No results found.
No results found.
No results found.

Podcasts

Episode 352 Deep Dive: Alex Loizou | The Human Impact of a Cyber Incident
byKBI.Media

In this episode, we sit down with Alex Loizou, Managing Director at Intrinsic Security and former CISO of Medibank, as he shares firsthand insights into the human impact of navigating a major cyber breach. Alex walks us through the initial moments of discovery, the emotional and psychological toll on teams, and the importance of staying calm under pressure. He dives into Medibank’s approach to incident response, including the use of multiple IR partners for comprehensive investigations and the challenges of coordinating large incident teams in real time. The conversation highlights the value of practical, repeated exposure to incident scenarios, the pitfalls of “ambulance chasing” in the security industry, and the vital role of transparent, evidence-based communication during sensitive events. Alex emphasizes lessons learned about organisational preparedness, collaboration across the cybersecurity community, and the importance of building strong relationships with external media and government agencies.

Alex Loizou is a seasoned cybersecurity leader with a proven track record of building and leading high-performing security teams. He has extensive experience as a Chief Information Security Officer (CISO) for major organisations such as Medibank, Flybuys, and Bupa. Notably, he served as the CISO at Medibank during their 2022 cyber incident, where he played a crucial role in leading the response and recovery efforts.

No results found.
Five Telecom Habits Of Smart Small Businesses

Five Telecom Habits Of Smart Small Businesses

Introduction Small businesses often grow quickly, but if their telecommunications setup doesn’t support this growth, productivity and service can suffer. With a few strategic habits, SMEs can avoid tech growing pains. Here are the top telecom habits that the savviest Australian small businesses adopt early on. Consolidate Where It Makes Sense It’s easy for businesses to end up with multiple vendors for phone, mobile, internet and IT services. While price-shopping can yield short-term savings, managing too many bills and support lines is ...
No results found.

Business News ↓

When Digital Names Collide, Business Risk Follows

In corporate networks, a “collision” is usually associated with infrastructure failure: two devices sharing the same IP address, traffic misdirected, and ultimately a communications breaking down. However, a quieter and potentially more damaging form of collision is becoming increasingly common inside organisations: identity collisions. Unlike their network equivalents, identity collisions do not announce...

In the Age of Microsegmentation Enforcement in Hours, Are You Still Shutting Down Operations?

I was researching cyberattacks, and a common theme popped out. “We had an unprecedented cyberattack… and we shut down our operations to protect stakeholder interests.” I know, breaches can be strenuous. The initial hours following a breach are often marked by chaos and urgency as crisis leaders call vendors, disconnect systems, analyze logs, and brief executives. The focus is on containing the damage. But over...

Encryption Isn’t Enough: The Hidden Threat of Messaging Metadata

Today’s Digital Landscape Metadata is one of the most overlooked security risks in modern digital communications. Adversaries no longer need to break into encrypted chats to understand your intent; all they need is your metadata. For government officials who deal with national security, foreign relations, or coordination of high-stakes operations such as international summits or VIP protection, these risks are a...

The ISO27001 Gold Standard

Introduction Building a strong information security posture is no longer optional. For tech executives tasked with protecting sensitive data, enabling growth, and maintaining stakeholder trust, ISO 27001 has emerged as the global gold standard. This internationally recognised framework for information security management not only helps prevent breaches but also serves as a competitive differentiator in the...

Battling Burnout in Cybersecurity

The ceaseless nature and high sophistication of today’s AI-driven cyber threats are unrelenting and daunting. An alarmingly high 85% of cybersecurity professionals anticipate leaving their jobs due to burnout. Burnout impacts our most important line of defense – our cybersecurity professionals. ​Hack The Box and SecureWorld Report: 84% of cybersecurity workers report stress, fatigue, or burnout. 90% of CISOs...

Three Cybersecurity Predictions That Will Define the CISO Agenda in 2026

As we head into 2026, cybersecurity leaders are facing a paradox. Organisations have never invested more in security tools, data and talent – yet many CISOs admit they have less confidence in their true risk posture than ever before.  The problem isn’t a lack of signals. It’s an excess of them.   Fragmented tools, disconnected data, accelerating AI adoption and rising board expectations have created an environment...

How to Build Secure Communications Beyond “End-to-End” Network Encryption

For governments and critical infrastructure operators, secure communications are essential to national governance, operational continuity, and crisis response. Secure communication is the process of safeguarding communication channels and taking full control over critical information. It involves methods and technologies to ensure that all data exchanged between two or more parties remains confidential, authentic,...

NIAP-Certified Security – A Foundation for Trusted Communications

In government and critical infrastructure, security is not an optional feature, it is the foundation of operational integrity. For organizations responsible for protecting sensitive data and ensuring mission continuity, trust in communication systems must be earned through independent, rigorous validation. Relying on unvetted software introduces unacceptable risks to national security and public safety. As a...

Streamlining Cyber Operations

Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing pressure to protect, adapt, and enable innovation. For many organisations, cyber operations are buckling under the weight of manual tasks, legacy tools, and cross-functional bottlenecks. The result is a reactive security posture that struggles to keep up with business demands. To address this, tech...

Containing the Inevitable: What Cyber Leaders Must Prepare for in 2026

As we head into 2026, I am thinking of a Japanese idiom, Koun Ryusui (行雲流水), to describe how enterprises should behave when facing a cyberattack. Koun Ryusui means “to drift like clouds and flow like water.” It reflects calm movement, adaptability, and resilience. For enterprises, this is an operating requirement. Cyber incidents are no longer isolated disruptions. They are recurring tests of how well an...

Continuous Compliance Isn’t An Option

Introduction For today’s Chief Information Security Officers (CISOs), compliance is no longer a once-a-year headache, it’s a continuous, evolving mandate. As threat landscapes shift and regulatory frameworks grow more complex, businesses are being called to do more than tick boxes at audit time. Instead, they must embrace a model of continuous compliance, an approach that provides ongoing assurance, improves...

Trust, Power, People: Hybrid AI’s 2026 Imperative 

Over the past year across Asia Pacific, conversations with customers, from fast-growing digital natives to highly regulated banks and healthcare providers, all have shared a common thread: AI has moved from experimentation to execution. The question is no longer “if” but “how” to scale responsibly, efficiently, and with clear business outcomes. As we look to 2026, the organisations that lead will be those that...

Can AI Ever Really Outpace AI-Powered Cyberattacks?

Introduction There's this question that keeps coming up in cybersecurity circles, and honestly, it feels a bit like asking whether we can outrun our own shadow. Can defensive AI actually stay ahead of AI-powered attacks? The short answer is probably not in any permanent way, but that doesn't mean we're doomed to lose this fight. The thing about AI in cybersecurity: it's fundamentally playing both offense and...

Putting Your Money Where Your Money Is

Introduction Fintech companies occupy a unique position at the intersection of finance and technology. They handle extremely sensitive customer information, personal identities, payment data, transaction histories, and therefore represent a high‑value target for cyber‑criminals. In the Asia‑Pacific region, nearly 80 percent of executives anticipate that financial crime risks, including AI‑driven attacks, will...

ISACA Sydney Conference 2025 – Event Recap

Overview Walking into the ISACA Sydney Chapter Conference as “the student voice”, I knew I was surrounded by some of the heaviest hitters in cyber, audit and technology leadership. My job for the day was simple but huge: ask the questions students and early-career professionals are scared to ask and bring those answers back to our community. By the end, one theme kept looping in my head: it’s not enough to just be...

Disruption Demands Coordination: Why Secure Communications Solutions are Key to Disrupting the Illegal Fentanyl Trade

Introduction The Government of Canada is taking concrete and bold action to strengthen border security and disrupt the illegal fentanyl trade. It has announced an investment of $1.3 billion to enhance operations. The funding will support hiring additional personnel and purchasing advanced technology and equipment. This includes state-of-the-art imaging systems, drones, and AI tools. The plan also involves creating...
No results found.
No results found.
No results found.
The ISO27001 Gold Standard

The ISO27001 Gold Standard

Introduction Building a strong information security posture is no longer optional. For tech executives tasked with ...
Streamlining Cyber Operations

Streamlining Cyber Operations

Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing ...
No results found.
No results found.

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

When Digital Names Collide, Business Risk Follows

In corporate networks, a “collision” is usually associated with infrastructure failure: two devices sharing the same IP address, traffic misdirected, and ultimately a communications breaking down. However, a quieter and potentially more damaging form of collision is becoming increasingly common inside organisations: identity collisions. Unlike their network equivalents, identity collisions do not announce...

In the Age of Microsegmentation Enforcement in Hours, Are You Still Shutting Down Operations?

I was researching cyberattacks, and a common theme popped out. “We had an unprecedented cyberattack… and we shut down our operations to protect stakeholder interests.” I know, breaches can be strenuous. The initial hours following a breach are often marked by chaos and urgency as crisis leaders call vendors, disconnect systems, analyze logs, and brief executives. The focus is on containing the damage. But over...

Encryption Isn’t Enough: The Hidden Threat of Messaging Metadata

Today’s Digital Landscape Metadata is one of the most overlooked security risks in modern digital communications. Adversaries no longer need to break into encrypted chats to understand your intent; all they need is your metadata. For government officials who deal with national security, foreign relations, or coordination of high-stakes operations such as international summits or VIP protection, these risks are a...

The ISO27001 Gold Standard

Introduction Building a strong information security posture is no longer optional. For tech executives tasked with protecting sensitive data, enabling growth, and maintaining stakeholder trust, ISO 27001 has emerged as the global gold standard. This internationally recognised framework for information security management not only helps prevent breaches but also serves as a competitive differentiator in the...
No results found.
No results found.
No results found.
It’s Time to Hack the Hackers

It’s Time to Hack the Hackers

Introduction Cybercrime in Australia is rising rapidly. From the major breachers that held headlines hostage for months, ...
No results found.
No results found.
No results found.
No results found.
The ISO27001 Gold Standard

The ISO27001 Gold Standard

Introduction Building a strong information security posture is no longer optional. For tech executives tasked with ...
No results found.
No results found.
No results found.