No results found.
No results found.
No results found.

Podcasts

From The SimSpace Summit 2026 – KB On The Go | Peter Lee and Ernie Ferraresso (Part 1)
byKBI.Media

Cybersecurity is hitting a breaking point. Compliance checklists, tabletop exercises and confidence claims aren’t enough anymore, especially as AI accelerates both attack and defense. In this bonus episode, KB sits down with Peter Lee, Chief Executive Officer and President of SimSpace, and Ernie Ferraresso, Senior Director of Cyber Florida. Together they discuss cyber readiness and why Florida treats cyber like a mission.

Peter Lee, Chief Executive Officer and President of SimSpace

Peter serves as the Chief Executive Officer and President of SimSpace, the realistic, intelligent cyber range that strengthens teams, technologies, and processes to outsmart adversaries before the fight begins.

Previously, Peter was co-founder and CEO of DataSynapse, an infrastructure software company acquired by TIBCO; and CEO of RapidMiner, an open source machine learning platform acquired by Altair. At TIBCO, Peter served as Executive Vice President responsible for multiple businesses including the security, cloud computing, B2B, CX, and analytics product groups. Before launching his career in software, Peter was a strategy consultant with Deloitte and an investment banker with JP Morgan.

Peter has extensive Board experience collaborating with top tier investors to grow innovative software companies, serving as Chairman for Attivio (acquired by ServiceNow), WorldQuant Predictive, and ActiveState, and as Director for Ektron (acquired by Accel-KKR), Vesta (acquired by TINT), Infomatix (acquired by EPAM), OpenAssemby (acquired by Fulcrum), BlogTalkRadio (acquired by iHeartRadio), Entrio and Chattermill. Peter also serves on the investment committees of Advanced Finance & Investment Group and Communitas Capital Partners.

Peter graduated from Harvard College with an AB degree in Government (cum laude), received an MBA degree from The Wharton School in Entrepreneurial Management and an MA degree from The University of Pennsylvania in International Affairs.

Peter has been invited twice to speak at the World Economic Forum in Davos and four times at The Milken Institute Global Conferences in LA and Singapore, explaining the impact of AI in terms of its business value and key use cases. Peter is a former Board member of Upwardly Global, alumnus of YPO and a member of the Development Board for Phillips Academy Andover.

Ernie Ferraresso, Senior Director of Cyber Florida

As the senior director of Cyber Florida, Ernie drives the organization’s strategic vision while overseeing the center’s day-to-day operations. He started with Cyber Florida in 2017 as associate director of programs and partnerships and brings decades of technology expertise and leadership experience to his role.

Prior to Cyber Florida, Ernie worked for a small technology design and integration firm as the Director of Operations, overseeing the design and implementation of cybersecurity and emergency operations center technology solutions in the U.S. and throughout Latin America.

He is a retired U.S. Marine Intelligence Officer who served in the U.S. and abroad. His work included assignments with the U.S. Special Operations Forces, the intelligence community, the George C. Marshall European Center for Security Studies, and U.S. Cyber Command.

No results found.
Five Telecom Habits Of Smart Small Businesses

Five Telecom Habits Of Smart Small Businesses

Introduction Small businesses often grow quickly, but if their telecommunications setup doesn’t support this growth, productivity and service can suffer. With a few strategic habits, SMEs can avoid tech growing pains. Here are the top telecom habits that the savviest Australian small businesses adopt early on. Consolidate Where It Makes Sense It’s easy for businesses to end up with multiple vendors for phone, mobile, internet and IT services. While price-shopping can yield short-term savings, managing too many bills and support lines is ...
No results found.

Business News ↓

Eliminating the Technical Debt Caused by AI-Assisted Software Development

If recent industry forecasts are correct, 2026 will be the year of artificial intelligence (AI)-driven technical debt. According to research company Forrester[1], the tech debt for 75% of organisations will increase to a moderate or high level during this year, due to the rapid expansion of AI usage across a range of areas including software development. Indeed, the software development community is experiencing a...

Navigating AI with Cyber-Resilient Storage: Use Cases Lead, Infrastructure Enables

I’ve recently discussed the evolving landscape of intelligent data infrastructure on platforms like Techstrong TV. In these conversations, a recurring theme emerges: major trends like cloud and AI are reshaping enterprises, but their adoption is propelled primarily by compelling use cases. Infrastructure may not take center stage, but it’s the essential enabler that makes those use cases viable, efficient, and...

Security Metrics That Matter

Introduction Organisations must move beyond reactive security postures and embrace data-driven decision-making as the sophistication and prevalence of threat actors continues to increase. For start-ups, especially those scaling rapidly or navigating compliance requirements, understanding and tracking the right cybersecurity metrics is crucial. Security metrics provide clarity: they help prioritise risks, optimise...

Rethinking Cyber Resilience in the Age of AI

AI has fundamentally changed how we think about both innovation and risk. It’s driving new breakthroughs in medicine, design, and productivity, but it’s also giving attackers a sharper edge. Ransomware isn’t just about encrypting data anymore. It’s about double extortion, data theft, and the erosion of trust that organizations depend on to operate. As threat actors become more adaptive and use AI for more...

Cisco’s Bid to Anchor the Agentic Enterprise

The Shift to Agentic Enterprise AI Artificial Intelligence (AI) now alters the commercial world with a speed that feels less evolutionary and more tectonic. Infrastructure strains, security models stretch, collaboration tools morph. In that context, Cisco has positioned itself not merely as a participant, but as a structural layer in what it sees as the next phase of enterprise computing. During a recent company...

Future-Proofing Your Data Infrastructure with Post-Quantum Cryptography

The arrival of quantum computing isn’t a question of if—but when. And when it does arrive at scale, it will break the very encryption systems that protect the digital backbone of modern business. From banking records and intellectual property to classified communications, data that’s secure today could be exposed tomorrow. That’s why forward-thinking organizations are already investing in post-quantum...

Rising Cybersecurity Vulnerabilities In Increasingly Interconnected IT/OT Environments

From Outage to Infiltration: Cybersecurity Risk and the Evolving Threat to Electrical Infrastructure As electrical infrastructure modernizes, its vulnerabilities evolve in parallel. From substation automation to AI-powered grid management, today’s systems have developed from the isolated hardware of the past to converged digital ecosystems with data pathways, network connections, and embedded intelligence. Every...

Cyber Dashboards are Making Boards Feel Safer…and That’s the Real Risk

Introduction Boards today have never seen more cyber risk data. Dashboards glow with heat maps, scores, alerts and reassuring trend lines. Cyber is now a standing agenda item, backed by metrics designed to prove the organisation is in control. And yet, beneath this apparent clarity sits an uncomfortable truth. Many boards are less safe precisely because they believe they can see everything. This is not a failure of...

KnowBe4 Experts Calls for ‘Digital Mindfulness’ and Skepticism as AI Dominates Safer Internet Day 2026

As the world prepares for Safer Internet Day on 10 February 2026, KnowBe4 is encouraging individuals of all ages to adopt a mindset of ‘digital mindfulness’ to stay safe online. This year’s theme, ‘Smart tech, safe choices – Exploring the safe and responsible use of AI’, highlights the urgent need for a new set of digital skills in the world of AI. With Artificial Intelligence (AI) now a permanent fixture in the...

Safer Internet Day 2026

Introduction On Safer Internet Day, it’s worth recognising a simple reality: AI is reshaping the Internet in two directions at once. The same tools accelerating productivity and innovation are also industrialising cybercrime, making attacks faster to launch, cheaper to run, and harder to spot. We’ve seen the impact in Australia. In 2024–25, the Australian Signals Directorate’s Australian Cyber Security Centre...

Data Resilience in a Post-Quantum World

Introduction As cyberthreats grow more sophisticated and the quantum era draws closer, resilience is no longer just a best practice—it’s a business imperative. Many organizations have focused on breach prevention. Forward-looking enterprises are shifting to a resilience-first model. This model prioritizes continuity, recovery, and adaptability in the face of emerging risks. Why Resilience Is the New Gold Standard...

Securing the New Gaming Frontier: Data Infrastructure at Play

Introduction The gaming industry is in the midst of an extraordinary transformation. Immersive digital worlds, AI-driven gameplay, and massive global online communities are reshaping how we play, connect, and innovate. But as this digital ecosystem grows, so does the complexity of managing it safely and effectively. This frontier, rich with opportunity, also brings evolving challenges for studios that must secure...

Deepfake Diplomacy – AI Impersonation’s Attack on Sovereign Security

The rise of AI-powered impersonation—ranging from synthetic voice deepfakes to algorithmically generated messages—poses a critical threat to government, defense, and national infrastructure. A recent incident involving an AI-generated impersonation of a U.S. Secretary of State underscores the urgency of this threat. State-sponsored actors are increasingly exploiting consumer-grade messaging apps including Signal to...

Building Resilience Through AI-Driven Security

The pace and complexity of adversarial attacks is rapidly evolving. According to the 2024 Cybersecurity Visibility Study conducted by NetApp and Futurum Group, more than half (54%) of enterprises have experienced a cyberattack in the past 12-18 months. Even more troubling, one in five of these organizations were unable to recover their data. The situation underscores an urgent need for businesses to reimagine their...

The Transformative Role of AI in Cybersecurity

2025 marks a pivotal moment in the integration of artificial intelligence (AI) and cybersecurity. Rapid advancements in AI are not only redefining industries; they are reshaping the cybersecurity landscape in profound ways. Through this evolution, I have noted three primary trends emerging that demand immediate attention from organizations: The amplification of security threats powered by AI, A renewed focus on...

When Digital Names Collide, Business Risk Follows

In corporate networks, a “collision” is usually associated with infrastructure failure: two devices sharing the same IP address, traffic misdirected, and ultimately a communications breaking down. However, a quieter and potentially more damaging form of collision is becoming increasingly common inside organisations: identity collisions. Unlike their network equivalents, identity collisions do not announce...
No results found.
No results found.
No results found.
Security Metrics That Matter

Security Metrics That Matter

Introduction Organisations must move beyond reactive security postures and embrace data-driven decision-making as the ...
The ISO27001 Gold Standard

The ISO27001 Gold Standard

Introduction Building a strong information security posture is no longer optional. For tech executives tasked with ...
Streamlining Cyber Operations

Streamlining Cyber Operations

Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing ...
No results found.
No results found.

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

AI Versus AI: Why The Next Cyber Security Battle Will Be Fought By Machines

Introduction Artificial intelligence has evolved from being a technical novelty into a powerful business tool with remarkable speed. Companies are embedding generative AI into customer service, software development, and finance operations to unlock efficiency gains and accelerate innovation. However, as adoption deepens, cyber security leaders are confronting a new reality: AI is not just enhancing productivity but...

Why Identity Security Is Breaking Under the Weight of Silos

For more than a decade, cybersecurity professionals have repeated a now-familiar mantra: identity is the new perimeter. However, in many organisations, identity security remains fragmented, inconsistently governed and poorly understood across increasingly complex environments. As enterprises scale hybrid cloud infrastructure, adopt dozens of SaaS platforms and experiment with AI-driven automation, identity has...

Inside the DIY Scam Economy

Introduction The headquarters of the scam economy have always been elusive, shifting between countries, towns and cities like a shadow. Western Africa, once heralded as a hotbed for digital fraud operations, has now been superseded by Southeast Asia, where hundreds of major scam centres are scattered. The operations of these criminal groups transcend the digital world, securing land to build cities and special...

Closing the Human Gap in SAP Security: The Case for Cybersecurity Training

Hackers are becoming increasingly sophisticated by the day. Ever-evolving cyber threats are happening at an overwhelming pace. Organizations using SAP systems have become favorite targets for cybercriminals. For SAP users, the necessity for comprehensive cybersecurity training has never been greater. Though security tools exist, these technologies do not replace the importance of training employees to recognize and...
Security Metrics That Matter

Security Metrics That Matter

Introduction Organisations must move beyond reactive security postures and embrace data-driven decision-making as the ...
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
Security Metrics That Matter

Security Metrics That Matter

Introduction Organisations must move beyond reactive security postures and embrace data-driven decision-making as the ...
No results found.
No results found.
No results found.