How appreciation and gamification can improve your employees’ security awarenessMaking security behaviours stick – reframing mistakes as opportunities for growthFostering a culture of continuous improvement with an inclusive learning environmentThom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Sara Carty, Founder & CEO, Unboring https://www.linkedin.com/in/saracarty/ Penny Jackson, Director Strategy, Awareness & Engagement (Human Risk Management), Aristos Part...
All content for teissPodcast - Cracking Cyber Security is the property of TEISS and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
How appreciation and gamification can improve your employees’ security awarenessMaking security behaviours stick – reframing mistakes as opportunities for growthFostering a culture of continuous improvement with an inclusive learning environmentThom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Sara Carty, Founder & CEO, Unboring https://www.linkedin.com/in/saracarty/ Penny Jackson, Director Strategy, Awareness & Engagement (Human Risk Management), Aristos Part...
How appreciation and gamification can improve your employees’ security awarenessMaking security behaviours stick – reframing mistakes as opportunities for growthFostering a culture of continuous improvement with an inclusive learning environmentThom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Sara Carty, Founder & CEO, Unboring https://www.linkedin.com/in/saracarty/ Penny Jackson, Director Strategy, Awareness & Engagement (Human Risk Management), Aristos Part...
Which techniques and methods use by threat actors are bypassing security parametersReducing your cyber risk - using lessons learned from recent high-profile attacksStrategies to protect your service desk against identity-based attacksThom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Paul Holland, Cyber Capability Manager, Royal Mail https://www.linkedin.com/in/paulinfosec/ Lukas Weber, Senior Vice President, AlixPartners https://www.linkedin.com/in/lukaswebr/ Rebecca...
70% of critical security debt stems from third-party code - what can be done upstream?How real-time threat intelligence and policy enforcement are closing the gapWhy DORA and modern CI/CD pipelines demand pre-emptive visibility and automation Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Paul Holland, Cyber Capability Manager, Royal Mail https://www.linkedin.com/in/paulinfosec/ Tiago Rosado, Chief Information Security Officer, Asite https://www.linkedin.com/i...
Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threatsMeeting API compliance and data protection challenges with emerging technologiesMoving towards a mature posture for API securityThom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Satyam Rastogi, Director of Information Security & DevOps, BAMKO https://www.linkedin.com/in/hackersatyamrastogi/ Mike Johnson, Global Cyber Threat & Incident Response Manager, Verifone https...
Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threatsMeeting API compliance and data protection challenges with emerging technologiesMoving towards a mature posture for API securityThom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Tiago Rosado, Chief Information Security Officer, Asite https://www.linkedin.com/in/tiagorosado/ Anne Coulombe, CISO, Bleuet LLC https://www.linkedin.com/in/annecoulombe/ Menachem Perlman, Dir...
Analysing how your teams cope with a cyber incident or a failure scenarioLearning from crises - building resilience strategies to mitigate future incidentsBuilding a cyber resilient mindset within your infosec team and in the wider organisationThom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Raza Sadiq, Head of Enterprise Risk, MQube https://www.linkedin.com/in/razasadiq7/ Sara Carty, Founder & CEO, Unboring https://www.linkedin.com/in/saracarty/ Christoph Schuh...
Risk-based prioritising using severity scoring and patch analysisEscaping the silo trap - bridging the gap between IT and security teamsAutomate rules to handle high-severity vulnerabilities and zero-daysJonathan Craven, Host, teissTalk https://www.linkedin.com/in/jonathanbcraven/ Tiago Rosado, Chief Information Security Officer, Asite https://www.linkedin.com/in/tiagorosado/ Cameron Brown, Head of Cyber Threat and Risk Analytics, Ariel Re https://www.linkedin.com/in/analyticalcyber/ York v...
How cyber criminals are using AI tools to scale malicious operationsStreamlining user experience with biometrics or device-based authenticationMaking your organisation cyber resilient and securing critical systems as AI continues to advanceFeaturing: Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Derek Hanson, VP Solutions Architecture and Alliances, Yubico https://www.linkedin.com/in/derekthanson Jay Vinda, Global CISO and Cyber Risk Engineering Lead, Mosaic...
Which behaviours increase risk and how we can measurably change them Driving employee engagement without incentives Which real-time interventions encourage safer employee behaviours Jonathan Craven, Host, teissTalk https://www.linkedin.com/in/jonathanbcraven/ Rebecca Stephenson, Specialist Lead Lecturer, Highlands College https://www.linkedin.com/in/creative-minds-in-cyber/ Penny Jackson, Director Strategy, Awareness & Engagement (Human Risk Management), Aristos Partnersh...
Reducing personal risk with your organisation’s liability insurance Understanding the evolving risk landscape through recent case studies Creating a workplace ethos of shared accountability This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Michela Resta, Solicitor, CYXCEL https://www.linkedin.com/in/michelarestacyxcel/ Kelly Hagedorn, Partner, ALSTON & BIRD https://www.linkedin.com/in/kellyhagedorn/
Trends in the current credential theft landscape and changing compliance standardsStrategies to reduce password risk - continuous scanning, enforced policies and exclusion dictionariesEncouraging users to create strong, securely stored passwords without reuseThis episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Shannon Muller, Cyber security Specialist, Microsoft https://www.linkedin.com/in/shannon-muller/ Jay Vinda, Cyber Risk Engineering and Emerging Solutions ...
What DORA is specifically asking of organisationsWhere the likely CTI gaps are when attempting to align with DORAWhy innovation is key to aligning your CTI capabilitiesThis episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Benoit Heynderickx, Principal Analyst, Information Security Forum (ISF) https://www.linkedin.com/in/benoithey/ Tim Parker, Chair, South West Cyber Security Cluster https://www.linkedin.com/in/tim-parker Lewis Henderson, Director - Product Marke...
Preparing for ransomware - where is your data and how is it protected? Building cyber resilience for your data, across on-premises and cloud Reducing the window of damage and minimising the time to recover This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Heather Lowrie, Independent Advisor, Earthgard Ltd https://www.linkedin.com/in/heather-lowrie/ Raza Sadiq, Head of Enterprise Risk, MQube https://www.linkedin.com/in/razasadiq7/ Sandra Bell, ...
Identifying and removing barriers to cyber resilienceReducing complexity - consolidating and eliminating legacy systemsBuilding a cyber-resilient organisation - moving from a reactive to a proactive model This episode is hosted by Thom Langford: https://www.linkedin.com/in/jonathanbcraven/ Heather Lowrie, Independent Advisor, Earthgard Ltd https://www.linkedin.com/in/heather-lowrie/ Sasha Henry, Cyber Strategy & Resilience Advisor, Confidential https://www.linkedin.com/in/alexandra...
Where metrics and evaluations fall short in measuring holistic security effectiveness Identifying gaps between tools and determining which gaps you need to fill Showing the board and the business that cyber-security is moving the needle on resilience This episode is hosted by Jonathan Craven: https://www.linkedin.com/in/jonathanbcraven/ Richard Absalom, Principal Research Analyst, Information Security Forum (ISF) https://uk.linkedin.com/in/richard-absalom-48879116 Edward Star...
How cyber-attackers are using GenAI to evade detection by security systemsSafeguarding against sophisticated ransomware attacks with robust security measuresTop tactics for stopping ransomware attacks before they cause damageThis episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ John Heaton-Armstrong, Experienced Cyber security Leader, Confidential https://www.linkedin.com/in/johnheatonarmstrong/ Edewede Oriwoh, Group IT and Cybersecurity Manager, Zigup Plc https...
Whether compliance-as-security in CNI offers security or false confidenceNavigating tool and dashboard complexity to avoid CNI cyber blind spots Attracting cyber talent into CNI and away from finance and tech This episode is hosted by Jonathan Craven: https://www.linkedin.com/in/thomlangford/ Sofia Martinez Gomez, VP, Risk & Tech Practice - Cybersecurity, Privacy & Compliance, AlixPartners https://www.linkedin.com/in/sofia-martinez-gomez-8b5534136/?locale=en_US Moni...
Fortifying security defences with automated root cause analysis and prioritisationManaging security risk urgency across your application pipeline with real-time visibility and data visualisation capabilitiesDriving efficiency and prioritisation across your security ecosystem with practical remediation actionsThis episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ John Heaton-Armstrong, Experienced Cyber security Leader, Confidential https://www.linkedin.com/in/john...
What’s making supply chain risk the fastest-growing cyber-risk categoryHow to galvanise your internal and external peers to develop a shared responsibility for supply chain cyber-risksDesigning and implementing effective key controls to mitigate supply chain cyber-risks This episode is hosted by Jonathan Craven: https://www.linkedin.com/in/jonathanbcraven/ Mike Johnson, Global Cyber Threat & Incident Response Manager, Verifone https://www.linkedin.com/in/mike---johnson/ Jean Carlos,...
How the human risk surface area has broadened with GenAI and collaboration tools Prevent breaches by applying the cyber kill chain to human vulnerabilities Strategies to protect employees without compromising productivity This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Daniela Almeida Lourenco, Chief Information Security Officer, Dutch Financial Services https://www.linkedin.com/in/daniela-almeida-lourenco/ Rebecca Stephenson, Specialist Lead...
How appreciation and gamification can improve your employees’ security awarenessMaking security behaviours stick – reframing mistakes as opportunities for growthFostering a culture of continuous improvement with an inclusive learning environmentThom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Sara Carty, Founder & CEO, Unboring https://www.linkedin.com/in/saracarty/ Penny Jackson, Director Strategy, Awareness & Engagement (Human Risk Management), Aristos Part...