Podcasts

Episode 244 Deep Dive: Mark McClain | Enhancing Security Resilience: Identity as the Key Accelerant for Business Success
byKBI.Media

In this episode, we are joined by Mark McClain (CEO and Founder of SailPoint), as we dive deep into the pivotal role of identity as a fundamental control point and lens for understanding security in organizations. Mark emphasises that while traditional security measures such as firewalls and network security remain vital, identity security and access privileges are equally critical for protecting data and driving business momentum. Moreover, the conversation delves into the challenges of balancing convenience and security, particularly with the rise of AI and machine learning in security measures. Mark highlights the limitations of current security tools in being “identity blind,” stressing the need for better tooling and processes to identify and respond to security threats more efficiently.

Business News ↓

Why Agile Learning is Vital for Secure Software Development

With recent increases in cyberattacks showing no sign of abating, the role software developers need to play to improve levels of protection is becoming more widely understood. Encouragingly, industry research[1] shows nearly four in five developers believe that either they themselves are responsible for their code’s security or that every member of their team should be held accountable. The research also found 75%...

Modern Threats Need Modern Defences – Why We Need To Modernise Cybersecurity

With the benefit of hindsight, we can now look back and understand some of the cyber security missteps of 2023 to understand what we’re missing and how we can learn from our mistakes. According to the ASD, the top three causes of cyber incidents in Australia in 2023 were email compromise, business email compromise fraud, and online banking fraud. From Verizon’s DBIR report, we can see that APAC’s top patterns...

Upholding the Principles of “Responsible Tech” in a Rapidly-Changing World

With growing concern and scepticism around the misuse of technology, it’s vital for organisations to have the right safeguards in place to protect their people and the business overall. It starts with the belief that the technology we use must earn our trust if it is to transform lives for the better. So how might organisations go about achieving this? At BT, we’ve identified three challenges concerning people...

Is Using Generative AI at Work Cheating? A Quarter of Aussie Office Workers Say “Yes”

New research released today by Veritas Technologies shows that confusion over generative AI in the workplace is simultaneously creating a divide between employees while also increasing the risk of exposing sensitive information. More than two-thirds (68%) of Australian office workers acknowledged using generative AI tools such as ChatGPT at work—including risky behaviour like inputting customer details, employee...

Dragos OT Cybersecurity “Year in Review” Reports Rise in Geopolitically Driven Attacks, Ransomware, and Threat Groups

Dragos Inc., the global leader in cybersecurity for operational technology (OT) environments, today released its sixth annual Dragos OT Cybersecurity Year in Review report, the most comprehensive report on cyber threats facing industrial organisations. The report named the emergence of three new threat groups, including VOLTZITE linked to Volt Typhoon, and found that ransomware continued to be the most reported...

Australian Security Teams Start To Address Functional Overlap In Their Tooling Stacks

The seemingly unending list of threat actors successfully targeting Australian organisations, and a corresponding rise in financial losses and regulatory scrutiny, has firms, leaders and cybersecurity teams on edge. Australian and New Zealand businesses lost almost 10% of their revenue to cyber attacks in the last year, recent research by Fastly shows. That is leading many to contemplate the extent to which their...

Weaving Sustainability into the DNA of How Companies Operate

Once a marginal topic, sustainability is now critical focus area with commitment required at all levels of the company starting with the Board. It goes well beyond ticking off ESG goals to embedding a culture of change across the organisation - from the set of company mandates, trickling down simply to ‘how we do things around here.’ When companies focus on three core areas for change: utilising greener technology;...

How To Manage Risk Appetite By Balancing Cybersecurity With Business Growth

Australia’s business leaders face a complex and rapidly evolving market landscape that is highly competitive, globally interconnected, and demands a proactive approach to risk management. As continued technological innovation drives business development, efficiency, and success, it simultaneously empowers malicious threat actors to evolve and make more sophisticated attacks on successful businesses. Modern business...

The Future of CISOs: Navigating Trends and Evolving Roles

Introduction In September 2023, the Australian federal government introduced new rules making the appointment of Chief Information Security Officers (CISOs) at its largest agencies mandatory. This marks an inflection point and recognition of the importance of cyber security leadership, in the current climate of escalating risk. According to the Australian Bureau of Statistics, more than two in 10 Australian...

Pervasive OT and IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated

The latest Nozomi Networks Labs OT & IoT Security Report released today finds that network anomalies and attacks were the most prevalent threat to operational technology (OT) and internet of things (IoT) environments. Vulnerabilities within critical manufacturing also surged 230% – a cause for concern as threat actors have far more opportunities to access networks and cause these anomalies. Real World Telemetry...

Boosting Confidence In Ransomware Recovery

Introduction The safeguarding of digital assets is an ongoing, uphill battle. This fight is made harder still by the gaps in cyber resilience policies and the alarming lack of confidence in ransomware recovery. The need for boosted recovery confidence underscores the importance of addressing these challenges to fortify organisations against the rising tide of cyberthreats. The Australian Signals Directorate (ASD)...

Sophos Report Reveals 86 Per Cent Of Cybersecurity And IT Professionals In Australia Are Impacted By Burnout And Fatigue

Sophos, a global leader in innovating and delivering cybersecurity as a service, released the findings of its fourth “The Future of Cybersecurity in Asia Pacific and Japan” report in collaboration with Tech Research Asia (TRA). The report found that 86 per cent of Australian respondents in cybersecurity and IT roles are impacted by burnout and fatigue. The study revealed that burnout is felt across almost all...

Compliance and Security: The AI-Powered Identity Revolution

The cyber security landscape is grappling with an expanding attack vector as the rise in identities from digitisation has exposed organisations to increased vulnerabilities. The challenge is most organisations haven’t yet implemented a comprehensive identity security strategy to help manage the access for hundreds to thousands of identities, with nearly half of global companies still at the beginning of their...

A New Cyber Battleground, Australian Resilience And Adaptation Will Shine Through

2024 is upon us and Australia and New Zealand stand as vibrant hubs of innovation and technological evolution. The Antipodes are set to witness transformative trends in both technology and cybersecurity that promise to shape the digital frontier. In Australia, the tech and cybersecurity industry are booming with key trends such as AI – and the infrastructure needed to support it – ramping up, while companies shore...

Global Investment Group BOKA Fuels Growth of Deep Tech Companies to Bolster National Security

BOKA, a global investment group, with headquarters in London is revolutionising the deep tech sector by identifying, funding, and enabling companies that can address critical National Security mission needs for the AUKUS Alliance which include the United States, the United Kingdom, and Australia - as well as other close allies around the world. At BOKA, the goal reaches beyond just providing essential funding to...

The Kids Aren’t Alright: Vulnerabilities in Edulog Portal Revealed K-12 Student Location Data

Introduction Tenable Research discovered security flaws in a popular transportation management app that allowed access to student location data. While these issues have been fixed, the findings again prove the importance of strong authentication and access control. On December 13, 2023, Tenable Research publicly disclosed security flaws uncovered in Edulog’s Parent Portal suite of products. These flaws allowed...
Episode 136: Ashkan Tashvir

Episode 136: Ashkan Tashvir

Ashkan Tashvir built and launched the first of several businesses at the age of fifteen and subsequently led a series of ...
No results found.
Episode 138: Nicholas Boyle

Episode 138: Nicholas Boyle

Nick Boyle is a partner in the IP & Technology team at DLA Piper, and is based in Sydney. He advises clients on data ...
Episode 96: Jason Yakencheck

Episode 96: Jason Yakencheck

Jason is a Associate Partner at IBM with a strong background in project management, cybersecurity, cloud, and strategic ...

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

Why Agile Learning is Vital for Secure Software Development

With recent increases in cyberattacks showing no sign of abating, the role software developers need to play to improve levels of protection is becoming more widely understood. Encouragingly, industry research[1] shows nearly four in five developers believe that either they themselves are responsible for their code’s security or that every member of their team should be held accountable. The research also found 75%...

Modern Threats Need Modern Defences – Why We Need To Modernise Cybersecurity

With the benefit of hindsight, we can now look back and understand some of the cyber security missteps of 2023 to understand what we’re missing and how we can learn from our mistakes. According to the ASD, the top three causes of cyber incidents in Australia in 2023 were email compromise, business email compromise fraud, and online banking fraud. From Verizon’s DBIR report, we can see that APAC’s top patterns...

How Organisations Can Combat the Surge in Phishing Attacks

As we rapidly progress into the digital era, Australia aims to become a world leader in cyber security by 2030. However, the threat of cybercrime continues to grow at an alarming rate. Australia has continued to see high-profile breaches leaving Australians’ sensitive data vulnerable and exploited, with some impacted falling victim to several breaches and attacks. Among the most prevalent forms of cybercrime,...

Why Human-Based and Identity Security is Becoming Increasingly Important

Of all the causes of cybersecurity breaches within organisations, one of the most prevalent remains human behaviour. Indeed, according to a Verizon data breach report[1], human error is involved in 74% of data breaches. For this reason, it is vital that security teams shift towards designing human-centric controls that promote and facilitate the use of responsible cybersecurity practices. Interestingly, analyst...
No results found.
No results found.
No results found.