PodParley PodParley
Compromising Positions - A Technology Podcast cover art

All Episodes

Compromising Positions - A Technology Podcast — 59 episodes

#
Title
1

EPISODE 58: Self-Driving Cars, Cybersecurity & Trust

2

EPISODE 57: SUSPICION BY DESIGN: INSIDE DWP’S UNIVERSAL CREDIT AI FRAUD SYSTEM

3

EPISODE 56: From Dark Triads to Patriotic Hackers: Human Maliciousness in Cybersecurity

4

EPISODE 55: Hack the Movies! The Best and WorsT Hacker Movies Part 2!

5

EPISODE 54: CFO Secrets: How to Secure Your Cybersecurity Budget

6

EPISODE 53: Whose Responsibility Is It To Protect The Data? The Data Team Or The Cybersecurity Team?

7

EPISODE 52: People Don’t Follow Companies, They Follow People: How To Build Your Personal Brand On LinkedIN

8

EPISODE 51: Cha, Cha, Cha, Changes! How to get excited about organisational change (re-release)

9

EPISODE 50: Tips On How To Be A Top-Class Cybersecurity Student And Get Your First Cybersecurity Job!

10

EPISODE 49: Are Our Cybersecurity Controls Inclusive? Going Beyond Hiring When It Comes To Diversity In Cybersecurity

11

EPISODE 48: It’s So Hard To Commit A Crime These Days! Surveillance, Dishonesty, Fraud And Other Pink-Collar Flags

12

EPISODE 47: Hacking Our Capacity To Think: The Philosophy Of Trust, Cybersecurity And AI

13

EPISODE 46: Sometimes, We Are The Villains: Tech Ethics In Software Development

14

EPISODE 45: Can Cybersecurity Teams Actually Do Scrum?

15

EPISODE 44: Embracing Failure in Cybersecurity by Learning Through Trial and Error

16

EPISODE 43: Not Everybody Does It Like US…So Hire Anthropologists in Cybersecurity!

17

EPISODE 42: Mind Science - Cyber Psychology 101

18

EPISODE 41: Empathy Over Ego: Why We're Angry At The Wrong People In Cybersecurity - The Cyber Empathy Podcast

19

EPISODE 40: How Do You Protect Your ASS-ets? An Interview On AppSec With The Modern.Net Show

20

EPISODE 39: Throwback Thursday! I’m Only H.U.M.A.N(S): Hacking the Human OS to Master Cybersecurity Compliance

21

EPISODE 38: HACK THE PLANET! THE BEST AND WORST HACKER MOVIES REVIEWED!

22

EPISODE 37: There Is No Perfect Cybersecurity, But You Could At Least Put a Padlock On It!

23

EPISODE 36: When Perception is Everything: Is it Time to Ditch the name "Cybersecurity"?

24

EPISODE 35: Can Cybersecurity Teams Flex Their Creativity To Keep Us All Safe?

25

EPISODE 34: IS YOUR RISK MANAGEMENT TOAST?

26

EPISODE 33: Inconvenient Truths: Why Technology Won’t Create The Perfect Customer Experience In Cybersecurity

27

EPISODE 32: Cybersecurity and The Human Experience: Designing for humans, not robots with John Sills

28

EPISODE 31: Can Cybersecurity Overcome its PR Problem? Building Your Brand and Social Capital with Sarah Evans, PR and Marketing Specialist

29

EPISODE 30: SAY GOODBYE TO ‘GIT BLAME’: BUILDING COLLABORATIVE AND SECURE SOFTWARE DEVELOPMENT LIFECYCLES

30

EPISODE 29: “THE DILEMMA GAME”:UNLEASHING THE POWER OF ETHICS AND GOOD CYBERSECURITY THROUGH PLAY

31

EPISODE 28: RULES WITHOUT RELATIONSHIPS CREATE REBELLION: WHY ETHICS MATTER IN CYBERSECURITY

32

EPISODE 27: Ignore all previous instructions: Threat modelling AI Systems

33

EPISODE 26: It’s A Wonderful Hack! Building A High Performance Security Team

34

EPISODE 25: SUPERCONNECTORS: UNLEASHING PURPOSE BEYOND METRICS IN YOUR CYBERSECURITY FUNCTION

35

EPISODE 24: DATA, DATA EVERYWHERE, BUT HOW DO WE MAKE IT SAFE TO SHARE? EXPLORING THE RELATIONSHIP BETWEEN DATA, CYBERSECURITY AND OUR DESIRE FOR CONVENIENCE

36

EPISODE 23: Awareness ≠ Behavioural Change - Rethinking Cybersecurity Training

37

EPISODE 22: Hands Off My Amygdala! The Psychology Behind Cybersecurity

38

EPISODE 21: Bringing The Curtain Down On Risk Theatre And Applauding Objective-Centred Risk Management

39

EPISODE 20: Not New, But Novel - Tackling Risk In The Third Sector

40

EPISODE 19: Fun With Purpose: A Scrum Guide!

41

EPISODE 18: And The BAFTA For Best Cybersecurity Awareness Training Goes To…

42

EPISODE 17: F.U.D Off! Cybersecurity Awareness Beyond Compliance and Boredom

43

EPISODE 16: That’s illuminating! Protecting aberdeen’s iot street lights from cyber attacks!

44

EPISODE 15: SHIFT HAPPENS: The ART OF NAVIGATING THE SEAS OF CYBER CHANGE

45

EPISODE 14: HACK THE NEURAL NETWORK - AI and CYBERSECURITY

46

BACK SOON

47

EPISODE 13: 5 HOT TAKES ON AI

48

EPISODE 12: How to Use ChatGPT and AI to Level UP Your Cybersecurity function

49

EPISODE 11: Are You User Experienced? Applying The Principles of UX & UR To The Cybersecurity Journey

50

EPISODE 10: It’s Not about the Cookie : THE POWER OF FRAMING INTERACTIONS

51

EPISODE 9: What the Cybersecurity Team Wants and Can’t Tell You (Because they Need More Behavioural Science)

52

EPISODE 8: CYBERCRIME - THE GREATEST HEIST IN HUMAN HISTORY

53

EPISODE 7: If Data is the new oil, how do we prevent data spills?

54

EPISODE 6: What Would Dolly Parton Do?

55

EPISODE 5: WAR (Metaphor), What is it good for? ABSOLUTELY NOTHING!

56

Episode 4 : CODE RED - Empowering engineers to secure our ci/cd pipelines

57

EPISODE 3: I’M ONLY H.U.M.A.N.(S)

58

EPISODE 2: THE HUMAN OS - WHY WE CAN’T JUST CTRL + ALT + DELETE OUR COMPLIANCE PROBLEMS

59

Trailer!