PodParley PodParley
Compromising Positions - A Technology Podcast

Compromising Positions - A Technology Podcast

Bookmark

Compromising Positions - A Technology Podcast is a technology podcast hosted by Compromising Positions. It has 60 episodes, with the latest published March 2026.

The award-winning tech podcast that asks : "Are we the ones breaking the world?"Most tech podcasts are an echo chamber for builders. We step outside. We talk to the observers, the social scientists, and the deep thinkers who study the friction we create and the human systems we disrupt.Lianne Potter and Jeff Watkins strip away the industry fluff and pit academic research against the harsh reality of real organisations and real human incentives.We don’t just talk about AI, security, and automation; we explore the unintended consequences of our own "elegant" solutions.We’re here to look at tech through a different lens and ask the uncomfortable questions that the industry usually avoids. Because if you’ve built a system that has become everyone else's problem, you have to ask:"Am I the compromising position here?"

technology ·en ·60 episodes

#
Title
1

EPISODE 58: Self-Driving Cars, Cybersecurity & Trust

2

EPISODE 57: SUSPICION BY DESIGN: INSIDE DWP’S UNIVERSAL CREDIT AI FRAUD SYSTEM

3

EPISODE 56: From Dark Triads to Patriotic Hackers: Human Maliciousness in Cybersecurity

4

EPISODE 55: Hack the Movies! The Best and WorsT Hacker Movies Part 2!

5

EPISODE 54: CFO Secrets: How to Secure Your Cybersecurity Budget

6

EPISODE 53: Whose Responsibility Is It To Protect The Data? The Data Team Or The Cybersecurity Team?

7

EPISODE 52: People Don’t Follow Companies, They Follow People: How To Build Your Personal Brand On LinkedIN

8

EPISODE 51: Cha, Cha, Cha, Changes! How to get excited about organisational change (re-release)

9

EPISODE 50: Tips On How To Be A Top-Class Cybersecurity Student And Get Your First Cybersecurity Job!

10

EPISODE 49: Are Our Cybersecurity Controls Inclusive? Going Beyond Hiring When It Comes To Diversity In Cybersecurity

11

EPISODE 48: It’s So Hard To Commit A Crime These Days! Surveillance, Dishonesty, Fraud And Other Pink-Collar Flags

12

EPISODE 47: Hacking Our Capacity To Think: The Philosophy Of Trust, Cybersecurity And AI

13

EPISODE 46: Sometimes, We Are The Villains: Tech Ethics In Software Development

14

EPISODE 45: Can Cybersecurity Teams Actually Do Scrum?

15

EPISODE 44: Embracing Failure in Cybersecurity by Learning Through Trial and Error

16

EPISODE 43: Not Everybody Does It Like US…So Hire Anthropologists in Cybersecurity!

17

EPISODE 42: Mind Science - Cyber Psychology 101

18

EPISODE 41: Empathy Over Ego: Why We're Angry At The Wrong People In Cybersecurity - The Cyber Empathy Podcast

19

EPISODE 40: How Do You Protect Your ASS-ets? An Interview On AppSec With The Modern.Net Show

20

EPISODE 39: Throwback Thursday! I’m Only H.U.M.A.N(S): Hacking the Human OS to Master Cybersecurity Compliance

21

EPISODE 38: HACK THE PLANET! THE BEST AND WORST HACKER MOVIES REVIEWED!

22

EPISODE 37: There Is No Perfect Cybersecurity, But You Could At Least Put a Padlock On It!

23

EPISODE 36: When Perception is Everything: Is it Time to Ditch the name "Cybersecurity"?

24

EPISODE 35: Can Cybersecurity Teams Flex Their Creativity To Keep Us All Safe?

25

EPISODE 34: IS YOUR RISK MANAGEMENT TOAST?

26

EPISODE 33: Inconvenient Truths: Why Technology Won’t Create The Perfect Customer Experience In Cybersecurity

27

EPISODE 32: Cybersecurity and The Human Experience: Designing for humans, not robots with John Sills

28

EPISODE 31: Can Cybersecurity Overcome its PR Problem? Building Your Brand and Social Capital with Sarah Evans, PR and Marketing Specialist

29

EPISODE 30: SAY GOODBYE TO ‘GIT BLAME’: BUILDING COLLABORATIVE AND SECURE SOFTWARE DEVELOPMENT LIFECYCLES

30

EPISODE 29: “THE DILEMMA GAME”:UNLEASHING THE POWER OF ETHICS AND GOOD CYBERSECURITY THROUGH PLAY

31

EPISODE 28: RULES WITHOUT RELATIONSHIPS CREATE REBELLION: WHY ETHICS MATTER IN CYBERSECURITY

32

EPISODE 27: Ignore all previous instructions: Threat modelling AI Systems

33

EPISODE 26: It’s A Wonderful Hack! Building A High Performance Security Team

34

EPISODE 25: SUPERCONNECTORS: UNLEASHING PURPOSE BEYOND METRICS IN YOUR CYBERSECURITY FUNCTION

35

EPISODE 24: DATA, DATA EVERYWHERE, BUT HOW DO WE MAKE IT SAFE TO SHARE? EXPLORING THE RELATIONSHIP BETWEEN DATA, CYBERSECURITY AND OUR DESIRE FOR CONVENIENCE

36

EPISODE 23: Awareness ≠ Behavioural Change - Rethinking Cybersecurity Training

37

EPISODE 22: Hands Off My Amygdala! The Psychology Behind Cybersecurity

38

EPISODE 21: Bringing The Curtain Down On Risk Theatre And Applauding Objective-Centred Risk Management

39

EPISODE 20: Not New, But Novel - Tackling Risk In The Third Sector

40

EPISODE 19: Fun With Purpose: A Scrum Guide!

41

EPISODE 18: And The BAFTA For Best Cybersecurity Awareness Training Goes To…

42

EPISODE 17: F.U.D Off! Cybersecurity Awareness Beyond Compliance and Boredom

43

EPISODE 16: That’s illuminating! Protecting aberdeen’s iot street lights from cyber attacks!

44

EPISODE 15: SHIFT HAPPENS: The ART OF NAVIGATING THE SEAS OF CYBER CHANGE

45

EPISODE 14: HACK THE NEURAL NETWORK - AI and CYBERSECURITY

46

BACK SOON

47

EPISODE 13: 5 HOT TAKES ON AI

48

EPISODE 12: How to Use ChatGPT and AI to Level UP Your Cybersecurity function

49

EPISODE 11: Are You User Experienced? Applying The Principles of UX & UR To The Cybersecurity Journey

50

EPISODE 10: It’s Not about the Cookie : THE POWER OF FRAMING INTERACTIONS

URL copied to clipboard!