Kylie Watson, Head of Cyber Security at DXC Technology, shares how her Defence background shapes her cyber leadership and why prioritisation and smarter vendor outreach are critical for security leaders.
Years in the Australian Army taught Kylie how to operate under pressure, navigate complex infrastructure, and lead teams in challenging environments.
In this interview with ADAPT’s Head of Programs & Value Engagement Byron Connolly, she explains how those experiences shaped her leadership style and approach to securing enterprises across Australia, New Zealand, ASEAN, Japan, India, the Middle East and Africa.
Her Defence work in infrastructure, networks, and operating under threat translated unexpectedly well to cyber security.
“I really liked being on that side of the fence; I actually understood it and got across it.” she says of her first IT project at the Department of Defence.
Over the past decade, she has held senior transformation, analytics, cyber and cloud roles at SAP, Deloitte, IBM and PwC before joining DXC in 2024.
Prioritising protections
Kylie emphasises that organisations need to determine where cyber rigour will have the greatest impact.
She cites the recent credential stuffing attack on superannuation providers as a case where multi-factor authentication could have been implemented, but acknowledges that no CISO can secure every asset to the highest standard.
She notes that, in practice, some lower-profile or legacy systems still require protection, and that defences often target the wrong threat.
In some cases, organisations have prepared for attacks from nation state actors, only to be compromised instead by social engineering from competitors.
Vendors missing the mark
ADAPT’s recent survey of 118 CISOs found only 15% considered vendor outreach useful.
Kylie shares that view.
“I hate it, I absolutely hate it,” she says, adding that she receives around five pitches a day and ignores most to focus on her role.
She encourages vendors to build credibility through structured programs and local networking, citing a government-funded cyber hub that connected eight small suppliers with 100 CISOs in one event.
“Find the more formal programs, don’t keep doing the individual outreach. Go get your marketing right.”
Read our full interview breakdown for more insights into her approach to threat prioritisation, legacy security challenges, and vendor engagement.