No results found.
No results found.
No results found.

Podcasts

Episode 362 Deep Dive: César Cernuda | Trust, Trade & the New Data Diplomacy
byKBI.Media

In this episode, we sit down with César Cernuda, President at NetApp, as he explores the growing significance of data and the evolving role of trust, governance, and transparency in managing this strategic asset. César discusses how organizations and nations must build intelligent data infrastructures to enable AI and navigate complex regulatory landscapes, emphasizing the importance of cybersecurity, interoperability, and modernizing data lakes. We also examine the balance between protection and openness, the resurgence of sovereign cloud requirements, and the pressure for leaders to cultivate a data-first mindset to stay competitive.

César Cernuda has led NetApp’s integrated go-to-market organization since July 2020, delivering on the company’s promise to meet customers wherever they are on their digital-transformation journeys by providing the superior products, specialist skills, and services they need to architect, build, and manage their data fabrics.

César joined NetApp following a long career at Microsoft, where he served as President of Microsoft Asia Pacific, President of Microsoft Latin America, and Global Corporate Vice President of the brand. Having walked in the shoes of NetApp’s enterprise customers, he brings a customer-centric perspective to all he does as president. César serves as the non-executive director and Chairman of the ESG committee at Gestamp, an international organization dedicated to the automotive industry; as an advisory board member of Georgetown University’s McDonough School of Business; and as an international advisory board member of IESE Business School – University of Navarra.

 

 

No results found.
Taming the Gallop On Rising Cybersecurity Risk

Taming the Gallop On Rising Cybersecurity Risk

Introduction As the Lunar New Year ushers in a new cycle of The Horse, we can look to the traits of the traditional Chinese zodiac, which provide an admirable framework for cybersecurity objectives. Horses are commonly known for unbridled speed, agility, and making forward strides. These aren't just symbolic of cyber resilience: they are the new requirements for digital survival. With AI and automation in play the digital world is moving at a gallop. Attacks are no longer slow, manual, or opportunistic. They are continuous, adaptive, and ...
No results found.

Business News ↓

World Cloud Security Day

The Rise of Stealth Impact Attacks In the past year, cyberattacks have been increasingly focused on “stealth impact”, quietly degrading performance, inflating cloud and AI costs, and eroding revenue over time. This includes tactics such as mass creation of fake accounts, bot-driven abuse of transactions, and the exploitation of AI chatbots to exhaust costly tokens. At the same time, illegal data scraping is on the...

The Hidden Risk Inside Australia’s Expanding IT Inventory

Introduction Australian organisations' technological maturity has grown exponentially in recent years. Hybrid work is the standard, cloud adoption is accelerating, and new innovations keep emerging to provide a productivity and competitive edge. What were once foreign concepts now underpin every business' workflow, communication, and customer interaction.  Yet as the number of technologies and platforms balloons in...

Australia’s AI Shift from Capability to Control 

Introduction Conversations with CIOs across Australian industries tell a consistent story. AI has decisively moved beyond pilots and proofs of concept. The question is no longer whether AI works, but whether it delivers measurable returns while operating within clear boundaries of trust, governance, and accountability. As Australian enterprises look ahead, success will depend on treating AI not as a technology...

Resilience at Scale: How Modern Organisations Stay Fast Without Increasing Risk

Introduction Australian organisations are not taking resilience seriously enough. According to BDO’s Tectonic States report, only 62 per cent of Australian business leaders ranked resilience as their top organisational priority, this is compared to 78 per cent of leaders in other countries, including the UK and Spain. This signals an opportunity for Australian organisations to build resilience, starting with...

Taming the Gallop On Rising Cybersecurity Risk

Introduction As the Lunar New Year ushers in a new cycle of The Horse, we can look to the traits of the traditional Chinese zodiac, which provide an admirable framework for cybersecurity objectives. Horses are commonly known for unbridled speed, agility, and making forward strides. These aren't just symbolic of cyber resilience: they are the new requirements for digital survival. With AI and automation in play the...

Communication As Infrastructure – Why Dialogue Is A Business Advantage

In the Asia, Pacific and Japan (APJ) region, one of the biggest challenges for businesses isn’t technology, it’s communication. The region spans more than 23 major languages, multiple dialects and profoundly different business cultures. Translating messages correctly matters, but real success comes from designing systems that can listen, respond and adapt at scale. The Australian market offers a clear example of...

From 398 to 200 Days: Understanding the TLS Certificate Lifespan Reduction

Digital trust is entering a new phase, and on March 15, 2026, a policy change will take effect that reshapes how organisations approach security. In 2025, the CA/Browser Forum, a consortium of browser vendors and certificate authorities, approved revisions to public TLS standards, introducing a phased reduction in certificate lifespans to better address modern threats. After extensive industry-wide debate, the...

Eliminating the Technical Debt Caused by AI-Assisted Software Development

If recent industry forecasts are correct, 2026 will be the year of artificial intelligence (AI)-driven technical debt. According to research company Forrester[1], the tech debt for 75% of organisations will increase to a moderate or high level during this year, due to the rapid expansion of AI usage across a range of areas including software development. Indeed, the software development community is experiencing a...

Navigating AI with Cyber-Resilient Storage: Use Cases Lead, Infrastructure Enables

I’ve recently discussed the evolving landscape of intelligent data infrastructure on platforms like Techstrong TV. In these conversations, a recurring theme emerges: major trends like cloud and AI are reshaping enterprises, but their adoption is propelled primarily by compelling use cases. Infrastructure may not take center stage, but it’s the essential enabler that makes those use cases viable, efficient, and...

Security Metrics That Matter

Introduction Organisations must move beyond reactive security postures and embrace data-driven decision-making as the sophistication and prevalence of threat actors continues to increase. For start-ups, especially those scaling rapidly or navigating compliance requirements, understanding and tracking the right cybersecurity metrics is crucial. Security metrics provide clarity: they help prioritise risks, optimise...

Rethinking Cyber Resilience in the Age of AI

AI has fundamentally changed how we think about both innovation and risk. It’s driving new breakthroughs in medicine, design, and productivity, but it’s also giving attackers a sharper edge. Ransomware isn’t just about encrypting data anymore. It’s about double extortion, data theft, and the erosion of trust that organizations depend on to operate. As threat actors become more adaptive and use AI for more...

Cisco’s Bid to Anchor the Agentic Enterprise

The Shift to Agentic Enterprise AI Artificial Intelligence (AI) now alters the commercial world with a speed that feels less evolutionary and more tectonic. Infrastructure strains, security models stretch, collaboration tools morph. In that context, Cisco has positioned itself not merely as a participant, but as a structural layer in what it sees as the next phase of enterprise computing. During a recent company...

Future-Proofing Your Data Infrastructure with Post-Quantum Cryptography

The arrival of quantum computing isn’t a question of if—but when. And when it does arrive at scale, it will break the very encryption systems that protect the digital backbone of modern business. From banking records and intellectual property to classified communications, data that’s secure today could be exposed tomorrow. That’s why forward-thinking organizations are already investing in post-quantum...

Rising Cybersecurity Vulnerabilities In Increasingly Interconnected IT/OT Environments

From Outage to Infiltration: Cybersecurity Risk and the Evolving Threat to Electrical Infrastructure As electrical infrastructure modernizes, its vulnerabilities evolve in parallel. From substation automation to AI-powered grid management, today’s systems have developed from the isolated hardware of the past to converged digital ecosystems with data pathways, network connections, and embedded intelligence. Every...

Cyber Dashboards are Making Boards Feel Safer…and That’s the Real Risk

Introduction Boards today have never seen more cyber risk data. Dashboards glow with heat maps, scores, alerts and reassuring trend lines. Cyber is now a standing agenda item, backed by metrics designed to prove the organisation is in control. And yet, beneath this apparent clarity sits an uncomfortable truth. Many boards are less safe precisely because they believe they can see everything. This is not a failure of...

KnowBe4 Experts Calls for ‘Digital Mindfulness’ and Skepticism as AI Dominates Safer Internet Day 2026

As the world prepares for Safer Internet Day on 10 February 2026, KnowBe4 is encouraging individuals of all ages to adopt a mindset of ‘digital mindfulness’ to stay safe online. This year’s theme, ‘Smart tech, safe choices – Exploring the safe and responsible use of AI’, highlights the urgent need for a new set of digital skills in the world of AI. With Artificial Intelligence (AI) now a permanent fixture in the...
No results found.
No results found.
No results found.
Security Metrics That Matter

Security Metrics That Matter

Introduction Organisations must move beyond reactive security postures and embrace data-driven decision-making as the ...
The ISO27001 Gold Standard

The ISO27001 Gold Standard

Introduction Building a strong information security posture is no longer optional. For tech executives tasked with ...
Streamlining Cyber Operations

Streamlining Cyber Operations

Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing ...
No results found.
No results found.

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

We Need to Rethink What Airport Security Means In Australia

Introduction In Australia, the intensity of our airport and aviation security is strangely famous worldwide. It even has its own reality television show; Border Security – Australia’s Front Line. The scene is always similar: drug sniffing dogs, x-ray machines and baggage searches used to investigate the latest security threat. But there is an underlying threat to airport security that doesn’t ever make it onto the...

World Cloud Security Day

The Rise of Stealth Impact Attacks In the past year, cyberattacks have been increasingly focused on “stealth impact”, quietly degrading performance, inflating cloud and AI costs, and eroding revenue over time. This includes tactics such as mass creation of fake accounts, bot-driven abuse of transactions, and the exploitation of AI chatbots to exhaust costly tokens. At the same time, illegal data scraping is on the...

The Hidden Risk Inside Australia’s Expanding IT Inventory

Introduction Australian organisations' technological maturity has grown exponentially in recent years. Hybrid work is the standard, cloud adoption is accelerating, and new innovations keep emerging to provide a productivity and competitive edge. What were once foreign concepts now underpin every business' workflow, communication, and customer interaction.  Yet as the number of technologies and platforms balloons in...

Australia’s AI Shift from Capability to Control 

Introduction Conversations with CIOs across Australian industries tell a consistent story. AI has decisively moved beyond pilots and proofs of concept. The question is no longer whether AI works, but whether it delivers measurable returns while operating within clear boundaries of trust, governance, and accountability. As Australian enterprises look ahead, success will depend on treating AI not as a technology...
No results found.
World Cloud Security Day

World Cloud Security Day

This World Cloud Security Day, the message is clear for Australian organisations: security and resilience must be embedded ...
No results found.
No results found.
World Cloud Security Day

World Cloud Security Day

This World Cloud Security Day, the message is clear for Australian organisations: security and resilience must be embedded ...
No results found.
World Cloud Security Day

World Cloud Security Day

This World Cloud Security Day, the message is clear for Australian organisations: security and resilience must be embedded ...
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.