Ranked #1

What’s the best way to respond to a data breach?
What’s the best way to respond to a data breach?
This week TEISS talks crisis communications!What is the best way to plan a response to a data breach? What is the key to... Read more
19 Jul 2018
•
15mins
Ranked #2

The role of the threat hunter: what is it and why it matters
The role of the threat hunter: what is it and why it matters
This week on the podcast we are talking with Naaman Haart, a UK-based threat hunter for the cybersecurity company, Digit... Read more
8 Feb 2019
•
24mins
Ranked #3

Is password security really that important?
Is password security really that important?
Did you know that the most popular password at the end of 2018 was "123456", followed by “password” in second place? Her... Read more
11 Jan 2019
•
20mins
Ranked #4

How to secure your supply chain
How to secure your supply chain
As supply chains grow in size and complexity, so does the technology, data, transactions, users, and therefore the cyber... Read more
29 Aug 2018
•
19mins
Ranked #5

Cyber extortion: to pay or not to pay?
Cyber extortion: to pay or not to pay?
Cyber extortion is our theme this week; the crime involving an attack or threat of an attack coupled with a demand for m... Read more
7 Dec 2018
•
25mins
Ranked #6

How are cyber criminals collaborating?
How are cyber criminals collaborating?
Head of Threat Intelligence at Cybereason, Assaf Dahan, shares some fascinating research about the latest cyber security... Read more
28 Jun 2019
•
15mins
Ranked #7

What’s the big deal about zero trust?
What’s the big deal about zero trust?
Our theme this week is “Zero trust” – what is it and how can you implement it in your organisation. On the episode I’m j... Read more
10 May 2019
•
19mins
Ranked #8

Spotting the Insider Threat with Lisa Forte
Spotting the Insider Threat with Lisa Forte
How should organisations deal with the Insider Threat? Can you stop the insider before they cause harm? What are the red... Read more
5 Jul 2019
•
21mins
Ranked #9

The hacker vs the defender and a paranoid future
The hacker vs the defender and a paranoid future
This week we talk hackers vs defenders, how to convince the board to invest in the unknown and the future of cybersecuri... Read more
2 Nov 2018
•
13mins
Ranked #10

Can we protect our National Critical Infrastructure from a major cyber-attack?
Can we protect our National Critical Infrastructure from a major cyber-attack?
Can you imagine a world where our water, energy and transport systems just stop working? How about our hospitals, teleco... Read more
26 Jul 2019
•
18mins
Ranked #11

Estonia's e-revolution
Estonia's e-revolution
Estonia's e-revolution began in the 1990s, not long after independence from the Soviet Union. However the massive cyber ... Read more
25 Jul 2018
•
15mins
Ranked #12

Leadership, imposter syndrome and humour with Thom Langford
Leadership, imposter syndrome and humour with Thom Langford
This week we are talking about leadership, imposter syndrome and humour with Thom Langford on the Cracking Cyber Securit... Read more
12 Jul 2019
•
26mins
Ranked #13

Are we investing too much in cyber security?
Are we investing too much in cyber security?
On this week’s episode, we talk to cyber security company Tanium’s CEO Orion Hindawi and Chief Technology Officer, Ryan ... Read more
1 Feb 2019
•
16mins
Ranked #14

Is Huawei a security threat?
Is Huawei a security threat?
Why has the US banned the use of Chinese company Huawei’s technology? To what extent is Huawei a security threat? What a... Read more
7 Jun 2019
•
22mins
Ranked #15

"It’s going wrong at the human level” - Martin Smith MBE on inspiring culture change
"It’s going wrong at the human level” - Martin Smith MBE on inspiring culture change
This week we are talking about security awareness with Martin Smith MBE, Chairman of both SASIG and The Security Company... Read more
30 Nov 2018
•
15mins
Ranked #16

Security training: should we give humans a break?
Security training: should we give humans a break?
Cryptographer Bruce Schneier once said, "only amateurs attack machines, professionals target people" and yet how far sho... Read more
26 Apr 2019
•
15mins
Ranked #17

Inside the mind of a hacker
Inside the mind of a hacker
This week Joe Carson, chief security scientist at Thycotic, takes us through the mind of a hacker. What reconnaissance d... Read more
4 Jan 2019
•
20mins
Ranked #18

“The internet is like a flower with teeth”; with Bridget Kenyon, Global CISO, Thales eSecurity
“The internet is like a flower with teeth”; with Bridget Kenyon, Global CISO, Thales eSecurity
“The internet is like a flower with teeth, it’s beautiful and ugly at the same time, it’s just like we are…” TEISS speak... Read more
20 Jun 2018
•
11mins
Ranked #19

Summer Special Podcast, Part III! Patching vulnerabilities: which should you prioritise?
Summer Special Podcast, Part III! Patching vulnerabilities: which should you prioritise?
Welcome to our Cyber Summer Series. Slightly different to our usual podcast format – we’re featuring interviews recorded... Read more
15 Aug 2018
•
10mins
Ranked #20

Why can’t we retain the cyber talent that we need?
Why can’t we retain the cyber talent that we need?
There’s a cyber skills shortage, but are cyber security hiring and retention processes doing more harm than good to your... Read more
16 Aug 2019
•
20mins