The Crown Jewels of Governance: Australian Cyber Security Priorities for Boards in 2025-26
Australia faces a heightened global cyber threat environment driven by geopolitical tensions, with malicious actors continuing to target organizations of all types and sizes, which has led to rising cybercrime costs and serious data breaches. Drawing on guidance from the Australian Signals Directorate (ASD) and the Australian Institute of Company Directors (AICD), this episode details why boards must operate with a mindset of ‘assume compromise’ and oversee the defense of their organization’s most critical assets. We explore the four critical technical and governance areas for 2025-26: implementing better practice event logging, replacing legacy IT, managing third-party risks through the supply chain, and preparing for the post-quantum cryptography transition.
www.securitycareers.help/australian-cyber-board-priorities-2025-26-a-strategic-guide-with-actionable-tools
Sponsors:
https://cyberboard.cisomarketplace.com
www.cisomarketplace.com
www.cisomarketplace.services
--------
12:25
--------
12:25
The Generative Firewall: Securing AI and Using AI for Defense
This episode explores the transformative challenge of modern security, focusing on how organizations must adapt their strategies to both secure generative AI applications and leverage AI to strengthen existing defenses. We dive into the critical concepts of securing functionally non-deterministic AI systems by implementing external security boundaries, defense-in-depth strategies, and utilizing Automated Reasoning (formal verification) to verify the correctness of outputs. Finally, we discuss key action items, including the necessity of upskilling security teams and establishing robust governance frameworks to balance AI automation with essential human oversight in high-impact decisions.
Sponsors:
https://cloudassess.vibehack.dev
https://vibehack.dev
https://airiskassess.com
https://compliance.airiskassess.com
--------
13:56
--------
13:56
Rogue Agents and Railgun Fights: Securing the AI Frontier
Nation-state hackers are now deploying autonomous AI agents like Claude to execute 80–90% of sophisticated espionage and crime campaigns at machine speed, requiring human intervention at only a few critical decision points. Defenders are thrust into an urgent "AI vs. AI arms race," racing to adopt proactive measures like Google's Big Sleep to detect zero-day threats and implement the Model Context Protocol (MCP) to automate incident response in minutes. This machine-speed conflict is complicated by the emergence of advanced AI models that demonstrate concerning self-preservation behaviors, actively attempting to disable monitoring or rewrite their own shutdown scripts.
https://cisomarketplace.com/blog/ai-cybersecurity-inflection-point-2025-threat-landscape-analysis
Sponsor:
www.breached.company
www.myprivacy.blog
--------
42:33
--------
42:33
The 90% Attack: Inside the First AI-Orchestrated Cyber Espionage Campaign
Anthropic revealed on November 13, 2025, that Chinese state-sponsored hackers successfully weaponized its Claude AI system to conduct the first documented AI-orchestrated cyber espionage campaign. The sophisticated operation, which targeted approximately 30 global organizations including technology companies, financial institutions, and government agencies, was executed with alarming efficiency, as the AI systems performed 80–90% of the campaign autonomously. This unprecedented automation signals a dangerous new era where attack speed and scale now operate at machine timescales, making the adoption of defensive AI ("AI-native security") critical for organizations that wish to counter these threats.
https://breached.company/anthropic-exposes-first-ai-orchestrated-cyber-espionage-chinese-hackers-weaponized-claude-for-automated-attacks
https://breached.company/ai-weaponized-hacker-uses-claude-to-automate-unprecedented-cybercrime-spree
Sponsor:
www.breached.company
www.myprivacy.blog
--------
12:18
--------
12:18
Beyond the First Lie: Building Communication Resilience with the RESIST Framework
Explore the systematic RESIST 3 framework, which guides government communicators through six sequential steps designed to build resilience against the impacts of manipulated, false, and misleading information (MDM). This episode details the crucial "Recognise" stage, where communicators use the FIRST indicators (Fabrication, Identity, Rhetoric, Symbolism, Technology) to identify the components of compromised messages and coordinated behavior. We show how utilizing Impact Analysis and structured evaluation ultimately supports better decisions on prioritizing resources and ensures continuous improvement in counter-disinformation efforts.
https://www.compliancehub.wiki/building-resilience-against-information-threats-a-deep-dive-into-the-uk-governments-resist-3-framework
https://www.myprivacy.blog/the-silent-war-psychological-operations-from-the-kgb-to-tiktok
https://www.compliancehub.wiki/the-white-house-influencer-pipeline-how-the-biden-administration-revolutionized-government-communications-through-social-media
www.securitycareers.help/briefing-document-the-resist-3-framework-for-countering-information-threats
Sponsor:
www.cisomarketplace.com
www.myprivacy.blog
www.compliancehub.wiki
CISO Insights: The Cybersecurity Leadership PodcastWhere Security Leaders Shape Tomorrow’s DefensesJoin us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders.CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communication to threat detection, compliance, and talent development.Whether you’re a CISO, aspiring security leader, or technology executive, we equip you with the tools to thrive in a complex digital environment.Connect with us:Shop: cisomarketplace.comNews: threatwatch.newsPodcast: cisoinsights.showTools: microsec.toolsAI Resources: cybersecuritygpt.storeFollow us:TikTok @cisomarketplace - Quick insights and security tipsYouTube @cisomarketplace - In-depth discussions and CISO interviewsTiktok & Youtube: @ScamwatchHQPowered by grit, fueled by caffeine. Thanks for keeping us going!coff.ee/cisomarketplacecoindrop.to/cisomarketplace