TEISS สาธารณะ
[search 0]
เพิ่มเติม
ดาวน์โหลดแอปเลย!
show episodes
 
Loading …
show series
 
Why the traditional malware-centric approach to security doesn’t enable proactive protection Pre-empting and protecting attacks before they are launched - looking at the threat actors attack infrastructure Emergent domains, what are they and why they need a layered detection This episode is hosted by Thom Langford: https://www.linkedin.com/in/thoml…
  continue reading
 
Where does Zero Trust fall short, and why these failings encourage cyber-crime Expanding Zero Trust to protect the data itself Identifying, classifying, and securing sensitive data through automation This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Jean Carlos, VP Cyber Security, BOXT https://www.linkedin.com/in/je…
  continue reading
 
Leveraging behavioural AI to mitigate the risk of phishing attacks Fortifying your defenses against the next wave of phishing threats Practical strategies for empowering colleagues while strengthening your cyber resilience This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Rebecca Stephenson, Specialist Lead Lecturer …
  continue reading
 
Meeting your operational and legal obligations - getting your foundations in order Cyber-proofing your organisation with comprehensive cyber-security training and awareness Developing cyber-hygiene to defend against cyber-criminals using emerging technology This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Paul Holla…
  continue reading
 
A proactive approach to third-party risk - continuous monitoring of suppliers Using threat intelligence to identify third-party risk Effectively working with partners to mitigate third-party security risks This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Chuck Brooks, Adjunct Professor, Georgetown University https:/…
  continue reading
 
How the next generation of InfoSec leaders can better prepare themselves to navigate the threats of tomorrow Identifying the quick wins and making the most of the finite time new CISOs have to get their message across Practical measures for reducing stress, burnout and frustration within InfoSec teams over the longer term This episode is hosted by …
  continue reading
 
Gaining comprehensive visibility across your hybrid and multi-cloud environments Mitigating hidden threats and vulnerabilities beyond your endpoints and network parameters Maximising your cyber security investments with better visibility and optimised tool performance This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/…
  continue reading
 
Threat trends - how threat actors are targeting C-Suite executives to access the enterprise Empowering your C-Suite to identify and avoid social engineering Creating social media policies that your C-Suite understand so that they can lead by example This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Thomas Wendrich, A…
  continue reading
 
Protecting your endpoints - how do cybercriminals exfiltrate data, and what trends are we seeing? Mitigating the financial, legal, and reputational risks with a comprehensive data strategy Leveraging next-generation technology to rapidly detect and respond to data exfiltrating ransomware attacks This episode is hosted by Thom Langford https://www.l…
  continue reading
 
How you can reduce data loss resulting from user error, disgruntled employees, or cyber attacks Leveraging existing and emerging technologies to enhance your preparedness against the latest attack vectors and threat actors Investing in autonomous and integrated security platforms without breaking the bank This episode is hosted by Thom Langford htt…
  continue reading
 
Building rapport with the board through persuasive communication skills Leveraging your influence to drive business change and manage cyber risks Measuring the impact of your actions and advice This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Alan Jenkins, Principal Consultant, Cyber Security Navigator Ltd https://w…
  continue reading
 
The privacy challenges of using the network as your fundemental point of defence Whether InfoSec leaders can ever get full network visibility Setting privacy controls to reduce vulnerabilities and blindspots within your network This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Tom Ellis-Aziz, Associate Director, Cont…
  continue reading
 
Proving that your infosec strategy delivers a competitive advantage Managing the risks and costs of a business-enabling infosec team Balancing business objectives with infosec needs to deliver security and growth This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Alan Jenkins, Principal Consultant, Cyber Security Navi…
  continue reading
 
How infosec leaders can support product teams incorporating generative AI Using AI to improve compliance processes and ongoing vulnerability monitoring Mitigating and minimising AI-based information security risks with ISO 42001 This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Dean Sapp, SVP, Information Security, P…
  continue reading
 
Closing the cybersecurity gap - acting fast against critical threats Aligning to current compliance standards without the heavy-lifting Leveraging AI-powered tools to maximise your security investments This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Mike Johnson, Global Cyber Threat & Incident Response Manager, Ver…
  continue reading
 
Ensuring your risk management framework meets your organisation’s needs Ransomware, legacy devices and remote access - risk trends for OT Why you should prioritise risks based on the likelihood of exploitation as well as impact This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Syed Ubaid Ali Jafri, Head of Cyber Defe…
  continue reading
 
How does NIS2 address risks within critical supply chains and information sharing across borders? Maintaining a proactive stance against evolving threats - how continuous improvement complies with NIS2 Ensuring timely compliance - meeting the new requirements in risk assessment and avoiding penalties This episode is hosted by Thom Langford https://…
  continue reading
 
Selecting metrics that best convey the impacts and risks of your strategy to the board How the changing threat landscape will affect your cyber resilience The role cyber insurance plays as a component of your resilience strategy This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Daniel G. Dresner, Professor of Cyberse…
  continue reading
 
Why sharing data means better decisions across your supply chain network Where AI-powered tools can support continuous monitoring and analysis Predicting cyber-risks with AI-driven analytics This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Edd Hardy, Director Cyber and Risk, AlixPartners https://www.linkedin.com/in/…
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Phishing simulations – should you bother? Why phishing simulations can be more trouble than they’re worth, and how you can lead the change Changes can you deploy to incre…
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Is your cyber security approach leaving neurodiverse colleagues behind? Ensuring your digital tools and platforms are accessible to people with neurodiverse traits Implem…
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Can internal audit boost your cyber security readiness? Getting an internal second opinion to help identify your cyber-security weaknesses Auditing your controls, policie…
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: ROI from your SOC - measuring impact and reporting progress Tools for measuring ROI for your SOC - where to look for the greatest impact What are the best capabilities an…
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Improving your cyber resilience with threat intelligence How the changing threat landscape could damage your cyber resilience Implementing the latest threat intelligence …
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Embracing AI tools across your organisation - ensuring you remain secure The opportunities and risks widespread adoption of AI poses to your organisation How infosec thin…
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Securing your Industrial IoT How cyber-threat actors are exploiting Industrial IoT, and what the profile of a typical attack looks like Best practices for managing and mi…
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Helping colleagues recognise and learn from their risky behaviour Enabling a "no-blame" culture where colleagues feel confident reporting their near misses Using examples…
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Building a more inclusive cybersecurity team Avoiding the one-size-fits-all approach to meeting people’s neurodiversity needs Recognising burnout in your neurodiverse sec…
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Why your non-cyber colleagues aren't listening to you How to get your language right when translating the jargon Making your training relevant and interesting How to best…
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Building truly diverse teams Ways to adapt your job adverts and interview techniques that will attract diverse candidates How to reduce qualification expectations to attr…
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: The liability of the CISO - a legal briefing How is personal liability changing, and how should CISOs protect themselves? What are the CISO’s disclosure obligations and w…
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: How much will your next breach cost? Which data do you need to estimate financial loss from a breach? Which risks should CISOs prioritise in a cyber security assessment? …
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Mitigating the cyber risks in your digital supply chai Why the standard prescriptions for addressing supplier risk are challenged when it comes to 4th, 5th and Nth partie…
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Creating a security-conscious culture Adapting security awareness to the way your colleagues see the online world Benchmarking behaviour to get a true representation of c…
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: How do you demonstrate effective cyber resilience to the board? Selecting metrics that best convey the impacts and risks of your strategy Measuring the value to the busin…
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Building an effective infosec strategy for critical Nth-party suppliers Leveraging your relationships to build cyber resilience across your supply chain ecosystem Vendor …
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Leveraging AI to monitor, analyse and respond to threats What are the practical limitations and challenges with deploying AI to respond to threats and incidents Complemen…
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Are you ready to respond to a ransomware attack? Is your playbook robust enough? Stress-testing your playbook with table top exercises Reactive or proactive security - wh…
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Where is your next negligent insider, and what risk do they pose? What to look for in end-user behaviour to identify the negligent insider Training to protect against neg…
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Are infosec leaders emotionally literate enough? Building emotionally intelligent infosec teams and strategies Adapting your security awareness programmes to keep them fr…
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: The evolving role of identity in cyber security With continuous digital transformation, where do digital identities fit in? How does the evolving threat landscape change …
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Detecting imposters and rogue insiders in SaaS applications Preventing and mitigating the impact of stolen credentials Identifying and managing trigger events that may le…
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Delivering measurable cyber risk reduction Advising colleagues to improve security decision-making and reduce cyber risk Practical steps to apply cyber threat intelligenc…
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Protecting yourself and your infosec colleagues How to recognise burnout in your team and reduce employee stress Conducting stress assessments after security incidents an…
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Building competitive advantage with diverse infosec teams Building a diverse-thinking infosec team to address the threats and vulnerabilities your organisation faces Deve…
  continue reading
 
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Bridging your cyber skills gap - training and retaining talent Understaffed and under-trained - how can InfoSec leaders break the cycle? Recruiting for potential and tran…
  continue reading
 
This is the audio-only version of our twice-weekly cyber security talk show, teissTalk. Join us twice a week for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Control in the cloud - are your data transfers secure? How to modernise data handling when integrating with cloud-based solutions? The challenges of mo…
  continue reading
 
This is the audio-only version of our twice-weekly cyber security talk show, teissTalk. Join us twice a week for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: How to answer when your board asks, “Are we secure?” Moving the conversation beyond risk – what other approaches demonstrate security? What strategies …
  continue reading
 
This is the audio-only version of our twice-weekly cyber security talk show, teissTalk. Join us twice a week for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Cyber insurance - living with spiralling costs and reduced coverage Persuading your Board to take out cyber insurance and choosing the best coverage Ho…
  continue reading
 
This is the audio-only version of our twice-weekly cyber security talk show, teissTalk. Join us twice a week for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Where are your email risk blind spots? BEC attacks: understanding how cyber-criminals are using the five types of scams Adapting your training and awar…
  continue reading
 
Loading …

คู่มืออ้างอิงด่วน