No results found.
No results found.
No results found.

Podcasts

Episode 351 Deep Dive: Tammy Klotz | Leading with Empathy and Grace
byKBI.Media

In this episode, we sit down with Tammy Klotz, cybersecurity and IT executive and author of Leading with Empathy and Grace, as she explores the critical role of intentional empathy in leadership. Tammy unpacks the misconception that empathy and accountability are opposites, arguing they are essential partners for building trust within teams. She discusses the impact of technology on our ability to be present, the importance of transparency during organizational challenges, and the pitfalls of viewing empathy as a “soft skill” in cybersecurity. Tammy also addresses how leaders can be more intentional in their interactions, foster stronger human connections despite remote and hybrid work environments, and why self-care is foundational for personal and professional success.

Tammy Klotz is a vibrant and accomplished executive and best-selling author with over three decades of diverse experience in the manufacturing industry, specializing in cybersecurity and transformational leadership. She offers keen expertise in navigating mergers, acquisitions, and divestitures within both publicly-traded and privately-held companies and is seasoned in security, risk, and compliance leadership. Tammy brings a dynamic and positive approach to problem solving, excelling in simplifying intricate IT and cybersecurity concepts and facilitating pragmatic, non-technical dialogues that resonate with business executives. She is recognized as a strong, knowledgeable, thoughtful security executive who excels in public speaking and thought leadership, striving to empower others through knowledge sharing.

 

No results found.
The Guardians that Safeguard our Critical Infrastructure

The Guardians that Safeguard our Critical Infrastructure

Introduction Every day, critical industry sectors like healthcare, government and utilities services rely on digital systems that are mission-critical but vulnerable to cyber threats. Yet, the professionals safeguarding these systems often go unrecognised. Imagine a hospital's life-support systems faltering during critical surgery, a school building’s security lockdown failing during an active threat drill or a state government's emergency response network collapsing during a natural disaster. These scenarios are daily hypotheticals faced by the ...
No results found.

Business News ↓

In the Age of Microsegmentation Enforcement in Hours, Are You Still Shutting Down Operations?

I was researching cyberattacks, and a common theme popped out. “We had an unprecedented cyberattack… and we shut down our operations to protect stakeholder interests.” I know, breaches can be strenuous. The initial hours following a breach are often marked by chaos and urgency as crisis leaders call vendors, disconnect systems, analyze logs, and brief executives. The focus is on containing the damage. But over...

Encryption Isn’t Enough: The Hidden Threat of Messaging Metadata

Today’s Digital Landscape Metadata is one of the most overlooked security risks in modern digital communications. Adversaries no longer need to break into encrypted chats to understand your intent; all they need is your metadata. For government officials who deal with national security, foreign relations, or coordination of high-stakes operations such as international summits or VIP protection, these risks are a...

The ISO27001 Gold Standard

Introduction Building a strong information security posture is no longer optional. For tech executives tasked with protecting sensitive data, enabling growth, and maintaining stakeholder trust, ISO 27001 has emerged as the global gold standard. This internationally recognised framework for information security management not only helps prevent breaches but also serves as a competitive differentiator in the...

Battling Burnout in Cybersecurity

The ceaseless nature and high sophistication of today’s AI-driven cyber threats are unrelenting and daunting. An alarmingly high 85% of cybersecurity professionals anticipate leaving their jobs due to burnout. Burnout impacts our most important line of defense – our cybersecurity professionals. ​Hack The Box and SecureWorld Report: 84% of cybersecurity workers report stress, fatigue, or burnout. 90% of CISOs...

Three Cybersecurity Predictions That Will Define the CISO Agenda in 2026

As we head into 2026, cybersecurity leaders are facing a paradox. Organisations have never invested more in security tools, data and talent – yet many CISOs admit they have less confidence in their true risk posture than ever before.  The problem isn’t a lack of signals. It’s an excess of them.   Fragmented tools, disconnected data, accelerating AI adoption and rising board expectations have created an environment...

How to Build Secure Communications Beyond “End-to-End” Network Encryption

For governments and critical infrastructure operators, secure communications are essential to national governance, operational continuity, and crisis response. Secure communication is the process of safeguarding communication channels and taking full control over critical information. It involves methods and technologies to ensure that all data exchanged between two or more parties remains confidential, authentic,...

NIAP-Certified Security – A Foundation for Trusted Communications

In government and critical infrastructure, security is not an optional feature, it is the foundation of operational integrity. For organizations responsible for protecting sensitive data and ensuring mission continuity, trust in communication systems must be earned through independent, rigorous validation. Relying on unvetted software introduces unacceptable risks to national security and public safety. As a...

Streamlining Cyber Operations

Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing pressure to protect, adapt, and enable innovation. For many organisations, cyber operations are buckling under the weight of manual tasks, legacy tools, and cross-functional bottlenecks. The result is a reactive security posture that struggles to keep up with business demands. To address this, tech...

Containing the Inevitable: What Cyber Leaders Must Prepare for in 2026

As we head into 2026, I am thinking of a Japanese idiom, Koun Ryusui (行雲流水), to describe how enterprises should behave when facing a cyberattack. Koun Ryusui means “to drift like clouds and flow like water.” It reflects calm movement, adaptability, and resilience. For enterprises, this is an operating requirement. Cyber incidents are no longer isolated disruptions. They are recurring tests of how well an...

Continuous Compliance Isn’t An Option

Introduction For today’s Chief Information Security Officers (CISOs), compliance is no longer a once-a-year headache, it’s a continuous, evolving mandate. As threat landscapes shift and regulatory frameworks grow more complex, businesses are being called to do more than tick boxes at audit time. Instead, they must embrace a model of continuous compliance, an approach that provides ongoing assurance, improves...

Trust, Power, People: Hybrid AI’s 2026 Imperative 

Over the past year across Asia Pacific, conversations with customers, from fast-growing digital natives to highly regulated banks and healthcare providers, all have shared a common thread: AI has moved from experimentation to execution. The question is no longer “if” but “how” to scale responsibly, efficiently, and with clear business outcomes. As we look to 2026, the organisations that lead will be those that...

Can AI Ever Really Outpace AI-Powered Cyberattacks?

Introduction There's this question that keeps coming up in cybersecurity circles, and honestly, it feels a bit like asking whether we can outrun our own shadow. Can defensive AI actually stay ahead of AI-powered attacks? The short answer is probably not in any permanent way, but that doesn't mean we're doomed to lose this fight. The thing about AI in cybersecurity: it's fundamentally playing both offense and...

Putting Your Money Where Your Money Is

Introduction Fintech companies occupy a unique position at the intersection of finance and technology. They handle extremely sensitive customer information, personal identities, payment data, transaction histories, and therefore represent a high‑value target for cyber‑criminals. In the Asia‑Pacific region, nearly 80 percent of executives anticipate that financial crime risks, including AI‑driven attacks, will...

ISACA Sydney Conference 2025 – Event Recap

Overview Walking into the ISACA Sydney Chapter Conference as “the student voice”, I knew I was surrounded by some of the heaviest hitters in cyber, audit and technology leadership. My job for the day was simple but huge: ask the questions students and early-career professionals are scared to ask and bring those answers back to our community. By the end, one theme kept looping in my head: it’s not enough to just be...

Disruption Demands Coordination: Why Secure Communications Solutions are Key to Disrupting the Illegal Fentanyl Trade

Introduction The Government of Canada is taking concrete and bold action to strengthen border security and disrupt the illegal fentanyl trade. It has announced an investment of $1.3 billion to enhance operations. The funding will support hiring additional personnel and purchasing advanced technology and equipment. This includes state-of-the-art imaging systems, drones, and AI tools. The plan also involves creating...

Shifting the Burden of ID Crime from Victims to Institutions

Introduction Australia’s growing epidemic of identity crime has exposed a critical flaw in the nation’s cyber security response: the victims of data breaches are too often left to clean up the mess alone. As cyberattacks rise and personal information circulates through criminal networks, calls are mounting for a co-ordinated, government-led framework to replace today’s fragmented, victim-driven recovery model. At...
No results found.
No results found.
No results found.
The ISO27001 Gold Standard

The ISO27001 Gold Standard

Introduction Building a strong information security posture is no longer optional. For tech executives tasked with ...
Streamlining Cyber Operations

Streamlining Cyber Operations

Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing ...
No results found.
No results found.

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

In the Age of Microsegmentation Enforcement in Hours, Are You Still Shutting Down Operations?

I was researching cyberattacks, and a common theme popped out. “We had an unprecedented cyberattack… and we shut down our operations to protect stakeholder interests.” I know, breaches can be strenuous. The initial hours following a breach are often marked by chaos and urgency as crisis leaders call vendors, disconnect systems, analyze logs, and brief executives. The focus is on containing the damage. But over...

Encryption Isn’t Enough: The Hidden Threat of Messaging Metadata

Today’s Digital Landscape Metadata is one of the most overlooked security risks in modern digital communications. Adversaries no longer need to break into encrypted chats to understand your intent; all they need is your metadata. For government officials who deal with national security, foreign relations, or coordination of high-stakes operations such as international summits or VIP protection, these risks are a...

The ISO27001 Gold Standard

Introduction Building a strong information security posture is no longer optional. For tech executives tasked with protecting sensitive data, enabling growth, and maintaining stakeholder trust, ISO 27001 has emerged as the global gold standard. This internationally recognised framework for information security management not only helps prevent breaches but also serves as a competitive differentiator in the...

Battling Burnout in Cybersecurity

The ceaseless nature and high sophistication of today’s AI-driven cyber threats are unrelenting and daunting. An alarmingly high 85% of cybersecurity professionals anticipate leaving their jobs due to burnout. Burnout impacts our most important line of defense – our cybersecurity professionals. ​Hack The Box and SecureWorld Report: 84% of cybersecurity workers report stress, fatigue, or burnout. 90% of CISOs...
The ISO27001 Gold Standard

The ISO27001 Gold Standard

Introduction Building a strong information security posture is no longer optional. For tech executives tasked with ...
No results found.
No results found.
No results found.
It’s Time to Hack the Hackers

It’s Time to Hack the Hackers

Introduction Cybercrime in Australia is rising rapidly. From the major breachers that held headlines hostage for months, ...
No results found.
No results found.
No results found.
No results found.
The ISO27001 Gold Standard

The ISO27001 Gold Standard

Introduction Building a strong information security posture is no longer optional. For tech executives tasked with ...
No results found.
No results found.
No results found.