11. Behind the scenes with a Digital Detective
Girls Talk Cyber
by girlstalkcyber
3w ago
Who do you call when you are going through a cyber attack? The answer is someone like Claudia, a Digital Forensics and Incident Response investigator. In this episode Claudia takes us through a day in her life as an investigator, how she got into the industry and answers the arguably more important question, what is the funniest google search you’ve seen during an investigation.  Follow Claudia on LinkedIn here: https://www.linkedin.com/in/claudia-squire-a35505126/ If you’re lucky you may get to catch her speaking at a conferences on the topic of Electron apps unplugged: Unveiling Digital ..read more
Visit website
10. Vacay Mode Activated: Cyber on the go
Girls Talk Cyber
by girlstalkcyber
1M ago
In this episode we give you some tips and tricks to stay cyber secure when you’re on the go, so you can say bon voyage to cyber criminals ruining your holiday.    Connecting to public WiFi? Posting a boarding pass on your socials? Working on the train? Hold that thought, because we’ve got some wild stories to share that will help you understand the potential risks associated with these seemingly harmless actions.   Article Mentioned:  https://mango.pdf.zone/finding-former-australian-prime-minister-tony-abbotts-passport-number-on-instagram _________________ Support the Girls ..read more
Visit website
09. What happens in Vegas, doesn't always stay in Vegas
Girls Talk Cyber
by girlstalkcyber
2M ago
One of the largest casino chains in Las Vegas, MGM Grand, became paralysed after they were hit by a ransomware attack in September 2023. The bustling casino floor was unrecognisable as casino slot machines, hotels, restaurants and more were disconnected for allegedly 10 days in one of the biggest cyber attacks of our time. Who was responsible? How did they do it? Did cyber criminals really tell a $33.9 trillion dollar company to “grow a pair” and pay them? Tune in to this episode to find out.  GTC’s new segment, Cyber Scandal, looks to unpack cyber hacks and untangle any tech jargon surro ..read more
Visit website
Hackers can be good guys too
Girls Talk Cyber
by girlstalkcyber
4M ago
Ethical hacking. Two words that can’t possibly go together right?  How can hacking be an ethical activity?    Well in this episode we are joined by cyber security professional and ethical hacker, Vikki Grouios who proves hacking with a conscious is possible. Vikki has dedicated her career to testing systems, breaking into client networks and securing organisations and communities. Vikki has also featured on Season 1 and 2 of the latest hit show Hunted where viewers were able to see her skills in action..    In this episode Vikki shares some of her stories and ..read more
Visit website
Unveiling the cyber heroes who defend our digital world
Girls Talk Cyber
by girlstalkcyber
4M ago
So cyber, does it involve the mysterious bunkers just like the movies? Well, not quite.. But defensive cyber does share some similarities.    In this episode you can expect to hear a breakdown of what defensive cyber actually is and what it looks like in the real world. We shine a light on our unsung, defensive cyber security heroes and professionals and chat about what they can get up to on the daily, as well as bringing it back to what’s relevant for you, and learning some hot tips on how you can boost your own cyber defences.    We jump back to one of our favourite segme ..read more
Visit website
Expert Insights: Chatting with a top cyber security executive
Girls Talk Cyber
by girlstalkcyber
4M ago
Today we are joined by an expert in cyber security, Shireen Syed, the University of Newcastle’s Chief Information Security Officer (CISO). Shireen’s job is to not only help secure students and teachers but so many elements in between including cyber security strategy and incident response. Shireen gives us a rundown of what her day-to-day looks like, what is expected of her in her role as CISO and walks us through her career path leading up to this position. We learn about the unique challenges a university faces when securing their environment - with bespoke gadgets and intellectual property ..read more
Visit website
Piecing together your online footprint with OSINT
Girls Talk Cyber
by girlstalkcyber
4M ago
What information about you resides on the internet today that anyone can access? In this episode we give you the tools to answer that question and walk you through the definition of Open Source Intelligence (OSINT). We look at how it can benefit our lives and how it can also be used in a borderline creepy way. Jules and I also give you some tools to perform OSINT on yourself, and while it may be confronting to see a bunch of information about yourself strewn across the internet, we believe if the bad guys know it exists, you should too. Finally with all this being said and done, we run you thr ..read more
Visit website
Who are the bad guys and how can they get to you?
Girls Talk Cyber
by girlstalkcyber
4M ago
Today we take you through the rumblings of a cyber attack. How does it start and what does it look like? By the end of the episode you’ll be able to identify and avoid cyber threats quicker than you can say GTC. We also take a look at who is behind these cyber attacks. The type of people sitting behind a computer, pulling these attacks off, may surprise you. From phishing to "J-elena" (Justin and Selena) references, this episode has everything you need to understand ransomware headlines and protect yourself from cyber attacks. Let’s redefine how you act online. Support the Girls Talk Cyber pod ..read more
Visit website
Shining a light on the dark web
Girls Talk Cyber
by girlstalkcyber
4M ago
Have you ever heard of the dark web and want to know more? Well you're in luck because in this episode we are joined by a special guest, a cyber intelligence expert from CyberCX, Leah Pinto. Join us as we chat to Leah to decode this space for our GTC Community and answer the questions - what is the dark web, what is it used for, how anonymous can you be when using it, and how onions and the dark web are related. DISCLAIMER Girls Talk Cyber does not encourage or endorse accessing or using the dark web for illegitimate purposes. Without adequate understanding of its capability, risks and vulnera ..read more
Visit website
What to do if you were involved in a data breach
Girls Talk Cyber
by girlstalkcyber
4M ago
We've all seen the headlines recently "Aussie Company Hit With Data Breach" or "Major Firm Left Scrambling After Major Data Leak". It can feel overwhelming knowing what to do next, and you may be asking yourself the question, is there anything I can do to protect myself? The answer is yes, in this episode we are going to help you run through our GTC check list of what to do after a data breach to secure your online footprint. With your details in the hands of criminals, let's redefine how you act online.  Show Resources:  Password Managers We Recommend LastPass (Free and Paid Version ..read more
Visit website

Follow Girls Talk Cyber on FeedSpot

Continue with Google
Continue with Apple
OR