No results found.
No results found.
No results found.

Podcasts

Episode 324 Deep Dive: Kate Healy | Successfully Engaging and Selling to a CISO
byKBI.Media

In this episode, we sit down with Kate Healy, Founder of Empowered Cyber, as she shares her insights on how to successfully engage and sell to CISOs. Kate highlights the challenges salespeople face in a market where traditional tactics, such as cold calls, unsolicited emails, and LinkedIn pitches, often fall flat and can damage long-term relationships. She emphasizes the importance of building genuine trust, creating value, and truly understanding a CISO’s unique challenges rather than launching straight into product pitches. Kate also discusses how effective sales strategies in Australia hinge on relationship-building and mutual respect, and offers practical advice on leveraging existing customer introductions, participating in industry events, and communicating with authenticity and transparency. She strongly advocates for marketing, PR, and sales teams to align more closely and for both sides, vendor and client, to treat each other with empathy, honesty, and a human-centric approach.

Awarded Australia’s Most Outstanding in IT Security 2024, Fellow of AISA, and Graduate Australian Institute of Company Directors, Kate is a distinguished cyber security executive with over 25 years global experience. She has served in influential roles including Interim CISO The Lottery Corporation, Head of Security Google Cloud ANZ, Head of Risk, Wholesale Banking, Standard Chartered Bank and has been a volunteer Board Director. This diverse experience positions her uniquely, having been both an operator and a vendor, she understands the industry from both sides. Kate brings not only deep expertise but also a passion for making this knowledge accessible to everyone through her company Empowered Cyber.

No results found.
Five Telecom Habits Of Smart Small Businesses

Five Telecom Habits Of Smart Small Businesses

Introduction Small businesses often grow quickly, but if their telecommunications setup doesn’t support this growth, productivity and service can suffer. With a few strategic habits, SMEs can avoid tech growing pains. Here are the top telecom habits that the savviest Australian small businesses adopt early on. Consolidate Where It Makes Sense It’s easy for businesses to end up with multiple vendors for phone, mobile, internet and IT services. While price-shopping can yield short-term savings, managing too many bills and support lines is ...
No results found.

Business News ↓

The Countdown to Quantum Has Begun

Introduction Cybersecurity, as we know it, could be facing an extinction-level event—one that will reshape and rebuild the entire industry. Innovations like AI are already transforming threat landscapes and defences, while quantum computing looms as a seismic shift just over the horizon. Even now, organisations are being pushed to adapt, with drastically reduced certificate lifespans (47 days to be exact) forcing...

Five Telecom Habits Of Smart Small Businesses

Introduction Small businesses often grow quickly, but if their telecommunications setup doesn’t support this growth, productivity and service can suffer. With a few strategic habits, SMEs can avoid tech growing pains. Here are the top telecom habits that the savviest Australian small businesses adopt early on. Consolidate Where It Makes Sense It’s easy for businesses to end up with multiple vendors for phone,...

Rethinking The Office Phone: Why Cloud PBX Is The Future For SMBs

Overview For many small to medium-sized enterprises (SMBs), the office phone system can be treated as a set-and-forget utility. Yet business needs have changed, particularly with the advent of hybrid work and rising customer service expectations, and traditional phone setups are starting to show their age.  Cloud-based PBX (Private Branch Exchange) systems are a compelling solution, offering flexibility, cost...

The Scattered Spider, Airline Attacks and How to Be Breach Ready!

Introduction On July 2, 2025, Qantas, Australia's flagship airline, disclosed a cyberattack that compromised the personal information of up to six million customers, first detected on June 30, 2025. Touted as one of the most significant data breaches in Australia's recent history, the attack is suspected to be the work of the notorious Scattered Spider cybercriminal group. According to the information currently...

NBN Or Mobile Broadband? How To Choose The Right Business Internet Setup

Introduction Setting up internet for your business is not a one size fits all exercise. Whether you're running a solo consultancy, managing a busy retail outlet, or coordinating a remote team, choosing between NBN and mobile broadband can significantly impact your daily operations. With digital connectivity now critical for everything from cloud storage to video conferencing, it’s worth getting the setup right....

Alleged Russian Hackers Target Norwegian Dam

Overview This wasn’t a super sophisticated cyber attack; it was someone logging into a control system with too little security and opening a dam valve all the way. While the impact was minimal - 447 litres/second of flooding - it’s a reminder that the same digital world that provides us so many societal benefits has a soft underbelly if not properly secured. Just like you wouldn’t leave your front door unlocked,...

How Consumer Data Rights Are Changing the Way Australian Businesses Operate

Introduction Consumer data rights reforms in Australia are reshaping how enterprises handle personal information by introducing operational, legal, and technical responsibilities that apply across every part of the business. That includes how data is collected, how it is stored, and how it moves between internal teams and external systems. John Harding, general manager – managed services, Konica Minolta Australia,...

The Rising Role of Citizen Automators In Business Innovation

Australia is facing a deepening shortage of technology skills in the coming years, putting pressure on businesses that need developers and other ICT professionals to innovate successfully. It is estimated that 1.3 million technology workers will be needed in Australia by 2030 to meet industry demand. But new tools are enabling the rise of citizen developers to fill these tech gaps, here’s how: Creating Citizen...

Minimising Third-party Risk

Introduction As organisations continue to rely heavily on Software-as-a-Service (SaaS) tools and cloud-based vendors, the need to proactively manage third-party risk is more critical than ever. With over 60% of data breaches originating from third parties and the average organisation using upwards of 110 SaaS applications, the threat landscape has never been more complex. Implementing a strong vendor management...
The Blind Spot In Your Cyber Strategy cover

The Blind Spot In Your Cyber Strategy

 Recently on the DevSecOops podcast, Hosts Tom Walker, James Vincent, and Scott Fletcher unpacked the modern threats in the cybersecurity space. With years of experience in IT and cybersecurity, the hosts shared real world experiences, from everyday technical mishaps to nation sponsored cyberattacks, offering practical advice for staying secure amid the increasingly sophisticated threats. Start With The Basics A...

What Australian Businesses Need To Do To Bolster Their Cyber Defences During the EOFY

Introduction With the end of the financial year (EOFY) fast approaching, it’s more important now than ever for businesses to be even more vigilant and take stock of their online security. Tax season is a time of increased cyber threats and is ripe for cybercriminals and scammers to strike. Ways AI Is Being Utilised In EOFY Scams While the types of threats remain similar, they have become more sophisticated due to...
WTF is Happening in Tech? cover

WTF is Happening in Tech?

In the latest episode of the DevSecOops podcast, hosts Tom Walker and Scott Fletcher discussed three of the most talked about topics in enterprise IT including Kubernetes, the March 2025 Oracle Cloud security breach, and how AI is reshaping both productivity and cybersecurity. Kubernetes - Necessary Evolution or Needless Complexity? Tom did not hide his skepticism toward Kubernetes, the container orchestration tool...

Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets

Introduction Computer Emergency Response Teams (CERTs) are the unsung heroes of cybersecurity. There are many myths about their role and function. Contrary to popular belief they don’t certify cybersecurity professionals, and many don’t do emergency response.   Operating in the background, CERTs provide vital functions in anticipating and reducing the impact of cyber-attacks. The first CERT, the CERT/CC, was...

Don’t Let Generative AI And LLMs Become A Third-Party Vulnerability

 Asadullah (Asad) Rathore, Head of Professional Services - cyber security and AI consulting, Excite Cyber (ASX:EXT)  As Large language models (LLMs) are increasingly being embedded into software development, organisations must ensure they understand the cyber security risks that come with it. Developer tools that have generative AI capability integrated to assist developers when writing code are on the rise. But...

How Unchecked Third-Party Access is Undermining Supply Chains

In the modern global economy, supply chains are no longer just physical networks but have become vast digital ecosystems. At the heart of these systems lies a challenge that is rapidly gaining prominence among cybersecurity professionals: third-party digital access. While companies have invested heavily in internal cybersecurity, the true vulnerability often lies just outside their walls, in the hands of partners,...

7 Reasons Certifications Are Critical to Secure Communications

Picture this scenario. You’re a government leader or a critical infrastructure operator. Suddenly, your communication systems go dark. The network has been breached, and sensitive information is exposed. Foreign adversaries are listening, decisions are delayed, and operations are paralyzed. Worse yet, you have no way of getting in touch with your employees to let them know what is going on. This is no hypothetical...
No results found.
No results found.
No results found.
No results found.
No results found.

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

The Guardians that Safeguard our Critical Infrastructure

Introduction Every day, critical industry sectors like healthcare, government and utilities services rely on digital systems that are mission-critical but vulnerable to cyber threats. Yet, the professionals safeguarding these systems often go unrecognised. Imagine a hospital's life-support systems faltering during critical surgery, a school building’s security lockdown failing during an active threat drill or a...

From Zero To Stack

 Recently on the DevSecOops podcast, hosts Tom Walker and Scott Fletcher explored what it takes to build a modern IT environment from scratch. The pair discussed the tools that work, the ones that don’t, and how decisions should be based on people. The conversation kicked off with a topic that’s top of mind for many: virtualisation in a post-VMware world. Despite recent backlash over Broadcom’s acquisition of...

The Countdown to Quantum Has Begun

Introduction Cybersecurity, as we know it, could be facing an extinction-level event—one that will reshape and rebuild the entire industry. Innovations like AI are already transforming threat landscapes and defences, while quantum computing looms as a seismic shift just over the horizon. Even now, organisations are being pushed to adapt, with drastically reduced certificate lifespans (47 days to be exact) forcing...

Five Telecom Habits Of Smart Small Businesses

Introduction Small businesses often grow quickly, but if their telecommunications setup doesn’t support this growth, productivity and service can suffer. With a few strategic habits, SMEs can avoid tech growing pains. Here are the top telecom habits that the savviest Australian small businesses adopt early on. Consolidate Where It Makes Sense It’s easy for businesses to end up with multiple vendors for phone,...
From Zero To Stack

From Zero To Stack

 Recently on the DevSecOops podcast, hosts Tom Walker and Scott Fletcher explored what it takes to build a modern IT ...
No results found.
No results found.
No results found.
No results found.
No results found.
From Zero To Stack

From Zero To Stack

 Recently on the DevSecOops podcast, hosts Tom Walker and Scott Fletcher explored what it takes to build a modern IT ...
No results found.
No results found.
No results found.
No results found.