
teissPodcast - Cracking Cyber Security
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
Episodes
273 episodes
teissTalk: Hacking security effectiveness - making sure your tools are working for you
Where metrics and evaluations fall short in measuring holistic security effectiveness Identifying gaps between tools and determining which gaps you need to fill Showing the board and the business that cyber-secu...
•
44:50

teissTalk: Protecting critical services without disruption
How cyber-attackers are using GenAI to evade detection by security systemsSafeguarding against sophisticated ransomware attacks with robust security measuresTop tactics for stopping ransomware attacks before they cause da...
•
46:06

teissTalk: Protecting critical services without disruption
Whether compliance-as-security in CNI offers security or false confidenceNavigating tool and dashboard complexity to avoid CNI cyber blind spots Attracting cyber talent into CNI and away from finance and tech
•
44:30

teissTalk: Live at teissLondon2025 - Enhancing AppSec with Application Security Posture Management
Fortifying security defences with automated root cause analysis and prioritisationManaging security risk urgency across your application pipeline with real-time visibility and data visualisation capabilitiesDriving effici...
•
58:48

teissTalk: Bolstering your defences against supply chain cyber-risk
What’s making supply chain risk the fastest-growing cyber-risk categoryHow to galvanise your internal and external peers to develop a shared responsibility for supply chain cyber-risksDesigning and implementing effective ...
•
45:22

teissTalk: Securing the human perimeter
How the human risk surface area has broadened with GenAI and collaboration tools Prevent breaches by applying the cyber kill chain to human vulnerabilities Strategies to protect employees without compromising pr...
•
42:32

teissTalk: Threat intelligence strategies to mitigate industrial-scale cyber-crime
How cyber-crime continues to evolve and what this means for enterprise threat intelligence strategiesEvaluating sources and deciding which characteristics are most relevantHow DNS-based threat intelligence versus a malwar...
•
43:53

teissTalk: The future of SecOps - why should leaders be optimistic?
Automating SecOps processes and procedures - free your people, improve retention and increase productivityWhere creativity and diversity is keeping your SecOps one step ahead of the attackersMatching your effectiveness to...
•
45:17

teissTalk: The emerging 2025 threat landscape
How evolving methods of work are expanding the attack surfaceGrowth of supply chain attacks targeting devices touching sensitive dataIncreased nation-state targeting of Critical National InfrastructureThis ep...
•
46:03

teissTalk: Transforming your security operations to detect and respond to advanced attacks
Diverse threat vectors and complex attacks - how to expand your detection and response programmesHelping your SOC analysts achieve more - finding the right combination of internal ML/AI tools and external providersPathway...
•
45:33

teissTalk: Protecting your crown jewels as an SME without breaking the bank
Identifying which data assets to prioritise Building an enterprise-level cyber-security profile on a budget Strengthening your cyber-resilience with incident response playbooks This episode is ...
•
44:51

teissTalk: Reducing your security debt in a GenAI-driven world
Minimising the risks to your security posture from developers’ reliance on GenAIUsing AI to speed up remediation and avoid security becoming the bottleneckSteps to ensure safe and secure implementation of GenAI in softwar...
•
43:21

teissTalk: Why just-in-time security is leaving you exposed
Why the traditional malware-centric approach to security doesn’t enable proactive protectionPre-empting and protecting attacks before they are launched - looking at the threat actors attack infrastructureEmergent domains,...
•
44:41

teissTalk: Why Zero Trust Network Access is not your silver bullet
Where does Zero Trust fall short, and why these failings encourage cyber-crimeExpanding Zero Trust to protect the data itselfIdentifying, classifying, and securing sensitive data through automationThis episod...
•
45:07

teissTalk: Better security awareness training with AI
Leveraging behavioural AI to mitigate the risk of phishing attacks Fortifying your defenses against the next wave of phishing threats Practical strategies for empowering colleagues while strengthening your cyber...
•
40:46

teissTalk: Confronting cyber-criminals-strategies for cyber-hygiene
Meeting your operational and legal obligations - getting your foundations in orderCyber-proofing your organisation with comprehensive cyber-security training and awarenessDeveloping cyber-hygiene to defend against cyber-c...
•
45:13

teissTalk: Mitigating third-party risk with threat intelligence
A proactive approach to third-party risk - continuous monitoring of suppliersUsing threat intelligence to identify third-party riskEffectively working with partners to mitigate third-party security risksThis ...
•
43:43

teissTalk: A playbook for new CISOs - learnings from years in the trenches
How the next generation of InfoSec leaders can better prepare themselves to navigate the threats of tomorrowIdentifying the quick wins and making the most of the finite time new CISOs have to get their message acrossPract...
•
44:49

teissTalk: Eliminating blind spots within your cyber security environment
Gaining comprehensive visibility across your hybrid and multi-cloud environmentsMitigating hidden threats and vulnerabilities beyond your endpoints and network parametersMaximising your cyber security investments with bet...
•
46:30

teissTalk: Protecting your C-Suite's private lives to protect the enterprise
Threat trends - how threat actors are targeting C-Suite executives to access the enterpriseEmpowering your C-Suite to identify and avoid social engineeringCreating social media policies that your C-Suite understand so tha...
•
45:39

teissTalk: Securing your sensitive data from exfiltration
Protecting your endpoints - how do cybercriminals exfiltrate data, and what trends are we seeing?Mitigating the financial, legal, and reputational risks with a comprehensive data strategyLeveraging next-generation technol...
•
44:56

teissTalk: Fortifying your cyber defenses as a mid-sized organisation
How you can reduce data loss resulting from user error, disgruntled employees, or cyber attacksLeveraging existing and emerging technologies to enhance your preparedness against the latest attack vectors and threat actors...
•
44:44

teissTalk: Maintaining your credibility as a security advisor
Building rapport with the board through persuasive communication skillsLeveraging your influence to drive business change and manage cyber risksMeasuring the impact of your actions and adviceThis episode is h...
•
45:16
