Fortifying security defences with automated root cause analysis and prioritisation Managing security risk urgency across your application pipeline with real-time visibility and data visualisation capabilities Driving efficiency and prioritisation across your security ecosystem with practical remediation actions This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ John Heaton-Armstrong, Experienced Cyber security Leader, Confidential https://www.linkedin.com/in/johnh...
Mar 06, 2025•59 min•Transcript available on Metacast What’s making supply chain risk the fastest-growing cyber-risk category How to galvanise your internal and external peers to develop a shared responsibility for supply chain cyber-risks Designing and implementing effective key controls to mitigate supply chain cyber-risks This episode is hosted by Jonathan Craven: https://www.linkedin.com/in/jonathanbcraven/ Mike Johnson, Global Cyber Threat & Incident Response Manager, Verifone https://www.linkedin.com/in/mike---johnson/ Jean Carlos, Group ...
Feb 27, 2025•45 min•Transcript available on Metacast How the human risk surface area has broadened with GenAI and collaboration tools Prevent breaches by applying the cyber kill chain to human vulnerabilities Strategies to protect employees without compromising productivity This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Daniela Almeida Lourenco, Chief Information Security Officer, Dutch Financial Services https://www.linkedin.com/in/daniela-almeida-lourenco/ Rebecca Stephenson, Specialist Lead Lecturer, Highland...
Feb 20, 2025•43 min•Transcript available on Metacast How cyber-crime continues to evolve and what this means for enterprise threat intelligence strategies Evaluating sources and deciding which characteristics are most relevant How DNS-based threat intelligence versus a malware-centric approach disrupts industrialised cyber-crime This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Todd Wade, Chief Information Security Officer https://www.linkedin.com/in/twade/ Matt Hardy, Senior Information Security Executive https://...
Feb 06, 2025•44 min•Transcript available on Metacast Automating SecOps processes and procedures - free your people, improve retention and increase productivity Where creativity and diversity is keeping your SecOps one step ahead of the attackers Matching your effectiveness to organisational objectives - aligning your internal SOC metrics with those required by the board This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Prince Adu, Board Member - ISACA Accra Chapter, ISACA https://www.linkedin.com/in/prince-adu-ccsp...
Jan 30, 2025•45 min•Transcript available on Metacast How evolving methods of work are expanding the attack surface Growth of supply chain attacks targeting devices touching sensitive data Increased nation-state targeting of Critical National Infrastructure This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Richard Absalom, Principal Research Analyst, Information Security Forum (ISF) https://uk.linkedin.com/in/richard-absalom-48879116 Tom O’Driscoll, Head of Security Strategy and Intelligence, National Highways https...
Dec 12, 2024•46 min•Transcript available on Metacast Diverse threat vectors and complex attacks - how to expand your detection and response programmes Helping your SOC analysts achieve more - finding the right combination of internal ML/AI tools and external providers Pathways to accelerate your SOC development to detect and mitigate attacks earlier This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Mike Johnson, Global Cyber Threat & Incident Response Manager, Verifone https://www.linkedin.com/in/mike---johnson...
Dec 05, 2024•46 min•Transcript available on Metacast Identifying which data assets to prioritise Building an enterprise-level cyber-security profile on a budget Strengthening your cyber-resilience with incident response playbooks This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Steven Furnell, Professor of Cyber Security, University of Nottingham https://www.linkedin.com/in/stevenfurnell/ Jean Carlos, VP of Information Security, AutogenAI https://www.linkedin.com/in/jeanpc/ Stephanie Lynch-Ozanar, Education and Aw...
Nov 28, 2024•45 min•Transcript available on Metacast Minimising the risks to your security posture from developers’ reliance on GenAI Using AI to speed up remediation and avoid security becoming the bottleneck Steps to ensure safe and secure implementation of GenAI in software development This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Lee Munson, Principal Research Analyst, Information Security Forum https://www.linkedin.com/in/lmunson/ Zia Ush Shamszaman, Senior Lecturer , Computer Science, Teesside University ...
Nov 21, 2024•43 min•Transcript available on Metacast Why the traditional malware-centric approach to security doesn’t enable proactive protection Pre-empting and protecting attacks before they are launched - looking at the threat actors attack infrastructure Emergent domains, what are they and why they need a layered detection This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ John Rouffas, Cyber Security Executive, Author & Journalist, CyberEdBoard Community https://www.linkedin.com/in/drjohnrouffas/ Francis An...
Nov 14, 2024•45 min•Transcript available on Metacast Where does Zero Trust fall short, and why these failings encourage cyber-crime Expanding Zero Trust to protect the data itself Identifying, classifying, and securing sensitive data through automation This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Jean Carlos, VP Cyber Security, BOXT https://www.linkedin.com/in/jeanpc/ Sasha Henry, Senior Managing Consultant, Cyxcel https://www.linkedin.com/in/alexandra-pavelovna-henry-32b98465/?originalSubdomain=uk Karim Eldef...
Oct 24, 2024•45 min•Transcript available on Metacast Leveraging behavioural AI to mitigate the risk of phishing attacks Fortifying your defenses against the next wave of phishing threats Practical strategies for empowering colleagues while strengthening your cyber resilience This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Rebecca Stephenson, Specialist Lead Lecturer in Digital Pedagogy, Government of Jersey https://www.linkedin.com/in/creative-minds-in-cyber/ Ben Wynn-Jones, Information Awareness Lead, Canon EMEA ...
Oct 17, 2024•41 min•Transcript available on Metacast Meeting your operational and legal obligations - getting your foundations in order Cyber-proofing your organisation with comprehensive cyber-security training and awareness Developing cyber-hygiene to defend against cyber-criminals using emerging technology This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Paul Holland, Head of Research, Information Security Forum (ISF) https://www.linkedin.com/in/paulinfosec/ Penny Jackson, Director Strategy, Awareness & Enga...
Oct 03, 2024•45 min•Transcript available on Metacast A proactive approach to third-party risk - continuous monitoring of suppliers Using threat intelligence to identify third-party risk Effectively working with partners to mitigate third-party security risks This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Chuck Brooks, Adjunct Professor, Georgetown University https://www.linkedin.com/in/chuckbrooks/ Victoria van Roosmalen, CISO & CPO, Coosto https://www.linkedin.com/in/victoriavanroosmalen/ Stuart Frost, Head ...
Sep 26, 2024•44 min•Transcript available on Metacast How the next generation of InfoSec leaders can better prepare themselves to navigate the threats of tomorrow Identifying the quick wins and making the most of the finite time new CISOs have to get their message across Practical measures for reducing stress, burnout and frustration within InfoSec teams over the longer term This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Paul Watts, Distinguished Analyst, Information Security Forum (ISF) https://www.linkedin.com/i...
Jul 18, 2024•45 min•Transcript available on Metacast Gaining comprehensive visibility across your hybrid and multi-cloud environments Mitigating hidden threats and vulnerabilities beyond your endpoints and network parameters Maximising your cyber security investments with better visibility and optimised tool performance This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Dr Edewede Oriwoh, Group IT Information and Cyber Security Manager, Zigup Plc https://www.linkedin.com/in/edewedeoriwoh/ Lessie Skiba, Global Directo...
Jul 04, 2024•47 min•Transcript available on Metacast Threat trends - how threat actors are targeting C-Suite executives to access the enterprise Empowering your C-Suite to identify and avoid social engineering Creating social media policies that your C-Suite understand so that they can lead by example This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Thomas Wendrich, Associate Partner, IBM https://www.linkedin.com/in/thomas-wendrich-5470672 Jacqueline Hanson-Kotei, Senior Manager, Enterprise Information Security &am...
Jun 27, 2024•46 min•Transcript available on Metacast Protecting your endpoints - how do cybercriminals exfiltrate data, and what trends are we seeing? Mitigating the financial, legal, and reputational risks with a comprehensive data strategy Leveraging next-generation technology to rapidly detect and respond to data exfiltrating ransomware attacks This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Neil Hare-Brown, CEO, STORM Guidance https://www.linkedin.com/in/neilhb Prince Adu, Board Member - ISACA Accra Chapter, I...
Jun 13, 2024•45 min•Transcript available on Metacast How you can reduce data loss resulting from user error, disgruntled employees, or cyber attacks Leveraging existing and emerging technologies to enhance your preparedness against the latest attack vectors and threat actors Investing in autonomous and integrated security platforms without breaking the bank This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Dhruva Pudel, Head of Cyber security, Skillcast Group plc https://www.linkedin.com/in/dhruv-cyber/ Kai Michael ...
May 30, 2024•45 min•Transcript available on Metacast Building rapport with the board through persuasive communication skills Leveraging your influence to drive business change and manage cyber risks Measuring the impact of your actions and advice This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Alan Jenkins, Principal Consultant, Cyber Security Navigator Ltd https://www.linkedin.com/in/alanjenkins/ Graydon McKee, Senior Director Cybersecurity Engineering, Visa https://www.linkedin.com/in/graydon-mckee/ Laurie Gibbe...
May 16, 2024•45 min•Transcript available on Metacast The privacy challenges of using the network as your fundemental point of defence Whether InfoSec leaders can ever get full network visibility Setting privacy controls to reduce vulnerabilities and blindspots within your network This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Tom Ellis-Aziz, Associate Director, Control Risks https://www.linkedin.com/in/tomasellis-aziz/ Raul Zeppenfeldt, Principal Consultant, PA Consulting https://www.linkedin.com/in/raul-z-91198b...
May 02, 2024•45 min•Transcript available on Metacast Proving that your infosec strategy delivers a competitive advantage Managing the risks and costs of a business-enabling infosec team Balancing business objectives with infosec needs to deliver security and growth This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Alan Jenkins, Principal Consultant, Cyber Security Navigator Ltd https://www.linkedin.com/in/alanjenkins/ Garrett Smiley, Adjunct Dissertation Chair / Distinguished Core Part-Time Professor, National Unive...
Apr 25, 2024•45 min•Transcript available on Metacast How infosec leaders can support product teams incorporating generative AI Using AI to improve compliance processes and ongoing vulnerability monitoring Mitigating and minimising AI-based information security risks with ISO 42001 This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Dean Sapp, SVP, Information Security, Privacy, Risk and Compliance (DPO), Filevine https://www.linkedin.com/in/deansapp/ Jonathan Craven, Privacy and Compliance Lead, UK, iRhythm Technologi...
Apr 11, 2024•47 min•Transcript available on Metacast Closing the cybersecurity gap - acting fast against critical threats Aligning to current compliance standards without the heavy-lifting Leveraging AI-powered tools to maximise your security investments This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Mike Johnson, Global Cyber Threat & Incident Response Manager, Verifone https://www.linkedin.com/in/mike---johnson/ Matt Hardy, Head of Security, Liberis https://www.linkedin.com/in/matthardy67/ Kiarash Kia, Foun...
Apr 05, 2024•46 min•Transcript available on Metacast Ensuring your risk management framework meets your organisation’s needs Ransomware, legacy devices and remote access - risk trends for OT Why you should prioritise risks based on the likelihood of exploitation as well as impact This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Syed Ubaid Ali Jafri, Head of Cyber Defence & Offensive Security, HBL - Habib Bank Limited https://www.linkedin.com/in/ubaidjafri Giles Dunn, Partner & OT Cyber Security leader, EY h...
Mar 29, 2024•46 min•Transcript available on Metacast How does NIS2 address risks within critical supply chains and information sharing across borders? Maintaining a proactive stance against evolving threats - how continuous improvement complies with NIS2 Ensuring timely compliance - meeting the new requirements in risk assessment and avoiding penalties This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Jay Moloo, Corporate Information Security Officer, DB Schenker https://www.linkedin.com/in/jaymoloo/ Lee Elliott, Di...
Mar 22, 2024•42 min•Transcript available on Metacast Selecting metrics that best convey the impacts and risks of your strategy to the board How the changing threat landscape will affect your cyber resilience The role cyber insurance plays as a component of your resilience strategy This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Daniel G. Dresner, Professor of Cybersecurity, University of Manchester https://www.linkedin.com/in/danny-dresner-fciis-6382381 Mike Yeomans, Manager, Cyber Risk Quantification Service Deli...
Mar 15, 2024•44 min•Transcript available on Metacast Why sharing data means better decisions across your supply chain network Where AI-powered tools can support continuous monitoring and analysis Predicting cyber-risks with AI-driven analytics This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Edd Hardy, Director Cyber and Risk, AlixPartners https://www.linkedin.com/in/eddhardy/ Jean Carlos, VP of Information Security, AutogenAI https://www.linkedin.com/in/jeanpc/...
Feb 23, 2024•46 min•Transcript available on Metacast This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Phishing simulations – should you bother? Why phishing simulations can be more trouble than they’re worth, and how you can lead the change Changes can you deploy to increase staff diligence and keep security front and centre How phishing simulations can match the latest threat trends This episode is hosted by Thom Lang...
Feb 15, 2024•46 min•Transcript available on Metacast This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Is your cyber security approach leaving neurodiverse colleagues behind? Ensuring your digital tools and platforms are accessible to people with neurodiverse traits Implementing security measures that protect neurodiverse users from active cyber-threats Promoting an inclusive approach to cyber-security across the organi...
Feb 01, 2024•46 min•Transcript available on Metacast