Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
History
Sports
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/5e/b4/21/5eb421cd-39ae-4cf5-7307-dc51db253668/mza_17906098394500704381.jpg/600x600bb.jpg
Cyber Voices
Australian Information Security Association (AISA)
54 episodes
3 days ago
Welcome to CYBER VOICES, where we highlight and celebrate the diverse voices of the Australian cyber community. From top-ranking CISOs and government officials to threat hunters and vulnerability analysts, if there’s a voice to be heard, you’ll hear it on CYBER VOICES. Join us as we delve into the stories, insights, and expertise that shape the world of cybersecurity in Australia.
Show more...
Technology
RSS
All content for Cyber Voices is the property of Australian Information Security Association (AISA) and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Welcome to CYBER VOICES, where we highlight and celebrate the diverse voices of the Australian cyber community. From top-ranking CISOs and government officials to threat hunters and vulnerability analysts, if there’s a voice to be heard, you’ll hear it on CYBER VOICES. Join us as we delve into the stories, insights, and expertise that shape the world of cybersecurity in Australia.
Show more...
Technology
Episodes (20/54)
Cyber Voices
Igniting a Global STEM Revolution with Kari Byron
In this episode of Cyber Voices, Kari Byron, known for her role on MythBusters, discusses her evolution from television host to STEM advocate. She is spearheading a global mission to promote STEM through a reimagined version of the White House Science Fair, now a national festival that transcends politics by involving industry sponsors. Byron explains how this initiative not only highlights young talent but also creates vital connections between students and industry leaders. The end goal is to empower the next generation of innovators, making STEM careers more accessible and fostering a worldwide community of future leaders.

Make sure you check out Kari's podcast, Mythfits! 
Show more...
3 days ago
20 minutes

Cyber Voices
Spotting Malicious Remote IT Applicants with Michael Puckridge and Jamie Lindsay
In this gripping episode of Cyber Voices, we delve into the intricate web of North Korean cyber operations, revealing how the nation operates more like an international criminal network than a traditional state entity. Michael Puckridge and Jamie Lindsay from DTEX discuss their investigations into North Korea's covert cyber workforce. These malevolent actors pose as legitimate IT professionals to penetrate organizations, siphoning funds back to their homeland. This episode uncovers how these operatives exploit the remote work trend to bypass security and steal advanced intellectual property, showing the nuances of modern cyber warfare in a world still grappling with the aftermath of the pandemic.
Show more...
1 week ago
29 minutes

Cyber Voices
From White House to CyberCon: Theresa Payton's Impactful Journey
In an engaging session at CyberCon Melbourne 2025, Theresa Payton shared insights from her pivotal career spanning from her role as the first female White House CIO to becoming the CEO of Fortalice. Payton captivated the audience by discussing her innovative approaches to cybersecurity, emphasising the importance of understanding human factors. She shares the success of her 'White House Happy Meal' initiative, a creative strategy to enhance cybersecurity training participation at the White House. Her keynote not only highlighted the serious cybersecurity work happening in Australia but also offered inventive solutions to global challenges.
Show more...
2 weeks ago
33 minutes

Cyber Voices
The Trident Exercise Series Explained with Tom Huth & Ryan Mclaren
Tom Huth and Ryan Mclaren stop by to discuss the Trident exercise series, a collaborative effort by the Australian Energy Market Operator (AEMO) and Retrospect Labs, is a large-scale cybersecurity exercise designed to enhance incident response in the energy sector. With participation from over 27 organizations and 560 individuals, the exercises simulate real-world cyber threats to practice and strengthen response capabilities. Through a flexible scenario framework, the exercises cater to varying maturity levels, focusing on delivering technically credible scenarios that participants can customize to fit their environments. This initiative not only boosts sector-wide resilience but also fosters collaboration across different organisations.
Show more...
3 weeks ago
37 minutes

Cyber Voices
Meet The Incident Response Champions
In this episode of Cyber Voices, David Willett chats with former participants of the Australian Women in Security Network (AWSN) and Retrospect Labs Incident Response Competition. The panelists, including competition winners and runners-up, share their transformative experiences in this hands-on, teamwork-based event. The competition, which simulates real-world cybersecurity incidents, highlights the importance of both technical and non-technical skills. Participants discuss how this immersive experience has propelled their careers in cybersecurity and fostered personal growth, while offering networking opportunities. The episode captures the competition's potential to redefine career paths and nurture talent in Australia’s cybersecurity landscape.

Register for this years competition here: https://events.humanitix.com/2025-awsn-incident-response-competition  

Get more detailed information here: https://www.retrospectlabs.com/events/awsn-2025-incident-response-competition  

Or, Chek out the AWSN Events Page: https://www.awsn.org.au/initiatives/incident-response-competition/
Show more...
1 month ago
36 minutes

Cyber Voices
The Invisible Backbone: Why APIs Matter More Than Ever with Jeremy Snyder
In this episode of Cyber Voices, David discusses with Jeremy Snyder, founder and CEO of Firetail, the critical yet often overlooked significance of API security in the modern digital landscape. Jeremy explains how APIs underpin most online interactions, from mobile apps to AI systems, and the large volume of personal data transferred through these gateways. Despite the rise of AI topics, API security should remain a primary focus due to its central role in Internet infrastructure. The discussion also highlights common security oversights, such as unauthenticated endpoints and unretired zombie APIs, stressing the need for diligence and organizational alignment.
Show more...
1 month ago
42 minutes

Cyber Voices
The Future of Non-Human Identities with Abbas Kudrati
In this episode of Cyber Voices, cybersecurity expert Abbas Kudrati discusses the emerging challenge of non-human identities in the digital landscape. These identities, which include API keys, machine identities, and AI agents, are becoming crucial security concerns as technological advancements accelerate. Abbas shares insights into how non-human identities are defined, their inherent risks, and the shift towards them as major targets for cyber attackers. He explains the necessity of visibility and governance over these identities. He offers some strategies for securing them, emphasising the need for a proactive approach in an increasingly complex cyber environment.
Show more...
1 month ago
41 minutes

Cyber Voices
Beyond the Questionnaire with Yvonne Sears
Yvonne Sears discusses innovative strategies for rethinking third-party risk assessments. Moving beyond traditional checklists, Yvonne emphasises the importance of aligning assessments with organisational goals and risk profiles. By focusing on specific objectives and measurable outcomes using OKRs, organisations can enhance trust, transparency, and resilience across their supply chains. The conversation highlights the limitations of standard questionnaires and advocates for a risk-based approach tailored to individual vendors and service providers, paving the way for more meaningful and effective partnerships.
Show more...
1 month ago
26 minutes

Cyber Voices
Stop Playing Whack-A-Mole with Karl Sellmann
In this episode of Cyber Voices, host David Willett sits down with Karl Sellmann, Chief Information Security Officer at Flinders University, to discuss the ongoing challenges in cybersecurity. Sellmann emphasises the importance of moving away from a reactive, 'whack-a-mole' approach to a more strategic, long-term plan that incorporates quick wins as building blocks.

By focusing on broader strategies and risk management, organisations can better align their efforts with emerging threats and maintain resilience. This involves leadership engagement, understanding organisational complexities, and ensuring ongoing adaptability and transparency in cybersecurity operations.
Show more...
1 month ago
27 minutes

Cyber Voices
Kill The Runbook with Zoe Adam
In this insightful episode of Cyber Voices, David Willett interviews Zoe Adam, a seasoned cybersecurity professional leading dynamic teams at CyberCX. Newly energised after her talk at AdelaideSEC, Zoe shares her revolutionary approach to security operations. She argues for adaptability over rigid runbooks, emphasising the necessity for curiosity in incident management. Through anecdotes and personal experience, Zoe highlights how a monotonous tiered system stymies growth and curiosity. Her innovative method focuses on letting analysts own their work from start to finish, thereby unleashing their full potential and empowering them to make significant impacts.
Show more...
2 months ago
30 minutes

Cyber Voices
Championing Change in Cybersecurity Leadership with Dr. Susan McGinty
In this enlightening episode of Cyber Voices, host David Willett talks with Dr. Susan McGinty, a leader in the realm of cybersecurity and STEM leadership. Dr. McGinty shares her journey from being a scientist to a passionate advocate for diversity and inclusion in cybersecurity. The discussion highlights her initiatives aimed at fostering leadership skills among women and promoting inclusive cultures within organisations.

Her work through AYA Leadership and The Asstembly emphasises the need for female representation at all levels, urging companies to embrace inclusivity as a driving force for innovation and effective decision-making.

  1. The Asstembly website: https://theasstembly.com/  
  2. Susan's white paper Advancing the Cyber Security Sector: Pathway to a Diverse and Inclusive Cyber Security Workforce, https://ayaleadership.com/advancing-the-cyber-security-sector-white-paper/  
  3. The Asstembly Women's Leadership Programs: https://theasstembly.com/womens-leadership-programs/
Show more...
2 months ago
39 minutes

Cyber Voices
Operationalising SIEM and SOAR with Jessica Clarence
In this special episode recorded live at AISA SydneySEC 2025, David Willett sits down with Jessica Clarence from the Australian Signals Directorate (ASD) to explore the agency’s latest efforts to uplift cybersecurity across all levels of government.

Jessica offers a deep dive into the SIEM and SOAR implementation guidelines developed by the ASD, highlighting how these frameworks are helping Australian organisations—both public and private—build more resilient and responsive cyber capabilities.

She also unpacks the Government Uplift mission and the role of the Australian Cyber Security Centre (ACSC) in driving practical, scalable security strategies.From resource constraints and skills shortages to the limitations of emerging tech like AI, this episode tackles the real-world challenges facing cybersecurity leaders today. Whether you're in government or the private sector, Jessica’s insights offer actionable takeaways for strengthening your cyber posture.
Show more...
2 months ago
25 minutes

Cyber Voices
Embracing Disability Confidence in Cyber with Rudy Haruta
In this episode of CyberVoices, David sits down with Rudy Haruta, a passionate advocate for disability inclusion and program lead at the Australian Disability Network. Rudy shares his personal journey and struggles with dyslexia, anxiety, and depression, and how these experiences shape his work today. They discuss the importance of organisations becoming disability confident, highlighting the need for tailored support and the challenges posed by traditional recruitment methods. The conversation aims to inspire listeners in the tech and cyber industries to consider more inclusive hiring practices and to better understand the unique perspectives of individuals with disabilities.
Show more...
2 months ago
35 minutes

Cyber Voices
Expanding the Third Party Risk Conversation with William Oh
In this episode of Cyber Voices, David Willett hosts William Oh, Senior VP at BlueVoyant, as they dive into the critical issue of third party cybersecurity risk. William shares his extensive background in intelligence and highlights the growing importance of cybersecurity. They discuss how cyber attacks have become the silent initiators of warfare and emphasise the increasing risks associated with third-party vendors. This conversation sheds light on the often-overlooked threats that lurk beneath the surface of conventional warfare.
Show more...
3 months ago
29 minutes

Cyber Voices
Building Trust into Biometrics with Gaurav Vikash
In this episode of Cyber Voices, David Willett interviews Gaurav Vikash, Head of Security and Risk for Asia Pacific at Axon, about the complex interplay of technology, compliance, and trust in today's security landscape. Gaurav discusses Axon's mission to create transparent policing tools, emphasising community trust. He also explores the exciting developments in biometric authentication and the risks associated with deepfake technology used to exploit static biometric systems. The conversation highlights the continuous need for innovative yet responsible solutions that enhance security while maintaining individual privacy and safety.
Show more...
3 months ago
30 minutes

Cyber Voices
Mastering Cyber Tabletop Exercises with Ella Donald
In this episode of Cyber Voices, Ella Donald, a change and communications manager for cybersecurity at the University of Queensland, shares her insights. Ella discusses her expertise in running successful tabletop exercises for both technical and executive audiences. She emphasises the importance of having clear aims, maintaining a proper scope, and understanding that these exercises are meant for practice rather than a test. Her approach focuses on relationship building and open communication, thereby enhancing organisational preparedness and resilience without amplifying egos or hierarchical barriers.
Show more...
3 months ago
16 minutes

Cyber Voices
The Power of Volunteering with James Pemberton
In this episode of Cyber Voices, host David Willett chats with James Pemberton, chair of the AISA's Tasmanian branch. James shares his journey from service desk roles into cybersecurity leadership and reflects on nearly a decade as an AISA member and volunteer. He highlights the branch's significant growth, with membership skyrocketing from 48 to 208. The conversation discusses the symbiotic relationship between seasoned professionals and students in Tasmania, emphasising community involvement and mentorship. James underscores the branch's challenges and rewards, stressing the importance of volunteer-driven initiatives to foster a vibrant cybersecurity community in Tasmania.
Show more...
3 months ago
23 minutes

Cyber Voices
Rats and Freeloaders with Peter Watson
In another interview recorded live at CyberCon Canberra 2025, David chats with with Peter Watson from Recorded Future. Peter provides insights into malware loaders and Remote Access Trojans (RATS), shedding light on their evasive tactics and the complexity of defending against them. Additionally, he delves into techniques like DLL hijacking, illustrating their subtlety and effectiveness. The conversation highlights the challenges faced by security teams in detecting such activities, emphasising the role of threat intelligence.
Show more...
4 months ago
23 minutes

Cyber Voices
Pride in Security
In this special Pride-themed episode of Cyber Voices, host David celebrates the diverse contributions of the LGBTQIA community within the cybersecurity industry. Guests Meagan McClendon, Sean Barnett, and Joshua Craig share personal experiences about their identities and roles in cyber. The discussion highlights the importance of inclusivity in tech fields, the challenges faced by LGBTQIA professionals, and the evolution of workplace attitudes. The episode also marks the ongoing advocacy efforts by the Pride in Security network, underscoring the broader movement towards creating safe and welcoming spaces for all individuals in the technology sector.
Show more...
4 months ago
46 minutes

Cyber Voices
Vanessa Van Beek Builds Cyber Defences with LEGO and Diversity
In this enlightening episode of Cyber Voices, David and Jasmine interview Vanessa Van Beek, a notable figure in the cybersecurity realm, to discuss her journey from IT to becoming a cybersecurity champion. Vanessa emphasises the importance of diversity within cyber teams, highlighting how different perspectives, including those from neurodivergent individuals, enhance problem-solving capabilities. She shares her innovative use of LEGO bricks to visualise and tackle cybersecurity challenges, demonstrating the power of creativity in technical fields. This dialogue showcases the value of embracing varied experiences and skill sets to strengthen defence mechanisms against cyber threats.
Show more...
4 months ago
29 minutes

Cyber Voices
Welcome to CYBER VOICES, where we highlight and celebrate the diverse voices of the Australian cyber community. From top-ranking CISOs and government officials to threat hunters and vulnerability analysts, if there’s a voice to be heard, you’ll hear it on CYBER VOICES. Join us as we delve into the stories, insights, and expertise that shape the world of cybersecurity in Australia.