Épisodes

  • Championing Change in Cybersecurity Leadership with Dr. Susan McGinty
    Aug 27 2025
    In this enlightening episode of Cyber Voices, host David Willett talks with Dr. Susan McGinty, a leader in the realm of cybersecurity and STEM leadership. Dr. McGinty shares her journey from being a scientist to a passionate advocate for diversity and inclusion in cybersecurity. The discussion highlights her initiatives aimed at fostering leadership skills among women and promoting inclusive cultures within organisations.

    Her work through AYA Leadership and The Asstembly emphasises the need for female representation at all levels, urging companies to embrace inclusivity as a driving force for innovation and effective decision-making.

    1. The Asstembly website: https://theasstembly.com/
    2. Susan's white paper Advancing the Cyber Security Sector: Pathway to a Diverse and Inclusive Cyber Security Workforce, https://ayaleadership.com/advancing-the-cyber-security-sector-white-paper/
    3. The Asstembly Women's Leadership Programs: https://theasstembly.com/womens-leadership-programs/
    Voir plus Voir moins
    40 min
  • Operationalising SIEM and SOAR with Jessica Clarence
    Aug 20 2025
    In this special episode recorded live at AISA SydneySEC 2025, David Willett sits down with Jessica Clarence from the Australian Signals Directorate (ASD) to explore the agency’s latest efforts to uplift cybersecurity across all levels of government.

    Jessica offers a deep dive into the SIEM and SOAR implementation guidelines developed by the ASD, highlighting how these frameworks are helping Australian organisations—both public and private—build more resilient and responsive cyber capabilities.

    She also unpacks the Government Uplift mission and the role of the Australian Cyber Security Centre (ACSC) in driving practical, scalable security strategies.From resource constraints and skills shortages to the limitations of emerging tech like AI, this episode tackles the real-world challenges facing cybersecurity leaders today. Whether you're in government or the private sector, Jessica’s insights offer actionable takeaways for strengthening your cyber posture.
    Voir plus Voir moins
    26 min
  • Embracing Disability Confidence in Cyber with Rudy Haruta
    Aug 13 2025
    In this episode of CyberVoices, David sits down with Rudy Haruta, a passionate advocate for disability inclusion and program lead at the Australian Disability Network. Rudy shares his personal journey and struggles with dyslexia, anxiety, and depression, and how these experiences shape his work today. They discuss the importance of organisations becoming disability confident, highlighting the need for tailored support and the challenges posed by traditional recruitment methods. The conversation aims to inspire listeners in the tech and cyber industries to consider more inclusive hiring practices and to better understand the unique perspectives of individuals with disabilities.
    Voir plus Voir moins
    35 min
  • Expanding the Third Party Risk Conversation with William Oh
    Aug 6 2025
    In this episode of Cyber Voices, David Willett hosts William Oh, Senior VP at BlueVoyant, as they dive into the critical issue of third party cybersecurity risk. William shares his extensive background in intelligence and highlights the growing importance of cybersecurity. They discuss how cyber attacks have become the silent initiators of warfare and emphasise the increasing risks associated with third-party vendors. This conversation sheds light on the often-overlooked threats that lurk beneath the surface of conventional warfare.
    Voir plus Voir moins
    29 min
  • Building Trust into Biometrics with Gaurav Vikash
    Jul 30 2025
    In this episode of Cyber Voices, David Willett interviews Gaurav Vikash, Head of Security and Risk for Asia Pacific at Axon, about the complex interplay of technology, compliance, and trust in today's security landscape. Gaurav discusses Axon's mission to create transparent policing tools, emphasising community trust. He also explores the exciting developments in biometric authentication and the risks associated with deepfake technology used to exploit static biometric systems. The conversation highlights the continuous need for innovative yet responsible solutions that enhance security while maintaining individual privacy and safety.
    Voir plus Voir moins
    31 min
  • Mastering Cyber Tabletop Exercises with Ella Donald
    Jul 23 2025
    In this episode of Cyber Voices, Ella Donald, a change and communications manager for cybersecurity at the University of Queensland, shares her insights. Ella discusses her expertise in running successful tabletop exercises for both technical and executive audiences. She emphasises the importance of having clear aims, maintaining a proper scope, and understanding that these exercises are meant for practice rather than a test. Her approach focuses on relationship building and open communication, thereby enhancing organisational preparedness and resilience without amplifying egos or hierarchical barriers.
    Voir plus Voir moins
    16 min
  • The Power of Volunteering with James Pemberton
    Jul 16 2025
    In this episode of Cyber Voices, host David Willett chats with James Pemberton, chair of the AISA's Tasmanian branch. James shares his journey from service desk roles into cybersecurity leadership and reflects on nearly a decade as an AISA member and volunteer. He highlights the branch's significant growth, with membership skyrocketing from 48 to 208. The conversation discusses the symbiotic relationship between seasoned professionals and students in Tasmania, emphasising community involvement and mentorship. James underscores the branch's challenges and rewards, stressing the importance of volunteer-driven initiatives to foster a vibrant cybersecurity community in Tasmania.
    Voir plus Voir moins
    24 min
  • Rats and Freeloaders with Peter Watson
    Jul 9 2025
    In another interview recorded live at CyberCon Canberra 2025, David chats with with Peter Watson from Recorded Future. Peter provides insights into malware loaders and Remote Access Trojans (RATS), shedding light on their evasive tactics and the complexity of defending against them. Additionally, he delves into techniques like DLL hijacking, illustrating their subtlety and effectiveness. The conversation highlights the challenges faced by security teams in detecting such activities, emphasising the role of threat intelligence.
    Voir plus Voir moins
    23 min