No results found.
No results found.
No results found.

Podcasts

Episode 358 Deep Dive: Lisa Black | How Leaders Survive Major System Failures
byKBI.Media

In this episode, we sit down with Lisa Black, Director of Public Sector at Aeon Nexus Corporation, as she shares her perspectives on crisis leadership and organizational resilience when critical systems fail. Lisa draws from her extensive background leading government operations to highlight how real risk in a crisis is often less about technology and more about maintaining trust, clear communication, and effective decision-making under pressure.

We explore the pitfalls of traditional and predictable crisis training, the importance of cross-training team members, and the value of embedding continuous improvement and consequence-based learning into daily operations. Lisa also discusses the crucial role of cadence in incident communications, the need to manage rumor mills and public scrutiny, consequences of over-reliance on technology, and why true collaboration between public and private sectors is essential to strengthen defenses against modern threats.

Lisa Black is the Director of Public Sector at Aeon Nexus Corporation where she consults with government clients who are committed to enhancing justice through modernizing technology. Utilizing Aeon’s legal case management solution to deliver a single, secure, centralized, cloud-based system to public sector entities Lisa and her company work with public safety agencies, the offices of District Attorneys, Public Defenders, mediators and courts throughout the US.

With over two decades of government experience, Lisa previously served as the Chief Deputy County Executive in Suffolk County, NY. There she managed the daily operations of a local government that served 1.5 million residents with a $4 Billion budget and a workforce of approximately 12,000 staff. Lisa has also held leadership roles with two NY State Senate Majority Leaders, two New York City Mayors and a NY Governor serving as Senior Advisor at the NYS Division of Homeland Security and Emergency Services.

Lisa’s advantage in serving in both republican and democratic governments has been instrumental in her ability to communicate across the aisle where she has been involved in crisis and emergency management for over half of her career. Formerly trained in emergency management and operational decision-making during crisis, Lisa has also earned certificates in Government Leadership and Cybersecurity Policy and Technology from the JFK School of Government at Harvard University Executive Education Program. Importantly, her skills and training helped her lead the Unified Command Incident Response to a 2022 countywide ransomware attack including incident identification, containment, eradication and operational recovery.

She has spoken publicly about the experience at conferences and forums across the US including those with the NY State Association of Counties (NYSAC), the US Secret Service Cyber Fraud Task Force, NY State Local Government Information Technology Directors Association (NYSLGITDA), the National Federation of Municipal Analysts (NFMA), the International Association of Emergency Manager’s (IAEM) Region II Inaugural Conference, the National Association of Counties (NACo) Chief Information Officer Forum, the FBI & Fordham Law School’s International Cyber Security Summit and the 2020Partners Counterterrorism, Counter-Narcotics & Cyber Security Miami Conference.

No results found.
The Guardians that Safeguard our Critical Infrastructure

The Guardians that Safeguard our Critical Infrastructure

Introduction Every day, critical industry sectors like healthcare, government and utilities services rely on digital systems that are mission-critical but vulnerable to cyber threats. Yet, the professionals safeguarding these systems often go unrecognised. Imagine a hospital's life-support systems faltering during critical surgery, a school building’s security lockdown failing during an active threat drill or a state government's emergency response network collapsing during a natural disaster. These scenarios are daily hypotheticals faced by the ...
No results found.

Business News ↓

Eliminating the Technical Debt Caused by AI-Assisted Software Development

If recent industry forecasts are correct, 2026 will be the year of artificial intelligence (AI)-driven technical debt. According to research company Forrester[1], the tech debt for 75% of organisations will increase to a moderate or high level during this year, due to the rapid expansion of AI usage across a range of areas including software development. Indeed, the software development community is experiencing a...

Navigating AI with Cyber-Resilient Storage: Use Cases Lead, Infrastructure Enables

I’ve recently discussed the evolving landscape of intelligent data infrastructure on platforms like Techstrong TV. In these conversations, a recurring theme emerges: major trends like cloud and AI are reshaping enterprises, but their adoption is propelled primarily by compelling use cases. Infrastructure may not take center stage, but it’s the essential enabler that makes those use cases viable, efficient, and...

Security Metrics That Matter

Introduction Organisations must move beyond reactive security postures and embrace data-driven decision-making as the sophistication and prevalence of threat actors continues to increase. For start-ups, especially those scaling rapidly or navigating compliance requirements, understanding and tracking the right cybersecurity metrics is crucial. Security metrics provide clarity: they help prioritise risks, optimise...

Rethinking Cyber Resilience in the Age of AI

AI has fundamentally changed how we think about both innovation and risk. It’s driving new breakthroughs in medicine, design, and productivity, but it’s also giving attackers a sharper edge. Ransomware isn’t just about encrypting data anymore. It’s about double extortion, data theft, and the erosion of trust that organizations depend on to operate. As threat actors become more adaptive and use AI for more...

Cisco’s Bid to Anchor the Agentic Enterprise

The Shift to Agentic Enterprise AI Artificial Intelligence (AI) now alters the commercial world with a speed that feels less evolutionary and more tectonic. Infrastructure strains, security models stretch, collaboration tools morph. In that context, Cisco has positioned itself not merely as a participant, but as a structural layer in what it sees as the next phase of enterprise computing. During a recent company...

Future-Proofing Your Data Infrastructure with Post-Quantum Cryptography

The arrival of quantum computing isn’t a question of if—but when. And when it does arrive at scale, it will break the very encryption systems that protect the digital backbone of modern business. From banking records and intellectual property to classified communications, data that’s secure today could be exposed tomorrow. That’s why forward-thinking organizations are already investing in post-quantum...

Rising Cybersecurity Vulnerabilities In Increasingly Interconnected IT/OT Environments

From Outage to Infiltration: Cybersecurity Risk and the Evolving Threat to Electrical Infrastructure As electrical infrastructure modernizes, its vulnerabilities evolve in parallel. From substation automation to AI-powered grid management, today’s systems have developed from the isolated hardware of the past to converged digital ecosystems with data pathways, network connections, and embedded intelligence. Every...

Cyber Dashboards are Making Boards Feel Safer…and That’s the Real Risk

Introduction Boards today have never seen more cyber risk data. Dashboards glow with heat maps, scores, alerts and reassuring trend lines. Cyber is now a standing agenda item, backed by metrics designed to prove the organisation is in control. And yet, beneath this apparent clarity sits an uncomfortable truth. Many boards are less safe precisely because they believe they can see everything. This is not a failure of...

KnowBe4 Experts Calls for ‘Digital Mindfulness’ and Skepticism as AI Dominates Safer Internet Day 2026

As the world prepares for Safer Internet Day on 10 February 2026, KnowBe4 is encouraging individuals of all ages to adopt a mindset of ‘digital mindfulness’ to stay safe online. This year’s theme, ‘Smart tech, safe choices – Exploring the safe and responsible use of AI’, highlights the urgent need for a new set of digital skills in the world of AI. With Artificial Intelligence (AI) now a permanent fixture in the...

Safer Internet Day 2026

Introduction On Safer Internet Day, it’s worth recognising a simple reality: AI is reshaping the Internet in two directions at once. The same tools accelerating productivity and innovation are also industrialising cybercrime, making attacks faster to launch, cheaper to run, and harder to spot. We’ve seen the impact in Australia. In 2024–25, the Australian Signals Directorate’s Australian Cyber Security Centre...

Data Resilience in a Post-Quantum World

Introduction As cyberthreats grow more sophisticated and the quantum era draws closer, resilience is no longer just a best practice—it’s a business imperative. Many organizations have focused on breach prevention. Forward-looking enterprises are shifting to a resilience-first model. This model prioritizes continuity, recovery, and adaptability in the face of emerging risks. Why Resilience Is the New Gold Standard...

Securing the New Gaming Frontier: Data Infrastructure at Play

Introduction The gaming industry is in the midst of an extraordinary transformation. Immersive digital worlds, AI-driven gameplay, and massive global online communities are reshaping how we play, connect, and innovate. But as this digital ecosystem grows, so does the complexity of managing it safely and effectively. This frontier, rich with opportunity, also brings evolving challenges for studios that must secure...

Deepfake Diplomacy – AI Impersonation’s Attack on Sovereign Security

The rise of AI-powered impersonation—ranging from synthetic voice deepfakes to algorithmically generated messages—poses a critical threat to government, defense, and national infrastructure. A recent incident involving an AI-generated impersonation of a U.S. Secretary of State underscores the urgency of this threat. State-sponsored actors are increasingly exploiting consumer-grade messaging apps including Signal to...

Building Resilience Through AI-Driven Security

The pace and complexity of adversarial attacks is rapidly evolving. According to the 2024 Cybersecurity Visibility Study conducted by NetApp and Futurum Group, more than half (54%) of enterprises have experienced a cyberattack in the past 12-18 months. Even more troubling, one in five of these organizations were unable to recover their data. The situation underscores an urgent need for businesses to reimagine their...

The Transformative Role of AI in Cybersecurity

2025 marks a pivotal moment in the integration of artificial intelligence (AI) and cybersecurity. Rapid advancements in AI are not only redefining industries; they are reshaping the cybersecurity landscape in profound ways. Through this evolution, I have noted three primary trends emerging that demand immediate attention from organizations: The amplification of security threats powered by AI, A renewed focus on...

When Digital Names Collide, Business Risk Follows

In corporate networks, a “collision” is usually associated with infrastructure failure: two devices sharing the same IP address, traffic misdirected, and ultimately a communications breaking down. However, a quieter and potentially more damaging form of collision is becoming increasingly common inside organisations: identity collisions. Unlike their network equivalents, identity collisions do not announce...
No results found.
No results found.
No results found.
Security Metrics That Matter

Security Metrics That Matter

Introduction Organisations must move beyond reactive security postures and embrace data-driven decision-making as the ...
The ISO27001 Gold Standard

The ISO27001 Gold Standard

Introduction Building a strong information security posture is no longer optional. For tech executives tasked with ...
Streamlining Cyber Operations

Streamlining Cyber Operations

Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing ...
No results found.
No results found.

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

How ‘Verified Trust’ Is Redefining Digital Authentication in the Age of AI

As artificial intelligence transforms digital commerce and the workplace, it is also dismantling the foundations of online trust. In an environment where deepfakes can mimic executives, synthetic identities can pass background checks, and AI-powered phishing campaigns can scale globally in minutes, traditional authentication methods are struggling to keep pace. The stakes are high. As digital experiences become...

What Einstein would say about AI

In this article Owen Lamont from Acadian Asset Management  revisits Einstein’s Depression-era warning about “technological unemployment” and argues that the real economic threat may not be AI itself, but the narrative that AI will replace us all. Einstein's Layoffs A spectre is haunting the economy – the spectre of mass layoffs due to AI. One manifestation is the recent announcement by Block that it was embracing a...

The AI Edge in Edge Security

The digital footprint of Australian organisations is no longer confined to enterprise boundaries: public cloud adoption has risen steadily over the past few years; more than 80 percent of enterprises follow a hybrid work model; and the multi-access edge computing market is projected to grow from about US$ 100 million in 2024 to more than US$ 5 billion by 2033. With the attack surface expanding beyond the enterprise...

AI Versus AI: Why The Next Cyber Security Battle Will Be Fought By Machines

Introduction Artificial intelligence has evolved from being a technical novelty into a powerful business tool with remarkable speed. Companies are embedding generative AI into customer service, software development, and finance operations to unlock efficiency gains and accelerate innovation. However, as adoption deepens, cyber security leaders are confronting a new reality: AI is not just enhancing productivity but...
Inside the DIY Scam Economy

Inside the DIY Scam Economy

Introduction The headquarters of the scam economy have always been elusive, shifting between countries, towns and cities ...
No results found.
The AI Edge in Edge Security

The AI Edge in Edge Security

As Australian organisations expand into hybrid cloud and edge environments, their attack surface is rapidly growing beyond ...
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
The AI Edge in Edge Security

The AI Edge in Edge Security

As Australian organisations expand into hybrid cloud and edge environments, their attack surface is rapidly growing beyond ...
No results found.
No results found.
No results found.