Cyber Media

Contributors

Our team of Contributors are independent experts from the fields of academia, research & development, military, government, and other similar fields, designed to bring unbiased and insightful perspectives to the forefront of cybersecurity discussions.

We understand the importance of fostering a diverse range of opinions and insights in the rapidly evolving landscape of cybersecurity. As such, our program exclusively features experts who operate independently of commercial affiliations, ensuring an objective and impartial viewpoint.

By participating in our Independent Expert Guest Writer Program, cybersecurity professionals, academics, and thought leaders have the opportunity to contribute to a platform dedicated to fostering open dialogue and advancing the collective understanding of cybersecurity issues.

From The Archives

The Challenges of Underfunding Data Teams: How Data Drives AI and Security

The Challenges of Underfunding Data Teams: How Data Drives AI and Security

This article delves into the critical role of data teams in supporting AI and security initiatives within organisations. It highlights the challenges that arise from underfunding these teams, emphasising the importance of data quality, governance, and management. The piece explores the imbalance in budget allocation, potential risks, and inefficiencies caused by insufficient funding. Through case studies and recommendations, the article underscores the need for balanced budget allocation to enhance data quality, improve AI effectiveness, and strengthen security measures, ultimately advocating for greater investment in data teams.
Super Fund Hacks: Are We Seeing Warning Signs or the Full Crisis?

Super Fund Hacks: Are We Seeing Warning Signs or the Full Crisis?

Australia faces another significant cybersecurity breach, this time targeting superannuation funds managing trillions in retirement savings. This attack highlights a severe erosion of public trust and underscores the gap between Australia's ambitious cybersecurity goals and actual readiness. Discover how lax security protocols, regulatory shortcomings, and political bravado are making Australia a prime target for cybercriminals. Learn why immediate action is crucial for safeguarding national digital defenses.
Microsoft’s Cybersecurity Vet to Vendor Visionary

Microsoft’s Cybersecurity Vet to Vendor Visionary

Tech giant, Microsoft, is heavily focused on building long-term trust with customers and re-establishing how cybersecurity leaders engage with the company. Mick Dunne, Chief Security Adviser for Asia Pacific at Microsoft, shared insights into the newly established Customer Security Officer (CSO) team, a strategic initiative. Dunne, who transitioned ...
Teachers Need to Focus on Teaching – AI’s Role in Classrooms

Teachers Need to Focus on Teaching – AI’s Role in Classrooms

At the Microsoft AI Tour 2024, Leigh Williams, Chief Information Officer and IT Executive at Brisbane Catholic Education, shared her opinion on how Artificial Intelligence (AI) is reshaping the education arena. From reducing administrative burdens on teachers to enabling hyper-personalised learning, AI is assisting the way students engage with their ...
The Rise of AI-Powered Sectional and Differential Attacks: A Growing Threat to Symmetric Encryption

The Rise of AI-Powered Sectional and Differential Attacks: A Growing Threat to Symmetric Encryption

Artificial intelligence (AI) is revolutionizing cryptanalysis, making traditional symmetric key encryption increasingly vulnerable. AI-driven differential and sectional attacks can now exploit minor weaknesses in encryption schemes with unprecedented efficiency. Organizations must adopt crypto-resilient architectures like Quantum-Powered Encryption (QPE) and Quantum Random Number Generators (QRNGs) to stay ahead of these threats. Explore how ExeQuantum's advanced security solutions can safeguard your data against the evolving landscape of AI-enhanced cryptographic attacks. Stay prepared for the future of cybersecurity with cutting-edge protection strategies.
Australia’s 2025 Federal Budget: Is Cybersecurity Still a Priority?

Australia’s 2025 Federal Budget: Is Cybersecurity Still a Priority?

Treasurer Jim Chalmers' 2025 federal budget marks a significant departure from previous robust commitments to cybersecurity, sparking concerns about Australia's cyber resilience. With notable investments like REDSPICE and the 2023–2030 Cybersecurity Strategy now in the past, questions arise about maintaining momentum amid escalating cyber threats.
Why Cybercriminals Never Take a Day Off

Why Cybercriminals Never Take a Day Off

Cyber criminals don’t take days off. They hit when we’re taking some ‘down time’. Why? Because our guards are down and it’s a perfect time to strike. Gerry Sillars, Vice President of APJ at Semperis discusses the relentless nature of cyber threats and the realities of ransomware attacks, as revealed in Semperis' latest holiday risk report.“Think ...
Cooperate or Collapse: The Prisoner’s Dilemma in Cybersecurity Strategy

Cooperate or Collapse: The Prisoner’s Dilemma in Cybersecurity Strategy

Introduction In the interconnected world of cybersecurity, organisations, nations, and individuals constantly confront strategic decisions regarding resource allocation, information sharing, and defence against cyber threats. One of the most compelling frameworks for analysing these challenges is the Prisoner’s Dilemma, a foundational game theory ...
No results found.

Meet Our Contributors & Editors

Suzanne Charlotte Vos is a Director at Innovation & Integration and Cyber & Emerging Tech Ventures advisor at Fairlight Ventures. She is on a mission to help people get unstuck and achieve their goals in a constantly transforming world. With over a decade of experience ranging from her family business to global corporate environments, she believes everyone benefits from having an innovative mindset in both a personal and professional capacity.
View Posts →
Samuel was always interested in emerging technologies, having cofounded AISSOC - Artificial Intelligence Student Society, during his university studies. AISSOC is a club for students interested in and working on AI projects. He contributed to and helped facilitate multiple projects. Shortly after finishing his Cybersecurity studies at Monash, he became interested in Quantum Computers, and found that he needed to adapt his Cybersecurity skillset in the face of this rapidly developing technology. Seeing that there's not nearly enough attention paid to this incoming threat, he took it upon himself to not only spread awareness of the issue, but also provide the solution with ExeQuantum. Since then, Samuel has been leading multiple thought leadership, lectures and panels around Australia, including in Stone & Chalk, University of Melbourne, Melbourne Python, and more, spreading the word of the quantum threat.
View Posts →
With over 40 years of experience and, acknowledged as being one of the top CIOs in Australia, Rowan has a solid reputation for delivering strategic transformational business change including cyber security and artificial intelligence. Rowan is well renowned for being an innovator and transformer, managing change, building high performance teams and delivery in rapidly changing and complex mission-critical environments. Rowan is known throughout Government and Industry as an expert advisor and thought leader regarding Digital and Data strategy, security and transformations in Financial Services, Banking and Government. He is a sought-after advisor and expert in AgTech, ICT and business strategy, project management, cybersecurity and Artificial Intelligence project delivery. Acknowledged across the corporate landscape, Rowan's reputation is for successful transformation, innovation and technology leadership.
View Posts →
Reshma is a Data & AI, Security, and Technology Risk specialist with over 25 years experience working in Australia and New Zealand. She holds a Master's in Information Technology, is a Certified Data Privacy Solutions Engineer (CDPSE), and a Graduate of the Australian Institute of Company Directors (GAICD). Passionate about emerging technologies, Reshma is dedicated to addressing Data & AI challenges. She is a Board Member at ISACA Melbourne and serves on other nonprofit and advisory boards. Additionally, she has contributed as a Subject Matter Expert Reviewer for ISACA's CDPSE Manual and regularly writes for blogs, magazines, and participates in podcasts.
View Posts →
Mark Perry is an experienced technologist specialising in Digital Identity and Open Banking. From 2018 until 2020 he served on the Australian Government's Consumer Data Right advisory committee, and regularly speaks at global industry events on digital identity trends, consumer privacy, and cybersecurity. His 30+ year career includes leadership and technical roles at established industry players and startups. A founding member of IDPro, Mark combines his technical expertise with interests in golf, single malt Scotch, vintage synthesizers, and writing both fiction and non-fiction.
View Posts →
Karissa Breen, crowned a LinkedIn ‘Top Voice in Technology’, is more commonly known as KB. A serial Entrepreneur that Co-Founded the TMFE Group, a holding company and consortium of several businesses all relating to cybersecurity including, an industry-leading media platform, a marketing agency, a content production studio, and the executive headhunting firm, MercSec. KBI.Media is an independent and agnostic global cyber security media company led by KB at the helm of the journalism division. As a Cybersecurity Investigative Journalist, KB hosts her flagship podcast, KBKast, interviewing cybersecurity practitioners around the globe on security and the problems business executives face. It has been downloaded in 65 countries with more than 300K downloads globally, influencing billions in cyber budgets. KB asks hard questions and gets real answers from her guests, providing a unique, uncoloured position on the always evolving landscape of cybersecurity. As a Producer and Host of the streaming show, 2Fa.tv, she sits down with experts to demystify the world of cybersecurity and provide genuine insight to businesses executives on the downstream impacts cybersecurity advancement and events have on our wider world.
View Posts →
Security Influencer | Human Risk Management Expert | Online Safety Specialist Jacqueline Jayne, a.k.a. JJ, stands out in the cybersecurity landscape with an innate talent for simplifying the complex. With over two decades of experience in education, tech, cybersecurity, communications, and strategy, she's transformed cybersecurity awareness in her professional roles, making it engaging and understandable for all. JJ's approach is about sparking curiosity, asking questions, and inspiring alternative thinking. She's not just about the tech; she's about connecting with people and sharing stories that resonate.
View Posts →
Dr. Ivano Bongiovanni is the General Manager of AUSCERT, Australia's first computer emergency response team (CERT) and one of the oldest CERTs in the world. With more than 20 years in cyber security and risk management. Dr. Bongiovanni also holds a position as Senior Lecturer in Information Security, Governance, and Leadership. Prior to this, Dr. Bongiovanni was a Research Fellow at the University of Glasgow and PwC Chair in Digital Economy. Dr. Bongiovanni commenced his career as a Police Officer with the Italian Ministry and was the Deputy Venue Security Manager at the Turin 2006 Winter Olympic and Paralympic Games, where he delivered the Venue Security Plan, coordinated security services for the Main Media Centre, the Olympic Stadium (opening ceremony) and the Paralympic Village. He holds a PhD in Risk Management in international airports.
View Posts →
Dinesh is a technologist, entrepreneur, and business leader with 20+ years of global expertise in Cyber-GRC, AI, and ITSM. Pursuing a PhD, he holds Master's degrees in IT and Cybersecurity. Passionate about policy development and reforms, he integrates technology with business and bridges academia with industry. As a Specialist at Würth Australia, he strengthens cybersecurity and strategic partnerships. A lecturer, blogger, and startup mentor, he advocates for democratizing technology and AI. He is a sought-after speaker who blends technical expertise with business strategy to drive innovation.
View Posts →
Dali Kaafar is a Professor at the Faculty of Science and Engineering, Executive Director of The Macquarie University Cyber Security Hub, Founder of APATE.AI., Director of the Data Security and Privacy R&D Program, Director of the Cyber Range Training Centre (CRTC) and the Cyber Security Curriculum at the Institute of Applied Technology-Digital. Professor Kaafar interested in the broad R&D activities in Cyber Security in Emerging Technologies with a vision to enable Explicit Trust in the Digital Economy. His research interests include Data Security and Privacy, with a focus on Privacy-Preserving (or Enhancing) technologies and Information Security for Web and Mobile applications, (Provably) private date sharing and Trustworthy Secure and Private Machine learning techniques.
View Posts →
Cam retains oversight of the editorial content for KBI.Media and finds time to write every once in a while too. With a keen interest in geo-political goings-on, Cam oversees our new Global News section. And being an ex-techy, he puts his (very) atrophied knowledge to use, giving a helping hand to shape and manage our Technical section on occasion too.
View Posts →

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Become a Contributor

Unbiased Expertise: Our guest writers are carefully selected based on their expertise and independence from commercial interests. This ensures that the content they contribute is free from any potential bias, providing our audience with a well-rounded and objective understanding of cybersecurity topics.

Diverse Perspectives: We believe in showcasing a variety of perspectives to enrich the discourse surrounding cybersecurity. By featuring independent experts with diverse backgrounds, experiences, and viewpoints, we aim to present a comprehensive and inclusive narrative that reflects the complexity of the cybersecurity landscape.

Rigorous Selection Process: To maintain the integrity of our program, we employ a rigorous selection process for guest writers. Prospective contributors undergo thorough vetting to ensure their independence and commitment to delivering high-quality, unbiased content.

Cutting-Edge Insights: Our guest writers are at the forefront of cybersecurity developments, providing our audience with timely and relevant insights. Their independence allows them to delve into emerging trends, technological advancements, and policy changes without the constraints of commercial interests.

Commitment to Transparency: We prioritize transparency in our program, clearly outlining the independence criteria for our guest writers. This commitment ensures that our audience can trust the authenticity and objectivity of the content presented.

 

Get In Touch

Speak with KBI

Share This