In the electric chaos of DEF CON—where dial tones, solder smoke, and hacker legends collide—one figure stands out: John Aff, aka PANDA.
A veteran in the hacker community, he moves effortlessly between challenge design, telephony wizardry, mesh networking experiments, and the culture that surrounds it all.
Behind the reputation is a journey that started with game hacking, shifted into enterprise security, and evolved into a life built around creativity, community, and technical obsession. It’s also a story of identity—of finding a place where personal expression and professional skill finally intersected.
This conversation pulls back the curtain on a mind shaped by curiosity, lived experience, and a deep love for the craft.
CHAPTERS
00:00 - Introduction to Barcode Podcast
00:24 - Meet Panda: Cybersecurity Icon
01:47 - Panda's Journey into Cybersecurity
10:12 - Creating Interactive Challenges for Conferences
22:11 - Badge Building: The Art and Science
28:00 - Lessons from Offensive Security for Defenders
30:11 - Winning the TeleChallenge: A Team Effort
35:10 - Nostalgia in Gaming: The Phone Verse Experience
37:30 - Understanding LoRa and Mesh Networking
43:20 - Real-World Applications of MeshTastic Technology
49:14 - The Intersection of Furry Culture and Cybersecurity
56:54 - Community Building and Future Aspirations in Tech
LINKS
TelePhreak – https://telephreak.org An informatione trading post for the computer enthusiast (the hacker), telephony technophiles (the phreak), radio junkies (the HAM).
DEF CON – https://defcon.org/ The world’s largest hacker conference and the backdrop for many of Panda’s stories, competitions, and breakthroughs.
RedSeer Security – https://redseersecurity.com The security practice Panda supports on the defensive and strategic side.
Assura, Inc. – https://assurainc.com Where Panda leads offensive security operations and continuous testing programs.
MeshTastic – https://meshtastic.org Open-source long-range mesh communication project central to Panda’s community work.
Comms For All – https://commsforall.com Panda’s initiative focused on mesh networking, LoRa radios, and community education.
B-Sides Jax – https://bsidesjax.org Conference where Panda built the interactive phone-based badge challenge.
HackSpaceCon – https://hackspacecon.com The first conference where you and Panda crossed paths; a major Florida hacker gathering.
JLCPCB – https://jlcpcb.com PCB manufacturing service used for producing custom badge hardware.
EasyEDA – https://easyeda.com Design tool Panda uses to create the multilayer art and circuitry for badges.
Vectorizer.AI – https://vectorizer.ai The AI-powered tool Panda relies on to convert artwork into vector format for PCB badge design.
KiCad – https://kicad.org Open-source PCB design suite used for laying out circuits and prototyping badge hardware.
Adtran – https://www.adtran.com Telecom hardware vendor whose legacy gateways were used in the BSides Jax phone challenge.
QueerCon – https://www.queercon.org Long-running LGBTQ+ hacker community at DEF CON that collaborated with Panda on early badge projects.
National Cyber Games (NCA Cyber Games) – https://nationalcybergames.org Competition platform where Panda designed MeshTastic-based CTF challenges.
UNF Osprey Security – https://www.unf.edu University of North Florida’s student security group that runs CTFs and collaborated locally with Panda.
HackRedCon – https://hackredcon.com Security conference where Panda volunteers and participates in community events.
Jax2600 – https://2600.com Local chapter of the classic 2600 hacker community, part of Panda’s long-term involvement in grassroots infosec groups.
Backdoors & Breaches – https://blackhillsinfosec.com/projects/backdoors-breaches Incident response card game Panda used for blue team development and tabletop exercises.
Enter the mind of Amar Sonik - a DevOps engineer, community builder, and lifelong technologist whose journey spans from the help desk to the heart of cybersecurity. Known for shaping BSides Singapore and now lending his voice to The Borg Radio Hour, Sonic reveals how curiosity fueled his evolution, how mentorship from Len Noe helped him command the stage, and why community, creativity, and calm remain the true superpowers in tech. From meditation to zero days, from tabla rhythms to threat research - this conversation reminds us that behind every exploit, every innovation, and every line of code, lies a deeply human story.00:00 Introduction and Background
01:43 The Journey into Public Speaking
03:58 Experiences at CyberSecCon
06:26 The Impact of the Documentary 'I Am Machine'
08:58 The Role of Community in Technology
10:04 The Importance of Informal Networks
12:36 The Launch of Borg Radio Hour
14:55 Personal Connections and Daily Affirmations
19:23 Daily Affirmations and Positive Mindset
23:21 Journey into Cybersecurity
31:03 The Intersection of Music and Technology
33:18 Creating a Cybersecurity Coffee Shop
SYMLINKS
[CyberSecCon] –CyberSecCon | Bringing Business & Tech Together A cybersecurity conference referenced as a major event in the guest’s professional community. The guest helped organize this event, and it serves as a hub for security professionals to collaborate and share insights.
[B-Sides Singapore] – https://bsidessg.org/ A community-driven cybersecurity conference organized by the guest (“Sonic aka Kenosa”) for the past six years. B-Sides events are known globally for offering inclusive, grassroots spaces for learning and networking in information security.
[I Am Machine Documentary] – https://i-am-machine.com/ A cybersecurity-themed documentary filmed in Las Vegas and released in August. It features interviews with industry professionals and was picked up by two film festivals, highlighting stories of technology, identity, and resilience in cybersecurity.
[The Borg Radio Hour] – https://www.youtube.com/@TheBorgRadioHour An online radio program the guest is now an associate of. It appears to be connected to the cybersecurity or hacker community, serving as a creative platform for tech discussions or related storytelling.
Summary:
Live from the BarCode YachtCast 2025, host Chris Glanden sits down with Krista Arndt, Associate CISO at St. Luke’s University Health Network and author of “Permission to Be Real.” In this raw and authentic conversation recorded aboard the SS McMenamin, Krista shares her journey from aspiring nurse to cybersecurity leader, the parallels between drag racing and infosec, and the art of blending authenticity with corporate leadership.
This episode dives deep into risk, resilience, leadership, and the psychology of authenticity — while celebrating the Philly tech community, Titan 100 leaders, and the human side of cybersecurity.
00:00 – Opening freestyle & Philly Tech Council shout-out
02:28 – Welcome aboard the BarCode YachtCast 2025
03:13 – Introducing Krista Arndt, “Awesome Sauce CISO”
05:00 – Life in healthcare security: high stakes & human impact
06:10 – From surviving to leading: Krista’s unconventional path
07:36 – Drag racing & cybersecurity: managing risk in high-speed chaos
09:55 – The psychology behind leadership under pressure
10:49 – Being real: authenticity in corporate culture
12:44 – Finding balance between personality and professionalism
13:09 – About the book “Permission to Be Real”
15:00 – The importance of culture fit and personal growth
16:06 – Recognizing leadership beyond accolades
18:30 – What Titan 100 really means for Philly tech leaders
21:28 – “The language of the business” — redefined
23:25 – Q&A, laughs, and book giveaways
24:22 – Closing credits
BarCode Podcast: https://barcodesecurity.com/podcastKrista Arndt – “Permission to Be Real” on Amazon: https://www.amazon.com/Permission-Be-RealConnect with Krista on LinkedIn: https://www.linkedin.com/in/kearndtPhilly Tech Council: https://phillytechcouncil.orgTitan 100 Philadelphia: https://www.titan100.biz/philadelphiaBarCode Events & Live Shows: https://barcodesecurity.com/events
Subscribe to the BarCode Podcast for real conversations with the people shaping the future of cybersecurity, tech, and human resilience.
“Flow State” isn’t just a nod to the psychological zone of peak focus — it reflects Yuriy Sibere’s entire approach to life and work. From tinkering with a ZX Spectrum in Ukraine to managing cross-functional security products at ThreatLocker, Yuriy embodies adaptability, alignment, and precision amid complexity.
He thrives where vision meets implementation — translating abstract strategy into tangible, human-centric security products. Calm under shifting priorities, relentlessly curious, and articulate in execution, Yuriy represents the discipline behind today’s most effective cybersecurity innovation.
In this conversation, host Chris sits down with Yuriy to trace his path from IT operations to product leadership in cybersecurity. They explore how early curiosity shaped his mindset, how communication builds trust across teams, and how to balance security with usability under real-world pressures. Tune in to discover how clarity, collaboration, and human-centered design fuel success in modern security product management.
00:00 Yuriy's Journey into Cybersecurity
04:52 Effective Product Management in Cybersecurity
09:05 Overcoming Collaboration Challenges
11:04 Managing Technical Debt
13:21 User Experience in Security Products
15:39 Communication in Global Teams
16:01 Closing Thoughts and Future Connections
SYMLINKS
[ThreatLocker] - https://www.threatlocker.com
ThreatLocker is a cybersecurity company specializing in endpoint security and zero trust solutions. In the episode, Yuriy Tsibere shares his experience as a Product Manager at ThreatLocker and discusses how the company buildsuser-focused security products.
[LinkedIn – Yuriy Tsibere] - https://www.linkedin.com/in/yuriytsibere
Yuriy’s professional profile where listeners can learn more about his background, connect with him, and follow his work in cybersecurity and productmanagement.
[LinkedIn – ThreatLocker] - https://www.linkedin.com/company/threatlocker
The official LinkedIn page for ThreatLocker, offering updates, company insights, and product news related to cybersecurity innovation.
[Zero Trust World Conference] -https://zerotrustworld.com
An annual event hosted by ThreatLocker that brings together IT professionals, cybersecurity experts, and technology leaders to discuss advancements in zerotrust security.