Geopolitics Is Now a Technology Risk

Geopolitics has become a direct and material technology risk, and it now firmly belongs on the CISO’s agenda. 🌐 Trade disputes, sanctions, cyber espionage, and digital sovereignty are reshaping where data lives, who can access it, and how resilient our platforms really are.
Our dependence on globally distributed supply chains and a small number of predominantly US-based ☁️ cloud providers has concentrated high‑value data and critical services in a few strategic locations. In a heightened geopolitical environment, cloud data centres are now strategic infrastructure, and disruptions—malicious or not—can quickly become systemic business events.
In this article, I explore why technology is uniquely exposed to geopolitical shocks and what CISOs and technology leaders should be doing now to factor geopolitics into cloud, availability, and resilience planning.
Cybersecurity Study Group: (ISC)² Certified in Cybersecurity (CC)
If you’re interested in the (ISC)² Certified in Cybersecurity (CC) certification, this is your chance to study with peers, ask questions, and learn from industry professionals.
We’re hiring: Senior Security Architect
We’re expanding our security team at AMP and hiring a Senior Security Architect to design and implement robust security architectures in a regulated financial environment.
You’ll lead security strategy, architect secure systems, collaborate with engineering teams, and ensure compliance while protecting customer data and operations.
You’ll be great for this role if you have:
🔹 Proven experience in security architecture and design
🔹 Deep knowledge of cloud security, identity management, and threat modelling
🔹 Background in financial services or regulated industries
🔹 Strong communication skills to influence stakeholders
Join us to shape secure financial services innovation and advance your cybersecurity career.
➡️ Apply now: Senior Security Architect
💡 You Can’t Secure What You Can’t See: The Case for SBOMs

Modern software is assembled from countless third‑party and open‑source components. And if you can’t see them, you can’t secure them. 🔎🔐
This article explains why SBOMs (Software Bills of Materials) are becoming essential for managing supply‑chain risk, strengthening incident response, and meeting rising security and compliance expectations.
If you want faster visibility, better control, and fewer surprises in your software stack, this one’s for you.
We’re hiring: Security Services Senior Specialist (AppSec)
We’re expanding our security team at AMP and hiring a Security Services Senior Specialist to lead application security, penetration testing, and vulnerability management.
You’ll own and uplift our AppSec framework, pen‑testing program, and vulnerability lifecycle, shaping engineering practices and protecting millions of customers.
You’ll be great for this role if you have:
🔹 Strong AppSec, pen testing, and vuln‑management experience
🔹 Confidence owning services and improving processes
🔹 Experience in regulated environments
🔹 Ability to turn technical risks into clear guidance
Join us to make a real impact on the future of financial services while growing your career.
➡️ Apply now: Security Service Senior Specialist
We’re hiring: 2x Enterprise Security Architects
We’re expanding our security leadership capability and are recruiting two Enterprise Security Architects to help shape and protect a complex, customer‑centric financial services environment.
If you’re passionate about designing security that enables the business, working at enterprise scale, and influencing outcomes across cloud, data, and core platforms, this could be a great next step.
➡️ Apply now: Entreprise Security Architect
💡Agentic AI's Identity Crisis

Agentic AI — autonomous 🤖 agents that can perceive, decide, and act — are entering business workflows fast. But as these non-human “digital workers” multiply, identity has become the hidden challenge.
Most enterprises haven’t extended authentication and access controls to these agents, creating ungoverned digital personas operating at machine speed: a serious security risk.
This article explores why identity is the new frontier of AI security, and how cybersecurity leaders can govern agentic AI safely through strong authentication, lifecycle management, and accountability.
Australian School Cyber Challenge 2026
🧑🎓 Thousands of students and schools will be shaping the future of Australia’s cybersecurity talent. ASCC 2026 brings together students from every state and territory, building a sense of competition, community, and pride.
Students step out of the classroom and onto a national stage where creativity, curiosity and critical thinking shine. Schools benefit from increased visibility, community engagement, and recognition for their support of future-ready education.
If your school wants to be part of something meaningful and future-focused, this is it.
At AMP, supporting programs that nurture innovation, education, and technology skills is something we deeply believe in, and the Cyber Challenge is a perfect example of that mission in action.
Looking forward to seeing the creativity, curiosity, and determination of all the participating students this year!
Find out more at https://cyberpathways.com.au/ascc/
Looking for a Cyber Engineering Specialist
If you're passionate about building secure systems that enable innovation, we’d love to hear from you.
Our Security, Risk & Compliance team is deeply embedded in the organisation - driving strategy, enabling transformation, and protecting what matters. We work with purpose, backed by strong leadership and a clear mandate.
We’re hiring a 🧑💻 Cyber Engineering Specialist to join us in Sydney.
➡️ Apply now: Cyber Engineering Specialist
Cyber Security Awareness Month 2025
The event was buzzing with energy: interactive challenges, live demos, and conversations that turned complex topics into practical, actionable insights. Read More…