Épisodes

  • Building Trust in Customer Success with David Muniz
    Dec 9 2025

    In this episode of the Security by Default podcast, Joseph Carson engages with David Muniz to explore the evolving landscape of cybersecurity. They discuss the importance of diversity in the field, the distinction between customer success and support, and the critical role of trust in business relationships. The conversation also delves into the Zero Trust paradigm, emphasizing the need for a human-centric approach in cybersecurity. David shares insights on staying updated in a rapidly changing industry and the significance of happiness in the workplace, concluding with thoughts on the human element in cybersecurity.

    Keywords

    cybersecurity, customer success, zero trust, trust in business, diversity in tech, human relationships, customer support, industry insights, happiness in work, staying updated

    Takeaways

    · Customer success focuses on long-term relationships, not just immediate problem-solving.

    · Trust is a key component in building successful customer relationships.

    · Zero Trust is about managing trust dynamically, not eliminating it.

    · Customer success involves understanding what success means to the customer.

    · Building trust requires consistent and reliable service.

    · Human interactions are crucial in customer success, even in a digital world.

    · Customer success can lead to increased revenue through renewals and up-selling.

    · Trust in cybersecurity involves both technical and human elements.

    · Effective customer success strategies can differentiate a company in the market.

    · Balancing security with user experience is essential for customer satisfaction.


    Sound bites

    · "Customer success is about long-term relationships."

    · "Trust is not just assumed; it must be earned."

    · "Zero Trust is about managing trust, not eliminating it."

    · "Success is defined by the customer's perspective."

    · "Human interactions are crucial in a digital world."

    · "Trust leads to increased revenue and loyalty."

    · "Cybersecurity involves both technical and human elements."

    · "Balancing security with user experience is key."

    · "Customer success can differentiate a company."

    · "Trust is a business differentiator."


    Chapters

    00:00 Introduction to Cybersecurity and Guest Background

    04:10 The Importance of Diversity in Cybersecurity

    08:41 Understanding Customer Success vs. Customer Support

    12:52 Building Trust in Customer Relationships

    17:15 The Role of Zero Trust in Cybersecurity

    22:07 Understanding Zero Trust and Its Implications

    27:33 The Dynamic Nature of Trust in Cybersecurity

    32:01 The Human Element in Building Trust


    Additional Resources

    The Trust Paradox: A Cybersecurity Mindset for Human Relationships

    https://www.linkedin.com/pulse/trust-paradox-cybersecurity-mindset-human-david-muniz-f9fzf

    The Hidden ROI of Trust in Business and Cybersecurity...

    Voir plus Voir moins
    42 min
  • Transforming Cybersecurity Awareness Training with Michael Waite
    Dec 3 2025

    In this episode of Security by Default, host Joe Carson sits down with Michael Waite from Dune Security to explore how AI is reshaping cybersecurity and why it’s time to rethink traditional awareness training.

    As cyber threats become more sophisticated, personalized, and AI-powered, organizations can no longer rely on outdated, one-size-fits-all learning models. Joe and Michael break down what modern cybersecurity training should look like, how to engage employees more effectively, and why empowering people both inside and outside the office is essential to strong defense.

    What You’ll Learn
    • How AI is transforming both cyber attacks and defensive strategies
    • Why the volume and quality of phishing attempts continue to rise
    • The limitations of traditional annual awareness training
    • The shift toward personalized, role-based learning
    • How real-time intervention improves security habits
    • Why cybersecurity awareness must extend beyond the workplace
    • Practical ways to engage employees and build a security-first culture
    • The importance of collaboration and communication across teams
    • How threat intelligence informs more effective training programs

    Key Takeaways
    • AI is rewriting the threat landscape.
    • Attackers are faster, more convincing, and more scalable than ever.
    • Generic awareness training is no longer enough.
    • Personalization is essential to reducing real-world risk.
    • Engagement drives stronger security culture and better outcomes.
    • Cybersecurity begins at home, not just at work.
    • Bite-sized, real-time lessons are more effective than long annual videos.
    • Employees are part of the detection engine—and must be empowered accordingly.

    Memorable Quotes
    • “Cybersecurity doesn’t start in the office.”
    • “The one size fits all approach is dead.”
    • “We need to democratize security.”
    • “Let’s give individuals the tools they need.”
    • “We need to make cybersecurity more fun.”
    • “This is my favorite thing to talk about.”

    Episode Chapters

    00:00 – Introduction to the Chaos of Cybersecurity

    03:05 – The Impact of AI on Cybersecurity

    09:40 – Best Practices for Cybersecurity Awareness

    18:51 – Personalizing Cybersecurity Training

    27:00 – Engaging Employees in Cybersecurity

    29:20 – Resources for Further Learning

    Additional Resources:

    https://www.linkedin.com/in/mr-michael-waite/

    https://www.dune.security/

    https://www.dune.security/threat-intelligence-report

    Voir plus Voir moins
    32 min
  • Hacking AI and Building Trustworthy Systems: Insights from Satu Korhonen
    Nov 19 2025

    In this episode of the Security by Default podcast, Joseph Carson and guest Satu Korhonen a passionate practitioner, researcher and founder of Helheim Labs delve into the intersection of AI and cybersecurity. They discuss the challenges and opportunities in creating trustworthy AI systems, the importance of collaboration between AI and cybersecurity professionals, and the role of regulation in ensuring AI safety. Satu shares her journey from education to AI, highlighting key moments and insights from her career. The conversation also touches on the EU AI Act, the importance of understanding AI's limitations, and the need for a balanced approach to AI development.

    Key Takeaways

    • AI systems are fundamentally probability-based, not perfect.
    • Collaboration between AI and cybersecurity is crucial for safety.
    • The EU AI Act focuses on human rights and risk management.
    • Understanding AI's limitations is key to using it effectively.
    • AI can enhance productivity but requires careful implementation.
    • Training AI with both good and bad data improves its robustness.
    • AI should serve humans, not the other way around.
    • Hacking AI can reveal vulnerabilities and improve security.
    • Community events like hacker camps foster innovation and learning.
    • AI's role in society should be carefully considered and discussed.

    Chapters

    00:00:00 Introduction to AI and Cybersecurity

    00:03:00 Satu's Journey into AI

    00:09:00 Trustworthy AI and the EU AI Act

    00:15:00 Challenges in AI and Cybersecurity Collaboration

    00:21:00 The Role of Community and Events in AI

    Resources:

    https://hackai.quest/

    https://helheimlabs.ai/

    https://helheimlabs.ai/about-satu-korhonen/

    https://www.linkedin.com/in/satu-m-korhonen/

    https://why2025.org/

    https://www.ccc.de/en/home

    https://events.ccc.de/en/

    https://disobey.fi/2026/

    Voir plus Voir moins
    40 min
  • Identity Threats, AI Attacks, and the Power of Community with Filipi Pires
    Nov 5 2025

    In this episode of the Security by Default podcast, host Joe Carson welcomes back Filipi Pires, Head of Identity Threat Labs & Global Product Advocate at Segura® to discuss the latest trends in identity threats and cybersecurity. They explore the evolution of attacks, particularly focusing on social engineering and the role of AI in both offensive and defensive strategies. Filipi shares insights from recent events, including the significance of BSides conferences in fostering community and knowledge sharing. The conversation emphasizes the importance of a zero trust approach and the need for continuous education in cybersecurity.

    Key Takeaways

    • The BSides community is essential for cybersecurity education.
    • Attackers are increasingly using social engineering techniques.
    • AI is being leveraged by both attackers and defenders.
    • Zero trust is a critical framework for modern security.
    • Organizations must implement multiple layers of protection.
    • Credential theft is a major concern in identity threats.
    • B-Sides events provide networking opportunities for newcomers.
    • Cybersecurity Awareness Month is a time for reflection and improvement.
    • The rise of AI in social engineering poses new challenges.
    • Community-driven events like B-Sides foster collaboration and learning.

    Chapters

    • 00:00 Introduction to Security by Default Podcast
    • 01:59 Understanding BSides Events
    • 05:57 Current Trends in Identity Threats
    • 11:50 The Evolution of Authentication Methods
    • 14:57 The Rise of InfoStealer Malware
    • 18:52 AI's Role in Cybersecurity Threats
    • 21:13 AI in Cybersecurity: Defensive and Offensive Perspectives
    • 24:36 The Role of APIs and Observers in Cybersecurity
    • 26:06 Best Practices for Securing AI in Organizations
    • 31:04 BSides Porto: Community and Event Insights
    • 39:06 Future BSides: Expanding to Porto Alegre

    Resources:

    https://www.linkedin.com/in/filipipires/

    https://segura.security/

    https://www.instagram.com/filipipires.sec/

    https://segura.security/events/filipi-pires

    https://www.linkedin.com/showcase/identity-threat-labs/about/

    https://labs.segura.blog/


    About Segura®

    Segura® is an Identity Security Platform built to help organizations secure privileged access, detect identity threats, and respond rapidly to attacks targeting human and machine identities.


    Designed for hybrid and high-risk environments, Segura delivers identity threat detection and response (ITDR), secure remote access, and privileged session protection — ensuring that only verified users, devices, and applications can access critical systems.


    From infrastructure and servers to cloud platforms and the supply chain, Segura provides unified visibility and control across every identity interaction. By combining advanced analytics, behavioural detection, and Zero Trust access principles, Segura empowers companies to prevent credential misuse, lateral movement, and privilege escalation before damage occurs.

    Voir plus Voir moins
    39 min
  • Navigating the Complex World of Cyber Law - Insights from a Pentester-Turned-Lawyer with Pamela
    Oct 22 2025

    In this episode of the Security by Default podcast, host Joe Carson engages with Pamela Victor Ibitamuno, a lawyer with a unique background in penetration testing. They discuss the critical intersection of cyber law and cybersecurity, exploring the challenges faced in prosecuting cyber crimes, the importance of understanding intent, and the need for adaptive legal frameworks in the face of rapid technological advancements. The conversation also delves into the role of AI in the legal field and how professionals can stay updated in this ever-evolving landscape.

    Takeaways

    • Pamela's journey from penetration testing to cyber law highlights the importance of understanding both fields.
    • Legal professionals often struggle to grasp the technicalities of cybersecurity.
    • Regulations may not effectively address the problems they aim to solve.
    • Cyber crime often transcends borders, complicating prosecution efforts.
    • Partnerships between tech companies and governments can enhance cyber crime prevention.
    • Misconceptions about hacking can hinder legal processes.
    • Intent is a crucial factor in determining the legality of cyber actions.
    • The law is lagging behind technological innovations, necessitating updates.
    • AI can streamline legal processes but cannot replace human empathy.
    • Staying informed through conferences and subscriptions is vital for legal professionals.

    Chapters

    • 00:00 Introduction to Cyber Law and Its Importance
    • 02:57 Pamela's Journey: From Penetration Testing to Cyber Law
    • 06:08 The Intersection of Law and Cybersecurity
    • 08:50 Challenges in Cyber Crime Prosecution
    • 12:04 The Role of Intent in Cyber Crime
    • 14:58 The Need for Adaptive Legal Frameworks
    • 17:50 AI's Impact on Cyber Law
    • 20:53 Staying Updated in Cyber Law
    • 23:59 Conclusion and Future Outlook

    Voir plus Voir moins
    29 min
  • The Power of Games in Cybersecurity with Peadar
    Oct 8 2025

    In this episode of the Security by Default podcast, host Joe Carson engages with game designer Peadar, Gamification Lecturer at Tallinn University to explore the intersection of game design and cybersecurity training. Peadar shares his journey from teaching to game design, emphasizing the importance of using games to facilitate learning in complex subjects like cybersecurity. The conversation delves into the fundamental elements of games, the challenges of creating effective training games, and the need for conceptual transfer games that bridge the gap between technical and non-technical audiences. Peadar also discusses the future of cybersecurity training, the significance of soft skills, and the different player types in game design. The episode concludes with recommended resources for those interested in game design and cybersecurity.

    Peadar Callaghan, Gamification Lecturer at Tallinn University, Digital Learning Games Lab, Digital Technologies Institute, Tallinn University.

    Lecturer in Gamification, Learning Game Design, and Fundamentals of Game Design in the Digital Learning Games Master's program.

    Key Takeaways

    • Games can help people understand complex subjects.
    • Cybersecurity is a business problem, not just an IT problem.
    • Effective training requires engaging and simple game mechanics.
    • Checkbox training is ineffective for real learning.
    • Conceptual transfer games are essential for non-technical audiences.
    • The average age of gamers is increasing, indicating a shift in demographics.
    • Soft skills are crucial for effective communication in cybersecurity.
    • Games can create a safe space for learning from failure.
    • Understanding player types can enhance game design for training.
    • The future of cybersecurity training lies in small-scale, experiential games.


    Chapters

    • 00:00 Introduction to Cybersecurity and Game Design
    • 02:45 The Role of Games in Learning and Cybersecurity
    • 05:52 Fundamental Elements of Game Design
    • 09:00 Applying Game Mechanics to Cybersecurity Training
    • 11:46 Challenges in Cybersecurity Training Games
    • 14:38 Conceptual Transfer Games for Non-Technical Audiences
    • 17:44 The Future of Cybersecurity Training
    • 20:52 Understanding Player Types in Game Design
    • 23:47 The Importance of Soft Skills in Cybersecurity
    • 26:28 Recommended Resources for Game Design and Cybersecurity
    • 29:24 Conclusion and Future Directions


    Resources:

    https://www.linkedin.com/in/peadar-callaghan-a218721a/

    https://www.linkedin.com/school/tallinn-university/

    https://www.tlu.ee/

    Book - Reality Is Broken: Why Games Make Us Better and How They Can Change the World - https://a.co/d/hzvwYtf

    Book - Game Design Workshop: A Playcentric Approach to Creating Innovative Games by Tracey Fullerton- https://a.co/d/5jnbDg6

    Voir plus Voir moins
    42 min
  • Unlocking the Secrets of RFID Hacking with Iceman
    Sep 24 2025

    In this episode of the Security by Default podcast, host Joe Carson interviews Christian Herrmann, also known as Iceman, who shares his journey into the world of RFID hacking. The conversation covers Christian's origin story, his passion for technology, and the challenges he faced while learning and developing his skills. They discuss the importance of community engagement, open-source contributions, and the evolution of hacking tools like Proxmark. The episode also touches on risk management in cybersecurity, the ethical implications of hacking tools, and the significance of finding balance in personal and professional life. Christian emphasizes the value of asking for help and surrounding oneself with supportive individuals in the tech community.

    Takeaways

    • Christian Herrmann, known as Iceman, shares his journey into RFID hacking.
    • He emphasizes the importance of community engagement and open-source contributions.
    • The evolution of Proxmark has significantly impacted the RFID hacking community.
    • Tools used in hacking can have ethical implications that need to be considered.
    • Risk management is a crucial aspect of cybersecurity and hacking.
    • Finding balance between personal life and professional commitments is essential.
    • Asking for help and engaging with the community can accelerate learning.
    • Surrounding oneself with supportive individuals enhances personal growth.
    • The importance of continuous learning and adapting in the tech field.
    • Gamification can be an effective way to improve hacking skills.

    Chapters

    • 00:00 Introduction and Guest Background
    • 01:23 The Journey into Hacking and RFID
    • 09:23 The Thrill of Hacking and Career Development
    • 20:03 Open Source Contributions and Community Engagement
    • 30:54 Navigating Tools and Legal Considerations in Hacking
    • 36:03 Conference Experiences and Community Engagement
    • 42:00 Tools and Their Misinterpretations
    • 44:25 Risk Management in Technology
    • 46:06 Current Projects and Future Plans
    • 49:40 The Importance of Hobbies and Balance
    • 55:33 Learning from Failures and Community Support
    • 01:02:22 The Value of Networking and Collaboration

    Voir plus Voir moins
    1 h et 6 min
  • Special Episode - Building Cybersecurity Communities with George Kamide
    Sep 23 2025

    In this episode, Joe Carson speaks with George Kamide about the evolving landscape of cybersecurity, emphasizing the importance of community building, branding, and effective communication. They discuss how cybersecurity is no longer just an IT issue but a societal one, and how understanding user experience is crucial for success. The conversation also highlights the role of podcasts in educating the cybersecurity community and the challenges of building meaningful connections in a digital world.

    Takeaways

    • Cybersecurity is a societal problem, not just an IT issue.
    • Branding is essential for standing out in a crowded market.
    • Understanding user experience is critical for product success.
    • Podcasts can provide valuable education and insights in cybersecurity.
    • Building communities takes time and effort without immediate ROI.
    • Effective communication is key to conveying value propositions.
    • Listening to customers is more important than broadcasting solutions.
    • Time is the most valuable resource we have.
    • Engagement on social media should be curated and positive.
    • Building relationships requires giving before asking.

    Chapters

    00:00 Introduction to Cybersecurity and Community Building

    02:25 The Importance of Branding in Cybersecurity

    08:54 User Experience and Customer Understanding

    19:36 The Role of Podcasts in Cybersecurity Education

    22:42 Building Communities and Navigating Social Media

    Voir plus Voir moins
    29 min