teissPodcast - Cracking Cyber Security
Episodes
302 episodes
teissTalk: Scaling resilience across your cyber ecosystem
Evolving beyond traditional perimeters – strategies to embed resilience across your supply chains and shared digital infrastructureBuilding architectures that absorb external shockwaves including AI-driven disruptions without slow...
teissTalk: Securing your organisation in the age of GenAI
Enabling GenAI safely while protecting sensitive data across users, employees and AI-enabled toolsManaging agentic AI risk through improved visibility, governance, and control across the attack surfaceLeveraging AI to str...
teissTalk: Geopolitics & Regulation - Reshaping the Energy Sector’s Supply Chain Risk
How geopolitical disruptions are driving sophisticated supply chain attacks within the energy sectorShifting towards continuous, intelligence-led supply chain risk management to mitigate 4th and 5th party vulnerabilitiesB...
teissTalk: Cybersecurity as a business metric - giving your C-Suite the data to govern
Executive cyber liability - new regulations and the responsibility to actSupporting your C-Suite with a framework for defining, tracking, and reporting security KPIsBridging the gap to your C-Suite - leveraging attack sur...
teissTalk: Why your security team is burned out and what to do about it
Identifying the causes and effects of stress and burnout within security teams Building personal resilience through mindfulness – regulating stress, strengthening focus and enhancing clarityTech tools to reduce burno...
teissTalk: Building a trusted security model for Generative and Agentic AI
Transferable lessons - how overlooking fundamental security and data trust leads to Generative and Agentic AI failuresSteps for embedding security checkpoints and governance directly into your AI pipelineStrategies to sca...
teissTalk:The confidence gap - moving SMBs from reactive to proactive cyber security
Why fundamental security best-practices are overlooked by SMBs despite advanced threatsAddressing the unmanageable digital exposure surface - identifying critical assets to prioritise for investmentScalable actions that e...
teissTalk: Securing applications and infrastructure in the AI era
Aligning application and API security with the demands of the modern AI eraEnabling secure, high-performance infrastructure for AI and LLM environmentsSecuring APIs and your network without overspending on security
teissTalk: Silent Swipers - unmasking info-stealers in today's threat landscape
Understanding the anatomy, infrastructure and automation of modern information-stealing malwareTracking delivery methods, evasion technique and high-value data targetsBuilding effective, multi-layered defences against the...
teissTalk: 2026 predictions for OT security and the future of cyber physical systems
Exploitable vulnerabilities within OT devices and how this is expected to changeCyber warfare risk in 2026 - how organisations can defend themselvesSecuring the supply chain and expanding XIoT attack surface<...
teissTalk: 2026 threat trends - securing your organisation against next-gen cyber attacks
How cyber criminals are weaponising AI to defeat your threat detection and responseBeyond encryption – how ransomware has evolved to include data exfiltration, publication threats and supply chain compromiseHow geopolitic...
teissTalk: Shielding sensitive data from ransomware – staying ahead of evolving threats
How modern ransomware actors are deploying multidimensional tactics to outpace traditional defencesStrategies to reduce data loss and sustain business operations after an attackAI and automation – enhancing visibility and...
teissTalk: Resilience as a business outcome
Identifying critical assets and dependencies to focus investment where impact is highestDesigning for rapid recovery with tested runbooks and clear RTO/RPO targetsStrengthening resilience through training, playbooks, and ...
teissTalk: AI defence against offence - are you playing catch-up in the new security arms race?
Leveraging AI-powered solutions to anticipate, detect and contain asymmetric cyber threatsAugmenting security teams through AI efficiencies – reducing alert fatigue whilst improving detection speed and accuracyBest AI sec...
teissTalk: Getting the board’s ‘aye’ on your cyber-security investments
Bridging the CISO-board disconnect which hinders your cyber-security progressMeasuring cyber-risk in financial, economic and operational terms and demonstrating value in cyber-investmentsFocusing on governance and complia...
teissTalk: Help your colleagues help you with an enhanced security awareness programme
How appreciation and gamification can improve your employees’ security awarenessMaking security behaviours stick – reframing mistakes as opportunities for growthFostering a culture of continuous improvement with an inclus...
teissTalk: From service desk to security risk - stopping social engineering at the source
Which techniques and methods use by threat actors are bypassing security parametersReducing your cyber risk - using lessons learned from recent high-profile attacksStrategies to protect your service desk against identity-...
Live at teissLondon2025: From gatekeeping to guardrails - proactive supply chain security at scale
70% of critical security debt stems from third-party code - what can be done upstream?How real-time threat intelligence and policy enforcement are closing the gapWhy DORA and modern CI/CD pipelines demand pre-emptive visi...
teissTalk: Advancing compliance maturity in an age of DORA & NIS2
Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threatsMeeting API compliance and data protection challenges with emerging technologiesMoving towards a mature posture for API securi...
teissTalk: Refining your API security strategy to protect against AI-driven attacks
Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threatsMeeting API compliance and data protection challenges with emerging technologiesMoving towards a mature posture for API securi...
teissTalk: Building resilient infosec teams
Analysing how your teams cope with a cyber incident or a failure scenarioLearning from crises - building resilience strategies to mitigate future incidentsBuilding a cyber resilient mindset within your infosec team and in...
teissTalk: Surviving a critical CVE - a high-impact playbook
Risk-based prioritising using severity scoring and patch analysisEscaping the silo trap - bridging the gap between IT and security teamsAutomate rules to handle high-severity vulnerabilities and zero-daysJona...
teissTalk: Securing against AI-driven phishing attacks
How cyber criminals are using AI tools to scale malicious operationsStreamlining user experience with biometrics or device-based authenticationMaking your organisation cyber resilient and securing critical systems as AI c...