Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Cybersecurity Mentors. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cybersecurity Mentors or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Lessons Learned From the Australian National University Breach with Suthagar Seevaratnam - Part 1

47:31
 
Share
 

Manage episode 516734124 series 3594482
Content provided by Cybersecurity Mentors. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cybersecurity Mentors or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

In this episode of the Cybersecurity Mentors Podcast, Suthagar Seevaratnam, a former CISO at the Australian National University, shares his journey into cybersecurity and the challenges faced during a significant data breach. He discusses the importance of addressing organizational trauma, effective leadership during crises, and the human element in cybersecurity. The conversation delves into the details of the breach, including the attack vector, the role of phishing, and the impact of legacy systems. Suthagar emphasizes the need for calmness, compassion, and effective communication in crisis management, highlighting the lessons learned from the incident.

ANU Breach Report

Suthagar Seevaratnam’s LinkedIn

ACILearning.com/SimplyCyber

Send us fan mail via text

  continue reading

Chapters

1. Cold Open & Sponsor (00:00:00)

2. Guest Intro And Background (00:01:47)

3. From Economics To Cybersecurity (00:04:50)

4. First CISO At ANU (00:09:15)

5. Culture After The First Breach (00:12:00)

6. Discovery Of The Second Breach (00:16:20)

7. Briefing The Vice Chancellor (00:19:00)

8. Human Impact And Resolve (00:23:00)

9. Leadership Under Pressure (00:27:10)

10. Reconstructing The Attack Path (00:31:20)

11. The Email That Triggered Compromise (00:35:10)

12. Clarifying The “No Click” Myth (00:40:00)

13. Chaining Techniques And MITRE Mapping (00:44:20)

46 episodes

Artwork
iconShare
 
Manage episode 516734124 series 3594482
Content provided by Cybersecurity Mentors. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cybersecurity Mentors or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

In this episode of the Cybersecurity Mentors Podcast, Suthagar Seevaratnam, a former CISO at the Australian National University, shares his journey into cybersecurity and the challenges faced during a significant data breach. He discusses the importance of addressing organizational trauma, effective leadership during crises, and the human element in cybersecurity. The conversation delves into the details of the breach, including the attack vector, the role of phishing, and the impact of legacy systems. Suthagar emphasizes the need for calmness, compassion, and effective communication in crisis management, highlighting the lessons learned from the incident.

ANU Breach Report

Suthagar Seevaratnam’s LinkedIn

ACILearning.com/SimplyCyber

Send us fan mail via text

  continue reading

Chapters

1. Cold Open & Sponsor (00:00:00)

2. Guest Intro And Background (00:01:47)

3. From Economics To Cybersecurity (00:04:50)

4. First CISO At ANU (00:09:15)

5. Culture After The First Breach (00:12:00)

6. Discovery Of The Second Breach (00:16:20)

7. Briefing The Vice Chancellor (00:19:00)

8. Human Impact And Resolve (00:23:00)

9. Leadership Under Pressure (00:27:10)

10. Reconstructing The Attack Path (00:31:20)

11. The Email That Triggered Compromise (00:35:10)

12. Clarifying The “No Click” Myth (00:40:00)

13. Chaining Techniques And MITRE Mapping (00:44:20)

46 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play