Promote Your Company       |     Contact

Independent Cyber News.

Podcasts

Episode 298 Deep Dive: Grant Bourzikas | Future-proofing Security
byKBI.Media

In this episode, we sit down with Grant Bourzikas, Chief Security Officer from Cloudflare, as he shares what lessons he learned from 2024. Grant emphasizes the industry’s need to move beyond outdated technology to enhance security postures and reduce complexities. He discusses the impact of artificial intelligence on security, the challenges of leveraging AI, and the necessity for organizations to embrace it strategically. Furthermore, Grant highlights the importance of modernizing security infrastructures, simplifying environments, and the critical need to cultivate new talent in the field to tackle the evolving landscape.

Grant Bourzikas joined Cloudflare as the Chief Security Officer in 2023, where he is a driving force in helping the company achieve its mission to build a better Internet. As a critical component within Cloudflare’s ecosystem, Grant’s primary role is to protect the company from sophisticated adversaries to stay ahead in today’s cybersecurity landscape. He oversees Cloudflare’s threat intelligence services, which successfully mitigate 170+ billion attacks daily, in addition to acting as “Customer Zero” to help foster innovation across all Cloudflare products and services.

Grant is a seven-time CSO with over 20 years experience leading global security programs that span the private sector, having worked at a Fortune 500 critical infrastructure company, an online trading organization and within the gaming space. Most notably, Grant spent several years in the financial services industry at both HSBC and Silicon Valley Bank. Grant holds a Master’s in Data Science and Artificial Intelligence from Southern Methodist University, and a Bachelor of Science in Accounting from the University of Missouri in St. Louis. He is a CPA (Certified Public Accountant) and CISSP (Certified Information Systems Security Professional).

Business News ↓

Exploiting Medical Devices: Attack Vectors, Cyber Threats, and Advanced Defense Mechanisms

Imagine a scenario where a ransomware attack cripples a hospital’s ventilators, infusion pumps are manipulated to deliver incorrect dosages, or a CT scanner is hijacked to serve as a launchpad for a larger network breach. These are not hypothetical situations; they are real threats that healthcare organizations face today. As medical devices become increasingly interconnected, they also become prime targets for...

Bret Arsenault – CVP, Global Chief Security Advisor at Microsoft

Watch The Interview  Biography Bret Arsenault is Microsoft's Chief Cybersecurity Advisor, responsible for advancing critical security initiatives and escalating impact across the entire Microsoft ecosystem: company, partners, customers, government agencies, and important communities. As Chief Information Security Officer for 14 years, Bret was responsible for enterprise-wide digital security and resiliency. Bret...

Benjamin Lamont & Helen Schneider – Australian Federal Police

Watch The Interview Biography Benjamin (Ben) Lamont is the Manager of Technology Strategy and Data for the Australian Federal Police. He is responsible for developing the AFP Technology Strategy and associated roadmaps to address capability gaps and opportunities. Ben also oversees the development and deployment of the AFP’s information management, data science, and analytics platforms. His role includes delivering...

How to Outsmart Ransomware and Build Resilience Within Your Organisation

Ransomware is growing more dangerous every day. Strains like LockBit 3.0 are leading the attack, while other groups like Clop, BlackCat/ALPHV, and Royal are constantly changing their strategies to catch businesses off guard. These ransomware groups have evolved their tactics, shifting from single to double and even triple extortion models. For example, LockBit 3.0 uses a triple extortion strategy, demanding a...

The Strategic Transformation of IT: From Cost Center to Business Catalyst

The perception of IT has undergone a remarkable transformation in recent years. What was once viewed primarily as a cost centre has transformed into a pivotal force driving business innovation and market leadership. This shift hasn’t just been about changing mindsets—it's about tangible results. Research shows that digital leaders deliver average annual total shareholder returns of 8.1% vs. 4.9% for laggards,...

Mick Dunne – Chief Cybersecurity Advisor at Microsoft

Watch The Interview  Biography Mick Dunne is the Chief Cybersecurity Advisor at Microsoft where he is focused on ensuring alignment between Microsoft and their customers on cybersecurity challenges, product roadmaps and long-term security needs. Mick and his team bring deep industry experience as former CISOs and CTOs to enable them to work with customers with empathy and understanding of the challenges security...

Leigh Williams – CIO, Brisbane Catholic Education

Watch The Interview  Biography Leigh is currently the Chief Information Officer for Brisbane Catholic Education, overseeing all digital, information and IT infrastructure for hundreds of locations and over 13,000 staff. As a passionate, published researcher and advocator in digital innovation and education, Leigh has led keynotes and workshops around the world on digital transformation. Leigh has experience in...

Command Central: Holistic Control Room Design for Today’s Critical Infrastructure

If you’ve been leading critical infrastructure for a while, you’re no stranger to control rooms. You’ve seen your fair share—some meticulously designed for efficiency, others falling short of expectations. You know the ones: cramped spaces with lighting that’s either too harsh or too dim, screens that clash with the ambience, desks haphazardly arranged, a corner reluctantly repurposed as a managers office, and, of...

Akamai Unveils Defenders’ Guide 2025 to Better Equip APJ Cybersecurity Teams Against Evolving Threats

Akamai Technologies (NASDAQ: AKAM), the cybersecurity and cloud computing company that powers and protects business online, today announced the release of the Defenders’ Guide 2025: Fortify the Future of Your Defense. This first-of-its-kind State of the Internet (SOTI) report delivers practical research around risk management to identify, assess, and mitigate threats; how to reinforce network architecture to create...

Chris Lloyd-Jones – Head of Platforms and Incubation, Office of the CTO at Avanade

Watch The Interview  Biography As a technology leader in Platforms & Incubation, Chris is focused on driving strategic growth, delivering impact at scale, and fostering innovation across the Microsoft ecosystem, from GitHub to ISVs. He is passionate about harnessing the power of Open Source, demonstrated through his leadership roles at OpenUK and the Green Software Foundation. With a unique blend of legal and...

Why Is Energy Monitoring Technology So Important For Achieving Sustainability Goals?

You can’t manage what you don’t measure. So measure we must. This year we see the continued roll out of the Australian Sustainability Reporting Standards (ASRS) and edge even closer to Australia’s 2030 commitment to Net Zero Emissions. It all points to a need for authentic, precision sustainability. And while many organisations are setting ambitious goals (planning for decarbonisation, cleaner electrification or...

Janice Le – GM, Microsoft Security, Compliance, Identity & Privacy

Watch The Interview  Biography Janice is GM, Microsoft Security Compliance, Identity & Privacy at Microsoft where she oversees strategy, operations, and portfolio marketing for Microsoft Security. She has served the tech industry in Silicon Valley over the last 20+ years at enterprises and startups in product, marketing, and GM roles for B2B tech companies with depth in networking and cybersecurity. Prior to...

The End of Pentest Reporting Chaos: OWASP Standardises the Industry

Background Penetration test reports are one of the most critical security deliverables for organisations, yet the way they are produced and handled has barely changed in decades. Security teams still receive findings in inconsistent, manually formatted reports, often requiring labour-intensive work to extract meaningful insights. The OWASP Penetration Test Reporting Standard (OPTRS) has been created to address this...

2024 Lessons Shaping 2025 Cybersecurity Trends

Introduction Ransomware attacks have continued to progress throughout this year. Groups such as AlphV, LockBit, Hive, and BlackCat are employing advanced tactics to infiltrate systems and conduct lateral movements within networks. The RansomHub attack on Halliburton, in which the company likely incurred losses of approximately $35 million against its billions in earnings, underscores the notion that employee...

Navigating And Combatting Scams In Banking

Australia’s banking sector is dedicated to protecting its customers from sophisticated criminal networks through the Scam-Safe Accord—a globally leading initiative designed to disrupt, detect, and respond to scam activity. This industry-wide commitment unites community-owned banks, building societies, credit unions, and commercial banks under a comprehensive framework of anti-scam measures to strengthen financial...

The Two Forces Reshaping Our Cyber Defences For The Better

Introduction It’s very hard to catch a ball in flight without being able to make real-time calculations based on a continuous and uninterrupted stream of information from your eyes to your brain. The same can be said for cyber security. It’s tough to catch threats in play without truly real-time data. The need for real-time data and data processing is becoming particularly prominent as generative artificial...

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

The Role of Secure Information Architecture in Transforming Modern Workspaces

Best practice information architecture is essential for business leaders and IT decision-makers to secure data, streamline operations, and empower teams to work efficiently. According to the 2024 Konica Minolta Australian IT Trends: Driving Digital Transformation Report, nearly one-third of organisations are dissatisfied with their IT infrastructure.1 Most C-suite executives prioritise operational efficiency and...

Exploiting Medical Devices: Attack Vectors, Cyber Threats, and Advanced Defense Mechanisms

Imagine a scenario where a ransomware attack cripples a hospital’s ventilators, infusion pumps are manipulated to deliver incorrect dosages, or a CT scanner is hijacked to serve as a launchpad for a larger network breach. These are not hypothetical situations; they are real threats that healthcare organizations face today. As medical devices become increasingly interconnected, they also become prime targets for...

What’s New in Microsegmentation in 2025

What’s changed about microsegmentation in 2025? Why does it feel like there’s suddenly a renewed spotlight on this approach? Short answer: because the stakes are higher than ever. It’s no longer just a “nice-to-have” method of tightening your network boundaries. For many organizations, it’s become an operational necessity. Let’s talk about why. Why the “Zero Trust” Playbook Is Everywhere Microsegmentation = Zero...

Bret Arsenault – CVP, Global Chief Security Advisor at Microsoft

Watch The Interview  Biography Bret Arsenault is Microsoft's Chief Cybersecurity Advisor, responsible for advancing critical security initiatives and escalating impact across the entire Microsoft ecosystem: company, partners, customers, government agencies, and important communities. As Chief Information Security Officer for 14 years, Bret was responsible for enterprise-wide digital security and resiliency. Bret...