<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd">
  <channel>
    <atom:link href="https://feeds.simplecast.com/Vtbd7xWj" rel="self" title="MP3 Audio" type="application/atom+xml"/>
    <atom:link href="https://simplecast.superfeedr.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom"/>
    <generator>https://simplecast.com</generator>
    <title>Hacking into Security - Career Talks</title>
    <description>Your career-related cybersecurity show. Regularly we will be speaking with a variety of guests from industry leaders to new entrants into the space. Each sharing their journey to where they are today, views on the industry, and how others can find success navigating their career. </description>
    <copyright>Hacking into Security 2020</copyright>
    <language>en</language>
    <pubDate>Sat, 14 Nov 2020 18:56:19 +0000</pubDate>
    <lastBuildDate>Wed, 21 Jul 2021 01:02:12 +0000</lastBuildDate>
    <image>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <title>Hacking into Security - Career Talks</title>
      <url>https://image.simplecastcdn.com/images/d4af6783-0b17-4c9e-985c-2164ddde6aa1/66b88950-7df3-4297-b725-8497500b3d93/3000x3000/20200415-235925-f3d2594a11f1d7f809e03718abde3347.jpeg?aid=rss_feed</url>
    </image>
    <link>https://rss.com/podcasts/hackingintosecurity/</link>
    <itunes:type>episodic</itunes:type>
    <itunes:summary>Your career-related cybersecurity show. Regularly we will be speaking with a variety of guests from industry leaders to new entrants into the space. Each sharing their journey to where they are today, views on the industry, and how others can find success navigating their career. </itunes:summary>
    <itunes:author>Ricki Burke</itunes:author>
    <itunes:explicit>yes</itunes:explicit>
    <itunes:image href="https://image.simplecastcdn.com/images/d4af6783-0b17-4c9e-985c-2164ddde6aa1/66b88950-7df3-4297-b725-8497500b3d93/3000x3000/20200415-235925-f3d2594a11f1d7f809e03718abde3347.jpeg?aid=rss_feed"/>
    <itunes:new-feed-url>https://feeds.simplecast.com/Vtbd7xWj</itunes:new-feed-url>
    <itunes:owner>
      <itunes:name>Ricki Burke</itunes:name>
      <itunes:email>Ricki@cybersecpeople.com</itunes:email>
    </itunes:owner>
    <itunes:category text="Business">
      <itunes:category text="Careers"/>
    </itunes:category>
    <itunes:category text="Technology"/>
    <item>
      <guid isPermaLink="false">67d5dbb6-176b-4937-8787-53f502a4820e</guid>
      <title>Hacking into Security #32 - becoming a Champion for women in security, with Jacqui Loustau</title>
      <description><![CDATA[In this episode, we catch up with Jacqui Loustau, the Founder of the AWSN (Australian Women in Security Network) and Principal Security Consultant for Cynch Security.

Jacqui gained excellent experience working overseas in security was planning to come back to Australia and had more difficulty than she expected in landing a job. We walk through Jacqui's story of getting into security, her challenges in landing a job, what got her to start what would become such an influential security community, the future for AWSN and how organisations can do more to attract a more diverse culture.  

Knowing Jacqui over the years has given me some insight into the incredible demand in starting a security community. Impressively, Jacqui decided "to take 6 months and get it (AWSN) up and running properly!" and is now getting paid for her AWSN work. 
 ]]></description>
      <pubDate>Sat, 14 Nov 2020 18:56:19 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Jacqui Loustau)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <enclosure length="31015405" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af6783-0b17-4c9e-985c-2164ddde6aa1/episodes/c927d5f5-eb89-4b5c-a17d-7150260c10e0/audio/d5ad699b-7aa7-4b8f-b529-ee884b256e37/default_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking into Security #32 - becoming a Champion for women in security, with Jacqui Loustau</itunes:title>
      <itunes:author>Jacqui Loustau</itunes:author>
      <itunes:duration>00:32:18</itunes:duration>
      <itunes:summary>In this episode, we catch up with Jacqui Loustau, the Founder of the AWSN (Australian Women in Security Network) and Principal Security Consultant for Cynch Security.

Jacqui gained excellent experience working overseas in security was planning to come back to Australia and had more difficulty than she expected in landing a job. We walk through Jacqui&apos;s story of getting into security, her challenges in landing a job, what got her to start what would become such an influential security community, the future for AWSN and how organisations can do more to attract a more diverse culture.  

Knowing Jacqui over the years has given me some insight into the incredible demand in starting a security community. Impressively, Jacqui decided &quot;to take 6 months and get it (AWSN) up and running properly!&quot; and is now getting paid for her AWSN work. 
 </itunes:summary>
      <itunes:subtitle>In this episode, we catch up with Jacqui Loustau, the Founder of the AWSN (Australian Women in Security Network) and Principal Security Consultant for Cynch Security.

Jacqui gained excellent experience working overseas in security was planning to come back to Australia and had more difficulty than she expected in landing a job. We walk through Jacqui&apos;s story of getting into security, her challenges in landing a job, what got her to start what would become such an influential security community, the future for AWSN and how organisations can do more to attract a more diverse culture.  

Knowing Jacqui over the years has given me some insight into the incredible demand in starting a security community. Impressively, Jacqui decided &quot;to take 6 months and get it (AWSN) up and running properly!&quot; and is now getting paid for her AWSN work. 
 </itunes:subtitle>
      <itunes:keywords>awsn, cyber, infosec, information security, cybersecurity, women, women in security, diversity</itunes:keywords>
      <itunes:explicit>yes</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>32</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">35a3e5f1-7d55-4cf4-b44d-ed5574e9aa1f</guid>
      <title>Hacking into Security #31 - United States Marine to Application Security Engineer, with John Jackson</title>
      <description><![CDATA[In this episode, we catch up with John Jackson (@johnjhacking) an Application Security Engineer at Shutterstock.

John never thought he would have a career sitting at a computer, let alone in cybersecurity. We walk through John's journey from being a Petroleum Engineer in the United States Marine Corps to eventually working in application security, penetration testing, security research and bug bounties. 

We also discuss the reality of applying for hundreds of jobs to land something, taking different roles to help him progress and a story that highlights some of the dangers that can happen to curious security researchers. ]]></description>
      <pubDate>Sat, 31 Oct 2020 23:16:04 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (John Jackson)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <enclosure length="39743646" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af6783-0b17-4c9e-985c-2164ddde6aa1/episodes/dd08321e-4929-44b8-a649-5cf8af674a0c/audio/6ab7749c-cac7-4f58-82c1-872247d9633d/default_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking into Security #31 - United States Marine to Application Security Engineer, with John Jackson</itunes:title>
      <itunes:author>John Jackson</itunes:author>
      <itunes:duration>00:41:24</itunes:duration>
      <itunes:summary>In this episode, we catch up with John Jackson (@johnjhacking) an Application Security Engineer at Shutterstock.

John never thought he would have a career sitting at a computer, let alone in cybersecurity. We walk through John&apos;s journey from being a Petroleum Engineer in the United States Marine Corps to eventually working in application security, penetration testing, security research and bug bounties. 

We also discuss the reality of applying for hundreds of jobs to land something, taking different roles to help him progress and a story that highlights some of the dangers that can happen to curious security researchers. </itunes:summary>
      <itunes:subtitle>In this episode, we catch up with John Jackson (@johnjhacking) an Application Security Engineer at Shutterstock.

John never thought he would have a career sitting at a computer, let alone in cybersecurity. We walk through John&apos;s journey from being a Petroleum Engineer in the United States Marine Corps to eventually working in application security, penetration testing, security research and bug bounties. 

We also discuss the reality of applying for hundreds of jobs to land something, taking different roles to help him progress and a story that highlights some of the dangers that can happen to curious security researchers. </itunes:subtitle>
      <itunes:keywords>cyber, hacker, infosec, devsecops, bug bounty, bugcrowd, hacking, bug bounties, appsec, information security, cybersecurity, application security, security researcher</itunes:keywords>
      <itunes:explicit>yes</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>31</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1da2551c-7965-4134-ae3c-d0519a3862fe</guid>
      <title>Hacking into Security #30 - Building and selling a business (SensePost) and what businesses can do increase gender diversity</title>
      <description><![CDATA[In this episode, we catch up with Charl van der Walt (@charlvdwalt), Head Of Security Research at Orange Cyberdefense and one of the original founders of SensePost.

We talk through the origins of how SensePost got started, what it was like to build a business over 20 plus years and eventually sell and become part of a much larger company. 

Charl also spoke about a personal topic he is driving around gettings organisations to think differently in their approach to gender diversity. 

]]></description>
      <pubDate>Sat, 24 Oct 2020 22:18:41 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Charl van der Walt)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <enclosure length="42229250" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af6783-0b17-4c9e-985c-2164ddde6aa1/episodes/107a49d8-4ce2-4580-bf31-649a357b21c5/audio/32d41af8-c0fd-411d-8b81-6bd3a06ccf53/default_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking into Security #30 - Building and selling a business (SensePost) and what businesses can do increase gender diversity</itunes:title>
      <itunes:author>Charl van der Walt</itunes:author>
      <itunes:duration>00:43:59</itunes:duration>
      <itunes:summary>In this episode, we catch up with Charl van der Walt (@charlvdwalt), Head Of Security Research at Orange Cyberdefense and one of the original founders of SensePost.

We talk through the origins of how SensePost got started, what it was like to build a business over 20 plus years and eventually sell and become part of a much larger company. 

Charl also spoke about a personal topic he is driving around gettings organisations to think differently in their approach to gender diversity. 

</itunes:summary>
      <itunes:subtitle>In this episode, we catch up with Charl van der Walt (@charlvdwalt), Head Of Security Research at Orange Cyberdefense and one of the original founders of SensePost.

We talk through the origins of how SensePost got started, what it was like to build a business over 20 plus years and eventually sell and become part of a much larger company. 

Charl also spoke about a personal topic he is driving around gettings organisations to think differently in their approach to gender diversity. 

</itunes:subtitle>
      <itunes:keywords>cyber, entrepreneur, hacker, infosec, black hat, cloud, devsecops, defcon, hacking, information security, cybersecurity, penetration tester, pentesting</itunes:keywords>
      <itunes:explicit>yes</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>30</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">eeb31402-7644-4d61-8a1a-e6356e0ec5b9</guid>
      <title>Hacking into Security #29 - &quot;we need Security to become part of the Software Engineering team&quot;, with Keith Hoodlet (@securingdev)</title>
      <description><![CDATA[In this episode, we catch up with Keith Hoodlet (@securingdev) Senior Manager, Application Experience at Thermo Fisher Scientific.

Keith has a strong background in application security and is the former host for 55 episodes on the  Application Security Weekly podcast. I saw a tweet by Keith and wanted to dig deeper in that. The tweet was responding to Dino Dai Zovi who said "Security" as a single dimension of expertise increasingly makes no sense. Saying that you are a "security expert" is like saying you are a "computer expert." Computing is a part of everything we do and we don't isolate expertise on all of it within the "computers team.",  Keith said "Agreed; in the same way that Ops became part of the Software Engineering team, we need Security to become part of the Software Engineering team.

This is why I say that Security is a Feature, because features are:
- Funded
- Have time allocated to them
- Are tested and maintained"

We also walk through Keith's journey into the industry and also share advice to companies looking to mature their Application Security and DevSecOps. 

You can watch Keith's keynote talk at OWASP AppSec Day Melbourne 2018 

https://www.youtube.com/watch?v=QT_omddhJzo&list=PLPvxR0i93gjQjrIJK0PdMdFkUbnHhRBRN&index=2&t=0s]]></description>
      <pubDate>Fri, 16 Oct 2020 23:05:11 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Keith Hoodlet)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <enclosure length="49175731" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af6783-0b17-4c9e-985c-2164ddde6aa1/episodes/76565067-7ecc-40cb-8a73-a863e3e34441/audio/868dc717-4e64-4851-a8a0-ac0017b8f059/default_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking into Security #29 - &quot;we need Security to become part of the Software Engineering team&quot;, with Keith Hoodlet (@securingdev)</itunes:title>
      <itunes:author>Keith Hoodlet</itunes:author>
      <itunes:duration>00:51:13</itunes:duration>
      <itunes:summary>In this episode, we catch up with Keith Hoodlet (@securingdev) Senior Manager, Application Experience at Thermo Fisher Scientific.

Keith has a strong background in application security and is the former host for 55 episodes on the  Application Security Weekly podcast. I saw a tweet by Keith and wanted to dig deeper in that. The tweet was responding to Dino Dai Zovi who said &quot;Security&quot; as a single dimension of expertise increasingly makes no sense. Saying that you are a &quot;security expert&quot; is like saying you are a &quot;computer expert.&quot; Computing is a part of everything we do and we don&apos;t isolate expertise on all of it within the &quot;computers team.&quot;,  Keith said &quot;Agreed; in the same way that Ops became part of the Software Engineering team, we need Security to become part of the Software Engineering team.

This is why I say that Security is a Feature, because features are:
- Funded
- Have time allocated to them
- Are tested and maintained&quot;

We also walk through Keith&apos;s journey into the industry and also share advice to companies looking to mature their Application Security and DevSecOps. 

You can watch Keith&apos;s keynote talk at OWASP AppSec Day Melbourne 2018 

https://www.youtube.com/watch?v=QT_omddhJzo&amp;list=PLPvxR0i93gjQjrIJK0PdMdFkUbnHhRBRN&amp;index=2&amp;t=0s</itunes:summary>
      <itunes:subtitle>In this episode, we catch up with Keith Hoodlet (@securingdev) Senior Manager, Application Experience at Thermo Fisher Scientific.

Keith has a strong background in application security and is the former host for 55 episodes on the  Application Security Weekly podcast. I saw a tweet by Keith and wanted to dig deeper in that. The tweet was responding to Dino Dai Zovi who said &quot;Security&quot; as a single dimension of expertise increasingly makes no sense. Saying that you are a &quot;security expert&quot; is like saying you are a &quot;computer expert.&quot; Computing is a part of everything we do and we don&apos;t isolate expertise on all of it within the &quot;computers team.&quot;,  Keith said &quot;Agreed; in the same way that Ops became part of the Software Engineering team, we need Security to become part of the Software Engineering team.

This is why I say that Security is a Feature, because features are:
- Funded
- Have time allocated to them
- Are tested and maintained&quot;

We also walk through Keith&apos;s journey into the industry and also share advice to companies looking to mature their Application Security and DevSecOps. 

You can watch Keith&apos;s keynote talk at OWASP AppSec Day Melbourne 2018 

https://www.youtube.com/watch?v=QT_omddhJzo&amp;list=PLPvxR0i93gjQjrIJK0PdMdFkUbnHhRBRN&amp;index=2&amp;t=0s</itunes:subtitle>
      <itunes:keywords>owasp, cyber, infosec, cloud, devsecops, hacking, appsec, information security, cybersecurity, application security</itunes:keywords>
      <itunes:explicit>yes</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>29</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7bc2cfa7-1b51-4132-85ce-1814cd894b52</guid>
      <title>Hacking into Security #28 - Snowboarder to Security Advisor</title>
      <description><![CDATA[In this episode, we catch up with Toni James (@_tonijames), Security Advisor and CHCon co-organiser.

Toni was a snowboarder, managing a large team but wanted more. She decided to go back to university as a mature student and mum. Not easy to juggle! She went on to finish her Computer Science degree,  an Google Anita Borg Scholar, then Software Engineer and started getting into the security community. 

Toni talks very openly about her journey, the challenges she faced and shared excellent advice to others out there. ]]></description>
      <pubDate>Sun, 11 Oct 2020 00:00:00 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Toni James)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <enclosure length="45294144" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af6783-0b17-4c9e-985c-2164ddde6aa1/episodes/97deca15-99e5-4fc2-a0cd-f4fd3d10bc8c/audio/3b251d47-897f-4c8b-bee1-6ccbd3b997e3/default_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking into Security #28 - Snowboarder to Security Advisor</itunes:title>
      <itunes:author>Toni James</itunes:author>
      <itunes:duration>00:47:11</itunes:duration>
      <itunes:summary>In this episode, we catch up with Toni James (@_tonijames), Security Advisor and CHCon co-organiser.

Toni was a snowboarder, managing a large team but wanted more. She decided to go back to university as a mature student and mum. Not easy to juggle! She went on to finish her Computer Science degree,  an Google Anita Borg Scholar, then Software Engineer and started getting into the security community. 

Toni talks very openly about her journey, the challenges she faced and shared excellent advice to others out there. </itunes:summary>
      <itunes:subtitle>In this episode, we catch up with Toni James (@_tonijames), Security Advisor and CHCon co-organiser.

Toni was a snowboarder, managing a large team but wanted more. She decided to go back to university as a mature student and mum. Not easy to juggle! She went on to finish her Computer Science degree,  an Google Anita Borg Scholar, then Software Engineer and started getting into the security community. 

Toni talks very openly about her journey, the challenges she faced and shared excellent advice to others out there. </itunes:subtitle>
      <itunes:keywords>cyber, hacker, career, infosec, cloud, devsecops, hacking, appsec, information security, cybersecurity, application security, pentesting, software engineer</itunes:keywords>
      <itunes:explicit>yes</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>28</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7f5e95d8-6a4b-09d4-6344-76074b8964ea</guid>
      <title>Hacking into Security #27 - US Marine to Red Teaming and Purple Teaming, with @mubix (Rob Fuller)</title>
      <description><![CDATA[<p>In this episode, we catch up with @mubix (Rob Fuller), a is red teamer turned purple teamer. He started his career in the United States Marine Corps working with explosives and has gone on to have a highly successful career in the security industry working at companies like Rapid7, GE, Uber, Cruise Automation and now Balck Hills Information Security, as well as contributing back in many ways to the security community and speaking at many conferences around the world.</p><p>Mubix shares his journey, stories along the way, as well as going deeper into both red and purple teaming.</p>
]]></description>
      <pubDate>Sat, 3 Oct 2020 22:15:58 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Ricki Burke)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <content:encoded><![CDATA[<p>In this episode, we catch up with @mubix (Rob Fuller), a is red teamer turned purple teamer. He started his career in the United States Marine Corps working with explosives and has gone on to have a highly successful career in the security industry working at companies like Rapid7, GE, Uber, Cruise Automation and now Balck Hills Information Security, as well as contributing back in many ways to the security community and speaking at many conferences around the world.</p><p>Mubix shares his journey, stories along the way, as well as going deeper into both red and purple teaming.</p>
]]></content:encoded>
      <enclosure length="48425913" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af67/d4af6783-0b17-4c9e-985c-2164ddde6aa1/be94b23c-f10b-42be-a6bc-11cad9e1f8f5/20201003-221559-a1893dcaf58eed0e02c0be695908f9c4_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking into Security #27 - US Marine to Red Teaming and Purple Teaming, with @mubix (Rob Fuller)</itunes:title>
      <itunes:author>Ricki Burke</itunes:author>
      <itunes:duration>00:50:27</itunes:duration>
      <itunes:summary>In this episode, we catch up with @mubix (Rob Fuller), a is red teamer turned purple teamer. He started his career in the United States Marine Corps working with explosives and has gone on to have a highly successful career in the security industry working at companies like Rapid7, GE, Uber, Cruise Automation and now Balck Hills Information Security, as well as contributing back in many ways to the security community and speaking at many conferences around the world.Mubix shares his journey, stories along the way, as well as going deeper into both red and purple teaming.</itunes:summary>
      <itunes:subtitle>In this episode, we catch up with @mubix (Rob Fuller), a is red teamer turned purple teamer. He started his career in the United States Marine Corps working with explosives and has gone on to have a highly successful career in the security industry working at companies like Rapid7, GE, Uber, Cruise Automation and now Balck Hills Information Security, as well as contributing back in many ways to the security community and speaking at many conferences around the world.Mubix shares his journey, stories along the way, as well as going deeper into both red and purple teaming.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>27</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">693bd093-14d8-802a-dea4-868327901aab</guid>
      <title>Hacking into Security #26 - Poker player, Developer, Penetration Tester, top 20 bug hunter and Global Head of Security Operations and Researcher Enablement at Bugcrowd, with Michael Skelton (@Codingo)</title>
      <description><![CDATA[<p>In this episode, we catch up with Michael Skelton (@Codingo) Global Head of Security Operations and Researcher Enablement at Bugcrowd.</p><p>Codingo has a non-traditional career path and he shares his journey on how he got to where he is, including the challenges of breaking into the infosec industry. As someone who got to be a Top 20 bug hunter on Bugcrowd and now the Global Head of Security Operations and Researcher Enablement at Bugcrowd, Codingo shares not only career advice but also tips on bug bounties.</p>
]]></description>
      <pubDate>Sat, 26 Sep 2020 14:00:00 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Ricki Burke)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <content:encoded><![CDATA[<p>In this episode, we catch up with Michael Skelton (@Codingo) Global Head of Security Operations and Researcher Enablement at Bugcrowd.</p><p>Codingo has a non-traditional career path and he shares his journey on how he got to where he is, including the challenges of breaking into the infosec industry. As someone who got to be a Top 20 bug hunter on Bugcrowd and now the Global Head of Security Operations and Researcher Enablement at Bugcrowd, Codingo shares not only career advice but also tips on bug bounties.</p>
]]></content:encoded>
      <enclosure length="38300433" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af67/d4af6783-0b17-4c9e-985c-2164ddde6aa1/518ef1bc-aa0a-47cb-bb39-bfaa90d0be91/20200926-060809-ab6be44f0e1935bf64b4494e125e67a9_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking into Security #26 - Poker player, Developer, Penetration Tester, top 20 bug hunter and Global Head of Security Operations and Researcher Enablement at Bugcrowd, with Michael Skelton (@Codingo)</itunes:title>
      <itunes:author>Ricki Burke</itunes:author>
      <itunes:duration>00:39:54</itunes:duration>
      <itunes:summary>In this episode, we catch up with Michael Skelton (@Codingo) Global Head of Security Operations and Researcher Enablement at Bugcrowd.Codingo has a non-traditional career path and he shares his journey on how he got to where he is, including the challenges of breaking into the infosec industry. As someone who got to be a Top 20 bug hunter on Bugcrowd and now the Global Head of Security Operations and Researcher Enablement at Bugcrowd, Codingo shares not only career advice but also tips on bug bounties.</itunes:summary>
      <itunes:subtitle>In this episode, we catch up with Michael Skelton (@Codingo) Global Head of Security Operations and Researcher Enablement at Bugcrowd.Codingo has a non-traditional career path and he shares his journey on how he got to where he is, including the challenges of breaking into the infosec industry. As someone who got to be a Top 20 bug hunter on Bugcrowd and now the Global Head of Security Operations and Researcher Enablement at Bugcrowd, Codingo shares not only career advice but also tips on bug bounties.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>26</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">63fcb161-c2f7-5cb6-b56e-9e291106243c</guid>
      <title>Hacking Into Security #25 - From marketing to InfoSec Advocate &amp; Activist, with Chloé Messdaghi</title>
      <description><![CDATA[<p>In this episode, we catch up with Chloé Messdaghi, VP of Strategy at Point3 Security. </p><p>Chloé is a humanitarian Advocate in the Cybersecurity space. She started her career in marketing but got the opportunity to move into infosec in 2017. Chloé shares some of the experiences that led her to nearly quit the industry but instead has gone on to become a voice in the community. As well as speaking many conferences, Chloé is the founder of WeAreHackerz (formerly known as WomenHackerz) & the President and cofounder of Women of Security (WoSEC), podcaster for ITSP Magazine's The Uncommon Journey, and runs the Hacker Book Club. </p>
]]></description>
      <pubDate>Sat, 19 Sep 2020 14:00:00 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Ricki Burke)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <content:encoded><![CDATA[<p>In this episode, we catch up with Chloé Messdaghi, VP of Strategy at Point3 Security. </p><p>Chloé is a humanitarian Advocate in the Cybersecurity space. She started her career in marketing but got the opportunity to move into infosec in 2017. Chloé shares some of the experiences that led her to nearly quit the industry but instead has gone on to become a voice in the community. As well as speaking many conferences, Chloé is the founder of WeAreHackerz (formerly known as WomenHackerz) & the President and cofounder of Women of Security (WoSEC), podcaster for ITSP Magazine's The Uncommon Journey, and runs the Hacker Book Club. </p>
]]></content:encoded>
      <enclosure length="37749563" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af67/d4af6783-0b17-4c9e-985c-2164ddde6aa1/f01e3c0a-2cec-4b05-aa99-f5b95840e5d4/20200917-225542-53238043949b3e77c5c207d8449362e9_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking Into Security #25 - From marketing to InfoSec Advocate &amp; Activist, with Chloé Messdaghi</itunes:title>
      <itunes:author>Ricki Burke</itunes:author>
      <itunes:duration>00:39:19</itunes:duration>
      <itunes:summary>In this episode, we catch up with Chloé Messdaghi, VP of Strategy at Point3 Security. Chloé is a humanitarian Advocate in the Cybersecurity space. She started her career in marketing but got the opportunity to move into infosec in 2017. Chloé shares some of the experiences that led her to nearly quit the industry but instead has gone on to become a voice in the community. As well as speaking many conferences, Chloé is the founder of WeAreHackerz (formerly known as WomenHackerz) &amp; the President and cofounder of Women of Security (WoSEC), podcaster for ITSP Magazine&apos;s The Uncommon Journey, and runs the Hacker Book Club.</itunes:summary>
      <itunes:subtitle>In this episode, we catch up with Chloé Messdaghi, VP of Strategy at Point3 Security. Chloé is a humanitarian Advocate in the Cybersecurity space. She started her career in marketing but got the opportunity to move into infosec in 2017. Chloé shares some of the experiences that led her to nearly quit the industry but instead has gone on to become a voice in the community. As well as speaking many conferences, Chloé is the founder of WeAreHackerz (formerly known as WomenHackerz) &amp; the President and cofounder of Women of Security (WoSEC), podcaster for ITSP Magazine&apos;s The Uncommon Journey, and runs the Hacker Book Club.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>25</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">16ea76f3-7371-95f6-d0f5-de0390f148f8</guid>
      <title>Hacking Into Security #24 - Finding vulnerabilities, with Elliot Alderson (@fs0c131y) - Baptiste Robert</title>
      <description><![CDATA[<p>In this episode, we catch up with Baptiste Robert, who goes by the handle @fs0c131y.</p><p>Baptiste is a Security Researcher based in France with a big focus on android. We walk through his journey from graduating with a network and telecommunication to finding vulnerabilities and creating a large following. </p><p>We also cover how has a security researcher, Baptise finds his projects and his plans for the future around battling disinformation. </p>
]]></description>
      <pubDate>Fri, 11 Sep 2020 14:00:00 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Ricki Burke)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <content:encoded><![CDATA[<p>In this episode, we catch up with Baptiste Robert, who goes by the handle @fs0c131y.</p><p>Baptiste is a Security Researcher based in France with a big focus on android. We walk through his journey from graduating with a network and telecommunication to finding vulnerabilities and creating a large following. </p><p>We also cover how has a security researcher, Baptise finds his projects and his plans for the future around battling disinformation. </p>
]]></content:encoded>
      <enclosure length="34538383" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af67/d4af6783-0b17-4c9e-985c-2164ddde6aa1/cb35b34f-80ca-4382-9890-660156f21053/20200911-045825-e97d8a3f7f6f86b70ec273120e1ab5bb_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking Into Security #24 - Finding vulnerabilities, with Elliot Alderson (@fs0c131y) - Baptiste Robert</itunes:title>
      <itunes:author>Ricki Burke</itunes:author>
      <itunes:duration>00:35:59</itunes:duration>
      <itunes:summary>In this episode, we catch up with Baptiste Robert, who goes by the handle @fs0c131y.Baptiste is a Security Researcher based in France with a big focus on android. We walk through his journey from graduating with a network and telecommunication to finding vulnerabilities and creating a large following. We also cover how has a security researcher, Baptise finds his projects and his plans for the future around battling disinformation.</itunes:summary>
      <itunes:subtitle>In this episode, we catch up with Baptiste Robert, who goes by the handle @fs0c131y.Baptiste is a Security Researcher based in France with a big focus on android. We walk through his journey from graduating with a network and telecommunication to finding vulnerabilities and creating a large following. We also cover how has a security researcher, Baptise finds his projects and his plans for the future around battling disinformation.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>24</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">072aa57f-6abe-816d-1f4b-a6f5ea3ccbdc</guid>
      <title>Hacking Into Security #23 - Finding vulnerabilities as a teenager, first job at 17, bug bounties and more, with Shubs - @infosec_au, @notnaffy</title>
      <description><![CDATA[<p>In this episode, we catch up with Shubs (Shubham Shah, @infosec_au, @notnaffy), CTO of Assetnote.</p><p>A passion for hacking grew early in Shubs' life. He was demonstrating good skills in hacking but faced with a tough decision at an early age. Follow his parents wishes and attend university or his own path and get a job. </p><p>We talk through Shubs's incredible journey which saw him land his first job in the industry at 17 years old, his success in bug bounties and going on to co-found the company Assetnote. </p><p></p><p>Shubs also shares some practical tips for aspiring hackers and bug bounty hunters. </p><p></p><p>Recommended blog by Shubs on bug bounties - High frequency security bug hunting: 120 days, 120 bugs</p><p></p><p><a href="https://shubs.io/high-frequency-security-bug-hunting-120-days-120-bugs/">https://shubs.io/high-frequency-security-bug-hunting-120-days-120-bugs/</a></p>
]]></description>
      <pubDate>Fri, 4 Sep 2020 14:00:00 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Ricki Burke)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <content:encoded><![CDATA[<p>In this episode, we catch up with Shubs (Shubham Shah, @infosec_au, @notnaffy), CTO of Assetnote.</p><p>A passion for hacking grew early in Shubs' life. He was demonstrating good skills in hacking but faced with a tough decision at an early age. Follow his parents wishes and attend university or his own path and get a job. </p><p>We talk through Shubs's incredible journey which saw him land his first job in the industry at 17 years old, his success in bug bounties and going on to co-found the company Assetnote. </p><p></p><p>Shubs also shares some practical tips for aspiring hackers and bug bounty hunters. </p><p></p><p>Recommended blog by Shubs on bug bounties - High frequency security bug hunting: 120 days, 120 bugs</p><p></p><p><a href="https://shubs.io/high-frequency-security-bug-hunting-120-days-120-bugs/">https://shubs.io/high-frequency-security-bug-hunting-120-days-120-bugs/</a></p>
]]></content:encoded>
      <enclosure length="38483917" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af67/d4af6783-0b17-4c9e-985c-2164ddde6aa1/1f9d5093-e0fc-48c2-8b0f-022855435f11/20200831-043030-849f46300de53cd73815cabbac67e5ad_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking Into Security #23 - Finding vulnerabilities as a teenager, first job at 17, bug bounties and more, with Shubs - @infosec_au, @notnaffy</itunes:title>
      <itunes:author>Ricki Burke</itunes:author>
      <itunes:duration>00:40:05</itunes:duration>
      <itunes:summary>In this episode, we catch up with Shubs (Shubham Shah, @infosec_au, @notnaffy), CTO of Assetnote.A passion for hacking grew early in Shubs&apos; life. He was demonstrating good skills in hacking but faced with a tough decision at an early age. Follow his parents wishes and attend university or his own path and get a job. We talk through Shubs&apos;s incredible journey which saw him land his first job in the industry at 17 years old, his success in bug bounties and going on to co-found the company Assetnote. Shubs also shares some practical tips for aspiring hackers and bug bounty hunters. Recommended blog by Shubs on bug bounties - High frequency security bug hunting: 120 days, 120 bugshttps://shubs.io/high-frequency-security-bug-hunting-120-days-120-bugs/</itunes:summary>
      <itunes:subtitle>In this episode, we catch up with Shubs (Shubham Shah, @infosec_au, @notnaffy), CTO of Assetnote.A passion for hacking grew early in Shubs&apos; life. He was demonstrating good skills in hacking but faced with a tough decision at an early age. Follow his parents wishes and attend university or his own path and get a job. We talk through Shubs&apos;s incredible journey which saw him land his first job in the industry at 17 years old, his success in bug bounties and going on to co-found the company Assetnote. Shubs also shares some practical tips for aspiring hackers and bug bounty hunters. Recommended blog by Shubs on bug bounties - High frequency security bug hunting: 120 days, 120 bugshttps://shubs.io/high-frequency-security-bug-hunting-120-days-120-bugs/</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>23</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">84763578-738d-fa57-5d79-70badfac253d</guid>
      <title>Hacking Into Security #22 - QA to Senior Security Advisor and beyond, with Brendan Seerup @SparkleOps</title>
      <description><![CDATA[<p>In this episode, we catch up with Brendan Seerup, or sometimes better known as SparkleOps.</p><p>Brendan is currently a Senior Security Advisor at REA Group, but less than 5 years ago he was working as a Quality Assurance Manager. Brendan talks about how he always saw security as part of QA, hardware hacking and how he went from not presenting to speaking at six security cons in a year.</p><p>He gives practical advice for people with a similar background and talks about what the future looks like and how he can make an even bigger impact combining his skills and experience.  </p>
]]></description>
      <pubDate>Sun, 30 Aug 2020 10:00:08 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Ricki Burke)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <content:encoded><![CDATA[<p>In this episode, we catch up with Brendan Seerup, or sometimes better known as SparkleOps.</p><p>Brendan is currently a Senior Security Advisor at REA Group, but less than 5 years ago he was working as a Quality Assurance Manager. Brendan talks about how he always saw security as part of QA, hardware hacking and how he went from not presenting to speaking at six security cons in a year.</p><p>He gives practical advice for people with a similar background and talks about what the future looks like and how he can make an even bigger impact combining his skills and experience.  </p>
]]></content:encoded>
      <enclosure length="31656554" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af67/d4af6783-0b17-4c9e-985c-2164ddde6aa1/2198b2e5-df02-48e6-9d06-17e651ae07b8/20200830-100009-32b3bbe0ee642f43660a1126763b27dc_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking Into Security #22 - QA to Senior Security Advisor and beyond, with Brendan Seerup @SparkleOps</itunes:title>
      <itunes:author>Ricki Burke</itunes:author>
      <itunes:duration>00:32:58</itunes:duration>
      <itunes:summary>In this episode, we catch up with Brendan Seerup, or sometimes better known as SparkleOps.Brendan is currently a Senior Security Advisor at REA Group, but less than 5 years ago he was working as a Quality Assurance Manager. Brendan talks about how he always saw security as part of QA, hardware hacking and how he went from not presenting to speaking at six security cons in a year.He gives practical advice for people with a similar background and talks about what the future looks like and how he can make an even bigger impact combining his skills and experience.</itunes:summary>
      <itunes:subtitle>In this episode, we catch up with Brendan Seerup, or sometimes better known as SparkleOps.Brendan is currently a Senior Security Advisor at REA Group, but less than 5 years ago he was working as a Quality Assurance Manager. Brendan talks about how he always saw security as part of QA, hardware hacking and how he went from not presenting to speaking at six security cons in a year.He gives practical advice for people with a similar background and talks about what the future looks like and how he can make an even bigger impact combining his skills and experience.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>22</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a6a3dbb3-606c-3f17-f458-f91abef9cbaa</guid>
      <title>Hacking Into Security #21 - Drone Security, with Mike Monnik - CTO of DroneSec</title>
      <description><![CDATA[<p>In this episode, we catch up with Mike Monnik, CTO of DroneSec, offensive security professional and Co-organiser of SecTalks Melbourne. </p><p>Mike was advised early in his career to pick up a specialist area. That area turned out to be drones, and a passion was formed. Starting as a side hustle and whilst working as a penetration tester, Mike started building a (not-for-profit) drone security company.  This eventually turned into a business and Mike walks us through this story and what the drone security industry looks like. </p><p>He discusses what the future could look like for the industry and how others who share a similar passion could pivot into a full-time role in drone security.</p><p></p><p>Here are some resources Mike recommends:</p><ul><li><p>DroneSec UAV Threat Intel Platform: <a href="https://dronesec.com/pages/notify">https://dronesec.com/pages/notify</a></p></li><li><p>CREST ASSURE Program: <a href="https://www.crest-approved.org/assure/index.html">https://www.crest-approved.org/assure/index.html</a></p></li><li><p>Christchurch Mosque shooter used drones to surveil target site: <a href="https://www.stuff.co.nz/national/christchurch-shooting/122232602/christchurch-mosque-terrorist-used-drone-over-mosque-before-march-15-attack">https://www.stuff.co.nz/national/christchurch-shooting/122232602/christchurch-mosque-terrorist-used-drone-over-mosque-before-march-15-attack</a></p></li><li><p>ISIS fighter killed by own drone: <a href="https://www.thesun.co.uk/news/9797095/isis-fighter-killed-by-drone-bomb/">https://www.thesun.co.uk/news/9797095/isis-fighter-killed-by-drone-bomb/</a></p></li><li><p>Gangs using drones to infect pig pens: <a href="https://www.businessinsider.com/chinese-gangs-are-spreading-african-swine-fever-to-profit-2019-12?r=AU&IR=T">https://www.businessinsider.com/chinese-gangs-are-spreading-african-swine-fever-to-profit-2019-12?r=AU&IR=T</a> (editors note: swine flu not bird flu as mentioned in the podcast)</p></li><li><p>Pig pen farms disrupt aviation with drone jammers: <a href="https://www.reuters.com/article/us-china-swinefever/commercial-pig-farm-in-china-jams-drone-signal-to-combat-swine-fever-crooks-idUSKBN1YO0JE">https://www.reuters.com/article/us-china-swinefever/commercial-pig-farm-in-china-jams-drone-signal-to-combat-swine-fever-crooks-idUSKBN1YO0JE</a></p></li><li><p>Cartels using drones as temporary airstrips: <a href="https://www.washingtonpost.com/world/2020/07/05/guatemala-cocaine-trafficking-laguna-del-tigre/">https://www.washingtonpost.com/world/2020/07/05/guatemala-cocaine-trafficking-laguna-del-tigre/</a></p></li><li><p>A journalist uses a drone to exfiltrate hard drives: <a href="https://www.bbc.com/news/technology-49689833">https://www.bbc.com/news/technology-49689833</a></p></li><li><p>Researchers use drone projectors to disrupt smart vehicles: <a href="https://thenextweb.com/cars/2020/02/05/teslas-autopilot-dangerously-fooled-by-drone-mounted-projectors/">https://thenextweb.com/cars/2020/02/05/teslas-autopilot-dangerously-fooled-by-drone-mounted-projectors/</a></p></li><li><p>DJI Bug Bounty Program: <a href="https://security.dji.com/policy">https://security.dji.com/policy</a></p></li></ul>
]]></description>
      <pubDate>Sat, 22 Aug 2020 23:34:59 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Ricki Burke)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <content:encoded><![CDATA[<p>In this episode, we catch up with Mike Monnik, CTO of DroneSec, offensive security professional and Co-organiser of SecTalks Melbourne. </p><p>Mike was advised early in his career to pick up a specialist area. That area turned out to be drones, and a passion was formed. Starting as a side hustle and whilst working as a penetration tester, Mike started building a (not-for-profit) drone security company.  This eventually turned into a business and Mike walks us through this story and what the drone security industry looks like. </p><p>He discusses what the future could look like for the industry and how others who share a similar passion could pivot into a full-time role in drone security.</p><p></p><p>Here are some resources Mike recommends:</p><ul><li><p>DroneSec UAV Threat Intel Platform: <a href="https://dronesec.com/pages/notify">https://dronesec.com/pages/notify</a></p></li><li><p>CREST ASSURE Program: <a href="https://www.crest-approved.org/assure/index.html">https://www.crest-approved.org/assure/index.html</a></p></li><li><p>Christchurch Mosque shooter used drones to surveil target site: <a href="https://www.stuff.co.nz/national/christchurch-shooting/122232602/christchurch-mosque-terrorist-used-drone-over-mosque-before-march-15-attack">https://www.stuff.co.nz/national/christchurch-shooting/122232602/christchurch-mosque-terrorist-used-drone-over-mosque-before-march-15-attack</a></p></li><li><p>ISIS fighter killed by own drone: <a href="https://www.thesun.co.uk/news/9797095/isis-fighter-killed-by-drone-bomb/">https://www.thesun.co.uk/news/9797095/isis-fighter-killed-by-drone-bomb/</a></p></li><li><p>Gangs using drones to infect pig pens: <a href="https://www.businessinsider.com/chinese-gangs-are-spreading-african-swine-fever-to-profit-2019-12?r=AU&IR=T">https://www.businessinsider.com/chinese-gangs-are-spreading-african-swine-fever-to-profit-2019-12?r=AU&IR=T</a> (editors note: swine flu not bird flu as mentioned in the podcast)</p></li><li><p>Pig pen farms disrupt aviation with drone jammers: <a href="https://www.reuters.com/article/us-china-swinefever/commercial-pig-farm-in-china-jams-drone-signal-to-combat-swine-fever-crooks-idUSKBN1YO0JE">https://www.reuters.com/article/us-china-swinefever/commercial-pig-farm-in-china-jams-drone-signal-to-combat-swine-fever-crooks-idUSKBN1YO0JE</a></p></li><li><p>Cartels using drones as temporary airstrips: <a href="https://www.washingtonpost.com/world/2020/07/05/guatemala-cocaine-trafficking-laguna-del-tigre/">https://www.washingtonpost.com/world/2020/07/05/guatemala-cocaine-trafficking-laguna-del-tigre/</a></p></li><li><p>A journalist uses a drone to exfiltrate hard drives: <a href="https://www.bbc.com/news/technology-49689833">https://www.bbc.com/news/technology-49689833</a></p></li><li><p>Researchers use drone projectors to disrupt smart vehicles: <a href="https://thenextweb.com/cars/2020/02/05/teslas-autopilot-dangerously-fooled-by-drone-mounted-projectors/">https://thenextweb.com/cars/2020/02/05/teslas-autopilot-dangerously-fooled-by-drone-mounted-projectors/</a></p></li><li><p>DJI Bug Bounty Program: <a href="https://security.dji.com/policy">https://security.dji.com/policy</a></p></li></ul>
]]></content:encoded>
      <enclosure length="41843473" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af67/d4af6783-0b17-4c9e-985c-2164ddde6aa1/75c41521-0ca0-47cf-8c99-1f471ba043eb/20200822-233500-0754186762739897a5668a423ac4762d_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking Into Security #21 - Drone Security, with Mike Monnik - CTO of DroneSec</itunes:title>
      <itunes:author>Ricki Burke</itunes:author>
      <itunes:duration>00:43:35</itunes:duration>
      <itunes:summary>In this episode, we catch up with Mike Monnik, CTO of DroneSec, offensive security professional and Co-organiser of SecTalks Melbourne. Mike was advised early in his career to pick up a specialist area. That area turned out to be drones, and a passion was formed. Starting as a side hustle and whilst working as a penetration tester, Mike started building a (not-for-profit) drone security company.  This eventually turned into a business and Mike walks us through this story and what the drone security industry looks like. He discusses what the future could look like for the industry and how others who share a similar passion could pivot into a full-time role in drone security.Here are some resources Mike recommends:DroneSec UAV Threat Intel Platform: https://dronesec.com/pages/notifyCREST ASSURE Program: https://www.crest-approved.org/assure/index.htmlChristchurch Mosque shooter used drones to surveil target site: https://www.stuff.co.nz/national/christchurch-shooting/122232602/christchurch-mosque-terrorist-used-drone-over-mosque-before-march-15-attackISIS fighter killed by own drone: https://www.thesun.co.uk/news/9797095/isis-fighter-killed-by-drone-bomb/Gangs using drones to infect pig pens: https://www.businessinsider.com/chinese-gangs-are-spreading-african-swine-fever-to-profit-2019-12?r=AU&amp;IR=T (editors note: swine flu not bird flu as mentioned in the podcast)Pig pen farms disrupt aviation with drone jammers: https://www.reuters.com/article/us-china-swinefever/commercial-pig-farm-in-china-jams-drone-signal-to-combat-swine-fever-crooks-idUSKBN1YO0JECartels using drones as temporary airstrips: https://www.washingtonpost.com/world/2020/07/05/guatemala-cocaine-trafficking-laguna-del-tigre/A journalist uses a drone to exfiltrate hard drives: https://www.bbc.com/news/technology-49689833Researchers use drone projectors to disrupt smart vehicles: https://thenextweb.com/cars/2020/02/05/teslas-autopilot-dangerously-fooled-by-drone-mounted-projectors/DJI Bug Bounty Program: https://security.dji.com/policy</itunes:summary>
      <itunes:subtitle>In this episode, we catch up with Mike Monnik, CTO of DroneSec, offensive security professional and Co-organiser of SecTalks Melbourne. Mike was advised early in his career to pick up a specialist area. That area turned out to be drones, and a passion was formed. Starting as a side hustle and whilst working as a penetration tester, Mike started building a (not-for-profit) drone security company.  This eventually turned into a business and Mike walks us through this story and what the drone security industry looks like. He discusses what the future could look like for the industry and how others who share a similar passion could pivot into a full-time role in drone security.Here are some resources Mike recommends:DroneSec UAV Threat Intel Platform: https://dronesec.com/pages/notifyCREST ASSURE Program: https://www.crest-approved.org/assure/index.htmlChristchurch Mosque shooter used drones to surveil target site: https://www.stuff.co.nz/national/christchurch-shooting/122232602/christchurch-mosque-terrorist-used-drone-over-mosque-before-march-15-attackISIS fighter killed by own drone: https://www.thesun.co.uk/news/9797095/isis-fighter-killed-by-drone-bomb/Gangs using drones to infect pig pens: https://www.businessinsider.com/chinese-gangs-are-spreading-african-swine-fever-to-profit-2019-12?r=AU&amp;IR=T (editors note: swine flu not bird flu as mentioned in the podcast)Pig pen farms disrupt aviation with drone jammers: https://www.reuters.com/article/us-china-swinefever/commercial-pig-farm-in-china-jams-drone-signal-to-combat-swine-fever-crooks-idUSKBN1YO0JECartels using drones as temporary airstrips: https://www.washingtonpost.com/world/2020/07/05/guatemala-cocaine-trafficking-laguna-del-tigre/A journalist uses a drone to exfiltrate hard drives: https://www.bbc.com/news/technology-49689833Researchers use drone projectors to disrupt smart vehicles: https://thenextweb.com/cars/2020/02/05/teslas-autopilot-dangerously-fooled-by-drone-mounted-projectors/DJI Bug Bounty Program: https://security.dji.com/policy</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>21</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a6ca39d4-b8a2-80d5-5b6e-421378e3ab05</guid>
      <title>Hacking Into Security #20 - The origins of Hackers, with Iain Dickson, ComfyCon AU Founder, Cyber Technical Lead</title>
      <description><![CDATA[<p>In this episode, we catch up with Iain Dickson, ComfyCon AU Founder, Cyber Technical Lead for Leidos Australia.</p><p>Iain walks us through a presentation on the origins of Hackers and defines the different types of threat actors, </p>
]]></description>
      <pubDate>Sat, 15 Aug 2020 14:00:00 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Ricki Burke)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <content:encoded><![CDATA[<p>In this episode, we catch up with Iain Dickson, ComfyCon AU Founder, Cyber Technical Lead for Leidos Australia.</p><p>Iain walks us through a presentation on the origins of Hackers and defines the different types of threat actors, </p>
]]></content:encoded>
      <enclosure length="45619735" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af67/d4af6783-0b17-4c9e-985c-2164ddde6aa1/422f2ca7-2e94-4598-a522-4d3b0b47483f/20200814-223438-fa9c4ed9fb4ab14ff9b6da8800e7f94c_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking Into Security #20 - The origins of Hackers, with Iain Dickson, ComfyCon AU Founder, Cyber Technical Lead</itunes:title>
      <itunes:author>Ricki Burke</itunes:author>
      <itunes:duration>00:47:31</itunes:duration>
      <itunes:summary>In this episode, we catch up with Iain Dickson, ComfyCon AU Founder, Cyber Technical Lead for Leidos Australia.Iain walks us through a presentation on the origins of Hackers and defines the different types of threat actors,</itunes:summary>
      <itunes:subtitle>In this episode, we catch up with Iain Dickson, ComfyCon AU Founder, Cyber Technical Lead for Leidos Australia.Iain walks us through a presentation on the origins of Hackers and defines the different types of threat actors,</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>20</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9359a356-ccd7-1597-dc62-525526f0d6df</guid>
      <title>Hacking Into Security #19 - Advising CIOs on their first security hire, with Claire Pales</title>
      <description><![CDATA[<p>In this episode, we catch up with Claire Pales. </p><p>Claire is the Director and Founder of 27 Lanterns, author of The Secure CIO book, host of The Secure CIO podcast and mum of four. We cover Claire's unique insight as she comes from a security leadership background and now advises organisations in hiring their first CISO. </p><p>We also discuss the challenges of coming back to Australia with overseas experience. </p>
]]></description>
      <pubDate>Fri, 7 Aug 2020 14:00:00 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Ricki Burke)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <content:encoded><![CDATA[<p>In this episode, we catch up with Claire Pales. </p><p>Claire is the Director and Founder of 27 Lanterns, author of The Secure CIO book, host of The Secure CIO podcast and mum of four. We cover Claire's unique insight as she comes from a security leadership background and now advises organisations in hiring their first CISO. </p><p>We also discuss the challenges of coming back to Australia with overseas experience. </p>
]]></content:encoded>
      <enclosure length="26024554" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af67/d4af6783-0b17-4c9e-985c-2164ddde6aa1/c6daee32-14f9-4f93-9511-d6d5a68478a3/20200716-050618-c13c40080564b083b54b7fc3e75e84d2_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking Into Security #19 - Advising CIOs on their first security hire, with Claire Pales</itunes:title>
      <itunes:author>Ricki Burke</itunes:author>
      <itunes:duration>00:27:06</itunes:duration>
      <itunes:summary>In this episode, we catch up with Claire Pales. Claire is the Director and Founder of 27 Lanterns, author of The Secure CIO book, host of The Secure CIO podcast and mum of four. We cover Claire&apos;s unique insight as she comes from a security leadership background and now advises organisations in hiring their first CISO. We also discuss the challenges of coming back to Australia with overseas experience.</itunes:summary>
      <itunes:subtitle>In this episode, we catch up with Claire Pales. Claire is the Director and Founder of 27 Lanterns, author of The Secure CIO book, host of The Secure CIO podcast and mum of four. We cover Claire&apos;s unique insight as she comes from a security leadership background and now advises organisations in hiring their first CISO. We also discuss the challenges of coming back to Australia with overseas experience.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>19</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f6b70f50-d9d3-30db-3d28-b8ac5adc3636</guid>
      <title>Hacking Into Security #18 - VCs in cybersecurity and Unit 8200, with Ofer Schreiber</title>
      <description><![CDATA[<p>In this episode, we catch up with Ofer Schreiber, Partner & Head of Israel Office at the American-Israeli venture capital firm, YL Ventures. </p><p>We talk about the cybersecurity from the lens of a venture capital firm. Ofer shares his unique background and experience having come through Unit 8200 and now looks at and manages investments on the behalf of YL Ventures.</p><p>Ofer talks about what his firm looks for when investing in entrepreneurs and provides advice for people who aspire to build the next cybersecurity startup. </p>
]]></description>
      <pubDate>Fri, 31 Jul 2020 14:00:00 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Ricki Burke)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <content:encoded><![CDATA[<p>In this episode, we catch up with Ofer Schreiber, Partner & Head of Israel Office at the American-Israeli venture capital firm, YL Ventures. </p><p>We talk about the cybersecurity from the lens of a venture capital firm. Ofer shares his unique background and experience having come through Unit 8200 and now looks at and manages investments on the behalf of YL Ventures.</p><p>Ofer talks about what his firm looks for when investing in entrepreneurs and provides advice for people who aspire to build the next cybersecurity startup. </p>
]]></content:encoded>
      <enclosure length="37300257" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af67/d4af6783-0b17-4c9e-985c-2164ddde6aa1/55203640-e92c-40a7-9e8f-a280297fcd12/20200716-031232-843194d6da81bdf7307974d8e71da08d_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking Into Security #18 - VCs in cybersecurity and Unit 8200, with Ofer Schreiber</itunes:title>
      <itunes:author>Ricki Burke</itunes:author>
      <itunes:duration>00:38:51</itunes:duration>
      <itunes:summary>In this episode, we catch up with Ofer Schreiber, Partner &amp; Head of Israel Office at the American-Israeli venture capital firm, YL Ventures. We talk about the cybersecurity from the lens of a venture capital firm. Ofer shares his unique background and experience having come through Unit 8200 and now looks at and manages investments on the behalf of YL Ventures.Ofer talks about what his firm looks for when investing in entrepreneurs and provides advice for people who aspire to build the next cybersecurity startup.</itunes:summary>
      <itunes:subtitle>In this episode, we catch up with Ofer Schreiber, Partner &amp; Head of Israel Office at the American-Israeli venture capital firm, YL Ventures. We talk about the cybersecurity from the lens of a venture capital firm. Ofer shares his unique background and experience having come through Unit 8200 and now looks at and manages investments on the behalf of YL Ventures.Ofer talks about what his firm looks for when investing in entrepreneurs and provides advice for people who aspire to build the next cybersecurity startup.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>18</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b2e32762-4ff9-e427-da7a-f1f7f42b4a3a</guid>
      <title>Hacking Into Security #17 - Becoming the World&apos;s first CISO, with Steve Katz</title>
      <description><![CDATA[<p>In this episode, we catch up with Steve Katz, the World's first CISO. </p><p>Steve became the CISO of Citigroup in 1995. We discuss Steve's journey leading up to the role, how it came about and with no blueprint to follow, what he did in the job. </p><p>We also discuss Steve's approach to how he dealt with boards and there is plenty of advice for current and future CISOs. </p>
]]></description>
      <pubDate>Fri, 24 Jul 2020 14:00:00 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Ricki Burke)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <content:encoded><![CDATA[<p>In this episode, we catch up with Steve Katz, the World's first CISO. </p><p>Steve became the CISO of Citigroup in 1995. We discuss Steve's journey leading up to the role, how it came about and with no blueprint to follow, what he did in the job. </p><p>We also discuss Steve's approach to how he dealt with boards and there is plenty of advice for current and future CISOs. </p>
]]></content:encoded>
      <enclosure length="40855000" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af67/d4af6783-0b17-4c9e-985c-2164ddde6aa1/90dac650-7955-41b8-9878-cd72db4e7314/20200707-042840-1a1eda26a77824803bc1c09b31b8c9d4_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking Into Security #17 - Becoming the World&apos;s first CISO, with Steve Katz</itunes:title>
      <itunes:author>Ricki Burke</itunes:author>
      <itunes:duration>00:42:33</itunes:duration>
      <itunes:summary>In this episode, we catch up with Steve Katz, the World&apos;s first CISO. Steve became the CISO of Citigroup in 1995. We discuss Steve&apos;s journey leading up to the role, how it came about and with no blueprint to follow, what he did in the job. We also discuss Steve&apos;s approach to how he dealt with boards and there is plenty of advice for current and future CISOs.</itunes:summary>
      <itunes:subtitle>In this episode, we catch up with Steve Katz, the World&apos;s first CISO. Steve became the CISO of Citigroup in 1995. We discuss Steve&apos;s journey leading up to the role, how it came about and with no blueprint to follow, what he did in the job. We also discuss Steve&apos;s approach to how he dealt with boards and there is plenty of advice for current and future CISOs.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>17</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c6f6f698-c2d7-b189-8b05-20c18fd08e21</guid>
      <title>Hacking Into Security #16 - The job of a CISO and more, with Craig Templeton</title>
      <description><![CDATA[<p>In this episode, we catch up with Craig Templeton, CISO & GM Technology Platforms at REA Group.</p><p>Craig is very open about the role of a CISO and what his job looks like. He shares advice to people wanting to progress in their career and the experiences that helped him get to where he is today.</p>
]]></description>
      <pubDate>Fri, 17 Jul 2020 14:00:00 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Ricki Burke)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <content:encoded><![CDATA[<p>In this episode, we catch up with Craig Templeton, CISO & GM Technology Platforms at REA Group.</p><p>Craig is very open about the role of a CISO and what his job looks like. He shares advice to people wanting to progress in their career and the experiences that helped him get to where he is today.</p>
]]></content:encoded>
      <enclosure length="38483499" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af67/d4af6783-0b17-4c9e-985c-2164ddde6aa1/fcecdf91-89a3-4168-a4ae-f0df4526f0a8/20200707-042709-2688e3782b9f689dde51ac317d00e4de_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking Into Security #16 - The job of a CISO and more, with Craig Templeton</itunes:title>
      <itunes:author>Ricki Burke</itunes:author>
      <itunes:duration>00:40:05</itunes:duration>
      <itunes:summary>In this episode, we catch up with Craig Templeton, CISO &amp; GM Technology Platforms at REA Group.Craig is very open about the role of a CISO and what his job looks like. He shares advice to people wanting to progress in their career and the experiences that helped him get to where he is today.</itunes:summary>
      <itunes:subtitle>In this episode, we catch up with Craig Templeton, CISO &amp; GM Technology Platforms at REA Group.Craig is very open about the role of a CISO and what his job looks like. He shares advice to people wanting to progress in their career and the experiences that helped him get to where he is today.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>16</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">40ade328-662d-0e9f-5ef2-70c7bf4ccc8e</guid>
      <title>Hacking Into Security #15 - The story of BSides with Jack Daniel</title>
      <description><![CDATA[<p>In this episode, we catch up with one of the original co-founders and organisers of BSides.</p><p>Jack talks about the origins and growth of BSides, what makes a BSides conference so unique and what it takes to run a conference.</p><p>We also hear Jack's thoughts on the current state of conferences during a global pandemic and what the future looks like for BSides. </p>
]]></description>
      <pubDate>Sat, 11 Jul 2020 14:00:00 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Ricki Burke)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <content:encoded><![CDATA[<p>In this episode, we catch up with one of the original co-founders and organisers of BSides.</p><p>Jack talks about the origins and growth of BSides, what makes a BSides conference so unique and what it takes to run a conference.</p><p>We also hear Jack's thoughts on the current state of conferences during a global pandemic and what the future looks like for BSides. </p>
]]></content:encoded>
      <enclosure length="36449292" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af67/d4af6783-0b17-4c9e-985c-2164ddde6aa1/c3b8226c-f8de-4501-a0d5-db60c8b61f34/20200623-040329-a242563442946605e674ed7d3a8090f5_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking Into Security #15 - The story of BSides with Jack Daniel</itunes:title>
      <itunes:author>Ricki Burke</itunes:author>
      <itunes:duration>00:37:58</itunes:duration>
      <itunes:summary>In this episode, we catch up with one of the original co-founders and organisers of BSides.Jack talks about the origins and growth of BSides, what makes a BSides conference so unique and what it takes to run a conference.We also hear Jack&apos;s thoughts on the current state of conferences during a global pandemic and what the future looks like for BSides.</itunes:summary>
      <itunes:subtitle>In this episode, we catch up with one of the original co-founders and organisers of BSides.Jack talks about the origins and growth of BSides, what makes a BSides conference so unique and what it takes to run a conference.We also hear Jack&apos;s thoughts on the current state of conferences during a global pandemic and what the future looks like for BSides.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>15</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">63d63dda-9929-99b1-8e45-5192ea3df6bc</guid>
      <title>Hacking Into Security #14 - Aesthetician to Senior Security Engineer at Netflix, with Wendy Zenone</title>
      <description><![CDATA[<p>Wendy Zenone quit her job as an aesthetician at 38, learnt to code and has progressed to working at her dream company, Netflix.</p><p>We have a fun chat discussing Wendy's journey from a very non IT role, learning to code, being a mom, landing her first job in security to where she is today.</p><p>Wendy shares her experience, tips for others wanting to move into the industry as well as advice on interviewing and the value of perseverance.</p>
]]></description>
      <pubDate>Sat, 4 Jul 2020 14:00:00 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Ricki Burke)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <content:encoded><![CDATA[<p>Wendy Zenone quit her job as an aesthetician at 38, learnt to code and has progressed to working at her dream company, Netflix.</p><p>We have a fun chat discussing Wendy's journey from a very non IT role, learning to code, being a mom, landing her first job in security to where she is today.</p><p>Wendy shares her experience, tips for others wanting to move into the industry as well as advice on interviewing and the value of perseverance.</p>
]]></content:encoded>
      <enclosure length="35872090" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af67/d4af6783-0b17-4c9e-985c-2164ddde6aa1/d619dd8f-3ad0-4525-8fb7-451ab4ad4b9d/20200622-034442-7746413c45632f3aea4302c5e27373f7_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking Into Security #14 - Aesthetician to Senior Security Engineer at Netflix, with Wendy Zenone</itunes:title>
      <itunes:author>Ricki Burke</itunes:author>
      <itunes:duration>00:37:22</itunes:duration>
      <itunes:summary>Wendy Zenone quit her job as an aesthetician at 38, learnt to code and has progressed to working at her dream company, Netflix.We have a fun chat discussing Wendy&apos;s journey from a very non IT role, learning to code, being a mom, landing her first job in security to where she is today.Wendy shares her experience, tips for others wanting to move into the industry as well as advice on interviewing and the value of perseverance.</itunes:summary>
      <itunes:subtitle>Wendy Zenone quit her job as an aesthetician at 38, learnt to code and has progressed to working at her dream company, Netflix.We have a fun chat discussing Wendy&apos;s journey from a very non IT role, learning to code, being a mom, landing her first job in security to where she is today.Wendy shares her experience, tips for others wanting to move into the industry as well as advice on interviewing and the value of perseverance.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>14</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4917c447-7ce2-562e-af84-ab9c6422fff9</guid>
      <title>Hacking Into Security #13 - Talking about building tools and graudit with Eldar Marcussen</title>
      <description><![CDATA[<p>In this episode, we catch up with Security Researcher, pentester, trainer and Principal Security Engineer Eldar Marcussen.</p><p>Eldar built the source code auditing tool graudit (grep rough audit). We discuss what it's like to build a tool and some of the unknowing benefits it's led to in his career.</p><p>Eldar also shares advice for any aspiring pentesters.</p>
]]></description>
      <pubDate>Sat, 27 Jun 2020 14:00:00 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Ricki Burke)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <content:encoded><![CDATA[<p>In this episode, we catch up with Security Researcher, pentester, trainer and Principal Security Engineer Eldar Marcussen.</p><p>Eldar built the source code auditing tool graudit (grep rough audit). We discuss what it's like to build a tool and some of the unknowing benefits it's led to in his career.</p><p>Eldar also shares advice for any aspiring pentesters.</p>
]]></content:encoded>
      <enclosure length="31414556" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af67/d4af6783-0b17-4c9e-985c-2164ddde6aa1/6dc2e1d3-e1d7-49d5-b8f5-d81b53796ada/20200618-051947-584bc6adc4d16d5c641d045f33004e97_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking Into Security #13 - Talking about building tools and graudit with Eldar Marcussen</itunes:title>
      <itunes:author>Ricki Burke</itunes:author>
      <itunes:duration>00:32:43</itunes:duration>
      <itunes:summary>In this episode, we catch up with Security Researcher, pentester, trainer and Principal Security Engineer Eldar Marcussen.Eldar built the source code auditing tool graudit (grep rough audit). We discuss what it&apos;s like to build a tool and some of the unknowing benefits it&apos;s led to in his career.Eldar also shares advice for any aspiring pentesters.</itunes:summary>
      <itunes:subtitle>In this episode, we catch up with Security Researcher, pentester, trainer and Principal Security Engineer Eldar Marcussen.Eldar built the source code auditing tool graudit (grep rough audit). We discuss what it&apos;s like to build a tool and some of the unknowing benefits it&apos;s led to in his career.Eldar also shares advice for any aspiring pentesters.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>13</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c7ae0d99-dbed-d143-99a9-fb35bea3018c</guid>
      <title>Hacking Into Security #12 - Customer Support Agent to Security Manager at Mailchimp withBobby Stoskopf</title>
      <description><![CDATA[<p>Bobby Stoskopf is a Security Manager at Mailchimp, a company where he started as a Customer Support Agent. </p><p>We discuss Bobby's journey and how he became the company's first security employee and help build a security team. </p><p>Bobby also shares tips from a hiring manager's perspective.</p>
]]></description>
      <pubDate>Sat, 20 Jun 2020 14:00:00 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Ricki Burke)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <content:encoded><![CDATA[<p>Bobby Stoskopf is a Security Manager at Mailchimp, a company where he started as a Customer Support Agent. </p><p>We discuss Bobby's journey and how he became the company's first security employee and help build a security team. </p><p>Bobby also shares tips from a hiring manager's perspective.</p>
]]></content:encoded>
      <enclosure length="24976730" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af67/d4af6783-0b17-4c9e-985c-2164ddde6aa1/91d6b30e-c90c-4b82-983b-281b6ed3af63/20200618-050347-30cc085f3d7fd1061f2d90bc2bc7f86f_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking Into Security #12 - Customer Support Agent to Security Manager at Mailchimp withBobby Stoskopf</itunes:title>
      <itunes:author>Ricki Burke</itunes:author>
      <itunes:duration>00:26:01</itunes:duration>
      <itunes:summary>Bobby Stoskopf is a Security Manager at Mailchimp, a company where he started as a Customer Support Agent. We discuss Bobby&apos;s journey and how he became the company&apos;s first security employee and help build a security team. Bobby also shares tips from a hiring manager&apos;s perspective.</itunes:summary>
      <itunes:subtitle>Bobby Stoskopf is a Security Manager at Mailchimp, a company where he started as a Customer Support Agent. We discuss Bobby&apos;s journey and how he became the company&apos;s first security employee and help build a security team. Bobby also shares tips from a hiring manager&apos;s perspective.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>12</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7f6876b4-d50d-8f82-78f1-611b2957d13c</guid>
      <title>Hacking Into Security #11 - Cook to Threat Detection Engineer</title>
      <description><![CDATA[<p>In this episode, we catch up with Zachary Mikus a Threat Detection Engineer.</p><p>Zach left school at a young age, worked in his family business as a landscape gardener, become a cook and is now working hunting bots. Zach shares his personal story about how he got his break into the industry, working in a SOC for one of Australia's largest banks and what he does in his current role.</p><p>We discussed the skills Zach used working in a SOC and what he uses to hunt bots. Zach is passionate about supporting others and advises on what others can do to help in their career.</p>
]]></description>
      <pubDate>Sun, 14 Jun 2020 02:00:00 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Ricki Burke)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <content:encoded><![CDATA[<p>In this episode, we catch up with Zachary Mikus a Threat Detection Engineer.</p><p>Zach left school at a young age, worked in his family business as a landscape gardener, become a cook and is now working hunting bots. Zach shares his personal story about how he got his break into the industry, working in a SOC for one of Australia's largest banks and what he does in his current role.</p><p>We discussed the skills Zach used working in a SOC and what he uses to hunt bots. Zach is passionate about supporting others and advises on what others can do to help in their career.</p>
]]></content:encoded>
      <enclosure length="27087842" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af67/d4af6783-0b17-4c9e-985c-2164ddde6aa1/324a65b9-98c4-4196-add4-9a8dee84b1ab/20200601-224515-0a766328887d3d7164fa62009ffb3d5a_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking Into Security #11 - Cook to Threat Detection Engineer</itunes:title>
      <itunes:author>Ricki Burke</itunes:author>
      <itunes:duration>00:28:13</itunes:duration>
      <itunes:summary>In this episode, we catch up with Zachary Mikus a Threat Detection Engineer.Zach left school at a young age, worked in his family business as a landscape gardener, become a cook and is now working hunting bots. Zach shares his personal story about how he got his break into the industry, working in a SOC for one of Australia&apos;s largest banks and what he does in his current role.We discussed the skills Zach used working in a SOC and what he uses to hunt bots. Zach is passionate about supporting others and advises on what others can do to help in their career.</itunes:summary>
      <itunes:subtitle>In this episode, we catch up with Zachary Mikus a Threat Detection Engineer.Zach left school at a young age, worked in his family business as a landscape gardener, become a cook and is now working hunting bots. Zach shares his personal story about how he got his break into the industry, working in a SOC for one of Australia&apos;s largest banks and what he does in his current role.We discussed the skills Zach used working in a SOC and what he uses to hunt bots. Zach is passionate about supporting others and advises on what others can do to help in their career.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>11</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">41c38abd-fa35-9f0e-1598-02bf1b039db9</guid>
      <title>Hacking Into Security #10 - OWASP and Application Security with Prashant Venkatesh</title>
      <description><![CDATA[<p>We catch up with Prashant Venkatesh, a specialist in Application Security and an OWASP Bay Area Chapter Lead.</p><p>With over 10 years of experience in building teams and uplifting environments in Application Security, we discuss what Application Security means to Venkatesh, how he got started in the area, how others can get started and advice for organizations that want to increase their security. </p><p></p>
]]></description>
      <pubDate>Sun, 7 Jun 2020 02:00:00 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Ricki Burke)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <content:encoded><![CDATA[<p>We catch up with Prashant Venkatesh, a specialist in Application Security and an OWASP Bay Area Chapter Lead.</p><p>With over 10 years of experience in building teams and uplifting environments in Application Security, we discuss what Application Security means to Venkatesh, how he got started in the area, how others can get started and advice for organizations that want to increase their security. </p><p></p>
]]></content:encoded>
      <enclosure length="24334327" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af67/d4af6783-0b17-4c9e-985c-2164ddde6aa1/de3e3262-c4f6-4c52-b35a-56f732d3e91c/20200601-223433-d348a3312d996a400d31bd5308c7a509_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking Into Security #10 - OWASP and Application Security with Prashant Venkatesh</itunes:title>
      <itunes:author>Ricki Burke</itunes:author>
      <itunes:duration>00:25:21</itunes:duration>
      <itunes:summary>We catch up with Prashant Venkatesh, a specialist in Application Security and an OWASP Bay Area Chapter Lead.With over 10 years of experience in building teams and uplifting environments in Application Security, we discuss what Application Security means to Venkatesh, how he got started in the area, how others can get started and advice for organizations that want to increase their security.</itunes:summary>
      <itunes:subtitle>We catch up with Prashant Venkatesh, a specialist in Application Security and an OWASP Bay Area Chapter Lead.With over 10 years of experience in building teams and uplifting environments in Application Security, we discuss what Application Security means to Venkatesh, how he got started in the area, how others can get started and advice for organizations that want to increase their security.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">046a9073-cd13-af09-96ae-9e1508131f40</guid>
      <title>Hacking Into Security #9 - Pentester to CISO with Marc Bown</title>
      <description><![CDATA[<p>In this episode, we speak with Afterpay CISO Marc Bown.</p><p>Marc's career started on the technical side as a Penetration Tester and has progressed to become CISO for one of the fastest-growing e-commerce payment companies in the market.</p><p>We discuss the differences between working in the Bay Area and Australia, how he moved in his career and share advice for aspiring CISOs.</p>
]]></description>
      <pubDate>Sat, 30 May 2020 02:00:00 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Ricki Burke)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <content:encoded><![CDATA[<p>In this episode, we speak with Afterpay CISO Marc Bown.</p><p>Marc's career started on the technical side as a Penetration Tester and has progressed to become CISO for one of the fastest-growing e-commerce payment companies in the market.</p><p>We discuss the differences between working in the Bay Area and Australia, how he moved in his career and share advice for aspiring CISOs.</p>
]]></content:encoded>
      <enclosure length="28524368" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af67/d4af6783-0b17-4c9e-985c-2164ddde6aa1/f2c54789-47fc-4079-a96b-2531f36a9f7f/20200601-221426-5c598b9921d88ae5d548de18626c5fa5_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking Into Security #9 - Pentester to CISO with Marc Bown</itunes:title>
      <itunes:author>Ricki Burke</itunes:author>
      <itunes:duration>00:29:43</itunes:duration>
      <itunes:summary>In this episode, we speak with Afterpay CISO Marc Bown.Marc&apos;s career started on the technical side as a Penetration Tester and has progressed to become CISO for one of the fastest-growing e-commerce payment companies in the market.We discuss the differences between working in the Bay Area and Australia, how he moved in his career and share advice for aspiring CISOs.</itunes:summary>
      <itunes:subtitle>In this episode, we speak with Afterpay CISO Marc Bown.Marc&apos;s career started on the technical side as a Penetration Tester and has progressed to become CISO for one of the fastest-growing e-commerce payment companies in the market.We discuss the differences between working in the Bay Area and Australia, how he moved in his career and share advice for aspiring CISOs.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>9</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cc8abd70-0ca1-8df5-73f3-7a972e60bf67</guid>
      <title>Hacking Into Security #8 - Social Engineering with Maxie Reynolds</title>
      <description><![CDATA[<p>In this episode, we catch up with Maxie Reynolds, a specialist in Social Engineering. </p><p>Maxie left Scotland at a relatively young age and has gone on to work around the world. She worked offshore on oil rigs, become a penetration tester at a big four consulting company, started her own business and is now working as a Social Engineering Consultant. </p><p>We get to hear what about the type of engagements Maxie has worked on, the skills involved and advice for others wanting to learn about social engineering. </p>
]]></description>
      <pubDate>Sun, 24 May 2020 20:00:00 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Ricki Burke)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <content:encoded><![CDATA[<p>In this episode, we catch up with Maxie Reynolds, a specialist in Social Engineering. </p><p>Maxie left Scotland at a relatively young age and has gone on to work around the world. She worked offshore on oil rigs, become a penetration tester at a big four consulting company, started her own business and is now working as a Social Engineering Consultant. </p><p>We get to hear what about the type of engagements Maxie has worked on, the skills involved and advice for others wanting to learn about social engineering. </p>
]]></content:encoded>
      <enclosure length="40509766" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af67/d4af6783-0b17-4c9e-985c-2164ddde6aa1/07bffb8c-d2a5-4eba-9ae2-6525b579668d/20200520-035434-5a9d27812d6adbde455acb04147e9afa_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking Into Security #8 - Social Engineering with Maxie Reynolds</itunes:title>
      <itunes:author>Ricki Burke</itunes:author>
      <itunes:duration>00:42:12</itunes:duration>
      <itunes:summary>In this episode, we catch up with Maxie Reynolds, a specialist in Social Engineering. Maxie left Scotland at a relatively young age and has gone on to work around the world. She worked offshore on oil rigs, become a penetration tester at a big four consulting company, started her own business and is now working as a Social Engineering Consultant. We get to hear what about the type of engagements Maxie has worked on, the skills involved and advice for others wanting to learn about social engineering.</itunes:summary>
      <itunes:subtitle>In this episode, we catch up with Maxie Reynolds, a specialist in Social Engineering. Maxie left Scotland at a relatively young age and has gone on to work around the world. She worked offshore on oil rigs, become a penetration tester at a big four consulting company, started her own business and is now working as a Social Engineering Consultant. We get to hear what about the type of engagements Maxie has worked on, the skills involved and advice for others wanting to learn about social engineering.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>8</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9273107b-28a5-e1e0-af71-a8d601ee5fe2</guid>
      <title>Hacking Into Security #7 - System and Network Engineer to CISO -  Abbas Kudrati, Chief Cybersecurity Officer at Microsoft</title>
      <description><![CDATA[<p>In this episode, we catch up with Abbas Kudrati. Abbas has an impressive career which has seen him work around the world and is now operating as a Chief Cybersecurity Officer at Microsoft. </p><p>Abbas started off his career in a technical role and then progressed to working as a CISO for various organisations. He is incredibly generous with his time and gives back to the community in many ways, including as a part-time Lecturer for "Masters in Cyber Security" program at La Trobe University. </p><p>In our conversation, Abbas gives practical advice for others working in technical roles that aspire to work in a CISO position. </p>
]]></description>
      <pubDate>Tue, 19 May 2020 04:11:10 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Ricki Burke)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <content:encoded><![CDATA[<p>In this episode, we catch up with Abbas Kudrati. Abbas has an impressive career which has seen him work around the world and is now operating as a Chief Cybersecurity Officer at Microsoft. </p><p>Abbas started off his career in a technical role and then progressed to working as a CISO for various organisations. He is incredibly generous with his time and gives back to the community in many ways, including as a part-time Lecturer for "Masters in Cyber Security" program at La Trobe University. </p><p>In our conversation, Abbas gives practical advice for others working in technical roles that aspire to work in a CISO position. </p>
]]></content:encoded>
      <enclosure length="24942876" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af67/d4af6783-0b17-4c9e-985c-2164ddde6aa1/02672c8d-3bf3-4518-bc42-db42dd16018b/20200519-041112-45347f036712edc8ce56834af8cb72ab_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking Into Security #7 - System and Network Engineer to CISO -  Abbas Kudrati, Chief Cybersecurity Officer at Microsoft</itunes:title>
      <itunes:author>Ricki Burke</itunes:author>
      <itunes:duration>00:25:59</itunes:duration>
      <itunes:summary>In this episode, we catch up with Abbas Kudrati. Abbas has an impressive career which has seen him work around the world and is now operating as a Chief Cybersecurity Officer at Microsoft. Abbas started off his career in a technical role and then progressed to working as a CISO for various organisations. He is incredibly generous with his time and gives back to the community in many ways, including as a part-time Lecturer for &quot;Masters in Cyber Security&quot; program at La Trobe University. In our conversation, Abbas gives practical advice for others working in technical roles that aspire to work in a CISO position.</itunes:summary>
      <itunes:subtitle>In this episode, we catch up with Abbas Kudrati. Abbas has an impressive career which has seen him work around the world and is now operating as a Chief Cybersecurity Officer at Microsoft. Abbas started off his career in a technical role and then progressed to working as a CISO for various organisations. He is incredibly generous with his time and gives back to the community in many ways, including as a part-time Lecturer for &quot;Masters in Cyber Security&quot; program at La Trobe University. In our conversation, Abbas gives practical advice for others working in technical roles that aspire to work in a CISO position.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">134d29ee-8512-fcbf-1e9c-2ff6b8c0e4c8</guid>
      <title>Hacking Into Security #6 - Entrepreneurship in cybersecurity - Casey Ellis from Bugcrowd</title>
      <description><![CDATA[<p>We catch up with Casey Ellis, founder of the number one crowdsourced security platform, Bugcrowd. </p><p>Through our conversation, we go through the journey of starting a business, moving countries, multimillion-dollar raises and more. </p><p>Casey also shares his advice to future founders. </p>
]]></description>
      <pubDate>Fri, 8 May 2020 01:45:30 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Ricki Burke)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <content:encoded><![CDATA[<p>We catch up with Casey Ellis, founder of the number one crowdsourced security platform, Bugcrowd. </p><p>Through our conversation, we go through the journey of starting a business, moving countries, multimillion-dollar raises and more. </p><p>Casey also shares his advice to future founders. </p>
]]></content:encoded>
      <enclosure length="46548440" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af67/d4af6783-0b17-4c9e-985c-2164ddde6aa1/3918ca7c-37e0-41b3-a760-ff96e7b6d32d/20200508-014531-0944e993de495e8f4e7d912ddf925f8f_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking Into Security #6 - Entrepreneurship in cybersecurity - Casey Ellis from Bugcrowd</itunes:title>
      <itunes:author>Ricki Burke</itunes:author>
      <itunes:duration>00:48:29</itunes:duration>
      <itunes:summary>We catch up with Casey Ellis, founder of the number one crowdsourced security platform, Bugcrowd. Through our conversation, we go through the journey of starting a business, moving countries, multimillion-dollar raises and more. Casey also shares his advice to future founders.</itunes:summary>
      <itunes:subtitle>We catch up with Casey Ellis, founder of the number one crowdsourced security platform, Bugcrowd. Through our conversation, we go through the journey of starting a business, moving countries, multimillion-dollar raises and more. Casey also shares his advice to future founders.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f86d91cf-1f7a-0040-1f51-4faee3f373ce</guid>
      <title>Hacking Into Security #4 - Recruitment Consultant to General Manager of a Penetration testing company - Ian White, ZX Security</title>
      <description><![CDATA[<p><strong>Ian shares the insight of someone that has transitioned from working a Recruitment Consultant to General Manager of XZ Security, one of New Zealand’s leading penetration testing companies.</strong></p><p>He talks about his journey into security, discusses the skills required for a non-technical person working in a security company and what his company look for when hiring.</p>
]]></description>
      <pubDate>Mon, 4 May 2020 20:00:00 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Ricki Burke)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <content:encoded><![CDATA[<p><strong>Ian shares the insight of someone that has transitioned from working a Recruitment Consultant to General Manager of XZ Security, one of New Zealand’s leading penetration testing companies.</strong></p><p>He talks about his journey into security, discusses the skills required for a non-technical person working in a security company and what his company look for when hiring.</p>
]]></content:encoded>
      <enclosure length="35229269" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af67/d4af6783-0b17-4c9e-985c-2164ddde6aa1/c98de4cc-ae0c-4943-919a-ae58cd729849/20200426-230247-4ede8354d3f6289161e8da2da9ef4d6c_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking Into Security #4 - Recruitment Consultant to General Manager of a Penetration testing company - Ian White, ZX Security</itunes:title>
      <itunes:author>Ricki Burke</itunes:author>
      <itunes:duration>00:36:42</itunes:duration>
      <itunes:summary>Ian shares the insight of someone that has transitioned from working a Recruitment Consultant to General Manager of XZ Security, one of New Zealand’s leading penetration testing companies.He talks about his journey into security, discusses the skills required for a non-technical person working in a security company and what his company look for when hiring.</itunes:summary>
      <itunes:subtitle>Ian shares the insight of someone that has transitioned from working a Recruitment Consultant to General Manager of XZ Security, one of New Zealand’s leading penetration testing companies.He talks about his journey into security, discusses the skills required for a non-technical person working in a security company and what his company look for when hiring.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e5e72f94-35ee-490b-394c-c51534de4f08</guid>
      <title>Hacking Into Security #5 - The view from Talent Acquisition - Francisco “Disco” Morales from Canva</title>
      <description><![CDATA[<p>This episode is with Francisco “Disco” Morales who works in Talent Acquisition at Canva. Disco has helped Canva hire over 100 people and prior to this had a background in agency recruitment. He shares the views of someone working in a team that receive over 50,000 jobs applications a year.</p><p>Disco recommends some tips that can help someone standout ad improve their chances when applying for a role.</p>
]]></description>
      <pubDate>Sun, 3 May 2020 19:00:00 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Ricki Burke)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <content:encoded><![CDATA[<p>This episode is with Francisco “Disco” Morales who works in Talent Acquisition at Canva. Disco has helped Canva hire over 100 people and prior to this had a background in agency recruitment. He shares the views of someone working in a team that receive over 50,000 jobs applications a year.</p><p>Disco recommends some tips that can help someone standout ad improve their chances when applying for a role.</p>
]]></content:encoded>
      <enclosure length="24599731" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af67/d4af6783-0b17-4c9e-985c-2164ddde6aa1/826b6a36-4713-4fcc-8e7a-6f980d75df83/20200426-232944-bdca8b251e97dd41030c0c3ccc7b29a2_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking Into Security #5 - The view from Talent Acquisition - Francisco “Disco” Morales from Canva</itunes:title>
      <itunes:author>Ricki Burke</itunes:author>
      <itunes:duration>00:25:37</itunes:duration>
      <itunes:summary>This episode is with Francisco “Disco” Morales who works in Talent Acquisition at Canva. Disco has helped Canva hire over 100 people and prior to this had a background in agency recruitment. He shares the views of someone working in a team that receive over 50,000 jobs applications a year.Disco recommends some tips that can help someone standout ad improve their chances when applying for a role.</itunes:summary>
      <itunes:subtitle>This episode is with Francisco “Disco” Morales who works in Talent Acquisition at Canva. Disco has helped Canva hire over 100 people and prior to this had a background in agency recruitment. He shares the views of someone working in a team that receive over 50,000 jobs applications a year.Disco recommends some tips that can help someone standout ad improve their chances when applying for a role.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">65cb6a47-69d8-cdd2-2124-f90e30c2636f</guid>
      <title>Hacking Into Security #2 - With Cairo Malet</title>
      <description><![CDATA[<p>This episode is with Cairo Malet.</p><p>Cairo is a Cyber Risk Advisor working in Cyber Security Risk and Advisory for a major mining company. That isn't where her career started and we get to hear Cairo's journey from barista to working in an organisation that could have her performing security assessments on mining sites and ships.</p>
]]></description>
      <pubDate>Thu, 23 Apr 2020 04:02:35 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Ricki Burke)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <content:encoded><![CDATA[<p>This episode is with Cairo Malet.</p><p>Cairo is a Cyber Risk Advisor working in Cyber Security Risk and Advisory for a major mining company. That isn't where her career started and we get to hear Cairo's journey from barista to working in an organisation that could have her performing security assessments on mining sites and ships.</p>
]]></content:encoded>
      <enclosure length="17060584" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af67/d4af6783-0b17-4c9e-985c-2164ddde6aa1/4512194d-9cf3-46d0-ac75-fc89d5893d48/20200423-234809-2780809961dc73bcc28d8188be07de34_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking Into Security #2 - With Cairo Malet</itunes:title>
      <itunes:author>Ricki Burke</itunes:author>
      <itunes:duration>00:17:46</itunes:duration>
      <itunes:summary>This episode is with Cairo Malet.Cairo is a Cyber Risk Advisor working in Cyber Security Risk and Advisory for a major mining company. That isn&apos;t where her career started and we get to hear Cairo&apos;s journey from barista to working in an organisation that could have her performing security assessments on mining sites and ships.</itunes:summary>
      <itunes:subtitle>This episode is with Cairo Malet.Cairo is a Cyber Risk Advisor working in Cyber Security Risk and Advisory for a major mining company. That isn&apos;t where her career started and we get to hear Cairo&apos;s journey from barista to working in an organisation that could have her performing security assessments on mining sites and ships.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">dc066f98-1e7c-a7be-4ee7-906daac8643e</guid>
      <title>Hacking Into Security #3 - Starting a business - With Louis Nyffenegger (CVE connoisseur @PentesterLab)</title>
      <description><![CDATA[<p>This episode is with Louis Nyffenegger, founder of PentesterLab, one the best training grounds for newbies and experienced professionals to enhance their web application security skills.</p><p>Louis shares his story of how he got into security and then what it took for him to convert a passion into a business whilst working as a Security Engineer at Fitbit.</p>
]]></description>
      <pubDate>Mon, 20 Apr 2020 04:46:17 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Ricki Burke)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <content:encoded><![CDATA[<p>This episode is with Louis Nyffenegger, founder of PentesterLab, one the best training grounds for newbies and experienced professionals to enhance their web application security skills.</p><p>Louis shares his story of how he got into security and then what it took for him to convert a passion into a business whilst working as a Security Engineer at Fitbit.</p>
]]></content:encoded>
      <enclosure length="29615659" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af67/d4af6783-0b17-4c9e-985c-2164ddde6aa1/b244dc97-76fe-4bfb-b690-7feb29f85a3e/20200422-001529-8aa4b84a1fccc116dd7716438eddf2d8_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking Into Security #3 - Starting a business - With Louis Nyffenegger (CVE connoisseur @PentesterLab)</itunes:title>
      <itunes:author>Ricki Burke</itunes:author>
      <itunes:duration>00:30:51</itunes:duration>
      <itunes:summary>This episode is with Louis Nyffenegger, founder of PentesterLab, one the best training grounds for newbies and experienced professionals to enhance their web application security skills.Louis shares his story of how he got into security and then what it took for him to convert a passion into a business whilst working as a Security Engineer at Fitbit.</itunes:summary>
      <itunes:subtitle>This episode is with Louis Nyffenegger, founder of PentesterLab, one the best training grounds for newbies and experienced professionals to enhance their web application security skills.Louis shares his story of how he got into security and then what it took for him to convert a passion into a business whilst working as a Security Engineer at Fitbit.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b683515e-95d1-f265-fe26-abb458ca4e5f</guid>
      <title>Hacking Into Security #1 - With Chris Rock</title>
      <description><![CDATA[<p>This episode is with Chris Rock.</p><p>Chris has been active in the security industry for over the last 25+ years. Chris presented I will Kill you at Defcon 23 and How to Overthrow a Government at Defcon 24. Chris ran a security penetration testing company for 10 years.</p><p>Chris Rock is now CISO and co-founder of SIEMonster. SIEMonster was started in 2015 by a team of hackers.</p><p></p><p>After years working in penetration testing, they realized that there was a gap in the SIEM market for an affordable scalable open-source alternative to existing solutions.</p><p></p><p>Chris talks about his journey from an 11-year-old hacker to working in banks, pentesting around the world and starting his own company which is now global.</p>
]]></description>
      <pubDate>Thu, 16 Apr 2020 04:00:20 +0000</pubDate>
      <author>Ricki@cybersecpeople.com (Ricki Burke)</author>
      <link>https://rss.com/podcasts/hackingintosecurity/</link>
      <content:encoded><![CDATA[<p>This episode is with Chris Rock.</p><p>Chris has been active in the security industry for over the last 25+ years. Chris presented I will Kill you at Defcon 23 and How to Overthrow a Government at Defcon 24. Chris ran a security penetration testing company for 10 years.</p><p>Chris Rock is now CISO and co-founder of SIEMonster. SIEMonster was started in 2015 by a team of hackers.</p><p></p><p>After years working in penetration testing, they realized that there was a gap in the SIEM market for an affordable scalable open-source alternative to existing solutions.</p><p></p><p>Chris talks about his journey from an 11-year-old hacker to working in banks, pentesting around the world and starting his own company which is now global.</p>
]]></content:encoded>
      <enclosure length="30887678" type="audio/mpeg" url="https://cdn.simplecast.com/audio/d4af67/d4af6783-0b17-4c9e-985c-2164ddde6aa1/34722b6f-d48c-4183-8fd2-e94abfa980ca/20200416-234834-703d7a3636f4a2bed0bcb1eb86ee0f87_tc.mp3?aid=rss_feed&amp;feed=Vtbd7xWj"/>
      <itunes:title>Hacking Into Security #1 - With Chris Rock</itunes:title>
      <itunes:author>Ricki Burke</itunes:author>
      <itunes:duration>00:32:07</itunes:duration>
      <itunes:summary>This episode is with Chris Rock.Chris has been active in the security industry for over the last 25+ years. Chris presented I will Kill you at Defcon 23 and How to Overthrow a Government at Defcon 24. Chris ran a security penetration testing company for 10 years.Chris Rock is now CISO and co-founder of SIEMonster. SIEMonster was started in 2015 by a team of hackers.After years working in penetration testing, they realized that there was a gap in the SIEM market for an affordable scalable open-source alternative to existing solutions.Chris talks about his journey from an 11-year-old hacker to working in banks, pentesting around the world and starting his own company which is now global.</itunes:summary>
      <itunes:subtitle>This episode is with Chris Rock.Chris has been active in the security industry for over the last 25+ years. Chris presented I will Kill you at Defcon 23 and How to Overthrow a Government at Defcon 24. Chris ran a security penetration testing company for 10 years.Chris Rock is now CISO and co-founder of SIEMonster. SIEMonster was started in 2015 by a team of hackers.After years working in penetration testing, they realized that there was a gap in the SIEM market for an affordable scalable open-source alternative to existing solutions.Chris talks about his journey from an 11-year-old hacker to working in banks, pentesting around the world and starting his own company which is now global.</itunes:subtitle>
      <itunes:explicit>yes</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
    </item>
  </channel>
</rss>