Future Secured - Shaping a Future-Proof Digital Society Podcast Por Future Secured arte de portada

Future Secured - Shaping a Future-Proof Digital Society

Future Secured - Shaping a Future-Proof Digital Society

De: Future Secured
Escúchala gratis

Acerca de esta escucha

Future Secured brings you in-depth conversations with Australian and global cyber security leaders, founders, CEOs, and co-founders.

Hosted by Jason Murell and Tom Finnigan, each episode delves into the personal journeys of these experts as they navigate the challenges of building and scaling successful cyber security businesses.

From critical industry issues to hard-learned lessons, the podcast explores the competitive global market and offers valuable insights on how to start, grow, and succeed in the cyber security space.

Join us as we uncover the stories behind the industry's brightest minds and build a knowledge base to help aspiring cyber security entrepreneurs thrive.

© 2025 Future Secured - Shaping a Future-Proof Digital Society
Episodios
  • Never Go Full Cyber - Future Secured Episode 37
    May 22 2025

    Why Basics Beat Buzzwords with Edward Farrell

    In this episode of Future Secured, Tom Finnigan and Jason Murrell sit down with Edward Farrell, CEO of Mercury Information Security Services, to talk about why cyber security has lost its way—and what it will take to fix it.

    Known for his no-nonsense perspective, Edward argues that the industry is obsessed with brain surgeons when what it really needs are more good GPs. We explore how hype, inflated job titles, and obsession with advanced tools are pulling focus from the practical, day-to-day security work that actually reduces risk.

    With experience spanning governance, pen testing, and training, Edward shares war stories from the field, exposes the hidden dangers of motivated amateurs, and explains why apprenticeship models—not certifications—might be the real fix for our cyber talent shortage.

    If you're a founder, CISO, engineer or just trying to make sense of this confusing industry, Edward’s take will help you separate the meaningful from the meaningless in cyber security today.

    🎧 Key Takeaways:
    Stop chasing shiny tools. Focus on basics that protect your business.
    Cyber security needs apprentices, not just experts.
    Human bias is a bigger threat than hackers.
    Too many businesses are ‘going full cyber’—and getting burned.
    Insider threats are the biggest risk no one talks about.
    It’s not about a silver bullet—it’s about trade-offs.

    🗣️ Soundbites:
    "Never go full cyber."
    "A motivated idiot is a dangerous thing."
    "We’re obsessed with brain surgeons and ignore the GPs."
    "Startups catch fire before they secure the house."
    "We reward enthusiasm over expertise—and that’s a problem."

    ⏱️ Chapters:
    00:00 – Why You Should Never Go Full Cyber
    04:54 – Redundancy, Risk and the State of Cyber
    10:05 – The Hype Cycle vs Real Problems
    14:59 – Apprenticeship Models in Cyber
    19:56 – Clarity in Roles, Titles and Tools
    24:03 – Danger of Enthusiasts Without Experience
    26:58 – Why Storytelling Still Wins in Cyber
    30:42 – Australian Culture vs Silicon Valley Speed
    34:46 – Basic Security Wins, Always
    39:25 – Insider Threats: The Silent Killer
    45:00 – Cyber Drills and Missing Basics

    Más Menos
    40 m
  • This Isn’t a Front Door. It’s a Vault Cloud - Future Secured Episode 36
    May 22 2025

    In this episode, Tom Finnigan and Jason Murrell sit down with Rupert Taylor-Price, CEO of Vault Cloud, to dive into what it takes to build sovereign cloud infrastructure that doesn’t just host data, it protects national secrets. Rupert shares his journey from developer to hyperscale cloud builder, the decision to own source code, and why Vault refuses to compromise on security.

    The conversation explores the future of AUKUS Pillar Two, how government funding is shaping sovereign tech, and why “building a vault, not a front door” isn’t just a metaphor, it’s an engineering blueprint. Rupert also unpacks the intersection of AI, national security and trust and why Australia is uniquely positioned to lead in a shifting geopolitical landscape.

    Takeaways
    Owning the source code is foundational to true cloud security.

    Vault Cloud’s strict, non-negotiable controls are designed for secrets, not convenience.

    Usability and security are always in tension and Vault leans toward protection.

    Sovereign capability is becoming a national security imperative.

    AI brings both risk and opportunity to secure infrastructure.

    Vault Cloud has had zero customer breaches, a rare feat.

    AUKUS opens a trillion-dollar pathway for tech collaboration across three nations.

    Pillar 1 is about military capability; Pillar 2 is about technology interoperability.

    Engineering a truly sovereign, multi-nation cloud is complex but critical.

    Australia’s agility makes it well-positioned in the AI and cyber arms race.

    Interoperability between nations requires aligned standards, not just alliances.

    Government investment is essential to enable secure sovereign tech.

    Different sectors demand different security levels, there is no one-size-fits-all.

    Critical infrastructure and defence require zero-trust, high-bar security controls.

    Cloud built for convenience will never meet the bar for classified systems.

    Secret cloud environments come with trade-offs, but for some, they’re necessary.

    Psychological data, social records, and defence systems need maximum protection.

    Global shifts in AI and trade are creating competitive openings for Australia.

    Vault Cloud’s strategy is built around foresight, not just compliance.

    Titles
    This Isn’t a Front Door. It’s a Vault.

    Building Australia’s Secret Cloud

    Engineering Sovereignty at Hyperscale

    AUKUS, AI & the Vault Standard

    From Source Code to National Security

    Sound Bites
    "We build vault doors in the physical analogy."

    "Vault has never had a customer breach of its system."

    "You don’t turn MFA off. There is no switch."

    "We wanted to own the source code of this platform."

    "Sovereignty isn’t a feature, it’s a foundation."

    "It’s quite a feat to get three countries aligned."

    "This is about building infrastructure that nation-states can trust."

    "There’s an opportunity to blend AI models for better outcomes."

    "Every time you see these changes, it creates opportunity."

    Chapters
    00:00 – Introduction to Vault Cloud & Sovereign Infrastructure
    01:17 – Rupert’s Journey: From Developer to National Cloud Provider
    04:28 – Building Secure Systems for Government Use
    06:00 – Balancing Protection vs. Usability in Cloud Architecture
    11:19 – The Case for Sovereign Capability in Tech
    14:40 – AI, Security & the Real-World Risks Emerging
    21:13 – Demystifying AUKUS Pillar Two
    24:02 – Cross-Nation Tech Collaboration Challenges
    27:31 – Inside Government Investment in Sovereign Cloud
    30:33 – Building a Classified Cloud for AUKUS
    33:31 – What “Secret Cloud” Really Means in Practice

    39:59 – Chaos, Geopolitics & Why Australia Has the Advantage

    Más Menos
    43 m
  • Bug Bounties, The Wanted Poster For Ethical Hackers - Future Secured Episode 35
    May 22 2025

    In this episode, Casey Ellis, founder of Bugcrowd and a pioneer of the crowdsourced cyber security movement, shares the hard-earned lessons from building a category-defining company. Casey pulls back the curtain on the real startup grind: from bootstrapping Bugcrowd into a global force to navigating leadership pressures, health crises and building resilient teams.

    He lays bare the hidden truths of entrepreneurship, scaling cyber security innovation, and why humanising hackers is essential to the future of digital defence.

    Whether you're a CISO, a cyber founder, or a leader preparing for the next wave of cyber security threats, Casey's insights will resonate deeply and possibly change the way you think about trust, leadership, and resilience.

    🛡️ Core Themes and Big Takeaways
    Crowdsourcing Cyber Defense: Why tapping global ethical hackers outpaces traditional security models.

    Entrepreneurial Resilience: 17+ years to "overnight success" — Casey's brutal honesty on what it really takes.

    Leadership Evolution: From "doing everything" to mastering the art of delegation and trust.

    Health and Hustle: Ignoring health nearly cost Casey his life and he’s not holding back on lessons learned.

    Culture Over Everything: Building trust-first teams that scale cybersecurity innovation.

    The Human Side of Hackers: Why reframing the hacker narrative is essential for modern security strategies.

    🧠 Soundbites You Can’t Miss
    🔥 "You don't get a pass on your health, no matter how 'busy' you are."

    🔥 "Building a company is finding where your Venn diagrams overlap, not forcing them."

    🔥 "Double down on your strengths. Delegate the rest without guilt."

    🔥 "If you're working on your one weakest skill, you're ignoring your ten strongest."

    🔥 "Founders should be irrationally passionate about the problem they're solving, it has to look crazy to others at first."

    🔥 "Humanising hackers isn't optional. It’s critical if we want cybersecurity to evolve."

    🔥 "There’s no such thing as 100% secure, the question is, how do you stay ahead?"

    ⏱️ Chapters
    00:00 - Intro to Casey Ellis and Bugcrowd’s origins
    02:08 - How the idea for crowdsourced security was born
    06:04 - Entrepreneurial lessons from the GFC, COVID, and everything in between
    10:01 - The CEO’s real job: doing less, leading more
    14:00 - Ignoring health almost cost everything
    18:05 - Timing your scale-up: when, not if
    22:05 - How to build and trust a world-class cyber team
    28:14 - Why delegation makes or breaks startups
    32:45 - Strengths vs Weaknesses: play to your natural edge
    34:50 - Capital raising and the "midpoint" you need to find
    39:47 - Why culture beats strategy every time
    43:39 - Changing perceptions: Hackers as allies
    46:35 - The defender’s dilemma — and how to win
    51:50 - What's next for cybersecurity in a chaotic world

    Más Menos
    52 m
adbl_web_global_use_to_activate_T1_webcro805_stickypopup
Todavía no hay opiniones