Skip to main content
Phishy Business

Phishy Business

By Mimecast

Ready to change how you think about cybersecurity?

Every other week, Mimecast’s Brian Pinnock and Alice Jeffrey are joined by a special guest for tales of risk, reward and just a dash of ridiculousness.

Whether it’s a tech expert who is not your average CIO or an expert from a field you wouldn’t expect, we’ll be exploring the lesser seen side of cybersecurity – to learn how we can all improve in the fight to stay safe.
Available on
Google Podcasts Logo
Pocket Casts Logo
RadioPublic Logo
Spotify Logo
Currently playing episode

How to ‘level up’ ransomware protection and the curious case of the $54,000 ransom

Phishy BusinessOct 12, 2021

00:00
26:33
Exposing Shortcomings in Cybersecurity Leadership and why we need more Dana Scullys

Exposing Shortcomings in Cybersecurity Leadership and why we need more Dana Scullys

In this episode of Phishy Business, we talk about the improper mindset of not thinking about security until after you have been breached, and some of the major problems this can cause. We do this through the lens of SIEM, ethical hacking, and a focus on the need for leadership in teaching organizations how to be secure. We also discuss how some IT leaders try to keep the results of pen testing quiet.

Our special guest is Dez Rock, CEO of SIEMonster. After dropping out of law school, Dez became an entrepreneur and has run businesses for the last 20 years. Dez has spent a good deal of time in ethical hacking, building great experiences and great stories over the years with both physical and virtual security. She also has plenty of great insights about being a female CEO with ADHD in the cybersecurity industry.

In ‘Exposing Shortcomings in Cybersecurity Leadership and why we need more Dana Scullys’, we discuss:

  • What made Dez and her team successful as ethical hackers and how this helped make their product better.
  • How there needs to be more transparency about cybercrime, not only between organizations, but within them as well.
  • Why boards need to realize that the fact they haven’t been breached makes them low hanging fruit.
  • What security decision makers think of vendor marketing and what they also should be aware of when it comes to marketing budgets and tactics.
  • The importance of democratizing security.
  • The major limitations of adopting point solutions and not thinking of the whole ecosystem.
  • The importance of a neurodiverse workforce in cybersecurity and any industry.
  • Dez’s experiences as a female CEO.
  • How more women need to be represented in STEM careers to get more diversity in these roles.
Aug 29, 202333:49
Built-In Bias: Existing Real-World Inequality in AI and Other Technology

Built-In Bias: Existing Real-World Inequality in AI and Other Technology

In this episode of Phishy Business, we talk about various important discussions around AI, including the concerning issue of built-in bias and stereotypes. Imagine AI thinking that all doctors must be male, and all nurses must be female? Well, according to ChatGPT, they are.

Our special guest is Ivana Bartoletti, Global Privacy Officer at Wipro. Ivana has a human rights background and is an internationally recognized thought leader in privacy, data protection, and responsible technology. She’s a fellow at Virginia Tech, a published author, and the founder of the Women Leading in AI Network. Ivana says that she works at the intersection of technology and law and focuses on privacy advocacy. Ivana concentrates her efforts on the collection of data and how that data is used in technology such as AI.

In ‘Built-In Bias: Existing Real-World Inequality in AI and Other Technology’, we discuss:

  • How Ivana’s book came about, the themes covered, and how much has changed in this space since it was written.
  • Built-in bias in data and AI technology.
  • The protection of democracy and human rights when it comes to data collection, digital privacy, and AI.
  • Having legislation in place for safe adoption of AI.
  • The hype around the dangers of AI.
  • The European Union’s proposed AI regulation and businesses speaking out against the Act.
  • Cybersecurity considerations when it comes to AI.
  • The Women Leading in AI Network – why it was started and its purpose.

 

Aug 15, 202334:31
Protecting Shoes: Balancing Cybersecurity Strategy and Business Success at Dr Martens

Protecting Shoes: Balancing Cybersecurity Strategy and Business Success at Dr Martens

In this episode of Phishy Business, we talk about how today's cybersecurity strategy needs to focus on risk while still allowing smooth operation of the business. We also discuss how cybersecurity must involve the board so that business goals and cyber strategy align.

Our special guest is Theo Botha, Global Information Security Officer at Dr. Martens. Theo is responsible for protecting the Dr. Martens brand, one of the most iconic in the world. Theo began his career in physical security which evolved into a more technology-based approach. That led Theo to information security, and then, to cybersecurity and risk management. Today, Theo ensures Dr. Martens’ cybersecurity strategy protects the business while not hindering its ability to operate successfully.

In ‘Protecting Shoes: Balancing Cybersecurity Strategy and Business Success at Dr Martens’, we discuss:

  • The main ways the cybersecurity landscape has changed over the years.
  • How Theo adapted to being in a brand-new role at Dr. Martens as the world went into lockdown.
  • Communicating risks to the board by aligning to business objectives.
  • How he protects the online presence of one most well-known brands in the world.
  • Educating consumers and employees about cyber threats.
  • Managing supply chain attacks.
  • The skills shortage and managing the stress placed on teams.
Aug 01, 202331:52
CIS Roundtable – Keeping the Public Sector Secure

CIS Roundtable – Keeping the Public Sector Secure

In this episode of Phishy Business, we feature a roundtable discussion with three members from the Center for Internet Security. Mimecast CMO Norman Guadagno hosts this wide-ranging discussion that covers many topics including cybersecurity trends in the public sector and why information sharing is essential to keeping our connected world safe.

Our special guests are Sean Atkinson, CISO, Randy Rose, CIS Sr. Director of Security Operations and Intelligence & Karen Sorady, VP of MS-ISAC Member Engagement (and former NY State CISO). The trio shares the mission and background of CIS. Plus, their experiences and learnings from years working with the public sector.  

In ‘CIS Roundtable – Keeping the Public Sector Secure’ we discuss:

  • Are we in better or worse shape in terms of cybersecurity than we were 20 years ago? 
  • What is the Multi State Information Sharing and Analysis Center and how does it work in the context of the US? 
  • What is the reality of election security and threats? 
  • How prioritized is cybersecurity at the local government level?  
  • What’s it like being a CISO of a large US state?
  • How can the tabletop exercise model be optimized?  
  • Why is cybersecurity a great field for recent and upcoming graduates?
Jul 18, 202335:48
What has ESG got to do with Cybersecurity?

What has ESG got to do with Cybersecurity?

In this episode of Phishy Business, we talk about environmental, social, and governance, commonly known throughout the corporate world as ESG, and how cybersecurity fits into corporate sustainability.

Our special guest is Garyn Rapson who is a partner and the head of ESG at African law firm Webber Wentzel. Garyn manages a team of nine lawyers that advise clients on how to be more sustainable organizations. While ESG is complicated and always evolving, Garyn helps clients break through the complexity to manage risks and threats, and uncover the opportunities to protect their organization and make them more resilient. Garyn says that ESG is an understanding as a business that there are certain external issues that must be taken seriously.

In ‘What has ESG got to do with Cybersecurity?’, we discuss:

  • What ESG is, and how it’s changed the way organizations think about doing business.
  • How the future of work is both digital and sustainable.
  • How cybersecurity fits into ESG.
  • The importance of cybersecurity transparency and the idea of ‘cyberwashing’ as a concept.
  • Why cybersecurity should be a part of reporting in the context of ESG. Using an ESG framework to communicate cyber risk to the board.
  • How cybersecurity fits into the ‘E’ (environmental) and the ‘S’ (social) portion of ESG.
Jul 04, 202334:31
CIOs Should think like Entrepreneurs on Dragon’s Den

CIOs Should think like Entrepreneurs on Dragon’s Den

In this episode of Phishy Business, we talk about some of the cybersecurity trends and worries facing today’s global CIOs.

Our special guest is Martin Wallgren who is the CIO of global logistics and shipping company, Gulf Agency Company, headquartered in Dubai. Martin says he is an entrepreneurial tech nerd with a business mindset who does business development with a touch of technology. He likes to emphasize the CIO’s business role even though he is passionate about both business and technology. Martin also discusses how impactful cybersecurity has become on the role of the CIO, and how much AI is changing the cybersecurity game.

In ‘CIOs Should think like Entrepreneurs on Dragon’s Den’, we discuss:

  • Why CIOs need to have an entrepreneurial mindset
  • How to communicate effectively to secure budget from the board
  • How the pandemic changed security
  • The importance of humour in cyber awareness training
  • Advice on cyber strategies
  • What scares Martin about AI and why security teams shouldn’t rely on AI to do everything
  • Martin’s views on the skills shortage
Jun 20, 202332:51
Proud Hackers: Understanding Criminal Minds

Proud Hackers: Understanding Criminal Minds

In this episode of Phishy Business, we talk about the psychology behind crime, particularly cybercrime and white-collar crime. We delve into the reasons why most cybercriminals are roaming free and don’t get caught, yet deep down, really want to tell their story.

Our special guest is Mark T. Hoffmann, a crime and intelligence analyst and business psychologist. Mark specializes in behavioral and cyber profiling and has conducted interviews with criminals, psychopaths, and hackers to understand their internal perspective. Mark is well-known for providing his expertise during international television and streaming appearances and numerous keynote speeches.

Mark is sincerely interested in other people and wants to learn about them, which has led to a fascinating career. After obtaining his degree in business psychology, Mark quickly became interested in the dark side of business and crime which led to his role as a crime analyst, which naturally led him to an interest in cybercrime.

In ‘Proud Hackers: Understanding Criminal Minds’, we discuss:

  • What a crime and intelligence analyst is and how Mark found himself focusing on cybercrime.
  • How Mark gets criminals to talk to him and provide a certain level of detail
  • A typical profile of a cybercriminal.
  • Why criminals get into cybercrime.
  • Why Mark doesn’t like white, gray, and black hat categories.
  • The psychology of cyber awareness training.
Jun 06, 202334:22
Keeping Threats ‘At-Bay’ – Normalizing Cyber Insurance as Part of Business

Keeping Threats ‘At-Bay’ – Normalizing Cyber Insurance as Part of Business

In this episode of Phishy Business, we bring you a special recording from the show floor at RSA Conference. Hosted by Mimecast’s CMO Norman Guadagno, this episode delves into cyber insurance and how managing risk has had to adapt to the modern digital economy. You’ll learn exactly what cyber insurance is, why it’s important and how insurers should be trusted partners to organizations looking to better protect themselves from cyberattacks.


Our special guests are Tara Bodden, Head of Claims and General Counsel, and Thom Dekens, Chief Business Officer & GM at At-Bay Cyber Insurance. Tara works to ensure a seamless customer experience for At-Bay clients who have filed a claim. She also works to unlock data insights that can protect clients, and heads up At-Bay’s legal department which is charged with making sure At-Bay can deliver on its aspirations without doing harm. Thom heads up the cybersecurity side of At-Bay, ensuring the company and its clients are as secure as possible.


Tara and Thom use their expertise to provide a look into the importance of cyber insurance in today’s high-risk security environment. They explain how every company is a technology company and how a cyber insurance company can educate organizations on how they can protect themselves. They also provide insight on how a cyber insurance company can help when something goes wrong.


In ‘Keeping Threats ‘At-Bay’ – Normalizing Cyber Insurance as Part of Business’, we discuss:

  • How cyber insurance companies work with their customers to ensure they have the most effective security solutions in place.
  • How cyber insurers are vital partners for SMBs needing improve their cybersecurity.
  • How our guests made their way to the world of cybersecurity.
  • The main threats At-Bay’s clients see.  
  • At-Bay’s Ranking Email Security Solutions report in which Mimecast was found to be the email security solution associated with the lowest number security incidents.
May 23, 202326:49
RSAC Part 2: CISO trends + thinking differently about tradeshows

RSAC Part 2: CISO trends + thinking differently about tradeshows

In part two of this special RSA episode Mimecast CMO, Norman Guadagno, interviews another four guests live from the conference show floor. We talk about how cybersecurity has changed over the years, bringing more diversity to the industry and how exactly one becomes a CISO.


Our guests for part two: Julian Waits, SVP business development at Rapid7 (:54 – 11:44), Kayla Williams, CISO at Devo (12:02 – 23:22), Tyler Warren, deputy CISO at Prologis (23:39 – 33:52) and Josh Copeland, cybersecurity director at AT&T (34:16 – 43:14).


In ‘RSAC Part 2: CISO trends + thinking differently about tradeshows’ we discuss:


  • 'Cyversity' – and why cybersecurity needs to become more diverse
  • Becoming a CISO without a traditional IT background
  • Unpopular opinions at RSA  
  • Why vendors should think about being distinctive at tradeshows
May 11, 202344:13
ChatGPT buzz + much more from the RSAC show floor

ChatGPT buzz + much more from the RSAC show floor

In this episode of Phishy Business, Mimecast CMO and guest host Norman Guadagno, chats to four different people at this year’s RSA Conference in San Francisco. Our guests were interviewed in our very own podcast recording studio at the Mimecast booth. In part one of this two-part episode, we learn more about our guests' roles, their companies, and the cool things they're working on. We also discuss what was trending at this year’s show and how the conference has evolved over the years. Did we mention ChatGPT? That was brought up once or twice too!


Our guests for part one: Adrian Sanabria, podcast host of Enterprise Security Weekly, (1:14 – 13:30) Pam Cyr, vice president of technical partnerships at Palo Alto Networks (14:00 – 25:23), Michael Smith, CISO at HKS, Inc. (25:41 – 38:35) and Michiel Prins, co-founder and head of professional services at HackerOne (39:17 – 51:27).


In ‘ChatGPT buzz + much more from the RSAC show floor’ we discuss:

  • The major trends from this year’s conference
  • How ChatGPT is being used now – and what the future could hold
  • Technology partnerships and how they benefit organizations
  • Cybersecurity resources to learn more about security and coding
  • Why cybersecurity is a great field to go into
May 09, 202351:52
Using Criminal Skills for Good - a Memoir of a Burglar for Hire

Using Criminal Skills for Good - a Memoir of a Burglar for Hire

In this episode of Phishy Business, we discuss social engineering, the professional con game of burglary for hire, and different aspects of how this very specialized skill can impact organizations and individuals.

Our special guest is Jenny Radcliffe, who was our very first interview on the podcast and made a return appearance in our episode on job hacking. Jenny is well known for being able to get in anywhere and past anyone. She has turned a schooling in the art of breaking and entering during her childhood, into a celebrated career as an expert in social engineering, where she exploits the flaws and weaknesses in top-grade security operations.

Now, Jenny has returned for a third visit to tell us all about her new book, People Hacker. It’s a memoir about her unusual career as an ethical burglar and as you can imagine, it’s filled with fascinating stories.

In ‘Using Criminal Skills for Good - a Memoir of a Burglar for Hire’, we discuss:

  • The importance of context in social engineering and how good people hackers adapt their methods according to the scenario and culture
  • How real-world social engineering compares to the virtual world
  • The importance of diversity in security
  • Why Jenny didn’t go over to the dark side despite having all the skills of a successful criminal
  • How everyone is hackable and it’s important to make security relevant to everyone
  • How to do penetration testing well and without negatively impacting employees
Apr 25, 202333:33
It’s Time to Retire the Risk Management Profession

It’s Time to Retire the Risk Management Profession

In this episode of Phishy Business, we discuss some important ways to think about and look at risk and how its more about making decisions than assessing threats.

Our special guest is Stefan Gershater, Director of Risk at Burberry. Stefan is a risk management expert, a biochemist, and a navy veteran. Stefan says that as a risk expert, he tries to make sense of uncertainty, which means he thinks a lot about how everyday decisions impact people and organizations. Stefan feels that when defining “risk”, it should be disassociated from the word “threat”, and simply be about making better decisions to improve outcomes.

In ‘It’s Time to Retire the Risk Management Profession’, we discuss:

  • How being in the royal navy shaped Stefan’s understanding of risk
  • The difference between risk in the navy and risk in a corporate setting
  • Why Stefan thinks the risk management profession should be retired
  • The importance of data in risk assessment
  • How to communicate risk to stakeholders
  • Mental health in the workplace

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Apr 11, 202334:31
Why Security Professionals Should Consider Career Coaching

Why Security Professionals Should Consider Career Coaching

In this episode of Phishy Business, we discuss career coaching, looking at what it is, and how it can benefit all professionals, including those in the cybersecurity space. We delve into the differences between coaching and mentoring and discuss what to expect when working with a career coach.

Our special guests are executive coach and mentor Fiona Anderson, and Dr. Kiri Addison, Senior Product Manager at Mimecast. Fiona is a change catalyst who works with professionals from all sectors with a particular focus on culture change. Fiona loves working with people to help them become the best versions of themselves. Kiri is a senior product manager and all-around cybersecurity expert who recently won a Most Inspiring Women in Cyber award and worked with Fiona on her own career development.

In ‘Understanding More About Career Coaching’, we discuss:

  • The difference between coaching and mentoring
  • Recognizing that there may be career ceilings of our own making
  • How different personalities and even gender identity can lead to different perspectives
  • How the career coaching process works and key things to insist on, such as confidentiality
  • The importance of knowing your own values
  • What Kiri got out of the coaching process
  • Tips to combat stress and burnout, a major issue in the cybersecurity sector 

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Mar 28, 202332:10
Scary Smart AI? Or the Potential to Be a Force for Good?

Scary Smart AI? Or the Potential to Be a Force for Good?

In this episode of Phishy Business, we discuss what can be a very scary side of AI – when bots start thinking for themselves. We delve into some examples of this actually happening, but also look at the good AI is providing humankind.

Our special guest is Mo Gawdat, former chief business officer at Google X and bestselling author of the books Solve for Happy and Scary Smart. Mo describes himself as having two lives – a first life as a “maker” who coded, built robots, and developed technology, and a second life following a personal tragedy, as an author, podcaster, and “thinker” who analyzes things that tend to be overlooked by others.

Mo spends much of his time championing the importance of happiness and acceptance of events we cannot change. Mo also has a lot to say about the similarity between developing AI and raising children. Mo believes that one day AI will become more intelligent than humans and that we need to prepare now to coexist with AI.

In ‘Scary Smart AI? Or the Potential to Be a Force for Good?’, we discuss:

  • Why AI could be scary, but also, why it could be good for humankind
  • How raising AI is similar to parents raising children
  • Why AI is humanity’s biggest opportunity
  • The potential for AI to develop emotions and consciousness
  • When AI becomes smarter than humans and what the implications could be
  • How Mo stays happy as explained in his book Solve for Happy

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Mar 14, 202344:37
Work Inspired – What’s Possible in Shaping Corporate Culture

Work Inspired – What’s Possible in Shaping Corporate Culture

In this episode of Phishy Business, we discuss the idea of Work Inspired, a corporate culture where employees all love to work because it turns out that happy employees are very good for business.

Our special guest is Aron Ain, award-winning, retired CEO of UKG, formerly known as Kronos. Aron now serves as Executive Chair of the UKG Board of Directors and is also the author of Work Inspired, a book that depicts an inspiring example of what’s possible in shaping corporate culture.

Aron transformed his company’s culture at Kronos, building a billion-dollar business. Aron truly believes that great organizations are powered by great people and that great people build better products, services, and outcomes. He also believes the biggest challenge in building such an organization is creating an engaging environment where people feel wanted and valued. We also discuss how Aron’s leadership style and authenticity were key weapons when his organization fell victim to a cyberattack.

In ‘Work Inspired – What’s Possible in Shaping Corporate Culture’, we discuss:

· How employees are a powerful strategic weapon in any organization.

  • The concept of being an ‘unleader’ and the importance of humility – how you don’t need to throw your title around and be forceful to get things done.
  • Being conscious of being authentic.
  • How Aron handled the COVID-19 pandemic as a leader.
  • Aron’s views on the future of work.
  • The importance of transparency and overcommunication when dealing with a cyberattack.
  • Why organizations often aren’t transparent in the event of a cyberattack.
  • How Aron’s values showed up in his people during the attack.

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Feb 21, 202325:26
Cyber Extortion – The Next Evolution of Ransomware

Cyber Extortion – The Next Evolution of Ransomware

In this episode of Phishy Business, we discuss the very definition of ransomware and how it can be an overused and underdefined concept. We also take a closer look at the world of threat research.

Our special guest is former professional hacker Charl van der Walt, Head of Security Research at Orange CyberDefense, who now spends his time asking and answering the important questions around cybersecurity, specifically those that pertain to ransomware.

Charl believes we need to move beyond the term ransomware and look more at the concept of cyber extortion because the days of one-off ransomware attacks have given way to a massive, highly profitable, well-organized cyber-crime industry. Charl is working to ensure cybersecurity professionals look at ransomware more in terms as being part of a series of crimes in which security is breached and then something of value is taken and held for ransom. This is because ransom attacks are moving beyond just denial of access to data and are more frequently including confidential data exposure and denial of service in some form.

In ‘Cyber Extortion – The Next Evolution of Ransomware’, we discuss:

  • Redefining the term “ransomware” as “cyber extortion”.
  • Why cyber extortion is now a much more appropriate term for security professionals to use.
  • The main categories of threats in cybersecurity.
  • The trends in ransomware over the past few years that have led to its transformation.
  • How to effectively communicate about ransomware to a non-technical audience.
  • The work communities can do to prevent ransomware attacks, known as ecosystem-based security.

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Feb 07, 202333:55
Marketing as Customer Experience – Be an Active Listener

Marketing as Customer Experience – Be an Active Listener

In this episode of Phishy Business, we discuss how cybersecurity marketing, sales, and support are for the most part inadequate, and how there can be a big disconnect between how marketers market and how technology professionals buy. We talk more about how marketing should consider the customer experience and how marketing departments should not only market their products and services but should also be active listeners and understand what their buyers need and want.

Our special guest is cybersecurity marketing expert and podcaster Dani Woolf, who spent the past decade running high impact marketing departments for technology startups. She has since started Audience 1st to help cybersecurity vendors understand what CIOs and CISOs really want from them. Dani helps cybersecurity marketers better understand their buyers so they can sell more.

In ‘Marketing as Customer Experience – Be an Active Listener’, we discuss:

  • How cybersecurity can help solve very complex problems.
  • Vendors should have a ‘mission over money’ mindset.
  • Some traditional demand- and lead-gen techniques that don’t work with a cybersecurity audience.
  • Why CISOs tend to be a more cynical and less trustworthy audience, which is understandable because of the high stakes and stressful nature of the job.
  • Co-creating with influencers who have polarizing opinions in the market is a good strategy in cybersecurity marketing.
  • How the cybersecurity community values concise and clear content.
  • The fact that technology leaders want marketing to be authentic and to cut through the ‘noise’.
  • The mass over use of buzzwords that is all too common and alarming in the sector.
  • How the cybersecurity community is open to giving feedback and taking feedback and how not a lot of vendors take advantage of this.
  • That in order to be successful, marketing mindset needs to shift from product first to customer first.

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Jan 24, 202333:11
Cybermindz - Bonus Episode

Cybermindz - Bonus Episode

In this bonus episode of Phishy Business, we continue to recognize the value of the work of cybersecurity professionals. Join us as Peter Coroneos, Founder and Executive Chairman of Cybermindz.org, takes us through a 10-minute meditation aimed at lowering stress. This is a just a taste of the whole Cybermindz protocol, and worth a try!

Jan 16, 202312:06
Cybermindz – Hope in a Burnt-Out Sector

Cybermindz – Hope in a Burnt-Out Sector

In this episode of Phishy Business, we honor and recognize the value of the work of those professionals who spend their days defending people and organizations from cyberattacks by taking a close look at one of the biggest problems the industry faces today: worker burnout and the associated mental health issues. Join us as we discuss how while many of us say we are simply “fine” when someone asks how we are, we may, in fact, actually be suffering silently from stress and burn out.

Our special guest is cybersecurity expert Peter Coroneos, Founder and Executive Chairman of Cybermindz.org, an organization that recognizes that many cybersecurity professionals are themselves under sustained and increasing stress and sets out to provide direct support to restore and rebuild emotional and cognitive health. Peter has worked in cybersecurity for a long time and was once head of the Internet Industry Association in Australia which gave him special and early insight into how cybersecurity workers can suffer from on-the-job stress. With cybersecurity professionals suffering more and more from stress and burnout, Peter is working to develop and deploy programs that are designed to help.

In ‘Cybermindz – Hope in a Burnt-Out Sector’, we discuss how:

  • Stressed-out security teams make companies less secure.
  • Hope and reinvigoration through a proven relaxation protocol is the aim of Cybermindz.
  • The brain is not designed for constant periods of stress.
  • The brain can’t distinguish between a physical and psychological threat – and how in cybersecurity teams there is a constant sense of being under attack.
  • In preliminary findings, CISOs are polling worse than frontline healthcare workers on their sense of efficacy and ‘doing a good job’.
  • Through research, connecting the dots between cyber teams’ mental health and an organization’s cybersecurity posture is paramount to bring this issue to the forefront.
  • The huge skills gap is making it impossible to simply throw more resources at the problem.
  • It is a holistic issue, meaning that the skills gap needs to be filled and corporate culture needs to be improved before we see some improvement in CISO burnout.

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Jan 10, 202329:51
Criminals are like water, adapting to new circumstances

Criminals are like water, adapting to new circumstances

In this episode of Phishy Business, we discuss how criminals are like water because of how they flow, and adapt around obstacles and security measures, always looking for a way in no matter what security professionals put in their way. You’ll learn more about how well-thought-out cybersecurity strategies, tools, and responses can be, especially in the military vs. the private sector, and, why this needs to be the case when protecting users from very fluid criminals.

Our special guest is threat intelligence expert Jason Rivera, who is currently serving as a senior director in the Strategic Threat Advisory Group at CrowdStrike. He provides threat intelligence thought leadership to commercial and government organizations across the globe. Jason is an Army veteran who worked in cyber roles for the military, built cyber intelligence programs for civilian organizations, and today combines both of those elements of his experience into helping advise CrowdStrike and its customers on cybersecurity strategy.

In ‘Criminals Are Like Water, Adapting to New Circumstances’, we discuss:

  • The military vs. the private sector and understanding how they are not always what they seem.
  • Identifying the cyber domain as a new part of warfare, and how this is different from the traditional domains such as land, sea, and air.
  • How the need to understand risk is ever-increasing and how to best deploy scarce resources.
  • Identifying the various types of adversaries, what they’re motivated by, how they operate, and how they sometimes collaborate with each other.
  • New trends in cybercrime such as callback phishing, data extortion, and multifactor authentication bypass, including what these are and how they work.
  • Cybersecurity vendor collaboration and how a second opinion is healthy.
  • How cybersecurity vendor integration and collaboration is increasing.
  • Being happy at work because if you’re happy, a job doesn’t feel like work and that happiness leads to much more productivity.

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Dec 13, 202234:45
Risk, Risk, Risk…and Beer: What Keeps the Cyber C-Suite Up at Night

Risk, Risk, Risk…and Beer: What Keeps the Cyber C-Suite Up at Night

In this episode of Phishy Business, we find out everything you may have wanted to ask your CISO or CIO but were too afraid to ask. Two very experienced information technology leaders delve deeper into the roles they play in keeping their organizations safe while balancing the nos and yesses they deal in every day. You’ll learn a lot more about that it is like to be CISO or CIO and the challenges they face in their roles.

Our special guests are Magnus Carling, CISO at Swedish shipping company Stena, and Andrew Pritchett, CIO at Grant Thornton Australia, a leading accounting and consultancy firm. Magnus runs the global information security program for shipping conglomerate Stena, which is made up of a number of companies. Andrew navigates the challenges of the CIO role to balance pleasing clients while at the same time keeping client and internal resources safe. Learn more about these two leaders and their real-world daily challenges.

In ‘Risk, Risk, Risk…and Beer: What Keeps the Cyber C-Suite Up at Night’, we discuss:

  • What it is like being considered the department of no by colleagues.
  • The challenges of balancing protecting the organization with the needs of team members.
  • The crossroads of tech and people that occur every day at every organization.
  • How the weakest link in security can be people – and how to get that point across to those very same people.
  • The problems IT leaders face when the board don’t speak cyber.
  • How to bring cyber risk in earlier in the board’s conversations.
  • Conducting proper risk assessment before the big decisions instead of dealing with the fallout after an attack.
  • Keeping cyber teams together and not burning them out.
  • The difference between responsibility and accountability for CISOs in cyber breaches.
  • Why the need for CISOs to have battle scars from previous breaches is so valuable.
  • Beer as a stress relief strategy.
  • Why cybersecurity is everyone’s business.

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Nov 29, 202236:17
Is Data the new Uranium?

Is Data the new Uranium?

In this episode of Phishy Business, we take a look at data, which some have called the new gold or the new oil and discuss why it really is something more like the new uranium because it has such a huge potential to impact society, just like uranium did in the 20th century. And just like uranium, data can be used for good, and for bad. Join us as we delve further into all things data – how it is collected, used, and what the consequences are when it is leaked.

Our special guest is Glenn Wilkinson, world-renowned cybersecurity expert and ethical hacker for organizations ranging from startups to multi-nationals and governments. Glenn is an ethical hacker for hire who helps organizations protect themselves against real-world attackers by simulating real-world attacks. He also builds security products, conducts training sessions, and gives talks on cybersecurity.

In ‘Is Data the new Uranium?’, we discuss:

  • The types of data that can be compromised during a security breach and what can be the most valuable data to malicious hackers.
  • The voluntary, involuntary, and necessary data we share every day, some of which is essential to live in the modern world.
  • The huge amount of personal information that is housed on social media and with other companies that claim to provide personalized services.
  • How companies want our data to sell us more personalized ads and to also sell it on to third parties.
  • The fact that companies are also collecting our personal data simply because they can – and how they are planning to figure out what to do with it later, using AI to process it for example.
  • If we are at the point in history where we can call data the new uranium because in that sense, it could contain information that if monetized, could have profound societal impact.
  • Data, and how the aggregation of it can also be used by less democratic regimes to spy on and control their population.
  • Using Glenn’s top three tips that could help you and the data you share online stay secure.

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Nov 15, 202221:52
Supercharging the AI tortoise

Supercharging the AI tortoise

In this episode of Phishy Business, we take a look at AI. We talk on the fact that the stigma of AI running amok in Terminator-fashion is a myth we must dispel in the face of all the good AI can do in protecting the world - from cyberattacks to helping with climate change. We also talk about the other major challenges that AI can be used to solve globally in the next decade. Our special guests are Vilas S. Dhar, President of the Patrick J. McGovern Foundation, who was named a young global leader by the World Economic Forum, and our own AI data scientist Elaine Lee. Vilas originally trained as a computer scientist who worked on early AI, also went to law school, and then worked on rule of law in technology, finally moving on to build a few businesses in the private sector. Elaine uses her expertise as a data scientist to help create products that protect users against email cyberthreats and was recently promoted to manage a team of data scientists at Mimecast.

In ‘Supercharging the AI Tortoise’, we discuss:

  • How optimism is essential to taking control of what we want AI systems to do.
  • The sense of urgency that is needed in this work to protect people today and in the future.
  • Why human oversight of AI systems is crucial to course correct and to remove biases in the algorithms.
  • How diversity is fundamental in creating AI systems.
  • The fact that more needs to be done in relation to how AI can be a force for good, from educating policy makers to more positive media coverage.
  • How AI and data science can be used to created sustainable and scalable progress on the big issues our society faces, such as climate, poverty, and hunger.
  • The reasons why Winnie the Pooh is possibly the greatest modern philosopher of our era.

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Nov 01, 202230:50
Beyond Awareness Training: How to Improve User Behavior

Beyond Awareness Training: How to Improve User Behavior

In this episode of Phishy Business, we take a look at how cybersecurity awareness training needs to go beyond just having users sit through training, but in fact, has to work to change user behavior. Listen in to learn more about the importance of cybersecurity awareness training at organizations of all sizes across the globe and how, with today’s diverse and threatening security landscape, cybersecurity is the responsibility of everyone in the organization, not just security professionals. Our special guests are Ira Winkler, award-winning CISO and best-selling author of Security Awareness for Dummies, and our own cybersecurity training expert Duane Nicol, Senior Product Manager – Awareness Training at Mimecast. Ira works to help organizations become more resilient against cyberattack and Duane works to make people feel more involved and included as part of the cybersecurity awareness culture at an organization, driving measurable results.

In ‘Beyond Awareness Training: How to Improve User Behavior’, we discuss:

  • How cybersecurity awareness is part of everyone’s job responsibility.
  • Why the outcome of cybersecurity awareness training shouldn’t just be awareness, but also should be behavior change.
  • The importance of a just corporate culture to encourage employees to report mistakes.
  • The difference between ‘must’ and ‘should’.
  • Whether or not there is ever a role for blame in cybersecurity awareness training.
  • The fact that measurement of cybersecurity awareness programs is crucial.
  • Why if a user clicks on a phishing link, the failure happened much further upstream because a lot of technology had to fail to let that malicious email through, and why holistic remediation is necessary.

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Oct 04, 202233:48
Shining a Light on Bots: The Good and the Bad

Shining a Light on Bots: The Good and the Bad

In this episode of Phishy Business, we take a look at bots. Listen in to learn more about what bots are, and what they do. Also, learn what can make them good…and what can make them bad. It would seem the answer lies within the intent of the person deploying them. Our special guests are Cyril Noel-Tagoe, Principal Security Researcher at Netacea, and our own Dr. Kiri Addison, Senior Product Manager at Mimecast. Cyril works to understand automated attacks to discover their aim and how to stop them; Kiri is a senior product manager and all-around cybersecurity expert who has a good amount of experience discovering and combatting malicious bots.

In ‘Shining a Light on Bots: The Good and the Bad’, we discuss:

  • Some examples of good and bad bots, and how they can be used and misused.
  • How bad bots are responsible for as much as 3% of revenue loss.
  • That bots can be used in all kinds of cyberattacks, including phishing, and DDoS attacks.
  • How bots can skew website metrics, which can falsify entire marketing campaigns.
  • That bots are also used to automate tasks for cybercriminals such as validating credentials.
  • The fact that Marketing and IT teams should work together to understand the problem of malicious bots and discover how to best combat them.
  • The ways bots can also be used defensively, against cyberattacks.
  • How the fact remains: If the promises of a product or service sound too good to be true, they probably are.

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Sep 20, 202230:20
The Billion Dollar Cryptocurrency Scam

The Billion Dollar Cryptocurrency Scam

In this episode of Phishy Business, we take a look at what has been called the smartest and biggest scam of the 21st century, OneCoin, a cryptocurrency that brought in $4 billion in investments via multi-level marketing and proved to be nothing but a scheme that made one woman who is still on the run very rich. This wasn’t a backroom con, but in fact, was perpetrated by a woman whose adoring fans filled an arena two years after OneCoin’s founding, and whose con took money from millions of people. Our special guest is Jamie Bartlett, author of The Missing Cryptoqueen: The Billion Dollar Cryptocurrency Con and the Woman Who Got Away with It, a book that started out as a podcast in which Jaime tells the all-too-true tale of Dr. Ruja Ignatova, the Oxford-educated fugitive who got away with billions.

In ‘The Billion Dollar Cryptocurrency Scam’ we discuss:

  • How Jaime discovered this amazing story after presenting his findings following an investigation into drug sales on the Dark Web and was approached by a fellow journalist who was propositioned with this too-good-to-be-true cryptocurrency scam.
  • A little background on cryptocurrency, its history, and how it works, as well as how Dr. Ruja presented a story and a cryptocurrency that was so appealing to so many people.
  • How cryptocurrencies currently make ideal attack vectors for scammers.
  • How FOMO is a very powerful tool in the cybercriminal arsenal and how it worked for Dr. Ruja.
  • Why most people’s murky understanding of the tech behind cryptocurrency allowed the alleged victims to be more easily duped by Dr. Ruja and her real and impressive credentials
  • Why cries of OneCoin being a Ponzi scheme from the very beginning went unheeded by investors and regulators.
  • How a simple selfie posted on social media can reveal a treasure trove of information for investigators…and for cybercriminals.
  • If the promises of a product or service sound too good to be true, they probably are.

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Sep 06, 202231:26
Closing the cybersecurity skills gap through education and opportunity

Closing the cybersecurity skills gap through education and opportunity

In this episode of Phishy Business, we take a look at the skills shortage being faced by IT departments when it comes to hiring cybersecurity experts and how the Absa Cybersecurity Academy is working with its partner, the Maharishi Institute, to assist in helping marginalized South African youth to become certified cybersecurity experts. Together, Absa and the Maharishi Institute are consistently working to develop a sustainable means to give youth the training they need to maintain careers and break the cycle of poverty they have been born into. Our special guests are Shenaaz Abrahams, who has made it her mission to ensure the Absa Academy is giving the most marginalized in her community access to cybersecurity training, and one of the Absa Academy’s success stories, student Kerwin Jacobs.

In ‘Closing the cybersecurity skills gap through education and opportunity’ we discuss:

  • What the Absa Cybersecurity Academy is, and its aim
  • The holistic learning experience at the Maharishi Institute, which includes a lot of self-development and getting to learn things like transcendental meditation
  • Absa’s latest partnership with the Hein Wagner Academy and teaching cybersecurity skills to the visually impaired
  • The opportunities for Africa to be a cybersecurity hub and how the continent can help plug the global skills gap while offering employment opportunities in a market with a high unemployment rate
  • Why individuals from disadvantaged backgrounds – like those enrolled at the academy – make good cybersecurity professionals
  • How the academy has impacted Kerwin’s life
  • Some inspiring stories about other students enrolled in the academy

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Aug 09, 202232:38
Actors, tabletop exercises, and insider threats

Actors, tabletop exercises, and insider threats

In this episode of Phishy Business, we take a look at cyber crisis exercises and insider threats. Our special guest is Lisa Forte, an expert on running cyber crisis exercises and training high-risk staff on insider threats and social engineering, who was named one of the top 30 female cybersecurity leaders by SC Magazine. Lisa works hard to simulate cybersecurity disasters for organizations in order to train them in how to deal with real-world cyberattacks. Lisa shares her insights on cyber crisis exercises and preparing organizations on how to handle cyberattacks as well as how to prevent insider threats.

In ‘Actors, tabletop exercises, and insider threats’ we discuss:

  • The fact that 70% of organizations in EMEA do not have a plan for dealing with insider threats despite it being a growing risk.
  • How insider threats can be both accidental and malicious, different ways to look at the term “insider threat”, and some of the factors that may play into people becoming insider threats.
  • How to balance fear and empowerment to get every employee to care personally about an organization’s cybersecurity, and how cybersecurity needs to be marketed internally to people across the organization.
  • Some of the creative ways to use role-playing and acting in cyber crisis exercises to make simulations as real as possible, which is key to educating teams in dealing with cyberattacks.
  • Top tips for getting started with a plan to deal with insider threats and cyberattacks and the importance of explaining to key personnel that just having backups really is not a solid plan for dealing with today’s threats.
  • The importance of a happy workforce, properly and legally monitoring for insider threats, and tech-for-good and cybersecurity-for-good initiatives.
  • Why CISOs might benefit from rock climbing 

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Jul 26, 202230:56
The Internet Tattoo Effect and common sense online safety

The Internet Tattoo Effect and common sense online safety

In this episode of Phishy Business, we take a look at ways for children and teens to stay safe while online. Our special guest is Emma Sadleir, a leading expert in social media law who educates individuals and organizations about the legal, disciplinary, and reputational risks of social media. Emma is also the co-author of Selfies, Sex, and Smartphones: A Teenager’s Online Survival Guide, which explains the legal pitfalls, hidden dangers, and future implications of what teens do, see, and post online. Emma shares her insights on using common sense to stay safe when participating in social media.

In ‘The Internet Tattoo Effect and Common Sense Online Safety’, we discuss:

  • What children and teens should and should not put online, or even commit to digital content, and the limitations of the billboard test (don’t post online what you would not put on a billboard next to a photo of yourself on the side of the highway) in today’s online world.
  • How digital content is dangerous because it is out of our control, even when we think we are in a private online setting, and how deepfake technology is beginning to become a big problem.
  • The legal guidebooks Emma has had a hand in creating and the benefits they provide for readers.
  • The six p’s (police, parents, principals, predators, prospective schools/employers, phishers) that teenagers should keep in the back of their minds when posting content or interacting online.
  • How parents can keep their heads above water while trying to maintain their child’s online safety in today’s online world.
  • How the lines between the real world and the digital world are fading – we need to now consider the digital world as an extension of the real world.
  • The age at which children should be allowed online and the fact that the Internet has no “shallow end” in which to get acclimated.
  • Whether or not social media platforms are doing enough to protect children online? Learn why Emma says they are not.
  • The steps children themselves can take and the tools they can use to maintain their safety online.

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Jul 12, 202233:41
Advanced Persistent Threat Groups: Preparing Instead of Hoping

Advanced Persistent Threat Groups: Preparing Instead of Hoping

In this episode of Phishy Business, we take a look at advanced persistent threat groups, also known as APT Groups. Special guest Krijn de Mik, Incident Response and Intelligence Lead at Hunt & Hackett, where he specializes in investigations, forensic analysis, and tracking threat actors and threat actor groups, gives his insight on how organizations can protect themselves from APT Groups and their advanced cyberattacks. 

In ‘Advanced Persistent Threat Groups: Preparing Instead of Hoping’, we discuss:

  • What advanced persistent threat groups are, their tactics, their motivations, how large and organized they can be, and why we distinguish them as threat actors
  • The ransom amounts that APT Groups seek, how and why the amounts differ by industry and victim, and the three most targeted industries (listen to learn which three)
  • To pay or not to pay – some of the things that organizations should consider and what they should do when it comes to making this decision
  • How prevention remains an organization’s best bet and how prevention tactics such a table-top and crisis management exercises can help organizations prepare for attacks and reduce chaos
  • One of the largest-scale and most fascinating APT group hacks Krijn and Hunt & Hackett have investigated
  • The importance of:

    o Forensic readiness and how it can be achieved

    o Two-factor authentication

    o Backups and how organizations need to ensure they are complete

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Jun 28, 202225:29
Quantum Computing: Qubits, Algorithms, and Cybersecurity?

Quantum Computing: Qubits, Algorithms, and Cybersecurity?

In this episode of Phishy Business, we delve into the current and future state of quantum computing, and make some predictions about how it will impact cybersecurity and the world in general. Just how cybersecurity doesn’t just impact organizations, but is something that every user should be thinking about, quantum computing is going to have a wide-reaching impact on many aspects of life.

Special guests Duncan Jones, Head of Cybersecurity at Cambridge Quantum, and Dr. Francis Gaffney, Director of Mimecast Labs & Future Operations, do their best to take a concept that can be intimidating and break it down into simple, easy-to-understand scenarios.

In ‘Quantum Computing: Qubits, Algorithms, and Cybersecurity?’, we discuss:

  • How to describe quantum computing at a dinner party, how it is different from the computing we are familiar with
  • The power of quantum computing and its benefits for technologies like machine learning, medical discovery, and language processing
  • How quantum computing is going to impact cybersecurity, including the fact that quantum computers may one day in the not-so-distant future render modern encryption powerless
  • How quantum computing can be used in the future to defend against threats and what organizations should be doing to plan for a future with quantum computing
  • How IoT devices that are being built today should factor in quantum computing as much as possible since these devices will very likely still be in use when quantum computing is deployed on a large scale.
  • What Q Day refers to

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Jun 14, 202228:58
The Lazarus Heist: From Phishing Emails to Half a Ton of Cash

The Lazarus Heist: From Phishing Emails to Half a Ton of Cash

The Lazarus Heist: From Phishing Emails to Half a Ton of Cash

In this episode of Phishy Business, we sit down with Geoff White, investigative journalist, host of The Lazarus Heist Podcast, and now, author of The Lazarus Heist book, which tells the incredible true stories of some of the most high-profile cyberattacks in the world.

In The Lazarus Heist: From Phishing Emails to Half a Ton of Cash, we discuss:

  • How every hack Geoff investigated started with business email compromise, a ‘depressingly familiar tactic’
  • The dangers of phishing emails and human error, and how they give hackers a way in
  • Why human oversight is also crucial to detecting anomalies and monitoring systems to discover malicious activity
  • The physical and digital aspects of traceability when it comes to assets stolen through cyberattacks
  • How you to launder $81 million of cash
  • How organizations need to take a risk-based approach to cybersecurity and resilience
  • How cybercrime gangs operate like legitimate businesses and how cybercriminals can lead a double life.

You can find Geoff's book The Lazarus Heist here.

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

May 31, 202225:22
A Real Life Phishy Business: Jobfished, catfished by your boss?

A Real Life Phishy Business: Jobfished, catfished by your boss?

In this episode of Phishy Business, we dig into the viral BBC documentary called Jobfished, which tells the story of an alleged con that tricked a pool of design workers into working for a fake agency…for free! Special guests Catrin Nye, the investigative journalist who broke the story, and renowned people hacker and social engineer Jenny Radcliffe get into the details of this unbelievable story.

In ‘A Real Life Phishy Business: Jobfished, catfished by your boss?’, we discuss:

  • How the story of over 50 people from across the world being tricked into doing working for free for a fake agency was discovered in a WhatsApp group
  • How the scammer used social engineering and stock pictures in marketing materials and social media to trick prospective employees
  • The motive behind a strange con like this – it’s not always about making money – sometimes it is about stealing your time, seeking fame, and capturing attention
  • How the investigation led back to one person at the top, who has never admitted his guilt or why he did it, and how some believe this was a fake-it-until-you-make it scam
  • How COVID-19 restrictions and workers new to working from home created the perfect storm for this phishy business
  • The four red flags in every con: emotion, urgency, reward, and a clear call to action
  • The power of curiosity – even the smartest people can be duped when they become curious about a new opportunity

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

May 17, 202233:21
Hacker life: Insights into hacking, penetration testing, and more

Hacker life: Insights into hacking, penetration testing, and more

In this episode of Phishy Business, we speak to Elger Jonker who has been active as an ethical hacker and penetration tester for quite a few years. Elger is now in the process of setting up one of the world’s largest hacker camps and conferences. In addition to speaking with Elger about this exciting new event, we also discuss his tips and tricks to make organisations more resilient.

In ‘Hacker life: Insights into hacking, penetration testing, and more’, we discuss:

  • The definition of a hacker and the types of hackers that exist today.
  • Examples of hacks that made an impact, even on Elger himself.
  • How to make organisations more resilient while facing ever-increasing cyberthreats.
  • How ethical hackers can help improve security for organisations.
  • Various initiatives to create more awareness around hacks, hacking, and cybersecurity.
  • Elger’s vision for one of the largest hacker camps and conferences worldwide, hosted in the Netherlands.

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

May 03, 202231:49
Making cybersecurity a business priority - the World Economic Forum’s Global Cybersecurity Outlook 2022

Making cybersecurity a business priority - the World Economic Forum’s Global Cybersecurity Outlook 2022

This week, we speak to Algirde Pipikaite, cybersecurity strategy lead at the World Economic Forum, about their Global cybersecurity outlook report findings, including some concerning misperceptions between business and IT leaders on cybersecurity matters. Our wide-ranging discussion covers the reasons why having a resilient business is good for profits, how to educate the board on the need for cybersecurity, why coding should be taught in schools, and the cybersecurity sector being full of rewarding cybersecurity career opportunities.

In ‘Making cybersecurity a business priority’, we discuss:

  • The WEF’s mission
  • The difference between cyber resilience and cybersecurity
  • The (mis)perception from business leaders that their business is better protected than it really is
  • How IT leaders can better educate the board on the need for cybersecurity
  • How to create a new generation of cyber-aware employees
  • The importance of being bold and trying things out in life

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Apr 19, 202235:29
Hacked, and hacked again

Hacked, and hacked again

Imagine being the CEO of tech company. Now imagine your company gets hacked; not once… but twice. This is what happened to our guest, Scott Schober, a CEO, best-selling author of the book ‘Hacked Again’ and cybersecurity educator. We discuss how his company got breached, his mission to educate other business leaders on good cyber hygiene, and - crucially – to get them to act.

In ‘Hacked, and hacked again’ we cover:

  • How his company got hacked
  • What it is like being both a cyber security expert and a victim of cyber crime
  • How his experience spurred him on to educate other business leaders
  • How his speaking out about being attacked, made him a personal target for cyber criminals
  • His tips of on how business leaders can stay safe
  • Why losing $65,000 to hackers is a drop in the cybercrime ocean

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Apr 05, 202227:13
Being ‘always on’ earned our guest a front row seat to the best tech stories of the last few decades

Being ‘always on’ earned our guest a front row seat to the best tech stories of the last few decades

Ever wonder what it is like to be at THE iPhone launch with Steve Jobs or to interview Elon Musk? Our guest this week has done both those things, and so much more. Rory Cellan Jones is the former tech correspondent at the BBC, and now author of ‘Always on – hope and fear in the smartphone era’. We cover everything from his best stories from his years as a journalist with a front row seat at the biggest tech stories of the last few decades, to the effects social media and mobile devices have on society.

In ‘A front row seat to the best tech stories, our guest was ‘always on’’ we discuss:

  • What it was like having a front row seat to some of the most important tech stories of the last few decades
  • Speaking to Prof. Steven Hawking and hearing what he had to say on the rise of AI
  • The impact mobile devices have had on us and our society at large
  • What being ‘always on’ means in how we interact with each other
  • What the impact is of misinformation
  • How to effectively communicate stories about cybercrime to a broad audience
  • The perils of interviewing Elon Musk

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Mar 21, 202236:26
Starting small to succeed – two inspiring women with a bright future

Starting small to succeed – two inspiring women with a bright future

On the 8th of March every year, we celebrate International Women’s Day, an opportunity to recognise all the inspiring and resilient women across the world. In this week’s episode, we interview two of our own colleagues: Dimakatso Makinta and Sebenzile Sibisi. These incredible women have both overcome huge challenges to get to where they are today. We chat with them about the many obstacles they faced growing up, and the challenges they experienced trying to break into the job market to start making a living.

In this episode, we discuss:

  • Coming from humble beginnings, learning emotional maturity and learning how to look after themselves from a young age
  • How sometimes you must choose between a R5 (33c) taxi to school, or a 40-minute walk each way so you can buy bread for your family
  • Recognising the importance of education in order to break out of the poverty cycle
  • The challenges they experienced getting a tertiary education and how a R4000 monthly salary ($260) can help you get into the job market
  • How you don’t need to have technical training or experience to make it in the world of cybersecurity
  • Advice for other women in tech and in general

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Mar 08, 202230:16
Giving orders can get you in big trouble – intent-based leadership tales

Giving orders can get you in big trouble – intent-based leadership tales

We speak to Captain David Marquet best-selling author, creator of Intent-based leadership and former commander of nuclear-powered submarines for the US Navy. We talk about his career and how that shaped his views on leadership. We discuss his philosophy of intent-based leadership, his commitment to give control to and treat his team as leaders. This led the submarine he was in charge of to be recognised as “worst to first,” achieving the highest retention and operational standings in the navy.

In ‘giving orders can get you in big trouble’ we discuss:

  • How commanding a nuclear submarine in the US navy taught our guest valuable lessons on leadership
  • Giving orders is not always the best way to run teams
  • Permission-based organisations are designed to prevent actions and bold ideas
  • Empowering teams to show what they intend to do creates innovation and better results
  • If you have to give orders, be clear about it
  • Leadership is a language, be mindful of how you use it
  • Tools, such as flashlights, can become a powerful metaphor for change

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Feb 15, 202227:27
Recovering from a cyberattack, openness, snacks and memory sticks

Recovering from a cyberattack, openness, snacks and memory sticks

This week, we speak to one of the most well-known leaders in the tech sector, Adam Banks. Adam is the former Group CTO & CIO at A.P Moller Maersk and lead the recovery from the most expensive cyberattack in history. We discuss what happened, how he drove the recovery, the importance of being open when experiencing a cyber incident, recognising that change can only happen from within yourself and the surprising logistical challenges of dealing with large scale cyber attacks

In ‘Recovering from a cyberattack, openness, snacks, and memory sticks’ we discuss:

  • All change starts with the individual
  • The importance of communication for C level execs, communicate why you did what you did and what the future value of it will be
  • Importance of scenario crisis training
  • Culture of openness benefits the company that has been hit by a cyberattack and all other companies who can learn from these types of incidents
  • Cyberattacks aren’t necessarily an IT problem
  • The logistical needs when managing a crisis involving thousands of people
  • Memory sticks can be very hard to find when you need them

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Jan 31, 202235:38
Workhorses, kidnappings, and ransomware

Workhorses, kidnappings, and ransomware

In this episode we speak to Marc Brandner, partner at SmartRiskSolutions a risk and crisis management consultancy. He served as an officer of the German Special Forces (KSK) in various command assignments in Germany and abroad. He now supports customers both in crisis prevention and in the architecture of holistic and seamless security management. We discuss the similarities between kidnappings and ransomware, the fact that most companies still underestimate the cyber threats they face, and how to best create a crisis management and cyber response plan.

In ‘Workhorses, kidnappings, and ransomware’ we discuss:

  • The similarities between ransomware and kidnapping and how to respond to ransomware attacks
  • Companies need more awareness of cybercrime across the board, and should have preventative measures in place
  • The different legal requirements based on which country the cybercrime takes place in, makes investigations challenging for law enforcement
  • Bigger companies should be aware of creating silos when creating crisis management plans – having a full view is crucial
  • In a crisis situation, management can sometimes decide on the wrong course of action out of eagerness rather than making an informed decision
  • Metaphorically, workhorses are better than racehorses in the special forces

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Jan 18, 202234:13
Chasing cybercriminals across borders – the world of digital forensics

Chasing cybercriminals across borders – the world of digital forensics

This week we speak with Danny Myburgh, a digital forensics expert and the managing Director of Cyanre - The Digital Forensic Lab. He was responsible for establishing the National Computer Crime Investigation Unit for the South African Police Service and was trained by the FBI and the French Police. We chat about the current state of the threat landscape and the vital role that digital forensics plays in the fight against cybercrime.

In this episode we discuss:

  • How the world of cybercrime has evolved since he first got into this business in the early 2000s
  • How he conducts his investigations
  • The challenges of dealing with crimes and criminals across borders
  • What more needs to be done in terms of law enforcement and tracking down cybercriminals
  • Some of the hairier situations he’s been in during his investigations
  • What organisations should be doing to prepare for attacks and limit impact

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Jan 04, 202231:28
Cartoon eyes, and other cybersecurity awareness training techniques

Cartoon eyes, and other cybersecurity awareness training techniques

This week we speak to Mike Gruen, CISO and CTO and Dr. Daniel Glaser, a neuroscientist, about how humour can help in learning. We talk about how to build effective cybersecurity awareness programmes, how to positively harness our innate fear of being judged, and that cyber resilience is everybody’s responsibility.

In ‘Cartoon eyes, and other cybersecurity awareness training techniques’ we discuss:

  • Why creativity is important in STEM subjects
  • Cybersecurity is everyone’s responsibility
  • Eye movements are very telling in terms of learning and can show your level of expertise
  • How humour helps learning because it is context dependent, so you remember the context the information was in
  • Insider threat – moral decisions are not made in a vacuum but in social context and values
  • The surprise effect of cartoon eyes on decision making as most people fear being judged
  • Reward change behaviour more effectively that punishment, in parenting and in cybersecurity awareness training

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Dec 21, 202136:35
Our guest may enjoy being naked, but you should have your brand covered

Our guest may enjoy being naked, but you should have your brand covered

Dec 07, 202130:60
The New Normal in cyber security, an interview with Michelle Price by The Economist Impact
Nov 30, 202139:22
Small company – Big cybersecurity issues
Nov 23, 202124:07
How data protection relates to cyber security, an interview with Kerissa Varma by The Economist Impact
Nov 16, 202131:40
Teenagers and cybercrime – the draw of malice and money?

Teenagers and cybercrime – the draw of malice and money?

Listen to this interesting episode featuring how law enforcement tries to prevent young offenders from making a career in cybercrime. We speak to Floor Jansen, team leader of the offender prevention squad of the Dutch police, and British offender prevention expert Gregory Francis about young cybercrime offenders. We discuss their sometimes surprising motivations, what can be done to stop them from committing these acts, and why society as a whole needs to own the problem.

In this episode, ‘Teenagers and cybercrime – the draw of malice and money?’, we discuss:

  • Just how much damage a 14-year-old with a grudge can cause a multinational company
  • The motivations of young cybercrime offenders aren’t always to cause harm
  • There really isn’t much difference between the crime prevention officers and the young offenders – they both have a passion for IT, one group just took a positive turn in their lives
  • Gaming can be a gateway into committing cybercrimes, as teenagers look to modify and cheat
  • Prevention is key, and if caught early, the re-offending rate drops
  • More often than not, the young offenders did not understand the implications of the crimes they were committing
  • Parents and teachers are usually never in the loop and see these acts as mischief without realising the child could go to prison.

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

Nov 09, 202130:37
The impact of ransomware, an interview with Prof. Ciaran Martin by The Economist Impact
Nov 02, 202132:29
Cybersecurity and crisps

Cybersecurity and crisps

This week we speak to Ciaran Martin, the former founding CEO of the UK National Cyber Security Centre (NCSC) and current Professor of Practice in the Management of Public Organisations at the University of Oxford. We discuss how the NCSC got started, how they communicate cyber threats to the general public without infantilising them, the need for sectorial cyber security legislation and how the culture of silence around ransomware could be doing more harm than good. And last but certainly not least, Ciaran’s surprising snack choice.
In ‘Cyber Security and crisps’ we discuss:

How to balance top secret threat intelligence with communications about cyber security to the general public
The need for legislation in cyber security and how it should be tailored to each business sector
How deglamourizing and talking about cyber-attacks and ransomware might help organisations better deal with those threats
The borderless nature of cybercrime and how difficult it is for governments to catch cyber criminals
How universities are unique organisations to protect against cyber crimes
That working for MI6 is nothing like the James Bond films

About Phishy Business
Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.
www.mimecast.com
Oct 26, 202131:26