<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="/global/feed/rss.xslt" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podaccess="https://access.acast.com/schema/1.0/" xmlns:acast="https://schema.acast.com/1.0/">
    <channel>
		<ttl>60</ttl>
		<generator>acast.com</generator>
		<title>Hackable Me</title>
		<link>https://hm.proofpoint.com/</link>
		<atom:link href="https://feeds.acast.com/public/shows/5ecc54aa4b408c1d03ec8a25" rel="self" type="application/rss+xml"/>
		<language>en</language>
		<copyright>Proofpoint</copyright>
		<itunes:keywords>cybercrime, hacking,phishing,crime,security,privacy,catfish,social engineering,fraud</itunes:keywords>
		<itunes:author>Proofpoint</itunes:author>
		<itunes:subtitle>A deep dive into the world of cybercrime</itunes:subtitle>
		<itunes:summary><![CDATA[<p>Hackable Me is the podcast that pulls back the curtain on the industry of cybercrime.</p><br><p>What is social engineering and why does it still work? How are online lotharios using techniques to trick would-be partners? What is phishing and who exactly falls for those emails from Nigerian princes?</p><br><p>Hosted by Katie Finlayson, Head of Marketing Asia Pacific at Proofpoint, you can listen and learn from our team of cyber experts, authors, futurists and socio-technical analysts - because we're all hackable.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		<description><![CDATA[<p>Hackable Me is the podcast that pulls back the curtain on the industry of cybercrime.</p><br><p>What is social engineering and why does it still work? How are online lotharios using techniques to trick would-be partners? What is phishing and who exactly falls for those emails from Nigerian princes?</p><br><p>Hosted by Katie Finlayson, Head of Marketing Asia Pacific at Proofpoint, you can listen and learn from our team of cyber experts, authors, futurists and socio-technical analysts - because we're all hackable.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
		<itunes:explicit>false</itunes:explicit>
		<itunes:owner>
			<itunes:name>Proofpoint</itunes:name>
			<itunes:email>info+5ecc54aa4b408c1d03ec8a25@mg-eu.acast.com</itunes:email>
		</itunes:owner>
		<acast:showId>5ecc54aa4b408c1d03ec8a25</acast:showId>
		<acast:showUrl>hackable-me</acast:showUrl>
		<acast:signature key="EXAMPLE" algorithm="aes-256-cbc"><![CDATA[wbG1Z7+6h9QOi+CR1Dv0uQ==]]></acast:signature>
		<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmTHg2/BXqPr07kkpFZ5JfhvEZqggcpunI6E1w81XpUaBscFc3skEQ0jWG4GCmQYJ66w6pH6P/aGd3DnpJN6h/CD4icd8kZVl4HZn12KicA2k]]></acast:settings>
        <acast:network id="60076134795a1c638da1608b" slug="katie-finlayson"><![CDATA[Katie Finlayson]]></acast:network>
		<itunes:type>episodic</itunes:type>
			<itunes:image href="https://assets.pippa.io/shows/5ecc54aa4b408c1d03ec8a25/1596174008409-785701a8ad905c44d5d3e8e33053ed98.jpeg"/>
			<image>
				<url>https://assets.pippa.io/shows/5ecc54aa4b408c1d03ec8a25/1596174008409-785701a8ad905c44d5d3e8e33053ed98.jpeg</url>
				<link>https://hm.proofpoint.com/</link>
				<title>Hackable Me</title>
			</image>
		<item>
			<title>The Crushed</title>
			<itunes:title>The Crushed</itunes:title>
			<pubDate>Fri, 24 Jun 2022 10:35:58 GMT</pubDate>
			<itunes:duration>20:22</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/5ecc54aa4b408c1d03ec8a25/e/629439bee613500012bcff80/media.mp3" length="323538874" type="audio/mpeg"/>
			<guid isPermaLink="false">629439bee613500012bcff80</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/hackable-me/episodes/the-crushed</link>
			<acast:episodeId>629439bee613500012bcff80</acast:episodeId>
			<acast:showId>5ecc54aa4b408c1d03ec8a25</acast:showId>
			<acast:episodeUrl>the-crushed</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs0C3Fc1kUWr/wtY0RHHVQYMxppowlSHK28GAIW5xX0NJd4T5gYGvC3fyw4ZoK4FdeeCyY5GLeLC57Iq2VbnxghqMqEitSL8erSWTGDWIDT4R9dYgPxXLxRIwEUsLiI+KI]]></acast:settings>
			<itunes:subtitle>What are the costs to individuals who have fallen victim to a cyber attack? </itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>3</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/5ecc54aa4b408c1d03ec8a25/1596174008409-785701a8ad905c44d5d3e8e33053ed98.jpeg"/>
			<description><![CDATA[<p>What do you do when you realise you’ve just lost thousands of dollars to a cyber attack? The costs of cyber crime can be the undoing of individuals, and as criminals become more and more adept at accessing our personal data, how do you keep yourself safe from an attack?</p><br><p>With <strong>Sanjay Joseph</strong> and <strong>Dr Alana Maurushat</strong>, Professor of Cybersecurity and Behaviour at Western Sydney University.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>What do you do when you realise you’ve just lost thousands of dollars to a cyber attack? The costs of cyber crime can be the undoing of individuals, and as criminals become more and more adept at accessing our personal data, how do you keep yourself safe from an attack?</p><br><p>With <strong>Sanjay Joseph</strong> and <strong>Dr Alana Maurushat</strong>, Professor of Cybersecurity and Behaviour at Western Sydney University.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>The Crashed</title>
			<itunes:title>The Crashed</itunes:title>
			<pubDate>Fri, 24 Jun 2022 10:35:04 GMT</pubDate>
			<itunes:duration>21:56</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/5ecc54aa4b408c1d03ec8a25/e/629439784bc3eb00123a2174/media.mp3" length="348397906" type="audio/mpeg"/>
			<guid isPermaLink="false">629439784bc3eb00123a2174</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/hackable-me/episodes/the-crashed</link>
			<acast:episodeId>629439784bc3eb00123a2174</acast:episodeId>
			<acast:showId>5ecc54aa4b408c1d03ec8a25</acast:showId>
			<acast:episodeUrl>the-crashed</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs0C3Fc1kUWr/wtY0RHHVQYMxppowlSHK28GAIW5xX0NJvm0zHCju7Bsb+Fbavx+xmsr7WYOyQxcIz4WclWaOKmZVtIqjxeHHJbvtLkhRObjOGWjJK7OiLJi/25tTDjVl7]]></acast:settings>
			<itunes:subtitle>How much does a cyber attack cost businesses and their employees?</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>2</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/5ecc54aa4b408c1d03ec8a25/1596174008409-785701a8ad905c44d5d3e8e33053ed98.jpeg"/>
			<description><![CDATA[<p>As criminals set their sights on larger targets, businesses are finding themselves dealing with cyber attacks on a regular basis. What do businesses need to do to keep themselves, and their clients safe? And when an attack on a business affects customers, who should take responsibility?</p><br><p>With <strong>Yvette Lejins</strong>,&nbsp;a former chief information security officer and current CISO in residence at Proofpoint and <strong>Malcolm Turnbull</strong>, former prime minister of Australia.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>As criminals set their sights on larger targets, businesses are finding themselves dealing with cyber attacks on a regular basis. What do businesses need to do to keep themselves, and their clients safe? And when an attack on a business affects customers, who should take responsibility?</p><br><p>With <strong>Yvette Lejins</strong>,&nbsp;a former chief information security officer and current CISO in residence at Proofpoint and <strong>Malcolm Turnbull</strong>, former prime minister of Australia.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>The Crashers</title>
			<itunes:title>The Crashers</itunes:title>
			<pubDate>Fri, 24 Jun 2022 10:34:08 GMT</pubDate>
			<itunes:duration>19:17</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/5ecc54aa4b408c1d03ec8a25/e/62942e207742990012d4cfa4/media.mp3" length="306296056" type="audio/mpeg"/>
			<guid isPermaLink="false">62942e207742990012d4cfa4</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/hackable-me/episodes/the-crashers</link>
			<acast:episodeId>62942e207742990012d4cfa4</acast:episodeId>
			<acast:showId>5ecc54aa4b408c1d03ec8a25</acast:showId>
			<acast:episodeUrl>the-crashers</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs0C3Fc1kUWr/wtY0RHHVQYMxppowlSHK28GAIW5xX0NKOUaI/fEp55YFlqrd2djAXM5kwyLoVajzKtKla8E6rUHZIV3OcS1No3Lonx8S9+C66Gr86yrEJiiYHecgB+q2Z]]></acast:settings>
			<itunes:subtitle>What is the cost to a hacker to launch a cyber attack?</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:episode>1</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/5ecc54aa4b408c1d03ec8a25/1596174008409-785701a8ad905c44d5d3e8e33053ed98.jpeg"/>
			<description><![CDATA[<p>Cyber attacks are being reported with more frequency than ever before, as criminals appear to be making large amounts of money. But what does it cost a cyber criminal to launch one of these attacks? And as they set their sights on bigger, more rewarding targets, could those costs become higher and riskier?</p><br><p>With <strong>Adrian Covich</strong>, senior director of technical sales at Proofpoint for Asia Pacific and Japan, and <strong>Andrew Milroy</strong>, founder of digital risk advisory firm Veqtor8.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Cyber attacks are being reported with more frequency than ever before, as criminals appear to be making large amounts of money. But what does it cost a cyber criminal to launch one of these attacks? And as they set their sights on bigger, more rewarding targets, could those costs become higher and riskier?</p><br><p>With <strong>Adrian Covich</strong>, senior director of technical sales at Proofpoint for Asia Pacific and Japan, and <strong>Andrew Milroy</strong>, founder of digital risk advisory firm Veqtor8.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Trailer for Hackable Me Season 02</title>
			<itunes:title>Trailer for Hackable Me Season 02</itunes:title>
			<pubDate>Thu, 12 May 2022 06:38:45 GMT</pubDate>
			<itunes:duration>2:36</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/5ecc54aa4b408c1d03ec8a25/e/627cab76c5a7e90014ab13a0/media.mp3" length="41337034" type="audio/mpeg"/>
			<guid isPermaLink="false">627cab76c5a7e90014ab13a0</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/hackable-me/episodes/trailer-for-hackable-me-season-02</link>
			<acast:episodeId>627cab76c5a7e90014ab13a0</acast:episodeId>
			<acast:showId>5ecc54aa4b408c1d03ec8a25</acast:showId>
			<acast:episodeUrl>trailer-for-hackable-me-season-02</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs0C3Fc1kUWr/wtY0RHHVQYMxppowlSHK28GAIW5xX0NLViOgyfq0PNGQOsDhW/mT7kmHY2PzrrnD7GbTh0bEM3igs+rYDV+5xmqK6Vg3MTbxOtom5DYHOxgd0g3DPLFhY]]></acast:settings>
			<itunes:episodeType>trailer</itunes:episodeType>
			<itunes:season>2</itunes:season>
			<itunes:image href="https://assets.pippa.io/shows/5ecc54aa4b408c1d03ec8a25/1596174008409-785701a8ad905c44d5d3e8e33053ed98.jpeg"/>
			<description><![CDATA[<p>Hackable Me is the podcast that pulls back the curtain on the industry of cybercrime.</p><br><p>For Season two, we delve into the cost of cybercrime. How do cybercriminals plan an attack, how much does it cost them? What do you do when you realise your business is at the centre of an attack? And how do you keep yourself and your family safe from falling victim to a cyber attack?</p><br><p>Listen and learn form our team of cyber security experts, digital risk advisors, and former prime minister of Australia, Malcolm Turnbull.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Hackable Me is the podcast that pulls back the curtain on the industry of cybercrime.</p><br><p>For Season two, we delve into the cost of cybercrime. How do cybercriminals plan an attack, how much does it cost them? What do you do when you realise your business is at the centre of an attack? And how do you keep yourself and your family safe from falling victim to a cyber attack?</p><br><p>Listen and learn form our team of cyber security experts, digital risk advisors, and former prime minister of Australia, Malcolm Turnbull.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Episode 4 - Hack to the Future</title>
			<itunes:title>Episode 4 - Hack to the Future</itunes:title>
			<pubDate>Thu, 06 Aug 2020 04:55:45 GMT</pubDate>
			<itunes:duration>20:48</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/5ecc54aa4b408c1d03ec8a25/e/5ecc5baeadd3db7b44d2efa0/media.mp3" length="39946112" type="audio/mpeg"/>
			<guid isPermaLink="false">5ecc5baeadd3db7b44d2efa0</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://proofpoint.com/hackableme</link>
			<acast:episodeId>5ecc5baeadd3db7b44d2efa0</acast:episodeId>
			<acast:showId>5ecc54aa4b408c1d03ec8a25</acast:showId>
			<acast:episodeUrl>hack-to-the-future</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs0C3Fc1kUWr/wtY0RHHVQYMxppowlSHK28GAIW5xX0NILtdhoSvnqqB4FM6iK04VMeFHEfVGO/1BLTgizxkYhvlIxN9FhIOektNhyF6GvpiZEP96HeW2fJfeWaouDo1jk]]></acast:settings>
			<itunes:subtitle>Episode 4</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>4</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/5ecc54aa4b408c1d03ec8a25/1596174008409-785701a8ad905c44d5d3e8e33053ed98.jpeg"/>
			<description><![CDATA[<p>Cybersecurity has always evoked science fiction, but recent technological developments are pushing the boundary between imagination and reality. Looking into the future, what will you need to look for?</p><p>With Shara Evans, Technology Futurist and Ryan Kalember, Executive Vice President of Cybersecurity Strategy at Proofpoint.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Cybersecurity has always evoked science fiction, but recent technological developments are pushing the boundary between imagination and reality. Looking into the future, what will you need to look for?</p><p>With Shara Evans, Technology Futurist and Ryan Kalember, Executive Vice President of Cybersecurity Strategy at Proofpoint.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Episode 3 - I am Not a Robot</title>
			<itunes:title>Episode 3 - I am Not a Robot</itunes:title>
			<pubDate>Thu, 06 Aug 2020 04:55:14 GMT</pubDate>
			<itunes:duration>21:10</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/5ecc54aa4b408c1d03ec8a25/e/5ecc5b351cb54f44b740115a/media.mp3" length="40643456" type="audio/mpeg"/>
			<guid isPermaLink="false">5ecc5b351cb54f44b740115a</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://proofpoint.com/hackableme</link>
			<acast:episodeId>5ecc5b351cb54f44b740115a</acast:episodeId>
			<acast:showId>5ecc54aa4b408c1d03ec8a25</acast:showId>
			<acast:episodeUrl>i-am-not-a-robot</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs0C3Fc1kUWr/wtY0RHHVQYMxppowlSHK28GAIW5xX0NJlhQsvOlczdPUbeXzc3DsfOU64p2Kk6kzF8LFLfWq9zmOb8v4A8+dx0FepicaAQc5pnn+KglR8js8pZ3vDZFNd]]></acast:settings>
			<itunes:subtitle>Episode 3</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>3</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/5ecc54aa4b408c1d03ec8a25/1596174008409-785701a8ad905c44d5d3e8e33053ed98.jpeg"/>
			<description><![CDATA[<p>How are our human frailties exposing us to cyber risk? We learn how cybercriminals exploit our psychology for more than just money?</p><p>With Stephanie Wood, author of <em>Fake: A Startling True Story of Love in a World of Liars, Cheats, Narcissists, Fantasists and Phonies</em>; and Joanne Mihelcic, Research Fellow in the Faculty of I.T. at Monash University, Melbourne.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>How are our human frailties exposing us to cyber risk? We learn how cybercriminals exploit our psychology for more than just money?</p><p>With Stephanie Wood, author of <em>Fake: A Startling True Story of Love in a World of Liars, Cheats, Narcissists, Fantasists and Phonies</em>; and Joanne Mihelcic, Research Fellow in the Faculty of I.T. at Monash University, Melbourne.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Episode 2 - From Prince to Phisherman</title>
			<itunes:title>Episode 2 - From Prince to Phisherman</itunes:title>
			<pubDate>Thu, 06 Aug 2020 04:54:38 GMT</pubDate>
			<itunes:duration>19:59</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/5ecc54aa4b408c1d03ec8a25/e/5ecc5a75add3db7b44d2ef9f/media.mp3" length="38374016" type="audio/mpeg"/>
			<guid isPermaLink="false">5ecc5a75add3db7b44d2ef9f</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://proofpoint.com/hackableme</link>
			<acast:episodeId>5ecc5a75add3db7b44d2ef9f</acast:episodeId>
			<acast:showId>5ecc54aa4b408c1d03ec8a25</acast:showId>
			<acast:episodeUrl>from-prince-to-phisherman</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs0C3Fc1kUWr/wtY0RHHVQYMxppowlSHK28GAIW5xX0NJRGLjHopvQHpWVlYj4cJmFBUj1EzhnAp7iWeTdV6P7nTjn7gxg64PuotAnAZAS180lKoMfJCK1FZAzBNx2t6XL]]></acast:settings>
			<itunes:subtitle>Episode 2</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>2</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/5ecc54aa4b408c1d03ec8a25/1596174008409-785701a8ad905c44d5d3e8e33053ed98.jpeg"/>
			<description><![CDATA[<p>We go in search of the cybercriminal. We find out who they are, where they come from and why they do it.&nbsp;You learn how they lay the groundwork for an attack and come away with strategies to defend yourself.</p><p>With Sherrod DeGrippo, Senior Director of Threat Research and Detection at Proofpoint and Marc de Frontingnac, certified ethical hacker and sales engineer with Proofpoint.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>We go in search of the cybercriminal. We find out who they are, where they come from and why they do it.&nbsp;You learn how they lay the groundwork for an attack and come away with strategies to defend yourself.</p><p>With Sherrod DeGrippo, Senior Director of Threat Research and Detection at Proofpoint and Marc de Frontingnac, certified ethical hacker and sales engineer with Proofpoint.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Episode 1 - Email Bounce Back </title>
			<itunes:title>Episode 1 - Email Bounce Back </itunes:title>
			<pubDate>Thu, 06 Aug 2020 04:53:01 GMT</pubDate>
			<itunes:duration>25:50</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/5ecc54aa4b408c1d03ec8a25/e/5ecc5a12d4d05b65147d70b3/media.mp3" length="49602176" type="audio/mpeg"/>
			<guid isPermaLink="false">5ecc5a12d4d05b65147d70b3</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://proofpoint.com/hackableme</link>
			<acast:episodeId>5ecc5a12d4d05b65147d70b3</acast:episodeId>
			<acast:showId>5ecc54aa4b408c1d03ec8a25</acast:showId>
			<acast:episodeUrl>email-bounce-back</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs0C3Fc1kUWr/wtY0RHHVQYMxppowlSHK28GAIW5xX0NK7UcsjQV/Z0Pq4W0hGbwFST3ztU0uUYNOnkNYweDLB3l474aFVVy4huqreqsUEyt7zIjEAMTvUwJf2zJ+rvdC8]]></acast:settings>
			<itunes:subtitle>Episode 1</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>1</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/5ecc54aa4b408c1d03ec8a25/1596174008409-785701a8ad905c44d5d3e8e33053ed98.jpeg"/>
			<description><![CDATA[<p>Email phishing and social engineering are the most common cyber attacks. So how do they work and what role does human psychology play?</p><p>&nbsp;</p><p>With Ryan Kalember, Executive Vice President of Cybersecurity Strategy at Proofpoint and Sherrod DeGrippo, Senior Director of Threat Research and Detection at Proofpoint.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Email phishing and social engineering are the most common cyber attacks. So how do they work and what role does human psychology play?</p><p>&nbsp;</p><p>With Ryan Kalember, Executive Vice President of Cybersecurity Strategy at Proofpoint and Sherrod DeGrippo, Senior Director of Threat Research and Detection at Proofpoint.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Introducing Hackable Me</title>
			<itunes:title>Introducing Hackable Me</itunes:title>
			<pubDate>Fri, 31 Jul 2020 05:34:11 GMT</pubDate>
			<itunes:duration>2:09</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/5ecc54aa4b408c1d03ec8a25/e/5ecc5847add3db7b44d2ef9e/media.mp3" length="4158848" type="audio/mpeg"/>
			<guid isPermaLink="false">5ecc5847add3db7b44d2ef9e</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://proofpoint.com/hackableme</link>
			<acast:episodeId>5ecc5847add3db7b44d2ef9e</acast:episodeId>
			<acast:showId>5ecc54aa4b408c1d03ec8a25</acast:showId>
			<acast:episodeUrl>introducing-hackable-me</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs0C3Fc1kUWr/wtY0RHHVQYMxppowlSHK28GAIW5xX0NKb70C0nVBsBt6iJmZrjqLu+8jDtWKa391ecrThx10YgUZzCjz/e3ggkopSNMCsKVbRFVpEcWaXrpgDLQ1juYOe]]></acast:settings>
			<itunes:subtitle>The world of cybercrime revealed </itunes:subtitle>
			<itunes:episodeType>trailer</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:image href="https://assets.pippa.io/shows/5ecc54aa4b408c1d03ec8a25/1596173632173-ac1a474bd2c69f1d845f3c22507a4c97.jpeg"/>
			<description><![CDATA[<p>Hackable Me is the podcast that pulls back the curtain on the industry of cybercrime.</p><br><p>What is social engineering and why does it still work? How are online lotharios using these techniques to “catfish” and trick would-be partners? What is phishing and who exactly falls for those emails from Nigerian princes?</p><br><p>Listen and learn from our team of cyber experts, authors and a socio-technical analyst – because we’re all hackable.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Hackable Me is the podcast that pulls back the curtain on the industry of cybercrime.</p><br><p>What is social engineering and why does it still work? How are online lotharios using these techniques to “catfish” and trick would-be partners? What is phishing and who exactly falls for those emails from Nigerian princes?</p><br><p>Listen and learn from our team of cyber experts, authors and a socio-technical analyst – because we’re all hackable.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
    	<itunes:category text="Business"/>
    	<itunes:category text="Technology"/>
    	<itunes:category text="True Crime"/>
    </channel>
</rss>
