No results found.
No results found.
No results found.

Podcasts

From AWS re:Invent 2025 – KB On The Go | CJ Moses, Hart Rossman, and Mark Ryland
byKBI.Media

In this bonus episode, KB sits down with CJ Moses, CISO at Amazon, Hart Rossman, VP of Global Security Services at AWS, and Mark Ryland, Director, AWS Security. Together they discuss the realities of “planetary scale security,” AI-powered defenses, and the shifting mindset that’s driving organizations to adopt automation and agentic technologies faster than ever before.

CJ Moses, CISO, Amazon

CJ Moses, CISO at Amazon, leads security engineering and operations across the company. His mission is to enable Amazon businesses by making the benefits of security the path of least resistance. CJ joined Amazon in December 2007, holding various roles including Consumer CISO and AWS CISO, before becoming CISO of Amazon in September 2023.

Before Amazon, CJ led the technical analysis of computer and network intrusion efforts at the Federal Bureau of Investigation’s Cyber Division and served as a Special Agent with the Air Force Office of Special Investigations (AFOSI). CJ led several computer intrusion investigations seen as foundational to the security industry today.

CJ holds degrees in Computer Science and Criminal Justice and is an active SRO GT America GT2 Race car driver.

Hart Rossman, VP of Global Security Services, AWS

Hart Rossman is the VP of Global Security Services at AWS. He leads a team of geographically distributed AWS builders who help customers realise the benefits of planetary-scale security solutions in the cloud, with a focus on innovating with internal teams and partners. Prior to AWS, he was VP & CTO of Cyber Security Services & Solutions at SAIC.

Mark Ryland, Director, AWS Security

Mark Ryland is a Director, AWS Security, reporting to the CISO of AWS, and engaging with a variety of external and internal stakeholders on behalf of the AWS Security leadership team. Externally, he focuses on public policy initiatives and public sector regulators and customers on issues related to cloud and AI security. Internally, he works with AWS service teams by channelling the perspectives of external stakeholders to influence their plans and priorities. In addition, Ryland works with industry partners to enhance the security of the broader information technology ecosystem as Amazon’s representative on the governing board of the Open Source Security Foundation (OpenSSF), as well as in industry groups focusing on the security and reliability of cutting-edge artificial intelligence systems such as the Frontier Model Forum (FMF) and the Coalition for Secure AI (CoSAI).Ryland has more than 34 years of experience in the technology industry across a wide range of leadership roles in information security, software engineering, distributed systems, technical standardisation, and public policy. Most recently he founded and ran AWS’s Office of the CISO from 2018 to 2023, a team with which he still collaborates closely on a variety of matters. Prior to that, he was the Director of Solutions Architecture and Professional Services for the AWS Worldwide Public Sector team, founding the team in 2011 and growing it to a large global organisation through early 2018. Before joining AWS, Ryland worked for Microsoft for 13 years in two different stints (1991-2000 and 2008-2011) in multiple roles including Lead Program Manager for COM/DCOM, and founder and Director, Standards Strategy Group. In between work at Microsoft, he was co-founder and CTO of two start-ups, and served as vice president and director of the Washington DC office of a public policy think tank.

No results found.
No results found.
No results found.
No results found.
No results found.
The Scattered Spider, Airline Attacks and How to Be Breach Ready!

The Scattered Spider, Airline Attacks and How to Be Breach Ready!

Introduction On July 2, 2025, Qantas, Australia's flagship airline, disclosed a cyberattack that compromised the personal information of up to six million customers, first detected on June 30, 2025. Touted as one of the most significant data breaches in Australia's recent history, the attack is suspected to be the work of the notorious Scattered Spider cybercriminal group. According to the information currently available, the hackers targeted a third-party customer service platform used by Qantas's contact centre - specifically, a Manila-based ...
No results found.

Business News ↓

Can AI Ever Really Outpace AI-Powered Cyberattacks?

Introduction There's this question that keeps coming up in cybersecurity circles, and honestly, it feels a bit like asking whether we can outrun our own shadow. Can defensive AI actually stay ahead of AI-powered attacks? The short answer is probably not in any permanent way, but that doesn't mean we're doomed to lose this fight. The thing about AI in cybersecurity: it's fundamentally playing both offense and...

Putting Your Money Where Your Money Is

Introduction Fintech companies occupy a unique position at the intersection of finance and technology. They handle extremely sensitive customer information, personal identities, payment data, transaction histories, and therefore represent a high‑value target for cyber‑criminals. In the Asia‑Pacific region, nearly 80 percent of executives anticipate that financial crime risks, including AI‑driven attacks, will...

ISACA Sydney Conference 2025 – Event Recap

Overview Walking into the ISACA Sydney Chapter Conference as “the student voice”, I knew I was surrounded by some of the heaviest hitters in cyber, audit and technology leadership. My job for the day was simple but huge: ask the questions students and early-career professionals are scared to ask and bring those answers back to our community. By the end, one theme kept looping in my head: it’s not enough to just be...

Disruption Demands Coordination: Why Secure Communications Solutions are Key to Disrupting the Illegal Fentanyl Trade

Introduction The Government of Canada is taking concrete and bold action to strengthen border security and disrupt the illegal fentanyl trade. It has announced an investment of $1.3 billion to enhance operations. The funding will support hiring additional personnel and purchasing advanced technology and equipment. This includes state-of-the-art imaging systems, drones, and AI tools. The plan also involves creating...

Shifting the Burden of ID Crime from Victims to Institutions

Introduction Australia’s growing epidemic of identity crime has exposed a critical flaw in the nation’s cyber security response: the victims of data breaches are too often left to clean up the mess alone. As cyberattacks rise and personal information circulates through criminal networks, calls are mounting for a co-ordinated, government-led framework to replace today’s fragmented, victim-driven recovery model. At...

Avoiding Security Operation Chokepoints

Introduction Security operations often become inadvertent chokepoints. When every vendor relationship triggers an extensive security review, and teams rely on spreadsheets and email chains to gather responses, progress grinds to a halt. For resource‑constrained organisations, particularly in the fintech, SaaS and technology spaces, these bottlenecks can delay product launches, strain customer relationships and...

2026 Predictions: The Year Identity Becomes the Ultimate Control Point for an Autonomous World

Introduction The collision between technological acceleration and human adaptability will define the cybersecurity landscape in 2026. Identity and trust will sit at the centre of this struggle — as the proliferation of machine and AI identities exposes the fragility of traditional controls and the limits of human oversight.  As organisations race to deploy autonomous agents and machine-led systems to drive...

Why 9 In 10 IT Teams Overestimate Their Operational Resilience

Introduction How confident are you that your operations are resilient enough to tackle today’s challenges while preparing for tomorrow’s? If your answer is ‘very confident’, you’re not alone. According to SolarWinds' 2025 IT Trends Report, over 90% of IT professionals believe their organisations are resilient in the face of today’s demands. Of those, 38% say their resilience is ‘very strong’, while 55% describe it...

Cybersecurity in Manufacturing: Why It’s More Important Now Than Ever

Manufacturing has always depended on stable operations. That used to mean keeping machines running, maintaining quality, and hitting delivery schedules. Today it also means defending the environment from attacks that can shut down production, corrupt data, or compromise customer trust. Plants are now connected in ways they weren’t ten years ago, and that connection has created real exposure. The stakes are higher...

AI to Supercharge Cyber Threats Across Australia

AI is fundamentally changing the economics of cyberattacks in Australia. Adversaries are no longer scaling through the workforce, but rather through automation. Leaders can’t rely on human-paced defences in a machine-paced threat environment.  Here are the top security trends to watch out for in 2026 and beyond: Compressed Attack Timelines Due to Autonomous AI In 2026, the rapid acceleration of autonomous AI-driven...

‘Tis the Season to Stay Secure: Safeguarding Your Business this Festive Period

This holiday shopping season can make or break many Australian businesses. While consumers are shopping for bargains, attackers are searching for vulnerabilities.  The surge in shopping traffic during Black Friday, Cyber Monday and Christmas sales provides cybercriminals with the perfect cover to launch scams and fraud campaigns, exploiting the rise in digital transactions to hide malicious activity.  The Perfect...

Safeguarding Australia’s Most Critical Systems: Why Cybersecurity Is a Sovereignty Issue

Australia’s critical infrastructure is now on the front line of a contest that is playing out both in cyberspace and our surrounding seas and skies. The choices industry makes in the next few years will determine whether we remain merely connected or truly resilient. The Stakes for Critical Infrastructure The latest ASD Cyber Threat Report shows that cyber incidents now target Australia’s critical infrastructure at...

Exploring Security In the Context of AI

Insights from the Cisco Live! "Redefining Security in the AI Era" Panel The rapid proliferation of Artificial Intelligence (AI) across industries has adroitly shifted the paradigm of cybersecurity. At the recent “Redefining Security in the AI Era” panel held at Cisco Live! 2025, senior leaders from Cisco, and partner organisation Logicalis, met to discuss the complexities and opportunities facing security teams...

The ABCs of GRC

Introduction In the face of increasing regulatory pressure, rising cyber threats, and growing business complexity, organisations need a structured, scalable approach to managing risk. Governance, Risk, and Compliance (GRC) frameworks have become vital for aligning information security with corporate objectives, ensuring operational resilience, and maintaining trust with stakeholders. For tech executives, building...

The Korean Leaks – Analysing the Hybrid Geopolitical Campaign Targeting South Korean Financial Services with Qilin RaaS

When preparing data for the Bitdefender Threat Debrief | October 2025, Bitdefender noticed a significant departure from established ransomware trends. Typically, the top five most impacted countries are consistently the US, Canada, and major Western European nations. However, for this period, South Korea (KR) suddenly became the second most-targeted country, with 25 victims claimed in a single month. This anomaly...

How the Financial Sector Is Battling New Cyber Threats

Australia’s financial institutions are confronting a new generation of cyber and fraud threats that are testing the limits of traditional defences. From quote manipulation in insurance to networks of co-ordinated money mules and ghost brokering, the old playbook built on static, siloed data models is fast losing its relevance. The financial sector’s challenge is not just the rising sophistication of fraudsters, but...
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

Can AI Ever Really Outpace AI-Powered Cyberattacks?

Introduction There's this question that keeps coming up in cybersecurity circles, and honestly, it feels a bit like asking whether we can outrun our own shadow. Can defensive AI actually stay ahead of AI-powered attacks? The short answer is probably not in any permanent way, but that doesn't mean we're doomed to lose this fight. The thing about AI in cybersecurity: it's fundamentally playing both offense and...

Disruption Demands Coordination: Why Secure Communications Solutions are Key to Disrupting the Illegal Fentanyl Trade

Introduction The Government of Canada is taking concrete and bold action to strengthen border security and disrupt the illegal fentanyl trade. It has announced an investment of $1.3 billion to enhance operations. The funding will support hiring additional personnel and purchasing advanced technology and equipment. This includes state-of-the-art imaging systems, drones, and AI tools. The plan also involves creating...

Shifting the Burden of ID Crime from Victims to Institutions

Introduction Australia’s growing epidemic of identity crime has exposed a critical flaw in the nation’s cyber security response: the victims of data breaches are too often left to clean up the mess alone. As cyberattacks rise and personal information circulates through criminal networks, calls are mounting for a co-ordinated, government-led framework to replace today’s fragmented, victim-driven recovery model. At...

Avoiding Security Operation Chokepoints

Introduction Security operations often become inadvertent chokepoints. When every vendor relationship triggers an extensive security review, and teams rely on spreadsheets and email chains to gather responses, progress grinds to a halt. For resource‑constrained organisations, particularly in the fintech, SaaS and technology spaces, these bottlenecks can delay product launches, strain customer relationships and...
No results found.
AI Fear Meets FOMO

AI Fear Meets FOMO

Introduction If you haven’t heard about AI, then you must be living on a different planet. It’s the talk of the town, ...
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
AI Fear Meets FOMO

AI Fear Meets FOMO

Introduction If you haven’t heard about AI, then you must be living on a different planet. It’s the talk of the town, ...
No results found.
No results found.
No results found.