teissPodcast - Cracking Cyber Security

PODCAST · business

teissPodcast - Cracking Cyber Security

The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.

  1. 303

    teissTalk: Scaling resilience across your cyber ecosystem

    Evolving beyond traditional perimeters – strategies to embed resilience across your supply chains and shared digital infrastructureBuilding architectures that absorb external shockwaves including AI-driven disruptions without slowing the businessMoving from reactive incident-driven updates to a test-driven posture using chaos engineering and AI red teamingJonathan Craven, Host, teissTalkhttps://www.linkedin.com/in/jonathanbcraven/Milena Maneva, Head of Business Continuity & Resilience, EMEA, Cantor Fitzgerald https://www.linkedin.com/in/milenamaneva/Lessie Skiba, Deputy Managing Director, Cyber Readiness Institutehttps://www.linkedin.com/in/lessie-skiba-2b7460bb/James Tucker, Head of CISO, Zscalerhttps://www.linkedin.com/in/jamesjtucker/

  2. 302

    teissTalk: Securing your organisation in the age of GenAI

    Enabling GenAI safely while protecting sensitive data across users, employees and AI-enabled toolsManaging agentic AI risk through improved visibility, governance, and control across the attack surfaceLeveraging AI to strengthen cyber defence – identifying and preventing zero-day threatsThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/David Cartwright, CISO, Santander Internationalhttps://www.linkedin.com/in/davidscartwright/Lisa Ventura,  Chief Executive and Founder, AI and Cyber Security Associationhttps://www.linkedin.com/in/lisasventura/Nina Pettersen, Senior Manager, Gritera Securityhttps://www.linkedin.com/in/nina-pettersen-46904773/Lionel Litty, CISO, Menlohttps://www.linkedin.com/in/lionellitty/

  3. 301

    teissTalk: Geopolitics & Regulation - Reshaping the Energy Sector’s Supply Chain Risk

    How geopolitical disruptions are driving sophisticated supply chain attacks within the energy sectorShifting towards continuous, intelligence-led supply chain risk management to mitigate 4th and 5th party vulnerabilitiesBest practices on future-proofing the energy sector against next-gen cyber attacksThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Justin Kuruvilla, Head of Cyber Security, Risk Ledgerhttps://www.linkedin.com/in/justin-kuruvilla-680a50257/John Reilly, Cyber Security and Governance Lead, UK Power Networkshttps://www.linkedin.com/in/john-reilly-a3848669/Joseph Couture, Regional Information Security Officer, Ørstedhttps://www.linkedin.com/in/josephcouture/Adam Callaghan, Cyber Risk Management Specialist, Wales and West Utilitieshttps://www.linkedin.com/in/adam-c-8583a833/

  4. 300

    teissTalk: Cybersecurity as a business metric - giving your C-Suite the data to govern

    Executive cyber liability - new regulations and the responsibility to actSupporting your C-Suite with a framework for defining, tracking, and reporting security KPIsBridging the gap to your C-Suite - leveraging attack surface management and employee insight for strategic governanceThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Edd Hardy, Director Cyber Security, AlixPartnershttps://www.linkedin.com/in/eddhardyBjörn Orri Guðmundsson, CEO & Founder, Aftrahttps://www.linkedin.com/in/bj%C3%B6rn-orri-gu%C3%B0mundsson-b7b62527

  5. 299

    teissTalk: Why your security team is burned out and what to do about it

    Identifying the causes and effects of stress and burnout within security teams Building personal resilience through mindfulness – regulating stress, strengthening focus and enhancing clarityTech tools to reduce burnout while increasing wellbeing and limiting turnover among security teamsThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Johann van Duyn, Chief Information Security Officer, DO & COhttps://www.linkedin.com/in/johannvanduyn/Don Gibson, Chief Information Security Officerhttps://www.linkedin.com/in/don-gibson-cyber/Cavan Fabris, Partner - Head of Data & Cyber, RPChttps://www.linkedin.com/in/cavan-fabris/

  6. 298

    teissTalk: Building a trusted security model for Generative and Agentic AI

    Transferable lessons - how overlooking fundamental security and data trust leads to Generative and Agentic AI failuresSteps for embedding security checkpoints and governance directly into your AI pipelineStrategies to scale AI safely - avoiding costly retrofits - and positioning security as a key competitive advantageThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Tim Roberts, Managing Director, AlixPartnershttps://www.linkedin.com/in/thrrobertsSatyam Rastogi, Director of Information Security & DevOps, BAMKOhttps://www.linkedin.com/in/hackersatyamrastogi/Deryck Mitchelson, Head of Global CISO Team & C-Suite Advisor, Check Pointhttps://www.linkedin.com/in/deryckmitchelson

  7. 297

    teissTalk:The confidence gap - moving SMBs from reactive to proactive cyber security

    Why fundamental security best-practices are overlooked by SMBs despite advanced threatsAddressing the unmanageable digital exposure surface - identifying critical assets to prioritise for investmentScalable actions that enable smaller IT teams to transition from reactive incident response to targeted, proactive cyber defenceThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Steven Furnell, Professor of Cyber Security, University of Nottinghamhttps://www.linkedin.com/in/stevenfurnell/Edd Hardy, Director Cyber Security, AlixPartnershttps://www.linkedin.com/in/eddhardySuvi Silvanto, Director, Product Marketing, WithSecurehttps://www.linkedin.com/in/suvi-silvanto/

  8. 296

    teissTalk: Securing applications and infrastructure in the AI era

    Aligning application and API security with the demands of the modern AI eraEnabling secure, high-performance infrastructure for AI and LLM environmentsSecuring APIs and your network without overspending on securityThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Tiago Rosado, Chief Information Security Office, Asitehttps://www.linkedin.com/in/tiagorosado/Jamison Utter, Field CISO, A10 Networkslinkedin.com/in/jamisonutter/

  9. 295

    teissTalk: Silent Swipers - unmasking info-stealers in today's threat landscape

    Understanding the anatomy, infrastructure and automation of modern information-stealing malwareTracking delivery methods, evasion technique and high-value data targetsBuilding effective, multi-layered defences against the prevalent info-stealer familiesThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Jim Walter, Senior Threat Researcher, SentinelOneBrett Taylor, SE Director UK&I, SentinelOnehttps://www.linkedin.com/in/effectiveleaderandmentor/Satyam Rastogi, Director of Information Security & DevOps, BAMKOhttps://www.linkedin.com/in/hackersatyamrastogi/

  10. 294

    teissTalk: 2026 predictions for OT security and the future of cyber physical systems

    Exploitable vulnerabilities within OT devices and how this is expected to changeCyber warfare risk in 2026 - how organisations can defend themselvesSecuring the supply chain and expanding XIoT attack surfaceThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Jordan M. Schroeder, CISOhttps://www.linkedin.com/in/schroederjordan/Zia Ush Shamszaman, Senior Lecturer in Computer Science, Teesside Universityhttps://www.linkedin.com/in/zia-ush-shamszaman/Elliot Gidley, Field CTO EMEA, Clarotyhttps://www.linkedin.com/in/elliotgidley

  11. 293

    teissTalk: 2026 threat trends - securing your organisation against next-gen cyber attacks

    How cyber criminals are weaponising AI to defeat your threat detection and responseBeyond encryption – how ransomware has evolved to include data exfiltration, publication threats and supply chain compromiseHow geopolitical tensions are increasing nation-sponsored cyber-campaigns - proxy attacks, IT worker scams and supply chain risksThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Ed Tucker, Director - Cyber Security Practice, Telefornica Techhttps://www.linkedin.com/in/tuckeredward/Neil King, IT Security Professional, Canonhttps://www.linkedin.com/in/neilking/Christine Bejerasco, CISO, WithSecure Intelligencehttps://www.linkedin.com/in/christinebejerasco/

  12. 292

    teissTalk: Shielding sensitive data from ransomware – staying ahead of evolving threats

    How modern ransomware actors are deploying multidimensional tactics to outpace traditional defencesStrategies to reduce data loss and sustain business operations after an attackAI and automation – enhancing visibility and accelerating response to ransomware threatsThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Edward Starkie, Director, GRC | Cyber Risk, Thomas Murrayhttps://www.linkedin.com/in/edward-starkie-56712431/Cameron Brown, Head of Cyber Threat and Risk Analytics, Ariel Rehttps://www.linkedin.com/in/analyticalcyber/Jesus Cordero, Director, Solution Architects AppSec, NetSec & XDR, EMEA, Barracudahttps://www.linkedin.com/in/jcordero-guzm%C3%A1n/

  13. 291

    teissTalk: Resilience as a business outcome

    Identifying critical assets and dependencies to focus investment where impact is highestDesigning for rapid recovery with tested runbooks and clear RTO/RPO targetsStrengthening resilience through training, playbooks, and cross-functional drillsThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Scott Hardy, CISO, Sargent-Dischttps://www.linkedin.com/in/scott-hardy-cissp-ccsk-44882a45Tamara Kaye, Group Director - Resilience, Ardagh Grouphttps://www.linkedin.com/in/tamara-kaye-8997852b/Sam Woodcock, Sr. Director, Solutions Architecture - EMEA, 11:11 Systemshttps://www.linkedin.com/in/samuel-woodcock-9745b831/

  14. 290

    teissTalk: AI defence against offence - are you playing catch-up in the new security arms race?

    Leveraging AI-powered solutions to anticipate, detect and contain asymmetric cyber threatsAugmenting security teams through AI efficiencies – reducing alert fatigue whilst improving detection speed and accuracyBest AI security practices on safeguarding critical systems and sensitive data against AI-driven cyber threatsThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Michela Resta, Solicitor, CyXcelhttps://www.linkedin.com/in/michelarestacyxcel/Paolo Palumbo, Vice President, WithSecure Intelligencehttps://www.linkedin.com/in/paolopalumbo/Tiago Rosado, Chief Information Security Officer, Asitehttps://www.linkedin.com/in/tiagorosado/

  15. 289

    teissTalk: Getting the board’s ‘aye’ on your cyber-security investments

    Bridging the CISO-board disconnect which hinders your cyber-security progressMeasuring cyber-risk in financial, economic and operational terms and demonstrating value in cyber-investmentsFocusing on governance and compliance – how to answer when asked “are we compliant?Thom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Zia Ush Shamszaman, Senior Lecturer in Computer Science, Teesside Universityhttps://www.linkedin.com/in/zia-ush-shamszaman/Edd Hardy, Director Cyber Security, AlixPartnershttps://www.linkedin.com/in/eddhardyPenny Jackson, Director Strategy, Awareness & Engagement (Human Risk Management), Aristos Partnershiphttps://www.linkedin.com/in/pennykjackson/

  16. 288

    teissTalk: Help your colleagues help you with an enhanced security awareness programme

    How appreciation and gamification can improve your employees’ security awarenessMaking security behaviours stick – reframing mistakes as opportunities for growthFostering a culture of continuous improvement with an inclusive learning environmentThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Sara Carty, Founder & CEO, Unboringhttps://www.linkedin.com/in/saracarty/Penny Jackson, Director Strategy, Awareness & Engagement (Human Risk Management), Aristos Partnershiphttps://www.linkedin.com/in/pennykjackson/Rebecca Stephenson, Specialist Lead Lecturer, Highlands Collegehttps://www.linkedin.com/in/creative-minds-in-cyber/

  17. 287

    teissTalk: From service desk to security risk - stopping social engineering at the source

    Which techniques and methods use by threat actors are bypassing security parametersReducing your cyber risk - using lessons learned from recent high-profile attacksStrategies to protect your service desk against identity-based attacksThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Paul Holland, Cyber Capability Manager, Royal Mailhttps://www.linkedin.com/in/paulinfosec/Lukas Weber, Senior Vice President, AlixPartnershttps://www.linkedin.com/in/lukaswebr/Rebecca Stephenson, Specialist Lead Lecturer, Highlands Collegehttps://www.linkedin.com/in/creative-minds-in-cyber/Darren James, Senior Product Manager, Specopshttps://www.linkedin.com/in/darren-james-91055310

  18. 286

    Live at teissLondon2025: From gatekeeping to guardrails - proactive supply chain security at scale

    70% of critical security debt stems from third-party code - what can be done upstream?How real-time threat intelligence and policy enforcement are closing the gapWhy DORA and modern CI/CD pipelines demand pre-emptive visibility and automation Thom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Paul Holland, Cyber Capability Manager, Royal Mailhttps://www.linkedin.com/in/paulinfosec/Tiago Rosado, Chief Information Security Officer, Asitehttps://www.linkedin.com/in/tiagorosado/Jean Carlos, Information Security Lead, Trade Republichttps://www.linkedin.com/in/jeanpcarlos/John Smith, CTO of EMEA, Veracodehttps://www.linkedin.com/in/jtsmith123

  19. 285

    teissTalk: Advancing compliance maturity in an age of DORA & NIS2

    Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threatsMeeting API compliance and data protection challenges with emerging technologiesMoving towards a mature posture for API securityThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Satyam Rastogi, Director of Information Security & DevOps, BAMKOhttps://www.linkedin.com/in/hackersatyamrastogi/Mike Johnson, Global Cyber Threat & Incident Response Manager, Verifonehttps://www.linkedin.com/in/mike---johnson/Madison Dreshner, Principal of IT Risk and Compliance solutions, AuditBoardhttps://www.linkedin.com/in/madisondreshner/

  20. 284

    teissTalk: Refining your API security strategy to protect against AI-driven attacks

    Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threatsMeeting API compliance and data protection challenges with emerging technologiesMoving towards a mature posture for API securityThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Tiago Rosado, Chief Information Security Officer, Asitehttps://www.linkedin.com/in/tiagorosado/Anne Coulombe, CISO, Bleuet LLChttps://www.linkedin.com/in/annecoulombe/Menachem Perlman,  Director, Global Solutions Engineering at Akamai Technologies - API Security,  Akamaihttps://www.linkedin.com/in/menachemperlman/

  21. 283

    teissTalk: Building resilient infosec teams

    Analysing how your teams cope with a cyber incident or a failure scenarioLearning from crises - building resilience strategies to mitigate future incidentsBuilding a cyber resilient mindset within your infosec team and in the wider organisationThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Raza Sadiq, Head of Enterprise Risk, MQubehttps://www.linkedin.com/in/razasadiq7/Sara Carty, Founder & CEO, Unboringhttps://www.linkedin.com/in/saracarty/Christoph Schuhwerk, CISO in Residence, EMEA, Zscalerhttps://www.linkedin.com/in/christophschuhwerk1978

  22. 282

    teissTalk: Surviving a critical CVE - a high-impact playbook

    Risk-based prioritising using severity scoring and patch analysisEscaping the silo trap - bridging the gap between IT and security teamsAutomate rules to handle high-severity vulnerabilities and zero-daysJonathan Craven, Host, teissTalkhttps://www.linkedin.com/in/jonathanbcraven/Tiago Rosado, Chief Information Security Officer, Asitehttps://www.linkedin.com/in/tiagorosado/Cameron Brown, Head of Cyber Threat and Risk Analytics, Ariel Rehttps://www.linkedin.com/in/analyticalcyber/York von Eichel-Streiber, Product Marketing Manager, NinjaOnehttps://www.linkedin.com/in/york-von-eichel-streiber-50552b9b

  23. 281

    teissTalk: Securing against AI-driven phishing attacks

    How cyber criminals are using AI tools to scale malicious operationsStreamlining user experience with biometrics or device-based authenticationMaking your organisation cyber resilient and securing critical systems as AI continues to advanceFeaturing: Thom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Derek Hanson, VP Solutions Architecture and Alliances, Yubicohttps://www.linkedin.com/in/derekthansonJay Vinda, Global CISO and Cyber Risk Engineering Lead, Mosaic Insurancehttps://www.linkedin.com/in/jayvindaLee Munson, Principal Research Analyst, Information Security Forumhttps://www.linkedin.com/in/lmunson/

  24. 280

    teissTalk: Mitigating human cyber-risks with data and behavioural sciences

    Which behaviours increase risk and how we can measurably change them Driving employee engagement without incentives Which real-time interventions encourage safer employee behaviours Jonathan Craven, Host, teissTalkhttps://www.linkedin.com/in/jonathanbcraven/Rebecca Stephenson, Specialist Lead Lecturer, Highlands Collegehttps://www.linkedin.com/in/creative-minds-in-cyber/Penny Jackson, Director Strategy, Awareness & Engagement (Human Risk Management), Aristos Partnershiphttps://www.linkedin.com/in/pennykjackson/Candace Williams, CEO/Founder, Cyb(H)er Ally Cybersecurity Solutions, LLChttps://www.linkedin.com/in/cybherally/

  25. 279

    teissTalk: Navigating the rising legal threats to cyber-security leaders

    Reducing personal risk with your organisation’s liability insurance Understanding the evolving risk landscape through recent case studies Creating a workplace ethos of shared accountability This episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Michela Resta, Solicitor, CYXCELhttps://www.linkedin.com/in/michelarestacyxcel/Kelly Hagedorn, Partner, ALSTON & BIRDhttps://www.linkedin.com/in/kellyhagedorn/

  26. 278

    teissTalk: Weak passwords – the hidden threat lurking in your organisation

    Trends in the current credential theft landscape and changing compliance standardsStrategies to reduce password risk - continuous scanning, enforced policies and exclusion dictionariesEncouraging users to create strong, securely stored passwords without reuseThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Shannon Muller, Cyber security Specialist, Microsofthttps://www.linkedin.com/in/shannon-muller/Jay Vinda, Cyber Risk Engineering and Emerging Solutions Lead, Mosaic Insurance https://www.linkedin.com/in/jayvindaDarren James, Senior Product Manager, Specopshttps://www.linkedin.com/in/darren-james-91055310

  27. 277

    teissTalk: DORA - A new law for a new dawn

    What DORA is specifically asking of organisationsWhere the likely CTI gaps are when attempting to align with DORAWhy innovation is key to aligning your CTI capabilitiesThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Benoit Heynderickx, Principal Analyst, Information Security Forum (ISF)https://www.linkedin.com/in/benoithey/Tim Parker, Chair, South West Cyber Security Clusterhttps://www.linkedin.com/in/tim-parkerLewis Henderson, Director - Product Marketing, Team Cymruhttps://www.linkedin.com/in/lewishenderson/

  28. 276

    teissTalk: Cyber-resilience – your last line of defence

    Preparing for ransomware - where is your data and how is it protected? Building cyber resilience for your data, across on-premises and cloud Reducing the window of damage and minimising the time to recover This episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Heather Lowrie, Independent Advisor, Earthgard Ltdhttps://www.linkedin.com/in/heather-lowrie/Raza Sadiq, Head of Enterprise Risk, MQubehttps://www.linkedin.com/in/razasadiq7/Sandra Bell, Group Head of Organisational Resilience, Novunahttps://www.linkedin.com/in/sandra-bell-13a109183/Grant Caley, UK & Ireland Solutions Director, NetApphttps://www.linkedin.com/in/grant-caley-a424681/

  29. 275

    teissTalk: Resilient by design – the next cyber-security imperative

    Identifying and removing barriers to cyber resilienceReducing complexity - consolidating and eliminating legacy systemsBuilding a cyber-resilient organisation - moving from a reactive to a proactive model This episode is hosted by Thom Langford:https://www.linkedin.com/in/jonathanbcraven/Heather Lowrie, Independent Advisor, Earthgard Ltdhttps://www.linkedin.com/in/heather-lowrie/Sasha Henry, Cyber Strategy & Resilience Advisor, Confidentialhttps://www.linkedin.com/in/alexandra-pavelovna-henry-32b98465/James Tucker, Head of CISO, International, Zscalerhttps://www.linkedin.com/in/jamesjtucker/

  30. 274

    teissTalk: Hacking security effectiveness - making sure your tools are working for you

    Where metrics and evaluations fall short in measuring holistic security effectiveness Identifying gaps between tools and determining which gaps you need to fill Showing the board and the business that cyber-security is moving the needle on resilience This episode is hosted by Jonathan Craven:https://www.linkedin.com/in/jonathanbcraven/Richard Absalom, Principal Research Analyst, Information Security Forum (ISF)https://uk.linkedin.com/in/richard-absalom-48879116Edward Starkie, Director, GRC | Cyber Risk, Thomas Murrayhttps://www.linkedin.com/in/edward-starkie-56712431/Emanuel Salmona, Co-Founder and CEO, Nagomi Securityhttps://www.linkedin.com/in/emanuelsalmona/

  31. 273

    teissTalk: Protecting critical services without disruption

    How cyber-attackers are using GenAI to evade detection by security systemsSafeguarding against sophisticated ransomware attacks with robust security measuresTop tactics for stopping ransomware attacks before they cause damageThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/John Heaton-Armstrong, Experienced Cyber security Leader, Confidentialhttps://www.linkedin.com/in/johnheatonarmstrong/Edewede Oriwoh, Group IT and Cybersecurity Manager, Zigup Plchttps://www.linkedin.com/in/edewedeoriwoh/Seamus Lennon, VP of Operations, ThreatLocker https://www.linkedin.com/in/seamus-lennon-41423886

  32. 272

    teissTalk: Protecting critical services without disruption

    Whether compliance-as-security in CNI offers security or false confidenceNavigating tool and dashboard complexity to avoid CNI cyber blind spots Attracting cyber talent into CNI and away from finance and tech This episode is hosted by Jonathan Craven:https://www.linkedin.com/in/thomlangford/Sofia Martinez Gomez, VP, Risk & Tech Practice - Cybersecurity, Privacy & Compliance, AlixPartnershttps://www.linkedin.com/in/sofia-martinez-gomez-8b5534136/?locale=en_US  Monika Atanasova, Global Head of Third Party Risk Management, Raiffeisen Gruppehttps://www.linkedin.com/in/monika-atanasova-746633b7/?originalSubdomain=chDeryck Mitchelson, Global CISO, Check Point Software Technologieshttps://www.linkedin.com/in/deryckmitchelson

  33. 271

    teissTalk: Live at teissLondon2025 - Enhancing AppSec with Application Security Posture Management

    Fortifying security defences with automated root cause analysis and prioritisationManaging security risk urgency across your application pipeline with real-time visibility and data visualisation capabilitiesDriving efficiency and prioritisation across your security ecosystem with practical remediation actionsThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/John Heaton-Armstrong, Experienced Cyber security Leader, Confidentialhttps://www.linkedin.com/in/johnheatonarmstrong/Danny Dresner, Professor of Cyber security, The University of Manchesterhttps://www.linkedin.com/in/danny-dresner-fciis-6382381/Tiago Rosado, Chief Information Security Officer, Asitehttps://www.linkedin.com/in/tiagorosado/Derek Maki, VP Product Management, Veracodehttps://www.linkedin.com/in/derekmaki/

  34. 270

    teissTalk: Bolstering your defences against supply chain cyber-risk

    What’s making supply chain risk the fastest-growing cyber-risk categoryHow to galvanise your internal and external peers to develop a shared responsibility for supply chain cyber-risksDesigning and implementing effective key controls to mitigate supply chain cyber-risks This episode is hosted by Jonathan Craven:https://www.linkedin.com/in/jonathanbcraven/Mike Johnson, Global Cyber Threat & Incident Response Manager, Verifonehttps://www.linkedin.com/in/mike---johnson/Jean Carlos, Group Head of Cyber Architecture & Engineering, TP ICAP https://www.linkedin.com/in/jeanpc/Richard Marcus, CISO, AuditBoardhttps://www.linkedin.com/in/richard-marcus-b3192261/

  35. 269

    teissTalk: Securing the human perimeter

    How the human risk surface area has broadened with GenAI and collaboration tools Prevent breaches by applying the cyber kill chain to human vulnerabilities Strategies to protect employees without compromising productivity This episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Daniela Almeida Lourenco, Chief Information Security Officer, Dutch Financial Serviceshttps://www.linkedin.com/in/daniela-almeida-lourenco/Rebecca Stephenson, Specialist Lead Lecturer, Highlands College https://www.linkedin.com/in/creative-minds-in-cyber/Frederick Coulton, Director of UX, CultureAIhttps://www.linkedin.com/in/frederickcoulton

  36. 268

    teissTalk: Threat intelligence strategies to mitigate industrial-scale cyber-crime

    How cyber-crime continues to evolve and what this means for enterprise threat intelligence strategiesEvaluating sources and deciding which characteristics are most relevantHow DNS-based threat intelligence versus a malware-centric approach disrupts industrialised cyber-crimeThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Todd Wade, Chief Information Security Officerhttps://www.linkedin.com/in/twade/Matt Hardy, Senior Information Security Executivehttps://www.linkedin.com/in/matthardy67/Craig Sanderson, Principal Cybersecurity Strategist, Infobloxhttps://www.linkedin.com/in/craigsanderson1

  37. 267

    teissTalk: The future of SecOps - why should leaders be optimistic?

    Automating SecOps processes and procedures - free your people, improve retention and increase productivityWhere creativity and diversity is keeping your SecOps one step ahead of the attackersMatching your effectiveness to organisational objectives - aligning your internal SOC metrics with those required by the boardThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Prince Adu, Board Member - ISACA Accra Chapter, ISACAhttps://www.linkedin.com/in/prince-adu-ccsp-cisa-crisc-3759a520/Garrett Smiley, Chief of Staff to CDIO / Vice President of Digital Infrastructure and Technology Strategy, Maximushttps://www.linkedin.com/in/garrettsmiley/Matt Muller, Field CISO, Tines https://www.linkedin.com/in/matthewrmuller/

  38. 266

    teissTalk: The emerging 2025 threat landscape

    How evolving methods of work are expanding the attack surfaceGrowth of supply chain attacks targeting devices touching sensitive dataIncreased nation-state targeting of Critical National InfrastructureThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Richard Absalom, Principal Research Analyst, Information Security Forum (ISF)https://uk.linkedin.com/in/richard-absalom-48879116Tom O’Driscoll, Head of Security Strategy and Intelligence, National Highwayshttps://www.linkedin.com/in/odte/Michael Covington, Vice President, Portfolio Strategy, Jamfhttps://www.linkedin.com/in/michaelcovington/

  39. 265

    teissTalk: Transforming your security operations to detect and respond to advanced attacks

    Diverse threat vectors and complex attacks - how to expand your detection and response programmesHelping your SOC analysts achieve more - finding the right combination of internal ML/AI tools and external providersPathways to accelerate your SOC development to detect and mitigate attacks earlier This episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Mike Johnson, Global Cyber Threat & Incident Response Manager, Verifonehttps://www.linkedin.com/in/mike---johnson/Alan Jenkins, CISO Team lead, Saepiohttps://www.linkedin.com/in/alanjenkins/Josh Davies, Principal Technical Manager, Fortrahttps://www.linkedin.com/in/jdgwilym/

  40. 264

    teissTalk: Protecting your crown jewels as an SME without breaking the bank

    Identifying which data assets to prioritise Building an enterprise-level cyber-security profile on a budget Strengthening your cyber-resilience with incident response playbooks This episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Steven Furnell, Professor of Cyber Security, University of Nottinghamhttps://www.linkedin.com/in/stevenfurnell/Jean Carlos, VP of Information Security, AutogenAIhttps://www.linkedin.com/in/jeanpc/Stephanie Lynch-Ozanar, Education and Awareness Specialist, Co-Ophttps://www.linkedin.com/in/stephlynchozanarKev Eley, VP of UKI, Exabeamhttps://www.linkedin.com/in/keveley/

  41. 263

    teissTalk: Reducing your security debt in a GenAI-driven world

    Minimising the risks to your security posture from developers’ reliance on GenAIUsing AI to speed up remediation and avoid security becoming the bottleneckSteps to ensure safe and secure implementation of GenAI in software developmentThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Lee Munson, Principal Research Analyst, Information Security Forumhttps://www.linkedin.com/in/lmunson/Zia Ush Shamszaman, Senior Lecturer , Computer Science, Teesside Universityhttps://www.linkedin.com/in/zia-ush-shamszamanJohn Smith, EMEA CTO, Veracodehttps://www.linkedin.com/in/jtsmith123

  42. 262

    teissTalk: Why just-in-time security is leaving you exposed

    Why the traditional malware-centric approach to security doesn’t enable proactive protectionPre-empting and protecting attacks before they are launched - looking at the threat actors attack infrastructureEmergent domains, what are they and why they need a layered detectionThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/John Rouffas, Cyber Security Executive, Author & Journalist, CyberEdBoard Communityhttps://www.linkedin.com/in/drjohnrouffas/Francis Annandale, Managing Consultant, CyXcelhttps://www.linkedin.com/in/francis-annandale-98222186/Craig Sanderson, Principal Cybersecurity Strategist, Infobloxhttps://www.linkedin.com/in/craigsanderson1/ 

  43. 261

    teissTalk: Why Zero Trust Network Access is not your silver bullet

    Where does Zero Trust fall short, and why these failings encourage cyber-crimeExpanding Zero Trust to protect the data itselfIdentifying, classifying, and securing sensitive data through automationThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Jean Carlos, VP Cyber Security, BOXThttps://www.linkedin.com/in/jeanpc/Sasha Henry, Senior Managing Consultant, Cyxcelhttps://www.linkedin.com/in/alexandra-pavelovna-henry-32b98465/?originalSubdomain=ukKarim Eldefrawy, CTO and Cofounder, Confidencialhttps://www.linkedin.com/in/karim-eldefrawy-b706b53/

  44. 260

    teissTalk: Better security awareness training with AI

    Leveraging behavioural AI to mitigate the risk of phishing attacks Fortifying your defenses against the next wave of phishing threats Practical strategies for empowering colleagues while strengthening your cyber resilience This episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Rebecca Stephenson, Specialist Lead Lecturer in Digital Pedagogy, Government of Jerseyhttps://www.linkedin.com/in/creative-minds-in-cyber/Ben Wynn-Jones, Information Awareness Lead, Canon EMEA https://www.linkedin.com/in/ben-wynn-jones/

  45. 259

    teissTalk: Confronting cyber-criminals-strategies for cyber-hygiene

    Meeting your operational and legal obligations - getting your foundations in orderCyber-proofing your organisation with comprehensive cyber-security training and awarenessDeveloping cyber-hygiene to defend against cyber-criminals using emerging technologyThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Paul Holland, Head of Research, Information Security Forum (ISF)https://www.linkedin.com/in/paulinfosec/Penny Jackson, Director Strategy, Awareness & Engagement (Human Risk Management), Aristos Partnershiphttps://www.linkedin.com/in/pennykjackson/

  46. 258

    teissTalk: Mitigating third-party risk with threat intelligence

    A proactive approach to third-party risk - continuous monitoring of suppliersUsing threat intelligence to identify third-party riskEffectively working with partners to mitigate third-party security risksThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Chuck Brooks, Adjunct Professor, Georgetown Universityhttps://www.linkedin.com/in/chuckbrooks/Victoria van Roosmalen, CISO & CPO, Coostohttps://www.linkedin.com/in/victoriavanroosmalen/Stuart Frost, Head of Enterprise Security & RIsk Management, Department for Work & Pensionshttps://www.linkedin.com/in/stuart-frost-bem/Andy Grayland, CISO, Silobreakerhttps://www.linkedin.com/in/dr-andy-g-1b90b4150/

  47. 257

    teissTalk: A playbook for new CISOs - learnings from years in the trenches

    How the next generation of InfoSec leaders can better prepare themselves to navigate the threats of tomorrowIdentifying the quick wins and making the most of the finite time new CISOs have to get their message acrossPractical measures for reducing stress, burnout and frustration within InfoSec teams over the longer termThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Paul Watts, Distinguished Analyst, Information Security Forum (ISF)https://www.linkedin.com/in/paulewatts/Dr Andrea Cullen, Co Founder/Co CEO, CAPSLOCKhttps://www.linkedin.com/in/dr-andrea-cullen/

  48. 256

    teissTalk: Eliminating blind spots within your cyber security environment

    Gaining comprehensive visibility across your hybrid and multi-cloud environmentsMitigating hidden threats and vulnerabilities beyond your endpoints and network parametersMaximising your cyber security investments with better visibility and optimised tool performanceThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Dr Edewede Oriwoh, Group IT Information and Cyber Security Manager, Zigup Plchttps://www.linkedin.com/in/edewedeoriwoh/Lessie Skiba, Global Director of Outreach and Partner Engagement, Cyber Readiness Institutehttps://www.linkedin.com/in/lessie-skiba-2b7460bb/Mark Jow, EMEA Tech Lead & Evangelist, Gigamonhttps://www.linkedin.com/in/mark-jow-4766797

  49. 255

    teissTalk: Protecting your C-Suite's private lives to protect the enterprise

    Threat trends - how threat actors are targeting C-Suite executives to access the enterpriseEmpowering your C-Suite to identify and avoid social engineeringCreating social media policies that your C-Suite understand so that they can lead by exampleThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Thomas Wendrich, Associate Partner, IBMhttps://www.linkedin.com/in/thomas-wendrich-5470672Jacqueline Hanson-Kotei, Senior Manager, Enterprise Information Security & Governance, MTN Ghanahttps://www.linkedin.com/in/jacqueihk/Torsten Wiedemeyer, VP Europe, Cyblehttps://www.linkedin.com/in/wiedemeyer

  50. 254

    teissTalk: Securing your sensitive data from exfiltration

    Protecting your endpoints - how do cybercriminals exfiltrate data, and what trends are we seeing?Mitigating the financial, legal, and reputational risks with a comprehensive data strategyLeveraging next-generation technology to rapidly detect and respond to data exfiltrating ransomware attacksThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Neil Hare-Brown, CEO, STORM Guidancehttps://www.linkedin.com/in/neilhbPrince Adu, Board Member - ISACA Accra Chapter, ISACAhttps://www.linkedin.com/in/prince-adu-ccsp-cisa-crisc-3759a520/Darren Williams, CEO, BlackFoghttps://www.linkedin.com/in/darrenwwilliams/

Type above to search every episode's transcript for a word or phrase. Matches are scoped to this podcast.

Searching…

No matches for "" in this podcast's transcripts.

Showing of matches

No topics indexed yet for this podcast.

Loading reviews...

ABOUT THIS SHOW

The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.

HOSTED BY

TEISS

URL copied to clipboard!