teissPodcast - Cracking Cyber Security

teissPodcast - Cracking Cyber Security

The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.

Episodes

March 19, 2026 44 mins
  • How geopolitical disruptions are driving sophisticated supply chain attacks within the energy sector
  • Shifting towards continuous, intelligence-led supply chain risk management to mitigate 4th and 5th party vulnerabilities
  • Best practices on future-proofing the energy sector against next-gen cyber attacks


Thom Langford, Host, teissTalk
https://www.linkedin.com/in/thomlangford/

Justin Kuruvilla, Head of Cyber S...

Listen
Mark as Played
  • Executive cyber liability - new regulations and the responsibility to act
  • Supporting your C-Suite with a framework for defining, tracking, and reporting security KPIs
  • Bridging the gap to your C-Suite - leveraging attack surface management and employee insight for strategic governance

Thom Langford, Host, teissTalk
https://www.linkedin.com/in/thomlangford/

Edd Hardy, Director Cyber Security, AlixPartners
https...

Listen
Mark as Played
  • Identifying the causes and effects of stress and burnout within security teams 
  • Building personal resilience through mindfulness – regulating stress, strengthening focus and enhancing clarity
  • Tech tools to reduce burnout while increasing wellbeing and limiting turnover among security teams

Thom Langford, Host, teissTalk
https://www.linkedin.com/in/thomlangford/

Johann van Duyn, Chief Information Security Officer,...

Listen
Mark as Played
  • Transferable lessons - how overlooking fundamental security and data trust leads to Generative and Agentic AI failures
  • Steps for embedding security checkpoints and governance directly into your AI pipeline
  • Strategies to scale AI safely - avoiding costly retrofits - and positioning security as a key competitive advantage

Thom Langford, Host, teissTalk
https://www.linkedin.com/in/thomlangford/

Tim Roberts, Managing...

Listen
Mark as Played
  • Why fundamental security best-practices are overlooked by SMBs despite advanced threats
  • Addressing the unmanageable digital exposure surface - identifying critical assets to prioritise for investment
  • Scalable actions that enable smaller IT teams to transition from reactive incident response to targeted, proactive cyber defence

Thom Langford, Host, teissTalk
https://www.linkedin.com/in/thomlangford/

Steven Furnell...

Listen
Mark as Played
  • Aligning application and API security with the demands of the modern AI era
  • Enabling secure, high-performance infrastructure for AI and LLM environments
  • Securing APIs and your network without overspending on security

Thom Langford, Host, teissTalk
https://www.linkedin.com/in/thomlangford/

Tiago Rosado, Chief Information Security Office, Asite
https://www.linkedin.com/in/tiagorosado/

Jamison Utter, Fi...

Listen
Mark as Played
  • Understanding the anatomy, infrastructure and automation of modern information-stealing malware
  • Tracking delivery methods, evasion technique and high-value data targets
  • Building effective, multi-layered defences against the prevalent info-stealer families

Thom Langford, Host, teissTalk
https://www.linkedin.com/in/thomlangford/

Jim Walter, Senior Threat Researcher, SentinelOne

Brett Taylor, SE Director UK...

Listen
Mark as Played
  • Exploitable vulnerabilities within OT devices and how this is expected to change
  • Cyber warfare risk in 2026 - how organisations can defend themselves
  • Securing the supply chain and expanding XIoT attack surface


Thom Langford, Host, teissTalk
https://www.linkedin.com/in/thomlangford/

Jordan M. Schroeder, CISO
https://www.linkedin.com/in/schroederjordan/

Zia Ush Shamszaman, Senior Lecturer in Compu...

Listen
Mark as Played
  • How cyber criminals are weaponising AI to defeat your threat detection and response
  • Beyond encryption – how ransomware has evolved to include data exfiltration, publication threats and supply chain compromise
  • How geopolitical tensions are increasing nation-sponsored cyber-campaigns - proxy attacks, IT worker scams and supply chain risks

Thom Langford, Host, teissTalk
https://www.linkedin.com/in/thomlangford/

Ed T...

Listen
Mark as Played
  • How modern ransomware actors are deploying multidimensional tactics to outpace traditional defences
  • Strategies to reduce data loss and sustain business operations after an attack
  • AI and automation – enhancing visibility and accelerating response to ransomware threats

Thom Langford, Host, teissTalk
https://www.linkedin.com/in/thomlangford/

Edward Starkie, Director, GRC | Cyber Risk, Thomas Murray
https://www.l...

Listen
Mark as Played
November 20, 2025 44 mins
  • Identifying critical assets and dependencies to focus investment where impact is highest
  • Designing for rapid recovery with tested runbooks and clear RTO/RPO targets
  • Strengthening resilience through training, playbooks, and cross-functional drills

Thom Langford, Host, teissTalk
https://www.linkedin.com/in/thomlangford/

Scott Hardy, CISO, Sargent-Disc
https://www.linkedin.com/in/scott-hardy-cissp-ccsk-44882a45<...

Listen
Mark as Played
  • Leveraging AI-powered solutions to anticipate, detect and contain asymmetric cyber threats
  • Augmenting security teams through AI efficiencies – reducing alert fatigue whilst improving detection speed and accuracy
  • Best AI security practices on safeguarding critical systems and sensitive data against AI-driven cyber threats

Thom Langford, Host, teissTalk
https://www.linkedin.com/in/thomlangford/

Michela Resta, Solic...

Listen
Mark as Played
  • Bridging the CISO-board disconnect which hinders your cyber-security progress
  • Measuring cyber-risk in financial, economic and operational terms and demonstrating value in cyber-investments
  • Focusing on governance and compliance – how to answer when asked “are we compliant?

Thom Langford, Host, teissTalk
https://www.linkedin.com/in/thomlangford/

Zia Ush Shamszaman, Senior Lecturer in Computer Science, Teesside Univ...

Listen
Mark as Played
  • How appreciation and gamification can improve your employees’ security awareness
  • Making security behaviours stick – reframing mistakes as opportunities for growth
  • Fostering a culture of continuous improvement with an inclusive learning environment

Thom Langford, Host, teissTalk
https://www.linkedin.com/in/thomlangford/

Sara Carty, Founder & CEO, Unboring
https://www.linkedin.com/in/saracarty/

Pen...

Listen
Mark as Played
  • Which techniques and methods use by threat actors are bypassing security parameters
  • Reducing your cyber risk - using lessons learned from recent high-profile attacks
  • Strategies to protect your service desk against identity-based attacks

Thom Langford, Host, teissTalk
https://www.linkedin.com/in/thomlangford/

Paul Holland, Cyber Capability Manager, Royal Mail
https://www.linkedin.com/in/paulinfosec/

L...

Listen
Mark as Played
  • 70% of critical security debt stems from third-party code - what can be done upstream?
  • How real-time threat intelligence and policy enforcement are closing the gap
  • Why DORA and modern CI/CD pipelines demand pre-emptive visibility and automation 

Thom Langford, Host, teissTalk
https://www.linkedin.com/in/thomlangford/

Paul Holland, Cyber Capability Manager, Royal Mail
https://www.linkedin.com/in/paulinfosec/

Listen
Mark as Played
  • Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threats
  • Meeting API compliance and data protection challenges with emerging technologies
  • Moving towards a mature posture for API security

Thom Langford, Host, teissTalk
https://www.linkedin.com/in/thomlangford/

Satyam Rastogi, Director of Information Security & DevOps, BAMKO
https://www.linkedin.com/in/hackersatyamrast...

Listen
Mark as Played
  • Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threats
  • Meeting API compliance and data protection challenges with emerging technologies
  • Moving towards a mature posture for API security

Thom Langford, Host, teissTalk
https://www.linkedin.com/in/thomlangford/

Tiago Rosado, Chief Information Security Officer, Asite
https://www.linkedin.com/in/tiagorosado/

Anne Co...

Listen
Mark as Played
  • Analysing how your teams cope with a cyber incident or a failure scenario
  • Learning from crises - building resilience strategies to mitigate future incidents
  • Building a cyber resilient mindset within your infosec team and in the wider organisation

Thom Langford, Host, teissTalk
https://www.linkedin.com/in/thomlangford/

Raza Sadiq, Head of Enterprise Risk, MQube
https://www.linkedin.com/in/razasadiq7/

...

Listen
Mark as Played
  • Risk-based prioritising using severity scoring and patch analysis
  • Escaping the silo trap - bridging the gap between IT and security teams
  • Automate rules to handle high-severity vulnerabilities and zero-days

Jonathan Craven, Host, teissTalk
https://www.linkedin.com/in/jonathanbcraven/

Tiago Rosado, Chief Information Security Officer, Asite
https://www.linkedin.com/in/tiagorosado/

Cameron Brown, Head of Cyber Th...

Listen
Mark as Played

Popular Podcasts

    If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

    Betrayal Season 5

    Saskia Inwood woke up one morning, knowing her life would never be the same. The night before, she learned the unimaginable – that the husband she knew in the light of day was a different person after dark. This season unpacks Saskia’s discovery of her husband’s secret life and her fight to bring him to justice. Along the way, we expose a crime that is just coming to light. This is also a story about the myth of the “perfect victim:” who gets believed, who gets doubted, and why. We follow Saskia as she works to reclaim her body, her voice, and her life. If you would like to reach out to the Betrayal Team, email us at betrayalpod@gmail.com. Follow us on Instagram @betrayalpod and @glasspodcasts. Please join our Substack for additional exclusive content, curated book recommendations, and community discussions. Sign up FREE by clicking this link Beyond Betrayal Substack. Join our community dedicated to truth, resilience, and healing. Your voice matters! Be a part of our Betrayal journey on Substack.

    Dateline NBC

    Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com

    The Breakfast Club

    The World's Most Dangerous Morning Show, The Breakfast Club, With DJ Envy, Jess Hilarious, And Charlamagne Tha God!

    The Joe Rogan Experience

    The official podcast of comedian Joe Rogan.

Advertise With Us
Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2026 iHeartMedia, Inc.

  • Help
  • Privacy Policy
  • Terms of Use
  • AdChoicesAd Choices