The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
TEISS Podcasts
1
teissTalk: 2026 predictions for OT security and the future of cyber physical systems
43:18
43:18
Play later
Play later
Lists
Like
Liked
43:18Exploitable vulnerabilities within OT devices and how this is expected to change Cyber warfare risk in 2026 - how organisations can defend themselves Securing the supply chain and expanding XIoT attack surface Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Jordan M. Schroeder, CISO https://www.linkedin.com/in/schroederjord…
…
continue reading
1
teissTalk: 2026 threat trends - securing your organisation against next-gen cyber attacks
43:16
43:16
Play later
Play later
Lists
Like
Liked
43:16How cyber criminals are weaponising AI to defeat your threat detection and response Beyond encryption – how ransomware has evolved to include data exfiltration, publication threats and supply chain compromise How geopolitical tensions are increasing nation-sponsored cyber-campaigns - proxy attacks, IT worker scams and supply chain risks Thom Langfo…
…
continue reading
1
teissTalk: Shielding sensitive data from ransomware – staying ahead of evolving threats
44:49
44:49
Play later
Play later
Lists
Like
Liked
44:49How modern ransomware actors are deploying multidimensional tactics to outpace traditional defences Strategies to reduce data loss and sustain business operations after an attack AI and automation – enhancing visibility and accelerating response to ransomware threats Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Edward St…
…
continue reading
1
teissTalk: Resilience as a business outcome
44:10
44:10
Play later
Play later
Lists
Like
Liked
44:10Identifying critical assets and dependencies to focus investment where impact is highest Designing for rapid recovery with tested runbooks and clear RTO/RPO targets Strengthening resilience through training, playbooks, and cross-functional drills Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Scott Hardy, CISO, Sargent-Dis…
…
continue reading
1
teissTalk: AI defence against offence - are you playing catch-up in the new security arms race?
44:17
44:17
Play later
Play later
Lists
Like
Liked
44:17Leveraging AI-powered solutions to anticipate, detect and contain asymmetric cyber threats Augmenting security teams through AI efficiencies – reducing alert fatigue whilst improving detection speed and accuracy Best AI security practices on safeguarding critical systems and sensitive data against AI-driven cyber threats Thom Langford, Host, teissT…
…
continue reading
1
teissTalk: Getting the board’s ‘aye’ on your cyber-security investments
45:29
45:29
Play later
Play later
Lists
Like
Liked
45:29Bridging the CISO-board disconnect which hinders your cyber-security progress Measuring cyber-risk in financial, economic and operational terms and demonstrating value in cyber-investments Focusing on governance and compliance – how to answer when asked “are we compliant? Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Zia …
…
continue reading
1
teissTalk: Help your colleagues help you with an enhanced security awareness programme
44:42
44:42
Play later
Play later
Lists
Like
Liked
44:42How appreciation and gamification can improve your employees’ security awareness Making security behaviours stick – reframing mistakes as opportunities for growth Fostering a culture of continuous improvement with an inclusive learning environment Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Sara Carty, Founder & CEO, Un…
…
continue reading
1
teissTalk: From service desk to security risk - stopping social engineering at the source
42:33
42:33
Play later
Play later
Lists
Like
Liked
42:33Which techniques and methods use by threat actors are bypassing security parameters Reducing your cyber risk - using lessons learned from recent high-profile attacks Strategies to protect your service desk against identity-based attacks Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Paul Holland, Cyber Capability Manager, …
…
continue reading
1
Live at teissLondon2025: From gatekeeping to guardrails - proactive supply chain security at scale
49:59
49:59
Play later
Play later
Lists
Like
Liked
49:5970% of critical security debt stems from third-party code - what can be done upstream? How real-time threat intelligence and policy enforcement are closing the gap Why DORA and modern CI/CD pipelines demand pre-emptive visibility and automation Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Paul Holland, Cyber Capability M…
…
continue reading
1
teissTalk: Advancing compliance maturity in an age of DORA & NIS2
45:42
45:42
Play later
Play later
Lists
Like
Liked
45:42Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threats Meeting API compliance and data protection challenges with emerging technologies Moving towards a mature posture for API security Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Satyam Rastogi, Director of Information Security & …
…
continue reading
1
teissTalk: Refining your API security strategy to protect against AI-driven attacks
45:30
45:30
Play later
Play later
Lists
Like
Liked
45:30Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threats Meeting API compliance and data protection challenges with emerging technologies Moving towards a mature posture for API security Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Tiago Rosado, Chief Information Security Officer, A…
…
continue reading
1
teissTalk: Building resilient infosec teams
45:05
45:05
Play later
Play later
Lists
Like
Liked
45:05Analysing how your teams cope with a cyber incident or a failure scenario Learning from crises - building resilience strategies to mitigate future incidents Building a cyber resilient mindset within your infosec team and in the wider organisation Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Raza Sadiq, Head of Enterprise…
…
continue reading
1
teissTalk: Surviving a critical CVE - a high-impact playbook
47:42
47:42
Play later
Play later
Lists
Like
Liked
47:42Risk-based prioritising using severity scoring and patch analysis Escaping the silo trap - bridging the gap between IT and security teams Automate rules to handle high-severity vulnerabilities and zero-days Jonathan Craven, Host, teissTalk https://www.linkedin.com/in/jonathanbcraven/ Tiago Rosado, Chief Information Security Officer, Asite https://w…
…
continue reading
1
teissTalk: Securing against AI-driven phishing attacks
44:16
44:16
Play later
Play later
Lists
Like
Liked
44:16How cyber criminals are using AI tools to scale malicious operations Streamlining user experience with biometrics or device-based authentication Making your organisation cyber resilient and securing critical systems as AI continues to advance Featuring: Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Derek Hanson, VP Soluti…
…
continue reading
1
teissTalk: Mitigating human cyber-risks with data and behavioural sciences
45:38
45:38
Play later
Play later
Lists
Like
Liked
45:38Which behaviours increase risk and how we can measurably change them Driving employee engagement without incentives Which real-time interventions encourage safer employee behaviours Jonathan Craven, Host, teissTalk https://www.linkedin.com/in/jonathanbcraven/ Rebecca Stephenson, Specialist Lead Lecturer, Highlands College https://www.linkedin.com/i…
…
continue reading
1
teissTalk: Navigating the rising legal threats to cyber-security leaders
44:12
44:12
Play later
Play later
Lists
Like
Liked
44:12Reducing personal risk with your organisation’s liability insurance Understanding the evolving risk landscape through recent case studies Creating a workplace ethos of shared accountability This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Michela Resta, Solicitor, CYXCEL https://www.linkedin.com/in/michelarestacyxce…
…
continue reading
1
teissTalk: Weak passwords – the hidden threat lurking in your organisation
45:06
45:06
Play later
Play later
Lists
Like
Liked
45:06Trends in the current credential theft landscape and changing compliance standards Strategies to reduce password risk - continuous scanning, enforced policies and exclusion dictionaries Encouraging users to create strong, securely stored passwords without reuse This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Shanno…
…
continue reading
1
teissTalk: DORA - A new law for a new dawn
44:58
44:58
Play later
Play later
Lists
Like
Liked
44:58What DORA is specifically asking of organisations Where the likely CTI gaps are when attempting to align with DORA Why innovation is key to aligning your CTI capabilities This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Benoit Heynderickx, Principal Analyst, Information Security Forum (ISF) https://www.linkedin.com/…
…
continue reading
1
teissTalk: Cyber-resilience – your last line of defence
45:10
45:10
Play later
Play later
Lists
Like
Liked
45:10Preparing for ransomware - where is your data and how is it protected? Building cyber resilience for your data, across on-premises and cloud Reducing the window of damage and minimising the time to recover This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Heather Lowrie, Independent Advisor, Earthgard Ltd https://www…
…
continue reading
1
teissTalk: Resilient by design – the next cyber-security imperative
45:36
45:36
Play later
Play later
Lists
Like
Liked
45:36Identifying and removing barriers to cyber resilience Reducing complexity - consolidating and eliminating legacy systems Building a cyber-resilient organisation - moving from a reactive to a proactive model This episode is hosted by Thom Langford: https://www.linkedin.com/in/jonathanbcraven/ Heather Lowrie, Independent Advisor, Earthgard Ltd https:…
…
continue reading
1
teissTalk: Hacking security effectiveness - making sure your tools are working for you
44:50
44:50
Play later
Play later
Lists
Like
Liked
44:50Where metrics and evaluations fall short in measuring holistic security effectiveness Identifying gaps between tools and determining which gaps you need to fill Showing the board and the business that cyber-security is moving the needle on resilience This episode is hosted by Jonathan Craven: https://www.linkedin.com/in/jonathanbcraven/ Richard Abs…
…
continue reading
1
teissTalk: Protecting critical services without disruption
46:06
46:06
Play later
Play later
Lists
Like
Liked
46:06How cyber-attackers are using GenAI to evade detection by security systems Safeguarding against sophisticated ransomware attacks with robust security measures Top tactics for stopping ransomware attacks before they cause damage This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ John Heaton-Armstrong, Experienced Cybe…
…
continue reading
1
teissTalk: Protecting critical services without disruption
44:30
44:30
Play later
Play later
Lists
Like
Liked
44:30Whether compliance-as-security in CNI offers security or false confidence Navigating tool and dashboard complexity to avoid CNI cyber blind spots Attracting cyber talent into CNI and away from finance and tech This episode is hosted by Jonathan Craven: https://www.linkedin.com/in/thomlangford/ Sofia Martinez Gomez, VP, Risk & Tech Practice - Cybers…
…
continue reading
1
teissTalk: Live at teissLondon2025 - Enhancing AppSec with Application Security Posture Management
58:48
58:48
Play later
Play later
Lists
Like
Liked
58:48Fortifying security defences with automated root cause analysis and prioritisation Managing security risk urgency across your application pipeline with real-time visibility and data visualisation capabilities Driving efficiency and prioritisation across your security ecosystem with practical remediation actions This episode is hosted by Thom Langfo…
…
continue reading
1
teissTalk: Bolstering your defences against supply chain cyber-risk
45:22
45:22
Play later
Play later
Lists
Like
Liked
45:22What’s making supply chain risk the fastest-growing cyber-risk category How to galvanise your internal and external peers to develop a shared responsibility for supply chain cyber-risks Designing and implementing effective key controls to mitigate supply chain cyber-risks This episode is hosted by Jonathan Craven: https://www.linkedin.com/in/jonath…
…
continue reading
How the human risk surface area has broadened with GenAI and collaboration tools Prevent breaches by applying the cyber kill chain to human vulnerabilities Strategies to protect employees without compromising productivity This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Daniela Almeida Lourenco, Chief Information S…
…
continue reading
1
teissTalk: Threat intelligence strategies to mitigate industrial-scale cyber-crime
43:53
43:53
Play later
Play later
Lists
Like
Liked
43:53How cyber-crime continues to evolve and what this means for enterprise threat intelligence strategies Evaluating sources and deciding which characteristics are most relevant How DNS-based threat intelligence versus a malware-centric approach disrupts industrialised cyber-crime This episode is hosted by Thom Langford: https://www.linkedin.com/in/tho…
…
continue reading
1
teissTalk: The future of SecOps - why should leaders be optimistic?
45:17
45:17
Play later
Play later
Lists
Like
Liked
45:17Automating SecOps processes and procedures - free your people, improve retention and increase productivity Where creativity and diversity is keeping your SecOps one step ahead of the attackers Matching your effectiveness to organisational objectives - aligning your internal SOC metrics with those required by the board This episode is hosted by Thom…
…
continue reading
1
teissTalk: The emerging 2025 threat landscape
46:03
46:03
Play later
Play later
Lists
Like
Liked
46:03How evolving methods of work are expanding the attack surface Growth of supply chain attacks targeting devices touching sensitive data Increased nation-state targeting of Critical National Infrastructure This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Richard Absalom, Principal Research Analyst, Information Securi…
…
continue reading
1
teissTalk: Transforming your security operations to detect and respond to advanced attacks
45:33
45:33
Play later
Play later
Lists
Like
Liked
45:33Diverse threat vectors and complex attacks - how to expand your detection and response programmes Helping your SOC analysts achieve more - finding the right combination of internal ML/AI tools and external providers Pathways to accelerate your SOC development to detect and mitigate attacks earlier This episode is hosted by Thom Langford: https://ww…
…
continue reading
1
teissTalk: Protecting your crown jewels as an SME without breaking the bank
44:51
44:51
Play later
Play later
Lists
Like
Liked
44:51Identifying which data assets to prioritise Building an enterprise-level cyber-security profile on a budget Strengthening your cyber-resilience with incident response playbooks This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Steven Furnell, Professor of Cyber Security, University of Nottingham https://www.linkedin…
…
continue reading
1
teissTalk: Reducing your security debt in a GenAI-driven world
43:21
43:21
Play later
Play later
Lists
Like
Liked
43:21Minimising the risks to your security posture from developers’ reliance on GenAI Using AI to speed up remediation and avoid security becoming the bottleneck Steps to ensure safe and secure implementation of GenAI in software development This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Lee Munson, Principal Research…
…
continue reading
1
teissTalk: Why just-in-time security is leaving you exposed
44:41
44:41
Play later
Play later
Lists
Like
Liked
44:41Why the traditional malware-centric approach to security doesn’t enable proactive protection Pre-empting and protecting attacks before they are launched - looking at the threat actors attack infrastructure Emergent domains, what are they and why they need a layered detection This episode is hosted by Thom Langford: https://www.linkedin.com/in/thoml…
…
continue reading
1
teissTalk: Why Zero Trust Network Access is not your silver bullet
45:07
45:07
Play later
Play later
Lists
Like
Liked
45:07Where does Zero Trust fall short, and why these failings encourage cyber-crime Expanding Zero Trust to protect the data itself Identifying, classifying, and securing sensitive data through automation This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Jean Carlos, VP Cyber Security, BOXT https://www.linkedin.com/in/je…
…
continue reading
1
teissTalk: Better security awareness training with AI
40:46
40:46
Play later
Play later
Lists
Like
Liked
40:46Leveraging behavioural AI to mitigate the risk of phishing attacks Fortifying your defenses against the next wave of phishing threats Practical strategies for empowering colleagues while strengthening your cyber resilience This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Rebecca Stephenson, Specialist Lead Lecturer …
…
continue reading
1
teissTalk: Confronting cyber-criminals-strategies for cyber-hygiene
45:13
45:13
Play later
Play later
Lists
Like
Liked
45:13Meeting your operational and legal obligations - getting your foundations in order Cyber-proofing your organisation with comprehensive cyber-security training and awareness Developing cyber-hygiene to defend against cyber-criminals using emerging technology This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Paul Holla…
…
continue reading
1
teissTalk: Mitigating third-party risk with threat intelligence
43:43
43:43
Play later
Play later
Lists
Like
Liked
43:43A proactive approach to third-party risk - continuous monitoring of suppliers Using threat intelligence to identify third-party risk Effectively working with partners to mitigate third-party security risks This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Chuck Brooks, Adjunct Professor, Georgetown University https:/…
…
continue reading
1
teissTalk: A playbook for new CISOs - learnings from years in the trenches
44:49
44:49
Play later
Play later
Lists
Like
Liked
44:49How the next generation of InfoSec leaders can better prepare themselves to navigate the threats of tomorrow Identifying the quick wins and making the most of the finite time new CISOs have to get their message across Practical measures for reducing stress, burnout and frustration within InfoSec teams over the longer term This episode is hosted by …
…
continue reading
1
teissTalk: Eliminating blind spots within your cyber security environment
46:30
46:30
Play later
Play later
Lists
Like
Liked
46:30Gaining comprehensive visibility across your hybrid and multi-cloud environments Mitigating hidden threats and vulnerabilities beyond your endpoints and network parameters Maximising your cyber security investments with better visibility and optimised tool performance This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/…
…
continue reading
1
teissTalk: Protecting your C-Suite's private lives to protect the enterprise
45:39
45:39
Play later
Play later
Lists
Like
Liked
45:39Threat trends - how threat actors are targeting C-Suite executives to access the enterprise Empowering your C-Suite to identify and avoid social engineering Creating social media policies that your C-Suite understand so that they can lead by example This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Thomas Wendrich, A…
…
continue reading
1
teissTalk: Securing your sensitive data from exfiltration
44:56
44:56
Play later
Play later
Lists
Like
Liked
44:56Protecting your endpoints - how do cybercriminals exfiltrate data, and what trends are we seeing? Mitigating the financial, legal, and reputational risks with a comprehensive data strategy Leveraging next-generation technology to rapidly detect and respond to data exfiltrating ransomware attacks This episode is hosted by Thom Langford https://www.l…
…
continue reading
1
teissTalk: Fortifying your cyber defenses as a mid-sized organisation
44:44
44:44
Play later
Play later
Lists
Like
Liked
44:44How you can reduce data loss resulting from user error, disgruntled employees, or cyber attacks Leveraging existing and emerging technologies to enhance your preparedness against the latest attack vectors and threat actors Investing in autonomous and integrated security platforms without breaking the bank This episode is hosted by Thom Langford htt…
…
continue reading
1
teissTalk: Maintaining your credibility as a security advisor
45:16
45:16
Play later
Play later
Lists
Like
Liked
45:16Building rapport with the board through persuasive communication skills Leveraging your influence to drive business change and manage cyber risks Measuring the impact of your actions and advice This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Alan Jenkins, Principal Consultant, Cyber Security Navigator Ltd https://w…
…
continue reading
1
teissTalk: Is privacy the source of your failing security?
44:38
44:38
Play later
Play later
Lists
Like
Liked
44:38The privacy challenges of using the network as your fundemental point of defence Whether InfoSec leaders can ever get full network visibility Setting privacy controls to reduce vulnerabilities and blindspots within your network This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Tom Ellis-Aziz, Associate Director, Cont…
…
continue reading
1
teissTalk: Selling infosec as a business enabler
44:54
44:54
Play later
Play later
Lists
Like
Liked
44:54Proving that your infosec strategy delivers a competitive advantage Managing the risks and costs of a business-enabling infosec team Balancing business objectives with infosec needs to deliver security and growth This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Alan Jenkins, Principal Consultant, Cyber Security Navi…
…
continue reading
1
teissTalk: How AI can improve your security and compliance programmes
46:37
46:37
Play later
Play later
Lists
Like
Liked
46:37How infosec leaders can support product teams incorporating generative AI Using AI to improve compliance processes and ongoing vulnerability monitoring Mitigating and minimising AI-based information security risks with ISO 42001 This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Dean Sapp, SVP, Information Security, P…
…
continue reading
1
teissTalk: Where AI-driven threat detection can streamline your SOC
46:02
46:02
Play later
Play later
Lists
Like
Liked
46:02Closing the cybersecurity gap - acting fast against critical threats Aligning to current compliance standards without the heavy-lifting Leveraging AI-powered tools to maximise your security investments This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Mike Johnson, Global Cyber Threat & Incident Response Manager, Ver…
…
continue reading
1
teissTalk: Assessing and mitigating risks in your OT environment
45:57
45:57
Play later
Play later
Lists
Like
Liked
45:57Ensuring your risk management framework meets your organisation’s needs Ransomware, legacy devices and remote access - risk trends for OT Why you should prioritise risks based on the likelihood of exploitation as well as impact This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Syed Ubaid Ali Jafri, Head of Cyber Defe…
…
continue reading
1
teissTalk: Is your organisation prepared for NIS2?
41:36
41:36
Play later
Play later
Lists
Like
Liked
41:36How does NIS2 address risks within critical supply chains and information sharing across borders? Maintaining a proactive stance against evolving threats - how continuous improvement complies with NIS2 Ensuring timely compliance - meeting the new requirements in risk assessment and avoiding penalties This episode is hosted by Thom Langford https://…
…
continue reading
1
teissTalk: Is your organisation cyber resilient?
44:08
44:08
Play later
Play later
Lists
Like
Liked
44:08Selecting metrics that best convey the impacts and risks of your strategy to the board How the changing threat landscape will affect your cyber resilience The role cyber insurance plays as a component of your resilience strategy This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Daniel G. Dresner, Professor of Cyberse…
…
continue reading