months, and there are concerns - among politicians, academics...

Three Reasons Why Now Is The Time To Tackle A SOC Modernisation

There is a rising appetite for SOC modernisation and transformation among Australian companies, driven by a desire to enhance security maturity, improve resilience against cyberattacks, and reduce risk in a digitally-driven world. SOCs today are challenged by a complex and varied threat landscape and attack surface, comprising devices, disparate and remote workforces, and cloud and AI services. There is a lot...