PODCAST · business
teissPodcast - Cracking Cyber Security
by TEISS
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
-
303
teissTalk: Scaling resilience across your cyber ecosystem
Evolving beyond traditional perimeters – strategies to embed resilience across your supply chains and shared digital infrastructureBuilding architectures that absorb external shockwaves including AI-driven disruptions without slowing the businessMoving from reactive incident-driven updates to a test-driven posture using chaos engineering and AI red teamingJonathan Craven, Host, teissTalkhttps://www.linkedin.com/in/jonathanbcraven/Milena Maneva, Head of Business Continuity & Resilience, EMEA, Cantor Fitzgerald https://www.linkedin.com/in/milenamaneva/Lessie Skiba, Deputy Managing Director, Cyber Readiness Institutehttps://www.linkedin.com/in/lessie-skiba-2b7460bb/James Tucker, Head of CISO, Zscalerhttps://www.linkedin.com/in/jamesjtucker/
-
302
teissTalk: Securing your organisation in the age of GenAI
Enabling GenAI safely while protecting sensitive data across users, employees and AI-enabled toolsManaging agentic AI risk through improved visibility, governance, and control across the attack surfaceLeveraging AI to strengthen cyber defence – identifying and preventing zero-day threatsThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/David Cartwright, CISO, Santander Internationalhttps://www.linkedin.com/in/davidscartwright/Lisa Ventura, Chief Executive and Founder, AI and Cyber Security Associationhttps://www.linkedin.com/in/lisasventura/Nina Pettersen, Senior Manager, Gritera Securityhttps://www.linkedin.com/in/nina-pettersen-46904773/Lionel Litty, CISO, Menlohttps://www.linkedin.com/in/lionellitty/
-
301
teissTalk: Geopolitics & Regulation - Reshaping the Energy Sector’s Supply Chain Risk
How geopolitical disruptions are driving sophisticated supply chain attacks within the energy sectorShifting towards continuous, intelligence-led supply chain risk management to mitigate 4th and 5th party vulnerabilitiesBest practices on future-proofing the energy sector against next-gen cyber attacksThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Justin Kuruvilla, Head of Cyber Security, Risk Ledgerhttps://www.linkedin.com/in/justin-kuruvilla-680a50257/John Reilly, Cyber Security and Governance Lead, UK Power Networkshttps://www.linkedin.com/in/john-reilly-a3848669/Joseph Couture, Regional Information Security Officer, Ørstedhttps://www.linkedin.com/in/josephcouture/Adam Callaghan, Cyber Risk Management Specialist, Wales and West Utilitieshttps://www.linkedin.com/in/adam-c-8583a833/
-
300
teissTalk: Cybersecurity as a business metric - giving your C-Suite the data to govern
Executive cyber liability - new regulations and the responsibility to actSupporting your C-Suite with a framework for defining, tracking, and reporting security KPIsBridging the gap to your C-Suite - leveraging attack surface management and employee insight for strategic governanceThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Edd Hardy, Director Cyber Security, AlixPartnershttps://www.linkedin.com/in/eddhardyBjörn Orri Guðmundsson, CEO & Founder, Aftrahttps://www.linkedin.com/in/bj%C3%B6rn-orri-gu%C3%B0mundsson-b7b62527
-
299
teissTalk: Why your security team is burned out and what to do about it
Identifying the causes and effects of stress and burnout within security teams Building personal resilience through mindfulness – regulating stress, strengthening focus and enhancing clarityTech tools to reduce burnout while increasing wellbeing and limiting turnover among security teamsThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Johann van Duyn, Chief Information Security Officer, DO & COhttps://www.linkedin.com/in/johannvanduyn/Don Gibson, Chief Information Security Officerhttps://www.linkedin.com/in/don-gibson-cyber/Cavan Fabris, Partner - Head of Data & Cyber, RPChttps://www.linkedin.com/in/cavan-fabris/
-
298
teissTalk: Building a trusted security model for Generative and Agentic AI
Transferable lessons - how overlooking fundamental security and data trust leads to Generative and Agentic AI failuresSteps for embedding security checkpoints and governance directly into your AI pipelineStrategies to scale AI safely - avoiding costly retrofits - and positioning security as a key competitive advantageThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Tim Roberts, Managing Director, AlixPartnershttps://www.linkedin.com/in/thrrobertsSatyam Rastogi, Director of Information Security & DevOps, BAMKOhttps://www.linkedin.com/in/hackersatyamrastogi/Deryck Mitchelson, Head of Global CISO Team & C-Suite Advisor, Check Pointhttps://www.linkedin.com/in/deryckmitchelson
-
297
teissTalk:The confidence gap - moving SMBs from reactive to proactive cyber security
Why fundamental security best-practices are overlooked by SMBs despite advanced threatsAddressing the unmanageable digital exposure surface - identifying critical assets to prioritise for investmentScalable actions that enable smaller IT teams to transition from reactive incident response to targeted, proactive cyber defenceThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Steven Furnell, Professor of Cyber Security, University of Nottinghamhttps://www.linkedin.com/in/stevenfurnell/Edd Hardy, Director Cyber Security, AlixPartnershttps://www.linkedin.com/in/eddhardySuvi Silvanto, Director, Product Marketing, WithSecurehttps://www.linkedin.com/in/suvi-silvanto/
-
296
teissTalk: Securing applications and infrastructure in the AI era
Aligning application and API security with the demands of the modern AI eraEnabling secure, high-performance infrastructure for AI and LLM environmentsSecuring APIs and your network without overspending on securityThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Tiago Rosado, Chief Information Security Office, Asitehttps://www.linkedin.com/in/tiagorosado/Jamison Utter, Field CISO, A10 Networkslinkedin.com/in/jamisonutter/
-
295
teissTalk: Silent Swipers - unmasking info-stealers in today's threat landscape
Understanding the anatomy, infrastructure and automation of modern information-stealing malwareTracking delivery methods, evasion technique and high-value data targetsBuilding effective, multi-layered defences against the prevalent info-stealer familiesThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Jim Walter, Senior Threat Researcher, SentinelOneBrett Taylor, SE Director UK&I, SentinelOnehttps://www.linkedin.com/in/effectiveleaderandmentor/Satyam Rastogi, Director of Information Security & DevOps, BAMKOhttps://www.linkedin.com/in/hackersatyamrastogi/
-
294
teissTalk: 2026 predictions for OT security and the future of cyber physical systems
Exploitable vulnerabilities within OT devices and how this is expected to changeCyber warfare risk in 2026 - how organisations can defend themselvesSecuring the supply chain and expanding XIoT attack surfaceThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Jordan M. Schroeder, CISOhttps://www.linkedin.com/in/schroederjordan/Zia Ush Shamszaman, Senior Lecturer in Computer Science, Teesside Universityhttps://www.linkedin.com/in/zia-ush-shamszaman/Elliot Gidley, Field CTO EMEA, Clarotyhttps://www.linkedin.com/in/elliotgidley
-
293
teissTalk: 2026 threat trends - securing your organisation against next-gen cyber attacks
How cyber criminals are weaponising AI to defeat your threat detection and responseBeyond encryption – how ransomware has evolved to include data exfiltration, publication threats and supply chain compromiseHow geopolitical tensions are increasing nation-sponsored cyber-campaigns - proxy attacks, IT worker scams and supply chain risksThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Ed Tucker, Director - Cyber Security Practice, Telefornica Techhttps://www.linkedin.com/in/tuckeredward/Neil King, IT Security Professional, Canonhttps://www.linkedin.com/in/neilking/Christine Bejerasco, CISO, WithSecure Intelligencehttps://www.linkedin.com/in/christinebejerasco/
-
292
teissTalk: Shielding sensitive data from ransomware – staying ahead of evolving threats
How modern ransomware actors are deploying multidimensional tactics to outpace traditional defencesStrategies to reduce data loss and sustain business operations after an attackAI and automation – enhancing visibility and accelerating response to ransomware threatsThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Edward Starkie, Director, GRC | Cyber Risk, Thomas Murrayhttps://www.linkedin.com/in/edward-starkie-56712431/Cameron Brown, Head of Cyber Threat and Risk Analytics, Ariel Rehttps://www.linkedin.com/in/analyticalcyber/Jesus Cordero, Director, Solution Architects AppSec, NetSec & XDR, EMEA, Barracudahttps://www.linkedin.com/in/jcordero-guzm%C3%A1n/
-
291
teissTalk: Resilience as a business outcome
Identifying critical assets and dependencies to focus investment where impact is highestDesigning for rapid recovery with tested runbooks and clear RTO/RPO targetsStrengthening resilience through training, playbooks, and cross-functional drillsThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Scott Hardy, CISO, Sargent-Dischttps://www.linkedin.com/in/scott-hardy-cissp-ccsk-44882a45Tamara Kaye, Group Director - Resilience, Ardagh Grouphttps://www.linkedin.com/in/tamara-kaye-8997852b/Sam Woodcock, Sr. Director, Solutions Architecture - EMEA, 11:11 Systemshttps://www.linkedin.com/in/samuel-woodcock-9745b831/
-
290
teissTalk: AI defence against offence - are you playing catch-up in the new security arms race?
Leveraging AI-powered solutions to anticipate, detect and contain asymmetric cyber threatsAugmenting security teams through AI efficiencies – reducing alert fatigue whilst improving detection speed and accuracyBest AI security practices on safeguarding critical systems and sensitive data against AI-driven cyber threatsThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Michela Resta, Solicitor, CyXcelhttps://www.linkedin.com/in/michelarestacyxcel/Paolo Palumbo, Vice President, WithSecure Intelligencehttps://www.linkedin.com/in/paolopalumbo/Tiago Rosado, Chief Information Security Officer, Asitehttps://www.linkedin.com/in/tiagorosado/
-
289
teissTalk: Getting the board’s ‘aye’ on your cyber-security investments
Bridging the CISO-board disconnect which hinders your cyber-security progressMeasuring cyber-risk in financial, economic and operational terms and demonstrating value in cyber-investmentsFocusing on governance and compliance – how to answer when asked “are we compliant?Thom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Zia Ush Shamszaman, Senior Lecturer in Computer Science, Teesside Universityhttps://www.linkedin.com/in/zia-ush-shamszaman/Edd Hardy, Director Cyber Security, AlixPartnershttps://www.linkedin.com/in/eddhardyPenny Jackson, Director Strategy, Awareness & Engagement (Human Risk Management), Aristos Partnershiphttps://www.linkedin.com/in/pennykjackson/
-
288
teissTalk: Help your colleagues help you with an enhanced security awareness programme
How appreciation and gamification can improve your employees’ security awarenessMaking security behaviours stick – reframing mistakes as opportunities for growthFostering a culture of continuous improvement with an inclusive learning environmentThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Sara Carty, Founder & CEO, Unboringhttps://www.linkedin.com/in/saracarty/Penny Jackson, Director Strategy, Awareness & Engagement (Human Risk Management), Aristos Partnershiphttps://www.linkedin.com/in/pennykjackson/Rebecca Stephenson, Specialist Lead Lecturer, Highlands Collegehttps://www.linkedin.com/in/creative-minds-in-cyber/
-
287
teissTalk: From service desk to security risk - stopping social engineering at the source
Which techniques and methods use by threat actors are bypassing security parametersReducing your cyber risk - using lessons learned from recent high-profile attacksStrategies to protect your service desk against identity-based attacksThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Paul Holland, Cyber Capability Manager, Royal Mailhttps://www.linkedin.com/in/paulinfosec/Lukas Weber, Senior Vice President, AlixPartnershttps://www.linkedin.com/in/lukaswebr/Rebecca Stephenson, Specialist Lead Lecturer, Highlands Collegehttps://www.linkedin.com/in/creative-minds-in-cyber/Darren James, Senior Product Manager, Specopshttps://www.linkedin.com/in/darren-james-91055310
-
286
Live at teissLondon2025: From gatekeeping to guardrails - proactive supply chain security at scale
70% of critical security debt stems from third-party code - what can be done upstream?How real-time threat intelligence and policy enforcement are closing the gapWhy DORA and modern CI/CD pipelines demand pre-emptive visibility and automation Thom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Paul Holland, Cyber Capability Manager, Royal Mailhttps://www.linkedin.com/in/paulinfosec/Tiago Rosado, Chief Information Security Officer, Asitehttps://www.linkedin.com/in/tiagorosado/Jean Carlos, Information Security Lead, Trade Republichttps://www.linkedin.com/in/jeanpcarlos/John Smith, CTO of EMEA, Veracodehttps://www.linkedin.com/in/jtsmith123
-
285
teissTalk: Advancing compliance maturity in an age of DORA & NIS2
Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threatsMeeting API compliance and data protection challenges with emerging technologiesMoving towards a mature posture for API securityThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Satyam Rastogi, Director of Information Security & DevOps, BAMKOhttps://www.linkedin.com/in/hackersatyamrastogi/Mike Johnson, Global Cyber Threat & Incident Response Manager, Verifonehttps://www.linkedin.com/in/mike---johnson/Madison Dreshner, Principal of IT Risk and Compliance solutions, AuditBoardhttps://www.linkedin.com/in/madisondreshner/
-
284
teissTalk: Refining your API security strategy to protect against AI-driven attacks
Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threatsMeeting API compliance and data protection challenges with emerging technologiesMoving towards a mature posture for API securityThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Tiago Rosado, Chief Information Security Officer, Asitehttps://www.linkedin.com/in/tiagorosado/Anne Coulombe, CISO, Bleuet LLChttps://www.linkedin.com/in/annecoulombe/Menachem Perlman, Director, Global Solutions Engineering at Akamai Technologies - API Security, Akamaihttps://www.linkedin.com/in/menachemperlman/
-
283
teissTalk: Building resilient infosec teams
Analysing how your teams cope with a cyber incident or a failure scenarioLearning from crises - building resilience strategies to mitigate future incidentsBuilding a cyber resilient mindset within your infosec team and in the wider organisationThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Raza Sadiq, Head of Enterprise Risk, MQubehttps://www.linkedin.com/in/razasadiq7/Sara Carty, Founder & CEO, Unboringhttps://www.linkedin.com/in/saracarty/Christoph Schuhwerk, CISO in Residence, EMEA, Zscalerhttps://www.linkedin.com/in/christophschuhwerk1978
-
282
teissTalk: Surviving a critical CVE - a high-impact playbook
Risk-based prioritising using severity scoring and patch analysisEscaping the silo trap - bridging the gap between IT and security teamsAutomate rules to handle high-severity vulnerabilities and zero-daysJonathan Craven, Host, teissTalkhttps://www.linkedin.com/in/jonathanbcraven/Tiago Rosado, Chief Information Security Officer, Asitehttps://www.linkedin.com/in/tiagorosado/Cameron Brown, Head of Cyber Threat and Risk Analytics, Ariel Rehttps://www.linkedin.com/in/analyticalcyber/York von Eichel-Streiber, Product Marketing Manager, NinjaOnehttps://www.linkedin.com/in/york-von-eichel-streiber-50552b9b
-
281
teissTalk: Securing against AI-driven phishing attacks
How cyber criminals are using AI tools to scale malicious operationsStreamlining user experience with biometrics or device-based authenticationMaking your organisation cyber resilient and securing critical systems as AI continues to advanceFeaturing: Thom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Derek Hanson, VP Solutions Architecture and Alliances, Yubicohttps://www.linkedin.com/in/derekthansonJay Vinda, Global CISO and Cyber Risk Engineering Lead, Mosaic Insurancehttps://www.linkedin.com/in/jayvindaLee Munson, Principal Research Analyst, Information Security Forumhttps://www.linkedin.com/in/lmunson/
-
280
teissTalk: Mitigating human cyber-risks with data and behavioural sciences
Which behaviours increase risk and how we can measurably change them Driving employee engagement without incentives Which real-time interventions encourage safer employee behaviours Jonathan Craven, Host, teissTalkhttps://www.linkedin.com/in/jonathanbcraven/Rebecca Stephenson, Specialist Lead Lecturer, Highlands Collegehttps://www.linkedin.com/in/creative-minds-in-cyber/Penny Jackson, Director Strategy, Awareness & Engagement (Human Risk Management), Aristos Partnershiphttps://www.linkedin.com/in/pennykjackson/Candace Williams, CEO/Founder, Cyb(H)er Ally Cybersecurity Solutions, LLChttps://www.linkedin.com/in/cybherally/
-
279
teissTalk: Navigating the rising legal threats to cyber-security leaders
Reducing personal risk with your organisation’s liability insurance Understanding the evolving risk landscape through recent case studies Creating a workplace ethos of shared accountability This episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Michela Resta, Solicitor, CYXCELhttps://www.linkedin.com/in/michelarestacyxcel/Kelly Hagedorn, Partner, ALSTON & BIRDhttps://www.linkedin.com/in/kellyhagedorn/
-
278
teissTalk: Weak passwords – the hidden threat lurking in your organisation
Trends in the current credential theft landscape and changing compliance standardsStrategies to reduce password risk - continuous scanning, enforced policies and exclusion dictionariesEncouraging users to create strong, securely stored passwords without reuseThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Shannon Muller, Cyber security Specialist, Microsofthttps://www.linkedin.com/in/shannon-muller/Jay Vinda, Cyber Risk Engineering and Emerging Solutions Lead, Mosaic Insurance https://www.linkedin.com/in/jayvindaDarren James, Senior Product Manager, Specopshttps://www.linkedin.com/in/darren-james-91055310
-
277
teissTalk: DORA - A new law for a new dawn
What DORA is specifically asking of organisationsWhere the likely CTI gaps are when attempting to align with DORAWhy innovation is key to aligning your CTI capabilitiesThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Benoit Heynderickx, Principal Analyst, Information Security Forum (ISF)https://www.linkedin.com/in/benoithey/Tim Parker, Chair, South West Cyber Security Clusterhttps://www.linkedin.com/in/tim-parkerLewis Henderson, Director - Product Marketing, Team Cymruhttps://www.linkedin.com/in/lewishenderson/
-
276
teissTalk: Cyber-resilience – your last line of defence
Preparing for ransomware - where is your data and how is it protected? Building cyber resilience for your data, across on-premises and cloud Reducing the window of damage and minimising the time to recover This episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Heather Lowrie, Independent Advisor, Earthgard Ltdhttps://www.linkedin.com/in/heather-lowrie/Raza Sadiq, Head of Enterprise Risk, MQubehttps://www.linkedin.com/in/razasadiq7/Sandra Bell, Group Head of Organisational Resilience, Novunahttps://www.linkedin.com/in/sandra-bell-13a109183/Grant Caley, UK & Ireland Solutions Director, NetApphttps://www.linkedin.com/in/grant-caley-a424681/
-
275
teissTalk: Resilient by design – the next cyber-security imperative
Identifying and removing barriers to cyber resilienceReducing complexity - consolidating and eliminating legacy systemsBuilding a cyber-resilient organisation - moving from a reactive to a proactive model This episode is hosted by Thom Langford:https://www.linkedin.com/in/jonathanbcraven/Heather Lowrie, Independent Advisor, Earthgard Ltdhttps://www.linkedin.com/in/heather-lowrie/Sasha Henry, Cyber Strategy & Resilience Advisor, Confidentialhttps://www.linkedin.com/in/alexandra-pavelovna-henry-32b98465/James Tucker, Head of CISO, International, Zscalerhttps://www.linkedin.com/in/jamesjtucker/
-
274
teissTalk: Hacking security effectiveness - making sure your tools are working for you
Where metrics and evaluations fall short in measuring holistic security effectiveness Identifying gaps between tools and determining which gaps you need to fill Showing the board and the business that cyber-security is moving the needle on resilience This episode is hosted by Jonathan Craven:https://www.linkedin.com/in/jonathanbcraven/Richard Absalom, Principal Research Analyst, Information Security Forum (ISF)https://uk.linkedin.com/in/richard-absalom-48879116Edward Starkie, Director, GRC | Cyber Risk, Thomas Murrayhttps://www.linkedin.com/in/edward-starkie-56712431/Emanuel Salmona, Co-Founder and CEO, Nagomi Securityhttps://www.linkedin.com/in/emanuelsalmona/
-
273
teissTalk: Protecting critical services without disruption
How cyber-attackers are using GenAI to evade detection by security systemsSafeguarding against sophisticated ransomware attacks with robust security measuresTop tactics for stopping ransomware attacks before they cause damageThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/John Heaton-Armstrong, Experienced Cyber security Leader, Confidentialhttps://www.linkedin.com/in/johnheatonarmstrong/Edewede Oriwoh, Group IT and Cybersecurity Manager, Zigup Plchttps://www.linkedin.com/in/edewedeoriwoh/Seamus Lennon, VP of Operations, ThreatLocker https://www.linkedin.com/in/seamus-lennon-41423886
-
272
teissTalk: Protecting critical services without disruption
Whether compliance-as-security in CNI offers security or false confidenceNavigating tool and dashboard complexity to avoid CNI cyber blind spots Attracting cyber talent into CNI and away from finance and tech This episode is hosted by Jonathan Craven:https://www.linkedin.com/in/thomlangford/Sofia Martinez Gomez, VP, Risk & Tech Practice - Cybersecurity, Privacy & Compliance, AlixPartnershttps://www.linkedin.com/in/sofia-martinez-gomez-8b5534136/?locale=en_US Monika Atanasova, Global Head of Third Party Risk Management, Raiffeisen Gruppehttps://www.linkedin.com/in/monika-atanasova-746633b7/?originalSubdomain=chDeryck Mitchelson, Global CISO, Check Point Software Technologieshttps://www.linkedin.com/in/deryckmitchelson
-
271
teissTalk: Live at teissLondon2025 - Enhancing AppSec with Application Security Posture Management
Fortifying security defences with automated root cause analysis and prioritisationManaging security risk urgency across your application pipeline with real-time visibility and data visualisation capabilitiesDriving efficiency and prioritisation across your security ecosystem with practical remediation actionsThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/John Heaton-Armstrong, Experienced Cyber security Leader, Confidentialhttps://www.linkedin.com/in/johnheatonarmstrong/Danny Dresner, Professor of Cyber security, The University of Manchesterhttps://www.linkedin.com/in/danny-dresner-fciis-6382381/Tiago Rosado, Chief Information Security Officer, Asitehttps://www.linkedin.com/in/tiagorosado/Derek Maki, VP Product Management, Veracodehttps://www.linkedin.com/in/derekmaki/
-
270
teissTalk: Bolstering your defences against supply chain cyber-risk
What’s making supply chain risk the fastest-growing cyber-risk categoryHow to galvanise your internal and external peers to develop a shared responsibility for supply chain cyber-risksDesigning and implementing effective key controls to mitigate supply chain cyber-risks This episode is hosted by Jonathan Craven:https://www.linkedin.com/in/jonathanbcraven/Mike Johnson, Global Cyber Threat & Incident Response Manager, Verifonehttps://www.linkedin.com/in/mike---johnson/Jean Carlos, Group Head of Cyber Architecture & Engineering, TP ICAP https://www.linkedin.com/in/jeanpc/Richard Marcus, CISO, AuditBoardhttps://www.linkedin.com/in/richard-marcus-b3192261/
-
269
teissTalk: Securing the human perimeter
How the human risk surface area has broadened with GenAI and collaboration tools Prevent breaches by applying the cyber kill chain to human vulnerabilities Strategies to protect employees without compromising productivity This episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Daniela Almeida Lourenco, Chief Information Security Officer, Dutch Financial Serviceshttps://www.linkedin.com/in/daniela-almeida-lourenco/Rebecca Stephenson, Specialist Lead Lecturer, Highlands College https://www.linkedin.com/in/creative-minds-in-cyber/Frederick Coulton, Director of UX, CultureAIhttps://www.linkedin.com/in/frederickcoulton
-
268
teissTalk: Threat intelligence strategies to mitigate industrial-scale cyber-crime
How cyber-crime continues to evolve and what this means for enterprise threat intelligence strategiesEvaluating sources and deciding which characteristics are most relevantHow DNS-based threat intelligence versus a malware-centric approach disrupts industrialised cyber-crimeThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Todd Wade, Chief Information Security Officerhttps://www.linkedin.com/in/twade/Matt Hardy, Senior Information Security Executivehttps://www.linkedin.com/in/matthardy67/Craig Sanderson, Principal Cybersecurity Strategist, Infobloxhttps://www.linkedin.com/in/craigsanderson1
-
267
teissTalk: The future of SecOps - why should leaders be optimistic?
Automating SecOps processes and procedures - free your people, improve retention and increase productivityWhere creativity and diversity is keeping your SecOps one step ahead of the attackersMatching your effectiveness to organisational objectives - aligning your internal SOC metrics with those required by the boardThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Prince Adu, Board Member - ISACA Accra Chapter, ISACAhttps://www.linkedin.com/in/prince-adu-ccsp-cisa-crisc-3759a520/Garrett Smiley, Chief of Staff to CDIO / Vice President of Digital Infrastructure and Technology Strategy, Maximushttps://www.linkedin.com/in/garrettsmiley/Matt Muller, Field CISO, Tines https://www.linkedin.com/in/matthewrmuller/
-
266
teissTalk: The emerging 2025 threat landscape
How evolving methods of work are expanding the attack surfaceGrowth of supply chain attacks targeting devices touching sensitive dataIncreased nation-state targeting of Critical National InfrastructureThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Richard Absalom, Principal Research Analyst, Information Security Forum (ISF)https://uk.linkedin.com/in/richard-absalom-48879116Tom O’Driscoll, Head of Security Strategy and Intelligence, National Highwayshttps://www.linkedin.com/in/odte/Michael Covington, Vice President, Portfolio Strategy, Jamfhttps://www.linkedin.com/in/michaelcovington/
-
265
teissTalk: Transforming your security operations to detect and respond to advanced attacks
Diverse threat vectors and complex attacks - how to expand your detection and response programmesHelping your SOC analysts achieve more - finding the right combination of internal ML/AI tools and external providersPathways to accelerate your SOC development to detect and mitigate attacks earlier This episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Mike Johnson, Global Cyber Threat & Incident Response Manager, Verifonehttps://www.linkedin.com/in/mike---johnson/Alan Jenkins, CISO Team lead, Saepiohttps://www.linkedin.com/in/alanjenkins/Josh Davies, Principal Technical Manager, Fortrahttps://www.linkedin.com/in/jdgwilym/
-
264
teissTalk: Protecting your crown jewels as an SME without breaking the bank
Identifying which data assets to prioritise Building an enterprise-level cyber-security profile on a budget Strengthening your cyber-resilience with incident response playbooks This episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Steven Furnell, Professor of Cyber Security, University of Nottinghamhttps://www.linkedin.com/in/stevenfurnell/Jean Carlos, VP of Information Security, AutogenAIhttps://www.linkedin.com/in/jeanpc/Stephanie Lynch-Ozanar, Education and Awareness Specialist, Co-Ophttps://www.linkedin.com/in/stephlynchozanarKev Eley, VP of UKI, Exabeamhttps://www.linkedin.com/in/keveley/
-
263
teissTalk: Reducing your security debt in a GenAI-driven world
Minimising the risks to your security posture from developers’ reliance on GenAIUsing AI to speed up remediation and avoid security becoming the bottleneckSteps to ensure safe and secure implementation of GenAI in software developmentThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Lee Munson, Principal Research Analyst, Information Security Forumhttps://www.linkedin.com/in/lmunson/Zia Ush Shamszaman, Senior Lecturer , Computer Science, Teesside Universityhttps://www.linkedin.com/in/zia-ush-shamszamanJohn Smith, EMEA CTO, Veracodehttps://www.linkedin.com/in/jtsmith123
-
262
teissTalk: Why just-in-time security is leaving you exposed
Why the traditional malware-centric approach to security doesn’t enable proactive protectionPre-empting and protecting attacks before they are launched - looking at the threat actors attack infrastructureEmergent domains, what are they and why they need a layered detectionThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/John Rouffas, Cyber Security Executive, Author & Journalist, CyberEdBoard Communityhttps://www.linkedin.com/in/drjohnrouffas/Francis Annandale, Managing Consultant, CyXcelhttps://www.linkedin.com/in/francis-annandale-98222186/Craig Sanderson, Principal Cybersecurity Strategist, Infobloxhttps://www.linkedin.com/in/craigsanderson1/
-
261
teissTalk: Why Zero Trust Network Access is not your silver bullet
Where does Zero Trust fall short, and why these failings encourage cyber-crimeExpanding Zero Trust to protect the data itselfIdentifying, classifying, and securing sensitive data through automationThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Jean Carlos, VP Cyber Security, BOXThttps://www.linkedin.com/in/jeanpc/Sasha Henry, Senior Managing Consultant, Cyxcelhttps://www.linkedin.com/in/alexandra-pavelovna-henry-32b98465/?originalSubdomain=ukKarim Eldefrawy, CTO and Cofounder, Confidencialhttps://www.linkedin.com/in/karim-eldefrawy-b706b53/
-
260
teissTalk: Better security awareness training with AI
Leveraging behavioural AI to mitigate the risk of phishing attacks Fortifying your defenses against the next wave of phishing threats Practical strategies for empowering colleagues while strengthening your cyber resilience This episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Rebecca Stephenson, Specialist Lead Lecturer in Digital Pedagogy, Government of Jerseyhttps://www.linkedin.com/in/creative-minds-in-cyber/Ben Wynn-Jones, Information Awareness Lead, Canon EMEA https://www.linkedin.com/in/ben-wynn-jones/
-
259
teissTalk: Confronting cyber-criminals-strategies for cyber-hygiene
Meeting your operational and legal obligations - getting your foundations in orderCyber-proofing your organisation with comprehensive cyber-security training and awarenessDeveloping cyber-hygiene to defend against cyber-criminals using emerging technologyThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Paul Holland, Head of Research, Information Security Forum (ISF)https://www.linkedin.com/in/paulinfosec/Penny Jackson, Director Strategy, Awareness & Engagement (Human Risk Management), Aristos Partnershiphttps://www.linkedin.com/in/pennykjackson/
-
258
teissTalk: Mitigating third-party risk with threat intelligence
A proactive approach to third-party risk - continuous monitoring of suppliersUsing threat intelligence to identify third-party riskEffectively working with partners to mitigate third-party security risksThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Chuck Brooks, Adjunct Professor, Georgetown Universityhttps://www.linkedin.com/in/chuckbrooks/Victoria van Roosmalen, CISO & CPO, Coostohttps://www.linkedin.com/in/victoriavanroosmalen/Stuart Frost, Head of Enterprise Security & RIsk Management, Department for Work & Pensionshttps://www.linkedin.com/in/stuart-frost-bem/Andy Grayland, CISO, Silobreakerhttps://www.linkedin.com/in/dr-andy-g-1b90b4150/
-
257
teissTalk: A playbook for new CISOs - learnings from years in the trenches
How the next generation of InfoSec leaders can better prepare themselves to navigate the threats of tomorrowIdentifying the quick wins and making the most of the finite time new CISOs have to get their message acrossPractical measures for reducing stress, burnout and frustration within InfoSec teams over the longer termThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Paul Watts, Distinguished Analyst, Information Security Forum (ISF)https://www.linkedin.com/in/paulewatts/Dr Andrea Cullen, Co Founder/Co CEO, CAPSLOCKhttps://www.linkedin.com/in/dr-andrea-cullen/
-
256
teissTalk: Eliminating blind spots within your cyber security environment
Gaining comprehensive visibility across your hybrid and multi-cloud environmentsMitigating hidden threats and vulnerabilities beyond your endpoints and network parametersMaximising your cyber security investments with better visibility and optimised tool performanceThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Dr Edewede Oriwoh, Group IT Information and Cyber Security Manager, Zigup Plchttps://www.linkedin.com/in/edewedeoriwoh/Lessie Skiba, Global Director of Outreach and Partner Engagement, Cyber Readiness Institutehttps://www.linkedin.com/in/lessie-skiba-2b7460bb/Mark Jow, EMEA Tech Lead & Evangelist, Gigamonhttps://www.linkedin.com/in/mark-jow-4766797
-
255
teissTalk: Protecting your C-Suite's private lives to protect the enterprise
Threat trends - how threat actors are targeting C-Suite executives to access the enterpriseEmpowering your C-Suite to identify and avoid social engineeringCreating social media policies that your C-Suite understand so that they can lead by exampleThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Thomas Wendrich, Associate Partner, IBMhttps://www.linkedin.com/in/thomas-wendrich-5470672Jacqueline Hanson-Kotei, Senior Manager, Enterprise Information Security & Governance, MTN Ghanahttps://www.linkedin.com/in/jacqueihk/Torsten Wiedemeyer, VP Europe, Cyblehttps://www.linkedin.com/in/wiedemeyer
-
254
teissTalk: Securing your sensitive data from exfiltration
Protecting your endpoints - how do cybercriminals exfiltrate data, and what trends are we seeing?Mitigating the financial, legal, and reputational risks with a comprehensive data strategyLeveraging next-generation technology to rapidly detect and respond to data exfiltrating ransomware attacksThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Neil Hare-Brown, CEO, STORM Guidancehttps://www.linkedin.com/in/neilhbPrince Adu, Board Member - ISACA Accra Chapter, ISACAhttps://www.linkedin.com/in/prince-adu-ccsp-cisa-crisc-3759a520/Darren Williams, CEO, BlackFoghttps://www.linkedin.com/in/darrenwwilliams/
No matches for "" in this podcast's transcripts.
No topics indexed yet for this podcast.
Loading reviews...
ABOUT THIS SHOW
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
HOSTED BY
TEISS
CATEGORIES
Loading similar podcasts...