Proofpoint Logo

Series 2

Hackable Me is back with three exciting new episodes! Series 2 investigates the cost of cybercrime. How much do hackers spend on initiating an attack? And what are the monetary and emotional prices paid by businesses and consumers?

podcast artwork

What is the cost to a hacker to launch a cyber attack?

Cyber attacks are being reported with more frequency than ever before, as criminals appear to be making large amounts of money. But what does it cost a cyber criminal to launch one of these attacks? And as they set their sights on bigger, more rewarding targets, could those costs become higher and riskier?

With Adrian Covich, senior director of technical sales at Proofpoint for Asia Pacific and Japan, and Andrew Milroy, founder of digital risk advisory firm Veqtor8.

podcast artwork

How much does a cyber attack cost businesses and their employees?

As criminals set their sights on larger targets, businesses are finding themselves dealing with cyber attacks on a regular basis. What do businesses need to do to keep themselves, and their clients safe? And when an attack on a business affects customers, who should take responsibility?

With Yvette Lejins, a former chief information security officer and current CISO in residence at Proofpoint APJ and Malcolm Turnbull, former prime minister of Australia.

podcast artwork

What are the costs to individuals who have fallen victim to a cyber attack?

What do you do when you realise you’ve just lost thousands of dollars to a cyber attack? The costs of cyber crime can be the undoing of individuals, and as criminals become more and more adept at accessing our personal data, how do you keep yourself safe from an attack?

With Sanjay Joseph and Dr Alana Maurushat, Professor of Cybersecurity and Behaviour at Western Sydney University.

Series 1

Most of us are having fewer face-to-face meetings, working from home on un-encrypted servers or using changed work procedures. This is music to a hacker’s ears — and the reason we created Hackable Me.

Hackable Me is the podcast that pulls back the curtain on the hacking industry. What are the origins of social engineering and why does it still work? What is phishing and how is business reacting to the threat? How are online lotharios using similar techniques to trick would-be partners? Who falls for those emails from Nigerian Princes? And how do you protect yourself and the company you work for from loss? Listen and learn from our team of cyber experts, as well as a leading cybercrime author, a technology futurist and a socio-technical analyst.

podcast artwork

Email phishing and social engineering are the most common cyber attacks. So how do they work and what role does human psychology play?

podcast artwork

We go in search of the cybercriminal. We find out who they are, where they come from, why they do it. Learn how they lay the groundwork for an attack and come away with strategies to defend yourself.

podcast artwork

How are our human frailties exposing us to cyber risk? We learn how cybercriminals exploit our psychology for more than just money.

podcast artwork

Cybersecurity has always evoked science fiction, but recent technological developments are pushing the boundary between imagination and reality. What will you need to look for into the future?

Take the
Hack-Wise Test

This ‘new normal’ has meant that we’re online even more than ever, yet it’s common knowledge that people are a cyber criminal’s greatest weapon.

Do you know how to ‘hack the hackers’ and keep your information and identity safe?

Take the short test to find out — then share your result on social media and challenge your friends to beat it.


Help your Friends to

Hacker activity is on the up but by sharing your test result, you’ll encourage everyone you know to get Hack-Wise.

About Proofpoint

Proofpoint protects organisations’ biggest risks and greatest assets: their people. With an integrated, cloud-based suite of people-centric compliance and security solutions, we help leading organisations mitigate their most critical security and compliance risks.