No results found.
No results found.
No results found.

Podcasts

From 2020Partners 2025 – KB On The Go | Neha Idnani, James Tennant, and Simon Hodgkinson (Part 1)
byKBI.Media

The 2020 Partners Dialogue sits at the edge of possibility, where security meets technological ambition. In this special bonus episode, KB explores how nations can move beyond simply consuming innovation to actively co-creating strategic dominance. Anchored by AUKUS and empowered by cross-sector collaboration, this conversation features insights from industry leaders Neha Idnani (Regional Vice President – APAC, Eutelsat OneWeb), James Tennant (Partner – Head of JAPAC, BOKA Capital), and Simon Hodgkinson (Strategic Advisor at Semperis).

Neha delves into the significance of operating one of only two global LEO satellite constellations, emphasizing how satellite networks power resilient connectivity, complement terrestrial infrastructure, and enable sovereign national capabilities amid rising geopolitical tensions. James offers a global investment perspective, highlighting how Australia and other key regions are rapidly adapting to strategic defense imperatives, the challenge of nurturing deep-tech startups, and the necessity of scaling defense technology within complex regulatory frameworks. Simon rounds out the discussion with expert insights on cybersecurity, examining the impact of economic uncertainty, increased insider risk during major corporate events and layoffs, and the criticality of robust cyber operations—even as organizations strive to balance resource constraints and work-life demands.

Neha Idnani, Regional Vice President – APAC, Eutelsat OneWeb

Neha Idnani is an accomplished leader in the Technology, Media, and Telecom (TMT) sector, currently serving as the Regional Vice President for APAC at Eutelsat OneWeb. With over 18 years of experience across the telecom, space, and infrastructure industries, she leads the Asia Pacific and ANZ business for Eutelsat Group, the world’s first multi-orbit satellite connectivity provider. Prior to her current role, she spent over a decade with Bharti Enterprises and Bharti Airtel, notably serving as Vice President and Chief of Staff to the Chairman’s Office. In that capacity, she managed multi-billion dollar fundraising transactions and drove significant global expansion initiatives.

Beyond her corporate leadership, Neha is deeply involved in industry governance and the arts. She serves as a Board Director for OneWeb Communications India, is a Founding Member of the Indian Space Association (ISpA), and acts as a Board Trustee for Improbable, a UK-based non-profit. Academically, she holds an MBA from NMIMS, Mumbai, and a Bachelor’s in Commerce (Honours) from Shri Ram College of Commerce (SRCC), Delhi University. Throughout her career, she has remained a passionate advocate for driving the future of global connectivity through innovation and strategic collaboration.

James Tennant, Partner – Head of JAPAC, BOKA Capital

James Tennant is a Fellow with ASPI’s Cyber, Technology and Security Program and a Partner at BOKA Capital, a leading AUKUS Investment House in London, Sydney and New York.

His key role at BOKA is complemented by his service as an Officer in the Australian Army, where he specialises in Capability Development. He is also a Senior Partner at Gilmour Space Technologies, an Australian-based rocket company innovating in the field of low-cost small satellite launch vehicles.

James is a seasoned investor and corporate leader with deep interests and investments in diverse fields such as Quantum, Artificial Intelligence, Space, CyberSec, Machine Learning, Internet of Things, Drones, Enterprise Infrastructure, and Autonomous Vehicles. His professional journey, spanning across different continents and industries, uniquely positions him at the intersection of finance, defence, and technology including artificial intelligence.

James holds a Bachelor of Commerce degree with a specialisation in International Business from the University of Sydney, is a Graduate of Applied Finance at Macquarie University, and holds management courses in Private Equity and Venture Capital from Harvard Business School. He has also completed the Company Directors Course at the Australian Institute of Company Directors.

Simon Hodgkinson, Strategic Advisor, Semperis

Simon is an experienced technology leader who has worked in the software sector, financial services, energy sector and has worked in a financial services startup company.

Simon is currently a Strategic Advisor at cybersecurity firm Semperis, and prior to this, he spent 18 years working for BP in a variety of global roles, the last being CISO. Simon transformed BP’s cyber security with a strategy of embedding security to simplify and accelerate adoption. Simon advised the BP board and has shared his expertise on numerous technology and diversity forums.

Prior to the CISO role, Simon was the VP of Infrastructure and Integration Services where he initiated the programme to move BP to the cloud, significantly improving time to market and user experience. Simon was accountable for a complex technology infrastructure in 80 countries, supporting 75,000 users across 600 offices and included critical national infrastructure.

Simon has led globally diverse teams in excess of 500, an annual budget in excess of $0.5bn and has negotiated and managed significant outsourced contracts. His brand is building highly inclusive, capable and successful technical teams, leading with empathy and performance edge.

No results found.
Five Telecom Habits Of Smart Small Businesses

Five Telecom Habits Of Smart Small Businesses

Introduction Small businesses often grow quickly, but if their telecommunications setup doesn’t support this growth, productivity and service can suffer. With a few strategic habits, SMEs can avoid tech growing pains. Here are the top telecom habits that the savviest Australian small businesses adopt early on. Consolidate Where It Makes Sense It’s easy for businesses to end up with multiple vendors for phone, mobile, internet and IT services. While price-shopping can yield short-term savings, managing too many bills and support lines is ...
No results found.

Business News ↓

NIAP-Certified Security – A Foundation for Trusted Communications

In government and critical infrastructure, security is not an optional feature, it is the foundation of operational integrity. For organizations responsible for protecting sensitive data and ensuring mission continuity, trust in communication systems must be earned through independent, rigorous validation. Relying on unvetted software introduces unacceptable risks to national security and public safety. As a...

Streamlining Cyber Operations

Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing pressure to protect, adapt, and enable innovation. For many organisations, cyber operations are buckling under the weight of manual tasks, legacy tools, and cross-functional bottlenecks. The result is a reactive security posture that struggles to keep up with business demands. To address this, tech...

Containing the Inevitable: What Cyber Leaders Must Prepare for in 2026

As we head into 2026, I am thinking of a Japanese idiom, Koun Ryusui (行雲流水), to describe how enterprises should behave when facing a cyberattack. Koun Ryusui means “to drift like clouds and flow like water.” It reflects calm movement, adaptability, and resilience. For enterprises, this is an operating requirement. Cyber incidents are no longer isolated disruptions. They are recurring tests of how well an...

Continuous Compliance Isn’t An Option

Introduction For today’s Chief Information Security Officers (CISOs), compliance is no longer a once-a-year headache, it’s a continuous, evolving mandate. As threat landscapes shift and regulatory frameworks grow more complex, businesses are being called to do more than tick boxes at audit time. Instead, they must embrace a model of continuous compliance, an approach that provides ongoing assurance, improves...

Trust, Power, People: Hybrid AI’s 2026 Imperative 

Over the past year across Asia Pacific, conversations with customers, from fast-growing digital natives to highly regulated banks and healthcare providers, all have shared a common thread: AI has moved from experimentation to execution. The question is no longer “if” but “how” to scale responsibly, efficiently, and with clear business outcomes. As we look to 2026, the organisations that lead will be those that...

Can AI Ever Really Outpace AI-Powered Cyberattacks?

Introduction There's this question that keeps coming up in cybersecurity circles, and honestly, it feels a bit like asking whether we can outrun our own shadow. Can defensive AI actually stay ahead of AI-powered attacks? The short answer is probably not in any permanent way, but that doesn't mean we're doomed to lose this fight. The thing about AI in cybersecurity: it's fundamentally playing both offense and...

Putting Your Money Where Your Money Is

Introduction Fintech companies occupy a unique position at the intersection of finance and technology. They handle extremely sensitive customer information, personal identities, payment data, transaction histories, and therefore represent a high‑value target for cyber‑criminals. In the Asia‑Pacific region, nearly 80 percent of executives anticipate that financial crime risks, including AI‑driven attacks, will...

ISACA Sydney Conference 2025 – Event Recap

Overview Walking into the ISACA Sydney Chapter Conference as “the student voice”, I knew I was surrounded by some of the heaviest hitters in cyber, audit and technology leadership. My job for the day was simple but huge: ask the questions students and early-career professionals are scared to ask and bring those answers back to our community. By the end, one theme kept looping in my head: it’s not enough to just be...

Disruption Demands Coordination: Why Secure Communications Solutions are Key to Disrupting the Illegal Fentanyl Trade

Introduction The Government of Canada is taking concrete and bold action to strengthen border security and disrupt the illegal fentanyl trade. It has announced an investment of $1.3 billion to enhance operations. The funding will support hiring additional personnel and purchasing advanced technology and equipment. This includes state-of-the-art imaging systems, drones, and AI tools. The plan also involves creating...

Shifting the Burden of ID Crime from Victims to Institutions

Introduction Australia’s growing epidemic of identity crime has exposed a critical flaw in the nation’s cyber security response: the victims of data breaches are too often left to clean up the mess alone. As cyberattacks rise and personal information circulates through criminal networks, calls are mounting for a co-ordinated, government-led framework to replace today’s fragmented, victim-driven recovery model. At...

Avoiding Security Operation Chokepoints

Introduction Security operations often become inadvertent chokepoints. When every vendor relationship triggers an extensive security review, and teams rely on spreadsheets and email chains to gather responses, progress grinds to a halt. For resource‑constrained organisations, particularly in the fintech, SaaS and technology spaces, these bottlenecks can delay product launches, strain customer relationships and...

2026 Predictions: The Year Identity Becomes the Ultimate Control Point for an Autonomous World

Introduction The collision between technological acceleration and human adaptability will define the cybersecurity landscape in 2026. Identity and trust will sit at the centre of this struggle — as the proliferation of machine and AI identities exposes the fragility of traditional controls and the limits of human oversight.  As organisations race to deploy autonomous agents and machine-led systems to drive...

Why 9 In 10 IT Teams Overestimate Their Operational Resilience

Introduction How confident are you that your operations are resilient enough to tackle today’s challenges while preparing for tomorrow’s? If your answer is ‘very confident’, you’re not alone. According to SolarWinds' 2025 IT Trends Report, over 90% of IT professionals believe their organisations are resilient in the face of today’s demands. Of those, 38% say their resilience is ‘very strong’, while 55% describe it...

Cybersecurity in Manufacturing: Why It’s More Important Now Than Ever

Manufacturing has always depended on stable operations. That used to mean keeping machines running, maintaining quality, and hitting delivery schedules. Today it also means defending the environment from attacks that can shut down production, corrupt data, or compromise customer trust. Plants are now connected in ways they weren’t ten years ago, and that connection has created real exposure. The stakes are higher...

AI to Supercharge Cyber Threats Across Australia

AI is fundamentally changing the economics of cyberattacks in Australia. Adversaries are no longer scaling through the workforce, but rather through automation. Leaders can’t rely on human-paced defences in a machine-paced threat environment.  Here are the top security trends to watch out for in 2026 and beyond: Compressed Attack Timelines Due to Autonomous AI In 2026, the rapid acceleration of autonomous AI-driven...

‘Tis the Season to Stay Secure: Safeguarding Your Business this Festive Period

This holiday shopping season can make or break many Australian businesses. While consumers are shopping for bargains, attackers are searching for vulnerabilities.  The surge in shopping traffic during Black Friday, Cyber Monday and Christmas sales provides cybercriminals with the perfect cover to launch scams and fraud campaigns, exploiting the rise in digital transactions to hide malicious activity.  The Perfect...
No results found.
No results found.
No results found.
Streamlining Cyber Operations

Streamlining Cyber Operations

Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing ...
No results found.
No results found.

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

NIAP-Certified Security – A Foundation for Trusted Communications

In government and critical infrastructure, security is not an optional feature, it is the foundation of operational integrity. For organizations responsible for protecting sensitive data and ensuring mission continuity, trust in communication systems must be earned through independent, rigorous validation. Relying on unvetted software introduces unacceptable risks to national security and public safety. As a...

Streamlining Cyber Operations

Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing pressure to protect, adapt, and enable innovation. For many organisations, cyber operations are buckling under the weight of manual tasks, legacy tools, and cross-functional bottlenecks. The result is a reactive security posture that struggles to keep up with business demands. To address this, tech...

Containing the Inevitable: What Cyber Leaders Must Prepare for in 2026

As we head into 2026, I am thinking of a Japanese idiom, Koun Ryusui (行雲流水), to describe how enterprises should behave when facing a cyberattack. Koun Ryusui means “to drift like clouds and flow like water.” It reflects calm movement, adaptability, and resilience. For enterprises, this is an operating requirement. Cyber incidents are no longer isolated disruptions. They are recurring tests of how well an...

Trust, Power, People: Hybrid AI’s 2026 Imperative 

Over the past year across Asia Pacific, conversations with customers, from fast-growing digital natives to highly regulated banks and healthcare providers, all have shared a common thread: AI has moved from experimentation to execution. The question is no longer “if” but “how” to scale responsibly, efficiently, and with clear business outcomes. As we look to 2026, the organisations that lead will be those that...
No results found.
No results found.
No results found.
It’s Time to Hack the Hackers

It’s Time to Hack the Hackers

Introduction Cybercrime in Australia is rising rapidly. From the major breachers that held headlines hostage for months, ...
No results found.
No results found.
No results found.
No results found.
Streamlining Cyber Operations

Streamlining Cyber Operations

Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing ...
No results found.
No results found.
No results found.