menu close
  • Back

Cloud Security Architect - Canon Business Services ANZ

Anthony, affectionately known as Anto, hails from Perth, Western Australia. With over 15 years of IT experience, Anto has spent the last 5 years specialising in Microsoft cloud technologies. Currently, he serves as a Cloud Security Architect at Canon Business Services ANZ, where he leverages his expertise in Microsoft Intune and Defender XDR to enhance security and streamline operations.

Anto’s career journey began in Microsoft Cloud Managed Services helpdesk, progressing through various cloud infrastructure projects, and ultimately focusing on cloud security. He is a strong advocate of the “KISS” model – Keep It Simple Stupid – ensuring that solutions are secure and effective, while still being admin and user-friendly.

Outside of his professional life, Anto enjoys spending time with his family and tinkering with his Subaru. He is also a regular at the Perth-based Microsoft Security Meetup user group, where he shares his knowledge and insights with the community.



Given the constantly shifting threat landscape, Australian and New Zealand business leaders must now pay closer attention to how emerging technologies—and equally sophisticated criminals—are reshaping the security environment.

Chief Financial Officers (CFOs), Chief Information Security Officers (CISOs), and Chief Technology Officers (CTOs), in particular, face mounting pressure to safeguard not just their organisations’ data but their reputations and bottom lines. While it’s tempting to rely on established frameworks and legacy defences, today’s adversaries use increasingly advanced methods, including artificial intelligence (AI) and automation, to stay ahead.

This article explores the top five trends reshaping cyber threats, cybersecurity, and compliance, along with practical insights on how executives can respond.

1. AI-powered cyber threats

Artificial intelligence has become a powerful enabler—unfortunately, not just for legitimate businesses but also for cybercriminals. Attackers are using AI to automate mundane tasks like vulnerability discovery, spear-phishing, and evading traditional security measures. This development radically increases the scale and speed at which attacks can be launched, posing new complexities for organisations of all sizes.


Adaptive cyber threats

What sets artificial intelligence-driven attacks apart is their ability to adapt. Instead of following a single, predictable playbook, these threats evolve in real-time. Machine learning models can quickly identify weaknesses in network security and applications, pivoting instantly to exploit vulnerabilities. Traditional defences, which might rely on static rules or infrequent threat intelligence updates, can struggle to keep pace.


Personalisation

Artificial intelligence enables a high degree of personalisation in cyberattacks—particularly in phishing campaigns. Threat actors now use large language models to craft tailored emails that mimic internal communications with alarming accuracy. By analysing digital footprints—such as social media activity, public bios, and LinkedIn profiles—AI tools can extract contextual details about colleagues, reporting lines, job titles, and communication styles.

This level of insight allows attackers to produce messages that appear highly credible. An employee might receive an email that looks like it came from the CEO or CFO, complete with correct salutations, recent project references, and an authentic tone. With each layer of personalisation, the likelihood of a successful breach increases—especially when traditional filters fail to detect such well-crafted messages.

For cyber security leaders, it reinforces the need to train staff not just to spot poor grammar or odd requests, but to question even the most plausible emails that subtly pressure them into urgent action.

Automation

Finally, AI-driven automation means tasks that once required expert human intervention—like combing through large data sets to find exploitable weaknesses—are now executed in minutes.
top emerging cybersecurity trends

What you can do:

  • Automate your defences: Use AI-based cyber security tools to detect unusual network traffic or login behaviour in real-time.
  • Conduct regular phishing campaigns: Help your staff recognise AI-fuelled phishing attempts by running realistic, ongoing training.
  • Align budgets to threat levels: Factor in the rising costs of AI-driven attacks when planning security spend, ensuring you have funds for advanced defence solutions.

2. Zero Trust Architecture

As organisations adopt remote work, hybrid models, and Bring Your Own Device (BYOD) policies, the traditional network perimeter has become blurred. Zero Trust Architecture (ZTA) has emerged as a leading security model to address this challenge. In essence, ZTA assumes that no user or device—inside or outside the network—should be trusted by default.


Principle of least privilege

Zero Trust mandates that individuals and devices are granted only the minimum level of access required for their tasks. This principle is particularly relevant for managing teams with varying levels of financial systems and operational systems access. By strictly limiting privileges, ZTA minimises the damage a compromised account can inflict.


  • Minimise access: Users and devices should only have the minimum level of access necessary to perform their tasks.
  • Role-Based Access Control (RBAC): Implement RBAC to ensure access permissions are aligned with job roles and responsibilities.
  • Regular reviews: Continuously review and adjust access permissions to ensure they remain appropriate and secure.

Continuous verification

Unlike traditional approaches that verify users once at login, ZTA frequently re-authenticates identities and devices throughout a session. This continuous verification is crucial when employees might work from a home network one day and a public Wi-Fi network the next. Microsoft’s Zero Trust framework underscores the importance of assessing security posture in real-time to spot anomalies quickly.

  • Always verify: Every access request should be authenticated, authorized, and encrypted before granting access.
  • Real-time monitoring: Implement continuous monitoring and logging to detect anomalies and potential security threats.
  • Adaptive policies: Use adaptive policies that adjust based on real-time risk assessments and telemetry data.

Assume breach

Zero Trust further emphasises the idea of assuming a breach has already occurred. In practice, this means constant vigilance: systems monitor behaviours and context, and any suspicious activity triggers alarms or restricts access. When malicious actors do gain a foothold, continuous monitoring severely limits their ability to move laterally and access critical or sensitive data.

  • Prepare for breach: Operate under the assumption that data breaches will happen, and plan accordingly.
  • Segmentation: Use network segmentation to limit the impact of a breach.
  • Incident response: Develop and regularly update incident response plans to quickly address and mitigate breaches.

For organisations embracing hybrid work or BYOD policies, Zero Trust is less a trend and more a necessary evolution. “Leadership recognises that a single compromised device—an unprotected laptop, for instance—can jeopardise sensitive financial and operational data,” says Anthony Porter, Cloud Security Architect at Canon Business Services ANZ. “ZTA counteracts these security risks by adopting a ‘trust no one, verify everything’ stance.”


What you can do:

  • Set up MFA for all user accounts to add an extra layer of security.
  • Schedule periodic reviews of user access permissions to ensure they align with current roles.
  • Use network monitoring tools to continuously observe traffic and detect anomalies.
  • Regularly review and update security policies to address new threats and vulnerabilities.
  • Deploy endpoint security software to protect devices from malware and other threats.

Get in touch

Talk to us today to optimise your operations.

Contact Us

3. Regulatory compliance and governance

Australia and New Zealand’s regulatory landscape continues to evolve in response to new cyber security threats and escalating concerns around data privacy. Not only must organisations protect themselves against potential fines and legal ramifications, they also risk severe reputational damage if found to be non-compliant.


Data privacy laws

In Australia, the Privacy Act 1988 requires organisations to handle personal or sensitive information responsibly. Across the Tasman, the New Zealand Privacy Act 2020 has introduced modernised guidelines that demand transparency and accountability in how personal data is processed and stored. Both laws stipulate how data should be collected, used, and disclosed, with hefty penalties for breaches.


Cyber security frameworks

Beyond data privacy statutes, frameworks like the Australian Cyber Security Centre (ACSC) Essential Eight guide organisations on key cyber security controls. These controls range from application whitelisting to patch management and backup strategies. Government agencies and large enterprises increasingly reference the Essential Eight, indicating a broader emphasis on baseline cyber hygiene.


Reporting requirements

Under Australia’s Notifiable Data Breaches scheme, organisations must report serious data breaches to the Office of the Australian Information Commissioner (OAIC). New Zealand’s Privacy Act has similar disclosure obligations. Timely reporting helps authorities track and address large-scale breaches and ensures public awareness. Non-compliance poses both legal and reputational risks that can overshadow short-term costs associated with implementing proper security.

Organisations can stay ahead of shifting regulatory requirements by paying close attention to governance, risk, and compliance (GRC) strategies. Many are turning to consulting services—like CBS’ Security GRC Consulting—to navigate these rules without sacrificing operational efficiency.

What you can do:

  • Schedule regular audits: Assess your systems and processes against local legal requirements (Privacy Act, Essential Eight) at least annually.
  • Create a breach response plan: Define clear roles, responsibilities, and timelines for reporting and managing incidents.
  • Monitor legislative updates: Keep abreast of changes in Australian and New Zealand privacy and cyber security laws to maintain compliance.

4. Data security with generative AI use

Generative AI, from complex text generation to image creation, is reshaping how content is produced. While this technology can speed up many business processes, it also presents unique security concerns. The very systems that generate valuable data can also create new unexpected security risks to your organisation.


Unstructured data protection

Generative AI often handles unstructured data—text, images, videos, or even audio. This increases the complexity of data security because many existing tools are designed primarily for structured datasets like spreadsheets or databases. The risk is that sensitive information may be embedded in artificial intelligence-generated content, making it harder to monitor and protect.


Risk of PII leak

As generative AI systems rely on training data, there’s a real possibility of inadvertently exposing personally identifiable information (PII). If sensitive customer or employee data is entered into an unregulated AI model—especially one without appropriate access controls—that data could surface in future outputs, or worse, be exploited by threat actors.

For CFOs, such a breach carries significant financial and legal liability. CTOs face the technical challenge of integrating AI securely across systems. And for CISOs, this highlights the growing need to enforce clear governance over AI usage—establishing policies, vetting tools, and applying controls to ensure data privacy obligations are met at every stage of AI implementation.

In short, AI-driven innovation must be balanced with rigorous oversight to ensure sensitive data remains protected by design.

AI model security

Securing the AI model itself is another concern. Hackers could tamper with a model’s parameters to produce misleading or damaging outputs, effectively ‘poisoning’ the system. This risk underscores the importance of integrity checks, access controls, and robust monitoring.

top emerging cybersecurity trends 2

Ethical considerations

Beyond security, generative AI also raises ethical questions. Deepfake technology, for example, can produce highly convincing, fraudulent audio and video content. Unethical or poorly vetted AI deployments could breach regulations and erode consumer trust.

To mitigate these cyber risks, organisations should align with established ethical frameworks such as Microsoft’s AI Principles, which emphasise:

  • Fairness – ensuring AI systems do not perpetuate bias or inequality.
  • Reliability and safety – guaranteeing consistent, dependable outcomes under a variety of conditions.
  • Privacy and security – protecting sensitive data and preventing misuse.
  • Inclusiveness – designing AI tools that are accessible and equitable.
  • Transparency – making AI decisions understandable and explainable.
  • Accountability – establishing clear oversight and governance mechanisms.

For many executives, the question is no longer whether to adopt AI, but how to integrate it responsibly—balancing innovation with ethical foresight.


What you can do:

  • Conduct an AI risk assessment: Identify where and how you use AI across your organisation—then create guidelines for responsible use.
  • Implement data classification: Use automated tools to scan and enforce security measures on sensitive information before it’s fed into AI models.
  • Secure the model environment: Restrict access to AI development systems and apply real-time monitoring to prevent unauthorised modifications.
  • Enforce employee awareness training: Educate on Gen AI use, best practices, and data security concerns. Develop awareness to keep everyone informed and up-to-date on guidelines and ethics.

5. Cyber security talent shortage

The final trend impacting cyber security is not a purely technological one: a growing talent shortage. The demand for cyber security professionals far exceeds the supply in Australia and globally. This deficiency directly translates into higher salaries, increased competition for top talent, and a heavier reliance on third-party providers.


Skills gap

According to the (ISC)² Cybersecurity Workforce Study 2024, the global cyber security workforce needs to grow by an estimated 4.8 million professionals to effectively defend organisations. This shortage is particularly critical in specialised areas like threat intelligence and incident response, leaving companies without the expertise to tackle advanced threats.


Training and development

Organisations are increasingly focusing on upskilling. With targeted training and certification programs, they can build a cyber security bench in-house. This approach benefits employers and employees: it addresses pressing security needs while boosting retention and job satisfaction.


Retention strategies

High turnover in cyber security roles remains a challenge. Cyber security specialists are regularly headhunted with offers of better pay or more attractive projects. Retention strategies—ranging from flexible work arrangements to clear career progression pathways—help companies hold on to critical talent. For small to medium enterprises and large corporations alike, third-party services such as a 24/7 Security Operations Centre (SOC) can plug immediate gaps while internal teams focus on strategic initiatives.


What you can do:

  • Offer fast-track certifications: Partner with training providers to equip staff with specialised skills quickly. Incentivise upskilling within your organisation to align with business needs.
  • Enhance retention: Implement career pathways, mentorship programs, and flexible work options that appeal to skilled cyber security professionals.
  • Outsource for immediate coverage: If you’re short on expertise, consider partnering with a 24/7 SOC to fill critical gaps while gradually building in-house talent.

Building a secure, compliant future

Organisations across Australia and New Zealand are wrestling with an increasingly complex cyber terrain. AI-powered threats, the adoption of zero-trust frameworks, evolving compliance mandates, the intricacies of generative AI, and a persistent talent shortage underscore the need for a coordinated, forward-thinking strategy.


“Relying on legacy systems or incremental updates isn’t enough,” explains Anthony.. “Instead, organisations should invest in adaptive, real-time defences, robust GRC frameworks, and skilled cyber security personnel.”


It’s equally vital to question where data is stored, how it’s being used, and by whom. While these measures require time and resources, the return on investment—safeguarding both shareholder value and stakeholder trust—can’t be overstated.

Canon Business Services ANZ helps enterprises navigate these security challenges holistically, offering advisory, managed services, and cutting-edge solutions that align with regulatory requirements and business goals. By integrating people, processes, and technology, we help organisations future-proof their cyber defences.

If you’re ready to take the next step in securing your digital landscape, consider Canon Business Services ANZ as your partner in proactive cyber security and compliance.

Frequently asked questions

Why is business process mapping considered a vital component of digital transformation initiatives within organisations?

Business process mapping is vital in digital transformation because it forms the foundation for effective business process modeling and business process management. It offers a structured way to map business processes, aiding in the identification of inefficiencies and bottlenecks. This, in turn, facilitates the implementation of automation and optimisation strategies, making it an integral part of any business process management initiative.

What are the key benefits of implementing business process mapping during a digital transformation journey?

Implementing business process mapping brings numerous benefits to organisations during digital transformation. It allows for a clear visualisation of business processes, making it easier to identify areas for improvement and optimisation. By creating business process maps, companies can streamline their operations, reduce inefficiencies, and achieve continuous improvement. Moreover, it provides a basis for automation and ensures that complex processes are better managed.

Can you explain the relationship between business process mapping and improving operational efficiency in the context of digital transformation?

Business process mapping plays a crucial role in enhancing operational efficiency during digital transformation. It allows organisations to create a process map that visualises the current process, helping identify bottlenecks and areas where improvements can be made. This visual representation, often in the form of process charts, aids in streamlining operations and ensuring that business process management efforts align with the organisation's digital goals.

How does business process mapping support organisations in identifying areas for automation and optimisation in the digital age?

In the digital age, business process mapping helps organisations identify areas ripe for automation and optimisation. By visually representing business processes, organisations can pinpoint tasks and steps that can be streamlined or automated, leading to increased efficiency and reduced manual effort. This is particularly valuable for complex processes, as a well-documented business process model can guide the transformation process effectively.

Similar Articles

VIEW ALL

APRA CPS 230 & the future of IT compliance

Ensure IT compliance with APRA CPS 230. Learn how AI and automation help enterprises build resilience in a changing regulatory landscape.

What is Security Automation?

Learn how automated security transforms cybersecurity, making it simpler and more efficient. Protect your business data with CBS New Zealand’s expert insights now!

What are the benefits of penetration testing?

Gain confidence in your digital security with the benefits of penetration testing. Enhance cybersecurity, identify vulnerabilities, and fortify your defences with CBS New Zealand's expert insights now!

Cybersecurity Threat Detection: Proactive strategies

Stay ahead in cybersecurity with our 2024 guide on threat detection. Learn advanced technologies & response plans to protect your business against threats with CBS New Zealand.

Cybersecurity risk assessment

Learn how to protect your business with a detailed cybersecurity risk assessment. Start now to identify threats and secure your digital assets!

Digital transformation in different industries

Discover how digital transformation is driving innovation across industries like healthcare, finance, and retail in New Zealand. Learn more.

Essential 8 maturity levels

Learn about Essential 8 Maturity Levels to protect your business from cyber threats. Discover strategies to enhance security for New Zealand organisations. Start improving today!

How do you prevent phishing attacks?

Prevent phishing attacks with MFA, anti-phishing tools, and employee training to safeguard sensitive information and stay secure with Cannon Business Services New Zealand!

Ultimate guide to internal penetration testing

This Internal Penetration Testing guide covers techniques, analysis, and best practices for identifying vulnerabilities & strengthening your cyber defense in New Zealand.

RMM Meaning and its significance in IT management

Evolving technology, key benefits, and its impact on efficiency and security. protect your business data with CBS New Zealand’s expert insights now!

The role of AI in cyber security

Discover how AI enhances cybersecurity with faster threat detection and automated, real-time protection with Canon Business Services New Zealand.

The Threat Intelligence Lifecycle explained

Discover how to navigate the Threat Intelligence Lifecycle in 2024. Our guide covers phases, analysis, and best practices for cybersecurity decision-making in New Zealand.