document.body.classList.toggle('menu-open', show); // Add 'menu-open' class to body.

CEO Q&A: an interview with Eliza-May Austin

th4ts3cur1ty.company - Meet The Team - Eliza
Written by Eliza-May Austin
July 29, 2024
Tags – ,

Our CEO Q&A with Eliza-May Austin proves that...well, she's not boring - let's put it that way.

You may have seen her posts on LinkedIn, so you already know this. But there’s a lot more to EMA than you might think, so what better time for a CEO Q&A with the woman herself?

Find out below about how th4ts3cur1ty.company came to be, observing an ill-advised phishing test…and a potential link to Danny DeVito!

If your cybersecurity company were a superhero, what would its superpowers be and why?

The Invisible Man. We made the mistake of choosing a company name that is hated by the Google algorithm and we also don’t discuss our customers publicly, meaning no logos on the website. We’ve inadvertently made ourselves a little invisible, but the upside is that we are trusted and we’re invited to work on some pretty interesting contracts; we just don’t get to brag about them.

What was the ‘lightbulb moment’ that made you say, “I need to start my own cybersecurity company?”

I’ve experienced cybersecurity from both sides; as a user whilst working internally at large organisations, and on the delivery side of cyber services. Along the way, I noticed some major systemic issues in how cybersecurity is bought and delivered. These weren’t just isolated problems specific to certain organisations; they were widespread across the entire cyber ecosystem.

It was clear that a few meetings or workshops wouldn’t make a real difference, so I teamed up with Stephen Ridgway to create a security company that does things differently. Our goal was to challenge the status quo and address those systemic issues head-on. Now, in our sixth year and with a growing team, it’s evident that we’re on the right track.

What’s the most surprising or unexpected threat you’ve ever encountered in your career?

I’ve worked on some pretty impressive cases. One standout involved a well-known APT using an international company as a training ground. You could actually tell when the junior trainees were in “class” versus when the more advanced individuals took over. This taught me early on not to rely solely on the technical TTPs during incident response.

It’s crucial to understand the attackers – their motives, origins, organisational structures, and the level of professionalism they bring to their operations.

If you could have dinner with any famous hacker (ethical or otherwise), who would it be and what would you ask them?

Easy – I’d pick Cliff Stoll, the author of The Cuckoo’s Egg. I’d encourage anyone to read that book. He took it upon himself to investigate an oddity and ended up catching a hacker. It’s the kind of mindset I look for when hiring; people who just have an interest in what they do and push themselves not to give up on it. He’s a super interesting character and I’d love to take him for a steak!

What’s your favourite non-tech activity to unwind after a long day of fighting cyber threats?

Reading, walking and watching Alien documentaries.

What’s the funniest or most bizarre phishing attempt you’ve ever seen?

Bizarre, yes; funny no. A “professional” phishing company hired by one of our PocketSIEM customers sent out a phishing campaign about sexual harassment to the customer. It was advertised internally as a sexual harassment warning, but when people clicked on it it came up with this banner saying “oops – you failed the phishing test!”.

That probably really triggered some people at that customer and would have affected their reputation if staff members had posted that online. Imagine having experienced that situation and thinking your employer was taking it seriously, and then being hit with this email in the office. It was a nail in the coffin that ultimately lost them that contract. The customer took it really seriously – good on them.

How would you explain what you do to a five-year-old?

“We protect companies from hackers,
We help companies that have been hacked,
Ee-i-ee-i-oh!

If your company’s journey were made into a movie, what would be the title and who would play you?

“Defenders”. It’d be an action movie and I’d be played by Danny DeVito, probably.

What’s your go-to “pump-up” song before a big presentation or tackling a major cyber threat?

I can’t listen to songs while working – I get too distracted by the words. I sometimes settle for classical Baroque because I like it, but also because I’m a little pretentious.

Want more from Eliza and the team?

If you enjoyed out CEO Q&A, watch this space for more behind-the-scenes content from th4ts3cur1ty.company!

You can also follow Eliza over on LinkedIn.

Like what you see? Share with a friend!

th4ts3cur1ty.company - Meet The Team - Eliza

This article is written by

Eliza-May Austin

CEO

Eliza exudes a captivating, no-nonsense demeanour that defines the services provided by th4ts3cur1ty company. As a proud Yorkshire woman, she boasts an impressive expertise in tea, gravy, and local hiking trails. Clients value Eliza’s practical, assertive stance on security, especially in challenging situations. Quietly dubbed the “Winston Wolfe of cyber”, she navigates complex conditions with a calm and strategic approach. Trust her to handle security matters with finesse and to get you out of a bind with determined resolve.