POPULARITY
Podcast: teissPodcast - Cracking Cyber Security (LS 31 · TOP 5% what is this?)Episode: teissTalk: Assessing and mitigating risks in your OT environmentPub date: 2024-03-29Ensuring your risk management framework meets your organisation's needsRansomware, legacy devices and remote access - risk trends for OTWhy you should prioritise risks based on the likelihood of exploitation as well as impactThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Syed Ubaid Ali Jafri, Head of Cyber Defence & Offensive Security, HBL - Habib Bank Limitedhttps://www.linkedin.com/in/ubaidjafriGiles Dunn, Partner & OT Cyber Security leader, EYhttps://www.linkedin.com/in/giles-dunn-6485a2117/Amir Preminger, VP Research, Clarotyhttps://www.linkedin.com/in/amir-preminger-207a0553/Max Higginson, Cyber Security Manager (ICS/OT), Dominos UKhttps://www.linkedin.com/in/max-higginson/The podcast and artwork embedded on this page are from TEISS, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: teissPodcast - Cracking Cyber Security (LS 31 · TOP 5% what is this?)Episode: teissTalk: Assessing and mitigating risks in your OT environmentPub date: 2024-03-29Ensuring your risk management framework meets your organisation's needsRansomware, legacy devices and remote access - risk trends for OTWhy you should prioritise risks based on the likelihood of exploitation as well as impactThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Syed Ubaid Ali Jafri, Head of Cyber Defence & Offensive Security, HBL - Habib Bank Limitedhttps://www.linkedin.com/in/ubaidjafriGiles Dunn, Partner & OT Cyber Security leader, EYhttps://www.linkedin.com/in/giles-dunn-6485a2117/Amir Preminger, VP Research, Clarotyhttps://www.linkedin.com/in/amir-preminger-207a0553/Max Higginson, Cyber Security Manager (ICS/OT), Dominos UKhttps://www.linkedin.com/in/max-higginson/The podcast and artwork embedded on this page are from TEISS, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Raamattutunti 13.03.2024: Lauri Lankinen & Petrus Leppänen
On aika käydä läpi Iltalehden suurta autokyselyä, kun autotoimittaja Arttu Toivonen ja Iltalehden autotoimituksen esihenkilö Mikko Räsänen käyvät kysymyksiä läpi ja kertovat omat näkemyksensä. Mukaan mahtuu monta kulmaa autoiluun - muun muassa se, mikä Suomen teissä on vialla, mikä auton hankintaan vaikuttaa ja mikä on ammattilaisen unelmien automerkki?
Podcast: teissPodcast - Cracking Cyber Security (LS 31 · TOP 5% what is this?)Episode: teissTalk: Securing your Industrial IoTPub date: 2023-11-16This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalkThe panel discussion is titled:teissTalk: Securing your Industrial IoTHow cyber-threat actors are exploiting Industrial IoT, and what the profile of a typical attack looks likeBest practices for managing and mitigating vulnerabilities affecting Industrial IoT assetsThe implications for the regulatory landscapeThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/John Opala, VP & Global Chief Information Security Officer, Hanesbrands Inc.https://www.linkedin.com/in/johnopalaphd/Grant Geyer, Chief Product Officer, Clarotyhttps://www.linkedin.com/in/grantgeyer/The podcast and artwork embedded on this page are from TEISS, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: teissPodcast - Cracking Cyber Security (LS 31 · TOP 5% what is this?)Episode: teissTalk: Securing your Industrial IoTPub date: 2023-11-16This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalkThe panel discussion is titled:teissTalk: Securing your Industrial IoTHow cyber-threat actors are exploiting Industrial IoT, and what the profile of a typical attack looks likeBest practices for managing and mitigating vulnerabilities affecting Industrial IoT assetsThe implications for the regulatory landscapeThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/John Opala, VP & Global Chief Information Security Officer, Hanesbrands Inc.https://www.linkedin.com/in/johnopalaphd/Grant Geyer, Chief Product Officer, Clarotyhttps://www.linkedin.com/in/grantgeyer/The podcast and artwork embedded on this page are from TEISS, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: teissPodcast - Cracking Cyber Security (LS 32 · TOP 5% what is this?)Episode: teissTalk: Reducing the cyber risk to your operational technologyPub date: 2022-07-29Translating IT security awareness training and priorities to OT colleaguesMitigating the risk of human threat or errors to your OT securitySecuring legacy equipment and reducing the risk of compromise: should legacy OT be kept separate from IT?The podcast and artwork embedded on this page are from TEISS, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Raamattutunti 01.06.2022: Petrus Leppänen
Dimanche 16 janvier 2022 Michel Gassier Michel a grandi dans le sud de la France au milieu des vignes familiales. Après un diplôme d'ingénieur agronome, il part aux Etats Unis pour occuper un poste d'attaché viticole à l'ambassade de France. En 1993, Michel revient en France pour rejoindre le Château de Nages, la ferme familiale de vignes et de vergers créée par son grand-père dans les années 40. La propriété se trouve aux Costières de Nîmes, l'appellation la plus méridionale de la Vallée du Rhône et en plein cœur d'une zone classée Natura 2000. Michel a transformé avec passion la ferme familiale d'un vigneron méconnu en un domaine bio premium. On trouve dans les parcelles de la Syrah, Grenache, Roussanne et Mourvèdre. En les cultivant en agriculture bio et avec une approche minimaliste dans la cave, Michel crée des vins équilibrés, frais et minérales. La biodiversité occupe une place importante sur le domaine avec des ruches d'abeilles, des nichoirs à oiseaux, des zones réservées aux fleurs sauvages. Jean Teissèdre C'est en 2011 que Jean s'installe sur le domaine familial après plusieurs expériences dans des domaines du Beaujolais et de Sancerre. Sa sœur, Sophie, le rejoint en 2015 avec son époux Jérôme. Ces trois passionnés du vin ont cette envie commune : partager leur terroir à travers leurs vins. Soucieux du respect de l'environnement, Jean cultive ses vignes en bio et biodynamie afin d'obtenir les raisins les plus sains possibles et le meilleur potentiel qualitatif. Jean va même au-delà des vins puisque depuis 2020, il transforme ses propres céréales sur le domaine et commercialise ses farines bio auprès des artisans boulangers locaux, magasins bio et directement au caveau. Le domaine des Bérioles bénéficie aussi d'un cadre exceptionnel par exemple avec son chai situé dans une ancienne bâtisse bourbonnaise, au pied d'une petite chapelle et traversée par le chemin de Saint-Jacques-de-Compostelle. Jean propose aussi une offre oenotouristique unique sur le vignoble de Saint-Pourçain. Il a notamment créé en 2018 les « Balades en Bérioles » avec 5 très belles routes oenotouristiques.
Kristuksen kuninkuuden juhla.
Introducing the audio edition of our teissTalk series. Each week we dive into the latest cyber security news with our expert panel and then deep dives into an issue that is vital to the cyber security industry. On this episode: Estimating financial loss from cyber breaches using the data you haveEffective upwards communication with credible measurements of cyber risk: Using the Board's language to show the impact of your cyber security spend on your organisation's cyber riskMaking prioritisation decisions from your quantified cyber risk - where to allocate your hard won resources and funding?HostJenny RadcliffeGuestsSteve Brown, Cyber Security Director, MastercardKen Munro, Partner, PenTest PartnersMichelle Griffey, Chief Risk Officer, Communisis----Attend a live teissTalk, for free, by visiting https://www.teiss.co.uk/talk/
Band 3 der Roman-Trilogie Großstadt-Oasen: Geheimbund, Rint, Teiss, Stollenbacken, Ausblick – ab Folge 57. In diesem wöchentlichen Podcast, einer Hörsendung des Hamburger Autors Ralf Plenz, erhält man einen Einblick in die Welt der Autoren, Lektoren, Gestalter, Büchermacher und Buchverkäufer. Zu Beginn wird jeweils ein Kapitel aus seiner Roman-Trilogie „Großstadt-Oasen“ gelesen, danach folgen aktuelle Erklärungen und Beispiele. Bleiben Sie unserem Podcast treu! www.input-verlag.de
What’s at the root of most security breaches? Is there a common theme? This week on the teisspodcast, Greg Van Der Gaast, Head of Information, University of Salford, discusses the basic common issues that go unnoticed by security departments which - more often than not - are the cause of major breaches. Greg explains how organisations can improve their security without spending huge sums of money, as well as why he refuses to use metrics with the board and why he feels CISOs need to embrace more “altruism” in their role as security leaders.
On this week’s podcast we speak with Chris Hodson, CISO for cyber security provider, Tanium.I met fellow Brit in Nashville, at the end of last year, at Tanium’s annual conference. Previously CISO at Zscaler, Chris is one of the movers and shakers of the industry – as well as his role at Tanium, Chris is a prolific writer and vlogger about all things security, and he's named as one of the 'Top 10 Cyber Risk Experts to Follow' by Vulcan Cyber. In between conference sessions, I sat with Chris to discuss his cyber security predictions for 2020, how he prevents self burnout, and how he goes about implementing a culture of security in the organisations he works with.Presenter: Anna DelaneyMusic: Light the Fuze, Audio Network
Podcast: teissPodcast - Cracking Cyber SecurityEpisode: Can we protect our National Critical Infrastructure from a major cyber-attack?Pub date: 2019-07-26Can you imagine a world where our water, energy and transport systems just stop working? How about our hospitals, telecoms and financial services? It’s a picture I struggle to visualise, and yet we are told that the risks to our national security have never been greater. So, how safe actually is our National Critical Infrastructure right now and are we able to protect ourselves? Questions we’ll be exploring on this episode of the Cracking Cyber Security Podcast. Tim Mackey, Principal Security Strategist at the Synopsys CyRC (Cybersecurity Research Centre) about the ominous potential of a cyber-attack on our National Critical Infrastructure. We discuss the threats, the problems and some possible solutions.The podcast and artwork embedded on this page are from TEISS, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
This week we are talking about leadership, imposter syndrome and humour with Thom Langford on the Cracking Cyber Security podcast. Founder of (TL)2 Security Ltd and former CISO at Publicis Groupe, Thom is a well-known figure in the security world, prolific public speaker and an active and engaging social media user – so to hear that he describes himself as “naturally shy” – came as a bit of a surprise. Thom speaks candidly about wrestling with imposter syndrome, using humour to his advantage and how public speaking has helped his confidence grow over the years.
How should organisations deal with the Insider Threat? Can you stop the insider before they cause harm? What are the red flags to look out for? This week on the Cracking Cyber Security Podcast we speak with Lisa Forte, cybersecurity expert and founder of Red Goat Cyber Security about the “Insider Threat”.Lisa began her career in maritime security before moving into counter-terrorism intelligence, and then later into one of the UK Police cyber-crime units where she got to know the attackers’ mindsets and methodologies well. She’s also a bit of a legend in the tech world, winning the “Top 100 Women In Tech” award last year. Lisa recently conducted some research on the Insider Threat and she shares some fascinating findings on the episode.
What can we learn from the way 'national security' government organisations think about and buy security? This week I’ll be speaking with ex-BAE Systems cyber security technical director and now co-founder of Garrison, Henry Harrison. He tells us what we can learn from government organisations in their approach to security and advises on the mind-set and strategies companies should adopt when buying security. Also, our podcast has been nominated for not just one but two awards at this year’s EU Security Blogger Awards…We are up for "Best New Cyber Security Podcast" and "Best Security Podcast"…We’d like to thank all of you for your support over the past year and we also ask that you go and vote for us! Cast your votes here: https://www.surveymonkey.com/r/eubloggerawards2019 (entries 1 and 5)
Are CISOs suffering from an image crisis? Do they need a rebranding of sorts? How can they be taken seriously by the board and be seen as part of business operations as opposed to purely an investment? With us to explore these questions is TEISS podcast regular Joe Carson, Chief Security Expert at Thycotic. He’ll explain why 2019 is the year of the CISO but also why CISOs need to do more listening than talking.
This week on the show we have ESET’S Malware Analyst and Researcher, Lukas Stefanko and Head of Automated Threat Detection and Artificial Intelligence, Juraj Jánošík. TEISS caught up with them at Mobile World Congress last month in Barcelona where we discussed the tactics criminals are employing to hack into mobile phones and how we can stay secure with the fast moving innovations in the mobile space.
On this week’s podcast TEISS speaks with Detective Superintendent Andrew Gould - Head of the Metropolitan Police Cyber Crime Unit about how the Met is tackling international cybercrime, how well nation states cooperate when it comes to tracking down the criminals and what he’s learned from previous work in counter terrorism that is helping in the plight to clamp down on cybercrime.
TEISS speaks with Tanium’s Chief Security Officer, David Damato, at CONVERGE18 in Washington DC. On the podcast, we explore how he thinks the cyber skills gap could be bridged, how WannaCry could have been avoided, lessons he’s learnt along his career path, as well as how to talk to the board effectively.New research from Tanium suggests that UK firms have a long way to go in building the business resilience required to withstand modern cyber threats and other major disruptions. Tanium's latest Business Resilience study reveals that 96% of business decision makers claim business resilience should be core to company strategy, however only 54% say that it definitely is…so why are they struggling to take action?
45% of businesses claim to have a shortage of cybersecurity skills and 67% of cybersecurity professionals say they’re too busy with their jobs to keep up with skills development and training. And yet there is an obvious and massively untapped resource – veterans – of which only 4% are working in tech and cyber. TEISS speaks with Peter Connolly, CEO of TechVets, on why veterans are the perfect candidates to solve the cyber security skills shortage problem.
As supply chains grow in size and complexity, so does the technology, data, transactions, users, and therefore the cyber security risk. According to the 2016 Security Breaches Survey, very few UK businesses set minimum security standards for their suppliers….So, how can organisations gain an improved awareness of supply chain security and how can they work better with their suppliers? TEISS talks with Martin Smith, MBE, Chairman and Founder of SASIG, The Security Awareness Special Interest Group, which aims to improve trust in the online environment.
This week TEISS talks crisis communications! What is the best way to plan a response to a data breach? What is the key to retaining customer loyalty? How do you strike the right tone and language? How can you use the media to your advantage? To tackle these questions, TEISS talks with Paul Murricane, Media Mentor, who relays his communications tips. Music: The Pain by Nick Homes (YouTube Channel: Jazz Duets)
On this week’s podcast, TEISS talks with Robert Hannigan, former head of GCHQ at the launch of the London Office for Rapid Cybersecurity Advancement (LORCA), an accelerator for cyber security start-ups, which was officially opened last week by Secretary of State for Digital, Culture, Media and Sport, Matt Hancock. Robert shares his thoughts on how the UK is currently faring when it comes to cyber security, what cyber protocols he’d like to see put in place, as well as why he won’t be racing back to Whitehall anytime soon. On this podcast we’ll be hearing from two of the start-ups included in the first LORCA cohort; B-Secur which specialises in using biometric heartbeat as an authentication solution and Zone Fox – an insider threat detection solution. More interviews with the other start-ups will be published soon.
“The internet is like a flower with teeth, it’s beautiful and ugly at the same time, it’s just like we are…” TEISS speaks with Bridget Kenyon, Global CISO at Thales eSecurity about the good, the bad and the ugly facets of the internet, how to reconcile the blurring of our private and public online lives with GDPR, as well as the challenges of diversity in AI. Please subscribe, rate and review our show and tweet us your questions @TeissNews! Music: The Pain by Nick Homes (YouTube Channel: Jazz Duets)
TEISS speaks with Julie Conroy, Research Director for Aite Group’s Retail Banking practice about "digital identity"...Can we reclaim our scattered digital footprint? How can we secure our online identities? How can we predict the future with digital identity? Listen to this podcast where Julie tackles these questions and more...! Music: The Pain, Nick Homes (check out Nick's YouTube channel Jazz Duets) https://www.youtube.com/channel/UCqimxUbWsE26KSpx2_OcmmA
Leaders Of Transformation | Leadership Development | Conscious Business | Global Transformation
Ashwin Krishnan is a technology expert with over two decades of experience in cybersecurity and cloud technologies. Formerly Senior Vice President of Products and Strategy at HyTrust, a late stage security startup, Ashwin is now a reformed high tech executive turned freelance Cyber Moralist and Tech Demystifier. He is the host of The Moral Compass Podcast, and a regular columnist for CSOOnline.com, ITSPMagazine, ThriveGlobal and Qrius. He also contributes to publications such as LightReading.com, Securitynow.com, CIOreview.com, SDxcentral.com, Virtual-Strategy.com, SoftwareMag.com, TEISS.co.uk and CloudTweaks.com, and is further quoted in publications including Erpscan.com, DigitalGuardian, FutureOfEverything.com, TalkinCloud.com, EnterpriseProject, MRC and SiliconIndia.com. A recognized thought leader, his speaking engagements have included the Mobile World Congress, CSA World Congress, ISACA,RSA Security Conference, VMWorld, Telecom Industry Association, and Product Camp Silicon Valley. In our eye-opening discussion with Ashwin, he sheds light on the impact of cybersecurity on our day-to-day lives and our businesses. Massive amounts of data are being collected and stored – how is it being protected and used? Who is responsible if/when things go wrong? Ashwin addresses these questions and more, as we delve into the complex world of technology, artificial intelligence and automation. We are getting there faster than most realize. Whether you are a small business owner, an industry leader, or simply a consumer in today's society, this episode will enlighten and engage you in an important conversation about the morality and ethics of cybersecurity and what it means to us today. Key Takeaways We are at the cusp of something dramatic. We have gotten to where we're at by the efforts of humans. Now, humans are being outpaced by machines, however they lack fundamental human concepts of ethics and moral values. A lot of research is being done on cyber morality and its impact, but it's not yet translating into the business world. Twitter can already predict the onset of depression based on the words you use repeatedly. The question is, “What they do with that information? Who do they inform?” It is getting easier to manufacture numbers of followers. Which begs the question, “If my competitors are doing it, should I or shouldn't I?” There are 3 stages of Artificial Intelligence: Data insights, Prediction, and Action. The morale framework needs to be applied at all stages. At what point goes a human need to step in to make the right decision? The problem is the amount of data – it will be impossible. We're getting there faster than people realize. Uber is going towards driverless vehicles and trucks. An important question to ask is, “What biases are getting built into autonomous vehicles?” Small companies need to pay attention to the information they are collecting and storing and how the data is being put into application. They can use a 3rd party, but who will ultimately be accountable if something goes wrong? Resources The Moral Compass Podcast Connect With Ashwin Krishnan Website LinkedIn Twitter Facebook
Raamattutunti 20.07.2016: Lauri Lankinen & Petrus Leppänen