teissPodcast - Cracking Cyber Security

teissPodcast - Cracking Cyber Security

The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.

Episodes

June 26, 2025 47 mins
  • Risk-based prioritising using severity scoring and patch analysis
  • Escaping the silo trap - bridging the gap between IT and security teams
  • Automate rules to handle high-severity vulnerabilities and zero-days

Jonathan Craven, Host, teissTalk
https://www.linkedin.com/in/jonathanbcraven/

Tiago Rosado, Chief Information Security Officer, Asite
https://www.linkedin.com/in/tiagorosado/

Cameron Brown, Head of Cyber Th...

Mark as Played
  • How cyber criminals are using AI tools to scale malicious operations
  • Streamlining user experience with biometrics or device-based authentication
  • Making your organisation cyber resilient and securing critical systems as AI continues to advance

Featuring: 

Thom Langford, Host, teissTalk
https://www.linkedin.com/in/thomlangford/

Derek Hanson, VP Solutions Architecture and Alliances, Yubico
https://www.linkedin.co...

Mark as Played
  • Which behaviours increase risk and how we can measurably change them 
  • Driving employee engagement without incentives 
  • Which real-time interventions encourage safer employee behaviours 

Jonathan Craven, Host, teissTalk
https://www.linkedin.com/in/jonathanbcraven/

Rebecca Stephenson, Specialist Lead Lecturer, Highlands College
https://www.linkedin.com/in/creative-minds-in-cyber/

Penny Jackson, Director...

Mark as Played
  • Reducing personal risk with your organisation’s liability insurance 
  • Understanding the evolving risk landscape through recent case studies 
  • Creating a workplace ethos of shared accountability 

This episode is hosted by Thom Langford
https://www.linkedin.com/in/thomlangford/

Michela Resta, Solicitor, CYXCEL
https://www.linkedin.com/in/michelarestacyxcel/

Kelly Hagedorn, Partner, ALSTON & BIRD
https://ww...

Mark as Played
  • Trends in the current credential theft landscape and changing compliance standards
  • Strategies to reduce password risk - continuous scanning, enforced policies and exclusion dictionaries
  • Encouraging users to create strong, securely stored passwords without reuse

This episode is hosted by Thom Langford
https://www.linkedin.com/in/thomlangford/

Shannon Muller, Cyber security Specialist, Microsoft
https://www.lin...

Mark as Played
  • What DORA is specifically asking of organisations
  • Where the likely CTI gaps are when attempting to align with DORA
  • Why innovation is key to aligning your CTI capabilities

This episode is hosted by Thom Langford
https://www.linkedin.com/in/thomlangford/

Benoit Heynderickx, Principal Analyst, Information Security Forum (ISF)
https://www.linkedin.com/in/benoithey/

Tim Parker, Chair, South West Cyber Sec...

Mark as Played
  • Preparing for ransomware - where is your data and how is it protected? 
  • Building cyber resilience for your data, across on-premises and cloud 
  • Reducing the window of damage and minimising the time to recover 

This episode is hosted by Thom Langford
https://www.linkedin.com/in/thomlangford/

Heather Lowrie, Independent Advisor, Earthgard Ltd
https://www.linkedin.com/in/heather-lowrie/

Raza Sadiq, Head ...

Mark as Played
  • Identifying and removing barriers to cyber resilience
  • Reducing complexity - consolidating and eliminating legacy systems
  • Building a cyber-resilient organisation - moving from a reactive to a proactive model 

This episode is hosted by Thom Langford:
https://www.linkedin.com/in/jonathanbcraven/

Heather Lowrie, Independent Advisor, Earthgard Ltd
https://www.linkedin.com/in/heather-lowrie/

Sasha Henry, C...

Mark as Played
  • Where metrics and evaluations fall short in measuring holistic security effectiveness 
  • Identifying gaps between tools and determining which gaps you need to fill 
  • Showing the board and the business that cyber-security is moving the needle on resilience 

This episode is hosted by Jonathan Craven:
https://www.linkedin.com/in/jonathanbcraven/

Richard Absalom, Principal Research Analyst, Information Security Forum (I...

Mark as Played
  • How cyber-attackers are using GenAI to evade detection by security systems
  • Safeguarding against sophisticated ransomware attacks with robust security measures
  • Top tactics for stopping ransomware attacks before they cause damage

This episode is hosted by Thom Langford:
https://www.linkedin.com/in/thomlangford/

John Heaton-Armstrong, Experienced Cyber security Leader, Confidential
https://www.linkedin.com/in/jo...

Mark as Played
  • Whether compliance-as-security in CNI offers security or false confidence
  • Navigating tool and dashboard complexity to avoid CNI cyber blind spots 
  • Attracting cyber talent into CNI and away from finance and tech 

This episode is hosted by Jonathan Craven:
https://www.linkedin.com/in/thomlangford/

Sofia Martinez Gomez, VP, Risk & Tech Practice - Cybersecurity, Privacy & Compliance, AlixPartners
https://...

Mark as Played
  • Fortifying security defences with automated root cause analysis and prioritisation
  • Managing security risk urgency across your application pipeline with real-time visibility and data visualisation capabilities
  • Driving efficiency and prioritisation across your security ecosystem with practical remediation actions

This episode is hosted by Thom Langford:
https://www.linkedin.com/in/thomlangford/

John Heaton-Armstron...

Mark as Played
  • What’s making supply chain risk the fastest-growing cyber-risk category
  • How to galvanise your internal and external peers to develop a shared responsibility for supply chain cyber-risks
  • Designing and implementing effective key controls to mitigate supply chain cyber-risks 

This episode is hosted by Jonathan Craven:
https://www.linkedin.com/in/jonathanbcraven/

Mike Johnson, Global Cyber Threat & Incident Respo...

Mark as Played
February 20, 2025 42 mins
  • How the human risk surface area has broadened with GenAI and collaboration tools 
  • Prevent breaches by applying the cyber kill chain to human vulnerabilities 
  • Strategies to protect employees without compromising productivity 

This episode is hosted by Thom Langford:
https://www.linkedin.com/in/thomlangford/

Daniela Almeida Lourenco, Chief Information Security Officer, Dutch Financial Services
https://www.linke...

Mark as Played
  • How cyber-crime continues to evolve and what this means for enterprise threat intelligence strategies
  • Evaluating sources and deciding which characteristics are most relevant
  • How DNS-based threat intelligence versus a malware-centric approach disrupts industrialised cyber-crime

This episode is hosted by Thom Langford:
https://www.linkedin.com/in/thomlangford/

Todd Wade, Chief Information Security Officer
https...

Mark as Played
  • Automating SecOps processes and procedures - free your people, improve retention and increase productivity
  • Where creativity and diversity is keeping your SecOps one step ahead of the attackers
  • Matching your effectiveness to organisational objectives - aligning your internal SOC metrics with those required by the board

This episode is hosted by Thom Langford:
https://www.linkedin.com/in/thomlangford/

Prince Adu, B...

Mark as Played
  • How evolving methods of work are expanding the attack surface
  • Growth of supply chain attacks targeting devices touching sensitive data
  • Increased nation-state targeting of Critical National Infrastructure

This episode is hosted by Thom Langford:
https://www.linkedin.com/in/thomlangford/

Richard Absalom, Principal Research Analyst, Information Security Forum (ISF)
https://uk.linkedin.com/in/richard-absalom-4887...

Mark as Played
  • Diverse threat vectors and complex attacks - how to expand your detection and response programmes
  • Helping your SOC analysts achieve more - finding the right combination of internal ML/AI tools and external providers
  • Pathways to accelerate your SOC development to detect and mitigate attacks earlier 

This episode is hosted by Thom Langford:
https://www.linkedin.com/in/thomlangford/

Mike Johnson, Global Cyber Threat...

Mark as Played
  • Identifying which data assets to prioritise 
  • Building an enterprise-level cyber-security profile on a budget 
  • Strengthening your cyber-resilience with incident response playbooks 

This episode is hosted by Thom Langford:
https://www.linkedin.com/in/thomlangford/

Steven Furnell, Professor of Cyber Security, University of Nottingham
https://www.linkedin.com/in/stevenfurnell/

Jean Carlos, VP of Information Securi...

Mark as Played
  • Minimising the risks to your security posture from developers’ reliance on GenAI
  • Using AI to speed up remediation and avoid security becoming the bottleneck
  • Steps to ensure safe and secure implementation of GenAI in software development

This episode is hosted by Thom Langford:
https://www.linkedin.com/in/thomlangford/

Lee Munson, Principal Research Analyst, Information Security Forum
https://www.linkedin.com/...

Mark as Played

Popular Podcasts

    United States of Kennedy is a podcast about our cultural fascination with the Kennedy dynasty. Every week, hosts Lyra Smith and George Civeris go into one aspect of the Kennedy story.

    Stuff You Should Know

    If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

    Dateline NBC

    Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com

    The Clay Travis and Buck Sexton Show

    The Clay Travis and Buck Sexton Show. Clay Travis and Buck Sexton tackle the biggest stories in news, politics and current events with intelligence and humor. From the border crisis, to the madness of cancel culture and far-left missteps, Clay and Buck guide listeners through the latest headlines and hot topics with fun and entertaining conversations and opinions.

    Crime Junkie

    Does hearing about a true crime case always leave you scouring the internet for the truth behind the story? Dive into your next mystery with Crime Junkie. Every Monday, join your host Ashley Flowers as she unravels all the details of infamous and underreported true crime cases with her best friend Brit Prawat. From cold cases to missing persons and heroes in our community who seek justice, Crime Junkie is your destination for theories and stories you won’t hear anywhere else. Whether you're a seasoned true crime enthusiast or new to the genre, you'll find yourself on the edge of your seat awaiting a new episode every Monday. If you can never get enough true crime... Congratulations, you’ve found your people. Follow to join a community of Crime Junkies! Crime Junkie is presented by audiochuck Media Company.

Advertise With Us
Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.