The Cracking Cyber Security podcast from TEISS is dedicated to cracking cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
Reducing personal risk with your organisation's liability insurance Understanding the evolving risk landscape through recent case studies Creating a workplace ethos of shared accountability This episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Michela Resta, Solicitor, CYXCELhttps://www.linkedin.com/in/michelarestacyxcel/Kelly Hagedorn, Partner, ALSTON & BIRDhttps://www.linkedin.com/in/kellyhagedorn/
Trends in the current credential theft landscape and changing compliance standardsStrategies to reduce password risk - continuous scanning, enforced policies and exclusion dictionariesEncouraging users to create strong, securely stored passwords without reuseThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Shannon Muller, Cyber security Specialist, Microsofthttps://www.linkedin.com/in/shannon-muller/Jay Vinda, Cyber Risk Engineering and Emerging Solutions Lead, Mosaic Insurance https://www.linkedin.com/in/jayvindaDarren James, Senior Product Manager, Specopshttps://www.linkedin.com/in/darren-james-91055310
What DORA is specifically asking of organisationsWhere the likely CTI gaps are when attempting to align with DORAWhy innovation is key to aligning your CTI capabilitiesThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Benoit Heynderickx, Principal Analyst, Information Security Forum (ISF)https://www.linkedin.com/in/benoithey/Tim Parker, Chair, South West Cyber Security Clusterhttps://www.linkedin.com/in/tim-parkerLewis Henderson, Director - Product Marketing, Team Cymruhttps://www.linkedin.com/in/lewishenderson/
Preparing for ransomware - where is your data and how is it protected? Building cyber resilience for your data, across on-premises and cloud Reducing the window of damage and minimising the time to recover This episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Heather Lowrie, Independent Advisor, Earthgard Ltdhttps://www.linkedin.com/in/heather-lowrie/Raza Sadiq, Head of Enterprise Risk, MQubehttps://www.linkedin.com/in/razasadiq7/Sandra Bell, Group Head of Organisational Resilience, Novunahttps://www.linkedin.com/in/sandra-bell-13a109183/Grant Caley, UK & Ireland Solutions Director, NetApphttps://www.linkedin.com/in/grant-caley-a424681/
Identifying and removing barriers to cyber resilienceReducing complexity - consolidating and eliminating legacy systemsBuilding a cyber-resilient organisation - moving from a reactive to a proactive model This episode is hosted by Thom Langford:https://www.linkedin.com/in/jonathanbcraven/Heather Lowrie, Independent Advisor, Earthgard Ltdhttps://www.linkedin.com/in/heather-lowrie/Sasha Henry, Cyber Strategy & Resilience Advisor, Confidentialhttps://www.linkedin.com/in/alexandra-pavelovna-henry-32b98465/James Tucker, Head of CISO, International, Zscalerhttps://www.linkedin.com/in/jamesjtucker/
Where metrics and evaluations fall short in measuring holistic security effectiveness Identifying gaps between tools and determining which gaps you need to fill Showing the board and the business that cyber-security is moving the needle on resilience This episode is hosted by Jonathan Craven:https://www.linkedin.com/in/jonathanbcraven/Richard Absalom, Principal Research Analyst, Information Security Forum (ISF)https://uk.linkedin.com/in/richard-absalom-48879116Edward Starkie, Director, GRC | Cyber Risk, Thomas Murrayhttps://www.linkedin.com/in/edward-starkie-56712431/Emanuel Salmona, Co-Founder and CEO, Nagomi Securityhttps://www.linkedin.com/in/emanuelsalmona/
How cyber-attackers are using GenAI to evade detection by security systemsSafeguarding against sophisticated ransomware attacks with robust security measuresTop tactics for stopping ransomware attacks before they cause damageThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/John Heaton-Armstrong, Experienced Cyber security Leader, Confidentialhttps://www.linkedin.com/in/johnheatonarmstrong/Edewede Oriwoh, Group IT and Cybersecurity Manager, Zigup Plchttps://www.linkedin.com/in/edewedeoriwoh/Seamus Lennon, VP of Operations, ThreatLocker https://www.linkedin.com/in/seamus-lennon-41423886
Whether compliance-as-security in CNI offers security or false confidenceNavigating tool and dashboard complexity to avoid CNI cyber blind spots Attracting cyber talent into CNI and away from finance and tech This episode is hosted by Jonathan Craven:https://www.linkedin.com/in/thomlangford/Sofia Martinez Gomez, VP, Risk & Tech Practice - Cybersecurity, Privacy & Compliance, AlixPartnershttps://www.linkedin.com/in/sofia-martinez-gomez-8b5534136/?locale=en_US Monika Atanasova, Global Head of Third Party Risk Management, Raiffeisen Gruppehttps://www.linkedin.com/in/monika-atanasova-746633b7/?originalSubdomain=chDeryck Mitchelson, Global CISO, Check Point Software Technologieshttps://www.linkedin.com/in/deryckmitchelson
Fortifying security defences with automated root cause analysis and prioritisationManaging security risk urgency across your application pipeline with real-time visibility and data visualisation capabilitiesDriving efficiency and prioritisation across your security ecosystem with practical remediation actionsThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/John Heaton-Armstrong, Experienced Cyber security Leader, Confidentialhttps://www.linkedin.com/in/johnheatonarmstrong/Danny Dresner, Professor of Cyber security, The University of Manchesterhttps://www.linkedin.com/in/danny-dresner-fciis-6382381/Tiago Rosado, Chief Information Security Officer, Asitehttps://www.linkedin.com/in/tiagorosado/Derek Maki, VP Product Management, Veracodehttps://www.linkedin.com/in/derekmaki/
What's making supply chain risk the fastest-growing cyber-risk categoryHow to galvanise your internal and external peers to develop a shared responsibility for supply chain cyber-risksDesigning and implementing effective key controls to mitigate supply chain cyber-risks This episode is hosted by Jonathan Craven:https://www.linkedin.com/in/jonathanbcraven/Mike Johnson, Global Cyber Threat & Incident Response Manager, Verifonehttps://www.linkedin.com/in/mike---johnson/Jean Carlos, Group Head of Cyber Architecture & Engineering, TP ICAP https://www.linkedin.com/in/jeanpc/Richard Marcus, CISO, AuditBoardhttps://www.linkedin.com/in/richard-marcus-b3192261/
How the human risk surface area has broadened with GenAI and collaboration tools Prevent breaches by applying the cyber kill chain to human vulnerabilities Strategies to protect employees without compromising productivity This episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Daniela Almeida Lourenco, Chief Information Security Officer, Dutch Financial Serviceshttps://www.linkedin.com/in/daniela-almeida-lourenco/Rebecca Stephenson, Specialist Lead Lecturer, Highlands College https://www.linkedin.com/in/creative-minds-in-cyber/Frederick Coulton, Director of UX, CultureAIhttps://www.linkedin.com/in/frederickcoulton
How cyber-crime continues to evolve and what this means for enterprise threat intelligence strategiesEvaluating sources and deciding which characteristics are most relevantHow DNS-based threat intelligence versus a malware-centric approach disrupts industrialised cyber-crimeThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Todd Wade, Chief Information Security Officerhttps://www.linkedin.com/in/twade/Matt Hardy, Senior Information Security Executivehttps://www.linkedin.com/in/matthardy67/Craig Sanderson, Principal Cybersecurity Strategist, Infobloxhttps://www.linkedin.com/in/craigsanderson1
Automating SecOps processes and procedures - free your people, improve retention and increase productivityWhere creativity and diversity is keeping your SecOps one step ahead of the attackersMatching your effectiveness to organisational objectives - aligning your internal SOC metrics with those required by the boardThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Prince Adu, Board Member - ISACA Accra Chapter, ISACAhttps://www.linkedin.com/in/prince-adu-ccsp-cisa-crisc-3759a520/Garrett Smiley, Chief of Staff to CDIO / Vice President of Digital Infrastructure and Technology Strategy, Maximushttps://www.linkedin.com/in/garrettsmiley/Matt Muller, Field CISO, Tines https://www.linkedin.com/in/matthewrmuller/
How evolving methods of work are expanding the attack surfaceGrowth of supply chain attacks targeting devices touching sensitive dataIncreased nation-state targeting of Critical National InfrastructureThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Richard Absalom, Principal Research Analyst, Information Security Forum (ISF)https://uk.linkedin.com/in/richard-absalom-48879116Tom O'Driscoll, Head of Security Strategy and Intelligence, National Highwayshttps://www.linkedin.com/in/odte/Michael Covington, Vice President, Portfolio Strategy, Jamfhttps://www.linkedin.com/in/michaelcovington/
Diverse threat vectors and complex attacks - how to expand your detection and response programmesHelping your SOC analysts achieve more - finding the right combination of internal ML/AI tools and external providersPathways to accelerate your SOC development to detect and mitigate attacks earlier This episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Mike Johnson, Global Cyber Threat & Incident Response Manager, Verifonehttps://www.linkedin.com/in/mike---johnson/Alan Jenkins, CISO Team lead, Saepiohttps://www.linkedin.com/in/alanjenkins/Josh Davies, Principal Technical Manager, Fortrahttps://www.linkedin.com/in/jdgwilym/
Identifying which data assets to prioritise Building an enterprise-level cyber-security profile on a budget Strengthening your cyber-resilience with incident response playbooks This episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Steven Furnell, Professor of Cyber Security, University of Nottinghamhttps://www.linkedin.com/in/stevenfurnell/Jean Carlos, VP of Information Security, AutogenAIhttps://www.linkedin.com/in/jeanpc/Stephanie Lynch-Ozanar, Education and Awareness Specialist, Co-Ophttps://www.linkedin.com/in/stephlynchozanarKev Eley, VP of UKI, Exabeamhttps://www.linkedin.com/in/keveley/
Minimising the risks to your security posture from developers' reliance on GenAIUsing AI to speed up remediation and avoid security becoming the bottleneckSteps to ensure safe and secure implementation of GenAI in software developmentThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Lee Munson, Principal Research Analyst, Information Security Forumhttps://www.linkedin.com/in/lmunson/Zia Ush Shamszaman, Senior Lecturer , Computer Science, Teesside Universityhttps://www.linkedin.com/in/zia-ush-shamszamanJohn Smith, EMEA CTO, Veracodehttps://www.linkedin.com/in/jtsmith123
Why the traditional malware-centric approach to security doesn't enable proactive protectionPre-empting and protecting attacks before they are launched - looking at the threat actors attack infrastructureEmergent domains, what are they and why they need a layered detectionThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/John Rouffas, Cyber Security Executive, Author & Journalist, CyberEdBoard Communityhttps://www.linkedin.com/in/drjohnrouffas/Francis Annandale, Managing Consultant, CyXcelhttps://www.linkedin.com/in/francis-annandale-98222186/Craig Sanderson, Principal Cybersecurity Strategist, Infobloxhttps://www.linkedin.com/in/craigsanderson1/
Where does Zero Trust fall short, and why these failings encourage cyber-crimeExpanding Zero Trust to protect the data itselfIdentifying, classifying, and securing sensitive data through automationThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Jean Carlos, VP Cyber Security, BOXThttps://www.linkedin.com/in/jeanpc/Sasha Henry, Senior Managing Consultant, Cyxcelhttps://www.linkedin.com/in/alexandra-pavelovna-henry-32b98465/?originalSubdomain=ukKarim Eldefrawy, CTO and Cofounder, Confidencialhttps://www.linkedin.com/in/karim-eldefrawy-b706b53/
Leveraging behavioural AI to mitigate the risk of phishing attacks Fortifying your defenses against the next wave of phishing threats Practical strategies for empowering colleagues while strengthening your cyber resilience This episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Rebecca Stephenson, Specialist Lead Lecturer in Digital Pedagogy, Government of Jerseyhttps://www.linkedin.com/in/creative-minds-in-cyber/Ben Wynn-Jones, Information Awareness Lead, Canon EMEA https://www.linkedin.com/in/ben-wynn-jones/
Meeting your operational and legal obligations - getting your foundations in orderCyber-proofing your organisation with comprehensive cyber-security training and awarenessDeveloping cyber-hygiene to defend against cyber-criminals using emerging technologyThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Paul Holland, Head of Research, Information Security Forum (ISF)https://www.linkedin.com/in/paulinfosec/Penny Jackson, Director Strategy, Awareness & Engagement (Human Risk Management), Aristos Partnershiphttps://www.linkedin.com/in/pennykjackson/
A proactive approach to third-party risk - continuous monitoring of suppliersUsing threat intelligence to identify third-party riskEffectively working with partners to mitigate third-party security risksThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Chuck Brooks, Adjunct Professor, Georgetown Universityhttps://www.linkedin.com/in/chuckbrooks/Victoria van Roosmalen, CISO & CPO, Coostohttps://www.linkedin.com/in/victoriavanroosmalen/Stuart Frost, Head of Enterprise Security & RIsk Management, Department for Work & Pensionshttps://www.linkedin.com/in/stuart-frost-bem/Andy Grayland, CISO, Silobreakerhttps://www.linkedin.com/in/dr-andy-g-1b90b4150/
How the next generation of InfoSec leaders can better prepare themselves to navigate the threats of tomorrowIdentifying the quick wins and making the most of the finite time new CISOs have to get their message acrossPractical measures for reducing stress, burnout and frustration within InfoSec teams over the longer termThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Paul Watts, Distinguished Analyst, Information Security Forum (ISF)https://www.linkedin.com/in/paulewatts/Dr Andrea Cullen, Co Founder/Co CEO, CAPSLOCKhttps://www.linkedin.com/in/dr-andrea-cullen/
Gaining comprehensive visibility across your hybrid and multi-cloud environmentsMitigating hidden threats and vulnerabilities beyond your endpoints and network parametersMaximising your cyber security investments with better visibility and optimised tool performanceThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Dr Edewede Oriwoh, Group IT Information and Cyber Security Manager, Zigup Plchttps://www.linkedin.com/in/edewedeoriwoh/Lessie Skiba, Global Director of Outreach and Partner Engagement, Cyber Readiness Institutehttps://www.linkedin.com/in/lessie-skiba-2b7460bb/Mark Jow, EMEA Tech Lead & Evangelist, Gigamonhttps://www.linkedin.com/in/mark-jow-4766797
Threat trends - how threat actors are targeting C-Suite executives to access the enterpriseEmpowering your C-Suite to identify and avoid social engineeringCreating social media policies that your C-Suite understand so that they can lead by exampleThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Thomas Wendrich, Associate Partner, IBMhttps://www.linkedin.com/in/thomas-wendrich-5470672Jacqueline Hanson-Kotei, Senior Manager, Enterprise Information Security & Governance, MTN Ghanahttps://www.linkedin.com/in/jacqueihk/Torsten Wiedemeyer, VP Europe, Cyblehttps://www.linkedin.com/in/wiedemeyer
Protecting your endpoints - how do cybercriminals exfiltrate data, and what trends are we seeing?Mitigating the financial, legal, and reputational risks with a comprehensive data strategyLeveraging next-generation technology to rapidly detect and respond to data exfiltrating ransomware attacksThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Neil Hare-Brown, CEO, STORM Guidancehttps://www.linkedin.com/in/neilhbPrince Adu, Board Member - ISACA Accra Chapter, ISACAhttps://www.linkedin.com/in/prince-adu-ccsp-cisa-crisc-3759a520/Darren Williams, CEO, BlackFoghttps://www.linkedin.com/in/darrenwwilliams/
How you can reduce data loss resulting from user error, disgruntled employees, or cyber attacksLeveraging existing and emerging technologies to enhance your preparedness against the latest attack vectors and threat actorsInvesting in autonomous and integrated security platforms without breaking the bankThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Dhruva Pudel, Head of Cyber security, Skillcast Group plchttps://www.linkedin.com/in/dhruv-cyber/Kai Michael Hermsen, Managing Board Member and Secretary, Twinds Foundationhttps://www.linkedin.com/in/kaihermsen/Charlie Milton, VP Strategic Alliances, Censornethttps://www.linkedin.com/in/charliemilton/
Building rapport with the board through persuasive communication skillsLeveraging your influence to drive business change and manage cyber risksMeasuring the impact of your actions and adviceThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/ Alan Jenkins, Principal Consultant, Cyber Security Navigator Ltdhttps://www.linkedin.com/in/alanjenkins/Graydon McKee, Senior Director Cybersecurity Engineering, Visahttps://www.linkedin.com/in/graydon-mckee/Laurie Gibbett, Cyber Risk Quantification Manager, KPMGhttps://www.linkedin.com/in/lauriegibbett/
The privacy challenges of using the network as your fundemental point of defenceWhether InfoSec leaders can ever get full network visibilitySetting privacy controls to reduce vulnerabilities and blindspots within your networkThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Tom Ellis-Aziz, Associate Director, Control Riskshttps://www.linkedin.com/in/tomasellis-aziz/Raul Zeppenfeldt, Principal Consultant, PA Consultinghttps://www.linkedin.com/in/raul-z-91198b2b/aJamie Moles, Senior Technical Marketing Manager, ExtraHophttps://www.linkedin.com/in/jamiemoles
Proving that your infosec strategy delivers a competitive advantageManaging the risks and costs of a business-enabling infosec teamBalancing business objectives with infosec needs to deliver security and growthThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Alan Jenkins, Principal Consultant, Cyber Security Navigator Ltdhttps://www.linkedin.com/in/alanjenkins/Garrett Smiley, Adjunct Dissertation Chair / Distinguished Core Part-Time Professor, National Universityhttps://www.linkedin.com/in/garrettsmiley/Dom Lucas, Head of Security, British International Investmenthttps://www.linkedin.com/in/dom-lucas-mciis-msyl-30223528/
How infosec leaders can support product teams incorporating generative AIUsing AI to improve compliance processes and ongoing vulnerability monitoringMitigating and minimising AI-based information security risks with ISO 42001This episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Dean Sapp, SVP, Information Security, Privacy, Risk and Compliance (DPO), Filevinehttps://www.linkedin.com/in/deansapp/Jonathan Craven, Privacy and Compliance Lead, UK, iRhythm Technologies UKhttps://www.linkedin.com/in/jonathanbcraven/Herman Errico, Head of Security Program Management, Vantahttps://www.linkedin.com/in/hermanerrico
Closing the cybersecurity gap - acting fast against critical threatsAligning to current compliance standards without the heavy-liftingLeveraging AI-powered tools to maximise your security investmentsThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Mike Johnson, Global Cyber Threat & Incident Response Manager, Verifonehttps://www.linkedin.com/in/mike---johnson/Matt Hardy, Head of Security, Liberishttps://www.linkedin.com/in/matthardy67/Kiarash Kia, Founder, Stealth Startuphttps://www.linkedin.com/in/kiarashkia/Dan Crossley, Director, Security Engineering, Vectra.aihttps://www.linkedin.com/in/crossleydaniel
Ensuring your risk management framework meets your organisation's needsRansomware, legacy devices and remote access - risk trends for OTWhy you should prioritise risks based on the likelihood of exploitation as well as impactThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Syed Ubaid Ali Jafri, Head of Cyber Defence & Offensive Security, HBL - Habib Bank Limitedhttps://www.linkedin.com/in/ubaidjafriGiles Dunn, Partner & OT Cyber Security leader, EYhttps://www.linkedin.com/in/giles-dunn-6485a2117/Amir Preminger, VP Research, Clarotyhttps://www.linkedin.com/in/amir-preminger-207a0553/Max Higginson, Cyber Security Manager (ICS/OT), Dominos UKhttps://www.linkedin.com/in/max-higginson/
How does NIS2 address risks within critical supply chains and information sharing across borders?Maintaining a proactive stance against evolving threats - how continuous improvement complies with NIS2Ensuring timely compliance - meeting the new requirements in risk assessment and avoiding penaltiesThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Jay Moloo, Corporate Information Security Officer, DB Schenkerhttps://www.linkedin.com/in/jaymoloo/Lee Elliott, Director, Solutions Engineering, BeyondTrusthttps://www.linkedin.com/in/lee-elliott/
Selecting metrics that best convey the impacts and risks of your strategy to the boardHow the changing threat landscape will affect your cyber resilienceThe role cyber insurance plays as a component of your resilience strategyThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Daniel G. Dresner, Professor of Cybersecurity, University of Manchesterhttps://www.linkedin.com/in/danny-dresner-fciis-6382381Mike Yeomans, Manager, Cyber Risk Quantification Service Delivery Lead, KPMGhttps://www.linkedin.com/in/mike-y-46129467/Sam Woodcock, Senior Director - Cloud Strategy, 11:11 Systemshttps://www.linkedin.com/in/samuel-woodcock-9745b831/
Why sharing data means better decisions across your supply chain networkWhere AI-powered tools can support continuous monitoring and analysisPredicting cyber-risks with AI-driven analyticsThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Edd Hardy, Director Cyber and Risk, AlixPartnershttps://www.linkedin.com/in/eddhardy/Jean Carlos, VP of Information Security, AutogenAIhttps://www.linkedin.com/in/jeanpc/
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalkThe panel discussion is titled:teissTalk: Phishing simulations – should you bother?Why phishing simulations can be more trouble than they're worth, and how you can lead the changeChanges can you deploy to increase staff diligence and keep security front and centreHow phishing simulations can match the latest threat trendsThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Paul W., Distinguished Analyst, Information Security Forum (ISF)https://www.linkedin.com/in/paulewatts/Andrew Rose, Board Advisor - Cyber Security, Mencaphttps://www.linkedin.com/in/andrewrose1/Ben Wynn-Jones, Information Awareness Lead, Canon EMEAhttps://www.linkedin.com/in/ben-wynn-jones/
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalkThe panel discussion is titled:teissTalk: Is your cyber security approach leaving neurodiverse colleagues behind?Ensuring your digital tools and platforms are accessible to people with neurodiverse traitsImplementing security measures that protect neurodiverse users from active cyber-threatsPromoting an inclusive approach to cyber-security across the organisationThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Holly Foxcroft, NeuroDiversity Consultanthttps://www.linkedin.com/in/hollyfoxcroft/Rebecca Massey, Security Awareness Specialist, Pinsent Masons LLPhttps://www.linkedin.com/in/creative-minds-in-cyber/
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalkThe panel discussion is titled:teissTalk: Can internal audit boost your cyber security readiness?Getting an internal second opinion to help identify your cyber-security weaknessesAuditing your controls, policies and procedures to address those cyber-security weaknessesUsing language everyone can understand to communicate cyber riskThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Veselin Monev, Information Security Officer, Pilatus Aircraft Ltdhttps://www.linkedin.com/in/vmonev/Daniel G. Dresner, Professor of Cybersecurity, University of Manchesterhttps://www.linkedin.com/in/danny-dresner-fciis-6382381/Deborah Haworth, Director of Information Security, Penguin Random Househttps://www.linkedin.com/in/deborah-haworth/
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalkThe panel discussion is titled:teissTalk: ROI from your SOC - measuring impact and reporting progressTools for measuring ROI for your SOC - where to look for the greatest impactWhat are the best capabilities and attributes for a high-perfoming SOC, and what change you should measureSpeaking the board's language - reporting the impact of spend and reduced cyber riskThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Vishal Sharma, BISO, CISO office, Santander UKhttps://www.linkedin.com/in/vishal-s-11ba15115/Minesh Dattani, Head of Cyber Security Operations, Simply Businesshttps://www.linkedin.com/in/minesh-dattani-023b3581/
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalkThe panel discussion is titled:teissTalk: Improving your cyber resilience with threat intelligenceHow the changing threat landscape could damage your cyber resilienceImplementing the latest threat intelligence to improve your cyber-resilienceSelling threat intelligence to the board – how to link spend to increased resilienceThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Sajan Gautam, Chief Information Security Officer, Arvest Bankhttps://www.linkedin.com/in/sajan-gautam-27a4125/Endré Walls, Member - Senior Council, OnConferenceshttps://www.linkedin.com/in/endrewalls/Jon Cosson, Head of IT & Chief Information Security Officer, JM Finnhttps://www.linkedin.com/in/jon-cosson/
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalkThe panel discussion is titled:teissTalk: Embracing AI tools across your organisation - ensuring you remain secureThe opportunities and risks widespread adoption of AI poses to your organisationHow infosec thinking can keep all departments safe as they adopt AI toolsBest practices for integrating AI tools across the organisationThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Eldar Lillevik, Partner - Cyber Security & Privacy, PwChttps://www.linkedin.com/in/eldarlillevik/Laiz Batista Tellefsen, Board Member, Den norske dataforening (DND)https://www.linkedin.com/in/laizbatista/Andres Andreu, SVP, CISO, 2Uhttps://www.linkedin.com/in/andresandreu/
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalkThe panel discussion is titled:teissTalk: Securing your Industrial IoTHow cyber-threat actors are exploiting Industrial IoT, and what the profile of a typical attack looks likeBest practices for managing and mitigating vulnerabilities affecting Industrial IoT assetsThe implications for the regulatory landscapeThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/John Opala, VP & Global Chief Information Security Officer, Hanesbrands Inc.https://www.linkedin.com/in/johnopalaphd/Grant Geyer, Chief Product Officer, Clarotyhttps://www.linkedin.com/in/grantgeyer/
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalkThe panel discussion is titled:teissTalk: Helping colleagues recognise and learn from their risky behaviourEnabling a "no-blame" culture where colleagues feel confident reporting their near missesUsing examples and anecdotes to help colleagues understand the operational risksLeading the culture change from "blame" to "no blame"This episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Keil Hubert, Associate Principal, Security Human Risk Management, OCChttps://www.linkedin.com/in/khubert/Rob Flanders, Head of Threat and Incident Response, BAE Systemshttps://www.linkedin.com/in/robert-flanders-31b01976/
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalkThe panel discussion is titled:teissTalk: Building a more inclusive cybersecurity teamAvoiding the one-size-fits-all approach to meeting people's neurodiversity needsRecognising burnout in your neurodiverse security analystsRemoving barriers to maximising performance with your neurodiverse colleaguesThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Lisa Ventura, Cyber Security Specialist & Founder, Cyber Security Unityhttps://www.linkedin.com/in/lisasventura/Sam Masiello, Chief Information Security Officer, The Anschutz Corporationhttps://www.linkedin.com/in/smasiello/
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalkThe panel discussion is titled:teissTalk: Why your non-cyber colleagues aren't listening to youHow to get your language right when translating the jargonMaking your training relevant and interestingHow to best use actual examples and active threats to make the risks resonateThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Lisa Ventura, Cyber Security Specialist & Founder, Cyber Security Unityhttps://www.linkedin.com/in/lisasventura/Dom Lucas, Head of Security, British International Investmenthttps://www.linkedin.com/in/dom-lucas-mciis-30223528/Dennis Leber, Director of Cyber Security, Honest Medical Grouphttps://www.linkedin.com/in/dennisleber/
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalkThe panel discussion is titled:teissTalk: Building truly diverse teamsWays to adapt your job adverts and interview techniques that will attract diverse candidatesHow to reduce qualification expectations to attract top talent from a range of different backgroundsFocusing on soft skills to support and grow diverse teamsThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Sophia Adhami, Director Cyber Security Awareness and Engagement, Sagehttps://www.linkedin.com/in/sophia-adhami-73538246/Joshua Copeland, Cybersecurity Director, AT&Thttps://www.linkedin.com/in/joshuacopeland/Albert F. Yonkovitz, Former Director Strategy, Policy and Plans, Retired Colonel U.S. Armyhttps://www.linkedin.com/in/albert-f-yonkovitz-jr/
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalkThe panel discussion is titled:teissTalk: The liability of the CISO - a legal briefingHow is personal liability changing, and how should CISOs protect themselves?What are the CISO's disclosure obligations and when to include them your incident response plan?Insuring a CISO - what are the legal implications and processes?This episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Joe Hancock, Partner (non-lawyer) & Head of MDR Cyber, Mishcon de Reya LLPhttps://www.linkedin.com/in/joehancock/Peter McLaughlin, Partner, Armstrong Teasdale LLPhttps://www.linkedin.com/in/petermclaughlin/J.J. Jones, Strategy Counsel & Advisor, Googlehttps://www.linkedin.com/in/jakarra-jones/
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalkThe panel discussion is titled:teissTalk: How much will your next breach cost?Which data do you need to estimate financial loss from a breach?Which risks should CISOs prioritise in a cyber security assessment?Demonstrating the impact of your cyber security spend on mitigating cyber risk This episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Tiago Rosado, Chief Information Security Officer, Confidential https://www.linkedin.com/in/tiagorosado/Paul Watts, Distinguished Analyst, Information Security Forumhttps://www.linkedin.com/in/paulewatts/Syed Ubaid Ali Jafri, Head of Cyber Defense & Offensive Security, Habib Bank Limited (HBL)https://www.linkedin.com/in/ubaidjafri/
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalkThe panel discussion is titled:teissTalk: Mitigating the cyber risks in your digital supply chaiWhy the standard prescriptions for addressing supplier risk are challenged when it comes to 4th, 5th and Nth partiesHow well are the regulatory/contractual routes helping organisations to secure their supply chains?What technological approaches can complement the traditional solutions to help you build cyber resilience across your supply chain ecosystem?This episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Andrea Szeiler-Zengo, Global Chief Information Security Officer, Transcomhttps://www.linkedin.com/in/andrea-szeiler-zengo-cissp/Abbas Ahmed, CISO/VP Technology, Qenta Inchttps://www.linkedin.com/in/abbasahmed/Dov Goldman, VP Risk Strategy, Panorayshttps://www.linkedin.com/in/dovgoldman/
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalkThe panel discussion is titled:teissTalk: Creating a security-conscious cultureAdapting security awareness to the way your colleagues see the online worldBenchmarking behaviour to get a true representation of cyber risk Ensuring your security awareness programme doesn't get in the way of colleagues' productivityThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Gry Evita Sivertsen, Cybersecurity Manager, PwChttps://www.linkedin.com/in/gry-evita-sivertsen-5b58a713a/Ishaaq Jacobs, Chief Cyber Security Officer, Sasolhttps://www.linkedin.com/in/ishaaq-jacobs/Penny Jackson, Security Awareness Lead, John Lewis & Partnershttps://www.linkedin.com/in/pennykjackson/