All Episodes
Compromising Positions - A Technology Podcast — 59 episodes
EPISODE 58: Self-Driving Cars, Cybersecurity & Trust
EPISODE 57: SUSPICION BY DESIGN: INSIDE DWP’S UNIVERSAL CREDIT AI FRAUD SYSTEM
EPISODE 56: From Dark Triads to Patriotic Hackers: Human Maliciousness in Cybersecurity
EPISODE 55: Hack the Movies! The Best and WorsT Hacker Movies Part 2!
EPISODE 54: CFO Secrets: How to Secure Your Cybersecurity Budget
EPISODE 53: Whose Responsibility Is It To Protect The Data? The Data Team Or The Cybersecurity Team?
EPISODE 52: People Don’t Follow Companies, They Follow People: How To Build Your Personal Brand On LinkedIN
EPISODE 51: Cha, Cha, Cha, Changes! How to get excited about organisational change (re-release)
EPISODE 50: Tips On How To Be A Top-Class Cybersecurity Student And Get Your First Cybersecurity Job!
EPISODE 49: Are Our Cybersecurity Controls Inclusive? Going Beyond Hiring When It Comes To Diversity In Cybersecurity
EPISODE 48: It’s So Hard To Commit A Crime These Days! Surveillance, Dishonesty, Fraud And Other Pink-Collar Flags
EPISODE 47: Hacking Our Capacity To Think: The Philosophy Of Trust, Cybersecurity And AI
EPISODE 46: Sometimes, We Are The Villains: Tech Ethics In Software Development
EPISODE 45: Can Cybersecurity Teams Actually Do Scrum?
EPISODE 44: Embracing Failure in Cybersecurity by Learning Through Trial and Error
EPISODE 43: Not Everybody Does It Like US…So Hire Anthropologists in Cybersecurity!
EPISODE 42: Mind Science - Cyber Psychology 101
EPISODE 41: Empathy Over Ego: Why We're Angry At The Wrong People In Cybersecurity - The Cyber Empathy Podcast
EPISODE 40: How Do You Protect Your ASS-ets? An Interview On AppSec With The Modern.Net Show
EPISODE 39: Throwback Thursday! I’m Only H.U.M.A.N(S): Hacking the Human OS to Master Cybersecurity Compliance
EPISODE 38: HACK THE PLANET! THE BEST AND WORST HACKER MOVIES REVIEWED!
EPISODE 37: There Is No Perfect Cybersecurity, But You Could At Least Put a Padlock On It!
EPISODE 36: When Perception is Everything: Is it Time to Ditch the name "Cybersecurity"?
EPISODE 35: Can Cybersecurity Teams Flex Their Creativity To Keep Us All Safe?
EPISODE 34: IS YOUR RISK MANAGEMENT TOAST?
EPISODE 33: Inconvenient Truths: Why Technology Won’t Create The Perfect Customer Experience In Cybersecurity
EPISODE 32: Cybersecurity and The Human Experience: Designing for humans, not robots with John Sills
EPISODE 31: Can Cybersecurity Overcome its PR Problem? Building Your Brand and Social Capital with Sarah Evans, PR and Marketing Specialist
EPISODE 30: SAY GOODBYE TO ‘GIT BLAME’: BUILDING COLLABORATIVE AND SECURE SOFTWARE DEVELOPMENT LIFECYCLES
EPISODE 29: “THE DILEMMA GAME”:UNLEASHING THE POWER OF ETHICS AND GOOD CYBERSECURITY THROUGH PLAY
EPISODE 28: RULES WITHOUT RELATIONSHIPS CREATE REBELLION: WHY ETHICS MATTER IN CYBERSECURITY
EPISODE 27: Ignore all previous instructions: Threat modelling AI Systems
EPISODE 26: It’s A Wonderful Hack! Building A High Performance Security Team
EPISODE 25: SUPERCONNECTORS: UNLEASHING PURPOSE BEYOND METRICS IN YOUR CYBERSECURITY FUNCTION
EPISODE 24: DATA, DATA EVERYWHERE, BUT HOW DO WE MAKE IT SAFE TO SHARE? EXPLORING THE RELATIONSHIP BETWEEN DATA, CYBERSECURITY AND OUR DESIRE FOR CONVENIENCE
EPISODE 23: Awareness ≠ Behavioural Change - Rethinking Cybersecurity Training
EPISODE 22: Hands Off My Amygdala! The Psychology Behind Cybersecurity
EPISODE 21: Bringing The Curtain Down On Risk Theatre And Applauding Objective-Centred Risk Management
EPISODE 20: Not New, But Novel - Tackling Risk In The Third Sector
EPISODE 19: Fun With Purpose: A Scrum Guide!
EPISODE 18: And The BAFTA For Best Cybersecurity Awareness Training Goes To…
EPISODE 17: F.U.D Off! Cybersecurity Awareness Beyond Compliance and Boredom
EPISODE 16: That’s illuminating! Protecting aberdeen’s iot street lights from cyber attacks!
EPISODE 15: SHIFT HAPPENS: The ART OF NAVIGATING THE SEAS OF CYBER CHANGE
EPISODE 14: HACK THE NEURAL NETWORK - AI and CYBERSECURITY
BACK SOON
EPISODE 13: 5 HOT TAKES ON AI
EPISODE 12: How to Use ChatGPT and AI to Level UP Your Cybersecurity function
EPISODE 11: Are You User Experienced? Applying The Principles of UX & UR To The Cybersecurity Journey
EPISODE 10: It’s Not about the Cookie : THE POWER OF FRAMING INTERACTIONS
EPISODE 9: What the Cybersecurity Team Wants and Can’t Tell You (Because they Need More Behavioural Science)
EPISODE 8: CYBERCRIME - THE GREATEST HEIST IN HUMAN HISTORY
EPISODE 7: If Data is the new oil, how do we prevent data spills?
EPISODE 6: What Would Dolly Parton Do?
EPISODE 5: WAR (Metaphor), What is it good for? ABSOLUTELY NOTHING!
Episode 4 : CODE RED - Empowering engineers to secure our ci/cd pipelines
EPISODE 3: I’M ONLY H.U.M.A.N.(S)
EPISODE 2: THE HUMAN OS - WHY WE CAN’T JUST CTRL + ALT + DELETE OUR COMPLIANCE PROBLEMS
Trailer!