Player FM - Internet Radio Done Right
31 subscribers
Checked 4d ago
Added seven years ago
Content provided by TEISS. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by TEISS or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!
Go offline with the Player FM app!
teissPodcast - Cracking Cyber Security
Mark all (un)played …
Manage series 2318447
Content provided by TEISS. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by TEISS or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
277 episodes
Mark all (un)played …
Manage series 2318447
Content provided by TEISS. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by TEISS or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
277 episodes
All episodes
×t
teissPodcast - Cracking Cyber Security

What DORA is specifically asking of organisations Where the likely CTI gaps are when attempting to align with DORA Why innovation is key to aligning your CTI capabilities This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Benoit Heynderickx, Principal Analyst, Information Security Forum (ISF) https://www.linkedin.com/in/benoithey/ Tim Parker, Chair, South West Cyber Security Cluster https://www.linkedin.com/in/tim-parker Lewis Henderson, Director - Product Marketing, Team Cymru https://www.linkedin.com/in/lewishenderson/…
t
teissPodcast - Cracking Cyber Security

1 teissTalk: Cyber-resilience – your last line of defence 45:10
45:10
Play Later
Play Later
Lists
Like
Liked45:10
Preparing for ransomware - where is your data and how is it protected? Building cyber resilience for your data, across on-premises and cloud Reducing the window of damage and minimising the time to recover This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Heather Lowrie, Independent Advisor, Earthgard Ltd https://www.linkedin.com/in/heather-lowrie/ Raza Sadiq, Head of Enterprise Risk, MQube https://www.linkedin.com/in/razasadiq7/ Sandra Bell, Group Head of Organisational Resilience, Novuna https://www.linkedin.com/in/sandra-bell-13a109183/ Grant Caley, UK & Ireland Solutions Director, NetApp https://www.linkedin.com/in/grant-caley-a424681/…
t
teissPodcast - Cracking Cyber Security

1 teissTalk: Resilient by design – the next cyber-security imperative 45:36
45:36
Play Later
Play Later
Lists
Like
Liked45:36
Identifying and removing barriers to cyber resilience Reducing complexity - consolidating and eliminating legacy systems Building a cyber-resilient organisation - moving from a reactive to a proactive model This episode is hosted by Thom Langford: https://www.linkedin.com/in/jonathanbcraven/ Heather Lowrie, Independent Advisor, Earthgard Ltd https://www.linkedin.com/in/heather-lowrie/ Sasha Henry, Cyber Strategy & Resilience Advisor, Confidential https://www.linkedin.com/in/alexandra-pavelovna-henry-32b98465/ James Tucker, Head of CISO, International, Zscaler https://www.linkedin.com/in/jamesjtucker/…
t
teissPodcast - Cracking Cyber Security

1 teissTalk: Hacking security effectiveness - making sure your tools are working for you 44:50
44:50
Play Later
Play Later
Lists
Like
Liked44:50
Where metrics and evaluations fall short in measuring holistic security effectiveness Identifying gaps between tools and determining which gaps you need to fill Showing the board and the business that cyber-security is moving the needle on resilience This episode is hosted by Jonathan Craven: https://www.linkedin.com/in/jonathanbcraven/ Richard Absalom, Principal Research Analyst, Information Security Forum (ISF) https://uk.linkedin.com/in/richard-absalom-48879116 Edward Starkie, Director, GRC | Cyber Risk, Thomas Murray https://www.linkedin.com/in/edward-starkie-56712431/ Emanuel Salmona, Co-Founder and CEO, Nagomi Security https://www.linkedin.com/in/emanuelsalmona/…
t
teissPodcast - Cracking Cyber Security

1 teissTalk: Protecting critical services without disruption 46:06
46:06
Play Later
Play Later
Lists
Like
Liked46:06
How cyber-attackers are using GenAI to evade detection by security systems Safeguarding against sophisticated ransomware attacks with robust security measures Top tactics for stopping ransomware attacks before they cause damage This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ John Heaton-Armstrong, Experienced Cyber security Leader, Confidential https://www.linkedin.com/in/johnheatonarmstrong/ Edewede Oriwoh, Group IT and Cybersecurity Manager, Zigup Plc https://www.linkedin.com/in/edewedeoriwoh/ Seamus Lennon, VP of Operations, ThreatLocker https://www.linkedin.com/in/seamus-lennon-41423886…
t
teissPodcast - Cracking Cyber Security

1 teissTalk: Protecting critical services without disruption 44:30
44:30
Play Later
Play Later
Lists
Like
Liked44:30
Whether compliance-as-security in CNI offers security or false confidence Navigating tool and dashboard complexity to avoid CNI cyber blind spots Attracting cyber talent into CNI and away from finance and tech This episode is hosted by Jonathan Craven: https://www.linkedin.com/in/thomlangford/ Sofia Martinez Gomez, VP, Risk & Tech Practice - Cybersecurity, Privacy & Compliance, AlixPartners https://www.linkedin.com/in/sofia-martinez-gomez-8b5534136/?locale=en_US Monika Atanasova, Global Head of Third Party Risk Management, Raiffeisen Gruppe https://www.linkedin.com/in/monika-atanasova-746633b7/?originalSubdomain=ch Deryck Mitchelson, Global CISO, Check Point Software Technologies https://www.linkedin.com/in/deryckmitchelson…
t
teissPodcast - Cracking Cyber Security

1 teissTalk: Live at teissLondon2025 - Enhancing AppSec with Application Security Posture Management 58:48
58:48
Play Later
Play Later
Lists
Like
Liked58:48
Fortifying security defences with automated root cause analysis and prioritisation Managing security risk urgency across your application pipeline with real-time visibility and data visualisation capabilities Driving efficiency and prioritisation across your security ecosystem with practical remediation actions This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ John Heaton-Armstrong, Experienced Cyber security Leader, Confidential https://www.linkedin.com/in/johnheatonarmstrong/ Danny Dresner, Professor of Cyber security, The University of Manchester https://www.linkedin.com/in/danny-dresner-fciis-6382381/ Tiago Rosado, Chief Information Security Officer, Asite https://www.linkedin.com/in/tiagorosado/ Derek Maki, VP Product Management, Veracode https://www.linkedin.com/in/derekmaki/…
t
teissPodcast - Cracking Cyber Security

1 teissTalk: Bolstering your defences against supply chain cyber-risk 45:22
45:22
Play Later
Play Later
Lists
Like
Liked45:22
What’s making supply chain risk the fastest-growing cyber-risk category How to galvanise your internal and external peers to develop a shared responsibility for supply chain cyber-risks Designing and implementing effective key controls to mitigate supply chain cyber-risks This episode is hosted by Jonathan Craven: https://www.linkedin.com/in/jonathanbcraven/ Mike Johnson, Global Cyber Threat & Incident Response Manager, Verifone https://www.linkedin.com/in/mike---johnson/ Jean Carlos, Group Head of Cyber Architecture & Engineering, TP ICAP https://www.linkedin.com/in/jeanpc/ Richard Marcus, CISO, AuditBoard https://www.linkedin.com/in/richard-marcus-b3192261/…
t
teissPodcast - Cracking Cyber Security

How the human risk surface area has broadened with GenAI and collaboration tools Prevent breaches by applying the cyber kill chain to human vulnerabilities Strategies to protect employees without compromising productivity This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Daniela Almeida Lourenco, Chief Information Security Officer, Dutch Financial Services https://www.linkedin.com/in/daniela-almeida-lourenco/ Rebecca Stephenson, Specialist Lead Lecturer, Highlands College https://www.linkedin.com/in/creative-minds-in-cyber/ Frederick Coulton, Director of UX, CultureAI https://www.linkedin.com/in/frederickcoulton…
t
teissPodcast - Cracking Cyber Security

1 teissTalk: Threat intelligence strategies to mitigate industrial-scale cyber-crime 43:53
43:53
Play Later
Play Later
Lists
Like
Liked43:53
How cyber-crime continues to evolve and what this means for enterprise threat intelligence strategies Evaluating sources and deciding which characteristics are most relevant How DNS-based threat intelligence versus a malware-centric approach disrupts industrialised cyber-crime This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Todd Wade, Chief Information Security Officer https://www.linkedin.com/in/twade/ Matt Hardy, Senior Information Security Executive https://www.linkedin.com/in/matthardy67/ Craig Sanderson, Principal Cybersecurity Strategist, Infoblox https://www.linkedin.com/in/craigsanderson1…
t
teissPodcast - Cracking Cyber Security

1 teissTalk: The future of SecOps - why should leaders be optimistic? 45:17
45:17
Play Later
Play Later
Lists
Like
Liked45:17
Automating SecOps processes and procedures - free your people, improve retention and increase productivity Where creativity and diversity is keeping your SecOps one step ahead of the attackers Matching your effectiveness to organisational objectives - aligning your internal SOC metrics with those required by the board This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Prince Adu, Board Member - ISACA Accra Chapter, ISACA https://www.linkedin.com/in/prince-adu-ccsp-cisa-crisc-3759a520/ Garrett Smiley, Chief of Staff to CDIO / Vice President of Digital Infrastructure and Technology Strategy, Maximus https://www.linkedin.com/in/garrettsmiley/ Matt Muller, Field CISO, Tines https://www.linkedin.com/in/matthewrmuller/…
t
teissPodcast - Cracking Cyber Security

1 teissTalk: The emerging 2025 threat landscape 46:03
46:03
Play Later
Play Later
Lists
Like
Liked46:03
How evolving methods of work are expanding the attack surface Growth of supply chain attacks targeting devices touching sensitive data Increased nation-state targeting of Critical National Infrastructure This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Richard Absalom, Principal Research Analyst, Information Security Forum (ISF) https://uk.linkedin.com/in/richard-absalom-48879116 Tom O’Driscoll, Head of Security Strategy and Intelligence, National Highways https://www.linkedin.com/in/odte/ Michael Covington, Vice President, Portfolio Strategy, Jamf https://www.linkedin.com/in/michaelcovington/…
t
teissPodcast - Cracking Cyber Security

1 teissTalk: Transforming your security operations to detect and respond to advanced attacks 45:33
45:33
Play Later
Play Later
Lists
Like
Liked45:33
Diverse threat vectors and complex attacks - how to expand your detection and response programmes Helping your SOC analysts achieve more - finding the right combination of internal ML/AI tools and external providers Pathways to accelerate your SOC development to detect and mitigate attacks earlier This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Mike Johnson, Global Cyber Threat & Incident Response Manager, Verifone https://www.linkedin.com/in/mike---johnson/ Alan Jenkins, CISO Team lead, Saepio https://www.linkedin.com/in/alanjenkins/ Josh Davies, Principal Technical Manager, Fortra https://www.linkedin.com/in/jdgwilym/…
t
teissPodcast - Cracking Cyber Security

1 teissTalk: Protecting your crown jewels as an SME without breaking the bank 44:51
44:51
Play Later
Play Later
Lists
Like
Liked44:51
Identifying which data assets to prioritise Building an enterprise-level cyber-security profile on a budget Strengthening your cyber-resilience with incident response playbooks This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Steven Furnell, Professor of Cyber Security, University of Nottingham https://www.linkedin.com/in/stevenfurnell/ Jean Carlos, VP of Information Security, AutogenAI https://www.linkedin.com/in/jeanpc/ Stephanie Lynch-Ozanar, Education and Awareness Specialist, Co-Op https://www.linkedin.com/in/stephlynchozanar Kev Eley, VP of UKI, Exabeam https://www.linkedin.com/in/keveley/…
t
teissPodcast - Cracking Cyber Security

1 teissTalk: Reducing your security debt in a GenAI-driven world 43:21
43:21
Play Later
Play Later
Lists
Like
Liked43:21
Minimising the risks to your security posture from developers’ reliance on GenAI Using AI to speed up remediation and avoid security becoming the bottleneck Steps to ensure safe and secure implementation of GenAI in software development This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Lee Munson, Principal Research Analyst, Information Security Forum https://www.linkedin.com/in/lmunson/ Zia Ush Shamszaman, Senior Lecturer , Computer Science, Teesside University https://www.linkedin.com/in/zia-ush-shamszaman John Smith, EMEA CTO, Veracode https://www.linkedin.com/in/jtsmith123…
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.