<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/secured/" rel="self" type="application/rss+xml"/><title><![CDATA[Secured by Galah Cyber with Cole Cornford]]></title><podcast:guid>72e3b1c5-9e3e-531b-93ea-0c036146dabf</podcast:guid><lastBuildDate>Wed, 01 Apr 2026 19:00:06 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[Copyright 2026 Galah Cyber]]></copyright><managingEditor>Galah Cyber</managingEditor><itunes:summary><![CDATA[Secured is the podcast for software security enthusiasts. Host Cole Cornford sits down with Australia's top software security experts to uncover their unconventional career paths and the challenges they faced along the way. 

Listen in as they share their insights on the diverse approaches to AppSec, company by company, and how each organisation's security needs are distinct and require personalised solutions. 

Gain insider access to the masterminds behind some of Australia's most successful Software security teams on Secured by Galah Cyber.<br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></itunes:summary><image><url>https://artwork.captivate.fm/02dc7bd9-4680-4c09-a4bf-a14fe576108f/LOGO-Secured-by-Galah-Cyber-01.jpg</url><title>Secured by Galah Cyber with Cole Cornford</title><link><![CDATA[https://galahcyber.com.au/podcasts]]></link></image><itunes:image href="https://artwork.captivate.fm/02dc7bd9-4680-4c09-a4bf-a14fe576108f/LOGO-Secured-by-Galah-Cyber-01.jpg"/><itunes:owner><itunes:name>Galah Cyber</itunes:name></itunes:owner><itunes:author>Galah Cyber</itunes:author><description>Secured is the podcast for software security enthusiasts. Host Cole Cornford sits down with Australia&apos;s top software security experts to uncover their unconventional career paths and the challenges they faced along the way. 

Listen in as they share their insights on the diverse approaches to AppSec, company by company, and how each organisation&apos;s security needs are distinct and require personalised solutions. 

Gain insider access to the masterminds behind some of Australia&apos;s most successful Software security teams on Secured by Galah Cyber.

This podcast uses the following third-party services for analysis: 

Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp
Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/</description><link>https://galahcyber.com.au/podcasts</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:subtitle><![CDATA[Top conversations with Australia's leading software security operators]]></itunes:subtitle><itunes:explicit>false</itunes:explicit><itunes:type>episodic</itunes:type><itunes:category text="Technology"></itunes:category><itunes:category text="Business"><itunes:category text="Careers"/></itunes:category><itunes:category text="News"><itunes:category text="Tech News"/></itunes:category><podcast:locked>no</podcast:locked><podcast:medium>podcast</podcast:medium><item><title>What the ISM AI Update Actually Means for Cyber Teams</title><itunes:title>What the ISM AI Update Actually Means for Cyber Teams</itunes:title><description><![CDATA[<h2>Episode Summary</h2><p>The ISM has been updated again, and this time AI is front and centre. In this episode of Secured, Cole Cornford is joined by returning guest Toby Amodio, Practice Lead at Fujitsu Cybersecurity Services, for another instalment of Policy Wonks and Gronks, cutting through the vendor noise to talk about what the March 2026 update actually means in practice.</p><p>They explore where AI is genuinely delivering value for cyber professionals, from automating compliance mapping and vendor assessments to streamlining pen test reporting and SOC triage. But they are equally candid about the risks: the erosion of foundational skills as junior roles get outsourced to AI, the creeping fatigue of reviewing outputs at scale, and the danger of skipping straight to full automation without the expertise to validate what the machine is doing.</p><p>The conversation also tackles bigger picture concerns unique to Australia, sovereign AI capability, the risk of a brain drain to the US, and whether a small country can afford to decentralise its AI infrastructure. Toby closes with a sharp reminder for government CISOs: AI is just another system, and how people use it matters far more than the certifications attached to it.</p><h2>Timestamps</h2><p>00:00 Episode Trailer</p><p>01:01 Chainguard ad</p><p>01:28 Intro and the March 2026 ISM update</p><p>03:00 AI hype vs real world utility</p><p>05:00 Governance and compliance use cases</p><p>08:00 Vendor assessments and knowledge base automation</p><p>11:00 Skill erosion and the junior roles question</p><p>14:00 AI in pen testing: reporting, scoping and customer experience</p><p>17:30 The maturity model for AI adoption</p><p>21:00 Vibe coding, slop assurance and fatigue at scale</p><p>25:00 Agents watching agents and the bot vs bot future</p><p>28:30 Australian AI sovereignty and the brain drain risk</p><p>32:00 Top tip for government CISOs on AI risk</p><p>35:00 Shadow AI and DNS log visibility</p><p>37:00 Closing remarks</p><p>🐙 Secured is grateful to be sponsored and supported by Chainguard.</p><p>Chainguard is the trusted source for open source. Get hardened, secure, production-ready builds so your team can ship faster, stay compliant, and reduce risk. Download your free CVE Reduction Assessment at https://dayone.fm/chainguard</p><p><h1>Secured is part of Day One.</h1><h2>Day One helps founders and startup operators make better business decisions more often. </h2><p>To learn more, join our <a href="https://dayonefm.beehiiv.com/" rel="noopener noreferrer" target="_blank">newsletter </a>to be notified of new First Cheque episodes and upcoming shows.</p></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<h2>Episode Summary</h2><p>The ISM has been updated again, and this time AI is front and centre. In this episode of Secured, Cole Cornford is joined by returning guest Toby Amodio, Practice Lead at Fujitsu Cybersecurity Services, for another instalment of Policy Wonks and Gronks, cutting through the vendor noise to talk about what the March 2026 update actually means in practice.</p><p>They explore where AI is genuinely delivering value for cyber professionals, from automating compliance mapping and vendor assessments to streamlining pen test reporting and SOC triage. But they are equally candid about the risks: the erosion of foundational skills as junior roles get outsourced to AI, the creeping fatigue of reviewing outputs at scale, and the danger of skipping straight to full automation without the expertise to validate what the machine is doing.</p><p>The conversation also tackles bigger picture concerns unique to Australia, sovereign AI capability, the risk of a brain drain to the US, and whether a small country can afford to decentralise its AI infrastructure. Toby closes with a sharp reminder for government CISOs: AI is just another system, and how people use it matters far more than the certifications attached to it.</p><h2>Timestamps</h2><p>00:00 Episode Trailer</p><p>01:01 Chainguard ad</p><p>01:28 Intro and the March 2026 ISM update</p><p>03:00 AI hype vs real world utility</p><p>05:00 Governance and compliance use cases</p><p>08:00 Vendor assessments and knowledge base automation</p><p>11:00 Skill erosion and the junior roles question</p><p>14:00 AI in pen testing: reporting, scoping and customer experience</p><p>17:30 The maturity model for AI adoption</p><p>21:00 Vibe coding, slop assurance and fatigue at scale</p><p>25:00 Agents watching agents and the bot vs bot future</p><p>28:30 Australian AI sovereignty and the brain drain risk</p><p>32:00 Top tip for government CISOs on AI risk</p><p>35:00 Shadow AI and DNS log visibility</p><p>37:00 Closing remarks</p><p>🐙 Secured is grateful to be sponsored and supported by Chainguard.</p><p>Chainguard is the trusted source for open source. Get hardened, secure, production-ready builds so your team can ship faster, stay compliant, and reduce risk. Download your free CVE Reduction Assessment at https://dayone.fm/chainguard</p><p><h1>Secured is part of Day One.</h1><h2>Day One helps founders and startup operators make better business decisions more often. </h2><p>To learn more, join our <a href="https://dayonefm.beehiiv.com/" rel="noopener noreferrer" target="_blank">newsletter </a>to be notified of new First Cheque episodes and upcoming shows.</p></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts]]></link><guid isPermaLink="false">33145aae-96a3-4a8c-aff8-6c1502180f75</guid><itunes:image href="https://artwork.captivate.fm/766eae66-fc36-4ed9-8c47-63ebbc356779/Toby-Amodio-Episode-Artwork.jpeg"/><pubDate>Thu, 02 Apr 2026 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/episodes.captivate.fm/episode/33145aae-96a3-4a8c-aff8-6c1502180f75.mp3" length="49074963" type="audio/mpeg"/><itunes:duration>33:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>62</itunes:episode><podcast:episode>62</podcast:episode><podcast:season>1</podcast:season></item><item><title>(Replay Ep) Leading Change in Cybersecurity: Tara Whitehead’s Approach to Security Engagement</title><itunes:title>(Replay Ep) Leading Change in Cybersecurity: Tara Whitehead’s Approach to Security Engagement</itunes:title><description><![CDATA[<h2>Episode Summary</h2><p>Tara Whitehead is Security Engagement Manager at MYOB. Prior to becoming a cybersecurity specialist, Tara had an eclectic career, including working in advertising and international relations. In this episode Tara chats with Cole about how her non-technical background has in many ways been an asset working in security, leading change management in large enterprises, the importance of great communication skills, and plenty more.</p><h2>Timestamps</h2><p>7:15 - Tara's first days in AppSec</p><p>10:00 - How to influence people</p><p>12:30 - Why we should dial back on the doomsday conversation</p><p>14:10 - Find your change champions</p><p>21:30 - Is a non-technical background help or hindrance?</p><p>23:30 - Communication and influencing key skills</p><p>26:00 - Communicating with execs</p><p>28:20 - Rapid fire questions</p><p>🐙 Secured is grateful to be sponsored and supported by Chainguard.</p><p>Chainguard is the trusted source for open source. Get hardened, secure, production-ready builds so your team can ship faster, stay compliant, and reduce risk. Download your free CVE Reduction Assessment at https://dayone.fm/chainguard</p><p><h1>Secured is part of Day One.</h1><h2>Day One helps founders and startup operators make better business decisions more often. </h2><p>To learn more, join our <a href="https://dayonefm.beehiiv.com/" rel="noopener noreferrer" target="_blank">newsletter </a>to be notified of new First Cheque episodes and upcoming shows.</p></p><p>Mentioned in this episode:</p><p><strong>Download your free CVE Reduction Assessment</strong></p><p>Chainguard is the trusted source for open source. Get hardened, secure, production-ready builds so your team can ship faster, stay compliant, and reduce risk.</p><p><a href="https://secured.captivate.fm/chainguard">December 2025 - Chainguard</a></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<h2>Episode Summary</h2><p>Tara Whitehead is Security Engagement Manager at MYOB. Prior to becoming a cybersecurity specialist, Tara had an eclectic career, including working in advertising and international relations. In this episode Tara chats with Cole about how her non-technical background has in many ways been an asset working in security, leading change management in large enterprises, the importance of great communication skills, and plenty more.</p><h2>Timestamps</h2><p>7:15 - Tara's first days in AppSec</p><p>10:00 - How to influence people</p><p>12:30 - Why we should dial back on the doomsday conversation</p><p>14:10 - Find your change champions</p><p>21:30 - Is a non-technical background help or hindrance?</p><p>23:30 - Communication and influencing key skills</p><p>26:00 - Communicating with execs</p><p>28:20 - Rapid fire questions</p><p>🐙 Secured is grateful to be sponsored and supported by Chainguard.</p><p>Chainguard is the trusted source for open source. Get hardened, secure, production-ready builds so your team can ship faster, stay compliant, and reduce risk. Download your free CVE Reduction Assessment at https://dayone.fm/chainguard</p><p><h1>Secured is part of Day One.</h1><h2>Day One helps founders and startup operators make better business decisions more often. </h2><p>To learn more, join our <a href="https://dayonefm.beehiiv.com/" rel="noopener noreferrer" target="_blank">newsletter </a>to be notified of new First Cheque episodes and upcoming shows.</p></p><p>Mentioned in this episode:</p><p><strong>Download your free CVE Reduction Assessment</strong></p><p>Chainguard is the trusted source for open source. Get hardened, secure, production-ready builds so your team can ship faster, stay compliant, and reduce risk.</p><p><a href="https://secured.captivate.fm/chainguard">December 2025 - Chainguard</a></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts]]></link><guid isPermaLink="false">702d97ac-bae4-4a3b-b35f-6d545e7769bc</guid><itunes:image href="https://artwork.captivate.fm/7a7f9b17-0459-492e-9867-325a72a8d65f/Tara-Whitehead-Secured-Episode-Artwork-01.jpg"/><pubDate>Thu, 26 Mar 2026 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/episodes.captivate.fm/episode/702d97ac-bae4-4a3b-b35f-6d545e7769bc.mp3" length="51196105" type="audio/mpeg"/><itunes:duration>35:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>61</itunes:episode><podcast:episode>61</podcast:episode><podcast:season>1</podcast:season></item><item><title>AI in AppSec: Hype, Layoffs and What&apos;s Actually Real</title><itunes:title>AI in AppSec: Hype, Layoffs and What&apos;s Actually Real</itunes:title><description><![CDATA[<h2>Episode Summary</h2><p>Artificial intelligence is dominating headlines in cybersecurity, but how much of it holds up under scrutiny? In this solo episode of Secured, Cole Cornford, founder and CEO of Galah Cyber, shares his unfiltered take on three of the biggest AI narratives making waves in the AppSec space right now.</p><p>Cole breaks down the Claude Code security announcement and why the market reaction dramatically overstated its real-world impact, arguing that the most meaningful security vulnerabilities have never been the ones static analysis tools can easily catch. He then examines Aikido's continuous penetration testing proposition, raising serious questions around noise, cost, resilience, and whether most organisations are even architected to support it.</p><p>Finally, Cole tackles the AI job displacement narrative head-on, making the case that most high-profile tech layoffs are less about AI capability and more about mismanaged businesses using automation as convenient cover for decisions driven by poor performance and investor pressure.</p><h2>Timestamps</h2><p>00:00 – Intro &amp; Cole's hot take on AI hype</p><p>01:30 – Claude Code Security: what it is and why markets overreacted</p><p>03:30 – Why meaningful vulnerabilities need context, not static analysis</p><p>05:30 – Autofix, token waste, and who's actually using Claude Code</p><p>08:00 – Aikido Infinite: the continuous pen testing promise</p><p>10:00 – Cost, resilience, and noise concerns with Aikido</p><p>12:49 – The AI jobs narrative: Cole's verdict</p><p>14:30 – WiseTech, Block, and the smokescreen theory</p><p>16:00 – Jobs shift, not job loss</p><p>17:03 – Closing thoughts and solo format feedback</p><p>🐙 Secured is grateful to be sponsored and supported by Chainguard.</p><p>Chainguard is the trusted source for open source. Get hardened, secure, production-ready builds so your team can ship faster, stay compliant, and reduce risk. Download your free CVE Reduction Assessment at https://dayone.fm/chainguard</p><p><h1>Secured is part of Day One.</h1><h2>Day One helps founders and startup operators make better business decisions more often. </h2><p>To learn more, join our <a href="https://dayonefm.beehiiv.com/" rel="noopener noreferrer" target="_blank">newsletter </a>to be notified of new First Cheque episodes and upcoming shows.</p></p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<h2>Episode Summary</h2><p>Artificial intelligence is dominating headlines in cybersecurity, but how much of it holds up under scrutiny? In this solo episode of Secured, Cole Cornford, founder and CEO of Galah Cyber, shares his unfiltered take on three of the biggest AI narratives making waves in the AppSec space right now.</p><p>Cole breaks down the Claude Code security announcement and why the market reaction dramatically overstated its real-world impact, arguing that the most meaningful security vulnerabilities have never been the ones static analysis tools can easily catch. He then examines Aikido's continuous penetration testing proposition, raising serious questions around noise, cost, resilience, and whether most organisations are even architected to support it.</p><p>Finally, Cole tackles the AI job displacement narrative head-on, making the case that most high-profile tech layoffs are less about AI capability and more about mismanaged businesses using automation as convenient cover for decisions driven by poor performance and investor pressure.</p><h2>Timestamps</h2><p>00:00 – Intro &amp; Cole's hot take on AI hype</p><p>01:30 – Claude Code Security: what it is and why markets overreacted</p><p>03:30 – Why meaningful vulnerabilities need context, not static analysis</p><p>05:30 – Autofix, token waste, and who's actually using Claude Code</p><p>08:00 – Aikido Infinite: the continuous pen testing promise</p><p>10:00 – Cost, resilience, and noise concerns with Aikido</p><p>12:49 – The AI jobs narrative: Cole's verdict</p><p>14:30 – WiseTech, Block, and the smokescreen theory</p><p>16:00 – Jobs shift, not job loss</p><p>17:03 – Closing thoughts and solo format feedback</p><p>🐙 Secured is grateful to be sponsored and supported by Chainguard.</p><p>Chainguard is the trusted source for open source. Get hardened, secure, production-ready builds so your team can ship faster, stay compliant, and reduce risk. Download your free CVE Reduction Assessment at https://dayone.fm/chainguard</p><p><h1>Secured is part of Day One.</h1><h2>Day One helps founders and startup operators make better business decisions more often. </h2><p>To learn more, join our <a href="https://dayonefm.beehiiv.com/" rel="noopener noreferrer" target="_blank">newsletter </a>to be notified of new First Cheque episodes and upcoming shows.</p></p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts]]></link><guid isPermaLink="false">7a94f6b9-0ad8-4f35-8e36-db1583598ae0</guid><itunes:image href="https://artwork.captivate.fm/3bde78ee-b426-471f-83d2-722fb3a9c47c/Cole-Cornford-Episode-Artwork.jpeg"/><pubDate>Thu, 05 Mar 2026 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/episodes.captivate.fm/episode/7a94f6b9-0ad8-4f35-8e36-db1583598ae0.mp3" length="27165385" type="audio/mpeg"/><itunes:duration>18:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>60</itunes:episode><podcast:episode>60</podcast:episode><podcast:season>1</podcast:season></item><item><title>How AI Pen Testing Actually Works (and Where It Breaks)</title><itunes:title>How AI Pen Testing Actually Works (and Where It Breaks)</itunes:title><description><![CDATA[<h2>Episode Summary</h2><p>AI is starting to change penetration testing, but most people are asking the wrong question. In this episode of Secured, Cole Cornford sits down with Brendan Dolan-Gavitt, AI researcher at XBOW and former NYU professor, to unpack what autonomous pen testing really is, what it can reliably do today, and what still needs humans.</p><p>They explore why AI agents are great at scaling the boring parts of testing, like authenticated workflows and broad vulnerability coverage across huge attack surfaces, and why that does not automatically translate to deep, context-aware exploitation. The conversation also gets into the messy parts: AI systems overclaiming “serious” findings, business logic flaws that are hard to verify, audit expectations, and why scope control needs real guardrails, not vibes. From agent traces and validation models to cost curves and creative exfiltration tricks, this episode is a grounded look at where AI helps AppSec and where it can still cause damage if you trust it too much.</p><h2>Timestamps</h2><p>00:00 – Intro</p><p>03:10 – From academia to building autonomous security tools</p><p>05:00 – Human pen testers vs AI agents: what is actually different</p><p>06:40 – Where AI helps most: boring tasks and low hanging fruit</p><p>08:30 – Scale: a thousand targets vs hiring a thousand testers</p><p>10:20 – Accessibility, economics, and Jevons paradox</p><p>12:30 – Accountability: audit evidence, traces, and “who signs off”</p><p>14:40 – Scope control: avoiding prod and preventing out-of-scope actions</p><p>16:20 – Safety checkers, overseer agents, and persuasion resistance</p><p>18:40 – The cost question: VC money, inference pricing, and efficiency</p><p>21:20 – When AI wastes money and why prioritisation matters</p><p>23:50 – Failure mode: overclaiming business “vulnerabilities”</p><p>26:10 – Validation agents and adversarial peer review</p><p>28:40 – The scary clever stuff: exfiltrating files as images</p><p>31:00 – What AI finds well: XSS, SQLi, file traversal, hard proof bugs</p><p>33:10 – What AI struggles with: business logic and contextual judgement</p><p>35:20 – Hype vs skepticism and why nobody has a crystal ball</p><p>🐙 Secured is grateful to be sponsored and supported by Chainguard.</p><p>Chainguard is the trusted source for open source. Get hardened, secure, production-ready builds so your team can ship faster, stay compliant, and reduce risk. Download your free CVE Reduction Assessment at https://dayone.fm/chainguard</p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<h2>Episode Summary</h2><p>AI is starting to change penetration testing, but most people are asking the wrong question. In this episode of Secured, Cole Cornford sits down with Brendan Dolan-Gavitt, AI researcher at XBOW and former NYU professor, to unpack what autonomous pen testing really is, what it can reliably do today, and what still needs humans.</p><p>They explore why AI agents are great at scaling the boring parts of testing, like authenticated workflows and broad vulnerability coverage across huge attack surfaces, and why that does not automatically translate to deep, context-aware exploitation. The conversation also gets into the messy parts: AI systems overclaiming “serious” findings, business logic flaws that are hard to verify, audit expectations, and why scope control needs real guardrails, not vibes. From agent traces and validation models to cost curves and creative exfiltration tricks, this episode is a grounded look at where AI helps AppSec and where it can still cause damage if you trust it too much.</p><h2>Timestamps</h2><p>00:00 – Intro</p><p>03:10 – From academia to building autonomous security tools</p><p>05:00 – Human pen testers vs AI agents: what is actually different</p><p>06:40 – Where AI helps most: boring tasks and low hanging fruit</p><p>08:30 – Scale: a thousand targets vs hiring a thousand testers</p><p>10:20 – Accessibility, economics, and Jevons paradox</p><p>12:30 – Accountability: audit evidence, traces, and “who signs off”</p><p>14:40 – Scope control: avoiding prod and preventing out-of-scope actions</p><p>16:20 – Safety checkers, overseer agents, and persuasion resistance</p><p>18:40 – The cost question: VC money, inference pricing, and efficiency</p><p>21:20 – When AI wastes money and why prioritisation matters</p><p>23:50 – Failure mode: overclaiming business “vulnerabilities”</p><p>26:10 – Validation agents and adversarial peer review</p><p>28:40 – The scary clever stuff: exfiltrating files as images</p><p>31:00 – What AI finds well: XSS, SQLi, file traversal, hard proof bugs</p><p>33:10 – What AI struggles with: business logic and contextual judgement</p><p>35:20 – Hype vs skepticism and why nobody has a crystal ball</p><p>🐙 Secured is grateful to be sponsored and supported by Chainguard.</p><p>Chainguard is the trusted source for open source. Get hardened, secure, production-ready builds so your team can ship faster, stay compliant, and reduce risk. Download your free CVE Reduction Assessment at https://dayone.fm/chainguard</p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts]]></link><guid isPermaLink="false">a4c9b6fa-3875-4fa3-aad9-2965b1e2d968</guid><itunes:image href="https://artwork.captivate.fm/d0f6fe71-250f-4b7d-91c4-230083bc6115/Brendan-Dolan-Gavitt-Episode-Artwork.jpg"/><pubDate>Thu, 19 Feb 2026 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/episodes.captivate.fm/episode/a4c9b6fa-3875-4fa3-aad9-2965b1e2d968.mp3" length="61175136" type="audio/mpeg"/><itunes:duration>42:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>59</itunes:episode><podcast:episode>59</podcast:episode><podcast:season>1</podcast:season></item><item><title>AI, Hiring, and Trust: Why Shortcuts Break Interviews</title><itunes:title>AI, Hiring, and Trust: Why Shortcuts Break Interviews</itunes:title><description><![CDATA[<h2>Episode Summary</h2><p>Hiring is still a human process, no matter how much AI gets injected into it. In this episode of Secured, Cole Cornford sits down with Kim Acosta, Managing Director at UCentric and former Amazon talent acquisition leader, to unpack how AI is actually changing recruitment and where it is quietly breaking trust.</p><p>They explore how candidates are using AI in applications and technical assessments, why misuse often damages long term employability more than failing an interview, and why recruiters and hiring managers are responding with stricter controls, in person assessments, and AI detection. Kim shares what she is seeing across data, analytics, and AI roles, where demand is growing, and why human judgment, rapport, and credibility still matter far more than perfect answers.</p><p>The conversation also covers embedded recruitment and RPO models, why soft skills matter more as teams get smaller, and what the next hiring cycle is likely to look like as big tech contracts while smaller companies continue to grow. For candidates, hiring managers, and founders alike, this episode is a grounded look at why shortcuts rarely pay off and why trust is still the real signal.</p><h2>Timestamps</h2><p>00:00 – Intro</p><p>01:24 – Meet Kim Acosta and UCentric</p><p>02:06 – From Amazon to starting a recruitment consultancy</p><p>04:19 – Data engineering demand vs AI hype</p><p>05:31 – What data engineering roles actually look like</p><p>07:27 – Adapting business models to real market needs</p><p>10:04 – Where AI genuinely helps recruiters</p><p>11:09 – Custom GPTs and interview preparation</p><p>13:43 – One way interviews and candidate slop</p><p>15:09 – Technical assessments and AI misuse</p><p>17:19 – Trust, failure, and reapplying the right way</p><p>18:29 – Spotting AI generated answers in interviews</p><p>20:19 – Rapport, eye contact, and human signals</p><p>22:19 – Hiring for values and team fit</p><p>23:52 – Agency vs internal vs embedded recruiters</p><p>27:59 – RPO models and cost tradeoffs</p><p>28:47 – Layoffs, market shifts, and salary reality</p><p>30:57 – Where hiring is still strong</p><p>33:10 – Why hiring and podcasts still need humans</p><p>🐙 Secured is grateful to be sponsored and supported by Chainguard.</p><p>Chainguard is the trusted source for open source. Get hardened, secure, production-ready builds so your team can ship faster, stay compliant, and reduce risk. Download your free CVE Reduction Assessment at https://dayone.fm/chainguard</p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<h2>Episode Summary</h2><p>Hiring is still a human process, no matter how much AI gets injected into it. In this episode of Secured, Cole Cornford sits down with Kim Acosta, Managing Director at UCentric and former Amazon talent acquisition leader, to unpack how AI is actually changing recruitment and where it is quietly breaking trust.</p><p>They explore how candidates are using AI in applications and technical assessments, why misuse often damages long term employability more than failing an interview, and why recruiters and hiring managers are responding with stricter controls, in person assessments, and AI detection. Kim shares what she is seeing across data, analytics, and AI roles, where demand is growing, and why human judgment, rapport, and credibility still matter far more than perfect answers.</p><p>The conversation also covers embedded recruitment and RPO models, why soft skills matter more as teams get smaller, and what the next hiring cycle is likely to look like as big tech contracts while smaller companies continue to grow. For candidates, hiring managers, and founders alike, this episode is a grounded look at why shortcuts rarely pay off and why trust is still the real signal.</p><h2>Timestamps</h2><p>00:00 – Intro</p><p>01:24 – Meet Kim Acosta and UCentric</p><p>02:06 – From Amazon to starting a recruitment consultancy</p><p>04:19 – Data engineering demand vs AI hype</p><p>05:31 – What data engineering roles actually look like</p><p>07:27 – Adapting business models to real market needs</p><p>10:04 – Where AI genuinely helps recruiters</p><p>11:09 – Custom GPTs and interview preparation</p><p>13:43 – One way interviews and candidate slop</p><p>15:09 – Technical assessments and AI misuse</p><p>17:19 – Trust, failure, and reapplying the right way</p><p>18:29 – Spotting AI generated answers in interviews</p><p>20:19 – Rapport, eye contact, and human signals</p><p>22:19 – Hiring for values and team fit</p><p>23:52 – Agency vs internal vs embedded recruiters</p><p>27:59 – RPO models and cost tradeoffs</p><p>28:47 – Layoffs, market shifts, and salary reality</p><p>30:57 – Where hiring is still strong</p><p>33:10 – Why hiring and podcasts still need humans</p><p>🐙 Secured is grateful to be sponsored and supported by Chainguard.</p><p>Chainguard is the trusted source for open source. Get hardened, secure, production-ready builds so your team can ship faster, stay compliant, and reduce risk. Download your free CVE Reduction Assessment at https://dayone.fm/chainguard</p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts]]></link><guid isPermaLink="false">6c4bea24-82f6-4939-9e69-2c3a26c07063</guid><itunes:image href="https://artwork.captivate.fm/57f297e1-c363-4cb1-822b-39bc8e8f53fc/Kim-Acosta-Episode-Artwork.jpg"/><pubDate>Thu, 05 Feb 2026 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/episodes.captivate.fm/episode/6c4bea24-82f6-4939-9e69-2c3a26c07063.mp3" length="50021629" type="audio/mpeg"/><itunes:duration>34:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>58</itunes:episode><podcast:episode>58</podcast:episode><podcast:season>1</podcast:season></item><item><title>PSPF Changes Explained for Security Leaders</title><itunes:title>PSPF Changes Explained for Security Leaders</itunes:title><description><![CDATA[<h2>Episode Summary</h2><p>The Protective Security Policy Framework is meant to guide how government manages security risk, but constant updates make it harder to implement than to understand. In this episode of Secured, Cole Cornford is joined by Toby Amodio, Practice Lead at Fujitsu Cybersecurity Services and former senior cybersecurity leader across Australian government, to break down what actually changed in the latest PSPF update and why it matters in practice.</p><p>They examine the growing focus on personnel security and foreign interference risk, the inclusion of AI guidance that adds little beyond basic risk assessment, and the long overdue recognition of Secure Service Edge and SASE as compliant gateways. The conversation also explores why deny lists and centralised risk sharing sound sensible on paper but are far harder to enforce in reality, and why most security failures still come down to behaviour, accountability, and how technology is actually used rather than what policy says.</p><h2>Timestamps</h2><p>00:00 – Intro</p><p>01:18 – What the PSPF is and why it exists</p><p>02:49 – Annual updates, directives, and policy advisories</p><p>04:19 – What actually changed in the 2025 PSPF update</p><p>05:36 – AI in the PSPF and why it adds little value</p><p>08:14 – Tool hype vs implementation risk</p><p>10:32 – The AI policy advisory and trusted vendors</p><p>14:25 – Directive 3 and clearance disclosure risks</p><p>17:21 – Personnel security and enforcement reality</p><p>19:41 – Secure Service Edge and SASE recognition</p><p>23:39 – Commonwealth Technology Management directive</p><p>25:28 – Deny lists, transparency, and security through obscurity</p><p>28:05 – Centralised risk sharing and assessment overload</p><p>29:52 – Policy wonk or policy gronk</p><p>31:12 – Final takeaways and closing</p><p>🐙 Secured is grateful to be sponsored and supported by Chainguard.</p><p>Chainguard is the trusted source for open source. Get hardened, secure, production-ready builds so your team can ship faster, stay compliant, and reduce risk. Download your free CVE Reduction Assessment at https://dayone.fm/chainguard</p><p>Mentioned in this episode:</p><p><strong>Download your free CVE Reduction Assessment</strong></p><p>Chainguard is the trusted source for open source. Get hardened, secure, production-ready builds so your team can ship faster, stay compliant, and reduce risk.</p><p><a href="https://secured.captivate.fm/chainguard">December 2025 - Chainguard</a></p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<h2>Episode Summary</h2><p>The Protective Security Policy Framework is meant to guide how government manages security risk, but constant updates make it harder to implement than to understand. In this episode of Secured, Cole Cornford is joined by Toby Amodio, Practice Lead at Fujitsu Cybersecurity Services and former senior cybersecurity leader across Australian government, to break down what actually changed in the latest PSPF update and why it matters in practice.</p><p>They examine the growing focus on personnel security and foreign interference risk, the inclusion of AI guidance that adds little beyond basic risk assessment, and the long overdue recognition of Secure Service Edge and SASE as compliant gateways. The conversation also explores why deny lists and centralised risk sharing sound sensible on paper but are far harder to enforce in reality, and why most security failures still come down to behaviour, accountability, and how technology is actually used rather than what policy says.</p><h2>Timestamps</h2><p>00:00 – Intro</p><p>01:18 – What the PSPF is and why it exists</p><p>02:49 – Annual updates, directives, and policy advisories</p><p>04:19 – What actually changed in the 2025 PSPF update</p><p>05:36 – AI in the PSPF and why it adds little value</p><p>08:14 – Tool hype vs implementation risk</p><p>10:32 – The AI policy advisory and trusted vendors</p><p>14:25 – Directive 3 and clearance disclosure risks</p><p>17:21 – Personnel security and enforcement reality</p><p>19:41 – Secure Service Edge and SASE recognition</p><p>23:39 – Commonwealth Technology Management directive</p><p>25:28 – Deny lists, transparency, and security through obscurity</p><p>28:05 – Centralised risk sharing and assessment overload</p><p>29:52 – Policy wonk or policy gronk</p><p>31:12 – Final takeaways and closing</p><p>🐙 Secured is grateful to be sponsored and supported by Chainguard.</p><p>Chainguard is the trusted source for open source. Get hardened, secure, production-ready builds so your team can ship faster, stay compliant, and reduce risk. Download your free CVE Reduction Assessment at https://dayone.fm/chainguard</p><p>Mentioned in this episode:</p><p><strong>Download your free CVE Reduction Assessment</strong></p><p>Chainguard is the trusted source for open source. Get hardened, secure, production-ready builds so your team can ship faster, stay compliant, and reduce risk.</p><p><a href="https://secured.captivate.fm/chainguard">December 2025 - Chainguard</a></p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts]]></link><guid isPermaLink="false">4600264f-0ba4-43c8-9b82-2dfc455fe13d</guid><itunes:image href="https://artwork.captivate.fm/94a193a0-b2b3-4c9a-851a-fabebfeafb4b/Toby-Amodio-Episode-Artwork.jpg"/><pubDate>Thu, 22 Jan 2026 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/episodes.captivate.fm/episode/4600264f-0ba4-43c8-9b82-2dfc455fe13d.mp3" length="47853577" type="audio/mpeg"/><itunes:duration>33:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>57</itunes:episode><podcast:episode>57</podcast:episode><podcast:season>1</podcast:season></item><item><title>The Architect’s Dilemma: Why Security Design Keeps Failing (and How to Fix It)</title><itunes:title>The Architect’s Dilemma: Why Security Design Keeps Failing (and How to Fix It)</itunes:title><description><![CDATA[<h2>Episode Summary</h2><p>Most security architects are not actually doing architecture. They are doing assurance work, following checklists, and hoping standards will save them. But as systems get more complex and attackers get faster, that approach is no longer good enough.</p><p>In this episode of Secured, Cole sits down with Ken Fitzpatrick, founder of Patterned Security and creator of securitypatterns.io, a resource built during the lockdown years that has since grown into one of the clearest frameworks for designing meaningful, context-aware security architecture.</p><p>Ken shares why so many architects fall into the trap of compliance thinking, how security design becomes a tick box exercise, and why threat modeling without understanding context is pointless. They unpack the four foundational steps every architect should follow, why traceability matters more than ever, and how modern teams can stop copying best practice and start solving the real problems in front of them.</p><p>The conversation also digs into secure by design in different industries, why the term has lost its meaning, and how modern defensible architecture is resetting expectations for what good looks like. Cole and Ken also dive into AI and its impact on the architecture function, separating hype from reality and exploring which roles are at risk as AI improves.</p><p>If you work in engineering, architecture, AppSec, risk, or are building a product and want a practical way to think about secure design, this is an episode you should not miss.</p><h2>Timestamps</h2><p>00:00 – Intro</p><p>00:48 – Chainguard Ad</p><p>01:20 – Meet Ken Fitzpatrick and Patterned Security</p><p>02:19 – How a cancelled Canada trip sparked <a href="http://securitypatterns.io/" rel="noopener noreferrer" target="_blank">securitypatterns.io</a></p><p>04:08 – Why architecture needs practical guidance, not more frameworks</p><p>05:18 – The four step method for real security architecture</p><p>07:23 – Moving beyond box ticking and why engineering experience matters</p><p>09:39 – Teaching architecture fundamentals and selecting the right controls</p><p>11:37 – Traceability and making defensible design decisions</p><p>13:14 – Architecture vs assurance and who <a href="http://securitypatterns.io/" rel="noopener noreferrer" target="_blank">securitypatterns.io</a> is for</p><p>16:31 – Embedding secure by design into PMO processes and scale up use cases</p><p>19:58 – What secure by design means across different industries</p><p>23:05 – Inconsistent definitions in security and the need for clarity</p><p>23:50 – Modern defensible architecture and Zero Trust guidance</p><p>24:44 – AI’s role in architecture and which tasks get replaced</p><p>28:25 – AI in AppSec and reducing false positives with context</p><p>30:24 – AI sales bots, hype cycles, and the loss of human reciprocity</p><p>33:28 – Ken’s call for collaboration on repeatable architecture patterns</p><p>34:28 – Closing and how to connect with Galah Cyber</p><p>🐙 Secured is grateful to be sponsored and supported by Chainguard.</p><p>Chainguard is the trusted source for open source. Get hardened, secure, production-ready builds so your team can ship faster, stay compliant, and reduce risk. Download your free CVE Reduction Assessment at https://dayone.fm/chainguard</p><p>Mentioned in this episode:</p><p><strong>Chainguard is the trusted source for open source.</strong></p><p>Get hardened, secure, production-ready builds so your team can ship faster, stay compliant, and reduce risk. Download your free CVE Reduction Report now!</p><p><a href="https://secured.captivate.fm/chainguard">December 2025 - Chainguard</a></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<h2>Episode Summary</h2><p>Most security architects are not actually doing architecture. They are doing assurance work, following checklists, and hoping standards will save them. But as systems get more complex and attackers get faster, that approach is no longer good enough.</p><p>In this episode of Secured, Cole sits down with Ken Fitzpatrick, founder of Patterned Security and creator of securitypatterns.io, a resource built during the lockdown years that has since grown into one of the clearest frameworks for designing meaningful, context-aware security architecture.</p><p>Ken shares why so many architects fall into the trap of compliance thinking, how security design becomes a tick box exercise, and why threat modeling without understanding context is pointless. They unpack the four foundational steps every architect should follow, why traceability matters more than ever, and how modern teams can stop copying best practice and start solving the real problems in front of them.</p><p>The conversation also digs into secure by design in different industries, why the term has lost its meaning, and how modern defensible architecture is resetting expectations for what good looks like. Cole and Ken also dive into AI and its impact on the architecture function, separating hype from reality and exploring which roles are at risk as AI improves.</p><p>If you work in engineering, architecture, AppSec, risk, or are building a product and want a practical way to think about secure design, this is an episode you should not miss.</p><h2>Timestamps</h2><p>00:00 – Intro</p><p>00:48 – Chainguard Ad</p><p>01:20 – Meet Ken Fitzpatrick and Patterned Security</p><p>02:19 – How a cancelled Canada trip sparked <a href="http://securitypatterns.io/" rel="noopener noreferrer" target="_blank">securitypatterns.io</a></p><p>04:08 – Why architecture needs practical guidance, not more frameworks</p><p>05:18 – The four step method for real security architecture</p><p>07:23 – Moving beyond box ticking and why engineering experience matters</p><p>09:39 – Teaching architecture fundamentals and selecting the right controls</p><p>11:37 – Traceability and making defensible design decisions</p><p>13:14 – Architecture vs assurance and who <a href="http://securitypatterns.io/" rel="noopener noreferrer" target="_blank">securitypatterns.io</a> is for</p><p>16:31 – Embedding secure by design into PMO processes and scale up use cases</p><p>19:58 – What secure by design means across different industries</p><p>23:05 – Inconsistent definitions in security and the need for clarity</p><p>23:50 – Modern defensible architecture and Zero Trust guidance</p><p>24:44 – AI’s role in architecture and which tasks get replaced</p><p>28:25 – AI in AppSec and reducing false positives with context</p><p>30:24 – AI sales bots, hype cycles, and the loss of human reciprocity</p><p>33:28 – Ken’s call for collaboration on repeatable architecture patterns</p><p>34:28 – Closing and how to connect with Galah Cyber</p><p>🐙 Secured is grateful to be sponsored and supported by Chainguard.</p><p>Chainguard is the trusted source for open source. Get hardened, secure, production-ready builds so your team can ship faster, stay compliant, and reduce risk. Download your free CVE Reduction Assessment at https://dayone.fm/chainguard</p><p>Mentioned in this episode:</p><p><strong>Chainguard is the trusted source for open source.</strong></p><p>Get hardened, secure, production-ready builds so your team can ship faster, stay compliant, and reduce risk. Download your free CVE Reduction Report now!</p><p><a href="https://secured.captivate.fm/chainguard">December 2025 - Chainguard</a></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts]]></link><guid isPermaLink="false">1a341a8d-6939-4306-b074-795247ff433e</guid><itunes:image href="https://artwork.captivate.fm/8a0a40fc-7095-497e-ba93-27a9101f3fbd/Ken-Fitzpatrick-Episode-Artwork.jpg"/><pubDate>Thu, 08 Jan 2026 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/episodes.captivate.fm/episode/1a341a8d-6939-4306-b074-795247ff433e.mp3" length="50044681" type="audio/mpeg"/><itunes:duration>34:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>56</itunes:episode><podcast:episode>56</podcast:episode><podcast:season>1</podcast:season></item><item><title>Fix the Flag: Rethinking Secure Code Training with Pedram Hayati</title><itunes:title>Fix the Flag: Rethinking Secure Code Training with Pedram Hayati</itunes:title><description><![CDATA[<h2>Episode Summary</h2><p>CTFs are fun, but do they actually make developers write more secure code? In this episode of Secured, Cole Cornford is joined by Pedram Hayati (Founder of SecDim &amp; SecTalks) to explore why most developer security training fails, and how SecDim’s “Fix the Flag” approach is changing the game.</p><p>From contrived WebGoat-style examples to frameworks that quietly eradicate entire bug classes, Cole and Pedram dive deep into the intersection of AppSec and software engineering. They unpack why developer experience is non-negotiable, why security needs to borrow design patterns from engineering, and how real-world incidents (like GitHub’s mass assignment bug or the Optus breach) make concepts stick far better than acronyms like “XSS” or “SSTI.”</p><p>This is a technical, opinionated episode for anyone who’s ever struggled to get developers engaged with security.</p><h2>Timestamps</h2><p>01:10 – Why Pedram built SecDim, the problem with pen test reports, and why CTFs don’t train developers</p><p>04:42 – From “Capture the Flag” to “Fix the Flag”: making training realistic and Git-first</p><p>06:30 – Training inside developer workflows and why contrived examples fail</p><p>10:28 – Using modern stacks, AI-tailored labs, and real-world incidents to make concepts stick</p><p>12:35 – Why security names suck (XSS vs. “content injection”) and the Optus hack as a teaching moment</p><p>17:37 – Secure design patterns vs. vague slogans, and why secure defaults beat secure by design</p><p>21:15 – Frameworks like React, Rails, and Angular that kill entire bug classes</p><p>23:23 – Engineering by-products: reproducibility, immutability, and orthogonality in secure coding</p><p>30:36 – PHP’s bad reputation, language quirks, and what’s actually most popular in security training today</p><p>33:41 – Why AppSec pros need to build and deploy apps (not just know vulnerability classes)</p><p>37:44 – Getting started with SecDim and hands-on secure coding</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<h2>Episode Summary</h2><p>CTFs are fun, but do they actually make developers write more secure code? In this episode of Secured, Cole Cornford is joined by Pedram Hayati (Founder of SecDim &amp; SecTalks) to explore why most developer security training fails, and how SecDim’s “Fix the Flag” approach is changing the game.</p><p>From contrived WebGoat-style examples to frameworks that quietly eradicate entire bug classes, Cole and Pedram dive deep into the intersection of AppSec and software engineering. They unpack why developer experience is non-negotiable, why security needs to borrow design patterns from engineering, and how real-world incidents (like GitHub’s mass assignment bug or the Optus breach) make concepts stick far better than acronyms like “XSS” or “SSTI.”</p><p>This is a technical, opinionated episode for anyone who’s ever struggled to get developers engaged with security.</p><h2>Timestamps</h2><p>01:10 – Why Pedram built SecDim, the problem with pen test reports, and why CTFs don’t train developers</p><p>04:42 – From “Capture the Flag” to “Fix the Flag”: making training realistic and Git-first</p><p>06:30 – Training inside developer workflows and why contrived examples fail</p><p>10:28 – Using modern stacks, AI-tailored labs, and real-world incidents to make concepts stick</p><p>12:35 – Why security names suck (XSS vs. “content injection”) and the Optus hack as a teaching moment</p><p>17:37 – Secure design patterns vs. vague slogans, and why secure defaults beat secure by design</p><p>21:15 – Frameworks like React, Rails, and Angular that kill entire bug classes</p><p>23:23 – Engineering by-products: reproducibility, immutability, and orthogonality in secure coding</p><p>30:36 – PHP’s bad reputation, language quirks, and what’s actually most popular in security training today</p><p>33:41 – Why AppSec pros need to build and deploy apps (not just know vulnerability classes)</p><p>37:44 – Getting started with SecDim and hands-on secure coding</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts]]></link><guid isPermaLink="false">c3c6f2ed-2718-40d3-b24c-0d4b8ef40cfc</guid><itunes:image href="https://artwork.captivate.fm/f05f9ddf-6f95-44b5-b06e-87c46865e19b/Pedram-Hayati-Episode-Artwork.jpg"/><pubDate>Fri, 12 Sep 2025 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/episodes.captivate.fm/episode/c3c6f2ed-2718-40d3-b24c-0d4b8ef40cfc.mp3" length="56643987" type="audio/mpeg"/><itunes:duration>39:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>54</itunes:episode><podcast:episode>54</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/5e91b293-109a-4c4a-a128-00c7781976f6/index.html" type="text/html"/></item><item><title>ISM 2025 Explained: What CISOs, Devs and Security Leads Need to Know - with Toby Amodio</title><itunes:title>ISM 2025 Explained: What CISOs, Devs and Security Leads Need to Know - with Toby Amodio</itunes:title><description><![CDATA[<h2>Episode Summary</h2><p>The Australian Information Security Manual (ISM) just got a major update, and not everyone’s thrilled. In this special episode of Secured, Cole Cornford is joined by Toby Amodio (Head of Professional Services, Fujitsu Cyber) to break down what’s changed, what’s missing, and what it all means for CISOs, AppSec teams and public sector security leads.</p><p>From the new cybersecurity principles (and why they feel like yak shaving) to the long-overdue expansion of software security controls, Cole and Toby navigate the mess of frameworks, missing maturity models, and babushka-doll-style mappings that have left many teams overwhelmed. They also reflect on what “secure-by-default” really means in a world of legacy codebases, overstretched resources, and one-person AppSec teams.</p><h2>Timestamps</h2><p>01:02 – Why ISM Updates Matter (Even If They’re Late)</p><p>02:32 – New Principles: Nice Idea, Hard to Implement</p><p>04:08 – Yak Shaving and the Complexity Cascade</p><p>07:48 – Mapping Mayhem: PSPF, E8 and Governance Overload</p><p>10:25 – Losing the Maturity Model: Who Does That Help?</p><p>13:46 – Secure-by-Default and the Problem with OWASP-as-a-Proxy</p><p>18:13 – Integration, Incentives, and Cyber vs. Business Silos</p><p>20:34 – The Talent Gap and Why Code Reviews Still Matter</p><p>22:58 – Galah Cyber, Capability Building &amp; Doing AppSec Right</p><p>23:57 – Why Buying Tools Isn’t the Same as Building Capability</p><p>25:21 – What Red, Amber, Green Tools Really Miss</p><p>26:01 – One ISM to Rule Them All… If You Can Implement It</p><p>26:52 – Final Thoughts (and a Funding Stick for CISOs)</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<h2>Episode Summary</h2><p>The Australian Information Security Manual (ISM) just got a major update, and not everyone’s thrilled. In this special episode of Secured, Cole Cornford is joined by Toby Amodio (Head of Professional Services, Fujitsu Cyber) to break down what’s changed, what’s missing, and what it all means for CISOs, AppSec teams and public sector security leads.</p><p>From the new cybersecurity principles (and why they feel like yak shaving) to the long-overdue expansion of software security controls, Cole and Toby navigate the mess of frameworks, missing maturity models, and babushka-doll-style mappings that have left many teams overwhelmed. They also reflect on what “secure-by-default” really means in a world of legacy codebases, overstretched resources, and one-person AppSec teams.</p><h2>Timestamps</h2><p>01:02 – Why ISM Updates Matter (Even If They’re Late)</p><p>02:32 – New Principles: Nice Idea, Hard to Implement</p><p>04:08 – Yak Shaving and the Complexity Cascade</p><p>07:48 – Mapping Mayhem: PSPF, E8 and Governance Overload</p><p>10:25 – Losing the Maturity Model: Who Does That Help?</p><p>13:46 – Secure-by-Default and the Problem with OWASP-as-a-Proxy</p><p>18:13 – Integration, Incentives, and Cyber vs. Business Silos</p><p>20:34 – The Talent Gap and Why Code Reviews Still Matter</p><p>22:58 – Galah Cyber, Capability Building &amp; Doing AppSec Right</p><p>23:57 – Why Buying Tools Isn’t the Same as Building Capability</p><p>25:21 – What Red, Amber, Green Tools Really Miss</p><p>26:01 – One ISM to Rule Them All… If You Can Implement It</p><p>26:52 – Final Thoughts (and a Funding Stick for CISOs)</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts]]></link><guid isPermaLink="false">e98db83d-f07c-4876-831d-5f5411009cc6</guid><itunes:image href="https://artwork.captivate.fm/21c6028c-6ba8-4574-b7d3-92b1f79c09c3/jjqWGm9UtVRGdo8rgVSnQqkO.jpg"/><pubDate>Thu, 24 Jul 2025 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/episodes.captivate.fm/episode/e98db83d-f07c-4876-831d-5f5411009cc6.mp3" length="41480219" type="audio/mpeg"/><itunes:duration>28:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>53</itunes:episode><podcast:episode>53</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/d5d028c5-9587-4440-81ab-6ee19d4c1bf9/index.html" type="text/html"/></item><item><title>Securing the Gaps: M Brennan on Integration, Context and Developer Experience</title><itunes:title>Securing the Gaps: M Brennan on Integration, Context and Developer Experience</itunes:title><description><![CDATA[<h2>Episode Summary</h2><p>With a career that spans mainframes, integration platforms, and developer experience, M Brennan brings a unique lens to the world of application security. In this episode, M joins Cole Cornford to unpack why integration is often the riskiest layer in software systems, how context is everything when choosing security controls, and what it really takes to build security into developer workflows without adding friction.</p><p>They dive into stories from government and enterprise environments, the overlap between security and resilience, and how thinking in terms of energy and empathy, not just tools, can lead to better outcomes for everyone. Plus, a surprisingly effective stereo-selling strategy, some well-earned AI scepticism, and a jam-jar analogy you’ll never forget.</p><h2>Timestamps</h2><p>03:45 From COBOL to Developer Experience in Security</p><p>06:37 Choosing the Right Security Control for the Right Risk</p><p>10:00 Reducing Developer Friction with Secure Defaults</p><p>14:10 How Threat Modelling Creates Real Value</p><p>17:57 Fixing Access and Provisioning for Devs and Security</p><p>20:09 Virtual Dev Environments and Automating the Boring Stuff</p><p>24:04 Smarter Security Adoption and the Jam Jar Effect</p><p>28:48 AI, Developer Toil and the Problem with Overpromising</p><p>31:03 Using AI to Kickstart Threat Modelling and Resilience</p><p>33:56 Why Some Tech Trends Aren’t Worth the Hype</p><p>36:09 The Risk of Letting Chatbots Handle Security Promises</p><p>37:16 Final Takeaways on Empathy, Context and Collaboration</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<h2>Episode Summary</h2><p>With a career that spans mainframes, integration platforms, and developer experience, M Brennan brings a unique lens to the world of application security. In this episode, M joins Cole Cornford to unpack why integration is often the riskiest layer in software systems, how context is everything when choosing security controls, and what it really takes to build security into developer workflows without adding friction.</p><p>They dive into stories from government and enterprise environments, the overlap between security and resilience, and how thinking in terms of energy and empathy, not just tools, can lead to better outcomes for everyone. Plus, a surprisingly effective stereo-selling strategy, some well-earned AI scepticism, and a jam-jar analogy you’ll never forget.</p><h2>Timestamps</h2><p>03:45 From COBOL to Developer Experience in Security</p><p>06:37 Choosing the Right Security Control for the Right Risk</p><p>10:00 Reducing Developer Friction with Secure Defaults</p><p>14:10 How Threat Modelling Creates Real Value</p><p>17:57 Fixing Access and Provisioning for Devs and Security</p><p>20:09 Virtual Dev Environments and Automating the Boring Stuff</p><p>24:04 Smarter Security Adoption and the Jam Jar Effect</p><p>28:48 AI, Developer Toil and the Problem with Overpromising</p><p>31:03 Using AI to Kickstart Threat Modelling and Resilience</p><p>33:56 Why Some Tech Trends Aren’t Worth the Hype</p><p>36:09 The Risk of Letting Chatbots Handle Security Promises</p><p>37:16 Final Takeaways on Empathy, Context and Collaboration</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts]]></link><guid isPermaLink="false">b8961b95-f2a3-4041-8f72-6114494dcf62</guid><itunes:image href="https://artwork.captivate.fm/e19f04b4-96d7-4033-bd67-b990b4554fd2/WHysMI3g5c1x-hLMNwa7shrv.jpg"/><pubDate>Thu, 10 Jul 2025 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/episodes.captivate.fm/episode/b8961b95-f2a3-4041-8f72-6114494dcf62.mp3" length="57035197" type="audio/mpeg"/><itunes:duration>39:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>52</itunes:episode><podcast:episode>52</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/c3d04890-5058-404d-821b-1a94ee6f9f1e/index.html" type="text/html"/></item><item><title>From Cryptography to AppSec: Scott Contini on Building Practical Security</title><itunes:title>From Cryptography to AppSec: Scott Contini on Building Practical Security</itunes:title><description><![CDATA[<h2>Episode Summary</h2><p>Scott Contini has a PhD in cryptography with more than a dozen research publications, and has spent the last 15 years focused on solving real-world security problems. After switching from academia to industry in 2008, Scott has identified hundreds of cryptographic implementation flaws across the world, written widely read blogs on common coding mistakes, and contributed significantly to the 2021 OWASP Top 10 topic of Cryptographic Failures. He joins Cole Cornford to discuss how cryptography often goes wrong in practice, why secure-by-default APIs are reshaping security today, and the importance of clear communication and community-building in advancing the field. Scott also shares stories from working alongside legendary figures in cryptography, and offers advice for anyone looking to build a sustainable and impactful security career.</p><h2>Timestamps</h2><p>00:20 - Scott’s background in cryptography and transition to AppSec</p><p>02:00 - Moving from theory to real-world security challenges</p><p>05:00 - Common cryptography mistakes in the industry</p><p>07:50 - Why using the wrong encryption modes leads to vulnerabilities</p><p>10:10 - How Java’s cryptography design led to widespread issues</p><p>14:40 - The rise of secure-by-default APIs in cryptography</p><p>17:00 - Stories from working with cryptographic legends</p><p>22:00 - Improving advice in the OWASP community</p><p>27:50 - The value of writing and public speaking in AppSec careers</p><p>33:00 - Advice for newcomers in security: think like an attacker and keep learning</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<h2>Episode Summary</h2><p>Scott Contini has a PhD in cryptography with more than a dozen research publications, and has spent the last 15 years focused on solving real-world security problems. After switching from academia to industry in 2008, Scott has identified hundreds of cryptographic implementation flaws across the world, written widely read blogs on common coding mistakes, and contributed significantly to the 2021 OWASP Top 10 topic of Cryptographic Failures. He joins Cole Cornford to discuss how cryptography often goes wrong in practice, why secure-by-default APIs are reshaping security today, and the importance of clear communication and community-building in advancing the field. Scott also shares stories from working alongside legendary figures in cryptography, and offers advice for anyone looking to build a sustainable and impactful security career.</p><h2>Timestamps</h2><p>00:20 - Scott’s background in cryptography and transition to AppSec</p><p>02:00 - Moving from theory to real-world security challenges</p><p>05:00 - Common cryptography mistakes in the industry</p><p>07:50 - Why using the wrong encryption modes leads to vulnerabilities</p><p>10:10 - How Java’s cryptography design led to widespread issues</p><p>14:40 - The rise of secure-by-default APIs in cryptography</p><p>17:00 - Stories from working with cryptographic legends</p><p>22:00 - Improving advice in the OWASP community</p><p>27:50 - The value of writing and public speaking in AppSec careers</p><p>33:00 - Advice for newcomers in security: think like an attacker and keep learning</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts]]></link><guid isPermaLink="false">dec6a49e-b6c1-4351-9fed-7c22b4912d2a</guid><itunes:image href="https://artwork.captivate.fm/3070eeec-4a66-47c4-bb18-07b7256ecded/yKSKuBJ31z3j-pNg-ADY9ZLQ.jpg"/><pubDate>Thu, 01 May 2025 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/b1bc1325-b3e5-430b-96d8-edcef6a537fa/Scott-Contini-SP.mp3" length="60875824" type="audio/mpeg"/><itunes:duration>42:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>51</itunes:episode><podcast:episode>51</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/0c93ca6e-7247-41e9-ad86-d825a28dd658/index.html" type="text/html"/></item><item><title>Engineering Security: Bridging DevOps and AppSec with Jon-Anthoney de Boer</title><itunes:title>Engineering Security: Bridging DevOps and AppSec with Jon-Anthoney de Boer</itunes:title><description><![CDATA[<h2>Episode Summary</h2><p>Jon-Anthoney de Boer is the Product Security Lead at Transmax, overseeing security for critical infrastructure that manages traffic flow across Australia. Coming from a strong software engineering background, Jon-Anthoney shares his experience transitioning from traditional engineering into product and application security. He highlights the importance of aligning software engineering and security teams, building trust into the software development lifecycle, and fostering a security culture based on practical strategy rather than superficial metrics. Jon-Anthoney also discusses how behavioural change, organisational alignment, and operational excellence are key to achieving effective, sustainable security outcomes.</p><h2>Timestamps</h2><p>00:32 - Jon-Anthoney’s journey from electrical engineering to product security</p><p>05:08 - Transitioning from software craftsmanship to cybersecurity</p><p>09:30 - Why aligned incentives between engineering and security teams matter</p><p>12:22 - Goodhart's Law: pitfalls of security metrics</p><p>18:21 - Rethinking cybersecurity strategies beyond tools and compliance</p><p>25:12 - Building observability into the secure software development lifecycle</p><p>32:35 - Why executive support is crucial for security initiatives</p><p>38:34 - Operational excellence: removing waste from security processes</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<h2>Episode Summary</h2><p>Jon-Anthoney de Boer is the Product Security Lead at Transmax, overseeing security for critical infrastructure that manages traffic flow across Australia. Coming from a strong software engineering background, Jon-Anthoney shares his experience transitioning from traditional engineering into product and application security. He highlights the importance of aligning software engineering and security teams, building trust into the software development lifecycle, and fostering a security culture based on practical strategy rather than superficial metrics. Jon-Anthoney also discusses how behavioural change, organisational alignment, and operational excellence are key to achieving effective, sustainable security outcomes.</p><h2>Timestamps</h2><p>00:32 - Jon-Anthoney’s journey from electrical engineering to product security</p><p>05:08 - Transitioning from software craftsmanship to cybersecurity</p><p>09:30 - Why aligned incentives between engineering and security teams matter</p><p>12:22 - Goodhart's Law: pitfalls of security metrics</p><p>18:21 - Rethinking cybersecurity strategies beyond tools and compliance</p><p>25:12 - Building observability into the secure software development lifecycle</p><p>32:35 - Why executive support is crucial for security initiatives</p><p>38:34 - Operational excellence: removing waste from security processes</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts]]></link><guid isPermaLink="false">e20ca3c1-368e-46ae-a922-5deaa08242cc</guid><itunes:image href="https://artwork.captivate.fm/8fdbfcea-e32c-4b72-9320-3ed1aa2cb904/mCEAnjjnla0s74RUCXC4L5Ii.jpg"/><pubDate>Thu, 17 Apr 2025 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/e2fdf0b2-34c1-49da-b07a-39e994e5e70f/Jon-Anthoney-de-Boer-SP.mp3" length="62224370" type="audio/mpeg"/><itunes:duration>43:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>50</itunes:episode><podcast:episode>50</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/f7674fa9-5896-4675-a7dd-3b6230814bc9/index.html" type="text/html"/></item><item><title>Scaling Cyber at Fujitsu: Laura O&apos;Neill on Strategy, Risk and Growth</title><itunes:title>Scaling Cyber at Fujitsu: Laura O&apos;Neill on Strategy, Risk and Growth</itunes:title><description><![CDATA[<h2>Episode Summary</h2><p>In this episode of Secured, host Cole Cornford chats with Laura O'Neill from Fujitsu Cyber. Laura shares her journey from a pure maths and cryptography background through management consulting into the world of cybersecurity. She explains how she helped grow MF&amp;A from a small team into a 70-person company before its acquisition by Fujitsu. Cole and Laura discuss the challenges of scaling a cyber practice, the importance of professionalising sales and board-level communications, and how embracing diverse, non-traditional talent can transform the industry. Their conversation offers valuable insights into shifting from a compliance-based mindset to a risk-based strategy that truly supports business objectives.</p><h2>Timestamps</h2><p>00:10 - Introduction to Laura O'Neill and her role at Fujitsu Cyber</p><p>02:27 - Laura recounts her journey from pure maths and cryptography to cybersecurity</p><p>05:31 - Discussing the rapid growth of MF&amp;A from a small team to 70 staff</p><p>07:30 - Overcoming scaling challenges through improved processes and support</p><p>11:23 - Professionalising sales and board-level communications in cyber</p><p>15:30 - Moving from a compliance-driven approach to a risk-based strategy</p><p>26:16 - Embracing diversity and non-traditional hiring in cybersecurity</p><p>31:20 - The value of diverse backgrounds and soft skills in solving security challenges</p><p>40:43 - The importance of empathy and listening in leadership</p><p>42:16 - Closing thoughts on security as an enabling function for business success</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<h2>Episode Summary</h2><p>In this episode of Secured, host Cole Cornford chats with Laura O'Neill from Fujitsu Cyber. Laura shares her journey from a pure maths and cryptography background through management consulting into the world of cybersecurity. She explains how she helped grow MF&amp;A from a small team into a 70-person company before its acquisition by Fujitsu. Cole and Laura discuss the challenges of scaling a cyber practice, the importance of professionalising sales and board-level communications, and how embracing diverse, non-traditional talent can transform the industry. Their conversation offers valuable insights into shifting from a compliance-based mindset to a risk-based strategy that truly supports business objectives.</p><h2>Timestamps</h2><p>00:10 - Introduction to Laura O'Neill and her role at Fujitsu Cyber</p><p>02:27 - Laura recounts her journey from pure maths and cryptography to cybersecurity</p><p>05:31 - Discussing the rapid growth of MF&amp;A from a small team to 70 staff</p><p>07:30 - Overcoming scaling challenges through improved processes and support</p><p>11:23 - Professionalising sales and board-level communications in cyber</p><p>15:30 - Moving from a compliance-driven approach to a risk-based strategy</p><p>26:16 - Embracing diversity and non-traditional hiring in cybersecurity</p><p>31:20 - The value of diverse backgrounds and soft skills in solving security challenges</p><p>40:43 - The importance of empathy and listening in leadership</p><p>42:16 - Closing thoughts on security as an enabling function for business success</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts]]></link><guid isPermaLink="false">a94a2e44-0a1b-4a2c-8986-6b24185282ab</guid><itunes:image href="https://artwork.captivate.fm/c54c3645-2571-4243-b99c-8bc03ba9fc93/ew56wHV86EjDJ04A44qEOhpl.jpg"/><pubDate>Thu, 03 Apr 2025 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/90d20d09-8464-4b33-95e1-f1dcfcb9c4b1/Laura-Oniell-SP.mp3" length="63697049" type="audio/mpeg"/><itunes:duration>44:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>49</itunes:episode><podcast:episode>49</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/7ead3615-6df9-4d65-94e8-e165382eacf1/index.html" type="text/html"/></item><item><title>Balancing Compliance and Risk: Kat McCrabb on Cybersecurity for Mission-Driven Organisations</title><itunes:title>Balancing Compliance and Risk: Kat McCrabb on Cybersecurity for Mission-Driven Organisations</itunes:title><description><![CDATA[<h2>Episode Summary</h2><p>Cole Cornford speaks with Kat McCrabb, founder of Flame Tree Cyber, about navigating cybersecurity compliance and risk, particularly within education, government, and mission-driven organisations. Kat shares insights from her experience in federal government and as CISO at Brisbane Catholic Education, highlighting the strengths and weaknesses of compliance frameworks like Australia's Essential Eight and MITRE ATT&amp;CK. The conversation covers how to effectively communicate cyber risks to stakeholders, align security with organisational priorities, and why prevention beats incident response every time. Kat also discusses strategies for meaningful conversations around funding and shares her perspective on the evolving landscape of security in the age of SaaS and cloud technologies.</p><h2>Timestamps</h2><p>00:59 - Kat’s background and founding Flame Tree Cyber</p><p>03:10 - Defining mission-driven organisations</p><p>04:29 - Challenges of prescriptive compliance frameworks (ISM, Essential Eight, DISP)</p><p>05:41 - Compliance vs meaningful security improvement</p><p>06:51 - How threat modelling with MITRE ATT&amp;CK helps allocate resources</p><p>07:35 - Balancing foundational cybersecurity and advanced threat intelligence</p><p>08:52 - Incident response and the value of understanding threat actors</p><p>11:46 - Allocating budget and demonstrating security value to executives</p><p>16:31 - How to effectively request security funding from the board</p><p>20:00 - Relevance of Essential Eight in modern SaaS environments</p><p>29:21 - Kat’s role with AISA and building the cybersecurity community in Queensland</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<h2>Episode Summary</h2><p>Cole Cornford speaks with Kat McCrabb, founder of Flame Tree Cyber, about navigating cybersecurity compliance and risk, particularly within education, government, and mission-driven organisations. Kat shares insights from her experience in federal government and as CISO at Brisbane Catholic Education, highlighting the strengths and weaknesses of compliance frameworks like Australia's Essential Eight and MITRE ATT&amp;CK. The conversation covers how to effectively communicate cyber risks to stakeholders, align security with organisational priorities, and why prevention beats incident response every time. Kat also discusses strategies for meaningful conversations around funding and shares her perspective on the evolving landscape of security in the age of SaaS and cloud technologies.</p><h2>Timestamps</h2><p>00:59 - Kat’s background and founding Flame Tree Cyber</p><p>03:10 - Defining mission-driven organisations</p><p>04:29 - Challenges of prescriptive compliance frameworks (ISM, Essential Eight, DISP)</p><p>05:41 - Compliance vs meaningful security improvement</p><p>06:51 - How threat modelling with MITRE ATT&amp;CK helps allocate resources</p><p>07:35 - Balancing foundational cybersecurity and advanced threat intelligence</p><p>08:52 - Incident response and the value of understanding threat actors</p><p>11:46 - Allocating budget and demonstrating security value to executives</p><p>16:31 - How to effectively request security funding from the board</p><p>20:00 - Relevance of Essential Eight in modern SaaS environments</p><p>29:21 - Kat’s role with AISA and building the cybersecurity community in Queensland</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts]]></link><guid isPermaLink="false">9c24646d-4a6c-46b3-a576-cc8cce861328</guid><itunes:image href="https://artwork.captivate.fm/28e6da57-dde5-499d-8947-8e1fbb2b2a26/HXyGbRiUVmGKfK6Op1mOAtss.jpg"/><pubDate>Thu, 20 Mar 2025 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/cf5e3154-927a-4857-9311-d0f79705fcf6/Kat-McCrabb-SP.mp3" length="48022325" type="audio/mpeg"/><itunes:duration>33:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>48</itunes:episode><podcast:episode>48</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/68d9087d-1399-4d46-ad1f-b803c41c0623/index.html" type="text/html"/></item><item><title>Breaking into Cyber: Kiera Farrell on Growth, Networking &amp; Early-Career Lessons</title><itunes:title>Breaking into Cyber: Kiera Farrell on Growth, Networking &amp; Early-Career Lessons</itunes:title><description><![CDATA[<h2>Episode Summary</h2><p>Kiera Farrell, Cyber Analyst at David Jones, shares her journey from studying a Bachelor of Cybersecurity to landing a role in cybersecurity operations. She reflects on the challenges of breaking into the industry, the lessons learned from risk management, and the importance of networking in career growth. Kiera and Cole discuss the value of stepping outside your comfort zone, the evolving landscape of cybersecurity degrees, and what hiring managers can do to attract and retain young talent. If you're an aspiring cybersecurity professional or a leader looking to support early-career hires, this episode is packed with insights.</p><h2>Timestamps</h2><p><strong>2:00</strong> – Kiera’s journey: From Bachelor of Cybersecurity to David Jones</p><p><strong>5:00</strong> – What studying cybersecurity is really like</p><p><strong>8:10</strong> – The surprising importance of risk management</p><p><strong>12:00</strong> – Ethical hacking &amp; the role of security education</p><p><strong>16:30</strong> – The grad job hunt: what works, what doesn’t</p><p><strong>19:45</strong> – The power of stepping out of your comfort zone</p><p><strong>21:30</strong> – Building a strong professional network</p><p><strong>23:50</strong> – What makes an employer attractive for graduates?</p><p><strong>26:40</strong> – How mentorship accelerates career growth</p><p><strong>30:35</strong> – Advice for students and early-career professionals</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<h2>Episode Summary</h2><p>Kiera Farrell, Cyber Analyst at David Jones, shares her journey from studying a Bachelor of Cybersecurity to landing a role in cybersecurity operations. She reflects on the challenges of breaking into the industry, the lessons learned from risk management, and the importance of networking in career growth. Kiera and Cole discuss the value of stepping outside your comfort zone, the evolving landscape of cybersecurity degrees, and what hiring managers can do to attract and retain young talent. If you're an aspiring cybersecurity professional or a leader looking to support early-career hires, this episode is packed with insights.</p><h2>Timestamps</h2><p><strong>2:00</strong> – Kiera’s journey: From Bachelor of Cybersecurity to David Jones</p><p><strong>5:00</strong> – What studying cybersecurity is really like</p><p><strong>8:10</strong> – The surprising importance of risk management</p><p><strong>12:00</strong> – Ethical hacking &amp; the role of security education</p><p><strong>16:30</strong> – The grad job hunt: what works, what doesn’t</p><p><strong>19:45</strong> – The power of stepping out of your comfort zone</p><p><strong>21:30</strong> – Building a strong professional network</p><p><strong>23:50</strong> – What makes an employer attractive for graduates?</p><p><strong>26:40</strong> – How mentorship accelerates career growth</p><p><strong>30:35</strong> – Advice for students and early-career professionals</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts]]></link><guid isPermaLink="false">52aa9c1f-d6a2-4f39-b6d1-87742863c364</guid><itunes:image href="https://artwork.captivate.fm/c4d3e441-7ee0-427e-81f6-97e2cb112395/NC8Ch4JPDqyHABbz5BQaf2WX.jpg"/><pubDate>Thu, 06 Mar 2025 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/cdd563eb-d92a-4df3-8b47-51bd123e467b/Kiera-Farrell-SC-01.mp3" length="50955772" type="audio/mpeg"/><itunes:duration>35:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>47</itunes:episode><podcast:episode>47</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/1988ecc9-35aa-47e6-92e3-181e2f80b758/index.html" type="text/html"/></item><item><title>The Story So Far: Inside Secured’s Growth and What’s Coming Next</title><itunes:title>The Story So Far: Inside Secured’s Growth and What’s Coming Next</itunes:title><description><![CDATA[<h2>Episode Summary</h2><p>In this special solo episode, host Cole Cornford reflects on the journey of the&nbsp;<em>Secured</em>&nbsp;podcast over the past two years. He shares behind-the-scenes insights, from the unexpected challenges of cicada season disrupting recordings to the podcast’s growth, hitting 45 episodes and over 7,000 downloads. Cole discusses listener feedback, format changes, and his plans to expand the show, including moving to weekly episodes, introducing video content, and diversifying guest profiles. He also highlights listener engagement stats, the importance of audience reviews, and the future direction of&nbsp;<em>Secured</em>&nbsp;with a focus on delivering more valuable and dynamic cybersecurity content.</p><h2>Timestamps</h2><p>00:20 – The impact of cicada season on recording and production</p><p>01:10 – Hitting 45 episodes: reflections on the podcast’s growth</p><p>01:54 – Asking for listener feedback and reviews to support the show</p><p>02:51 – Plans to move to weekly episodes and potential sponsorships</p><p>03:51 – The possibility of introducing video content and its challenges</p><p>04:35 – Listener engagement stats: unique listeners, downloads, and demographics</p><p>08:05 – Most downloaded and highest engagement episodes revealed</p><p>10:55 – Diversity in guests and topics: striving for representation</p><p>13:48 – Changes in podcast format: cutting certain segments for better engagement</p><p>17:03 – The shift towards professional development-focused content</p><p>19:50 – Future goals: more international guests and sharper conversations</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<h2>Episode Summary</h2><p>In this special solo episode, host Cole Cornford reflects on the journey of the&nbsp;<em>Secured</em>&nbsp;podcast over the past two years. He shares behind-the-scenes insights, from the unexpected challenges of cicada season disrupting recordings to the podcast’s growth, hitting 45 episodes and over 7,000 downloads. Cole discusses listener feedback, format changes, and his plans to expand the show, including moving to weekly episodes, introducing video content, and diversifying guest profiles. He also highlights listener engagement stats, the importance of audience reviews, and the future direction of&nbsp;<em>Secured</em>&nbsp;with a focus on delivering more valuable and dynamic cybersecurity content.</p><h2>Timestamps</h2><p>00:20 – The impact of cicada season on recording and production</p><p>01:10 – Hitting 45 episodes: reflections on the podcast’s growth</p><p>01:54 – Asking for listener feedback and reviews to support the show</p><p>02:51 – Plans to move to weekly episodes and potential sponsorships</p><p>03:51 – The possibility of introducing video content and its challenges</p><p>04:35 – Listener engagement stats: unique listeners, downloads, and demographics</p><p>08:05 – Most downloaded and highest engagement episodes revealed</p><p>10:55 – Diversity in guests and topics: striving for representation</p><p>13:48 – Changes in podcast format: cutting certain segments for better engagement</p><p>17:03 – The shift towards professional development-focused content</p><p>19:50 – Future goals: more international guests and sharper conversations</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts]]></link><guid isPermaLink="false">20be3001-76b9-4449-a0c9-ecc6f1f26b4c</guid><itunes:image href="https://artwork.captivate.fm/d642446f-2da9-489e-8778-a252f578eec4/F-Kc106vDKikDEBqw0nhP0ze.jpg"/><pubDate>Thu, 13 Feb 2025 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/be06ff7f-3dd4-4193-9171-343d15de86f6/BTS-with-Cole-SP.mp3" length="34602074" type="audio/mpeg"/><itunes:duration>24:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>46</itunes:episode><podcast:episode>46</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/59baf658-b299-4cde-bb14-4aec9e087fec/index.html" type="text/html"/></item><item><title>Gaming Her Way to the Top: Madhuri Nandi on Security &amp; Diversity</title><itunes:title>Gaming Her Way to the Top: Madhuri Nandi on Security &amp; Diversity</itunes:title><description><![CDATA[<h2>Episode Summary</h2><p>Madhuri Nandi is the Head of Security at Till Payments and a trailblazer in the Australian cybersecurity industry. As co-chair of the Australian Women’s Security Network, she brings decades of experience to the table, breaking barriers for women in tech and redefining what leadership looks like in cybersecurity. Madhuri shares how a love for gaming and cheat codes sparked her journey into application security and the cultural challenges she overcame to thrive in a male-dominated industry. They explore the realities of leading security functions in scaling FinTechs, why compliance doesn’t equate to security, and the critical role of aligning cybersecurity strategies with business objectives.</p><h2>Timestamps</h2><p>01:13 Cheat Codes Ignite a Cybersecurity Path</p><p>02:26 From Database Admin to Security Professional</p><p>05:09 Lessons from Gaming &amp; Early Misperceptions</p><p>07:29 The Jump into Executive Leadership</p><p>10:53 Compliance vs. True Risk Management</p><p>18:45 Overcoming Cultural &amp; Workplace Hurdles</p><p>31:55 Diversity, Women in Tech &amp; Final Reflection</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<h2>Episode Summary</h2><p>Madhuri Nandi is the Head of Security at Till Payments and a trailblazer in the Australian cybersecurity industry. As co-chair of the Australian Women’s Security Network, she brings decades of experience to the table, breaking barriers for women in tech and redefining what leadership looks like in cybersecurity. Madhuri shares how a love for gaming and cheat codes sparked her journey into application security and the cultural challenges she overcame to thrive in a male-dominated industry. They explore the realities of leading security functions in scaling FinTechs, why compliance doesn’t equate to security, and the critical role of aligning cybersecurity strategies with business objectives.</p><h2>Timestamps</h2><p>01:13 Cheat Codes Ignite a Cybersecurity Path</p><p>02:26 From Database Admin to Security Professional</p><p>05:09 Lessons from Gaming &amp; Early Misperceptions</p><p>07:29 The Jump into Executive Leadership</p><p>10:53 Compliance vs. True Risk Management</p><p>18:45 Overcoming Cultural &amp; Workplace Hurdles</p><p>31:55 Diversity, Women in Tech &amp; Final Reflection</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://www.galahcyber.com.au/podcasts/]]></link><guid isPermaLink="false">2240378c-20e2-4a5e-b10f-82a2cf7b85d5</guid><itunes:image href="https://artwork.captivate.fm/e4d985a6-3548-4b81-927e-8cef27701a76/Cy_Xx4ZZu03coOqKvrvPPh5v.jpg"/><pubDate>Thu, 23 Jan 2025 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/f3af6c50-348f-4423-9a58-f45ffc34c00b/Madhuri-Nandi-Audio-SP-01.mp3" length="53353813" type="audio/mpeg"/><itunes:duration>37:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>45</itunes:episode><podcast:episode>45</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/9b48a843-7c7e-4dce-951b-39db1ff25213/index.html" type="text/html"/></item><item><title>Empowering Developers, Elevating Security: Neha Malik on Building an AppSec Culture</title><itunes:title>Empowering Developers, Elevating Security: Neha Malik on Building an AppSec Culture</itunes:title><description><![CDATA[<h2>Episode Summary</h2><p>In this episode of Secured, host Cole Cornford chats with Neha Malik, Head of Product Security at REA Group, about building and scaling effective application security (AppSec) programs. They delve into the importance of empathy, communication, and relationship-building between security teams and developers. Neha shares her journey from a Microsoft graduate program, through external consulting at KPMG, and into her current leadership role. They discuss making security easy for engineers, managing security champions programs with realistic expectations, and learning from other disciplines—like psychology and marketing—to better influence and engage stakeholders. Neha and Cole also highlight how tailoring approach and tooling can differ for startups and large enterprises, and emphasise that collaboration, not confrontation, leads to long-term AppSec success.</p><h2>Timestamps</h2><p>00:20 - Neha’s Role at REA Group and Positive AppSec Outcomes</p><p>01:30 - Starting a Career in Security at Microsoft’s Grad Program</p><p>05:45 - Building an AppSec Program from Scratch at REA</p><p>10:00 - Startups: Embedding Security in Tools Over Heavy Process</p><p>14:40 - Security Champions Programs: Value, Expectations, and Incentives</p><p>20:25 - Learning from Other Disciplines (e.g., Psychology) to Influence Teams</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<h2>Episode Summary</h2><p>In this episode of Secured, host Cole Cornford chats with Neha Malik, Head of Product Security at REA Group, about building and scaling effective application security (AppSec) programs. They delve into the importance of empathy, communication, and relationship-building between security teams and developers. Neha shares her journey from a Microsoft graduate program, through external consulting at KPMG, and into her current leadership role. They discuss making security easy for engineers, managing security champions programs with realistic expectations, and learning from other disciplines—like psychology and marketing—to better influence and engage stakeholders. Neha and Cole also highlight how tailoring approach and tooling can differ for startups and large enterprises, and emphasise that collaboration, not confrontation, leads to long-term AppSec success.</p><h2>Timestamps</h2><p>00:20 - Neha’s Role at REA Group and Positive AppSec Outcomes</p><p>01:30 - Starting a Career in Security at Microsoft’s Grad Program</p><p>05:45 - Building an AppSec Program from Scratch at REA</p><p>10:00 - Startups: Embedding Security in Tools Over Heavy Process</p><p>14:40 - Security Champions Programs: Value, Expectations, and Incentives</p><p>20:25 - Learning from Other Disciplines (e.g., Psychology) to Influence Teams</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://www.galahcyber.com.au/podcasts/]]></link><guid isPermaLink="false">9e9a047d-35e8-4d79-87c8-440370b4dac1</guid><itunes:image href="https://artwork.captivate.fm/dc94bc19-c3d3-43af-94dd-ab90b7f71276/rd41_bPkGrP2m8-3_ES8m1kY.jpg"/><pubDate>Thu, 09 Jan 2025 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/6ba235ff-9125-406f-8857-e3d657f7d976/Neha-Malik-Secured.mp3" length="52481114" type="audio/mpeg"/><itunes:duration>36:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>44</itunes:episode><podcast:episode>44</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/74990b2a-5594-4565-b9f8-d96dcae3cd99/index.html" type="text/html"/></item><item><title>The Secured Christmas Special | Your Questions Answered</title><itunes:title>The Secured Christmas Special | Your Questions Answered</itunes:title><description><![CDATA[<h2>Episode Summary</h2><p>In this special christmas episode of Secured, Cole Cornford does something a little different to usual and answers listener questions. Lots of topics are covered, including new years resolutions, cybersecurity trends of 2024, career and life advice, and plenty more.&nbsp;</p><p>A huge thank you to everyone who sent in questions! We had so many responses&nbsp;that we weren't able to get to all of them. Let us know if you enjoy this format and we may do it again in the future.</p><h2>Timestamps</h2><p>1:00 - Cole's thoughts on new year's resolutions&nbsp;</p><p>3:00 - Cole's experiences working in large organisations</p><p>13:30 - Critical cybersecurity steps for organisations in 2025</p><p>20:30 - Using security tools to protect APIs</p><p>26:20 - Protecting against supply chain attacks</p><p>36:20 - Cole's perspective on DevSecOps</p><p>40:50 - Trends of 2024</p><p>50:40 - Diversity in the cybersecurity industry&nbsp;</p><p>1:01:02 - ASPM tools</p><p>1:13:20 - Why Cole enjoys making the podcast</p><p>1:21:00 - Life advice that has stayed with Cole</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<h2>Episode Summary</h2><p>In this special christmas episode of Secured, Cole Cornford does something a little different to usual and answers listener questions. Lots of topics are covered, including new years resolutions, cybersecurity trends of 2024, career and life advice, and plenty more.&nbsp;</p><p>A huge thank you to everyone who sent in questions! We had so many responses&nbsp;that we weren't able to get to all of them. Let us know if you enjoy this format and we may do it again in the future.</p><h2>Timestamps</h2><p>1:00 - Cole's thoughts on new year's resolutions&nbsp;</p><p>3:00 - Cole's experiences working in large organisations</p><p>13:30 - Critical cybersecurity steps for organisations in 2025</p><p>20:30 - Using security tools to protect APIs</p><p>26:20 - Protecting against supply chain attacks</p><p>36:20 - Cole's perspective on DevSecOps</p><p>40:50 - Trends of 2024</p><p>50:40 - Diversity in the cybersecurity industry&nbsp;</p><p>1:01:02 - ASPM tools</p><p>1:13:20 - Why Cole enjoys making the podcast</p><p>1:21:00 - Life advice that has stayed with Cole</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts/]]></link><guid isPermaLink="false">3a1332fd-170d-4dd0-bd86-021802188fe6</guid><itunes:image href="https://artwork.captivate.fm/84b18d96-00ae-4d08-b552-477d99c719d1/1lsrlY4l0km2h7d6nIpFC4aY.jpg"/><pubDate>Thu, 19 Dec 2024 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/7ed5e925-6409-4a71-a68d-8d1b240b50bc/Christmas-Special-Audio-SP-01.mp3" length="135633097" type="audio/mpeg"/><itunes:duration>01:34:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>43</itunes:episode><podcast:episode>43</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/0f24040d-9371-4068-a1c2-4e1fffa7f2ca/index.html" type="text/html"/></item><item><title>Leading the Digital Front: Military Lessons in Cybersecurity with Elizabeth Stephens</title><itunes:title>Leading the Digital Front: Military Lessons in Cybersecurity with Elizabeth Stephens</itunes:title><description><![CDATA[<p><strong>Episode Summary</strong></p><p>Elizabeth Stephens is CEO of DBS Cyber, where her team deliver&nbsp;IT solutions for clients in various industries. A retired Marine Corps Major and author of the book Building a Resilient Digital Future: A Comprehensive Guide to Cyber Risk Monitoring, Elizabeth draws from her diverse&nbsp;experience in her work. In her conversation with Cole Cornford, they discuss leveraging AI to be helpful and not harmful the politics and nuance of cybersecurity, lessons from Elizabeth's military experience that she applies to her current role, and plenty more.</p><h2><strong>Timestamps</strong></h2><p>1:00 - Elizabeth's background</p><p>7:30 - How we can leverage AI to be useful not harmful</p><p>14:30 - Using AI to help with parenting</p><p>20:30 - The politics &amp; nuance of cybersecurity</p><p>23:30 - Roblox &amp; cybersecurity for kids</p><p>27:00 - Lessons from the military Elizabeth applies to cybersecurity</p><p>30:30 - Elizabeth's journey as an author</p><p>36:30 - Cybersecurity for small business</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p><strong>Episode Summary</strong></p><p>Elizabeth Stephens is CEO of DBS Cyber, where her team deliver&nbsp;IT solutions for clients in various industries. A retired Marine Corps Major and author of the book Building a Resilient Digital Future: A Comprehensive Guide to Cyber Risk Monitoring, Elizabeth draws from her diverse&nbsp;experience in her work. In her conversation with Cole Cornford, they discuss leveraging AI to be helpful and not harmful the politics and nuance of cybersecurity, lessons from Elizabeth's military experience that she applies to her current role, and plenty more.</p><h2><strong>Timestamps</strong></h2><p>1:00 - Elizabeth's background</p><p>7:30 - How we can leverage AI to be useful not harmful</p><p>14:30 - Using AI to help with parenting</p><p>20:30 - The politics &amp; nuance of cybersecurity</p><p>23:30 - Roblox &amp; cybersecurity for kids</p><p>27:00 - Lessons from the military Elizabeth applies to cybersecurity</p><p>30:30 - Elizabeth's journey as an author</p><p>36:30 - Cybersecurity for small business</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts/]]></link><guid isPermaLink="false">4003e5f3-de83-46fa-9094-3c5f379e688f</guid><itunes:image href="https://artwork.captivate.fm/719f3b80-419d-4ad1-b18c-5d9593feedfe/fE4e7eqMKYF9hiIcUtnAUn-J.jpg"/><pubDate>Thu, 05 Dec 2024 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/f93abb7e-2bc5-4eda-b066-55b5034365bc/Elizabeth-Stephens-Audio-Secured-01.mp3" length="60917829" type="audio/mpeg"/><itunes:duration>42:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>42</itunes:episode><podcast:episode>42</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/b1a82002-2d54-452e-ba74-a8b1d1ff01d9/index.html" type="text/html"/></item><item><title>Navigating the PSPF 2024 Updates: Expert Insights with Kat McCrabb and Toby Amodio</title><itunes:title>Navigating the PSPF 2024 Updates: Expert Insights with Kat McCrabb and Toby Amodio</itunes:title><description><![CDATA[<h2>Episode Summary</h2><p>In this episode, Cole Cornford is joined by cybersecurity experts and IRAP assessors, Kat McCrabb and Toby Amodio, to unpack the latest updates to the Protective Security Policy Framework (PSPF) for 2024. They explore the significant changes introduced in the PSPF, such as the heightened emphasis on IRAP assessments, the potential strain on resources due to increased demand for assessors, and the impact on government agencies' compliance efforts. The discussion delves into the restructuring of the PSPF domains, including the separation of information and technology, and the challenges this presents for reporting and governance. They also address issues with self-attestation in agencies, insights from ANAO reports, and the critical importance of managing legacy IT systems. Kat and Toby offer valuable perspectives and practical advice for organisations navigating these new requirements, highlighting the need for proactive planning and adaptation in the evolving cybersecurity landscape.</p><h2>Timestamps</h2><p>01:27 - What is the PSPF? Toby explains the framework</p><p>03:07 - Kat discusses the biggest changes in the PSPF 2024 updates</p><p>04:20 - Challenges with IRAP assessments: time, cost, and limited assessors</p><p>06:18 - When are IRAP assessments required? Clarifications</p><p>08:13 - Changes in PSPF domains: splitting information and technology</p><p>10:08 - Implications of the changes for reporting and governance</p><p>12:15 - Comparison with NIST framework and governance considerations</p><p>13:38 - Issues with self-attestation and insights from ANAO reports</p><p>15:09 - Strategies for improving reporting and assessments in agencies</p><p>17:36 - Managing legacy IT systems under the new PSPF requirements</p><p>18:52 - Key takeaways and final thoughts from Kat and Toby</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<h2>Episode Summary</h2><p>In this episode, Cole Cornford is joined by cybersecurity experts and IRAP assessors, Kat McCrabb and Toby Amodio, to unpack the latest updates to the Protective Security Policy Framework (PSPF) for 2024. They explore the significant changes introduced in the PSPF, such as the heightened emphasis on IRAP assessments, the potential strain on resources due to increased demand for assessors, and the impact on government agencies' compliance efforts. The discussion delves into the restructuring of the PSPF domains, including the separation of information and technology, and the challenges this presents for reporting and governance. They also address issues with self-attestation in agencies, insights from ANAO reports, and the critical importance of managing legacy IT systems. Kat and Toby offer valuable perspectives and practical advice for organisations navigating these new requirements, highlighting the need for proactive planning and adaptation in the evolving cybersecurity landscape.</p><h2>Timestamps</h2><p>01:27 - What is the PSPF? Toby explains the framework</p><p>03:07 - Kat discusses the biggest changes in the PSPF 2024 updates</p><p>04:20 - Challenges with IRAP assessments: time, cost, and limited assessors</p><p>06:18 - When are IRAP assessments required? Clarifications</p><p>08:13 - Changes in PSPF domains: splitting information and technology</p><p>10:08 - Implications of the changes for reporting and governance</p><p>12:15 - Comparison with NIST framework and governance considerations</p><p>13:38 - Issues with self-attestation and insights from ANAO reports</p><p>15:09 - Strategies for improving reporting and assessments in agencies</p><p>17:36 - Managing legacy IT systems under the new PSPF requirements</p><p>18:52 - Key takeaways and final thoughts from Kat and Toby</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts/karissa-breen]]></link><guid isPermaLink="false">467da031-2dde-4a3d-bf1e-d08800638010</guid><itunes:image href="https://artwork.captivate.fm/c339012d-38de-4923-a83a-ca252b0d419f/yxmZBgZ7_G3daVlqQyY7m39f.jpg"/><pubDate>Thu, 21 Nov 2024 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/2a0f7e39-68df-4f05-b6c7-713739131cac/Toby-Amodio-Kat-McCrabb-Secured.mp3" length="31644804" type="audio/mpeg"/><itunes:duration>21:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>41</itunes:episode><podcast:episode>41</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/66dd2edf-eca4-4484-a1f3-4c2e41e269ec/index.html" type="text/html"/></item><item><title>Securing the API Frontier: Insights from Anand Rai on Modern Cybersecurity Challenges</title><itunes:title>Securing the API Frontier: Insights from Anand Rai on Modern Cybersecurity Challenges</itunes:title><description><![CDATA[<h2>Episode Summary</h2><p>In this episode, Cole Cornford speaks with Anand, an API security expert at Traceable AI with over 18 years of experience in crafting innovative IT solutions. Anand's expertise spans API design, microservices architecture, cloud technologies like Kubernetes and AWS, and security architecture including IAM and OAuth. Together, they delve into the critical importance of API security in today's digital landscape, discussing why traditional web security measures are insufficient, lessons learned from incidents like the Optus breach, the challenges of managing API inventories, and how AI and machine learning can enhance security practices. Anand also shares his experience writing a book during the pandemic and the value of continuous learning. This episode is packed with insights on modern application development, cybersecurity, and plenty more.</p><h2>Timestamps</h2><p>4:20 - Understanding API security challenges</p><p>9:30 - The role of AI in API security</p><p>16:55 - The importance of API inventory management</p><p>24:00 - The business impact of API security</p><p>28:00 - Cole &amp; Anand discuss books &amp; writing</p><p>34:00 - Current state of API security in Australia</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<h2>Episode Summary</h2><p>In this episode, Cole Cornford speaks with Anand, an API security expert at Traceable AI with over 18 years of experience in crafting innovative IT solutions. Anand's expertise spans API design, microservices architecture, cloud technologies like Kubernetes and AWS, and security architecture including IAM and OAuth. Together, they delve into the critical importance of API security in today's digital landscape, discussing why traditional web security measures are insufficient, lessons learned from incidents like the Optus breach, the challenges of managing API inventories, and how AI and machine learning can enhance security practices. Anand also shares his experience writing a book during the pandemic and the value of continuous learning. This episode is packed with insights on modern application development, cybersecurity, and plenty more.</p><h2>Timestamps</h2><p>4:20 - Understanding API security challenges</p><p>9:30 - The role of AI in API security</p><p>16:55 - The importance of API inventory management</p><p>24:00 - The business impact of API security</p><p>28:00 - Cole &amp; Anand discuss books &amp; writing</p><p>34:00 - Current state of API security in Australia</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts]]></link><guid isPermaLink="false">12b07da8-b2e3-4bcf-9faf-38a9a0bed4e6</guid><itunes:image href="https://artwork.captivate.fm/793bb03b-9fcf-461c-ade7-8f3f037d73fe/maGGZ6bLFa4k_em6rE7-YC6D.jpg"/><pubDate>Thu, 07 Nov 2024 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/fd496575-1e6e-45e1-9a84-5df07655a8c0/Anand-Rai-Secured-Audio-02.mp3" length="58591369" type="audio/mpeg"/><itunes:duration>40:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>40</itunes:episode><podcast:episode>40</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/4a083ba0-5e6a-49c7-91ae-f4f97fea5479/index.html" type="text/html"/></item><item><title>Secure Robotics: Exploring Safety, Trust, and Cybersecurity with Prof. Damith Herath and Adam Haskard</title><itunes:title>Secure Robotics: Exploring Safety, Trust, and Cybersecurity with Prof. Damith Herath and Adam Haskard</itunes:title><description><![CDATA[<h2>Episode Summary</h2><p>In this episode, Cole Cornford speaks to two guests on the topic of robotics: Damith Herath, a Professor at the University of Canberra, and&nbsp;Adam Haskard, co-founder and Director of&nbsp;Bluerydge, a Canberra-based cybersecurity and technology firm. Together, Damith and Adam are conducting research into Secure Robotics, an emerging field of study that addresses the intersection of robotic safety, trust, and cybersecurity. In their conversation with Cole, they discuss the growth opportunities for robotics, how someone interested in the field could pursue a career in robotics, potential risks of the common household vacuum robots, and plenty more.</p><h2>Timestamps</h2><p>2:00 - Robotics: definitions &amp; applications</p><p>8:45 - The intersection of robotics &amp; cybersecurity</p><p>10:00 - Trust &amp; safety in robotics &amp; cyber</p><p>15:00 - Emerging risks in robotics</p><p>18:40 - The role of cybersecurity in robotics</p><p>20:30 - Regulation and innovation in robotics</p><p>40:00 - Growth opportunities for robotics</p><p>29:00 - Future of robotics &amp; AI</p><p>32:00 - Career pathways into robotics</p><p>39:00 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<h2>Episode Summary</h2><p>In this episode, Cole Cornford speaks to two guests on the topic of robotics: Damith Herath, a Professor at the University of Canberra, and&nbsp;Adam Haskard, co-founder and Director of&nbsp;Bluerydge, a Canberra-based cybersecurity and technology firm. Together, Damith and Adam are conducting research into Secure Robotics, an emerging field of study that addresses the intersection of robotic safety, trust, and cybersecurity. In their conversation with Cole, they discuss the growth opportunities for robotics, how someone interested in the field could pursue a career in robotics, potential risks of the common household vacuum robots, and plenty more.</p><h2>Timestamps</h2><p>2:00 - Robotics: definitions &amp; applications</p><p>8:45 - The intersection of robotics &amp; cybersecurity</p><p>10:00 - Trust &amp; safety in robotics &amp; cyber</p><p>15:00 - Emerging risks in robotics</p><p>18:40 - The role of cybersecurity in robotics</p><p>20:30 - Regulation and innovation in robotics</p><p>40:00 - Growth opportunities for robotics</p><p>29:00 - Future of robotics &amp; AI</p><p>32:00 - Career pathways into robotics</p><p>39:00 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://www.galahcyber.com.au/podcasts/]]></link><guid isPermaLink="false">1b6d58ae-b551-443d-b1de-90eed1072886</guid><itunes:image href="https://artwork.captivate.fm/68d487ba-12ba-4aec-ad6b-09d61307233d/a6hZorP3_G5b1TJjl42AgLGm.jpg"/><pubDate>Thu, 24 Oct 2024 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/45f08431-759f-4aaa-afcd-3c98e68680b8/Damith-and-Adam-Secured-Audio-02.mp3" length="67172170" type="audio/mpeg"/><itunes:duration>46:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>39</itunes:episode><podcast:episode>39</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/4d8d6b29-4d5f-45d2-b39e-bf242b091e70/index.html" type="text/html"/></item><item><title>Open-Source Software: Balancing Innovation and Security with Ilkka Turunen, CTO of Sonatype</title><itunes:title>Open-Source Software: Balancing Innovation and Security with Ilkka Turunen, CTO of Sonatype</itunes:title><description><![CDATA[<h2>Episode Summary</h2><p>Ilkka Turunen is the CTO at Sonatype, a company that helps millions of software developers use open-source software while minimising security risk. In this conversation, Ilkka chats with Cole Cornford about the benefits and risk of using open-source software, how Maven helped standardise software development processes, the different approaches to AppSec regulation in Australia and Europe, and plenty more.</p><h2>Timestamps</h2><p>1:33 - Ilkka's career background</p><p>4:00 - Varying quality of open-source software</p><p>6:10 - How Maven helped standardise software development processes</p><p>13:00 - The balance between speed of delivery &amp; quality</p><p>17:00 - Importance of environment parity in software dev</p><p>21:40 - Risk of using 3rd party code in software</p><p>25:10 - Regulation of AppSec in Australia vs Europe</p><p>32:10 - How new European software security regulations will be enforced</p><p>35:00 - Recommendations for compliance with European regulations</p><p>39:00 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<h2>Episode Summary</h2><p>Ilkka Turunen is the CTO at Sonatype, a company that helps millions of software developers use open-source software while minimising security risk. In this conversation, Ilkka chats with Cole Cornford about the benefits and risk of using open-source software, how Maven helped standardise software development processes, the different approaches to AppSec regulation in Australia and Europe, and plenty more.</p><h2>Timestamps</h2><p>1:33 - Ilkka's career background</p><p>4:00 - Varying quality of open-source software</p><p>6:10 - How Maven helped standardise software development processes</p><p>13:00 - The balance between speed of delivery &amp; quality</p><p>17:00 - Importance of environment parity in software dev</p><p>21:40 - Risk of using 3rd party code in software</p><p>25:10 - Regulation of AppSec in Australia vs Europe</p><p>32:10 - How new European software security regulations will be enforced</p><p>35:00 - Recommendations for compliance with European regulations</p><p>39:00 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://www.galahcyber.com.au/podcasts/]]></link><guid isPermaLink="false">797dc65d-4a74-4e45-9ce0-689f762ccc12</guid><itunes:image href="https://artwork.captivate.fm/ae3d64a9-1673-426d-beaa-55513d7e6752/Gg__rZ8scS6wLVFB_e8uGhV0.jpg"/><pubDate>Thu, 10 Oct 2024 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/350d5961-33b9-474b-b11c-3bbaec0b414a/Ilkka-Turunen-Audio-Secured-01.mp3" length="67597862" type="audio/mpeg"/><itunes:duration>46:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>38</itunes:episode><podcast:episode>38</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/c4d97802-618e-4d89-af4e-e3f453d572f3/index.html" type="text/html"/></item><item><title>Building Cybersecurity Culture: Marketing, Awareness, and Diversity with Daisy Wong</title><itunes:title>Building Cybersecurity Culture: Marketing, Awareness, and Diversity with Daisy Wong</itunes:title><description><![CDATA[<p><strong>Summary</strong></p><p>Daisy Wong is the Head of Security Awareness at Medibank, as well as a disability advocate. Originally from a marketing background, Daisy gained experience in the cybersecurity industry working as part of penetration teams, before making her way into the security culture and awareness space.&nbsp;</p><p>In her conversation with Cole Cornford, Daisy discusses using the tools of marketing to educate people on cybersecurity, what are the hallmarks of a good security culture and awareness program, and the importance of diversity in cybersecurity.</p><p><strong>Timestamps</strong></p><p>4:00 - Daisy's transition from marketing to cybersecurity</p><p>8:10 - The importance of security culture and awareness</p><p>11:00 - Building effective security awareness programs</p><p>14:15 - The role of diversity in cybersecurity</p><p>17:00 - Strategies for inclusive hiring practices</p><p>19:40 - The power of communication in security awareness</p><p>23:20 - Creative approaches to security awareness campaigns</p><p>31:45 - Daisy's personal perspective on the importance of diversity</p><p>43:40 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p><strong>Summary</strong></p><p>Daisy Wong is the Head of Security Awareness at Medibank, as well as a disability advocate. Originally from a marketing background, Daisy gained experience in the cybersecurity industry working as part of penetration teams, before making her way into the security culture and awareness space.&nbsp;</p><p>In her conversation with Cole Cornford, Daisy discusses using the tools of marketing to educate people on cybersecurity, what are the hallmarks of a good security culture and awareness program, and the importance of diversity in cybersecurity.</p><p><strong>Timestamps</strong></p><p>4:00 - Daisy's transition from marketing to cybersecurity</p><p>8:10 - The importance of security culture and awareness</p><p>11:00 - Building effective security awareness programs</p><p>14:15 - The role of diversity in cybersecurity</p><p>17:00 - Strategies for inclusive hiring practices</p><p>19:40 - The power of communication in security awareness</p><p>23:20 - Creative approaches to security awareness campaigns</p><p>31:45 - Daisy's personal perspective on the importance of diversity</p><p>43:40 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://www.galahcyber.com.au/podcasts/]]></link><guid isPermaLink="false">c2a40f65-e96a-47fa-b527-a42e7c993dcd</guid><itunes:image href="https://artwork.captivate.fm/fa2b8ea7-786e-4d14-ad3d-7f2f4c805aa3/kMcZ_Z_E6Q98gAIltdmfIZux.jpg"/><pubDate>Thu, 03 Oct 2024 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/f547045b-b4b2-418f-a6da-cb980cd403e6/Daisy-Wong-Audio-Secured-03.mp3" length="68195961" type="audio/mpeg"/><itunes:duration>47:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>37</itunes:episode><podcast:episode>37</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/3f764e1c-5393-4624-990d-51b020a52728/index.html" type="text/html"/></item><item><title>From Physics to Cybersecurity: Antonio Deliseo’s Journey from Goldmines to Telstra</title><itunes:title>From Physics to Cybersecurity: Antonio Deliseo’s Journey from Goldmines to Telstra</itunes:title><description><![CDATA[<p><strong>Summary</strong></p><p>Antonio&nbsp;Deliseo has been in the information security industry for decades. Currently working at Telstra, Antonio has enjoyed a long and winding career path and has plenty of stories and insights to share as a result. In this conversation with Cole Cornford, Antonio discusses how he got started in his career studying physics, overseeing cybersecurity at a goldmine, how to advocate for cybersecurity within a large organisation, and plenty more.</p><p><strong>Timestamps</strong></p><p>1:40 -&nbsp;Antonio's career background</p><p>3:30 - Advantages of coming from a non technical background</p><p>8:30 - Stories from&nbsp;Antonio's early career working at a goldmine</p><p>14:00 - How&nbsp;Antonio&nbsp;moved into the GRC space</p><p>17:30 - The role a board of directors plays in cybersecurity</p><p>20:00 - Cybersecurity is less like IT, more like gambling or insurance</p><p>25:30 - Calculating the cost of a breach in dollar terms</p><p>30:30 - How to advocate for cybersecurity as a CISO</p><p>40:00 - Cybersecurity often seen as unaffordable by small businesses</p><p>42:30 - Pros &amp; cons of networked technology</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p><strong>Summary</strong></p><p>Antonio&nbsp;Deliseo has been in the information security industry for decades. Currently working at Telstra, Antonio has enjoyed a long and winding career path and has plenty of stories and insights to share as a result. In this conversation with Cole Cornford, Antonio discusses how he got started in his career studying physics, overseeing cybersecurity at a goldmine, how to advocate for cybersecurity within a large organisation, and plenty more.</p><p><strong>Timestamps</strong></p><p>1:40 -&nbsp;Antonio's career background</p><p>3:30 - Advantages of coming from a non technical background</p><p>8:30 - Stories from&nbsp;Antonio's early career working at a goldmine</p><p>14:00 - How&nbsp;Antonio&nbsp;moved into the GRC space</p><p>17:30 - The role a board of directors plays in cybersecurity</p><p>20:00 - Cybersecurity is less like IT, more like gambling or insurance</p><p>25:30 - Calculating the cost of a breach in dollar terms</p><p>30:30 - How to advocate for cybersecurity as a CISO</p><p>40:00 - Cybersecurity often seen as unaffordable by small businesses</p><p>42:30 - Pros &amp; cons of networked technology</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://www.galahcyber.com.au/podcasts/]]></link><guid isPermaLink="false">8d1c6498-12f2-471b-b2a8-c9ea5c44c064</guid><itunes:image href="https://artwork.captivate.fm/721d8fb2-2789-4579-9b74-b1fd5a0e9e5a/8c-fHzOJMgvA_PM9zjAQoOPc.jpg"/><pubDate>Thu, 12 Sep 2024 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/035b1c2e-9f23-477b-bbc4-be0a2bc7a2ba/Antonio-Deliseo-Audio-Secured-02.mp3" length="66663096" type="audio/mpeg"/><itunes:duration>46:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>36</itunes:episode><podcast:episode>36</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/08319f80-114b-47b7-9799-fac82cfe4d3c/index.html" type="text/html"/></item><item><title>Security Done Right: Ben Gittins on the Case for Generalists and Long-Term Solutions</title><itunes:title>Security Done Right: Ben Gittins on the Case for Generalists and Long-Term Solutions</itunes:title><description><![CDATA[<h2>Summary</h2><p>Ben&nbsp;Gittins&nbsp;is the Principal Security Engineer at Bugcrowd, one of the world's best bug bounty platforms.&nbsp;Ben&nbsp;has previously worked as a Senior DevSecOps Engineer at Canva, as well as DevSecOps Lead at SecureStack.&nbsp;</p><p>In this conversation with Cole Cornford,&nbsp;Ben&nbsp;shares his belief that cybersecurity needs more generalists, how coding and AppSec have changed over time, whether cybersecurity qualifications are overrated, and plenty more.</p><h2>Timestamps</h2><p>3:50 - Why is Aus cybersecurity lagging behind?&nbsp;</p><p>9:50 - Over-reliance on purchasing cybersecurity products&nbsp;</p><p>14:40 - We ask too much of our AppSec professionals&nbsp;</p><p>19:00 - How App development &amp; cybersecurity have changed over time&nbsp;</p><p>24:00 - "Greenfield projects" are often not realistic&nbsp;</p><p>28:20 - How to bring new people into the AppSec industry&nbsp;</p><p>32:00 - Importance of communication skills&nbsp;</p><p>38:20 - Cybersecurity qualifications are overrated</p><p>43:00 - Rapid fire questions&nbsp;&nbsp;</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<h2>Summary</h2><p>Ben&nbsp;Gittins&nbsp;is the Principal Security Engineer at Bugcrowd, one of the world's best bug bounty platforms.&nbsp;Ben&nbsp;has previously worked as a Senior DevSecOps Engineer at Canva, as well as DevSecOps Lead at SecureStack.&nbsp;</p><p>In this conversation with Cole Cornford,&nbsp;Ben&nbsp;shares his belief that cybersecurity needs more generalists, how coding and AppSec have changed over time, whether cybersecurity qualifications are overrated, and plenty more.</p><h2>Timestamps</h2><p>3:50 - Why is Aus cybersecurity lagging behind?&nbsp;</p><p>9:50 - Over-reliance on purchasing cybersecurity products&nbsp;</p><p>14:40 - We ask too much of our AppSec professionals&nbsp;</p><p>19:00 - How App development &amp; cybersecurity have changed over time&nbsp;</p><p>24:00 - "Greenfield projects" are often not realistic&nbsp;</p><p>28:20 - How to bring new people into the AppSec industry&nbsp;</p><p>32:00 - Importance of communication skills&nbsp;</p><p>38:20 - Cybersecurity qualifications are overrated</p><p>43:00 - Rapid fire questions&nbsp;&nbsp;</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts]]></link><guid isPermaLink="false">7f97d1aa-a8ef-4405-a507-c497e277faa3</guid><itunes:image href="https://artwork.captivate.fm/73777907-f757-4e19-88f2-17a8f2cc94fa/amvUsqYYerbrQxbUIh4MQo7H.jpg"/><pubDate>Thu, 29 Aug 2024 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/04c90764-d907-4552-bf8f-2b5cf4b96174/Ben-Gittins-AUDIO-Secured-02.mp3" length="67906316" type="audio/mpeg"/><itunes:duration>47:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>35</itunes:episode><podcast:episode>35</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/67cf90e5-2057-4f31-9968-14cf11356af6/index.html" type="text/html"/></item><item><title>AI-Driven AppSec: Shan Kulkarni on Nullify, Hiring Challenges, and the Future of Cybersecurity in Australia</title><itunes:title>AI-Driven AppSec: Shan Kulkarni on Nullify, Hiring Challenges, and the Future of Cybersecurity in Australia</itunes:title><description><![CDATA[<p><strong>Summary</strong></p><p>Shan Kulkarni is the co-founder and CEO of Nullify, a product designed to augment AppSec teams with AI agents capable of carrying out multiple levels of product security work autonomously. Prior to Nullify, Shan worked in roles such as Cloud Operations Lead at UNSW Redback Racing, and Cloud Security Engineer at CMD Solutions Australia.&nbsp;</p><p>In this conversation with Cole Cornford, Shan discusses the challenges of starting a business, and in particular the challenges of hiring, the state of AppSec in Australia, what the future might hold for the industry, and plenty more.</p><p><strong>Timestamps</strong></p><p>1:30 - Shan's career background</p><p>5:30 - Why AppSec is so often inefficient and expensive</p><p>9:00 - Bigh tech has a monopoly on AppSec talent</p><p>12:30 - Shan's journey from consultant to founding a company</p><p>15:40 - Biggest mistakes when starting a business</p><p>19:20 - Selling products/services to devs is extremely difficult</p><p>25:00 - Where Shan sees AppSec going</p><p>28:00 - Consolidation of security products</p><p>32:00 - What security leaders are struggling with: visibility</p><p>34:00 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p><strong>Summary</strong></p><p>Shan Kulkarni is the co-founder and CEO of Nullify, a product designed to augment AppSec teams with AI agents capable of carrying out multiple levels of product security work autonomously. Prior to Nullify, Shan worked in roles such as Cloud Operations Lead at UNSW Redback Racing, and Cloud Security Engineer at CMD Solutions Australia.&nbsp;</p><p>In this conversation with Cole Cornford, Shan discusses the challenges of starting a business, and in particular the challenges of hiring, the state of AppSec in Australia, what the future might hold for the industry, and plenty more.</p><p><strong>Timestamps</strong></p><p>1:30 - Shan's career background</p><p>5:30 - Why AppSec is so often inefficient and expensive</p><p>9:00 - Bigh tech has a monopoly on AppSec talent</p><p>12:30 - Shan's journey from consultant to founding a company</p><p>15:40 - Biggest mistakes when starting a business</p><p>19:20 - Selling products/services to devs is extremely difficult</p><p>25:00 - Where Shan sees AppSec going</p><p>28:00 - Consolidation of security products</p><p>32:00 - What security leaders are struggling with: visibility</p><p>34:00 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts]]></link><guid isPermaLink="false">76218517-053a-4261-9898-96db1a404e82</guid><itunes:image href="https://artwork.captivate.fm/735fe107-c745-4ea4-9116-97a1e8cc9fbe/R9A64bwJpZ4BOOypRANqTj6S.jpg"/><pubDate>Thu, 15 Aug 2024 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/534830f6-9821-4208-9fd6-4908730f9b84/Shan-Kulkarni-AUDIO-Secured-01.mp3" length="54919906" type="audio/mpeg"/><itunes:duration>38:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>34</itunes:episode><podcast:episode>34</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/a74a3e96-10b1-433a-9c94-4252d5b94acf/index.html" type="text/html"/></item><item><title>Cryptography &amp; Startups: Insights from CipherStash&apos;s Dan Draper</title><itunes:title>Cryptography &amp; Startups: Insights from CipherStash&apos;s Dan Draper</itunes:title><description><![CDATA[<p><strong>Summary</strong></p><p>Dan Draper is CEO and Founder of CipherStash, a data-storage platform that helps customers keep data secure. As well as being fascinated by Cryptography and data security, for most of Dan's career he's either been a founder or worked in the leadership team of startups, so has plenty of experience in both business and getting into the nitty gritty details of technical problems.&nbsp;</p><p>In this episode Dan chats with Cole Cornford about Cryptography, the challenges and rewards of founding a company, best practices for securing funding for a startup, and plenty more.</p><h2>Timestamps</h2><p>&nbsp;- 2:00 - Dan's career background</p><p>&nbsp;- 8:00 - Dan's lessons from working in government</p><p>&nbsp;- 9:30 - When Dan became obsessed with cryptography</p><p>&nbsp;- 12:40 - Reflecting on Dan's 1st failed business</p><p>&nbsp;- 17:10 - The founding of CipherStash</p><p>&nbsp;- 23:40 - Managing data a major challenge in large orgs</p><p>&nbsp;- 28:00 - Different types of data breaches</p><p>&nbsp;- 32:00 - Potential and limitations of AI in cybersecurity</p><p>&nbsp;- 37:00 - Experience raising money for a startup</p><p>&nbsp;- 44:10 - Dan's 3 tiers of investors</p><p>&nbsp;- 46:00 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p><strong>Summary</strong></p><p>Dan Draper is CEO and Founder of CipherStash, a data-storage platform that helps customers keep data secure. As well as being fascinated by Cryptography and data security, for most of Dan's career he's either been a founder or worked in the leadership team of startups, so has plenty of experience in both business and getting into the nitty gritty details of technical problems.&nbsp;</p><p>In this episode Dan chats with Cole Cornford about Cryptography, the challenges and rewards of founding a company, best practices for securing funding for a startup, and plenty more.</p><h2>Timestamps</h2><p>&nbsp;- 2:00 - Dan's career background</p><p>&nbsp;- 8:00 - Dan's lessons from working in government</p><p>&nbsp;- 9:30 - When Dan became obsessed with cryptography</p><p>&nbsp;- 12:40 - Reflecting on Dan's 1st failed business</p><p>&nbsp;- 17:10 - The founding of CipherStash</p><p>&nbsp;- 23:40 - Managing data a major challenge in large orgs</p><p>&nbsp;- 28:00 - Different types of data breaches</p><p>&nbsp;- 32:00 - Potential and limitations of AI in cybersecurity</p><p>&nbsp;- 37:00 - Experience raising money for a startup</p><p>&nbsp;- 44:10 - Dan's 3 tiers of investors</p><p>&nbsp;- 46:00 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://www.galahcyber.com.au/podcasts/]]></link><guid isPermaLink="false">86ac08cb-9af3-4b7b-bbfc-6d7af8808ab0</guid><itunes:image href="https://artwork.captivate.fm/acc43890-df0c-47a7-95f7-f7f733c2f7a0/3A5RnxOkPzevyYwd445tMD7U.jpg"/><pubDate>Thu, 11 Jul 2024 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/02dafed2-cd8a-4687-be1f-235aca3d520d/Dan-Draper-Audio-Secured-02.mp3" length="73237176" type="audio/mpeg"/><itunes:duration>50:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>33</itunes:episode><podcast:episode>33</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/7355953f-d865-4c45-b4bf-5b46e9c39ed3/index.html" type="text/html"/></item><item><title>Behind Elttam: Matt Jones Discusses Infosec Innovations and Australia&apos;s Cybersecurity Landscape</title><itunes:title>Behind Elttam: Matt Jones Discusses Infosec Innovations and Australia&apos;s Cybersecurity Landscape</itunes:title><description><![CDATA[<p><strong>Summary</strong></p><p>In this episode, Cole Cornford chats with Matt Jones, co-founder of Elttam, an independent security boutique that provides security assessment services. On top of his role at Elttam, Matt is active in the infosec community in a variety of ways, including helping with BSides Canberra's call for papers and writing open-source tooling such as talkback.sh. Cole and Matt chat about the motivation behind founding Elttam, why Australia's infosec industry is lagging behind other parts of the world, the exploit development space, and plenty more.</p><p><strong>Timestamps</strong></p><p>2:00 - Matt's career background</p><p>7:00 - Matt's early challenges finding an opportunity in cybersecurity</p><p>11:00 - Why Matt chose to co-found Elttam</p><p>13:00 - Cole: Australia's infosec industry is immature compared to US</p><p>19:00 - The importance of specialisation</p><p>20:30 - Better to do 1 thing really well when bootstrapping</p><p>24:00 - Using the right approach for the right context</p><p>25:30 - Risks of using a bug bounty program</p><p>31:10 - Cole: the bar for pen testing reports should be much higher</p><p>37:10 - Training &amp; education for infosec</p><p>39:00 - Cole: is infosec a cottage industry?</p><p>44:00 - Product vs service approach to cybersecurity</p><p>47:50 - Cole: I like looking at source code from 80s and 90s</p><p>49:00 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p><strong>Summary</strong></p><p>In this episode, Cole Cornford chats with Matt Jones, co-founder of Elttam, an independent security boutique that provides security assessment services. On top of his role at Elttam, Matt is active in the infosec community in a variety of ways, including helping with BSides Canberra's call for papers and writing open-source tooling such as talkback.sh. Cole and Matt chat about the motivation behind founding Elttam, why Australia's infosec industry is lagging behind other parts of the world, the exploit development space, and plenty more.</p><p><strong>Timestamps</strong></p><p>2:00 - Matt's career background</p><p>7:00 - Matt's early challenges finding an opportunity in cybersecurity</p><p>11:00 - Why Matt chose to co-found Elttam</p><p>13:00 - Cole: Australia's infosec industry is immature compared to US</p><p>19:00 - The importance of specialisation</p><p>20:30 - Better to do 1 thing really well when bootstrapping</p><p>24:00 - Using the right approach for the right context</p><p>25:30 - Risks of using a bug bounty program</p><p>31:10 - Cole: the bar for pen testing reports should be much higher</p><p>37:10 - Training &amp; education for infosec</p><p>39:00 - Cole: is infosec a cottage industry?</p><p>44:00 - Product vs service approach to cybersecurity</p><p>47:50 - Cole: I like looking at source code from 80s and 90s</p><p>49:00 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts]]></link><guid isPermaLink="false">e0308391-2a7b-4841-8e2d-29da90592d9a</guid><itunes:image href="https://artwork.captivate.fm/d4fbd40f-aa54-4df1-b39c-c4d72cd21739/nVDwzmw04k60JS0inUDgLaMm.jpg"/><pubDate>Thu, 20 Jun 2024 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/40d6b579-ccb3-4e08-9c99-0371166879d8/Matt-Jones-Audio-Secured-01.mp3" length="80095886" type="audio/mpeg"/><itunes:duration>55:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>31</itunes:episode><podcast:episode>31</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/452b6a7f-9903-4383-b8db-bf0ce461ef0a/index.html" type="text/html"/></item><item><title>Bruce Large discusses the importance of threat modelling in operational technology security</title><itunes:title>Bruce Large discusses the importance of threat modelling in operational technology security</itunes:title><description><![CDATA[<h2>Summary</h2><p>In this episode of Secured, host Cole Cornford interviews Bruce Large, a security architect and evangelist at Secolve, the OT security specialists in Australia. They discuss the importance of threat modelling in operational technology systems and the need for engineers to consider the potential for cyber attacks. Bruce also shares insights from the ISA/IEC 62443 series of standards, which provides guidelines for secure system development in OT. Additionally, they touch on the significance of unions in the tech industry and the benefits of joining organisations like Professionals Australia. Tune in for a fascinating conversation on application security and more.</p><h2>Timestamps</h2><p>1:25 - Bruce's professional background</p><p>2:40 - Defining "engineer" in different contexts</p><p>6:20 - Differences between computer engineers and civil engineers</p><p>8:20 - Threat modeling</p><p>12:40 - How we treat safety in software vs other industries</p><p>18:30 - Bruce: we should be encouraging lifelong learning</p><p>24:00 - ISA/IEC 62443 safety standard</p><p>29:00 - The Year 2038 Problem</p><p>34:20 - Unions &amp; industrial relations</p><p>43:40 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<h2>Summary</h2><p>In this episode of Secured, host Cole Cornford interviews Bruce Large, a security architect and evangelist at Secolve, the OT security specialists in Australia. They discuss the importance of threat modelling in operational technology systems and the need for engineers to consider the potential for cyber attacks. Bruce also shares insights from the ISA/IEC 62443 series of standards, which provides guidelines for secure system development in OT. Additionally, they touch on the significance of unions in the tech industry and the benefits of joining organisations like Professionals Australia. Tune in for a fascinating conversation on application security and more.</p><h2>Timestamps</h2><p>1:25 - Bruce's professional background</p><p>2:40 - Defining "engineer" in different contexts</p><p>6:20 - Differences between computer engineers and civil engineers</p><p>8:20 - Threat modeling</p><p>12:40 - How we treat safety in software vs other industries</p><p>18:30 - Bruce: we should be encouraging lifelong learning</p><p>24:00 - ISA/IEC 62443 safety standard</p><p>29:00 - The Year 2038 Problem</p><p>34:20 - Unions &amp; industrial relations</p><p>43:40 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts]]></link><guid isPermaLink="false">2b7c6d2c-f132-4597-9822-561b28d388d1</guid><itunes:image href="https://artwork.captivate.fm/3c3e0c59-b31e-41fa-b020-dc4c4a149f1e/RM6eleq3hzMfQxoGONhqRApP.jpg"/><pubDate>Thu, 23 May 2024 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/12418f87-fd92-45b8-8bb2-af996d93e8d8/Bruce-Large-Secured-02.mp3" length="70750729" type="audio/mpeg"/><itunes:duration>49:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>29</itunes:episode><podcast:episode>29</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/5e639774-f9ca-4779-89d8-ed5c1020e191/index.html" type="text/html"/></item><item><title>Australia&apos;s Cybersecurity Evolution: A Veteran&apos;s Perspective with Paul McCarty</title><itunes:title>Australia&apos;s Cybersecurity Evolution: A Veteran&apos;s Perspective with Paul McCarty</itunes:title><description><![CDATA[<p><strong>Summary</strong></p><p>Paul McCarty is CEO and founder of SecureStack, a DevSecOps visibility &amp; automation company, and GitLab's Red Team leader. Paul's been involved in software security in Australia for decades. In his conversation with Cole Cornford, Paul discusses how Australia's software security industry has changed since the early 2000's, whether security professionals aught to know how to code, and plenty more.&nbsp;</p><p><strong>Timestamps</strong></p><p>2:50 - Paul's career background</p><p>7:00 - Spicy take: people on LinkedIn are too blindly positive</p><p>10:00 - Understanding what went wrong when there's a breach</p><p>13:00 - Cole doesn't think "zero trust" is feasible</p><p>14:10 - Cole: maturity of cybersecurity in Aus is weak generally</p><p>16:00 - Cole hires for dev experience, not sec ops, because dev is harder to teach</p><p>18:30 - Aus market different to US, which has lots of software companies</p><p>21:50 - Paul: we've devalued the importance of operations</p><p>22:20 - The "holy trinity" of offensive security</p><p>26:30 - What percentage of ASX companies have a bug bounty program?</p><p>28:50 - Cole's free pizza exploit</p><p>31:00 - Got to be in security for the long haul</p><p>31:40 - The book that changed Paul's life</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p><strong>Summary</strong></p><p>Paul McCarty is CEO and founder of SecureStack, a DevSecOps visibility &amp; automation company, and GitLab's Red Team leader. Paul's been involved in software security in Australia for decades. In his conversation with Cole Cornford, Paul discusses how Australia's software security industry has changed since the early 2000's, whether security professionals aught to know how to code, and plenty more.&nbsp;</p><p><strong>Timestamps</strong></p><p>2:50 - Paul's career background</p><p>7:00 - Spicy take: people on LinkedIn are too blindly positive</p><p>10:00 - Understanding what went wrong when there's a breach</p><p>13:00 - Cole doesn't think "zero trust" is feasible</p><p>14:10 - Cole: maturity of cybersecurity in Aus is weak generally</p><p>16:00 - Cole hires for dev experience, not sec ops, because dev is harder to teach</p><p>18:30 - Aus market different to US, which has lots of software companies</p><p>21:50 - Paul: we've devalued the importance of operations</p><p>22:20 - The "holy trinity" of offensive security</p><p>26:30 - What percentage of ASX companies have a bug bounty program?</p><p>28:50 - Cole's free pizza exploit</p><p>31:00 - Got to be in security for the long haul</p><p>31:40 - The book that changed Paul's life</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts]]></link><guid isPermaLink="false">77dda277-7cb4-4475-b80a-2bc643760cdd</guid><itunes:image href="https://artwork.captivate.fm/e4766033-5dc7-4ee6-87d6-972f860bc8c8/XJ2xvMaukICDMaSA4BnH0aOh.jpg"/><pubDate>Thu, 09 May 2024 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/a09a2694-a64c-469e-906e-1cc9a1c20581/Paul-McCarty-Secured-03.mp3" length="51109129" type="audio/mpeg"/><itunes:duration>35:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>28</itunes:episode><podcast:episode>28</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/42ee658a-bc48-4f7b-9d23-29629a45245c/index.html" type="text/html"/></item><item><title>Are You Speaking the Same Cybersecurity Language as Your CEO with Jay Hira?</title><itunes:title>Are You Speaking the Same Cybersecurity Language as Your CEO with Jay Hira?</itunes:title><description><![CDATA[<p>Jay Hira is a cybersecurity director with 18 years of experience working in a variety of roles both in Australia and internationally. Today he is Director of Cyber Security: Financial Services at KPMG Australia, and Founder and Executive Director of MakeCyberSimple. In this conversation Jay and Cole Cornford avoid getting too deep into technical details, and instead discuss a zoomed out perspective on cybersecurity strategy for large organisations, how the current macroeconomic climate affects approaches&nbsp;to cybersecurity, tips for clear communication between technical and non-technical stakeholders, and plenty more.</p><p><strong>Timestamps</strong></p><p>1:40 - Advantages of generalisation vs specialisation</p><p>4:00 - Tips for communicating effectively to leaders</p><p>6:00 - Clarity comes from simplicity</p><p>9:30 - Importance of reporting structure in a large org</p><p>14:20 - Core foundations of a cyber strategy</p><p>20:00 - How current economic climate is affecting cybersecurity budgets</p><p>24:30 - How do you maintain intrinsic motivation?</p><p>27:00 - Work life balance</p><p>30:30 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p>Jay Hira is a cybersecurity director with 18 years of experience working in a variety of roles both in Australia and internationally. Today he is Director of Cyber Security: Financial Services at KPMG Australia, and Founder and Executive Director of MakeCyberSimple. In this conversation Jay and Cole Cornford avoid getting too deep into technical details, and instead discuss a zoomed out perspective on cybersecurity strategy for large organisations, how the current macroeconomic climate affects approaches&nbsp;to cybersecurity, tips for clear communication between technical and non-technical stakeholders, and plenty more.</p><p><strong>Timestamps</strong></p><p>1:40 - Advantages of generalisation vs specialisation</p><p>4:00 - Tips for communicating effectively to leaders</p><p>6:00 - Clarity comes from simplicity</p><p>9:30 - Importance of reporting structure in a large org</p><p>14:20 - Core foundations of a cyber strategy</p><p>20:00 - How current economic climate is affecting cybersecurity budgets</p><p>24:30 - How do you maintain intrinsic motivation?</p><p>27:00 - Work life balance</p><p>30:30 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts]]></link><guid isPermaLink="false">dd23bba6-11b7-4c36-9851-92005f1021cb</guid><itunes:image href="https://artwork.captivate.fm/73c720df-44a8-45d0-9ce6-1166eaf2b0cb/Y0NDQKwlNQj7C4jzyHuAsKtN.jpg"/><pubDate>Thu, 18 Apr 2024 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/f3a8c694-797d-4239-abc4-24e55f95413d/Jay-Hira-Secured-01.mp3" length="52224841" type="audio/mpeg"/><itunes:duration>36:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>27</itunes:episode><podcast:episode>27</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/dc0867ae-8a93-4b78-8cc4-447e73e78185/index.html" type="text/html"/></item><item><title>Leading Change in Cybersecurity: Tara Whitehead’s Approach to Security Engagement</title><itunes:title>Leading Change in Cybersecurity: Tara Whitehead’s Approach to Security Engagement</itunes:title><description><![CDATA[<p>Tara Whitehead is Security Engagement Manager at MYOB. Prior to becoming a cybersecurity specialist, Tara had an eclectic career, including working in advertising and international relations. In this episode&nbsp;Tara chats with Cole about how her non-technical background has in many ways been an asset working&nbsp;in security, leading change management in large enterprises, the importance of great communication skills, and plenty more.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p><strong>Timecodes</strong></p><p>7:15 - Tara's first days in AppSec</p><p>10:00 - How to influence people</p><p>12:30 - Why we should dial back on the doomsday conversation</p><p>14:10 - Find your change champions</p><p>21:30 - Is a non-technical background help or hindrance?</p><p>23:30 - Communication and influencing key skills</p><p>26:00 - Communicating with execs</p><p>28:20 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p>Tara Whitehead is Security Engagement Manager at MYOB. Prior to becoming a cybersecurity specialist, Tara had an eclectic career, including working in advertising and international relations. In this episode&nbsp;Tara chats with Cole about how her non-technical background has in many ways been an asset working&nbsp;in security, leading change management in large enterprises, the importance of great communication skills, and plenty more.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p><strong>Timecodes</strong></p><p>7:15 - Tara's first days in AppSec</p><p>10:00 - How to influence people</p><p>12:30 - Why we should dial back on the doomsday conversation</p><p>14:10 - Find your change champions</p><p>21:30 - Is a non-technical background help or hindrance?</p><p>23:30 - Communication and influencing key skills</p><p>26:00 - Communicating with execs</p><p>28:20 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts/tara-whitehead]]></link><guid isPermaLink="false">6119adfd-1045-4421-961e-e2359686834d</guid><itunes:image href="https://artwork.captivate.fm/9d17e0af-e5c7-4545-a55e-dc13eac7ddc5/bh6Z_Y-Q6pYtgD0E9HJEY8XC.jpg"/><pubDate>Thu, 04 Apr 2024 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/d97f7077-705a-4c99-b1aa-5100f7f54f9b/Secured-Tara-Whitehead-03.mp3" length="52243273" type="audio/mpeg"/><itunes:duration>36:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>26</itunes:episode><podcast:episode>26</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/8ab6b58e-df0c-4a1a-833e-ed48d84bd67c/index.html" type="text/html"/></item><item><title>Cracking Cybersecurity Myths: A Candid Chat with Daniel Grzelak</title><itunes:title>Cracking Cybersecurity Myths: A Candid Chat with Daniel Grzelak</itunes:title><description><![CDATA[<p><strong>Episode summary</strong></p><p>Daniel Grzelak is currently the Chief Innovation Officer at Plerion, and has had a storied career at a variety of technology firms around Australia. In this conversation Daniel brings his experience and insight to the topic of common myths and misconceptions within the cybersecurity industry, and with Cole Cornford tackles questions like:</p><p>Does a cybersecurity professional need to know how to code?</p><p>Is there a workforce shortage in the industry?</p><p>Should pen testers write remediation advice?</p><p><strong>Timestamps</strong></p><p>1:50 - Does a cybersecurity professional need to know how to code?</p><p>5:40 - Is there a workforce shortage in cybersecurity?</p><p>9:30 - Questions to ask when interviewing potential cybersecurity hires</p><p>12:30 - Are people in cybersecurity bad at promoting their own skills?</p><p>17:00 - Should pen testers write remediation advice?</p><p>20:20 - Daniel's career advice: start writing</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p><strong>Episode summary</strong></p><p>Daniel Grzelak is currently the Chief Innovation Officer at Plerion, and has had a storied career at a variety of technology firms around Australia. In this conversation Daniel brings his experience and insight to the topic of common myths and misconceptions within the cybersecurity industry, and with Cole Cornford tackles questions like:</p><p>Does a cybersecurity professional need to know how to code?</p><p>Is there a workforce shortage in the industry?</p><p>Should pen testers write remediation advice?</p><p><strong>Timestamps</strong></p><p>1:50 - Does a cybersecurity professional need to know how to code?</p><p>5:40 - Is there a workforce shortage in cybersecurity?</p><p>9:30 - Questions to ask when interviewing potential cybersecurity hires</p><p>12:30 - Are people in cybersecurity bad at promoting their own skills?</p><p>17:00 - Should pen testers write remediation advice?</p><p>20:20 - Daniel's career advice: start writing</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts/daniel-grzelak]]></link><guid isPermaLink="false">94692936-f096-4722-8ece-da8f687f2d11</guid><itunes:image href="https://artwork.captivate.fm/f5b2040c-0a38-44d8-99f5-4d0be8397efe/py2pzC7o5LpVshON81cb9Kl7.jpg"/><pubDate>Thu, 21 Mar 2024 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/44da22ab-6aca-4b02-9e09-32c1b55e47d2/Daniel-Grzelak-Secured-01.mp3" length="36959113" type="audio/mpeg"/><itunes:duration>25:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>25</itunes:episode><podcast:episode>25</podcast:episode><podcast:season>1</podcast:season></item><item><title>Breaking the Code: Jacqui Loustau on Diversifying Australia&apos;s Cybersecurity</title><itunes:title>Breaking the Code: Jacqui Loustau on Diversifying Australia&apos;s Cybersecurity</itunes:title><description><![CDATA[<p>After working as a cybersecurity consultant in Europe for over a decade, Jacqui Loustau was struck by how cybersecurity professionals in Australia were overwhelmingly male. This led Jacqui to found the Australian Women in Security Network (AWSN), a not-for-profit association and network with the goal of increasing the number of women in the security community.&nbsp;</p><p>In this episode, Jacqui chats with Cole Cornford about how businesses can change their approach to hiring to improve diversity, the importance of supporting kids and students of all backgrounds who have an interest in the field, as well as some of her thoughts on the future of the industry. </p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><h2>Timestamps</h2><p>4:30 - Jacqui’s career background.</p><p>9:30 - How Jacqui became inspired to tackle the issue of diversity within cyber.</p><p>10:00 - At Jacqui’s first cyber event in Aus, struck by a sea of men.</p><p>13:00 - Achievements Jacqui is proud of from the last 10 years.</p><p>15:20 - What can businesses do to encourage diversity.</p><p>19:00 - Cole: what are some systemic issues we need to tackle?</p><p>22:00 - Jacqui: you can always teach technical skills.</p><p>23:00 - How we can support kids &amp; students to move into cyber.</p><p>25:00 - Rapid fire questions.</p><p>27:10 - What will be the theme in cyber for 2024.</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p>After working as a cybersecurity consultant in Europe for over a decade, Jacqui Loustau was struck by how cybersecurity professionals in Australia were overwhelmingly male. This led Jacqui to found the Australian Women in Security Network (AWSN), a not-for-profit association and network with the goal of increasing the number of women in the security community.&nbsp;</p><p>In this episode, Jacqui chats with Cole Cornford about how businesses can change their approach to hiring to improve diversity, the importance of supporting kids and students of all backgrounds who have an interest in the field, as well as some of her thoughts on the future of the industry. </p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><h2>Timestamps</h2><p>4:30 - Jacqui’s career background.</p><p>9:30 - How Jacqui became inspired to tackle the issue of diversity within cyber.</p><p>10:00 - At Jacqui’s first cyber event in Aus, struck by a sea of men.</p><p>13:00 - Achievements Jacqui is proud of from the last 10 years.</p><p>15:20 - What can businesses do to encourage diversity.</p><p>19:00 - Cole: what are some systemic issues we need to tackle?</p><p>22:00 - Jacqui: you can always teach technical skills.</p><p>23:00 - How we can support kids &amp; students to move into cyber.</p><p>25:00 - Rapid fire questions.</p><p>27:10 - What will be the theme in cyber for 2024.</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts/jacqui-loustau]]></link><guid isPermaLink="false">20cd4e6a-67b0-402a-90e3-5426a750400b</guid><itunes:image href="https://artwork.captivate.fm/da898e93-92a3-4be4-896d-a4316ebc7d06/1Jbi8ucovCvVvCNiEma0XFew.jpg"/><pubDate>Thu, 22 Feb 2024 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/a9e8b74d-bd00-4447-8f33-11ee580f61ae/Jacqui-Loustau-Secured-02.mp3" length="42200713" type="audio/mpeg"/><itunes:duration>29:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>24</itunes:episode><podcast:episode>24</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/97f1b00a-3107-46ac-b3aa-fdbdde1431e3/index.html" type="text/html"/></item><item><title>From Australia Post to Cynch Security: Susie Jones&apos;s Journey to Safeguard Small Businesses</title><itunes:title>From Australia Post to Cynch Security: Susie Jones&apos;s Journey to Safeguard Small Businesses</itunes:title><description><![CDATA[<p>While working as Head of Cyber Security Business Services at Australia Post, Susie Jones worked on a product that was designed to support small businesses that had suffered a data breach. Susie came to believe that existing cybersecurity tools and support was generally either too expensive for Australian small businesses, or didn’t suit their needs. And so she co-founded Cynch Security, which aims to fill this gap.&nbsp;</p><p>In this conversation Susie chats with Cole Cornford about Susie’s career, the benefits of coming from a non-technical background, and they do a deep dive on the security needs of small businesses in Australia.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p>4:36 - Susie’s career background</p><p>5:40 - benefits of coming from a non-technical background</p><p>7:15 - Challenges of running your own business</p><p>7:40 - Cole: you’re selling protection, it’s a pure cost</p><p>8:10 - Susie’s motivation to become a founder</p><p>9:00 - Consequences of breaches “the worst working day of their life”</p><p>10:30 - Most common&nbsp; security challenges for small businesses</p><p>13:00 - Big businesses that work with small businesses share cyber risk</p><p>14:40 - Supply chains and small businesses in Australia</p><p>17:20 - 90% of employers in Aus aren’t served by our current cyber solutions</p><p>18:00 - Worst examples of advice not suited to small business</p><p>19:20 - Tips Susie would give to small businesses</p><p>21:20 - Password managers are a no brainer</p><p>25:00 - Rapid fire questions</p><p>26:10 - One cybersecurity myth Susie would like to debunk</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p>While working as Head of Cyber Security Business Services at Australia Post, Susie Jones worked on a product that was designed to support small businesses that had suffered a data breach. Susie came to believe that existing cybersecurity tools and support was generally either too expensive for Australian small businesses, or didn’t suit their needs. And so she co-founded Cynch Security, which aims to fill this gap.&nbsp;</p><p>In this conversation Susie chats with Cole Cornford about Susie’s career, the benefits of coming from a non-technical background, and they do a deep dive on the security needs of small businesses in Australia.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p>4:36 - Susie’s career background</p><p>5:40 - benefits of coming from a non-technical background</p><p>7:15 - Challenges of running your own business</p><p>7:40 - Cole: you’re selling protection, it’s a pure cost</p><p>8:10 - Susie’s motivation to become a founder</p><p>9:00 - Consequences of breaches “the worst working day of their life”</p><p>10:30 - Most common&nbsp; security challenges for small businesses</p><p>13:00 - Big businesses that work with small businesses share cyber risk</p><p>14:40 - Supply chains and small businesses in Australia</p><p>17:20 - 90% of employers in Aus aren’t served by our current cyber solutions</p><p>18:00 - Worst examples of advice not suited to small business</p><p>19:20 - Tips Susie would give to small businesses</p><p>21:20 - Password managers are a no brainer</p><p>25:00 - Rapid fire questions</p><p>26:10 - One cybersecurity myth Susie would like to debunk</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts/susie-jones]]></link><guid isPermaLink="false">d9b50e0d-40fa-4359-8240-6dbdfefb5ab3</guid><itunes:image href="https://artwork.captivate.fm/ef14b08b-66fe-4692-93aa-cc167f8c4b82/YCJKDfTdP9qyQ_s91ybDfyy_.jpg"/><pubDate>Thu, 08 Feb 2024 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/440a9cd3-56d6-4f98-9fbb-5900ac03c342/Susie-Jones-Secured-02.mp3" length="41954761" type="audio/mpeg"/><itunes:duration>29:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>23</itunes:episode><podcast:episode>23</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/56f5affd-9c09-4f16-8827-cfeb1ae9950c/index.html" type="text/html"/></item><item><title>Powering Resilience: Nathan Morelli on Securing South Australia&apos;s Electricity Grid</title><itunes:title>Powering Resilience: Nathan Morelli on Securing South Australia&apos;s Electricity Grid</itunes:title><description><![CDATA[<p>In this episode Cole Cornford chats with Nathan Morelli, Head of Cyber Security and IT Resilience at SA Power Networks, which is the sole electricity provider for the entire state of South Australia. Making sure that 1.7 million people have electricity is a pretty important job, and Nathan shares his perspective on how the organisation maintains resilience in the face of potential breaches. </p><p>They also discuss the importance of financial management skills in a management role, the Australian government’s updates to the Essential 8 and the national Six Shields cyber strategy, the importance of work life balance, and plenty more.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p>4:00 - Nathan’s career overview</p><p>8:00 - “Not if, but when” and the principle of acting like a breach has already occurred</p><p>10:40 - Cyber resilience is critical</p><p>11:00 - Finding value in the impact of your work</p><p>15:00 - Matching cybersecurity strategy to the resources available</p><p>17:20 - High regulation/barriers to entry restrict quality security advice</p><p>19:00 - Importance of access to affordable cybersecurity tools</p><p>19:30 - Australian government “Six shields” update</p><p>23:50 - Australian government update to “Essential 8”</p><p>27:40 - Why Nathan adopted financial management concepts in his cybersecurity work</p><p>31:10 - Cybersecurity decisions are made for financial reasons</p><p>33:10 - Typical career trajectory: follow money, then people, then problems</p><p>35:40 - Importance of work-life balance</p><p>40:40 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p>In this episode Cole Cornford chats with Nathan Morelli, Head of Cyber Security and IT Resilience at SA Power Networks, which is the sole electricity provider for the entire state of South Australia. Making sure that 1.7 million people have electricity is a pretty important job, and Nathan shares his perspective on how the organisation maintains resilience in the face of potential breaches. </p><p>They also discuss the importance of financial management skills in a management role, the Australian government’s updates to the Essential 8 and the national Six Shields cyber strategy, the importance of work life balance, and plenty more.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p>4:00 - Nathan’s career overview</p><p>8:00 - “Not if, but when” and the principle of acting like a breach has already occurred</p><p>10:40 - Cyber resilience is critical</p><p>11:00 - Finding value in the impact of your work</p><p>15:00 - Matching cybersecurity strategy to the resources available</p><p>17:20 - High regulation/barriers to entry restrict quality security advice</p><p>19:00 - Importance of access to affordable cybersecurity tools</p><p>19:30 - Australian government “Six shields” update</p><p>23:50 - Australian government update to “Essential 8”</p><p>27:40 - Why Nathan adopted financial management concepts in his cybersecurity work</p><p>31:10 - Cybersecurity decisions are made for financial reasons</p><p>33:10 - Typical career trajectory: follow money, then people, then problems</p><p>35:40 - Importance of work-life balance</p><p>40:40 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts/nathan-morelli]]></link><guid isPermaLink="false">84233223-e194-4f27-b131-9b9605faa18a</guid><itunes:image href="https://artwork.captivate.fm/0dcb0d3b-7e6d-43cb-81f0-a47896467212/LnOBVXJYjhK7VMRJp-15BZyI.jpg"/><pubDate>Thu, 25 Jan 2024 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/7ef8f24e-355a-4ac6-9f01-ea60fc4afa3d/Nathan-Morelli-Secured-02.mp3" length="67110985" type="audio/mpeg"/><itunes:duration>46:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>22</itunes:episode><podcast:episode>22</podcast:episode><podcast:season>1</podcast:season></item><item><title>Building a Cybersecurity Team with a Difference with Mat Franklin</title><itunes:title>Building a Cybersecurity Team with a Difference with Mat Franklin</itunes:title><description><![CDATA[<p>In this episode, Cole Cornford chats with Mat Franklin, founder and managing director of the consulting firm MF &amp; Associates. Founded in 2019, Mat has quickly grown the company to be 70 or so employees, with their largest team being a cybersecurity team. With a focus on diversity and representation, MF &amp; Associates are made up of approx 70% women, as well as having strong representation of LGBTQ+ and people with disabilities.</p><p>In the conversation, Cole and Mat chat about the importance of diversity and representation in tech and cybersecurity, what Mat looks for in a potential employee, what lessons cybersecurity professionals can learn from other industries like health and law, and plenty more. </p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p>14:40 - How to improve diversity within a team</p><p>17:00 - What Mat looks for in a potential employee during a job interview</p><p>19:40 - The stereotype of cybersecurity professionals</p><p>20:00 - The movie The Web, and portrayal of cyber in film</p><p>24:00 - Cole: example of bad behaviour at a cybersecurity expo</p><p>26:30 - How did Mat build his business?</p><p>30:40 - Taking inspiration from how other industries operate</p><p>31:40 - Mat’s company targeting ex-nurses for employees</p><p>33:30 - The importance of brevity in corporate communication</p><p>35:50 - It’s not possible or useful to try and know everything in cyber</p><p>37:20 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p>In this episode, Cole Cornford chats with Mat Franklin, founder and managing director of the consulting firm MF &amp; Associates. Founded in 2019, Mat has quickly grown the company to be 70 or so employees, with their largest team being a cybersecurity team. With a focus on diversity and representation, MF &amp; Associates are made up of approx 70% women, as well as having strong representation of LGBTQ+ and people with disabilities.</p><p>In the conversation, Cole and Mat chat about the importance of diversity and representation in tech and cybersecurity, what Mat looks for in a potential employee, what lessons cybersecurity professionals can learn from other industries like health and law, and plenty more. </p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p>14:40 - How to improve diversity within a team</p><p>17:00 - What Mat looks for in a potential employee during a job interview</p><p>19:40 - The stereotype of cybersecurity professionals</p><p>20:00 - The movie The Web, and portrayal of cyber in film</p><p>24:00 - Cole: example of bad behaviour at a cybersecurity expo</p><p>26:30 - How did Mat build his business?</p><p>30:40 - Taking inspiration from how other industries operate</p><p>31:40 - Mat’s company targeting ex-nurses for employees</p><p>33:30 - The importance of brevity in corporate communication</p><p>35:50 - It’s not possible or useful to try and know everything in cyber</p><p>37:20 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts/mat-franklin]]></link><guid isPermaLink="false">2ac090b6-67ea-4b34-bec5-15bc573b3452</guid><itunes:image href="https://artwork.captivate.fm/a639fb3c-419f-47b0-b203-4c88cabb35db/VR1pb_Z8b6z-u9XQF-5h7s19.jpg"/><pubDate>Thu, 11 Jan 2024 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/0aaadfaf-8af4-413a-9f9b-688c3f2e1865/Mat-Franklin-Secured-02.mp3" length="60734665" type="audio/mpeg"/><itunes:duration>42:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>21</itunes:episode><podcast:episode>21</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/bb63ac1a-f15c-4027-a408-c56a91a99a09/index.html" type="text/html"/></item><item><title>Systems Thinking in Cybersecurity: A Conversation with Michael Collins</title><itunes:title>Systems Thinking in Cybersecurity: A Conversation with Michael Collins</itunes:title><description><![CDATA[<p>The cybersecurity industry is made up of people from all sorts of different backgrounds, and Michael Collins is a perfect example. After spending 8 years in the Australian navy, Michael moved to Cairns and became a diving instructor. After 5 years, Michael decided it was time for a career change and enrolled in a course to become a Microsoft certified systems engineer.<strong><em> </em></strong></p><p>Today, he’s Chief Information Security Officer at Judo Bank. In this episode we chat about how Michael has managed major transitions in his career, the importance of aligning cybersecurity strategies with business goals, systems thinking as a framework for approaching cybersecurity, and plenty more.</p><p>Systems Thinking Made Simple - by Derek Cabrera:</p><p><a href="https://www.amazon.com.au/Systems-Thinking-Made-Simple-Problems/dp/1520740492" rel="noopener noreferrer" target="_blank">https://www.amazon.com.au/Systems-Thinking-Made-Simple-Problems/dp/1520740492</a> </p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p>2:20 - A good summary of Judo Bank</p><p>7:10 - How Michael became a CISO</p><p>9:00 - How Michael almost bailed on his cybersecurity training after day one</p><p>12:00 - The joys of scuba diving</p><p>14:30 - Advantages of systems thinking</p><p>16:30 - How someone can get started with systems thinking</p><p>17:40 - DSRP thinking (Distinctions, Systems, Relationships and Perspectives)</p><p>24:20 - Delivering AppSec by meeting the business where it is, not being idealistic</p><p>25:20 - “It’s not all about downsides”, businesses succeed by taking risks</p><p>27:10 - How we can promote more business-mindedness in cyber</p><p>32:50 - Michael’s transition from techie role to CISO</p><p>39:50 - Cole: “Leadership is a funny thing”</p><p>43:30 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p>The cybersecurity industry is made up of people from all sorts of different backgrounds, and Michael Collins is a perfect example. After spending 8 years in the Australian navy, Michael moved to Cairns and became a diving instructor. After 5 years, Michael decided it was time for a career change and enrolled in a course to become a Microsoft certified systems engineer.<strong><em> </em></strong></p><p>Today, he’s Chief Information Security Officer at Judo Bank. In this episode we chat about how Michael has managed major transitions in his career, the importance of aligning cybersecurity strategies with business goals, systems thinking as a framework for approaching cybersecurity, and plenty more.</p><p>Systems Thinking Made Simple - by Derek Cabrera:</p><p><a href="https://www.amazon.com.au/Systems-Thinking-Made-Simple-Problems/dp/1520740492" rel="noopener noreferrer" target="_blank">https://www.amazon.com.au/Systems-Thinking-Made-Simple-Problems/dp/1520740492</a> </p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p>2:20 - A good summary of Judo Bank</p><p>7:10 - How Michael became a CISO</p><p>9:00 - How Michael almost bailed on his cybersecurity training after day one</p><p>12:00 - The joys of scuba diving</p><p>14:30 - Advantages of systems thinking</p><p>16:30 - How someone can get started with systems thinking</p><p>17:40 - DSRP thinking (Distinctions, Systems, Relationships and Perspectives)</p><p>24:20 - Delivering AppSec by meeting the business where it is, not being idealistic</p><p>25:20 - “It’s not all about downsides”, businesses succeed by taking risks</p><p>27:10 - How we can promote more business-mindedness in cyber</p><p>32:50 - Michael’s transition from techie role to CISO</p><p>39:50 - Cole: “Leadership is a funny thing”</p><p>43:30 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts/michael-collins]]></link><guid isPermaLink="false">18458732-55e0-4e5a-b2a2-8400d6d9058a</guid><itunes:image href="https://artwork.captivate.fm/5361b551-6cb6-4130-bebe-4a5dd1c5dc00/OUxpNZozREujwzVbP3Eodai6.jpg"/><pubDate>Thu, 21 Dec 2023 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/c5ef6997-3d62-41f7-9e6c-62a3338e0e1c/Michael-Collins-Secured-02.mp3" length="70534153" type="audio/mpeg"/><itunes:duration>48:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>20</itunes:episode><podcast:episode>20</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/f1dd9963-0425-4888-babe-7bd34b41b502/index.html" type="text/html"/></item><item><title>Exploring AI&apos;s Impact on App Security with Seth Law</title><itunes:title>Exploring AI&apos;s Impact on App Security with Seth Law</itunes:title><description><![CDATA[<p>Seth Law is Founder and Principal Consultant of Redpoint Security, an AppSec consulting firm that focuses on code security, as well as co-host of the fantastic Absolute AppSec podcast. Seth has plenty of experience with the nitty gritty details of software development, and Cole Cornford had a great time nerding out with him about static analysis tools and code reviews. </p><p>They chat about the potential for AI to improve AppSec, the unhelpful tendency to idolise big tech companies, the importance of good communication between developers and AppSec, and plenty more.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p>Seth Law is Founder and Principal Consultant of Redpoint Security, an AppSec consulting firm that focuses on code security, as well as co-host of the fantastic Absolute AppSec podcast. Seth has plenty of experience with the nitty gritty details of software development, and Cole Cornford had a great time nerding out with him about static analysis tools and code reviews. </p><p>They chat about the potential for AI to improve AppSec, the unhelpful tendency to idolise big tech companies, the importance of good communication between developers and AppSec, and plenty more.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/secured/seth-law]]></link><guid isPermaLink="false">415184a7-0acb-4ee3-95ab-29060e36829b</guid><itunes:image href="https://artwork.captivate.fm/79d73d3a-f626-4afa-bdcb-297fb205a17d/bcSlNgi5eabKhNjC-kEy94BX.jpg"/><pubDate>Thu, 07 Dec 2023 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/e717f3ab-6f02-4b3a-9546-b2eed555f658/Seth-Law-Secured-02.mp3" length="71074441" type="audio/mpeg"/><itunes:duration>49:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>19</itunes:episode><podcast:episode>19</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/7c75f0bc-0472-4f8c-9aa9-b964e2164150/index.html" type="text/html"/></item><item><title>Bridging the Divide: How Communication Can Unite Developers and AppSec with Jeanette Gill</title><itunes:title>Bridging the Divide: How Communication Can Unite Developers and AppSec with Jeanette Gill</itunes:title><description><![CDATA[<p>Jeanette Gill is Principal Customer Success Manager at Secure Code Warrior. Jeanette comes from a non-technical background, having worked in the aviation industry for over a decade. When she made the leap into AppSec, it was her communication skills and focus on providing a great experience for customers which proved invaluable. </p><p>Jeanette chats with Cole Cornford about some common misconceptions about AppSec, the sometimes uneasy relationship between developers and AppSec, the potential for AI to change our industry, and plenty more.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p>7:30 - Jeanette’s career background in aviation</p><p>10:40 - Working for airline “best years of my life”</p><p>13:10 - Giving up career to move to Australia</p><p>15:20 - Jeanette’s current role at Secure Code Warrior</p><p>16:40 - Developers being wary of appsec</p><p>20:40 - Cole: I don’t think education issue, but incentive issue</p><p>24:00 - Using AI to improve appsec</p><p>24:40 - What is Secure Code Warrior</p><p>28:00 - What do teams struggle with in terms of Appsec?</p><p>36:00 - Management leading by example</p><p>38:40 - Often, devs don’t want to hear from appsec team</p><p>43:00 - How did Jeanette get involved with appsec after moving to Aus</p><p>46:50 - Value of webinars, podcasts, and people sharing knowledge online</p><p>47:30 - Developers, programmers or engineers, what’s the correct term?</p><p>51:50 - The importance of titles and job descriptions</p><p>52:30 - Rapid fire questions</p><p>59:30 - Jeanette: hug your appsec team</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p>Jeanette Gill is Principal Customer Success Manager at Secure Code Warrior. Jeanette comes from a non-technical background, having worked in the aviation industry for over a decade. When she made the leap into AppSec, it was her communication skills and focus on providing a great experience for customers which proved invaluable. </p><p>Jeanette chats with Cole Cornford about some common misconceptions about AppSec, the sometimes uneasy relationship between developers and AppSec, the potential for AI to change our industry, and plenty more.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p>7:30 - Jeanette’s career background in aviation</p><p>10:40 - Working for airline “best years of my life”</p><p>13:10 - Giving up career to move to Australia</p><p>15:20 - Jeanette’s current role at Secure Code Warrior</p><p>16:40 - Developers being wary of appsec</p><p>20:40 - Cole: I don’t think education issue, but incentive issue</p><p>24:00 - Using AI to improve appsec</p><p>24:40 - What is Secure Code Warrior</p><p>28:00 - What do teams struggle with in terms of Appsec?</p><p>36:00 - Management leading by example</p><p>38:40 - Often, devs don’t want to hear from appsec team</p><p>43:00 - How did Jeanette get involved with appsec after moving to Aus</p><p>46:50 - Value of webinars, podcasts, and people sharing knowledge online</p><p>47:30 - Developers, programmers or engineers, what’s the correct term?</p><p>51:50 - The importance of titles and job descriptions</p><p>52:30 - Rapid fire questions</p><p>59:30 - Jeanette: hug your appsec team</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts/jeanette-gill]]></link><guid isPermaLink="false">e5af928e-aa46-4163-9b47-766c0e190b31</guid><itunes:image href="https://artwork.captivate.fm/288f3332-ed56-462f-b75e-72030e1318da/bwOIIKBvLGx7oHzwlVpCGqZf.jpg"/><pubDate>Thu, 23 Nov 2023 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/b423980b-89ff-43a4-a54f-ddefb2d394e2/Jeanette-Gill-Secured-02.mp3" length="87681097" type="audio/mpeg"/><itunes:duration>01:00:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>18</itunes:episode><podcast:episode>18</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/ab48d6e9-8b8e-4373-aeff-7b9ee783d974/index.html" type="text/html"/></item><item><title>The Evolution of Cyber Defence: Edward Farrell&apos;s Journey from IT Ops to InfoSec</title><itunes:title>The Evolution of Cyber Defence: Edward Farrell&apos;s Journey from IT Ops to InfoSec</itunes:title><description><![CDATA[<p>Edward Farrell is Director &amp; Principal Consultant for the Australian company Mercury Information Security Services. Edward has nearly two decades experience in the IT sector, having worked early on in network design and IT operations, before transitioning into a focus on infosec. He’s an Industry Fellow at the University of NSW, teaching in the cyber security masters program, and a board member and advisor to multiple organisations. In this episode, Cole Cornford chats with Edward about his career journey, using automation to make teams more efficient, his belief that the infosec industry would benefit from further professionalisation, and plenty more. </p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><h2>Time Stamps</h2><p>6:25 - Edward’s career background</p><p>10:00 - Did Edward enjoy living in Wollongong?&nbsp;</p><p>11:20 - Value of work experience while at Uni</p><p>14:00 - What led Edward to start his own business</p><p>15:40 - Using automation to make a business more efficient</p><p>18:10 - Career pathways within info security</p><p>19:00 - The big 4 firms in cybersecurity</p><p>20:40 - A broader issue with the Australian market</p><p>22:30 - Financial planning</p><p>25:40 - The best blog posts that Edward has written recently</p><p>27:10 - The professionalisation of cybersecurity&nbsp;</p><p>32:00 - Too many tech solutions, not enough service providers?</p><p>36:00 - Edward anecdote: one guy in the company who knows all the systems</p><p>37:20 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p>Edward Farrell is Director &amp; Principal Consultant for the Australian company Mercury Information Security Services. Edward has nearly two decades experience in the IT sector, having worked early on in network design and IT operations, before transitioning into a focus on infosec. He’s an Industry Fellow at the University of NSW, teaching in the cyber security masters program, and a board member and advisor to multiple organisations. In this episode, Cole Cornford chats with Edward about his career journey, using automation to make teams more efficient, his belief that the infosec industry would benefit from further professionalisation, and plenty more. </p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><h2>Time Stamps</h2><p>6:25 - Edward’s career background</p><p>10:00 - Did Edward enjoy living in Wollongong?&nbsp;</p><p>11:20 - Value of work experience while at Uni</p><p>14:00 - What led Edward to start his own business</p><p>15:40 - Using automation to make a business more efficient</p><p>18:10 - Career pathways within info security</p><p>19:00 - The big 4 firms in cybersecurity</p><p>20:40 - A broader issue with the Australian market</p><p>22:30 - Financial planning</p><p>25:40 - The best blog posts that Edward has written recently</p><p>27:10 - The professionalisation of cybersecurity&nbsp;</p><p>32:00 - Too many tech solutions, not enough service providers?</p><p>36:00 - Edward anecdote: one guy in the company who knows all the systems</p><p>37:20 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts/edward-farrell]]></link><guid isPermaLink="false">36c2c525-da69-4b2d-81d3-a7b419f6a37e</guid><itunes:image href="https://artwork.captivate.fm/81c0cefe-c728-4d0c-9315-cbb62ce7ca9b/a-j9fto1nVoBpAGJA16H5JkI.jpg"/><pubDate>Thu, 09 Nov 2023 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/737427b8-bfa2-48c8-beb9-24c1f1e7a10f/Edward-Farrell-Secured-02.mp3" length="66816649" type="audio/mpeg"/><itunes:duration>46:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>17</itunes:episode><podcast:episode>17</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/12340558-28cf-45af-98b8-f0c16245af07/index.html" type="text/html"/></item><item><title>Tables Turned: Cole Cornford on the Hot Seat with Abhijeth Dugginapeddi</title><itunes:title>Tables Turned: Cole Cornford on the Hot Seat with Abhijeth Dugginapeddi</itunes:title><description><![CDATA[<p>In this special episode of Secured, Abhijeth Dugginapeddi takes the reins as guest host and Cole Cornford answer the questions for once. Cole discusses some of the ups and downs of his career, what advice he has to share, and plenty more.&nbsp;</p><p>Abhijeth Dugginapeddi is currently Head of AppSec at BigCommerce, an ecommerce platform used by thousands of companies across 150 countries, as well as lecturer at the University of New South Wales. Abhijeth has worked in cybersecurity for well over a decade, including roles at Adobe and Commonwealth Bank.&nbsp;</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p>2:56 - Cole’s career background</p><p>4:30 - Cole rapidly becoming head of AppSec function&nbsp;</p><p>8:20 - Looking back, was Cole’s career background a good start?</p><p>10:20 - Cole’s advice for people getting into cybersecurity</p><p>13:30 - The 3 “A”s of consulting</p><p>16:00 - Is elitism still common in cybersecurity?</p><p>16:50 - Cybersecurity: we’re taught an adversarial mindset by default</p><p>20:10 - What were the motivations and challenges for Cole starting a company?</p><p>22:40 - Cole’s experience at a recruitment fair</p><p>25:50 - What a day in the life of Cole looks like</p><p>31:00 - Tips for leaders on how to build a successful security team</p><p>34:00 - Importance of good relationships/communication among team</p><p>35:30 - Does Cole have frustrating days? What are some challenges he’s overcome?</p><p>44:00 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p>In this special episode of Secured, Abhijeth Dugginapeddi takes the reins as guest host and Cole Cornford answer the questions for once. Cole discusses some of the ups and downs of his career, what advice he has to share, and plenty more.&nbsp;</p><p>Abhijeth Dugginapeddi is currently Head of AppSec at BigCommerce, an ecommerce platform used by thousands of companies across 150 countries, as well as lecturer at the University of New South Wales. Abhijeth has worked in cybersecurity for well over a decade, including roles at Adobe and Commonwealth Bank.&nbsp;</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p>2:56 - Cole’s career background</p><p>4:30 - Cole rapidly becoming head of AppSec function&nbsp;</p><p>8:20 - Looking back, was Cole’s career background a good start?</p><p>10:20 - Cole’s advice for people getting into cybersecurity</p><p>13:30 - The 3 “A”s of consulting</p><p>16:00 - Is elitism still common in cybersecurity?</p><p>16:50 - Cybersecurity: we’re taught an adversarial mindset by default</p><p>20:10 - What were the motivations and challenges for Cole starting a company?</p><p>22:40 - Cole’s experience at a recruitment fair</p><p>25:50 - What a day in the life of Cole looks like</p><p>31:00 - Tips for leaders on how to build a successful security team</p><p>34:00 - Importance of good relationships/communication among team</p><p>35:30 - Does Cole have frustrating days? What are some challenges he’s overcome?</p><p>44:00 - Rapid fire questions</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts/abhijeth-dugginapeddi]]></link><guid isPermaLink="false">0986980e-a7ce-4d2b-ac71-4fbc2047e4ce</guid><itunes:image href="https://artwork.captivate.fm/8f1cc274-2423-4350-b4d1-a3e22d9b1c5f/AsKSm9QUKbgbmLr2QUeembjZ.jpg"/><pubDate>Thu, 26 Oct 2023 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/7db5c016-ec37-4a71-8dc4-d25231d20175/Abhijeth-Dugginapeddi-Secured-02.mp3" length="78751369" type="audio/mpeg"/><itunes:duration>54:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>16</itunes:episode><podcast:episode>16</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/aedec6df-2cfd-453b-8f3f-bd8cfbe95640/index.html" type="text/html"/></item><item><title>Podcasting and Cybersecurity: Karissa Breen&apos;s Insights and Advice</title><itunes:title>Podcasting and Cybersecurity: Karissa Breen&apos;s Insights and Advice</itunes:title><description><![CDATA[<p>Karissa Breen is the founder of KBI, a marketing and communications agency that works with cybersecurity and deep tech companies. After working in technical roles early in her career, Karissa saw that the complexity of cybersecurity often made it challenging for companies to communicate clearly, especially to those outside of the cyber industry. </p><p>An entrepreneur at heart, Karissa took a leap of faith, quit her job, and has since focused on helping those with technical expertise tell their stories more effectively.</p><p>In this episode Cole Cornford chats with Karissa about her experiences with podcasting, producing a TV show, the ups and downs of entrepreneurship, and plenty more.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p>Time Stamps</p><ul><li>4:20 - Karissa’s career background.</li><li>6:30 - Moving away from a purely technical role.</li><li>7:20 - Cole: is a uni degree important for a career in cyber?</li><li>11:10 - Karissa being inquisitive in her early years.</li><li>11:50 - Treating people the same regardless of their job/rank.</li><li>13:00 - Cole: lots of students think a uni degree will be enough to get them a job.</li><li>15:00 - Karissa’s decision to pursue entrepreneurship.</li><li>16:40 - Cole: starting out in business, naivety can be valuable.</li><li>18:40 - Karissa’s journey building her business and getting into media.</li><li>23:30 - In the early days of Karissa’s podcasting, what worked well and what didn’t.</li><li>26:40 - Cole gives a shoutout to W2D1.</li><li>27:30 - Karissa: podcast hosts need to enjoy/care about hosting their podcast.</li><li>31:30 - Karissa’s TV show.</li><li>38:00 - The importance of preparation for a podcast.</li><li>38:30 - Karissa’s entrepreneurship journey.</li><li>39:20 - Karissa: Entrepreneurs are a different breed.</li><li>43:00 - Entrepreneurship is constantly challenging.</li><li>44:30 - The importance of a good support network.</li><li>45:10 - rapid-fire questions.</li></ul><br/><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p>Karissa Breen is the founder of KBI, a marketing and communications agency that works with cybersecurity and deep tech companies. After working in technical roles early in her career, Karissa saw that the complexity of cybersecurity often made it challenging for companies to communicate clearly, especially to those outside of the cyber industry. </p><p>An entrepreneur at heart, Karissa took a leap of faith, quit her job, and has since focused on helping those with technical expertise tell their stories more effectively.</p><p>In this episode Cole Cornford chats with Karissa about her experiences with podcasting, producing a TV show, the ups and downs of entrepreneurship, and plenty more.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p>Time Stamps</p><ul><li>4:20 - Karissa’s career background.</li><li>6:30 - Moving away from a purely technical role.</li><li>7:20 - Cole: is a uni degree important for a career in cyber?</li><li>11:10 - Karissa being inquisitive in her early years.</li><li>11:50 - Treating people the same regardless of their job/rank.</li><li>13:00 - Cole: lots of students think a uni degree will be enough to get them a job.</li><li>15:00 - Karissa’s decision to pursue entrepreneurship.</li><li>16:40 - Cole: starting out in business, naivety can be valuable.</li><li>18:40 - Karissa’s journey building her business and getting into media.</li><li>23:30 - In the early days of Karissa’s podcasting, what worked well and what didn’t.</li><li>26:40 - Cole gives a shoutout to W2D1.</li><li>27:30 - Karissa: podcast hosts need to enjoy/care about hosting their podcast.</li><li>31:30 - Karissa’s TV show.</li><li>38:00 - The importance of preparation for a podcast.</li><li>38:30 - Karissa’s entrepreneurship journey.</li><li>39:20 - Karissa: Entrepreneurs are a different breed.</li><li>43:00 - Entrepreneurship is constantly challenging.</li><li>44:30 - The importance of a good support network.</li><li>45:10 - rapid-fire questions.</li></ul><br/><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts/karissa-breen]]></link><guid isPermaLink="false">91ab47bc-b59b-4408-bb73-a2fd8b2cb453</guid><itunes:image href="https://artwork.captivate.fm/b9b4ebc7-545a-4e7b-bce0-4892fbca1931/gegRQFTb9gQAhqnIZtepMs_U.jpg"/><pubDate>Thu, 12 Oct 2023 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/ffb6d3a1-8514-440d-989e-5c266ab99a72/Karissa-Breen-Secured-02.mp3" length="73999945" type="audio/mpeg"/><itunes:duration>51:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>15</itunes:episode><podcast:episode>15</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/d8010563-0a41-48f9-9ccb-be1252418ebd/index.html" type="text/html"/></item><item><title>Whisky to Firewalls: Jason Murrell&apos;s Unconventional Path to Cybersecurity</title><itunes:title>Whisky to Firewalls: Jason Murrell&apos;s Unconventional Path to Cybersecurity</itunes:title><description><![CDATA[<p>Jason Murrell is a cybersecurity advocate and consultant with more than two decades of experience in business and entrepreneurship. In this episode Jason chats with host Cole Cornford about both the successes and setbacks he’s experienced in the startup world, including as a founding shareholder in Starward Whisky and co-founder of Altius Mining. In recent years Jason’s career has focused on cybersecurity, including roles such as COO of Cyber Aware and Group Executive of AustCyber. Jason and Cole chat about how Jason’s business experience helped shape his approach to cybersecurity, learning from mistakes, financial literacy, and plenty more. </p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><h2>Time Stamps</h2><p>4:46 - Sharks as a metaphor for adversaries in cybersecurity</p><p>9:40 - Financial literacy</p><p>12:30 - Need for greater gender diversity</p><p>14:30 - Learning financial literacy from running a business</p><p>18:40 - How Jason’s business experience informed his approach to cybersecurity</p><p>19:00 - Jason’s experience with the company Starward Whisky</p><p>24:20 - Cle sees similarities between whiskey company and Galah Cyber</p><p>25:40 - In business, approaching problems differently to the competition</p><p>25:50 - Jason’s gold mining business</p><p>26:30 - Raising millions for the gold mining business, only for it to be taken over</p><p>28:00 - Learning more from mistakes than successes</p><p>28:30 - In cyber, we shold learn from instances and mistakes better</p><p>30:20 - Optus breach, and the imbalance of “one mistake and you’re hung drawn and quartered”</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p>Jason Murrell is a cybersecurity advocate and consultant with more than two decades of experience in business and entrepreneurship. In this episode Jason chats with host Cole Cornford about both the successes and setbacks he’s experienced in the startup world, including as a founding shareholder in Starward Whisky and co-founder of Altius Mining. In recent years Jason’s career has focused on cybersecurity, including roles such as COO of Cyber Aware and Group Executive of AustCyber. Jason and Cole chat about how Jason’s business experience helped shape his approach to cybersecurity, learning from mistakes, financial literacy, and plenty more. </p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><h2>Time Stamps</h2><p>4:46 - Sharks as a metaphor for adversaries in cybersecurity</p><p>9:40 - Financial literacy</p><p>12:30 - Need for greater gender diversity</p><p>14:30 - Learning financial literacy from running a business</p><p>18:40 - How Jason’s business experience informed his approach to cybersecurity</p><p>19:00 - Jason’s experience with the company Starward Whisky</p><p>24:20 - Cle sees similarities between whiskey company and Galah Cyber</p><p>25:40 - In business, approaching problems differently to the competition</p><p>25:50 - Jason’s gold mining business</p><p>26:30 - Raising millions for the gold mining business, only for it to be taken over</p><p>28:00 - Learning more from mistakes than successes</p><p>28:30 - In cyber, we shold learn from instances and mistakes better</p><p>30:20 - Optus breach, and the imbalance of “one mistake and you’re hung drawn and quartered”</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts/jason-murrell]]></link><guid isPermaLink="false">edc8f861-f34c-4c70-98c8-f133c48988d6</guid><itunes:image href="https://artwork.captivate.fm/84d2deef-efeb-4406-ae58-64b76af4d17f/wtgz87wQor-bg9KF2Tp_qEtc.jpg"/><pubDate>Thu, 28 Sep 2023 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/dae8d308-5ef7-4d76-be3d-29c5bde78139/Jason-Murrell-Secured-02.mp3" length="76536128" type="audio/mpeg"/><itunes:duration>53:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>14</itunes:episode><podcast:episode>14</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/af9c6e76-19a8-486e-b060-a2fe22a092df/index.html" type="text/html"/></item><item><title>How Sam Fariborz Navigated the Aussie Cybersecurity Landscape</title><itunes:title>How Sam Fariborz Navigated the Aussie Cybersecurity Landscape</itunes:title><description><![CDATA[<p>When Sam Fariborz moved to Australia from Iran, she had been working as an IT manager. While she had plenty of experience and strong technical skills, the move to Australia was challenging, and in this episode Sam discusses some of the barriers to entry she faced. By attending cybersecurity events and reaching out to people on LinkedIn, Sam found mentors and peers who helped progress her career, and today Sam is Cybersecurity Services &amp; Program Manager for Kmart group which employs nearly 50,000 people across Australia and New Zealand. Sam chats with Cole Cornford about how to network effectively, the growth of cybersecurity as a profession in the last couple of decades, the need for greater diversity within the industry, and plenty more.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p>Time Stamps</p><p>4:15 - Sam’s journey into cybersecurity.</p><p>5:00 - Sam losing her confidence when coming to Australia.</p><p>6:00 - Cole has seen people from overseas struggle to fit into Australian work culture.</p><p>7:00 - Sam’s experience with racism.</p><p>8:10 -&nbsp; Sam’s positive experiences meeting mentors.</p><p>9:10 - Cole’s uni address and why “career ladder” is a terrible analogy.</p><p>11:45 - Sam: a story of one mentor who changed the path of her career.</p><p>14:10 - Cole: giving back to the community that fosters you.</p><p>16:40 - How to network effectively.</p><p>17:00 - The value of attending community events.</p><p>19:00 - The growth of cyber community in Australia.</p><p>20:00 - Sam: today everyone wants&nbsp; to get into cyber.</p><p>20:20 - The increasing gender diversity within cybersecurity.</p><p>21:30 - Sam: the need for greater diversity within cybersecurity.</p><p>27:20 - Sam’s experience being a woman in a cyber leadership role.</p><p>28:20 - Sam: most women feel like they need to be perfect to be acceptable.</p><p>31:40 - Sam: cybersecurity is changing every day.</p><p>32:10 - Sam: cybersecurity professionals have a positive impact on the lives of people.</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p>When Sam Fariborz moved to Australia from Iran, she had been working as an IT manager. While she had plenty of experience and strong technical skills, the move to Australia was challenging, and in this episode Sam discusses some of the barriers to entry she faced. By attending cybersecurity events and reaching out to people on LinkedIn, Sam found mentors and peers who helped progress her career, and today Sam is Cybersecurity Services &amp; Program Manager for Kmart group which employs nearly 50,000 people across Australia and New Zealand. Sam chats with Cole Cornford about how to network effectively, the growth of cybersecurity as a profession in the last couple of decades, the need for greater diversity within the industry, and plenty more.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p>Time Stamps</p><p>4:15 - Sam’s journey into cybersecurity.</p><p>5:00 - Sam losing her confidence when coming to Australia.</p><p>6:00 - Cole has seen people from overseas struggle to fit into Australian work culture.</p><p>7:00 - Sam’s experience with racism.</p><p>8:10 -&nbsp; Sam’s positive experiences meeting mentors.</p><p>9:10 - Cole’s uni address and why “career ladder” is a terrible analogy.</p><p>11:45 - Sam: a story of one mentor who changed the path of her career.</p><p>14:10 - Cole: giving back to the community that fosters you.</p><p>16:40 - How to network effectively.</p><p>17:00 - The value of attending community events.</p><p>19:00 - The growth of cyber community in Australia.</p><p>20:00 - Sam: today everyone wants&nbsp; to get into cyber.</p><p>20:20 - The increasing gender diversity within cybersecurity.</p><p>21:30 - Sam: the need for greater diversity within cybersecurity.</p><p>27:20 - Sam’s experience being a woman in a cyber leadership role.</p><p>28:20 - Sam: most women feel like they need to be perfect to be acceptable.</p><p>31:40 - Sam: cybersecurity is changing every day.</p><p>32:10 - Sam: cybersecurity professionals have a positive impact on the lives of people.</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts/sam-fariborz]]></link><guid isPermaLink="false">e6282d1b-435f-4542-ae5f-b4cb0a2b1594</guid><itunes:image href="https://artwork.captivate.fm/959c082e-b13d-4db7-bb2e-229ab228ac93/V5xE4G8Ky9XXMkA2I2TGyzWR.jpg"/><pubDate>Thu, 14 Sep 2023 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/603bb537-1a38-4668-b05b-94d01713e608/Sam-Fariborz-Secured-03.mp3" length="54997019" type="audio/mpeg"/><itunes:duration>38:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>13</itunes:episode><podcast:episode>13</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/f396c2ae-afec-4d1d-886c-f1384dcc4d5d/index.html" type="text/html"/></item><item><title>From Mary Poppins of Security to Startup Founder: Laura Bell-Main&apos;s Journey</title><itunes:title>From Mary Poppins of Security to Startup Founder: Laura Bell-Main&apos;s Journey</itunes:title><description><![CDATA[<p>As a consultant, Laura Bell-Main earned a reputation for being “the Mary Poppins of security”, swooping in to fix problems with her big bag of tricks. More recently, she made the leap from consulting into founding a product company, securing funding from VC firm Blackbird with the aim of building SafeStack into an online training platform that can help orgs of all sizes design secure software.</p><p>In this episode, Laura chats with Cole Cornford about the challenges of becoming a startup founder, the current state of AppSec training &amp; education, Laura’s vision for SafeStack’s legacy, and plenty more.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><h2>Timestamps</h2><p>4:19 - Laura’s career background.</p><p>7:45 - no clear pathway into a career in AppSec.</p><p>8:40 - Cole’s experience at a career expo @ Newcastle uni.</p><p>12:00 - Large and small companies AppSec needs are different.</p><p>14:00 - A large company like Facebook is very different from the average company.</p><p>16:40 - Security has a tendency to get lax for software not being actively developed.</p><p>18:10 - Laura: the theme of this conversation “you will fail and this will make you stronger”.</p><p>19:00 - Why Laura is in AppSec.</p><p>20:00 - Laura speaks about being a salesperson + having a product company.</p><p>21:20 - Cole: I anticipate AppSec will grow Laura: software rules the world.</p><p>25:10 - SafeStack: for profit with purpose, balancing purpose and profit.</p><p>27:50 - Laura: discussing Blackbird’s investment in SafeStack.</p><p>29:40 - Laura’s background as a consultant.</p><p>30:20 - Laura: customers called me “Mary Poppins of AppSec”.</p><p>32:50 - Laura’s transition from consulting to founding a product company.</p><p>34:20 - Laura: on building a company, I sometimes joke “I used to be in security”.</p><p>37:40 - The leap from idea to product.</p><p>38:30 - Laura’s vision for SafeStack’s legacy.</p><p>40:10 - SafeStack’s “one hour AppSec”.</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p>As a consultant, Laura Bell-Main earned a reputation for being “the Mary Poppins of security”, swooping in to fix problems with her big bag of tricks. More recently, she made the leap from consulting into founding a product company, securing funding from VC firm Blackbird with the aim of building SafeStack into an online training platform that can help orgs of all sizes design secure software.</p><p>In this episode, Laura chats with Cole Cornford about the challenges of becoming a startup founder, the current state of AppSec training &amp; education, Laura’s vision for SafeStack’s legacy, and plenty more.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><h2>Timestamps</h2><p>4:19 - Laura’s career background.</p><p>7:45 - no clear pathway into a career in AppSec.</p><p>8:40 - Cole’s experience at a career expo @ Newcastle uni.</p><p>12:00 - Large and small companies AppSec needs are different.</p><p>14:00 - A large company like Facebook is very different from the average company.</p><p>16:40 - Security has a tendency to get lax for software not being actively developed.</p><p>18:10 - Laura: the theme of this conversation “you will fail and this will make you stronger”.</p><p>19:00 - Why Laura is in AppSec.</p><p>20:00 - Laura speaks about being a salesperson + having a product company.</p><p>21:20 - Cole: I anticipate AppSec will grow Laura: software rules the world.</p><p>25:10 - SafeStack: for profit with purpose, balancing purpose and profit.</p><p>27:50 - Laura: discussing Blackbird’s investment in SafeStack.</p><p>29:40 - Laura’s background as a consultant.</p><p>30:20 - Laura: customers called me “Mary Poppins of AppSec”.</p><p>32:50 - Laura’s transition from consulting to founding a product company.</p><p>34:20 - Laura: on building a company, I sometimes joke “I used to be in security”.</p><p>37:40 - The leap from idea to product.</p><p>38:30 - Laura’s vision for SafeStack’s legacy.</p><p>40:10 - SafeStack’s “one hour AppSec”.</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts/laura-bell-main]]></link><guid isPermaLink="false">b4da8115-022e-487a-8da0-86160e2c4434</guid><itunes:image href="https://artwork.captivate.fm/cb274837-ffb1-4adf-a86d-a4ca07f83c08/NE1bFOpJDOR_Mc4Ojdk_l5Id.jpg"/><pubDate>Thu, 31 Aug 2023 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/5aa0b3b1-fc9a-4022-bce3-d9011330aca9/Laura-Bell-Main-Secured-02.mp3" length="59796236" type="audio/mpeg"/><itunes:duration>41:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>12</itunes:episode><podcast:episode>12</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/2e138678-e4dc-48fc-8137-cef79bc364b8/index.html" type="text/html"/></item><item><title>An Agnostic Approach to AppSec: Ken Johnson on Navigating the Future with AI</title><itunes:title>An Agnostic Approach to AppSec: Ken Johnson on Navigating the Future with AI</itunes:title><description><![CDATA[<p>Ken Johnson is co-founder of Dryrun Security and co-host of the Apsolute AppSec podcast. Ken has many years experience working in AppSec in a variety of roles, including CTO of nVisium and Application Security Engineer at GitHub. Ken chats with Cole Cornford about taking an agnostic approach to AppSec, transitioning from being an employee to a founder, how AI might change cybersecurity, and plenty more.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><h2>Timestamps</h2><ul><li>9:10 - When Ken started running AppSec conferences.</li><li>12:00 - Ken: an “agnostic approach” to appsec really resonated with people.</li><li>14:30 - Ken: “by nature we are always behind the curve”.</li><li>15:40 - Ken: appsec is getting much harder.</li><li>17:00 - Cole also advocates for an agnostic approach to appsec.</li><li>18:50 - Ken’s favourite thing about Github: the culture.</li><li>20:30 - discussing Github.</li><li>25:00 - Appsec education.</li><li>26:30 - quality software is secure software.</li><li>27:30 - AI &amp; Appsec.</li><li>33:50 - Brief overview of Ken’s professional life, transition to being a founder.</li><li>36:30 - Cole: people who plan to build a product alongside consulting.</li><li>38:20 - Cole’s experience starting a consulting business.</li><li>39:40 - Ken’s interests outside AppSec.</li><li>40:40 - How Ken got into brazilian ju jitsu.</li><li>44:10 - Cole’s pandemic experience.</li></ul><br/><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p>Ken Johnson is co-founder of Dryrun Security and co-host of the Apsolute AppSec podcast. Ken has many years experience working in AppSec in a variety of roles, including CTO of nVisium and Application Security Engineer at GitHub. Ken chats with Cole Cornford about taking an agnostic approach to AppSec, transitioning from being an employee to a founder, how AI might change cybersecurity, and plenty more.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><h2>Timestamps</h2><ul><li>9:10 - When Ken started running AppSec conferences.</li><li>12:00 - Ken: an “agnostic approach” to appsec really resonated with people.</li><li>14:30 - Ken: “by nature we are always behind the curve”.</li><li>15:40 - Ken: appsec is getting much harder.</li><li>17:00 - Cole also advocates for an agnostic approach to appsec.</li><li>18:50 - Ken’s favourite thing about Github: the culture.</li><li>20:30 - discussing Github.</li><li>25:00 - Appsec education.</li><li>26:30 - quality software is secure software.</li><li>27:30 - AI &amp; Appsec.</li><li>33:50 - Brief overview of Ken’s professional life, transition to being a founder.</li><li>36:30 - Cole: people who plan to build a product alongside consulting.</li><li>38:20 - Cole’s experience starting a consulting business.</li><li>39:40 - Ken’s interests outside AppSec.</li><li>40:40 - How Ken got into brazilian ju jitsu.</li><li>44:10 - Cole’s pandemic experience.</li></ul><br/><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts/ken-johnson]]></link><guid isPermaLink="false">e201473e-2145-4659-a406-5ad79b46585c</guid><itunes:image href="https://artwork.captivate.fm/dce928ea-04cf-4ab2-9245-8d316fd32bfa/0qtC7FFGflW1c6g0XUvkbcwh.jpg"/><pubDate>Thu, 17 Aug 2023 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/e7ddbde6-a7b7-4ef8-8599-484d033a2f0c/Ken-Johnson-Secured-02.mp3" length="69721930" type="audio/mpeg"/><itunes:duration>48:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>11</itunes:episode><podcast:episode>11</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/f2202041-d70b-4663-bb1d-0f84ec4a4710/index.html" type="text/html"/></item><item><title>ComfyCon, Risk-Based Cybersecurity, and Reconsidering Breach Penalties with Iain Dickson</title><itunes:title>ComfyCon, Risk-Based Cybersecurity, and Reconsidering Breach Penalties with Iain Dickson</itunes:title><description><![CDATA[<p>In the latest episode of Secured, Cole Cornford chats with Iain Dickson, Full Spectrum Cyber Practice Lead<strong> </strong>at Leidos Australia, a technology company working across defence, aviation and national security. Iain is also the co-founder of ComfyCon, an online cyber security conference which was started in response to the many event cancellations caused by the 2020 covid lockdowns.&nbsp;</p><p>Iain chats with Cole Cornford about taking a risk-based vs a compliance based-approach to cybersecurity, why punishing a company for their security breaches can sometimes be a bad idea in the long run, the importance of communication skills, and plenty more.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a></p><h2>Timestamps</h2><p>4:30 - Iain: my entire career is finding issues in things.</p><p>7:15 - Are security professionals naturally risk averse?</p><p>8:00 - Compliance vs risk approach to cybersecurity.</p><p>9:00 - Cole: I try to understand the business before talking security.</p><p>9:15 - Iain: discussing optus breach &amp; risk vs compliance.</p><p>11:00 - Should we persecute companies for having security incidents?</p><p>11:15 - The tenant of “zero trust.”</p><p>12:00 - Cole: as soon as you start being punitive, no one will want to work with you.</p><p>16:15 - Cole: a business is there to achieve an outcome.</p><p>16:50 - Cole: a lot of security challenges are user experience challenges.</p><p>18:15 - Cole: passwords solved the wrong problem (spicy take).</p><p>20:00 - Iain’s spicy takes.</p><p>21:40 - Companies claiming to help people meet “essential 8 compliance.”</p><p>25:35  - Essential 8 note very relevant to appsec.</p><p>28:35 - Iain’s background.</p><p>30:00 - Iain: I have a rule with vendors I work with: no selling.</p><p>31:30 - Cole: no Australian likes to be sold to.</p><p>33:30 - Cybersecurity in the OT space.</p><p>36:00 - Challenges in OT that don’t exist in other sectors.</p><p>38:45 - Difference when working on tangible vs non tangible software/hardware.</p><p>40:15 - Difference between software engineers &amp; developers.</p><p>41:15 - Software as a profession hasn't existed very long.</p><p>44:50 - Iain’s advice.</p><p>49:30 - Cole: too much focus on technical skills.</p><p>50:20 - Iain: sometimes, leaders choose to accept risk.</p><p>51:15 - … and if you can’t accept that, you’re going to burn out.</p><p>53:00 - You can’t live without risk.</p><p>54:15 - Founding of Comfycon. </p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p>In the latest episode of Secured, Cole Cornford chats with Iain Dickson, Full Spectrum Cyber Practice Lead<strong> </strong>at Leidos Australia, a technology company working across defence, aviation and national security. Iain is also the co-founder of ComfyCon, an online cyber security conference which was started in response to the many event cancellations caused by the 2020 covid lockdowns.&nbsp;</p><p>Iain chats with Cole Cornford about taking a risk-based vs a compliance based-approach to cybersecurity, why punishing a company for their security breaches can sometimes be a bad idea in the long run, the importance of communication skills, and plenty more.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a></p><h2>Timestamps</h2><p>4:30 - Iain: my entire career is finding issues in things.</p><p>7:15 - Are security professionals naturally risk averse?</p><p>8:00 - Compliance vs risk approach to cybersecurity.</p><p>9:00 - Cole: I try to understand the business before talking security.</p><p>9:15 - Iain: discussing optus breach &amp; risk vs compliance.</p><p>11:00 - Should we persecute companies for having security incidents?</p><p>11:15 - The tenant of “zero trust.”</p><p>12:00 - Cole: as soon as you start being punitive, no one will want to work with you.</p><p>16:15 - Cole: a business is there to achieve an outcome.</p><p>16:50 - Cole: a lot of security challenges are user experience challenges.</p><p>18:15 - Cole: passwords solved the wrong problem (spicy take).</p><p>20:00 - Iain’s spicy takes.</p><p>21:40 - Companies claiming to help people meet “essential 8 compliance.”</p><p>25:35  - Essential 8 note very relevant to appsec.</p><p>28:35 - Iain’s background.</p><p>30:00 - Iain: I have a rule with vendors I work with: no selling.</p><p>31:30 - Cole: no Australian likes to be sold to.</p><p>33:30 - Cybersecurity in the OT space.</p><p>36:00 - Challenges in OT that don’t exist in other sectors.</p><p>38:45 - Difference when working on tangible vs non tangible software/hardware.</p><p>40:15 - Difference between software engineers &amp; developers.</p><p>41:15 - Software as a profession hasn't existed very long.</p><p>44:50 - Iain’s advice.</p><p>49:30 - Cole: too much focus on technical skills.</p><p>50:20 - Iain: sometimes, leaders choose to accept risk.</p><p>51:15 - … and if you can’t accept that, you’re going to burn out.</p><p>53:00 - You can’t live without risk.</p><p>54:15 - Founding of Comfycon. </p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts/iain-dickson]]></link><guid isPermaLink="false">aded4b29-0de5-4a1e-aa91-f5c7d315a91e</guid><itunes:image href="https://artwork.captivate.fm/ca646551-35fa-4f81-bcb3-65c6585470e1/frpNznPtmJ7ktlUz5Imm2H2B.jpg"/><pubDate>Thu, 03 Aug 2023 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/8284858f-df16-483a-8c3d-164ec444394c/EP10-Iain-Dickson-Secured-02.mp3" length="94086025" type="audio/mpeg"/><itunes:duration>01:05:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>10</itunes:episode><podcast:episode>10</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/96dd8473-00c8-410c-8a48-64e52b0da0d5/index.html" type="text/html"/></item><item><title>Unleashing the Power of Sales: A Must-Have Skill for Cybersecurity Pros</title><itunes:title>Unleashing the Power of Sales: A Must-Have Skill for Cybersecurity Pros</itunes:title><description><![CDATA[<p>Ian Yip is the founder and CEO of Avertro, a venture backed startup that creates software to help teams manage and measure their cybersecurity performance. In this episode Cole Cornford spoke with Ian about how being a salesperson is a valuable skill for any security professional, the common fallacy in software of “if you build it, they will come”, the similarities between starting a company and having kids, and plenty more.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a></p><ul><li>4:00 - Ian works from different locations around the world.</li><li>5:20 - Ian’s professional background.</li><li>5:30 - Ian was in cybersecurity before it was called cybersecurity.</li><li>8:00 - Cole’s professional background.</li><li>9:30 - Common misconception: if you build it, they will come.</li><li>11:20 - Moving from consultant to starting a product company.</li><li>12:20 - Skills that were useful for Ian when he became a startup founder.</li><li>13:00 - Ian: I like to be comfortably uncomfortable.</li><li>14:30 - Cole: I am a naturally good salesperson.</li><li>16:00 - Selling is a valuable skill for all security people.</li><li>18:30 - Cole: What scenarios have you pushed yourself to be uncomfortable?</li><li>21:30 - Cole: I think starting a company is not as big a risk as people think.</li><li>22:40 - Cole: Public speaking anecdote.</li><li>25:15 - Cole: Shaving a yak parable.</li><li>27:00 - Ian: Similarities between starting a business and having kids.</li><li>31:40 - How Ian came to found his company.</li><li>35:00 - What drove core product changes for Ian’s company.</li><li>36:40 - Advice for aspiring SAAS founders.</li><li>39:10 - Ian: The graveyard of products that nobody uses.</li><li>40:20 - Approach to startups in the current challenging financial market.</li><li>44:10 - Quick fire questions.</li></ul><br/><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p>Ian Yip is the founder and CEO of Avertro, a venture backed startup that creates software to help teams manage and measure their cybersecurity performance. In this episode Cole Cornford spoke with Ian about how being a salesperson is a valuable skill for any security professional, the common fallacy in software of “if you build it, they will come”, the similarities between starting a company and having kids, and plenty more.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a></p><ul><li>4:00 - Ian works from different locations around the world.</li><li>5:20 - Ian’s professional background.</li><li>5:30 - Ian was in cybersecurity before it was called cybersecurity.</li><li>8:00 - Cole’s professional background.</li><li>9:30 - Common misconception: if you build it, they will come.</li><li>11:20 - Moving from consultant to starting a product company.</li><li>12:20 - Skills that were useful for Ian when he became a startup founder.</li><li>13:00 - Ian: I like to be comfortably uncomfortable.</li><li>14:30 - Cole: I am a naturally good salesperson.</li><li>16:00 - Selling is a valuable skill for all security people.</li><li>18:30 - Cole: What scenarios have you pushed yourself to be uncomfortable?</li><li>21:30 - Cole: I think starting a company is not as big a risk as people think.</li><li>22:40 - Cole: Public speaking anecdote.</li><li>25:15 - Cole: Shaving a yak parable.</li><li>27:00 - Ian: Similarities between starting a business and having kids.</li><li>31:40 - How Ian came to found his company.</li><li>35:00 - What drove core product changes for Ian’s company.</li><li>36:40 - Advice for aspiring SAAS founders.</li><li>39:10 - Ian: The graveyard of products that nobody uses.</li><li>40:20 - Approach to startups in the current challenging financial market.</li><li>44:10 - Quick fire questions.</li></ul><br/><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts/ian-yip]]></link><guid isPermaLink="false">0c7338c8-742e-4074-822b-20e5ceb1232d</guid><itunes:image href="https://artwork.captivate.fm/ea88830e-3651-436d-a4cb-7688e88a9035/EFTVrRgR1P44DGRU6t2zEEXS.jpg"/><pubDate>Thu, 20 Jul 2023 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/258476d8-699f-4ed5-b7a6-c8a7230609d2/Ian-Yip-Secured-02.mp3" length="69864872" type="audio/mpeg"/><itunes:duration>48:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>9</itunes:episode><podcast:episode>9</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/dc99d40b-0986-4425-a456-77b9f50e1198/index.html" type="text/html"/></item><item><title>From Code to Cybersecurity: A Deep Dive into Open Source, Encryption, and Leadership with Edwin Kwan</title><itunes:title>From Code to Cybersecurity: A Deep Dive into Open Source, Encryption, and Leadership with Edwin Kwan</itunes:title><description><![CDATA[<p>Formerly a software engineer, today Edwin Kwan is Head of Application Security and Advisory at Tyro Payments. Edwin is also a contributing journalist to the It’s 5:05 Podcast, which highlights cybersecurity and open source software news.&nbsp;</p><p>Host Cole Cornford chats with Edwin about transitioning from focusing on the nitty gritty challenges of an engineer to the very different challenges of overseeing a team, the importance of due diligence when using open source software, the pros and cons of end to end encryption, and plenty more.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a></p><p> 2:55 - Importance of listening.</p><p>3:50 - Edwin’s current role.</p><p>4:28 - A recent news story: end to end encryption &amp; Google.</p><p>7:30 - Unintended results from security decisions.</p><p>8:38 - Security about making "an informed risk decision."</p><p>9:50 - Edwin’s background and career trajectory.</p><p>12:50 - The challenges of doing intangible work vs. work you can see the tangible impact of in the real world.</p><p>13:30 - Edwin: "Changing from a technical challenge to a people and culture challenge," i.e., going from a technical role to a manager role.</p><p>15:50 - Cole: Would you want to go back to a technical role?</p><p>18:30 - Edwin: In security, there’s this idea that security is a blocker.</p><p>20:30 - Edwin: "What you know today is obsolete in 11 months."</p><p>23:40 - Cole: I think AI is a really good example of security not having a proactive mindset.</p><p>25:00 - Edwin: Security team always chasing its tail.</p><p>26:30 - Cole: I always worry when cybersecurity teams advocate for having more money.</p><p>27:30 - Edwin: Security is seen as a "cost centre," not revenue generation.</p><p>30:30 - Advice for young people wanting to enter the industry/tech more generally.</p><p>32:40 - Rapid fire questions.</p><p>35:50 - Edwin’s favourite book to recommend: How To Win Friends and Influence People.</p><p>37:30 - Edwin’s 1 piece of advice: "Look at your open source supply chain."</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p>Formerly a software engineer, today Edwin Kwan is Head of Application Security and Advisory at Tyro Payments. Edwin is also a contributing journalist to the It’s 5:05 Podcast, which highlights cybersecurity and open source software news.&nbsp;</p><p>Host Cole Cornford chats with Edwin about transitioning from focusing on the nitty gritty challenges of an engineer to the very different challenges of overseeing a team, the importance of due diligence when using open source software, the pros and cons of end to end encryption, and plenty more.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a></p><p> 2:55 - Importance of listening.</p><p>3:50 - Edwin’s current role.</p><p>4:28 - A recent news story: end to end encryption &amp; Google.</p><p>7:30 - Unintended results from security decisions.</p><p>8:38 - Security about making "an informed risk decision."</p><p>9:50 - Edwin’s background and career trajectory.</p><p>12:50 - The challenges of doing intangible work vs. work you can see the tangible impact of in the real world.</p><p>13:30 - Edwin: "Changing from a technical challenge to a people and culture challenge," i.e., going from a technical role to a manager role.</p><p>15:50 - Cole: Would you want to go back to a technical role?</p><p>18:30 - Edwin: In security, there’s this idea that security is a blocker.</p><p>20:30 - Edwin: "What you know today is obsolete in 11 months."</p><p>23:40 - Cole: I think AI is a really good example of security not having a proactive mindset.</p><p>25:00 - Edwin: Security team always chasing its tail.</p><p>26:30 - Cole: I always worry when cybersecurity teams advocate for having more money.</p><p>27:30 - Edwin: Security is seen as a "cost centre," not revenue generation.</p><p>30:30 - Advice for young people wanting to enter the industry/tech more generally.</p><p>32:40 - Rapid fire questions.</p><p>35:50 - Edwin’s favourite book to recommend: How To Win Friends and Influence People.</p><p>37:30 - Edwin’s 1 piece of advice: "Look at your open source supply chain."</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts/edwin-kwan]]></link><guid isPermaLink="false">f31fc2a8-9d91-47f7-b91d-dd16b75030dc</guid><itunes:image href="https://artwork.captivate.fm/538c6664-edfa-4822-946d-6ab5950f9223/9FHs5Zp6gsm-iGVFSU4-XSOo.jpg"/><pubDate>Thu, 06 Jul 2023 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/c20f09e7-28dc-4e14-a3da-85d6359ab4c8/EP07-Edwin-Kwan-Secured-02.mp3" length="57765581" type="audio/mpeg"/><itunes:duration>40:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>8</itunes:episode><podcast:episode>8</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/1c9acd99-c585-4521-ae9d-ca74c043dbb0/index.html" type="text/html"/></item><item><title>BONUS: 2023 Review of the Cyber Bible - The Australian Cyber Security Centre&apos;s (ACSC) Information Security Manual (ISM)</title><itunes:title>BONUS: 2023 Review of the Cyber Bible - The Australian Cyber Security Centre&apos;s (ACSC) Information Security Manual (ISM)</itunes:title><description><![CDATA[<p>In this bonus episode, Cole Cornford chats with Toby Amodio, Chief Information Security Officer at the Department of Parliamentary Services, about the latest update of the Information Security Manual, ahead of its release in early July. The Information Security Manual is a great reference for anyone looking to understand what threats the government is looking to address, and where the cybersecurity community needs to be more vigilant. </p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p>00:00 - Toby Amodio and Cole Cornford start their discussion about the Australian Cyber Security Centre's (ACSC) Information Security Manual (ISM) Control 2023 Updates, focusing initially on the encryption and handling of passwords.</p><p>03:38 - Toby highlights a humorous typo on a 30-character limit for "break glass" accounts, which was later corrected by the ACSC.</p><p>06:04 - Cole discusses the ISM Control 1171 update which relates to password managers. They explore the pros and cons of using these tools.</p><p>09:00 - Toby introduces a change in ISM Control 1492, which now requires password changes only when there are indications of compromise, marking a shift from regular password changes.</p><p>11:08 - Cole discusses changes in ISM Control 1428, highlighting how security is shifting towards a more risk-based approach rather than blanket mandates.</p><p>14:15 - Toby talks about Control 1371, which emphasises procurement processes and "secure-by-design" practices. However, he also acknowledges the practical challenge of enforcing such a control.</p><p>18:43 - Cole and Toby discuss ISM Control 1431 which focuses on scalability in cloud environments. They delve into how most government systems might not be architected to handle dynamic scaling.</p><p>25:46 - Toby introduces the concept of continuous real-time monitoring. They debate the removal of Control 1518, which pertains to maintaining a low-bandwidth version of a website as a form of backup.</p><p>28:51 - Cole argues against maintaining a low-bandwidth website. He emphasises the need to build more resilient applications that can handle load effectively.</p><p>31:42 - Toby and Cole discuss the practical impact of the changes, noting how it creates a competitive vector for businesses and promotes better cultural change in the security space.</p><p>33:18 - Toby summarises the overall changes in the ISM guidelines, focusing on the blend of security by design and resilience of websites and external services.</p><p>34:51 - Cole shares his viewpoint on why it's better to focus on resilience rather than having a low bandwidth backup.</p><p>36:07 - They discuss the potential negative implications of switching to a low-bandwidth version during high load, such as causing alarm and potential reputational damage.</p><p>37:41 - Toby and Cole discuss their favourite parts of the updates, appreciating the indirect promotion of better cultural change in security through the ISM.</p><p>40:46 - They conclude their conversation, expressing their gratitude to the ACSC for the constant improvement of the ISM document and its value to the cybersecurity community.</p><h2>Resources</h2><p><a href="https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/ism" rel="noopener noreferrer" target="_blank">https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/ism</a></p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p>In this bonus episode, Cole Cornford chats with Toby Amodio, Chief Information Security Officer at the Department of Parliamentary Services, about the latest update of the Information Security Manual, ahead of its release in early July. The Information Security Manual is a great reference for anyone looking to understand what threats the government is looking to address, and where the cybersecurity community needs to be more vigilant. </p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p>00:00 - Toby Amodio and Cole Cornford start their discussion about the Australian Cyber Security Centre's (ACSC) Information Security Manual (ISM) Control 2023 Updates, focusing initially on the encryption and handling of passwords.</p><p>03:38 - Toby highlights a humorous typo on a 30-character limit for "break glass" accounts, which was later corrected by the ACSC.</p><p>06:04 - Cole discusses the ISM Control 1171 update which relates to password managers. They explore the pros and cons of using these tools.</p><p>09:00 - Toby introduces a change in ISM Control 1492, which now requires password changes only when there are indications of compromise, marking a shift from regular password changes.</p><p>11:08 - Cole discusses changes in ISM Control 1428, highlighting how security is shifting towards a more risk-based approach rather than blanket mandates.</p><p>14:15 - Toby talks about Control 1371, which emphasises procurement processes and "secure-by-design" practices. However, he also acknowledges the practical challenge of enforcing such a control.</p><p>18:43 - Cole and Toby discuss ISM Control 1431 which focuses on scalability in cloud environments. They delve into how most government systems might not be architected to handle dynamic scaling.</p><p>25:46 - Toby introduces the concept of continuous real-time monitoring. They debate the removal of Control 1518, which pertains to maintaining a low-bandwidth version of a website as a form of backup.</p><p>28:51 - Cole argues against maintaining a low-bandwidth website. He emphasises the need to build more resilient applications that can handle load effectively.</p><p>31:42 - Toby and Cole discuss the practical impact of the changes, noting how it creates a competitive vector for businesses and promotes better cultural change in the security space.</p><p>33:18 - Toby summarises the overall changes in the ISM guidelines, focusing on the blend of security by design and resilience of websites and external services.</p><p>34:51 - Cole shares his viewpoint on why it's better to focus on resilience rather than having a low bandwidth backup.</p><p>36:07 - They discuss the potential negative implications of switching to a low-bandwidth version during high load, such as causing alarm and potential reputational damage.</p><p>37:41 - Toby and Cole discuss their favourite parts of the updates, appreciating the indirect promotion of better cultural change in security through the ISM.</p><p>40:46 - They conclude their conversation, expressing their gratitude to the ACSC for the constant improvement of the ISM document and its value to the cybersecurity community.</p><h2>Resources</h2><p><a href="https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/ism" rel="noopener noreferrer" target="_blank">https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/ism</a></p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts/information-security-manual]]></link><guid isPermaLink="false">0a854927-6930-474f-82f8-d7f9a7273715</guid><itunes:image href="https://artwork.captivate.fm/ae6d71c5-9b01-48bf-b3ec-682d85799ca6/BtpLP-ykgLO_vWhRfSJAj0kB.jpg"/><pubDate>Thu, 29 Jun 2023 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/8bb6cc28-062a-4ca7-90be-080ace0c2380/Toby-Amodio-June-2023-Secured-02.mp3" length="61100268" type="audio/mpeg"/><itunes:duration>42:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>bonus</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>7</itunes:episode><podcast:episode>7</podcast:episode><podcast:season>1</podcast:season></item><item><title>Balancing Act: Merging Cybersecurity and Business Strategies with Sheena Peeters</title><itunes:title>Balancing Act: Merging Cybersecurity and Business Strategies with Sheena Peeters</itunes:title><description><![CDATA[<p>After beginning her career as a management consultant, Sheena Peeters has worked in a variety of roles within tech and cybersecurity, including founding her own startup, and executing digital strategies for companies like NAB and Australia Post in key management positions. Sheena chats with Cole Cornford about aligning cybersecurity strategy with business strategy, fostering a culture of shared responsibility, the challenges of measuring ROI in cybersecurity, and plenty more. </p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p>6:00 - Discussion on Sheena’s career background.</p><p>8:00 - Sheena discusses the start of her career in consulting, highlighting its benefits.</p><p>10:30 - Cole shares his experience and challenges moving into consulting.</p><p>13:30 - Cole asks about the essential qualities required for leaders of companies.</p><p>17:00 - Cole addresses the challenges of having just a one or two-person cybersecurity team.</p><p>20:20 - Sheena shares strategies on how to encourage shared responsibility throughout a company.</p><p>23:30 - Cole discusses the negative dynamic between security teams and the rest of the company.</p><p>25:20 - Sheena emphasizes that the security architect should be part of the architecture team.</p><p>26:20 - Cole presents two models that security architects typically fall into.</p><p>32:20 - Cole asks about decision-making strategies regarding resource allocation.</p><p>32:40 - Sheena insists that the cybersecurity strategy needs to align with the business strategy.</p><p>34:20 - Sheena highlights the rapid changes in the cybersecurity field.</p><p>34:50 - Sheena asserts that compliance is not a strategy.</p><p>36:50 - Cole addresses the difficulty in measuring ROI in cybersecurity and asks about Sheena's strategies.</p><p>42:50 - Rapid fire questions begin.</p><p>49:00 - Sheena's piece of advice: the importance of collaboration and cooperation.</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p>After beginning her career as a management consultant, Sheena Peeters has worked in a variety of roles within tech and cybersecurity, including founding her own startup, and executing digital strategies for companies like NAB and Australia Post in key management positions. Sheena chats with Cole Cornford about aligning cybersecurity strategy with business strategy, fostering a culture of shared responsibility, the challenges of measuring ROI in cybersecurity, and plenty more. </p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p>6:00 - Discussion on Sheena’s career background.</p><p>8:00 - Sheena discusses the start of her career in consulting, highlighting its benefits.</p><p>10:30 - Cole shares his experience and challenges moving into consulting.</p><p>13:30 - Cole asks about the essential qualities required for leaders of companies.</p><p>17:00 - Cole addresses the challenges of having just a one or two-person cybersecurity team.</p><p>20:20 - Sheena shares strategies on how to encourage shared responsibility throughout a company.</p><p>23:30 - Cole discusses the negative dynamic between security teams and the rest of the company.</p><p>25:20 - Sheena emphasizes that the security architect should be part of the architecture team.</p><p>26:20 - Cole presents two models that security architects typically fall into.</p><p>32:20 - Cole asks about decision-making strategies regarding resource allocation.</p><p>32:40 - Sheena insists that the cybersecurity strategy needs to align with the business strategy.</p><p>34:20 - Sheena highlights the rapid changes in the cybersecurity field.</p><p>34:50 - Sheena asserts that compliance is not a strategy.</p><p>36:50 - Cole addresses the difficulty in measuring ROI in cybersecurity and asks about Sheena's strategies.</p><p>42:50 - Rapid fire questions begin.</p><p>49:00 - Sheena's piece of advice: the importance of collaboration and cooperation.</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[https://galahcyber.com.au/podcasts/sheena-peeters]]></link><guid isPermaLink="false">4e7e4024-20a0-4111-8d5f-85887978ca01</guid><itunes:image href="https://artwork.captivate.fm/a83913ad-9d12-4b8c-a586-4156f724c6b0/oOK9MSjIheUNPKEs2mnB67K9.jpg"/><pubDate>Thu, 22 Jun 2023 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/c667a539-2c59-49aa-986f-27039d47eac6/Sheena-Peeters-Secured-02.mp3" length="72489865" type="audio/mpeg"/><itunes:duration>50:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>6</itunes:episode><podcast:episode>6</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/17050d2e-1724-4dbf-a2e9-1a69d6eda71e/index.html" type="text/html"/></item><item><title>Hacking the Game of Life: From Gaming Exploits to Cybersecurity Giant with Shubham Shah of Assetnote</title><itunes:title>Hacking the Game of Life: From Gaming Exploits to Cybersecurity Giant with Shubham Shah of Assetnote</itunes:title><description><![CDATA[<p>Shubham Shah is co-founder and CTO of Assetnote, a cybersecurity tool used by companies like Atlassian, Qantas, and Australia Post. Shubham’s career in cybersecurity had very humble beginnings: he first learned to hack computer games as a kid so he could beat his brother. Shubham chats with Cole Cornford about video game exploits and what they can teach us about appsec, bug bounty hunting, the challenges of founding a company, and plenty more.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p>2:30 - Benefits of shared workspace.</p><p>5:30 - Shubham’s background.</p><p>9:00 - Bug bounty hunting.</p><p>10:45 - Developing a good work ethic from crappy jobs.</p><p>15:00 - Video game hacking.</p><p>21:00 - Tying video game hacking to cybersecurity.</p><p>22:40 - Shubham: got in trouble for hacking in high school.</p><p>24:20 - Shubham: had to convince his parents to let him study computer science.</p><p>26:00 - Shubham was working an unpaid internship.</p><p>26:50 - Cole: pros and cons of uni education.</p><p>29:20 - Shubham: I don’t discourage people from going to uni.</p><p>32:00 - Assetnote - discussing the company.</p><p>34:00 - Shubham started commercialising but “had no idea what I was doing”.</p><p>36:45 - Cole reflects on his early naivety when starting Galah Cyber.</p><p>38:30 - Pros and challenges of bootstrapping a business.</p><p>39:00 - Shubham: came close to running out of money.</p><p>40:45 - Cole: I see a vacuum for app sec talent in smaller orgs.</p><p>41:30 - Cole: software has eaten the world. Now AI is eating software.</p><p>43:10 - Shubham: division of work between Shubham and co-founder.</p><p>44:30 - Doing any job to move the business forward.</p><p>47:00 - Rapid-fire questions.</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p>Shubham Shah is co-founder and CTO of Assetnote, a cybersecurity tool used by companies like Atlassian, Qantas, and Australia Post. Shubham’s career in cybersecurity had very humble beginnings: he first learned to hack computer games as a kid so he could beat his brother. Shubham chats with Cole Cornford about video game exploits and what they can teach us about appsec, bug bounty hunting, the challenges of founding a company, and plenty more.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p>2:30 - Benefits of shared workspace.</p><p>5:30 - Shubham’s background.</p><p>9:00 - Bug bounty hunting.</p><p>10:45 - Developing a good work ethic from crappy jobs.</p><p>15:00 - Video game hacking.</p><p>21:00 - Tying video game hacking to cybersecurity.</p><p>22:40 - Shubham: got in trouble for hacking in high school.</p><p>24:20 - Shubham: had to convince his parents to let him study computer science.</p><p>26:00 - Shubham was working an unpaid internship.</p><p>26:50 - Cole: pros and cons of uni education.</p><p>29:20 - Shubham: I don’t discourage people from going to uni.</p><p>32:00 - Assetnote - discussing the company.</p><p>34:00 - Shubham started commercialising but “had no idea what I was doing”.</p><p>36:45 - Cole reflects on his early naivety when starting Galah Cyber.</p><p>38:30 - Pros and challenges of bootstrapping a business.</p><p>39:00 - Shubham: came close to running out of money.</p><p>40:45 - Cole: I see a vacuum for app sec talent in smaller orgs.</p><p>41:30 - Cole: software has eaten the world. Now AI is eating software.</p><p>43:10 - Shubham: division of work between Shubham and co-founder.</p><p>44:30 - Doing any job to move the business forward.</p><p>47:00 - Rapid-fire questions.</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[http://galahcyber.com.au/podcasts/shubham-shah]]></link><guid isPermaLink="false">2644a3b2-3b4d-4e85-83c3-8c37309597e4</guid><itunes:image href="https://artwork.captivate.fm/d18b3b7f-0cc4-48ba-8871-32e235341907/-oVAnrg3s7vG-cV4cj0RA7B2.jpg"/><pubDate>Thu, 08 Jun 2023 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/5f9f246b-c59f-4b85-8780-0e5d239f90a7/EP05-Shubham-Shah-Secured-03.mp3" length="78133568" type="audio/mpeg"/><itunes:duration>54:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>5</itunes:episode><podcast:episode>5</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/cf4d4cef-1c71-4509-b750-96a9a2bf1966/index.html" type="text/html"/></item><item><title>Decoding Cybersecurity Hiring: Riki Blok on Industry Trends, Key Skills, and the Future of Remote Work</title><itunes:title>Decoding Cybersecurity Hiring: Riki Blok on Industry Trends, Key Skills, and the Future of Remote Work</itunes:title><description><![CDATA[<p>Riki Blok is a management recruitment consultant who specialises in cybersecurity. Riki heads up a team of recruitment consultants at the employment agency Talenza, filling positions in security, infrastructure, dev ops and cloud. This role gives him a unique perspective on the cybersecurity industry, and in his conversation with host Cole Cornford, Riki shares his insights on what companies are looking for in their hires, both for entry level and more senior security roles. Riki and Cole chat about current trends in the industry, what skills are most important in potential employees, changing expectations around remote work, and plenty more.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p>4:40 - Riki’s background and career journey.</p><p>11:30 - Riki: as a recruiter, I’m the least important person in the interaction.</p><p>13:40 - Cole reflects on opportunity cost.</p><p>14:20 - Cole: recruitment’s a tough industry: why?</p><p>17:00 - Cole: I follow David Mayster’s philosophy.</p><p>20:00 - Riki: Video calls and pandemic changed recruitment industry.</p><p>23:00 - Team culture is hard to drive when everyone is working remotely.</p><p>24:20 - Pros and cons of video calls in recruitment.</p><p>26:20 - Hybrid work.</p><p>27:00 - Riki: recruiting for big tech firm that requires hybrid work.</p><p>27:50 - Cole: what are some trends in cybersecurity recruitment?</p><p>28:40 - Riki: In general, seeing a maturing of the industry.</p><p>30:20 - Riki: gender diversity trending in right direction.</p><p>31:20 - What are the right qualifications/requirements for a cybersecurity job.</p><p>33:00 - Importance of networking.</p><p>35:00 - Limited amount of entry-level cybersecurity jobs.</p><p>36:30 - Cole: if you can’t empathise with people, you’re screwed.</p><p>38:20 - Tips for people further along in their career.</p><p>39:20 - Riki: your appearance matters.</p><p>41:10 - Cole overdressed at Atlassian office.</p><p>42:00 - Quick fire questions.</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p>Riki Blok is a management recruitment consultant who specialises in cybersecurity. Riki heads up a team of recruitment consultants at the employment agency Talenza, filling positions in security, infrastructure, dev ops and cloud. This role gives him a unique perspective on the cybersecurity industry, and in his conversation with host Cole Cornford, Riki shares his insights on what companies are looking for in their hires, both for entry level and more senior security roles. Riki and Cole chat about current trends in the industry, what skills are most important in potential employees, changing expectations around remote work, and plenty more.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><p>4:40 - Riki’s background and career journey.</p><p>11:30 - Riki: as a recruiter, I’m the least important person in the interaction.</p><p>13:40 - Cole reflects on opportunity cost.</p><p>14:20 - Cole: recruitment’s a tough industry: why?</p><p>17:00 - Cole: I follow David Mayster’s philosophy.</p><p>20:00 - Riki: Video calls and pandemic changed recruitment industry.</p><p>23:00 - Team culture is hard to drive when everyone is working remotely.</p><p>24:20 - Pros and cons of video calls in recruitment.</p><p>26:20 - Hybrid work.</p><p>27:00 - Riki: recruiting for big tech firm that requires hybrid work.</p><p>27:50 - Cole: what are some trends in cybersecurity recruitment?</p><p>28:40 - Riki: In general, seeing a maturing of the industry.</p><p>30:20 - Riki: gender diversity trending in right direction.</p><p>31:20 - What are the right qualifications/requirements for a cybersecurity job.</p><p>33:00 - Importance of networking.</p><p>35:00 - Limited amount of entry-level cybersecurity jobs.</p><p>36:30 - Cole: if you can’t empathise with people, you’re screwed.</p><p>38:20 - Tips for people further along in their career.</p><p>39:20 - Riki: your appearance matters.</p><p>41:10 - Cole overdressed at Atlassian office.</p><p>42:00 - Quick fire questions.</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[http://galahcyber.com.au/secured/riki-blok]]></link><guid isPermaLink="false">aa457644-4373-43ab-a287-7aa8376a7c7c</guid><itunes:image href="https://artwork.captivate.fm/b5f5da64-7da0-473b-9a99-7d78d02f3fbf/7GqXo_4v0P_uRm-RipD4DDdM.jpg"/><pubDate>Thu, 25 May 2023 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/c0c640b7-4759-4f98-8912-c42c565f7e1d/EP04-Riki-Blok-Secured-03.mp3" length="67743938" type="audio/mpeg"/><itunes:duration>47:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>4</itunes:episode><podcast:episode>4</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/7244c6a6-86e8-438b-9858-d832917efba0/index.html" type="text/html"/></item><item><title>Trevor Hancock on Bridging the Gap between Protection and Progress</title><itunes:title>Trevor Hancock on Bridging the Gap between Protection and Progress</itunes:title><description><![CDATA[<p>Trevor Hancock has enjoyed a decades long career as a cybersecurity consultant, and today is Specialist Director at Deloitte. Trevor is most motivated by projects that make a meaningful difference in people’s day to day lives, and throughout his career he’s had the opportunity to work on several large scale projects that touch the lives of thousands of Australians.</p><p>In his conversation with host Cole Cornford, Trevor discusses finding a balance between protecting against security threats while allowing an organisation to pursue its goals, the importance of being vulnerable with your colleagues, and plenty more. </p><p>Secured is brought to you by Galah Cyber.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><h2>Timestamps</h2><ul><li>2:00 - Opening banter.</li><li>5:00 - The most interesting project Trevor’s worked on (gives 3 examples).</li><li>6:40 - Cole: making a difference by working in the public sector.</li><li>7:20 - Trevor: “Shelfware” vs worthwhile work.</li><li>7:45 - Cole: Cybersecurity industry has a lot of people who are jaded.</li><li>8:30 - Trevor: we all have to use the “fear factor” to generate money.</li><li>9:10 - Trevor: cybersecurity has to enable business.</li><li>9:50: - Cole: How do we build a positive, trusting relationship with our customers?</li><li>11:00 - Cole: People focus too much on technical aspects, not enough on business aspects.</li><li>13:00 - Trevor: cybersecurity is often prioritised far too late into project.</li><li>13:30 - Cole: how do we change the above?</li><li>14:40 - How Trevor got into cybersecurity.</li><li>19:50 - Cole: I believe cybersecurity should be approachable.</li><li>20:45 - Trevor: you wouldn’t cross a road without looking left and right.</li><li>22:40 - Making calculated risks.</li><li>23:55 - Cole: delegation is important.</li><li>25:40 - How sport has been helpful to Trevor’s career.</li><li>29:20 - Exercise helps free the mind.</li><li>30:00 - The importance of taking a break.</li><li>32:30 - Advice for young people entering cybersecurity: be willing to learn from trial and error.</li><li>36:50 - Quick fire questions.</li></ul><br/><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p>Trevor Hancock has enjoyed a decades long career as a cybersecurity consultant, and today is Specialist Director at Deloitte. Trevor is most motivated by projects that make a meaningful difference in people’s day to day lives, and throughout his career he’s had the opportunity to work on several large scale projects that touch the lives of thousands of Australians.</p><p>In his conversation with host Cole Cornford, Trevor discusses finding a balance between protecting against security threats while allowing an organisation to pursue its goals, the importance of being vulnerable with your colleagues, and plenty more. </p><p>Secured is brought to you by Galah Cyber.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><h2>Timestamps</h2><ul><li>2:00 - Opening banter.</li><li>5:00 - The most interesting project Trevor’s worked on (gives 3 examples).</li><li>6:40 - Cole: making a difference by working in the public sector.</li><li>7:20 - Trevor: “Shelfware” vs worthwhile work.</li><li>7:45 - Cole: Cybersecurity industry has a lot of people who are jaded.</li><li>8:30 - Trevor: we all have to use the “fear factor” to generate money.</li><li>9:10 - Trevor: cybersecurity has to enable business.</li><li>9:50: - Cole: How do we build a positive, trusting relationship with our customers?</li><li>11:00 - Cole: People focus too much on technical aspects, not enough on business aspects.</li><li>13:00 - Trevor: cybersecurity is often prioritised far too late into project.</li><li>13:30 - Cole: how do we change the above?</li><li>14:40 - How Trevor got into cybersecurity.</li><li>19:50 - Cole: I believe cybersecurity should be approachable.</li><li>20:45 - Trevor: you wouldn’t cross a road without looking left and right.</li><li>22:40 - Making calculated risks.</li><li>23:55 - Cole: delegation is important.</li><li>25:40 - How sport has been helpful to Trevor’s career.</li><li>29:20 - Exercise helps free the mind.</li><li>30:00 - The importance of taking a break.</li><li>32:30 - Advice for young people entering cybersecurity: be willing to learn from trial and error.</li><li>36:50 - Quick fire questions.</li></ul><br/><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[http://galahcyber.com.au/secured/trevor-hancock]]></link><guid isPermaLink="false">9c631e5e-9879-4c7a-871f-6778c4d8beaf</guid><itunes:image href="https://artwork.captivate.fm/7de6b4a7-23e2-44d9-8c0e-817896abd4c6/GPROr7b5nNULt7fvULi7aO-i.jpg"/><pubDate>Thu, 11 May 2023 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/1615f893-f1ad-484f-a191-1abc3de1d2db/EP03-Trevor-Hancock-Secured-02mp3.mp3" length="61816232" type="audio/mpeg"/><itunes:duration>42:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>3</itunes:episode><podcast:episode>3</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/1b88ebf0-b305-4af2-9b3e-f5d323d910e9/index.html" type="text/html"/></item><item><title>From Software Developer to Cybersecurity Expert: Nina Juliadotter on the Importance of Application Security and Continuous Learning</title><itunes:title>From Software Developer to Cybersecurity Expert: Nina Juliadotter on the Importance of Application Security and Continuous Learning</itunes:title><description><![CDATA[<h1>Summary</h1><p>After years of working as a software developer, Nina Juliadotter was reading headlines about data breaches at major companies. She was horrified to think developers like herself might be leaving vulnerabilities that made these breaches possible. This inspired Nina to study for a Masters in Cybersecurity, and has focused on improving application security ever since. Today, Nina is Westpac’s Principal Information Security Consultant.&nbsp;</p><p>In her conversation with Cole, Nina discusses cybersecurity education and training, the crucial role of software inventory management, the importance of not being afraid to ask “dumb” questions, and more.</p><p>Secured is brought to you by Galah Cyber.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><h2>Timestamps</h2><p>3:13 - Nina’s path to getting into cybersecurity.</p><p>3:37 - “I was horrified” - Nina felt responsible for data breaches.</p><p>4:50 - Cole: Are developers taught about AppSec today?</p><p>7:00 - Need for higher-up management to appreciate the importance of AppSec.</p><p>9:00 - Cole: How do we tackle the problem of not having enough respect for AppSec?</p><p>10:30 - Nina: I don’t think secure development is rocket science.</p><p>12:10 - Nina: I believe the work is meaningful.</p><p>13:00 - Nina: It comes down to good and evil.</p><p>13:30 - Cole: AppSec is working with real, tangible things.</p><p>15:00 - Cole: What does formal cybersecurity education look like?</p><p>16:30 - Nina: Considers her work very specialised and narrow-focused.</p><p>17:00 - Cole: Believes most AppSec professionals are generalists.</p><p>18:30 - Nina: currently focusing on inventory management.</p><p>19:00 - Nina: Where do you start with an AppSec program?</p><p>21:45 - Cole: How does a large organisation tackle inventory management?</p><p>22:40 - Nina: how inventory management works at Westpack.</p><p>24:50 - Cole: What’s one personal trait that’s helped in your career?</p><p>25:00 - Nina: I was never one of the gifted kids.</p><p>25:45 - Nina: Important to always ask questions.</p><p>29:30 - Cole: Importance of hard work.</p><p>30:40 - Rapid fire questions.</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<h1>Summary</h1><p>After years of working as a software developer, Nina Juliadotter was reading headlines about data breaches at major companies. She was horrified to think developers like herself might be leaving vulnerabilities that made these breaches possible. This inspired Nina to study for a Masters in Cybersecurity, and has focused on improving application security ever since. Today, Nina is Westpac’s Principal Information Security Consultant.&nbsp;</p><p>In her conversation with Cole, Nina discusses cybersecurity education and training, the crucial role of software inventory management, the importance of not being afraid to ask “dumb” questions, and more.</p><p>Secured is brought to you by Galah Cyber.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><h2>Timestamps</h2><p>3:13 - Nina’s path to getting into cybersecurity.</p><p>3:37 - “I was horrified” - Nina felt responsible for data breaches.</p><p>4:50 - Cole: Are developers taught about AppSec today?</p><p>7:00 - Need for higher-up management to appreciate the importance of AppSec.</p><p>9:00 - Cole: How do we tackle the problem of not having enough respect for AppSec?</p><p>10:30 - Nina: I don’t think secure development is rocket science.</p><p>12:10 - Nina: I believe the work is meaningful.</p><p>13:00 - Nina: It comes down to good and evil.</p><p>13:30 - Cole: AppSec is working with real, tangible things.</p><p>15:00 - Cole: What does formal cybersecurity education look like?</p><p>16:30 - Nina: Considers her work very specialised and narrow-focused.</p><p>17:00 - Cole: Believes most AppSec professionals are generalists.</p><p>18:30 - Nina: currently focusing on inventory management.</p><p>19:00 - Nina: Where do you start with an AppSec program?</p><p>21:45 - Cole: How does a large organisation tackle inventory management?</p><p>22:40 - Nina: how inventory management works at Westpack.</p><p>24:50 - Cole: What’s one personal trait that’s helped in your career?</p><p>25:00 - Nina: I was never one of the gifted kids.</p><p>25:45 - Nina: Important to always ask questions.</p><p>29:30 - Cole: Importance of hard work.</p><p>30:40 - Rapid fire questions.</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[http://galahcyber.com.au/secured/nina-juliadotter]]></link><guid isPermaLink="false">fee3ef21-8e58-4ffb-a8d7-c4da15116e21</guid><itunes:image href="https://artwork.captivate.fm/9b1de66d-9c99-4748-881b-1f1bcb9dc7f0/D6wBtckEHvVg0F2cBmteP4V2.jpg"/><pubDate>Thu, 27 Apr 2023 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/53c26d31-f19d-4816-9d47-52fde7e85ec0/EP2-Nina-Juliadotter-Secured-Intro-Teaser-Added-02.mp3" length="48515726" type="audio/mpeg"/><itunes:duration>33:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>2</itunes:episode><podcast:episode>2</podcast:episode><podcast:season>1</podcast:season><itunes:summary>After years of working as a software developer, Nina Juliadotter was reading headlines about data breaches at major companies. She was horrified to think developers like herself might be leaving vulnerabilities that made these breaches possible. This inspired Nina to study for a Masters in Cybersecurity, and has focused on improving application security ever since. Today, Nina is Westpac’s Principal Information Security Consultant. 

In her conversation with Cole, Nina discusses cybersecurity education and training, the crucial role of software inventory management, the importance of not being afraid to ask “dumb” questions, and more.</itunes:summary><podcast:transcript url="https://transcripts.captivate.fm/transcript/6098fa00-00af-4e0b-af24-265f44e967a5/index.html" type="text/html"/></item><item><title>The Human Side of Cybersecurity: Toby&apos;s Journey and Insight on Collaboration, Communication and Auditing</title><itunes:title>The Human Side of Cybersecurity: Toby&apos;s Journey and Insight on Collaboration, Communication and Auditing</itunes:title><description><![CDATA[<p>Toby Amodio is the Chief Information Security Officer at the Department of Parliamentary Services. As Toby puts it himself, he’s probably the only CISO with a “feminist degree”, having studied politics, history and gender studies. His career advancement has been unusually fast for the field of cybersecurity, progressing from a university graduate to his current role in just 15 years. In his conversation with Cole, Toby discusses some of the AppSec challenges unique to the government, when it’s important to say no to a client, why security auditors are your friend and more.</p><p>Secured is brought to you by Galah Cyber.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><h2>Timestamps</h2><p>4:00 - Two examples of exciting projects Toby has worked on.</p><p>5:30 - “Cybersecurity is built on the human”.</p><p>5:40 - How Toby’s work helped people during covid.</p><p>8:30 - Parliament house bells in the background.</p><p>9:00 - Important to communicate in ways businesses can understand.</p><p>14:20 - Begin discussing the Australian Cybersecurity Centre.</p><p>15:30 - Cole: “I better read the ISM again”</p><p>16:40 - Cole: wants the podcast to focus on personal journeys.</p><p>17:00 - Toby’s background is studying politics and arts.</p><p>20:00 - Toby: “The crux of my career…”.</p><p>21:00 - When you should say no to a client.</p><p>22:30 - Cole’s views on people skills &amp; the right attitude are more important than qualifications.</p><p>23:40 - Toby recommends debating in high school as helpful for any career path.</p><p>24:15 - Toby recommends having cross-domain capabilities.</p><p>25:30 - Cole: communication skills are key.</p><p>26:50 - Toby: it’s easy to assume malintent.</p><p>26:50 - Toby: Half the job is calling CIO’s baby ugly.</p><p>28:35 - Cybersecurity experts have to tell people what’s wrong constantly.</p><p>30:00 - Cole: I see lots of people are afraid of auditors.</p><p>30:38 - Toby: Auditors are your friend.</p><p>30:50 - Toby: The only thing that grows in the dark is a fungus.</p><p>31:40 - Cole: Toby has progressed in his career very quickly.</p><p>32:00 - Cole: What are some challenges unique to gov?</p><p>33:50 - Toby: Higher levels of scrutiny.</p><p>35:20 - Collaboration between different gov orgs.</p><p>37:30 - Private sector keeps its cards close to its chest.</p><p>39:00 - Cole: cybersecurity in the rental sector.</p><p>39:50 - Quickfire questions.</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p>Toby Amodio is the Chief Information Security Officer at the Department of Parliamentary Services. As Toby puts it himself, he’s probably the only CISO with a “feminist degree”, having studied politics, history and gender studies. His career advancement has been unusually fast for the field of cybersecurity, progressing from a university graduate to his current role in just 15 years. In his conversation with Cole, Toby discusses some of the AppSec challenges unique to the government, when it’s important to say no to a client, why security auditors are your friend and more.</p><p>Secured is brought to you by Galah Cyber.</p><p><a href="https://secured.captivate.fm">Secured by Galah Cyber with Cole Cornford website</a> </p><h2>Timestamps</h2><p>4:00 - Two examples of exciting projects Toby has worked on.</p><p>5:30 - “Cybersecurity is built on the human”.</p><p>5:40 - How Toby’s work helped people during covid.</p><p>8:30 - Parliament house bells in the background.</p><p>9:00 - Important to communicate in ways businesses can understand.</p><p>14:20 - Begin discussing the Australian Cybersecurity Centre.</p><p>15:30 - Cole: “I better read the ISM again”</p><p>16:40 - Cole: wants the podcast to focus on personal journeys.</p><p>17:00 - Toby’s background is studying politics and arts.</p><p>20:00 - Toby: “The crux of my career…”.</p><p>21:00 - When you should say no to a client.</p><p>22:30 - Cole’s views on people skills &amp; the right attitude are more important than qualifications.</p><p>23:40 - Toby recommends debating in high school as helpful for any career path.</p><p>24:15 - Toby recommends having cross-domain capabilities.</p><p>25:30 - Cole: communication skills are key.</p><p>26:50 - Toby: it’s easy to assume malintent.</p><p>26:50 - Toby: Half the job is calling CIO’s baby ugly.</p><p>28:35 - Cybersecurity experts have to tell people what’s wrong constantly.</p><p>30:00 - Cole: I see lots of people are afraid of auditors.</p><p>30:38 - Toby: Auditors are your friend.</p><p>30:50 - Toby: The only thing that grows in the dark is a fungus.</p><p>31:40 - Cole: Toby has progressed in his career very quickly.</p><p>32:00 - Cole: What are some challenges unique to gov?</p><p>33:50 - Toby: Higher levels of scrutiny.</p><p>35:20 - Collaboration between different gov orgs.</p><p>37:30 - Private sector keeps its cards close to its chest.</p><p>39:00 - Cole: cybersecurity in the rental sector.</p><p>39:50 - Quickfire questions.</p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[http://galahcyber.com.au/secured/toby-amodio]]></link><guid isPermaLink="false">d3d2410d-9617-43b1-b942-89159a76b8a8</guid><itunes:image href="https://artwork.captivate.fm/120e892c-1e4a-48f6-9b96-9d4f40840e7e/ljpscJi0O7-Lyf4b83gQULP2.jpg"/><pubDate>Thu, 13 Apr 2023 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/86c33df6-eab2-4727-93d1-117088be4284/EP1-Toby-Amodio-Secured-Intro-Teaser-Added-03.mp3" length="66303233" type="audio/mpeg"/><itunes:duration>46:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>1</itunes:episode><podcast:episode>1</podcast:episode><podcast:season>1</podcast:season><itunes:summary>Toby Amodio is Chief Information Security Officer at the Department of Parliamentary Services. As Toby puts it himself, he’s probably the only CISO with a “feminist degree”, having studied politics, history and gender studies. His career advancement has been unusually fast for the field of cybersecurity, progressing from a university graduate to his current role in just 15 years. In his conversation with Cole, Toby discusses some of the AppSec challenges unique to the government, when it’s important to say no to a client, why security auditors are your friend, and more.</itunes:summary><podcast:transcript url="https://transcripts.captivate.fm/transcript/258325c6-0820-4fdb-8cfc-8dc63c717d0c/index.html" type="text/html"/></item><item><title>It&apos;s time to get Secured by Galah Cyber</title><itunes:title>It&apos;s time to get Secured by Galah Cyber</itunes:title><description><![CDATA[<p>“Secured” is the podcast for software security enthusiasts. Host Cole Cornford sits down with Australia’s top software security experts to uncover their unconventional career paths and the challenges they faced along the way. Listen in as they share their insights on the diverse approaches to AppSec, company by company, and how each organisation’s security needs are distinct and require personalised solutions. If you’re entering the world of application security and need a helping hand or a veteran, you’ll find something valuable in every episode. </p><p>Subscribe now to hear career stories and practical tips to help level up your career on “Secured by Galah Cyber”.</p><p><br></p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></description><content:encoded><![CDATA[<p>“Secured” is the podcast for software security enthusiasts. Host Cole Cornford sits down with Australia’s top software security experts to uncover their unconventional career paths and the challenges they faced along the way. Listen in as they share their insights on the diverse approaches to AppSec, company by company, and how each organisation’s security needs are distinct and require personalised solutions. If you’re entering the world of application security and need a helping hand or a veteran, you’ll find something valuable in every episode. </p><p>Subscribe now to hear career stories and practical tips to help level up your career on “Secured by Galah Cyber”.</p><p><br></p><p>Mentioned in this episode:</p><p><strong>Call for Feedback</strong></p><br/><br/>This podcast uses the following third-party services for analysis: <br/><br/>Podtrac - https://analytics.podtrac.com/privacy-policy-gdrp<br/>Spotify Ad Analytics - https://www.spotify.com/us/legal/ad-analytics-privacy-policy/]]></content:encoded><link><![CDATA[http://galahcyber.com.au/secured]]></link><guid isPermaLink="false">309af01a-8ae7-4f91-8e01-058c1faebe86</guid><itunes:image href="https://artwork.captivate.fm/02dc7bd9-4680-4c09-a4bf-a14fe576108f/LOGO-Secured-by-Galah-Cyber-01.jpg"/><pubDate>Tue, 04 Apr 2023 06:00:00 +1100</pubDate><enclosure url="https://prfx.byspotify.com/e/dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/64668429-7567-4cf3-aa85-0b877500eece/Secured-Launch-Trailer-01.mp3" length="2613777" type="audio/mpeg"/><itunes:duration>01:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>trailer</itunes:episodeType><itunes:season>1</itunes:season><podcast:season>1</podcast:season></item></channel></rss>