teissPodcast - Cracking Cyber Security cover art

All Episodes

teissPodcast - Cracking Cyber Security — 302 episodes

#
Title
1

teissTalk: Scaling resilience across your cyber ecosystem

2

teissTalk: Securing your organisation in the age of GenAI

3

teissTalk: Geopolitics & Regulation - Reshaping the Energy Sector’s Supply Chain Risk

4

teissTalk: Cybersecurity as a business metric - giving your C-Suite the data to govern

5

teissTalk: Why your security team is burned out and what to do about it

6

teissTalk: Building a trusted security model for Generative and Agentic AI

7

teissTalk:The confidence gap - moving SMBs from reactive to proactive cyber security

8

teissTalk: Securing applications and infrastructure in the AI era

9

teissTalk: Silent Swipers - unmasking info-stealers in today's threat landscape

10

teissTalk: 2026 predictions for OT security and the future of cyber physical systems

11

teissTalk: 2026 threat trends - securing your organisation against next-gen cyber attacks

12

teissTalk: Shielding sensitive data from ransomware – staying ahead of evolving threats

13

teissTalk: Resilience as a business outcome

14

teissTalk: AI defence against offence - are you playing catch-up in the new security arms race?

15

teissTalk: Getting the board’s ‘aye’ on your cyber-security investments

16

teissTalk: Help your colleagues help you with an enhanced security awareness programme

17

teissTalk: From service desk to security risk - stopping social engineering at the source

18

Live at teissLondon2025: From gatekeeping to guardrails - proactive supply chain security at scale

19

teissTalk: Advancing compliance maturity in an age of DORA & NIS2

20

teissTalk: Refining your API security strategy to protect against AI-driven attacks

21

teissTalk: Building resilient infosec teams

22

teissTalk: Surviving a critical CVE - a high-impact playbook

23

teissTalk: Securing against AI-driven phishing attacks

24

teissTalk: Mitigating human cyber-risks with data and behavioural sciences

25

teissTalk: Navigating the rising legal threats to cyber-security leaders

26

teissTalk: Weak passwords – the hidden threat lurking in your organisation

27

teissTalk: DORA - A new law for a new dawn

28

teissTalk: Cyber-resilience – your last line of defence

29

teissTalk: Resilient by design – the next cyber-security imperative

30

teissTalk: Hacking security effectiveness - making sure your tools are working for you

31

teissTalk: Protecting critical services without disruption

32

teissTalk: Protecting critical services without disruption

33

teissTalk: Live at teissLondon2025 - Enhancing AppSec with Application Security Posture Management

34

teissTalk: Bolstering your defences against supply chain cyber-risk

35

teissTalk: Securing the human perimeter

36

teissTalk: Threat intelligence strategies to mitigate industrial-scale cyber-crime

37

teissTalk: The future of SecOps - why should leaders be optimistic?

38

teissTalk: The emerging 2025 threat landscape

39

teissTalk: Transforming your security operations to detect and respond to advanced attacks

40

teissTalk: Protecting your crown jewels as an SME without breaking the bank

41

teissTalk: Reducing your security debt in a GenAI-driven world

42

teissTalk: Why just-in-time security is leaving you exposed

43

teissTalk: Why Zero Trust Network Access is not your silver bullet

44

teissTalk: Better security awareness training with AI

45

teissTalk: Confronting cyber-criminals-strategies for cyber-hygiene

46

teissTalk: Mitigating third-party risk with threat intelligence

47

teissTalk: A playbook for new CISOs - learnings from years in the trenches

48

teissTalk: Eliminating blind spots within your cyber security environment

49

teissTalk: Protecting your C-Suite's private lives to protect the enterprise

50

teissTalk: Securing your sensitive data from exfiltration

51

teissTalk: Fortifying your cyber defenses as a mid-sized organisation

52

teissTalk: Maintaining your credibility as a security advisor

53

teissTalk: Is privacy the source of your failing security?

54

teissTalk: Selling infosec as a business enabler

55

teissTalk: How AI can improve your security and compliance programmes

56

teissTalk: Where AI-driven threat detection can streamline your SOC

57

teissTalk: Assessing and mitigating risks in your OT environment

58

teissTalk: Is your organisation prepared for NIS2?

59

teissTalk: Is your organisation cyber resilient?

60

teissTalk: Can AI mitigate your supply chain cyber-risks?

61

teissTalk: Phishing simulations – should you bother?

62

teissTalk: Is your cyber security approach leaving neurodiverse colleagues behind?

63

teissTalk: Can internal audit boost your cyber security readiness?

64

teissTalk: ROI from your SOC - measuring impact and reporting progress

65

teissTalk: Improving your cyber resilience with threat intelligence

66

teissTalk: Embracing AI tools across your organisation - ensuring you remain secure

67

teissTalk: Securing your Industrial IoT

68

teissTalk: Helping colleagues recognise and learn from their risky behaviour

69

teissTalk: Building a more inclusive cybersecurity team

70

teissTalk: Why your non-cyber colleagues aren't listening to you

71

teissTalk: Building truly diverse teams

72

teissTalk: The liability of the CISO - a legal briefing

73

teissTalk: How much will your next breach cost?

74

teissTalk: Mitigating the cyber risks in your digital supply chain

75

teissTalk: Creating a security-conscious culture

76

teissTalk: How do you demonstrate effective cyber resilience to the board?

77

teissTalk: Building an effective infosec strategy for critical Nth-party suppliers

78

teissTalk: Leveraging AI to monitor, analyse and respond to threats

79

teissTalk: Are you ready to respond to a ransomware attack?

80

teissTalk: Where is your next negligent insider, and what risk do they pose?

81

teissTalk: Are infosec leaders emotionally literate enough?

82

teissTalk: The evolving role of identity in cyber security

83

teissTalk: Detecting imposters and rogue insiders in SaaS applications

84

teissTalk: Delivering measurable cyber risk reduction

85

teissTalk: Protecting yourself and your infosec colleagues

86

teissTalk: Building competitive advantage with diverse infosec teams

87

teissTalk: Bridging your cyber skills gap - training and retaining talent

88

teissTalk: Control in the cloud - are your data transfers secure?

89

teissTalk: How to answer when your board asks, “Are we secure?”

90

teissTalk: Cyber insurance - living with spiralling costs and reduced coverage

91

teissTalk: Where are your email risk blind spots?

92

teissTalk: Overcoming your internal cultural AppSec challenges

93

teissTalk: Doing more with less - managing cyber risk in 2023

94

teissTalk: Security awareness programmes – starting from scratch

95

teissTalk: Threat trends in 2023 and beyond – how uncertain times affect cyber-risk

96

teissTalk: Ensuring your IP is safe from malicious activity and cyber-espionage

97

teissTalk: Infosec leaders' legal briefing - the liability of the CISO

98

teissTalk: Developing an intergenerational security awareness programme

99

teissTalk: Building an effective digital trust framework

100

teissTalk: Matching intelligence to defence improvements

101

teissTalk: Delivering enterprise-level security on an SME budget

102

teissTalk: Robot wars – using AI to combat the deepfake threat

103

teissTalk: Industry focus - how are FinTechs mitigating risk against the evolving cyber-threat landscape

104

teissTalk: What can the arms race with the attackers teach us?

105

teissTalk: How many cyber-attack playbooks do you actually need?

106

teissTalk: Industry focus - how the automotive industry is protecting itself from third party threats

107

teissTalk: Measuring behavioural change to reduce cyber risk

108

teissTalk: Swerving the big threats to your application security

109

teissTalk: Get smart - How top CISOs are leveraging the dark web to gather pre-attack intelligence

110

teissTalk: Leading incident response and crisis simulations

111

teissTalk: Managing your board during a significant cyber-incident

112

teissTalk: Industry focus - how healthcare institutions protect their data from cyber threats

113

teissTalk: Fostering an effective security culture

114

teissTalk: Industry focus - how aviation companies share cyber threat intelligence

115

teissTalk: Is your hybrid security awareness programme helping or harming your organisation?

116

teissTalk: Can security awareness keep up with the attackers?

117

teissTalk: Avoiding infosec blind spots and embracing diversity of thought

118

teissTalk: Malicious or non-malicious – tackling the remote insider threat

119

teissTalk: Industry focus - how educational institutions effectively navigate cyber threats

120

teissTalk: Using threat modelling to reduce the attack surface

121

teissTalk: Building an effective infosec strategy for critical third-party suppliers

122

teissTalk: The evolution of data protection in the cloud

123

teissTalk: Persuading the board to sign off on your cyber-security strategy

124

teissTalk: Redesigning your cyber-security recruitment strategy

125

teissTalk: Reducing your attack surface - Zero Trust and microsegmentation

126

teissTalk: Managing the human element in your incident response plan

127

teissTalk: Infosec leaders' legal briefing - international data transfers

128

teissTalk: Securely onboarding new suppliers

129

teissTalk: Reducing the cyber risk to your operational technology

130

teissTalk: How to hire, and keep, the cream of cyber-security talent

131

teissTalk: Securing your applications with Zero Trust architecture

132

teissTalk: Maximising the effectiveness of your incident response plan

133

teissTalk: Security assurance - identifying the gaps in your security controls

134

teissTalk: Demonstrating effectiveness in managing cyber risk

135

teissTalk: Measuring the effectiveness of your security awareness programme

136

teissTalk: Trusting security automation

137

teissTalk: Security as a business enabler

138

teissTalk: Leading your breach response

139

Strengthening your supply chain’s cyber-resilience

140

teissTalk: Designing threat resilient organisations

141

teissTalk: Stress-testing your security playbooks

142

teissTalk: A playbook for new CISOs

143

teissTalk: Identity-first security for humans and machines

144

teissTalk: Testing your EQ - using emotional intelligence to retain talent and reduce cyber risk

145

teissTalk: Risk-based versus compliance-based security programmes

146

Digital forensics and incident response in the cloud

147

Inside job - Investigating the malicious insider threat

148

Playing it safe - the gamification of security awareness training

149

Selling threat intelligence to the board

150

Negotiating a ransomware payment

151

Defining and assessing your cyber resilience

152

How effective is your security awareness programme?

153

Prioritising your security vulnerabilities and misconfigurations

154

Inclusive infosec leadership - developing a vision for your security function

155

Deploying AI in attack prevention and incident response

156

Maturing the CISO role

157

The Log4j marathon - where are we and what comes next?

158

Protecting your key people from their own mistakes

159

How resilient is your data?

160

Protecting your infosec colleagues during a crisis

161

Quantifying and qualifying the value of your data

162

teissTalk: Quantifying the value of your data

163

teissTalk: Next level cyber hygiene for SMEs

164

teissTalk: Zero Trust in your supply chain

165

teissTalk: Tracking your joiners, movers and leavers (JMLs) in the world of hybrid work

166

teissTalk: Getting the Board on board

167

teissTalk: Developing a people-centric security programme

168

teissTalk: Transferring risk – what should your cyber insurance cover?

169

teissTalk: Bridge builders – two new security roles that are your next essential appointments

170

teissTalk: Avoiding bias in infosec decision making

171

teissTalk: Threat reconnaissance in your supply chain

172

teissTalk: Threat trends - double extortion ransomware

173

teissTalk: Vendor diversity - onboarding and offboarding security vendors

174

teissTalk: Mapping AI to your security posture and avoiding overlooked threats

175

teissTalk: How do you define a cyber incident?

176

teissTalk: Threat intelligence gathering

177

teissTalk: Balancing endpoint security and productivity for your hybrid workforce

178

teissTalk: Reviewing the InfoSec legacy of your pandemic response

179

teissTalk: Identity Governance in a hybrid work world

180

teissTalk: Supply chain threats: Supplier assurance

181

teissTalk: Rethinking your approach to insider risk

182

teissTalk: Leading remote Incident Response and crisis simulation

183

teissTalk: How do you know if your SOC is relevant?

184

teissTalk: Building a security culture in a remote and hybrid working world

185

teissTalk: Leading a Zero Trust initiative that will outlive your tenure

186

teissTalk: Building a diverse InfoSec team and bringing value to the organisation

187

teissTalk: How effective is your security awareness programme?

188

teissTalk: Quantifying cyber risk at Board level

189

teissTalk: Provisioning passwordless authentication at scale

190

teissTalk: Managing the level of threat alerts

191

teissTalk: Threat intelligence sharing

192

teissTalk: Cyber resilience and business logic attacks

193

teissTalk: Developing an Incident Response playbook for critical 3rd party suppliers

194

teissTalk: Identifying and responding to credential theft

195

teissTalk: Shadow-IT – keeping security out of the way of productivity?

196

teissTalk: What should the CISO and Security function not own?

197

teissTalk: 3rd party risk management – vulnerability testing your suppliers

198

teissTalk: Can ethics guide the use of AI in cyber security?

199

teissTalk: Winning budget as a CISO for 2022 and beyond

200

teissTalk: Automating Incident Response for a hybrid workforce

201

teissTalk: Can security awareness keep up with the attackers?

202

teissTalk: Does cyber insurance incentivise ransomware?

203

teissTalk: International Transfers of Data – the InfoSec Leaders’ Briefing

204

teissTalk: Disposal and destruction of data and devices

205

teissTalk: ROI from your SOC - Measuring impact and reporting progress

206

teissTalk: 2021 threat trends: Ransomware

207

teissTalk: The CISO-Cyber Security vendor relationship

208

teissTalk: Passive, reactive and proactive threat management

209

teissTalk: Passwords and the future of authentication

210

teissTalk: Cybersecurity in the new era of 5G

211

teissTalk: Securing your organisation’s hybrid working environment

212

teissTalk: Cyber career paths – a way out of our skills shortage?

213

teissTalk: The future role of the CISO

214

teissTalk: Measuring your Organisation’s Cyber Resilience

215

teissTalk: Why do we still see email security as only a perimeter problem?

216

teissTalk: Security & Privacy by Design: Avoiding a “bolt-on” Approach

217

teissTalk: The Evolution of Cloud Security – Then, Now & to Come

218

teissTalk: 2021 cyber-crime trends: ransomware, BEC and social engineering

219

teissTalk: Removing your ‘cloak of complexity’ in quantifying cyber risk

220

teissTalk: Have you got alert fatigue? Managing threat inflation in the pandemic and beyond

221

teissTalk: AI-led threat analysis – where do your humans fit in?

222

"People need to understand that there isn't an invisible force-field that's protecting them"

223

"Crisis or no crisis; security needs to be the same"

224

"We've seen a marked increase in social engineering attacks"

225

"The community needs to recognise and understand crime"

226

Are your new starters getting the security awareness training they need

227

Contact tracing apps - can a loss of privacy ever be temporary?

228

What’s at the root of most security breaches?

229

How to manage the supply chain during COVID-19

230

How should leadership respond during the COVID-19 crisis?

231

Feeling the stress of it all? How to look after yourself and others during COVID-19

232

COVID-19: What are the cyber security threats to your organisation?

233

Does it really matter if government has backdoors to our tech?

234

How can human error lead to a charity being scammed out of $1 million? Recorded live at #teissLondon2020

235

Building a positive and modern security culture’ with Michele Hanson, CISO at Micro Focus.

236

Is the ICO all carrot and no stick?

237

“Our industry needs critical thinkers” - Chris Hallenbeck, CISO Americas, Tanium

238

Cyber training: is trying to change people’s behaviours useless?

239

Can a CISO really make significant change to an organisation’s culture in just 18 months?

240

“We need to communicate the what and the why of security” – Tanium’s CISO, Chris Hodson

241

"Security should be a lifestyle choice for people these days" - Helen Rabe, CISO, Abcam

242

Should Microsoft 365 abandon most of its security tools? Thom Langford and Javvad Malik discuss.

243

Could deepfakes be good for cybersecurity?

244

How can we protect our children online?

245

Which cyber threats are going to impact the upcoming UK election?

246

What are the benefits of red teaming?

247

How can we grow the next generation of cyber talent?

248

Does culture really trump strategy?

249

Has Monzo perfected the art of responding to a data breach?

250

CISO at Levi Strauss & Co, Colin Anderson, on dealing with cyber security’s unknown unknowns

251

What can we learn from the way cybercriminals recruit and train people in their networks to help us?

252

Looking to invest in cyber start-ups? Listen to this.

253

The past, the present and the future with Paul Watts, CISO Domino’s Pizza Group PLC.

254

Why can’t we retain the cyber talent that we need?

255

Can we protect our National Critical Infrastructure from a major cyber-attack?

256

Up-skilling your cyber security workforce with Matt Lorentzen, Trustwave

257

Leadership, imposter syndrome and humour with Thom Langford

258

Spotting the Insider Threat with Lisa Forte

259

How are cyber criminals collaborating?

260

Can defenders trick their attackers?

261

How can CISOs be better leaders?

262

Is Huawei a security threat?

263

What can we learn from the way 'national security' government organisations buy security?

264

Can cyber security be creative?

265

What’s the big deal about zero trust?

266

Is it time for the cyber security industry to grow up?

267

Security training: should we give humans a break?

268

#Web30: Has the internet been a force for good?

269

Are CISOs suffering from an image crisis?

270

Cybercrime in the mobile space

271

Could #QueueForTheLoo solve our diversity problem?

272

The role of the threat hunter: what is it and why it matters

273

Are we investing too much in cyber security?

274

How is the Met tackling international cybercrime?

275

Is password security really that important?

276

Inside the mind of a hacker

277

Looking back at cyber security in 2018...and what's to come in 2019

278

“GDPR has empowered extortionists” – Tim Lambon, Director, Global Response Team, NYA

279

Cyber extortion: to pay or not to pay?

280

"It’s going wrong at the human level” - Martin Smith MBE on inspiring culture change

281

Tanium's CSO, David Damato, on how to stop your breach hitting the headlines

282

The hacker vs the defender and a paranoid future

283

Why geopolitics matter to our cyber security

284

What if Hitler had access to my Facebook data?

285

Getting more girls into Cyber Security with Sarah Atkinson, VP at CA Technologies

286

“A good conference is like a robust dinner party” – Freshfields CISO, Mark Walmsley, on getting the best value from conferences

287

Elections: manipulations, misinformation and misconceptions

288

“Cyber is a team sport, it’s not about the star player” – Chief Security Officer of Bacs and Faster Payments, Craig Rice, on cyber resiliency

289

Mental Health & Cyber Security: Do we have a problem?

290

Could veterans be the answer to the cyber skills shortage problem?

291

How to secure your supply chain

292

Summer Podcast 4! Is bitcoin the currency of our future?

293

Summer Special Podcast, Part III! Patching vulnerabilities: which should you prioritise?

294

Summer Special: Daniel Moscovici on the IoT

295

Summer Podcast Special: how can organisations leverage the power of AI?

296

Estonia's e-revolution

297

What’s the best way to respond to a data breach?

298

Women in Cyber Special

299

What is the greatest threat to the UK’s security?

300

“The internet is like a flower with teeth”; with Bridget Kenyon, Global CISO, Thales eSecurity

301

Can we ever reclaim our digital identities?

302

GDPR: Myths and Realities