teissPodcast - Cracking Cyber Security
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
Episodes
266 episodes
teissTalk: The future of SecOps - why should leaders be optimistic?
Automating SecOps processes and procedures - free your people, improve retention and increase productivityWhere creativity and diversity is keeping your SecOps one step ahead of the attackersMatching your effectiveness to...
•
45:17
teissTalk: The emerging 2025 threat landscape
How evolving methods of work are expanding the attack surfaceGrowth of supply chain attacks targeting devices touching sensitive dataIncreased nation-state targeting of Critical National InfrastructureThis ep...
•
46:03
teissTalk: Transforming your security operations to detect and respond to advanced attacks
Diverse threat vectors and complex attacks - how to expand your detection and response programmesHelping your SOC analysts achieve more - finding the right combination of internal ML/AI tools and external providersPathway...
•
45:33
teissTalk: Protecting your crown jewels as an SME without breaking the bank
Identifying which data assets to prioritise Building an enterprise-level cyber-security profile on a budget Strengthening your cyber-resilience with incident response playbooks This episode is ...
•
44:51
teissTalk: Reducing your security debt in a GenAI-driven world
Minimising the risks to your security posture from developers’ reliance on GenAIUsing AI to speed up remediation and avoid security becoming the bottleneckSteps to ensure safe and secure implementation of GenAI in softwar...
•
43:21
teissTalk: Why just-in-time security is leaving you exposed
Why the traditional malware-centric approach to security doesn’t enable proactive protectionPre-empting and protecting attacks before they are launched - looking at the threat actors attack infrastructureEmergent domains,...
•
44:41
teissTalk: Why Zero Trust Network Access is not your silver bullet
Where does Zero Trust fall short, and why these failings encourage cyber-crimeExpanding Zero Trust to protect the data itselfIdentifying, classifying, and securing sensitive data through automationThis episod...
•
45:07
teissTalk: Better security awareness training with AI
Leveraging behavioural AI to mitigate the risk of phishing attacks Fortifying your defenses against the next wave of phishing threats Practical strategies for empowering colleagues while strengthening your cyber...
•
40:46
teissTalk: Confronting cyber-criminals-strategies for cyber-hygiene
Meeting your operational and legal obligations - getting your foundations in orderCyber-proofing your organisation with comprehensive cyber-security training and awarenessDeveloping cyber-hygiene to defend against cyber-c...
•
45:13
teissTalk: Mitigating third-party risk with threat intelligence
A proactive approach to third-party risk - continuous monitoring of suppliersUsing threat intelligence to identify third-party riskEffectively working with partners to mitigate third-party security risksThis ...
•
43:43
teissTalk: A playbook for new CISOs - learnings from years in the trenches
How the next generation of InfoSec leaders can better prepare themselves to navigate the threats of tomorrowIdentifying the quick wins and making the most of the finite time new CISOs have to get their message acrossPract...
•
44:49
teissTalk: Eliminating blind spots within your cyber security environment
Gaining comprehensive visibility across your hybrid and multi-cloud environmentsMitigating hidden threats and vulnerabilities beyond your endpoints and network parametersMaximising your cyber security investments with bet...
•
46:30
teissTalk: Protecting your C-Suite's private lives to protect the enterprise
Threat trends - how threat actors are targeting C-Suite executives to access the enterpriseEmpowering your C-Suite to identify and avoid social engineeringCreating social media policies that your C-Suite understand so tha...
•
45:39
teissTalk: Securing your sensitive data from exfiltration
Protecting your endpoints - how do cybercriminals exfiltrate data, and what trends are we seeing?Mitigating the financial, legal, and reputational risks with a comprehensive data strategyLeveraging next-generation technol...
•
44:56
teissTalk: Fortifying your cyber defenses as a mid-sized organisation
How you can reduce data loss resulting from user error, disgruntled employees, or cyber attacksLeveraging existing and emerging technologies to enhance your preparedness against the latest attack vectors and threat actors...
•
44:44
teissTalk: Maintaining your credibility as a security advisor
Building rapport with the board through persuasive communication skillsLeveraging your influence to drive business change and manage cyber risksMeasuring the impact of your actions and adviceThis episode is h...
•
45:16
teissTalk: Is privacy the source of your failing security?
The privacy challenges of using the network as your fundemental point of defenceWhether InfoSec leaders can ever get full network visibilitySetting privacy controls to reduce vulnerabilities and blindspots within your net...
•
44:38
teissTalk: Selling infosec as a business enabler
Proving that your infosec strategy delivers a competitive advantageManaging the risks and costs of a business-enabling infosec teamBalancing business objectives with infosec needs to deliver security and growth<...
•
44:54
teissTalk: How AI can improve your security and compliance programmes
How infosec leaders can support product teams incorporating generative AIUsing AI to improve compliance processes and ongoing vulnerability monitoringMitigating and minimising AI-based information security risks with ISO ...
•
46:37
teissTalk: Where AI-driven threat detection can streamline your SOC
Closing the cybersecurity gap - acting fast against critical threatsAligning to current compliance standards without the heavy-liftingLeveraging AI-powered tools to maximise your security investmentsThis epis...
•
46:02
teissTalk: Assessing and mitigating risks in your OT environment
Ensuring your risk management framework meets your organisation’s needsRansomware, legacy devices and remote access - risk trends for OTWhy you should prioritise risks based on the likelihood of exploitation as well as im...
•
45:57
teissTalk: Is your organisation prepared for NIS2?
How does NIS2 address risks within critical supply chains and information sharing across borders?Maintaining a proactive stance against evolving threats - how continuous improvement complies with NIS2Ensuring timely compl...
•
41:36
teissTalk: Is your organisation cyber resilient?
Selecting metrics that best convey the impacts and risks of your strategy to the boardHow the changing threat landscape will affect your cyber resilienceThe role cyber insurance plays as a component of your resilience str...
•
44:08