エピソード

  • Laughing with Cyber - A Standup Comedy Special with Ian
    2025/12/23

    In this episode of the Security by Default podcast, host Joseph Carson welcomes Ian Murphy, a cybersecurity expert and stand-up comedian. They discuss Ian's unconventional journey into cybersecurity, his experiences at the MOD and Symantec, and his transition to self-employment and comedy. Ian shares insights on the importance of storytelling in both cybersecurity awareness and comedy, as well as navigating online criticism and audience interactions. The conversation highlights the need for humor in serious industries and the value of real human connections.

    Takeaways

    1. Ian's journey into cybersecurity was unplanned and unconventional.
    2. The importance of storytelling in both cybersecurity and comedy.
    3. Self-employment offers freedom but comes with challenges.
    4. Humor can be a powerful tool in serious industries.
    5. Navigating online criticism requires thick skin and perspective.
    6. Comedy is subjective, and not everyone will appreciate it.
    7. Real human interactions are essential in today's digital age.
    8. Learning from experiences is crucial for growth in any field.
    9. Networking and peer relationships are vital for success.
    10. Life is better when you find joy and laughter in everyday situations.


    Titles

    From Cybersecurity to Comedy: Ian Murphy's Journey

    The Power of Storytelling in Cybersecurity and Comedy


    Sound bites

    "I wanted to be a footballer."

    "Comedy is subjective."

    "You need to grow the fuck up."


    Chapters

    1. 00:00 Introduction to the Podcast and Guest
    2. 00:56 Ian's Origin Story and Journey into Cybersecurity
    3. 06:29 Experiences at MOD and Symantec
    4. 10:44 Transitioning to Self-Employment and Freedom
    5. 14:27 The Switch to Stand-Up Comedy
    6. 22:05 The Impact of Humor in Cybersecurity Awareness
    7. 30:06 Audience Feedback and Social Media Interaction
    8. 31:54 The Power of Audience Engagement
    9. 34:49 Navigating Controversy in Comedy
    10. 37:43 The Art of Timing and Response
    11. 40:47 Comedy as a Reflection of Life
    12. 43:44 The Evolution of Comedy and Storytelling
    13. 49:53 Learning
    続きを読む 一部表示
    57 分
  • From Hacker to Hollywood: Alissa Knight's Journey
    2025/12/16

    In this episode of the Security by Default podcast, host Joe Carson engages with cybersecurity expert Alissa Knight, who shares her unique journey into the world of hacking and cybersecurity. They discuss the evolution of hacking, the challenges of API security, and the transformative impact of AI on the industry. Alissa emphasizes the importance of continuous learning and adapting to new technologies, while also reflecting on her career shifts and the significance of storytelling in cybersecurity marketing. The conversation highlights the need for organizations to invest in their employees' education and the future of cybersecurity innovation.

    Takeaways

    • Alissa started hacking at the age of 13, driven by curiosity.
    • The early days of hacking were like the wild west, with fewer resources.
    • A significant turning point in Alissa's life was her arrest at 17.
    • Cybersecurity offers lucrative career opportunities for skilled individuals.
    • API security is a growing concern as more services rely on APIs.
    • AI is reshaping the cybersecurity landscape, creating new challenges and opportunities.
    • Continuous learning is essential in the fast-evolving field of cybersecurity.
    • Organizations must invest in training their developers in secure coding practices.
    • Storytelling can be a powerful tool in cybersecurity marketing.
    • The future of cybersecurity will heavily involve AI and automation.


    Sound bites

    "It was the wild, wild west."

    "I was arrested on my school campus."

    "This industry pays very well."


    Chapters

    • 00:00 Introduction to the Podcast and Guest
    • 00:57 Alissa Knight's Unique Origin Story
    • 05:30 The Evolution of Hacking and Cybersecurity
    • 10:54 Turning Points and Career Shifts
    • 16:10 The Impact of DDoS Attacks on Career Paths
    • 20:57 The Importance of API Security
    • 24:06 Hacking APIs and Security Vulnerabilities
    • 27:52 The Evolution of AI in Coding
    • 31:30 From Cybersecurity to Hollywood
    • 36:32 Introducing ARIES: AI for Cybersecurity
    • 39:03 The Importance of Continuous Learning in Cybersecurity


    Resources

    https://www.linkedin.com/in/alissaknight/

    https://www.knightgroup.co/

    https://microreels.com/

    https://www.youtube.com/@AlissaKnightArchives


    続きを読む 一部表示
    47 分
  • Building Trust in Customer Success with David Muniz
    2025/12/09

    In this episode of the Security by Default podcast, Joseph Carson engages with David Muniz to explore the evolving landscape of cybersecurity. They discuss the importance of diversity in the field, the distinction between customer success and support, and the critical role of trust in business relationships. The conversation also delves into the Zero Trust paradigm, emphasizing the need for a human-centric approach in cybersecurity. David shares insights on staying updated in a rapidly changing industry and the significance of happiness in the workplace, concluding with thoughts on the human element in cybersecurity.

    Keywords

    cybersecurity, customer success, zero trust, trust in business, diversity in tech, human relationships, customer support, industry insights, happiness in work, staying updated

    Takeaways

    · Customer success focuses on long-term relationships, not just immediate problem-solving.

    · Trust is a key component in building successful customer relationships.

    · Zero Trust is about managing trust dynamically, not eliminating it.

    · Customer success involves understanding what success means to the customer.

    · Building trust requires consistent and reliable service.

    · Human interactions are crucial in customer success, even in a digital world.

    · Customer success can lead to increased revenue through renewals and up-selling.

    · Trust in cybersecurity involves both technical and human elements.

    · Effective customer success strategies can differentiate a company in the market.

    · Balancing security with user experience is essential for customer satisfaction.


    Sound bites

    · "Customer success is about long-term relationships."

    · "Trust is not just assumed; it must be earned."

    · "Zero Trust is about managing trust, not eliminating it."

    · "Success is defined by the customer's perspective."

    · "Human interactions are crucial in a digital world."

    · "Trust leads to increased revenue and loyalty."

    · "Cybersecurity involves both technical and human elements."

    · "Balancing security with user experience is key."

    · "Customer success can differentiate a company."

    · "Trust is a business differentiator."


    Chapters

    00:00 Introduction to Cybersecurity and Guest Background

    04:10 The Importance of Diversity in Cybersecurity

    08:41 Understanding Customer Success vs. Customer Support

    12:52 Building Trust in Customer Relationships

    17:15 The Role of Zero Trust in Cybersecurity

    22:07 Understanding Zero Trust and Its Implications

    27:33 The Dynamic Nature of Trust in Cybersecurity

    32:01 The Human Element in Building Trust


    Additional Resources

    The Trust Paradox: A Cybersecurity Mindset for Human Relationships

    https://www.linkedin.com/pulse/trust-paradox-cybersecurity-mindset-human-david-muniz-f9fzf

    The Hidden ROI of Trust in Business and Cybersecurity...

    続きを読む 一部表示
    42 分
  • Transforming Cybersecurity Awareness Training with Michael Waite
    2025/12/03

    In this episode of Security by Default, host Joe Carson sits down with Michael Waite from Dune Security to explore how AI is reshaping cybersecurity and why it’s time to rethink traditional awareness training.

    As cyber threats become more sophisticated, personalized, and AI-powered, organizations can no longer rely on outdated, one-size-fits-all learning models. Joe and Michael break down what modern cybersecurity training should look like, how to engage employees more effectively, and why empowering people both inside and outside the office is essential to strong defense.

    What You’ll Learn
    • How AI is transforming both cyber attacks and defensive strategies
    • Why the volume and quality of phishing attempts continue to rise
    • The limitations of traditional annual awareness training
    • The shift toward personalized, role-based learning
    • How real-time intervention improves security habits
    • Why cybersecurity awareness must extend beyond the workplace
    • Practical ways to engage employees and build a security-first culture
    • The importance of collaboration and communication across teams
    • How threat intelligence informs more effective training programs

    Key Takeaways
    • AI is rewriting the threat landscape.
    • Attackers are faster, more convincing, and more scalable than ever.
    • Generic awareness training is no longer enough.
    • Personalization is essential to reducing real-world risk.
    • Engagement drives stronger security culture and better outcomes.
    • Cybersecurity begins at home, not just at work.
    • Bite-sized, real-time lessons are more effective than long annual videos.
    • Employees are part of the detection engine—and must be empowered accordingly.

    Memorable Quotes
    • “Cybersecurity doesn’t start in the office.”
    • “The one size fits all approach is dead.”
    • “We need to democratize security.”
    • “Let’s give individuals the tools they need.”
    • “We need to make cybersecurity more fun.”
    • “This is my favorite thing to talk about.”

    Episode Chapters

    00:00 – Introduction to the Chaos of Cybersecurity

    03:05 – The Impact of AI on Cybersecurity

    09:40 – Best Practices for Cybersecurity Awareness

    18:51 – Personalizing Cybersecurity Training

    27:00 – Engaging Employees in Cybersecurity

    29:20 – Resources for Further Learning

    Additional Resources:

    https://www.linkedin.com/in/mr-michael-waite/

    https://www.dune.security/

    https://www.dune.security/threat-intelligence-report

    続きを読む 一部表示
    32 分
  • Hacking AI and Building Trustworthy Systems: Insights from Satu Korhonen
    2025/11/19

    In this episode of the Security by Default podcast, Joseph Carson and guest Satu Korhonen a passionate practitioner, researcher and founder of Helheim Labs delve into the intersection of AI and cybersecurity. They discuss the challenges and opportunities in creating trustworthy AI systems, the importance of collaboration between AI and cybersecurity professionals, and the role of regulation in ensuring AI safety. Satu shares her journey from education to AI, highlighting key moments and insights from her career. The conversation also touches on the EU AI Act, the importance of understanding AI's limitations, and the need for a balanced approach to AI development.

    Key Takeaways

    • AI systems are fundamentally probability-based, not perfect.
    • Collaboration between AI and cybersecurity is crucial for safety.
    • The EU AI Act focuses on human rights and risk management.
    • Understanding AI's limitations is key to using it effectively.
    • AI can enhance productivity but requires careful implementation.
    • Training AI with both good and bad data improves its robustness.
    • AI should serve humans, not the other way around.
    • Hacking AI can reveal vulnerabilities and improve security.
    • Community events like hacker camps foster innovation and learning.
    • AI's role in society should be carefully considered and discussed.

    Chapters

    00:00:00 Introduction to AI and Cybersecurity

    00:03:00 Satu's Journey into AI

    00:09:00 Trustworthy AI and the EU AI Act

    00:15:00 Challenges in AI and Cybersecurity Collaboration

    00:21:00 The Role of Community and Events in AI

    Resources:

    https://hackai.quest/

    https://helheimlabs.ai/

    https://helheimlabs.ai/about-satu-korhonen/

    https://www.linkedin.com/in/satu-m-korhonen/

    https://why2025.org/

    https://www.ccc.de/en/home

    https://events.ccc.de/en/

    https://disobey.fi/2026/

    続きを読む 一部表示
    40 分
  • Identity Threats, AI Attacks, and the Power of Community with Filipi Pires
    2025/11/05

    In this episode of the Security by Default podcast, host Joe Carson welcomes back Filipi Pires, Head of Identity Threat Labs & Global Product Advocate at Segura® to discuss the latest trends in identity threats and cybersecurity. They explore the evolution of attacks, particularly focusing on social engineering and the role of AI in both offensive and defensive strategies. Filipi shares insights from recent events, including the significance of BSides conferences in fostering community and knowledge sharing. The conversation emphasizes the importance of a zero trust approach and the need for continuous education in cybersecurity.

    Key Takeaways

    • The BSides community is essential for cybersecurity education.
    • Attackers are increasingly using social engineering techniques.
    • AI is being leveraged by both attackers and defenders.
    • Zero trust is a critical framework for modern security.
    • Organizations must implement multiple layers of protection.
    • Credential theft is a major concern in identity threats.
    • B-Sides events provide networking opportunities for newcomers.
    • Cybersecurity Awareness Month is a time for reflection and improvement.
    • The rise of AI in social engineering poses new challenges.
    • Community-driven events like B-Sides foster collaboration and learning.

    Chapters

    • 00:00 Introduction to Security by Default Podcast
    • 01:59 Understanding BSides Events
    • 05:57 Current Trends in Identity Threats
    • 11:50 The Evolution of Authentication Methods
    • 14:57 The Rise of InfoStealer Malware
    • 18:52 AI's Role in Cybersecurity Threats
    • 21:13 AI in Cybersecurity: Defensive and Offensive Perspectives
    • 24:36 The Role of APIs and Observers in Cybersecurity
    • 26:06 Best Practices for Securing AI in Organizations
    • 31:04 BSides Porto: Community and Event Insights
    • 39:06 Future BSides: Expanding to Porto Alegre

    Resources:

    https://www.linkedin.com/in/filipipires/

    https://segura.security/

    https://www.instagram.com/filipipires.sec/

    https://segura.security/events/filipi-pires

    https://www.linkedin.com/showcase/identity-threat-labs/about/

    https://labs.segura.blog/


    About Segura®

    Segura® is an Identity Security Platform built to help organizations secure privileged access, detect identity threats, and respond rapidly to attacks targeting human and machine identities.


    Designed for hybrid and high-risk environments, Segura delivers identity threat detection and response (ITDR), secure remote access, and privileged session protection — ensuring that only verified users, devices, and applications can access critical systems.


    From infrastructure and servers to cloud platforms and the supply chain, Segura provides unified visibility and control across every identity interaction. By combining advanced analytics, behavioural detection, and Zero Trust access principles, Segura empowers companies to prevent credential misuse, lateral movement, and privilege escalation before damage occurs.

    続きを読む 一部表示
    39 分
  • Navigating the Complex World of Cyber Law - Insights from a Pentester-Turned-Lawyer with Pamela
    2025/10/22

    In this episode of the Security by Default podcast, host Joe Carson engages with Pamela Victor Ibitamuno, a lawyer with a unique background in penetration testing. They discuss the critical intersection of cyber law and cybersecurity, exploring the challenges faced in prosecuting cyber crimes, the importance of understanding intent, and the need for adaptive legal frameworks in the face of rapid technological advancements. The conversation also delves into the role of AI in the legal field and how professionals can stay updated in this ever-evolving landscape.

    Takeaways

    • Pamela's journey from penetration testing to cyber law highlights the importance of understanding both fields.
    • Legal professionals often struggle to grasp the technicalities of cybersecurity.
    • Regulations may not effectively address the problems they aim to solve.
    • Cyber crime often transcends borders, complicating prosecution efforts.
    • Partnerships between tech companies and governments can enhance cyber crime prevention.
    • Misconceptions about hacking can hinder legal processes.
    • Intent is a crucial factor in determining the legality of cyber actions.
    • The law is lagging behind technological innovations, necessitating updates.
    • AI can streamline legal processes but cannot replace human empathy.
    • Staying informed through conferences and subscriptions is vital for legal professionals.

    Chapters

    • 00:00 Introduction to Cyber Law and Its Importance
    • 02:57 Pamela's Journey: From Penetration Testing to Cyber Law
    • 06:08 The Intersection of Law and Cybersecurity
    • 08:50 Challenges in Cyber Crime Prosecution
    • 12:04 The Role of Intent in Cyber Crime
    • 14:58 The Need for Adaptive Legal Frameworks
    • 17:50 AI's Impact on Cyber Law
    • 20:53 Staying Updated in Cyber Law
    • 23:59 Conclusion and Future Outlook

    続きを読む 一部表示
    29 分
  • The Power of Games in Cybersecurity with Peadar
    2025/10/08

    In this episode of the Security by Default podcast, host Joe Carson engages with game designer Peadar, Gamification Lecturer at Tallinn University to explore the intersection of game design and cybersecurity training. Peadar shares his journey from teaching to game design, emphasizing the importance of using games to facilitate learning in complex subjects like cybersecurity. The conversation delves into the fundamental elements of games, the challenges of creating effective training games, and the need for conceptual transfer games that bridge the gap between technical and non-technical audiences. Peadar also discusses the future of cybersecurity training, the significance of soft skills, and the different player types in game design. The episode concludes with recommended resources for those interested in game design and cybersecurity.

    Peadar Callaghan, Gamification Lecturer at Tallinn University, Digital Learning Games Lab, Digital Technologies Institute, Tallinn University.

    Lecturer in Gamification, Learning Game Design, and Fundamentals of Game Design in the Digital Learning Games Master's program.


    Key Takeaways

    • Games can help people understand complex subjects.
    • Cybersecurity is a business problem, not just an IT problem.
    • Effective training requires engaging and simple game mechanics.
    • Checkbox training is ineffective for real learning.
    • Conceptual transfer games are essential for non-technical audiences.
    • The average age of gamers is increasing, indicating a shift in demographics.
    • Soft skills are crucial for effective communication in cybersecurity.
    • Games can create a safe space for learning from failure.
    • Understanding player types can enhance game design for training.
    • The future of cybersecurity training lies in small-scale, experiential games.


    Chapters

    • 00:00 Introduction to Cybersecurity and Game Design
    • 02:45 The Role of Games in Learning and Cybersecurity
    • 05:52 Fundamental Elements of Game Design
    • 09:00 Applying Game Mechanics to Cybersecurity Training
    • 11:46 Challenges in Cybersecurity Training Games
    • 14:38 Conceptual Transfer Games for Non-Technical Audiences
    • 17:44 The Future of Cybersecurity Training
    • 20:52 Understanding Player Types in Game Design
    • 23:47 The Importance of Soft Skills in Cybersecurity
    • 26:28 Recommended Resources for Game Design and Cybersecurity
    • 29:24 Conclusion and Future Directions


    Resources:

    https://www.linkedin.com/in/peadar-callaghan-a218721a/

    https://www.linkedin.com/school/tallinn-university/

    https://www.tlu.ee/

    Book - Reality Is Broken: Why Games Make Us Better and How They Can Change the World - https://a.co/d/hzvwYtf

    Book - Game Design Workshop: A Playcentric Approach to Creating Innovative Games by Tracey Fullerton- https://a.co/d/5jnbDg6

    続きを読む 一部表示
    42 分