<?xml version="1.0" encoding="UTF-8"?><!-- generator="podbean/5.5" -->
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
     xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"
     xmlns:spotify="http://www.spotify.com/ns/rss"
     xmlns:podcast="https://podcastindex.org/namespace/1.0"
    xmlns:media="http://search.yahoo.com/mrss/">

<channel>
    <title>Girls Talk Cyber</title>
    <atom:link href="https://feed.podbean.com/girlstalkcyber/feed.xml" rel="self" type="application/rss+xml"/>
    <link>https://girlstalkcyber.podbean.com</link>
    <description>Cyber security, no longer a place for tech heads, speaking another language 

Join us at Girls Talk Cyber, the podcast to help you decode this space and redefine  how you act online</description>
    <pubDate>Tue, 07 Apr 2026 18:38:19 +1000</pubDate>
    <generator>https://podbean.com/?v=5.5</generator>
    <language>en</language>
        <copyright>Copyright 2023 All rights reserved.</copyright>
    <category>Education</category>
    <ttl>1440</ttl>
    <itunes:type>episodic</itunes:type>
          <itunes:summary>Hey Cyber Queens! 
On today’s episode we want to introduce ourselves and this little thing we like to call cyber security. We will walk you through what cyber security is and why it’s becoming more and more important in our digital world. We also look at why women have been excluded from the conversation for so long and how with the help of Girls Talk Cyber, this can all change.
We introduce you to a segment called the Fraud Files, which has us reading through real scam stories sent in by you, the listener. We, the hosts, pull out the top cyber learnings and takeaways ready for you to start actioning as soon as you finish this episode!
Let’s redefine how you act online.

Show Resources:
Monitor active scams: https://www.telstra.com.au/cyber-security-and-safety/active-scams Report a cyber incident: https://www.cyber.gov.au/report-and-recover/report
_________________
  
 Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re digging the show, leave us a review and share it with your family and friends!
Socials:
Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks:
https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBG kWYJKa_GPswFOEEbks_YqAT3dMQU
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: https://www.facebook.com/groups/828589538834261/</itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
<itunes:category text="Education" />
    <itunes:owner>
        <itunes:name>girlstalkcyber</itunes:name>
            </itunes:owner>
    	<itunes:block>No</itunes:block>
	<itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://pbcdn1.podbean.com/imglogo/image-logo/16537622/GTC_DP_2000x2000.png" />
    <image>
        <url>https://pbcdn1.podbean.com/imglogo/image-logo/16537622/GTC_DP_2000x2000.png</url>
        <title>Girls Talk Cyber</title>
        <link>https://girlstalkcyber.podbean.com</link>
        <width>144</width>
        <height>144</height>
    </image>
    <item>
        <title>27. What Teens Think About Cyber</title>
        <itunes:title>27. What Teens Think About Cyber</itunes:title>
        <link>https://girlstalkcyber.podbean.com/e/27-what-do-teens-think-about-cyber/</link>
                    <comments>https://girlstalkcyber.podbean.com/e/27-what-do-teens-think-about-cyber/#comments</comments>        <pubDate>Tue, 07 Apr 2026 18:38:19 +1000</pubDate>
        <guid isPermaLink="false">girlstalkcyber.podbean.com/27de8908-e4c7-361f-8d3e-f1badc93ca99</guid>
                                    <description><![CDATA[<p class="p1">After the Women In Cyber Security Summit, we had collected a couple of incredible interviews with high school students. We just couldn’t keep these conversation to ourselves so we’ve collated and shared them here in this bonus ep for you!</p>
<p>For more information about how you can act secure online, visit <a href='https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure'>https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure</a></p>
<p>Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?hl=en'>https://www.instagram.com/girlstalkcyber/?hl=en</a> </p>
<p>Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">After the Women In Cyber Security Summit, we had collected a couple of incredible interviews with high school students. We just couldn’t keep these conversation to ourselves so we’ve collated and shared them here in this bonus ep for you!</p>
<p>For more information about how you can act secure online, visit <a href='https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure'>https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure</a></p>
<p>Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?hl=en'>https://www.instagram.com/girlstalkcyber/?hl=en</a> </p>
<p>Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/w7dzw7qfjw3qujzv/v3.mp3" length="23412794" type="audio/mpeg"/>
        <itunes:summary><![CDATA[After the Women In Cyber Security Summit, we had collected a couple of incredible interviews with high school students. We just couldn’t keep these conversation to ourselves so we’ve collated and shared them here in this bonus ep for you!
For more information about how you can act secure online, visit https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure
Socials:
Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: https://www.instagram.com/girlstalkcyber/?hl=en 
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: https://www.facebook.com/groups/828589538834261/]]></itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>973</itunes:duration>
                <itunes:episode>27</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>26. Women in Cyber Security Summit - LIVE Panel at Parliament House</title>
        <itunes:title>26. Women in Cyber Security Summit - LIVE Panel at Parliament House</itunes:title>
        <link>https://girlstalkcyber.podbean.com/e/26-women-in-cyber-security-summit-live-panel-at-parliament-house/</link>
                    <comments>https://girlstalkcyber.podbean.com/e/26-women-in-cyber-security-summit-live-panel-at-parliament-house/#comments</comments>        <pubDate>Wed, 18 Mar 2026 19:18:15 +1000</pubDate>
        <guid isPermaLink="false">girlstalkcyber.podbean.com/d446e45a-07f9-3f4a-98eb-ea2db09b6639</guid>
                                    <description><![CDATA[<p>Tune in to a live recording from the Women in Cyber Security Summit 2026 at Parliament House in Canberra.</p>
<p>This event was hosted by AISA, Hemisphere East and Infoblox. The event looks to bring together some of the most insightful voices from industry and government to discuss practical initiatives that can expand the workforce and create clearer pathways for women entering the field.</p>
<p>The day was jam packed with panels and awesome guests and this recording is from the last one of the day and wraps up some of the takeaways from the summit - hope you enjoy!</p>
<p>For more information about how you can act secure online, visit <a href='https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure'>https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure</a></p>
<p>Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?hl=en'>https://www.instagram.com/girlstalkcyber/?hl=en</a> </p>
<p>Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
<p> </p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Tune in to a live recording from the Women in Cyber Security Summit 2026 at Parliament House in Canberra.</p>
<p>This event was hosted by AISA, Hemisphere East and Infoblox. The event looks to bring together some of the most insightful voices from industry and government to discuss practical initiatives that can expand the workforce and create clearer pathways for women entering the field.</p>
<p>The day was jam packed with panels and awesome guests and this recording is from the last one of the day and wraps up some of the takeaways from the summit - hope you enjoy!</p>
<p>For more information about how you can act secure online, visit <a href='https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure'>https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure</a></p>
<p>Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?hl=en'>https://www.instagram.com/girlstalkcyber/?hl=en</a> </p>
<p>Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
<p> </p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/4dmmqgcnybhkmman/V20_OF_WOMEIN_IN_CYBER_SEC_SUMMIT_EP7h3yc.mp3" length="70625029" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Tune in to a live recording from the Women in Cyber Security Summit 2026 at Parliament House in Canberra.
This event was hosted by AISA, Hemisphere East and Infoblox. The event looks to bring together some of the most insightful voices from industry and government to discuss practical initiatives that can expand the workforce and create clearer pathways for women entering the field.
The day was jam packed with panels and awesome guests and this recording is from the last one of the day and wraps up some of the takeaways from the summit - hope you enjoy!
For more information about how you can act secure online, visit https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure
Socials:
Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: https://www.instagram.com/girlstalkcyber/?hl=en 
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: https://www.facebook.com/groups/828589538834261/
 
 ]]></itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2940</itunes:duration>
        <itunes:season>4</itunes:season>
        <itunes:episode>26</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>25. Operation SIMCARTEL</title>
        <itunes:title>25. Operation SIMCARTEL</itunes:title>
        <link>https://girlstalkcyber.podbean.com/e/25-operation-simcartel/</link>
                    <comments>https://girlstalkcyber.podbean.com/e/25-operation-simcartel/#comments</comments>        <pubDate>Sun, 15 Feb 2026 19:25:02 +1000</pubDate>
        <guid isPermaLink="false">girlstalkcyber.podbean.com/7e28d496-dc54-3c1d-919c-a7cb7cca3f8c</guid>
                                    <description><![CDATA[<p>You know what a sim card is - but have you heard of a SIM Box? Or a SIM Farm? If not thats totally ok. In this episode we’re going to help you understand what this technology is, and how cyber criminals are using it. But it’s not all doom and gloom, law enforcement agencies around the world are cracking down on these SIM Boxes and we want to take you through some of the top
arrests involving these gnarly gadgets. In fact, that’s how we named todays episode, after an arrest over in Latvia called Operation SIMCartel
We hope you enjoy!</p>
<p>For more information about you can act secure online, visit <a href='https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure'>https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure</a></p>
<p> </p>
<p>Resources </p>
<p>SIMCARTEL Arrest <a href='https://www.europol.europa.eu/media-press/newsroom/news/cybercrime-service-takedown-7-arrested'>https://www.europol.europa.eu/media-press/newsroom/news/cybercrime-service-takedown-7-arrested</a></p>
<p>Australian Arrest</p>
<p><a href='https://ia.acs.org.au/article/2024/six-australians-arrested-in-sim-box-crackdown.html'>https://ia.acs.org.au/article/2024/six-australians-arrested-in-sim-box-crackdown.html</a></p>
<p> </p>
<p>New York Arrest </p>
<p><a href='https://www.secretservice.gov/newsroom/releases/2025/09/us-secret-service-dismantles-imminent-telecommunications-threat-new-york'>https://www.secretservice.gov/newsroom/releases/2025/09/us-secret-service-dismantles-imminent-telecommunications-threat-new-york</a></p>
<p> </p>
<p>SIMBOX Info</p>
<p><a href='https://en.wikipedia.org/wiki/SIM_box#:~:text=The%20SIM%20box%20operator%20can,phone%20manufacturers%20to%20evade%20detection'>https://en.wikipedia.org/wiki/SIM_box#:~:text=The%20SIM%20box%20operator%20can,phone%20manufacturers%20to%20evade%20detection</a>.</p>
<p> </p>
<p>Socials</p>
<p>Instagram <a href='https://www.instagram.com/girlstalkcyber/'>https://www.instagram.com/girlstalkcyber/</a></p>
<p>LinkedIn <a href='https://www.linkedin.com/company/girlstalkcyber'>https://www.linkedin.com/company/girlstalkcyber</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>You know what a sim card is - but have you heard of a SIM Box? Or a SIM Farm? If not thats totally ok. In this episode we’re going to help you understand what this technology is, and how cyber criminals are using it. But it’s not all doom and gloom, law enforcement agencies around the world are cracking down on these SIM Boxes and we want to take you through some of the top<br>
arrests involving these gnarly gadgets. In fact, that’s how we named todays episode, after an arrest over in Latvia called Operation SIMCartel<br>
We hope you enjoy!</p>
<p>For more information about you can act secure online, visit <a href='https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure'>https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure</a></p>
<p> </p>
<p>Resources </p>
<p>SIMCARTEL Arrest <a href='https://www.europol.europa.eu/media-press/newsroom/news/cybercrime-service-takedown-7-arrested'>https://www.europol.europa.eu/media-press/newsroom/news/cybercrime-service-takedown-7-arrested</a></p>
<p>Australian Arrest</p>
<p><a href='https://ia.acs.org.au/article/2024/six-australians-arrested-in-sim-box-crackdown.html'>https://ia.acs.org.au/article/2024/six-australians-arrested-in-sim-box-crackdown.html</a></p>
<p> </p>
<p>New York Arrest </p>
<p><a href='https://www.secretservice.gov/newsroom/releases/2025/09/us-secret-service-dismantles-imminent-telecommunications-threat-new-york'>https://www.secretservice.gov/newsroom/releases/2025/09/us-secret-service-dismantles-imminent-telecommunications-threat-new-york</a></p>
<p> </p>
<p>SIMBOX Info</p>
<p><a href='https://en.wikipedia.org/wiki/SIM_box#:~:text=The%20SIM%20box%20operator%20can,phone%20manufacturers%20to%20evade%20detection'>https://en.wikipedia.org/wiki/SIM_box#:~:text=The%20SIM%20box%20operator%20can,phone%20manufacturers%20to%20evade%20detection</a>.</p>
<p> </p>
<p>Socials</p>
<p>Instagram <a href='https://www.instagram.com/girlstalkcyber/'>https://www.instagram.com/girlstalkcyber/</a></p>
<p>LinkedIn <a href='https://www.linkedin.com/company/girlstalkcyber'>https://www.linkedin.com/company/girlstalkcyber</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/czwejhcbf5i92mh5/Final_Ep897jb.mp3" length="41280152" type="audio/mpeg"/>
        <itunes:summary><![CDATA[You know what a sim card is - but have you heard of a SIM Box? Or a SIM Farm? If not thats totally ok. In this episode we’re going to help you understand what this technology is, and how cyber criminals are using it. But it’s not all doom and gloom, law enforcement agencies around the world are cracking down on these SIM Boxes and we want to take you through some of the toparrests involving these gnarly gadgets. In fact, that’s how we named todays episode, after an arrest over in Latvia called Operation SIMCartelWe hope you enjoy!
For more information about you can act secure online, visit https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure
 
Resources 
SIMCARTEL Arrest https://www.europol.europa.eu/media-press/newsroom/news/cybercrime-service-takedown-7-arrested
Australian Arrest
https://ia.acs.org.au/article/2024/six-australians-arrested-in-sim-box-crackdown.html
 
New York Arrest 
https://www.secretservice.gov/newsroom/releases/2025/09/us-secret-service-dismantles-imminent-telecommunications-threat-new-york
 
SIMBOX Info
https://en.wikipedia.org/wiki/SIM_box#:~:text=The%20SIM%20box%20operator%20can,phone%20manufacturers%20to%20evade%20detection.
 
Socials
Instagram https://www.instagram.com/girlstalkcyber/
LinkedIn https://www.linkedin.com/company/girlstalkcyber]]></itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1714</itunes:duration>
                <itunes:episode>25</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>24. What Happens If Hackers Poison the Water? Interview with Lesley Carhart</title>
        <itunes:title>24. What Happens If Hackers Poison the Water? Interview with Lesley Carhart</itunes:title>
        <link>https://girlstalkcyber.podbean.com/e/24-what-happens-when-hackers-poison-the-water-interview-with-lesley-carhart/</link>
                    <comments>https://girlstalkcyber.podbean.com/e/24-what-happens-when-hackers-poison-the-water-interview-with-lesley-carhart/#comments</comments>        <pubDate>Mon, 12 Jan 2026 05:00:00 +1000</pubDate>
        <guid isPermaLink="false">girlstalkcyber.podbean.com/2d89c8da-ddfc-3aec-8e4f-a234f02671c7</guid>
                                    <description><![CDATA[<p>We’ve seen the latest AFR headlines: “Spy chief warns hackers could cut power, poison water, crash banks.” But who do you call when those headlines become real life? </p>
<p>In this episode, we’re joined by Lesley Carhart, Technical Director of Industrial Incident Response at Dragos. Lesley is one of a few people in the world who has the skillset to walk in and help provide digital forensic analysis when critical infrastructure (think power, water, and industrial systems) gets hacked. In this episode we unpack what “operational technology” really means and walk through some real-world impacts of what happens when it’s attacked. We also talk about what actually helps prevent these incidents, and what everyday people can do (yes, even outside of cyber) to reduce the risk.</p>
<p>It’s a big, fascinating, slightly terrifying episode, and we’re incredibly grateful to have Lesley join us to pull back the curtain on the incidents you never want to experience, but should understand. </p>
<p>For more information about you can act secure online, visit <a href='https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure'>https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure</a></p>
<p>Resources mentioned: </p>
<p>Lesley on LinkedIn: https://www.linkedin.com/in/lcarhart/?originalSubdomain=au</p>
<p>Lesleys blog and cyber security conference: <a href='https://tisiphone.net/author/hacks4pancakes/'>https://tisiphone.net/author/hacks4pancakes/</a></p>
<p>GTC on Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?hl=en'>https://www.instagram.com/girlstalkcyber/?hl=en</a> </p>
<p>Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>We’ve seen the latest AFR headlines: <em>“Spy chief warns hackers could cut power, poison water, crash banks.” </em>But who do you call when those headlines become real life? </p>
<p>In this episode, we’re joined by Lesley Carhart, Technical Director of Industrial Incident Response at Dragos. Lesley is one of a few people in the world who has the skillset to walk in and help provide digital forensic analysis when critical infrastructure (think power, water, and industrial systems) gets hacked. In this episode we unpack what “operational technology” really means and walk through some real-world impacts of what happens when it’s attacked. We also talk about what actually helps prevent these incidents, and what everyday people can do (yes, even outside of cyber) to reduce the risk.</p>
<p>It’s a big, fascinating, slightly terrifying episode, and we’re incredibly grateful to have Lesley join us to pull back the curtain on the incidents you never want to experience, but should understand. </p>
<p>For more information about you can act secure online, visit <a href='https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure'>https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure</a></p>
<p>Resources mentioned: </p>
<p>Lesley on LinkedIn: https://www.linkedin.com/in/lcarhart/?originalSubdomain=au</p>
<p>Lesleys blog and cyber security conference: <a href='https://tisiphone.net/author/hacks4pancakes/'>https://tisiphone.net/author/hacks4pancakes/</a></p>
<p>GTC on Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?hl=en'>https://www.instagram.com/girlstalkcyber/?hl=en</a> </p>
<p>Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/5crekhnfnfai2def/v20_Critical_Infra_Ep_80h7m.mp3" length="61031653" type="audio/mpeg"/>
        <itunes:summary><![CDATA[We’ve seen the latest AFR headlines: “Spy chief warns hackers could cut power, poison water, crash banks.” But who do you call when those headlines become real life? 
In this episode, we’re joined by Lesley Carhart, Technical Director of Industrial Incident Response at Dragos. Lesley is one of a few people in the world who has the skillset to walk in and help provide digital forensic analysis when critical infrastructure (think power, water, and industrial systems) gets hacked. In this episode we unpack what “operational technology” really means and walk through some real-world impacts of what happens when it’s attacked. We also talk about what actually helps prevent these incidents, and what everyday people can do (yes, even outside of cyber) to reduce the risk.
It’s a big, fascinating, slightly terrifying episode, and we’re incredibly grateful to have Lesley join us to pull back the curtain on the incidents you never want to experience, but should understand. 
For more information about you can act secure online, visit https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure
Resources mentioned: 
Lesley on LinkedIn: https://www.linkedin.com/in/lcarhart/?originalSubdomain=au
Lesleys blog and cyber security conference: https://tisiphone.net/author/hacks4pancakes/
GTC on Socials:
Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: https://www.instagram.com/girlstalkcyber/?hl=en 
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: https://www.facebook.com/groups/828589538834261/]]></itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2539</itunes:duration>
                <itunes:episode>24</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>23. The Dark Web and Cyber Crime - LIVE Podcast with Federal Agent and Cyber Intel Expert</title>
        <itunes:title>23. The Dark Web and Cyber Crime - LIVE Podcast with Federal Agent and Cyber Intel Expert</itunes:title>
        <link>https://girlstalkcyber.podbean.com/e/23-the-dark-web-and-cyber-crime-live-podcast-with-federal-agent-and-cyber-intel-exper/</link>
                    <comments>https://girlstalkcyber.podbean.com/e/23-the-dark-web-and-cyber-crime-live-podcast-with-federal-agent-and-cyber-intel-exper/#comments</comments>        <pubDate>Sun, 09 Nov 2025 20:49:43 +1000</pubDate>
        <guid isPermaLink="false">girlstalkcyber.podbean.com/fb67929a-5172-33a3-b748-96a3a5557989</guid>
                                    <description><![CDATA[<p>Crime as we know it is changing and the kids are keeping up, faster than we are. </p>
<p>In this episode, GTC is on stage at the SXSW conference, discussing how the average age of cyber criminals is becoming younger and younger. Joined by our panelists AFP Federal Agent, Amy Phelps and Cyber Intelligence Expert Leah Pinto, we unpack how the dark web is fuelling cyber crime - including hiring violence “as a service” and ransomware toolkits.</p>
<p>But it’s not all doom and gloom, the AFP is hacking back, taking down dark web marketplaces and implementing prevention programs in schools. So tune in, and learn more about the dark web and the cyber crime it’s facilitating. </p>
<p>For more information about you can act secure online, visit <a href='https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure'>https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure</a></p>
<p>Links mentioned: </p>
<p>AFP Reboot program:</p>
<p><a href='https://www.afp.gov.au/news-centre/media-release/reb00tcmp-inspires-next-generation-cyber-champions'>https://www.afp.gov.au/news-centre/media-release/reb00tcmp-inspires-next-generation-cyber-champions</a></p>
<p> </p>
<p>Where to find us</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?hl=en'>https://www.instagram.com/girlstalkcyber/?hl=en</a></p>
<p>Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Crime as we know it is changing and the kids are keeping up, faster than we are. </p>
<p>In this episode, GTC is on stage at the SXSW conference, discussing how the average age of cyber criminals is becoming younger and younger. Joined by our panelists AFP Federal Agent, Amy Phelps and Cyber Intelligence Expert Leah Pinto, we unpack how the dark web is fuelling cyber crime - including hiring violence “as a service” and ransomware toolkits.</p>
<p>But it’s not all doom and gloom, the AFP is hacking back, taking down dark web marketplaces and implementing prevention programs in schools. So tune in, and learn more about the dark web and the cyber crime it’s facilitating. </p>
<p>For more information about you can act secure online, visit <a href='https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure'>https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure</a></p>
<p>Links mentioned: </p>
<p>AFP Reboot program:</p>
<p><a href='https://www.afp.gov.au/news-centre/media-release/reb00tcmp-inspires-next-generation-cyber-champions'>https://www.afp.gov.au/news-centre/media-release/reb00tcmp-inspires-next-generation-cyber-champions</a></p>
<p> </p>
<p>Where to find us</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?hl=en'>https://www.instagram.com/girlstalkcyber/?hl=en</a></p>
<p>Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/tzn96r4eqr4mdemn/AFP_Ep_v2amgbi.mp3" length="52091372" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Crime as we know it is changing and the kids are keeping up, faster than we are. 
In this episode, GTC is on stage at the SXSW conference, discussing how the average age of cyber criminals is becoming younger and younger. Joined by our panelists AFP Federal Agent, Amy Phelps and Cyber Intelligence Expert Leah Pinto, we unpack how the dark web is fuelling cyber crime - including hiring violence “as a service” and ransomware toolkits.
But it’s not all doom and gloom, the AFP is hacking back, taking down dark web marketplaces and implementing prevention programs in schools. So tune in, and learn more about the dark web and the cyber crime it’s facilitating. 
For more information about you can act secure online, visit https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure
Links mentioned: 
AFP Reboot program:
https://www.afp.gov.au/news-centre/media-release/reb00tcmp-inspires-next-generation-cyber-champions
 
Where to find us
Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: https://www.instagram.com/girlstalkcyber/?hl=en
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: https://www.facebook.com/groups/828589538834261/]]></itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>3253</itunes:duration>
                <itunes:episode>23</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <podcast:chapters url="https://mcdn.podbean.com/mf/web/2ktu57gabu4kf5uz/AFP_Ep_v2amgbi_chapters.json" type="application/json" />    </item>
    <item>
        <title>22. You Can't Ask That - Cyber Security Edition</title>
        <itunes:title>22. You Can't Ask That - Cyber Security Edition</itunes:title>
        <link>https://girlstalkcyber.podbean.com/e/22-you-cant-ask-that-cyber-security-edition/</link>
                    <comments>https://girlstalkcyber.podbean.com/e/22-you-cant-ask-that-cyber-security-edition/#comments</comments>        <pubDate>Mon, 13 Oct 2025 05:00:00 +1000</pubDate>
        <guid isPermaLink="false">girlstalkcyber.podbean.com/ef8e48eb-7f23-3390-a2c5-bf5e7d485fea</guid>
                                    <description><![CDATA[<p>We get it, cyber security is tough and some questions can feel too basic to ask. But don’t worry you’re not alone. In this episode we’ve teamed up with Kim from Cyber Wardens to bring you a few things: an overview of the Cyber Wardens program, a list of ‘you can’t ask that’ questions we’ve heard over the years, including their answers, and a story where a Shark Tank business owner almost lost her business to a scammer. </p>
<p>
Whether you’re running a side hustle, or just trying to clean up your online act, this episode will help build your cyber confidence without the technical jargon.</p>
<p> </p>
<p>For more information about you can act secure online, visit <a href='https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure'>https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure</a></p>
<p> </p>
<p>Resources:</p>
<p>Cyber wardens: <a href='https://cyberwardens.com.au/'>https://cyberwardens.com.au/</a></p>
<p>Embarrassing questions continued: <a href='https://cyberwardens.com.au/asking-for-a-friend-our-most-embarrassing-cyber-questions-answered/'>https://cyberwardens.com.au/asking-for-a-friend-our-most-embarrassing-cyber-questions-answered/</a></p>
<p>Cyber security pulse check report: <a href='https://cyberwardens.com.au/research-report/small-business-cyber-security-pulse-check-report/'>https://cyberwardens.com.au/research-report/small-business-cyber-security-pulse-check-report/</a></p>
<p>Password managers:<a href='https://www.passwordmanager.com/best-password-managers/'>https://www.passwordmanager.com/best-password-managers/</a></p>
<p>Where to find us</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?hl=en'>https://www.instagram.com/girlstalkcyber/?hl=en</a></p>
<p>Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>We get it, cyber security is tough and some questions can feel too basic to ask. But don’t worry you’re not alone. In this episode we’ve teamed up with Kim from Cyber Wardens to bring you a few things: an overview of the Cyber Wardens program, a list of ‘you can’t ask that’ questions we’ve heard over the years, including their answers, and a story where a Shark Tank business owner almost lost her business to a scammer. </p>
<p><br>
Whether you’re running a side hustle, or just trying to clean up your online act, this episode will help build your cyber confidence without the technical jargon.</p>
<p> </p>
<p>For more information about you can act secure online, visit <a href='https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure'>https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure</a></p>
<p> </p>
<p>Resources:</p>
<p>Cyber wardens: <a href='https://cyberwardens.com.au/'>https://cyberwardens.com.au/</a></p>
<p>Embarrassing questions continued: <a href='https://cyberwardens.com.au/asking-for-a-friend-our-most-embarrassing-cyber-questions-answered/'>https://cyberwardens.com.au/asking-for-a-friend-our-most-embarrassing-cyber-questions-answered/</a></p>
<p>Cyber security pulse check report: <a href='https://cyberwardens.com.au/research-report/small-business-cyber-security-pulse-check-report/'>https://cyberwardens.com.au/research-report/small-business-cyber-security-pulse-check-report/</a></p>
<p>Password managers:<a href='https://www.passwordmanager.com/best-password-managers/'>https://www.passwordmanager.com/best-password-managers/</a></p>
<p>Where to find us</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?hl=en'>https://www.instagram.com/girlstalkcyber/?hl=en</a></p>
<p>Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/pmvd4v4rxstmyzp8/Cyber_Warden_v26okqg.mp3" length="51110295" type="audio/mpeg"/>
        <itunes:summary><![CDATA[We get it, cyber security is tough and some questions can feel too basic to ask. But don’t worry you’re not alone. In this episode we’ve teamed up with Kim from Cyber Wardens to bring you a few things: an overview of the Cyber Wardens program, a list of ‘you can’t ask that’ questions we’ve heard over the years, including their answers, and a story where a Shark Tank business owner almost lost her business to a scammer. 
Whether you’re running a side hustle, or just trying to clean up your online act, this episode will help build your cyber confidence without the technical jargon.
 
For more information about you can act secure online, visit https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure
 
Resources:
Cyber wardens: https://cyberwardens.com.au/
Embarrassing questions continued: https://cyberwardens.com.au/asking-for-a-friend-our-most-embarrassing-cyber-questions-answered/
Cyber security pulse check report: https://cyberwardens.com.au/research-report/small-business-cyber-security-pulse-check-report/
Password managers:https://www.passwordmanager.com/best-password-managers/
Where to find us
Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: https://www.instagram.com/girlstalkcyber/?hl=en
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: https://www.facebook.com/groups/828589538834261/
 ]]></itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2126</itunes:duration>
        <itunes:season>3</itunes:season>
        <itunes:episode>22</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>21. The Cyber Spy on the Inside</title>
        <itunes:title>21. The Cyber Spy on the Inside</itunes:title>
        <link>https://girlstalkcyber.podbean.com/e/21-the-cyber-spy-on-the-inside/</link>
                    <comments>https://girlstalkcyber.podbean.com/e/21-the-cyber-spy-on-the-inside/#comments</comments>        <pubDate>Mon, 01 Sep 2025 05:00:00 +1000</pubDate>
        <guid isPermaLink="false">girlstalkcyber.podbean.com/21ae88e0-1dc2-3cda-8791-61105eecccb3</guid>
                                    <description><![CDATA[<p>A billion-dollar rivalry, a spy on the inside, and a sting operation for the history books. This isn’t a Netflix drama — it’s a real lawsuit.</p>
<p>In this episode, GTC dives into the explosive case of Rippling vs. Deel, where Rippling alleges Deel deployed a corporate spy in their ranks.</p>
<p>This case has it all and is the exact kind of story that you might not hear about if you’re outside of the cyber security industry. But with a phone being flushed down the toilet and entire building pipes dismantled to find it, trust us it's an exceptional one.</p>
<p>For more information about you can act secure online, visit <a href='https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure'>https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure</a></p>
<p>Resources: </p>
<p><a href='https://rippling2.imgix.net/Complaint.pdf'>https://rippling2.imgix.net/Complaint.pdf</a></p>
<p><a href='https://techcrunch.com/2025/04/02/the-affidavit-of-a-rippling-employee-caught-spying-for-deel-reads-like-a-movie/'>https://techcrunch.com/2025/04/02/the-affidavit-of-a-rippling-employee-caught-spying-for-deel-reads-like-a-movie/</a></p>
<p><a href='https://sfstandard.com/2025/04/02/deel-rippling-spy-coporate-espionage-silicon-valley/'>https://sfstandard.com/2025/04/02/deel-rippling-spy-coporate-espionage-silicon-valley/</a> </p>
<p>Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?hl=en'>https://www.instagram.com/girlstalkcyber/?hl=en</a> </p>
<p>Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
<p> </p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>A billion-dollar rivalry, a spy on the inside, and a sting operation for the history books. This isn’t a Netflix drama — it’s a real lawsuit.</p>
<p>In this episode, GTC dives into the explosive case of Rippling vs. Deel, where Rippling alleges Deel deployed a corporate spy in their ranks.</p>
<p>This case has it all and is the exact kind of story that you might not hear about if you’re outside of the cyber security industry. But with a phone being flushed down the toilet and entire building pipes dismantled to find it, trust us it's an exceptional one.</p>
<p>For more information about you can act secure online, visit <a href='https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure'>https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure</a></p>
<p>Resources: </p>
<p><a href='https://rippling2.imgix.net/Complaint.pdf'>https://rippling2.imgix.net/Complaint.pdf</a></p>
<p><a href='https://techcrunch.com/2025/04/02/the-affidavit-of-a-rippling-employee-caught-spying-for-deel-reads-like-a-movie/'>https://techcrunch.com/2025/04/02/the-affidavit-of-a-rippling-employee-caught-spying-for-deel-reads-like-a-movie/</a></p>
<p><a href='https://sfstandard.com/2025/04/02/deel-rippling-spy-coporate-espionage-silicon-valley/'>https://sfstandard.com/2025/04/02/deel-rippling-spy-coporate-espionage-silicon-valley/</a> </p>
<p>Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?hl=en'>https://www.instagram.com/girlstalkcyber/?hl=en</a> </p>
<p>Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
<p> </p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/zexix64s7nb3fbmd/V2_Inisder_Threat_mp375f2u.mp3" length="46538894" type="audio/mpeg"/>
        <itunes:summary><![CDATA[A billion-dollar rivalry, a spy on the inside, and a sting operation for the history books. This isn’t a Netflix drama — it’s a real lawsuit.
In this episode, GTC dives into the explosive case of Rippling vs. Deel, where Rippling alleges Deel deployed a corporate spy in their ranks.
This case has it all and is the exact kind of story that you might not hear about if you’re outside of the cyber security industry. But with a phone being flushed down the toilet and entire building pipes dismantled to find it, trust us it's an exceptional one.
For more information about you can act secure online, visit https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure
Resources: 
https://rippling2.imgix.net/Complaint.pdf
https://techcrunch.com/2025/04/02/the-affidavit-of-a-rippling-employee-caught-spying-for-deel-reads-like-a-movie/
https://sfstandard.com/2025/04/02/deel-rippling-spy-coporate-espionage-silicon-valley/ 
Socials:
Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: https://www.instagram.com/girlstalkcyber/?hl=en 
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: https://www.facebook.com/groups/828589538834261/
 
 ]]></itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1933</itunes:duration>
        <itunes:season>3</itunes:season>
        <itunes:episode>21</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>20. Cyber Basics That Could Save Your Business</title>
        <itunes:title>20. Cyber Basics That Could Save Your Business</itunes:title>
        <link>https://girlstalkcyber.podbean.com/e/20-cyber-basics-that-could-save-your-business/</link>
                    <comments>https://girlstalkcyber.podbean.com/e/20-cyber-basics-that-could-save-your-business/#comments</comments>        <pubDate>Mon, 02 Jun 2025 08:18:25 +1000</pubDate>
        <guid isPermaLink="false">girlstalkcyber.podbean.com/f9bce184-d732-31c4-a599-0d21cb9d6650</guid>
                                    <description><![CDATA[<p>In this episode, we’re joined by Jacqui Loustau —cybersecurity expert, industry powerhouse, and founder of the Australian Women in Security Network (AWSN). We dive into the real risks small businesses face online and break down where to start and end with the cyber basics for your business. </p>
<p>Whether you’re running a side hustle or just want to get smarter about scams, we cover:
- Why your business is a target (yes, if you have an email, you’re a target)
- The 6 accounts you should protect right now
- What to do when things go wrong (because it happens)
- How students are helping secure Aussie small businesses. </p>
<p>Hit play, take notes, and get your cyber hygiene sorted.</p>
<p> </p>
<p>For more information about you can act secure online, visit the Act Now, Stay Secure website at: https://www.actnowstaysecure.gov.au/</p>
<p>Resources mentioned:</p>
<p><a href='https://haveibeenpwned.com/'>https://haveibeenpwned.com/</a></p>
<p><a href='https://www.cyber.gov.au'>https://www.cyber.gov.au</a></p>
<p>
Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?hl=en'>https://www.instagram.com/girlstalkcyber/?hl=en</a> </p>
<p>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you're feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, we’re joined by Jacqui Loustau —cybersecurity expert, industry powerhouse, and founder of the Australian Women in Security Network (AWSN). We dive into the real risks small businesses face online and break down where to start and end with the cyber basics for your business. </p>
<p>Whether you’re running a side hustle or just want to get smarter about scams, we cover:<br>
- Why your business is a target (yes, if you have an email, you’re a target)<br>
- The 6 accounts you should protect right now<br>
- What to do when things go wrong (because it happens)<br>
- How students are helping secure Aussie small businesses. </p>
<p>Hit play, take notes, and get your cyber hygiene sorted.</p>
<p> </p>
<p>For more information about you can act secure online, visit the Act Now, Stay Secure website at: https://www.actnowstaysecure.gov.au/</p>
<p>Resources mentioned:</p>
<p><a href='https://haveibeenpwned.com/'>https://haveibeenpwned.com/</a></p>
<p><a href='https://www.cyber.gov.au'>https://www.cyber.gov.au</a></p>
<p><br>
Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?hl=en'>https://www.instagram.com/girlstalkcyber/?hl=en</a> </p>
<p><br>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you're feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/rxzhpk7xpguqutia/Final_Jacqui_Ep7k79f.mp3" length="65333779" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, we’re joined by Jacqui Loustau —cybersecurity expert, industry powerhouse, and founder of the Australian Women in Security Network (AWSN). We dive into the real risks small businesses face online and break down where to start and end with the cyber basics for your business. 
Whether you’re running a side hustle or just want to get smarter about scams, we cover:- Why your business is a target (yes, if you have an email, you’re a target)- The 6 accounts you should protect right now- What to do when things go wrong (because it happens)- How students are helping secure Aussie small businesses. 
Hit play, take notes, and get your cyber hygiene sorted.
 
For more information about you can act secure online, visit the Act Now, Stay Secure website at: https://www.actnowstaysecure.gov.au/
Resources mentioned:
https://haveibeenpwned.com/
https://www.cyber.gov.au
Socials:
Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: https://www.instagram.com/girlstalkcyber/?hl=en 
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you're feeling about the content covered in this episode: https://www.facebook.com/groups/828589538834261/
 ]]></itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2719</itunes:duration>
                <itunes:episode>20</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>19. The Art of Cyber Crisis Communications with Chloe</title>
        <itunes:title>19. The Art of Cyber Crisis Communications with Chloe</itunes:title>
        <link>https://girlstalkcyber.podbean.com/e/19-the-art-of-cyber-crisis-communications-with-chloe/</link>
                    <comments>https://girlstalkcyber.podbean.com/e/19-the-art-of-cyber-crisis-communications-with-chloe/#comments</comments>        <pubDate>Mon, 05 May 2025 06:00:00 +1000</pubDate>
        <guid isPermaLink="false">girlstalkcyber.podbean.com/cc74be2b-07e9-3ae0-be23-47233940c969</guid>
                                    <description><![CDATA[<p>When a cyber attack hits, Chloe is one of the first people called — not to manage the technical disaster, but to translate the technical problems into real world messages, that people can understand. </p>
<p>Chloe works in the Cyber Strategic Communications at CyberCX, a team that leads communications for organisations before during and after a cyber incident. </p>
<p>In this episode, Chloe walks us through her background, her memorable crises in the Strategic Communications team (remember the Australian port shut down that almost ruined Christmas?) and lifts the curtain on what happens before those “we regret to inform you, you’ve been breached” emails go out. Plus, she shares some hilarious war stories (think navy twerking scandals) and her best tips for keeping your info safe online.</p>
<p>So if you ever thought cyber security was just for the techies - think again.</p>

<p class="e-9640-text encore-text-body-medium encore-internal-color-text-subdued umouqjSkMUbvF4I_Xz6r">_________________</p>


<p class="e-9640-text encore-text-body-medium encore-internal-color-text-subdued umouqjSkMUbvF4I_Xz6r">This episode is sponsored by CyberCX, the leading provider of professional cyber security and cloud services across Australia and New Zealand. With a workforce of over 1,400 professionals, CyberCX is a trusted partner to private and public sector organisations helping customers confidently manage cyber risk, respond to incidents and build resilience in an increasingly complex and challenging threat environment.</p>


<p class="e-9640-text encore-text-body-medium encore-internal-color-text-subdued umouqjSkMUbvF4I_Xz6r">Find out more about how CyberCX can help your organisation by visiting <a href='https://cybercx.com.au/'>https://cybercx.com.au/</a> today.</p>


<p class="e-9640-text encore-text-body-medium encore-internal-color-text-subdued umouqjSkMUbvF4I_Xz6r"> </p>
<p class="e-9640-text encore-text-body-medium encore-internal-color-text-subdued umouqjSkMUbvF4I_Xz6r">For more information about you can act secure online, visit <a href='https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure'>https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure</a>
_________________

Socials:</p>


<p class="e-9640-text encore-text-body-medium encore-internal-color-text-subdued umouqjSkMUbvF4I_Xz6r">Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a></p>


<p class="e-9640-text encore-text-body-medium encore-internal-color-text-subdued umouqjSkMUbvF4I_Xz6r">
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>GTC - Girls Talk Cyber | Facebook</a></p>

<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>When a cyber attack hits, Chloe is one of the first people called — not to manage the technical disaster, but to translate the technical problems into real world messages, that people can understand. </p>
<p>Chloe works in the Cyber Strategic Communications at CyberCX, a team that leads communications for organisations before during and after a cyber incident. </p>
<p>In this episode, Chloe walks us through her background, her memorable crises in the Strategic Communications team (remember the Australian port shut down that almost ruined Christmas?) and lifts the curtain on what happens before those “we regret to inform you, you’ve been breached” emails go out. Plus, she shares some hilarious war stories (think navy twerking scandals) and her best tips for keeping your info safe online.</p>
<p>So if you ever thought cyber security was just for the techies - think again.</p>

<p class="e-9640-text encore-text-body-medium encore-internal-color-text-subdued umouqjSkMUbvF4I_Xz6r">_________________</p>


<p class="e-9640-text encore-text-body-medium encore-internal-color-text-subdued umouqjSkMUbvF4I_Xz6r">This episode is sponsored by CyberCX, the leading provider of professional cyber security and cloud services across Australia and New Zealand. With a workforce of over 1,400 professionals, CyberCX is a trusted partner to private and public sector organisations helping customers confidently manage cyber risk, respond to incidents and build resilience in an increasingly complex and challenging threat environment.</p>


<p class="e-9640-text encore-text-body-medium encore-internal-color-text-subdued umouqjSkMUbvF4I_Xz6r">Find out more about how CyberCX can help your organisation by visiting <a href='https://cybercx.com.au/'>https://cybercx.com.au/</a> today.</p>


<p class="e-9640-text encore-text-body-medium encore-internal-color-text-subdued umouqjSkMUbvF4I_Xz6r"> </p>
<p class="e-9640-text encore-text-body-medium encore-internal-color-text-subdued umouqjSkMUbvF4I_Xz6r">For more information about you can act secure online, visit <a href='https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure'>https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure</a><br>
_________________<br>
<br>
Socials:</p>


<p class="e-9640-text encore-text-body-medium encore-internal-color-text-subdued umouqjSkMUbvF4I_Xz6r">Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a></p>


<p class="e-9640-text encore-text-body-medium encore-internal-color-text-subdued umouqjSkMUbvF4I_Xz6r"><br>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>GTC - Girls Talk Cyber | Facebook</a></p>

<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/gnn7iwg5ftvx8j5x/FINAL_EP7mm5m.mp3" length="59251711" type="audio/mpeg"/>
        <itunes:summary><![CDATA[When a cyber attack hits, Chloe is one of the first people called — not to manage the technical disaster, but to translate the technical problems into real world messages, that people can understand. 
Chloe works in the Cyber Strategic Communications at CyberCX, a team that leads communications for organisations before during and after a cyber incident. 
In this episode, Chloe walks us through her background, her memorable crises in the Strategic Communications team (remember the Australian port shut down that almost ruined Christmas?) and lifts the curtain on what happens before those “we regret to inform you, you’ve been breached” emails go out. Plus, she shares some hilarious war stories (think navy twerking scandals) and her best tips for keeping your info safe online.
So if you ever thought cyber security was just for the techies - think again.

_________________


This episode is sponsored by CyberCX, the leading provider of professional cyber security and cloud services across Australia and New Zealand. With a workforce of over 1,400 professionals, CyberCX is a trusted partner to private and public sector organisations helping customers confidently manage cyber risk, respond to incidents and build resilience in an increasingly complex and challenging threat environment.


Find out more about how CyberCX can help your organisation by visiting https://cybercx.com.au/ today.


 
For more information about you can act secure online, visit https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure_________________Socials:


Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU


Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: GTC - Girls Talk Cyber | Facebook

 ]]></itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2464</itunes:duration>
                <itunes:episode>19</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>18. What the heck is a VPN anyway?</title>
        <itunes:title>18. What the heck is a VPN anyway?</itunes:title>
        <link>https://girlstalkcyber.podbean.com/e/18-what-the-heck-is-a-vpn-anyway/</link>
                    <comments>https://girlstalkcyber.podbean.com/e/18-what-the-heck-is-a-vpn-anyway/#comments</comments>        <pubDate>Mon, 31 Mar 2025 05:00:00 +1000</pubDate>
        <guid isPermaLink="false">girlstalkcyber.podbean.com/f4dcf836-3e2f-3a33-8e94-200e77958a8d</guid>
                                    <description><![CDATA[<p>TikTok might be getting banned in the United States, and VPN’s could be the access solution. But what the heck is a VPN anyway? How do they work? What are they used for outside of side stepping TikTok bans? Are they the silver bullet to cyber security? The answer may surprise you. </p>
<p>Tune in to this week’s episode as we unpack these questions and help you understand the tip of the iceberg when it comes to VPNs and your security. </p>
<p>Though free VPN options seem like a good idea, GTC doesn't endorse their use (there are sometimes hidden nasties you want to avoid). Always do your own, thorough research when finding a VPN which is right for you, and lean-in to paid services over free options. </p>
<p>For more information about you can act secure online, visit <a href='https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure'>https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure</a></p>
<p>Resources: </p>
<p><a href='https://nordvpn.com/'>https://nordvpn.com/</a></p>
<p>_________________</p>
<p>Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
<p>_________________</p>
<p>This episode is sponsored by CyberCX. Enjoy hearing about all things cyber here on the pod? Then maybe you should think about making the career switch into cyber security. There’s no better place to begin this journey than with the CyberCX Academy. A paid, permanent full time employment opportunity designed to launch your career in cyber security. No prior experience is necessary. Applications open here: <a href='https://cybercx.com.au/cyber-security-academy-cybercx/'>https://cybercx.com.au/cyber-security-academy-cybercx/</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>TikTok might be getting banned in the United States, and VPN’s could be the access solution. But what the heck is a VPN anyway? How do they work? What are they used for outside of side stepping TikTok bans? Are they the silver bullet to cyber security? The answer may surprise you. </p>
<p>Tune in to this week’s episode as we unpack these questions and help you understand the tip of the iceberg when it comes to VPNs and your security. </p>
<p>Though free VPN options seem like a good idea, GTC doesn't endorse their use (there are sometimes hidden nasties you want to avoid). Always do your own, thorough research when finding a VPN which is right for you, and lean-in to paid services over free options. </p>
<p>For more information about you can act secure online, visit <a href='https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure'>https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure</a></p>
<p>Resources: </p>
<p><a href='https://nordvpn.com/'>https://nordvpn.com/</a></p>
<p>_________________</p>
<p>Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p><br>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
<p>_________________</p>
<p>This episode is sponsored by CyberCX. Enjoy hearing about all things cyber here on the pod? Then maybe you should think about making the career switch into cyber security. There’s no better place to begin this journey than with the CyberCX Academy. A paid, permanent full time employment opportunity designed to launch your career in cyber security. No prior experience is necessary. Applications open here: <a href='https://cybercx.com.au/cyber-security-academy-cybercx/'>https://cybercx.com.au/cyber-security-academy-cybercx/</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ij6pyi28uf7rcmgc/Final_VPN_Ep6fw3b.mp3" length="14394336" type="audio/mpeg"/>
        <itunes:summary><![CDATA[TikTok might be getting banned in the United States, and VPN’s could be the access solution. But what the heck is a VPN anyway? How do they work? What are they used for outside of side stepping TikTok bans? Are they the silver bullet to cyber security? The answer may surprise you. 
Tune in to this week’s episode as we unpack these questions and help you understand the tip of the iceberg when it comes to VPNs and your security. 
Though free VPN options seem like a good idea, GTC doesn't endorse their use (there are sometimes hidden nasties you want to avoid). Always do your own, thorough research when finding a VPN which is right for you, and lean-in to paid services over free options. 
For more information about you can act secure online, visit https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/act-now-stay-secure
Resources: 
https://nordvpn.com/
_________________
Socials:
Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU 
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: https://www.facebook.com/groups/828589538834261/
_________________
This episode is sponsored by CyberCX. Enjoy hearing about all things cyber here on the pod? Then maybe you should think about making the career switch into cyber security. There’s no better place to begin this journey than with the CyberCX Academy. A paid, permanent full time employment opportunity designed to launch your career in cyber security. No prior experience is necessary. Applications open here: https://cybercx.com.au/cyber-security-academy-cybercx/
 ]]></itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1128</itunes:duration>
        <itunes:season>3</itunes:season>
        <itunes:episode>18</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>17. Behind The Badge, Tales From An FBI Agent</title>
        <itunes:title>17. Behind The Badge, Tales From An FBI Agent</itunes:title>
        <link>https://girlstalkcyber.podbean.com/e/17-behind-the-badge-tales-from-an-fbi-agent/</link>
                    <comments>https://girlstalkcyber.podbean.com/e/17-behind-the-badge-tales-from-an-fbi-agent/#comments</comments>        <pubDate>Mon, 24 Feb 2025 05:00:00 +1000</pubDate>
        <guid isPermaLink="false">girlstalkcyber.podbean.com/ddbdfc10-d85f-37aa-b451-6fe5082b6e75</guid>
                                    <description><![CDATA[<p>An FBI and Australian Federal Police operation named Trojan Shield, convinced criminals to obtain a mobile device and discuss their criminal operations on a law-enforcement encrypted messaging app. This led to the infiltration of 300 criminal groups across 100 countries. Wild right? Hear more about this operation and a bunch of others as GTC sits down with Nitiana Mann to discuss her work as an FBI Legal Attaché , and how her passion for financial crime led her to this position.</p>

<p class="e-9640-text encore-text-body-medium encore-internal-color-text-subdued umouqjSkMUbvF4I_Xz6r">_________________</p>


<p class="e-9640-text encore-text-body-medium encore-internal-color-text-subdued umouqjSkMUbvF4I_Xz6r">This episode is sponsored by CyberCX, the leading provider of professional cyber security and cloud services across Australia and New Zealand. With a workforce of over 1,400 professionals, CyberCX is a trusted partner to private and public sector organisations helping customers confidently manage cyber risk, respond to incidents and build resilience in an increasingly complex and challenging threat environment.</p>


<p class="e-9640-text encore-text-body-medium encore-internal-color-text-subdued umouqjSkMUbvF4I_Xz6r">Find out more about how CyberCX can help your organisation by visiting <a href='https://cybercx.com.au/'>https://cybercx.com.au/</a> today.</p>


<p class="e-9640-text encore-text-body-medium encore-internal-color-text-subdued umouqjSkMUbvF4I_Xz6r">_________________

Socials:</p>


<p class="e-9640-text encore-text-body-medium encore-internal-color-text-subdued umouqjSkMUbvF4I_Xz6r">Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a></p>


<p class="e-9640-text encore-text-body-medium encore-internal-color-text-subdued umouqjSkMUbvF4I_Xz6r">
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>GTC - Girls Talk Cyber | Facebook</a></p>

<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>An FBI and Australian Federal Police operation named Trojan Shield, convinced criminals to obtain a mobile device and discuss their criminal operations on a law-enforcement encrypted messaging app. This led to the infiltration of 300 criminal groups across 100 countries. Wild right? Hear more about this operation and a bunch of others as GTC sits down with Nitiana Mann to discuss her work as an FBI Legal Attaché , and how her passion for financial crime led her to this position.</p>

<p class="e-9640-text encore-text-body-medium encore-internal-color-text-subdued umouqjSkMUbvF4I_Xz6r">_________________</p>


<p class="e-9640-text encore-text-body-medium encore-internal-color-text-subdued umouqjSkMUbvF4I_Xz6r">This episode is sponsored by CyberCX, the leading provider of professional cyber security and cloud services across Australia and New Zealand. With a workforce of over 1,400 professionals, CyberCX is a trusted partner to private and public sector organisations helping customers confidently manage cyber risk, respond to incidents and build resilience in an increasingly complex and challenging threat environment.</p>


<p class="e-9640-text encore-text-body-medium encore-internal-color-text-subdued umouqjSkMUbvF4I_Xz6r">Find out more about how CyberCX can help your organisation by visiting <a href='https://cybercx.com.au/'>https://cybercx.com.au/</a> today.</p>


<p class="e-9640-text encore-text-body-medium encore-internal-color-text-subdued umouqjSkMUbvF4I_Xz6r">_________________<br>
<br>
Socials:</p>


<p class="e-9640-text encore-text-body-medium encore-internal-color-text-subdued umouqjSkMUbvF4I_Xz6r">Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a></p>


<p class="e-9640-text encore-text-body-medium encore-internal-color-text-subdued umouqjSkMUbvF4I_Xz6r"><br>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>GTC - Girls Talk Cyber | Facebook</a></p>

<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/db4ye2a6s2nxcxdv/Nitiana_Mann_Interview_-_FINALa0ibv.mp3" length="37501793" type="audio/mpeg"/>
        <itunes:summary><![CDATA[An FBI and Australian Federal Police operation named Trojan Shield, convinced criminals to obtain a mobile device and discuss their criminal operations on a law-enforcement encrypted messaging app. This led to the infiltration of 300 criminal groups across 100 countries. Wild right? Hear more about this operation and a bunch of others as GTC sits down with Nitiana Mann to discuss her work as an FBI Legal Attaché , and how her passion for financial crime led her to this position.

_________________


This episode is sponsored by CyberCX, the leading provider of professional cyber security and cloud services across Australia and New Zealand. With a workforce of over 1,400 professionals, CyberCX is a trusted partner to private and public sector organisations helping customers confidently manage cyber risk, respond to incidents and build resilience in an increasingly complex and challenging threat environment.


Find out more about how CyberCX can help your organisation by visiting https://cybercx.com.au/ today.


_________________Socials:


Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU


Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: GTC - Girls Talk Cyber | Facebook

 ]]></itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2612</itunes:duration>
                <itunes:episode>17</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>16. Catching the Criminal: A Deep Dive into the Medibank Cyber Attack</title>
        <itunes:title>16. Catching the Criminal: A Deep Dive into the Medibank Cyber Attack</itunes:title>
        <link>https://girlstalkcyber.podbean.com/e/16-catching-the-criminal-a-deep-dive-into-the-medibank-cyber-attack/</link>
                    <comments>https://girlstalkcyber.podbean.com/e/16-catching-the-criminal-a-deep-dive-into-the-medibank-cyber-attack/#comments</comments>        <pubDate>Mon, 27 Jan 2025 20:59:42 +1000</pubDate>
        <guid isPermaLink="false">girlstalkcyber.podbean.com/7f410b3f-7e6e-3233-a535-7e31bd063780</guid>
                                    <description><![CDATA[<p>A cyber criminal has been caught two years after coordinating a cyber attack against Medibank, one of Australia’s largest private health care providers. The attack was ruthless, with the cyber criminal leaking stolen medical data, bit by bit into the public arena, including: HIV statuses, sexually transmitted diseases and abortion data. Who was the brutally brazen hacker behind this attack? How did they get caught and where did it all begin? GTC investigates in this episode: Catching the Criminal: A deep dive into the Medibank cyber attack.</p>
<p>All information collected and used for this episode in publicly available from the following resources:</p>
<p>Resources mentioned in the episode: 
OAIC - Medibank data breach alleged timeline. </p>
<p><a href='https://www.oaic.gov.au/__data/assets/pdf_file/0037/228979/Medibank-data-breach-alleged-timeline-infographic.pdf'>https://www.oaic.gov.au/__data/assets/pdf_file/0037/228979/Medibank-data-breach-alleged-timeline-infographic.pdf</a></p>
<p> </p>
<p>Intel 471 report</p>
<p><a href='https://intel471.com/blog/medibanks-attacker-it-businessman-claimed-psychologist-and-alleged-cybercriminal'>https://intel471.com/blog/medibanks-attacker-it-businessman-claimed-psychologist-and-alleged-cybercriminal</a></p>
<p> </p>
<p>US Department of Treasury on REvil Ransomware Gang</p>
<p><a href='https://home.treasury.gov/news/press-releases/jy2041'>https://home.treasury.gov/news/press-releases/jy2041</a></p>
<p> </p>
<p>Medibank’s cyber crime update from Nov 7 2022: </p>
<p><a href='https://www.medibank.com.au/livebetter/newsroom/post/medibank-cybercrime-update%207%20November'>https://www.medibank.com.au/livebetter/newsroom/post/medibank-cybercrime-update%207%20November</a></p>
<p> </p>
<p>ABC News Article on the hacker</p>
<p><a href='https://www.abc.net.au/news/2024-01-23/aleksandr-ermakov-medibank-private-data-breach-cyber-attack/103378142'>https://www.abc.net.au/news/2024-01-23/aleksandr-ermakov-medibank-private-data-breach-cyber-attack/103378142</a></p>
<p> </p>
<p>Hacker detained in Russia</p>
<p><a href='https://ia.acs.org.au/article/2024/medibank-hacker-detained-in-russia.html'>https://ia.acs.org.au/article/2024/medibank-hacker-detained-in-russia.html</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>A cyber criminal has been caught two years after coordinating a cyber attack against Medibank, one of Australia’s largest private health care providers. The attack was ruthless, with the cyber criminal leaking stolen medical data, bit by bit into the public arena, including: HIV statuses, sexually transmitted diseases and abortion data. Who was the brutally brazen hacker behind this attack? How did they get caught and where did it all begin? GTC investigates in this episode: Catching the Criminal: A deep dive into the Medibank cyber attack.</p>
<p>All information collected and used for this episode in publicly available from the following resources:</p>
<p>Resources mentioned in the episode: <br>
OAIC - Medibank data breach alleged timeline. </p>
<p><a href='https://www.oaic.gov.au/__data/assets/pdf_file/0037/228979/Medibank-data-breach-alleged-timeline-infographic.pdf'>https://www.oaic.gov.au/__data/assets/pdf_file/0037/228979/Medibank-data-breach-alleged-timeline-infographic.pdf</a></p>
<p> </p>
<p>Intel 471 report</p>
<p><a href='https://intel471.com/blog/medibanks-attacker-it-businessman-claimed-psychologist-and-alleged-cybercriminal'>https://intel471.com/blog/medibanks-attacker-it-businessman-claimed-psychologist-and-alleged-cybercriminal</a></p>
<p> </p>
<p>US Department of Treasury on REvil Ransomware Gang</p>
<p><a href='https://home.treasury.gov/news/press-releases/jy2041'>https://home.treasury.gov/news/press-releases/jy2041</a></p>
<p> </p>
<p>Medibank’s cyber crime update from Nov 7 2022: </p>
<p><a href='https://www.medibank.com.au/livebetter/newsroom/post/medibank-cybercrime-update%207%20November'>https://www.medibank.com.au/livebetter/newsroom/post/medibank-cybercrime-update%207%20November</a></p>
<p> </p>
<p>ABC News Article on the hacker</p>
<p><a href='https://www.abc.net.au/news/2024-01-23/aleksandr-ermakov-medibank-private-data-breach-cyber-attack/103378142'>https://www.abc.net.au/news/2024-01-23/aleksandr-ermakov-medibank-private-data-breach-cyber-attack/103378142</a></p>
<p> </p>
<p>Hacker detained in Russia</p>
<p><a href='https://ia.acs.org.au/article/2024/medibank-hacker-detained-in-russia.html'>https://ia.acs.org.au/article/2024/medibank-hacker-detained-in-russia.html</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/udx53aewfutqvyb7/No_CCX_Ad_Final_Medibank_Epabdke.mp3" length="24508812" type="audio/mpeg"/>
        <itunes:summary><![CDATA[A cyber criminal has been caught two years after coordinating a cyber attack against Medibank, one of Australia’s largest private health care providers. The attack was ruthless, with the cyber criminal leaking stolen medical data, bit by bit into the public arena, including: HIV statuses, sexually transmitted diseases and abortion data. Who was the brutally brazen hacker behind this attack? How did they get caught and where did it all begin? GTC investigates in this episode: Catching the Criminal: A deep dive into the Medibank cyber attack.
All information collected and used for this episode in publicly available from the following resources:
Resources mentioned in the episode: OAIC - Medibank data breach alleged timeline. 
https://www.oaic.gov.au/__data/assets/pdf_file/0037/228979/Medibank-data-breach-alleged-timeline-infographic.pdf
 
Intel 471 report
https://intel471.com/blog/medibanks-attacker-it-businessman-claimed-psychologist-and-alleged-cybercriminal
 
US Department of Treasury on REvil Ransomware Gang
https://home.treasury.gov/news/press-releases/jy2041
 
Medibank’s cyber crime update from Nov 7 2022: 
https://www.medibank.com.au/livebetter/newsroom/post/medibank-cybercrime-update%207%20November
 
ABC News Article on the hacker
https://www.abc.net.au/news/2024-01-23/aleksandr-ermakov-medibank-private-data-breach-cyber-attack/103378142
 
Hacker detained in Russia
https://ia.acs.org.au/article/2024/medibank-hacker-detained-in-russia.html]]></itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1702</itunes:duration>
                <itunes:episode>16</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>15. Interview with the eSafety Commissioner - Julie Inman Grant PART 2</title>
        <itunes:title>15. Interview with the eSafety Commissioner - Julie Inman Grant PART 2</itunes:title>
        <link>https://girlstalkcyber.podbean.com/e/15-interview-with-esafety-comissioner-julie-inman-grant-part-2/</link>
                    <comments>https://girlstalkcyber.podbean.com/e/15-interview-with-esafety-comissioner-julie-inman-grant-part-2/#comments</comments>        <pubDate>Tue, 26 Nov 2024 23:19:50 +1000</pubDate>
        <guid isPermaLink="false">girlstalkcyber.podbean.com/e98847e4-6e45-3c34-93a2-63bbc5c74461</guid>
                                    <description><![CDATA[<p>Content warning: This episode includes discussion involving imaged based abuse, child sexual abuse, violence and suicide. Please listen with care. If content raises anything for you, please seek support by contacting Lifeline on 13 11 14 or via the website <a href='https://www.lifeline.org.au/'>https://www.lifeline.org.au/</a>.</p>
<p> </p>
<p>Sit down with us in the CyberCX lounge at SXSW as we interview the eSafety Commissioner, Julie Inman Grant. This episodes explores the critical work being done by eSafety which seeks to make the internet a safer place for all Australians. From tackling deep fakes to online harassment, this two-part interview sees us deep dive into the initiatives, policies and tools designed  to protect individuals in our increasingly connected world. Whether you're an educator, a parent, or simply an internet user, this episode is packed with insights and actionable advice.</p>
<p> </p>
<p>Interview part two of two.</p>
<p> </p>
<p>This episode is sponsored by CyberCX, Enjoy hearing about all things cyber here on the pod? Then maybe you should think about making the career switch into cyber security. There's no better place to begin this journey than with the CyberCX Academy. A paid, permanent full-time employment opportunity designed to launch your career in cyber security. No prior experience is necessary. Applications open here: <a href='https://cybercx.com.au/cyber-security-academy-cybercx/'>CyberCX Academy</a></p>
<p> </p>
<p>Stay up to date with the eSafety Commissioner on LinkedIn here:</p>
<p><a href='https://www.linkedin.com/company/esafetyoffice/'>eSafety Commissioner: Overview | LinkedIn</a></p>
<p> </p>
<p>eSafety website:</p>
<p><a href='https://www.esafety.gov.au/'>Online safety | eSafety Commissioner</a></p>
<p> </p>
<p>Other Mental Health Resources:</p>
<p><a href='https://www.beyondblue.org.au/'>https://www.beyondblue.org.au/</a></p>
<p> </p>
<p><a href='https://www.childsafety.gov.au/get-support/kids-helpline'>Kids Helpline | National Office for Child Safety</a></p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re loving the show, leave us a review and share it with your family and friends!</p>
<p>_________________
GTC Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Content warning: This episode includes discussion involving imaged based abuse, child sexual abuse, violence and suicide. Please listen with care. If content raises anything for you, please seek support by contacting Lifeline on 13 11 14 or via the website <a href='https://www.lifeline.org.au/'>https://www.lifeline.org.au/</a>.</p>
<p> </p>
<p>Sit down with us in the CyberCX lounge at SXSW as we interview the eSafety Commissioner, Julie Inman Grant. This episodes explores the critical work being done by eSafety which seeks to make the internet a safer place for all Australians. From tackling deep fakes to online harassment, this two-part interview sees us deep dive into the initiatives, policies and tools designed  to protect individuals in our increasingly connected world. Whether you're an educator, a parent, or simply an internet user, this episode is packed with insights and actionable advice.</p>
<p> </p>
<p>Interview part two of two.</p>
<p> </p>
<p>This episode is sponsored by CyberCX, Enjoy hearing about all things cyber here on the pod? Then maybe you should think about making the career switch into cyber security. There's no better place to begin this journey than with the CyberCX Academy. A paid, permanent full-time employment opportunity designed to launch your career in cyber security. No prior experience is necessary. Applications open here: <a href='https://cybercx.com.au/cyber-security-academy-cybercx/'>CyberCX Academy</a></p>
<p> </p>
<p>Stay up to date with the eSafety Commissioner on LinkedIn here:</p>
<p><a href='https://www.linkedin.com/company/esafetyoffice/'>eSafety Commissioner: Overview | LinkedIn</a></p>
<p> </p>
<p>eSafety website:</p>
<p><a href='https://www.esafety.gov.au/'>Online safety | eSafety Commissioner</a></p>
<p> </p>
<p>Other Mental Health Resources:</p>
<p><a href='https://www.beyondblue.org.au/'>https://www.beyondblue.org.au/</a></p>
<p> </p>
<p><a href='https://www.childsafety.gov.au/get-support/kids-helpline'>Kids Helpline | National Office for Child Safety</a></p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re loving the show, leave us a review and share it with your family and friends!</p>
<p>_________________<br>
GTC Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p><br>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/6yyuqtravuzyfrcq/PART_2_-_SXSW_Live_Podcast_-_V10_1_9nlkz.mp3" length="22342963" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Content warning: This episode includes discussion involving imaged based abuse, child sexual abuse, violence and suicide. Please listen with care. If content raises anything for you, please seek support by contacting Lifeline on 13 11 14 or via the website https://www.lifeline.org.au/.
 
Sit down with us in the CyberCX lounge at SXSW as we interview the eSafety Commissioner, Julie Inman Grant. This episodes explores the critical work being done by eSafety which seeks to make the internet a safer place for all Australians. From tackling deep fakes to online harassment, this two-part interview sees us deep dive into the initiatives, policies and tools designed  to protect individuals in our increasingly connected world. Whether you're an educator, a parent, or simply an internet user, this episode is packed with insights and actionable advice.
 
Interview part two of two.
 
This episode is sponsored by CyberCX, Enjoy hearing about all things cyber here on the pod? Then maybe you should think about making the career switch into cyber security. There's no better place to begin this journey than with the CyberCX Academy. A paid, permanent full-time employment opportunity designed to launch your career in cyber security. No prior experience is necessary. Applications open here: CyberCX Academy
 
Stay up to date with the eSafety Commissioner on LinkedIn here:
eSafety Commissioner: Overview | LinkedIn
 
eSafety website:
Online safety | eSafety Commissioner
 
Other Mental Health Resources:
https://www.beyondblue.org.au/
 
Kids Helpline | National Office for Child Safety
Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re loving the show, leave us a review and share it with your family and friends!
_________________GTC Socials:
Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU 
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: https://www.facebook.com/groups/828589538834261/]]></itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1752</itunes:duration>
                <itunes:episode>15</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>14. Interview with the eSafety Commissioner - Julie Inman Grant PART 1</title>
        <itunes:title>14. Interview with the eSafety Commissioner - Julie Inman Grant PART 1</itunes:title>
        <link>https://girlstalkcyber.podbean.com/e/14-interview-with-the-esafety-commissioner-julie-inman-grant-part-1/</link>
                    <comments>https://girlstalkcyber.podbean.com/e/14-interview-with-the-esafety-commissioner-julie-inman-grant-part-1/#comments</comments>        <pubDate>Tue, 26 Nov 2024 23:18:19 +1000</pubDate>
        <guid isPermaLink="false">girlstalkcyber.podbean.com/b1e42e8c-d9ef-371b-9eb3-965ed0728ef9</guid>
                                    <description><![CDATA[<p>Content warning: This episode includes discussion involving imaged based abuse, child sexual abuse, violence and suicide. Please listen with care. If content raises anything for you, please seek support by contacting Lifeline on 13 11 14 or via the website <a href='https://www.lifeline.org.au/'>https://www.lifeline.org.au/</a>.</p>
<p> </p>
<p>Sit down with us in the CyberCX lounge at SXSW as we interview the eSafety Commissioner, Julie Inman Grant. This episodes explores the critical work being done by eSafety which seeks to make the internet a safer place for all Australians. From tackling deep fakes to online harassment, this two-part interview sees us deep dive into the initiatives, policies and tools designed  to protect individuals in our increasingly connected world. Whether you're an educator, a parent, or simply an internet user, this episode is packed with insights and actionable advice.</p>
<p> </p>
<p>Interview part one of two.</p>
<p> </p>
<p>This episode is sponsored by CyberCX, Enjoy hearing about all things cyber here on the pod? Then maybe you should think about making the career switch into cyber security. There's no better place to begin this journey than with the CyberCX Academy. A paid, permanent full-time employment opportunity designed to launch your career in cyber security. No prior experience is necessary. Applications open here: <a href='https://cybercx.com.au/cyber-security-academy-cybercx/'>CyberCX Academy</a></p>
<p> </p>
<p>Stay up to date with the eSafety Commissioner on LinkedIn here:</p>
<p><a href='https://www.linkedin.com/company/esafetyoffice/'>eSafety Commissioner: Overview | LinkedIn</a></p>
<p> </p>
<p>eSafety website:</p>
<p><a href='https://www.esafety.gov.au/'>Online safety | eSafety Commissioner</a></p>
<p> </p>
<p>Other Mental Health Resources:</p>
<p><a href='https://www.beyondblue.org.au/'>https://www.beyondblue.org.au/</a></p>
<p> </p>
<p><a href='https://www.childsafety.gov.au/get-support/kids-helpline'>Kids Helpline | National Office for Child Safety</a></p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re loving the show, leave us a review and share it with your family and friends!</p>
<p>_________________
GTC Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Content warning: This episode includes discussion involving imaged based abuse, child sexual abuse, violence and suicide. Please listen with care. If content raises anything for you, please seek support by contacting Lifeline on 13 11 14 or via the website <a href='https://www.lifeline.org.au/'>https://www.lifeline.org.au/</a>.</p>
<p> </p>
<p>Sit down with us in the CyberCX lounge at SXSW as we interview the eSafety Commissioner, Julie Inman Grant. This episodes explores the critical work being done by eSafety which seeks to make the internet a safer place for all Australians. From tackling deep fakes to online harassment, this two-part interview sees us deep dive into the initiatives, policies and tools designed  to protect individuals in our increasingly connected world. Whether you're an educator, a parent, or simply an internet user, this episode is packed with insights and actionable advice.</p>
<p> </p>
<p>Interview part one of two.</p>
<p> </p>
<p>This episode is sponsored by CyberCX, Enjoy hearing about all things cyber here on the pod? Then maybe you should think about making the career switch into cyber security. There's no better place to begin this journey than with the CyberCX Academy. A paid, permanent full-time employment opportunity designed to launch your career in cyber security. No prior experience is necessary. Applications open here: <a href='https://cybercx.com.au/cyber-security-academy-cybercx/'>CyberCX Academy</a></p>
<p> </p>
<p>Stay up to date with the eSafety Commissioner on LinkedIn here:</p>
<p><a href='https://www.linkedin.com/company/esafetyoffice/'>eSafety Commissioner: Overview | LinkedIn</a></p>
<p> </p>
<p>eSafety website:</p>
<p><a href='https://www.esafety.gov.au/'>Online safety | eSafety Commissioner</a></p>
<p> </p>
<p>Other Mental Health Resources:</p>
<p><a href='https://www.beyondblue.org.au/'>https://www.beyondblue.org.au/</a></p>
<p> </p>
<p><a href='https://www.childsafety.gov.au/get-support/kids-helpline'>Kids Helpline | National Office for Child Safety</a></p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re loving the show, leave us a review and share it with your family and friends!</p>
<p>_________________<br>
GTC Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p><br>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/7pui73hm8g7q2qys/PART_1_-_Live_Podcast_-_V108tfzt.mp3" length="20780509" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Content warning: This episode includes discussion involving imaged based abuse, child sexual abuse, violence and suicide. Please listen with care. If content raises anything for you, please seek support by contacting Lifeline on 13 11 14 or via the website https://www.lifeline.org.au/.
 
Sit down with us in the CyberCX lounge at SXSW as we interview the eSafety Commissioner, Julie Inman Grant. This episodes explores the critical work being done by eSafety which seeks to make the internet a safer place for all Australians. From tackling deep fakes to online harassment, this two-part interview sees us deep dive into the initiatives, policies and tools designed  to protect individuals in our increasingly connected world. Whether you're an educator, a parent, or simply an internet user, this episode is packed with insights and actionable advice.
 
Interview part one of two.
 
This episode is sponsored by CyberCX, Enjoy hearing about all things cyber here on the pod? Then maybe you should think about making the career switch into cyber security. There's no better place to begin this journey than with the CyberCX Academy. A paid, permanent full-time employment opportunity designed to launch your career in cyber security. No prior experience is necessary. Applications open here: CyberCX Academy
 
Stay up to date with the eSafety Commissioner on LinkedIn here:
eSafety Commissioner: Overview | LinkedIn
 
eSafety website:
Online safety | eSafety Commissioner
 
Other Mental Health Resources:
https://www.beyondblue.org.au/
 
Kids Helpline | National Office for Child Safety
Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re loving the show, leave us a review and share it with your family and friends!
_________________GTC Socials:
Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU 
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: https://www.facebook.com/groups/828589538834261/]]></itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1623</itunes:duration>
        <itunes:season>2</itunes:season>
        <itunes:episode>14</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>13. It All Starts On A Darknet Marketplace...</title>
        <itunes:title>13. It All Starts On A Darknet Marketplace...</itunes:title>
        <link>https://girlstalkcyber.podbean.com/e/13-it-all-starts-on-a-darknet-marketplace/</link>
                    <comments>https://girlstalkcyber.podbean.com/e/13-it-all-starts-on-a-darknet-marketplace/#comments</comments>        <pubDate>Sun, 13 Oct 2024 20:46:26 +1000</pubDate>
        <guid isPermaLink="false">girlstalkcyber.podbean.com/b0baa8f0-f242-3fee-a33e-021382e1f200</guid>
                                    <description><![CDATA[<p>In this episode we walk you through a timeline of how a criminal gets from point A to point B when they are pulling off a successful credential stuffing attack. And spoiler alert, it all starts on a darknet marketplace. Walk away feeling confident on how to protect yourself from a credential stuffing attack. </p>
<p> </p>
<p>We also sneak in a Fraud File segment where we unpack a listeners experience in a Meta account takeover and how they got it back. </p>
<p> </p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re loving the show, leave us a review and share it with your family and friends!</p>
<p>_________________</p>
<p>This episode is sponsored by CyberCX, the leading provider of professional cyber security and cloud services across Australia and New Zealand. With a workforce of over 1,400 professionals, CyberCX is a trusted partner to private and public sector organisations helping customers confidently manage cyber risk, respond to incidents and build resilience in an increasingly complex and challenging threat environment.</p>
<p>Find out more about how CyberCX can help your organisation by visiting <a href='https://cybercx.com.au/'>https://cybercx.com.au/</a> today. </p>
<p>_________________
Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode we walk you through a timeline of how a criminal gets from point A to point B when they are pulling off a successful credential stuffing attack. And spoiler alert, it all starts on a darknet marketplace. Walk away feeling confident on how to protect yourself from a credential stuffing attack. </p>
<p> </p>
<p>We also sneak in a Fraud File segment where we unpack a listeners experience in a Meta account takeover and how they got it back. </p>
<p> </p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re loving the show, leave us a review and share it with your family and friends!</p>
<p>_________________</p>
<p>This episode is sponsored by CyberCX, the leading provider of professional cyber security and cloud services across Australia and New Zealand. With a workforce of over 1,400 professionals, CyberCX is a trusted partner to private and public sector organisations helping customers confidently manage cyber risk, respond to incidents and build resilience in an increasingly complex and challenging threat environment.</p>
<p>Find out more about how CyberCX can help your organisation by visiting <a href='https://cybercx.com.au/'>https://cybercx.com.au/</a> today. </p>
<p>_________________<br>
Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p><br>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/sib3jgw5sh9iwv38/Final_Cred_Stuffing_Epbazz8.mp3" length="19227830" type="audio/mpeg"/>
        <itunes:summary>In this episode we walk you through a timeline of how a criminal gets from point A to point B when they are pulling off a successful credential stuffing attack. And spoiler alert, it all starts on the darknet marketplace. Walk away feeling confident on how to protect yourself from a credential stuffing attack. 
We also sneak in a Fraud File segment where we unpack a listeners experience in a Meta account takeover and how they got it back.</itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1312</itunes:duration>
        <itunes:season>2</itunes:season>
        <itunes:episode>13</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>12. Understanding Scams with Sham</title>
        <itunes:title>12. Understanding Scams with Sham</itunes:title>
        <link>https://girlstalkcyber.podbean.com/e/12-understanding-scams-with-sham/</link>
                    <comments>https://girlstalkcyber.podbean.com/e/12-understanding-scams-with-sham/#comments</comments>        <pubDate>Tue, 13 Aug 2024 19:08:33 +1000</pubDate>
        <guid isPermaLink="false">girlstalkcyber.podbean.com/1cb12604-609f-36a8-b6a4-b89aa3218522</guid>
                                    <description><![CDATA[<p>Ever wondered how scams really work? In this episode, we are joined by scam expert Shameela Gonzalez as we dive into the shady world of scammers. From pulling on heart strings to encouraging the purchase of questionable Taylor Swift tickets, nothing is off limits for these criminals. Let this episode be your guide on how to spot a scam and stay one step ahead of these cyber criminals and avoid their art of manipulation. </p>
<p>Links mentioned:</p>
<p>Report a scam: </p>
<p><a href='https://www.scamwatch.gov.au/report-a-scam'>https://www.scamwatch.gov.au/report-a-scam</a></p>
<p>Stop Think Protect ScamWatch:</p>
<p><a href='https://www.scamwatch.gov.au/stay-protected/help-to-spot-and-avoid-scams#toc-how-to-stay-protected'>https://www.scamwatch.gov.au/stay-protected/help-to-spot-and-avoid-scams#toc-how-to-stay-protected</a></p>
<p>Follow Shameela Gonzalez on LinkedIn here:</p>
<p><a href='https://www.linkedin.com/in/shameelagonzalez/'>https://www.linkedin.com/in/shameelagonzalez/</a></p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re loving the show, leave us a review and share it with your family and friends!</p>
<p>_________________
Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Ever wondered how scams really work? In this episode, we are joined by scam expert Shameela Gonzalez as we dive into the shady world of scammers. From pulling on heart strings to encouraging the purchase of questionable Taylor Swift tickets, nothing is off limits for these criminals. Let this episode be your guide on how to spot a scam and stay one step ahead of these cyber criminals and avoid their art of manipulation. </p>
<p>Links mentioned:</p>
<p>Report a scam: </p>
<p><a href='https://www.scamwatch.gov.au/report-a-scam'>https://www.scamwatch.gov.au/report-a-scam</a></p>
<p>Stop Think Protect ScamWatch:</p>
<p><a href='https://www.scamwatch.gov.au/stay-protected/help-to-spot-and-avoid-scams#toc-how-to-stay-protected'>https://www.scamwatch.gov.au/stay-protected/help-to-spot-and-avoid-scams#toc-how-to-stay-protected</a></p>
<p>Follow Shameela Gonzalez on LinkedIn here:</p>
<p><a href='https://www.linkedin.com/in/shameelagonzalez/'>https://www.linkedin.com/in/shameelagonzalez/</a></p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re loving the show, leave us a review and share it with your family and friends!</p>
<p>_________________<br>
Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p><br>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/7vedmvfyd6spx3si/Ep_12_-_Shameela_G_Interview_final8yng8.mp3" length="42997942" type="audio/mpeg"/>
        <itunes:summary>Ever wondered how scams really work? In this episode, we are joined by scam expert Shameela Gonzalez as we dive into the shady world of scammers. From pulling on heart strings to encouraging the purchase of questionable Taylor Swift tickets, nothing is off limits for these criminals. Let this episode be your guide on how to spot a scam and stay one step ahead of these cyber criminals and avoid their art of manipulation.</itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2976</itunes:duration>
        <itunes:season>2</itunes:season>
        <itunes:episode>12</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>11. Behind the scenes with a Digital Detective</title>
        <itunes:title>11. Behind the scenes with a Digital Detective</itunes:title>
        <link>https://girlstalkcyber.podbean.com/e/11-behind-the-scenes-with-a-digital-detective/</link>
                    <comments>https://girlstalkcyber.podbean.com/e/11-behind-the-scenes-with-a-digital-detective/#comments</comments>        <pubDate>Mon, 01 Jul 2024 10:19:26 +1000</pubDate>
        <guid isPermaLink="false">girlstalkcyber.podbean.com/f2d73aef-98bc-3af4-81d4-a7726e9c6e3e</guid>
                                    <description><![CDATA[<p>Who do you call when you are going through a cyber attack? The answer is someone like Claudia, a Digital Forensics and Incident Response investigator. In this episode Claudia takes us through a day in her life as an investigator, how she got into the industry and answers the arguably more important question, what is the funniest google search you’ve seen during an investigation. </p>
<p>Follow Claudia on LinkedIn here: <a href='https://www.linkedin.com/in/claudia-squire-a35505126/'>https://www.linkedin.com/in/claudia-squire-a35505126/</a></p>
<p>If you’re lucky you may get to catch her speaking at a conferences on the topic of Electron apps unplugged: Unveiling Digital Forensic treasures. </p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re loving the show, leave us a review and share it with your family and friends!</p>
<p>_________________</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Who do you call when you are going through a cyber attack? The answer is someone like Claudia, a Digital Forensics and Incident Response investigator. In this episode Claudia takes us through a day in her life as an investigator, how she got into the industry and answers the arguably more important question, what is the funniest google search you’ve seen during an investigation. </p>
<p>Follow Claudia on LinkedIn here: <a href='https://www.linkedin.com/in/claudia-squire-a35505126/'>https://www.linkedin.com/in/claudia-squire-a35505126/</a></p>
<p>If you’re lucky you may get to catch her speaking at a conferences on the topic of Electron apps unplugged: Unveiling Digital Forensic treasures. </p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re loving the show, leave us a review and share it with your family and friends!</p>
<p>_________________</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p><br>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/hhzwxpxyp44npedv/FINAL_Claudia_Episode_v9jqss.mp3" length="18913451" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Who do you call when you are going through a cyber attack? The answer is someone like Claudia, a Digital Forensics and Incident Response investigator. In this episode Claudia takes us through a day in her life as an investigator, how she got into the industry and answers the arguably more important question, what is the funniest google search you’ve seen during an investigation. 
Follow Claudia on LinkedIn here: https://www.linkedin.com/in/claudia-squire-a35505126/
If you’re lucky you may get to catch her speaking at a conferences on the topic of Electron apps unplugged: Unveiling Digital Forensic treasures. 
Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re loving the show, leave us a review and share it with your family and friends!
_________________
Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU 
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: https://www.facebook.com/groups/828589538834261/]]></itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1867</itunes:duration>
        <itunes:season>2</itunes:season>
        <itunes:episode>11</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>10. Vacay Mode Activated: Cyber on the go</title>
        <itunes:title>10. Vacay Mode Activated: Cyber on the go</itunes:title>
        <link>https://girlstalkcyber.podbean.com/e/10-vacay-mode-activated-cyber-on-the-go/</link>
                    <comments>https://girlstalkcyber.podbean.com/e/10-vacay-mode-activated-cyber-on-the-go/#comments</comments>        <pubDate>Wed, 12 Jun 2024 22:00:24 +1000</pubDate>
        <guid isPermaLink="false">girlstalkcyber.podbean.com/268604eb-1b13-3b10-9d02-e78712738fe9</guid>
                                    <description><![CDATA[<p>In this episode we give you some tips and tricks to stay cyber secure when you’re on the go, so you can say bon voyage to cyber criminals ruining your holiday. </p>
<p> </p>
<p>Connecting to public WiFi? Posting a boarding pass on your socials? Working on the train? Hold that thought, because we’ve got some wild stories to share that will help you understand the potential risks associated with these seemingly harmless actions.</p>
<p> </p>
<p>Article Mentioned: </p>
<p><a href='https://mango.pdf.zone/finding-former-australian-prime-minister-tony-abbotts-passport-number-on-instagram'>https://mango.pdf.zone/finding-former-australian-prime-minister-tony-abbotts-passport-number-on-instagram</a></p>
<p>_________________
</p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re loving the show, leave us a review and share it with your family and friends!</p>
<p>Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode we give you some tips and tricks to stay cyber secure when you’re on the go, so you can say bon voyage to cyber criminals ruining your holiday. </p>
<p> </p>
<p>Connecting to public WiFi? Posting a boarding pass on your socials? Working on the train? Hold that thought, because we’ve got some wild stories to share that will help you understand the potential risks associated with these seemingly harmless actions.</p>
<p> </p>
<p>Article Mentioned: </p>
<p><a href='https://mango.pdf.zone/finding-former-australian-prime-minister-tony-abbotts-passport-number-on-instagram'>https://mango.pdf.zone/finding-former-australian-prime-minister-tony-abbotts-passport-number-on-instagram</a></p>
<p>_________________<br>
</p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re loving the show, leave us a review and share it with your family and friends!</p>
<p>Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p><br>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/rw5nxqc5w28pjdhy/Episode_10_-_Vacy_Mode_Activated_-_Final_Final6l1jg.mp3" length="33561767" type="audio/mpeg"/>
        <itunes:summary>In this episode we give you some tips and tricks to stay cyber secure when you’re on the go, so you can say bon voyage to cyber criminals ruining your holiday. 

Connecting to public WiFi? Posting a boarding pass on your socials? Working on the train? Hold that thought, because we’ve got some wild stories to share that will help you understand the potential risks associated with these seemingly harmless actions.</itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1701</itunes:duration>
        <itunes:season>2</itunes:season>
        <itunes:episode>10</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <itunes:image href="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog16537622/Ep10.jpg" />    </item>
    <item>
        <title>09. What happens in Vegas, doesn't always stay in Vegas</title>
        <itunes:title>09. What happens in Vegas, doesn't always stay in Vegas</itunes:title>
        <link>https://girlstalkcyber.podbean.com/e/what-happens-in-vegas-doesnt-always-stay-in-vegas/</link>
                    <comments>https://girlstalkcyber.podbean.com/e/what-happens-in-vegas-doesnt-always-stay-in-vegas/#comments</comments>        <pubDate>Mon, 20 May 2024 22:04:32 +1000</pubDate>
        <guid isPermaLink="false">girlstalkcyber.podbean.com/cf73a8d6-b8c7-3a1a-9089-922ea1ea5332</guid>
                                    <description><![CDATA[<p>One of the largest casino chains in Las Vegas, MGM Grand, became paralysed after they were hit by a ransomware attack in September 2023. The bustling casino floor was unrecognisable as casino slot machines, hotels, restaurants and more were disconnected for allegedly 10 days in one of the biggest cyber attacks of our time. Who was responsible? How did they do it? Did cyber criminals really tell a $33.9 trillion dollar company to “grow a pair” and pay them? Tune in to this episode to find out. </p>
<p>GTC’s new segment, Cyber Scandal, looks to unpack cyber hacks and untangle any tech jargon surrounding them so you can lean in and understand these stranger than fictions stories with little to no prior cyber security knowledge. We hope you enjoy this new segment as much as we do!</p>
<p>_________________</p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re loving the show, leave us a review and share it with your family and friends!</p>
<p>Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
<p>_________________</p>
<p>Resources:</p>
<p>ThriveDX: <a href='https://thrivedx.com/resources/article/investigating-the-mgm-cyberattack-how-social-engineering-and-a-help-desk-put-the-whole-strip-at-risk'>https://thrivedx.com/resources/article/investigating-the-mgm-cyberattack-how-social-engineering-and-a-help-desk-put-the-whole-strip-at-risk</a></p>
<p>SpecOps: <a href='https://specopssoft.com/blog/mgm-resorts-service-desk-hack/'>https://specopssoft.com/blog/mgm-resorts-service-desk-hack/</a></p>
<p>8news: <a href='https://www.8newsnow.com/news/local-news/mgm-hack-by-ransomware-group-social-media-post-says/'>https://www.8newsnow.com/news/local-news/mgm-hack-by-ransomware-group-social-media-post-says/</a></p>
<p>Verge: <a href='https://www.theverge.com/2023/9/21/23883920/mgm-resorts-hack-recovery-hotels'>https://www.theverge.com/2023/9/21/23883920/mgm-resorts-hack-recovery-hotels</a></p>
<p>Cyber Security Hub: <a href='https://www.cshub.com/attacks/news/a-full-timeline-of-the-mgm-resorts-cyber-attack'>https://www.cshub.com/attacks/news/a-full-timeline-of-the-mgm-resorts-cyber-attack</a></p>
<p>Vox: <a href='https://www.vox.com/technology/2023/9/15/23875113/mgm-hack-casino-vishing-cybersecurity-ransomware'>https://www.vox.com/technology/2023/9/15/23875113/mgm-hack-casino-vishing-cybersecurity-ransomware</a></p>
<p>Cyber Security News <a href='https://cybernews.com/security/mgm-caesars-ransomware-attack-timeline/'>https://cybernews.com/security/mgm-caesars-ransomware-attack-timeline/</a></p>
<p>Report a cyber incident: <a href='https://www.cyber.gov.au/report-and-recover/report'>https://www.cyber.gov.au/report-and-recover/report</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>One of the largest casino chains in Las Vegas, MGM Grand, became paralysed after they were hit by a ransomware attack in September 2023. The bustling casino floor was unrecognisable as casino slot machines, hotels, restaurants and more were disconnected for allegedly 10 days in one of the biggest cyber attacks of our time. Who was responsible? How did they do it? Did cyber criminals really tell a $33.9 trillion dollar company to “grow a pair” and pay them? Tune in to this episode to find out. </p>
<p>GTC’s new segment, Cyber Scandal, looks to unpack cyber hacks and untangle any tech jargon surrounding them so you can lean in and understand these stranger than fictions stories with little to no prior cyber security knowledge. We hope you enjoy this new segment as much as we do!</p>
<p>_________________</p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re loving the show, leave us a review and share it with your family and friends!</p>
<p>Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p><br>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
<p>_________________</p>
<p>Resources:</p>
<p>ThriveDX: <a href='https://thrivedx.com/resources/article/investigating-the-mgm-cyberattack-how-social-engineering-and-a-help-desk-put-the-whole-strip-at-risk'>https://thrivedx.com/resources/article/investigating-the-mgm-cyberattack-how-social-engineering-and-a-help-desk-put-the-whole-strip-at-risk</a></p>
<p>SpecOps: <a href='https://specopssoft.com/blog/mgm-resorts-service-desk-hack/'>https://specopssoft.com/blog/mgm-resorts-service-desk-hack/</a></p>
<p>8news: <a href='https://www.8newsnow.com/news/local-news/mgm-hack-by-ransomware-group-social-media-post-says/'>https://www.8newsnow.com/news/local-news/mgm-hack-by-ransomware-group-social-media-post-says/</a></p>
<p>Verge: <a href='https://www.theverge.com/2023/9/21/23883920/mgm-resorts-hack-recovery-hotels'>https://www.theverge.com/2023/9/21/23883920/mgm-resorts-hack-recovery-hotels</a></p>
<p>Cyber Security Hub: <a href='https://www.cshub.com/attacks/news/a-full-timeline-of-the-mgm-resorts-cyber-attack'>https://www.cshub.com/attacks/news/a-full-timeline-of-the-mgm-resorts-cyber-attack</a></p>
<p>Vox: <a href='https://www.vox.com/technology/2023/9/15/23875113/mgm-hack-casino-vishing-cybersecurity-ransomware'>https://www.vox.com/technology/2023/9/15/23875113/mgm-hack-casino-vishing-cybersecurity-ransomware</a></p>
<p>Cyber Security News <a href='https://cybernews.com/security/mgm-caesars-ransomware-attack-timeline/'>https://cybernews.com/security/mgm-caesars-ransomware-attack-timeline/</a></p>
<p>Report a cyber incident: <a href='https://www.cyber.gov.au/report-and-recover/report'>https://www.cyber.gov.au/report-and-recover/report</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/nfp9xrzyj3ite5hj/240520v2.mp3" length="22088894" type="audio/mpeg"/>
        <itunes:summary>One of the largest casino chains in Las Vegas, MGM Grand, became paralysed after they were hit by a ransomware attack in September 2023. The bustling casino floor was unrecognisable as casino slot machines, hotels, restaurants and more were disconnected for allegedly 10 days in one of the biggest cyber attacks of our time. Who was responsible? How did they do it? Did cyber criminals really tell a $33.9 trillion dollar company to “grow a pair” and pay them? Tune in to this episode to find out.</itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1512</itunes:duration>
        <itunes:season>2</itunes:season>
        <itunes:episode>9</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>08. Hackers can be good guys too</title>
        <itunes:title>08. Hackers can be good guys too</itunes:title>
        <link>https://girlstalkcyber.podbean.com/e/hackers-can-be-good-guys-too/</link>
                    <comments>https://girlstalkcyber.podbean.com/e/hackers-can-be-good-guys-too/#comments</comments>        <pubDate>Fri, 15 Sep 2023 09:57:02 +1000</pubDate>
        <guid isPermaLink="false">girlstalkcyber.podbean.com/764595ce-a3ff-3371-a889-1a2700d3a983</guid>
                                    <description><![CDATA[
Ethical hacking. Two words that can’t possibly go together right?  How can hacking be an ethical activity? 
 
Well in this episode we are joined by cyber security professional and ethical hacker, Vikki Grouios who proves hacking with a conscious is possible. Vikki has dedicated her career to testing systems, breaking into client networks and securing organisations and communities. Vikki has also featured on Season 1 and 2 of the latest hit show Hunted where viewers were able to see her skills in action.. 
 
In this episode Vikki shares some of her stories and experiences in this role and break down some buzzwords in this position. 
 
To bring it back to the listeners, Vikki also gives us some tips and tricks for our Cyber Queens, including developing a different online identity for non essential accounts. 
 
Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re digging the show, leave us a review and share it with your family and friends!
 
Show Resources: 
Have I been Pwned: https://haveibeenpwned.com/
_________________
 
Socials:
 
Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU 
 
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: https://www.facebook.com/groups/828589538834261/

 ]]></description>
                                                            <content:encoded><![CDATA[
Ethical hacking. Two words that can’t possibly go together right?  How can hacking be an ethical activity? 
 
Well in this episode we are joined by cyber security professional and ethical hacker, Vikki Grouios who proves hacking with a conscious is possible. Vikki has dedicated her career to testing systems, breaking into client networks and securing organisations and communities. Vikki has also featured on Season 1 and 2 of the latest hit show Hunted where viewers were able to see her skills in action.. 
 
In this episode Vikki shares some of her stories and experiences in this role and break down some buzzwords in this position. 
 
To bring it back to the listeners, Vikki also gives us some tips and tricks for our Cyber Queens, including developing a different online identity for non essential accounts. 
 
Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re digging the show, leave us a review and share it with your family and friends!
 
Show Resources: 
Have I been Pwned: https://haveibeenpwned.com/
_________________
 
Socials:
 
Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU 
 
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: https://www.facebook.com/groups/828589538834261/

 ]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/a28fcs/Final_Edit_v108pjck.mp3" length="19800405" type="audio/mpeg"/>
        <itunes:summary><![CDATA[
Ethical hacking. Two words that can’t possibly go together right?  How can hacking be an ethical activity? 
 
Well in this episode we are joined by cyber security professional and ethical hacker, Vikki Grouios who proves hacking with a conscious is possible. Vikki has dedicated her career to testing systems, breaking into client networks and securing organisations and communities. Vikki has also featured on Season 1 and 2 of the latest hit show Hunted where viewers were able to see her skills in action.. 
 
In this episode Vikki shares some of her stories and experiences in this role and break down some buzzwords in this position. 
 
To bring it back to the listeners, Vikki also gives us some tips and tricks for our Cyber Queens, including developing a different online identity for non essential accounts. 
 
Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re digging the show, leave us a review and share it with your family and friends!
 
Show Resources: 
Have I been Pwned: https://haveibeenpwned.com/
_________________
 
Socials:
 
Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU 
 
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: https://www.facebook.com/groups/828589538834261/

 ]]></itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1556</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>8</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>07. Unveiling the cyber heroes who defend our digital world</title>
        <itunes:title>07. Unveiling the cyber heroes who defend our digital world</itunes:title>
        <link>https://girlstalkcyber.podbean.com/e/unveiling-the-cyber-heroes-who-defend-our-digital-world/</link>
                    <comments>https://girlstalkcyber.podbean.com/e/unveiling-the-cyber-heroes-who-defend-our-digital-world/#comments</comments>        <pubDate>Wed, 16 Aug 2023 05:30:28 +1000</pubDate>
        <guid isPermaLink="false">girlstalkcyber.podbean.com/66f257a2-89d5-36ee-9c2d-04d02df1ff97</guid>
                                    <description><![CDATA[<p>So cyber, does it involve the mysterious bunkers just like the movies? Well, not quite.. But defensive cyber does share some similarities. </p>
<p> </p>
<p>In this episode you can expect to hear a breakdown of what defensive cyber actually is and what it looks like in the real world. We shine a light on our unsung, defensive cyber security heroes and professionals and chat about what they can get up to on the daily, as well as bringing it back to what’s relevant for you, and learning some hot tips on how you can boost your own cyber defences. </p>
<p> </p>
<p>We jump back to one of our favourite segments, The Fraud Files, and check out an online shopping scam sent-in from a listener and discuss what you can learn from the situation.  </p>
<p> </p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re digging the show, leave us a review and share it with your family and friends!</p>
<p> </p>
<p>Show Resources: </p>
<p>Report a cyber incident: <a href='https://www.cyber.gov.au/report-and-recover/report'>https://www.cyber.gov.au/report-and-recover/report</a></p>
<p>_________________</p>
<p> </p>
<p>Socials:</p>
<p> </p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p> </p>
<p>Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a> </p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>So cyber, does it involve the mysterious bunkers just like the movies? Well, not quite.. But defensive cyber does share some similarities. </p>
<p> </p>
<p>In this episode you can expect to hear a breakdown of what defensive cyber actually is and what it looks like in the real world. We shine a light on our unsung, defensive cyber security heroes and professionals and chat about what they can get up to on the daily, as well as bringing it back to what’s relevant for you, and learning some hot tips on how you can boost your own cyber defences. </p>
<p> </p>
<p>We jump back to one of our favourite segments, The Fraud Files, and check out an online shopping scam sent-in from a listener and discuss what you can learn from the situation.  </p>
<p> </p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re digging the show, leave us a review and share it with your family and friends!</p>
<p> </p>
<p>Show Resources: </p>
<p>Report a cyber incident: <a href='https://www.cyber.gov.au/report-and-recover/report'>https://www.cyber.gov.au/report-and-recover/report</a></p>
<p>_________________</p>
<p> </p>
<p>Socials:</p>
<p> </p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p> </p>
<p>Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a> </p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/aq8u2h/Episode_7_Defensive_Cyber_V2a2xd0.mp3" length="25747677" type="audio/mpeg"/>
        <itunes:summary><![CDATA[So cyber, does it involve the mysterious bunkers just like the movies? Well, not quite.. But defensive cyber does share some similarities. 
 
In this episode you can expect to hear a breakdown of what defensive cyber actually is and what it looks like in the real world. We shine a light on our unsung, defensive cyber security heroes and professionals and chat about what they can get up to on the daily, as well as bringing it back to what’s relevant for you, and learning some hot tips on how you can boost your own cyber defences. 
 
We jump back to one of our favourite segments, The Fraud Files, and check out an online shopping scam sent-in from a listener and discuss what you can learn from the situation.  
 
Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re digging the show, leave us a review and share it with your family and friends!
 
Show Resources: 
Report a cyber incident: https://www.cyber.gov.au/report-and-recover/report
_________________
 
Socials:
 
Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU 
 
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: https://www.facebook.com/groups/828589538834261/ 
 ]]></itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1302</itunes:duration>
                <itunes:episode>7</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>06. Expert Insights: Chatting with a top cyber security executive</title>
        <itunes:title>06. Expert Insights: Chatting with a top cyber security executive</itunes:title>
        <link>https://girlstalkcyber.podbean.com/e/expert-insights-chatting-with-a-top-security-executive/</link>
                    <comments>https://girlstalkcyber.podbean.com/e/expert-insights-chatting-with-a-top-security-executive/#comments</comments>        <pubDate>Thu, 10 Aug 2023 16:46:02 +1000</pubDate>
        <guid isPermaLink="false">girlstalkcyber.podbean.com/1b519013-1399-38e6-ba20-40f32f238239</guid>
                                    <description><![CDATA[<p>Today we are joined by an expert in cyber security, Shireen Syed, the University of Newcastle’s Chief Information Security Officer (CISO). Shireen’s job is to not only help secure students and teachers but so many elements in between including cyber security strategy and incident response. Shireen gives us a rundown of what her day-to-day looks like, what is expected of her in her role as CISO and walks us through her career path leading up to this position.</p>
<p>We learn about the unique challenges a university faces when securing their environment - with bespoke gadgets and intellectual property being developed, where do you start trying to secure these?</p>
<p>Finally, Shireen shares her perspective on how exciting the cyber security industry is and promotes how to get women interested and engaged in cyber. Shireen also gives our listeners some tips on staying safe online. We hope you enjoy!</p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re digging the show, leave us a review and share it with your family and friends.</p>
<p>_________________</p>
<p>Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p> </p>
<p>Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a> </p>
<p> </p>
<p>Report a cyber incident: </p>
<p><a href='https://www.cyber.gov.au/report-and-recover/report'>https://www.cyber.gov.au/report-and-recover/report</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Today we are joined by an expert in cyber security, Shireen Syed, the University of Newcastle’s Chief Information Security Officer (CISO). Shireen’s job is to not only help secure students and teachers but so many elements in between including cyber security strategy and incident response. Shireen gives us a rundown of what her day-to-day looks like, what is expected of her in her role as CISO and walks us through her career path leading up to this position.</p>
<p>We learn about the unique challenges a university faces when securing their environment - with bespoke gadgets and intellectual property being developed, where do you start trying to secure these?</p>
<p>Finally, Shireen shares her perspective on how exciting the cyber security industry is and promotes how to get women interested and engaged in cyber. Shireen also gives our listeners some tips on staying safe online. We hope you enjoy!</p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re digging the show, leave us a review and share it with your family and friends.</p>
<p>_________________</p>
<p>Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p> </p>
<p>Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a> </p>
<p> </p>
<p>Report a cyber incident: </p>
<p><a href='https://www.cyber.gov.au/report-and-recover/report'>https://www.cyber.gov.au/report-and-recover/report</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/qmii6x/Ep6ShireenInteerview.mp3" length="21457635" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Today we are joined by an expert in cyber security, Shireen Syed, the University of Newcastle’s Chief Information Security Officer (CISO). Shireen’s job is to not only help secure students and teachers but so many elements in between including cyber security strategy and incident response. Shireen gives us a rundown of what her day-to-day looks like, what is expected of her in her role as CISO and walks us through her career path leading up to this position.
We learn about the unique challenges a university faces when securing their environment - with bespoke gadgets and intellectual property being developed, where do you start trying to secure these?
Finally, Shireen shares her perspective on how exciting the cyber security industry is and promotes how to get women interested and engaged in cyber. Shireen also gives our listeners some tips on staying safe online. We hope you enjoy!
Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re digging the show, leave us a review and share it with your family and friends.
_________________
Socials:
Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU 
 
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: https://www.facebook.com/groups/828589538834261/ 
 
Report a cyber incident: 
https://www.cyber.gov.au/report-and-recover/report]]></itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1661</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>6</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>05. Piecing together your online footprint with OSINT</title>
        <itunes:title>05. Piecing together your online footprint with OSINT</itunes:title>
        <link>https://girlstalkcyber.podbean.com/e/piecing-together-your-online-footprint-with-osint/</link>
                    <comments>https://girlstalkcyber.podbean.com/e/piecing-together-your-online-footprint-with-osint/#comments</comments>        <pubDate>Thu, 03 Aug 2023 22:15:26 +1000</pubDate>
        <guid isPermaLink="false">girlstalkcyber.podbean.com/f0c988f1-7cf2-377a-9f31-ebe7ac3ad252</guid>
                                    <description><![CDATA[<p>What information about you resides on the internet today that anyone can access? In this episode we give you the tools to answer that question and walk you through the definition of Open Source Intelligence (OSINT). </p>
<p>We look at how it can benefit our lives and how it can also be used in a borderline creepy way. Jules and I also give you some tools to perform OSINT on yourself, and while it may be confronting to see a bunch of information about yourself strewn across the internet, we believe if the bad guys know it exists, you should too. </p>
<p>Finally with all this being said and done, we run you through some tips on how to protect your privacy whilst still existing in the online world.</p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re digging the show, leave us a review and share it with your family and friends!</p>
<p>_________________</p>
<p>Show Resources: </p>
<p>Have I Been Pwned </p>
<p><a href='https://haveibeenpwned.com/'>https://haveibeenpwned.com/</a></p>
<p>Account Analysis</p>
<p><a href='https://accountanalysis.app/'>https://accountanalysis.app/</a></p>
<p>OSINT SnapMaps </p>
<p><a href='https://www.osintcurio.us/2020/04/13/using-snapchat-for-osint-10-minute-tip/'>https://www.osintcurio.us/2020/04/13/using-snapchat-for-osint-10-minute-tip/</a></p>
<p>Maltego</p>
<p><a href='https://www.maltego.com/'>https://www.maltego.com/</a></p>
<p>Facebook privacy restrictions</p>
<p><a href='https://www.facebook.com/help/193677450678703'>https://www.facebook.com/help/193677450678703</a></p>
<p>LinkedIn privacy restrictions</p>
<p><a href='https://www.linkedin.com/help/linkedin/answer/a1338877/understanding-your-privacy-settings?lang=en'>https://www.linkedin.com/help/linkedin/answer/a1338877/understanding-your-privacy-settings?lang=en</a></p>
<p>Privacy with google</p>
<p><a href='https://www.mbsdirect.com/mbs-blog/article-what-is-google-web-app-activity-and-should-you-leave-it-enabled'>https://www.mbsdirect.com/mbs-blog/article-what-is-google-web-app-activity-and-should-you-leave-it-enabled</a></p>
<p>   </p>
<p>Report a cyber incident: <a href='https://www.cyber.gov.au/report-and-recover/report'>https://www.cyber.gov.au/report-and-recover/report</a></p>
<p>_________________</p>
<p>Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>What information about you resides on the internet today that anyone can access? In this episode we give you the tools to answer that question and walk you through the definition of Open Source Intelligence (OSINT). </p>
<p>We look at how it can benefit our lives and how it can also be used in a borderline creepy way. Jules and I also give you some tools to perform OSINT on yourself, and while it may be confronting to see a bunch of information about yourself strewn across the internet, we believe if the bad guys know it exists, you should too. </p>
<p>Finally with all this being said and done, we run you through some tips on how to protect your privacy whilst still existing in the online world.</p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re digging the show, leave us a review and share it with your family and friends!</p>
<p>_________________</p>
<p>Show Resources: </p>
<p>Have I Been Pwned </p>
<p><a href='https://haveibeenpwned.com/'>https://haveibeenpwned.com/</a></p>
<p>Account Analysis</p>
<p><a href='https://accountanalysis.app/'>https://accountanalysis.app/</a></p>
<p>OSINT SnapMaps </p>
<p><a href='https://www.osintcurio.us/2020/04/13/using-snapchat-for-osint-10-minute-tip/'>https://www.osintcurio.us/2020/04/13/using-snapchat-for-osint-10-minute-tip/</a></p>
<p>Maltego</p>
<p><a href='https://www.maltego.com/'>https://www.maltego.com/</a></p>
<p>Facebook privacy restrictions</p>
<p><a href='https://www.facebook.com/help/193677450678703'>https://www.facebook.com/help/193677450678703</a></p>
<p>LinkedIn privacy restrictions</p>
<p><a href='https://www.linkedin.com/help/linkedin/answer/a1338877/understanding-your-privacy-settings?lang=en'>https://www.linkedin.com/help/linkedin/answer/a1338877/understanding-your-privacy-settings?lang=en</a></p>
<p>Privacy with google</p>
<p><a href='https://www.mbsdirect.com/mbs-blog/article-what-is-google-web-app-activity-and-should-you-leave-it-enabled'>https://www.mbsdirect.com/mbs-blog/article-what-is-google-web-app-activity-and-should-you-leave-it-enabled</a></p>
<p>   </p>
<p>Report a cyber incident: <a href='https://www.cyber.gov.au/report-and-recover/report'>https://www.cyber.gov.au/report-and-recover/report</a></p>
<p>_________________</p>
<p>Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p><br>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/pvifnx/Episode_5_v17468h.mp3" length="20565026" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What information about you resides on the internet today that anyone can access? In this episode we give you the tools to answer that question and walk you through the definition of Open Source Intelligence (OSINT). 
We look at how it can benefit our lives and how it can also be used in a borderline creepy way. Jules and I also give you some tools to perform OSINT on yourself, and while it may be confronting to see a bunch of information about yourself strewn across the internet, we believe if the bad guys know it exists, you should too. 
Finally with all this being said and done, we run you through some tips on how to protect your privacy whilst still existing in the online world.
Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re digging the show, leave us a review and share it with your family and friends!
_________________
Show Resources: 
Have I Been Pwned 
https://haveibeenpwned.com/
Account Analysis
https://accountanalysis.app/
OSINT SnapMaps 
https://www.osintcurio.us/2020/04/13/using-snapchat-for-osint-10-minute-tip/
Maltego
https://www.maltego.com/
Facebook privacy restrictions
https://www.facebook.com/help/193677450678703
LinkedIn privacy restrictions
https://www.linkedin.com/help/linkedin/answer/a1338877/understanding-your-privacy-settings?lang=en
Privacy with google
https://www.mbsdirect.com/mbs-blog/article-what-is-google-web-app-activity-and-should-you-leave-it-enabled
   
Report a cyber incident: https://www.cyber.gov.au/report-and-recover/report
_________________
Socials:
Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU 
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: https://www.facebook.com/groups/828589538834261/ ]]></itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1358</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>5</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>04. Who are the bad guys and how can they get to you?</title>
        <itunes:title>04. Who are the bad guys and how can they get to you?</itunes:title>
        <link>https://girlstalkcyber.podbean.com/e/who-are-the-bad-guys-and-how-can-they-get-to-you/</link>
                    <comments>https://girlstalkcyber.podbean.com/e/who-are-the-bad-guys-and-how-can-they-get-to-you/#comments</comments>        <pubDate>Wed, 26 Jul 2023 07:11:32 +1000</pubDate>
        <guid isPermaLink="false">girlstalkcyber.podbean.com/b43fa222-b0a4-374b-9e70-a610987a1e18</guid>
                                    <description><![CDATA[<p>Today we take you through the rumblings of a cyber attack. How does it start and what does it look like? By the end of the episode you’ll be able to identify and avoid cyber threats quicker than you can say GTC.</p>
<p>We also take a look at who is behind these cyber attacks. The type of people sitting behind a computer, pulling these attacks off, may surprise you.</p>
<p>From phishing to "J-elena" (Justin and Selena) references, this episode has everything you need to understand ransomware headlines and protect yourself from cyber attacks. Let’s redefine how you act online.</p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re digging the show, leave us a review and share it with your family and friends!</p>
<p>Show Resources:</p>
<p>Report a cyber incident: <a href='https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.cyber.gov.au%2Freport-and-recover%2Freport%3Ffbclid%3DIwAR2lCrzVwmpwC_2BONhH3wJuLz5gAnllKnQNnuigL5EKT_hiw5YtvkolOME&amp;h=AT2dr4l8BjWha8bBFN7BOBYt5qL4w0kp75m5eycDcAIaat4QFnpLT9rKGhMhT57Am50LbmCQxgfHr38cMbwIxYCj7TwtKvfYX55UCGmfx37d__x83HltLplu1XxyrN6OIDEN1tgKDugalx3V26nPAQ'>https://www.cyber.gov.au/report-and-recover/report</a> _______________</p>
<p>Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.instagram.com%2Fgirlstalkcyber%2F%3Ffbclid%3DIwAR0xnw8Etn4XdovHZmP2H7VdALMIRC_n78EQJz8YN_MwMpyqNCtbnE_a6FE&amp;h=AT2dr4l8BjWha8bBFN7BOBYt5qL4w0kp75m5eycDcAIaat4QFnpLT9rKGhMhT57Am50LbmCQxgfHr38cMbwIxYCj7TwtKvfYX55UCGmfx37d__x83HltLplu1XxyrN6OIDEN1tgKDugalx3V26nPAQ'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a></p>
<p>Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Today we take you through the rumblings of a cyber attack. How does it start and what does it look like? By the end of the episode you’ll be able to identify and avoid cyber threats quicker than you can say GTC.</p>
<p>We also take a look at who is behind these cyber attacks. The type of people sitting behind a computer, pulling these attacks off, may surprise you.</p>
<p>From phishing to "J-elena" (Justin and Selena) references, this episode has everything you need to understand ransomware headlines and protect yourself from cyber attacks. Let’s redefine how you act online.</p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re digging the show, leave us a review and share it with your family and friends!</p>
<p>Show Resources:</p>
<p>Report a cyber incident: <a href='https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.cyber.gov.au%2Freport-and-recover%2Freport%3Ffbclid%3DIwAR2lCrzVwmpwC_2BONhH3wJuLz5gAnllKnQNnuigL5EKT_hiw5YtvkolOME&amp;h=AT2dr4l8BjWha8bBFN7BOBYt5qL4w0kp75m5eycDcAIaat4QFnpLT9rKGhMhT57Am50LbmCQxgfHr38cMbwIxYCj7TwtKvfYX55UCGmfx37d__x83HltLplu1XxyrN6OIDEN1tgKDugalx3V26nPAQ'>https://www.cyber.gov.au/report-and-recover/report</a> <em>_______________</em></p>
<p>Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.instagram.com%2Fgirlstalkcyber%2F%3Ffbclid%3DIwAR0xnw8Etn4XdovHZmP2H7VdALMIRC_n78EQJz8YN_MwMpyqNCtbnE_a6FE&amp;h=AT2dr4l8BjWha8bBFN7BOBYt5qL4w0kp75m5eycDcAIaat4QFnpLT9rKGhMhT57Am50LbmCQxgfHr38cMbwIxYCj7TwtKvfYX55UCGmfx37d__x83HltLplu1XxyrN6OIDEN1tgKDugalx3V26nPAQ'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a></p>
<p>Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/n29k3p/Ep_4_v46y6p3.mp3" length="26560477" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Today we take you through the rumblings of a cyber attack. How does it start and what does it look like? By the end of the episode you’ll be able to identify and avoid cyber threats quicker than you can say GTC.
We also take a look at who is behind these cyber attacks. The type of people sitting behind a computer, pulling these attacks off, may surprise you.
From phishing to "J-elena" (Justin and Selena) references, this episode has everything you need to understand ransomware headlines and protect yourself from cyber attacks. Let’s redefine how you act online.
Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re digging the show, leave us a review and share it with your family and friends!
Show Resources:
Report a cyber incident: https://www.cyber.gov.au/report-and-recover/report _______________
Socials:
Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: https://www.facebook.com/groups/828589538834261/]]></itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1216</itunes:duration>
                <itunes:episode>4</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>03. Shining a light on the dark web</title>
        <itunes:title>03. Shining a light on the dark web</itunes:title>
        <link>https://girlstalkcyber.podbean.com/e/shining-a-light-on-the-dark-web/</link>
                    <comments>https://girlstalkcyber.podbean.com/e/shining-a-light-on-the-dark-web/#comments</comments>        <pubDate>Wed, 19 Jul 2023 09:24:35 +1000</pubDate>
        <guid isPermaLink="false">girlstalkcyber.podbean.com/7617104a-b706-3536-ba82-4dda8fa942c1</guid>
                                    <description><![CDATA[<p>Have you ever heard of the dark web and want to know more? Well you're in luck because in this episode we are joined by a special guest, a cyber intelligence expert from CyberCX, Leah Pinto. Join us as we chat to Leah to decode this space for our GTC Community and answer the questions - what is the dark web, what is it used for, how anonymous can you be when using it, and how onions and the dark web are related.</p>
<p>DISCLAIMER</p>
<p>Girls Talk Cyber does not encourage or endorse accessing or using the dark web for illegitimate purposes. Without adequate understanding of its capability, risks and vulnerabilities, it is advised those not requiring it for legitimate, professional reasons do not attempt to engage with it. </p>
<p>_________________
</p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you are digging the show, leave us a review and share it with your family and friends!</p>
<p>Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
<p> </p>
<p>Report a cyber incident: <a href='https://www.cyber.gov.au/report-and-recover/report'>https://www.cyber.gov.au/report-and-recover/report</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Have you ever heard of the dark web and want to know more? Well you're in luck because in this episode we are joined by a special guest, a cyber intelligence expert from CyberCX, Leah Pinto. Join us as we chat to Leah to decode this space for our GTC Community and answer the questions - what is the dark web, what is it used for, how anonymous can you be when using it, and how onions and the dark web are related.</p>
<p>DISCLAIMER</p>
<p>Girls Talk Cyber does not encourage or endorse accessing or using the dark web for illegitimate purposes. Without adequate understanding of its capability, risks and vulnerabilities, it is advised those not requiring it for legitimate, professional reasons do not attempt to engage with it. </p>
<p>_________________<br>
</p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you are digging the show, leave us a review and share it with your family and friends!</p>
<p>Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p><br>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
<p> </p>
<p>Report a cyber incident: <a href='https://www.cyber.gov.au/report-and-recover/report'>https://www.cyber.gov.au/report-and-recover/report</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/3mqmz5/Episode_3_v106z1xw.mp3" length="30598802" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Have you ever heard of the dark web and want to know more? Well you're in luck because in this episode we are joined by a special guest, a cyber intelligence expert from CyberCX, Leah Pinto. Join us as we chat to Leah to decode this space for our GTC Community and answer the questions - what is the dark web, what is it used for, how anonymous can you be when using it, and how onions and the dark web are related.
DISCLAIMER
Girls Talk Cyber does not encourage or endorse accessing or using the dark web for illegitimate purposes. Without adequate understanding of its capability, risks and vulnerabilities, it is advised those not requiring it for legitimate, professional reasons do not attempt to engage with it. 
_________________
Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you are digging the show, leave us a review and share it with your family and friends!
Socials:
Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU 
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: https://www.facebook.com/groups/828589538834261/
 
Report a cyber incident: https://www.cyber.gov.au/report-and-recover/report]]></itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1429</itunes:duration>
                <itunes:episode>3</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>02. What to do if you were involved in a data breach</title>
        <itunes:title>02. What to do if you were involved in a data breach</itunes:title>
        <link>https://girlstalkcyber.podbean.com/e/what-to-do-if-you-were-involved-in-a-data-breach/</link>
                    <comments>https://girlstalkcyber.podbean.com/e/what-to-do-if-you-were-involved-in-a-data-breach/#comments</comments>        <pubDate>Tue, 11 Jul 2023 20:45:17 +1000</pubDate>
        <guid isPermaLink="false">girlstalkcyber.podbean.com/9b91c2d2-bb13-328f-bfb2-53eeac93210a</guid>
                                    <description><![CDATA[<p>We've all seen the headlines recently "Aussie Company Hit With Data Breach" or "Major Firm Left Scrambling After Major Data Leak". It can feel overwhelming knowing what to do next, and you may be asking yourself the question, is there anything I can do to protect myself? The answer is yes, in this episode we are going to help you run through our GTC check list of what to do after a data breach to secure your online footprint. With your details in the hands of criminals, let's redefine how you act online. </p>
<p>Show Resources: </p>
<p>Password Managers We Recommend</p>
<p>LastPass (Free and Paid Versions Available); <a href='https://www.lastpass.com/'>https://www.lastpass.com/</a></p>
<p>1Password (USD dollars); <a href='https://1password.com/'>https://1password.com/</a></p>
<p>Report a cyber incident: <a href='https://www.cyber.gov.au/report-and-recover/report'>https://www.cyber.gov.au/report-and-recover/report</a></p>
<p>_________________

</p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re digging the show, leave us a review and share it with your family and friends!</p>
<p>Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>We've all seen the headlines recently "Aussie Company Hit With Data Breach" or "Major Firm Left Scrambling After Major Data Leak". It can feel overwhelming knowing what to do next, and you may be asking yourself the question, is there anything I can do to protect myself? The answer is yes, in this episode we are going to help you run through our GTC check list of what to do after a data breach to secure your online footprint. With your details in the hands of criminals, let's redefine how you act online. </p>
<p>Show Resources: </p>
<p>Password Managers We Recommend</p>
<p>LastPass (Free and Paid Versions Available); <a href='https://www.lastpass.com/'>https://www.lastpass.com/</a></p>
<p>1Password (USD dollars); <a href='https://1password.com/'>https://1password.com/</a></p>
<p>Report a cyber incident: <a href='https://www.cyber.gov.au/report-and-recover/report'>https://www.cyber.gov.au/report-and-recover/report</a></p>
<p>_________________<br>
<br>
</p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re digging the show, leave us a review and share it with your family and friends!</p>
<p>Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p><br>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/vqcfv2/Episode2_What_To_Do_If_You_Were_Inolved_In_A_Data_Breach.mp3" length="19218429" type="audio/mpeg"/>
        <itunes:summary><![CDATA[We've all seen the headlines recently "Aussie Company Hit With Data Breach" or "Major Firm Left Scrambling After Major Data Leak". It can feel overwhelming knowing what to do next, and you may be asking yourself the question, is there anything I can do to protect myself? The answer is yes, in this episode we are going to help you run through our GTC check list of what to do after a data breach to secure your online footprint. With your details in the hands of criminals, let's redefine how you act online. 
Show Resources: 
Password Managers We Recommend
LastPass (Free and Paid Versions Available); https://www.lastpass.com/
1Password (USD dollars); https://1password.com/
Report a cyber incident: https://www.cyber.gov.au/report-and-recover/report
_________________
Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re digging the show, leave us a review and share it with your family and friends!
Socials:
Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU 
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: https://www.facebook.com/groups/828589538834261/]]></itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>899</itunes:duration>
                <itunes:episode>2</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>01. Welcome to Girls Talk Cyber</title>
        <itunes:title>01. Welcome to Girls Talk Cyber</itunes:title>
        <link>https://girlstalkcyber.podbean.com/e/welcome-to-girls-talk-cyber/</link>
                    <comments>https://girlstalkcyber.podbean.com/e/welcome-to-girls-talk-cyber/#comments</comments>        <pubDate>Wed, 05 Jul 2023 22:53:06 +1000</pubDate>
        <guid isPermaLink="false">girlstalkcyber.podbean.com/fa8cc6b0-82c0-37d6-9a2f-aa206dfafa6c</guid>
                                    <description><![CDATA[<p>Hey Cyber Queens! On today’s episode we want to introduce ourselves and this little thing we like to call cyber security. We will walk you through what cyber security is and why it’s becoming more and more important in our digital world. We also look at why women have been excluded from the conversation for so long and how with the help of Girls Talk Cyber, this can all change. </p>
<p> </p>
<p>We introduce you to a segment called the Fraud Files, which has us reading through real scam stories sent in by you, the listener. We, the hosts, pull out the top cyber learnings and takeaways ready for you to start actioning as soon as you finish this episode!</p>
<p>Let’s redefine how you act online. </p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re digging the show, leave us a review and share it with your family and friends!</p>
<p>_________________</p>
<p>Show Resources: </p>
<p>Monitor active scams: <a href='https://www.telstra.com.au/cyber-security-and-safety/active-scams'>https://www.telstra.com.au/cyber-security-and-safety/active-scams</a></p>
<p>Report a cyber incident: <a href='https://www.cyber.gov.au/report-and-recover/report'>https://www.cyber.gov.au/report-and-recover/report</a></p>
<p>_________________</p>
<p>Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Hey Cyber Queens! On today’s episode we want to introduce ourselves and this little thing we like to call cyber security. We will walk you through what cyber security is and why it’s becoming more and more important in our digital world. We also look at why women have been excluded from the conversation for so long and how with the help of Girls Talk Cyber, this can all change. </p>
<p> </p>
<p>We introduce you to a segment called the <em>Fraud Files</em>, which has us reading through real scam stories sent in by you, the listener. We, the hosts, pull out the top cyber learnings and takeaways ready for you to start actioning as soon as you finish this episode!</p>
<p>Let’s redefine how you act online. </p>
<p>Support the Girls Talk Cyber podcast by subscribing wherever you get your podcasts! If you’re digging the show, leave us a review and share it with your family and friends!</p>
<p>_________________</p>
<p>Show Resources: </p>
<p>Monitor active scams: <a href='https://www.telstra.com.au/cyber-security-and-safety/active-scams'>https://www.telstra.com.au/cyber-security-and-safety/active-scams</a></p>
<p>Report a cyber incident: <a href='https://www.cyber.gov.au/report-and-recover/report'>https://www.cyber.gov.au/report-and-recover/report</a></p>
<p>_________________</p>
<p>Socials:</p>
<p>Follow the Girls Talk Cyber Instagram account for all your cyber tips and tricks: <a href='https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU'>https://www.instagram.com/girlstalkcyber/?fbclid=IwAR1evKo-CQONzg3aCr5bOuEBxHJMOBGkWYJKa_GPswFOEEbks_YqAT3dMQU</a> </p>
<p><br>
Join the Girls Talk Cyber Facebook community to share your cyber security stories and let us know how you’re feeling about the content covered in this episode: <a href='https://www.facebook.com/groups/828589538834261/'>https://www.facebook.com/groups/828589538834261/</a> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ryum5p/Ep1V5.mp3" length="21274846" type="audio/mpeg"/>
        <itunes:summary>Hey Cyber Queens! On today’s episode we want to introduce ourselves and this little thing we like to call cyber security. We will walk you through what cyber security is and why it’s becoming more and more important in our digital world. We also look at why women have been excluded from the conversation for so long and how with the help of Girls Talk Cyber, this can all change. 




We introduce you to a segment called the Fraud Files, which has us reading through real scam stories sent in by you, the listener. We, the hosts, pull out the top cyber learnings and takeaways ready for you to start actioning as soon as you finish this episode!

Let’s redefine how you act online.</itunes:summary>
        <itunes:author>girlstalkcyber</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>985</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>1</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
</channel>
</rss>
