Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

TEISS Podcasts

show episodes
 
Loading …
show series
 
Exploitable vulnerabilities within OT devices and how this is expected to change Cyber warfare risk in 2026 - how organisations can defend themselves Securing the supply chain and expanding XIoT attack surface Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Jordan M. Schroeder, CISO https://www.linkedin.com/in/schroederjord…
  continue reading
 
How cyber criminals are weaponising AI to defeat your threat detection and response Beyond encryption – how ransomware has evolved to include data exfiltration, publication threats and supply chain compromise How geopolitical tensions are increasing nation-sponsored cyber-campaigns - proxy attacks, IT worker scams and supply chain risks Thom Langfo…
  continue reading
 
How modern ransomware actors are deploying multidimensional tactics to outpace traditional defences Strategies to reduce data loss and sustain business operations after an attack AI and automation – enhancing visibility and accelerating response to ransomware threats Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Edward St…
  continue reading
 
Identifying critical assets and dependencies to focus investment where impact is highest Designing for rapid recovery with tested runbooks and clear RTO/RPO targets Strengthening resilience through training, playbooks, and cross-functional drills Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Scott Hardy, CISO, Sargent-Dis…
  continue reading
 
Leveraging AI-powered solutions to anticipate, detect and contain asymmetric cyber threats Augmenting security teams through AI efficiencies – reducing alert fatigue whilst improving detection speed and accuracy Best AI security practices on safeguarding critical systems and sensitive data against AI-driven cyber threats Thom Langford, Host, teissT…
  continue reading
 
Bridging the CISO-board disconnect which hinders your cyber-security progress Measuring cyber-risk in financial, economic and operational terms and demonstrating value in cyber-investments Focusing on governance and compliance – how to answer when asked “are we compliant? Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Zia …
  continue reading
 
How appreciation and gamification can improve your employees’ security awareness Making security behaviours stick – reframing mistakes as opportunities for growth Fostering a culture of continuous improvement with an inclusive learning environment Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Sara Carty, Founder & CEO, Un…
  continue reading
 
Which techniques and methods use by threat actors are bypassing security parameters Reducing your cyber risk - using lessons learned from recent high-profile attacks Strategies to protect your service desk against identity-based attacks Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Paul Holland, Cyber Capability Manager, …
  continue reading
 
70% of critical security debt stems from third-party code - what can be done upstream? How real-time threat intelligence and policy enforcement are closing the gap Why DORA and modern CI/CD pipelines demand pre-emptive visibility and automation Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Paul Holland, Cyber Capability M…
  continue reading
 
Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threats Meeting API compliance and data protection challenges with emerging technologies Moving towards a mature posture for API security Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Satyam Rastogi, Director of Information Security & …
  continue reading
 
Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threats Meeting API compliance and data protection challenges with emerging technologies Moving towards a mature posture for API security Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Tiago Rosado, Chief Information Security Officer, A…
  continue reading
 
Analysing how your teams cope with a cyber incident or a failure scenario Learning from crises - building resilience strategies to mitigate future incidents Building a cyber resilient mindset within your infosec team and in the wider organisation Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Raza Sadiq, Head of Enterprise…
  continue reading
 
Risk-based prioritising using severity scoring and patch analysis Escaping the silo trap - bridging the gap between IT and security teams Automate rules to handle high-severity vulnerabilities and zero-days Jonathan Craven, Host, teissTalk https://www.linkedin.com/in/jonathanbcraven/ Tiago Rosado, Chief Information Security Officer, Asite https://w…
  continue reading
 
How cyber criminals are using AI tools to scale malicious operations Streamlining user experience with biometrics or device-based authentication Making your organisation cyber resilient and securing critical systems as AI continues to advance Featuring: Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Derek Hanson, VP Soluti…
  continue reading
 
Which behaviours increase risk and how we can measurably change them Driving employee engagement without incentives Which real-time interventions encourage safer employee behaviours Jonathan Craven, Host, teissTalk https://www.linkedin.com/in/jonathanbcraven/ Rebecca Stephenson, Specialist Lead Lecturer, Highlands College https://www.linkedin.com/i…
  continue reading
 
Reducing personal risk with your organisation’s liability insurance Understanding the evolving risk landscape through recent case studies Creating a workplace ethos of shared accountability This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Michela Resta, Solicitor, CYXCEL https://www.linkedin.com/in/michelarestacyxce…
  continue reading
 
Trends in the current credential theft landscape and changing compliance standards Strategies to reduce password risk - continuous scanning, enforced policies and exclusion dictionaries Encouraging users to create strong, securely stored passwords without reuse This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Shanno…
  continue reading
 
What DORA is specifically asking of organisations Where the likely CTI gaps are when attempting to align with DORA Why innovation is key to aligning your CTI capabilities This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Benoit Heynderickx, Principal Analyst, Information Security Forum (ISF) https://www.linkedin.com/…
  continue reading
 
Preparing for ransomware - where is your data and how is it protected? Building cyber resilience for your data, across on-premises and cloud Reducing the window of damage and minimising the time to recover This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Heather Lowrie, Independent Advisor, Earthgard Ltd https://www…
  continue reading
 
Identifying and removing barriers to cyber resilience Reducing complexity - consolidating and eliminating legacy systems Building a cyber-resilient organisation - moving from a reactive to a proactive model This episode is hosted by Thom Langford: https://www.linkedin.com/in/jonathanbcraven/ Heather Lowrie, Independent Advisor, Earthgard Ltd https:…
  continue reading
 
Where metrics and evaluations fall short in measuring holistic security effectiveness Identifying gaps between tools and determining which gaps you need to fill Showing the board and the business that cyber-security is moving the needle on resilience This episode is hosted by Jonathan Craven: https://www.linkedin.com/in/jonathanbcraven/ Richard Abs…
  continue reading
 
How cyber-attackers are using GenAI to evade detection by security systems Safeguarding against sophisticated ransomware attacks with robust security measures Top tactics for stopping ransomware attacks before they cause damage This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ John Heaton-Armstrong, Experienced Cybe…
  continue reading
 
Whether compliance-as-security in CNI offers security or false confidence Navigating tool and dashboard complexity to avoid CNI cyber blind spots Attracting cyber talent into CNI and away from finance and tech This episode is hosted by Jonathan Craven: https://www.linkedin.com/in/thomlangford/ Sofia Martinez Gomez, VP, Risk & Tech Practice - Cybers…
  continue reading
 
Fortifying security defences with automated root cause analysis and prioritisation Managing security risk urgency across your application pipeline with real-time visibility and data visualisation capabilities Driving efficiency and prioritisation across your security ecosystem with practical remediation actions This episode is hosted by Thom Langfo…
  continue reading
 
What’s making supply chain risk the fastest-growing cyber-risk category How to galvanise your internal and external peers to develop a shared responsibility for supply chain cyber-risks Designing and implementing effective key controls to mitigate supply chain cyber-risks This episode is hosted by Jonathan Craven: https://www.linkedin.com/in/jonath…
  continue reading
 
How the human risk surface area has broadened with GenAI and collaboration tools Prevent breaches by applying the cyber kill chain to human vulnerabilities Strategies to protect employees without compromising productivity This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Daniela Almeida Lourenco, Chief Information S…
  continue reading
 
How cyber-crime continues to evolve and what this means for enterprise threat intelligence strategies Evaluating sources and deciding which characteristics are most relevant How DNS-based threat intelligence versus a malware-centric approach disrupts industrialised cyber-crime This episode is hosted by Thom Langford: https://www.linkedin.com/in/tho…
  continue reading
 
Automating SecOps processes and procedures - free your people, improve retention and increase productivity Where creativity and diversity is keeping your SecOps one step ahead of the attackers Matching your effectiveness to organisational objectives - aligning your internal SOC metrics with those required by the board This episode is hosted by Thom…
  continue reading
 
How evolving methods of work are expanding the attack surface Growth of supply chain attacks targeting devices touching sensitive data Increased nation-state targeting of Critical National Infrastructure This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Richard Absalom, Principal Research Analyst, Information Securi…
  continue reading
 
Diverse threat vectors and complex attacks - how to expand your detection and response programmes Helping your SOC analysts achieve more - finding the right combination of internal ML/AI tools and external providers Pathways to accelerate your SOC development to detect and mitigate attacks earlier This episode is hosted by Thom Langford: https://ww…
  continue reading
 
Identifying which data assets to prioritise Building an enterprise-level cyber-security profile on a budget Strengthening your cyber-resilience with incident response playbooks This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Steven Furnell, Professor of Cyber Security, University of Nottingham https://www.linkedin…
  continue reading
 
Minimising the risks to your security posture from developers’ reliance on GenAI Using AI to speed up remediation and avoid security becoming the bottleneck Steps to ensure safe and secure implementation of GenAI in software development This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Lee Munson, Principal Research…
  continue reading
 
Why the traditional malware-centric approach to security doesn’t enable proactive protection Pre-empting and protecting attacks before they are launched - looking at the threat actors attack infrastructure Emergent domains, what are they and why they need a layered detection This episode is hosted by Thom Langford: https://www.linkedin.com/in/thoml…
  continue reading
 
Where does Zero Trust fall short, and why these failings encourage cyber-crime Expanding Zero Trust to protect the data itself Identifying, classifying, and securing sensitive data through automation This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Jean Carlos, VP Cyber Security, BOXT https://www.linkedin.com/in/je…
  continue reading
 
Leveraging behavioural AI to mitigate the risk of phishing attacks Fortifying your defenses against the next wave of phishing threats Practical strategies for empowering colleagues while strengthening your cyber resilience This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Rebecca Stephenson, Specialist Lead Lecturer …
  continue reading
 
Meeting your operational and legal obligations - getting your foundations in order Cyber-proofing your organisation with comprehensive cyber-security training and awareness Developing cyber-hygiene to defend against cyber-criminals using emerging technology This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Paul Holla…
  continue reading
 
A proactive approach to third-party risk - continuous monitoring of suppliers Using threat intelligence to identify third-party risk Effectively working with partners to mitigate third-party security risks This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Chuck Brooks, Adjunct Professor, Georgetown University https:/…
  continue reading
 
How the next generation of InfoSec leaders can better prepare themselves to navigate the threats of tomorrow Identifying the quick wins and making the most of the finite time new CISOs have to get their message across Practical measures for reducing stress, burnout and frustration within InfoSec teams over the longer term This episode is hosted by …
  continue reading
 
Gaining comprehensive visibility across your hybrid and multi-cloud environments Mitigating hidden threats and vulnerabilities beyond your endpoints and network parameters Maximising your cyber security investments with better visibility and optimised tool performance This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/…
  continue reading
 
Threat trends - how threat actors are targeting C-Suite executives to access the enterprise Empowering your C-Suite to identify and avoid social engineering Creating social media policies that your C-Suite understand so that they can lead by example This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Thomas Wendrich, A…
  continue reading
 
Protecting your endpoints - how do cybercriminals exfiltrate data, and what trends are we seeing? Mitigating the financial, legal, and reputational risks with a comprehensive data strategy Leveraging next-generation technology to rapidly detect and respond to data exfiltrating ransomware attacks This episode is hosted by Thom Langford https://www.l…
  continue reading
 
How you can reduce data loss resulting from user error, disgruntled employees, or cyber attacks Leveraging existing and emerging technologies to enhance your preparedness against the latest attack vectors and threat actors Investing in autonomous and integrated security platforms without breaking the bank This episode is hosted by Thom Langford htt…
  continue reading
 
Building rapport with the board through persuasive communication skills Leveraging your influence to drive business change and manage cyber risks Measuring the impact of your actions and advice This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Alan Jenkins, Principal Consultant, Cyber Security Navigator Ltd https://w…
  continue reading
 
The privacy challenges of using the network as your fundemental point of defence Whether InfoSec leaders can ever get full network visibility Setting privacy controls to reduce vulnerabilities and blindspots within your network This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Tom Ellis-Aziz, Associate Director, Cont…
  continue reading
 
Proving that your infosec strategy delivers a competitive advantage Managing the risks and costs of a business-enabling infosec team Balancing business objectives with infosec needs to deliver security and growth This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Alan Jenkins, Principal Consultant, Cyber Security Navi…
  continue reading
 
How infosec leaders can support product teams incorporating generative AI Using AI to improve compliance processes and ongoing vulnerability monitoring Mitigating and minimising AI-based information security risks with ISO 42001 This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Dean Sapp, SVP, Information Security, P…
  continue reading
 
Closing the cybersecurity gap - acting fast against critical threats Aligning to current compliance standards without the heavy-lifting Leveraging AI-powered tools to maximise your security investments This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Mike Johnson, Global Cyber Threat & Incident Response Manager, Ver…
  continue reading
 
Ensuring your risk management framework meets your organisation’s needs Ransomware, legacy devices and remote access - risk trends for OT Why you should prioritise risks based on the likelihood of exploitation as well as impact This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Syed Ubaid Ali Jafri, Head of Cyber Defe…
  continue reading
 
How does NIS2 address risks within critical supply chains and information sharing across borders? Maintaining a proactive stance against evolving threats - how continuous improvement complies with NIS2 Ensuring timely compliance - meeting the new requirements in risk assessment and avoiding penalties This episode is hosted by Thom Langford https://…
  continue reading
 
Selecting metrics that best convey the impacts and risks of your strategy to the board How the changing threat landscape will affect your cyber resilience The role cyber insurance plays as a component of your resilience strategy This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Daniel G. Dresner, Professor of Cyberse…
  continue reading
 
Loading …
Copyright 2026 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play