Sinopsis
The Cracking Cyber Security podcast from TEISS is dedicated to cracking cybersecurity. Well host interviews with industry experts wholl share commentary and advice on the latest threats and challenges that currently face our world.
Episodios
-
teissTalk: Securing against AI-driven phishing attacks
19/06/2025 Duración: 44minHow cyber criminals are using AI tools to scale malicious operationsStreamlining user experience with biometrics or device-based authenticationMaking your organisation cyber resilient and securing critical systems as AI continues to advanceFeaturing: Thom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Derek Hanson, VP Solutions Architecture and Alliances, Yubicohttps://www.linkedin.com/in/derekthansonJay Vinda, Global CISO and Cyber Risk Engineering Lead, Mosaic Insurancehttps://www.linkedin.com/in/jayvindaLee Munson, Principal Research Analyst, Information Security Forumhttps://www.linkedin.com/in/lmunson/
-
teissTalk: Mitigating human cyber-risks with data and behavioural sciences
12/06/2025 Duración: 45minWhich behaviours increase risk and how we can measurably change them Driving employee engagement without incentives Which real-time interventions encourage safer employee behaviours Jonathan Craven, Host, teissTalkhttps://www.linkedin.com/in/jonathanbcraven/Rebecca Stephenson, Specialist Lead Lecturer, Highlands Collegehttps://www.linkedin.com/in/creative-minds-in-cyber/Penny Jackson, Director Strategy, Awareness & Engagement (Human Risk Management), Aristos Partnershiphttps://www.linkedin.com/in/pennykjackson/Candace Williams, CEO/Founder, Cyb(H)er Ally Cybersecurity Solutions, LLChttps://www.linkedin.com/in/cybherally/
-
teissTalk: Navigating the rising legal threats to cyber-security leaders
15/05/2025 Duración: 44minReducing personal risk with your organisation’s liability insurance Understanding the evolving risk landscape through recent case studies Creating a workplace ethos of shared accountability This episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Michela Resta, Solicitor, CYXCELhttps://www.linkedin.com/in/michelarestacyxcel/Kelly Hagedorn, Partner, ALSTON & BIRDhttps://www.linkedin.com/in/kellyhagedorn/
-
teissTalk: Weak passwords – the hidden threat lurking in your organisation
06/05/2025 Duración: 45minTrends in the current credential theft landscape and changing compliance standardsStrategies to reduce password risk - continuous scanning, enforced policies and exclusion dictionariesEncouraging users to create strong, securely stored passwords without reuseThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Shannon Muller, Cyber security Specialist, Microsofthttps://www.linkedin.com/in/shannon-muller/Jay Vinda, Cyber Risk Engineering and Emerging Solutions Lead, Mosaic Insurance https://www.linkedin.com/in/jayvindaDarren James, Senior Product Manager, Specopshttps://www.linkedin.com/in/darren-james-91055310
-
teissTalk: DORA - A new law for a new dawn
01/05/2025 Duración: 44minWhat DORA is specifically asking of organisationsWhere the likely CTI gaps are when attempting to align with DORAWhy innovation is key to aligning your CTI capabilitiesThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Benoit Heynderickx, Principal Analyst, Information Security Forum (ISF)https://www.linkedin.com/in/benoithey/Tim Parker, Chair, South West Cyber Security Clusterhttps://www.linkedin.com/in/tim-parkerLewis Henderson, Director - Product Marketing, Team Cymruhttps://www.linkedin.com/in/lewishenderson/
-
teissTalk: Cyber-resilience – your last line of defence
15/04/2025 Duración: 45minPreparing for ransomware - where is your data and how is it protected? Building cyber resilience for your data, across on-premises and cloud Reducing the window of damage and minimising the time to recover This episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Heather Lowrie, Independent Advisor, Earthgard Ltdhttps://www.linkedin.com/in/heather-lowrie/Raza Sadiq, Head of Enterprise Risk, MQubehttps://www.linkedin.com/in/razasadiq7/Sandra Bell, Group Head of Organisational Resilience, Novunahttps://www.linkedin.com/in/sandra-bell-13a109183/Grant Caley, UK & Ireland Solutions Director, NetApphttps://www.linkedin.com/in/grant-caley-a424681/
-
teissTalk: Resilient by design – the next cyber-security imperative
08/04/2025 Duración: 45minIdentifying and removing barriers to cyber resilienceReducing complexity - consolidating and eliminating legacy systemsBuilding a cyber-resilient organisation - moving from a reactive to a proactive model This episode is hosted by Thom Langford:https://www.linkedin.com/in/jonathanbcraven/Heather Lowrie, Independent Advisor, Earthgard Ltdhttps://www.linkedin.com/in/heather-lowrie/Sasha Henry, Cyber Strategy & Resilience Advisor, Confidentialhttps://www.linkedin.com/in/alexandra-pavelovna-henry-32b98465/James Tucker, Head of CISO, International, Zscalerhttps://www.linkedin.com/in/jamesjtucker/
-
teissTalk: Hacking security effectiveness - making sure your tools are working for you
03/04/2025 Duración: 44minWhere metrics and evaluations fall short in measuring holistic security effectiveness Identifying gaps between tools and determining which gaps you need to fill Showing the board and the business that cyber-security is moving the needle on resilience This episode is hosted by Jonathan Craven:https://www.linkedin.com/in/jonathanbcraven/Richard Absalom, Principal Research Analyst, Information Security Forum (ISF)https://uk.linkedin.com/in/richard-absalom-48879116Edward Starkie, Director, GRC | Cyber Risk, Thomas Murrayhttps://www.linkedin.com/in/edward-starkie-56712431/Emanuel Salmona, Co-Founder and CEO, Nagomi Securityhttps://www.linkedin.com/in/emanuelsalmona/
-
teissTalk: Protecting critical services without disruption
27/03/2025 Duración: 46minHow cyber-attackers are using GenAI to evade detection by security systemsSafeguarding against sophisticated ransomware attacks with robust security measuresTop tactics for stopping ransomware attacks before they cause damageThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/John Heaton-Armstrong, Experienced Cyber security Leader, Confidentialhttps://www.linkedin.com/in/johnheatonarmstrong/Edewede Oriwoh, Group IT and Cybersecurity Manager, Zigup Plchttps://www.linkedin.com/in/edewedeoriwoh/Seamus Lennon, VP of Operations, ThreatLocker https://www.linkedin.com/in/seamus-lennon-41423886
-
teissTalk: Protecting critical services without disruption
20/03/2025 Duración: 44minWhether compliance-as-security in CNI offers security or false confidenceNavigating tool and dashboard complexity to avoid CNI cyber blind spots Attracting cyber talent into CNI and away from finance and tech This episode is hosted by Jonathan Craven:https://www.linkedin.com/in/thomlangford/Sofia Martinez Gomez, VP, Risk & Tech Practice - Cybersecurity, Privacy & Compliance, AlixPartnershttps://www.linkedin.com/in/sofia-martinez-gomez-8b5534136/?locale=en_US Monika Atanasova, Global Head of Third Party Risk Management, Raiffeisen Gruppehttps://www.linkedin.com/in/monika-atanasova-746633b7/?originalSubdomain=chDeryck Mitchelson, Global CISO, Check Point Software Technologieshttps://www.linkedin.com/in/deryckmitchelson
-
teissTalk: Live at teissLondon2025 - Enhancing AppSec with Application Security Posture Management
06/03/2025 Duración: 58minFortifying security defences with automated root cause analysis and prioritisationManaging security risk urgency across your application pipeline with real-time visibility and data visualisation capabilitiesDriving efficiency and prioritisation across your security ecosystem with practical remediation actionsThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/John Heaton-Armstrong, Experienced Cyber security Leader, Confidentialhttps://www.linkedin.com/in/johnheatonarmstrong/Danny Dresner, Professor of Cyber security, The University of Manchesterhttps://www.linkedin.com/in/danny-dresner-fciis-6382381/Tiago Rosado, Chief Information Security Officer, Asitehttps://www.linkedin.com/in/tiagorosado/Derek Maki, VP Product Management, Veracodehttps://www.linkedin.com/in/derekmaki/
-
teissTalk: Bolstering your defences against supply chain cyber-risk
27/02/2025 Duración: 45minWhat’s making supply chain risk the fastest-growing cyber-risk categoryHow to galvanise your internal and external peers to develop a shared responsibility for supply chain cyber-risksDesigning and implementing effective key controls to mitigate supply chain cyber-risks This episode is hosted by Jonathan Craven:https://www.linkedin.com/in/jonathanbcraven/Mike Johnson, Global Cyber Threat & Incident Response Manager, Verifonehttps://www.linkedin.com/in/mike---johnson/Jean Carlos, Group Head of Cyber Architecture & Engineering, TP ICAP https://www.linkedin.com/in/jeanpc/Richard Marcus, CISO, AuditBoardhttps://www.linkedin.com/in/richard-marcus-b3192261/
-
teissTalk: Securing the human perimeter
20/02/2025 Duración: 42minHow the human risk surface area has broadened with GenAI and collaboration tools Prevent breaches by applying the cyber kill chain to human vulnerabilities Strategies to protect employees without compromising productivity This episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Daniela Almeida Lourenco, Chief Information Security Officer, Dutch Financial Serviceshttps://www.linkedin.com/in/daniela-almeida-lourenco/Rebecca Stephenson, Specialist Lead Lecturer, Highlands College https://www.linkedin.com/in/creative-minds-in-cyber/Frederick Coulton, Director of UX, CultureAIhttps://www.linkedin.com/in/frederickcoulton
-
teissTalk: Threat intelligence strategies to mitigate industrial-scale cyber-crime
06/02/2025 Duración: 43minHow cyber-crime continues to evolve and what this means for enterprise threat intelligence strategiesEvaluating sources and deciding which characteristics are most relevantHow DNS-based threat intelligence versus a malware-centric approach disrupts industrialised cyber-crimeThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Todd Wade, Chief Information Security Officerhttps://www.linkedin.com/in/twade/Matt Hardy, Senior Information Security Executivehttps://www.linkedin.com/in/matthardy67/Craig Sanderson, Principal Cybersecurity Strategist, Infobloxhttps://www.linkedin.com/in/craigsanderson1
-
teissTalk: The future of SecOps - why should leaders be optimistic?
30/01/2025 Duración: 45minAutomating SecOps processes and procedures - free your people, improve retention and increase productivityWhere creativity and diversity is keeping your SecOps one step ahead of the attackersMatching your effectiveness to organisational objectives - aligning your internal SOC metrics with those required by the boardThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Prince Adu, Board Member - ISACA Accra Chapter, ISACAhttps://www.linkedin.com/in/prince-adu-ccsp-cisa-crisc-3759a520/Garrett Smiley, Chief of Staff to CDIO / Vice President of Digital Infrastructure and Technology Strategy, Maximushttps://www.linkedin.com/in/garrettsmiley/Matt Muller, Field CISO, Tines https://www.linkedin.com/in/matthewrmuller/
-
teissTalk: The emerging 2025 threat landscape
12/12/2024 Duración: 46minHow evolving methods of work are expanding the attack surfaceGrowth of supply chain attacks targeting devices touching sensitive dataIncreased nation-state targeting of Critical National InfrastructureThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Richard Absalom, Principal Research Analyst, Information Security Forum (ISF)https://uk.linkedin.com/in/richard-absalom-48879116Tom O’Driscoll, Head of Security Strategy and Intelligence, National Highwayshttps://www.linkedin.com/in/odte/Michael Covington, Vice President, Portfolio Strategy, Jamfhttps://www.linkedin.com/in/michaelcovington/
-
teissTalk: Transforming your security operations to detect and respond to advanced attacks
05/12/2024 Duración: 45minDiverse threat vectors and complex attacks - how to expand your detection and response programmesHelping your SOC analysts achieve more - finding the right combination of internal ML/AI tools and external providersPathways to accelerate your SOC development to detect and mitigate attacks earlier This episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Mike Johnson, Global Cyber Threat & Incident Response Manager, Verifonehttps://www.linkedin.com/in/mike---johnson/Alan Jenkins, CISO Team lead, Saepiohttps://www.linkedin.com/in/alanjenkins/Josh Davies, Principal Technical Manager, Fortrahttps://www.linkedin.com/in/jdgwilym/
-
teissTalk: Protecting your crown jewels as an SME without breaking the bank
28/11/2024 Duración: 44minIdentifying which data assets to prioritise Building an enterprise-level cyber-security profile on a budget Strengthening your cyber-resilience with incident response playbooks This episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Steven Furnell, Professor of Cyber Security, University of Nottinghamhttps://www.linkedin.com/in/stevenfurnell/Jean Carlos, VP of Information Security, AutogenAIhttps://www.linkedin.com/in/jeanpc/Stephanie Lynch-Ozanar, Education and Awareness Specialist, Co-Ophttps://www.linkedin.com/in/stephlynchozanarKev Eley, VP of UKI, Exabeamhttps://www.linkedin.com/in/keveley/
-
teissTalk: Reducing your security debt in a GenAI-driven world
21/11/2024 Duración: 43minMinimising the risks to your security posture from developers’ reliance on GenAIUsing AI to speed up remediation and avoid security becoming the bottleneckSteps to ensure safe and secure implementation of GenAI in software developmentThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/Lee Munson, Principal Research Analyst, Information Security Forumhttps://www.linkedin.com/in/lmunson/Zia Ush Shamszaman, Senior Lecturer , Computer Science, Teesside Universityhttps://www.linkedin.com/in/zia-ush-shamszamanJohn Smith, EMEA CTO, Veracodehttps://www.linkedin.com/in/jtsmith123
-
teissTalk: Why just-in-time security is leaving you exposed
14/11/2024 Duración: 44minWhy the traditional malware-centric approach to security doesn’t enable proactive protectionPre-empting and protecting attacks before they are launched - looking at the threat actors attack infrastructureEmergent domains, what are they and why they need a layered detectionThis episode is hosted by Thom Langford:https://www.linkedin.com/in/thomlangford/John Rouffas, Cyber Security Executive, Author & Journalist, CyberEdBoard Communityhttps://www.linkedin.com/in/drjohnrouffas/Francis Annandale, Managing Consultant, CyXcelhttps://www.linkedin.com/in/francis-annandale-98222186/Craig Sanderson, Principal Cybersecurity Strategist, Infobloxhttps://www.linkedin.com/in/craigsanderson1/