Powered by RND
PodcastsNewsDevSecOops

DevSecOops

Cordant
DevSecOops
Latest episode

Available Episodes

5 of 11
  • Episode 11 - A Journey In Cyber
    In this episode, the hosts are joined by George Abraham, a seasoned cybersecurity leader whose journey began in the early days of firewalls and telecommunication security. From engineering roots at RMIT to pivotal roles in payments, financial services, and critical infrastructure, George reflects on how a career of technical foundations and governance responsibilities has shaped his role today as CISO at Influx, a global customer support services company. George explains Influx’s model as “customer support as a service”—a scalable, on-demand operation that mirrors the elasticity of cloud platforms. He shares insights into managing a workforce of over 1,200 people across multiple time zones and varying levels of technical expertise, highlighting both the leadership challenges and the importance of people management in cybersecurity. The discussion turns to the evolving role of the CISO. George’s “accidental” path—from firewall engineering to compliance, auditing, and leadership—has made him a rare hybrid: both technically adept and boardroom-ready. The hosts debate whether technical CISOs are inherently stronger leaders, with agreement that technical understanding paired with business acumen is increasingly essential, especially as boards begin to seek security expertise alongside traditional finance and legal backgrounds. Key Topics Covered Career Origins in Cybersecurity – From firewall engineering to PCI DSS auditing, pen testing, and leadership. Influx and Customer Support at Scale – How the company delivers flexible, global customer support services. CISO Leadership Challenges – Balancing board-level communication, technical fluency, and people management. The “Technical CISO” Debate – Why security leaders must bridge technical expertise and business strategy. Boards and Security Accountability – Predictions that future boards will include dedicated security expertise. Emerging Technologies & Security – Open-source tools like Fleet (OSQuery) and GoPhish, and the case for new phishing training models. AI in Cybersecurity – Dual-use nature of AI in attack and defence, from WormGPT to CrowdStrike’s AI telemetry. Health, Community, and Leadership – George’s “Run Club for CISOs” in Melbourne, building resilience and camaraderie through fitness and shared experiences. Recommended Reading – High Output Management by Andrew Grove, a classic that still offers relevant lessons for today’s leaders. Closing Note The episode blends personal anecdotes, professional lessons, and predictions for the industry’s future. It is a conversation about leadership in cybersecurity that goes beyond technical mastery, touching on trust, board accountability, and the human side of sustaining a career in security.
    --------  
    37:19
  • Episode 10 - OT Security & Infrastructure
    Podcast Synopsis: Critical Infrastructure and Operational Technology Cybersecurity This episode features Sam McKenzie and Karl Dawson, two seasoned professionals in cybersecurity and operational technology (OT), discussing the convergence of IT and OT in critical infrastructure, and the growing complexity facing asset operators. Sam McKenzie, head of technology operations at the City of Stonnington, shares his early experiences growing up off-grid, which fostered a lifelong interest in protecting essential services. With a 25-year career across telecommunications, energy, and healthcare, Sam emphasises the vulnerability of modern society's reliance on critical infrastructure. His perspective blends physical asset protection and cybersecurity, drawing parallels between safeguarding farm resources and national infrastructure. Karl Dawson, a consultant at Cordant with a background in electronics and networking, outlines his journey from technician to cybersecurity professional. With experience in water utilities, energy, and government sectors, he has moved through helpdesk, project management, and penetration testing roles—especially in smart metering systems. Karl highlights the blurred boundary between IT and OT and notes the administrative, rather than purely technical, distinction that often separates the two. The discussion explores: The definition of operational technology as an umbrella term covering industrial control systems (ICS), IoT, SCADA, and building management systems. The contrast between IT and OT: IT prioritises confidentiality and data integrity, whereas OT focuses on availability, safety, and physical control. The challenges introduced by the Security of Critical Infrastructure Act 2018 in Australia, which redefined the sectors deemed critical and added compliance complexity for operators. Sam shares insights from his white paper on cyber-physical safety in Australia's critical infrastructure, based on interviews with over 50 industry leaders. He finds a persistent leadership gap in understanding and managing OT risks. This disconnect, he suggests, stems from legacy engineering assumptions being upended by the increasing interconnectivity of formerly isolated systems, often now exposed to insecure networks for operational efficiency. Karl expands on this with practical considerations: Many OT environments remain air-gapped, but increasing digital integration introduces vulnerabilities. Legacy systems are often irreplaceable due to vendor constraints, budget limitations, and safety certifications, leaving infrastructure reliant on outdated software (e.g. Windows XP). Contractual and operational boundaries often prevent upgrades or the addition of modern monitoring tools, risking security in the name of availability. The conversation underscores a central tension: the imperative to modernise OT systems versus the practical and financial limitations that inhibit progress. It concludes with reflections on how leadership must evolve its view—shifting from purely technical risk management to safety-focused governance that recognises the physical consequences of cyber events. This episode delivers a clear warning: many critical systems continue to operate on fragile, outdated infrastructure while the attack surface expands. The burden of modernisation falls not just on engineers but also on executives and regulators to align operational, financial, and safety objectives.
    --------  
    1:08:04
  • Episode 9 - Rapid Fire Judgement
    In this episode, Tom and Scotti take listeners behind the curtain at Cordant, revealing how the team collaboratively approaches designing IT solutions—from infrastructure to cybersecurity. Framed around a hypothetical greenfield deployment, the discussion is a rapid-fire breakdown of their go-to tools, platforms, and philosophies—covering everything from hypervisors and SIEM solutions to code repositories and discovery tools. Key Topics Covered: Discovery & Strategy Process: The Cordant methodology: discovery, internal collaboration, and experience-based solution building. VMware & Broadcom Fallout: Tom discusses why VMware remains the on-prem hypervisor of choice, despite Broadcom's pricing and licensing challenges. Alternatives are weighed, including cloud-native VMs and infrastructure consolidation strategies. SIEM & Logging Solutions: Scotti explores cost-effective approaches to log management, weighing Splunk, Microsoft Sentinel, and CrowdStrike SIEM. He stresses the need to align tooling with organisational maturity and internal expertise, cautioning against over-investment in underutilised platforms. Code Repositories: The team debates GitHub, GitLab, Bitbucket, and cloud-native options. Security, ease-of-use, and deployment flexibility are discussed, especially in contexts requiring data sovereignty or air-gapped environments. Discovery Tooling & Attack Surface Management: With evolving threats shifting from network-focused to identity-centric attacks, Scotti outlines the importance of modern asset discovery tools like RunZero, AssetNote, and Wiz. He advocates for agentless, comprehensive visibility across hybrid environments. Key Takeaways: Vendor selection should reflect organisational context—not just feature sets. Tooling must match internal capability; gold-plated tech without operational maturity offers little value. Identity, not infrastructure, is the modern threat frontier—external and internal visibility is critical. Cloud-native and hybrid strategies should be evaluated tactically and strategically, not reactively.
    --------  
    1:03:47
  • Episode 8 - Bytesized: Kubernetes, AI, Oracle, and More
    In this byte-sized episode of DevSecOops, Tom and Scotti dive into recent developments from the Cordant office. Tom and Scotti unpack the power and pitfalls of modern tech trends, from Kubernetes to GenAI, and cloud resilience. Kubernetes in Focus Tom questions the complexity of Kubernetes, while Scotti defends its scalability and abstraction benefits. Drawing from both home labs and enterprise deployments, they highlight how managed services reduce friction, enabling cloud-agnostic architecture and better DevOps alignment. OCI Incident & Lessons in Trust Reflecting on a real-world project from Oracle, Scotti describes auditing IAM permissions at scale using Kubernetes. They dive into cultural lessons from a major Oracle Cloud Infrastructure (OCI) incident, advocating for transparency, not blame. Tom stresses that resilience comes from what we learn, not whom we blame. AI: Game-Changer or Crutch? AI adoption is accelerating, with tools like ChatGPT and Claude now embedded in workflows. Tom recounts a colleague building a mobile app with zero prior experience using AI alone. Scotti sees AI as a thought partner; great for learning, risky if misused. ⚠️ Ethics & Risk AI’s potential is massive, but so are the dangers. Open-source LLMs trained on exploits pose real threats. As Scotti warns: “Like any security tool, it can be used for good or bad.” ️ Key Takeaway Balance innovation with governance. Transparency, culture, and intent define how we build secure, resilient systems.
    --------  
    42:42
  • Episode 7 - Wiz Bang
    This episode explores Wiz’s platform-driven approach to cloud security, emphasising its usability across multiple organizational roles — from developers to executives. Matt, a Principal Solution Engineer at Wiz, explains how the company provides comprehensive, real-time visibility into cloud environments (including multi-cloud and hybrid architectures), helping organisations identify high-risk vulnerabilities early in the software lifecycle — even before deployment. Key Discussion Points Wiz’s Core Value Proposition Wiz offers a cloud-native security platform designed to detect risks across infrastructure, applications, and configurations. The solution prioritises threats using risk context and attack path analysis, making security information relevant and actionable for both technical and business stakeholders. Executive-Level Adoption Matt notes strong engagement from CISOs, CTOs, and CIOs due to Wiz’s rapid time-to-value, easy implementation, and support for tooling consolidation. Executives appreciate how Wiz enables faster, safer adoption of new technologies, such as AI services, while maintaining governance and compliance. Developer Enablement A major focus is shifting security left by integrating it into developers’ workflows. Wiz provides clear guidance, risk prioritisation, and remediation suggestions, removing the need for developers to be security experts. This reduces friction between engineering and security teams, traditionally a major operational challenge. Operationalisation and ROI Emphasis is placed on real-world usage and ROI. Matt shares insights from customers who evaluate tools based on actual usage metrics, such as platform login frequency, to ensure investments are delivering value. Security Champion Models The discussion touches on the importance of embedded security roles, such as Security Champions within development teams. This model, pioneered by companies like Amazon, helps organisations scale secure development practices and manage the growing velocity of security threats in cloud environments. Noise Reduction and Prioritisation Hosts and guests stress the importance of eliminating alert fatigue. Wiz’s platform contextualises vulnerabilities (e.g., IAM policy misconfigurations or outdated libraries in containers) to distinguish meaningful risks from benign issues. This “pragmatic security” approach builds credibility with developers and promotes a security-aware culture.
    --------  
    54:19

More News podcasts

About DevSecOops

Welcome to DevSecOops - a mostly serious podcast about modern ICT, and pragmatic solutions to complex problems.
Podcast website

Listen to DevSecOops, Pod Save America and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features

DevSecOops: Podcasts in Family

Social
v7.23.9 | © 2007-2025 radio.de GmbH
Generated: 10/20/2025 - 2:59:04 PM