All Episodes
teissPodcast - Cracking Cyber Security — 302 episodes
teissTalk: Scaling resilience across your cyber ecosystem
teissTalk: Securing your organisation in the age of GenAI
teissTalk: Geopolitics & Regulation - Reshaping the Energy Sector’s Supply Chain Risk
teissTalk: Cybersecurity as a business metric - giving your C-Suite the data to govern
teissTalk: Why your security team is burned out and what to do about it
teissTalk: Building a trusted security model for Generative and Agentic AI
teissTalk:The confidence gap - moving SMBs from reactive to proactive cyber security
teissTalk: Securing applications and infrastructure in the AI era
teissTalk: Silent Swipers - unmasking info-stealers in today's threat landscape
teissTalk: 2026 predictions for OT security and the future of cyber physical systems
teissTalk: 2026 threat trends - securing your organisation against next-gen cyber attacks
teissTalk: Shielding sensitive data from ransomware – staying ahead of evolving threats
teissTalk: Resilience as a business outcome
teissTalk: AI defence against offence - are you playing catch-up in the new security arms race?
teissTalk: Getting the board’s ‘aye’ on your cyber-security investments
teissTalk: Help your colleagues help you with an enhanced security awareness programme
teissTalk: From service desk to security risk - stopping social engineering at the source
Live at teissLondon2025: From gatekeeping to guardrails - proactive supply chain security at scale
teissTalk: Advancing compliance maturity in an age of DORA & NIS2
teissTalk: Refining your API security strategy to protect against AI-driven attacks
teissTalk: Building resilient infosec teams
teissTalk: Surviving a critical CVE - a high-impact playbook
teissTalk: Securing against AI-driven phishing attacks
teissTalk: Mitigating human cyber-risks with data and behavioural sciences
teissTalk: Navigating the rising legal threats to cyber-security leaders
teissTalk: Weak passwords – the hidden threat lurking in your organisation
teissTalk: DORA - A new law for a new dawn
teissTalk: Cyber-resilience – your last line of defence
teissTalk: Resilient by design – the next cyber-security imperative
teissTalk: Hacking security effectiveness - making sure your tools are working for you
teissTalk: Protecting critical services without disruption
teissTalk: Protecting critical services without disruption
teissTalk: Live at teissLondon2025 - Enhancing AppSec with Application Security Posture Management
teissTalk: Bolstering your defences against supply chain cyber-risk
teissTalk: Securing the human perimeter
teissTalk: Threat intelligence strategies to mitigate industrial-scale cyber-crime
teissTalk: The future of SecOps - why should leaders be optimistic?
teissTalk: The emerging 2025 threat landscape
teissTalk: Transforming your security operations to detect and respond to advanced attacks
teissTalk: Protecting your crown jewels as an SME without breaking the bank
teissTalk: Reducing your security debt in a GenAI-driven world
teissTalk: Why just-in-time security is leaving you exposed
teissTalk: Why Zero Trust Network Access is not your silver bullet
teissTalk: Better security awareness training with AI
teissTalk: Confronting cyber-criminals-strategies for cyber-hygiene
teissTalk: Mitigating third-party risk with threat intelligence
teissTalk: A playbook for new CISOs - learnings from years in the trenches
teissTalk: Eliminating blind spots within your cyber security environment
teissTalk: Protecting your C-Suite's private lives to protect the enterprise
teissTalk: Securing your sensitive data from exfiltration
teissTalk: Fortifying your cyber defenses as a mid-sized organisation
teissTalk: Maintaining your credibility as a security advisor
teissTalk: Is privacy the source of your failing security?
teissTalk: Selling infosec as a business enabler
teissTalk: How AI can improve your security and compliance programmes
teissTalk: Where AI-driven threat detection can streamline your SOC
teissTalk: Assessing and mitigating risks in your OT environment
teissTalk: Is your organisation prepared for NIS2?
teissTalk: Is your organisation cyber resilient?
teissTalk: Can AI mitigate your supply chain cyber-risks?
teissTalk: Phishing simulations – should you bother?
teissTalk: Is your cyber security approach leaving neurodiverse colleagues behind?
teissTalk: Can internal audit boost your cyber security readiness?
teissTalk: ROI from your SOC - measuring impact and reporting progress
teissTalk: Improving your cyber resilience with threat intelligence
teissTalk: Embracing AI tools across your organisation - ensuring you remain secure
teissTalk: Securing your Industrial IoT
teissTalk: Helping colleagues recognise and learn from their risky behaviour
teissTalk: Building a more inclusive cybersecurity team
teissTalk: Why your non-cyber colleagues aren't listening to you
teissTalk: Building truly diverse teams
teissTalk: The liability of the CISO - a legal briefing
teissTalk: How much will your next breach cost?
teissTalk: Mitigating the cyber risks in your digital supply chain
teissTalk: Creating a security-conscious culture
teissTalk: How do you demonstrate effective cyber resilience to the board?
teissTalk: Building an effective infosec strategy for critical Nth-party suppliers
teissTalk: Leveraging AI to monitor, analyse and respond to threats
teissTalk: Are you ready to respond to a ransomware attack?
teissTalk: Where is your next negligent insider, and what risk do they pose?
teissTalk: Are infosec leaders emotionally literate enough?
teissTalk: The evolving role of identity in cyber security
teissTalk: Detecting imposters and rogue insiders in SaaS applications
teissTalk: Delivering measurable cyber risk reduction
teissTalk: Protecting yourself and your infosec colleagues
teissTalk: Building competitive advantage with diverse infosec teams
teissTalk: Bridging your cyber skills gap - training and retaining talent
teissTalk: Control in the cloud - are your data transfers secure?
teissTalk: How to answer when your board asks, “Are we secure?”
teissTalk: Cyber insurance - living with spiralling costs and reduced coverage
teissTalk: Where are your email risk blind spots?
teissTalk: Overcoming your internal cultural AppSec challenges
teissTalk: Doing more with less - managing cyber risk in 2023
teissTalk: Security awareness programmes – starting from scratch
teissTalk: Threat trends in 2023 and beyond – how uncertain times affect cyber-risk
teissTalk: Ensuring your IP is safe from malicious activity and cyber-espionage
teissTalk: Infosec leaders' legal briefing - the liability of the CISO
teissTalk: Developing an intergenerational security awareness programme
teissTalk: Building an effective digital trust framework
teissTalk: Matching intelligence to defence improvements
teissTalk: Delivering enterprise-level security on an SME budget
teissTalk: Robot wars – using AI to combat the deepfake threat
teissTalk: Industry focus - how are FinTechs mitigating risk against the evolving cyber-threat landscape
teissTalk: What can the arms race with the attackers teach us?
teissTalk: How many cyber-attack playbooks do you actually need?
teissTalk: Industry focus - how the automotive industry is protecting itself from third party threats
teissTalk: Measuring behavioural change to reduce cyber risk
teissTalk: Swerving the big threats to your application security
teissTalk: Get smart - How top CISOs are leveraging the dark web to gather pre-attack intelligence
teissTalk: Leading incident response and crisis simulations
teissTalk: Managing your board during a significant cyber-incident
teissTalk: Industry focus - how healthcare institutions protect their data from cyber threats
teissTalk: Fostering an effective security culture
teissTalk: Industry focus - how aviation companies share cyber threat intelligence
teissTalk: Is your hybrid security awareness programme helping or harming your organisation?
teissTalk: Can security awareness keep up with the attackers?
teissTalk: Avoiding infosec blind spots and embracing diversity of thought
teissTalk: Malicious or non-malicious – tackling the remote insider threat
teissTalk: Industry focus - how educational institutions effectively navigate cyber threats
teissTalk: Using threat modelling to reduce the attack surface
teissTalk: Building an effective infosec strategy for critical third-party suppliers
teissTalk: The evolution of data protection in the cloud
teissTalk: Persuading the board to sign off on your cyber-security strategy
teissTalk: Redesigning your cyber-security recruitment strategy
teissTalk: Reducing your attack surface - Zero Trust and microsegmentation
teissTalk: Managing the human element in your incident response plan
teissTalk: Infosec leaders' legal briefing - international data transfers
teissTalk: Securely onboarding new suppliers
teissTalk: Reducing the cyber risk to your operational technology
teissTalk: How to hire, and keep, the cream of cyber-security talent
teissTalk: Securing your applications with Zero Trust architecture
teissTalk: Maximising the effectiveness of your incident response plan
teissTalk: Security assurance - identifying the gaps in your security controls
teissTalk: Demonstrating effectiveness in managing cyber risk
teissTalk: Measuring the effectiveness of your security awareness programme
teissTalk: Trusting security automation
teissTalk: Security as a business enabler
teissTalk: Leading your breach response
Strengthening your supply chain’s cyber-resilience
teissTalk: Designing threat resilient organisations
teissTalk: Stress-testing your security playbooks
teissTalk: A playbook for new CISOs
teissTalk: Identity-first security for humans and machines
teissTalk: Testing your EQ - using emotional intelligence to retain talent and reduce cyber risk
teissTalk: Risk-based versus compliance-based security programmes
Digital forensics and incident response in the cloud
Inside job - Investigating the malicious insider threat
Playing it safe - the gamification of security awareness training
Selling threat intelligence to the board
Negotiating a ransomware payment
Defining and assessing your cyber resilience
How effective is your security awareness programme?
Prioritising your security vulnerabilities and misconfigurations
Inclusive infosec leadership - developing a vision for your security function
Deploying AI in attack prevention and incident response
Maturing the CISO role
The Log4j marathon - where are we and what comes next?
Protecting your key people from their own mistakes
How resilient is your data?
Protecting your infosec colleagues during a crisis
Quantifying and qualifying the value of your data
teissTalk: Quantifying the value of your data
teissTalk: Next level cyber hygiene for SMEs
teissTalk: Zero Trust in your supply chain
teissTalk: Tracking your joiners, movers and leavers (JMLs) in the world of hybrid work
teissTalk: Getting the Board on board
teissTalk: Developing a people-centric security programme
teissTalk: Transferring risk – what should your cyber insurance cover?
teissTalk: Bridge builders – two new security roles that are your next essential appointments
teissTalk: Avoiding bias in infosec decision making
teissTalk: Threat reconnaissance in your supply chain
teissTalk: Threat trends - double extortion ransomware
teissTalk: Vendor diversity - onboarding and offboarding security vendors
teissTalk: Mapping AI to your security posture and avoiding overlooked threats
teissTalk: How do you define a cyber incident?
teissTalk: Threat intelligence gathering
teissTalk: Balancing endpoint security and productivity for your hybrid workforce
teissTalk: Reviewing the InfoSec legacy of your pandemic response
teissTalk: Identity Governance in a hybrid work world
teissTalk: Supply chain threats: Supplier assurance
teissTalk: Rethinking your approach to insider risk
teissTalk: Leading remote Incident Response and crisis simulation
teissTalk: How do you know if your SOC is relevant?
teissTalk: Building a security culture in a remote and hybrid working world
teissTalk: Leading a Zero Trust initiative that will outlive your tenure
teissTalk: Building a diverse InfoSec team and bringing value to the organisation
teissTalk: How effective is your security awareness programme?
teissTalk: Quantifying cyber risk at Board level
teissTalk: Provisioning passwordless authentication at scale
teissTalk: Managing the level of threat alerts
teissTalk: Threat intelligence sharing
teissTalk: Cyber resilience and business logic attacks
teissTalk: Developing an Incident Response playbook for critical 3rd party suppliers
teissTalk: Identifying and responding to credential theft
teissTalk: Shadow-IT – keeping security out of the way of productivity?
teissTalk: What should the CISO and Security function not own?
teissTalk: 3rd party risk management – vulnerability testing your suppliers
teissTalk: Can ethics guide the use of AI in cyber security?
teissTalk: Winning budget as a CISO for 2022 and beyond
teissTalk: Automating Incident Response for a hybrid workforce
teissTalk: Can security awareness keep up with the attackers?
teissTalk: Does cyber insurance incentivise ransomware?
teissTalk: International Transfers of Data – the InfoSec Leaders’ Briefing
teissTalk: Disposal and destruction of data and devices
teissTalk: ROI from your SOC - Measuring impact and reporting progress
teissTalk: 2021 threat trends: Ransomware
teissTalk: The CISO-Cyber Security vendor relationship
teissTalk: Passive, reactive and proactive threat management
teissTalk: Passwords and the future of authentication
teissTalk: Cybersecurity in the new era of 5G
teissTalk: Securing your organisation’s hybrid working environment
teissTalk: Cyber career paths – a way out of our skills shortage?
teissTalk: The future role of the CISO
teissTalk: Measuring your Organisation’s Cyber Resilience
teissTalk: Why do we still see email security as only a perimeter problem?
teissTalk: Security & Privacy by Design: Avoiding a “bolt-on” Approach
teissTalk: The Evolution of Cloud Security – Then, Now & to Come
teissTalk: 2021 cyber-crime trends: ransomware, BEC and social engineering
teissTalk: Removing your ‘cloak of complexity’ in quantifying cyber risk
teissTalk: Have you got alert fatigue? Managing threat inflation in the pandemic and beyond
teissTalk: AI-led threat analysis – where do your humans fit in?
"People need to understand that there isn't an invisible force-field that's protecting them"
"Crisis or no crisis; security needs to be the same"
"We've seen a marked increase in social engineering attacks"
"The community needs to recognise and understand crime"
Are your new starters getting the security awareness training they need
Contact tracing apps - can a loss of privacy ever be temporary?
What’s at the root of most security breaches?
How to manage the supply chain during COVID-19
How should leadership respond during the COVID-19 crisis?
Feeling the stress of it all? How to look after yourself and others during COVID-19
COVID-19: What are the cyber security threats to your organisation?
Does it really matter if government has backdoors to our tech?
How can human error lead to a charity being scammed out of $1 million? Recorded live at #teissLondon2020
Building a positive and modern security culture’ with Michele Hanson, CISO at Micro Focus.
Is the ICO all carrot and no stick?
“Our industry needs critical thinkers” - Chris Hallenbeck, CISO Americas, Tanium
Cyber training: is trying to change people’s behaviours useless?
Can a CISO really make significant change to an organisation’s culture in just 18 months?
“We need to communicate the what and the why of security” – Tanium’s CISO, Chris Hodson
"Security should be a lifestyle choice for people these days" - Helen Rabe, CISO, Abcam
Should Microsoft 365 abandon most of its security tools? Thom Langford and Javvad Malik discuss.
Could deepfakes be good for cybersecurity?
How can we protect our children online?
Which cyber threats are going to impact the upcoming UK election?
What are the benefits of red teaming?
How can we grow the next generation of cyber talent?
Does culture really trump strategy?
Has Monzo perfected the art of responding to a data breach?
CISO at Levi Strauss & Co, Colin Anderson, on dealing with cyber security’s unknown unknowns
What can we learn from the way cybercriminals recruit and train people in their networks to help us?
Looking to invest in cyber start-ups? Listen to this.
The past, the present and the future with Paul Watts, CISO Domino’s Pizza Group PLC.
Why can’t we retain the cyber talent that we need?
Can we protect our National Critical Infrastructure from a major cyber-attack?
Up-skilling your cyber security workforce with Matt Lorentzen, Trustwave
Leadership, imposter syndrome and humour with Thom Langford
Spotting the Insider Threat with Lisa Forte
How are cyber criminals collaborating?
Can defenders trick their attackers?
How can CISOs be better leaders?
Is Huawei a security threat?
What can we learn from the way 'national security' government organisations buy security?
Can cyber security be creative?
What’s the big deal about zero trust?
Is it time for the cyber security industry to grow up?
Security training: should we give humans a break?
#Web30: Has the internet been a force for good?
Are CISOs suffering from an image crisis?
Cybercrime in the mobile space
Could #QueueForTheLoo solve our diversity problem?
The role of the threat hunter: what is it and why it matters
Are we investing too much in cyber security?
How is the Met tackling international cybercrime?
Is password security really that important?
Inside the mind of a hacker
Looking back at cyber security in 2018...and what's to come in 2019
“GDPR has empowered extortionists” – Tim Lambon, Director, Global Response Team, NYA
Cyber extortion: to pay or not to pay?
"It’s going wrong at the human level” - Martin Smith MBE on inspiring culture change
Tanium's CSO, David Damato, on how to stop your breach hitting the headlines
The hacker vs the defender and a paranoid future
Why geopolitics matter to our cyber security
What if Hitler had access to my Facebook data?
Getting more girls into Cyber Security with Sarah Atkinson, VP at CA Technologies
“A good conference is like a robust dinner party” – Freshfields CISO, Mark Walmsley, on getting the best value from conferences
Elections: manipulations, misinformation and misconceptions
“Cyber is a team sport, it’s not about the star player” – Chief Security Officer of Bacs and Faster Payments, Craig Rice, on cyber resiliency
Mental Health & Cyber Security: Do we have a problem?
Could veterans be the answer to the cyber skills shortage problem?
How to secure your supply chain
Summer Podcast 4! Is bitcoin the currency of our future?
Summer Special Podcast, Part III! Patching vulnerabilities: which should you prioritise?
Summer Special: Daniel Moscovici on the IoT
Summer Podcast Special: how can organisations leverage the power of AI?
Estonia's e-revolution
What’s the best way to respond to a data breach?
Women in Cyber Special
What is the greatest threat to the UK’s security?
“The internet is like a flower with teeth”; with Bridget Kenyon, Global CISO, Thales eSecurity
Can we ever reclaim our digital identities?
GDPR: Myths and Realities