<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://rss.buzzsprout.com/180185.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>teissPodcast - Cracking Cyber Security</title>

  <lastBuildDate>Thu, 16 Apr 2026 09:11:38 +0100</lastBuildDate>
  <link>https://www.teiss.co.uk</link>
  <language>en-gb</language>
  <copyright>© 2026 teissPodcast - Cracking Cyber Security</copyright>
  <podcast:locked>yes</podcast:locked>
    <podcast:guid>9709f429-a546-5cd8-81e9-54f7e29a0266</podcast:guid>
  <itunes:author>TEISS</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:keywords>cyber security, info security, cyber attack</itunes:keywords>
  <itunes:owner>
    <itunes:name>TEISS</itunes:name>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/bwmm1vviz8hj3brupugaq5jmnxyu?.jpg</url>
     <title>teissPodcast - Cracking Cyber Security</title>
     <link>https://www.teiss.co.uk</link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/bwmm1vviz8hj3brupugaq5jmnxyu?.jpg" />
  <itunes:category text="Business">
    <itunes:category text="Management" />
  </itunes:category>
  <itunes:category text="Technology" />
  <itunes:category text="News">
    <itunes:category text="Tech News" />
  </itunes:category>
  <item>
    <itunes:title>teissTalk: Securing your organisation in the age of GenAI</itunes:title>
    <title>teissTalk: Securing your organisation in the age of GenAI</title>
    <itunes:summary><![CDATA[Enabling GenAI safely while protecting sensitive data across users, employees and AI-enabled toolsManaging agentic AI risk through improved visibility, governance, and control across the attack surfaceLeveraging AI to strengthen cyber defence – identifying and preventing zero-day threatsThom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/  David Cartwright, CISO, Santander International https://www.linkedin.com/in/davidscartwright/  Lisa Ventura,  Chief Executive and ...]]></itunes:summary>
    <description><![CDATA[<ul><li>Enabling GenAI safely while protecting sensitive data across users, employees and AI-enabled tools</li><li>Managing agentic AI risk through improved visibility, governance, and control across the attack surface</li><li>Leveraging AI to strengthen cyber defence – identifying and preventing zero-day threats</li></ul><p>Thom Langford, Host, teissTalk<br/>https://www.linkedin.com/in/thomlangford/<br/><br/>David Cartwright, CISO, Santander International<br/>https://www.linkedin.com/in/davidscartwright/<br/><br/>Lisa Ventura,  Chief Executive and Founder, AI and Cyber Security Association<br/>https://www.linkedin.com/in/lisasventura/<br/><br/>Nina Pettersen, Senior Manager, Gritera Security<br/>https://www.linkedin.com/in/nina-pettersen-46904773/<br/><br/>Lionel Litty, CISO, Menlo<br/>https://www.linkedin.com/in/lionellitty/</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Enabling GenAI safely while protecting sensitive data across users, employees and AI-enabled tools</li><li>Managing agentic AI risk through improved visibility, governance, and control across the attack surface</li><li>Leveraging AI to strengthen cyber defence – identifying and preventing zero-day threats</li></ul><p>Thom Langford, Host, teissTalk<br/>https://www.linkedin.com/in/thomlangford/<br/><br/>David Cartwright, CISO, Santander International<br/>https://www.linkedin.com/in/davidscartwright/<br/><br/>Lisa Ventura,  Chief Executive and Founder, AI and Cyber Security Association<br/>https://www.linkedin.com/in/lisasventura/<br/><br/>Nina Pettersen, Senior Manager, Gritera Security<br/>https://www.linkedin.com/in/nina-pettersen-46904773/<br/><br/>Lionel Litty, CISO, Menlo<br/>https://www.linkedin.com/in/lionellitty/</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/19025073-teisstalk-securing-your-organisation-in-the-age-of-genai.mp3" length="32123161" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-19025073</guid>
    <pubDate>Thu, 16 Apr 2026 08:00:00 +0100</pubDate>
    <itunes:duration>2672</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Geopolitics &amp; Regulation - Reshaping the Energy Sector’s Supply Chain Risk</itunes:title>
    <title>teissTalk: Geopolitics &amp; Regulation - Reshaping the Energy Sector’s Supply Chain Risk</title>
    <itunes:summary><![CDATA[How geopolitical disruptions are driving sophisticated supply chain attacks within the energy sectorShifting towards continuous, intelligence-led supply chain risk management to mitigate 4th and 5th party vulnerabilitiesBest practices on future-proofing the energy sector against next-gen cyber attacks Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/  Justin Kuruvilla, Head of Cyber Security, Risk Ledger https://www.linkedin.com/in/justin-kuruvilla-680a50257/  John Reil...]]></itunes:summary>
    <description><![CDATA[<ul><li>How geopolitical disruptions are driving sophisticated supply chain attacks within the energy sector</li><li>Shifting towards continuous, intelligence-led supply chain risk management to mitigate 4th and 5th party vulnerabilities</li><li>Best practices on future-proofing the energy sector against next-gen cyber attacks</li></ul><p><br/>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Justin Kuruvilla, Head of Cyber Security,<b> Risk Ledger</b><br/>https://www.linkedin.com/in/justin-kuruvilla-680a50257/<br/><br/>John Reilly, Cyber Security and Governance Lead,<b> UK Power Networks</b><br/>https://www.linkedin.com/in/john-reilly-a3848669/<br/><br/>Joseph Couture, Regional Information Security Officer,<b> Ørsted</b><br/>https://www.linkedin.com/in/josephcouture/<br/><br/>Adam Callaghan, Cyber Risk Management Specialist,<b> Wales and West Utilities</b><br/>https://www.linkedin.com/in/adam-c-8583a833/</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>How geopolitical disruptions are driving sophisticated supply chain attacks within the energy sector</li><li>Shifting towards continuous, intelligence-led supply chain risk management to mitigate 4th and 5th party vulnerabilities</li><li>Best practices on future-proofing the energy sector against next-gen cyber attacks</li></ul><p><br/>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Justin Kuruvilla, Head of Cyber Security,<b> Risk Ledger</b><br/>https://www.linkedin.com/in/justin-kuruvilla-680a50257/<br/><br/>John Reilly, Cyber Security and Governance Lead,<b> UK Power Networks</b><br/>https://www.linkedin.com/in/john-reilly-a3848669/<br/><br/>Joseph Couture, Regional Information Security Officer,<b> Ørsted</b><br/>https://www.linkedin.com/in/josephcouture/<br/><br/>Adam Callaghan, Cyber Risk Management Specialist,<b> Wales and West Utilities</b><br/>https://www.linkedin.com/in/adam-c-8583a833/</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/18873460-teisstalk-geopolitics-regulation-reshaping-the-energy-sector-s-supply-chain-risk.mp3" length="32198764" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18873460</guid>
    <pubDate>Thu, 19 Mar 2026 08:00:00 +0000</pubDate>
    <itunes:duration>2678</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Cybersecurity as a business metric - giving your C-Suite the data to govern</itunes:title>
    <title>teissTalk: Cybersecurity as a business metric - giving your C-Suite the data to govern</title>
    <itunes:summary><![CDATA[Executive cyber liability - new regulations and the responsibility to actSupporting your C-Suite with a framework for defining, tracking, and reporting security KPIsBridging the gap to your C-Suite - leveraging attack surface management and employee insight for strategic governanceThom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/  Edd Hardy, Director Cyber Security, AlixPartners https://www.linkedin.com/in/eddhardy  Björn Orri Guðmundsson, CEO &amp; Founder, Aftra https...]]></itunes:summary>
    <description><![CDATA[<ul><li>Executive cyber liability - new regulations and the responsibility to act</li><li>Supporting your C-Suite with a framework for defining, tracking, and reporting security KPIs</li><li>Bridging the gap to your C-Suite - leveraging attack surface management and employee insight for strategic governance</li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Edd Hardy, Director Cyber Security, <b>AlixPartners</b><br/>https://www.linkedin.com/in/eddhardy<br/><br/>Björn Orri Guðmundsson, CEO &amp; Founder,<b> Aftra</b><br/>https://www.linkedin.com/in/bj%C3%B6rn-orri-gu%C3%B0mundsson-b7b62527</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Executive cyber liability - new regulations and the responsibility to act</li><li>Supporting your C-Suite with a framework for defining, tracking, and reporting security KPIs</li><li>Bridging the gap to your C-Suite - leveraging attack surface management and employee insight for strategic governance</li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Edd Hardy, Director Cyber Security, <b>AlixPartners</b><br/>https://www.linkedin.com/in/eddhardy<br/><br/>Björn Orri Guðmundsson, CEO &amp; Founder,<b> Aftra</b><br/>https://www.linkedin.com/in/bj%C3%B6rn-orri-gu%C3%B0mundsson-b7b62527</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/18834380-teisstalk-cybersecurity-as-a-business-metric-giving-your-c-suite-the-data-to-govern.mp3" length="30781570" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18834380</guid>
    <pubDate>Thu, 12 Mar 2026 08:00:00 +0000</pubDate>
    <itunes:duration>2560</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Why your security team is burned out and what to do about it</itunes:title>
    <title>teissTalk: Why your security team is burned out and what to do about it</title>
    <itunes:summary><![CDATA[Identifying the causes and effects of stress and burnout within security teams Building personal resilience through mindfulness – regulating stress, strengthening focus and enhancing clarityTech tools to reduce burnout while increasing wellbeing and limiting turnover among security teamsThom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/  Johann van Duyn, Chief Information Security Officer, DO &amp; CO https://www.linkedin.com/in/johannvanduyn/  Don Gibson, Chief Inf...]]></itunes:summary>
    <description><![CDATA[<ul><li>Identifying the causes and effects of stress and burnout within security teams </li><li>Building personal resilience through mindfulness – regulating stress, strengthening focus and enhancing clarity</li><li>Tech tools to reduce burnout while increasing wellbeing and limiting turnover among security teams</li></ul><p>Thom Langford, Host, teissTalk<br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Johann van Duyn, Chief Information Security Officer, DO &amp; CO<br/>https://www.linkedin.com/in/johannvanduyn/<br/><br/>Don Gibson, Chief Information Security Officer<br/>https://www.linkedin.com/in/don-gibson-cyber/<br/><br/>Cavan Fabris, Partner - Head of Data &amp; Cyber, RPC<br/>https://www.linkedin.com/in/cavan-fabris/</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Identifying the causes and effects of stress and burnout within security teams </li><li>Building personal resilience through mindfulness – regulating stress, strengthening focus and enhancing clarity</li><li>Tech tools to reduce burnout while increasing wellbeing and limiting turnover among security teams</li></ul><p>Thom Langford, Host, teissTalk<br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Johann van Duyn, Chief Information Security Officer, DO &amp; CO<br/>https://www.linkedin.com/in/johannvanduyn/<br/><br/>Don Gibson, Chief Information Security Officer<br/>https://www.linkedin.com/in/don-gibson-cyber/<br/><br/>Cavan Fabris, Partner - Head of Data &amp; Cyber, RPC<br/>https://www.linkedin.com/in/cavan-fabris/</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/18788826-teisstalk-why-your-security-team-is-burned-out-and-what-to-do-about-it.mp3" length="33894918" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18788826</guid>
    <pubDate>Thu, 05 Mar 2026 08:00:00 +0000</pubDate>
    <itunes:duration>2819</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Building a trusted security model for Generative and Agentic AI</itunes:title>
    <title>teissTalk: Building a trusted security model for Generative and Agentic AI</title>
    <itunes:summary><![CDATA[Transferable lessons - how overlooking fundamental security and data trust leads to Generative and Agentic AI failuresSteps for embedding security checkpoints and governance directly into your AI pipelineStrategies to scale AI safely - avoiding costly retrofits - and positioning security as a key competitive advantageThom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/  Tim Roberts, Managing Director, AlixPartners https://www.linkedin.com/in/thrroberts  Satyam Rastogi, Dir...]]></itunes:summary>
    <description><![CDATA[<ul><li>Transferable lessons - how overlooking fundamental security and data trust leads to Generative and Agentic AI failures</li><li>Steps for embedding security checkpoints and governance directly into your AI pipeline</li><li>Strategies to scale AI safely - avoiding costly retrofits - and positioning security as a key competitive advantage</li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Tim Roberts, Managing Director, <b>AlixPartners</b><br/>https://www.linkedin.com/in/thrroberts<br/><br/>Satyam Rastogi, Director of Information Security &amp; DevOps, <b>BAMKO</b><br/>https://www.linkedin.com/in/hackersatyamrastogi/<br/><br/>Deryck Mitchelson, Head of Global CISO Team &amp; C-Suite Advisor, <b>Check Point</b><br/>https://www.linkedin.com/in/deryckmitchelson</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Transferable lessons - how overlooking fundamental security and data trust leads to Generative and Agentic AI failures</li><li>Steps for embedding security checkpoints and governance directly into your AI pipeline</li><li>Strategies to scale AI safely - avoiding costly retrofits - and positioning security as a key competitive advantage</li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Tim Roberts, Managing Director, <b>AlixPartners</b><br/>https://www.linkedin.com/in/thrroberts<br/><br/>Satyam Rastogi, Director of Information Security &amp; DevOps, <b>BAMKO</b><br/>https://www.linkedin.com/in/hackersatyamrastogi/<br/><br/>Deryck Mitchelson, Head of Global CISO Team &amp; C-Suite Advisor, <b>Check Point</b><br/>https://www.linkedin.com/in/deryckmitchelson</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/18729999-teisstalk-building-a-trusted-security-model-for-generative-and-agentic-ai.mp3" length="31929785" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18729999</guid>
    <pubDate>Thu, 26 Feb 2026 08:00:00 +0000</pubDate>
    <itunes:duration>2656</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk:The confidence gap - moving SMBs from reactive to proactive cyber security</itunes:title>
    <title>teissTalk:The confidence gap - moving SMBs from reactive to proactive cyber security</title>
    <itunes:summary><![CDATA[Why fundamental security best-practices are overlooked by SMBs despite advanced threatsAddressing the unmanageable digital exposure surface - identifying critical assets to prioritise for investmentScalable actions that enable smaller IT teams to transition from reactive incident response to targeted, proactive cyber defenceThom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/  Steven Furnell, Professor of Cyber Security, University of Nottingham https://www.linkedin.com/in...]]></itunes:summary>
    <description><![CDATA[<ul><li>Why fundamental security best-practices are overlooked by SMBs despite advanced threats</li><li>Addressing the unmanageable digital exposure surface - identifying critical assets to prioritise for investment</li><li>Scalable actions that enable smaller IT teams to transition from reactive incident response to targeted, proactive cyber defence</li></ul><p>Thom Langford, Host,<b> teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Steven Furnell, Professor of Cyber Security, <b>University of Nottingham</b><br/>https://www.linkedin.com/in/stevenfurnell/<br/><br/>Edd Hardy, Director Cyber Security, <b>AlixPartners</b><br/>https://www.linkedin.com/in/eddhardy<br/><br/>Suvi Silvanto, Director, Product Marketing, <b>WithSecure</b><br/>https://www.linkedin.com/in/suvi-silvanto/</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Why fundamental security best-practices are overlooked by SMBs despite advanced threats</li><li>Addressing the unmanageable digital exposure surface - identifying critical assets to prioritise for investment</li><li>Scalable actions that enable smaller IT teams to transition from reactive incident response to targeted, proactive cyber defence</li></ul><p>Thom Langford, Host,<b> teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Steven Furnell, Professor of Cyber Security, <b>University of Nottingham</b><br/>https://www.linkedin.com/in/stevenfurnell/<br/><br/>Edd Hardy, Director Cyber Security, <b>AlixPartners</b><br/>https://www.linkedin.com/in/eddhardy<br/><br/>Suvi Silvanto, Director, Product Marketing, <b>WithSecure</b><br/>https://www.linkedin.com/in/suvi-silvanto/</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/18704846-teisstalk-the-confidence-gap-moving-smbs-from-reactive-to-proactive-cyber-security.mp3" length="31975573" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18704846</guid>
    <pubDate>Thu, 19 Feb 2026 08:00:00 +0000</pubDate>
    <itunes:duration>2659</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Securing applications and infrastructure in the AI era</itunes:title>
    <title>teissTalk: Securing applications and infrastructure in the AI era</title>
    <itunes:summary><![CDATA[Aligning application and API security with the demands of the modern AI eraEnabling secure, high-performance infrastructure for AI and LLM environmentsSecuring APIs and your network without overspending on securityThom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/  Tiago Rosado, Chief Information Security Office, Asite https://www.linkedin.com/in/tiagorosado/  Jamison Utter, Field CISO, A10 Networks linkedin.com/in/jamisonutter/   ]]></itunes:summary>
    <description><![CDATA[<ul><li>Aligning application and API security with the demands of the modern AI era</li><li>Enabling secure, high-performance infrastructure for AI and LLM environments</li><li>Securing APIs and your network without overspending on security</li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Tiago Rosado, Chief Information Security Office, <b>Asite</b><br/>https://www.linkedin.com/in/tiagorosado/<br/><br/>Jamison Utter, Field CISO, <b>A10 Networks</b><br/>linkedin.com/in/jamisonutter/</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Aligning application and API security with the demands of the modern AI era</li><li>Enabling secure, high-performance infrastructure for AI and LLM environments</li><li>Securing APIs and your network without overspending on security</li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Tiago Rosado, Chief Information Security Office, <b>Asite</b><br/>https://www.linkedin.com/in/tiagorosado/<br/><br/>Jamison Utter, Field CISO, <b>A10 Networks</b><br/>linkedin.com/in/jamisonutter/</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/18668306-teisstalk-securing-applications-and-infrastructure-in-the-ai-era.mp3" length="32891179" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18668306</guid>
    <pubDate>Thu, 12 Feb 2026 08:00:00 +0000</pubDate>
    <itunes:duration>2736</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Silent Swipers - unmasking info-stealers in today&#39;s threat landscape</itunes:title>
    <title>teissTalk: Silent Swipers - unmasking info-stealers in today&#39;s threat landscape</title>
    <itunes:summary><![CDATA[Understanding the anatomy, infrastructure and automation of modern information-stealing malwareTracking delivery methods, evasion technique and high-value data targetsBuilding effective, multi-layered defences against the prevalent info-stealer familiesThom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/  Jim Walter, Senior Threat Researcher, SentinelOne  Brett Taylor, SE Director UK&amp;I, SentinelOne https://www.linkedin.com/in/effectiveleaderandmentor/  Satyam Rastogi, ...]]></itunes:summary>
    <description><![CDATA[<ul><li>Understanding the anatomy, infrastructure and automation of modern information-stealing malware</li><li>Tracking delivery methods, evasion technique and high-value data targets</li><li>Building effective, multi-layered defences against the prevalent info-stealer families</li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Jim Walter, Senior Threat Researcher, <b>SentinelOne</b><br/><br/>Brett Taylor, SE Director UK&amp;I, <b>SentinelOne</b><br/>https://www.linkedin.com/in/effectiveleaderandmentor/<br/><br/>Satyam Rastogi, Director of Information Security &amp; DevOps, <b>BAMKO</b><br/>https://www.linkedin.com/in/hackersatyamrastogi/<br/><br/></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Understanding the anatomy, infrastructure and automation of modern information-stealing malware</li><li>Tracking delivery methods, evasion technique and high-value data targets</li><li>Building effective, multi-layered defences against the prevalent info-stealer families</li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Jim Walter, Senior Threat Researcher, <b>SentinelOne</b><br/><br/>Brett Taylor, SE Director UK&amp;I, <b>SentinelOne</b><br/>https://www.linkedin.com/in/effectiveleaderandmentor/<br/><br/>Satyam Rastogi, Director of Information Security &amp; DevOps, <b>BAMKO</b><br/>https://www.linkedin.com/in/hackersatyamrastogi/<br/><br/></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/18583828-teisstalk-silent-swipers-unmasking-info-stealers-in-today-s-threat-landscape.mp3" length="32420690" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18583828</guid>
    <pubDate>Thu, 29 Jan 2026 08:00:00 +0000</pubDate>
    <itunes:duration>2697</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: 2026 predictions for OT security and the future of cyber physical systems</itunes:title>
    <title>teissTalk: 2026 predictions for OT security and the future of cyber physical systems</title>
    <itunes:summary><![CDATA[Exploitable vulnerabilities within OT devices and how this is expected to changeCyber warfare risk in 2026 - how organisations can defend themselvesSecuring the supply chain and expanding XIoT attack surface Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/  Jordan M. Schroeder, CISO https://www.linkedin.com/in/schroederjordan/  Zia Ush Shamszaman, Senior Lecturer in Computer Science, Teesside University https://www.linkedin.com/in/zia-ush-shamszaman/  Elliot Gidley, Fi...]]></itunes:summary>
    <description><![CDATA[<ul><li>Exploitable vulnerabilities within OT devices and how this is expected to change</li><li>Cyber warfare risk in 2026 - how organisations can defend themselves</li><li>Securing the supply chain and expanding XIoT attack surface</li></ul><p><br/>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Jordan M. Schroeder, CISO<br/>https://www.linkedin.com/in/schroederjordan/<br/><br/>Zia Ush Shamszaman, Senior Lecturer in Computer Science, <b>Teesside University</b><br/>https://www.linkedin.com/in/zia-ush-shamszaman/<br/><br/>Elliot Gidley, Field CTO EMEA, <b>Claroty</b><br/>https://www.linkedin.com/in/elliotgidley</p>]]></description>
    <content:encoded><![CDATA[<ul><li>Exploitable vulnerabilities within OT devices and how this is expected to change</li><li>Cyber warfare risk in 2026 - how organisations can defend themselves</li><li>Securing the supply chain and expanding XIoT attack surface</li></ul><p><br/>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Jordan M. Schroeder, CISO<br/>https://www.linkedin.com/in/schroederjordan/<br/><br/>Zia Ush Shamszaman, Senior Lecturer in Computer Science, <b>Teesside University</b><br/>https://www.linkedin.com/in/zia-ush-shamszaman/<br/><br/>Elliot Gidley, Field CTO EMEA, <b>Claroty</b><br/>https://www.linkedin.com/in/elliotgidley</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/18404883-teisstalk-2026-predictions-for-ot-security-and-the-future-of-cyber-physical-systems.mp3" length="31232024" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18404883</guid>
    <pubDate>Thu, 25 Dec 2025 08:00:00 +0000</pubDate>
    <itunes:duration>2598</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: 2026 threat trends - securing your organisation against next-gen cyber attacks</itunes:title>
    <title>teissTalk: 2026 threat trends - securing your organisation against next-gen cyber attacks</title>
    <itunes:summary><![CDATA[How cyber criminals are weaponising AI to defeat your threat detection and responseBeyond encryption – how ransomware has evolved to include data exfiltration, publication threats and supply chain compromiseHow geopolitical tensions are increasing nation-sponsored cyber-campaigns - proxy attacks, IT worker scams and supply chain risksThom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/  Ed Tucker, Director - Cyber Security Practice, Telefornica Tech https://www.linkedin.co...]]></itunes:summary>
    <description><![CDATA[<ul><li>How cyber criminals are weaponising AI to defeat your threat detection and response</li><li>Beyond encryption – how ransomware has evolved to include data exfiltration, publication threats and supply chain compromise</li><li>How geopolitical tensions are increasing nation-sponsored cyber-campaigns - proxy attacks, IT worker scams and supply chain risks</li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Ed Tucker, Director - Cyber Security Practice, <b>Telefornica Tech</b><br/>https://www.linkedin.com/in/tuckeredward/<br/><br/>Neil King, IT Security Professional, <b>Canon</b><br/>https://www.linkedin.com/in/neilking/<br/><br/>Christine Bejerasco, CISO, <b>WithSecure Intelligence</b><br/>https://www.linkedin.com/in/christinebejerasco/</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>How cyber criminals are weaponising AI to defeat your threat detection and response</li><li>Beyond encryption – how ransomware has evolved to include data exfiltration, publication threats and supply chain compromise</li><li>How geopolitical tensions are increasing nation-sponsored cyber-campaigns - proxy attacks, IT worker scams and supply chain risks</li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Ed Tucker, Director - Cyber Security Practice, <b>Telefornica Tech</b><br/>https://www.linkedin.com/in/tuckeredward/<br/><br/>Neil King, IT Security Professional, <b>Canon</b><br/>https://www.linkedin.com/in/neilking/<br/><br/>Christine Bejerasco, CISO, <b>WithSecure Intelligence</b><br/>https://www.linkedin.com/in/christinebejerasco/</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/18335977-teisstalk-2026-threat-trends-securing-your-organisation-against-next-gen-cyber-attacks.mp3" length="31217928" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18335977</guid>
    <pubDate>Thu, 11 Dec 2025 08:00:00 +0000</pubDate>
    <itunes:duration>2596</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Shielding sensitive data from ransomware – staying ahead of evolving threats</itunes:title>
    <title>teissTalk: Shielding sensitive data from ransomware – staying ahead of evolving threats</title>
    <itunes:summary><![CDATA[How modern ransomware actors are deploying multidimensional tactics to outpace traditional defencesStrategies to reduce data loss and sustain business operations after an attackAI and automation – enhancing visibility and accelerating response to ransomware threatsThom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/  Edward Starkie, Director, GRC | Cyber Risk, Thomas Murray https://www.linkedin.com/in/edward-starkie-56712431/  Cameron Brown, Head of Cyber Threat and Risk A...]]></itunes:summary>
    <description><![CDATA[<ul><li>How modern ransomware actors are deploying multidimensional tactics to outpace traditional defences</li><li>Strategies to reduce data loss and sustain business operations after an attack</li><li>AI and automation – enhancing visibility and accelerating response to ransomware threats</li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Edward Starkie, Director, GRC | Cyber Risk, <b>Thomas Murray</b><br/>https://www.linkedin.com/in/edward-starkie-56712431/<br/><br/>Cameron Brown, Head of Cyber Threat and Risk Analytics, <b>Ariel Re</b><br/>https://www.linkedin.com/in/analyticalcyber/<br/><br/>Jesus Cordero, Director, Solution Architects AppSec, NetSec &amp; XDR, EMEA, <b>Barracuda</b><br/>https://www.linkedin.com/in/jcordero-guzm%C3%A1n/<br/><br/></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>How modern ransomware actors are deploying multidimensional tactics to outpace traditional defences</li><li>Strategies to reduce data loss and sustain business operations after an attack</li><li>AI and automation – enhancing visibility and accelerating response to ransomware threats</li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Edward Starkie, Director, GRC | Cyber Risk, <b>Thomas Murray</b><br/>https://www.linkedin.com/in/edward-starkie-56712431/<br/><br/>Cameron Brown, Head of Cyber Threat and Risk Analytics, <b>Ariel Re</b><br/>https://www.linkedin.com/in/analyticalcyber/<br/><br/>Jesus Cordero, Director, Solution Architects AppSec, NetSec &amp; XDR, EMEA, <b>Barracuda</b><br/>https://www.linkedin.com/in/jcordero-guzm%C3%A1n/<br/><br/></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/18262358-teisstalk-shielding-sensitive-data-from-ransomware-staying-ahead-of-evolving-threats.mp3" length="32335442" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18262358</guid>
    <pubDate>Thu, 27 Nov 2025 08:00:00 +0000</pubDate>
    <itunes:duration>2689</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Resilience as a business outcome</itunes:title>
    <title>teissTalk: Resilience as a business outcome</title>
    <itunes:summary><![CDATA[Identifying critical assets and dependencies to focus investment where impact is highestDesigning for rapid recovery with tested runbooks and clear RTO/RPO targetsStrengthening resilience through training, playbooks, and cross-functional drillsThom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/  Scott Hardy, CISO, Sargent-Disc https://www.linkedin.com/in/scott-hardy-cissp-ccsk-44882a45  Tamara Kaye, Group Director - Resilience, Ardagh Group https://www.linkedin.com/in/tam...]]></itunes:summary>
    <description><![CDATA[<ul><li>Identifying critical assets and dependencies to focus investment where impact is highest</li><li>Designing for rapid recovery with tested runbooks and clear RTO/RPO targets</li><li>Strengthening resilience through training, playbooks, and cross-functional drills</li></ul><p>Thom Langford, Host,<b> teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Scott Hardy, CISO, <b>Sargent-Disc</b><br/>https://www.linkedin.com/in/scott-hardy-cissp-ccsk-44882a45<br/><br/>Tamara Kaye, Group Director - Resilience, <b>Ardagh Group</b><br/>https://www.linkedin.com/in/tamara-kaye-8997852b/<br/><br/>Sam Woodcock, Sr. Director, Solutions Architecture - EMEA,<b> 11:11 Systems</b><br/>https://www.linkedin.com/in/samuel-woodcock-9745b831/</p>]]></description>
    <content:encoded><![CDATA[<ul><li>Identifying critical assets and dependencies to focus investment where impact is highest</li><li>Designing for rapid recovery with tested runbooks and clear RTO/RPO targets</li><li>Strengthening resilience through training, playbooks, and cross-functional drills</li></ul><p>Thom Langford, Host,<b> teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Scott Hardy, CISO, <b>Sargent-Disc</b><br/>https://www.linkedin.com/in/scott-hardy-cissp-ccsk-44882a45<br/><br/>Tamara Kaye, Group Director - Resilience, <b>Ardagh Group</b><br/>https://www.linkedin.com/in/tamara-kaye-8997852b/<br/><br/>Sam Woodcock, Sr. Director, Solutions Architecture - EMEA,<b> 11:11 Systems</b><br/>https://www.linkedin.com/in/samuel-woodcock-9745b831/</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/18222909-teisstalk-resilience-as-a-business-outcome.mp3" length="31858567" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18222909</guid>
    <pubDate>Thu, 20 Nov 2025 08:00:00 +0000</pubDate>
    <itunes:duration>2650</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: AI defence against offence - are you playing catch-up in the new security arms race?</itunes:title>
    <title>teissTalk: AI defence against offence - are you playing catch-up in the new security arms race?</title>
    <itunes:summary><![CDATA[Leveraging AI-powered solutions to anticipate, detect and contain asymmetric cyber threatsAugmenting security teams through AI efficiencies – reducing alert fatigue whilst improving detection speed and accuracyBest AI security practices on safeguarding critical systems and sensitive data against AI-driven cyber threatsThom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/  Michela Resta, Solicitor, CyXcel https://www.linkedin.com/in/michelarestacyxcel/  Paolo Palumbo, Vice P...]]></itunes:summary>
    <description><![CDATA[<ul><li>Leveraging AI-powered solutions to anticipate, detect and contain asymmetric cyber threats</li><li>Augmenting security teams through AI efficiencies – reducing alert fatigue whilst improving detection speed and accuracy</li><li>Best AI security practices on safeguarding critical systems and sensitive data against AI-driven cyber threats</li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Michela Resta, Solicitor, <b>CyXcel</b><br/>https://www.linkedin.com/in/michelarestacyxcel/<br/><br/>Paolo Palumbo, Vice President, <b>WithSecure Intelligence</b><br/>https://www.linkedin.com/in/paolopalumbo/<br/><br/>Tiago Rosado, Chief Information Security Officer, <b>Asite</b><br/>https://www.linkedin.com/in/tiagorosado/</p>]]></description>
    <content:encoded><![CDATA[<ul><li>Leveraging AI-powered solutions to anticipate, detect and contain asymmetric cyber threats</li><li>Augmenting security teams through AI efficiencies – reducing alert fatigue whilst improving detection speed and accuracy</li><li>Best AI security practices on safeguarding critical systems and sensitive data against AI-driven cyber threats</li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Michela Resta, Solicitor, <b>CyXcel</b><br/>https://www.linkedin.com/in/michelarestacyxcel/<br/><br/>Paolo Palumbo, Vice President, <b>WithSecure Intelligence</b><br/>https://www.linkedin.com/in/paolopalumbo/<br/><br/>Tiago Rosado, Chief Information Security Officer, <b>Asite</b><br/>https://www.linkedin.com/in/tiagorosado/</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/18169865-teisstalk-ai-defence-against-offence-are-you-playing-catch-up-in-the-new-security-arms-race.mp3" length="31940173" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18169865</guid>
    <pubDate>Thu, 13 Nov 2025 08:00:00 +0000</pubDate>
    <itunes:duration>2657</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Getting the board’s ‘aye’ on your cyber-security investments</itunes:title>
    <title>teissTalk: Getting the board’s ‘aye’ on your cyber-security investments</title>
    <itunes:summary><![CDATA[Bridging the CISO-board disconnect which hinders your cyber-security progressMeasuring cyber-risk in financial, economic and operational terms and demonstrating value in cyber-investmentsFocusing on governance and compliance – how to answer when asked “are we compliant?Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/  Zia Ush Shamszaman, Senior Lecturer in Computer Science, Teesside University https://www.linkedin.com/in/zia-ush-shamszaman/  Edd Hardy, Director Cyber S...]]></itunes:summary>
    <description><![CDATA[<ul><li>Bridging the CISO-board disconnect which hinders your cyber-security progress</li><li>Measuring cyber-risk in financial, economic and operational terms and demonstrating value in cyber-investments</li><li>Focusing on governance and compliance – how to answer when asked “are we compliant?</li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Zia Ush Shamszaman, Senior Lecturer in Computer Science, <b>Teesside University</b><br/>https://www.linkedin.com/in/zia-ush-shamszaman/<br/><br/>Edd Hardy, Director Cyber Security, <b>AlixPartners</b><br/>https://www.linkedin.com/in/eddhardy<br/><br/>Penny Jackson, Director Strategy, Awareness &amp; Engagement (Human Risk Management), <b>Aristos Partnership</b><br/>https://www.linkedin.com/in/pennykjackson/</p>]]></description>
    <content:encoded><![CDATA[<ul><li>Bridging the CISO-board disconnect which hinders your cyber-security progress</li><li>Measuring cyber-risk in financial, economic and operational terms and demonstrating value in cyber-investments</li><li>Focusing on governance and compliance – how to answer when asked “are we compliant?</li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Zia Ush Shamszaman, Senior Lecturer in Computer Science, <b>Teesside University</b><br/>https://www.linkedin.com/in/zia-ush-shamszaman/<br/><br/>Edd Hardy, Director Cyber Security, <b>AlixPartners</b><br/>https://www.linkedin.com/in/eddhardy<br/><br/>Penny Jackson, Director Strategy, Awareness &amp; Engagement (Human Risk Management), <b>Aristos Partnership</b><br/>https://www.linkedin.com/in/pennykjackson/</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/18137143-teisstalk-getting-the-board-s-aye-on-your-cyber-security-investments.mp3" length="32814705" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18137143</guid>
    <pubDate>Thu, 06 Nov 2025 08:00:00 +0000</pubDate>
    <itunes:duration>2729</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Help your colleagues help you with an enhanced security awareness programme</itunes:title>
    <title>teissTalk: Help your colleagues help you with an enhanced security awareness programme</title>
    <itunes:summary><![CDATA[How appreciation and gamification can improve your employees’ security awarenessMaking security behaviours stick – reframing mistakes as opportunities for growthFostering a culture of continuous improvement with an inclusive learning environmentThom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/  Sara Carty, Founder &amp; CEO, Unboring https://www.linkedin.com/in/saracarty/  Penny Jackson, Director Strategy, Awareness &amp; Engagement (Human Risk Management), Aristos Part...]]></itunes:summary>
    <description><![CDATA[<ul><li>How appreciation and gamification can improve your employees’ security awareness</li><li>Making security behaviours stick – reframing mistakes as opportunities for growth</li><li>Fostering a culture of continuous improvement with an inclusive learning environment</li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Sara Carty, Founder &amp; CEO, Unboring<br/>https://www.linkedin.com/in/saracarty/<br/><br/>Penny Jackson, Director Strategy, Awareness &amp; Engagement (Human Risk Management), Aristos Partnership<br/>https://www.linkedin.com/in/pennykjackson/<br/><br/>Rebecca Stephenson, Specialist Lead Lecturer, Highlands College<br/>https://www.linkedin.com/in/creative-minds-in-cyber/</p><p><br/><br/></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>How appreciation and gamification can improve your employees’ security awareness</li><li>Making security behaviours stick – reframing mistakes as opportunities for growth</li><li>Fostering a culture of continuous improvement with an inclusive learning environment</li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Sara Carty, Founder &amp; CEO, Unboring<br/>https://www.linkedin.com/in/saracarty/<br/><br/>Penny Jackson, Director Strategy, Awareness &amp; Engagement (Human Risk Management), Aristos Partnership<br/>https://www.linkedin.com/in/pennykjackson/<br/><br/>Rebecca Stephenson, Specialist Lead Lecturer, Highlands College<br/>https://www.linkedin.com/in/creative-minds-in-cyber/</p><p><br/><br/></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/18056682-teisstalk-help-your-colleagues-help-you-with-an-enhanced-security-awareness-programme.mp3" length="32251117" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18056682</guid>
    <pubDate>Thu, 23 Oct 2025 08:00:00 +0100</pubDate>
    <itunes:duration>2682</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: From service desk to security risk - stopping social engineering at the source</itunes:title>
    <title>teissTalk: From service desk to security risk - stopping social engineering at the source</title>
    <itunes:summary><![CDATA[Which techniques and methods use by threat actors are bypassing security parametersReducing your cyber risk - using lessons learned from recent high-profile attacksStrategies to protect your service desk against identity-based attacksThom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/  Paul Holland, Cyber Capability Manager, Royal Mail https://www.linkedin.com/in/paulinfosec/  Lukas Weber, Senior Vice President, AlixPartners https://www.linkedin.com/in/lukaswebr/  Rebecca...]]></itunes:summary>
    <description><![CDATA[<ul><li>Which techniques and methods use by threat actors are bypassing security parameters</li><li>Reducing your cyber risk - using lessons learned from recent high-profile attacks</li><li>Strategies to protect your service desk against identity-based attacks</li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Paul Holland, Cyber Capability Manager, Royal Mail<br/>https://www.linkedin.com/in/paulinfosec/<br/><br/>Lukas Weber, Senior Vice President, AlixPartners<br/>https://www.linkedin.com/in/lukaswebr/<br/><br/>Rebecca Stephenson, Specialist Lead Lecturer, Highlands College<br/>https://www.linkedin.com/in/creative-minds-in-cyber/<br/><br/>Darren James, Senior Product Manager, Specops<br/>https://www.linkedin.com/in/darren-james-91055310</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Which techniques and methods use by threat actors are bypassing security parameters</li><li>Reducing your cyber risk - using lessons learned from recent high-profile attacks</li><li>Strategies to protect your service desk against identity-based attacks</li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Paul Holland, Cyber Capability Manager, Royal Mail<br/>https://www.linkedin.com/in/paulinfosec/<br/><br/>Lukas Weber, Senior Vice President, AlixPartners<br/>https://www.linkedin.com/in/lukaswebr/<br/><br/>Rebecca Stephenson, Specialist Lead Lecturer, Highlands College<br/>https://www.linkedin.com/in/creative-minds-in-cyber/<br/><br/>Darren James, Senior Product Manager, Specops<br/>https://www.linkedin.com/in/darren-james-91055310</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/17938241-teisstalk-from-service-desk-to-security-risk-stopping-social-engineering-at-the-source.mp3" length="30696001" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17938241</guid>
    <pubDate>Thu, 02 Oct 2025 08:00:00 +0100</pubDate>
    <itunes:duration>2553</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Live at teissLondon2025: From gatekeeping to guardrails - proactive supply chain security at scale</itunes:title>
    <title>Live at teissLondon2025: From gatekeeping to guardrails - proactive supply chain security at scale</title>
    <itunes:summary><![CDATA[70% of critical security debt stems from third-party code - what can be done upstream?How real-time threat intelligence and policy enforcement are closing the gapWhy DORA and modern CI/CD pipelines demand pre-emptive visibility and automation Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/  Paul Holland, Cyber Capability Manager, Royal Mail https://www.linkedin.com/in/paulinfosec/  Tiago Rosado, Chief Information Security Officer, Asite https://www.linkedin.com/i...]]></itunes:summary>
    <description><![CDATA[<ul><li>70% of critical security debt stems from third-party code - what can be done upstream?</li><li>How real-time threat intelligence and policy enforcement are closing the gap</li><li>Why DORA and modern CI/CD pipelines demand pre-emptive visibility and automation </li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Paul Holland, Cyber Capability Manager, <b>Royal Mail</b><br/>https://www.linkedin.com/in/paulinfosec/<br/><br/>Tiago Rosado, Chief Information Security Officer,<b> Asite</b><br/>https://www.linkedin.com/in/tiagorosado/<br/><br/>Jean Carlos, Information Security Lead, <b>Trade Republic</b><br/>https://www.linkedin.com/in/jeanpcarlos/<br/><br/>John Smith, CTO of EMEA, <b>Veracode</b><br/>https://www.linkedin.com/in/jtsmith123</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>70% of critical security debt stems from third-party code - what can be done upstream?</li><li>How real-time threat intelligence and policy enforcement are closing the gap</li><li>Why DORA and modern CI/CD pipelines demand pre-emptive visibility and automation </li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Paul Holland, Cyber Capability Manager, <b>Royal Mail</b><br/>https://www.linkedin.com/in/paulinfosec/<br/><br/>Tiago Rosado, Chief Information Security Officer,<b> Asite</b><br/>https://www.linkedin.com/in/tiagorosado/<br/><br/>Jean Carlos, Information Security Lead, <b>Trade Republic</b><br/>https://www.linkedin.com/in/jeanpcarlos/<br/><br/>John Smith, CTO of EMEA, <b>Veracode</b><br/>https://www.linkedin.com/in/jtsmith123</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/17898032-live-at-teisslondon2025-from-gatekeeping-to-guardrails-proactive-supply-chain-security-at-scale.mp3" length="36053838" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17898032</guid>
    <pubDate>Thu, 25 Sep 2025 08:00:00 +0100</pubDate>
    <itunes:duration>2999</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Advancing compliance maturity in an age of DORA &amp; NIS2</itunes:title>
    <title>teissTalk: Advancing compliance maturity in an age of DORA &amp; NIS2</title>
    <itunes:summary><![CDATA[Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threatsMeeting API compliance and data protection challenges with emerging technologiesMoving towards a mature posture for API securityThom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/  Satyam Rastogi, Director of Information Security &amp; DevOps, BAMKO https://www.linkedin.com/in/hackersatyamrastogi/  Mike Johnson, Global Cyber Threat &amp; Incident Response Manager, Verifone https...]]></itunes:summary>
    <description><![CDATA[<ul><li>Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threats</li><li>Meeting API compliance and data protection challenges with emerging technologies</li><li>Moving towards a mature posture for API security</li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Satyam Rastogi, Director of Information Security &amp; DevOps, <b>BAMKO</b><br/>https://www.linkedin.com/in/hackersatyamrastogi/<br/><br/>Mike Johnson, Global Cyber Threat &amp; Incident Response Manager, <b>Verifone</b><br/>https://www.linkedin.com/in/mike---johnson/<br/><br/>Madison Dreshner, Principal of IT Risk and Compliance solutions, <b>AuditBoard</b><br/>https://www.linkedin.com/in/madisondreshner/</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threats</li><li>Meeting API compliance and data protection challenges with emerging technologies</li><li>Moving towards a mature posture for API security</li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Satyam Rastogi, Director of Information Security &amp; DevOps, <b>BAMKO</b><br/>https://www.linkedin.com/in/hackersatyamrastogi/<br/><br/>Mike Johnson, Global Cyber Threat &amp; Incident Response Manager, <b>Verifone</b><br/>https://www.linkedin.com/in/mike---johnson/<br/><br/>Madison Dreshner, Principal of IT Risk and Compliance solutions, <b>AuditBoard</b><br/>https://www.linkedin.com/in/madisondreshner/</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/17580495-teisstalk-advancing-compliance-maturity-in-an-age-of-dora-nis2.mp3" length="32964464" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17580495</guid>
    <pubDate>Thu, 31 Jul 2025 08:00:00 +0100</pubDate>
    <itunes:duration>2742</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Refining your API security strategy to protect against AI-driven attacks</itunes:title>
    <title>teissTalk: Refining your API security strategy to protect against AI-driven attacks</title>
    <itunes:summary><![CDATA[Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threatsMeeting API compliance and data protection challenges with emerging technologiesMoving towards a mature posture for API securityThom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/  Tiago Rosado, Chief Information Security Officer, Asite https://www.linkedin.com/in/tiagorosado/  Anne Coulombe, CISO, Bleuet LLC https://www.linkedin.com/in/annecoulombe/  Menachem Perlman,  Dir...]]></itunes:summary>
    <description><![CDATA[<ul><li>Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threats</li><li>Meeting API compliance and data protection challenges with emerging technologies</li><li>Moving towards a mature posture for API security</li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Tiago Rosado, Chief Information Security Officer, <b>Asite</b><br/>https://www.linkedin.com/in/tiagorosado/<br/><br/>Anne Coulombe, CISO, <b>Bleuet LLC</b><br/>https://www.linkedin.com/in/annecoulombe/<br/><br/>Menachem Perlman,  Director, Global Solutions Engineering at <b>Akamai</b> Technologies - API Security,  Akamai<br/>https://www.linkedin.com/in/menachemperlman/</p><p><br/><br/></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threats</li><li>Meeting API compliance and data protection challenges with emerging technologies</li><li>Moving towards a mature posture for API security</li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Tiago Rosado, Chief Information Security Officer, <b>Asite</b><br/>https://www.linkedin.com/in/tiagorosado/<br/><br/>Anne Coulombe, CISO, <b>Bleuet LLC</b><br/>https://www.linkedin.com/in/annecoulombe/<br/><br/>Menachem Perlman,  Director, Global Solutions Engineering at <b>Akamai</b> Technologies - API Security,  Akamai<br/>https://www.linkedin.com/in/menachemperlman/</p><p><br/><br/></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/17545727-teisstalk-refining-your-api-security-strategy-to-protect-against-ai-driven-attacks.mp3" length="32818423" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17545727</guid>
    <pubDate>Thu, 24 Jul 2025 08:00:00 +0100</pubDate>
    <itunes:duration>2730</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Building resilient infosec teams</itunes:title>
    <title>teissTalk: Building resilient infosec teams</title>
    <itunes:summary><![CDATA[Analysing how your teams cope with a cyber incident or a failure scenarioLearning from crises - building resilience strategies to mitigate future incidentsBuilding a cyber resilient mindset within your infosec team and in the wider organisationThom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/  Raza Sadiq, Head of Enterprise Risk, MQube https://www.linkedin.com/in/razasadiq7/  Sara Carty, Founder &amp; CEO, Unboring https://www.linkedin.com/in/saracarty/  Christoph Schuh...]]></itunes:summary>
    <description><![CDATA[<ul><li>Analysing how your teams cope with a cyber incident or a failure scenario</li><li>Learning from crises - building resilience strategies to mitigate future incidents</li><li>Building a cyber resilient mindset within your infosec team and in the wider organisation</li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Raza Sadiq, Head of Enterprise Risk, <b>MQube</b><br/>https://www.linkedin.com/in/razasadiq7/<br/><br/>Sara Carty, Founder &amp; CEO, <b>Unboring</b><br/>https://www.linkedin.com/in/saracarty/<br/><br/>Christoph Schuhwerk, CISO in Residence, EMEA, <b>Zscaler</b><br/>https://www.linkedin.com/in/christophschuhwerk1978</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Analysing how your teams cope with a cyber incident or a failure scenario</li><li>Learning from crises - building resilience strategies to mitigate future incidents</li><li>Building a cyber resilient mindset within your infosec team and in the wider organisation</li></ul><p>Thom Langford, Host, <b>teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Raza Sadiq, Head of Enterprise Risk, <b>MQube</b><br/>https://www.linkedin.com/in/razasadiq7/<br/><br/>Sara Carty, Founder &amp; CEO, <b>Unboring</b><br/>https://www.linkedin.com/in/saracarty/<br/><br/>Christoph Schuhwerk, CISO in Residence, EMEA, <b>Zscaler</b><br/>https://www.linkedin.com/in/christophschuhwerk1978</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/17513614-teisstalk-building-resilient-infosec-teams.mp3" length="32520548" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17513614</guid>
    <pubDate>Thu, 17 Jul 2025 08:00:00 +0100</pubDate>
    <itunes:duration>2705</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Surviving a critical CVE - a high-impact playbook</itunes:title>
    <title>teissTalk: Surviving a critical CVE - a high-impact playbook</title>
    <itunes:summary><![CDATA[Risk-based prioritising using severity scoring and patch analysisEscaping the silo trap - bridging the gap between IT and security teamsAutomate rules to handle high-severity vulnerabilities and zero-daysJonathan Craven, Host, teissTalk https://www.linkedin.com/in/jonathanbcraven/ Tiago Rosado, Chief Information Security Officer, Asite https://www.linkedin.com/in/tiagorosado/  Cameron Brown, Head of Cyber Threat and Risk Analytics, Ariel Re https://www.linkedin.com/in/analyticalcyber/  York v...]]></itunes:summary>
    <description><![CDATA[<ul><li>Risk-based prioritising using severity scoring and patch analysis</li><li>Escaping the silo trap - bridging the gap between IT and security teams</li><li>Automate rules to handle high-severity vulnerabilities and zero-days</li></ul><p>Jonathan Craven, Host, teissTalk<br/><b>https://www.linkedin.com/in/jonathanbcraven/</b></p><p>Tiago Rosado, Chief Information Security Officer, <b>Asite</b><br/>https://www.linkedin.com/in/tiagorosado/<br/><br/>Cameron Brown, Head of Cyber Threat and Risk Analytics, <b>Ariel Re</b><br/>https://www.linkedin.com/in/analyticalcyber/<br/><br/>York von Eichel-Streiber, Product Marketing Manager, <b>NinjaOne</b><br/>https://www.linkedin.com/in/york-von-eichel-streiber-50552b9b</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Risk-based prioritising using severity scoring and patch analysis</li><li>Escaping the silo trap - bridging the gap between IT and security teams</li><li>Automate rules to handle high-severity vulnerabilities and zero-days</li></ul><p>Jonathan Craven, Host, teissTalk<br/><b>https://www.linkedin.com/in/jonathanbcraven/</b></p><p>Tiago Rosado, Chief Information Security Officer, <b>Asite</b><br/>https://www.linkedin.com/in/tiagorosado/<br/><br/>Cameron Brown, Head of Cyber Threat and Risk Analytics, <b>Ariel Re</b><br/>https://www.linkedin.com/in/analyticalcyber/<br/><br/>York von Eichel-Streiber, Product Marketing Manager, <b>NinjaOne</b><br/>https://www.linkedin.com/in/york-von-eichel-streiber-50552b9b</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/17368150-teisstalk-surviving-a-critical-cve-a-high-impact-playbook.mp3" length="34402965" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17368150</guid>
    <pubDate>Thu, 26 Jun 2025 08:00:00 +0100</pubDate>
    <itunes:duration>2862</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Securing against AI-driven phishing attacks</itunes:title>
    <title>teissTalk: Securing against AI-driven phishing attacks</title>
    <itunes:summary><![CDATA[How cyber criminals are using AI tools to scale malicious operationsStreamlining user experience with biometrics or device-based authenticationMaking your organisation cyber resilient and securing critical systems as AI continues to advanceFeaturing:  Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/  Derek Hanson, VP Solutions Architecture and Alliances, Yubico https://www.linkedin.com/in/derekthanson  Jay Vinda, Global CISO and Cyber Risk Engineering Lead, Mosaic...]]></itunes:summary>
    <description><![CDATA[<ul><li>How cyber criminals are using AI tools to scale malicious operations</li><li>Streamlining user experience with biometrics or device-based authentication</li><li>Making your organisation cyber resilient and securing critical systems as AI continues to advance</li></ul><p>Featuring: </p><p>Thom Langford, Host,<b> teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Derek Hanson, VP Solutions Architecture and Alliances, <b>Yubico</b><br/>https://www.linkedin.com/in/derekthanson<br/><br/>Jay Vinda, Global CISO and Cyber Risk Engineering Lead, <b>Mosaic Insurance</b><br/>https://www.linkedin.com/in/jayvinda<br/><br/>Lee Munson, Principal Research Analyst, <b>Information Security Forum</b><br/>https://www.linkedin.com/in/lmunson/<br/><br/></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>How cyber criminals are using AI tools to scale malicious operations</li><li>Streamlining user experience with biometrics or device-based authentication</li><li>Making your organisation cyber resilient and securing critical systems as AI continues to advance</li></ul><p>Featuring: </p><p>Thom Langford, Host,<b> teissTalk</b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/>Derek Hanson, VP Solutions Architecture and Alliances, <b>Yubico</b><br/>https://www.linkedin.com/in/derekthanson<br/><br/>Jay Vinda, Global CISO and Cyber Risk Engineering Lead, <b>Mosaic Insurance</b><br/>https://www.linkedin.com/in/jayvinda<br/><br/>Lee Munson, Principal Research Analyst, <b>Information Security Forum</b><br/>https://www.linkedin.com/in/lmunson/<br/><br/></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/17368120-teisstalk-securing-against-ai-driven-phishing-attacks.mp3" length="31929053" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17368120</guid>
    <pubDate>Thu, 19 Jun 2025 08:00:00 +0100</pubDate>
    <itunes:duration>2656</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Mitigating human cyber-risks with data and behavioural sciences</itunes:title>
    <title>teissTalk: Mitigating human cyber-risks with data and behavioural sciences</title>
    <itunes:summary><![CDATA[Which behaviours increase risk and how we can measurably change them Driving employee engagement without incentives Which real-time interventions encourage safer employee behaviours Jonathan Craven, Host, teissTalk https://www.linkedin.com/in/jonathanbcraven/  Rebecca Stephenson, Specialist Lead Lecturer, Highlands College https://www.linkedin.com/in/creative-minds-in-cyber/  Penny Jackson, Director Strategy, Awareness &amp; Engagement (Human Risk Management), Aristos Partnersh...]]></itunes:summary>
    <description><![CDATA[<ul><li>Which behaviours increase risk and how we can measurably change them </li><li>Driving employee engagement without incentives </li><li>Which real-time interventions encourage safer employee behaviours </li></ul><p>Jonathan Craven, Host, teissTalk<br/><b>https://www.linkedin.com/in/jonathanbcraven/</b><br/><br/>Rebecca Stephenson, Specialist Lead Lecturer, <b>Highlands College</b><br/>https://www.linkedin.com/in/creative-minds-in-cyber/<br/><br/>Penny Jackson, Director Strategy, Awareness &amp; Engagement (Human Risk Management), <b>Aristos Partnership</b><br/>https://www.linkedin.com/in/pennykjackson/<br/><br/>Candace Williams, CEO/Founder,<b> Cyb(H)er Ally Cybersecurity Solutions, LLC</b><br/>https://www.linkedin.com/in/cybherally/</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Which behaviours increase risk and how we can measurably change them </li><li>Driving employee engagement without incentives </li><li>Which real-time interventions encourage safer employee behaviours </li></ul><p>Jonathan Craven, Host, teissTalk<br/><b>https://www.linkedin.com/in/jonathanbcraven/</b><br/><br/>Rebecca Stephenson, Specialist Lead Lecturer, <b>Highlands College</b><br/>https://www.linkedin.com/in/creative-minds-in-cyber/<br/><br/>Penny Jackson, Director Strategy, Awareness &amp; Engagement (Human Risk Management), <b>Aristos Partnership</b><br/>https://www.linkedin.com/in/pennykjackson/<br/><br/>Candace Williams, CEO/Founder,<b> Cyb(H)er Ally Cybersecurity Solutions, LLC</b><br/>https://www.linkedin.com/in/cybherally/</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/17291581-teisstalk-mitigating-human-cyber-risks-with-data-and-behavioural-sciences.mp3" length="32912133" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17291581</guid>
    <pubDate>Thu, 12 Jun 2025 08:00:00 +0100</pubDate>
    <itunes:duration>2738</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Navigating the rising legal threats to cyber-security leaders</itunes:title>
    <title>teissTalk: Navigating the rising legal threats to cyber-security leaders</title>
    <itunes:summary><![CDATA[Reducing personal risk with your organisation’s liability insurance Understanding the evolving risk landscape through recent case studies Creating a workplace ethos of shared accountability This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Michela Resta, Solicitor, CYXCEL https://www.linkedin.com/in/michelarestacyxcel/  Kelly Hagedorn, Partner, ALSTON &amp; BIRD https://www.linkedin.com/in/kellyhagedorn/ ]]></itunes:summary>
    <description><![CDATA[<ul><li>Reducing personal risk with your organisation’s liability insurance </li><li>Understanding the evolving risk landscape through recent case studies </li><li>Creating a workplace ethos of shared accountability </li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Michela Resta, Solicitor, <b>CYXCEL</b><br/>https://www.linkedin.com/in/michelarestacyxcel/<br/><br/>Kelly Hagedorn, Partner, <b>ALSTON &amp; BIRD</b><br/>https://www.linkedin.com/in/kellyhagedorn/</p>]]></description>
    <content:encoded><![CDATA[<ul><li>Reducing personal risk with your organisation’s liability insurance </li><li>Understanding the evolving risk landscape through recent case studies </li><li>Creating a workplace ethos of shared accountability </li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Michela Resta, Solicitor, <b>CYXCEL</b><br/>https://www.linkedin.com/in/michelarestacyxcel/<br/><br/>Kelly Hagedorn, Partner, <b>ALSTON &amp; BIRD</b><br/>https://www.linkedin.com/in/kellyhagedorn/</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/17125110-teisstalk-navigating-the-rising-legal-threats-to-cyber-security-leaders.mp3" length="31881128" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17125110</guid>
    <pubDate>Thu, 15 May 2025 08:00:00 +0100</pubDate>
    <itunes:duration>2652</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Weak passwords – the hidden threat lurking in your organisation</itunes:title>
    <title>teissTalk: Weak passwords – the hidden threat lurking in your organisation</title>
    <itunes:summary><![CDATA[Trends in the current credential theft landscape and changing compliance standardsStrategies to reduce password risk - continuous scanning, enforced policies and exclusion dictionariesEncouraging users to create strong, securely stored passwords without reuseThis episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/  Shannon Muller, Cyber security Specialist, Microsoft https://www.linkedin.com/in/shannon-muller/  Jay Vinda, Cyber Risk Engineering and Emerging Solutions ...]]></itunes:summary>
    <description><![CDATA[<ul><li>Trends in the current credential theft landscape and changing compliance standards</li><li>Strategies to reduce password risk - continuous scanning, enforced policies and exclusion dictionaries</li><li>Encouraging users to create strong, securely stored passwords without reuse</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Shannon Muller, Cyber security Specialist, <b>Microsoft</b><br/>https://www.linkedin.com/in/shannon-muller/<br/><br/>Jay Vinda, Cyber Risk Engineering and Emerging Solutions Lead, <b>Mosaic Insurance </b><br/>https://www.linkedin.com/in/jayvinda<br/><br/>Darren James, Senior Product Manager, <b>Specops</b><br/>https://www.linkedin.com/in/darren-james-91055310</p><p><br/><br/></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Trends in the current credential theft landscape and changing compliance standards</li><li>Strategies to reduce password risk - continuous scanning, enforced policies and exclusion dictionaries</li><li>Encouraging users to create strong, securely stored passwords without reuse</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Shannon Muller, Cyber security Specialist, <b>Microsoft</b><br/>https://www.linkedin.com/in/shannon-muller/<br/><br/>Jay Vinda, Cyber Risk Engineering and Emerging Solutions Lead, <b>Mosaic Insurance </b><br/>https://www.linkedin.com/in/jayvinda<br/><br/>Darren James, Senior Product Manager, <b>Specops</b><br/>https://www.linkedin.com/in/darren-james-91055310</p><p><br/><br/></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/17101247-teisstalk-weak-passwords-the-hidden-threat-lurking-in-your-organisation.mp3" length="32535029" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17101247</guid>
    <pubDate>Tue, 06 May 2025 08:00:00 +0100</pubDate>
    <itunes:duration>2706</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: DORA - A new law for a new dawn</itunes:title>
    <title>teissTalk: DORA - A new law for a new dawn</title>
    <itunes:summary><![CDATA[What DORA is specifically asking of organisationsWhere the likely CTI gaps are when attempting to align with DORAWhy innovation is key to aligning your CTI capabilitiesThis episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/  Benoit Heynderickx, Principal Analyst, Information Security Forum (ISF) https://www.linkedin.com/in/benoithey/  Tim Parker, Chair, South West Cyber Security Cluster https://www.linkedin.com/in/tim-parker  Lewis Henderson, Director - Product Marke...]]></itunes:summary>
    <description><![CDATA[<ul><li>What DORA is specifically asking of organisations</li><li>Where the likely CTI gaps are when attempting to align with DORA</li><li>Why innovation is key to aligning your CTI capabilities</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Benoit Heynderickx, Principal Analyst, <b>Information Security Forum (ISF)</b><br/>https://www.linkedin.com/in/benoithey/<br/><br/>Tim Parker, Chair, <b>South West Cyber Security Cluster</b><br/>https://www.linkedin.com/in/tim-parker<br/><br/>Lewis Henderson, Director - Product Marketing, <b>Team Cymru</b><br/>https://www.linkedin.com/in/lewishenderson/</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>What DORA is specifically asking of organisations</li><li>Where the likely CTI gaps are when attempting to align with DORA</li><li>Why innovation is key to aligning your CTI capabilities</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Benoit Heynderickx, Principal Analyst, <b>Information Security Forum (ISF)</b><br/>https://www.linkedin.com/in/benoithey/<br/><br/>Tim Parker, Chair, <b>South West Cyber Security Cluster</b><br/>https://www.linkedin.com/in/tim-parker<br/><br/>Lewis Henderson, Director - Product Marketing, <b>Team Cymru</b><br/>https://www.linkedin.com/in/lewishenderson/</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/17042042-teisstalk-dora-a-new-law-for-a-new-dawn.mp3" length="32432461" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17042042</guid>
    <pubDate>Thu, 01 May 2025 08:00:00 +0100</pubDate>
    <itunes:duration>2698</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Cyber-resilience – your last line of defence</itunes:title>
    <title>teissTalk: Cyber-resilience – your last line of defence</title>
    <itunes:summary><![CDATA[Preparing for ransomware - where is your data and how is it protected? Building cyber resilience for your data, across on-premises and cloud Reducing the window of damage and minimising the time to recover This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/  Heather Lowrie, Independent Advisor, Earthgard Ltd https://www.linkedin.com/in/heather-lowrie/  Raza Sadiq, Head of Enterprise Risk, MQube https://www.linkedin.com/in/razasadiq7/  Sandra Bell, ...]]></itunes:summary>
    <description><![CDATA[<ul><li>Preparing for ransomware - where is your data and how is it protected? </li><li>Building cyber resilience for your data, across on-premises and cloud </li><li>Reducing the window of damage and minimising the time to recover </li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Heather Lowrie, Independent Advisor, <b>Earthgard Ltd</b><br/>https://www.linkedin.com/in/heather-lowrie/<br/><br/>Raza Sadiq, Head of Enterprise Risk, <b>MQube</b><br/>https://www.linkedin.com/in/razasadiq7/<br/><br/>Sandra Bell, Group Head of Organisational Resilience, <b>Novuna</b><br/>https://www.linkedin.com/in/sandra-bell-13a109183/<br/><br/>Grant Caley, UK &amp; Ireland Solutions Director, <b>NetApp</b><br/>https://www.linkedin.com/in/grant-caley-a424681/</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Preparing for ransomware - where is your data and how is it protected? </li><li>Building cyber resilience for your data, across on-premises and cloud </li><li>Reducing the window of damage and minimising the time to recover </li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Heather Lowrie, Independent Advisor, <b>Earthgard Ltd</b><br/>https://www.linkedin.com/in/heather-lowrie/<br/><br/>Raza Sadiq, Head of Enterprise Risk, <b>MQube</b><br/>https://www.linkedin.com/in/razasadiq7/<br/><br/>Sandra Bell, Group Head of Organisational Resilience, <b>Novuna</b><br/>https://www.linkedin.com/in/sandra-bell-13a109183/<br/><br/>Grant Caley, UK &amp; Ireland Solutions Director, <b>NetApp</b><br/>https://www.linkedin.com/in/grant-caley-a424681/</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/16975181-teisstalk-cyber-resilience-your-last-line-of-defence.mp3" length="32582012" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16975181</guid>
    <pubDate>Tue, 15 Apr 2025 08:00:00 +0100</pubDate>
    <itunes:duration>2710</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Resilient by design – the next cyber-security imperative</itunes:title>
    <title>teissTalk: Resilient by design – the next cyber-security imperative</title>
    <itunes:summary><![CDATA[Identifying and removing barriers to cyber resilienceReducing complexity - consolidating and eliminating legacy systemsBuilding a cyber-resilient organisation - moving from a reactive to a proactive model This episode is hosted by Thom Langford: https://www.linkedin.com/in/jonathanbcraven/  Heather Lowrie, Independent Advisor, Earthgard Ltd https://www.linkedin.com/in/heather-lowrie/  Sasha Henry, Cyber Strategy &amp; Resilience Advisor, Confidential https://www.linkedin.com/in/alexandra...]]></itunes:summary>
    <description><![CDATA[<ul><li>Identifying and removing barriers to cyber resilience</li><li>Reducing complexity - consolidating and eliminating legacy systems</li><li>Building a cyber-resilient organisation - moving from a reactive to a proactive model </li></ul><p>This episode is hosted by Thom Langford:<br/>https://www.linkedin.com/in/jonathanbcraven/<br/><br/>Heather Lowrie, Independent Advisor, Earthgard Ltd<br/>https://www.linkedin.com/in/heather-lowrie/<br/><br/>Sasha Henry, Cyber Strategy &amp; Resilience Advisor, Confidential<br/>https://www.linkedin.com/in/alexandra-pavelovna-henry-32b98465/<br/><br/>James Tucker, Head of CISO, International, Zscaler<br/>https://www.linkedin.com/in/jamesjtucker/</p>]]></description>
    <content:encoded><![CDATA[<ul><li>Identifying and removing barriers to cyber resilience</li><li>Reducing complexity - consolidating and eliminating legacy systems</li><li>Building a cyber-resilient organisation - moving from a reactive to a proactive model </li></ul><p>This episode is hosted by Thom Langford:<br/>https://www.linkedin.com/in/jonathanbcraven/<br/><br/>Heather Lowrie, Independent Advisor, Earthgard Ltd<br/>https://www.linkedin.com/in/heather-lowrie/<br/><br/>Sasha Henry, Cyber Strategy &amp; Resilience Advisor, Confidential<br/>https://www.linkedin.com/in/alexandra-pavelovna-henry-32b98465/<br/><br/>James Tucker, Head of CISO, International, Zscaler<br/>https://www.linkedin.com/in/jamesjtucker/</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/16937091-teisstalk-resilient-by-design-the-next-cyber-security-imperative.mp3" length="32896759" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16937091</guid>
    <pubDate>Tue, 08 Apr 2025 08:00:00 +0100</pubDate>
    <itunes:duration>2736</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Hacking security effectiveness - making sure your tools are working for you</itunes:title>
    <title>teissTalk: Hacking security effectiveness - making sure your tools are working for you</title>
    <itunes:summary><![CDATA[Where metrics and evaluations fall short in measuring holistic security effectiveness Identifying gaps between tools and determining which gaps you need to fill Showing the board and the business that cyber-security is moving the needle on resilience This episode is hosted by Jonathan Craven: https://www.linkedin.com/in/jonathanbcraven/  Richard Absalom, Principal Research Analyst, Information Security Forum (ISF) https://uk.linkedin.com/in/richard-absalom-48879116  Edward Star...]]></itunes:summary>
    <description><![CDATA[<ul><li>Where metrics and evaluations fall short in measuring holistic security effectiveness </li><li>Identifying gaps between tools and determining which gaps you need to fill </li><li>Showing the board and the business that cyber-security is moving the needle on resilience </li></ul><p>This episode is hosted by Jonathan Craven:<br/>https://www.linkedin.com/in/jonathanbcraven/<b><br/></b><br/>Richard Absalom, Principal Research Analyst, Information Security Forum (ISF)<br/>https://uk.linkedin.com/in/richard-absalom-48879116<br/><br/>Edward Starkie, Director, GRC | Cyber Risk, Thomas Murray<br/>https://www.linkedin.com/in/edward-starkie-56712431/<br/><br/>Emanuel Salmona, Co-Founder and CEO, Nagomi Security<br/>https://www.linkedin.com/in/emanuelsalmona/</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Where metrics and evaluations fall short in measuring holistic security effectiveness </li><li>Identifying gaps between tools and determining which gaps you need to fill </li><li>Showing the board and the business that cyber-security is moving the needle on resilience </li></ul><p>This episode is hosted by Jonathan Craven:<br/>https://www.linkedin.com/in/jonathanbcraven/<b><br/></b><br/>Richard Absalom, Principal Research Analyst, Information Security Forum (ISF)<br/>https://uk.linkedin.com/in/richard-absalom-48879116<br/><br/>Edward Starkie, Director, GRC | Cyber Risk, Thomas Murray<br/>https://www.linkedin.com/in/edward-starkie-56712431/<br/><br/>Emanuel Salmona, Co-Founder and CEO, Nagomi Security<br/>https://www.linkedin.com/in/emanuelsalmona/</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/16875351-teisstalk-hacking-security-effectiveness-making-sure-your-tools-are-working-for-you.mp3" length="32336627" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16875351</guid>
    <pubDate>Thu, 03 Apr 2025 08:00:00 +0100</pubDate>
    <itunes:duration>2690</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Protecting critical services without disruption</itunes:title>
    <title>teissTalk: Protecting critical services without disruption</title>
    <itunes:summary><![CDATA[How cyber-attackers are using GenAI to evade detection by security systemsSafeguarding against sophisticated ransomware attacks with robust security measuresTop tactics for stopping ransomware attacks before they cause damageThis episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/  John Heaton-Armstrong, Experienced Cyber security Leader, Confidential https://www.linkedin.com/in/johnheatonarmstrong/  Edewede Oriwoh, Group IT and Cybersecurity Manager, Zigup Plc https...]]></itunes:summary>
    <description><![CDATA[<ul><li>How cyber-attackers are using GenAI to evade detection by security systems</li><li>Safeguarding against sophisticated ransomware attacks with robust security measures</li><li>Top tactics for stopping ransomware attacks before they cause damage</li></ul><p>This episode is hosted by Thom Langford:<br/><a href='https://www.linkedin.com/in/jonathanbcraven/'>https://www.linkedin.com/in/thomlangford/</a><b><br/></b><br/>John Heaton-Armstrong, Experienced Cyber security Leader, <b>Confidential</b><br/>https://www.linkedin.com/in/johnheatonarmstrong/<br/><br/>Edewede Oriwoh, Group IT and Cybersecurity Manager, <b>Zigup Plc</b><br/>https://www.linkedin.com/in/edewedeoriwoh/<br/><br/>Seamus Lennon, VP of Operations, <b>ThreatLocker </b><br/>https://www.linkedin.com/in/seamus-lennon-41423886</p>]]></description>
    <content:encoded><![CDATA[<ul><li>How cyber-attackers are using GenAI to evade detection by security systems</li><li>Safeguarding against sophisticated ransomware attacks with robust security measures</li><li>Top tactics for stopping ransomware attacks before they cause damage</li></ul><p>This episode is hosted by Thom Langford:<br/><a href='https://www.linkedin.com/in/jonathanbcraven/'>https://www.linkedin.com/in/thomlangford/</a><b><br/></b><br/>John Heaton-Armstrong, Experienced Cyber security Leader, <b>Confidential</b><br/>https://www.linkedin.com/in/johnheatonarmstrong/<br/><br/>Edewede Oriwoh, Group IT and Cybersecurity Manager, <b>Zigup Plc</b><br/>https://www.linkedin.com/in/edewedeoriwoh/<br/><br/>Seamus Lennon, VP of Operations, <b>ThreatLocker </b><br/>https://www.linkedin.com/in/seamus-lennon-41423886</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/16833652-teisstalk-protecting-critical-services-without-disruption.mp3" length="33259425" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16833652</guid>
    <pubDate>Thu, 27 Mar 2025 08:00:00 +0000</pubDate>
    <itunes:duration>2766</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Protecting critical services without disruption</itunes:title>
    <title>teissTalk: Protecting critical services without disruption</title>
    <itunes:summary><![CDATA[Whether compliance-as-security in CNI offers security or false confidenceNavigating tool and dashboard complexity to avoid CNI cyber blind spots Attracting cyber talent into CNI and away from finance and tech This episode is hosted by Jonathan Craven: https://www.linkedin.com/in/thomlangford/  Sofia Martinez Gomez, VP, Risk &amp; Tech Practice - Cybersecurity, Privacy &amp; Compliance, AlixPartners https://www.linkedin.com/in/sofia-martinez-gomez-8b5534136/?locale=en_US    Moni...]]></itunes:summary>
    <description><![CDATA[<ul><li>Whether compliance-as-security in CNI offers security or false confidence</li><li>Navigating tool and dashboard complexity to avoid CNI cyber blind spots </li><li>Attracting cyber talent into CNI and away from finance and tech </li></ul><p>This episode is hosted by Jonathan Craven:<br/><a href='https://www.linkedin.com/in/jonathanbcraven/'>https://www.linkedin.com/in/thomlangford/</a><b><br/></b><br/>Sofia Martinez Gomez, VP, Risk &amp; Tech Practice - Cybersecurity, Privacy &amp; Compliance, <b>AlixPartners</b><br/>https://www.linkedin.com/in/sofia-martinez-gomez-8b5534136/?locale=en_US  <br/><br/>Monika Atanasova, Global Head of Third Party Risk Management, <b>Raiffeisen Gruppe</b><br/>https://www.linkedin.com/in/monika-atanasova-746633b7/?originalSubdomain=ch<br/><br/>Deryck Mitchelson, Global CISO, <b>Check Point Software Technologies</b><br/>https://www.linkedin.com/in/deryckmitchelson</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Whether compliance-as-security in CNI offers security or false confidence</li><li>Navigating tool and dashboard complexity to avoid CNI cyber blind spots </li><li>Attracting cyber talent into CNI and away from finance and tech </li></ul><p>This episode is hosted by Jonathan Craven:<br/><a href='https://www.linkedin.com/in/jonathanbcraven/'>https://www.linkedin.com/in/thomlangford/</a><b><br/></b><br/>Sofia Martinez Gomez, VP, Risk &amp; Tech Practice - Cybersecurity, Privacy &amp; Compliance, <b>AlixPartners</b><br/>https://www.linkedin.com/in/sofia-martinez-gomez-8b5534136/?locale=en_US  <br/><br/>Monika Atanasova, Global Head of Third Party Risk Management, <b>Raiffeisen Gruppe</b><br/>https://www.linkedin.com/in/monika-atanasova-746633b7/?originalSubdomain=ch<br/><br/>Deryck Mitchelson, Global CISO, <b>Check Point Software Technologies</b><br/>https://www.linkedin.com/in/deryckmitchelson</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/16790612-teisstalk-protecting-critical-services-without-disruption.mp3" length="32096453" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16790612</guid>
    <pubDate>Thu, 20 Mar 2025 08:00:00 +0000</pubDate>
    <itunes:duration>2670</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Live at teissLondon2025  - Enhancing AppSec with Application Security Posture Management</itunes:title>
    <title>teissTalk: Live at teissLondon2025  - Enhancing AppSec with Application Security Posture Management</title>
    <itunes:summary><![CDATA[Fortifying security defences with automated root cause analysis and prioritisationManaging security risk urgency across your application pipeline with real-time visibility and data visualisation capabilitiesDriving efficiency and prioritisation across your security ecosystem with practical remediation actionsThis episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/  John Heaton-Armstrong, Experienced Cyber security Leader, Confidential https://www.linkedin.com/in/john...]]></itunes:summary>
    <description><![CDATA[<ul><li>Fortifying security defences with automated root cause analysis and prioritisation</li><li>Managing security risk urgency across your application pipeline with real-time visibility and data visualisation capabilities</li><li>Driving efficiency and prioritisation across your security ecosystem with practical remediation actions</li></ul><p>This episode is hosted by Thom Langford:<br/><a href='https://www.linkedin.com/in/jonathanbcraven/'>https://www.linkedin.com/in/thomlangford/</a><b><br/></b><br/>John Heaton-Armstrong, Experienced Cyber security Leader, Confidential<br/>https://www.linkedin.com/in/johnheatonarmstrong/<br/><br/>Danny Dresner, Professor of Cyber security, The University of Manchester<br/>https://www.linkedin.com/in/danny-dresner-fciis-6382381/<br/><br/>Tiago Rosado, Chief Information Security Officer, Asite<br/>https://www.linkedin.com/in/tiagorosado/<br/><br/>Derek Maki, VP Product Management, Veracode<br/>https://www.linkedin.com/in/derekmaki/<br/><br/></p><p><br/><br/></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Fortifying security defences with automated root cause analysis and prioritisation</li><li>Managing security risk urgency across your application pipeline with real-time visibility and data visualisation capabilities</li><li>Driving efficiency and prioritisation across your security ecosystem with practical remediation actions</li></ul><p>This episode is hosted by Thom Langford:<br/><a href='https://www.linkedin.com/in/jonathanbcraven/'>https://www.linkedin.com/in/thomlangford/</a><b><br/></b><br/>John Heaton-Armstrong, Experienced Cyber security Leader, Confidential<br/>https://www.linkedin.com/in/johnheatonarmstrong/<br/><br/>Danny Dresner, Professor of Cyber security, The University of Manchester<br/>https://www.linkedin.com/in/danny-dresner-fciis-6382381/<br/><br/>Tiago Rosado, Chief Information Security Officer, Asite<br/>https://www.linkedin.com/in/tiagorosado/<br/><br/>Derek Maki, VP Product Management, Veracode<br/>https://www.linkedin.com/in/derekmaki/<br/><br/></p><p><br/><br/></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/16744289-teisstalk-live-at-teisslondon2025-enhancing-appsec-with-application-security-posture-management.mp3" length="42397767" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16744289</guid>
    <pubDate>Thu, 06 Mar 2025 08:00:00 +0000</pubDate>
    <itunes:duration>3528</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Bolstering your defences against supply chain cyber-risk</itunes:title>
    <title>teissTalk: Bolstering your defences against supply chain cyber-risk</title>
    <itunes:summary><![CDATA[What’s making supply chain risk the fastest-growing cyber-risk categoryHow to galvanise your internal and external peers to develop a shared responsibility for supply chain cyber-risksDesigning and implementing effective key controls to mitigate supply chain cyber-risks This episode is hosted by Jonathan Craven: https://www.linkedin.com/in/jonathanbcraven/  Mike Johnson, Global Cyber Threat &amp; Incident Response Manager, Verifone https://www.linkedin.com/in/mike---johnson/ Jean Carlos,...]]></itunes:summary>
    <description><![CDATA[<ul><li>What’s making supply chain risk the fastest-growing cyber-risk category</li><li>How to galvanise your internal and external peers to develop a shared responsibility for supply chain cyber-risks</li><li>Designing and implementing effective key controls to mitigate supply chain cyber-risks </li></ul><p>This episode is hosted by Jonathan Craven:<br/><a href='https://www.linkedin.com/in/jonathanbcraven/'>https://www.linkedin.com/in/jonathanbcraven/</a><b><br/></b><br/>Mike Johnson, Global Cyber Threat &amp; Incident Response Manager,<b> Verifone<br/></b><a href='https://www.linkedin.com/in/mike---johnson/'>https://www.linkedin.com/in/mike---johnson/</a></p><p>Jean Carlos, Group Head of Cyber Architecture &amp; Engineering,<b> TP ICAP <br/></b><a href='https://www.linkedin.com/in/jeanpc/'>https://www.linkedin.com/in/jeanpc/</a></p><p>Richard Marcus, CISO,<b> AuditBoard<br/></b>https://www.linkedin.com/in/richard-marcus-b3192261/</p><p><br/><br/></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>What’s making supply chain risk the fastest-growing cyber-risk category</li><li>How to galvanise your internal and external peers to develop a shared responsibility for supply chain cyber-risks</li><li>Designing and implementing effective key controls to mitigate supply chain cyber-risks </li></ul><p>This episode is hosted by Jonathan Craven:<br/><a href='https://www.linkedin.com/in/jonathanbcraven/'>https://www.linkedin.com/in/jonathanbcraven/</a><b><br/></b><br/>Mike Johnson, Global Cyber Threat &amp; Incident Response Manager,<b> Verifone<br/></b><a href='https://www.linkedin.com/in/mike---johnson/'>https://www.linkedin.com/in/mike---johnson/</a></p><p>Jean Carlos, Group Head of Cyber Architecture &amp; Engineering,<b> TP ICAP <br/></b><a href='https://www.linkedin.com/in/jeanpc/'>https://www.linkedin.com/in/jeanpc/</a></p><p>Richard Marcus, CISO,<b> AuditBoard<br/></b>https://www.linkedin.com/in/richard-marcus-b3192261/</p><p><br/><br/></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/16697396-teisstalk-bolstering-your-defences-against-supply-chain-cyber-risk.mp3" length="32721529" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16697396</guid>
    <pubDate>Thu, 27 Feb 2025 09:00:00 +0000</pubDate>
    <itunes:duration>2722</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Securing the human perimeter</itunes:title>
    <title>teissTalk: Securing the human perimeter</title>
    <itunes:summary><![CDATA[How the human risk surface area has broadened with GenAI and collaboration tools Prevent breaches by applying the cyber kill chain to human vulnerabilities Strategies to protect employees without compromising productivity This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/  Daniela Almeida Lourenco, Chief Information Security Officer, Dutch Financial Services https://www.linkedin.com/in/daniela-almeida-lourenco/ Rebecca Stephenson, Specialist Lead...]]></itunes:summary>
    <description><![CDATA[<ul><li>How the human risk surface area has broadened with GenAI and collaboration tools </li><li>Prevent breaches by applying the cyber kill chain to human vulnerabilities </li><li>Strategies to protect employees without compromising productivity </li></ul><p>This episode is hosted by Thom Langford:<br/><b>https://www.linkedin.com/in/thomlangford/<br/></b><br/>Daniela Almeida Lourenco, Chief Information Security Officer, <b>Dutch Financial Services<br/></b><a href='https://www.linkedin.com/in/daniela-almeida-lourenco/'>https://www.linkedin.com/in/daniela-almeida-lourenco/</a></p><p>Rebecca Stephenson, Specialist Lead Lecturer, <b>Highlands College <br/></b><a href='https://www.linkedin.com/in/creative-minds-in-cyber/'>https://www.linkedin.com/in/creative-minds-in-cyber/</a></p><p>Frederick Coulton, Director of UX,<b> CultureAI<br/></b><a href='https://www.linkedin.com/in/frederickcoulton'>https://www.linkedin.com/in/frederickcoulton</a></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>How the human risk surface area has broadened with GenAI and collaboration tools </li><li>Prevent breaches by applying the cyber kill chain to human vulnerabilities </li><li>Strategies to protect employees without compromising productivity </li></ul><p>This episode is hosted by Thom Langford:<br/><b>https://www.linkedin.com/in/thomlangford/<br/></b><br/>Daniela Almeida Lourenco, Chief Information Security Officer, <b>Dutch Financial Services<br/></b><a href='https://www.linkedin.com/in/daniela-almeida-lourenco/'>https://www.linkedin.com/in/daniela-almeida-lourenco/</a></p><p>Rebecca Stephenson, Specialist Lead Lecturer, <b>Highlands College <br/></b><a href='https://www.linkedin.com/in/creative-minds-in-cyber/'>https://www.linkedin.com/in/creative-minds-in-cyber/</a></p><p>Frederick Coulton, Director of UX,<b> CultureAI<br/></b><a href='https://www.linkedin.com/in/frederickcoulton'>https://www.linkedin.com/in/frederickcoulton</a></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/16637124-teisstalk-securing-the-human-perimeter.mp3" length="30691132" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16637124</guid>
    <pubDate>Thu, 20 Feb 2025 08:00:00 +0000</pubDate>
    <itunes:duration>2552</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Threat intelligence strategies to mitigate industrial-scale cyber-crime</itunes:title>
    <title>teissTalk: Threat intelligence strategies to mitigate industrial-scale cyber-crime</title>
    <itunes:summary><![CDATA[How cyber-crime continues to evolve and what this means for enterprise threat intelligence strategiesEvaluating sources and deciding which characteristics are most relevantHow DNS-based threat intelligence versus a malware-centric approach disrupts industrialised cyber-crimeThis episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/  Todd Wade, Chief Information Security Officer https://www.linkedin.com/in/twade/  Matt Hardy, Senior Information Security Executive https:...]]></itunes:summary>
    <description><![CDATA[<ul><li>How cyber-crime continues to evolve and what this means for enterprise threat intelligence strategies</li><li>Evaluating sources and deciding which characteristics are most relevant</li><li>How DNS-based threat intelligence versus a malware-centric approach disrupts industrialised cyber-crime</li></ul><p>This episode is hosted by Thom Langford:<br/><b>https://www.linkedin.com/in/thomlangford/<br/></b><br/>Todd Wade, Chief Information Security Officer<b><br/></b><a href='https://www.linkedin.com/in/twade/'>https://www.linkedin.com/in/twade/</a></p><p><br/>Matt Hardy, Senior Information Security Executive<b><br/></b><a href='https://www.linkedin.com/in/matthardy67/'>https://www.linkedin.com/in/matthardy67/</a></p><p><br/>Craig Sanderson, Principal Cybersecurity Strategist, <b>Infoblox<br/></b>https://www.linkedin.com/in/craigsanderson1</p>]]></description>
    <content:encoded><![CDATA[<ul><li>How cyber-crime continues to evolve and what this means for enterprise threat intelligence strategies</li><li>Evaluating sources and deciding which characteristics are most relevant</li><li>How DNS-based threat intelligence versus a malware-centric approach disrupts industrialised cyber-crime</li></ul><p>This episode is hosted by Thom Langford:<br/><b>https://www.linkedin.com/in/thomlangford/<br/></b><br/>Todd Wade, Chief Information Security Officer<b><br/></b><a href='https://www.linkedin.com/in/twade/'>https://www.linkedin.com/in/twade/</a></p><p><br/>Matt Hardy, Senior Information Security Executive<b><br/></b><a href='https://www.linkedin.com/in/matthardy67/'>https://www.linkedin.com/in/matthardy67/</a></p><p><br/>Craig Sanderson, Principal Cybersecurity Strategist, <b>Infoblox<br/></b>https://www.linkedin.com/in/craigsanderson1</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/16573792-teisstalk-threat-intelligence-strategies-to-mitigate-industrial-scale-cyber-crime.mp3" length="31651688" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16573792</guid>
    <pubDate>Thu, 06 Feb 2025 09:00:00 +0000</pubDate>
    <itunes:duration>2633</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: The future of SecOps - why should leaders be optimistic?</itunes:title>
    <title>teissTalk: The future of SecOps - why should leaders be optimistic?</title>
    <itunes:summary><![CDATA[Automating SecOps processes and procedures - free your people, improve retention and increase productivityWhere creativity and diversity is keeping your SecOps one step ahead of the attackersMatching your effectiveness to organisational objectives - aligning your internal SOC metrics with those required by the boardThis episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/  Prince Adu, Board Member - ISACA Accra Chapter, ISACA https://www.linkedin.com/in/prince-adu-ccs...]]></itunes:summary>
    <description><![CDATA[<ul><li>Automating SecOps processes and procedures - free your people, improve retention and increase productivity</li><li>Where creativity and diversity is keeping your SecOps one step ahead of the attackers</li><li>Matching your effectiveness to organisational objectives - aligning your internal SOC metrics with those required by the board</li></ul><p>This episode is hosted by Thom Langford:<br/><b>https://www.linkedin.com/in/thomlangford/<br/></b><br/>Prince Adu, Board Member - ISACA Accra Chapter, <b>ISACA<br/></b><a href='https://www.linkedin.com/in/prince-adu-ccsp-cisa-crisc-3759a520/'>https://www.linkedin.com/in/prince-adu-ccsp-cisa-crisc-3759a520/</a></p><p>Garrett Smiley, Chief of Staff to CDIO / Vice President of Digital Infrastructure and Technology Strategy, <b>Maximus<br/></b><a href='https://www.linkedin.com/in/garrettsmiley/'>https://www.linkedin.com/in/garrettsmiley/</a></p><p>Matt Muller, Field CISO, <b>Tines <br/></b><a href='https://www.linkedin.com/in/matthewrmuller/'>https://www.linkedin.com/in/matthewrmuller/</a></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Automating SecOps processes and procedures - free your people, improve retention and increase productivity</li><li>Where creativity and diversity is keeping your SecOps one step ahead of the attackers</li><li>Matching your effectiveness to organisational objectives - aligning your internal SOC metrics with those required by the board</li></ul><p>This episode is hosted by Thom Langford:<br/><b>https://www.linkedin.com/in/thomlangford/<br/></b><br/>Prince Adu, Board Member - ISACA Accra Chapter, <b>ISACA<br/></b><a href='https://www.linkedin.com/in/prince-adu-ccsp-cisa-crisc-3759a520/'>https://www.linkedin.com/in/prince-adu-ccsp-cisa-crisc-3759a520/</a></p><p>Garrett Smiley, Chief of Staff to CDIO / Vice President of Digital Infrastructure and Technology Strategy, <b>Maximus<br/></b><a href='https://www.linkedin.com/in/garrettsmiley/'>https://www.linkedin.com/in/garrettsmiley/</a></p><p>Matt Muller, Field CISO, <b>Tines <br/></b><a href='https://www.linkedin.com/in/matthewrmuller/'>https://www.linkedin.com/in/matthewrmuller/</a></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/16501222-teisstalk-the-future-of-secops-why-should-leaders-be-optimistic.mp3" length="32668867" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16501222</guid>
    <pubDate>Thu, 30 Jan 2025 08:00:00 +0000</pubDate>
    <itunes:duration>2717</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: The emerging 2025 threat landscape</itunes:title>
    <title>teissTalk: The emerging 2025 threat landscape</title>
    <itunes:summary><![CDATA[How evolving methods of work are expanding the attack surfaceGrowth of supply chain attacks targeting devices touching sensitive dataIncreased nation-state targeting of Critical National InfrastructureThis episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/  Richard Absalom, Principal Research Analyst, Information Security Forum (ISF) https://uk.linkedin.com/in/richard-absalom-48879116 Tom O’Driscoll, Head of Security Strategy and Intelligence, National Highways http...]]></itunes:summary>
    <description><![CDATA[<ul><li>How evolving methods of work are expanding the attack surface</li><li>Growth of supply chain attacks targeting devices touching sensitive data</li><li>Increased nation-state targeting of Critical National Infrastructure</li></ul><p>This episode is hosted by Thom Langford:<br/><b>https://www.linkedin.com/in/thomlangford/<br/></b><br/>Richard Absalom, Principal Research Analyst,<b> Information Security Forum (ISF)<br/></b><a href='https://uk.linkedin.com/in/richard-absalom-48879116'>https://uk.linkedin.com/in/richard-absalom-48879116</a></p><p>Tom O’Driscoll, Head of Security Strategy and Intelligence, <b>National Highways<br/></b><a href='https://www.linkedin.com/in/odte/'>https://www.linkedin.com/in/odte/</a></p><p>Michael Covington, Vice President, Portfolio Strategy,<b> Jamf<br/></b><a href='https://www.linkedin.com/in/michaelcovington/'>https://www.linkedin.com/in/michaelcovington/</a></p>]]></description>
    <content:encoded><![CDATA[<ul><li>How evolving methods of work are expanding the attack surface</li><li>Growth of supply chain attacks targeting devices touching sensitive data</li><li>Increased nation-state targeting of Critical National Infrastructure</li></ul><p>This episode is hosted by Thom Langford:<br/><b>https://www.linkedin.com/in/thomlangford/<br/></b><br/>Richard Absalom, Principal Research Analyst,<b> Information Security Forum (ISF)<br/></b><a href='https://uk.linkedin.com/in/richard-absalom-48879116'>https://uk.linkedin.com/in/richard-absalom-48879116</a></p><p>Tom O’Driscoll, Head of Security Strategy and Intelligence, <b>National Highways<br/></b><a href='https://www.linkedin.com/in/odte/'>https://www.linkedin.com/in/odte/</a></p><p>Michael Covington, Vice President, Portfolio Strategy,<b> Jamf<br/></b><a href='https://www.linkedin.com/in/michaelcovington/'>https://www.linkedin.com/in/michaelcovington/</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/16232287-teisstalk-the-emerging-2025-threat-landscape.mp3" length="33213632" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16232287</guid>
    <pubDate>Thu, 12 Dec 2024 08:00:00 +0000</pubDate>
    <itunes:duration>2763</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Transforming your security operations to detect and respond to advanced attacks</itunes:title>
    <title>teissTalk: Transforming your security operations to detect and respond to advanced attacks</title>
    <itunes:summary><![CDATA[Diverse threat vectors and complex attacks - how to expand your detection and response programmesHelping your SOC analysts achieve more - finding the right combination of internal ML/AI tools and external providersPathways to accelerate your SOC development to detect and mitigate attacks earlier This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/  Mike Johnson, Global Cyber Threat &amp; Incident Response Manager, Verifone https://www.linkedin.com/in/mike---...]]></itunes:summary>
    <description><![CDATA[<ul><li>Diverse threat vectors and complex attacks - how to expand your detection and response programmes</li><li>Helping your SOC analysts achieve more - finding the right combination of internal ML/AI tools and external providers</li><li>Pathways to accelerate your SOC development to detect and mitigate attacks earlier </li></ul><p>This episode is hosted by Thom Langford:<br/><b>https://www.linkedin.com/in/thomlangford/<br/></b><br/>Mike Johnson, Global Cyber Threat &amp; Incident Response Manager, <b>Verifone</b><br/>https://www.linkedin.com/in/mike---johnson/</p><p>Alan Jenkins, CISO Team lead, <b>Saepio<br/></b>https://www.linkedin.com/in/alanjenkins/</p><p>Josh Davies, Principal Technical Manager,<b> Fortra<br/></b>https://www.linkedin.com/in/jdgwilym/</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Diverse threat vectors and complex attacks - how to expand your detection and response programmes</li><li>Helping your SOC analysts achieve more - finding the right combination of internal ML/AI tools and external providers</li><li>Pathways to accelerate your SOC development to detect and mitigate attacks earlier </li></ul><p>This episode is hosted by Thom Langford:<br/><b>https://www.linkedin.com/in/thomlangford/<br/></b><br/>Mike Johnson, Global Cyber Threat &amp; Incident Response Manager, <b>Verifone</b><br/>https://www.linkedin.com/in/mike---johnson/</p><p>Alan Jenkins, CISO Team lead, <b>Saepio<br/></b>https://www.linkedin.com/in/alanjenkins/</p><p>Josh Davies, Principal Technical Manager,<b> Fortra<br/></b>https://www.linkedin.com/in/jdgwilym/</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/16219765-teisstalk-transforming-your-security-operations-to-detect-and-respond-to-advanced-attacks.mp3" length="32856681" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16219765</guid>
    <pubDate>Thu, 05 Dec 2024 08:00:00 +0000</pubDate>
    <itunes:duration>2733</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Protecting your crown jewels as an SME without breaking the bank</itunes:title>
    <title>teissTalk: Protecting your crown jewels as an SME without breaking the bank</title>
    <itunes:summary><![CDATA[Identifying which data assets to prioritise Building an enterprise-level cyber-security profile on a budget Strengthening your cyber-resilience with incident response playbooks This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/  Steven Furnell, Professor of Cyber Security, University of Nottingham https://www.linkedin.com/in/stevenfurnell/ Jean Carlos, VP of Information Security, AutogenAI https://www.linkedin.com/in/jeanpc/ Stephanie Lynch-Ozana...]]></itunes:summary>
    <description><![CDATA[<ul><li>Identifying which data assets to prioritise </li><li>Building an enterprise-level cyber-security profile on a budget </li><li>Strengthening your cyber-resilience with incident response playbooks </li></ul><p>This episode is hosted by Thom Langford:<br/><b>https://www.linkedin.com/in/thomlangford/<br/></b><br/>Steven Furnell, Professor of Cyber Security, <b>University of Nottingham<br/></b>https://www.linkedin.com/in/stevenfurnell/</p><p>Jean Carlos, VP of Information Security, <b>AutogenAI<br/></b>https://www.linkedin.com/in/jeanpc/</p><p>Stephanie Lynch-Ozanar, Education and Awareness Specialist, <b>Co-Op<br/></b>https://www.linkedin.com/in/stephlynchozanar</p><p>Kev Eley, VP of UKI,<b> Exabeam<br/></b>https://www.linkedin.com/in/keveley/</p>]]></description>
    <content:encoded><![CDATA[<ul><li>Identifying which data assets to prioritise </li><li>Building an enterprise-level cyber-security profile on a budget </li><li>Strengthening your cyber-resilience with incident response playbooks </li></ul><p>This episode is hosted by Thom Langford:<br/><b>https://www.linkedin.com/in/thomlangford/<br/></b><br/>Steven Furnell, Professor of Cyber Security, <b>University of Nottingham<br/></b>https://www.linkedin.com/in/stevenfurnell/</p><p>Jean Carlos, VP of Information Security, <b>AutogenAI<br/></b>https://www.linkedin.com/in/jeanpc/</p><p>Stephanie Lynch-Ozanar, Education and Awareness Specialist, <b>Co-Op<br/></b>https://www.linkedin.com/in/stephlynchozanar</p><p>Kev Eley, VP of UKI,<b> Exabeam<br/></b>https://www.linkedin.com/in/keveley/</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/16153018-teisstalk-protecting-your-crown-jewels-as-an-sme-without-breaking-the-bank.mp3" length="32351652" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16153018</guid>
    <pubDate>Thu, 28 Nov 2024 08:00:00 +0000</pubDate>
    <itunes:duration>2691</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Reducing your security debt in a GenAI-driven world</itunes:title>
    <title>teissTalk: Reducing your security debt in a GenAI-driven world</title>
    <itunes:summary><![CDATA[Minimising the risks to your security posture from developers’ reliance on GenAIUsing AI to speed up remediation and avoid security becoming the bottleneckSteps to ensure safe and secure implementation of GenAI in software developmentThis episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/  Lee Munson, Principal Research Analyst, Information Security Forum https://www.linkedin.com/in/lmunson/ Zia Ush Shamszaman, Senior Lecturer , Computer Science, Teesside University...]]></itunes:summary>
    <description><![CDATA[<ul><li>Minimising the risks to your security posture from developers’ reliance on GenAI</li><li>Using AI to speed up remediation and avoid security becoming the bottleneck</li><li>Steps to ensure safe and secure implementation of GenAI in software development</li></ul><p>This episode is hosted by Thom Langford:<br/><b>https://www.linkedin.com/in/thomlangford/<br/></b><br/>Lee Munson, Principal Research Analyst, <b>Information Security Forum<br/></b>https://www.linkedin.com/in/lmunson/</p><p>Zia Ush Shamszaman, Senior Lecturer , Computer Science, <b>Teesside University<br/></b>https://www.linkedin.com/in/zia-ush-shamszaman</p><p>John Smith, EMEA CTO, <b>Veracode<br/></b>https://www.linkedin.com/in/jtsmith123</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Minimising the risks to your security posture from developers’ reliance on GenAI</li><li>Using AI to speed up remediation and avoid security becoming the bottleneck</li><li>Steps to ensure safe and secure implementation of GenAI in software development</li></ul><p>This episode is hosted by Thom Langford:<br/><b>https://www.linkedin.com/in/thomlangford/<br/></b><br/>Lee Munson, Principal Research Analyst, <b>Information Security Forum<br/></b>https://www.linkedin.com/in/lmunson/</p><p>Zia Ush Shamszaman, Senior Lecturer , Computer Science, <b>Teesside University<br/></b>https://www.linkedin.com/in/zia-ush-shamszaman</p><p>John Smith, EMEA CTO, <b>Veracode<br/></b>https://www.linkedin.com/in/jtsmith123</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/16111132-teisstalk-reducing-your-security-debt-in-a-genai-driven-world.mp3" length="31276739" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16111132</guid>
    <pubDate>Thu, 21 Nov 2024 08:00:00 +0000</pubDate>
    <itunes:duration>2601</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Why just-in-time security is leaving you exposed</itunes:title>
    <title>teissTalk: Why just-in-time security is leaving you exposed</title>
    <itunes:summary><![CDATA[Why the traditional malware-centric approach to security doesn’t enable proactive protectionPre-empting and protecting attacks before they are launched - looking at the threat actors attack infrastructureEmergent domains, what are they and why they need a layered detectionThis episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/  John Rouffas, Cyber Security Executive, Author &amp; Journalist, CyberEdBoard Community https://www.linkedin.com/in/drjohnrouffas/ Francis A...]]></itunes:summary>
    <description><![CDATA[<ul><li>Why the traditional malware-centric approach to security doesn’t enable proactive protection</li><li>Pre-empting and protecting attacks before they are launched - looking at the threat actors attack infrastructure</li><li>Emergent domains, what are they and why they need a layered detection</li></ul><p>This episode is hosted by Thom Langford:<br/><b>https://www.linkedin.com/in/thomlangford/<br/></b><br/>John Rouffas, Cyber Security Executive, Author &amp; Journalist, <b>CyberEdBoard Community<br/></b>https://www.linkedin.com/in/drjohnrouffas/</p><p>Francis Annandale, Managing Consultant, <b>CyXcel<br/></b>https://www.linkedin.com/in/francis-annandale-98222186/</p><p>Craig Sanderson, Principal Cybersecurity Strategist, <b>Infoblox<br/></b>https://www.linkedin.com/in/craigsanderson1/</p><p> </p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Why the traditional malware-centric approach to security doesn’t enable proactive protection</li><li>Pre-empting and protecting attacks before they are launched - looking at the threat actors attack infrastructure</li><li>Emergent domains, what are they and why they need a layered detection</li></ul><p>This episode is hosted by Thom Langford:<br/><b>https://www.linkedin.com/in/thomlangford/<br/></b><br/>John Rouffas, Cyber Security Executive, Author &amp; Journalist, <b>CyberEdBoard Community<br/></b>https://www.linkedin.com/in/drjohnrouffas/</p><p>Francis Annandale, Managing Consultant, <b>CyXcel<br/></b>https://www.linkedin.com/in/francis-annandale-98222186/</p><p>Craig Sanderson, Principal Cybersecurity Strategist, <b>Infoblox<br/></b>https://www.linkedin.com/in/craigsanderson1/</p><p> </p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/16095021-teisstalk-why-just-in-time-security-is-leaving-you-exposed.mp3" length="32231874" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16095021</guid>
    <pubDate>Thu, 14 Nov 2024 08:00:00 +0000</pubDate>
    <itunes:duration>2681</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Why Zero Trust Network Access is not your silver bullet</itunes:title>
    <title>teissTalk: Why Zero Trust Network Access is not your silver bullet</title>
    <itunes:summary><![CDATA[Where does Zero Trust fall short, and why these failings encourage cyber-crimeExpanding Zero Trust to protect the data itselfIdentifying, classifying, and securing sensitive data through automationThis episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/  Jean Carlos, VP Cyber Security, BOXT https://www.linkedin.com/in/jeanpc/  Sasha Henry, Senior Managing Consultant, Cyxcel https://www.linkedin.com/in/alexandra-pavelovna-henry-32b98465/?originalSubdomain=uk  Karim El...]]></itunes:summary>
    <description><![CDATA[<ul><li>Where does Zero Trust fall short, and why these failings encourage cyber-crime</li><li>Expanding Zero Trust to protect the data itself</li><li>Identifying, classifying, and securing sensitive data through automation</li></ul><p>This episode is hosted by Thom Langford:<br/><b>https://www.linkedin.com/in/thomlangford/<br/></b><br/>Jean Carlos, VP Cyber Security, <b>BOXT</b><br/>https://www.linkedin.com/in/jeanpc/<br/><br/>Sasha Henry, Senior Managing Consultant, <b>Cyxcel</b><br/>https://www.linkedin.com/in/alexandra-pavelovna-henry-32b98465/?originalSubdomain=uk<br/><br/>Karim Eldefrawy, CTO and Cofounder, <b>Confidencial</b><br/>https://www.linkedin.com/in/karim-eldefrawy-b706b53/</p>]]></description>
    <content:encoded><![CDATA[<ul><li>Where does Zero Trust fall short, and why these failings encourage cyber-crime</li><li>Expanding Zero Trust to protect the data itself</li><li>Identifying, classifying, and securing sensitive data through automation</li></ul><p>This episode is hosted by Thom Langford:<br/><b>https://www.linkedin.com/in/thomlangford/<br/></b><br/>Jean Carlos, VP Cyber Security, <b>BOXT</b><br/>https://www.linkedin.com/in/jeanpc/<br/><br/>Sasha Henry, Senior Managing Consultant, <b>Cyxcel</b><br/>https://www.linkedin.com/in/alexandra-pavelovna-henry-32b98465/?originalSubdomain=uk<br/><br/>Karim Eldefrawy, CTO and Cofounder, <b>Confidencial</b><br/>https://www.linkedin.com/in/karim-eldefrawy-b706b53/</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/15947527-teisstalk-why-zero-trust-network-access-is-not-your-silver-bullet.mp3" length="32545671" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15947527</guid>
    <pubDate>Thu, 24 Oct 2024 08:00:00 +0100</pubDate>
    <itunes:duration>2707</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Better security awareness training with AI</itunes:title>
    <title>teissTalk: Better security awareness training with AI</title>
    <itunes:summary><![CDATA[Leveraging behavioural AI to mitigate the risk of phishing attacks Fortifying your defenses against the next wave of phishing threats Practical strategies for empowering colleagues while strengthening your cyber resilience This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/  Rebecca Stephenson, Specialist Lead Lecturer in Digital Pedagogy, Government of Jersey https://www.linkedin.com/in/creative-minds-in-cyber/  Ben Wynn-Jones, Information Awarene...]]></itunes:summary>
    <description><![CDATA[<ul><li>Leveraging behavioural AI to mitigate the risk of phishing attacks </li><li>Fortifying your defenses against the next wave of phishing threats </li><li>Practical strategies for empowering colleagues while strengthening your cyber resilience </li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Rebecca Stephenson, Specialist Lead Lecturer in Digital Pedagogy, <b>Government of Jersey</b><br/>https://www.linkedin.com/in/creative-minds-in-cyber/<br/><br/>Ben Wynn-Jones, Information Awareness Lead, <b>Canon EMEA</b> <br/>https://www.linkedin.com/in/ben-wynn-jones/</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Leveraging behavioural AI to mitigate the risk of phishing attacks </li><li>Fortifying your defenses against the next wave of phishing threats </li><li>Practical strategies for empowering colleagues while strengthening your cyber resilience </li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Rebecca Stephenson, Specialist Lead Lecturer in Digital Pedagogy, <b>Government of Jersey</b><br/>https://www.linkedin.com/in/creative-minds-in-cyber/<br/><br/>Ben Wynn-Jones, Information Awareness Lead, <b>Canon EMEA</b> <br/>https://www.linkedin.com/in/ben-wynn-jones/</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/15907806-teisstalk-better-security-awareness-training-with-ai.mp3" length="29419415" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15907806</guid>
    <pubDate>Thu, 17 Oct 2024 08:00:00 +0100</pubDate>
    <itunes:duration>2446</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Confronting cyber-criminals-strategies for cyber-hygiene</itunes:title>
    <title>teissTalk: Confronting cyber-criminals-strategies for cyber-hygiene</title>
    <itunes:summary><![CDATA[Meeting your operational and legal obligations - getting your foundations in orderCyber-proofing your organisation with comprehensive cyber-security training and awarenessDeveloping cyber-hygiene to defend against cyber-criminals using emerging technologyThis episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/  Paul Holland, Head of Research, Information Security Forum (ISF) https://www.linkedin.com/in/paulinfosec/ Penny Jackson, Director Strategy, Awareness &amp; Eng...]]></itunes:summary>
    <description><![CDATA[<ul><li>Meeting your operational and legal obligations - getting your foundations in order</li><li>Cyber-proofing your organisation with comprehensive cyber-security training and awareness</li><li>Developing cyber-hygiene to defend against cyber-criminals using emerging technology</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Paul Holland, Head of Research, <b>Information Security Forum (ISF)<br/></b>https://www.linkedin.com/in/paulinfosec/</p><p>Penny Jackson, Director Strategy, Awareness &amp; Engagement (Human Risk Management),<b> Aristos Partnership<br/></b>https://www.linkedin.com/in/pennykjackson/</p>]]></description>
    <content:encoded><![CDATA[<ul><li>Meeting your operational and legal obligations - getting your foundations in order</li><li>Cyber-proofing your organisation with comprehensive cyber-security training and awareness</li><li>Developing cyber-hygiene to defend against cyber-criminals using emerging technology</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Paul Holland, Head of Research, <b>Information Security Forum (ISF)<br/></b>https://www.linkedin.com/in/paulinfosec/</p><p>Penny Jackson, Director Strategy, Awareness &amp; Engagement (Human Risk Management),<b> Aristos Partnership<br/></b>https://www.linkedin.com/in/pennykjackson/</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/15826004-teisstalk-confronting-cyber-criminals-strategies-for-cyber-hygiene.mp3" length="32617771" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15826004</guid>
    <pubDate>Thu, 03 Oct 2024 08:00:00 +0100</pubDate>
    <itunes:duration>2713</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Mitigating third-party risk with threat intelligence</itunes:title>
    <title>teissTalk: Mitigating third-party risk with threat intelligence</title>
    <itunes:summary><![CDATA[A proactive approach to third-party risk - continuous monitoring of suppliersUsing threat intelligence to identify third-party riskEffectively working with partners to mitigate third-party security risksThis episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/  Chuck Brooks, Adjunct Professor, Georgetown University https://www.linkedin.com/in/chuckbrooks/ Victoria van Roosmalen, CISO &amp; CPO, Coosto https://www.linkedin.com/in/victoriavanroosmalen/ Stuart Frost, Head...]]></itunes:summary>
    <description><![CDATA[<ul><li>A proactive approach to third-party risk - continuous monitoring of suppliers</li><li>Using threat intelligence to identify third-party risk</li><li>Effectively working with partners to mitigate third-party security risks</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Chuck Brooks, Adjunct Professor, <b>Georgetown University<br/></b><a href='https://www.linkedin.com/in/chuckbrooks/'>https://www.linkedin.com/in/chuckbrooks/</a></p><p>Victoria van Roosmalen, CISO &amp; CPO, <b>Coosto<br/></b><a href='https://www.linkedin.com/in/victoriavanroosmalen/'>https://www.linkedin.com/in/victoriavanroosmalen/</a></p><p>Stuart Frost, Head of Enterprise Security &amp; RIsk Management, <b>Department for Work &amp; Pensions<br/></b><a href='https://www.linkedin.com/in/stuart-frost-bem/'>https://www.linkedin.com/in/stuart-frost-bem/</a></p><p>Andy Grayland, CISO, <b>Silobreaker<br/></b>https://www.linkedin.com/in/dr-andy-g-1b90b4150/</p>]]></description>
    <content:encoded><![CDATA[<ul><li>A proactive approach to third-party risk - continuous monitoring of suppliers</li><li>Using threat intelligence to identify third-party risk</li><li>Effectively working with partners to mitigate third-party security risks</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Chuck Brooks, Adjunct Professor, <b>Georgetown University<br/></b><a href='https://www.linkedin.com/in/chuckbrooks/'>https://www.linkedin.com/in/chuckbrooks/</a></p><p>Victoria van Roosmalen, CISO &amp; CPO, <b>Coosto<br/></b><a href='https://www.linkedin.com/in/victoriavanroosmalen/'>https://www.linkedin.com/in/victoriavanroosmalen/</a></p><p>Stuart Frost, Head of Enterprise Security &amp; RIsk Management, <b>Department for Work &amp; Pensions<br/></b><a href='https://www.linkedin.com/in/stuart-frost-bem/'>https://www.linkedin.com/in/stuart-frost-bem/</a></p><p>Andy Grayland, CISO, <b>Silobreaker<br/></b>https://www.linkedin.com/in/dr-andy-g-1b90b4150/</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/15799376-teisstalk-mitigating-third-party-risk-with-threat-intelligence.mp3" length="31537861" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15799376</guid>
    <pubDate>Thu, 26 Sep 2024 08:00:00 +0100</pubDate>
    <itunes:duration>2623</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: A playbook for new CISOs - learnings from years in the trenches</itunes:title>
    <title>teissTalk: A playbook for new CISOs - learnings from years in the trenches</title>
    <itunes:summary><![CDATA[How the next generation of InfoSec leaders can better prepare themselves to navigate the threats of tomorrowIdentifying the quick wins and making the most of the finite time new CISOs have to get their message acrossPractical measures for reducing stress, burnout and frustration within InfoSec teams over the longer termThis episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/  Paul Watts, Distinguished Analyst, Information Security Forum (ISF) https://www.linkedin.com/...]]></itunes:summary>
    <description><![CDATA[<ul><li>How the next generation of InfoSec leaders can better prepare themselves to navigate the threats of tomorrow</li><li>Identifying the quick wins and making the most of the finite time new CISOs have to get their message across</li><li>Practical measures for reducing stress, burnout and frustration within InfoSec teams over the longer term</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Paul Watts, Distinguished Analyst, <b>Information Security Forum (ISF)</b><br/>https://www.linkedin.com/in/paulewatts/<br/><br/>Dr Andrea Cullen, Co Founder/Co CEO, <b>CAPSLOCK</b><br/>https://www.linkedin.com/in/dr-andrea-cullen/</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>How the next generation of InfoSec leaders can better prepare themselves to navigate the threats of tomorrow</li><li>Identifying the quick wins and making the most of the finite time new CISOs have to get their message across</li><li>Practical measures for reducing stress, burnout and frustration within InfoSec teams over the longer term</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Paul Watts, Distinguished Analyst, <b>Information Security Forum (ISF)</b><br/>https://www.linkedin.com/in/paulewatts/<br/><br/>Dr Andrea Cullen, Co Founder/Co CEO, <b>CAPSLOCK</b><br/>https://www.linkedin.com/in/dr-andrea-cullen/</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/15403217-teisstalk-a-playbook-for-new-cisos-learnings-from-years-in-the-trenches.mp3" length="32331901" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15403217</guid>
    <pubDate>Thu, 18 Jul 2024 08:00:00 +0100</pubDate>
    <itunes:duration>2689</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Eliminating blind spots within your cyber security environment</itunes:title>
    <title>teissTalk: Eliminating blind spots within your cyber security environment</title>
    <itunes:summary><![CDATA[Gaining comprehensive visibility across your hybrid and multi-cloud environmentsMitigating hidden threats and vulnerabilities beyond your endpoints and network parametersMaximising your cyber security investments with better visibility and optimised tool performanceThis episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/  Dr Edewede Oriwoh, Group IT Information and Cyber Security Manager, Zigup Plc https://www.linkedin.com/in/edewedeoriwoh/ Lessie Skiba, Global Direct...]]></itunes:summary>
    <description><![CDATA[<ul><li>Gaining comprehensive visibility across your hybrid and multi-cloud environments</li><li>Mitigating hidden threats and vulnerabilities beyond your endpoints and network parameters</li><li>Maximising your cyber security investments with better visibility and optimised tool performance</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Dr Edewede Oriwoh, Group IT Information and Cyber Security Manager, <b>Zigup Plc<br/></b>https://www.linkedin.com/in/edewedeoriwoh/</p><p>Lessie Skiba, Global Director of Outreach and Partner Engagement, <b>Cyber Readiness Institute<br/></b>https://www.linkedin.com/in/lessie-skiba-2b7460bb/</p><p>Mark Jow, EMEA Tech Lead &amp; Evangelist, <b>Gigamon<br/></b>https://www.linkedin.com/in/mark-jow-4766797</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Gaining comprehensive visibility across your hybrid and multi-cloud environments</li><li>Mitigating hidden threats and vulnerabilities beyond your endpoints and network parameters</li><li>Maximising your cyber security investments with better visibility and optimised tool performance</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Dr Edewede Oriwoh, Group IT Information and Cyber Security Manager, <b>Zigup Plc<br/></b>https://www.linkedin.com/in/edewedeoriwoh/</p><p>Lessie Skiba, Global Director of Outreach and Partner Engagement, <b>Cyber Readiness Institute<br/></b>https://www.linkedin.com/in/lessie-skiba-2b7460bb/</p><p>Mark Jow, EMEA Tech Lead &amp; Evangelist, <b>Gigamon<br/></b>https://www.linkedin.com/in/mark-jow-4766797</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/15326977-teisstalk-eliminating-blind-spots-within-your-cyber-security-environment.mp3" length="33543458" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15326977</guid>
    <pubDate>Thu, 04 Jul 2024 08:00:00 +0100</pubDate>
    <itunes:duration>2790</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Protecting your C-Suite&#39;s private lives to protect the enterprise</itunes:title>
    <title>teissTalk: Protecting your C-Suite&#39;s private lives to protect the enterprise</title>
    <itunes:summary><![CDATA[Threat trends - how threat actors are targeting C-Suite executives to access the enterpriseEmpowering your C-Suite to identify and avoid social engineeringCreating social media policies that your C-Suite understand so that they can lead by exampleThis episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/  Thomas Wendrich, Associate Partner, IBM https://www.linkedin.com/in/thomas-wendrich-5470672  Jacqueline Hanson-Kotei, Senior Manager, Enterprise Information Security &...]]></itunes:summary>
    <description><![CDATA[<ul><li>Threat trends - how threat actors are targeting C-Suite executives to access the enterprise</li><li>Empowering your C-Suite to identify and avoid social engineering</li><li>Creating social media policies that your C-Suite understand so that they can lead by example</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Thomas Wendrich, Associate Partner,<b> IBM</b><br/>https://www.linkedin.com/in/thomas-wendrich-5470672<br/><br/>Jacqueline Hanson-Kotei, Senior Manager, Enterprise Information Security &amp; Governance, <b>MTN Ghana</b><br/>https://www.linkedin.com/in/jacqueihk/<br/><br/>Torsten Wiedemeyer, VP Europe, <b>Cyble</b><br/>https://www.linkedin.com/in/wiedemeyer</p>]]></description>
    <content:encoded><![CDATA[<ul><li>Threat trends - how threat actors are targeting C-Suite executives to access the enterprise</li><li>Empowering your C-Suite to identify and avoid social engineering</li><li>Creating social media policies that your C-Suite understand so that they can lead by example</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Thomas Wendrich, Associate Partner,<b> IBM</b><br/>https://www.linkedin.com/in/thomas-wendrich-5470672<br/><br/>Jacqueline Hanson-Kotei, Senior Manager, Enterprise Information Security &amp; Governance, <b>MTN Ghana</b><br/>https://www.linkedin.com/in/jacqueihk/<br/><br/>Torsten Wiedemeyer, VP Europe, <b>Cyble</b><br/>https://www.linkedin.com/in/wiedemeyer</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/15288381-teisstalk-protecting-your-c-suite-s-private-lives-to-protect-the-enterprise.mp3" length="32933453" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15288381</guid>
    <pubDate>Thu, 27 Jun 2024 08:00:00 +0100</pubDate>
    <itunes:duration>2739</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Securing your sensitive data from exfiltration</itunes:title>
    <title>teissTalk: Securing your sensitive data from exfiltration</title>
    <itunes:summary><![CDATA[Protecting your endpoints - how do cybercriminals exfiltrate data, and what trends are we seeing?Mitigating the financial, legal, and reputational risks with a comprehensive data strategyLeveraging next-generation technology to rapidly detect and respond to data exfiltrating ransomware attacksThis episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/  Neil Hare-Brown, CEO, STORM Guidance https://www.linkedin.com/in/neilhb Prince Adu, Board Member - ISACA Accra Chapter, ...]]></itunes:summary>
    <description><![CDATA[<ul><li>Protecting your endpoints - how do cybercriminals exfiltrate data, and what trends are we seeing?</li><li>Mitigating the financial, legal, and reputational risks with a comprehensive data strategy</li><li>Leveraging next-generation technology to rapidly detect and respond to data exfiltrating ransomware attacks</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Neil Hare-Brown, CEO, <b>STORM Guidance<br/></b>https://www.linkedin.com/in/neilhb</p><p>Prince Adu, Board Member - ISACA Accra Chapter, <b>ISACA<br/></b>https://www.linkedin.com/in/prince-adu-ccsp-cisa-crisc-3759a520/</p><p>Darren Williams, CEO, <b>BlackFog<br/></b>https://www.linkedin.com/in/darrenwwilliams/</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Protecting your endpoints - how do cybercriminals exfiltrate data, and what trends are we seeing?</li><li>Mitigating the financial, legal, and reputational risks with a comprehensive data strategy</li><li>Leveraging next-generation technology to rapidly detect and respond to data exfiltrating ransomware attacks</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Neil Hare-Brown, CEO, <b>STORM Guidance<br/></b>https://www.linkedin.com/in/neilhb</p><p>Prince Adu, Board Member - ISACA Accra Chapter, <b>ISACA<br/></b>https://www.linkedin.com/in/prince-adu-ccsp-cisa-crisc-3759a520/</p><p>Darren Williams, CEO, <b>BlackFog<br/></b>https://www.linkedin.com/in/darrenwwilliams/</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/15210023-teisstalk-securing-your-sensitive-data-from-exfiltration.mp3" length="32416504" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15210023</guid>
    <pubDate>Thu, 13 Jun 2024 08:00:00 +0100</pubDate>
    <itunes:duration>2696</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Fortifying your cyber defenses as a mid-sized organisation</itunes:title>
    <title>teissTalk: Fortifying your cyber defenses as a mid-sized organisation</title>
    <itunes:summary><![CDATA[How you can reduce data loss resulting from user error, disgruntled employees, or cyber attacksLeveraging existing and emerging technologies to enhance your preparedness against the latest attack vectors and threat actorsInvesting in autonomous and integrated security platforms without breaking the bankThis episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/  Dhruva Pudel, Head of Cyber security, Skillcast Group plc https://www.linkedin.com/in/dhruv-cyber/ Kai Michael...]]></itunes:summary>
    <description><![CDATA[<ul><li>How you can reduce data loss resulting from user error, disgruntled employees, or cyber attacks</li><li>Leveraging existing and emerging technologies to enhance your preparedness against the latest attack vectors and threat actors</li><li>Investing in autonomous and integrated security platforms without breaking the bank</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Dhruva Pudel, Head of Cyber security, <b>Skillcast Group plc<br/></b>https://www.linkedin.com/in/dhruv-cyber/</p><p>Kai Michael Hermsen, Managing Board Member and Secretary, <b>Twinds Foundation<br/></b>https://www.linkedin.com/in/kaihermsen/</p><p>Charlie Milton, VP Strategic Alliances, <b>Censornet<br/></b>https://www.linkedin.com/in/charliemilton/</p>]]></description>
    <content:encoded><![CDATA[<ul><li>How you can reduce data loss resulting from user error, disgruntled employees, or cyber attacks</li><li>Leveraging existing and emerging technologies to enhance your preparedness against the latest attack vectors and threat actors</li><li>Investing in autonomous and integrated security platforms without breaking the bank</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Dhruva Pudel, Head of Cyber security, <b>Skillcast Group plc<br/></b>https://www.linkedin.com/in/dhruv-cyber/</p><p>Kai Michael Hermsen, Managing Board Member and Secretary, <b>Twinds Foundation<br/></b>https://www.linkedin.com/in/kaihermsen/</p><p>Charlie Milton, VP Strategic Alliances, <b>Censornet<br/></b>https://www.linkedin.com/in/charliemilton/</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/15128515-teisstalk-fortifying-your-cyber-defenses-as-a-mid-sized-organisation.mp3" length="32264495" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15128515</guid>
    <pubDate>Thu, 30 May 2024 08:00:00 +0100</pubDate>
    <itunes:duration>2684</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Maintaining your credibility as a security advisor</itunes:title>
    <title>teissTalk: Maintaining your credibility as a security advisor</title>
    <itunes:summary><![CDATA[Building rapport with the board through persuasive communication skillsLeveraging your influence to drive business change and manage cyber risksMeasuring the impact of your actions and adviceThis episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/   Alan Jenkins, Principal Consultant, Cyber Security Navigator Ltd https://www.linkedin.com/in/alanjenkins/ Graydon McKee, Senior Director Cybersecurity Engineering, Visa https://www.linkedin.com/in/graydon-mckee/ Laurie Gib...]]></itunes:summary>
    <description><![CDATA[<ul><li>Building rapport with the board through persuasive communication skills</li><li>Leveraging your influence to drive business change and manage cyber risks</li><li>Measuring the impact of your actions and advice</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/> </b>Alan Jenkins, Principal Consultant, <b>Cyber Security Navigator Ltd<br/></b>https://www.linkedin.com/in/alanjenkins/</p><p>Graydon McKee, Senior Director Cybersecurity Engineering, <b>Visa<br/></b>https://www.linkedin.com/in/graydon-mckee/</p><p>Laurie Gibbett, Cyber Risk Quantification Manager, <b>KPMG<br/></b>https://www.linkedin.com/in/lauriegibbett/</p>]]></description>
    <content:encoded><![CDATA[<ul><li>Building rapport with the board through persuasive communication skills</li><li>Leveraging your influence to drive business change and manage cyber risks</li><li>Measuring the impact of your actions and advice</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/> </b>Alan Jenkins, Principal Consultant, <b>Cyber Security Navigator Ltd<br/></b>https://www.linkedin.com/in/alanjenkins/</p><p>Graydon McKee, Senior Director Cybersecurity Engineering, <b>Visa<br/></b>https://www.linkedin.com/in/graydon-mckee/</p><p>Laurie Gibbett, Cyber Risk Quantification Manager, <b>KPMG<br/></b>https://www.linkedin.com/in/lauriegibbett/</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/15044996-teisstalk-maintaining-your-credibility-as-a-security-advisor.mp3" length="32649419" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15044996</guid>
    <pubDate>Thu, 16 May 2024 08:00:00 +0100</pubDate>
    <itunes:duration>2716</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Is privacy the source of your failing security?</itunes:title>
    <title>teissTalk: Is privacy the source of your failing security?</title>
    <itunes:summary><![CDATA[The privacy challenges of using the network as your fundemental point of defenceWhether InfoSec leaders can ever get full network visibilitySetting privacy controls to reduce vulnerabilities and blindspots within your networkThis episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/  Tom Ellis-Aziz, Associate Director, Control Risks https://www.linkedin.com/in/tomasellis-aziz/ Raul Zeppenfeldt, Principal Consultant, PA Consulting https://www.linkedin.com/in/raul-z-91198...]]></itunes:summary>
    <description><![CDATA[<ul><li>The privacy challenges of using the network as your fundemental point of defence</li><li>Whether InfoSec leaders can ever get full network visibility</li><li>Setting privacy controls to reduce vulnerabilities and blindspots within your network</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Tom Ellis-Aziz, Associate Director,<b> Control Risks<br/></b>https://www.linkedin.com/in/tomasellis-aziz/</p><p>Raul Zeppenfeldt, Principal Consultant,<b> PA Consulting<br/></b>https://www.linkedin.com/in/raul-z-91198b2b/a</p><p>Jamie Moles, Senior Technical Marketing Manager, <b>ExtraHop<br/></b>https://www.linkedin.com/in/jamiemoles</p>]]></description>
    <content:encoded><![CDATA[<ul><li>The privacy challenges of using the network as your fundemental point of defence</li><li>Whether InfoSec leaders can ever get full network visibility</li><li>Setting privacy controls to reduce vulnerabilities and blindspots within your network</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Tom Ellis-Aziz, Associate Director,<b> Control Risks<br/></b>https://www.linkedin.com/in/tomasellis-aziz/</p><p>Raul Zeppenfeldt, Principal Consultant,<b> PA Consulting<br/></b>https://www.linkedin.com/in/raul-z-91198b2b/a</p><p>Jamie Moles, Senior Technical Marketing Manager, <b>ExtraHop<br/></b>https://www.linkedin.com/in/jamiemoles</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/14959886-teisstalk-is-privacy-the-source-of-your-failing-security.mp3" length="32199898" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14959886</guid>
    <pubDate>Thu, 02 May 2024 08:00:00 +0100</pubDate>
    <itunes:duration>2678</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Selling infosec as a business enabler</itunes:title>
    <title>teissTalk: Selling infosec as a business enabler</title>
    <itunes:summary><![CDATA[Proving that your infosec strategy delivers a competitive advantageManaging the risks and costs of a business-enabling infosec teamBalancing business objectives with infosec needs to deliver security and growthThis episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/  Alan Jenkins, Principal Consultant, Cyber Security Navigator Ltd https://www.linkedin.com/in/alanjenkins/ Garrett Smiley, Adjunct Dissertation Chair / Distinguished Core Part-Time Professor, National Univ...]]></itunes:summary>
    <description><![CDATA[<ul><li>Proving that your infosec strategy delivers a competitive advantage</li><li>Managing the risks and costs of a business-enabling infosec team</li><li>Balancing business objectives with infosec needs to deliver security and growth</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Alan Jenkins, Principal Consultant, <b>Cyber Security Navigator Ltd<br/></b>https://www.linkedin.com/in/alanjenkins/</p><p>Garrett Smiley, Adjunct Dissertation Chair / Distinguished Core Part-Time Professor, <b>National University<br/></b>https://www.linkedin.com/in/garrettsmiley/</p><p>Dom Lucas, Head of Security, <b>British International Investment<br/></b>https://www.linkedin.com/in/dom-lucas-mciis-msyl-30223528/</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Proving that your infosec strategy delivers a competitive advantage</li><li>Managing the risks and costs of a business-enabling infosec team</li><li>Balancing business objectives with infosec needs to deliver security and growth</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Alan Jenkins, Principal Consultant, <b>Cyber Security Navigator Ltd<br/></b>https://www.linkedin.com/in/alanjenkins/</p><p>Garrett Smiley, Adjunct Dissertation Chair / Distinguished Core Part-Time Professor, <b>National University<br/></b>https://www.linkedin.com/in/garrettsmiley/</p><p>Dom Lucas, Head of Security, <b>British International Investment<br/></b>https://www.linkedin.com/in/dom-lucas-mciis-msyl-30223528/</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/14917470-teisstalk-selling-infosec-as-a-business-enabler.mp3" length="32391408" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14917470</guid>
    <pubDate>Thu, 25 Apr 2024 08:00:00 +0100</pubDate>
    <itunes:duration>2694</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: How AI can improve your security and compliance programmes</itunes:title>
    <title>teissTalk: How AI can improve your security and compliance programmes</title>
    <itunes:summary><![CDATA[How infosec leaders can support product teams incorporating generative AIUsing AI to improve compliance processes and ongoing vulnerability monitoringMitigating and minimising AI-based information security risks with ISO 42001This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/  Dean Sapp, SVP, Information Security, Privacy, Risk and Compliance (DPO), Filevine https://www.linkedin.com/in/deansapp/ Jonathan Craven, Privacy and Compliance Lead, UK, iRhythm Technolog...]]></itunes:summary>
    <description><![CDATA[<ul><li>How infosec leaders can support product teams incorporating generative AI</li><li>Using AI to improve compliance processes and ongoing vulnerability monitoring</li><li>Mitigating and minimising AI-based information security risks with ISO 42001</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Dean Sapp, SVP, Information Security, Privacy, Risk and Compliance (DPO), <b>Filevine<br/></b>https://www.linkedin.com/in/deansapp/</p><p>Jonathan Craven, Privacy and Compliance Lead, UK, <b>iRhythm Technologies UK<br/></b>https://www.linkedin.com/in/jonathanbcraven/</p><p>Herman Errico, Head of Security Program Management, <b>Vanta<br/></b>https://www.linkedin.com/in/hermanerrico</p>]]></description>
    <content:encoded><![CDATA[<ul><li>How infosec leaders can support product teams incorporating generative AI</li><li>Using AI to improve compliance processes and ongoing vulnerability monitoring</li><li>Mitigating and minimising AI-based information security risks with ISO 42001</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Dean Sapp, SVP, Information Security, Privacy, Risk and Compliance (DPO), <b>Filevine<br/></b>https://www.linkedin.com/in/deansapp/</p><p>Jonathan Craven, Privacy and Compliance Lead, UK, <b>iRhythm Technologies UK<br/></b>https://www.linkedin.com/in/jonathanbcraven/</p><p>Herman Errico, Head of Security Program Management, <b>Vanta<br/></b>https://www.linkedin.com/in/hermanerrico</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/14832366-teisstalk-how-ai-can-improve-your-security-and-compliance-programmes.mp3" length="33632291" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14832366</guid>
    <pubDate>Thu, 11 Apr 2024 09:00:00 +0100</pubDate>
    <itunes:duration>2797</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Where AI-driven threat detection can streamline your SOC</itunes:title>
    <title>teissTalk: Where AI-driven threat detection can streamline your SOC</title>
    <itunes:summary><![CDATA[Closing the cybersecurity gap - acting fast against critical threatsAligning to current compliance standards without the heavy-liftingLeveraging AI-powered tools to maximise your security investmentsThis episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/  Mike Johnson, Global Cyber Threat &amp; Incident Response Manager, Verifone https://www.linkedin.com/in/mike---johnson/  Matt Hardy, Head of Security, Liberis https://www.linkedin.com/in/matthardy67/  Kiarash Kia, F...]]></itunes:summary>
    <description><![CDATA[<ul><li>Closing the cybersecurity gap - acting fast against critical threats</li><li>Aligning to current compliance standards without the heavy-lifting</li><li>Leveraging AI-powered tools to maximise your security investments</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Mike Johnson, Global Cyber Threat &amp; Incident Response Manager, <b>Verifone</b><br/>https://www.linkedin.com/in/mike---johnson/<br/><br/>Matt Hardy, Head of Security, <b>Liberis</b><br/>https://www.linkedin.com/in/matthardy67/<br/><br/>Kiarash Kia, Founder, <b>Stealth Startup</b><br/>https://www.linkedin.com/in/kiarashkia/<br/><br/>Dan Crossley, Director, Security Engineering, <b>Vectra.ai</b><br/>https://www.linkedin.com/in/crossleydaniel</p>]]></description>
    <content:encoded><![CDATA[<ul><li>Closing the cybersecurity gap - acting fast against critical threats</li><li>Aligning to current compliance standards without the heavy-lifting</li><li>Leveraging AI-powered tools to maximise your security investments</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Mike Johnson, Global Cyber Threat &amp; Incident Response Manager, <b>Verifone</b><br/>https://www.linkedin.com/in/mike---johnson/<br/><br/>Matt Hardy, Head of Security, <b>Liberis</b><br/>https://www.linkedin.com/in/matthardy67/<br/><br/>Kiarash Kia, Founder, <b>Stealth Startup</b><br/>https://www.linkedin.com/in/kiarashkia/<br/><br/>Dan Crossley, Director, Security Engineering, <b>Vectra.ai</b><br/>https://www.linkedin.com/in/crossleydaniel</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/14791767-teisstalk-where-ai-driven-threat-detection-can-streamline-your-soc.mp3" length="33207536" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14791767</guid>
    <pubDate>Fri, 05 Apr 2024 08:00:00 +0100</pubDate>
    <itunes:duration>2762</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Assessing and mitigating risks in your OT environment</itunes:title>
    <title>teissTalk: Assessing and mitigating risks in your OT environment</title>
    <itunes:summary><![CDATA[Ensuring your risk management framework meets your organisation’s needsRansomware, legacy devices and remote access - risk trends for OTWhy you should prioritise risks based on the likelihood of exploitation as well as impactThis episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/  Syed Ubaid Ali Jafri, Head of Cyber Defence &amp; Offensive Security, HBL - Habib Bank Limited https://www.linkedin.com/in/ubaidjafri Giles Dunn, Partner &amp; OT Cyber Security leader, EY ...]]></itunes:summary>
    <description><![CDATA[<ul><li>Ensuring your risk management framework meets your organisation’s needs</li><li>Ransomware, legacy devices and remote access - risk trends for OT</li><li>Why you should prioritise risks based on the likelihood of exploitation as well as impact</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Syed Ubaid Ali Jafri, Head of Cyber Defence &amp; Offensive Security, <b>HBL - Habib Bank Limited<br/></b>https://www.linkedin.com/in/ubaidjafri</p><p>Giles Dunn, Partner &amp; OT Cyber Security leader, <b>EY<br/></b>https://www.linkedin.com/in/giles-dunn-6485a2117/</p><p>Amir Preminger, VP Research, <b>Claroty<br/></b>https://www.linkedin.com/in/amir-preminger-207a0553/</p><p>Max Higginson, Cyber Security Manager (ICS/OT),<b> Dominos UK<br/></b>https://www.linkedin.com/in/max-higginson/</p>]]></description>
    <content:encoded><![CDATA[<ul><li>Ensuring your risk management framework meets your organisation’s needs</li><li>Ransomware, legacy devices and remote access - risk trends for OT</li><li>Why you should prioritise risks based on the likelihood of exploitation as well as impact</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Syed Ubaid Ali Jafri, Head of Cyber Defence &amp; Offensive Security, <b>HBL - Habib Bank Limited<br/></b>https://www.linkedin.com/in/ubaidjafri</p><p>Giles Dunn, Partner &amp; OT Cyber Security leader, <b>EY<br/></b>https://www.linkedin.com/in/giles-dunn-6485a2117/</p><p>Amir Preminger, VP Research, <b>Claroty<br/></b>https://www.linkedin.com/in/amir-preminger-207a0553/</p><p>Max Higginson, Cyber Security Manager (ICS/OT),<b> Dominos UK<br/></b>https://www.linkedin.com/in/max-higginson/</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/14743093-teisstalk-assessing-and-mitigating-risks-in-your-ot-environment.mp3" length="33156121" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14743093</guid>
    <pubDate>Fri, 29 Mar 2024 08:00:00 +0000</pubDate>
    <itunes:duration>2757</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Is your organisation prepared for NIS2?</itunes:title>
    <title>teissTalk: Is your organisation prepared for NIS2?</title>
    <itunes:summary><![CDATA[How does NIS2 address risks within critical supply chains and information sharing across borders?Maintaining a proactive stance against evolving threats - how continuous improvement complies with NIS2Ensuring timely compliance - meeting the new requirements in risk assessment and avoiding penaltiesThis episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/  Jay Moloo, Corporate Information Security Officer, DB Schenker https://www.linkedin.com/in/jaymoloo/ Lee Elliott, D...]]></itunes:summary>
    <description><![CDATA[<ul><li>How does NIS2 address risks within critical supply chains and information sharing across borders?</li><li>Maintaining a proactive stance against evolving threats - how continuous improvement complies with NIS2</li><li>Ensuring timely compliance - meeting the new requirements in risk assessment and avoiding penalties</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Jay Moloo, Corporate Information Security Officer, <b>DB Schenker<br/>https://www.linkedin.com/in/jaymoloo/</b></p><p>Lee Elliott, Director, Solutions Engineering, <b>BeyondTrust<br/>https://www.linkedin.com/in/lee-elliott/</b></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>How does NIS2 address risks within critical supply chains and information sharing across borders?</li><li>Maintaining a proactive stance against evolving threats - how continuous improvement complies with NIS2</li><li>Ensuring timely compliance - meeting the new requirements in risk assessment and avoiding penalties</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Jay Moloo, Corporate Information Security Officer, <b>DB Schenker<br/>https://www.linkedin.com/in/jaymoloo/</b></p><p>Lee Elliott, Director, Solutions Engineering, <b>BeyondTrust<br/>https://www.linkedin.com/in/lee-elliott/</b></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/14694897-teisstalk-is-your-organisation-prepared-for-nis2.mp3" length="30024847" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14694897</guid>
    <pubDate>Fri, 22 Mar 2024 08:00:00 +0000</pubDate>
    <itunes:duration>2496</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Is your organisation cyber resilient?</itunes:title>
    <title>teissTalk: Is your organisation cyber resilient?</title>
    <itunes:summary><![CDATA[Selecting metrics that best convey the impacts and risks of your strategy to the boardHow the changing threat landscape will affect your cyber resilienceThe role cyber insurance plays as a component of your resilience strategyThis episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/  Daniel G. Dresner, Professor of Cybersecurity, University of Manchester https://www.linkedin.com/in/danny-dresner-fciis-6382381  Mike Yeomans, Manager, Cyber Risk Quantification Service De...]]></itunes:summary>
    <description><![CDATA[<ul><li>Selecting metrics that best convey the impacts and risks of your strategy to the board</li><li>How the changing threat landscape will affect your cyber resilience</li><li>The role cyber insurance plays as a component of your resilience strategy</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Daniel G. Dresner, Professor of Cybersecurity, University of Manchester<b><br/>https://www.linkedin.com/in/danny-dresner-fciis-6382381<br/></b><br/>Mike Yeomans, Manager, Cyber Risk Quantification Service Delivery Lead, KPMG<b><br/>https://www.linkedin.com/in/mike-y-46129467/<br/></b><br/>Sam Woodcock, Senior Director - Cloud Strategy, 11:11 Systems<b><br/>https://www.linkedin.com/in/samuel-woodcock-9745b831/</b></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Selecting metrics that best convey the impacts and risks of your strategy to the board</li><li>How the changing threat landscape will affect your cyber resilience</li><li>The role cyber insurance plays as a component of your resilience strategy</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/><br/></b>Daniel G. Dresner, Professor of Cybersecurity, University of Manchester<b><br/>https://www.linkedin.com/in/danny-dresner-fciis-6382381<br/></b><br/>Mike Yeomans, Manager, Cyber Risk Quantification Service Delivery Lead, KPMG<b><br/>https://www.linkedin.com/in/mike-y-46129467/<br/></b><br/>Sam Woodcock, Senior Director - Cloud Strategy, 11:11 Systems<b><br/>https://www.linkedin.com/in/samuel-woodcock-9745b831/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/14651497-teisstalk-is-your-organisation-cyber-resilient.mp3" length="31847667" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14651497</guid>
    <pubDate>Fri, 15 Mar 2024 08:00:00 +0000</pubDate>
    <itunes:duration>2648</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Can AI mitigate your supply chain cyber-risks?</itunes:title>
    <title>teissTalk: Can AI mitigate your supply chain cyber-risks?</title>
    <itunes:summary><![CDATA[Why sharing data means better decisions across your supply chain networkWhere AI-powered tools can support continuous monitoring and analysisPredicting cyber-risks with AI-driven analyticsThis episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/  Edd Hardy, Director Cyber and Risk, AlixPartners https://www.linkedin.com/in/eddhardy/  Jean Carlos, VP of Information Security, AutogenAI https://www.linkedin.com/in/jeanpc/     ]]></itunes:summary>
    <description><![CDATA[<ul><li>Why sharing data means better decisions across your supply chain network</li><li>Where AI-powered tools can support continuous monitoring and analysis</li><li>Predicting cyber-risks with AI-driven analytics</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/></b><br/>Edd Hardy, Director Cyber and Risk, AlixPartners<br/><b>https://www.linkedin.com/in/eddhardy/</b><br/><br/>Jean Carlos, VP of Information Security, AutogenAI<br/><b>https://www.linkedin.com/in/jeanpc/<br/></b><br/></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Why sharing data means better decisions across your supply chain network</li><li>Where AI-powered tools can support continuous monitoring and analysis</li><li>Predicting cyber-risks with AI-driven analytics</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/<br/></b><br/>Edd Hardy, Director Cyber and Risk, AlixPartners<br/><b>https://www.linkedin.com/in/eddhardy/</b><br/><br/>Jean Carlos, VP of Information Security, AutogenAI<br/><b>https://www.linkedin.com/in/jeanpc/<br/></b><br/></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/14515076-teisstalk-can-ai-mitigate-your-supply-chain-cyber-risks.mp3" length="33216606" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14515076</guid>
    <pubDate>Fri, 23 Feb 2024 08:00:00 +0000</pubDate>
    <itunes:duration>2762</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Phishing simulations – should you bother?</itunes:title>
    <title>teissTalk: Phishing simulations – should you bother?</title>
    <itunes:summary><![CDATA[This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Phishing simulations – should you bother? Why phishing simulations can be more trouble than they’re worth, and how you can lead the changeChanges can you deploy to increase staff diligence and keep security front and centreHow phishing simulations can match the latest threat trendsThis episode is hosted...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Phishing simulations – should you bother?</b></p><ul><li>Why phishing simulations can be more trouble than they’re worth, and how you can lead the change</li><li>Changes can you deploy to increase staff diligence and keep security front and centre</li><li>How phishing simulations can match the latest threat trends</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Paul W., Distinguished Analyst, Information Security Forum (ISF)<br/><b>https://www.linkedin.com/in/paulewatts/</b><br/><br/>Andrew Rose, Board Advisor - Cyber Security, Mencap<br/><b>https://www.linkedin.com/in/andrewrose1/</b><br/><br/>Ben Wynn-Jones, Information Awareness Lead, Canon EMEA<br/><b>https://www.linkedin.com/in/ben-wynn-jones/</b></p><p><br/><br/><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Phishing simulations – should you bother?</b></p><ul><li>Why phishing simulations can be more trouble than they’re worth, and how you can lead the change</li><li>Changes can you deploy to increase staff diligence and keep security front and centre</li><li>How phishing simulations can match the latest threat trends</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Paul W., Distinguished Analyst, Information Security Forum (ISF)<br/><b>https://www.linkedin.com/in/paulewatts/</b><br/><br/>Andrew Rose, Board Advisor - Cyber Security, Mencap<br/><b>https://www.linkedin.com/in/andrewrose1/</b><br/><br/>Ben Wynn-Jones, Information Awareness Lead, Canon EMEA<br/><b>https://www.linkedin.com/in/ben-wynn-jones/</b></p><p><br/><br/><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/14470155-teisstalk-phishing-simulations-should-you-bother.mp3" length="33036978" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14470155</guid>
    <pubDate>Thu, 15 Feb 2024 08:00:00 +0000</pubDate>
    <itunes:duration>2747</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Is your cyber security approach leaving neurodiverse colleagues behind?</itunes:title>
    <title>teissTalk: Is your cyber security approach leaving neurodiverse colleagues behind?</title>
    <itunes:summary><![CDATA[This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Is your cyber security approach leaving neurodiverse colleagues behind? Ensuring your digital tools and platforms are accessible to people with neurodiverse traitsImplementing security measures that protect neurodiverse users from active cyber-threatsPromoting an inclusive approach to cyber-security acr...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Is your cyber security approach leaving neurodiverse colleagues behind?</b></p><ul><li>Ensuring your digital tools and platforms are accessible to people with neurodiverse traits</li><li>Implementing security measures that protect neurodiverse users from active cyber-threats</li><li>Promoting an inclusive approach to cyber-security across the organisation</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Holly Foxcroft, NeuroDiversity Consultant<br/><b>https://www.linkedin.com/in/hollyfoxcroft/</b></p><p>Rebecca Massey, Security Awareness Specialist,<b> Pinsent Masons LLP<br/>https://www.linkedin.com/in/creative-minds-in-cyber/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Is your cyber security approach leaving neurodiverse colleagues behind?</b></p><ul><li>Ensuring your digital tools and platforms are accessible to people with neurodiverse traits</li><li>Implementing security measures that protect neurodiverse users from active cyber-threats</li><li>Promoting an inclusive approach to cyber-security across the organisation</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Holly Foxcroft, NeuroDiversity Consultant<br/><b>https://www.linkedin.com/in/hollyfoxcroft/</b></p><p>Rebecca Massey, Security Awareness Specialist,<b> Pinsent Masons LLP<br/>https://www.linkedin.com/in/creative-minds-in-cyber/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/14382171-teisstalk-is-your-cyber-security-approach-leaving-neurodiverse-colleagues-behind.mp3" length="33170890" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14382171</guid>
    <pubDate>Thu, 01 Feb 2024 08:00:00 +0000</pubDate>
    <itunes:duration>2759</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Can internal audit boost your cyber security readiness?</itunes:title>
    <title>teissTalk: Can internal audit boost your cyber security readiness?</title>
    <itunes:summary><![CDATA[This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Can internal audit boost your cyber security readiness? Getting an internal second opinion to help identify your cyber-security weaknessesAuditing your controls, policies and procedures to address those cyber-security weaknessesUsing language everyone can understand to communicate cyber riskThis episode...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Can internal audit boost your cyber security readiness?</b></p><ul><li>Getting an internal second opinion to help identify your cyber-security weaknesses</li><li>Auditing your controls, policies and procedures to address those cyber-security weaknesses</li><li>Using language everyone can understand to communicate cyber risk</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Veselin Monev, Information Security Officer, <b>Pilatus Aircraft Ltd<br/>https://www.linkedin.com/in/vmonev/</b></p><p>Daniel G. Dresner, Professor of Cybersecurity, <b>University of Manchester<br/>https://www.linkedin.com/in/danny-dresner-fciis-6382381/</b></p><p>Deborah Haworth, Director of Information Security, <b>Penguin Random Househttps://www.linkedin.com/in/deborah-haworth/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Can internal audit boost your cyber security readiness?</b></p><ul><li>Getting an internal second opinion to help identify your cyber-security weaknesses</li><li>Auditing your controls, policies and procedures to address those cyber-security weaknesses</li><li>Using language everyone can understand to communicate cyber risk</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Veselin Monev, Information Security Officer, <b>Pilatus Aircraft Ltd<br/>https://www.linkedin.com/in/vmonev/</b></p><p>Daniel G. Dresner, Professor of Cybersecurity, <b>University of Manchester<br/>https://www.linkedin.com/in/danny-dresner-fciis-6382381/</b></p><p>Deborah Haworth, Director of Information Security, <b>Penguin Random Househttps://www.linkedin.com/in/deborah-haworth/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/14327015-teisstalk-can-internal-audit-boost-your-cyber-security-readiness.mp3" length="32953310" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14327015</guid>
    <pubDate>Thu, 18 Jan 2024 08:00:00 +0000</pubDate>
    <itunes:duration>2740</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: ROI from your SOC - measuring impact and reporting progress</itunes:title>
    <title>teissTalk: ROI from your SOC - measuring impact and reporting progress</title>
    <itunes:summary><![CDATA[This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: ROI from your SOC - measuring impact and reporting progress Tools for measuring ROI for your SOC - where to look for the greatest impactWhat are the best capabilities and attributes for a high-perfoming SOC, and what change you should measureSpeaking the board’s language - reporting the impact of spend ...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: ROI from your SOC - measuring impact and reporting progress</b></p><ul><li>Tools for measuring ROI for your SOC - where to look for the greatest impact</li><li>What are the best capabilities and attributes for a high-perfoming SOC, and what change you should measure</li><li>Speaking the board’s language - reporting the impact of spend and reduced cyber risk</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Vishal Sharma, BISO, CISO office, <b>Santander UK<br/>https://www.linkedin.com/in/vishal-s-11ba15115/</b></p><p>Minesh Dattani, Head of Cyber Security Operations, <b>Simply Business<br/>https://www.linkedin.com/in/minesh-dattani-023b3581/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: ROI from your SOC - measuring impact and reporting progress</b></p><ul><li>Tools for measuring ROI for your SOC - where to look for the greatest impact</li><li>What are the best capabilities and attributes for a high-perfoming SOC, and what change you should measure</li><li>Speaking the board’s language - reporting the impact of spend and reduced cyber risk</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Vishal Sharma, BISO, CISO office, <b>Santander UK<br/>https://www.linkedin.com/in/vishal-s-11ba15115/</b></p><p>Minesh Dattani, Head of Cyber Security Operations, <b>Simply Business<br/>https://www.linkedin.com/in/minesh-dattani-023b3581/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/14152038-teisstalk-roi-from-your-soc-measuring-impact-and-reporting-progress.mp3" length="33626650" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14152038</guid>
    <pubDate>Thu, 21 Dec 2023 08:00:00 +0000</pubDate>
    <itunes:duration>2797</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Improving your cyber resilience with threat intelligence</itunes:title>
    <title>teissTalk: Improving your cyber resilience with threat intelligence</title>
    <itunes:summary><![CDATA[This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Improving your cyber resilience with threat intelligence How the changing threat landscape could damage your cyber resilienceImplementing the latest threat intelligence to improve your cyber-resilienceSelling threat intelligence to the board – how to link spend to increased resilienceThis episode is hos...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Improving your cyber resilience with threat intelligence</b></p><ul><li>How the changing threat landscape could damage your cyber resilience</li><li>Implementing the latest threat intelligence to improve your cyber-resilience</li><li>Selling threat intelligence to the board – how to link spend to increased resilience</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Sajan Gautam, Chief Information Security Officer, <b>Arvest Bank<br/>https://www.linkedin.com/in/sajan-gautam-27a4125/</b></p><p>Endré Walls, Member - Senior Council, <b>OnConferences<br/>https://www.linkedin.com/in/endrewalls/</b></p><p>Jon Cosson, Head of IT &amp; Chief Information Security Officer, <b>JM Finn<br/>https://www.linkedin.com/in/jon-cosson/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Improving your cyber resilience with threat intelligence</b></p><ul><li>How the changing threat landscape could damage your cyber resilience</li><li>Implementing the latest threat intelligence to improve your cyber-resilience</li><li>Selling threat intelligence to the board – how to link spend to increased resilience</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Sajan Gautam, Chief Information Security Officer, <b>Arvest Bank<br/>https://www.linkedin.com/in/sajan-gautam-27a4125/</b></p><p>Endré Walls, Member - Senior Council, <b>OnConferences<br/>https://www.linkedin.com/in/endrewalls/</b></p><p>Jon Cosson, Head of IT &amp; Chief Information Security Officer, <b>JM Finn<br/>https://www.linkedin.com/in/jon-cosson/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/14069436-teisstalk-improving-your-cyber-resilience-with-threat-intelligence.mp3" length="32992182" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14069436</guid>
    <pubDate>Thu, 07 Dec 2023 08:00:00 +0000</pubDate>
    <itunes:duration>2744</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Embracing AI tools across your organisation - ensuring you remain secure</itunes:title>
    <title>teissTalk: Embracing AI tools across your organisation - ensuring you remain secure</title>
    <itunes:summary><![CDATA[This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Embracing AI tools across your organisation - ensuring you remain secure The opportunities and risks widespread adoption of AI poses to your organisationHow infosec thinking can keep all departments safe as they adopt AI toolsBest practices for integrating AI tools across the organisationThis episode is...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Embracing AI tools across your organisation - ensuring you remain secure</b></p><ul><li>The opportunities and risks widespread adoption of AI poses to your organisation</li><li>How infosec thinking can keep all departments safe as they adopt AI tools</li><li>Best practices for integrating AI tools across the organisation</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Eldar Lillevik, Partner - Cyber Security &amp; Privacy, <b>PwC<br/>https://www.linkedin.com/in/eldarlillevik/</b></p><p>Laiz Batista Tellefsen, Board Member, <b>Den norske dataforening (DND)<br/>https://www.linkedin.com/in/laizbatista/</b></p><p>Andres Andreu, SVP, CISO,<b> 2U<br/>https://www.linkedin.com/in/andresandreu/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Embracing AI tools across your organisation - ensuring you remain secure</b></p><ul><li>The opportunities and risks widespread adoption of AI poses to your organisation</li><li>How infosec thinking can keep all departments safe as they adopt AI tools</li><li>Best practices for integrating AI tools across the organisation</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Eldar Lillevik, Partner - Cyber Security &amp; Privacy, <b>PwC<br/>https://www.linkedin.com/in/eldarlillevik/</b></p><p>Laiz Batista Tellefsen, Board Member, <b>Den norske dataforening (DND)<br/>https://www.linkedin.com/in/laizbatista/</b></p><p>Andres Andreu, SVP, CISO,<b> 2U<br/>https://www.linkedin.com/in/andresandreu/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/13990486-teisstalk-embracing-ai-tools-across-your-organisation-ensuring-you-remain-secure.mp3" length="33684668" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13990486</guid>
    <pubDate>Thu, 23 Nov 2023 08:00:00 +0000</pubDate>
    <itunes:duration>2801</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Securing your Industrial IoT</itunes:title>
    <title>teissTalk: Securing your Industrial IoT</title>
    <itunes:summary><![CDATA[This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Securing your Industrial IoT How cyber-threat actors are exploiting Industrial IoT, and what the profile of a typical attack looks likeBest practices for managing and mitigating vulnerabilities affecting Industrial IoT assetsThe implications for the regulatory landscapeThis episode is hosted by Thom Lan...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Securing your Industrial IoT</b></p><ul><li>How cyber-threat actors are exploiting Industrial IoT, and what the profile of a typical attack looks like</li><li>Best practices for managing and mitigating vulnerabilities affecting Industrial IoT assets</li><li>The implications for the regulatory landscape</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>John Opala, VP &amp; Global Chief Information Security Officer, <b>Hanesbrands Inc.<br/>https://www.linkedin.com/in/johnopalaphd/</b></p><p>Grant Geyer, Chief Product Officer, <b>Claroty<br/>https://www.linkedin.com/in/grantgeyer/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Securing your Industrial IoT</b></p><ul><li>How cyber-threat actors are exploiting Industrial IoT, and what the profile of a typical attack looks like</li><li>Best practices for managing and mitigating vulnerabilities affecting Industrial IoT assets</li><li>The implications for the regulatory landscape</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>John Opala, VP &amp; Global Chief Information Security Officer, <b>Hanesbrands Inc.<br/>https://www.linkedin.com/in/johnopalaphd/</b></p><p>Grant Geyer, Chief Product Officer, <b>Claroty<br/>https://www.linkedin.com/in/grantgeyer/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/13946032-teisstalk-securing-your-industrial-iot.mp3" length="31421331" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13946032</guid>
    <pubDate>Thu, 16 Nov 2023 08:00:00 +0000</pubDate>
    <itunes:duration>2613</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Helping colleagues recognise and learn from their risky behaviour</itunes:title>
    <title>teissTalk: Helping colleagues recognise and learn from their risky behaviour</title>
    <itunes:summary><![CDATA[This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Helping colleagues recognise and learn from their risky behaviour Enabling a "no-blame" culture where colleagues feel confident reporting their near missesUsing examples and anecdotes to help colleagues understand the operational risksLeading the culture change from "blame" to "no blame"This episode is ...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/>teissTalk: Helping colleagues recognise and learn from their risky behaviour</p><ul><li>Enabling a &quot;no-blame&quot; culture where colleagues feel confident reporting their near misses</li><li>Using examples and anecdotes to help colleagues understand the operational risks</li><li>Leading the culture change from &quot;blame&quot; to &quot;no blame&quot;</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Keil Hubert, Associate Principal, Security Human Risk Management, <b>OCC<br/>https://www.linkedin.com/in/khubert/</b></p><p>Rob Flanders, Head of Threat and Incident Response, <b>BAE Systems<br/>https://www.linkedin.com/in/robert-flanders-31b01976/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/>teissTalk: Helping colleagues recognise and learn from their risky behaviour</p><ul><li>Enabling a &quot;no-blame&quot; culture where colleagues feel confident reporting their near misses</li><li>Using examples and anecdotes to help colleagues understand the operational risks</li><li>Leading the culture change from &quot;blame&quot; to &quot;no blame&quot;</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Keil Hubert, Associate Principal, Security Human Risk Management, <b>OCC<br/>https://www.linkedin.com/in/khubert/</b></p><p>Rob Flanders, Head of Threat and Incident Response, <b>BAE Systems<br/>https://www.linkedin.com/in/robert-flanders-31b01976/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/13917697-teisstalk-helping-colleagues-recognise-and-learn-from-their-risky-behaviour.mp3" length="32050538" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13917697</guid>
    <pubDate>Thu, 09 Nov 2023 08:00:00 +0000</pubDate>
    <itunes:duration>2665</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Building a more inclusive cybersecurity team</itunes:title>
    <title>teissTalk: Building a more inclusive cybersecurity team</title>
    <itunes:summary><![CDATA[This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Building a more inclusive cybersecurity team Avoiding the one-size-fits-all approach to meeting people’s neurodiversity needsRecognising burnout in your neurodiverse security analystsRemoving barriers to maximising performance with your neurodiverse colleaguesThis episode is hosted by Thom Langford http...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Building a more inclusive cybersecurity team</b></p><ul><li>Avoiding the one-size-fits-all approach to meeting people’s neurodiversity needs</li><li>Recognising burnout in your neurodiverse security analysts</li><li>Removing barriers to maximising performance with your neurodiverse colleagues</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Lisa Ventura, Cyber Security Specialist &amp; Founder, <b>Cyber Security Unity<br/>https://www.linkedin.com/in/lisasventura/</b></p><p>Sam Masiello, Chief Information Security Officer, <b>The Anschutz Corporation<br/>https://www.linkedin.com/in/smasiello/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Building a more inclusive cybersecurity team</b></p><ul><li>Avoiding the one-size-fits-all approach to meeting people’s neurodiversity needs</li><li>Recognising burnout in your neurodiverse security analysts</li><li>Removing barriers to maximising performance with your neurodiverse colleagues</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Lisa Ventura, Cyber Security Specialist &amp; Founder, <b>Cyber Security Unity<br/>https://www.linkedin.com/in/lisasventura/</b></p><p>Sam Masiello, Chief Information Security Officer, <b>The Anschutz Corporation<br/>https://www.linkedin.com/in/smasiello/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/13813838-teisstalk-building-a-more-inclusive-cybersecurity-team.mp3" length="30395378" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13813838</guid>
    <pubDate>Thu, 26 Oct 2023 08:00:00 +0100</pubDate>
    <itunes:duration>2527</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Why your non-cyber colleagues aren&#39;t listening to you</itunes:title>
    <title>teissTalk: Why your non-cyber colleagues aren&#39;t listening to you</title>
    <itunes:summary><![CDATA[This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Why your non-cyber colleagues aren't listening to you How to get your language right when translating the jargonMaking your training relevant and interestingHow to best use actual examples and active threats to make the risks resonateThis episode is hosted by Thom Langford https://www.linkedin.com/in/th...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Why your non-cyber colleagues aren&apos;t listening to you</b></p><ul><li>How to get your language right when translating the jargon</li><li>Making your training relevant and interesting</li><li>How to best use actual examples and active threats to make the risks resonate</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Lisa Ventura, Cyber Security Specialist &amp; Founder, <b>Cyber Security Unity<br/>https://www.linkedin.com/in/lisasventura/</b></p><p>Dom Lucas, Head of Security, <b>British International Investment<br/>https://www.linkedin.com/in/dom-lucas-mciis-30223528/</b></p><p>Dennis Leber, Director of Cyber Security, <b>Honest Medical Group<br/>https://www.linkedin.com/in/dennisleber/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Why your non-cyber colleagues aren&apos;t listening to you</b></p><ul><li>How to get your language right when translating the jargon</li><li>Making your training relevant and interesting</li><li>How to best use actual examples and active threats to make the risks resonate</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Lisa Ventura, Cyber Security Specialist &amp; Founder, <b>Cyber Security Unity<br/>https://www.linkedin.com/in/lisasventura/</b></p><p>Dom Lucas, Head of Security, <b>British International Investment<br/>https://www.linkedin.com/in/dom-lucas-mciis-30223528/</b></p><p>Dennis Leber, Director of Cyber Security, <b>Honest Medical Group<br/>https://www.linkedin.com/in/dennisleber/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/13757777-teisstalk-why-your-non-cyber-colleagues-aren-t-listening-to-you.mp3" length="31425770" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13757777</guid>
    <pubDate>Thu, 12 Oct 2023 08:00:00 +0100</pubDate>
    <itunes:duration>2613</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Building truly diverse teams</itunes:title>
    <title>teissTalk: Building truly diverse teams</title>
    <itunes:summary><![CDATA[This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Building truly diverse teams Ways to adapt your job adverts and interview techniques that will attract diverse candidatesHow to reduce qualification expectations to attract top talent from a range of different backgroundsFocusing on soft skills to support and grow diverse teamsThis episode is hosted by ...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Building truly diverse teams</b></p><ul><li>Ways to adapt your job adverts and interview techniques that will attract diverse candidates</li><li>How to reduce qualification expectations to attract top talent from a range of different backgrounds</li><li>Focusing on soft skills to support and grow diverse teams</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Sophia Adhami, Director Cyber Security Awareness and Engagement, <b>Sage<br/>https://www.linkedin.com/in/sophia-adhami-73538246/</b></p><p>Joshua Copeland, Cybersecurity Director, <b>AT&amp;T<br/>https://www.linkedin.com/in/joshuacopeland/</b></p><p>Albert F. Yonkovitz, Former Director Strategy, Policy and Plans, <b>Retired Colonel U.S. Army<br/>https://www.linkedin.com/in/albert-f-yonkovitz-jr/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Building truly diverse teams</b></p><ul><li>Ways to adapt your job adverts and interview techniques that will attract diverse candidates</li><li>How to reduce qualification expectations to attract top talent from a range of different backgrounds</li><li>Focusing on soft skills to support and grow diverse teams</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Sophia Adhami, Director Cyber Security Awareness and Engagement, <b>Sage<br/>https://www.linkedin.com/in/sophia-adhami-73538246/</b></p><p>Joshua Copeland, Cybersecurity Director, <b>AT&amp;T<br/>https://www.linkedin.com/in/joshuacopeland/</b></p><p>Albert F. Yonkovitz, Former Director Strategy, Policy and Plans, <b>Retired Colonel U.S. Army<br/>https://www.linkedin.com/in/albert-f-yonkovitz-jr/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/13757762-teisstalk-building-truly-diverse-teams.mp3" length="32373965" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13757762</guid>
    <pubDate>Thu, 05 Oct 2023 08:00:00 +0100</pubDate>
    <itunes:duration>2692</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: The liability of the CISO - a legal briefing</itunes:title>
    <title>teissTalk: The liability of the CISO - a legal briefing</title>
    <itunes:summary><![CDATA[This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: The liability of the CISO - a legal briefing How is personal liability changing, and how should CISOs protect themselves?What are the CISO’s disclosure obligations and when to include them your incident response plan?Insuring a CISO - what are the legal implications and processes?This episode is hosted ...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: The liability of the CISO - a legal briefing</b></p><ul><li>How is personal liability changing, and how should CISOs protect themselves?</li><li>What are the CISO’s disclosure obligations and when to include them your incident response plan?</li><li>Insuring a CISO - what are the legal implications and processes?</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Joe Hancock, Partner (non-lawyer) &amp; Head of MDR Cyber, <b>Mishcon de Reya LLP<br/>https://www.linkedin.com/in/joehancock/</b></p><p>Peter McLaughlin, Partner, <b>Armstrong Teasdale LLP<br/>https://www.linkedin.com/in/petermclaughlin/</b></p><p>J.J. Jones, Strategy Counsel &amp; Advisor, <b>Google<br/>https://www.linkedin.com/in/jakarra-jones/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: The liability of the CISO - a legal briefing</b></p><ul><li>How is personal liability changing, and how should CISOs protect themselves?</li><li>What are the CISO’s disclosure obligations and when to include them your incident response plan?</li><li>Insuring a CISO - what are the legal implications and processes?</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Joe Hancock, Partner (non-lawyer) &amp; Head of MDR Cyber, <b>Mishcon de Reya LLP<br/>https://www.linkedin.com/in/joehancock/</b></p><p>Peter McLaughlin, Partner, <b>Armstrong Teasdale LLP<br/>https://www.linkedin.com/in/petermclaughlin/</b></p><p>J.J. Jones, Strategy Counsel &amp; Advisor, <b>Google<br/>https://www.linkedin.com/in/jakarra-jones/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/13262213-teisstalk-the-liability-of-the-ciso-a-legal-briefing.mp3" length="33429904" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13262213</guid>
    <pubDate>Thu, 27 Jul 2023 08:00:00 +0100</pubDate>
    <itunes:duration>2780</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: How much will your next breach cost?</itunes:title>
    <title>teissTalk: How much will your next breach cost?</title>
    <itunes:summary><![CDATA[This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: How much will your next breach cost? Which data do you need to estimate financial loss from a breach?Which risks should CISOs prioritise in a cyber security assessment?Demonstrating the impact of your cyber security spend on mitigating cyber risk This episode is hosted by Thom Langford https://www....]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: How much will your next breach cost?</b></p><ul><li>Which data do you need to estimate financial loss from a breach?</li><li>Which risks should CISOs prioritise in a cyber security assessment?</li><li>Demonstrating the impact of your cyber security spend on mitigating cyber risk</li></ul><p> This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Tiago Rosado, Chief Information Security Officer, <b>Confidential <br/>https://www.linkedin.com/in/tiagorosado/<br/><br/></b>Paul Watts, Distinguished Analyst,<b> Information Security Forum<br/>https://www.linkedin.com/in/paulewatts/</b></p><p>Syed Ubaid Ali Jafri, Head of Cyber Defense &amp; Offensive Security, <b>Habib Bank Limited (HBL)<br/>https://www.linkedin.com/in/ubaidjafri/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: How much will your next breach cost?</b></p><ul><li>Which data do you need to estimate financial loss from a breach?</li><li>Which risks should CISOs prioritise in a cyber security assessment?</li><li>Demonstrating the impact of your cyber security spend on mitigating cyber risk</li></ul><p> This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Tiago Rosado, Chief Information Security Officer, <b>Confidential <br/>https://www.linkedin.com/in/tiagorosado/<br/><br/></b>Paul Watts, Distinguished Analyst,<b> Information Security Forum<br/>https://www.linkedin.com/in/paulewatts/</b></p><p>Syed Ubaid Ali Jafri, Head of Cyber Defense &amp; Offensive Security, <b>Habib Bank Limited (HBL)<br/>https://www.linkedin.com/in/ubaidjafri/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/13223180-teisstalk-how-much-will-your-next-breach-cost.mp3" length="34011858" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13223180</guid>
    <pubDate>Thu, 20 Jul 2023 08:00:00 +0100</pubDate>
    <itunes:duration>2829</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Mitigating the cyber risks in your digital supply chain</itunes:title>
    <title>teissTalk: Mitigating the cyber risks in your digital supply chain</title>
    <itunes:summary><![CDATA[This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Mitigating the cyber risks in your digital supply chai Why the standard prescriptions for addressing supplier risk are challenged when it comes to 4th, 5th and Nth partiesHow well are the regulatory/contractual routes helping organisations to secure their supply chains?What technological approaches can ...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Mitigating the cyber risks in your digital supply chai</b></p><ul><li>Why the standard prescriptions for addressing supplier risk are challenged when it comes to 4th, 5th and Nth parties</li><li>How well are the regulatory/contractual routes helping organisations to secure their supply chains?</li><li>What technological approaches can complement the traditional solutions to help you build cyber resilience across your supply chain ecosystem?</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Andrea Szeiler-Zengo, Global Chief Information Security Officer<b>, Transcom<br/>https://www.linkedin.com/in/andrea-szeiler-zengo-cissp/</b></p><p>Abbas Ahmed, CISO/VP Technology, <b>Qenta Inc<br/>https://www.linkedin.com/in/abbasahmed/</b></p><p>Dov Goldman, VP Risk Strategy, <b>Panorays<br/>https://www.linkedin.com/in/dovgoldman/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Mitigating the cyber risks in your digital supply chai</b></p><ul><li>Why the standard prescriptions for addressing supplier risk are challenged when it comes to 4th, 5th and Nth parties</li><li>How well are the regulatory/contractual routes helping organisations to secure their supply chains?</li><li>What technological approaches can complement the traditional solutions to help you build cyber resilience across your supply chain ecosystem?</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Andrea Szeiler-Zengo, Global Chief Information Security Officer<b>, Transcom<br/>https://www.linkedin.com/in/andrea-szeiler-zengo-cissp/</b></p><p>Abbas Ahmed, CISO/VP Technology, <b>Qenta Inc<br/>https://www.linkedin.com/in/abbasahmed/</b></p><p>Dov Goldman, VP Risk Strategy, <b>Panorays<br/>https://www.linkedin.com/in/dovgoldman/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/13194052-teisstalk-mitigating-the-cyber-risks-in-your-digital-supply-chain.mp3" length="33941365" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13194052</guid>
    <pubDate>Thu, 13 Jul 2023 08:00:00 +0100</pubDate>
    <itunes:duration>2823</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Creating a security-conscious culture</itunes:title>
    <title>teissTalk: Creating a security-conscious culture</title>
    <itunes:summary><![CDATA[This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Creating a security-conscious culture Adapting security awareness to the way your colleagues see the online worldBenchmarking behaviour to get a true representation of cyber risk Ensuring your security awareness programme doesn’t get in the way of colleagues’ productivityThis episode is hosted by T...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Creating a security-conscious culture</b></p><ul><li>Adapting security awareness to the way your colleagues see the online world</li><li>Benchmarking behaviour to get a true representation of cyber risk </li><li>Ensuring your security awareness programme doesn’t get in the way of colleagues’ productivity</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Gry Evita Sivertsen, Cybersecurity Manager, <b>PwC<br/>https://www.linkedin.com/in/gry-evita-sivertsen-5b58a713a/</b></p><p>Ishaaq Jacobs, Chief Cyber Security Officer, <b>Sasol<br/>https://www.linkedin.com/in/ishaaq-jacobs/</b></p><p>Penny Jackson, Security Awareness Lead, <b>John Lewis &amp; Partners<br/>https://www.linkedin.com/in/pennykjackson/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Creating a security-conscious culture</b></p><ul><li>Adapting security awareness to the way your colleagues see the online world</li><li>Benchmarking behaviour to get a true representation of cyber risk </li><li>Ensuring your security awareness programme doesn’t get in the way of colleagues’ productivity</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Gry Evita Sivertsen, Cybersecurity Manager, <b>PwC<br/>https://www.linkedin.com/in/gry-evita-sivertsen-5b58a713a/</b></p><p>Ishaaq Jacobs, Chief Cyber Security Officer, <b>Sasol<br/>https://www.linkedin.com/in/ishaaq-jacobs/</b></p><p>Penny Jackson, Security Awareness Lead, <b>John Lewis &amp; Partners<br/>https://www.linkedin.com/in/pennykjackson/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/13158950-teisstalk-creating-a-security-conscious-culture.mp3" length="33091514" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13158950</guid>
    <pubDate>Thu, 06 Jul 2023 08:00:00 +0100</pubDate>
    <itunes:duration>2752</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: How do you demonstrate effective cyber resilience to the board?</itunes:title>
    <title>teissTalk: How do you demonstrate effective cyber resilience to the board?</title>
    <itunes:summary><![CDATA[This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: How do you demonstrate effective cyber resilience to the board? Selecting metrics that best convey the impacts and risks of your strategyMeasuring the value to the business of your cyber resilience strategy – which KPIs matter?Using the board’s language - how to answer when asked "are we cyber resilient...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: How do you demonstrate effective cyber resilience to the board?</b></p><ul><li>Selecting metrics that best convey the impacts and risks of your strategy</li><li>Measuring the value to the business of your cyber resilience strategy – which KPIs matter?</li><li>Using the board’s language - how to answer when asked &quot;are we cyber resilient&quot;?</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Leo Cunningham, CISO, <b>Owkin <br/>https://www.linkedin.com/in/leocunningham1/</b></p><p>Ifedayo Osideinde, Chief Information Security Officer, <b>AXA<br/>https://www.linkedin.com/in/ifedayo-osideinde-cfe-ceh-microsoft-azure-security-engineer-iso-li-68627671/</b></p><p>John Mago, Chief Information Security Officer, <b>Oxygen - Access Corporation<br/>https://www.linkedin.com/in/john-mago-mba-cciso-pcip-pciisa-ceh-itil-7a107086/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: How do you demonstrate effective cyber resilience to the board?</b></p><ul><li>Selecting metrics that best convey the impacts and risks of your strategy</li><li>Measuring the value to the business of your cyber resilience strategy – which KPIs matter?</li><li>Using the board’s language - how to answer when asked &quot;are we cyber resilient&quot;?</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Leo Cunningham, CISO, <b>Owkin <br/>https://www.linkedin.com/in/leocunningham1/</b></p><p>Ifedayo Osideinde, Chief Information Security Officer, <b>AXA<br/>https://www.linkedin.com/in/ifedayo-osideinde-cfe-ceh-microsoft-azure-security-engineer-iso-li-68627671/</b></p><p>John Mago, Chief Information Security Officer, <b>Oxygen - Access Corporation<br/>https://www.linkedin.com/in/john-mago-mba-cciso-pcip-pciisa-ceh-itil-7a107086/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/13158933-teisstalk-how-do-you-demonstrate-effective-cyber-resilience-to-the-board.mp3" length="33128555" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13158933</guid>
    <pubDate>Thu, 29 Jun 2023 08:00:00 +0100</pubDate>
    <itunes:duration>2755</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Building an effective infosec strategy for critical Nth-party suppliers</itunes:title>
    <title>teissTalk: Building an effective infosec strategy for critical Nth-party suppliers</title>
    <itunes:summary><![CDATA[This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Building an effective infosec strategy for critical Nth-party suppliers Leveraging your relationships to build cyber resilience across your supply chain ecosystemVendor due diligence - securing your software supply chainShifting your mindset away from questionnaires and tick-box complianceThis episode i...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Building an effective infosec strategy for critical Nth-party suppliers</b></p><ul><li>Leveraging your relationships to build cyber resilience across your supply chain ecosystem</li><li>Vendor due diligence - securing your software supply chain</li><li>Shifting your mindset away from questionnaires and tick-box compliance</li></ul><p>This episode is hosted by  Kevin Craine<br/><b>https://www.linkedin.com/in/kevincraine/</b></p><p>Irene Njoroge, CEO, <b>Gadiness Ltd<br/>https://www.linkedin.com/in/irenenjoroge/</b></p><p>Fene Osakwe, Group Head, Digital and Technology Assurance, <b>Wellcome Trust<br/>https://www.linkedin.com/in/dr-fene-osakwe-1617b585/</b></p><p>Mike Seeney, Supply Chain Information Risk Lead, <b>Pinsent Masons<br/>https://www.linkedin.com/in/mike-seeney-462b7619/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Building an effective infosec strategy for critical Nth-party suppliers</b></p><ul><li>Leveraging your relationships to build cyber resilience across your supply chain ecosystem</li><li>Vendor due diligence - securing your software supply chain</li><li>Shifting your mindset away from questionnaires and tick-box compliance</li></ul><p>This episode is hosted by  Kevin Craine<br/><b>https://www.linkedin.com/in/kevincraine/</b></p><p>Irene Njoroge, CEO, <b>Gadiness Ltd<br/>https://www.linkedin.com/in/irenenjoroge/</b></p><p>Fene Osakwe, Group Head, Digital and Technology Assurance, <b>Wellcome Trust<br/>https://www.linkedin.com/in/dr-fene-osakwe-1617b585/</b></p><p>Mike Seeney, Supply Chain Information Risk Lead, <b>Pinsent Masons<br/>https://www.linkedin.com/in/mike-seeney-462b7619/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/13051373-teisstalk-building-an-effective-infosec-strategy-for-critical-nth-party-suppliers.mp3" length="31373770" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13051373</guid>
    <pubDate>Thu, 22 Jun 2023 08:00:00 +0100</pubDate>
    <itunes:duration>2609</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Leveraging AI to monitor, analyse and respond to threats</itunes:title>
    <title>teissTalk: Leveraging AI to monitor, analyse and respond to threats</title>
    <itunes:summary><![CDATA[This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Leveraging AI to monitor, analyse and respond to threats What are the practical limitations and challenges with deploying AI to respond to threats and incidentsComplementing AI model performance accuracy with human OS and guidanceTreating your AI as a core component of your organisation and avoiding com...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Leveraging AI to monitor, analyse and respond to threats</b></p><ul><li>What are the practical limitations and challenges with deploying AI to respond to threats and incidents</li><li>Complementing AI model performance accuracy with human OS and guidance</li><li>Treating your AI as a core component of your organisation and avoiding compartmentalisation</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Chuck Brooks, Adjunct Professor,<b> Georgetown University<br/>https://www.linkedin.com/in/chuckbrooks/</b></p><p>Mark Ward, Senior Research Analyst, <b>Information Security Forum (ISF)<br/>https://www.linkedin.com/in/mark-ward-7828b0/</b></p><p>Tyler Farrar, Chief Information Security Officer,<b> Exabeam<br/>https://www.linkedin.com/in/tyler-j-farrar/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Leveraging AI to monitor, analyse and respond to threats</b></p><ul><li>What are the practical limitations and challenges with deploying AI to respond to threats and incidents</li><li>Complementing AI model performance accuracy with human OS and guidance</li><li>Treating your AI as a core component of your organisation and avoiding compartmentalisation</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Chuck Brooks, Adjunct Professor,<b> Georgetown University<br/>https://www.linkedin.com/in/chuckbrooks/</b></p><p>Mark Ward, Senior Research Analyst, <b>Information Security Forum (ISF)<br/>https://www.linkedin.com/in/mark-ward-7828b0/</b></p><p>Tyler Farrar, Chief Information Security Officer,<b> Exabeam<br/>https://www.linkedin.com/in/tyler-j-farrar/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/13007340-teisstalk-leveraging-ai-to-monitor-analyse-and-respond-to-threats.mp3" length="33573668" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13007340</guid>
    <pubDate>Thu, 15 Jun 2023 08:00:00 +0100</pubDate>
    <itunes:duration>2792</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Are you ready to respond to a ransomware attack?</itunes:title>
    <title>teissTalk: Are you ready to respond to a ransomware attack?</title>
    <itunes:summary><![CDATA[This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Are you ready to respond to a ransomware attack? Is your playbook robust enough? Stress-testing your playbook with table top exercisesReactive or proactive security - which works best for you?Revealing and filling the gaps in your incident response planThis episode is hosted by Thom Langford https://www...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Are you ready to respond to a ransomware attack?</b></p><ul><li>Is your playbook robust enough? Stress-testing your playbook with table top exercises</li><li>Reactive or proactive security - which works best for you?</li><li>Revealing and filling the gaps in your incident response plan</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Kailee Miner, Senior Manager - Cybersecurity, <b>EY<br/>https://www.linkedin.com/in/kaileeminer/</b></p><p>Lester Chng, Cybersecurity and Crisis Management Exercises Consultant, <b>Confidential<br/>https://www.linkedin.com/in/lesterchng/</b></p><p>Shakel Ahmed, Security Engineering Team Lead, <b>Pentera<br/>https://www.linkedin.com/in/shaka/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Are you ready to respond to a ransomware attack?</b></p><ul><li>Is your playbook robust enough? Stress-testing your playbook with table top exercises</li><li>Reactive or proactive security - which works best for you?</li><li>Revealing and filling the gaps in your incident response plan</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Kailee Miner, Senior Manager - Cybersecurity, <b>EY<br/>https://www.linkedin.com/in/kaileeminer/</b></p><p>Lester Chng, Cybersecurity and Crisis Management Exercises Consultant, <b>Confidential<br/>https://www.linkedin.com/in/lesterchng/</b></p><p>Shakel Ahmed, Security Engineering Team Lead, <b>Pentera<br/>https://www.linkedin.com/in/shaka/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/12965462-teisstalk-are-you-ready-to-respond-to-a-ransomware-attack.mp3" length="33922230" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12965462</guid>
    <pubDate>Thu, 08 Jun 2023 08:00:00 +0100</pubDate>
    <itunes:duration>2821</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Where is your next negligent insider, and what risk do they pose?</itunes:title>
    <title>teissTalk: Where is your next negligent insider, and what risk do they pose?</title>
    <itunes:summary><![CDATA[This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Where is your next negligent insider, and what risk do they pose? What to look for in end-user behaviour to identify the negligent insider Training to protect against negligence – effective techniques to get the message across Reducing the risk of negligent risks elsewhere - building lessons l...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Where is your next negligent insider, and what risk do they pose?</b></p><ul><li>What to look for in end-user behaviour to identify the negligent insider </li><li>Training to protect against negligence – effective techniques to get the message across </li><li>Reducing the risk of negligent risks elsewhere - building lessons learned back into the organisation </li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Jonathan Craven, Privacy and Compliance Lead, <b>iRhythm Technologies UK<br/>https://www.linkedin.com/in/jonathanbcraven/</b></p><p>Kate Hiykel, Insider Risk Program Manager,<b> Mutual of Omaha<br/>https://www.linkedin.com/in/kate-hiykel-aa9a2420/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Where is your next negligent insider, and what risk do they pose?</b></p><ul><li>What to look for in end-user behaviour to identify the negligent insider </li><li>Training to protect against negligence – effective techniques to get the message across </li><li>Reducing the risk of negligent risks elsewhere - building lessons learned back into the organisation </li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Jonathan Craven, Privacy and Compliance Lead, <b>iRhythm Technologies UK<br/>https://www.linkedin.com/in/jonathanbcraven/</b></p><p>Kate Hiykel, Insider Risk Program Manager,<b> Mutual of Omaha<br/>https://www.linkedin.com/in/kate-hiykel-aa9a2420/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/12925118-teisstalk-where-is-your-next-negligent-insider-and-what-risk-do-they-pose.mp3" length="33457389" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12925118</guid>
    <pubDate>Thu, 01 Jun 2023 08:00:00 +0100</pubDate>
    <itunes:duration>2782</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Are infosec leaders emotionally literate enough?</itunes:title>
    <title>teissTalk: Are infosec leaders emotionally literate enough?</title>
    <itunes:summary><![CDATA[This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Are infosec leaders emotionally literate enough? Building emotionally intelligent infosec teams and strategies Adapting your security awareness programmes to keep them fresh, relevant and effective Ensuring your awareness programmes cater for different demographics in your organisation Th...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Are infosec leaders emotionally literate enough?</b></p><ul><li>Building emotionally intelligent infosec teams and strategies </li><li>Adapting your security awareness programmes to keep them fresh, relevant and effective </li><li>Ensuring your awareness programmes cater for different demographics in your organisation </li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Cameron Brown, Director - Cyber Security/Risk Advisory, <b>Deloitte UK<br/>https://www.linkedin.com/in/analyticalcyber/</b></p><p>Dr. Edewede Oriwoh,  Group IT Information and Cyber Security Manager, <b>Redde Northgate Plc<br/>https://www.linkedin.com/in/edewedeoriwoh/</b></p><p>Holly Foxcroft, Head of Neurodiversity in Cyber Research and Consulting,<b> Stott and May Consulting<br/>https://www.linkedin.com/in/hollyfoxcroft/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Are infosec leaders emotionally literate enough?</b></p><ul><li>Building emotionally intelligent infosec teams and strategies </li><li>Adapting your security awareness programmes to keep them fresh, relevant and effective </li><li>Ensuring your awareness programmes cater for different demographics in your organisation </li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Cameron Brown, Director - Cyber Security/Risk Advisory, <b>Deloitte UK<br/>https://www.linkedin.com/in/analyticalcyber/</b></p><p>Dr. Edewede Oriwoh,  Group IT Information and Cyber Security Manager, <b>Redde Northgate Plc<br/>https://www.linkedin.com/in/edewedeoriwoh/</b></p><p>Holly Foxcroft, Head of Neurodiversity in Cyber Research and Consulting,<b> Stott and May Consulting<br/>https://www.linkedin.com/in/hollyfoxcroft/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/12917776-teisstalk-are-infosec-leaders-emotionally-literate-enough.mp3" length="33617538" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12917776</guid>
    <pubDate>Thu, 25 May 2023 00:00:00 +0100</pubDate>
    <itunes:duration>2796</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: The evolving role of identity in cyber security</itunes:title>
    <title>teissTalk: The evolving role of identity in cyber security</title>
    <itunes:summary><![CDATA[This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: The evolving role of identity in cyber security With continuous digital transformation, where do digital identities fit in?How does the evolving threat landscape change the necessity of Zero Trust in your organisation?Overcoming the obstacles to rolling out Zero Trust across your organisationThis episod...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: The evolving role of identity in cyber security</b></p><ul><li>With continuous digital transformation, where do digital identities fit in?</li><li>How does the evolving threat landscape change the necessity of Zero Trust in your organisation?</li><li>Overcoming the obstacles to rolling out Zero Trust across your organisation</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Andrew Raynes, Chief Information Officer, <b>Royal Papworth Hospital NHS Foundation Trust<br/>https://www.linkedin.com/in/andrew-raynes-chcio-msc-942300a/</b></p><p>Samer Fayssal, Chief Analyst,<b> Cyber Analytics LLC<br/>https://www.linkedin.com/in/dr-samer-fayssal-3a41b11b/</b></p><p>Mandeep Gosal, Director of Professional Services, <b>ITC Secure<br/>https://www.linkedin.com/in/mandeep-gosal-cism-4bb69529/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: The evolving role of identity in cyber security</b></p><ul><li>With continuous digital transformation, where do digital identities fit in?</li><li>How does the evolving threat landscape change the necessity of Zero Trust in your organisation?</li><li>Overcoming the obstacles to rolling out Zero Trust across your organisation</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Andrew Raynes, Chief Information Officer, <b>Royal Papworth Hospital NHS Foundation Trust<br/>https://www.linkedin.com/in/andrew-raynes-chcio-msc-942300a/</b></p><p>Samer Fayssal, Chief Analyst,<b> Cyber Analytics LLC<br/>https://www.linkedin.com/in/dr-samer-fayssal-3a41b11b/</b></p><p>Mandeep Gosal, Director of Professional Services, <b>ITC Secure<br/>https://www.linkedin.com/in/mandeep-gosal-cism-4bb69529/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/12917768-teisstalk-the-evolving-role-of-identity-in-cyber-security.mp3" length="34428794" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12917768</guid>
    <pubDate>Thu, 18 May 2023 08:00:00 +0100</pubDate>
    <itunes:duration>2863</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Detecting imposters and rogue insiders in SaaS applications</itunes:title>
    <title>teissTalk: Detecting imposters and rogue insiders in SaaS applications</title>
    <itunes:summary><![CDATA[This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Detecting imposters and rogue insiders in SaaS applications Preventing and mitigating the impact of stolen credentials Identifying and managing trigger events that may lead to internal malicious behaviour Allocating resource to automate data sifting and speed up detection and response Thi...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Detecting imposters and rogue insiders in SaaS applications</b></p><ul><li>Preventing and mitigating the impact of stolen credentials </li><li>Identifying and managing trigger events that may lead to internal malicious behaviour </li><li>Allocating resource to automate data sifting and speed up detection and response </li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Todd Wade, Chief Information Security Officer, <b>Lloyds Intelligence<br/>linkedin.com/in/twade/<br/><br/></b>Aderonke Thompson, Research Scientist, Applied Cybersecurity Team, <b>VTT, Finland -  ERCIM Fellow (2022)<br/>https://www.linkedin.com/in/aderonke-thompson-45103baa/</b></p><p>Adam Koblentz, Field CTO, <b>Reveal Security<br/>https://www.linkedin.com/in/akoblentz/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Detecting imposters and rogue insiders in SaaS applications</b></p><ul><li>Preventing and mitigating the impact of stolen credentials </li><li>Identifying and managing trigger events that may lead to internal malicious behaviour </li><li>Allocating resource to automate data sifting and speed up detection and response </li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Todd Wade, Chief Information Security Officer, <b>Lloyds Intelligence<br/>linkedin.com/in/twade/<br/><br/></b>Aderonke Thompson, Research Scientist, Applied Cybersecurity Team, <b>VTT, Finland -  ERCIM Fellow (2022)<br/>https://www.linkedin.com/in/aderonke-thompson-45103baa/</b></p><p>Adam Koblentz, Field CTO, <b>Reveal Security<br/>https://www.linkedin.com/in/akoblentz/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/12804418-teisstalk-detecting-imposters-and-rogue-insiders-in-saas-applications.mp3" length="33422649" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12804418</guid>
    <pubDate>Thu, 11 May 2023 08:00:00 +0100</pubDate>
    <itunes:duration>2780</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Delivering measurable cyber risk reduction</itunes:title>
    <title>teissTalk: Delivering measurable cyber risk reduction</title>
    <itunes:summary><![CDATA[This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Delivering measurable cyber risk reduction Advising colleagues to improve security decision-making and reduce cyber riskPractical steps to apply cyber threat intelligence across your organisationMeasuring risk reduction – which metrics matter?This episode is hosted by Thom Langford https://www.linkedin....]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Delivering measurable cyber risk reduction</b></p><ul><li>Advising colleagues to improve security decision-making and reduce cyber risk</li><li>Practical steps to apply cyber threat intelligence across your organisation</li><li>Measuring risk reduction – which metrics matter?</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Laurie Gibbett, Cyber Risk Quantification Manager, <b>KPMG<br/>https://www.linkedin.com/in/lauriegibbett/</b></p><p>Lucian Corlan, Senior Director Application Security, <b>Sage<br/>https://www.linkedin.com/in/lcorlan/</b></p><p>Jason Hart, Chief Technology Officer, <b>Rapid7<br/>https://www.linkedin.com/in/hartjason/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Delivering measurable cyber risk reduction</b></p><ul><li>Advising colleagues to improve security decision-making and reduce cyber risk</li><li>Practical steps to apply cyber threat intelligence across your organisation</li><li>Measuring risk reduction – which metrics matter?</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Laurie Gibbett, Cyber Risk Quantification Manager, <b>KPMG<br/>https://www.linkedin.com/in/lauriegibbett/</b></p><p>Lucian Corlan, Senior Director Application Security, <b>Sage<br/>https://www.linkedin.com/in/lcorlan/</b></p><p>Jason Hart, Chief Technology Officer, <b>Rapid7<br/>https://www.linkedin.com/in/hartjason/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/12740931-teisstalk-delivering-measurable-cyber-risk-reduction.mp3" length="34052935" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12740931</guid>
    <pubDate>Thu, 04 May 2023 08:00:00 +0100</pubDate>
    <itunes:duration>2832</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Protecting yourself and your infosec colleagues</itunes:title>
    <title>teissTalk: Protecting yourself and your infosec colleagues</title>
    <itunes:summary><![CDATA[This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Protecting yourself and your infosec colleagues How to recognise burnout in your team and reduce employee stressConducting stress assessments after security incidents and learning from themUnderstaffed and over-worked - how can InfoSec leaders break the cycle?This episode is hosted by Thom Langford http...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Protecting yourself and your infosec colleagues</b></p><ul><li>How to recognise burnout in your team and reduce employee stress</li><li>Conducting stress assessments after security incidents and learning from them</li><li>Understaffed and over-worked - how can InfoSec leaders break the cycle?</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Kerissa Varma, Managing Executive - Cyber Security,<b> Vodacom Group<br/>https://www.linkedin.com/in/kerissavarma/</b></p><p>Kiera Lillie, Head of Information Security and Compliance, <b>EMIS Group<br/>https://www.linkedin.com/in/kieralillie/</b></p><p>Chris Waynforth, GM &amp; VP International, <b>Expel<br/>https://www.linkedin.com/in/chriswaynforth/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Protecting yourself and your infosec colleagues</b></p><ul><li>How to recognise burnout in your team and reduce employee stress</li><li>Conducting stress assessments after security incidents and learning from them</li><li>Understaffed and over-worked - how can InfoSec leaders break the cycle?</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Kerissa Varma, Managing Executive - Cyber Security,<b> Vodacom Group<br/>https://www.linkedin.com/in/kerissavarma/</b></p><p>Kiera Lillie, Head of Information Security and Compliance, <b>EMIS Group<br/>https://www.linkedin.com/in/kieralillie/</b></p><p>Chris Waynforth, GM &amp; VP International, <b>Expel<br/>https://www.linkedin.com/in/chriswaynforth/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/12694869-teisstalk-protecting-yourself-and-your-infosec-colleagues.mp3" length="34606218" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12694869</guid>
    <pubDate>Thu, 27 Apr 2023 08:00:00 +0100</pubDate>
    <itunes:duration>2878</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Building competitive advantage with diverse infosec teams</itunes:title>
    <title>teissTalk: Building competitive advantage with diverse infosec teams</title>
    <itunes:summary><![CDATA[This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Building competitive advantage with diverse infosec teams Building a diverse-thinking infosec team to address the threats and vulnerabilities your organisation facesDeveloping a diversity and inclusion strategy to attract and retain top talentBalancing business objectives with security needs to deliver ...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Building competitive advantage with diverse infosec teams</b></p><ul><li>Building a diverse-thinking infosec team to address the threats and vulnerabilities your organisation faces</li><li>Developing a diversity and inclusion strategy to attract and retain top talent</li><li>Balancing business objectives with security needs to deliver a competitive advantage</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Ian Hill, Director of Information &amp; Cyber Security,<b> Upp<br/>https://www.linkedin.com/in/ian-hill-95123897/</b></p><p>Dr Andrea Cullen, Co Founder/Co CEO, <b>CAPSLOCK<br/>https://www.linkedin.com/in/dr-andrea-cullen/</b></p><p>Paul Baird, Chief Technology Security Officer, UK, <b>Qualys<br/>https://www.linkedin.com/in/prbaird/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us  for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Building competitive advantage with diverse infosec teams</b></p><ul><li>Building a diverse-thinking infosec team to address the threats and vulnerabilities your organisation faces</li><li>Developing a diversity and inclusion strategy to attract and retain top talent</li><li>Balancing business objectives with security needs to deliver a competitive advantage</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Ian Hill, Director of Information &amp; Cyber Security,<b> Upp<br/>https://www.linkedin.com/in/ian-hill-95123897/</b></p><p>Dr Andrea Cullen, Co Founder/Co CEO, <b>CAPSLOCK<br/>https://www.linkedin.com/in/dr-andrea-cullen/</b></p><p>Paul Baird, Chief Technology Security Officer, UK, <b>Qualys<br/>https://www.linkedin.com/in/prbaird/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/12649098-teisstalk-building-competitive-advantage-with-diverse-infosec-teams.mp3" length="33998107" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12649098</guid>
    <pubDate>Thu, 20 Apr 2023 08:00:00 +0100</pubDate>
    <itunes:duration>2828</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Bridging your cyber skills gap - training and retaining talent</itunes:title>
    <title>teissTalk: Bridging your cyber skills gap - training and retaining talent</title>
    <itunes:summary><![CDATA[This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Bridging your cyber skills gap - training and retaining talent Understaffed and under-trained - how can InfoSec leaders break the cycle?Recruiting for potential and transferable skills - are entry-level standards unrealistic?Improving retention of high-demand and high-quality SOC analystsThis episode is hoste...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Bridging your cyber skills gap - training and retaining talent</b></p><ul><li>Understaffed and under-trained - how can InfoSec leaders break the cycle?</li><li>Recruiting for potential and transferable skills - are entry-level standards unrealistic?</li><li>Improving retention of high-demand and high-quality SOC analysts</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Emilio Iasiello, Global Cyber Threat Intelligence Manager,<b> Dentons<br/>https://www.linkedin.com/in/emilio-iasiello-9378147a/</b></p><p>Nick Mullen, Project Manager - Information Security, <b>Mutual of Omaha<br/>https://www.linkedin.com/in/rnmullen/<br/><br/></b>Mike Gillespie, Founder and Thought Leader,<b> Advent IM Limited<br/>https://www.linkedin.com/in/adventimmikegillespie/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our weekly cyber security talk show, teissTalk.  Join us for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Bridging your cyber skills gap - training and retaining talent</b></p><ul><li>Understaffed and under-trained - how can InfoSec leaders break the cycle?</li><li>Recruiting for potential and transferable skills - are entry-level standards unrealistic?</li><li>Improving retention of high-demand and high-quality SOC analysts</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Emilio Iasiello, Global Cyber Threat Intelligence Manager,<b> Dentons<br/>https://www.linkedin.com/in/emilio-iasiello-9378147a/</b></p><p>Nick Mullen, Project Manager - Information Security, <b>Mutual of Omaha<br/>https://www.linkedin.com/in/rnmullen/<br/><br/></b>Mike Gillespie, Founder and Thought Leader,<b> Advent IM Limited<br/>https://www.linkedin.com/in/adventimmikegillespie/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/12555747-teisstalk-bridging-your-cyber-skills-gap-training-and-retaining-talent.mp3" length="33860077" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12555747</guid>
    <pubDate>Thu, 06 Apr 2023 08:00:00 +0100</pubDate>
    <itunes:duration>2816</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Control in the cloud - are your data transfers secure?</itunes:title>
    <title>teissTalk: Control in the cloud - are your data transfers secure?</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Control in the cloud - are your data transfers secure?   How to modernise data handling when integrating with cloud-based solutions?  The challenges of moving to a pure cloud infrastructure vs hybrid  Minimising the risks of cloud-based data breaches through encryptionThis ep...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Control in the cloud - are your data transfers secure?</b></p><ul><li>  How to modernise data handling when integrating with cloud-based solutions?</li><li>  The challenges of moving to a pure cloud infrastructure vs hybrid</li><li>  Minimising the risks of cloud-based data breaches through encryption</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Benoit Heynderickx, Principal Analyst, <b>Information Security Forum (ISF)<br/>https://www.linkedin.com/in/benoithey/<br/><br/></b>Ryan Cooke, Consulting CISO,<b> Orum.io<br/>https://www.linkedin.com/in/ryancooke/</b></p><p>Nick Hogg, Director of Technical Training,<b> Fortra<br/>https://www.linkedin.com/in/nick-hogg-034a9b5/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Control in the cloud - are your data transfers secure?</b></p><ul><li>  How to modernise data handling when integrating with cloud-based solutions?</li><li>  The challenges of moving to a pure cloud infrastructure vs hybrid</li><li>  Minimising the risks of cloud-based data breaches through encryption</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Benoit Heynderickx, Principal Analyst, <b>Information Security Forum (ISF)<br/>https://www.linkedin.com/in/benoithey/<br/><br/></b>Ryan Cooke, Consulting CISO,<b> Orum.io<br/>https://www.linkedin.com/in/ryancooke/</b></p><p>Nick Hogg, Director of Technical Training,<b> Fortra<br/>https://www.linkedin.com/in/nick-hogg-034a9b5/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/12532480-teisstalk-control-in-the-cloud-are-your-data-transfers-secure.mp3" length="33502193" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12532480</guid>
    <pubDate>Thu, 30 Mar 2023 08:00:00 +0100</pubDate>
    <itunes:duration>2786</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: How to answer when your board asks, “Are we secure?”</itunes:title>
    <title>teissTalk: How to answer when your board asks, “Are we secure?”</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: How to answer when your board asks, “Are we secure?” Moving the conversation beyond risk – what other approaches demonstrate security?What strategies can you use to demonstrate threat alignment?How do you demonstrate success to the board?This episode is hosted by Thom Langford https://www.l...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: How to answer when your board asks, “Are we secure?”</b></p><ul><li>Moving the conversation beyond risk – what other approaches demonstrate security?</li><li>What strategies can you use to demonstrate threat alignment?</li><li>How do you demonstrate success to the board?</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Ali Dehghantanha, Canada Research Chair in Cybersecurity &amp; Threat Intelligence, <b>University of Guelph<br/>https://www.linkedin.com/in/alide/</b></p><p>Dan Card, Global Chief Information Security Officer,<b> Universal Exports UK Division<br/>https://www.linkedin.com/in/dancard/<br/><br/></b>Nuno Teodoro, Cyber Security and Privacy Officer/CISO,<b> Huawei<br/>https://www.linkedin.com/in/nunoteodoro/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: How to answer when your board asks, “Are we secure?”</b></p><ul><li>Moving the conversation beyond risk – what other approaches demonstrate security?</li><li>What strategies can you use to demonstrate threat alignment?</li><li>How do you demonstrate success to the board?</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Ali Dehghantanha, Canada Research Chair in Cybersecurity &amp; Threat Intelligence, <b>University of Guelph<br/>https://www.linkedin.com/in/alide/</b></p><p>Dan Card, Global Chief Information Security Officer,<b> Universal Exports UK Division<br/>https://www.linkedin.com/in/dancard/<br/><br/></b>Nuno Teodoro, Cyber Security and Privacy Officer/CISO,<b> Huawei<br/>https://www.linkedin.com/in/nunoteodoro/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/12460818-teisstalk-how-to-answer-when-your-board-asks-are-we-secure.mp3" length="33933836" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12460818</guid>
    <pubDate>Thu, 23 Mar 2023 08:00:00 +0000</pubDate>
    <itunes:duration>2822</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Cyber insurance - living with spiralling costs and reduced coverage</itunes:title>
    <title>teissTalk: Cyber insurance - living with spiralling costs and reduced coverage</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Cyber insurance - living with spiralling costs and reduced coverage Persuading your Board to take out cyber insurance and choosing the best coverage How can you lower your cyber insurance premiums? How might changes in the cyber insurance market affect CISOs’ planning and budgetin...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Cyber insurance - living with spiralling costs and reduced coverage</b></p><ul><li>Persuading your Board to take out cyber insurance and choosing the best coverage </li><li>How can you lower your cyber insurance premiums? </li><li>How might changes in the cyber insurance market affect CISOs’ planning and budgeting? </li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Paul Holland, Principal Analyst, <b>Information Security Forum (ISF)<br/>https://www.linkedin.com/in/paulinfosec/</b></p><p>Sebastian Avarvarei, Information Security Manager, <b>Canon<br/>https://www.linkedin.com/in/sebastianavarvarei/</b></p><p>David Finz, First Vice President, Cyber Risk, <b>Alliant Insurance Services<br/>https://www.linkedin.com/in/davidfinz/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Cyber insurance - living with spiralling costs and reduced coverage</b></p><ul><li>Persuading your Board to take out cyber insurance and choosing the best coverage </li><li>How can you lower your cyber insurance premiums? </li><li>How might changes in the cyber insurance market affect CISOs’ planning and budgeting? </li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Paul Holland, Principal Analyst, <b>Information Security Forum (ISF)<br/>https://www.linkedin.com/in/paulinfosec/</b></p><p>Sebastian Avarvarei, Information Security Manager, <b>Canon<br/>https://www.linkedin.com/in/sebastianavarvarei/</b></p><p>David Finz, First Vice President, Cyber Risk, <b>Alliant Insurance Services<br/>https://www.linkedin.com/in/davidfinz/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/12413014-teisstalk-cyber-insurance-living-with-spiralling-costs-and-reduced-coverage.mp3" length="34207211" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12413014</guid>
    <pubDate>Thu, 16 Mar 2023 08:00:00 +0000</pubDate>
    <itunes:duration>2845</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Where are your email risk blind spots?</itunes:title>
    <title>teissTalk: Where are your email risk blind spots?</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Where are your email risk blind spots? BEC attacks: understanding how cyber-criminals are using the five types of scams Adapting your training and awareness raising to the increased email risks of hybrid working Hidden email security risks - detecting and mitigating threats T...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Where are your email risk blind spots?</b></p><ul><li>BEC attacks: understanding how cyber-criminals are using the five types of scams </li><li>Adapting your training and awareness raising to the increased email risks of hybrid working </li><li>Hidden email security risks - detecting and mitigating threats </li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Don Baham, VP, Chief Information Security Officer, <b>Germantown Technologies<br/>https://www.linkedin.com/in/donbaham/</b></p><p>Pedro Martinez, Chief Information Officer, <b>Zenus Bank<br/>https://www.linkedin.com/in/ptmartinez/</b></p><p>Steve Jeffery, Lead Solutions Engineer UK, <b>Fortra<br/>https://www.linkedin.com/in/steve-jeffery-1887aa24/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Where are your email risk blind spots?</b></p><ul><li>BEC attacks: understanding how cyber-criminals are using the five types of scams </li><li>Adapting your training and awareness raising to the increased email risks of hybrid working </li><li>Hidden email security risks - detecting and mitigating threats </li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Don Baham, VP, Chief Information Security Officer, <b>Germantown Technologies<br/>https://www.linkedin.com/in/donbaham/</b></p><p>Pedro Martinez, Chief Information Officer, <b>Zenus Bank<br/>https://www.linkedin.com/in/ptmartinez/</b></p><p>Steve Jeffery, Lead Solutions Engineer UK, <b>Fortra<br/>https://www.linkedin.com/in/steve-jeffery-1887aa24/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/12383418-teisstalk-where-are-your-email-risk-blind-spots.mp3" length="32727265" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12383418</guid>
    <pubDate>Thu, 09 Mar 2023 08:00:00 +0000</pubDate>
    <itunes:duration>2722</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Overcoming your internal cultural AppSec challenges</itunes:title>
    <title>teissTalk: Overcoming your internal cultural AppSec challenges</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Overcoming your internal cultural AppSec challenges Avoiding a siloed security function and non-existent DevSecOps cultureImplementing positive changes and building an effective application security modelInspiring and engaging your developers through gamificationThis episode is hosted by Ge...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Overcoming your internal cultural AppSec challenges</b></p><ul><li>Avoiding a siloed security function and non-existent DevSecOps culture</li><li>Implementing positive changes and building an effective application security model</li><li>Inspiring and engaging your developers through gamification</li></ul><p>This episode is hosted by Geoff White<br/><a href='https://www.linkedin.com/in/geoffwhite247/'><b>https://www.linkedin.com/in/geoffwhite247/</b></a></p><p>Eduardo B Santos, Tech Manager (AppSec &amp; Red Team), <b>BEES Bank Brasil<br/>https://www.linkedin.com/in/edusantos33/</b></p><p>Hainan Hu, EMEA Application Security, <b>Amazon<br/>https://www.linkedin.com/in/hainan/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Overcoming your internal cultural AppSec challenges</b></p><ul><li>Avoiding a siloed security function and non-existent DevSecOps culture</li><li>Implementing positive changes and building an effective application security model</li><li>Inspiring and engaging your developers through gamification</li></ul><p>This episode is hosted by Geoff White<br/><a href='https://www.linkedin.com/in/geoffwhite247/'><b>https://www.linkedin.com/in/geoffwhite247/</b></a></p><p>Eduardo B Santos, Tech Manager (AppSec &amp; Red Team), <b>BEES Bank Brasil<br/>https://www.linkedin.com/in/edusantos33/</b></p><p>Hainan Hu, EMEA Application Security, <b>Amazon<br/>https://www.linkedin.com/in/hainan/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/12289780-teisstalk-overcoming-your-internal-cultural-appsec-challenges.mp3" length="26304930" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12289780</guid>
    <pubDate>Thu, 23 Feb 2023 08:00:00 +0000</pubDate>
    <itunes:duration>2186</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Doing more with less - managing cyber risk in 2023</itunes:title>
    <title>teissTalk: Doing more with less - managing cyber risk in 2023</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Doing more with less - managing cyber risk in 2023 Delivering on a budget: the holy trinity of robust process, skilled resource and capable technologyTurning your reactive security concepts into a proactive methodologySimplifying the complex - reducing cyber risk in your organisation with t...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Doing more with less - managing cyber risk in 2023</b></p><ul><li>Delivering on a budget: the holy trinity of robust process, skilled resource and capable technology</li><li>Turning your reactive security concepts into a proactive methodology</li><li>Simplifying the complex - reducing cyber risk in your organisation with the single pane of glass</li></ul><p>This episode is hosted by Geoff White<br/><a href='https://www.linkedin.com/in/geoffwhite247/'><b>https://www.linkedin.com/in/geoffwhite247/</b></a></p><p>Michelle Griffey, Chief Risk Officer, <b>Communisis<br/>https://www.linkedin.com/in/michelle-griffey/</b></p><p>Steve McKeaveney, Head of Customer Success, <b>ITC Secure<br/>https://www.linkedin.com/in/steve-mckeaveney-5244001/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Doing more with less - managing cyber risk in 2023</b></p><ul><li>Delivering on a budget: the holy trinity of robust process, skilled resource and capable technology</li><li>Turning your reactive security concepts into a proactive methodology</li><li>Simplifying the complex - reducing cyber risk in your organisation with the single pane of glass</li></ul><p>This episode is hosted by Geoff White<br/><a href='https://www.linkedin.com/in/geoffwhite247/'><b>https://www.linkedin.com/in/geoffwhite247/</b></a></p><p>Michelle Griffey, Chief Risk Officer, <b>Communisis<br/>https://www.linkedin.com/in/michelle-griffey/</b></p><p>Steve McKeaveney, Head of Customer Success, <b>ITC Secure<br/>https://www.linkedin.com/in/steve-mckeaveney-5244001/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/12249173-teisstalk-doing-more-with-less-managing-cyber-risk-in-2023.mp3" length="29475357" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12249173</guid>
    <pubDate>Thu, 16 Feb 2023 08:00:00 +0000</pubDate>
    <itunes:duration>2451</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Security awareness programmes – starting from scratch</itunes:title>
    <title>teissTalk: Security awareness programmes – starting from scratch</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Security awareness programmes – starting from scratch Effectively communicating your security awareness goals to encourage change in user behaviourEnsuring colleagues become active and informed partners in securityMeeting your milestones – setting achievable and measurable targets for aware...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Security awareness programmes – starting from scratch</b></p><ul><li>Effectively communicating your security awareness goals to encourage change in user behaviour</li><li>Ensuring colleagues become active and informed partners in security</li><li>Meeting your milestones – setting achievable and measurable targets for awareness raising and behaviour change</li></ul><p>This episode is hosted by Geoff White<br/><a href='https://www.linkedin.com/in/geoffwhite247/'><b>https://www.linkedin.com/in/geoffwhite247/</b></a></p><p>Jacqueline Hanson-Kotei, Senior Manager, Enterprise Information Security &amp; Governance, <b>MTN Ghana<br/>https://www.linkedin.com/in/jacqueihk/</b></p><p>Dom Lucas, Head of Security, <b>British International Investment<br/>https://www.linkedin.com/in/dom-l-30223528/</b></p><p>Shelton Newsham, Owner/Director, <b>Newsham Business Solutions Ltd<br/>https://www.linkedin.com/in/shelton-newsham-b023bb157/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Security awareness programmes – starting from scratch</b></p><ul><li>Effectively communicating your security awareness goals to encourage change in user behaviour</li><li>Ensuring colleagues become active and informed partners in security</li><li>Meeting your milestones – setting achievable and measurable targets for awareness raising and behaviour change</li></ul><p>This episode is hosted by Geoff White<br/><a href='https://www.linkedin.com/in/geoffwhite247/'><b>https://www.linkedin.com/in/geoffwhite247/</b></a></p><p>Jacqueline Hanson-Kotei, Senior Manager, Enterprise Information Security &amp; Governance, <b>MTN Ghana<br/>https://www.linkedin.com/in/jacqueihk/</b></p><p>Dom Lucas, Head of Security, <b>British International Investment<br/>https://www.linkedin.com/in/dom-l-30223528/</b></p><p>Shelton Newsham, Owner/Director, <b>Newsham Business Solutions Ltd<br/>https://www.linkedin.com/in/shelton-newsham-b023bb157/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/12175993-teisstalk-security-awareness-programmes-starting-from-scratch.mp3" length="30691938" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12175993</guid>
    <pubDate>Thu, 09 Feb 2023 08:00:00 +0000</pubDate>
    <itunes:duration>2552</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Threat trends in 2023 and beyond – how uncertain times affect cyber-risk</itunes:title>
    <title>teissTalk: Threat trends in 2023 and beyond – how uncertain times affect cyber-risk</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Threat trends in 2023 and beyond – how uncertain times affect cyber-risk Critical third-party suppliers: building an effective infosec strategyBEC attacks: understanding how cyber-criminals are using deepfake technologyHybrid working: managing the security risks and vulnerabilitiesThis epis...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Threat trends in 2023 and beyond – how uncertain times affect cyber-risk</b></p><ul><li>Critical third-party suppliers: building an effective infosec strategy</li><li>BEC attacks: understanding how cyber-criminals are using deepfake technology</li><li>Hybrid working: managing the security risks and vulnerabilities</li></ul><p>This episode is hosted by Geoff White<br/><a href='https://www.linkedin.com/in/geoffwhite247/'><b>https://www.linkedin.com/in/geoffwhite247/</b></a></p><p>Todd Wade, Chief Information Security Officer, <b>Lloyds Intelligence<br/>https://www.linkedin.com/in/twade/?originalSubdomain=uk<br/><br/></b>Kevin Curran, Professor of Cybersecurity, <b>Ulster University<br/>https://www.linkedin.com/in/profkevincurran/?originalSubdomain=uk</b></p><p>Jamie Moles, Senior Technical Marketing Manager, <b>ExtraHop<br/>https://www.linkedin.com/in/jamiemoles/?originalSubdomain=uk</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Threat trends in 2023 and beyond – how uncertain times affect cyber-risk</b></p><ul><li>Critical third-party suppliers: building an effective infosec strategy</li><li>BEC attacks: understanding how cyber-criminals are using deepfake technology</li><li>Hybrid working: managing the security risks and vulnerabilities</li></ul><p>This episode is hosted by Geoff White<br/><a href='https://www.linkedin.com/in/geoffwhite247/'><b>https://www.linkedin.com/in/geoffwhite247/</b></a></p><p>Todd Wade, Chief Information Security Officer, <b>Lloyds Intelligence<br/>https://www.linkedin.com/in/twade/?originalSubdomain=uk<br/><br/></b>Kevin Curran, Professor of Cybersecurity, <b>Ulster University<br/>https://www.linkedin.com/in/profkevincurran/?originalSubdomain=uk</b></p><p>Jamie Moles, Senior Technical Marketing Manager, <b>ExtraHop<br/>https://www.linkedin.com/in/jamiemoles/?originalSubdomain=uk</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/12129790-teisstalk-threat-trends-in-2023-and-beyond-how-uncertain-times-affect-cyber-risk.mp3" length="30776926" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12129790</guid>
    <pubDate>Thu, 02 Feb 2023 08:00:00 +0000</pubDate>
    <itunes:duration>2559</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Ensuring your IP is safe from malicious activity and cyber-espionage</itunes:title>
    <title>teissTalk: Ensuring your IP is safe from malicious activity and cyber-espionage</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled: teissTalk: Ensuring your IP is safe from malicious activity and cyber-espionage Sharing your IP – protecting critical data when dealing with third partiesInsider threat – ensuring your organisation is secure from IP theftConvincing senior leadership to implement an IP protection planThis episode is ho...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Ensuring your IP is safe from malicious activity and cyber-espionage</b></p><ul><li>Sharing your IP – protecting critical data when dealing with third parties</li><li>Insider threat – ensuring your organisation is secure from IP theft</li><li>Convincing senior leadership to implement an IP protection plan</li></ul><p>This episode is hosted by Geoff White<br/><a href='https://www.linkedin.com/in/geoffwhite247/'><b>https://www.linkedin.com/in/geoffwhite247/</b></a></p><p>Danny Dresner, Professor of Cyber Security, <b>University of Manchester<br/>https://www.linkedin.com/in/danny-dresner-fciis-6382381/</b></p><p>Joshua Copeland, Cybersecurity Director, <b>AT &amp; T<br/>https://www.linkedin.com/in/joshuacopeland/</b></p><p>Lucy Marlow, Intellectual Property Senior Associate, <b>JMW Solicitors LLP<br/>https://www.linkedin.com/in/lucymarlow/</b></p><p>Steve Audsley. EMEA Solution Engineering Manager for Data Protction, <b>Fortra<br/>https://www.linkedin.com/in/steve-audsley-uk/</b></p><p> </p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled:<br/><b>teissTalk: Ensuring your IP is safe from malicious activity and cyber-espionage</b></p><ul><li>Sharing your IP – protecting critical data when dealing with third parties</li><li>Insider threat – ensuring your organisation is secure from IP theft</li><li>Convincing senior leadership to implement an IP protection plan</li></ul><p>This episode is hosted by Geoff White<br/><a href='https://www.linkedin.com/in/geoffwhite247/'><b>https://www.linkedin.com/in/geoffwhite247/</b></a></p><p>Danny Dresner, Professor of Cyber Security, <b>University of Manchester<br/>https://www.linkedin.com/in/danny-dresner-fciis-6382381/</b></p><p>Joshua Copeland, Cybersecurity Director, <b>AT &amp; T<br/>https://www.linkedin.com/in/joshuacopeland/</b></p><p>Lucy Marlow, Intellectual Property Senior Associate, <b>JMW Solicitors LLP<br/>https://www.linkedin.com/in/lucymarlow/</b></p><p>Steve Audsley. EMEA Solution Engineering Manager for Data Protction, <b>Fortra<br/>https://www.linkedin.com/in/steve-audsley-uk/</b></p><p> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/12116249-teisstalk-ensuring-your-ip-is-safe-from-malicious-activity-and-cyber-espionage.mp3" length="29887292" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12116249</guid>
    <pubDate>Fri, 27 Jan 2023 08:00:00 +0000</pubDate>
    <itunes:duration>2485</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Infosec leaders&#39; legal briefing - the liability of the CISO</itunes:title>
    <title>teissTalk: Infosec leaders&#39; legal briefing - the liability of the CISO</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled teissTalk: Infosec leaders' legal briefing - the liability of the CISO Personal legal liability of the CISO – how is this changing, and how should CISOs protect themselves?International data transfers – are data-sharing agreements offering adequate protection?Data disposal and destruction – who’s respo...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled</p><p><b>teissTalk: Infosec leaders&apos; legal briefing - the liability of the CISO</b></p><ul><li>Personal legal liability of the CISO – how is this changing, and how should CISOs protect themselves?</li><li>International data transfers – are data-sharing agreements offering adequate protection?</li><li>Data disposal and destruction – who’s responsible for your data or device destruction process?</li></ul><p>This episode is hosted by Geoff White</p><p><a href='https://www.linkedin.com/in/geoffwhite247/'><b>https://www.linkedin.com/in/geoffwhite247/</b></a></p><p> </p><p>Paul Lanois, Director, <b>Fieldfisher</b></p><p><a href='https://www.linkedin.com/in/paul-lanois-957a671/'><b>https://www.linkedin.com/in/paul-lanois-957a671/</b></a></p><p> </p><p>Benjamin Benhan, Privacy Counsel/Global Operations,<b> Ebay</b></p><p><a href='https://www.linkedin.com/in/benjamin-benhan-3441762/'><b>https://www.linkedin.com/in/benjamin-benhan-3441762/</b></a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled</p><p><b>teissTalk: Infosec leaders&apos; legal briefing - the liability of the CISO</b></p><ul><li>Personal legal liability of the CISO – how is this changing, and how should CISOs protect themselves?</li><li>International data transfers – are data-sharing agreements offering adequate protection?</li><li>Data disposal and destruction – who’s responsible for your data or device destruction process?</li></ul><p>This episode is hosted by Geoff White</p><p><a href='https://www.linkedin.com/in/geoffwhite247/'><b>https://www.linkedin.com/in/geoffwhite247/</b></a></p><p> </p><p>Paul Lanois, Director, <b>Fieldfisher</b></p><p><a href='https://www.linkedin.com/in/paul-lanois-957a671/'><b>https://www.linkedin.com/in/paul-lanois-957a671/</b></a></p><p> </p><p>Benjamin Benhan, Privacy Counsel/Global Operations,<b> Ebay</b></p><p><a href='https://www.linkedin.com/in/benjamin-benhan-3441762/'><b>https://www.linkedin.com/in/benjamin-benhan-3441762/</b></a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11910078-teisstalk-infosec-leaders-legal-briefing-the-liability-of-the-ciso.mp3" length="29702013" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11910078</guid>
    <pubDate>Thu, 22 Dec 2022 08:00:00 +0000</pubDate>
    <itunes:duration>2470</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Developing an intergenerational security awareness programme</itunes:title>
    <title>teissTalk: Developing an intergenerational security awareness programme</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled teissTalk: Developing an intergenerational security awareness programme   ·         Creating a culture that leverages strengths and confronts weaknesses in different generations ·         Understanding different generational security behaviours to ...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: Developing an intergenerational security awareness programme</b></p><p> </p><p>·         Creating a culture that leverages strengths and confronts weaknesses in different generations</p><p>·         Understanding different generational security behaviours to address cyber blind spots</p><p>·         Implementing an adaptive learning approach to raise security awareness</p><p> </p><p>This episode is hosted by Thom Langford<br/><a href='https://www.linkedin.com/in/thomlangford/'><b>https://www.linkedin.com/in/thomlangford/</b></a></p><p>Karandeep Bansal, Head of Information Security, <b>Travelopia</b><br/><a href='https://www.linkedin.com/in/kazbansal/'><b>https://www.linkedin.com/in/kazbansal/</b></a></p><p>Leanne Walker, Senior Information Security Specialist - Awareness &amp; Engagement<br/><a href='https://www.linkedin.com/in/leanne-walker-human-risk-and-security-awareness-specialist-4558bb88/'>https://www.linkedin.com/in/leanne-walker-human-risk-and-security-awareness-specialist-4558bb88/</a></p><p>Karl Knowles, Head of Cyber and Service Delivery, <b>HFW</b><br/><a href='https://www.linkedin.com/in/cyber-karlknowles/'><b>https://www.linkedin.com/in/cyber-karlknowles/</b></a></p><p> </p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: Developing an intergenerational security awareness programme</b></p><p> </p><p>·         Creating a culture that leverages strengths and confronts weaknesses in different generations</p><p>·         Understanding different generational security behaviours to address cyber blind spots</p><p>·         Implementing an adaptive learning approach to raise security awareness</p><p> </p><p>This episode is hosted by Thom Langford<br/><a href='https://www.linkedin.com/in/thomlangford/'><b>https://www.linkedin.com/in/thomlangford/</b></a></p><p>Karandeep Bansal, Head of Information Security, <b>Travelopia</b><br/><a href='https://www.linkedin.com/in/kazbansal/'><b>https://www.linkedin.com/in/kazbansal/</b></a></p><p>Leanne Walker, Senior Information Security Specialist - Awareness &amp; Engagement<br/><a href='https://www.linkedin.com/in/leanne-walker-human-risk-and-security-awareness-specialist-4558bb88/'>https://www.linkedin.com/in/leanne-walker-human-risk-and-security-awareness-specialist-4558bb88/</a></p><p>Karl Knowles, Head of Cyber and Service Delivery, <b>HFW</b><br/><a href='https://www.linkedin.com/in/cyber-karlknowles/'><b>https://www.linkedin.com/in/cyber-karlknowles/</b></a></p><p> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11910057-teisstalk-developing-an-intergenerational-security-awareness-programme.mp3" length="33819122" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11910057</guid>
    <pubDate>Wed, 21 Dec 2022 11:00:00 +0000</pubDate>
    <itunes:duration>2813</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Building an effective digital trust framework</itunes:title>
    <title>teissTalk: Building an effective digital trust framework</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled teissTalk: Building an effective digital trust framework Measuring the maturity of your digital trustDetermining the digital trustworthiness of your third-party suppliersMaking your digital trust framework effective at all levels to minimise cyber-riskThis episode is hosted by Geoff White https://www.l...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: Building an effective digital trust framework</b></p><ul><li>Measuring the maturity of your digital trust</li><li>Determining the digital trustworthiness of your third-party suppliers</li><li>Making your digital trust framework effective at all levels to minimise cyber-risk</li></ul><p>This episode is hosted by Geoff White<br/><b>https://www.linkedin.com/in/geoffwhite247/<br/><br/></b>Kevin Fielder, Chief Information Security Officer,<b> FNZ Group<br/>https://www.linkedin.com/in/kevinfielder/</b></p><p>Rolf Von Rossing, Partner / CEO, <b>FORFA Consulting AG<br/>https://www.linkedin.com/in/rolf-von-roessing-7b519b/</b></p><p>Laurie Gibbett, Cyber Risk Quantification Manager,<b> KPMG UK South Coast<br/>https://www.linkedin.com/in/lauriegibbett/</b></p><p>Mark Thomas, Founder &amp; President of<b> </b>Escoute Consulting,<b> ISACA<br/>https://www.linkedin.com/in/markthomas8/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: Building an effective digital trust framework</b></p><ul><li>Measuring the maturity of your digital trust</li><li>Determining the digital trustworthiness of your third-party suppliers</li><li>Making your digital trust framework effective at all levels to minimise cyber-risk</li></ul><p>This episode is hosted by Geoff White<br/><b>https://www.linkedin.com/in/geoffwhite247/<br/><br/></b>Kevin Fielder, Chief Information Security Officer,<b> FNZ Group<br/>https://www.linkedin.com/in/kevinfielder/</b></p><p>Rolf Von Rossing, Partner / CEO, <b>FORFA Consulting AG<br/>https://www.linkedin.com/in/rolf-von-roessing-7b519b/</b></p><p>Laurie Gibbett, Cyber Risk Quantification Manager,<b> KPMG UK South Coast<br/>https://www.linkedin.com/in/lauriegibbett/</b></p><p>Mark Thomas, Founder &amp; President of<b> </b>Escoute Consulting,<b> ISACA<br/>https://www.linkedin.com/in/markthomas8/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11855906-teisstalk-building-an-effective-digital-trust-framework.mp3" length="32474622" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11855906</guid>
    <pubDate>Thu, 15 Dec 2022 08:00:00 +0000</pubDate>
    <itunes:duration>2701</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Matching intelligence to defence improvements</itunes:title>
    <title>teissTalk: Matching intelligence to defence improvements</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled teissTalk: Matching intelligence to defence improvements Moving from reactive to proactive security - where to begin a threat intelligence gathering functionCan security teams make use of the dark web and other non-traditional threat intelligence?Prioritising your defence efforts – where to deploy your...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: Matching intelligence to defence improvements</b></p><ul><li>Moving from reactive to proactive security - where to begin a threat intelligence gathering function</li><li>Can security teams make use of the dark web and other non-traditional threat intelligence?</li><li>Prioritising your defence efforts – where to deploy your budget and resource</li></ul><p>This episode is hosted by Thom Langford<br/><b>https://www.linkedin.com/in/thomlangford/</b><br/><br/>Larry Cameron, Chief Information Security Officer, <b>Anti-Human-Trafficking Intelligence Initiative<br/>https://www.linkedin.com/in/larrycameron80/</b></p><p>Simon Goldsmith, Director of Information Security, <b>OVO<br/>https://www.linkedin.com/in/smg-cyber/</b></p><p>Sam Flockhart, Cyber Threat Intelligence Manager, <b>Santander UK<br/>https://www.linkedin.com/in/sam-flockhart-1b666685/</b></p><p>Allan Liska, Intelligence Analyst, <b>CSIRT Recorded Future<br/>https://www.linkedin.com/in/allan2/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: Matching intelligence to defence improvements</b></p><ul><li>Moving from reactive to proactive security - where to begin a threat intelligence gathering function</li><li>Can security teams make use of the dark web and other non-traditional threat intelligence?</li><li>Prioritising your defence efforts – where to deploy your budget and resource</li></ul><p>This episode is hosted by Thom Langford<br/><b>https://www.linkedin.com/in/thomlangford/</b><br/><br/>Larry Cameron, Chief Information Security Officer, <b>Anti-Human-Trafficking Intelligence Initiative<br/>https://www.linkedin.com/in/larrycameron80/</b></p><p>Simon Goldsmith, Director of Information Security, <b>OVO<br/>https://www.linkedin.com/in/smg-cyber/</b></p><p>Sam Flockhart, Cyber Threat Intelligence Manager, <b>Santander UK<br/>https://www.linkedin.com/in/sam-flockhart-1b666685/</b></p><p>Allan Liska, Intelligence Analyst, <b>CSIRT Recorded Future<br/>https://www.linkedin.com/in/allan2/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11855856-teisstalk-matching-intelligence-to-defence-improvements.mp3" length="33429763" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11855856</guid>
    <pubDate>Tue, 13 Dec 2022 08:00:00 +0000</pubDate>
    <itunes:duration>2780</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Delivering enterprise-level security on an SME budget</itunes:title>
    <title>teissTalk: Delivering enterprise-level security on an SME budget</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled teissTalk: Delivering enterprise-level security on an SME budget Stop trying to protect everything: prioritising your critical assetsBuilding an effective cybersecurity culture on a budgetBoosting cost effective cyber-resilience with incident response playbookThis episode is hosted by Jenny Radcliffe h...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: Delivering enterprise-level security on an SME budget</b></p><ul><li>Stop trying to protect everything: prioritising your critical assets</li><li>Building an effective cybersecurity culture on a budget</li><li>Boosting cost effective cyber-resilience with incident response playbook</li></ul><p>This episode is hosted by Jenny Radcliffe<br/><b>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</b></p><p>Casey Corcoran, Cybersecurity Advisor, <b>Stratascale<br/>https://www.linkedin.com/in/caseycorcoran/</b></p><p>Brent Deterding, Chief Information Security Officer, <b>Afni Inc. <br/>https://www.linkedin.com/in/brent-deterding/</b></p><p>Raghu Dev, CEO, <b>SAIX<br/>https://www.linkedin.com/in/raghukdev/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: Delivering enterprise-level security on an SME budget</b></p><ul><li>Stop trying to protect everything: prioritising your critical assets</li><li>Building an effective cybersecurity culture on a budget</li><li>Boosting cost effective cyber-resilience with incident response playbook</li></ul><p>This episode is hosted by Jenny Radcliffe<br/><b>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</b></p><p>Casey Corcoran, Cybersecurity Advisor, <b>Stratascale<br/>https://www.linkedin.com/in/caseycorcoran/</b></p><p>Brent Deterding, Chief Information Security Officer, <b>Afni Inc. <br/>https://www.linkedin.com/in/brent-deterding/</b></p><p>Raghu Dev, CEO, <b>SAIX<br/>https://www.linkedin.com/in/raghukdev/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11796877-teisstalk-delivering-enterprise-level-security-on-an-sme-budget.mp3" length="28908924" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11796877</guid>
    <pubDate>Tue, 06 Dec 2022 08:00:00 +0000</pubDate>
    <itunes:duration>2403</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Robot wars – using AI to combat the deepfake threat</itunes:title>
    <title>teissTalk: Robot wars – using AI to combat the deepfake threat</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled teissTalk: Robot wars – using AI to combat the deepfake threat How are cyber-criminals using deepfake technology to enhance BEC attacks?How has hybrid working opened up a slew of new security risks and vulnerabilities?Is a combination of AI, blockchain and awareness an adequate response?This episode is...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: Robot wars – using AI to combat the deepfake threat</b></p><ul><li>How are cyber-criminals using deepfake technology to enhance BEC attacks?</li><li>How has hybrid working opened up a slew of new security risks and vulnerabilities?</li><li>Is a combination of AI, blockchain and awareness an adequate response?</li></ul><p>This episode is hosted by Geoff White<br/><b>https://www.linkedin.com/in/geoffwhite247/</b></p><p>Dr. Janet Bastiman, Chief Data Scientist, <b>Napier AI<br/>https://www.linkedin.com/in/janetbastiman/<br/><br/></b>Ansgar Koene, Global AI Ethics and Regulatory Leader,<b> EY<br/>https://www.linkedin.com/in/akoene/<br/><br/></b>Chuck Brooks, Adjunct Professor,<b> Georgetown University<br/>https://business-reporter.co.uk/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: Robot wars – using AI to combat the deepfake threat</b></p><ul><li>How are cyber-criminals using deepfake technology to enhance BEC attacks?</li><li>How has hybrid working opened up a slew of new security risks and vulnerabilities?</li><li>Is a combination of AI, blockchain and awareness an adequate response?</li></ul><p>This episode is hosted by Geoff White<br/><b>https://www.linkedin.com/in/geoffwhite247/</b></p><p>Dr. Janet Bastiman, Chief Data Scientist, <b>Napier AI<br/>https://www.linkedin.com/in/janetbastiman/<br/><br/></b>Ansgar Koene, Global AI Ethics and Regulatory Leader,<b> EY<br/>https://www.linkedin.com/in/akoene/<br/><br/></b>Chuck Brooks, Adjunct Professor,<b> Georgetown University<br/>https://business-reporter.co.uk/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11771599-teisstalk-robot-wars-using-ai-to-combat-the-deepfake-threat.mp3" length="2556489" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11771599</guid>
    <pubDate>Thu, 01 Dec 2022 08:00:00 +0000</pubDate>
    <itunes:duration>207</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Industry focus - how are FinTechs mitigating risk against the evolving cyber-threat landscape</itunes:title>
    <title>teissTalk: Industry focus - how are FinTechs mitigating risk against the evolving cyber-threat landscape</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled teissTalk: Industry focus - how are FinTechs mitigating risk against the evolving cyber-threat landscape What are the unique challenges facing infosec leaders in this industry, and what are the transferable learnings?Comparing current risk to target risk in the FinTech industry – how have cyber risk ap...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: Industry focus - how are FinTechs mitigating risk against the evolving cyber-threat landscape</b></p><ul><li>What are the unique challenges facing infosec leaders in this industry, and what are the transferable learnings?</li><li>Comparing current risk to target risk in the FinTech industry – how have cyber risk appetites changed?</li><li>Fostering an effective security culture across in an FinTech organisation - overcoming industry-specific challenges</li></ul><p>This episode is hosted by Jenny Radcliffe<br/><b>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/<br/><br/></b>Alex Arango, Deputy CISO - Head of Cyber Threat Management,<b> Mercury Financial<br/>https://www.linkedin.com/in/alexander-a-63b04944/<br/><br/></b>Shreyas Kumar, CISO, <b>Kinship</b></p><p>David Arnold, Director of Cyber Security Sales Engineering,<b> EMEA Blackberry<br/>https://www.linkedin.com/in/davidgrahamarnold/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: Industry focus - how are FinTechs mitigating risk against the evolving cyber-threat landscape</b></p><ul><li>What are the unique challenges facing infosec leaders in this industry, and what are the transferable learnings?</li><li>Comparing current risk to target risk in the FinTech industry – how have cyber risk appetites changed?</li><li>Fostering an effective security culture across in an FinTech organisation - overcoming industry-specific challenges</li></ul><p>This episode is hosted by Jenny Radcliffe<br/><b>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/<br/><br/></b>Alex Arango, Deputy CISO - Head of Cyber Threat Management,<b> Mercury Financial<br/>https://www.linkedin.com/in/alexander-a-63b04944/<br/><br/></b>Shreyas Kumar, CISO, <b>Kinship</b></p><p>David Arnold, Director of Cyber Security Sales Engineering,<b> EMEA Blackberry<br/>https://www.linkedin.com/in/davidgrahamarnold/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11750606-teisstalk-industry-focus-how-are-fintechs-mitigating-risk-against-the-evolving-cyber-threat-landscape.mp3" length="2941200" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11750606</guid>
    <pubDate>Tue, 29 Nov 2022 08:00:00 +0000</pubDate>
    <itunes:duration>239</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: What can the arms race with the attackers teach us?</itunes:title>
    <title>teissTalk: What can the arms race with the attackers teach us?</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled teissTalk: What can the arms race with the attackers teach us? What can you share to help educate end users about the tools, techniques and tactics of attackers?Are attackers getting more sophisticated, or do we keep making the same mistakes?How can you develop more effective security awareness program...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: What can the arms race with the attackers teach us?</b></p><ul><li>What can you share to help educate end users about the tools, techniques and tactics of attackers?</li><li>Are attackers getting more sophisticated, or do we keep making the same mistakes?</li><li>How can you develop more effective security awareness programmes?</li></ul><p>This episode is hosted by Geoff White<br/><b>https://www.linkedin.com/in/geoffwhite247/</b></p><p>Steven F. Fox, Deputy CISO, Policy &amp; Program Management, <b>State of Washington<br/>https://www.linkedin.com/in/stevenffoxmba/</b></p><p>Jamie Moles, Senior Technical Marketing Manager, <b>ExtraHop<br/>https://www.linkedin.com/in/jamiemoles/</b></p><p>Adam Gordon, Edutainer &amp; SME, <b>ITProTV<br/>https://www.linkedin.com/in/adam-gordon-0408981/</b></p><p>Troy Stairwalt, Vice President &amp; Chief Information Security Officer, <b>Akron Children’s Hospital<br/>https://www.linkedin.com/in/troy-stairwalt/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: What can the arms race with the attackers teach us?</b></p><ul><li>What can you share to help educate end users about the tools, techniques and tactics of attackers?</li><li>Are attackers getting more sophisticated, or do we keep making the same mistakes?</li><li>How can you develop more effective security awareness programmes?</li></ul><p>This episode is hosted by Geoff White<br/><b>https://www.linkedin.com/in/geoffwhite247/</b></p><p>Steven F. Fox, Deputy CISO, Policy &amp; Program Management, <b>State of Washington<br/>https://www.linkedin.com/in/stevenffoxmba/</b></p><p>Jamie Moles, Senior Technical Marketing Manager, <b>ExtraHop<br/>https://www.linkedin.com/in/jamiemoles/</b></p><p>Adam Gordon, Edutainer &amp; SME, <b>ITProTV<br/>https://www.linkedin.com/in/adam-gordon-0408981/</b></p><p>Troy Stairwalt, Vice President &amp; Chief Information Security Officer, <b>Akron Children’s Hospital<br/>https://www.linkedin.com/in/troy-stairwalt/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11720347-teisstalk-what-can-the-arms-race-with-the-attackers-teach-us.mp3" length="32811927" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11720347</guid>
    <pubDate>Thu, 24 Nov 2022 08:00:00 +0000</pubDate>
    <itunes:duration>2729</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: How many cyber-attack playbooks do you actually need?</itunes:title>
    <title>teissTalk: How many cyber-attack playbooks do you actually need?</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled teissTalk: How many cyber-attack playbooks do you actually need? Incident response – what are the most effective pre-emptive measures?Would a single playbook for all incidents be effective, or merely increase the fear of ransomware attacks?Leading the shift in thinking within your organisation – prepar...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: How many cyber-attack playbooks do you actually need?</b></p><ul><li>Incident response – what are the most effective pre-emptive measures?</li><li>Would a single playbook for all incidents be effective, or merely increase the fear of ransomware attacks?</li><li>Leading the shift in thinking within your organisation – preparing for any and all attacks</li></ul><p>This episode is hosted by Jenny Radcliffe<br/><b>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</b><br/><b><br/></b>Benjamin Bachmann, VP Group Information<b> </b>Security,<b> Stroer<br/>https://www.linkedin.com/in/benbachmann/<br/><br/></b>Kai Hermsen, Managing Board Member and Secretary,<b> Twinds Foundation<br/>https://www.linkedin.com/in/kaihermsen/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: How many cyber-attack playbooks do you actually need?</b></p><ul><li>Incident response – what are the most effective pre-emptive measures?</li><li>Would a single playbook for all incidents be effective, or merely increase the fear of ransomware attacks?</li><li>Leading the shift in thinking within your organisation – preparing for any and all attacks</li></ul><p>This episode is hosted by Jenny Radcliffe<br/><b>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</b><br/><b><br/></b>Benjamin Bachmann, VP Group Information<b> </b>Security,<b> Stroer<br/>https://www.linkedin.com/in/benbachmann/<br/><br/></b>Kai Hermsen, Managing Board Member and Secretary,<b> Twinds Foundation<br/>https://www.linkedin.com/in/kaihermsen/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11720326-teisstalk-how-many-cyber-attack-playbooks-do-you-actually-need.mp3" length="28856261" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11720326</guid>
    <pubDate>Tue, 22 Nov 2022 08:00:00 +0000</pubDate>
    <itunes:duration>2399</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Industry focus - how the automotive industry is protecting itself from third party threats</itunes:title>
    <title>teissTalk: Industry focus - how the automotive industry is protecting itself from third party threats</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled teissTalk: Industry focus - how the automotive industry is protecting itself from third party threats What are the unique challenges facing infosec leaders in this industry, and what are the transferable learnings?Comparing current risk to target risk in the automotive industry – how have cyber risk ap...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: Industry focus - how the automotive industry is protecting itself from third party threats</b></p><ul><li>What are the unique challenges facing infosec leaders in this industry, and what are the transferable learnings?</li><li>Comparing current risk to target risk in the automotive industry – how have cyber risk appetites changed?</li><li>Fostering an effective security culture across in an automotive organisation - overcoming industry-specific challenges</li></ul><p>This episode is hosted by Geoff White<br/><b>https://www.linkedin.com/in/geoffwhite247/<br/><br/></b>Martin Bodenstein, Senior Manger (Financial Advisory/Forensic Technology),<b> Deloitte GmbH<br/>https://www.linkedin.com/in/martin-bodenstein-64a13685/</b></p><p>Christine Deger, CEO/Founder,<b> Cyberluchs for Business<br/>https://www.linkedin.com/in/christinedeger/</b></p><p>Andrew Clews Host, Producer &amp; Editor, <b>The Motoring Podcast</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: Industry focus - how the automotive industry is protecting itself from third party threats</b></p><ul><li>What are the unique challenges facing infosec leaders in this industry, and what are the transferable learnings?</li><li>Comparing current risk to target risk in the automotive industry – how have cyber risk appetites changed?</li><li>Fostering an effective security culture across in an automotive organisation - overcoming industry-specific challenges</li></ul><p>This episode is hosted by Geoff White<br/><b>https://www.linkedin.com/in/geoffwhite247/<br/><br/></b>Martin Bodenstein, Senior Manger (Financial Advisory/Forensic Technology),<b> Deloitte GmbH<br/>https://www.linkedin.com/in/martin-bodenstein-64a13685/</b></p><p>Christine Deger, CEO/Founder,<b> Cyberluchs for Business<br/>https://www.linkedin.com/in/christinedeger/</b></p><p>Andrew Clews Host, Producer &amp; Editor, <b>The Motoring Podcast</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11691209-teisstalk-industry-focus-how-the-automotive-industry-is-protecting-itself-from-third-party-threats.mp3" length="34118859" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11691209</guid>
    <pubDate>Fri, 18 Nov 2022 08:00:00 +0000</pubDate>
    <itunes:duration>2838</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Measuring behavioural change to reduce cyber risk</itunes:title>
    <title>teissTalk: Measuring behavioural change to reduce cyber risk</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled teissTalk: Measuring behavioural change to reduce cyber risk What should you measure – behavioural change or training metrics?Using behavioural metrics to analyse risk patternsHow can advanced metrics inform users with the right information at the right time?This episode is hosted by Thom Langford http...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/>teissTalk: Measuring behavioural change to reduce cyber risk</p><ul><li>What should you measure – behavioural change or training metrics?</li><li>Using behavioural metrics to analyse risk patterns</li><li>How can advanced metrics inform users with the right information at the right time?</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Candace Williams, CEO/Founder, <b>Cybersecurity(H)er Ally Cybersecurity Solutions<br/>https://www.linkedin.com/in/cybherally/</b></p><p>Baering Logason, Chief Information Security Officer, <b>Isavia<br/>https://www.linkedin.com/in/baeringlogason/</b></p><p>Oz Alashe, CEO, <b>CybSafe<br/>https://www.linkedin.com/in/oz-alashe-mbe-a8870785/</b></p><p>Ray Espinoza, Chief Information Security Officer, <b>Inspectiv<br/>https://www.linkedin.com/in/ray-espinoza-b399821/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/>teissTalk: Measuring behavioural change to reduce cyber risk</p><ul><li>What should you measure – behavioural change or training metrics?</li><li>Using behavioural metrics to analyse risk patterns</li><li>How can advanced metrics inform users with the right information at the right time?</li></ul><p>This episode is hosted by Thom Langford<b><br/>https://www.linkedin.com/in/thomlangford/</b></p><p>Candace Williams, CEO/Founder, <b>Cybersecurity(H)er Ally Cybersecurity Solutions<br/>https://www.linkedin.com/in/cybherally/</b></p><p>Baering Logason, Chief Information Security Officer, <b>Isavia<br/>https://www.linkedin.com/in/baeringlogason/</b></p><p>Oz Alashe, CEO, <b>CybSafe<br/>https://www.linkedin.com/in/oz-alashe-mbe-a8870785/</b></p><p>Ray Espinoza, Chief Information Security Officer, <b>Inspectiv<br/>https://www.linkedin.com/in/ray-espinoza-b399821/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11691161-teisstalk-measuring-behavioural-change-to-reduce-cyber-risk.mp3" length="761873" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11691161</guid>
    <pubDate>Wed, 16 Nov 2022 08:00:00 +0000</pubDate>
    <itunes:duration>58</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Swerving the big threats to your application security</itunes:title>
    <title>teissTalk: Swerving the big threats to your application security</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled teissTalk: Swerving the big threats to your application security Securing your apps – which threats is your organisation facing?Avoiding false positives in your test resultsOvercoming cultural clashes within DevSecOpsThis episode is hosted by Geoff White https://www.linkedin.com/in/geoffwhite247/  Andr...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<b><br/>teissTalk: Swerving the big threats to your application security</b></p><ul><li>Securing your apps – which threats is your organisation facing?</li><li>Avoiding false positives in your test results</li><li>Overcoming cultural clashes within DevSecOps</li></ul><p>This episode is hosted by Geoff White<br/><b>https://www.linkedin.com/in/geoffwhite247/<br/><br/></b>Andres Andreu SVP,<b> CISO 2U<br/>https://www.linkedin.com/in/andresandreu/<br/><br/></b>Dean Sapp, VP, Information Security, Privacy, Risk and Compliance (DPO),<b> Filevine<br/>https://www.linkedin.com/in/deansapp/<br/><br/></b>Michael Manrod, Chief Information Security Officer, <b>Grand Canyon Education, Inc.<br/>https://www.linkedin.com/in/manrod/<br/><br/></b>Adrian Winckles, Education Committee Chair,<b> OWASP Foundation<br/>https://www.linkedin.com/in/adrian-winckles-2582ab3/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<b><br/>teissTalk: Swerving the big threats to your application security</b></p><ul><li>Securing your apps – which threats is your organisation facing?</li><li>Avoiding false positives in your test results</li><li>Overcoming cultural clashes within DevSecOps</li></ul><p>This episode is hosted by Geoff White<br/><b>https://www.linkedin.com/in/geoffwhite247/<br/><br/></b>Andres Andreu SVP,<b> CISO 2U<br/>https://www.linkedin.com/in/andresandreu/<br/><br/></b>Dean Sapp, VP, Information Security, Privacy, Risk and Compliance (DPO),<b> Filevine<br/>https://www.linkedin.com/in/deansapp/<br/><br/></b>Michael Manrod, Chief Information Security Officer, <b>Grand Canyon Education, Inc.<br/>https://www.linkedin.com/in/manrod/<br/><br/></b>Adrian Winckles, Education Committee Chair,<b> OWASP Foundation<br/>https://www.linkedin.com/in/adrian-winckles-2582ab3/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11629927-teisstalk-swerving-the-big-threats-to-your-application-security.mp3" length="32076532" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11629927</guid>
    <pubDate>Mon, 14 Nov 2022 08:00:00 +0000</pubDate>
    <itunes:duration>2667</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Get smart - How top CISOs are leveraging the dark web to gather pre-attack intelligence</itunes:title>
    <title>teissTalk: Get smart - How top CISOs are leveraging the dark web to gather pre-attack intelligence</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled teissTalk: Get smart - How top CISOs are leveraging the dark web to gather pre-attack intelligence Moving from reactive to proactive security - where to beginStart threat modelling using the dark web and non-traditional threat intelligenceMapping dark web threat intelligence to the MITRE ATT&amp;CK fra...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<b><br/>teissTalk: Get smart - How top CISOs are leveraging the dark web to gather pre-attack intelligence</b></p><ul><li>Moving from reactive to proactive security - where to begin</li><li>Start threat modelling using the dark web and non-traditional threat intelligence</li><li>Mapping dark web threat intelligence to the MITRE ATT&amp;CK framework</li></ul><p>This episode is hosted by Jenny Radcliffe<br/><b>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/<br/><br/></b>Ben Muldoon, Senior Cyber Security Investigator, <b>STORM Guidance<br/>https://www.linkedin.com/in/ben-m-769279b/<br/><br/></b>Matt Gregory, Head of Security Operations,  <b>Penguin Random House UK<br/>https://www.linkedin.com/in/matthew-gregory-08523019/?originalSubdomain=uk<br/><br/></b>JB Benjamin, CEO/Founder,<b> Kryotech Ltd<br/>https://www.linkedin.com/in/jbbenjamin/?originalSubdomain=uk</b></p><p>Gareth Owenson, Co-founder and CTO,<b> Searchlight<br/>https://www.linkedin.com/in/gareth-owenson-a89aa5202/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<b><br/>teissTalk: Get smart - How top CISOs are leveraging the dark web to gather pre-attack intelligence</b></p><ul><li>Moving from reactive to proactive security - where to begin</li><li>Start threat modelling using the dark web and non-traditional threat intelligence</li><li>Mapping dark web threat intelligence to the MITRE ATT&amp;CK framework</li></ul><p>This episode is hosted by Jenny Radcliffe<br/><b>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/<br/><br/></b>Ben Muldoon, Senior Cyber Security Investigator, <b>STORM Guidance<br/>https://www.linkedin.com/in/ben-m-769279b/<br/><br/></b>Matt Gregory, Head of Security Operations,  <b>Penguin Random House UK<br/>https://www.linkedin.com/in/matthew-gregory-08523019/?originalSubdomain=uk<br/><br/></b>JB Benjamin, CEO/Founder,<b> Kryotech Ltd<br/>https://www.linkedin.com/in/jbbenjamin/?originalSubdomain=uk</b></p><p>Gareth Owenson, Co-founder and CTO,<b> Searchlight<br/>https://www.linkedin.com/in/gareth-owenson-a89aa5202/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11623787-teisstalk-get-smart-how-top-cisos-are-leveraging-the-dark-web-to-gather-pre-attack-intelligence.mp3" length="31493860" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11623787</guid>
    <pubDate>Fri, 11 Nov 2022 08:00:00 +0000</pubDate>
    <itunes:duration>2619</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Leading incident response and crisis simulations</itunes:title>
    <title>teissTalk: Leading incident response and crisis simulations</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled teissTalk: Leading incident response and crisis simulations How do you prepare key individuals for a significant cyber-incident?Adapting your crisis and incident response to risks faced by remote and hybrid-workersEnsuring your updated playbooks are followed by responders and the wider workforce as par...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: Leading incident response and crisis simulations</b></p><ul><li>How do you prepare key individuals for a significant cyber-incident?</li><li>Adapting your crisis and incident response to risks faced by remote and hybrid-workers</li><li>Ensuring your updated playbooks are followed by responders and the wider workforce as part of business continuity</li></ul><p>This episode is hosted by Geoff White<br/><b>https://www.linkedin.com/in/geoffwhite247/</b></p><p>Neil Hare-Brown, CEO, <b>Storm Guidance<br/>https://www.linkedin.com/in/neilhb/</b></p><p>Dr. Leandros Maglaras, Professor of Cyber Security, <b>De Montford University, Leicester UK<br/>https://www.linkedin.com/in/leandrosmaglaras/</b></p><p>Jonathan R. Brennan, Chief Information Officer, <b>Berkshire Farm Center and Services for Youth<br/>https://www.linkedin.com/in/brennj4/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: Leading incident response and crisis simulations</b></p><ul><li>How do you prepare key individuals for a significant cyber-incident?</li><li>Adapting your crisis and incident response to risks faced by remote and hybrid-workers</li><li>Ensuring your updated playbooks are followed by responders and the wider workforce as part of business continuity</li></ul><p>This episode is hosted by Geoff White<br/><b>https://www.linkedin.com/in/geoffwhite247/</b></p><p>Neil Hare-Brown, CEO, <b>Storm Guidance<br/>https://www.linkedin.com/in/neilhb/</b></p><p>Dr. Leandros Maglaras, Professor of Cyber Security, <b>De Montford University, Leicester UK<br/>https://www.linkedin.com/in/leandrosmaglaras/</b></p><p>Jonathan R. Brennan, Chief Information Officer, <b>Berkshire Farm Center and Services for Youth<br/>https://www.linkedin.com/in/brennj4/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11607795-teisstalk-leading-incident-response-and-crisis-simulations.mp3" length="31904741" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11607795</guid>
    <pubDate>Wed, 09 Nov 2022 08:00:00 +0000</pubDate>
    <itunes:duration>2653</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Managing your board during a significant cyber-incident</itunes:title>
    <title>teissTalk: Managing your board during a significant cyber-incident</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled teissTalk: Managing your board during a significant cyber-incident How should CISOs deal with a nervous board?Ensuring your board responds constructively and allows your team autonomy during an incidentHow can CISOs handle negative repsonses from the board?This episode is hosted by Thom Langford https:...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: Managing your board during a significant cyber-incident</b></p><ul><li>How should CISOs deal with a nervous board?</li><li>Ensuring your board responds constructively and allows your team autonomy during an incident</li><li>How can CISOs handle negative repsonses from the board?</li></ul><p>This episode is hosted by Thom Langford<br/><b>https://www.linkedin.com/in/thomlangford/?originalSubdomain=uk</b></p><p>Mathieu Gorge, CEO, <b>VigiTrust<br/>https://www.linkedin.com/in/mgorge/?originalSubdomain=ie</b></p><p>Morgan O’Neil, Director Data Protection Services, <b>Thorntons Law LLP<br/>https://www.linkedin.com/in/morgan-o-neill-35529b67/?originalSubdomain=uk</b></p><p>Rob Hornbuckle, Chief Information Security Officer, <b>Allegiant<br/>https://www.linkedin.com/in/rob-hornbuckle/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: Managing your board during a significant cyber-incident</b></p><ul><li>How should CISOs deal with a nervous board?</li><li>Ensuring your board responds constructively and allows your team autonomy during an incident</li><li>How can CISOs handle negative repsonses from the board?</li></ul><p>This episode is hosted by Thom Langford<br/><b>https://www.linkedin.com/in/thomlangford/?originalSubdomain=uk</b></p><p>Mathieu Gorge, CEO, <b>VigiTrust<br/>https://www.linkedin.com/in/mgorge/?originalSubdomain=ie</b></p><p>Morgan O’Neil, Director Data Protection Services, <b>Thorntons Law LLP<br/>https://www.linkedin.com/in/morgan-o-neill-35529b67/?originalSubdomain=uk</b></p><p>Rob Hornbuckle, Chief Information Security Officer, <b>Allegiant<br/>https://www.linkedin.com/in/rob-hornbuckle/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11607493-teisstalk-managing-your-board-during-a-significant-cyber-incident.mp3" length="32906603" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11607493</guid>
    <pubDate>Mon, 07 Nov 2022 08:00:00 +0000</pubDate>
    <itunes:duration>2737</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Industry focus - how healthcare institutions protect their data from cyber threats</itunes:title>
    <title>teissTalk: Industry focus - how healthcare institutions protect their data from cyber threats</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled teissTalk: Industry focus - how healthcare institutions protect their data from cyber threats What are the unique challenges facing infosec leaders in this industry, and what are the transferable learnings?Comparing current risk to target risk in the healthcare industry – how have cyber risk appetites ...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: Industry focus - how healthcare institutions protect their data from cyber threats</b></p><ul><li>What are the unique challenges facing infosec leaders in this industry, and what are the transferable learnings?</li><li>Comparing current risk to target risk in the healthcare industry – how have cyber risk appetites changed?</li><li>Fostering an effective security culture across a healthcare setting - overcoming industry-specific challenges</li></ul><p>This episode is hosted by Geoff White<br/><b>https://www.linkedin.com/in/geoffwhite247/</b></p><p>Kate Mullin, Chief Information Security Officer, <b>Cancer Treatment Centers of America Global<br/>https://www.linkedin.com/in/katemullin/</b></p><p>Richard Staynings, Teaching Professor, <b>University of Denver <br/>https://www.linkedin.com/in/richardstaynings/</b></p><p>Jim Brady, Vice President &amp; CISO, Cybersecurity and Risk Management, Fa<b>irview Health Services<br/>https://www.linkedin.com/in/jamesbrady/</b></p><p>Avishai Avivi, Chief Information Security Officer, <b>SafeBreach<br/>https://www.linkedin.com/in/aavivi/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: Industry focus - how healthcare institutions protect their data from cyber threats</b></p><ul><li>What are the unique challenges facing infosec leaders in this industry, and what are the transferable learnings?</li><li>Comparing current risk to target risk in the healthcare industry – how have cyber risk appetites changed?</li><li>Fostering an effective security culture across a healthcare setting - overcoming industry-specific challenges</li></ul><p>This episode is hosted by Geoff White<br/><b>https://www.linkedin.com/in/geoffwhite247/</b></p><p>Kate Mullin, Chief Information Security Officer, <b>Cancer Treatment Centers of America Global<br/>https://www.linkedin.com/in/katemullin/</b></p><p>Richard Staynings, Teaching Professor, <b>University of Denver <br/>https://www.linkedin.com/in/richardstaynings/</b></p><p>Jim Brady, Vice President &amp; CISO, Cybersecurity and Risk Management, Fa<b>irview Health Services<br/>https://www.linkedin.com/in/jamesbrady/</b></p><p>Avishai Avivi, Chief Information Security Officer, <b>SafeBreach<br/>https://www.linkedin.com/in/aavivi/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11600420-teisstalk-industry-focus-how-healthcare-institutions-protect-their-data-from-cyber-threats.mp3" length="31889449" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11600420</guid>
    <pubDate>Thu, 03 Nov 2022 08:00:00 +0000</pubDate>
    <itunes:duration>2652</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Fostering an effective security culture</itunes:title>
    <title>teissTalk: Fostering an effective security culture</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled teissTalk: Fostering an effective security culture How are workers prevented from becoming active and informed partners in security?To what extent do humans impact the effectiveness of security technology?How to overcome the challenges of delivering an effective security cultureThis episode is hosted b...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: Fostering an effective security culture</b></p><ul><li>How are workers prevented from becoming active and informed partners in security?</li><li>To what extent do humans impact the effectiveness of security technology?</li><li>How to overcome the challenges of delivering an effective security culture</li></ul><p>This episode is hosted by Thom Langford <br/><b>https://www.linkedin.com/in/thomlangford/?originalSubdomain=uk</b></p><p>Michael Woodson, Director of Information Security and Privacy, <b>Sonesta Hotels<br/>https://www.linkedin.com/in/mi5woodson/</b></p><p>Sergey Tairyan, Chief Information Security Officer, <b>Digitain<br/>https://www.linkedin.com/in/sergey-tairyan-ph-d-0081b072/</b></p><p>Ali Baccouche, Regional Information Security &amp; Data Privacy Officer EMEA, <b>Texas Instruments<br/>https://www.linkedin.com/in/ali-baccouche-7945a62/</b></p><p>Jon France, Chief Information Security Officer, <b>ISC2<br/>https://www.linkedin.com/in/jonfrance/?originalSubdomain=uk</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: Fostering an effective security culture</b></p><ul><li>How are workers prevented from becoming active and informed partners in security?</li><li>To what extent do humans impact the effectiveness of security technology?</li><li>How to overcome the challenges of delivering an effective security culture</li></ul><p>This episode is hosted by Thom Langford <br/><b>https://www.linkedin.com/in/thomlangford/?originalSubdomain=uk</b></p><p>Michael Woodson, Director of Information Security and Privacy, <b>Sonesta Hotels<br/>https://www.linkedin.com/in/mi5woodson/</b></p><p>Sergey Tairyan, Chief Information Security Officer, <b>Digitain<br/>https://www.linkedin.com/in/sergey-tairyan-ph-d-0081b072/</b></p><p>Ali Baccouche, Regional Information Security &amp; Data Privacy Officer EMEA, <b>Texas Instruments<br/>https://www.linkedin.com/in/ali-baccouche-7945a62/</b></p><p>Jon France, Chief Information Security Officer, <b>ISC2<br/>https://www.linkedin.com/in/jonfrance/?originalSubdomain=uk</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11600326-teisstalk-fostering-an-effective-security-culture.mp3" length="33789928" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11600326</guid>
    <pubDate>Tue, 01 Nov 2022 08:00:00 +0000</pubDate>
    <itunes:duration>2810</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Industry focus - how aviation companies share cyber threat intelligence</itunes:title>
    <title>teissTalk: Industry focus - how aviation companies share cyber threat intelligence</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled teissTalk: Industry focus - how aviation companies share cyber threat intelligence   What are the unique challenges facing infosec leaders in this industry, and what are the transferable learnings?Comparing current risk to target risk – how have cyber risk appetites changed?Fostering an effective secur...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: Industry focus - how aviation companies share cyber threat intelligence<br/></b><br/></p><ul><li>What are the unique challenges facing infosec leaders in this industry, and what are the transferable learnings?</li><li>Comparing current risk to target risk – how have cyber risk appetites changed?</li><li>Fostering an effective security culture across an aviation company - overcoming industry-specific challenges</li></ul><p>This episode is hosted by Geoff White<br/><b>https://www.linkedin.com/in/geoffwhite247/</b></p><p>Timothy Rohrbaugh, Chief Information Security Officer, <b>JetBlue Airways<br/>https://www.linkedin.com/in/timrohrbaugh/</b></p><p>Luke O’Brien, Cybersecurity Operations Manager, <b>easyJet<br/>https://www.linkedin.com/in/lukemobrien/</b></p><p>Manas Giri, Chief Information Security Officer, <b>WestJet<br/>https://www.linkedin.com/in/manas-giri-1aa3212/<br/><br/></b>Jean-Francois Simons, Vice President,<b> EMEA Aviation ISAC<br/>https://www.linkedin.com/in/jean-francois-simons-b18a7a1/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: Industry focus - how aviation companies share cyber threat intelligence<br/></b><br/></p><ul><li>What are the unique challenges facing infosec leaders in this industry, and what are the transferable learnings?</li><li>Comparing current risk to target risk – how have cyber risk appetites changed?</li><li>Fostering an effective security culture across an aviation company - overcoming industry-specific challenges</li></ul><p>This episode is hosted by Geoff White<br/><b>https://www.linkedin.com/in/geoffwhite247/</b></p><p>Timothy Rohrbaugh, Chief Information Security Officer, <b>JetBlue Airways<br/>https://www.linkedin.com/in/timrohrbaugh/</b></p><p>Luke O’Brien, Cybersecurity Operations Manager, <b>easyJet<br/>https://www.linkedin.com/in/lukemobrien/</b></p><p>Manas Giri, Chief Information Security Officer, <b>WestJet<br/>https://www.linkedin.com/in/manas-giri-1aa3212/<br/><br/></b>Jean-Francois Simons, Vice President,<b> EMEA Aviation ISAC<br/>https://www.linkedin.com/in/jean-francois-simons-b18a7a1/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11565321-teisstalk-industry-focus-how-aviation-companies-share-cyber-threat-intelligence.mp3" length="32453985" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11565321</guid>
    <pubDate>Fri, 28 Oct 2022 08:00:00 +0100</pubDate>
    <itunes:duration>2699</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Is your hybrid security awareness programme helping or harming your organisation?</itunes:title>
    <title>teissTalk: Is your hybrid security awareness programme helping or harming your organisation?</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled teissTalk: Is your hybrid security awareness programme helping or harming your organisation?   Phishing campaigns up, data breaches down: do security awareness programmes work?Security awareness training that meets the needs of a hybrid workforceFocusing hybrid awareness programmes to deliver positive ...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: Is your hybrid security awareness programme helping or harming your organisation?<br/></b><br/></p><ul><li>Phishing campaigns up, data breaches down: do security awareness programmes work?</li><li>Security awareness training that meets the needs of a hybrid workforce</li><li>Focusing hybrid awareness programmes to deliver positive security-related behaviours</li></ul><p>This episode is hosted by Thom Langford<br/><b>https://www.linkedin.com/in/thomlangford/?originalSubdomain=uk</b></p><p>Oscar O’Connor, Chief Storyteller, <b>Oscar O’Connor &amp; Co<br/>https://www.linkedin.com/in/oscaroconnor/?originalSubdomain=uk</b></p><p>Simon Mair, Head of Security Privacy &amp; Information Security, <b>Brewin Dolphin<br/>https://www.linkedin.com/in/simonmair/?originalSubdomain=uk</b></p><p>Keil Hubert, Associate Principal, Security Human Risk Management, <b>OCC<br/>https://www.linkedin.com/in/khubert/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><b>teissTalk: Is your hybrid security awareness programme helping or harming your organisation?<br/></b><br/></p><ul><li>Phishing campaigns up, data breaches down: do security awareness programmes work?</li><li>Security awareness training that meets the needs of a hybrid workforce</li><li>Focusing hybrid awareness programmes to deliver positive security-related behaviours</li></ul><p>This episode is hosted by Thom Langford<br/><b>https://www.linkedin.com/in/thomlangford/?originalSubdomain=uk</b></p><p>Oscar O’Connor, Chief Storyteller, <b>Oscar O’Connor &amp; Co<br/>https://www.linkedin.com/in/oscaroconnor/?originalSubdomain=uk</b></p><p>Simon Mair, Head of Security Privacy &amp; Information Security, <b>Brewin Dolphin<br/>https://www.linkedin.com/in/simonmair/?originalSubdomain=uk</b></p><p>Keil Hubert, Associate Principal, Security Human Risk Management, <b>OCC<br/>https://www.linkedin.com/in/khubert/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11565197-teisstalk-is-your-hybrid-security-awareness-programme-helping-or-harming-your-organisation.mp3" length="33920728" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11565197</guid>
    <pubDate>Wed, 26 Oct 2022 08:00:00 +0100</pubDate>
    <itunes:duration>2821</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Can security awareness keep up with the attackers?</itunes:title>
    <title>teissTalk: Can security awareness keep up with the attackers?</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled  teissTalk: Can security awareness keep up with the attackers? Avoiding a static awareness programme and delivering continuous education and trainingChanging your security awareness training to meet the needs of a hybrid workforceSecurity awareness and data: how can awareness professionals increase the...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><br/><b>teissTalk: Can security awareness keep up with the attackers?</b></p><ul><li>Avoiding a static awareness programme and delivering continuous education and training</li><li>Changing your security awareness training to meet the needs of a hybrid workforce</li><li>Security awareness and data: how can awareness professionals increase their impact?</li></ul><p>This episode is hosted by Geoff White<br/><b>https://www.linkedin.com/in/geoffwhite247/</b></p><p>Craig McEwen, Chief Information Security Officer, <b>Anglo American<br/>https://www.linkedin.com/in/craigjmcewen/?originalSubdomain=uk</b></p><p>Steven Furnell, Professor of Cyber Security, <b>University of Nottingham<br/>https://www.linkedin.com/in/stevenfurnell/?originalSubdomain=uk</b></p><p>Gema Perez Cortes, Information Security Awareness Lead, <b>Canon EMEA<br/>https://www.linkedin.com/in/gemaperezcortes/?locale=en_US</b></p><p>Oz Alashe,CEO, <b>CybSafe<br/>https://www.linkedin.com/in/oz-alashe-mbe-a8870785/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/><br/><b>teissTalk: Can security awareness keep up with the attackers?</b></p><ul><li>Avoiding a static awareness programme and delivering continuous education and training</li><li>Changing your security awareness training to meet the needs of a hybrid workforce</li><li>Security awareness and data: how can awareness professionals increase their impact?</li></ul><p>This episode is hosted by Geoff White<br/><b>https://www.linkedin.com/in/geoffwhite247/</b></p><p>Craig McEwen, Chief Information Security Officer, <b>Anglo American<br/>https://www.linkedin.com/in/craigjmcewen/?originalSubdomain=uk</b></p><p>Steven Furnell, Professor of Cyber Security, <b>University of Nottingham<br/>https://www.linkedin.com/in/stevenfurnell/?originalSubdomain=uk</b></p><p>Gema Perez Cortes, Information Security Awareness Lead, <b>Canon EMEA<br/>https://www.linkedin.com/in/gemaperezcortes/?locale=en_US</b></p><p>Oz Alashe,CEO, <b>CybSafe<br/>https://www.linkedin.com/in/oz-alashe-mbe-a8870785/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11471035-teisstalk-can-security-awareness-keep-up-with-the-attackers.mp3" length="32822897" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11471035</guid>
    <pubDate>Mon, 10 Oct 2022 15:00:00 +0100</pubDate>
    <itunes:duration>2730</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Avoiding infosec blind spots and embracing diversity of thought</itunes:title>
    <title>teissTalk: Avoiding infosec blind spots and embracing diversity of thought</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled   Avoiding infosec blind spots and embracing diversity of thought How can infosec leaders promote diversity of thought in their organisations?Attracting top talent through diversity and inclusionWhat does successful diversity in infosec look like?This episode is hosted by Jenny Radcliffe https://www.li...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/> <br/><b>Avoiding infosec blind spots and embracing diversity of thought</b></p><ul><li>How can infosec leaders promote diversity of thought in their organisations?</li><li>Attracting top talent through diversity and inclusion</li><li>What does successful diversity in infosec look like?</li></ul><p>This episode is hosted by Jenny Radcliffe</p><p><b>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</b></p><p>Our Guests are;</p><p>Chris Dunning-Walton, CEO, <b>InfoSec People Ltd<br/>https://www.linkedin.com/in/chrisdw/?originalSubdomain=uk</b></p><p>Lessie Longstreet, Global Director of Outreach and Partner Engagement, <b>Cyber Readiness Institute<br/>https://www.linkedin.com/in/lessie-longstreet-2b7460bb/</b></p><p>Paul Baird, Chief Technology Security Officer UK, <b>Qualys<br/>https://www.linkedin.com/in/prbaird/?originalSubdomain=uk</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/> <br/><b>Avoiding infosec blind spots and embracing diversity of thought</b></p><ul><li>How can infosec leaders promote diversity of thought in their organisations?</li><li>Attracting top talent through diversity and inclusion</li><li>What does successful diversity in infosec look like?</li></ul><p>This episode is hosted by Jenny Radcliffe</p><p><b>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</b></p><p>Our Guests are;</p><p>Chris Dunning-Walton, CEO, <b>InfoSec People Ltd<br/>https://www.linkedin.com/in/chrisdw/?originalSubdomain=uk</b></p><p>Lessie Longstreet, Global Director of Outreach and Partner Engagement, <b>Cyber Readiness Institute<br/>https://www.linkedin.com/in/lessie-longstreet-2b7460bb/</b></p><p>Paul Baird, Chief Technology Security Officer UK, <b>Qualys<br/>https://www.linkedin.com/in/prbaird/?originalSubdomain=uk</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11443377-teisstalk-avoiding-infosec-blind-spots-and-embracing-diversity-of-thought.mp3" length="32780604" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11443377</guid>
    <pubDate>Tue, 04 Oct 2022 18:00:00 +0100</pubDate>
    <itunes:duration>2726</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Malicious or non-malicious – tackling the remote insider threat</itunes:title>
    <title>teissTalk: Malicious or non-malicious – tackling the remote insider threat</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled  Malicious or non-malicious – tackling the remote insider threat Investigation priorities: uncovering intent and exposureHow to identify malicious threat behaviourBusiness processes: investing in investigators and developing policiesThis episode is hosted by Geoff White https://www.linkedin.com/in/geof...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled <br/><b>Malicious or non-malicious – tackling the remote insider threat</b></p><ul><li>Investigation priorities: uncovering intent and exposure</li><li>How to identify malicious threat behaviour</li><li>Business processes: investing in investigators and developing policies</li></ul><p>This episode is hosted by Geoff White<br/><b>https://www.linkedin.com/in/geoffwhite247/</b></p><p>Hans-Peter Bauer, Senior VP EMEA , Cybersecurity, <b>BlackBerry<br/>https://www.linkedin.com/in/hanspeterbauer/?originalSubdomain=de</b></p><p>Neil King, European Business &amp; Information Security Specialist, <b>Canon Europe<br/>https://www.linkedin.com/in/neilking/?originalSubdomain=uk<br/><br/></b>Robin Lennon Bylenga, Human Factors &amp; Performance, <b>LeadScoutbee<br/>https://www.linkedin.com/in/robinlbylenga/?originalSubdomain=uk</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled <br/><b>Malicious or non-malicious – tackling the remote insider threat</b></p><ul><li>Investigation priorities: uncovering intent and exposure</li><li>How to identify malicious threat behaviour</li><li>Business processes: investing in investigators and developing policies</li></ul><p>This episode is hosted by Geoff White<br/><b>https://www.linkedin.com/in/geoffwhite247/</b></p><p>Hans-Peter Bauer, Senior VP EMEA , Cybersecurity, <b>BlackBerry<br/>https://www.linkedin.com/in/hanspeterbauer/?originalSubdomain=de</b></p><p>Neil King, European Business &amp; Information Security Specialist, <b>Canon Europe<br/>https://www.linkedin.com/in/neilking/?originalSubdomain=uk<br/><br/></b>Robin Lennon Bylenga, Human Factors &amp; Performance, <b>LeadScoutbee<br/>https://www.linkedin.com/in/robinlbylenga/?originalSubdomain=uk</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11443226-teisstalk-malicious-or-non-malicious-tackling-the-remote-insider-threat.mp3" length="32613525" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11443226</guid>
    <pubDate>Thu, 29 Sep 2022 18:00:00 +0100</pubDate>
    <itunes:duration>2712</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Industry focus - how educational institutions effectively navigate cyber threats</itunes:title>
    <title>teissTalk: Industry focus - how educational institutions effectively navigate cyber threats</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled  Industry focus - how educational institutions effectively navigate cyber threats What are the unique challenges facing infosec leaders in this industry, and what are the transferable learnings?Comparing current risk to target risk in the education industry – how have cyber risk appetites changed?Foste...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled <br/><b>Industry focus - how educational institutions effectively navigate cyber threats</b></p><ul><li>What are the unique challenges facing infosec leaders in this industry, and what are the transferable learnings?</li><li>Comparing current risk to target risk in the education industry – how have cyber risk appetites changed?</li><li>Fostering an effective security culture across an educational institution - overcoming industry-specific challenges</li></ul><p>This episode is hosted by Thom Langford<br/><b>https://www.linkedin.com/in/thomlangford/?originalSubdomain=uk</b></p><p>Sharad Sinha, Head of Cybersecurity Operations, <b>Oxford University Press<br/>https://www.linkedin.com/in/s-sinha/?originalSubdomain=uk</b></p><p>Aaron Baillo, Chief Information Security Officer, <b>University of Oklahoma<br/>https://www.linkedin.com/in/aaronbaillio/</b></p><p>Daniel Basile , Chief Information Security Officer, Rellis Campus, <b>Texas A&amp;M University System<br/>https://www.linkedin.com/in/danbasile/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled <br/><b>Industry focus - how educational institutions effectively navigate cyber threats</b></p><ul><li>What are the unique challenges facing infosec leaders in this industry, and what are the transferable learnings?</li><li>Comparing current risk to target risk in the education industry – how have cyber risk appetites changed?</li><li>Fostering an effective security culture across an educational institution - overcoming industry-specific challenges</li></ul><p>This episode is hosted by Thom Langford<br/><b>https://www.linkedin.com/in/thomlangford/?originalSubdomain=uk</b></p><p>Sharad Sinha, Head of Cybersecurity Operations, <b>Oxford University Press<br/>https://www.linkedin.com/in/s-sinha/?originalSubdomain=uk</b></p><p>Aaron Baillo, Chief Information Security Officer, <b>University of Oklahoma<br/>https://www.linkedin.com/in/aaronbaillio/</b></p><p>Daniel Basile , Chief Information Security Officer, Rellis Campus, <b>Texas A&amp;M University System<br/>https://www.linkedin.com/in/danbasile/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11443121-teisstalk-industry-focus-how-educational-institutions-effectively-navigate-cyber-threats.mp3" length="33665562" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11443121</guid>
    <pubDate>Tue, 27 Sep 2022 18:00:00 +0100</pubDate>
    <itunes:duration>2800</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Using threat modelling to reduce the attack surface</itunes:title>
    <title>teissTalk: Using threat modelling to reduce the attack surface</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled Using threat modelling to reduce the attack surface   Designing a threat modelling approach that matches your organisation’s objectives and risk appetiteTranslating threat modelling into a security strategy: using simulation to uncover vulnerabilitiesCommunicating threat models to your stakeholders in p...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a></p><p>The panel discussion is titled<br/><b>Using threat modelling to reduce the attack surface<br/></b><br/></p><ul><li>Designing a threat modelling approach that matches your organisation’s objectives and risk appetite</li><li>Translating threat modelling into a security strategy: using simulation to uncover vulnerabilities</li><li>Communicating threat models to your stakeholders in plain language</li></ul><p>This episode is hosted by  Thom Langford<br/><b>https://www.linkedin.com/in/thomlangford/?originalSubdomain=uk</b><br/><b> </b><br/>Dinis Cruz, Chief Information Security Officer, <b>Holland &amp; Barrett<br/>https://www.linkedin.com/in/diniscruz/?originalSubdomain=uk</b></p><p>David Bosomworth, Chief Information Security Officer, <b>DRFB Consulting<br/>https://www.linkedin.com/in/dbosomworth/?originalSubdomain=uk</b></p><p>Scott Reynolds, Principle Intelligence Analyst, <b>ZeroFox<br/>https://www.linkedin.com/in/j-scott-reynolds-4411065/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a></p><p>The panel discussion is titled<br/><b>Using threat modelling to reduce the attack surface<br/></b><br/></p><ul><li>Designing a threat modelling approach that matches your organisation’s objectives and risk appetite</li><li>Translating threat modelling into a security strategy: using simulation to uncover vulnerabilities</li><li>Communicating threat models to your stakeholders in plain language</li></ul><p>This episode is hosted by  Thom Langford<br/><b>https://www.linkedin.com/in/thomlangford/?originalSubdomain=uk</b><br/><b> </b><br/>Dinis Cruz, Chief Information Security Officer, <b>Holland &amp; Barrett<br/>https://www.linkedin.com/in/diniscruz/?originalSubdomain=uk</b></p><p>David Bosomworth, Chief Information Security Officer, <b>DRFB Consulting<br/>https://www.linkedin.com/in/dbosomworth/?originalSubdomain=uk</b></p><p>Scott Reynolds, Principle Intelligence Analyst, <b>ZeroFox<br/>https://www.linkedin.com/in/j-scott-reynolds-4411065/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11442992-teisstalk-using-threat-modelling-to-reduce-the-attack-surface.mp3" length="33265204" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11442992</guid>
    <pubDate>Thu, 22 Sep 2022 18:00:00 +0100</pubDate>
    <itunes:duration>2766</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Building an effective infosec strategy for critical third-party suppliers</itunes:title>
    <title>teissTalk: Building an effective infosec strategy for critical third-party suppliers</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled  Building an effective infosec strategy for critical third-party suppliers  This episode is hosted by Jenny Radcliffe https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  Our Guests are; Kush M Sharma, Director, Municipal Modernization &amp;...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled <br/><b>Building an effective infosec strategy for critical third-party suppliers<br/><br/></b>This episode is hosted by Jenny Radcliffe<br/><b>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/<br/><br/></b>Our Guests are;<br/>Kush M Sharma, Director, Municipal Modernization &amp; Partnerships, Municipal Information Systems Association,<b> Ontario (MISA Ontario)   </b> <b><br/>https://www.linkedin.com/in/kush-m-sharma-9bb875a/?originalSubdomain=ca</b></p><p>Garrett Smiley, CISO &amp; VP of Information Security, <b>Serco, Inc.<br/>https://www.linkedin.com/in/garrettsmiley/</b></p><p>Sebastiaan Pastoors, Senior Manager Business Information Security EMEA, <b>Johnson &amp; Johnson</b></p><p>Andrew Rose, Resident CISO (EMEA), <b>Proofpoint<br/>https://www.linkedin.com/in/andrewrose1/?originalSubdomain=uk</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled <br/><b>Building an effective infosec strategy for critical third-party suppliers<br/><br/></b>This episode is hosted by Jenny Radcliffe<br/><b>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/<br/><br/></b>Our Guests are;<br/>Kush M Sharma, Director, Municipal Modernization &amp; Partnerships, Municipal Information Systems Association,<b> Ontario (MISA Ontario)   </b> <b><br/>https://www.linkedin.com/in/kush-m-sharma-9bb875a/?originalSubdomain=ca</b></p><p>Garrett Smiley, CISO &amp; VP of Information Security, <b>Serco, Inc.<br/>https://www.linkedin.com/in/garrettsmiley/</b></p><p>Sebastiaan Pastoors, Senior Manager Business Information Security EMEA, <b>Johnson &amp; Johnson</b></p><p>Andrew Rose, Resident CISO (EMEA), <b>Proofpoint<br/>https://www.linkedin.com/in/andrewrose1/?originalSubdomain=uk</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11442885-teisstalk-building-an-effective-infosec-strategy-for-critical-third-party-suppliers.mp3" length="33662414" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11442885</guid>
    <pubDate>Tue, 20 Sep 2022 18:00:00 +0100</pubDate>
    <itunes:duration>2800</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: The evolution of data protection in the cloud</itunes:title>
    <title>teissTalk: The evolution of data protection in the cloud</title>
    <itunes:summary><![CDATA[ This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled    The evolution of data protection in the cloud Data protection in the cloud: past, present and futureManaging and protecting data assets in the cloudUnderstanding cloud risks to inform decisions about vendors and services  This episode is hosted by Geoff White https://www.linkedin.com/in/geoffwhite2...]]></itunes:summary>
    <description><![CDATA[<p><br/>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/> <br/> <b>The evolution of data protection in the cloud</b></p><ul><li>Data protection in the cloud: past, present and future</li><li>Managing and protecting data assets in the cloud</li><li>Understanding cloud risks to inform decisions about vendors and services</li></ul><p><br/></p><p>This episode is hosted by Geoff White<br/><b>https://www.linkedin.com/in/geoffwhite247/</b></p><p>John Opala, Vice President of IT Security, <b>McCormick &amp; Company<br/>https://www.linkedin.com/in/johnopalaphd/</b></p><p>Judith Ratcliffe, Privacy and Data Protection Senior Leader, <b>Self-Employed<br/>https://www.linkedin.com/in/judith-r-6659452b/</b></p><p>Nicolas Buache, Cloud Solution Architect, <b>Microsoft<br/>https://www.linkedin.com/in/nbuache/?originalSubdomain=ca</b></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><br/>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled<br/> <br/> <b>The evolution of data protection in the cloud</b></p><ul><li>Data protection in the cloud: past, present and future</li><li>Managing and protecting data assets in the cloud</li><li>Understanding cloud risks to inform decisions about vendors and services</li></ul><p><br/></p><p>This episode is hosted by Geoff White<br/><b>https://www.linkedin.com/in/geoffwhite247/</b></p><p>John Opala, Vice President of IT Security, <b>McCormick &amp; Company<br/>https://www.linkedin.com/in/johnopalaphd/</b></p><p>Judith Ratcliffe, Privacy and Data Protection Senior Leader, <b>Self-Employed<br/>https://www.linkedin.com/in/judith-r-6659452b/</b></p><p>Nicolas Buache, Cloud Solution Architect, <b>Microsoft<br/>https://www.linkedin.com/in/nbuache/?originalSubdomain=ca</b></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11442711-teisstalk-the-evolution-of-data-protection-in-the-cloud.mp3" length="34021280" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11442711</guid>
    <pubDate>Thu, 15 Sep 2022 00:00:00 +0100</pubDate>
    <itunes:duration>2829</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Persuading the board to sign off on your cyber-security strategy</itunes:title>
    <title>teissTalk: Persuading the board to sign off on your cyber-security strategy</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  The panel discussion is titled  Persuading the board to sign off on your cyber-security strategy Making the case that cyber-security is mission-critical and delivers a competitive advantageSpeaking the board’s language: balancing opportunity, technology and riskSelecting metrics that best convey the impacts and risks of your strateg...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled <br/><b>Persuading the board to sign off on your cyber-security strategy</b></p><ul><li>Making the case that cyber-security is mission-critical and delivers a competitive advantage</li><li>Speaking the board’s language: balancing opportunity, technology and risk</li><li>Selecting metrics that best convey the impacts and risks of your strategy</li></ul><p>This episode is hosted by Jenny Radcliffe<br/><b>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/<br/></b><br/></p><p>Our Guests are;<br/>Graydon McKee, Senior Director Cybersecurity Engineering, <b>Visa<br/>https://www.linkedin.com/in/graydon-mckee/</b></p><p>Tony Giannino, Vice President, Technology Risk, Asset Management Division, <b>Goldman Sachs<br/>https://www.linkedin.com/in/tonygiannino/</b></p><p>Zeeshan Kazmi, CISO/CIO, <b>Zygotek, Inc.<br/>https://www.linkedin.com/in/zeeshankazmi/</b></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a><br/><br/>The panel discussion is titled <br/><b>Persuading the board to sign off on your cyber-security strategy</b></p><ul><li>Making the case that cyber-security is mission-critical and delivers a competitive advantage</li><li>Speaking the board’s language: balancing opportunity, technology and risk</li><li>Selecting metrics that best convey the impacts and risks of your strategy</li></ul><p>This episode is hosted by Jenny Radcliffe<br/><b>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/<br/></b><br/></p><p>Our Guests are;<br/>Graydon McKee, Senior Director Cybersecurity Engineering, <b>Visa<br/>https://www.linkedin.com/in/graydon-mckee/</b></p><p>Tony Giannino, Vice President, Technology Risk, Asset Management Division, <b>Goldman Sachs<br/>https://www.linkedin.com/in/tonygiannino/</b></p><p>Zeeshan Kazmi, CISO/CIO, <b>Zygotek, Inc.<br/>https://www.linkedin.com/in/zeeshankazmi/</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11442559-teisstalk-persuading-the-board-to-sign-off-on-your-cyber-security-strategy.mp3" length="33196580" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11442559</guid>
    <pubDate>Tue, 13 Sep 2022 18:00:00 +0100</pubDate>
    <itunes:duration>2761</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Redesigning your cyber-security recruitment strategy</itunes:title>
    <title>teissTalk: Redesigning your cyber-security recruitment strategy</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk   In this episode, we focus on the following news story; Hiring entry-level and junior candidates can alleviate the cybersecurity skills shortage https://www.techrepublic.com/article/hiring-entry-level-alleviate-cybersecurity-shortage/   The panel discussion is titled  Redesigning your cyber-security recruitment strate...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a></p><p> </p><p>In this episode, we focus on the following news story;</p><p><b>Hiring entry-level and junior candidates can alleviate the cybersecurity skills shortage</b></p><p>https://www.techrepublic.com/article/hiring-entry-level-alleviate-cybersecurity-shortage/</p><p> </p><p>The panel discussion is titled </p><p><b>Redesigning your cyber-security recruitment strategy</b></p><p>·       Bridging your cyber-skills shortage with apprenticeship and internship programmes</p><p>·       Overcoming certification gatekeeping by recruiting for potential and transferable skills</p><p>·       Developing a diversity and inclusion strategy to expand your pool and attract top talent</p><p> </p><p>This episode is hosted by Jenny Radcliffe</p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</p><p> </p><p>Our Guests are;</p><p>Mike Johnson, Cyber Threat Intelligence and Incident Response Manager, WithYouWithMe</p><p>https://www.linkedin.com/in/michael--johnson/</p><p> </p><p>Andy Giles, Head of Security &amp; Resilience COE/Chief Product Owner (Cyber), Nationwide Building Society</p><p>https://www.linkedin.com/in/andy-giles-41194247/</p><p> </p><p>Samer Adi, Chief Information Security Officer, Green Shield Canada (GSC)</p><p>https://www.linkedin.com/in/sameradi/</p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a></p><p> </p><p>In this episode, we focus on the following news story;</p><p><b>Hiring entry-level and junior candidates can alleviate the cybersecurity skills shortage</b></p><p>https://www.techrepublic.com/article/hiring-entry-level-alleviate-cybersecurity-shortage/</p><p> </p><p>The panel discussion is titled </p><p><b>Redesigning your cyber-security recruitment strategy</b></p><p>·       Bridging your cyber-skills shortage with apprenticeship and internship programmes</p><p>·       Overcoming certification gatekeeping by recruiting for potential and transferable skills</p><p>·       Developing a diversity and inclusion strategy to expand your pool and attract top talent</p><p> </p><p>This episode is hosted by Jenny Radcliffe</p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</p><p> </p><p>Our Guests are;</p><p>Mike Johnson, Cyber Threat Intelligence and Incident Response Manager, WithYouWithMe</p><p>https://www.linkedin.com/in/michael--johnson/</p><p> </p><p>Andy Giles, Head of Security &amp; Resilience COE/Chief Product Owner (Cyber), Nationwide Building Society</p><p>https://www.linkedin.com/in/andy-giles-41194247/</p><p> </p><p>Samer Adi, Chief Information Security Officer, Green Shield Canada (GSC)</p><p>https://www.linkedin.com/in/sameradi/</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11126126-teisstalk-redesigning-your-cyber-security-recruitment-strategy.mp3" length="32886198" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-11126126</guid>
    <pubDate>Fri, 12 Aug 2022 09:00:00 +0100</pubDate>
    <itunes:duration>2735</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Reducing your attack surface - Zero Trust and microsegmentation</itunes:title>
    <title>teissTalk: Reducing your attack surface - Zero Trust and microsegmentation</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk   On this episode, we focus on the following news story; #CCSE22: Why Are Organizations Getting Zero Trust "Wrong"? https://www.infosecurity-magazine.com/news/ccse22-zero-trust-wrong/   The panel discussion is titled  Reducing your attack surface - Zero Trust and microsegmentation ·       Communicat...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p><b>#CCSE22: Why Are Organizations Getting Zero Trust &quot;Wrong&quot;?</b></p><p>https://www.infosecurity-magazine.com/news/ccse22-zero-trust-wrong/</p><p> </p><p>The panel discussion is titled </p><p><b>Reducing your attack surface - Zero Trust and microsegmentation</b></p><p>·       Communicating clearly to get IT on-side for your microsegmentation strategy</p><p>·       Modelling application behaviour to reduce connectivity and availability issues</p><p>·       Identifying performance-sensitive applications unsuitable for microsegmentation</p><p> </p><p>This episode is hosted by Geoff White</p><p>https://www.linkedin.com/in/geoffwhitetech/ </p><p> </p><p>Our Guests are;</p><p>Richard Staynings, Teaching Professor, University of Denver</p><p>https://www.linkedin.com/in/richardstaynings/</p><p> </p><p>Andres Andreu, SVP, CISO, 2U</p><p>https://www.linkedin.com/in/andresandreu/</p><p> </p><p>Larry Cameron, Chief Information Security Officer, Anti-Human Trafficking Intelligence Initiative</p><p>https://www.linkedin.com/in/larrycameron80/</p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p><b>#CCSE22: Why Are Organizations Getting Zero Trust &quot;Wrong&quot;?</b></p><p>https://www.infosecurity-magazine.com/news/ccse22-zero-trust-wrong/</p><p> </p><p>The panel discussion is titled </p><p><b>Reducing your attack surface - Zero Trust and microsegmentation</b></p><p>·       Communicating clearly to get IT on-side for your microsegmentation strategy</p><p>·       Modelling application behaviour to reduce connectivity and availability issues</p><p>·       Identifying performance-sensitive applications unsuitable for microsegmentation</p><p> </p><p>This episode is hosted by Geoff White</p><p>https://www.linkedin.com/in/geoffwhitetech/ </p><p> </p><p>Our Guests are;</p><p>Richard Staynings, Teaching Professor, University of Denver</p><p>https://www.linkedin.com/in/richardstaynings/</p><p> </p><p>Andres Andreu, SVP, CISO, 2U</p><p>https://www.linkedin.com/in/andresandreu/</p><p> </p><p>Larry Cameron, Chief Information Security Officer, Anti-Human Trafficking Intelligence Initiative</p><p>https://www.linkedin.com/in/larrycameron80/</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11114900-teisstalk-reducing-your-attack-surface-zero-trust-and-microsegmentation.mp3" length="33907840" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11114900</guid>
    <pubDate>Wed, 10 Aug 2022 15:00:00 +0100</pubDate>
    <itunes:duration>2820</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Managing the human element in your incident response plan</itunes:title>
    <title>teissTalk: Managing the human element in your incident response plan</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk   On this episode, we focus on the following news story; SANS Institute: Human error remains the top security issue https://www.techtarget.com/searchsecurity/news/252522226/SANS-Institute-Human-error-remains-the-top-security-issue   The panel discussion is titled  Managing the human element in your incident response pl...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p><b>SANS Institute: Human error remains the top security issue</b></p><p>https://www.techtarget.com/searchsecurity/news/252522226/SANS-Institute-Human-error-remains-the-top-security-issue</p><p> </p><p>The panel discussion is titled </p><p><b>Managing the human element in your incident response plan</b></p><p>·       Identifying potential misunderstandings during incident responses and improving playbooks for the future</p><p>·       Using emotional intelligence to manage stress and care for your team during and after a serious incident</p><p>·       Effectively allocating resources to mitigate human error</p><p> </p><p>This episode is hosted by Jenny Radcliffe</p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</p><p> </p><p>Our Guests are;</p><p>Daniela Almeida Lourenco, Chief Information Security Officer, Tinka</p><p>https://www.linkedin.com/in/daniela-almeida-louren%C3%A7o-43825256/<br/><br/>----</p><p>Henrik Løth Thiesen, Global Head of Information Security &amp; Risk Management, Vestas</p><p>https://www.linkedin.com/in/henrik-l%C3%B8th-thiesen-386a311/</p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p><b>SANS Institute: Human error remains the top security issue</b></p><p>https://www.techtarget.com/searchsecurity/news/252522226/SANS-Institute-Human-error-remains-the-top-security-issue</p><p> </p><p>The panel discussion is titled </p><p><b>Managing the human element in your incident response plan</b></p><p>·       Identifying potential misunderstandings during incident responses and improving playbooks for the future</p><p>·       Using emotional intelligence to manage stress and care for your team during and after a serious incident</p><p>·       Effectively allocating resources to mitigate human error</p><p> </p><p>This episode is hosted by Jenny Radcliffe</p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</p><p> </p><p>Our Guests are;</p><p>Daniela Almeida Lourenco, Chief Information Security Officer, Tinka</p><p>https://www.linkedin.com/in/daniela-almeida-louren%C3%A7o-43825256/<br/><br/>----</p><p>Henrik Løth Thiesen, Global Head of Information Security &amp; Risk Management, Vestas</p><p>https://www.linkedin.com/in/henrik-l%C3%B8th-thiesen-386a311/</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11082202-teisstalk-managing-the-human-element-in-your-incident-response-plan.mp3" length="33454528" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-11082202</guid>
    <pubDate>Fri, 05 Aug 2022 05:00:00 +0100</pubDate>
    <itunes:duration>2782</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Infosec leaders&#39; legal briefing - international data transfers</itunes:title>
    <title>teissTalk: Infosec leaders&#39; legal briefing - international data transfers</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk   On this episode, we focus on the following news story; Data: a new direction - government response to consultation https://www.gov.uk/government/consultations/data-a-new-direction/outcome/data-a-new-direction-government-response-to-consultation   The panel discussion is titled  Infosec leaders' legal briefing - inter...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p><b>Data: a new direction - government response to consultation</b></p><p>https://www.gov.uk/government/consultations/data-a-new-direction/outcome/data-a-new-direction-government-response-to-consultation</p><p> </p><p>The panel discussion is titled </p><p><b>Infosec leaders&apos; legal briefing - international data transfers</b></p><p>·       Reopened transatlantic data flows and GDPR: where might the agreement be invalidated?</p><p>·       Are data-sharing agreements offering adequate protection?</p><p>·       Transfer impact assessments: identifying and mitigating data protection risk</p><p> </p><p>This episode is hosted by Geoff White</p><p>https://www.linkedin.com/in/geoffwhitetech/ </p><p> </p><p>Our Guests are;</p><p>Rocio de la Cruz, Partner, BPE Solicitors LLP</p><p>https://www.linkedin.com/in/rocio-de-la-cruz-a4525480/</p><p> </p><p>Simon Howarth, Data Protection Officer, On The Beach</p><p>https://www.linkedin.com/in/simonhowarth/</p><p> </p><p>Joanna Moczadlo, Legal Counsel, AG Integrate</p><p>https://www.linkedin.com/in/joanna-m-a6a02496/</p><p> </p><p>Elisavet Dravalou, Lawyer, Synch</p><p>https://www.linkedin.com/in/elisavetdravalou/</p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p><b>Data: a new direction - government response to consultation</b></p><p>https://www.gov.uk/government/consultations/data-a-new-direction/outcome/data-a-new-direction-government-response-to-consultation</p><p> </p><p>The panel discussion is titled </p><p><b>Infosec leaders&apos; legal briefing - international data transfers</b></p><p>·       Reopened transatlantic data flows and GDPR: where might the agreement be invalidated?</p><p>·       Are data-sharing agreements offering adequate protection?</p><p>·       Transfer impact assessments: identifying and mitigating data protection risk</p><p> </p><p>This episode is hosted by Geoff White</p><p>https://www.linkedin.com/in/geoffwhitetech/ </p><p> </p><p>Our Guests are;</p><p>Rocio de la Cruz, Partner, BPE Solicitors LLP</p><p>https://www.linkedin.com/in/rocio-de-la-cruz-a4525480/</p><p> </p><p>Simon Howarth, Data Protection Officer, On The Beach</p><p>https://www.linkedin.com/in/simonhowarth/</p><p> </p><p>Joanna Moczadlo, Legal Counsel, AG Integrate</p><p>https://www.linkedin.com/in/joanna-m-a6a02496/</p><p> </p><p>Elisavet Dravalou, Lawyer, Synch</p><p>https://www.linkedin.com/in/elisavetdravalou/</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11074067-teisstalk-infosec-leaders-legal-briefing-international-data-transfers.mp3" length="33237014" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11074067</guid>
    <pubDate>Wed, 03 Aug 2022 09:00:00 +0100</pubDate>
    <itunes:duration>2764</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Securely onboarding new suppliers</itunes:title>
    <title>teissTalk: Securely onboarding new suppliers</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  On this episode, we focus on the following news story;  #InfosecurityEurope2022: Tackling Widespread Data Breaches from Third Parties  https://www.infosecurity-magazine.com/news/data-breaches-third-parties/  The panel discussion is titled   Securely onboarding new suppliers  How vendor diversity reduces...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p><b>#InfosecurityEurope2022: Tackling Widespread Data Breaches from Third Parties</b> </p><p><a href='https://www.infosecurity-magazine.com/news/data-breaches-third-parties/ '>https://www.infosecurity-magazine.com/news/data-breaches-third-parties/ </a></p><p>The panel discussion is titled  </p><p><b>Securely onboarding new suppliers</b> </p><ul><li>How vendor diversity reduces cyber-risk: helping your organisation  make good vendor decisions </li><li>Ensuring new suppliers&apos; software is safe from vulnerabilities or falls below your risk appetite threshold </li><li>Alternative approaches to information sharing: spending fewer resources on assessing  the risks with  new suppliers </li></ul><p>This episode is hosted by Thom Langford  </p><p><a href='https://www.linkedin.com/in/thomlangford/  '>https://www.linkedin.com/in/thomlangford/  </a></p><p>Our Guests are; </p><p>Michael Manrod, Chief Information Security Officer, Grand Canyon Education, Inc. </p><p><a href='https://www.linkedin.com/in/manrod/ '>https://www.linkedin.com/in/manrod/ </a></p><p>Alan Jenkins, Principal Consultant, Cyber Security Navigator Ltd </p><p><a href='https://www.linkedin.com/in/alanjenkins/  '>https://www.linkedin.com/in/alanjenkins/  </a></p><p>Stuart Leach, Technical Director - Cyber Consulting, Grant Thornton UK LLP </p><p><a href='https://www.linkedin.com/in/stuart-leach-a3491612/ '>https://www.linkedin.com/in/stuart-leach-a3491612/ </a></p><p> </p><p> </p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p><b>#InfosecurityEurope2022: Tackling Widespread Data Breaches from Third Parties</b> </p><p><a href='https://www.infosecurity-magazine.com/news/data-breaches-third-parties/ '>https://www.infosecurity-magazine.com/news/data-breaches-third-parties/ </a></p><p>The panel discussion is titled  </p><p><b>Securely onboarding new suppliers</b> </p><ul><li>How vendor diversity reduces cyber-risk: helping your organisation  make good vendor decisions </li><li>Ensuring new suppliers&apos; software is safe from vulnerabilities or falls below your risk appetite threshold </li><li>Alternative approaches to information sharing: spending fewer resources on assessing  the risks with  new suppliers </li></ul><p>This episode is hosted by Thom Langford  </p><p><a href='https://www.linkedin.com/in/thomlangford/  '>https://www.linkedin.com/in/thomlangford/  </a></p><p>Our Guests are; </p><p>Michael Manrod, Chief Information Security Officer, Grand Canyon Education, Inc. </p><p><a href='https://www.linkedin.com/in/manrod/ '>https://www.linkedin.com/in/manrod/ </a></p><p>Alan Jenkins, Principal Consultant, Cyber Security Navigator Ltd </p><p><a href='https://www.linkedin.com/in/alanjenkins/  '>https://www.linkedin.com/in/alanjenkins/  </a></p><p>Stuart Leach, Technical Director - Cyber Consulting, Grant Thornton UK LLP </p><p><a href='https://www.linkedin.com/in/stuart-leach-a3491612/ '>https://www.linkedin.com/in/stuart-leach-a3491612/ </a></p><p> </p><p> </p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11047017-teisstalk-securely-onboarding-new-suppliers.mp3" length="33859483" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-11047017</guid>
    <pubDate>Mon, 01 Aug 2022 05:00:00 +0100</pubDate>
    <itunes:duration>2816</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Reducing the cyber risk to your operational technology</itunes:title>
    <title>teissTalk: Reducing the cyber risk to your operational technology</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  On this episode, we focus on the following news story;  Many OT Security Incidents Result in Outages Posing Physical Safety Risk: Fortinet  https://www.securityweek.com/many-ot-security-incidents-result-outages-posing-physical-safety-risk-fortinet  The panel discussion is titled   Reducing the cyber risk to ...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p><b>Many OT Security Incidents Result in Outages Posing Physical Safety Risk: Fortinet</b> </p><p><a href='https://www.securityweek.com/many-ot-security-incidents-result-outages-posing-physical-safety-risk-fortinet '>https://www.securityweek.com/many-ot-security-incidents-result-outages-posing-physical-safety-risk-fortinet </a></p><p>The panel discussion is titled  </p><p><b>Reducing the cyber risk to your operational technology</b> </p><ul><li>Translating IT security awareness training and priorities to OT colleagues </li><li>Mitigating the risk of human threat or errors to your OT security </li><li>Securing legacy equipment and reducing the risk of compromise: should legacy OT be kept separate from IT? </li></ul><p>This episode is hosted by Geoff White  </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/  '>https://www.linkedin.com/in/geoffwhitetech/  </a></p><p>Our Guests are; </p><p>Felipe Garcia Vivanco, Chief Information Security Officer, Scotiabank </p><p><a href='https://www.linkedin.com/in/felipegarciavivanco/ '>https://www.linkedin.com/in/felipegarciavivanco/ </a></p><p>Adnan Ahmed, Head of ICT and Chief Information Security Officer, Ornua </p><p><a href='https://www.linkedin.com/in/syedadnanahmed/ '>https://www.linkedin.com/in/syedadnanahmed/ </a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p><b>Many OT Security Incidents Result in Outages Posing Physical Safety Risk: Fortinet</b> </p><p><a href='https://www.securityweek.com/many-ot-security-incidents-result-outages-posing-physical-safety-risk-fortinet '>https://www.securityweek.com/many-ot-security-incidents-result-outages-posing-physical-safety-risk-fortinet </a></p><p>The panel discussion is titled  </p><p><b>Reducing the cyber risk to your operational technology</b> </p><ul><li>Translating IT security awareness training and priorities to OT colleagues </li><li>Mitigating the risk of human threat or errors to your OT security </li><li>Securing legacy equipment and reducing the risk of compromise: should legacy OT be kept separate from IT? </li></ul><p>This episode is hosted by Geoff White  </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/  '>https://www.linkedin.com/in/geoffwhitetech/  </a></p><p>Our Guests are; </p><p>Felipe Garcia Vivanco, Chief Information Security Officer, Scotiabank </p><p><a href='https://www.linkedin.com/in/felipegarciavivanco/ '>https://www.linkedin.com/in/felipegarciavivanco/ </a></p><p>Adnan Ahmed, Head of ICT and Chief Information Security Officer, Ornua </p><p><a href='https://www.linkedin.com/in/syedadnanahmed/ '>https://www.linkedin.com/in/syedadnanahmed/ </a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11046996-teisstalk-reducing-the-cyber-risk-to-your-operational-technology.mp3" length="31987799" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-11046996</guid>
    <pubDate>Fri, 29 Jul 2022 09:00:00 +0100</pubDate>
    <itunes:duration>2660</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: How to hire, and keep, the cream of cyber-security talent</itunes:title>
    <title>teissTalk: How to hire, and keep, the cream of cyber-security talent</title>
    <itunes:summary><![CDATA[  This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  On this episode, we focus on the following news story;  Cyber Skills Gap Linked to Breaches  https://www.infosecurity-magazine.com/news/cyber-skills-gap-linked-breaches/  The panel discussion is titled   How to hire, and keep, the cream of cyber-security talent  Beyond qualifications: prioritising val...]]></itunes:summary>
    <description><![CDATA[<p><br/></p><p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p><b>Cyber Skills Gap Linked to Breaches</b> </p><p><a href='https://www.infosecurity-magazine.com/news/cyber-skills-gap-linked-breaches/ '>https://www.infosecurity-magazine.com/news/cyber-skills-gap-linked-breaches/ </a></p><p>The panel discussion is titled  </p><p><b>How to hire, and keep, the cream of cyber-security talent</b> </p><ul><li>Beyond qualifications: prioritising values, soft skills, culture and organisational fit </li><li>Effectively communicating with HR to attract the best talent </li><li>Retaining your talent: ongoing managerial support, training, mentoring and professional development </li></ul><p>This episode is hosted by Jenny Radcliffe  </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  '>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </a></p><p>Our Guests are; </p><p>Tony Clarke, VP, IT Operations &amp; InfoSec, Marken </p><p><a href='https://www.linkedin.com/in/tonyclarke/ '>https://www.linkedin.com/in/tonyclarke/ </a></p><p>Lee Morton, Information Security Officer, On The Beach </p><p><a href='https://www.linkedin.com/in/leemortonuk/ '>https://www.linkedin.com/in/leemortonuk/ </a></p><p>Andrew Hollister, Deputy CISO and VP Labs, LogRhythm </p><p><a href='https://www.linkedin.com/in/andrewhollister/ '>https://www.linkedin.com/in/andrewhollister/ </a></p>]]></description>
    <content:encoded><![CDATA[<p><br/></p><p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p><b>Cyber Skills Gap Linked to Breaches</b> </p><p><a href='https://www.infosecurity-magazine.com/news/cyber-skills-gap-linked-breaches/ '>https://www.infosecurity-magazine.com/news/cyber-skills-gap-linked-breaches/ </a></p><p>The panel discussion is titled  </p><p><b>How to hire, and keep, the cream of cyber-security talent</b> </p><ul><li>Beyond qualifications: prioritising values, soft skills, culture and organisational fit </li><li>Effectively communicating with HR to attract the best talent </li><li>Retaining your talent: ongoing managerial support, training, mentoring and professional development </li></ul><p>This episode is hosted by Jenny Radcliffe  </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  '>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </a></p><p>Our Guests are; </p><p>Tony Clarke, VP, IT Operations &amp; InfoSec, Marken </p><p><a href='https://www.linkedin.com/in/tonyclarke/ '>https://www.linkedin.com/in/tonyclarke/ </a></p><p>Lee Morton, Information Security Officer, On The Beach </p><p><a href='https://www.linkedin.com/in/leemortonuk/ '>https://www.linkedin.com/in/leemortonuk/ </a></p><p>Andrew Hollister, Deputy CISO and VP Labs, LogRhythm </p><p><a href='https://www.linkedin.com/in/andrewhollister/ '>https://www.linkedin.com/in/andrewhollister/ </a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/11010303-teisstalk-how-to-hire-and-keep-the-cream-of-cyber-security-talent.mp3" length="33403433" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-11010303</guid>
    <pubDate>Fri, 22 Jul 2022 14:00:00 +0100</pubDate>
    <itunes:duration>2778</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Securing your applications with Zero Trust architecture</itunes:title>
    <title>teissTalk: Securing your applications with Zero Trust architecture</title>
    <itunes:summary><![CDATA[  This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  On this episode, we focus on the following news story;  82% of Public Sector Applications Contain Security Flaws  https://www.infosecurity-magazine.com/news/public-sector-apps-security-flaws/  The panel discussion is titled   Securing your applications with Zero Trust architecture  How to best apply a...]]></itunes:summary>
    <description><![CDATA[<p><br/></p><p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p><b>82% of Public Sector Applications Contain Security Flaws</b> </p><p><a href='https://www.infosecurity-magazine.com/news/public-sector-apps-security-flaws/ '>https://www.infosecurity-magazine.com/news/public-sector-apps-security-flaws/ </a></p><p>The panel discussion is titled  </p><p><b>Securing your applications with Zero Trust architecture</b> </p><ul><li>How to best apply access controls to mitigate risks of application security breaches </li><li>Best practice in use of testing tools: evaluating results to avoid false errors </li><li>Building an effective DevSecOps culture alongside a Zero Trust framework </li></ul><p>This episode is hosted by Geoff White  </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/  '>https://www.linkedin.com/in/geoffwhitetech/  </a></p><p>Our Guests are; </p><p>Jonathan Craven, Privacy and Compliance Lead, UK, iRhythm Technologies UK </p><p><a href='https://www.linkedin.com/in/jonathanbcraven/ '>https://www.linkedin.com/in/jonathanbcraven/ </a></p><p>Simon Gooch, Director of Cyber Security &amp; Global Digital Identity Lead for the CIO, Accenture </p><p><a href='https://www.linkedin.com/in/simon-gooch-445a5a205/ '>https://www.linkedin.com/in/simon-gooch-445a5a205/ </a></p><p>Lester Godsey, Chief Information Security Officer, Office of Enterprise Technology, Maricopa County </p><p><a href='https://www.linkedin.com/in/lestergodsey/ '>https://www.linkedin.com/in/lestergodsey/ </a></p>]]></description>
    <content:encoded><![CDATA[<p><br/></p><p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p><b>82% of Public Sector Applications Contain Security Flaws</b> </p><p><a href='https://www.infosecurity-magazine.com/news/public-sector-apps-security-flaws/ '>https://www.infosecurity-magazine.com/news/public-sector-apps-security-flaws/ </a></p><p>The panel discussion is titled  </p><p><b>Securing your applications with Zero Trust architecture</b> </p><ul><li>How to best apply access controls to mitigate risks of application security breaches </li><li>Best practice in use of testing tools: evaluating results to avoid false errors </li><li>Building an effective DevSecOps culture alongside a Zero Trust framework </li></ul><p>This episode is hosted by Geoff White  </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/  '>https://www.linkedin.com/in/geoffwhitetech/  </a></p><p>Our Guests are; </p><p>Jonathan Craven, Privacy and Compliance Lead, UK, iRhythm Technologies UK </p><p><a href='https://www.linkedin.com/in/jonathanbcraven/ '>https://www.linkedin.com/in/jonathanbcraven/ </a></p><p>Simon Gooch, Director of Cyber Security &amp; Global Digital Identity Lead for the CIO, Accenture </p><p><a href='https://www.linkedin.com/in/simon-gooch-445a5a205/ '>https://www.linkedin.com/in/simon-gooch-445a5a205/ </a></p><p>Lester Godsey, Chief Information Security Officer, Office of Enterprise Technology, Maricopa County </p><p><a href='https://www.linkedin.com/in/lestergodsey/ '>https://www.linkedin.com/in/lestergodsey/ </a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10992565-teisstalk-securing-your-applications-with-zero-trust-architecture.mp3" length="34329104" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-10992565</guid>
    <pubDate>Wed, 20 Jul 2022 15:00:00 +0100</pubDate>
    <itunes:duration>2855</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Maximising the effectiveness of your incident response plan</itunes:title>
    <title>teissTalk: Maximising the effectiveness of your incident response plan</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  On this episode, we focus on the following news story;  #RSAC: Putting Humans at the Center of Incident Response  https://www.infosecurity-magazine.com/news/humans-center-incident-response/  The panel discussion is titled   Maximising the effectiveness of your incident response plan  Why the best laid p...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p><b>#RSAC: Putting Humans at the Center of Incident Response</b> </p><p><a href='https://www.infosecurity-magazine.com/news/humans-center-incident-response/ '>https://www.infosecurity-magazine.com/news/humans-center-incident-response/ </a></p><p>The panel discussion is titled  </p><p><b>Maximising the effectiveness of your incident response plan</b> </p><ul><li>Why the best laid plans fail: where gaps in incident response plans expose your organisation to threats </li><li>Defined communication paths: which key stakeholders must be included as part of the communication process? </li><li>Running effective incident response drills and simulations that mimic real-life incidents </li></ul><p>This episode is hosted by Jenny Radcliffe  </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  '>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </a></p><p>Our Guests are; </p><p>Roland Cloutier, Global CSO, TikTok </p><p><a href='https://www.linkedin.com/in/rolandcloutier/ '>https://www.linkedin.com/in/rolandcloutier/ </a></p><p>Lee M. Howard, Associate Director of Cyber Security, Grant Thornton UK LLP </p><p><a href='https://www.linkedin.com/in/lee87howard/ '>https://www.linkedin.com/in/lee87howard/ </a></p><p>Joe Hancock, Partner (non-lawyer) &amp; Head of MDR Cyber, Mishcon de Reya LLP </p><p><a href='https://www.linkedin.com/in/joehancock/ '>https://www.linkedin.com/in/joehancock/ </a></p><p>Tim Erridge, Vice President, Services, EMEA, Palo Alto Networks </p><p><a href='https://www.linkedin.com/in/tim-erridge-453617 '>https://www.linkedin.com/in/tim-erridge-453617 </a></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p><b>#RSAC: Putting Humans at the Center of Incident Response</b> </p><p><a href='https://www.infosecurity-magazine.com/news/humans-center-incident-response/ '>https://www.infosecurity-magazine.com/news/humans-center-incident-response/ </a></p><p>The panel discussion is titled  </p><p><b>Maximising the effectiveness of your incident response plan</b> </p><ul><li>Why the best laid plans fail: where gaps in incident response plans expose your organisation to threats </li><li>Defined communication paths: which key stakeholders must be included as part of the communication process? </li><li>Running effective incident response drills and simulations that mimic real-life incidents </li></ul><p>This episode is hosted by Jenny Radcliffe  </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  '>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </a></p><p>Our Guests are; </p><p>Roland Cloutier, Global CSO, TikTok </p><p><a href='https://www.linkedin.com/in/rolandcloutier/ '>https://www.linkedin.com/in/rolandcloutier/ </a></p><p>Lee M. Howard, Associate Director of Cyber Security, Grant Thornton UK LLP </p><p><a href='https://www.linkedin.com/in/lee87howard/ '>https://www.linkedin.com/in/lee87howard/ </a></p><p>Joe Hancock, Partner (non-lawyer) &amp; Head of MDR Cyber, Mishcon de Reya LLP </p><p><a href='https://www.linkedin.com/in/joehancock/ '>https://www.linkedin.com/in/joehancock/ </a></p><p>Tim Erridge, Vice President, Services, EMEA, Palo Alto Networks </p><p><a href='https://www.linkedin.com/in/tim-erridge-453617 '>https://www.linkedin.com/in/tim-erridge-453617 </a></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10967128-teisstalk-maximising-the-effectiveness-of-your-incident-response-plan.mp3" length="35142879" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-10967128</guid>
    <pubDate>Fri, 15 Jul 2022 14:00:00 +0100</pubDate>
    <itunes:duration>2923</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Security assurance - identifying the gaps in your security controls</itunes:title>
    <title>teissTalk: Security assurance - identifying the gaps in your security controls</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  On this episode, we focus on the following news story;  Evil Corp Hacker Group Changes Ransomware Tactics to Evade US Sanctions  https://www.infosecurity-magazine.com/news/evil-corp-changes-ransomware/  The panel discussion is titled   Security assurance - identifying the gaps in your security controls ...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p><b>Evil Corp Hacker Group Changes Ransomware Tactics to Evade US Sanctions</b> </p><p><a href='https://www.infosecurity-magazine.com/news/evil-corp-changes-ransomware/ '>https://www.infosecurity-magazine.com/news/evil-corp-changes-ransomware/ </a></p><p>The panel discussion is titled  </p><p><b>Security assurance - identifying the gaps in your security controls</b> </p><ul><li>Threat trends: mapping your organisation&apos;s cyber-risk profile against new and emerging exploits </li><li>Threat modelling: do your controls mitigate the impact of new and emerging exploits ? </li><li>Turning reactive security into a proactive methodology </li></ul><p>This episode is hosted by Jenny Radcliffe  </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  '>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </a></p><p>Our Guests are; </p><p>Danny Dresner, Professor of Cyber Security, University of Manchester </p><p><a href='https://www.linkedin.com/in/danny-dresner-fciis-6382381 '>https://www.linkedin.com/in/danny-dresner-fciis-6382381 </a></p><p>Veselin Monev, Information Security Officer, Pilatus Aircraft Ltd </p><p><a href='https://www.linkedin.com/in/vmonev/ '>https://www.linkedin.com/in/vmonev/ </a></p><p>Fritz Y. Jean Louis, Chief Information Security Officer, The Globe and Mail Centre </p><p><a href='https://www.linkedin.com/in/fritzjeanlouis/ '>https://www.linkedin.com/in/fritzjeanlouis/ </a></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p><b>Evil Corp Hacker Group Changes Ransomware Tactics to Evade US Sanctions</b> </p><p><a href='https://www.infosecurity-magazine.com/news/evil-corp-changes-ransomware/ '>https://www.infosecurity-magazine.com/news/evil-corp-changes-ransomware/ </a></p><p>The panel discussion is titled  </p><p><b>Security assurance - identifying the gaps in your security controls</b> </p><ul><li>Threat trends: mapping your organisation&apos;s cyber-risk profile against new and emerging exploits </li><li>Threat modelling: do your controls mitigate the impact of new and emerging exploits ? </li><li>Turning reactive security into a proactive methodology </li></ul><p>This episode is hosted by Jenny Radcliffe  </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  '>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </a></p><p>Our Guests are; </p><p>Danny Dresner, Professor of Cyber Security, University of Manchester </p><p><a href='https://www.linkedin.com/in/danny-dresner-fciis-6382381 '>https://www.linkedin.com/in/danny-dresner-fciis-6382381 </a></p><p>Veselin Monev, Information Security Officer, Pilatus Aircraft Ltd </p><p><a href='https://www.linkedin.com/in/vmonev/ '>https://www.linkedin.com/in/vmonev/ </a></p><p>Fritz Y. Jean Louis, Chief Information Security Officer, The Globe and Mail Centre </p><p><a href='https://www.linkedin.com/in/fritzjeanlouis/ '>https://www.linkedin.com/in/fritzjeanlouis/ </a></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10953627-teisstalk-security-assurance-identifying-the-gaps-in-your-security-controls.mp3" length="32012903" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-10953627</guid>
    <pubDate>Wed, 13 Jul 2022 09:00:00 +0100</pubDate>
    <itunes:duration>2662</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Demonstrating effectiveness in managing cyber risk</itunes:title>
    <title>teissTalk: Demonstrating effectiveness in managing cyber risk</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  On this episode, we focus on the following news story;  Zero Trust Leaders Avert 5 Cyber Disasters Per Year on Average  https://www.techrepublic.com/article/zero-trust-leaders-avert-5-cyber-disasters-per-year-on-average/?utm_medium=email&amp;_hsmi=215487494&amp;_hsenc=p2ANqtz-_EKuM2-ugpjiFrxW_PefJYKzzGVVVUvw4VV7PydXXl...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p><b>Zero Trust Leaders Avert 5 Cyber Disasters Per Year on Average</b> </p><p><a href='https://www.techrepublic.com/article/zero-trust-leaders-avert-5-cyber-disasters-per-year-on-average/?utm_medium=email&amp;_hsmi=215487494&amp;_hsenc=p2ANqtz-_EKuM2-ugpjiFrxW_PefJYKzzGVVVUvw4VV7PydXXlrBp_97R3F5qJzhDJy5s6gW7c6tjQjDI0IvA179G5SSnA8js9ww&amp;utm_content=2 '>https://www.techrepublic.com/article/zero-trust-leaders-avert-5-cyber-disasters-per-year-on-average/?utm_medium=email&amp;_hsmi=215487494&amp;_hsenc=p2ANqtz-_EKuM2-ugpjiFrxW_PefJYKzzGVVVUvw4VV7PydXXlrBp_97R3F5qJzhDJy5s6gW7c6tjQjDI0IvA179G5SSnA8js9ww&amp;utm_content=2 </a></p><p>The panel discussion is titled  </p><p><b>Demonstrating effectiveness in managing cyber-risk</b> </p><ul><li>How can infosec leaders support their organisations in determining a clear risk appetite? </li><li>What is your infosec goal: risk reduction or risk management? </li><li>Which metrics best demonstrate where cyber-risk is being managed, and which show where it&apos;s not? </li></ul><p>This episode is hosted by Geoff White  </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/  '>https://www.linkedin.com/in/geoffwhitetech/  </a></p><p>Our Guests are; </p><p>Benjamin Corll, VP, Cybersecurity, Coats </p><p><a href='https://www.linkedin.com/in/benjamincorll/ '>https://www.linkedin.com/in/benjamincorll/ </a></p><p>Nick Harris, Director of InfoSec and Cyber Resilience, Oxford Nanopore Technologies </p><p><a href='https://www.linkedin.com/in/harrisprofile/ '>https://www.linkedin.com/in/harrisprofile/ </a></p><p>Ash Hunt, Group Head of Information Security, Sanne Group </p><p><a href='https://www.linkedin.com/in/ashjhunt/ '>https://www.linkedin.com/in/ashjhunt/ </a></p><p> </p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p><b>Zero Trust Leaders Avert 5 Cyber Disasters Per Year on Average</b> </p><p><a href='https://www.techrepublic.com/article/zero-trust-leaders-avert-5-cyber-disasters-per-year-on-average/?utm_medium=email&amp;_hsmi=215487494&amp;_hsenc=p2ANqtz-_EKuM2-ugpjiFrxW_PefJYKzzGVVVUvw4VV7PydXXlrBp_97R3F5qJzhDJy5s6gW7c6tjQjDI0IvA179G5SSnA8js9ww&amp;utm_content=2 '>https://www.techrepublic.com/article/zero-trust-leaders-avert-5-cyber-disasters-per-year-on-average/?utm_medium=email&amp;_hsmi=215487494&amp;_hsenc=p2ANqtz-_EKuM2-ugpjiFrxW_PefJYKzzGVVVUvw4VV7PydXXlrBp_97R3F5qJzhDJy5s6gW7c6tjQjDI0IvA179G5SSnA8js9ww&amp;utm_content=2 </a></p><p>The panel discussion is titled  </p><p><b>Demonstrating effectiveness in managing cyber-risk</b> </p><ul><li>How can infosec leaders support their organisations in determining a clear risk appetite? </li><li>What is your infosec goal: risk reduction or risk management? </li><li>Which metrics best demonstrate where cyber-risk is being managed, and which show where it&apos;s not? </li></ul><p>This episode is hosted by Geoff White  </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/  '>https://www.linkedin.com/in/geoffwhitetech/  </a></p><p>Our Guests are; </p><p>Benjamin Corll, VP, Cybersecurity, Coats </p><p><a href='https://www.linkedin.com/in/benjamincorll/ '>https://www.linkedin.com/in/benjamincorll/ </a></p><p>Nick Harris, Director of InfoSec and Cyber Resilience, Oxford Nanopore Technologies </p><p><a href='https://www.linkedin.com/in/harrisprofile/ '>https://www.linkedin.com/in/harrisprofile/ </a></p><p>Ash Hunt, Group Head of Information Security, Sanne Group </p><p><a href='https://www.linkedin.com/in/ashjhunt/ '>https://www.linkedin.com/in/ashjhunt/ </a></p><p> </p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10925906-teisstalk-demonstrating-effectiveness-in-managing-cyber-risk.mp3" length="35723742" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10925906</guid>
    <pubDate>Fri, 08 Jul 2022 11:00:00 +0100</pubDate>
    <itunes:duration>2971</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Measuring the effectiveness of your security awareness programme</itunes:title>
    <title>teissTalk: Measuring the effectiveness of your security awareness programme</title>
    <itunes:summary><![CDATA[  This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  On this episode, we focus on the following news story;  Mobile Devices As Attack Vector for Ransomware  https://securityboulevard.com/2022/05/mobile-devices-as-attack-vector-for-ransomware/  The panel discussion is titled   Measuring the effectiveness of your security awareness programme  The most eff...]]></itunes:summary>
    <description><![CDATA[<p><br/></p><p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p><b>Mobile Devices As Attack Vector for Ransomware</b> </p><p><a href='https://securityboulevard.com/2022/05/mobile-devices-as-attack-vector-for-ransomware/ '>https://securityboulevard.com/2022/05/mobile-devices-as-attack-vector-for-ransomware/ </a></p><p>The panel discussion is titled  </p><p><b>Measuring the effectiveness of your security awareness programme</b> </p><ul><li>The most effective methods for testing and evaluating security awareness </li><li>How can you be sure employees understand the methods that are implemented? </li><li>Overcoming the challenges of measuring your organisation’s security awareness </li></ul><p>This episode is hosted by Geoff White  </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/  '>https://www.linkedin.com/in/geoffwhitetech/  </a></p><p>Our Guests are; </p><p>Dora Ross, Global Information Security Culture Specialist, DAZN Group </p><p><a href='https://www.linkedin.com/in/dora-ross/ '>https://www.linkedin.com/in/dora-ross/ </a></p><p>Sarah Janes, Behaviour and culture specialist, Layer8 </p><p><a href='https://www.linkedin.com/in/sarahjaneslayer8ltd/    '>https://www.linkedin.com/in/sarahjaneslayer8ltd/ </a></p><p>Victoria van Roosmalen, CISO &amp; DPO, Coosto </p><p><a href='https://www.linkedin.com/in/victoriavanroosmalen/ '>https://www.linkedin.com/in/victoriavanroosmalen/ </a></p><p> </p>]]></description>
    <content:encoded><![CDATA[<p><br/></p><p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p><b>Mobile Devices As Attack Vector for Ransomware</b> </p><p><a href='https://securityboulevard.com/2022/05/mobile-devices-as-attack-vector-for-ransomware/ '>https://securityboulevard.com/2022/05/mobile-devices-as-attack-vector-for-ransomware/ </a></p><p>The panel discussion is titled  </p><p><b>Measuring the effectiveness of your security awareness programme</b> </p><ul><li>The most effective methods for testing and evaluating security awareness </li><li>How can you be sure employees understand the methods that are implemented? </li><li>Overcoming the challenges of measuring your organisation’s security awareness </li></ul><p>This episode is hosted by Geoff White  </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/  '>https://www.linkedin.com/in/geoffwhitetech/  </a></p><p>Our Guests are; </p><p>Dora Ross, Global Information Security Culture Specialist, DAZN Group </p><p><a href='https://www.linkedin.com/in/dora-ross/ '>https://www.linkedin.com/in/dora-ross/ </a></p><p>Sarah Janes, Behaviour and culture specialist, Layer8 </p><p><a href='https://www.linkedin.com/in/sarahjaneslayer8ltd/    '>https://www.linkedin.com/in/sarahjaneslayer8ltd/ </a></p><p>Victoria van Roosmalen, CISO &amp; DPO, Coosto </p><p><a href='https://www.linkedin.com/in/victoriavanroosmalen/ '>https://www.linkedin.com/in/victoriavanroosmalen/ </a></p><p> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10913583-teisstalk-measuring-the-effectiveness-of-your-security-awareness-programme.mp3" length="32821984" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10913583</guid>
    <pubDate>Wed, 06 Jul 2022 11:00:00 +0100</pubDate>
    <itunes:duration>2730</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Trusting security automation</itunes:title>
    <title>teissTalk: Trusting security automation</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  On this episode, we focus on the following news story;  Cybersecurity Without Automation And Intelligence In Today’s Digital World Is Like “Bringing A Knife To A Gunfight”  https://www.forbes.com/sites/forbestechcouncil/2021/11/10/cybersecurity-without-automation-and-intelligence-in-todays-digital-world-is-like-bringi...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p><b>Cybersecurity Without Automation And Intelligence In Today’s Digital World Is Like “Bringing A Knife To A Gunfight”</b> </p><p><a href='https://www.forbes.com/sites/forbestechcouncil/2021/11/10/cybersecurity-without-automation-and-intelligence-in-todays-digital-world-is-like-bringing-a-knife-to-a-gunfight/ '>https://www.forbes.com/sites/forbestechcouncil/2021/11/10/cybersecurity-without-automation-and-intelligence-in-todays-digital-world-is-like-bringing-a-knife-to-a-gunfight/ </a></p><p>The panel discussion is titled  </p><p><b>Trusting security automation</b> </p><ul><li>Laying the foundations for successful automated information security </li><li>Where are the main obstacles for achieving trust in automation, and how can these be overcome? </li><li>How can the automation of information security be achieved successfully? </li></ul><p>This episode is hosted by Jenny Radcliffe  </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  '>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </a> </p><p>Our Guests are; </p><p>David Cartwright, Head of IT Risk and Security, Standard Bank International Client Solutions </p><p><a href='https://www.linkedin.com/in/davidscartwright/'>https://www.linkedin.com/in/davidscartwright/</a> </p><p>Ansgar Koene, Global AI Ethics and Regulatory Leader, EY </p><p><a href='https://www.linkedin.com/in/akoene/ '>https://www.linkedin.com/in/akoene/ </a></p><p>Ian Hill, Director of Cybersecurity, BGL Group </p><p><a href='https://www.linkedin.com/in/ian-hill-95123897/ '>https://www.linkedin.com/in/ian-hill-95123897/ </a></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p><b>Cybersecurity Without Automation And Intelligence In Today’s Digital World Is Like “Bringing A Knife To A Gunfight”</b> </p><p><a href='https://www.forbes.com/sites/forbestechcouncil/2021/11/10/cybersecurity-without-automation-and-intelligence-in-todays-digital-world-is-like-bringing-a-knife-to-a-gunfight/ '>https://www.forbes.com/sites/forbestechcouncil/2021/11/10/cybersecurity-without-automation-and-intelligence-in-todays-digital-world-is-like-bringing-a-knife-to-a-gunfight/ </a></p><p>The panel discussion is titled  </p><p><b>Trusting security automation</b> </p><ul><li>Laying the foundations for successful automated information security </li><li>Where are the main obstacles for achieving trust in automation, and how can these be overcome? </li><li>How can the automation of information security be achieved successfully? </li></ul><p>This episode is hosted by Jenny Radcliffe  </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  '>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </a> </p><p>Our Guests are; </p><p>David Cartwright, Head of IT Risk and Security, Standard Bank International Client Solutions </p><p><a href='https://www.linkedin.com/in/davidscartwright/'>https://www.linkedin.com/in/davidscartwright/</a> </p><p>Ansgar Koene, Global AI Ethics and Regulatory Leader, EY </p><p><a href='https://www.linkedin.com/in/akoene/ '>https://www.linkedin.com/in/akoene/ </a></p><p>Ian Hill, Director of Cybersecurity, BGL Group </p><p><a href='https://www.linkedin.com/in/ian-hill-95123897/ '>https://www.linkedin.com/in/ian-hill-95123897/ </a></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10888639-teisstalk-trusting-security-automation.mp3" length="33393971" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-10888639</guid>
    <pubDate>Fri, 01 Jul 2022 09:00:00 +0100</pubDate>
    <itunes:duration>2777</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Security as a business enabler</itunes:title>
    <title>teissTalk: Security as a business enabler</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  On this episode, we focus on the following news story;  The sun starts to set on Wild West days of crypto  https://www.ft.com/content/bc28ec20-3c4c-48ae-b450-d4e9f570fd7e?  The panel discussion is titled   Security as a business enabler  Gaining buy-in for a security function which delivers a competitiv...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p><b>The sun starts to set on Wild West days of crypto</b> </p><p><a href='https://www.ft.com/content/bc28ec20-3c4c-48ae-b450-d4e9f570fd7e? '>https://www.ft.com/content/bc28ec20-3c4c-48ae-b450-d4e9f570fd7e? </a></p><p>The panel discussion is titled  </p><p><b>Security as a business enabler</b> </p><ul><li>Gaining buy-in for a security function which delivers a competitive advantage </li><li>Identity governance as a business enabler: using identity and access management to enable and secure your hybrid workforce </li><li>How to best articulate the risks, costs and benefits of business-enabling security functions </li></ul><p> </p><p>This episode is hosted by Geoff White  </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/  '>https://www.linkedin.com/in/geoffwhitetech/  </a></p><p>Our Guests are; </p><p>Niamh Vianney Muldoon, Chief Information Security Officer, Fenergo </p><p><a href='https://www.linkedin.com/in/niamh-vianney-muldoon-b2174853/ '>https://www.linkedin.com/in/niamh-vianney-muldoon-b2174853/ </a></p><p>Riyad Jazmawi, Head of Information Security and IT Governance, INVESTBANK </p><p><a href='https://www.linkedin.com/in/riyad-jazmawi-364b303/ '>https://www.linkedin.com/in/riyad-jazmawi-364b303/ </a></p><p>Ingo Schubert, Global Cloud Identity Architect- CISSP-ISSAP, CCSP, SecurID, an RSA business </p><p><a href='https://www.linkedin.com/in/ingo-schubert/ '>https://www.linkedin.com/in/ingo-schubert/ </a></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p><b>The sun starts to set on Wild West days of crypto</b> </p><p><a href='https://www.ft.com/content/bc28ec20-3c4c-48ae-b450-d4e9f570fd7e? '>https://www.ft.com/content/bc28ec20-3c4c-48ae-b450-d4e9f570fd7e? </a></p><p>The panel discussion is titled  </p><p><b>Security as a business enabler</b> </p><ul><li>Gaining buy-in for a security function which delivers a competitive advantage </li><li>Identity governance as a business enabler: using identity and access management to enable and secure your hybrid workforce </li><li>How to best articulate the risks, costs and benefits of business-enabling security functions </li></ul><p> </p><p>This episode is hosted by Geoff White  </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/  '>https://www.linkedin.com/in/geoffwhitetech/  </a></p><p>Our Guests are; </p><p>Niamh Vianney Muldoon, Chief Information Security Officer, Fenergo </p><p><a href='https://www.linkedin.com/in/niamh-vianney-muldoon-b2174853/ '>https://www.linkedin.com/in/niamh-vianney-muldoon-b2174853/ </a></p><p>Riyad Jazmawi, Head of Information Security and IT Governance, INVESTBANK </p><p><a href='https://www.linkedin.com/in/riyad-jazmawi-364b303/ '>https://www.linkedin.com/in/riyad-jazmawi-364b303/ </a></p><p>Ingo Schubert, Global Cloud Identity Architect- CISSP-ISSAP, CCSP, SecurID, an RSA business </p><p><a href='https://www.linkedin.com/in/ingo-schubert/ '>https://www.linkedin.com/in/ingo-schubert/ </a></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10875168-teisstalk-security-as-a-business-enabler.mp3" length="34156646" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-10875168</guid>
    <pubDate>Wed, 29 Jun 2022 10:00:00 +0100</pubDate>
    <itunes:duration>2841</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Leading your breach response</itunes:title>
    <title>teissTalk: Leading your breach response</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  On this episode, we focus on the following news story;  Coca-Cola Investigates Data Breach Claim  https://www.infosecurity-magazine.com/news/coca-cola-investigates-data-breach/  The panel discussion is titled   Leading your breach response  Taking the lead in communication across the business before, du...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p><b>Coca-Cola Investigates Data Breach Claim</b> </p><p><a href='https://www.infosecurity-magazine.com/news/coca-cola-investigates-data-breach/ '>https://www.infosecurity-magazine.com/news/coca-cola-investigates-data-breach/ </a></p><p>The panel discussion is titled  </p><p><b>Leading your breach response</b> </p><ul><li>Taking the lead in communication across the business before, during and after a breach </li><li>Best practice in planning a holistic breach response: removing the obstacles to a rapid and effective response </li><li>How lessons from previous incidents can help you lead the response to the next </li></ul><p>This episode is hosted by Geoff White  </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/  '>https://www.linkedin.com/in/geoffwhitetech/  </a></p><p>Our Guests are; </p><p>Deborah Haworth, Chief Information Security Officer, Penguin Random House </p><p><a href='https://www.linkedin.com/in/deborah-haworth-8a91701/ '>https://www.linkedin.com/in/deborah-haworth-8a91701/ </a></p><p>Tim Roberts, Managing Director, AlixPartners </p><p><a href='https://www.linkedin.com/in/thrroberts '>https://www.linkedin.com/in/thrroberts </a><br/><br/>Samantha Humphries, Head of Security Strategy, EMEA, Exabeam </p><p><a href='https://www.linkedin.com/in/safesecs '>https://www.linkedin.com/in/safesecs </a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p><b>Coca-Cola Investigates Data Breach Claim</b> </p><p><a href='https://www.infosecurity-magazine.com/news/coca-cola-investigates-data-breach/ '>https://www.infosecurity-magazine.com/news/coca-cola-investigates-data-breach/ </a></p><p>The panel discussion is titled  </p><p><b>Leading your breach response</b> </p><ul><li>Taking the lead in communication across the business before, during and after a breach </li><li>Best practice in planning a holistic breach response: removing the obstacles to a rapid and effective response </li><li>How lessons from previous incidents can help you lead the response to the next </li></ul><p>This episode is hosted by Geoff White  </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/  '>https://www.linkedin.com/in/geoffwhitetech/  </a></p><p>Our Guests are; </p><p>Deborah Haworth, Chief Information Security Officer, Penguin Random House </p><p><a href='https://www.linkedin.com/in/deborah-haworth-8a91701/ '>https://www.linkedin.com/in/deborah-haworth-8a91701/ </a></p><p>Tim Roberts, Managing Director, AlixPartners </p><p><a href='https://www.linkedin.com/in/thrroberts '>https://www.linkedin.com/in/thrroberts </a><br/><br/>Samantha Humphries, Head of Security Strategy, EMEA, Exabeam </p><p><a href='https://www.linkedin.com/in/safesecs '>https://www.linkedin.com/in/safesecs </a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10842711-teisstalk-leading-your-breach-response.mp3" length="34303659" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-10842711</guid>
    <pubDate>Fri, 24 Jun 2022 06:00:00 +0100</pubDate>
    <itunes:duration>2853</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Strengthening your supply chain’s cyber-resilience</itunes:title>
    <title>Strengthening your supply chain’s cyber-resilience</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  On this episode, we focus on the following news story;  Global Supply Chain Attacks Surge 51% in H2 2021  https://www.infosecurity-magazine.com/news/global-supply-chain-attacks-surge/  The panel discussion is titled   Strengthening your supply chain’s cyber-resilience  Involving your key suppliers in cr...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p><b>Global Supply Chain Attacks Surge 51% in H2 2021</b> </p><p><a href='https://www.infosecurity-magazine.com/news/global-supply-chain-attacks-surge/ '>https://www.infosecurity-magazine.com/news/global-supply-chain-attacks-surge/ </a></p><p>The panel discussion is titled  </p><p><b>Strengthening your supply chain’s cyber-resilience</b> </p><ul><li>Involving your key suppliers in creating your supply chain assurance process </li><li>Using vulnerability testing to assess and feed back to your suppliers on their cyber-resilience </li><li>CISO-procurement officer collaboration: a means to identifying third-, fourth- and fifth- party suppliers </li></ul><p>This episode is hosted by Geoff White  </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/  '>https://www.linkedin.com/in/geoffwhitetech/  </a></p><p>Our Guests are; </p><p>Edd Hardy, Senior Vice President Cyber Security, AlixPartners </p><p><a href='https://www.linkedin.com/in/eddhardy '>https://www.linkedin.com/in/eddhardy </a></p><p>Jay Moloo, Corporate Information Security Officer, DB Schenkers </p><p><a href='https://www.linkedin.com/in/jaymoloo/?originalSubdomain=uk '>https://www.linkedin.com/in/jaymoloo/?originalSubdomain=uk </a></p><p>Stephen Owen, Chief Information Security Officer, Esure Group </p><p><a href='https://www.linkedin.com/in/stephen-owen-data-protection/ '>https://www.linkedin.com/in/stephen-owen-data-protection/ </a></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p><b>Global Supply Chain Attacks Surge 51% in H2 2021</b> </p><p><a href='https://www.infosecurity-magazine.com/news/global-supply-chain-attacks-surge/ '>https://www.infosecurity-magazine.com/news/global-supply-chain-attacks-surge/ </a></p><p>The panel discussion is titled  </p><p><b>Strengthening your supply chain’s cyber-resilience</b> </p><ul><li>Involving your key suppliers in creating your supply chain assurance process </li><li>Using vulnerability testing to assess and feed back to your suppliers on their cyber-resilience </li><li>CISO-procurement officer collaboration: a means to identifying third-, fourth- and fifth- party suppliers </li></ul><p>This episode is hosted by Geoff White  </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/  '>https://www.linkedin.com/in/geoffwhitetech/  </a></p><p>Our Guests are; </p><p>Edd Hardy, Senior Vice President Cyber Security, AlixPartners </p><p><a href='https://www.linkedin.com/in/eddhardy '>https://www.linkedin.com/in/eddhardy </a></p><p>Jay Moloo, Corporate Information Security Officer, DB Schenkers </p><p><a href='https://www.linkedin.com/in/jaymoloo/?originalSubdomain=uk '>https://www.linkedin.com/in/jaymoloo/?originalSubdomain=uk </a></p><p>Stephen Owen, Chief Information Security Officer, Esure Group </p><p><a href='https://www.linkedin.com/in/stephen-owen-data-protection/ '>https://www.linkedin.com/in/stephen-owen-data-protection/ </a></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10830091-strengthening-your-supply-chain-s-cyber-resilience.mp3" length="33289608" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-10830091</guid>
    <pubDate>Wed, 22 Jun 2022 06:00:00 +0100</pubDate>
    <itunes:duration>2769</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Designing threat resilient organisations</itunes:title>
    <title>teissTalk: Designing threat resilient organisations</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk    On this episode, we focus on the following news story;  Less Than a Fifth of Cyber Leaders Feel Confident Their Organization is Cyber-Resilient  https://www.infosecurity-magazine.com/news/cyber-leaders-organization/    The panel discussion is titled   Designing threat resilient organisations  How to better articulate hig...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/> <br/>On this episode, we focus on the following news story; <br/><b>Less Than a Fifth of Cyber Leaders Feel Confident Their Organization is Cyber-Resilient</b> <br/><a href='https://www.infosecurity-magazine.com/news/cyber-leaders-organization/'>https://www.infosecurity-magazine.com/news/cyber-leaders-organization/</a> <br/> <br/>The panel discussion is titled  <br/><b>Designing threat resilient organisations</b> </p><ul><li>How to better articulate high-impact, low-likelihood cyber-risks </li><li>Defining risk appetite from the board downwards, and putting those risks in context </li><li>Pivoting from a blame culture to a learning culture to underpin stronger cyber-threat resilience </li></ul><p> <br/>This episode is hosted by Jenny Radcliffe  <br/><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a><br/> <br/>Our Guests are; <br/>Dr. Dave Chatterjee, Tenured Professor, The University of Georgia <br/><a href='https://www.linkedin.com/in/dchatte/'>https://www.linkedin.com/in/dchatte/</a> <br/> <br/>Vlad Brodsky, Chief Information Security Officer, OTC Markets Group <br/><a href='https://www.linkedin.com/in/vlad-brodsky-b18b0a3/'>https://www.linkedin.com/in/vlad-brodsky-b18b0a3/</a> <br/> <br/>Michelle Griffey, Chief Risk Officer, Communisis <br/><a href='https://www.linkedin.com/in/michelle-griffey/ '>https://www.linkedin.com/in/michelle-griffey/ </a><br/> </p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/> <br/>On this episode, we focus on the following news story; <br/><b>Less Than a Fifth of Cyber Leaders Feel Confident Their Organization is Cyber-Resilient</b> <br/><a href='https://www.infosecurity-magazine.com/news/cyber-leaders-organization/'>https://www.infosecurity-magazine.com/news/cyber-leaders-organization/</a> <br/> <br/>The panel discussion is titled  <br/><b>Designing threat resilient organisations</b> </p><ul><li>How to better articulate high-impact, low-likelihood cyber-risks </li><li>Defining risk appetite from the board downwards, and putting those risks in context </li><li>Pivoting from a blame culture to a learning culture to underpin stronger cyber-threat resilience </li></ul><p> <br/>This episode is hosted by Jenny Radcliffe  <br/><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a><br/> <br/>Our Guests are; <br/>Dr. Dave Chatterjee, Tenured Professor, The University of Georgia <br/><a href='https://www.linkedin.com/in/dchatte/'>https://www.linkedin.com/in/dchatte/</a> <br/> <br/>Vlad Brodsky, Chief Information Security Officer, OTC Markets Group <br/><a href='https://www.linkedin.com/in/vlad-brodsky-b18b0a3/'>https://www.linkedin.com/in/vlad-brodsky-b18b0a3/</a> <br/> <br/>Michelle Griffey, Chief Risk Officer, Communisis <br/><a href='https://www.linkedin.com/in/michelle-griffey/ '>https://www.linkedin.com/in/michelle-griffey/ </a><br/> </p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10803832-teisstalk-designing-threat-resilient-organisations.mp3" length="33172686" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-10803832</guid>
    <pubDate>Fri, 17 Jun 2022 06:00:00 +0100</pubDate>
    <itunes:duration>2759</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Stress-testing your security playbooks</itunes:title>
    <title>teissTalk: Stress-testing your security playbooks</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk    On this episode, we focus on the following news story;  Which Hole to Plug First? Solving Chronic Vulnerability Patching Overload  https://thehackernews.com/2022/05/which-hole-to-plug-first-solving.htm    The panel discussion is titled   Stress-testing your security playbooks  Are your playbooks too complicated to work? ...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/> <br/>On this episode, we focus on the following news story; <br/><b>Which Hole to Plug First? Solving Chronic Vulnerability Patching Overload</b> <br/><a href='https://thehackernews.com/2022/05/which-hole-to-plug-first-solving.htm'>https://thehackernews.com/2022/05/which-hole-to-plug-first-solving.htm</a> <br/> <br/>The panel discussion is titled  <br/><b>Stress-testing your security playbooks</b> </p><ul><li>Are your playbooks too complicated to work? Creating simple, reusable, practical and agile playbooks </li><li>Minimising the risks in incident automation: deciding when to replace your manual processes to reduce response time </li><li>Evidencing the challenge to, and the gaps in, your security roadmap for compliance and further investment </li></ul><p>This episode is hosted by Geoff White  <br/><a href='https://www.linkedin.com/in/geoffwhitetech/  '>https://www.linkedin.com/in/geoffwhitetech/  </a><br/> <br/>Our Guests are; <br/><br/>Vicki Gavin, Head of Information Security &amp; Compliance, Kaplan International <br/><a href='https://www.linkedin.com/in/vickigavin/ '>https://www.linkedin.com/in/vickigavin/ </a><br/> <br/>Matthew Hardy, Chief Information Security Officer, OMNIO <br/><a href='https://www.linkedin.com/in/matthardy67/ '>https://www.linkedin.com/in/matthardy67/ </a><br/> <br/>Zechariah Leke Akinpelu, Chief Information Security Officer, Unity Bank Plc <br/><a href='https://www.linkedin.com/in/zechariah-akinpelu-a7422920/ '>https://www.linkedin.com/in/zechariah-akinpelu-a7422920/ </a><br/> <br/>Shakel Ahmed, Senior Sales Engineer, Pentera <br/><a href='https://www.linkedin.com/in/shaka '>https://www.linkedin.com/in/shaka </a></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/> <br/>On this episode, we focus on the following news story; <br/><b>Which Hole to Plug First? Solving Chronic Vulnerability Patching Overload</b> <br/><a href='https://thehackernews.com/2022/05/which-hole-to-plug-first-solving.htm'>https://thehackernews.com/2022/05/which-hole-to-plug-first-solving.htm</a> <br/> <br/>The panel discussion is titled  <br/><b>Stress-testing your security playbooks</b> </p><ul><li>Are your playbooks too complicated to work? Creating simple, reusable, practical and agile playbooks </li><li>Minimising the risks in incident automation: deciding when to replace your manual processes to reduce response time </li><li>Evidencing the challenge to, and the gaps in, your security roadmap for compliance and further investment </li></ul><p>This episode is hosted by Geoff White  <br/><a href='https://www.linkedin.com/in/geoffwhitetech/  '>https://www.linkedin.com/in/geoffwhitetech/  </a><br/> <br/>Our Guests are; <br/><br/>Vicki Gavin, Head of Information Security &amp; Compliance, Kaplan International <br/><a href='https://www.linkedin.com/in/vickigavin/ '>https://www.linkedin.com/in/vickigavin/ </a><br/> <br/>Matthew Hardy, Chief Information Security Officer, OMNIO <br/><a href='https://www.linkedin.com/in/matthardy67/ '>https://www.linkedin.com/in/matthardy67/ </a><br/> <br/>Zechariah Leke Akinpelu, Chief Information Security Officer, Unity Bank Plc <br/><a href='https://www.linkedin.com/in/zechariah-akinpelu-a7422920/ '>https://www.linkedin.com/in/zechariah-akinpelu-a7422920/ </a><br/> <br/>Shakel Ahmed, Senior Sales Engineer, Pentera <br/><a href='https://www.linkedin.com/in/shaka '>https://www.linkedin.com/in/shaka </a></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10765154-teisstalk-stress-testing-your-security-playbooks.mp3" length="33214059" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-10765154</guid>
    <pubDate>Fri, 10 Jun 2022 06:00:00 +0100</pubDate>
    <itunes:duration>2762</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: A playbook for new CISOs</itunes:title>
    <title>teissTalk: A playbook for new CISOs</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk. Join us twice a week for free by visiting www.teiss.co.uk/teisstalk On this episode, we focus on the following news story; Hacking Your Security Behaviors: CISOs Share Best Practices for 2022 https://www.toolbox.com/it-security/cyber-risk-management/guest-article/hacking-your-security-behaviors-cisos-share-best-practices/ The panel discussion is titled A playbook for new CISOs · Identifying the quick wins ...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk. Join us twice a week for free by visiting <a href='HTTP://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a></p><p>On this episode, we focus on the following news story;</p><p>Hacking Your Security Behaviors: CISOs Share Best Practices for 2022</p><p><a href='https://www.toolbox.com/it-security/cyber-risk-management/guest-article/hacking-your-security-behaviors-cisos-share-best-practices/'>https://www.toolbox.com/it-security/cyber-risk-management/guest-article/hacking-your-security-behaviors-cisos-share-best-practices/</a></p><p>The panel discussion is titled</p><p>A playbook for new CISOs</p><p>· Identifying the quick wins and making the most of the finite time new CISOs have to get their message across</p><p>· Discouraging pessimism and promoting positivity among infosec professionals</p><p>· What should the new CISO be doing, and what should their security function not do or automate?</p><p>This episode is hosted by Jenny Radcliffe</p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a></p><p>Our Guests are;</p><p>Edward Tucker, Snr Director Cyber Security, The Workshop</p><p><a href='https://www.linkedin.com/in/tuckeredward/'>https://www.linkedin.com/in/tuckeredward/</a></p><p>Allan Alford, CISO/CTO, TrustMAPP</p><p><a href='https://www.linkedin.com/in/allanalford/'>https://www.linkedin.com/in/allanalford/</a></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk. Join us twice a week for free by visiting <a href='HTTP://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a></p><p>On this episode, we focus on the following news story;</p><p>Hacking Your Security Behaviors: CISOs Share Best Practices for 2022</p><p><a href='https://www.toolbox.com/it-security/cyber-risk-management/guest-article/hacking-your-security-behaviors-cisos-share-best-practices/'>https://www.toolbox.com/it-security/cyber-risk-management/guest-article/hacking-your-security-behaviors-cisos-share-best-practices/</a></p><p>The panel discussion is titled</p><p>A playbook for new CISOs</p><p>· Identifying the quick wins and making the most of the finite time new CISOs have to get their message across</p><p>· Discouraging pessimism and promoting positivity among infosec professionals</p><p>· What should the new CISO be doing, and what should their security function not do or automate?</p><p>This episode is hosted by Jenny Radcliffe</p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a></p><p>Our Guests are;</p><p>Edward Tucker, Snr Director Cyber Security, The Workshop</p><p><a href='https://www.linkedin.com/in/tuckeredward/'>https://www.linkedin.com/in/tuckeredward/</a></p><p>Allan Alford, CISO/CTO, TrustMAPP</p><p><a href='https://www.linkedin.com/in/allanalford/'>https://www.linkedin.com/in/allanalford/</a></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10679453-teisstalk-a-playbook-for-new-cisos.mp3" length="33919024" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-10679453</guid>
    <pubDate>Wed, 25 May 2022 12:00:00 +0100</pubDate>
    <itunes:duration>2821</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Identity-first security for humans and machines</itunes:title>
    <title>teissTalk: Identity-first security for humans and machines</title>
    <itunes:summary><![CDATA[How identity-first security differs from human and machine identity managementManaging the increase in volume, variety and velocity of both human and machine identitiesIs post-authentication security a major blind spot for infosec teams?]]></itunes:summary>
    <description><![CDATA[<ul><li>How identity-first security differs from human and machine identity management</li><li>Managing the increase in volume, variety and velocity of both human and machine identities</li><li>Is post-authentication security a major blind spot for infosec teams?</li></ul>]]></description>
    <content:encoded><![CDATA[<ul><li>How identity-first security differs from human and machine identity management</li><li>Managing the increase in volume, variety and velocity of both human and machine identities</li><li>Is post-authentication security a major blind spot for infosec teams?</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10638635-teisstalk-identity-first-security-for-humans-and-machines.mp3" length="34363593" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10638635</guid>
    <pubDate>Thu, 19 May 2022 06:00:00 +0100</pubDate>
    <itunes:duration>2858</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Testing your EQ - using emotional intelligence to retain talent and reduce cyber risk</itunes:title>
    <title>teissTalk: Testing your EQ - using emotional intelligence to retain talent and reduce cyber risk</title>
    <itunes:summary><![CDATA[Building, leading and retaining emotionally intelligent infosec teamsHow good EQ can help CISOs understand, communicate and address risk across the organisationWhere can automation tools support analyst retention and EQ development?]]></itunes:summary>
    <description><![CDATA[<ul><li>Building, leading and retaining emotionally intelligent infosec teams</li><li>How good EQ can help CISOs understand, communicate and address risk across the organisation</li><li>Where can automation tools support analyst retention and EQ development?</li></ul>]]></description>
    <content:encoded><![CDATA[<ul><li>Building, leading and retaining emotionally intelligent infosec teams</li><li>How good EQ can help CISOs understand, communicate and address risk across the organisation</li><li>Where can automation tools support analyst retention and EQ development?</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10624903-teisstalk-testing-your-eq-using-emotional-intelligence-to-retain-talent-and-reduce-cyber-risk.mp3" length="34327620" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10624903</guid>
    <pubDate>Mon, 16 May 2022 10:00:00 +0100</pubDate>
    <itunes:duration>2855</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Risk-based versus compliance-based security programmes</itunes:title>
    <title>teissTalk: Risk-based versus compliance-based security programmes</title>
    <itunes:summary><![CDATA["How did we get breached? We ticked all the boxes!": the limitations of compliance-base securityIdentifying what security controls to apply and when they should be applied to reduce riskTransitioning to risk-based security, and levelling up your security awareness programme]]></itunes:summary>
    <description><![CDATA[<ul><li>&quot;How did we get breached? We ticked all the boxes!&quot;: the limitations of compliance-base security</li><li>Identifying what security controls to apply and when they should be applied to reduce risk</li><li>Transitioning to risk-based security, and levelling up your security awareness programme</li></ul>]]></description>
    <content:encoded><![CDATA[<ul><li>&quot;How did we get breached? We ticked all the boxes!&quot;: the limitations of compliance-base security</li><li>Identifying what security controls to apply and when they should be applied to reduce risk</li><li>Transitioning to risk-based security, and levelling up your security awareness programme</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10606121-teisstalk-risk-based-versus-compliance-based-security-programmes.mp3" length="33221301" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-10606121</guid>
    <pubDate>Thu, 12 May 2022 14:00:00 +0100</pubDate>
    <itunes:duration>2763</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Digital forensics and incident response in the cloud</itunes:title>
    <title>Digital forensics and incident response in the cloud</title>
    <itunes:summary><![CDATA[Preparation - choosing which events and resources should be logged in your cloud environmentApplying a Zero Trust model when configuring your network - managing devices, permissions and applicationsMisconfigurations, vulnerabilities and patch management - best practice in reducing the opportunities for error  ]]></itunes:summary>
    <description><![CDATA[<ul><li>Preparation - choosing which events and resources should be logged in your cloud environment</li><li>Applying a Zero Trust model when configuring your network - managing devices, permissions and applications</li><li>Misconfigurations, vulnerabilities and patch management - best practice in reducing the opportunities for error</li></ul><p><br/></p>]]></description>
    <content:encoded><![CDATA[<ul><li>Preparation - choosing which events and resources should be logged in your cloud environment</li><li>Applying a Zero Trust model when configuring your network - managing devices, permissions and applications</li><li>Misconfigurations, vulnerabilities and patch management - best practice in reducing the opportunities for error</li></ul><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10586573-digital-forensics-and-incident-response-in-the-cloud.mp3" length="32803734" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-10586573</guid>
    <pubDate>Mon, 09 May 2022 18:00:00 +0100</pubDate>
    <itunes:duration>2728</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Inside job - Investigating the malicious insider threat</itunes:title>
    <title>Inside job - Investigating the malicious insider threat</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  On this episode, we focus on the following news story;  Block Warns Eight Million Customers of Insider Breach  https://www.infosecurity-magazine.com/news/block-warns-eight-million-insider/  The panel discussion is titled “Inside job - investigating the malicious insider threat”  https://www.teiss.co.uk/teisstalk/inves...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p>Block Warns Eight Million Customers of Insider Breach <br/><a href='https://www.infosecurity-magazine.com/news/block-warns-eight-million-insider/ '>https://www.infosecurity-magazine.com/news/block-warns-eight-million-insider/ </a></p><p>The panel discussion is titled “Inside job - investigating the malicious insider threat” <br/><a href='https://www.teiss.co.uk/teisstalk/investigating-the-malicious-insider-threat '>https://www.teiss.co.uk/teisstalk/investigating-the-malicious-insider-threat </a></p><p>This episode is hosted by Geoff White  <br/><a href='https://www.linkedin.com/in/geoffwhitetech/ '>https://www.linkedin.com/in/geoffwhitetech/ </a> </p><p>Our Guests are </p><p>Aderonke Thompson, Associate Professor, Federal University of Technology, Akure <a href='https://www.linkedin.com/in/aderonke-thompson-phd-45103baa/ '>https://www.linkedin.com/in/aderonke-thompson-phd-45103baa/ </a></p><p>Robin Lennon Bylenga, Human Factors &amp; Performance Lead, Scoutbee <a href='https://www.linkedin.com/in/robinlbylenga/ '>https://www.linkedin.com/in/robinlbylenga/ </a></p><p>Sudeep Venkatesh, Chief Customer Officer, Egress <br/><a href='https://www.linkedin.com/in/sudeep-venkatesh-5825a93'>https://www.linkedin.com/in/sudeep-venkatesh-5825a93</a> </p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p>Block Warns Eight Million Customers of Insider Breach <br/><a href='https://www.infosecurity-magazine.com/news/block-warns-eight-million-insider/ '>https://www.infosecurity-magazine.com/news/block-warns-eight-million-insider/ </a></p><p>The panel discussion is titled “Inside job - investigating the malicious insider threat” <br/><a href='https://www.teiss.co.uk/teisstalk/investigating-the-malicious-insider-threat '>https://www.teiss.co.uk/teisstalk/investigating-the-malicious-insider-threat </a></p><p>This episode is hosted by Geoff White  <br/><a href='https://www.linkedin.com/in/geoffwhitetech/ '>https://www.linkedin.com/in/geoffwhitetech/ </a> </p><p>Our Guests are </p><p>Aderonke Thompson, Associate Professor, Federal University of Technology, Akure <a href='https://www.linkedin.com/in/aderonke-thompson-phd-45103baa/ '>https://www.linkedin.com/in/aderonke-thompson-phd-45103baa/ </a></p><p>Robin Lennon Bylenga, Human Factors &amp; Performance Lead, Scoutbee <a href='https://www.linkedin.com/in/robinlbylenga/ '>https://www.linkedin.com/in/robinlbylenga/ </a></p><p>Sudeep Venkatesh, Chief Customer Officer, Egress <br/><a href='https://www.linkedin.com/in/sudeep-venkatesh-5825a93'>https://www.linkedin.com/in/sudeep-venkatesh-5825a93</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10527252-inside-job-investigating-the-malicious-insider-threat.mp3" length="33326024" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10527252</guid>
    <pubDate>Fri, 29 Apr 2022 14:00:00 +0100</pubDate>
    <itunes:duration>2772</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Playing it safe - the gamification of security awareness training</itunes:title>
    <title>Playing it safe - the gamification of security awareness training</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk   On this episode, we focus on the following news story;  Over Half of Data Security Incidents Caused by Insiders  https://www.infosecurity-magazine.com/news/half-security-incidents-insiders/  The panel discussion is titled “Playing it safe - the gamification of security awareness training” https://www.teiss.co.uk/teis...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/><br/>On this episode, we focus on the following news story; </p><p>Over Half of Data Security Incidents Caused by Insiders <br/><a href='https://www.infosecurity-magazine.com/news/half-security-incidents-insiders/ '>https://www.infosecurity-magazine.com/news/half-security-incidents-insiders/ </a></p><p>The panel discussion is titled “Playing it safe - the gamification of security awareness training” <a href='https://www.teiss.co.uk/teisstalk/gamification-of-security-awareness-training '>https://www.teiss.co.uk/teisstalk/gamification-of-security-awareness-training </a></p><p>This episode is hosted by Jenny Radcliffe <br/> <a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  '>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </a></p><p>Our Guests are </p><p>Lauren Zink, Manager- Security Culture and Awareness, Indeed.com <a href='https://www.linkedin.com/in/laurenazink/ '>https://www.linkedin.com/in/laurenazink/ </a></p><p>Vetea Lucas, Regional Chief Information Security Officer, Sodexo <a href='https://www.linkedin.com/in/vetea-lucas-5362081b '>https://www.linkedin.com/in/vetea-lucas-5362081b </a></p><p>Melanie Oldham OBE, Founder &amp; CEO, Bob&apos;s Business <a href='https://www.linkedin.com/in/melanieoldham/ '>https://www.linkedin.com/in/melanieoldham/ </a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/><br/>On this episode, we focus on the following news story; </p><p>Over Half of Data Security Incidents Caused by Insiders <br/><a href='https://www.infosecurity-magazine.com/news/half-security-incidents-insiders/ '>https://www.infosecurity-magazine.com/news/half-security-incidents-insiders/ </a></p><p>The panel discussion is titled “Playing it safe - the gamification of security awareness training” <a href='https://www.teiss.co.uk/teisstalk/gamification-of-security-awareness-training '>https://www.teiss.co.uk/teisstalk/gamification-of-security-awareness-training </a></p><p>This episode is hosted by Jenny Radcliffe <br/> <a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  '>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </a></p><p>Our Guests are </p><p>Lauren Zink, Manager- Security Culture and Awareness, Indeed.com <a href='https://www.linkedin.com/in/laurenazink/ '>https://www.linkedin.com/in/laurenazink/ </a></p><p>Vetea Lucas, Regional Chief Information Security Officer, Sodexo <a href='https://www.linkedin.com/in/vetea-lucas-5362081b '>https://www.linkedin.com/in/vetea-lucas-5362081b </a></p><p>Melanie Oldham OBE, Founder &amp; CEO, Bob&apos;s Business <a href='https://www.linkedin.com/in/melanieoldham/ '>https://www.linkedin.com/in/melanieoldham/ </a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10527028-playing-it-safe-the-gamification-of-security-awareness-training.mp3" length="34359845" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10527028</guid>
    <pubDate>Fri, 29 Apr 2022 14:00:00 +0100</pubDate>
    <itunes:duration>2858</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Selling threat intelligence to the board</itunes:title>
    <title>Selling threat intelligence to the board</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  On this episode, we focus on the following news story;  State-backed hacking attacks are a big worry, but most firms don't know what to watch out for  https://www.zdnet.com/article/state-backed-hacking-attacks-are-a-big-worry-but-most-firms-dont-know-what-to-watch-out-for/  The panel discussion is titled “Selling thre...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p>State-backed hacking attacks are a big worry, but most firms don&apos;t know what to watch out for <br/><a href='https://www.zdnet.com/article/state-backed-hacking-attacks-are-a-big-worry-but-most-firms-dont-know-what-to-watch-out-for/ '>https://www.zdnet.com/article/state-backed-hacking-attacks-are-a-big-worry-but-most-firms-dont-know-what-to-watch-out-for/ </a></p><p>The panel discussion is titled “Selling threat intelligence to the board” <br/><a href='https://www.teiss.co.uk/teisstalk/selling-a-threat-intelligence-function-to-the-board '>https://www.teiss.co.uk/teisstalk/selling-a-threat-intelligence-function-to-the-board </a></p><p>This episode is hosted by Geoff White  <br/><a href='https://www.linkedin.com/in/geoffwhitetech/  '>https://www.linkedin.com/in/geoffwhitetech/  </a></p><p>Our Guests are </p><p>Daniel Adaramola, Chief Information Security Officer &amp; Co-Founder, The Young CISO Network <br/><a href='https://www.linkedin.com/in/danieladaramola '>https://www.linkedin.com/in/danieladaramola </a></p><p>Luca Vigano, Professor and Head of the Cybersecurity Group of the Department of Informatics, King&apos;s College London <br/><a href='https://www.linkedin.com/in/luca-vigan%C3%B2-aaa054ba '>https://www.linkedin.com/in/luca-vigan%C3%B2-aaa054ba </a></p><p>Jason Steer, Principal Security Strategist, Recorded Future <a href='https://www.linkedin.com/in/jason-steer-256a15 '>https://www.linkedin.com/in/jason-steer-256a15 </a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p>State-backed hacking attacks are a big worry, but most firms don&apos;t know what to watch out for <br/><a href='https://www.zdnet.com/article/state-backed-hacking-attacks-are-a-big-worry-but-most-firms-dont-know-what-to-watch-out-for/ '>https://www.zdnet.com/article/state-backed-hacking-attacks-are-a-big-worry-but-most-firms-dont-know-what-to-watch-out-for/ </a></p><p>The panel discussion is titled “Selling threat intelligence to the board” <br/><a href='https://www.teiss.co.uk/teisstalk/selling-a-threat-intelligence-function-to-the-board '>https://www.teiss.co.uk/teisstalk/selling-a-threat-intelligence-function-to-the-board </a></p><p>This episode is hosted by Geoff White  <br/><a href='https://www.linkedin.com/in/geoffwhitetech/  '>https://www.linkedin.com/in/geoffwhitetech/  </a></p><p>Our Guests are </p><p>Daniel Adaramola, Chief Information Security Officer &amp; Co-Founder, The Young CISO Network <br/><a href='https://www.linkedin.com/in/danieladaramola '>https://www.linkedin.com/in/danieladaramola </a></p><p>Luca Vigano, Professor and Head of the Cybersecurity Group of the Department of Informatics, King&apos;s College London <br/><a href='https://www.linkedin.com/in/luca-vigan%C3%B2-aaa054ba '>https://www.linkedin.com/in/luca-vigan%C3%B2-aaa054ba </a></p><p>Jason Steer, Principal Security Strategist, Recorded Future <a href='https://www.linkedin.com/in/jason-steer-256a15 '>https://www.linkedin.com/in/jason-steer-256a15 </a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10478650-selling-threat-intelligence-to-the-board.mp3" length="34352606" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10478650</guid>
    <pubDate>Thu, 21 Apr 2022 15:00:00 +0100</pubDate>
    <itunes:duration>2857</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Negotiating a ransomware payment</itunes:title>
    <title>Negotiating a ransomware payment</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk   On this episode, we focus on the following news story;   Ransomware Attacks Soar by 100% in 2021  https://www.infosecurity-magazine.com/news/ransomware-attacks-soar-100-2021/   The panel discussion is titled “Negotiating a ransomware payment” https://www.teiss.co.uk/teisstalk/negotiating-a-ransomware-payment   This episode is hoste...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/><br/>On this episode, we focus on the following news story; <br/><br/>Ransomware Attacks Soar by 100% in 2021 <br/><a href='https://www.infosecurity-magazine.com/news/ransomware-attacks-soar-100-2021/'>https://www.infosecurity-magazine.com/news/ransomware-attacks-soar-100-2021/</a> <br/><br/>The panel discussion is titled “Negotiating a ransomware payment” <a href='https://www.teiss.co.uk/teisstalk/negotiating-a-ransomware-payment'>https://www.teiss.co.uk/teisstalk/negotiating-a-ransomware-payment</a> <br/><br/>This episode is hosted by Jenny Radcliffe  <br/><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a>  <br/><br/><br/>Our Guests are </p><p>Neil Hare-Brown, CEO, STORM Guidance <br/><a href='https://www.linkedin.com/in/neilhb '>https://www.linkedin.com/in/neilhb </a><br/><br/>Johann Van Duyn, Chief Information Security Officer, DO &amp; CO <br/><a href='https://www.linkedin.com/in/johannvanduyn '>https://www.linkedin.com/in/johannvanduyn </a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/><br/>On this episode, we focus on the following news story; <br/><br/>Ransomware Attacks Soar by 100% in 2021 <br/><a href='https://www.infosecurity-magazine.com/news/ransomware-attacks-soar-100-2021/'>https://www.infosecurity-magazine.com/news/ransomware-attacks-soar-100-2021/</a> <br/><br/>The panel discussion is titled “Negotiating a ransomware payment” <a href='https://www.teiss.co.uk/teisstalk/negotiating-a-ransomware-payment'>https://www.teiss.co.uk/teisstalk/negotiating-a-ransomware-payment</a> <br/><br/>This episode is hosted by Jenny Radcliffe  <br/><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a>  <br/><br/><br/>Our Guests are </p><p>Neil Hare-Brown, CEO, STORM Guidance <br/><a href='https://www.linkedin.com/in/neilhb '>https://www.linkedin.com/in/neilhb </a><br/><br/>Johann Van Duyn, Chief Information Security Officer, DO &amp; CO <br/><a href='https://www.linkedin.com/in/johannvanduyn '>https://www.linkedin.com/in/johannvanduyn </a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10478530-negotiating-a-ransomware-payment.mp3" length="33958246" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10478530</guid>
    <pubDate>Thu, 21 Apr 2022 14:00:00 +0100</pubDate>
    <itunes:duration>2824</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Defining and assessing your cyber resilience</itunes:title>
    <title>Defining and assessing your cyber resilience</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk   On this episode, we focus on the following news story;  Proposal for legislation to improve the UK’s cyber resilience  https://www.gov.uk/government/consultations/proposal-for-legislation-to-improve-the-uks-cyber-resilience   The panel discussion is titled “Defining and assessing your cyber resilience”  htt...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/><br/>On this episode, we focus on the following news story; </p><p>Proposal for legislation to improve the UK’s cyber resilience </p><p><a href='https://www.gov.uk/government/consultations/proposal-for-legislation-to-improve-the-uks-cyber-resilience '>https://www.gov.uk/government/consultations/proposal-for-legislation-to-improve-the-uks-cyber-resilience </a><br/><br/>The panel discussion is titled “Defining and assessing your cyber resilience” </p><p><a href='https://www.teiss.co.uk/teisstalk/defining-and-assessing-your-cyber-resilience '>https://www.teiss.co.uk/teisstalk/defining-and-assessing-your-cyber-resilience </a><br/><br/>This episode is hosted by Geoff White  </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/  '>https://www.linkedin.com/in/geoffwhitetech/  </a><br/><br/>Our Guests are </p><p>Ben Lindgreen, Head of Cyber Resilience, PAY.UK<a href='https://www.linkedin.com/in/benlindgreen/ '> https://www.linkedin.com/in/benlindgreen/ </a><br/><br/>Steve Brown, Cyber Security Director, Mastercard <a href='https://www.linkedin.com/in/stevebrown100/ '>https://www.linkedin.com/in/stevebrown100/ </a><br/><br/>Kevin Duffey, Managing Director, The Cyber Rescue Alliance <a href='https://www.linkedin.com/in/kevduffey/ '>https://www.linkedin.com/in/kevduffey/ </a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/><br/>On this episode, we focus on the following news story; </p><p>Proposal for legislation to improve the UK’s cyber resilience </p><p><a href='https://www.gov.uk/government/consultations/proposal-for-legislation-to-improve-the-uks-cyber-resilience '>https://www.gov.uk/government/consultations/proposal-for-legislation-to-improve-the-uks-cyber-resilience </a><br/><br/>The panel discussion is titled “Defining and assessing your cyber resilience” </p><p><a href='https://www.teiss.co.uk/teisstalk/defining-and-assessing-your-cyber-resilience '>https://www.teiss.co.uk/teisstalk/defining-and-assessing-your-cyber-resilience </a><br/><br/>This episode is hosted by Geoff White  </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/  '>https://www.linkedin.com/in/geoffwhitetech/  </a><br/><br/>Our Guests are </p><p>Ben Lindgreen, Head of Cyber Resilience, PAY.UK<a href='https://www.linkedin.com/in/benlindgreen/ '> https://www.linkedin.com/in/benlindgreen/ </a><br/><br/>Steve Brown, Cyber Security Director, Mastercard <a href='https://www.linkedin.com/in/stevebrown100/ '>https://www.linkedin.com/in/stevebrown100/ </a><br/><br/>Kevin Duffey, Managing Director, The Cyber Rescue Alliance <a href='https://www.linkedin.com/in/kevduffey/ '>https://www.linkedin.com/in/kevduffey/ </a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10464386-defining-and-assessing-your-cyber-resilience.mp3" length="33962324" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10464386</guid>
    <pubDate>Tue, 19 Apr 2022 13:00:00 +0100</pubDate>
    <itunes:duration>2825</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How effective is your security awareness programme?</itunes:title>
    <title>How effective is your security awareness programme?</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk   On this episode, we focus on the following news story;  NCSC Launches Awareness Campaign to Strengthen Password Practices  https://www.infosecurity-magazine.com/news/ncsc-awareness-campaign-password/  The panel discussion is titled “How effective is your security awareness programme?” https://www.teiss.co.uk/teisstalk/how...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/><br/>On this episode, we focus on the following news story; </p><p>NCSC Launches Awareness Campaign to Strengthen Password Practices <br/><a href='https://www.infosecurity-magazine.com/news/ncsc-awareness-campaign-password/'>https://www.infosecurity-magazine.com/news/ncsc-awareness-campaign-password/</a><br/><br/>The panel discussion is titled “How effective is your security awareness programme?” <a href='https://www.teiss.co.uk/teisstalk/how-effective-is-your-security-awareness-programme-2'>https://www.teiss.co.uk/teisstalk/how-effective-is-your-security-awareness-programme-2</a><br/><br/>This episode is hosted by Jenny Radcliffe  <br/><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  '>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </a><br/><br/>Our Guests are </p><p>Andy Cocallis, Head of Information Security, UK Biobank <br/><a href='https://www.linkedin.com/in/andy-cocallis-b66a274b/'>https://www.linkedin.com/in/andy-cocallis-b66a274b/</a> <br/><br/>Lucy Finlay, Head of Security Education and Training, Aviva <br/><a href='https://www.linkedin.com/in/lucyfinlay/'>https://www.linkedin.com/in/lucyfinlay/</a> <br/><br/>Ilona Vaiciuniene, Security Awareness Manager, Vinted <br/><a href='https://www.linkedin.com/in/ilona-vai%C4%8Di%C5%ABnien%C4%97-5b9171115/ '>https://www.linkedin.com/in/ilona-vai%C4%8Di%C5%ABnien%C4%97-5b9171115/ </a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/><br/>On this episode, we focus on the following news story; </p><p>NCSC Launches Awareness Campaign to Strengthen Password Practices <br/><a href='https://www.infosecurity-magazine.com/news/ncsc-awareness-campaign-password/'>https://www.infosecurity-magazine.com/news/ncsc-awareness-campaign-password/</a><br/><br/>The panel discussion is titled “How effective is your security awareness programme?” <a href='https://www.teiss.co.uk/teisstalk/how-effective-is-your-security-awareness-programme-2'>https://www.teiss.co.uk/teisstalk/how-effective-is-your-security-awareness-programme-2</a><br/><br/>This episode is hosted by Jenny Radcliffe  <br/><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  '>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </a><br/><br/>Our Guests are </p><p>Andy Cocallis, Head of Information Security, UK Biobank <br/><a href='https://www.linkedin.com/in/andy-cocallis-b66a274b/'>https://www.linkedin.com/in/andy-cocallis-b66a274b/</a> <br/><br/>Lucy Finlay, Head of Security Education and Training, Aviva <br/><a href='https://www.linkedin.com/in/lucyfinlay/'>https://www.linkedin.com/in/lucyfinlay/</a> <br/><br/>Ilona Vaiciuniene, Security Awareness Manager, Vinted <br/><a href='https://www.linkedin.com/in/ilona-vai%C4%8Di%C5%ABnien%C4%97-5b9171115/ '>https://www.linkedin.com/in/ilona-vai%C4%8Di%C5%ABnien%C4%97-5b9171115/ </a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10443753-how-effective-is-your-security-awareness-programme.mp3" length="35451652" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10443753</guid>
    <pubDate>Fri, 15 Apr 2022 10:00:00 +0100</pubDate>
    <itunes:duration>2949</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Prioritising your security vulnerabilities and misconfigurations</itunes:title>
    <title>Prioritising your security vulnerabilities and misconfigurations</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk   On this episode, we focus on the following news story;  Thousands of Mobile Apps Expose User Data Via Cloud Misconfigurations https://www.infosecurity-magazine.com/news/thousands-mobile-apps-expose-data/   The panel discussion is titled “Prioritising your security vulnerabilities and misconfigurations” https://www.teiss.c...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/><br/>On this episode, we focus on the following news story; </p><p>Thousands of Mobile Apps Expose User Data Via Cloud Misconfigurations <a href='https://www.infosecurity-magazine.com/news/thousands-mobile-apps-expose-data/'>https://www.infosecurity-magazine.com/news/thousands-mobile-apps-expose-data/</a> <br/><br/>The panel discussion is titled “Prioritising your security vulnerabilities and misconfigurations” <a href='https://www.teiss.co.uk/teisstalk/prioritising-your-security-vulnerabilities'>https://www.teiss.co.uk/teisstalk/prioritising-your-security-vulnerabilities</a> <br/><br/>This episode is hosted by Jenny Radcliffe  <br/><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  '>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </a><br/><br/>Our Guests are </p><p>Leandros Maglaras, Professor of Cyber Security, De Montfort University <a href='https://www.linkedin.com/in/leandrosmaglaras'>https://www.linkedin.com/in/leandrosmaglaras</a> <br/><br/>Andrea Manning, CEO and Co-founder, CyberPie <a href='https://www.linkedin.com/in/andreamanning1/'>https://www.linkedin.com/in/andreamanning1/</a> <br/><br/>Maor Bin, CEO &amp; Co-Founder, Adaptive-shield <br/><a href='https://www.linkedin.com/in/maorbin '>https://www.linkedin.com/in/maorbin </a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/><br/>On this episode, we focus on the following news story; </p><p>Thousands of Mobile Apps Expose User Data Via Cloud Misconfigurations <a href='https://www.infosecurity-magazine.com/news/thousands-mobile-apps-expose-data/'>https://www.infosecurity-magazine.com/news/thousands-mobile-apps-expose-data/</a> <br/><br/>The panel discussion is titled “Prioritising your security vulnerabilities and misconfigurations” <a href='https://www.teiss.co.uk/teisstalk/prioritising-your-security-vulnerabilities'>https://www.teiss.co.uk/teisstalk/prioritising-your-security-vulnerabilities</a> <br/><br/>This episode is hosted by Jenny Radcliffe  <br/><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  '>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </a><br/><br/>Our Guests are </p><p>Leandros Maglaras, Professor of Cyber Security, De Montfort University <a href='https://www.linkedin.com/in/leandrosmaglaras'>https://www.linkedin.com/in/leandrosmaglaras</a> <br/><br/>Andrea Manning, CEO and Co-founder, CyberPie <a href='https://www.linkedin.com/in/andreamanning1/'>https://www.linkedin.com/in/andreamanning1/</a> <br/><br/>Maor Bin, CEO &amp; Co-Founder, Adaptive-shield <br/><a href='https://www.linkedin.com/in/maorbin '>https://www.linkedin.com/in/maorbin </a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10437625-prioritising-your-security-vulnerabilities-and-misconfigurations.mp3" length="36058555" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10437625</guid>
    <pubDate>Thu, 14 Apr 2022 12:00:00 +0100</pubDate>
    <itunes:duration>2999</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Inclusive infosec leadership - developing a vision for your security function</itunes:title>
    <title>Inclusive infosec leadership - developing a vision for your security function</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk   On this episode, we focus on the following news story;   French Bank Denies Access to Russian Workforce  https://www.infosecurity-magazine.com/news/french-bank-denies-access-to/   The panel discussion is titled “Inclusive infosec leadership - developing a vision for your security function”  https://www.teiss.co.uk/teisstalk/inclusi...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/><br/>On this episode, we focus on the following news story; <br/><br/>French Bank Denies Access to Russian Workforce <br/><a href='https://www.infosecurity-magazine.com/news/french-bank-denies-access-to/ '>https://www.infosecurity-magazine.com/news/french-bank-denies-access-to/ </a><br/><br/>The panel discussion is titled “Inclusive infosec leadership - developing a vision for your security function” <br/><a href='https://www.teiss.co.uk/teisstalk/inclusive-infosec-leadership---developing-a-vision-for-your-security-function '>https://www.teiss.co.uk/teisstalk/inclusive-infosec-leadership---developing-a-vision-for-your-security-function </a><br/><br/>This episode is hosted by Geoff White  <br/><a href='https://www.linkedin.com/in/geoffwhitetech/  '>https://www.linkedin.com/in/geoffwhitetech/  </a><br/><br/>Our Guests are </p><p>Paul Raines, Chief Information Security Officer, United Nations Development Programme <a href='https://www.linkedin.com/in/paul-raines-58ab08177/ '>https://www.linkedin.com/in/paul-raines-58ab08177/ </a><br/><br/>Goher Mohammad, Head of Information Security, L&amp;Q <br/><a href='https://www.linkedin.com/in/goher-mohammad-6498635/ '>https://www.linkedin.com/in/goher-mohammad-6498635/ </a><br/><br/>Irene Njoroge, Cyber Security Governance &amp; Compliance Manager, Vodacom Congo <a href='https://www.linkedin.com/in/irenenjoroge/ '>https://www.linkedin.com/in/irenenjoroge/ </a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/><br/>On this episode, we focus on the following news story; <br/><br/>French Bank Denies Access to Russian Workforce <br/><a href='https://www.infosecurity-magazine.com/news/french-bank-denies-access-to/ '>https://www.infosecurity-magazine.com/news/french-bank-denies-access-to/ </a><br/><br/>The panel discussion is titled “Inclusive infosec leadership - developing a vision for your security function” <br/><a href='https://www.teiss.co.uk/teisstalk/inclusive-infosec-leadership---developing-a-vision-for-your-security-function '>https://www.teiss.co.uk/teisstalk/inclusive-infosec-leadership---developing-a-vision-for-your-security-function </a><br/><br/>This episode is hosted by Geoff White  <br/><a href='https://www.linkedin.com/in/geoffwhitetech/  '>https://www.linkedin.com/in/geoffwhitetech/  </a><br/><br/>Our Guests are </p><p>Paul Raines, Chief Information Security Officer, United Nations Development Programme <a href='https://www.linkedin.com/in/paul-raines-58ab08177/ '>https://www.linkedin.com/in/paul-raines-58ab08177/ </a><br/><br/>Goher Mohammad, Head of Information Security, L&amp;Q <br/><a href='https://www.linkedin.com/in/goher-mohammad-6498635/ '>https://www.linkedin.com/in/goher-mohammad-6498635/ </a><br/><br/>Irene Njoroge, Cyber Security Governance &amp; Compliance Manager, Vodacom Congo <a href='https://www.linkedin.com/in/irenenjoroge/ '>https://www.linkedin.com/in/irenenjoroge/ </a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10437295-inclusive-infosec-leadership-developing-a-vision-for-your-security-function.mp3" length="33702231" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10437295</guid>
    <pubDate>Thu, 14 Apr 2022 10:00:00 +0100</pubDate>
    <itunes:duration>2803</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Deploying AI in attack prevention and incident response</itunes:title>
    <title>Deploying AI in attack prevention and incident response</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk   On this episode, we focus on the following news story; Internet Organised Crime Threat Assessment (IOCTA) 2021  https://www.europol.europa.eu/publications-events/main-reports/internet-organised-crime-threat-assessment-iocta-2021   The panel discussion is titled “Deploying AI in attack prevention and incident response...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/><br/>On this episode, we focus on the following news story;<br/>Internet Organised Crime Threat Assessment (IOCTA) 2021 </p><p><a href='https://www.europol.europa.eu/publications-events/main-reports/internet-organised-crime-threat-assessment-iocta-2021 '>https://www.europol.europa.eu/publications-events/main-reports/internet-organised-crime-threat-assessment-iocta-2021 </a><br/><br/>The panel discussion is titled “Deploying AI in attack prevention and incident response” </p><p><a href='https://www.teiss.co.uk/teisstalk/deploying-ai-in-attack-prevention-and-incident-response'>https://www.teiss.co.uk/teisstalk/deploying-ai-in-attack-prevention-and-incident-response</a><br/><br/>This episode is hosted by Geoff White  </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/  '>https://www.linkedin.com/in/geoffwhitetech/  </a><br/><br/>Our Guests are </p><p>Philipp Amann, Head of Strategy, Europol - EC3 <br/><a href='https://www.linkedin.com/in/philippamann/ '>https://www.linkedin.com/in/philippamann/ </a><br/><br/>Alexandre Pieyre, Group Head of Information Security, IQ-EQ <br/><a href='https://www.linkedin.com/in/pieyrealexandre/ '>https://www.linkedin.com/in/pieyrealexandre/ </a><br/><br/>Alix Melchy, Vice President of Artificial Intelligence, Jumio <a href='https://www.linkedin.com/in/peamelchy/ '>https://www.linkedin.com/in/peamelchy/ </a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/><br/>On this episode, we focus on the following news story;<br/>Internet Organised Crime Threat Assessment (IOCTA) 2021 </p><p><a href='https://www.europol.europa.eu/publications-events/main-reports/internet-organised-crime-threat-assessment-iocta-2021 '>https://www.europol.europa.eu/publications-events/main-reports/internet-organised-crime-threat-assessment-iocta-2021 </a><br/><br/>The panel discussion is titled “Deploying AI in attack prevention and incident response” </p><p><a href='https://www.teiss.co.uk/teisstalk/deploying-ai-in-attack-prevention-and-incident-response'>https://www.teiss.co.uk/teisstalk/deploying-ai-in-attack-prevention-and-incident-response</a><br/><br/>This episode is hosted by Geoff White  </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/  '>https://www.linkedin.com/in/geoffwhitetech/  </a><br/><br/>Our Guests are </p><p>Philipp Amann, Head of Strategy, Europol - EC3 <br/><a href='https://www.linkedin.com/in/philippamann/ '>https://www.linkedin.com/in/philippamann/ </a><br/><br/>Alexandre Pieyre, Group Head of Information Security, IQ-EQ <br/><a href='https://www.linkedin.com/in/pieyrealexandre/ '>https://www.linkedin.com/in/pieyrealexandre/ </a><br/><br/>Alix Melchy, Vice President of Artificial Intelligence, Jumio <a href='https://www.linkedin.com/in/peamelchy/ '>https://www.linkedin.com/in/peamelchy/ </a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10423682-deploying-ai-in-attack-prevention-and-incident-response.mp3" length="35933776" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10423682</guid>
    <pubDate>Tue, 12 Apr 2022 12:00:00 +0100</pubDate>
    <itunes:duration>2989</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Maturing the CISO role</itunes:title>
    <title>Maturing the CISO role</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk   On this episode, we focus on the following news story;   Cyber-Criminals Exploit Invasion of Ukraine  https://www.infosecurity-magazine.com/news/cyber-criminals-invasion-ukraine/   The panel discussion is titled “Maturing the CISO role”  https://www.teiss.co.uk/teisstalk/maturing-the-ciso-role   This episode is hosted by ...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/><br/>On this episode, we focus on the following news story; <br/><br/>Cyber-Criminals Exploit Invasion of Ukraine <br/><a href='https://www.infosecurity-magazine.com/news/cyber-criminals-invasion-ukraine/'>https://www.infosecurity-magazine.com/news/cyber-criminals-invasion-ukraine/ <br/></a><br/>The panel discussion is titled “Maturing the CISO role” <br/><a href='https://www.teiss.co.uk/teisstalk/maturing-the-ciso-role '>https://www.teiss.co.uk/teisstalk/maturing-the-ciso-role </a></p><p> This episode is hosted by Geoff White <br/><a href='https://www.linkedin.com/in/geoffwhitetech/  '>https://www.linkedin.com/in/geoffwhitetech/  <br/></a><br/>Our Guests are </p><p>John Rouffas, Chief Information Security Officer, intelliflo <a href='https://www.linkedin.com/in/drjohnrouffas/ '>https://www.linkedin.com/in/drjohnrouffas/ </a><br/><br/>Matthew Bryant, Chief Information Security Officer, 118 118 Money <a href='https://www.linkedin.com/in/matthewbryant/ '>https://www.linkedin.com/in/matthewbryant/ </a><br/><br/>Stephen Moore, Vice President and Chief Security Strategist, Exabeam <a href='https://www.linkedin.com/in/stephenrmoore/'>https://www.linkedin.com/in/stephenrmoore/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/><br/>On this episode, we focus on the following news story; <br/><br/>Cyber-Criminals Exploit Invasion of Ukraine <br/><a href='https://www.infosecurity-magazine.com/news/cyber-criminals-invasion-ukraine/'>https://www.infosecurity-magazine.com/news/cyber-criminals-invasion-ukraine/ <br/></a><br/>The panel discussion is titled “Maturing the CISO role” <br/><a href='https://www.teiss.co.uk/teisstalk/maturing-the-ciso-role '>https://www.teiss.co.uk/teisstalk/maturing-the-ciso-role </a></p><p> This episode is hosted by Geoff White <br/><a href='https://www.linkedin.com/in/geoffwhitetech/  '>https://www.linkedin.com/in/geoffwhitetech/  <br/></a><br/>Our Guests are </p><p>John Rouffas, Chief Information Security Officer, intelliflo <a href='https://www.linkedin.com/in/drjohnrouffas/ '>https://www.linkedin.com/in/drjohnrouffas/ </a><br/><br/>Matthew Bryant, Chief Information Security Officer, 118 118 Money <a href='https://www.linkedin.com/in/matthewbryant/ '>https://www.linkedin.com/in/matthewbryant/ </a><br/><br/>Stephen Moore, Vice President and Chief Security Strategist, Exabeam <a href='https://www.linkedin.com/in/stephenrmoore/'>https://www.linkedin.com/in/stephenrmoore/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10402085-maturing-the-ciso-role.mp3" length="33947254" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10402085</guid>
    <pubDate>Fri, 08 Apr 2022 12:00:00 +0100</pubDate>
    <itunes:duration>2823</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Log4j marathon - where are we and what comes next?</itunes:title>
    <title>The Log4j marathon - where are we and what comes next?</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk   On this episode, we focus on the following news story;   As Tanks Rolled Into Ukraine, So Did Malware. Then Microsoft Entered the War.  https://www.nytimes.com/2022/02/28/us/politics/ukraine-russia-microsoft.html   The panel discussion is titled “The Log4j marathon - where are we and what comes next?” https://www.teiss.co.uk/teisst...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/><br/>On this episode, we focus on the following news story; <br/><br/>As Tanks Rolled Into Ukraine, So Did Malware. Then Microsoft Entered the War. <br/><a href='https://www.nytimes.com/2022/02/28/us/politics/ukraine-russia-microsoft.html'>https://www.nytimes.com/2022/02/28/us/politics/ukraine-russia-microsoft.html</a> <br/><br/>The panel discussion is titled “The Log4j marathon - where are we and what comes next?” <a href='https://www.teiss.co.uk/teisstalk/the-log4j-marathon---where-are-we-and-what-comes-next'>https://www.teiss.co.uk/teisstalk/the-log4j-marathon---where-are-we-and-what-comes-next</a> <br/><br/>This episode is hosted by Geoff White  <br/><a href='https://www.linkedin.com/in/geoffwhitetech/ '>https://www.linkedin.com/in/geoffwhitetech/ </a> <br/><br/>Our Guests are <br/><br/>Sarah Armstrong Smith, Chief Security Advisor, Microsoft <a href='https://www.linkedin.com/in/sarah-armstrong-smith'>https://www.linkedin.com/in/sarah-armstrong-smith</a> <br/><br/>Garry Scobie, Deputy Chief Information Security Officer, The University of Edinburgh <a href='https://uk.linkedin.com/in/garry-scobie'>https://uk.linkedin.com/in/garry-scobie</a> <br/><br/>Jamie Moles, Senior Technical Marketing Manager, ExtraHop <a href='https://www.linkedin.com/in/jamiemoles '>https://www.linkedin.com/in/jamiemoles </a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/><br/>On this episode, we focus on the following news story; <br/><br/>As Tanks Rolled Into Ukraine, So Did Malware. Then Microsoft Entered the War. <br/><a href='https://www.nytimes.com/2022/02/28/us/politics/ukraine-russia-microsoft.html'>https://www.nytimes.com/2022/02/28/us/politics/ukraine-russia-microsoft.html</a> <br/><br/>The panel discussion is titled “The Log4j marathon - where are we and what comes next?” <a href='https://www.teiss.co.uk/teisstalk/the-log4j-marathon---where-are-we-and-what-comes-next'>https://www.teiss.co.uk/teisstalk/the-log4j-marathon---where-are-we-and-what-comes-next</a> <br/><br/>This episode is hosted by Geoff White  <br/><a href='https://www.linkedin.com/in/geoffwhitetech/ '>https://www.linkedin.com/in/geoffwhitetech/ </a> <br/><br/>Our Guests are <br/><br/>Sarah Armstrong Smith, Chief Security Advisor, Microsoft <a href='https://www.linkedin.com/in/sarah-armstrong-smith'>https://www.linkedin.com/in/sarah-armstrong-smith</a> <br/><br/>Garry Scobie, Deputy Chief Information Security Officer, The University of Edinburgh <a href='https://uk.linkedin.com/in/garry-scobie'>https://uk.linkedin.com/in/garry-scobie</a> <br/><br/>Jamie Moles, Senior Technical Marketing Manager, ExtraHop <a href='https://www.linkedin.com/in/jamiemoles '>https://www.linkedin.com/in/jamiemoles </a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10396280-the-log4j-marathon-where-are-we-and-what-comes-next.mp3" length="37088282" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10396280</guid>
    <pubDate>Thu, 07 Apr 2022 13:00:00 +0100</pubDate>
    <itunes:duration>3085</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Protecting your key people from their own mistakes</itunes:title>
    <title>Protecting your key people from their own mistakes</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk   On this episode, we focus on the following news story;  7 Steps to Take Right Now to Prepare for Cyberattacks by Russia  https://www.darkreading.com/threat-intelligence/7-steps-to-take-right-now-to-prepare-for-cyberattacks-by-russia   The panel discussion is titled “Protecting your key people from their own mist...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/><br/>On this episode, we focus on the following news story; <br/>7 Steps to Take Right Now to Prepare for Cyberattacks by Russia </p><p><a href='https://www.darkreading.com/threat-intelligence/7-steps-to-take-right-now-to-prepare-for-cyberattacks-by-russia '>https://www.darkreading.com/threat-intelligence/7-steps-to-take-right-now-to-prepare-for-cyberattacks-by-russia </a><br/><br/>The panel discussion is titled “Protecting your key people from their own mistakes” <br/><a href='https://www.teiss.co.uk/teisstalk/protecting-your-key-people-from-social-engineering '>https://www.teiss.co.uk/teisstalk/protecting-your-key-people-from-social-engineering </a></p><p>This episode is hosted by Jenny Radcliffe  <br/><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  '>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </a><br/><br/>Our Guests are </p><p>Keil Hubert, Head of Security Awareness &amp; Training, OCC <a href='https://www.linkedin.com/in/khubert/ '>https://www.linkedin.com/in/khubert/ </a><br/><br/>Bernard Swierczyna, Chief Information Security Officer, Vivid Money Ireland <a href='https://www.linkedin.com/in/bernard-swierczyna/ '>https://www.linkedin.com/in/bernard-swierczyna/ </a><br/><br/>Robert Fleming, Chief Marketing Officer, Zivver <br/><a href='https://www.linkedin.com/in/robert-fleming-1a49571 '>https://www.linkedin.com/in/robert-fleming-1a49571 </a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/><br/>On this episode, we focus on the following news story; <br/>7 Steps to Take Right Now to Prepare for Cyberattacks by Russia </p><p><a href='https://www.darkreading.com/threat-intelligence/7-steps-to-take-right-now-to-prepare-for-cyberattacks-by-russia '>https://www.darkreading.com/threat-intelligence/7-steps-to-take-right-now-to-prepare-for-cyberattacks-by-russia </a><br/><br/>The panel discussion is titled “Protecting your key people from their own mistakes” <br/><a href='https://www.teiss.co.uk/teisstalk/protecting-your-key-people-from-social-engineering '>https://www.teiss.co.uk/teisstalk/protecting-your-key-people-from-social-engineering </a></p><p>This episode is hosted by Jenny Radcliffe  <br/><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  '>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </a><br/><br/>Our Guests are </p><p>Keil Hubert, Head of Security Awareness &amp; Training, OCC <a href='https://www.linkedin.com/in/khubert/ '>https://www.linkedin.com/in/khubert/ </a><br/><br/>Bernard Swierczyna, Chief Information Security Officer, Vivid Money Ireland <a href='https://www.linkedin.com/in/bernard-swierczyna/ '>https://www.linkedin.com/in/bernard-swierczyna/ </a><br/><br/>Robert Fleming, Chief Marketing Officer, Zivver <br/><a href='https://www.linkedin.com/in/robert-fleming-1a49571 '>https://www.linkedin.com/in/robert-fleming-1a49571 </a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10388824-protecting-your-key-people-from-their-own-mistakes.mp3" length="35140352" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-10388824</guid>
    <pubDate>Wed, 06 Apr 2022 12:00:00 +0100</pubDate>
    <itunes:duration>2923</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How resilient is your data?</itunes:title>
    <title>How resilient is your data?</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk   On this episode, we focus on the following news story;  Over 20,000 data center management systems exposed to hackers  https://www.bleepingcomputer.com/news/security/over-20-000-data-center-management-systems-exposed-to-hackers/   The panel discussion is titled “How resilient is your data?”  https://www.teiss.co.uk/teisstalk/h...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/><br/>On this episode, we focus on the following news story; <br/>Over 20,000 data center management systems exposed to hackers <br/><a href='https://www.bleepingcomputer.com/news/security/over-20-000-data-center-management-systems-exposed-to-hackers/ '>https://www.bleepingcomputer.com/news/security/over-20-000-data-center-management-systems-exposed-to-hackers/ </a><br/><br/>The panel discussion is titled “How resilient is your data?” <br/><a href='https://www.teiss.co.uk/teisstalk/how-resilient-is-your-data/ '>https://www.teiss.co.uk/teisstalk/how-resilient-is-your-data/ </a><br/><br/>This episode is hosted by Geoff White  <br/><a href='https://www.linkedin.com/in/geoffwhitetech/ '>https://www.linkedin.com/in/geoffwhitetech/ </a><br/> <br/>Our Guests are <br/><br/>Steve Wright, CEO, Privacy Culture <br/><a href='https://www.linkedin.com/in/stevewright1970/ '>https://www.linkedin.com/in/stevewright1970/ </a><br/><br/>Morgan O&apos;Neill, Director, Data Protection Services, Thorntons Law LLP <a href='https://www.linkedin.com/in/morgan-o-neill-35529b67/ '>https://www.linkedin.com/in/morgan-o-neill-35529b67/ </a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/><br/>On this episode, we focus on the following news story; <br/>Over 20,000 data center management systems exposed to hackers <br/><a href='https://www.bleepingcomputer.com/news/security/over-20-000-data-center-management-systems-exposed-to-hackers/ '>https://www.bleepingcomputer.com/news/security/over-20-000-data-center-management-systems-exposed-to-hackers/ </a><br/><br/>The panel discussion is titled “How resilient is your data?” <br/><a href='https://www.teiss.co.uk/teisstalk/how-resilient-is-your-data/ '>https://www.teiss.co.uk/teisstalk/how-resilient-is-your-data/ </a><br/><br/>This episode is hosted by Geoff White  <br/><a href='https://www.linkedin.com/in/geoffwhitetech/ '>https://www.linkedin.com/in/geoffwhitetech/ </a><br/> <br/>Our Guests are <br/><br/>Steve Wright, CEO, Privacy Culture <br/><a href='https://www.linkedin.com/in/stevewright1970/ '>https://www.linkedin.com/in/stevewright1970/ </a><br/><br/>Morgan O&apos;Neill, Director, Data Protection Services, Thorntons Law LLP <a href='https://www.linkedin.com/in/morgan-o-neill-35529b67/ '>https://www.linkedin.com/in/morgan-o-neill-35529b67/ </a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10381245-how-resilient-is-your-data.mp3" length="35212406" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10381245</guid>
    <pubDate>Tue, 05 Apr 2022 10:00:00 +0100</pubDate>
    <itunes:duration>2929</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Protecting your infosec colleagues during a crisis</itunes:title>
    <title>Protecting your infosec colleagues during a crisis</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk   On this episode, we focus on the following news story;  Overworked CISOs are Skipping Family Vacations and Holidays  https://www.infosecurity-magazine.com/news/overworked-cisos-are-skipping/    The panel discussion is titled “Protecting your infosec colleagues during a crisis”  https://www.teiss.co.uk/teisstalk/protecting-your...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/><br/>On this episode, we focus on the following news story; <br/>Overworked CISOs are Skipping Family Vacations and Holidays <br/><a href='https://www.infosecurity-magazine.com/news/overworked-cisos-are-skipping/ '>https://www.infosecurity-magazine.com/news/overworked-cisos-are-skipping/ </a><br/><br/></p><p>The panel discussion is titled “Protecting your infosec colleagues during a crisis” <br/><a href='https://www.teiss.co.uk/teisstalk/protecting-your-infosec-colleagues-during-a-crisis/ '>https://www.teiss.co.uk/teisstalk/protecting-your-infosec-colleagues-during-a-crisis/ </a><br/> <br/>This episode is hosted by Jenny Radcliffe  <br/><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a>  <br/><br/>Our Guests are <br/><br/>Kerissa Varma, Managing Executive - Cyber Security, Vodacom Group <br/><a href='https://www.linkedin.com/in/kerissavarma/ '>https://www.linkedin.com/in/kerissavarma/ </a><br/><br/>Sarah Norman-Clarke, Head of Information and Cyber Security, Department for Transport <br/><a href='https://www.linkedin.com/in/sarah-norman-clarke-8b9b0434 '>https://www.linkedin.com/in/sarah-norman-clarke-8b9b0434 </a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/><br/>On this episode, we focus on the following news story; <br/>Overworked CISOs are Skipping Family Vacations and Holidays <br/><a href='https://www.infosecurity-magazine.com/news/overworked-cisos-are-skipping/ '>https://www.infosecurity-magazine.com/news/overworked-cisos-are-skipping/ </a><br/><br/></p><p>The panel discussion is titled “Protecting your infosec colleagues during a crisis” <br/><a href='https://www.teiss.co.uk/teisstalk/protecting-your-infosec-colleagues-during-a-crisis/ '>https://www.teiss.co.uk/teisstalk/protecting-your-infosec-colleagues-during-a-crisis/ </a><br/> <br/>This episode is hosted by Jenny Radcliffe  <br/><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a>  <br/><br/>Our Guests are <br/><br/>Kerissa Varma, Managing Executive - Cyber Security, Vodacom Group <br/><a href='https://www.linkedin.com/in/kerissavarma/ '>https://www.linkedin.com/in/kerissavarma/ </a><br/><br/>Sarah Norman-Clarke, Head of Information and Cyber Security, Department for Transport <br/><a href='https://www.linkedin.com/in/sarah-norman-clarke-8b9b0434 '>https://www.linkedin.com/in/sarah-norman-clarke-8b9b0434 </a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10381104-protecting-your-infosec-colleagues-during-a-crisis.mp3" length="35867289" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10381104</guid>
    <pubDate>Tue, 05 Apr 2022 10:00:00 +0100</pubDate>
    <itunes:duration>2983</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Quantifying and qualifying the value of your data</itunes:title>
    <title>Quantifying and qualifying the value of your data</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk   On this episode, we focus on the following news story;  Meta threatens to shut down Facebook, Instagram in Europe over data regulations  https://www.teiss.co.uk/news/meta-threatens-to-shut-down-facebook-instagram-in-europe-over-data-regulations-9532    The panel discussion is titled “Quantifying the value of your data”  https:...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/><br/>On this episode, we focus on the following news story; <br/>Meta threatens to shut down Facebook, Instagram in Europe over data regulations <br/><a href='https://www.teiss.co.uk/news/meta-threatens-to-shut-down-facebook-instagram-in-europe-over-data-regulations-9532'>https://www.teiss.co.uk/news/meta-threatens-to-shut-down-facebook-instagram-in-europe-over-data-regulations-9532</a> <br/><br/></p><p>The panel discussion is titled “Quantifying the value of your data” <br/><a href='https://www.teiss.co.uk/teisstalk/quantifying-the-value-of-your-data/'>https://www.teiss.co.uk/teisstalk/quantifying-the-value-of-your-data/</a> <br/><br/></p><p>This episode is hosted by Geoff White  <br/><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a>  <br/><br/>Our Guests are <br/>Veroniki Stamati, Information Security and Privacy Engineering Lead, Skyscanner <br/><a href='https://www.linkedin.com/in/vstamati/'>https://www.linkedin.com/in/vstamati/</a> </p><p>Craig McEwen, Chief Information Security Officer, Anglo American <br/><a href='https://www.linkedin.com/in/craigjmcewen/'>https://www.linkedin.com/in/craigjmcewen/</a>  </p><p>Andrew Rawlins-Catterall, Group Data Protection Officer, VDS Insurance <br/><a href='https://www.linkedin.com/in/andrew-r-c/'>https://www.linkedin.com/in/andrew-r-c/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> <br/><br/>On this episode, we focus on the following news story; <br/>Meta threatens to shut down Facebook, Instagram in Europe over data regulations <br/><a href='https://www.teiss.co.uk/news/meta-threatens-to-shut-down-facebook-instagram-in-europe-over-data-regulations-9532'>https://www.teiss.co.uk/news/meta-threatens-to-shut-down-facebook-instagram-in-europe-over-data-regulations-9532</a> <br/><br/></p><p>The panel discussion is titled “Quantifying the value of your data” <br/><a href='https://www.teiss.co.uk/teisstalk/quantifying-the-value-of-your-data/'>https://www.teiss.co.uk/teisstalk/quantifying-the-value-of-your-data/</a> <br/><br/></p><p>This episode is hosted by Geoff White  <br/><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a>  <br/><br/>Our Guests are <br/>Veroniki Stamati, Information Security and Privacy Engineering Lead, Skyscanner <br/><a href='https://www.linkedin.com/in/vstamati/'>https://www.linkedin.com/in/vstamati/</a> </p><p>Craig McEwen, Chief Information Security Officer, Anglo American <br/><a href='https://www.linkedin.com/in/craigjmcewen/'>https://www.linkedin.com/in/craigjmcewen/</a>  </p><p>Andrew Rawlins-Catterall, Group Data Protection Officer, VDS Insurance <br/><a href='https://www.linkedin.com/in/andrew-r-c/'>https://www.linkedin.com/in/andrew-r-c/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10352606-quantifying-and-qualifying-the-value-of-your-data.mp3" length="33996502" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10352606</guid>
    <pubDate>Thu, 31 Mar 2022 11:00:00 +0100</pubDate>
    <itunes:duration>2827</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Quantifying the value of your data </itunes:title>
    <title>teissTalk: Quantifying the value of your data </title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk  On this episode, we focus on the following news story;  Meta threatens to shut down Facebook, Instagram in Europe over data regulations  https://www.teiss.co.uk/news/meta-threatens-to-shut-down-facebook-instagram-in-europe-over-data-regulations-9532   The panel discussion is titled “Quantifying the value of your ...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p>Meta threatens to shut down Facebook, Instagram in Europe over data regulations </p><p>https://www.teiss.co.uk/news/meta-threatens-to-shut-down-facebook-instagram-in-europe-over-data-regulations-9532 </p><p><br/>The panel discussion is titled “Quantifying the value of your data” </p><p>https://www.teiss.co.uk/teisstalk/quantifying-the-value-of-your-data/ </p><p>This episode is hosted by Geoff White  </p><p>https://www.linkedin.com/in/geoffwhitetech/  <br/><br/></p><p>Our Guests are </p><p>Veroniki Stamati, Information Security and Privacy Engineering Lead, Skyscanner </p><p>https://www.linkedin.com/in/vstamati/ </p><p>Craig McEwen, Chief Information Security Officer, Anglo American </p><p>https://www.linkedin.com/in/craigjmcewen/ </p><p>Andrew Rawlins-Catterall, Group Data Protection Officer, VDS Insurance </p><p>https://www.linkedin.com/in/andrew-r-c/ </p><p> </p><p> </p><p> </p><p> </p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a> </p><p>On this episode, we focus on the following news story; </p><p>Meta threatens to shut down Facebook, Instagram in Europe over data regulations </p><p>https://www.teiss.co.uk/news/meta-threatens-to-shut-down-facebook-instagram-in-europe-over-data-regulations-9532 </p><p><br/>The panel discussion is titled “Quantifying the value of your data” </p><p>https://www.teiss.co.uk/teisstalk/quantifying-the-value-of-your-data/ </p><p>This episode is hosted by Geoff White  </p><p>https://www.linkedin.com/in/geoffwhitetech/  <br/><br/></p><p>Our Guests are </p><p>Veroniki Stamati, Information Security and Privacy Engineering Lead, Skyscanner </p><p>https://www.linkedin.com/in/vstamati/ </p><p>Craig McEwen, Chief Information Security Officer, Anglo American </p><p>https://www.linkedin.com/in/craigjmcewen/ </p><p>Andrew Rawlins-Catterall, Group Data Protection Officer, VDS Insurance </p><p>https://www.linkedin.com/in/andrew-r-c/ </p><p> </p><p> </p><p> </p><p> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10345309-teisstalk-quantifying-the-value-of-your-data.mp3" length="33993069" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10345309</guid>
    <pubDate>Wed, 30 Mar 2022 10:00:00 +0100</pubDate>
    <itunes:duration>2827</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Next level cyber hygiene for SMEs</itunes:title>
    <title>teissTalk: Next level cyber hygiene for SMEs</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/teisstalk   On this episode, we focus on the following news story; Microsoft: Multifactor Adoption Remains Low https://www.darkreading.com/operations/microsoft-multifactor-adoption-remains-low   The panel discussion is titled “Next level cyber hygiene for SMEs” https://www.teiss.co.uk/teisstalk/next-level-cyber-hygiene-for-smes/ &nbs...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Microsoft: Multifactor Adoption Remains Low</p><p>https://www.darkreading.com/operations/microsoft-multifactor-adoption-remains-low</p><p> </p><p>The panel discussion is titled “Next level cyber hygiene for SMEs”</p><p>https://www.teiss.co.uk/teisstalk/next-level-cyber-hygiene-for-smes/</p><p> </p><p>This episode is hosted by Geoff White </p><p>https://www.linkedin.com/in/geoffwhitetech/ </p><p> </p><p>Our Guests are</p><p>Lessie Longstreet, Global Director of Outreach and Partner Engagement, Cyber Readiness Institute</p><p>https://www.linkedin.com/in/lessie-longstreet-2b7460bb/</p><p> </p><p>Kevin Curran, Professor of Cyber Security, University of Ulster</p><p>https://www.linkedin.com/in/profkevincurran/</p><p> </p><p>Steven Furnell, Professor of Cyber Security, University of Nottingham</p><p>https://www.linkedin.com/in/stevenfurnell</p><p> </p><p>Vladimir Jirasek, Founder &amp; CEO, Foresight Cyber</p><p>https://www.linkedin.com/in/vladimirjirasek</p><p> </p><p> </p><p> </p><p><br/><br/></p><p> </p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/teisstalk'>www.teiss.co.uk/teisstalk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Microsoft: Multifactor Adoption Remains Low</p><p>https://www.darkreading.com/operations/microsoft-multifactor-adoption-remains-low</p><p> </p><p>The panel discussion is titled “Next level cyber hygiene for SMEs”</p><p>https://www.teiss.co.uk/teisstalk/next-level-cyber-hygiene-for-smes/</p><p> </p><p>This episode is hosted by Geoff White </p><p>https://www.linkedin.com/in/geoffwhitetech/ </p><p> </p><p>Our Guests are</p><p>Lessie Longstreet, Global Director of Outreach and Partner Engagement, Cyber Readiness Institute</p><p>https://www.linkedin.com/in/lessie-longstreet-2b7460bb/</p><p> </p><p>Kevin Curran, Professor of Cyber Security, University of Ulster</p><p>https://www.linkedin.com/in/profkevincurran/</p><p> </p><p>Steven Furnell, Professor of Cyber Security, University of Nottingham</p><p>https://www.linkedin.com/in/stevenfurnell</p><p> </p><p>Vladimir Jirasek, Founder &amp; CEO, Foresight Cyber</p><p>https://www.linkedin.com/in/vladimirjirasek</p><p> </p><p> </p><p> </p><p><br/><br/></p><p> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10331097-teisstalk-next-level-cyber-hygiene-for-smes.mp3" length="33987109" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10331097</guid>
    <pubDate>Tue, 29 Mar 2022 06:00:00 +0100</pubDate>
    <itunes:duration>2827</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Zero Trust in your supply chain </itunes:title>
    <title>teissTalk: Zero Trust in your supply chain </title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk    On this episode, we focus on the following news story;  White House Releases Zero Trust Strategy for Federal Government  https://www.teiss.co.uk/news/news-scroller/white-house-releases-a-federal-strategy-to-adopt-a-zero-trust-approach-9502    The panel discussion is titled “Zero Trust in your supply chain”...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>White House Releases Zero Trust Strategy for Federal Government </p><p>https://www.teiss.co.uk/news/news-scroller/white-house-releases-a-federal-strategy-to-adopt-a-zero-trust-approach-9502 </p><p> </p><p>The panel discussion is titled “Zero Trust in your supply chain” </p><p>https://www.teiss.co.uk/teisstalk/zero-trust-in-your-supply-chain/ </p><p> </p><p>This episode is hosted by Geoff White  </p><p>https://www.linkedin.com/in/geoffwhitetech/  </p><p> </p><p>Our Guests are </p><p>Jay Moloo, Corporate Information Security Officer, DB Schenker </p><p>https://www.linkedin.com/in/jaymoloo/ </p><p> </p><p>Sebastian Avarvarei, Information Security Manager, Canon </p><p>https://www.linkedin.com/in/sebastianavarvarei/ </p><p> </p><p>Jason Soroko, CTO of PKI, Sectigo </p><p>https://www.linkedin.com/in/jason-soroko-19b41920/ </p><p> </p><p> </p><p> </p><p> </p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>White House Releases Zero Trust Strategy for Federal Government </p><p>https://www.teiss.co.uk/news/news-scroller/white-house-releases-a-federal-strategy-to-adopt-a-zero-trust-approach-9502 </p><p> </p><p>The panel discussion is titled “Zero Trust in your supply chain” </p><p>https://www.teiss.co.uk/teisstalk/zero-trust-in-your-supply-chain/ </p><p> </p><p>This episode is hosted by Geoff White  </p><p>https://www.linkedin.com/in/geoffwhitetech/  </p><p> </p><p>Our Guests are </p><p>Jay Moloo, Corporate Information Security Officer, DB Schenker </p><p>https://www.linkedin.com/in/jaymoloo/ </p><p> </p><p>Sebastian Avarvarei, Information Security Manager, Canon </p><p>https://www.linkedin.com/in/sebastianavarvarei/ </p><p> </p><p>Jason Soroko, CTO of PKI, Sectigo </p><p>https://www.linkedin.com/in/jason-soroko-19b41920/ </p><p> </p><p> </p><p> </p><p> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10282883-teisstalk-zero-trust-in-your-supply-chain.mp3" length="36227159" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10282883</guid>
    <pubDate>Tue, 22 Mar 2022 06:00:00 +0000</pubDate>
    <itunes:duration>3013</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Tracking your joiners, movers and leavers (JMLs) in the world of hybrid work </itunes:title>
    <title>teissTalk: Tracking your joiners, movers and leavers (JMLs) in the world of hybrid work </title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk  On this episode, we focus on the following news story;  Home Working Drives 44% Surge in Insider Threats  https://www.infosecurity-magazine.com/news/home-working-drives-44-surge-in/    The panel discussion is titled “Tracking your joiners, movers and leavers (JMLs) in the world of hybrid work”  https://www.teiss....]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p>On this episode, we focus on the following news story; </p><p>Home Working Drives 44% Surge in Insider Threats </p><p>https://www.infosecurity-magazine.com/news/home-working-drives-44-surge-in/ <br/><br/></p><p>The panel discussion is titled “Tracking your joiners, movers and leavers (JMLs) in the world of hybrid work” </p><p>https://www.teiss.co.uk/teisstalk/tracking-your-joiners-movers-and-leavers-jmls-in-the-world-of-hybrid-work </p><p> </p><p>This episode is hosted by Jenny Radcliffe  </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </p><p> </p><p>Our Guests are </p><p>Sarah Norman-Clarke, Head of Information and Cyber Security, Department for Transport </p><p>https://www.linkedin.com/in/sarah-norman-clarke-8b9b0434 </p><p> </p><p>Alain De Maght, Chief Information Security Officer &amp; Data Protection Officer, Hôpitaux Iris Sud - Iris Ziekenhuizen Zuid </p><p>https://www.linkedin.com/in/alaindemaght </p><p> </p><p>Ian Lowe, Head of Industry Solutions, Okta </p><p>https://www.linkedin.com/in/imlowe </p><p> </p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p>On this episode, we focus on the following news story; </p><p>Home Working Drives 44% Surge in Insider Threats </p><p>https://www.infosecurity-magazine.com/news/home-working-drives-44-surge-in/ <br/><br/></p><p>The panel discussion is titled “Tracking your joiners, movers and leavers (JMLs) in the world of hybrid work” </p><p>https://www.teiss.co.uk/teisstalk/tracking-your-joiners-movers-and-leavers-jmls-in-the-world-of-hybrid-work </p><p> </p><p>This episode is hosted by Jenny Radcliffe  </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </p><p> </p><p>Our Guests are </p><p>Sarah Norman-Clarke, Head of Information and Cyber Security, Department for Transport </p><p>https://www.linkedin.com/in/sarah-norman-clarke-8b9b0434 </p><p> </p><p>Alain De Maght, Chief Information Security Officer &amp; Data Protection Officer, Hôpitaux Iris Sud - Iris Ziekenhuizen Zuid </p><p>https://www.linkedin.com/in/alaindemaght </p><p> </p><p>Ian Lowe, Head of Industry Solutions, Okta </p><p>https://www.linkedin.com/in/imlowe </p><p> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10201738-teisstalk-tracking-your-joiners-movers-and-leavers-jmls-in-the-world-of-hybrid-work.mp3" length="33012934" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10201738</guid>
    <pubDate>Mon, 07 Mar 2022 08:00:00 +0000</pubDate>
    <itunes:duration>2745</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Getting the Board on board </itunes:title>
    <title>teissTalk: Getting the Board on board </title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk    On this episode, we focus on the following news story;  Data Protection concerns all of us  https://edps.europa.eu/press-publications/press-news/blog/data-protection-concerns-all-us_en    The panel discussion is titled “Getting the Board on board”  https://www.teiss.co.uk/teisstalk/getting-the-board-o...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>Data Protection concerns all of us </p><p>https://edps.europa.eu/press-publications/press-news/blog/data-protection-concerns-all-us_en </p><p> </p><p>The panel discussion is titled “Getting the Board on board” </p><p>https://www.teiss.co.uk/teisstalk/getting-the-board-on-board/ </p><p> </p><p>This episode is hosted by Jenny Radcliffe  </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </p><p> </p><p>Our Guests are </p><p>Jon Herd, VP of Information Security, Paddle </p><p>https://www.linkedin.com/in/jonherd </p><p> </p><p>Chris Dunning-Walton, Founder &amp; MD, InfoSec People </p><p>https://www.linkedin.com/in/chrisdw/ </p><p> </p><p>Henry Jiang, Chief Information Security Officer, Diligent </p><p>https://www.linkedin.com/in/henry-jiang-9184211/ </p><p> </p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>Data Protection concerns all of us </p><p>https://edps.europa.eu/press-publications/press-news/blog/data-protection-concerns-all-us_en </p><p> </p><p>The panel discussion is titled “Getting the Board on board” </p><p>https://www.teiss.co.uk/teisstalk/getting-the-board-on-board/ </p><p> </p><p>This episode is hosted by Jenny Radcliffe  </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </p><p> </p><p>Our Guests are </p><p>Jon Herd, VP of Information Security, Paddle </p><p>https://www.linkedin.com/in/jonherd </p><p> </p><p>Chris Dunning-Walton, Founder &amp; MD, InfoSec People </p><p>https://www.linkedin.com/in/chrisdw/ </p><p> </p><p>Henry Jiang, Chief Information Security Officer, Diligent </p><p>https://www.linkedin.com/in/henry-jiang-9184211/ </p><p> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10113523-teisstalk-getting-the-board-on-board.mp3" length="34199316" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10113523</guid>
    <pubDate>Mon, 21 Feb 2022 09:00:00 +0000</pubDate>
    <itunes:duration>2844</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Developing a people-centric security programme</itunes:title>
    <title>teissTalk: Developing a people-centric security programme</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; Security awareness training: Top challenges and what to do about them https://www.securitymagazine.com/articles/96565-security-awareness-training-top-challenges-and-what-to-do-about-them   The panel discussion is titled “Developing a people-centric security programme” http...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Security awareness training: Top challenges and what to do about them</p><p>https://www.securitymagazine.com/articles/96565-security-awareness-training-top-challenges-and-what-to-do-about-them</p><p> </p><p>The panel discussion is titled “Developing a people-centric security programme”</p><p>https://www.teiss.co.uk/teisstalk/developing-a-people-centric-security-programme/</p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/ </p><p> </p><p>Our Guests are</p><p>Lydie Ngo Nogol, Chief Information Security Officer, PwC</p><p>https://www.linkedin.com/in/lydie-ngonogol/</p><p> </p><p>Helen Rabe, Global Chief Information Security Officer, Abcam</p><p>https://www.linkedin.com/in/helenrabe/</p><p> </p><p>Christian Toon, Chief Information Security Officer, Pinsent Masons</p><p>https://www.linkedin.com/in/christiantoon</p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Security awareness training: Top challenges and what to do about them</p><p>https://www.securitymagazine.com/articles/96565-security-awareness-training-top-challenges-and-what-to-do-about-them</p><p> </p><p>The panel discussion is titled “Developing a people-centric security programme”</p><p>https://www.teiss.co.uk/teisstalk/developing-a-people-centric-security-programme/</p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/ </p><p> </p><p>Our Guests are</p><p>Lydie Ngo Nogol, Chief Information Security Officer, PwC</p><p>https://www.linkedin.com/in/lydie-ngonogol/</p><p> </p><p>Helen Rabe, Global Chief Information Security Officer, Abcam</p><p>https://www.linkedin.com/in/helenrabe/</p><p> </p><p>Christian Toon, Chief Information Security Officer, Pinsent Masons</p><p>https://www.linkedin.com/in/christiantoon</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/10026542-teisstalk-developing-a-people-centric-security-programme.mp3" length="36876382" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10026542</guid>
    <pubDate>Mon, 07 Feb 2022 12:00:00 +0000</pubDate>
    <itunes:duration>3067</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Transferring risk – what should your cyber insurance cover?</itunes:title>
    <title>teissTalk: Transferring risk – what should your cyber insurance cover?</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk    On this episode, we focus on the following news story;  How ransomware is destabilising cyber insurance – and what to do about it  https://www.intelligentciso.com/2022/01/05/how-ransomware-is-destabilising-cyber-insurance-and-what-to-do-about-it/#    The panel discussion is titled “Transferring risk - what...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>How ransomware is destabilising cyber insurance – and what to do about it </p><p>https://www.intelligentciso.com/2022/01/05/how-ransomware-is-destabilising-cyber-insurance-and-what-to-do-about-it/# </p><p> </p><p>The panel discussion is titled “Transferring risk - what should your cyber insurance cover?” </p><p>https://www.teiss.co.uk/teisstalk/transferring-risk-what-should-your-cyber-insurance-cover/ </p><p> </p><p>This episode is hosted by Geoff White  </p><p>https://www.linkedin.com/in/geoffwhitetech/  </p><p> </p><p>Our Guests are </p><p>James Tuplin, Head of Cyber, Mosaic Insurance </p><p>https://www.linkedin.com/in/james-tuplin-9b24a29/ </p><p> </p><p>Joe Hancock, Partner (non-lawyer) and Head of MDR Cyber, Mishcon de Reya </p><p>https://www.linkedin.com/in/joehancock/ </p><p> </p><p>Sebastian Avarvarei, Information Security Manager, Canon </p><p>https://www.linkedin.com/in/sebastianavarvarei/ </p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>How ransomware is destabilising cyber insurance – and what to do about it </p><p>https://www.intelligentciso.com/2022/01/05/how-ransomware-is-destabilising-cyber-insurance-and-what-to-do-about-it/# </p><p> </p><p>The panel discussion is titled “Transferring risk - what should your cyber insurance cover?” </p><p>https://www.teiss.co.uk/teisstalk/transferring-risk-what-should-your-cyber-insurance-cover/ </p><p> </p><p>This episode is hosted by Geoff White  </p><p>https://www.linkedin.com/in/geoffwhitetech/  </p><p> </p><p>Our Guests are </p><p>James Tuplin, Head of Cyber, Mosaic Insurance </p><p>https://www.linkedin.com/in/james-tuplin-9b24a29/ </p><p> </p><p>Joe Hancock, Partner (non-lawyer) and Head of MDR Cyber, Mishcon de Reya </p><p>https://www.linkedin.com/in/joehancock/ </p><p> </p><p>Sebastian Avarvarei, Information Security Manager, Canon </p><p>https://www.linkedin.com/in/sebastianavarvarei/ </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9991955-teisstalk-transferring-risk-what-should-your-cyber-insurance-cover.mp3" length="34937287" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9991955</guid>
    <pubDate>Tue, 01 Feb 2022 15:00:00 +0000</pubDate>
    <itunes:duration>2906</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Bridge builders – two new security roles that are your next essential appointments</itunes:title>
    <title>teissTalk: Bridge builders – two new security roles that are your next essential appointments</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; Russia arrests REvil ransomware gang members, seize $6.6 million https://www.bleepingcomputer.com/news/security/russia-arrests-revil-ransomware-gang-members-seize-66-million/   The panel discussion is titled “Bridge builders – two new security roles that are your next esse...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Russia arrests REvil ransomware gang members, seize $6.6 million</p><p>https://www.bleepingcomputer.com/news/security/russia-arrests-revil-ransomware-gang-members-seize-66-million/</p><p> </p><p>The panel discussion is titled “Bridge builders – two new security roles that are your next essential appointments”</p><p>https://www.teiss.co.uk/teisstalk/bridge-builders--two-new-security-roles-that-are-your-next-essential-appointments</p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/ </p><p> </p><p>Our Guests are</p><p>Daniela Lourenco, Business Information Security Officer, CarNext</p><p>https://www.linkedin.com/in/daniela-almeida-louren%C3%A7o-43825256/</p><p> </p><p>Neil King, European Business &amp; Information Security Specialist, Canon</p><p>https://www.linkedin.com/in/neilking</p><p> </p><p>Tariq Wani, Business Information Security Officer, Kimberly-Clark</p><p>https://www.linkedin.com/in/7634/</p><p> </p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Russia arrests REvil ransomware gang members, seize $6.6 million</p><p>https://www.bleepingcomputer.com/news/security/russia-arrests-revil-ransomware-gang-members-seize-66-million/</p><p> </p><p>The panel discussion is titled “Bridge builders – two new security roles that are your next essential appointments”</p><p>https://www.teiss.co.uk/teisstalk/bridge-builders--two-new-security-roles-that-are-your-next-essential-appointments</p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/ </p><p> </p><p>Our Guests are</p><p>Daniela Lourenco, Business Information Security Officer, CarNext</p><p>https://www.linkedin.com/in/daniela-almeida-louren%C3%A7o-43825256/</p><p> </p><p>Neil King, European Business &amp; Information Security Specialist, Canon</p><p>https://www.linkedin.com/in/neilking</p><p> </p><p>Tariq Wani, Business Information Security Officer, Kimberly-Clark</p><p>https://www.linkedin.com/in/7634/</p><p> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9947786-teisstalk-bridge-builders-two-new-security-roles-that-are-your-next-essential-appointments.mp3" length="34149271" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9947786</guid>
    <pubDate>Wed, 26 Jan 2022 06:00:00 +0000</pubDate>
    <itunes:duration>2840</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Avoiding bias in infosec decision making</itunes:title>
    <title>teissTalk: Avoiding bias in infosec decision making</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; Playing mind games with the enemy: How businesses can socially engineer threat actors https://www.scmagazine.com/analysis/leadership/playing-mind-games-with-the-enemy-how-businesses-can-socially-engineer-threat-actors   The panel discussion is titled “Avoiding bias in info...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Playing mind games with the enemy: How businesses can socially engineer threat actors</p><p>https://www.scmagazine.com/analysis/leadership/playing-mind-games-with-the-enemy-how-businesses-can-socially-engineer-threat-actors</p><p> </p><p>The panel discussion is titled “Avoiding bias in infosec decision making”</p><p>https://www.teiss.co.uk/teisstalk/avoiding-the-impact-of-bias-in-infosec-decision-making/</p><p> </p><p>This episode is hosted by Geoff White </p><p>https://www.linkedin.com/in/geoffwhitetech/ </p><p> </p><p>Our Guests are</p><p>Bridget Kenyon, EMEA CISO &amp; Information Security Programmes Lead, Thales DIS</p><p>https://www.linkedin.com/in/bridgetkenyon/</p><p> </p><p>Veselin Monev, Information Security Officer, Pilatus Aircraft</p><p>https://www.linkedin.com/in/vmonev/</p><p> </p><p> </p><p> </p><p> </p><p><br/><br/></p><p> </p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Playing mind games with the enemy: How businesses can socially engineer threat actors</p><p>https://www.scmagazine.com/analysis/leadership/playing-mind-games-with-the-enemy-how-businesses-can-socially-engineer-threat-actors</p><p> </p><p>The panel discussion is titled “Avoiding bias in infosec decision making”</p><p>https://www.teiss.co.uk/teisstalk/avoiding-the-impact-of-bias-in-infosec-decision-making/</p><p> </p><p>This episode is hosted by Geoff White </p><p>https://www.linkedin.com/in/geoffwhitetech/ </p><p> </p><p>Our Guests are</p><p>Bridget Kenyon, EMEA CISO &amp; Information Security Programmes Lead, Thales DIS</p><p>https://www.linkedin.com/in/bridgetkenyon/</p><p> </p><p>Veselin Monev, Information Security Officer, Pilatus Aircraft</p><p>https://www.linkedin.com/in/vmonev/</p><p> </p><p> </p><p> </p><p> </p><p><br/><br/></p><p> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9780949-teisstalk-avoiding-bias-in-infosec-decision-making.mp3" length="32878068" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9780949</guid>
    <pubDate>Fri, 24 Dec 2021 06:00:00 +0000</pubDate>
    <itunes:duration>2734</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>38</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Threat reconnaissance in your supply chain</itunes:title>
    <title>teissTalk: Threat reconnaissance in your supply chain</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; From growing supply chain attacks to ransomware gangs  https://www.teiss.co.uk/from-growing-supply-chain-attacks-to-ransomware-gangs-putting-lives-at-risk/   The panel discussion is titled “Threat reconnaissance in your supply chain” https://www.teiss.co.uk/teisstalk/...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>From growing supply chain attacks to ransomware gangs </p><p>https://www.teiss.co.uk/from-growing-supply-chain-attacks-to-ransomware-gangs-putting-lives-at-risk/</p><p> </p><p>The panel discussion is titled “Threat reconnaissance in your supply chain”</p><p>https://www.teiss.co.uk/teisstalk/threat-reconnaissance-in-your-supply-chain/</p><p> </p><p>This episode is hosted by Geoff White </p><p>https://www.linkedin.com/in/geoffwhitetech/ </p><p> </p><p>Our Guests are</p><p>Danny Dresner, Professor of Cyber Security, University of Manchester</p><p>https://www.linkedin.com/in/danny-dresner-fciis-6382381</p><p> </p><p>David Monnier, Fellow, Team Cymru</p><p>https://www.linkedin.com/in/davidmonnier/</p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>From growing supply chain attacks to ransomware gangs </p><p>https://www.teiss.co.uk/from-growing-supply-chain-attacks-to-ransomware-gangs-putting-lives-at-risk/</p><p> </p><p>The panel discussion is titled “Threat reconnaissance in your supply chain”</p><p>https://www.teiss.co.uk/teisstalk/threat-reconnaissance-in-your-supply-chain/</p><p> </p><p>This episode is hosted by Geoff White </p><p>https://www.linkedin.com/in/geoffwhitetech/ </p><p> </p><p>Our Guests are</p><p>Danny Dresner, Professor of Cyber Security, University of Manchester</p><p>https://www.linkedin.com/in/danny-dresner-fciis-6382381</p><p> </p><p>David Monnier, Fellow, Team Cymru</p><p>https://www.linkedin.com/in/davidmonnier/</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9760684-teisstalk-threat-reconnaissance-in-your-supply-chain.mp3" length="33579617" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9760684</guid>
    <pubDate>Wed, 22 Dec 2021 06:00:00 +0000</pubDate>
    <itunes:duration>2793</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Threat trends - double extortion ransomware</itunes:title>
    <title>teissTalk: Threat trends - double extortion ransomware</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk On this episode, we focus on the following news story; The FBI seizes alleged ransomware gang member’s funds, a cloud computing security report from Google and more https://www.itworldcanada.com/article/cyber-security-today-dec-1-2021-the-fbi-seizes-alleged-ransomware-gang-members-funds-a-cloud-computing-security-report-from-google-and-mo...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p>On this episode, we focus on the following news story;</p><p>The FBI seizes alleged ransomware gang member’s funds, a cloud computing security report from Google and more</p><p>https://www.itworldcanada.com/article/cyber-security-today-dec-1-2021-the-fbi-seizes-alleged-ransomware-gang-members-funds-a-cloud-computing-security-report-from-google-and-more/467076</p><p> </p><p>The panel discussion is titled “Threat trends - double extortion ransomware”</p><p>https://www.teiss.co.uk/teisstalk/threat-trend-double-extortion-ransomware/</p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/ </p><p> </p><p>Our Guests are</p><p>Johann Van Duyn, Chief Information Security Officer, DO &amp; CO</p><p>https://www.linkedin.com/in/johannvanduyn</p><p> </p><p>Todd Wade, Chief Information Security Officer, Sokin</p><p>https://www.linkedin.com/in/twade/</p><p> </p><p>Adam Kujawa, Security Evangelist, Malwarebytes</p><p>https://www.linkedin.com/in/%F0%9F%90%A7-adam-kujawa-78255316/</p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p>On this episode, we focus on the following news story;</p><p>The FBI seizes alleged ransomware gang member’s funds, a cloud computing security report from Google and more</p><p>https://www.itworldcanada.com/article/cyber-security-today-dec-1-2021-the-fbi-seizes-alleged-ransomware-gang-members-funds-a-cloud-computing-security-report-from-google-and-more/467076</p><p> </p><p>The panel discussion is titled “Threat trends - double extortion ransomware”</p><p>https://www.teiss.co.uk/teisstalk/threat-trend-double-extortion-ransomware/</p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/ </p><p> </p><p>Our Guests are</p><p>Johann Van Duyn, Chief Information Security Officer, DO &amp; CO</p><p>https://www.linkedin.com/in/johannvanduyn</p><p> </p><p>Todd Wade, Chief Information Security Officer, Sokin</p><p>https://www.linkedin.com/in/twade/</p><p> </p><p>Adam Kujawa, Security Evangelist, Malwarebytes</p><p>https://www.linkedin.com/in/%F0%9F%90%A7-adam-kujawa-78255316/</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9738698-teisstalk-threat-trends-double-extortion-ransomware.mp3" length="36970417" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9738698</guid>
    <pubDate>Fri, 17 Dec 2021 08:00:00 +0000</pubDate>
    <itunes:duration>3075</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>49</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Vendor diversity - onboarding and offboarding security vendors</itunes:title>
    <title>teissTalk: Vendor diversity - onboarding and offboarding security vendors</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; Online Payment Fraud Surges by 208% Ahead of Black Friday https://www.infosecurity-magazine.com/news/online-payment-fraud-black-friday/   The panel discussion is titled “Vendor diversity - onboarding and offboarding security vendors” https://www.teiss.co.uk/teisstalk/vendo...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Online Payment Fraud Surges by 208% Ahead of Black Friday</p><p>https://www.infosecurity-magazine.com/news/online-payment-fraud-black-friday/</p><p> </p><p>The panel discussion is titled “Vendor diversity - onboarding and offboarding security vendors”</p><p>https://www.teiss.co.uk/teisstalk/vendor-diversity-onboarding-and-offboarding-security-vendors/</p><p> </p><p>This episode is hosted by Geoff White </p><p>https://www.linkedin.com/in/geoffwhitetech/ </p><p> </p><p>Our Guests are</p><p>Tee Patel, vCISO, Iron Oak Security</p><p>https://www.linkedin.com/in/teepatel/</p><p> </p><p>Alan Jenkins, Advisor, Security Architecture</p><p>https://www.linkedin.com/in/alanjenkins/</p><p> </p><p>Dawid Kowalski, Senior Technical Director, EMEA, FireMon</p><p>https://www.linkedin.com/in/dawidkowalski</p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Online Payment Fraud Surges by 208% Ahead of Black Friday</p><p>https://www.infosecurity-magazine.com/news/online-payment-fraud-black-friday/</p><p> </p><p>The panel discussion is titled “Vendor diversity - onboarding and offboarding security vendors”</p><p>https://www.teiss.co.uk/teisstalk/vendor-diversity-onboarding-and-offboarding-security-vendors/</p><p> </p><p>This episode is hosted by Geoff White </p><p>https://www.linkedin.com/in/geoffwhitetech/ </p><p> </p><p>Our Guests are</p><p>Tee Patel, vCISO, Iron Oak Security</p><p>https://www.linkedin.com/in/teepatel/</p><p> </p><p>Alan Jenkins, Advisor, Security Architecture</p><p>https://www.linkedin.com/in/alanjenkins/</p><p> </p><p>Dawid Kowalski, Senior Technical Director, EMEA, FireMon</p><p>https://www.linkedin.com/in/dawidkowalski</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9685035-teisstalk-vendor-diversity-onboarding-and-offboarding-security-vendors.mp3" length="32105703" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9685035</guid>
    <pubDate>Fri, 10 Dec 2021 06:00:00 +0000</pubDate>
    <itunes:duration>2670</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>48</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Mapping AI to your security posture and avoiding overlooked threats</itunes:title>
    <title>teissTalk: Mapping AI to your security posture and avoiding overlooked threats</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; Cybersecurity experts warn of A.I.’s drawbacks in combating threats https://fortune.com/2021/11/09/cybersecurity-experts-ai-threats/   The panel discussion is titled “Mapping AI to your security posture and avoiding overlooked threats” https://www.teiss.co.uk/teisstalk/map...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Cybersecurity experts warn of A.I.’s drawbacks in combating threats</p><p>https://fortune.com/2021/11/09/cybersecurity-experts-ai-threats/</p><p> </p><p>The panel discussion is titled “Mapping AI to your security posture and avoiding overlooked threats”</p><p>https://www.teiss.co.uk/teisstalk/mapping-ai-to-your-security-posture-and-avoiding-overlooked-threats/</p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/ </p><p> </p><p>Our Guests are</p><p>Edward Tucker, Chief Information Security Officer, Co-founder of Email Auth, Byte and Human Firewall</p><p>https://www.linkedin.com/in/tuckeredward/</p><p> </p><p>Martyn Booth, Chief Information Security Officer, Euromoney Institutional Investor</p><p>https://www.linkedin.com/in/martynwb/</p><p> </p><p>Samantha Humphries, Head of Security Strategy, EMEA, Exabeam</p><p>https://www.linkedin.com/in/safesecs</p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Cybersecurity experts warn of A.I.’s drawbacks in combating threats</p><p>https://fortune.com/2021/11/09/cybersecurity-experts-ai-threats/</p><p> </p><p>The panel discussion is titled “Mapping AI to your security posture and avoiding overlooked threats”</p><p>https://www.teiss.co.uk/teisstalk/mapping-ai-to-your-security-posture-and-avoiding-overlooked-threats/</p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/ </p><p> </p><p>Our Guests are</p><p>Edward Tucker, Chief Information Security Officer, Co-founder of Email Auth, Byte and Human Firewall</p><p>https://www.linkedin.com/in/tuckeredward/</p><p> </p><p>Martyn Booth, Chief Information Security Officer, Euromoney Institutional Investor</p><p>https://www.linkedin.com/in/martynwb/</p><p> </p><p>Samantha Humphries, Head of Security Strategy, EMEA, Exabeam</p><p>https://www.linkedin.com/in/safesecs</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9672003-teisstalk-mapping-ai-to-your-security-posture-and-avoiding-overlooked-threats.mp3" length="35796209" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9672003</guid>
    <pubDate>Wed, 08 Dec 2021 06:00:00 +0000</pubDate>
    <itunes:duration>2977</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>46</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: How do you define a cyber incident?</itunes:title>
    <title>teissTalk: How do you define a cyber incident?</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; Ikea launches "full-scale investigation" into email-based cyber attack https://www.itpro.co.uk/security/cyber-attacks/361680/ikea-investigates-email-based-cyber-attack   The panel discussion is titled “How do you define a cyber incident?” https://www.teiss.co.uk/teisstalk/...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Ikea launches &quot;full-scale investigation&quot; into email-based cyber attack</p><p>https://www.itpro.co.uk/security/cyber-attacks/361680/ikea-investigates-email-based-cyber-attack</p><p> </p><p>The panel discussion is titled “How do you define a cyber incident?”</p><p>https://www.teiss.co.uk/teisstalk/how-do-you-define-a-cyber-incident/</p><p> </p><p>This episode is hosted by Geoff White </p><p>https://www.linkedin.com/in/geoffwhitetech/ </p><p> </p><p>Our Guests are</p><p>Paul Barnes, Head of Operations and Engagement - Cyber Security, NHSX</p><p>https://www.linkedin.com/in/pbarnes2/</p><p> </p><p>Felipe Garcia, Chief Information Security Officer, Scotiabank</p><p>https://www.linkedin.com/in/felipegarciavivanco/</p><p> </p><p>Todd Carroll, Chief Information Security Officer, CybelAngel</p><p>https://www.linkedin.com/in/todd-carroll-5a7b6b93/</p><p> </p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Ikea launches &quot;full-scale investigation&quot; into email-based cyber attack</p><p>https://www.itpro.co.uk/security/cyber-attacks/361680/ikea-investigates-email-based-cyber-attack</p><p> </p><p>The panel discussion is titled “How do you define a cyber incident?”</p><p>https://www.teiss.co.uk/teisstalk/how-do-you-define-a-cyber-incident/</p><p> </p><p>This episode is hosted by Geoff White </p><p>https://www.linkedin.com/in/geoffwhitetech/ </p><p> </p><p>Our Guests are</p><p>Paul Barnes, Head of Operations and Engagement - Cyber Security, NHSX</p><p>https://www.linkedin.com/in/pbarnes2/</p><p> </p><p>Felipe Garcia, Chief Information Security Officer, Scotiabank</p><p>https://www.linkedin.com/in/felipegarciavivanco/</p><p> </p><p>Todd Carroll, Chief Information Security Officer, CybelAngel</p><p>https://www.linkedin.com/in/todd-carroll-5a7b6b93/</p><p> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9678622-teisstalk-how-do-you-define-a-cyber-incident.mp3" length="35142561" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9678622</guid>
    <pubDate>Tue, 07 Dec 2021 14:00:00 +0000</pubDate>
    <itunes:duration>2923</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>47</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Threat intelligence gathering </itunes:title>
    <title>teissTalk: Threat intelligence gathering </title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk    On this episode, we focus on the following news story;  NCSC Annual Review 2021:  The Threat  https://www.ncsc.gov.uk/collection/ncsc-annual-review-2021/the-threat    The panel discussion is titled “Threat intelligence gathering”  https://www.teiss.co.uk/teisstalk/threat-intelligence-gathering/&n...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>NCSC Annual Review 2021:  The Threat </p><p>https://www.ncsc.gov.uk/collection/ncsc-annual-review-2021/the-threat </p><p> </p><p>The panel discussion is titled “Threat intelligence gathering” </p><p>https://www.teiss.co.uk/teisstalk/threat-intelligence-gathering/ </p><p> </p><p>This episode is hosted by Geoff White  </p><p>https://www.linkedin.com/in/geoffwhitetech/  </p><p> </p><p>Our Guests are </p><p>Simon Goldsmith, Director of Information Security, OVO </p><p>https://www.linkedin.com/in/smg-cyber/ </p><p> </p><p>Richard Morgan, Head of Security Services, RSA Insurance Ltd </p><p> </p><p>Michael Owen, Senior Pre-Sales, UK&amp;I, IntSights </p><p>https://www.linkedin.com/in/michael-owen-533442/ </p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>NCSC Annual Review 2021:  The Threat </p><p>https://www.ncsc.gov.uk/collection/ncsc-annual-review-2021/the-threat </p><p> </p><p>The panel discussion is titled “Threat intelligence gathering” </p><p>https://www.teiss.co.uk/teisstalk/threat-intelligence-gathering/ </p><p> </p><p>This episode is hosted by Geoff White  </p><p>https://www.linkedin.com/in/geoffwhitetech/  </p><p> </p><p>Our Guests are </p><p>Simon Goldsmith, Director of Information Security, OVO </p><p>https://www.linkedin.com/in/smg-cyber/ </p><p> </p><p>Richard Morgan, Head of Security Services, RSA Insurance Ltd </p><p> </p><p>Michael Owen, Senior Pre-Sales, UK&amp;I, IntSights </p><p>https://www.linkedin.com/in/michael-owen-533442/ </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9656656-teisstalk-threat-intelligence-gathering.mp3" length="33207191" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9656656</guid>
    <pubDate>Fri, 03 Dec 2021 14:00:00 +0000</pubDate>
    <itunes:duration>2762</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>45</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Balancing endpoint security and productivity for your hybrid workforce </itunes:title>
    <title>teissTalk: Balancing endpoint security and productivity for your hybrid workforce </title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk    On this episode, we focus on the following news story;  FBI investigating a major incident involving fake emails sent out from an internal server  https://www.teiss.co.uk/fbi-investigating-cyber-incident/    The panel discussion is titled “Balancing endpoint security and productivity for your hybrid workfo...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>FBI investigating a major incident involving fake emails sent out from an internal server </p><p>https://www.teiss.co.uk/fbi-investigating-cyber-incident/ </p><p> </p><p>The panel discussion is titled “Balancing endpoint security and productivity for your hybrid workforce” </p><p>https://www.teiss.co.uk/teisstalk/balancing-endpoint-security-and-productivity-for-your-hybrid-workforce/ </p><p> </p><p>This episode is hosted by Jenny Radcliffe  </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </p><p> </p><p>Our Guests are </p><p>Chucks Ojeme, Global Chief Information Security and Compliance Officer, Brenntag </p><p>https://www.linkedin.com/in/chuksojeme/ </p><p> </p><p>Tom Owen, Chief Information Security Officer, Grafana </p><p>https://www.linkedin.com/in/thomas-rhys-owen/ </p><p> </p><p>Brian Chappell, Deputy Chief Technology Officer, BeyondTrust </p><p>https://www.linkedin.com/in/brianchappell/ </p><p> </p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>FBI investigating a major incident involving fake emails sent out from an internal server </p><p>https://www.teiss.co.uk/fbi-investigating-cyber-incident/ </p><p> </p><p>The panel discussion is titled “Balancing endpoint security and productivity for your hybrid workforce” </p><p>https://www.teiss.co.uk/teisstalk/balancing-endpoint-security-and-productivity-for-your-hybrid-workforce/ </p><p> </p><p>This episode is hosted by Jenny Radcliffe  </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </p><p> </p><p>Our Guests are </p><p>Chucks Ojeme, Global Chief Information Security and Compliance Officer, Brenntag </p><p>https://www.linkedin.com/in/chuksojeme/ </p><p> </p><p>Tom Owen, Chief Information Security Officer, Grafana </p><p>https://www.linkedin.com/in/thomas-rhys-owen/ </p><p> </p><p>Brian Chappell, Deputy Chief Technology Officer, BeyondTrust </p><p>https://www.linkedin.com/in/brianchappell/ </p><p> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9636116-teisstalk-balancing-endpoint-security-and-productivity-for-your-hybrid-workforce.mp3" length="36005614" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9636116</guid>
    <pubDate>Wed, 01 Dec 2021 06:00:00 +0000</pubDate>
    <itunes:duration>2995</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>44</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Reviewing the InfoSec legacy of your pandemic response </itunes:title>
    <title>teissTalk: Reviewing the InfoSec legacy of your pandemic response </title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk  On this episode, we focus on the following news story;  Should companies subject employees to ransomware-specific security training?  https://www.scmagazine.com/analysis/ransomware/should-companies-subject-employees-to-ransomware-specific-security-training   The panel discussion is titled “Reviewing the InfoSec legacy...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p>On this episode, we focus on the following news story; </p><p>Should companies subject employees to ransomware-specific security training? </p><p>https://www.scmagazine.com/analysis/ransomware/should-companies-subject-employees-to-ransomware-specific-security-training </p><p><br/>The panel discussion is titled “Reviewing the InfoSec legacy of your pandemic response” </p><p>https://www.teiss.co.uk/teisstalk/reviewing-the-infosec-legacy-of-your-pandemic-response/ </p><p> </p><p>This episode is hosted by Geoff White  </p><p>https://www.linkedin.com/in/geoffwhitetech/  </p><p> </p><p>Our Guests are </p><p>Enis Sahin, Head of Information Security, Federated Hermes - International </p><p>https://www.linkedin.com/in/enissahin </p><p> </p><p>Naina Bhattacharya, Chief Information Security Officer, Danone </p><p>https://www.linkedin.com/in/naina-bhattacharya-0172351/ </p><p> </p><p>David Petty, Cyber Specialist, OpenText </p><p>https://www.linkedin.com/in/davidpetty/ </p><p> </p><p> </p><p> </p><p> </p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p>On this episode, we focus on the following news story; </p><p>Should companies subject employees to ransomware-specific security training? </p><p>https://www.scmagazine.com/analysis/ransomware/should-companies-subject-employees-to-ransomware-specific-security-training </p><p><br/>The panel discussion is titled “Reviewing the InfoSec legacy of your pandemic response” </p><p>https://www.teiss.co.uk/teisstalk/reviewing-the-infosec-legacy-of-your-pandemic-response/ </p><p> </p><p>This episode is hosted by Geoff White  </p><p>https://www.linkedin.com/in/geoffwhitetech/  </p><p> </p><p>Our Guests are </p><p>Enis Sahin, Head of Information Security, Federated Hermes - International </p><p>https://www.linkedin.com/in/enissahin </p><p> </p><p>Naina Bhattacharya, Chief Information Security Officer, Danone </p><p>https://www.linkedin.com/in/naina-bhattacharya-0172351/ </p><p> </p><p>David Petty, Cyber Specialist, OpenText </p><p>https://www.linkedin.com/in/davidpetty/ </p><p> </p><p> </p><p> </p><p> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9612220-teisstalk-reviewing-the-infosec-legacy-of-your-pandemic-response.mp3" length="33535109" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9612220</guid>
    <pubDate>Fri, 26 Nov 2021 06:00:00 +0000</pubDate>
    <itunes:duration>2789</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>43</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Identity Governance in a hybrid work world </itunes:title>
    <title>teissTalk: Identity Governance in a hybrid work world </title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk    On this episode, we focus on the following news story;  One in Three Workers Monitored by Their Employers  https://www.infosecurity-magazine.com/news/one-three-workers-monitored/    The panel discussion is titled “Identity Governance in a hybrid work world”  https://www.teiss.co.uk/teisstalk/identity-...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>One in Three Workers Monitored by Their Employers </p><p>https://www.infosecurity-magazine.com/news/one-three-workers-monitored/ </p><p> </p><p>The panel discussion is titled “Identity Governance in a hybrid work world” </p><p>https://www.teiss.co.uk/teisstalk/identity-governance-in-a-hybrid-work-world/ </p><p> </p><p>This episode is hosted by Jenny Radcliffe  </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </p><p> </p><p>Our Guests are </p><p>Todd Wade, Chief Information Security Officer, Sokin </p><p>https://www.linkedin.com/in/twade/ </p><p> </p><p>Matt Hardy, Chief Information Security Officer, OMNIO </p><p>https://www.linkedin.com/in/matthardy67/ </p><p> </p><p>Ingo Schubert, Global Cloud Identity Architect- CISSP-ISSAP, CCSP, SecurID, an RSA business </p><p>https://www.linkedin.com/in/ingo-schubert/ </p><p> </p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>One in Three Workers Monitored by Their Employers </p><p>https://www.infosecurity-magazine.com/news/one-three-workers-monitored/ </p><p> </p><p>The panel discussion is titled “Identity Governance in a hybrid work world” </p><p>https://www.teiss.co.uk/teisstalk/identity-governance-in-a-hybrid-work-world/ </p><p> </p><p>This episode is hosted by Jenny Radcliffe  </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </p><p> </p><p>Our Guests are </p><p>Todd Wade, Chief Information Security Officer, Sokin </p><p>https://www.linkedin.com/in/twade/ </p><p> </p><p>Matt Hardy, Chief Information Security Officer, OMNIO </p><p>https://www.linkedin.com/in/matthardy67/ </p><p> </p><p>Ingo Schubert, Global Cloud Identity Architect- CISSP-ISSAP, CCSP, SecurID, an RSA business </p><p>https://www.linkedin.com/in/ingo-schubert/ </p><p> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9599027-teisstalk-identity-governance-in-a-hybrid-work-world.mp3" length="33175243" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9599027</guid>
    <pubDate>Wed, 24 Nov 2021 06:00:00 +0000</pubDate>
    <itunes:duration>2759</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>42</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Supply chain threats:  Supplier assurance</itunes:title>
    <title>teissTalk: Supply chain threats:  Supplier assurance</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk  On this episode, we focus on the following news story; Labour Party data breach: Supporters details affected in cyberattack https://news.sky.com/story/labour-party-supporters-details-affected-by-cyber-security-breach-12458935   The panel discussion is titled “Supply chain threats:  Supplier assurance” https://www.teiss.co....]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> On this episode, we focus on the following news story;</p><p>Labour Party data breach: Supporters details affected in cyberattack</p><p>https://news.sky.com/story/labour-party-supporters-details-affected-by-cyber-security-breach-12458935</p><p> </p><p>The panel discussion is titled “Supply chain threats:  Supplier assurance”</p><p>https://www.teiss.co.uk/teisstalk/supply-chain-threats-supplier-assurance/</p><p> </p><p>This episode is hosted by Geoff White </p><p>https://www.linkedin.com/in/geoffwhitetech/ </p><p> </p><p>Our Guests are</p><p>Edd Hardy, Senior Vice President Cyber Security, AlixPartners</p><p>https://www.linkedin.com/in/eddhardy</p><p> </p><p>Marc Avery, Chief Information Security Officer &amp; Founder, Cyber Chain Alliance</p><p>https://www.linkedin.com/in/marc-avery/</p><p> </p><p>Mike Campfield, VP, GM International Operations and Global Security Programs, ExtraHop</p><p>https://www.linkedin.com/in/mikecampfield/</p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> On this episode, we focus on the following news story;</p><p>Labour Party data breach: Supporters details affected in cyberattack</p><p>https://news.sky.com/story/labour-party-supporters-details-affected-by-cyber-security-breach-12458935</p><p> </p><p>The panel discussion is titled “Supply chain threats:  Supplier assurance”</p><p>https://www.teiss.co.uk/teisstalk/supply-chain-threats-supplier-assurance/</p><p> </p><p>This episode is hosted by Geoff White </p><p>https://www.linkedin.com/in/geoffwhitetech/ </p><p> </p><p>Our Guests are</p><p>Edd Hardy, Senior Vice President Cyber Security, AlixPartners</p><p>https://www.linkedin.com/in/eddhardy</p><p> </p><p>Marc Avery, Chief Information Security Officer &amp; Founder, Cyber Chain Alliance</p><p>https://www.linkedin.com/in/marc-avery/</p><p> </p><p>Mike Campfield, VP, GM International Operations and Global Security Programs, ExtraHop</p><p>https://www.linkedin.com/in/mikecampfield/</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9571611-teisstalk-supply-chain-threats-supplier-assurance.mp3" length="32936689" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9571611</guid>
    <pubDate>Fri, 19 Nov 2021 06:00:00 +0000</pubDate>
    <itunes:duration>2739</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>41</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Rethinking your approach to insider risk </itunes:title>
    <title>teissTalk: Rethinking your approach to insider risk </title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk    On this episode, we focus on the following news story;  Shadow IT Alert: Half of Home Workers Buy Potentially Insecure Kit  https://www.infosecurity-magazine.com/news/half-home-workers-buy-insecure-kit/    The panel discussion is titled “Rethinking your approach to insider risk”  https://www.teiss.co....]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>Shadow IT Alert: Half of Home Workers Buy Potentially Insecure Kit </p><p>https://www.infosecurity-magazine.com/news/half-home-workers-buy-insecure-kit/ </p><p> </p><p>The panel discussion is titled “Rethinking your approach to insider risk” </p><p>https://www.teiss.co.uk/teisstalk/rethinking-your-approach-to-insider-risk/ </p><p> </p><p>This episode is hosted by Jenny Radcliffe  </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </p><p> </p><p>Our Guests are </p><p>Nick Harris, Director of InfoSec and Cyber Resilience, Oxford Nanopore Technologies </p><p>https://www.linkedin.com/in/harrisprofile/ </p><p> </p><p>Brian Reed, Cybersecurity Evangelist, Proofpoint </p><p>https://www.linkedin.com/in/brianreed/ </p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>Shadow IT Alert: Half of Home Workers Buy Potentially Insecure Kit </p><p>https://www.infosecurity-magazine.com/news/half-home-workers-buy-insecure-kit/ </p><p> </p><p>The panel discussion is titled “Rethinking your approach to insider risk” </p><p>https://www.teiss.co.uk/teisstalk/rethinking-your-approach-to-insider-risk/ </p><p> </p><p>This episode is hosted by Jenny Radcliffe  </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </p><p> </p><p>Our Guests are </p><p>Nick Harris, Director of InfoSec and Cyber Resilience, Oxford Nanopore Technologies </p><p>https://www.linkedin.com/in/harrisprofile/ </p><p> </p><p>Brian Reed, Cybersecurity Evangelist, Proofpoint </p><p>https://www.linkedin.com/in/brianreed/ </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9556761-teisstalk-rethinking-your-approach-to-insider-risk.mp3" length="35745688" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9556761</guid>
    <pubDate>Wed, 17 Nov 2021 06:00:00 +0000</pubDate>
    <itunes:duration>2973</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>40</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Leading remote Incident Response and crisis simulation </itunes:title>
    <title>teissTalk: Leading remote Incident Response and crisis simulation </title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story;  Tesco App and Website Back Online After Cyber Incident  https://www.infosecurity-magazine.com/news/tesco-app-website-back-online/    The panel discussion is titled “Leading remote Incident Response and crisis simulation”  https://www.teiss.co.uk/t...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> On this episode, we focus on the following news story; </p><p>Tesco App and Website Back Online After Cyber Incident </p><p>https://www.infosecurity-magazine.com/news/tesco-app-website-back-online/ </p><p> </p><p>The panel discussion is titled “Leading remote Incident Response and crisis simulation” </p><p>https://www.teiss.co.uk/teisstalk/leading-remote-incident-response-and-crisis-simulation/ </p><p> </p><p>This episode is hosted by Rene Millman  </p><p>https://www.linkedin.com/in/renemillman/  </p><p> </p><p>Our Guests are </p><p>Deborah Haworth, Chief Information Security Officer, Penguin Random House </p><p>https://www.linkedin.com/in/deborah-haworth-8a91701/ </p><p> </p><p>David Cartwright, Head of IT Security, Standard Bank International Client Solutions </p><p>https://www.linkedin.com/in/davidscartwright/ </p><p> </p><p>Chris Pace, Vice President, Product and Content Marketing, Immersive Labs </p><p>https://www.linkedin.com/in/achrispace/ </p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> On this episode, we focus on the following news story; </p><p>Tesco App and Website Back Online After Cyber Incident </p><p>https://www.infosecurity-magazine.com/news/tesco-app-website-back-online/ </p><p> </p><p>The panel discussion is titled “Leading remote Incident Response and crisis simulation” </p><p>https://www.teiss.co.uk/teisstalk/leading-remote-incident-response-and-crisis-simulation/ </p><p> </p><p>This episode is hosted by Rene Millman  </p><p>https://www.linkedin.com/in/renemillman/  </p><p> </p><p>Our Guests are </p><p>Deborah Haworth, Chief Information Security Officer, Penguin Random House </p><p>https://www.linkedin.com/in/deborah-haworth-8a91701/ </p><p> </p><p>David Cartwright, Head of IT Security, Standard Bank International Client Solutions </p><p>https://www.linkedin.com/in/davidscartwright/ </p><p> </p><p>Chris Pace, Vice President, Product and Content Marketing, Immersive Labs </p><p>https://www.linkedin.com/in/achrispace/ </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9530263-teisstalk-leading-remote-incident-response-and-crisis-simulation.mp3" length="34079313" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9530263</guid>
    <pubDate>Fri, 12 Nov 2021 06:00:00 +0000</pubDate>
    <itunes:duration>2834</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>39</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: How do you know if your SOC is relevant?</itunes:title>
    <title>teissTalk: How do you know if your SOC is relevant?</title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; Microsoft: Russian SVR hacked at least 14 IT supply chain firms since May https://www.bleepingcomputer.com/news/microsoft/microsoft-russian-svr-hacked-at-least-14-it-supply-chain-firms-since-may/   The panel discussion is titled “How do you know if your SOC is relevant?” https:...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p><br/></p><p>On this episode, we focus on the following news story;</p><p>Microsoft: Russian SVR hacked at least 14 IT supply chain firms since May</p><p>https://www.bleepingcomputer.com/news/microsoft/microsoft-russian-svr-hacked-at-least-14-it-supply-chain-firms-since-may/</p><p> </p><p>The panel discussion is titled “How do you know if your SOC is relevant?”</p><p>https://www.teiss.co.uk/teisstalk/how-do-you-know-if-your-soc-is-relevant/</p><p> </p><p>This episode is hosted by Geoff White </p><p>https://www.linkedin.com/in/geoffwhitetech/ </p><p> </p><p>Our Guests are</p><p>Stefan Treloar, Chief Information Security Officer, IG Group</p><p>https://www.linkedin.com/in/stefan-treloar-8156b16/</p><p> </p><p>Sajeed Naseem, Chief Information Security Officer, New Jersey Courts</p><p>https://www.linkedin.com/in/sajednaseem/</p><p> </p><p>Stephen Moore, Vice President and Chief Security Strategist, Exabeam</p><p>https://www.linkedin.com/in/stephenrmoore/</p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p><br/></p><p>On this episode, we focus on the following news story;</p><p>Microsoft: Russian SVR hacked at least 14 IT supply chain firms since May</p><p>https://www.bleepingcomputer.com/news/microsoft/microsoft-russian-svr-hacked-at-least-14-it-supply-chain-firms-since-may/</p><p> </p><p>The panel discussion is titled “How do you know if your SOC is relevant?”</p><p>https://www.teiss.co.uk/teisstalk/how-do-you-know-if-your-soc-is-relevant/</p><p> </p><p>This episode is hosted by Geoff White </p><p>https://www.linkedin.com/in/geoffwhitetech/ </p><p> </p><p>Our Guests are</p><p>Stefan Treloar, Chief Information Security Officer, IG Group</p><p>https://www.linkedin.com/in/stefan-treloar-8156b16/</p><p> </p><p>Sajeed Naseem, Chief Information Security Officer, New Jersey Courts</p><p>https://www.linkedin.com/in/sajednaseem/</p><p> </p><p>Stephen Moore, Vice President and Chief Security Strategist, Exabeam</p><p>https://www.linkedin.com/in/stephenrmoore/</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9518990-teisstalk-how-do-you-know-if-your-soc-is-relevant.mp3" length="33979600" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9518990</guid>
    <pubDate>Wed, 10 Nov 2021 06:00:00 +0000</pubDate>
    <itunes:duration>2826</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>38</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Building a security culture in a remote and hybrid working world </itunes:title>
    <title>teissTalk: Building a security culture in a remote and hybrid working world </title>
    <itunes:summary><![CDATA[This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk    On this episode, we focus on the following news story;  Financial Regulator Warns of Hybrid Working Security Risks  https://www.infosecurity-magazine.com/news/financial-regulator-hybrid-working/    The panel discussion is titled “Building a security culture in a remote and hybrid working world”  https...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>Financial Regulator Warns of Hybrid Working Security Risks </p><p>https://www.infosecurity-magazine.com/news/financial-regulator-hybrid-working/ </p><p> </p><p>The panel discussion is titled “Building a security culture in a remote and hybrid working world” </p><p>https://www.teiss.co.uk/teisstalk/building-a-security-culture-in-a-remote-and-hybrid-working-world/ </p><p> </p><p>This episode is hosted by Geoff White  </p><p>https://www.linkedin.com/in/geoffwhitetech/  </p><p> </p><p>Our Guests are </p><p>John Scott, Head of Education | Cyber Security Division, Bank of England </p><p>https://www.linkedin.com/in/johnfscott/ </p><p> </p><p>Dora Ross, Global Information Security Culture Specialist, DAZN Group </p><p>https://www.linkedin.com/in/dora-ross/ </p><p> </p><p>Fahim Afghan, Senior Product Marketing Manager, Egress </p><p>https://www.linkedin.com/in/fahimafghan </p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>Financial Regulator Warns of Hybrid Working Security Risks </p><p>https://www.infosecurity-magazine.com/news/financial-regulator-hybrid-working/ </p><p> </p><p>The panel discussion is titled “Building a security culture in a remote and hybrid working world” </p><p>https://www.teiss.co.uk/teisstalk/building-a-security-culture-in-a-remote-and-hybrid-working-world/ </p><p> </p><p>This episode is hosted by Geoff White  </p><p>https://www.linkedin.com/in/geoffwhitetech/  </p><p> </p><p>Our Guests are </p><p>John Scott, Head of Education | Cyber Security Division, Bank of England </p><p>https://www.linkedin.com/in/johnfscott/ </p><p> </p><p>Dora Ross, Global Information Security Culture Specialist, DAZN Group </p><p>https://www.linkedin.com/in/dora-ross/ </p><p> </p><p>Fahim Afghan, Senior Product Marketing Manager, Egress </p><p>https://www.linkedin.com/in/fahimafghan </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9497769-teisstalk-building-a-security-culture-in-a-remote-and-hybrid-working-world.mp3" length="34246412" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9497769</guid>
    <pubDate>Fri, 05 Nov 2021 15:00:00 +0000</pubDate>
    <itunes:duration>2848</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>37</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Leading a Zero Trust initiative that will outlive your tenure</itunes:title>
    <title>teissTalk: Leading a Zero Trust initiative that will outlive your tenure</title>
    <itunes:summary><![CDATA[This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk On this episode, we focus on the following news story; White House lays out 2024 timeline for making zero trust architecture a federal reality https://www.scmagazine.com/analysis/identity-and-access/white-house-lays-out-2024-timeline-for-making-zero-trust-architecture-a-federal-reality The panel discussion is titled “Leading a Zero Trust initiat...]]></itunes:summary>
    <description><![CDATA[<p>This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p>On this episode, we focus on the following news story;</p><p>White House lays out 2024 timeline for making zero trust architecture a federal reality</p><p>https://www.scmagazine.com/analysis/identity-and-access/white-house-lays-out-2024-timeline-for-making-zero-trust-architecture-a-federal-reality</p><p>The panel discussion is titled “Leading a Zero Trust initiative that will outlive your tenure”</p><p>https://www.teiss.co.uk/teisstalk/leading-a-zero-trust-initiative-that-will-outlive-your-tenure/</p><p>This episode is hosted by Jenny Radcliffe </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/ </p><p>Our Guests are</p><p>Kevin Fielder, Chief Information Security Officer, FNZ Group</p><p>https://www.linkedin.com/in/kevinfielder/ </p><p>Andrew Aken, VP of Infrastructure Technology, Fox Rent A Car</p><p>https://www.linkedin.com/in/ajaken/</p><p>Nick Sears, VP, SASE Solutions, Lookout</p><p>https://www.linkedin.com/in/nicksears/</p><p> </p><p> </p>]]></description>
    <content:encoded><![CDATA[<p>This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p>On this episode, we focus on the following news story;</p><p>White House lays out 2024 timeline for making zero trust architecture a federal reality</p><p>https://www.scmagazine.com/analysis/identity-and-access/white-house-lays-out-2024-timeline-for-making-zero-trust-architecture-a-federal-reality</p><p>The panel discussion is titled “Leading a Zero Trust initiative that will outlive your tenure”</p><p>https://www.teiss.co.uk/teisstalk/leading-a-zero-trust-initiative-that-will-outlive-your-tenure/</p><p>This episode is hosted by Jenny Radcliffe </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/ </p><p>Our Guests are</p><p>Kevin Fielder, Chief Information Security Officer, FNZ Group</p><p>https://www.linkedin.com/in/kevinfielder/ </p><p>Andrew Aken, VP of Infrastructure Technology, Fox Rent A Car</p><p>https://www.linkedin.com/in/ajaken/</p><p>Nick Sears, VP, SASE Solutions, Lookout</p><p>https://www.linkedin.com/in/nicksears/</p><p> </p><p> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9483538-teisstalk-leading-a-zero-trust-initiative-that-will-outlive-your-tenure.mp3" length="35307498" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9483538</guid>
    <pubDate>Wed, 03 Nov 2021 15:00:00 +0000</pubDate>
    <itunes:duration>2937</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>36</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Building a diverse InfoSec team and bringing value to the organisation </itunes:title>
    <title>teissTalk: Building a diverse InfoSec team and bringing value to the organisation </title>
    <itunes:summary><![CDATA[This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story;  Developer jobs: When it comes to building diverse teams, employers are still missing the mark  https://www.zdnet.com/article/developer-jobs-when-it-comes-to-building-diverse-teams-employers-are-still-missing-the-mark/    The panel discussion is titled “Buildi...]]></itunes:summary>
    <description><![CDATA[<p>This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> On this episode, we focus on the following news story; </p><p>Developer jobs: When it comes to building diverse teams, employers are still missing the mark </p><p>https://www.zdnet.com/article/developer-jobs-when-it-comes-to-building-diverse-teams-employers-are-still-missing-the-mark/ </p><p> </p><p>The panel discussion is titled “Building a diverse InfoSec team and bringing value to the organisation” </p><p>https://www.teiss.co.uk/teisstalk/building-a-diverse-infosec-team-and-bringing-value-to-the-organisation/ </p><p> </p><p>This episode is hosted by Geoff White  </p><p>https://www.linkedin.com/in/geoffwhitetech/  </p><p> </p><p>Our Guests are </p><p>Sherron Burgess, Senior Vice President and Chief Information Security Officer, BCD Travel </p><p>https://www.linkedin.com/in/sherronburgess/ </p><p> </p><p>Victoria van Roosmalen, Chief Information Security Officer, Coosto </p><p>https://www.linkedin.com/in/victoriavanroosmalen </p><p> </p><p>Regina Bluman, Co-Founder, Respect in Security </p><p>https://www.linkedin.com/in/bregina/ </p>]]></description>
    <content:encoded><![CDATA[<p>This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> On this episode, we focus on the following news story; </p><p>Developer jobs: When it comes to building diverse teams, employers are still missing the mark </p><p>https://www.zdnet.com/article/developer-jobs-when-it-comes-to-building-diverse-teams-employers-are-still-missing-the-mark/ </p><p> </p><p>The panel discussion is titled “Building a diverse InfoSec team and bringing value to the organisation” </p><p>https://www.teiss.co.uk/teisstalk/building-a-diverse-infosec-team-and-bringing-value-to-the-organisation/ </p><p> </p><p>This episode is hosted by Geoff White  </p><p>https://www.linkedin.com/in/geoffwhitetech/  </p><p> </p><p>Our Guests are </p><p>Sherron Burgess, Senior Vice President and Chief Information Security Officer, BCD Travel </p><p>https://www.linkedin.com/in/sherronburgess/ </p><p> </p><p>Victoria van Roosmalen, Chief Information Security Officer, Coosto </p><p>https://www.linkedin.com/in/victoriavanroosmalen </p><p> </p><p>Regina Bluman, Co-Founder, Respect in Security </p><p>https://www.linkedin.com/in/bregina/ </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9448977-teisstalk-building-a-diverse-infosec-team-and-bringing-value-to-the-organisation.mp3" length="34807848" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9448977</guid>
    <pubDate>Fri, 29 Oct 2021 06:00:00 +0100</pubDate>
    <itunes:duration>2895</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>35</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: How effective is your security awareness programme?</itunes:title>
    <title>teissTalk: How effective is your security awareness programme?</title>
    <itunes:summary><![CDATA[This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; NCSC: Revoke Admin Access for BYOD Users Immediately https://www.infosecurity-magazine.com/news/ncsc-revoke-admin-access-byod/   The panel discussion is titled “How effective is your security awareness programme?” https://www.teiss.co.uk/teisstalk/how-effective-is-your-security-a...]]></itunes:summary>
    <description><![CDATA[<p>This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>NCSC: Revoke Admin Access for BYOD Users Immediately</p><p>https://www.infosecurity-magazine.com/news/ncsc-revoke-admin-access-byod/</p><p> </p><p>The panel discussion is titled “How effective is your security awareness programme?”</p><p>https://www.teiss.co.uk/teisstalk/how-effective-is-your-security-awareness-programme/</p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/ </p><p> </p><p>Our Guests are</p><p>Stuart Coulson, Cyber Security Director, HiddenText</p><p>https://www.linkedin.com/in/stuartcoulson/</p><p> </p><p>James Hamon, Chief Information Security Officer, Financial Ombudsman Service</p><p>https://uk.linkedin.com/in/james-hamon-86668a9</p><p> </p><p>Veroniki Stamati, Information Security and Privacy Engineering Lead, Skyscanner</p><p>https://www.linkedin.com/in/vstamati/</p><p> </p><p>Johan Dreyer, EMEA Field CTO, Mimecast</p><p>https://www.linkedin.com/in/johandreyer/</p><p> </p>]]></description>
    <content:encoded><![CDATA[<p>This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>NCSC: Revoke Admin Access for BYOD Users Immediately</p><p>https://www.infosecurity-magazine.com/news/ncsc-revoke-admin-access-byod/</p><p> </p><p>The panel discussion is titled “How effective is your security awareness programme?”</p><p>https://www.teiss.co.uk/teisstalk/how-effective-is-your-security-awareness-programme/</p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/ </p><p> </p><p>Our Guests are</p><p>Stuart Coulson, Cyber Security Director, HiddenText</p><p>https://www.linkedin.com/in/stuartcoulson/</p><p> </p><p>James Hamon, Chief Information Security Officer, Financial Ombudsman Service</p><p>https://uk.linkedin.com/in/james-hamon-86668a9</p><p> </p><p>Veroniki Stamati, Information Security and Privacy Engineering Lead, Skyscanner</p><p>https://www.linkedin.com/in/vstamati/</p><p> </p><p>Johan Dreyer, EMEA Field CTO, Mimecast</p><p>https://www.linkedin.com/in/johandreyer/</p><p> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9436690-teisstalk-how-effective-is-your-security-awareness-programme.mp3" length="37310861" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9436690</guid>
    <pubDate>Wed, 27 Oct 2021 11:00:00 +0100</pubDate>
    <itunes:duration>3104</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>34</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Quantifying cyber risk at Board level </itunes:title>
    <title>teissTalk: Quantifying cyber risk at Board level </title>
    <itunes:summary><![CDATA[This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk    On this episode, we focus on the following news story;  The continuity lessons of the Facebook outage  https://www.scmagazine.com/analysis/risk-management/the-continuity-lessons-of-the-facebook-outage    The panel discussion is titled “Quantifying cyber risk at Board level”  https://www.teiss.co.uk/teisstalk...]]></itunes:summary>
    <description><![CDATA[<p>This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>The continuity lessons of the Facebook outage </p><p>https://www.scmagazine.com/analysis/risk-management/the-continuity-lessons-of-the-facebook-outage </p><p> </p><p>The panel discussion is titled “Quantifying cyber risk at Board level” </p><p>https://www.teiss.co.uk/teisstalk/quantifying-cyber-risk-at-board-level/ </p><p> </p><p>This episode is hosted by Geoff White  </p><p>https://www.linkedin.com/in/geoffwhitetech/  </p><p> </p><p>Our Guests are </p><p>Paul Lewis, Senior Director of Cloud Security, Elsevier </p><p>https://www.linkedin.com/in/paulslewis/ </p><p> </p><p>Simon Mair, Head of Information Security and Data Privacy, Brewin Dolphin </p><p>https://www.linkedin.com/in/simonmair/ </p><p> </p><p>Brooks Wallace, VP Sales EMEA, Deep Instinct </p><p>https://www.linkedin.com/in/brookswallace </p>]]></description>
    <content:encoded><![CDATA[<p>This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>The continuity lessons of the Facebook outage </p><p>https://www.scmagazine.com/analysis/risk-management/the-continuity-lessons-of-the-facebook-outage </p><p> </p><p>The panel discussion is titled “Quantifying cyber risk at Board level” </p><p>https://www.teiss.co.uk/teisstalk/quantifying-cyber-risk-at-board-level/ </p><p> </p><p>This episode is hosted by Geoff White  </p><p>https://www.linkedin.com/in/geoffwhitetech/  </p><p> </p><p>Our Guests are </p><p>Paul Lewis, Senior Director of Cloud Security, Elsevier </p><p>https://www.linkedin.com/in/paulslewis/ </p><p> </p><p>Simon Mair, Head of Information Security and Data Privacy, Brewin Dolphin </p><p>https://www.linkedin.com/in/simonmair/ </p><p> </p><p>Brooks Wallace, VP Sales EMEA, Deep Instinct </p><p>https://www.linkedin.com/in/brookswallace </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9408005-teisstalk-quantifying-cyber-risk-at-board-level.mp3" length="33574593" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9408005</guid>
    <pubDate>Thu, 21 Oct 2021 06:00:00 +0100</pubDate>
    <itunes:duration>2792</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>33</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Provisioning passwordless authentication at scale</itunes:title>
    <title>teissTalk: Provisioning passwordless authentication at scale</title>
    <itunes:summary><![CDATA[This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk    On this episode, we focus on the following news story;  Microsoft brings passwordless security to consumer accounts  https://www.itpro.co.uk/operating-systems/microsoft-windows/360900/microsoft-passwordless-user-accounts    The panel discussion is titled “Provisioning passwordless authentication at scale”  h...]]></itunes:summary>
    <description><![CDATA[<p>This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>Microsoft brings passwordless security to consumer accounts </p><p>https://www.itpro.co.uk/operating-systems/microsoft-windows/360900/microsoft-passwordless-user-accounts </p><p> </p><p>The panel discussion is titled “Provisioning passwordless authentication at scale” </p><p>https://www.teiss.co.uk/teisstalk/provisioning-passwordless-authentication-at-scale/ </p><p> </p><p>This episode is hosted by Jenny Radcliffe  </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </p><p> </p><p>Our Guests are </p><p>Jeremy Green, Cyber Security Advisory Manager, Vodafone </p><p>https://www.linkedin.com/in/jeremy-green-037a3715b/ </p><p> </p><p>Jason Soroko, CTO of PKI, Sectigo </p><p>https://www.linkedin.com/in/jason-soroko-19b41920/ </p>]]></description>
    <content:encoded><![CDATA[<p>This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>Microsoft brings passwordless security to consumer accounts </p><p>https://www.itpro.co.uk/operating-systems/microsoft-windows/360900/microsoft-passwordless-user-accounts </p><p> </p><p>The panel discussion is titled “Provisioning passwordless authentication at scale” </p><p>https://www.teiss.co.uk/teisstalk/provisioning-passwordless-authentication-at-scale/ </p><p> </p><p>This episode is hosted by Jenny Radcliffe  </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </p><p> </p><p>Our Guests are </p><p>Jeremy Green, Cyber Security Advisory Manager, Vodafone </p><p>https://www.linkedin.com/in/jeremy-green-037a3715b/ </p><p> </p><p>Jason Soroko, CTO of PKI, Sectigo </p><p>https://www.linkedin.com/in/jason-soroko-19b41920/ </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9395234-teisstalk-provisioning-passwordless-authentication-at-scale.mp3" length="34376156" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9395234</guid>
    <pubDate>Wed, 20 Oct 2021 06:00:00 +0100</pubDate>
    <itunes:duration>2859</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>32</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Managing the level of threat alerts </itunes:title>
    <title>teissTalk: Managing the level of threat alerts </title>
    <itunes:summary><![CDATA[This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk    On this episode, we focus on the following news story;  The Most Dangerous Attack Techniques in 2021  https://www.infosecurity-magazine.com/news/imos21-dangerous-attack-techniques/    The panel discussion is titled “Managing the level of threat alerts”  https://www.teiss.co.uk/teisstalk/managing-the-level-of...]]></itunes:summary>
    <description><![CDATA[<p>This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>The Most Dangerous Attack Techniques in 2021 </p><p>https://www.infosecurity-magazine.com/news/imos21-dangerous-attack-techniques/ </p><p> </p><p>The panel discussion is titled “Managing the level of threat alerts” </p><p>https://www.teiss.co.uk/teisstalk/managing-the-level-of-threat-alerts/ </p><p> </p><p>This episode is hosted by Geoff White  </p><p>https://www.linkedin.com/in/geoffwhitetech/  </p><p> </p><p>Our Guests are </p><p>Dr Victoria Baines, Visiting Research Fellow, Oxford Department of International Development </p><p>https://www.linkedin.com/in/dr-victoria-baines/ </p><p> </p><p>Craig McEwen, Chief Information Security Officer, Anglo American </p><p>https://www.linkedin.com/in/craigjmcewen/ </p><p> </p><p>Dave Mareels, CEO and Founder, SOC.OS </p><p>https://www.linkedin.com/in/david-mareels </p><p> </p>]]></description>
    <content:encoded><![CDATA[<p>This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>The Most Dangerous Attack Techniques in 2021 </p><p>https://www.infosecurity-magazine.com/news/imos21-dangerous-attack-techniques/ </p><p> </p><p>The panel discussion is titled “Managing the level of threat alerts” </p><p>https://www.teiss.co.uk/teisstalk/managing-the-level-of-threat-alerts/ </p><p> </p><p>This episode is hosted by Geoff White  </p><p>https://www.linkedin.com/in/geoffwhitetech/  </p><p> </p><p>Our Guests are </p><p>Dr Victoria Baines, Visiting Research Fellow, Oxford Department of International Development </p><p>https://www.linkedin.com/in/dr-victoria-baines/ </p><p> </p><p>Craig McEwen, Chief Information Security Officer, Anglo American </p><p>https://www.linkedin.com/in/craigjmcewen/ </p><p> </p><p>Dave Mareels, CEO and Founder, SOC.OS </p><p>https://www.linkedin.com/in/david-mareels </p><p> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9368196-teisstalk-managing-the-level-of-threat-alerts.mp3" length="34630354" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9368196</guid>
    <pubDate>Fri, 15 Oct 2021 06:00:00 +0100</pubDate>
    <itunes:duration>2880</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>31</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Threat intelligence sharing</itunes:title>
    <title>teissTalk: Threat intelligence sharing</title>
    <itunes:summary><![CDATA[This audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk    On this episode, we focus on the following news story;  US slaps Russian crypto exchange with sanctions as new details emerge in Kaseya attack  https://www.scmagazine.com/analysis/cybercrime/us-slaps-russian-crypto-exchange-with-sanctions-as-new-details-emerge-in-kaseya-attack    The panel discussion is titled “T...]]></itunes:summary>
    <description><![CDATA[<p>This audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>US slaps Russian crypto exchange with sanctions as new details emerge in Kaseya attack </p><p>https://www.scmagazine.com/analysis/cybercrime/us-slaps-russian-crypto-exchange-with-sanctions-as-new-details-emerge-in-kaseya-attack </p><p> </p><p>The panel discussion is titled “Threat intelligence sharing” </p><p>https://www.teiss.co.uk/teisstalk/threat-intelligence-sharing/ </p><p> </p><p>This episode is hosted by Geoff White  </p><p>https://www.linkedin.com/in/geoffwhitetech/  </p><p> </p><p>Our Guests are </p><p>Keith Nicholson, Head of Cyber Threat Operations, HM Revenue &amp; Customs </p><p>https://www.linkedin.com/in/keith-nicholson-a0924039/ </p><p> </p><p>Keil Hubert, Head of Security Awareness &amp; Training, OCC </p><p>https://www.linkedin.com/in/khubert/ </p><p> </p><p>Maurits Lucas, Director of Intelligence Solutions, Intel471 </p><p>https://www.linkedin.com/in/mauritslucas/ </p>]]></description>
    <content:encoded><![CDATA[<p>This audio-only version of our twice-weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>US slaps Russian crypto exchange with sanctions as new details emerge in Kaseya attack </p><p>https://www.scmagazine.com/analysis/cybercrime/us-slaps-russian-crypto-exchange-with-sanctions-as-new-details-emerge-in-kaseya-attack </p><p> </p><p>The panel discussion is titled “Threat intelligence sharing” </p><p>https://www.teiss.co.uk/teisstalk/threat-intelligence-sharing/ </p><p> </p><p>This episode is hosted by Geoff White  </p><p>https://www.linkedin.com/in/geoffwhitetech/  </p><p> </p><p>Our Guests are </p><p>Keith Nicholson, Head of Cyber Threat Operations, HM Revenue &amp; Customs </p><p>https://www.linkedin.com/in/keith-nicholson-a0924039/ </p><p> </p><p>Keil Hubert, Head of Security Awareness &amp; Training, OCC </p><p>https://www.linkedin.com/in/khubert/ </p><p> </p><p>Maurits Lucas, Director of Intelligence Solutions, Intel471 </p><p>https://www.linkedin.com/in/mauritslucas/ </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9334436-teisstalk-threat-intelligence-sharing.mp3" length="35506797" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9334436</guid>
    <pubDate>Sat, 09 Oct 2021 06:00:00 +0100</pubDate>
    <itunes:duration>2953</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>30</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Cyber resilience and business logic attacks </itunes:title>
    <title>teissTalk: Cyber resilience and business logic attacks </title>
    <itunes:summary><![CDATA[This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk    On this episode, we focus on the following news story;  Bot attacks grow 41% in first half of 2021  https://www.zdnet.com/article/bot-attacks-grow-41-in-first-half-of-2021-lexisnexis    The panel discussion is titled “Cyber resilience and business logic attacks”  https://www.teiss.co.uk/teisstalk/cyber-resil...]]></itunes:summary>
    <description><![CDATA[<p>This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>Bot attacks grow 41% in first half of 2021 </p><p>https://www.zdnet.com/article/bot-attacks-grow-41-in-first-half-of-2021-lexisnexis </p><p> </p><p>The panel discussion is titled “Cyber resilience and business logic attacks” </p><p>https://www.teiss.co.uk/teisstalk/cyber-resilience-and-business-logic-attacks/ </p><p> </p><p>This episode is hosted by Geoff White  </p><p>https://www.linkedin.com/in/geoffwhitetech/  </p><p> </p><p>Our Guests are </p><p>Edwin van Andel, Advisor, Hacker and CEO, Zerocopter </p><p>https://www.linkedin.com/in/yafsec/ </p><p> </p><p>James Packer, Head of Information Security, EF Education First </p><p>https://www.linkedin.com/in/jpcyber/ </p><p> </p><p>Matthew Gracey-McMinn, Head of Threat Research, Netacea </p><p>https://www.linkedin.com/in/matthewgraceymcminn </p><p> </p>]]></description>
    <content:encoded><![CDATA[<p>This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>Bot attacks grow 41% in first half of 2021 </p><p>https://www.zdnet.com/article/bot-attacks-grow-41-in-first-half-of-2021-lexisnexis </p><p> </p><p>The panel discussion is titled “Cyber resilience and business logic attacks” </p><p>https://www.teiss.co.uk/teisstalk/cyber-resilience-and-business-logic-attacks/ </p><p> </p><p>This episode is hosted by Geoff White  </p><p>https://www.linkedin.com/in/geoffwhitetech/  </p><p> </p><p>Our Guests are </p><p>Edwin van Andel, Advisor, Hacker and CEO, Zerocopter </p><p>https://www.linkedin.com/in/yafsec/ </p><p> </p><p>James Packer, Head of Information Security, EF Education First </p><p>https://www.linkedin.com/in/jpcyber/ </p><p> </p><p>Matthew Gracey-McMinn, Head of Threat Research, Netacea </p><p>https://www.linkedin.com/in/matthewgraceymcminn </p><p> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9314551-teisstalk-cyber-resilience-and-business-logic-attacks.mp3" length="35072049" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9314551</guid>
    <pubDate>Wed, 06 Oct 2021 06:00:00 +0100</pubDate>
    <itunes:duration>2917</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>29</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Developing an Incident Response playbook for critical 3rd party suppliers </itunes:title>
    <title>teissTalk: Developing an Incident Response playbook for critical 3rd party suppliers </title>
    <itunes:summary><![CDATA[This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk    On this episode, we focus on the following news story;  Wide-ranging SolarWinds probe sparks fear in Corporate America  https://www.reuters.com/technology/exclusive-wide-ranging-solarwinds-probe-sparks-fear-corporate-america-2021-09-10/    The panel discussion is titled “Developing an Incident Response playbook f...]]></itunes:summary>
    <description><![CDATA[<p>This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>Wide-ranging SolarWinds probe sparks fear in Corporate America </p><p>https://www.reuters.com/technology/exclusive-wide-ranging-solarwinds-probe-sparks-fear-corporate-america-2021-09-10/ </p><p> </p><p>The panel discussion is titled “Developing an Incident Response playbook for critical 3rd party suppliers” </p><p>https://www.teiss.co.uk/teisstalk/developing-an-incident-response-playbook-for-critical-3rd-party-suppliers/ </p><p> </p><p>This episode is hosted by Geoff White  </p><p>https://www.linkedin.com/in/geoffwhitetech/  </p><p> </p><p>Our Guests are </p><p>Stiliyana Simeonova, Head of Information Security, Guardian News and Media </p><p>https://www.linkedin.com/in/ssimeonova/ </p><p> </p><p>Karl Knowles, Global Head of Cyber | CISO, HFW </p><p>https://www.linkedin.com/in/cyber-karlknowles/ </p><p> </p><p>David Petty, Cyber Specialist, OpenText </p><p>https://www.linkedin.com/in/davidpetty/ </p>]]></description>
    <content:encoded><![CDATA[<p>This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>Wide-ranging SolarWinds probe sparks fear in Corporate America </p><p>https://www.reuters.com/technology/exclusive-wide-ranging-solarwinds-probe-sparks-fear-corporate-america-2021-09-10/ </p><p> </p><p>The panel discussion is titled “Developing an Incident Response playbook for critical 3rd party suppliers” </p><p>https://www.teiss.co.uk/teisstalk/developing-an-incident-response-playbook-for-critical-3rd-party-suppliers/ </p><p> </p><p>This episode is hosted by Geoff White  </p><p>https://www.linkedin.com/in/geoffwhitetech/  </p><p> </p><p>Our Guests are </p><p>Stiliyana Simeonova, Head of Information Security, Guardian News and Media </p><p>https://www.linkedin.com/in/ssimeonova/ </p><p> </p><p>Karl Knowles, Global Head of Cyber | CISO, HFW </p><p>https://www.linkedin.com/in/cyber-karlknowles/ </p><p> </p><p>David Petty, Cyber Specialist, OpenText </p><p>https://www.linkedin.com/in/davidpetty/ </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9292704-teisstalk-developing-an-incident-response-playbook-for-critical-3rd-party-suppliers.mp3" length="33988758" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9292704</guid>
    <pubDate>Sat, 02 Oct 2021 06:00:00 +0100</pubDate>
    <itunes:duration>2827</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>28</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Identifying and responding to credential theft </itunes:title>
    <title>teissTalk: Identifying and responding to credential theft </title>
    <itunes:summary><![CDATA[This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk    On this episode, we focus on the following news story;  Stolen Credentials Led to Data Theft at United Nations  https://threatpost.com/data-theft-united-nations/169357/    The panel discussion is titled “Identifying and responding to credential theft”  https://www.teiss.co.uk/teisstalk/identifying-and-respon...]]></itunes:summary>
    <description><![CDATA[<p>This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>Stolen Credentials Led to Data Theft at United Nations </p><p>https://threatpost.com/data-theft-united-nations/169357/ </p><p> </p><p>The panel discussion is titled “Identifying and responding to credential theft” </p><p>https://www.teiss.co.uk/teisstalk/identifying-and-responding-to-credential-theft/ </p><p> </p><p>This episode is hosted by Jenny Radcliffe  </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </p><p> </p><p>Our Guests are: </p><p>Bridget Kenyon, EMEA CISO &amp; Information Security Programmes Lead, Thales DIS </p><p>https://www.linkedin.com/in/bridgetkenyon/ </p><p> </p><p>Danny Dresner, Professor of Cyber Security, University of Manchester </p><p>https://www.linkedin.com/in/danny-dresner-fciis-6382381 </p><p> </p><p>Neil Sinclair, National Cyber Lead, Police Digital Security Centre </p><p>https://www.linkedin.com/in/neil-sinclair-a8036628 </p><p> </p><p>Yochai Corem, CEO, Cyberint </p><p>https://www.linkedin.com/in/yochaicorem </p>]]></description>
    <content:encoded><![CDATA[<p>This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p> </p><p>On this episode, we focus on the following news story; </p><p>Stolen Credentials Led to Data Theft at United Nations </p><p>https://threatpost.com/data-theft-united-nations/169357/ </p><p> </p><p>The panel discussion is titled “Identifying and responding to credential theft” </p><p>https://www.teiss.co.uk/teisstalk/identifying-and-responding-to-credential-theft/ </p><p> </p><p>This episode is hosted by Jenny Radcliffe  </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </p><p> </p><p>Our Guests are: </p><p>Bridget Kenyon, EMEA CISO &amp; Information Security Programmes Lead, Thales DIS </p><p>https://www.linkedin.com/in/bridgetkenyon/ </p><p> </p><p>Danny Dresner, Professor of Cyber Security, University of Manchester </p><p>https://www.linkedin.com/in/danny-dresner-fciis-6382381 </p><p> </p><p>Neil Sinclair, National Cyber Lead, Police Digital Security Centre </p><p>https://www.linkedin.com/in/neil-sinclair-a8036628 </p><p> </p><p>Yochai Corem, CEO, Cyberint </p><p>https://www.linkedin.com/in/yochaicorem </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9274021-teisstalk-identifying-and-responding-to-credential-theft.mp3" length="39515797" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9274021</guid>
    <pubDate>Wed, 29 Sep 2021 06:00:00 +0100</pubDate>
    <itunes:duration>3287</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>27</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Shadow-IT – keeping security out of the way of productivity?</itunes:title>
    <title>teissTalk: Shadow-IT – keeping security out of the way of productivity?</title>
    <itunes:summary><![CDATA[This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk  On this episode, we focus on the following news story;  Study finds 97% of cloud apps used in the enterprise are shadow IT  https://www.scmagazine.com/news/cloud-security/study-finds-97-of-cloud-apps-used-in-the-enterprise-are-shadow-it  The panel discussion is titled “Shadow-IT - keeping security out of the way of productiv...]]></itunes:summary>
    <description><![CDATA[<p>This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p>On this episode, we focus on the following news story; </p><p>Study finds 97% of cloud apps used in the enterprise are shadow IT </p><p>https://www.scmagazine.com/news/cloud-security/study-finds-97-of-cloud-apps-used-in-the-enterprise-are-shadow-it </p><p>The panel discussion is titled “Shadow-IT - keeping security out of the way of productivity?” </p><p>https://www.teiss.co.uk/teisstalk/shadow-it-keeping-security-out-of-the-way-of-productivity/ </p><p>This episode is hosted by Geoff White &gt; https://www.linkedin.com/in/geoffwhitetech/  </p><p><br/>Our Guests are: </p><p>Quentyn Taylor, Director of Information Security - EMEA, Canon </p><p>&gt;https://www.linkedin.com/in/quentyntaylor/ </p><p><br/>Robin Smith, Chief Information Security Officer, Aston Martin </p><p>&gt;https://www.linkedin.com/in/robin-s-78148a133/ </p><p><br/>Jonathan Craven, Head of Information Governance / Data Protection Officer, Central and North West London NHS Foundation Trust </p><p>&gt;https://www.linkedin.com/in/jonathan-craven-a40a2a2a </p>]]></description>
    <content:encoded><![CDATA[<p>This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p>On this episode, we focus on the following news story; </p><p>Study finds 97% of cloud apps used in the enterprise are shadow IT </p><p>https://www.scmagazine.com/news/cloud-security/study-finds-97-of-cloud-apps-used-in-the-enterprise-are-shadow-it </p><p>The panel discussion is titled “Shadow-IT - keeping security out of the way of productivity?” </p><p>https://www.teiss.co.uk/teisstalk/shadow-it-keeping-security-out-of-the-way-of-productivity/ </p><p>This episode is hosted by Geoff White &gt; https://www.linkedin.com/in/geoffwhitetech/  </p><p><br/>Our Guests are: </p><p>Quentyn Taylor, Director of Information Security - EMEA, Canon </p><p>&gt;https://www.linkedin.com/in/quentyntaylor/ </p><p><br/>Robin Smith, Chief Information Security Officer, Aston Martin </p><p>&gt;https://www.linkedin.com/in/robin-s-78148a133/ </p><p><br/>Jonathan Craven, Head of Information Governance / Data Protection Officer, Central and North West London NHS Foundation Trust </p><p>&gt;https://www.linkedin.com/in/jonathan-craven-a40a2a2a </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9233110-teisstalk-shadow-it-keeping-security-out-of-the-way-of-productivity.mp3" length="33015721" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9233110</guid>
    <pubDate>Tue, 21 Sep 2021 09:00:00 +0100</pubDate>
    <itunes:duration>2746</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>26</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: What should the CISO and Security function not own? </itunes:title>
    <title>teissTalk: What should the CISO and Security function not own? </title>
    <itunes:summary><![CDATA[This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk  On this episode, we focus on the following news story;  Cybersecurity is tough work, so beware of burnout  https://www.zdnet.com/article/cybersecurity-is-tough-work-so-beware-of-burnout/   The panel discussion is titled “What should the CISO and Security function not own?”  https://www.teiss.co.uk/teisstalk/what-should-...]]></itunes:summary>
    <description><![CDATA[<p>This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p>On this episode, we focus on the following news story; </p><p>Cybersecurity is tough work, so beware of burnout </p><p>https://www.zdnet.com/article/cybersecurity-is-tough-work-so-beware-of-burnout/ </p><p><br/>The panel discussion is titled “What should the CISO and Security function not own?” </p><p>https://www.teiss.co.uk/teisstalk/what-should-the-ciso-and-security-function-not-own/ </p><p> </p><p>This episode is hosted by Jenny Radcliffe  </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </p><p> Our Guests are: </p><p>- Adam Kassell, Head of Cyber Security, British Transport Police </p><p>https://www.linkedin.com/in/adam-kassell-6b33251 </p><p>- Andy Edwards, Chief Information Security Officer, Butterfield Group </p><p>https://www.linkedin.com/in/andy-edwards-1aa8b018/ </p><p> - Jon Winbow, Director - Information Security, GSK </p><p>https://www.linkedin.com/in/jonwinbow/ </p>]]></description>
    <content:encoded><![CDATA[<p>This audio-only version of our twice weekly cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a> </p><p>On this episode, we focus on the following news story; </p><p>Cybersecurity is tough work, so beware of burnout </p><p>https://www.zdnet.com/article/cybersecurity-is-tough-work-so-beware-of-burnout/ </p><p><br/>The panel discussion is titled “What should the CISO and Security function not own?” </p><p>https://www.teiss.co.uk/teisstalk/what-should-the-ciso-and-security-function-not-own/ </p><p> </p><p>This episode is hosted by Jenny Radcliffe  </p><p>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/  </p><p> Our Guests are: </p><p>- Adam Kassell, Head of Cyber Security, British Transport Police </p><p>https://www.linkedin.com/in/adam-kassell-6b33251 </p><p>- Andy Edwards, Chief Information Security Officer, Butterfield Group </p><p>https://www.linkedin.com/in/andy-edwards-1aa8b018/ </p><p> - Jon Winbow, Director - Information Security, GSK </p><p>https://www.linkedin.com/in/jonwinbow/ </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/9165115-teisstalk-what-should-the-ciso-and-security-function-not-own.mp3" length="36151967" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9165115</guid>
    <pubDate>Fri, 10 Sep 2021 06:00:00 +0100</pubDate>
    <itunes:duration>3007</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>26</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: 3rd party risk management – vulnerability testing your suppliers</itunes:title>
    <title>teissTalk: 3rd party risk management – vulnerability testing your suppliers</title>
    <itunes:summary><![CDATA[This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; A US-UK hacking probe offers a fresh approach against Russia https://www.atlanticcouncil.org/blogs/new-atlanticist/a-us-uk-hacking-probe-offers-a-fresh-approach-against-russia/   The panel discussion is titled “3rd party risk management - vulnerability testing your suppliers” https://w...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>A US-UK hacking probe offers a fresh approach against Russia</p><p><a href='https://www.atlanticcouncil.org/blogs/new-atlanticist/a-us-uk-hacking-probe-offers-a-fresh-approach-against-russia/'>https://www.atlanticcouncil.org/blogs/new-atlanticist/a-us-uk-hacking-probe-offers-a-fresh-approach-against-russia/</a></p><p> </p><p>The panel discussion is titled “3rd party risk management - vulnerability testing your suppliers”</p><p><a href='https://www.teiss.co.uk/teisstalk/3rd-party-risk-management-vulnerability-testing-your-suppliers/'>https://www.teiss.co.uk/teisstalk/3rd-party-risk-management-vulnerability-testing-your-suppliers/</a></p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a> </p><p> </p><p>Our Guests are</p><p>Danny Dresner, Professor of Cyber Security, University of Manchester</p><p><a href='https://www.linkedin.com/in/danny-dresner-fciis-6382381'>https://www.linkedin.com/in/danny-dresner-fciis-6382381</a></p><p> </p><p>Lee Morton, Information Security Officer, Onthebeach</p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>A US-UK hacking probe offers a fresh approach against Russia</p><p><a href='https://www.atlanticcouncil.org/blogs/new-atlanticist/a-us-uk-hacking-probe-offers-a-fresh-approach-against-russia/'>https://www.atlanticcouncil.org/blogs/new-atlanticist/a-us-uk-hacking-probe-offers-a-fresh-approach-against-russia/</a></p><p> </p><p>The panel discussion is titled “3rd party risk management - vulnerability testing your suppliers”</p><p><a href='https://www.teiss.co.uk/teisstalk/3rd-party-risk-management-vulnerability-testing-your-suppliers/'>https://www.teiss.co.uk/teisstalk/3rd-party-risk-management-vulnerability-testing-your-suppliers/</a></p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a> </p><p> </p><p>Our Guests are</p><p>Danny Dresner, Professor of Cyber Security, University of Manchester</p><p><a href='https://www.linkedin.com/in/danny-dresner-fciis-6382381'>https://www.linkedin.com/in/danny-dresner-fciis-6382381</a></p><p> </p><p>Lee Morton, Information Security Officer, Onthebeach</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/8904480-teisstalk-3rd-party-risk-management-vulnerability-testing-your-suppliers.mp3" length="33460185" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-8904480</guid>
    <pubDate>Wed, 28 Jul 2021 09:00:00 +0100</pubDate>
    <itunes:duration>2783</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>25</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Can ethics guide the use of AI in cyber security?</itunes:title>
    <title>teissTalk: Can ethics guide the use of AI in cyber security?</title>
    <itunes:summary><![CDATA[This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; How cybersecurity is getting AI wrong https://venturebeat.com/2021/07/10/how-cybersecurity-is-getting-ai-wrong/   The panel discussion is titled “Can ethics guide the use of AI in cyber security?” https://www.teiss.co.uk/teisstalk/can-ethics-guide-the-use-of-ai-in-cyber-security/ &nbsp...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>How cybersecurity is getting AI wrong</p><p><a href='https://venturebeat.com/2021/07/10/how-cybersecurity-is-getting-ai-wrong/'>https://venturebeat.com/2021/07/10/how-cybersecurity-is-getting-ai-wrong/</a></p><p> </p><p>The panel discussion is titled “Can ethics guide the use of AI in cyber security?”</p><p><a href='https://www.teiss.co.uk/teisstalk/can-ethics-guide-the-use-of-ai-in-cyber-security/'>https://www.teiss.co.uk/teisstalk/can-ethics-guide-the-use-of-ai-in-cyber-security/</a></p><p> </p><p>This episode is hosted by Geoff White </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a> </p><p> </p><p>Our Guests are</p><p>Ardie Kleijn, Chief Information Security Officer, Transavia</p><p><a href='https://www.linkedin.com/in/ardie-kleijn-a4b3872/'>https://www.linkedin.com/in/ardie-kleijn-a4b3872/</a></p><p> </p><p>Ansgar Koene, Global AI Ethics and Regulatory Leader, EY</p><p><a href='https://www.linkedin.com/in/akoene/'>https://www.linkedin.com/in/akoene/</a></p><p> </p><p>Richard Benjamins, Chief AI and Data Strategist, Telefonica</p><p><a href='https://www.linkedin.com/in/richard-benjamins/'>https://www.linkedin.com/in/richard-benjamins/</a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>How cybersecurity is getting AI wrong</p><p><a href='https://venturebeat.com/2021/07/10/how-cybersecurity-is-getting-ai-wrong/'>https://venturebeat.com/2021/07/10/how-cybersecurity-is-getting-ai-wrong/</a></p><p> </p><p>The panel discussion is titled “Can ethics guide the use of AI in cyber security?”</p><p><a href='https://www.teiss.co.uk/teisstalk/can-ethics-guide-the-use-of-ai-in-cyber-security/'>https://www.teiss.co.uk/teisstalk/can-ethics-guide-the-use-of-ai-in-cyber-security/</a></p><p> </p><p>This episode is hosted by Geoff White </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a> </p><p> </p><p>Our Guests are</p><p>Ardie Kleijn, Chief Information Security Officer, Transavia</p><p><a href='https://www.linkedin.com/in/ardie-kleijn-a4b3872/'>https://www.linkedin.com/in/ardie-kleijn-a4b3872/</a></p><p> </p><p>Ansgar Koene, Global AI Ethics and Regulatory Leader, EY</p><p><a href='https://www.linkedin.com/in/akoene/'>https://www.linkedin.com/in/akoene/</a></p><p> </p><p>Richard Benjamins, Chief AI and Data Strategist, Telefonica</p><p><a href='https://www.linkedin.com/in/richard-benjamins/'>https://www.linkedin.com/in/richard-benjamins/</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/8904449-teisstalk-can-ethics-guide-the-use-of-ai-in-cyber-security.mp3" length="36235926" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-8904449</guid>
    <pubDate>Mon, 26 Jul 2021 09:00:00 +0100</pubDate>
    <itunes:duration>3014</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>24</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Winning budget as a CISO for 2022 and beyond</itunes:title>
    <title>teissTalk: Winning budget as a CISO for 2022 and beyond</title>
    <itunes:summary><![CDATA[This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; Matt Hancock isn’t the only politician who is clueless about cyber security https://www.spectator.co.uk/article/matt-hancock-isn-t-the-only-politician-who-is-clueless-about-cyber-security   The panel discussion is titled “Winning budget as a CISO for 2022 and beyond” https://www.teiss....]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Matt Hancock isn’t the only politician who is clueless about cyber security</p><p><a href='https://www.spectator.co.uk/article/matt-hancock-isn-t-the-only-politician-who-is-clueless-about-cyber-security'>https://www.spectator.co.uk/article/matt-hancock-isn-t-the-only-politician-who-is-clueless-about-cyber-security</a></p><p> </p><p>The panel discussion is titled “Winning budget as a CISO for 2022 and beyond”</p><p><a href='https://www.teiss.co.uk/teisstalk/winning-budget-as-a-ciso-for-2022-and-beyond/'>https://www.teiss.co.uk/teisstalk/winning-budget-as-a-ciso-for-2022-and-beyond/</a></p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a> </p><p> </p><p>Our Guests are</p><p>Lee Whatford, Chief Information Security Officer, Domino&apos;s Pizza</p><p><a href='https://www.linkedin.com/in/leewhatford/'>https://www.linkedin.com/in/leewhatford/</a></p><p> </p><p>Matt Hardy, Chief Information Security Officer, OMNIO</p><p><a href='https://www.linkedin.com/in/matthardy67/'>https://www.linkedin.com/in/matthardy67/</a></p><p> </p><p>Garry Scobie, Deputy Chief Information Security Officer, The University of Edinburgh</p><p><a href='https://uk.linkedin.com/in/garry-scobie'>https://uk.linkedin.com/in/garry-scobie</a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Matt Hancock isn’t the only politician who is clueless about cyber security</p><p><a href='https://www.spectator.co.uk/article/matt-hancock-isn-t-the-only-politician-who-is-clueless-about-cyber-security'>https://www.spectator.co.uk/article/matt-hancock-isn-t-the-only-politician-who-is-clueless-about-cyber-security</a></p><p> </p><p>The panel discussion is titled “Winning budget as a CISO for 2022 and beyond”</p><p><a href='https://www.teiss.co.uk/teisstalk/winning-budget-as-a-ciso-for-2022-and-beyond/'>https://www.teiss.co.uk/teisstalk/winning-budget-as-a-ciso-for-2022-and-beyond/</a></p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a> </p><p> </p><p>Our Guests are</p><p>Lee Whatford, Chief Information Security Officer, Domino&apos;s Pizza</p><p><a href='https://www.linkedin.com/in/leewhatford/'>https://www.linkedin.com/in/leewhatford/</a></p><p> </p><p>Matt Hardy, Chief Information Security Officer, OMNIO</p><p><a href='https://www.linkedin.com/in/matthardy67/'>https://www.linkedin.com/in/matthardy67/</a></p><p> </p><p>Garry Scobie, Deputy Chief Information Security Officer, The University of Edinburgh</p><p><a href='https://uk.linkedin.com/in/garry-scobie'>https://uk.linkedin.com/in/garry-scobie</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/8904439-teisstalk-winning-budget-as-a-ciso-for-2022-and-beyond.mp3" length="35196138" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-8904439</guid>
    <pubDate>Fri, 23 Jul 2021 09:00:00 +0100</pubDate>
    <itunes:duration>2927</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>23</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Automating Incident Response for a hybrid workforce</itunes:title>
    <title>teissTalk: Automating Incident Response for a hybrid workforce</title>
    <itunes:summary><![CDATA[This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; As Kaseya works to bring SaaS servers online, experts laud precautionary measures as ‘opposite of complacency’ https://www.scmagazine.com/home/security-news/as-kaseya-works-to-bring-servers-online-experts-laud-precautionary-measures-taken-as-opposite-of-complacency/   The panel discuss...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>As Kaseya works to bring SaaS servers online, experts laud precautionary measures as ‘opposite of complacency’</p><p><a href='https://www.scmagazine.com/home/security-news/as-kaseya-works-to-bring-servers-online-experts-laud-precautionary-measures-taken-as-opposite-of-complacency/'>https://www.scmagazine.com/home/security-news/as-kaseya-works-to-bring-servers-online-experts-laud-precautionary-measures-taken-as-opposite-of-complacency/</a></p><p> </p><p>The panel discussion is titled “Automating Incident Response for a hybrid workforce”</p><p><a href='https://www.teiss.co.uk/teisstalk/automating-incident-response-for-a-hybrid-workforce/'>https://www.teiss.co.uk/teisstalk/automating-incident-response-for-a-hybrid-workforce/</a></p><p> </p><p>This episode is hosted by Geoff White </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a> </p><p> </p><p>Our Guests are</p><p>Vicki Gavin, Head of Information Security &amp; Compliance, Kaplan International</p><p><a href='https://www.linkedin.com/in/vickigavin/'>https://www.linkedin.com/in/vickigavin/</a></p><p> </p><p>Nenad Milisavljevic, Global Chief Information Security Officer, United Group B.V</p><p><a href='https://www.linkedin.com/in/nenadmilisavljevic/'>https://www.linkedin.com/in/nenadmilisavljevic/</a></p><p> </p><p>Israel Barak, Chief Security Officer, Cybereason</p><p><a href='https://www.linkedin.com/in/israel-barak-50b1a71/'>https://www.linkedin.com/in/israel-barak-50b1a71/</a> </p><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>As Kaseya works to bring SaaS servers online, experts laud precautionary measures as ‘opposite of complacency’</p><p><a href='https://www.scmagazine.com/home/security-news/as-kaseya-works-to-bring-servers-online-experts-laud-precautionary-measures-taken-as-opposite-of-complacency/'>https://www.scmagazine.com/home/security-news/as-kaseya-works-to-bring-servers-online-experts-laud-precautionary-measures-taken-as-opposite-of-complacency/</a></p><p> </p><p>The panel discussion is titled “Automating Incident Response for a hybrid workforce”</p><p><a href='https://www.teiss.co.uk/teisstalk/automating-incident-response-for-a-hybrid-workforce/'>https://www.teiss.co.uk/teisstalk/automating-incident-response-for-a-hybrid-workforce/</a></p><p> </p><p>This episode is hosted by Geoff White </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a> </p><p> </p><p>Our Guests are</p><p>Vicki Gavin, Head of Information Security &amp; Compliance, Kaplan International</p><p><a href='https://www.linkedin.com/in/vickigavin/'>https://www.linkedin.com/in/vickigavin/</a></p><p> </p><p>Nenad Milisavljevic, Global Chief Information Security Officer, United Group B.V</p><p><a href='https://www.linkedin.com/in/nenadmilisavljevic/'>https://www.linkedin.com/in/nenadmilisavljevic/</a></p><p> </p><p>Israel Barak, Chief Security Officer, Cybereason</p><p><a href='https://www.linkedin.com/in/israel-barak-50b1a71/'>https://www.linkedin.com/in/israel-barak-50b1a71/</a> </p><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/8904421-teisstalk-automating-incident-response-for-a-hybrid-workforce.mp3" length="34093681" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-8904421</guid>
    <pubDate>Thu, 22 Jul 2021 09:00:00 +0100</pubDate>
    <itunes:duration>2836</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>22</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Can security awareness keep up with the attackers?</itunes:title>
    <title>teissTalk: Can security awareness keep up with the attackers?</title>
    <itunes:summary><![CDATA[This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; US companies hit by 'colossal' cyber-attack https://www.bbc.com/news/world-us-canada-57703836   The panel discussion is titled “Can security awareness keep up with the attackers?” https://www.teiss.co.uk/teisstalk/can-security-awareness-keep-up-with-the-attackers/   This episode i...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>US companies hit by &apos;colossal&apos; cyber-attack</p><p><a href='https://www.bbc.com/news/world-us-canada-57703836'>https://www.bbc.com/news/world-us-canada-57703836</a></p><p> </p><p>The panel discussion is titled “Can security awareness keep up with the attackers?”</p><p><a href='https://www.teiss.co.uk/teisstalk/can-security-awareness-keep-up-with-the-attackers/'>https://www.teiss.co.uk/teisstalk/can-security-awareness-keep-up-with-the-attackers/</a></p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a> </p><p> </p><p>Our Guests are</p><p>Lauren Zink, Security Training and Awareness programme manager, Oportun</p><p><a href='https://www.linkedin.com/in/laurenazink/'>https://www.linkedin.com/in/laurenazink/</a></p><p> </p><p>Ceri Jones, Technology Security Manager, NatWest</p><p><a href='https://www.linkedin.com/in/ceri-jones-9769802b/'>https://www.linkedin.com/in/ceri-jones-9769802b/</a></p><p> </p><p>Sarah Janes, Behaviour and culture specialist, Layer8</p><p><a href='https://www.linkedin.com/in/sarahjaneslayer8ltd/'>https://www.linkedin.com/in/sarahjaneslayer8ltd/</a></p><p> </p><p>Greg Keller, Chief Technology Officer, JumpCloud</p><p><a href='https://www.linkedin.com/in/gregorykeller/'>https://www.linkedin.com/in/gregorykeller/</a> </p><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>US companies hit by &apos;colossal&apos; cyber-attack</p><p><a href='https://www.bbc.com/news/world-us-canada-57703836'>https://www.bbc.com/news/world-us-canada-57703836</a></p><p> </p><p>The panel discussion is titled “Can security awareness keep up with the attackers?”</p><p><a href='https://www.teiss.co.uk/teisstalk/can-security-awareness-keep-up-with-the-attackers/'>https://www.teiss.co.uk/teisstalk/can-security-awareness-keep-up-with-the-attackers/</a></p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a> </p><p> </p><p>Our Guests are</p><p>Lauren Zink, Security Training and Awareness programme manager, Oportun</p><p><a href='https://www.linkedin.com/in/laurenazink/'>https://www.linkedin.com/in/laurenazink/</a></p><p> </p><p>Ceri Jones, Technology Security Manager, NatWest</p><p><a href='https://www.linkedin.com/in/ceri-jones-9769802b/'>https://www.linkedin.com/in/ceri-jones-9769802b/</a></p><p> </p><p>Sarah Janes, Behaviour and culture specialist, Layer8</p><p><a href='https://www.linkedin.com/in/sarahjaneslayer8ltd/'>https://www.linkedin.com/in/sarahjaneslayer8ltd/</a></p><p> </p><p>Greg Keller, Chief Technology Officer, JumpCloud</p><p><a href='https://www.linkedin.com/in/gregorykeller/'>https://www.linkedin.com/in/gregorykeller/</a> </p><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/8851132-teisstalk-can-security-awareness-keep-up-with-the-attackers.mp3" length="35117806" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8851132</guid>
    <pubDate>Fri, 16 Jul 2021 09:00:00 +0100</pubDate>
    <itunes:duration>2921</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>21</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Does cyber insurance incentivise ransomware?</itunes:title>
    <title>teissTalk: Does cyber insurance incentivise ransomware?</title>
    <itunes:summary><![CDATA[This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; Scant evidence that cyber insurance boom is leading to better security https://www.scmagazine.com/home/security-news/ransomware/scant-evidence-that-cyber-insurance-boom-is-leading-to-better-security/   The panel discussion is titled “Does cyber insurance incentivise ransomware?” https:...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Scant evidence that cyber insurance boom is leading to better security</p><p><a href='https://www.scmagazine.com/home/security-news/ransomware/scant-evidence-that-cyber-insurance-boom-is-leading-to-better-security/'>https://www.scmagazine.com/home/security-news/ransomware/scant-evidence-that-cyber-insurance-boom-is-leading-to-better-security/</a></p><p> </p><p>The panel discussion is titled “Does cyber insurance incentivise ransomware?”</p><p><a href='https://www.teiss.co.uk/teisstalk/does-cyber-insurance-incentivise-ransomware/'>https://www.teiss.co.uk/teisstalk/does-cyber-insurance-incentivise-ransomware/</a></p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a> </p><p> </p><p>Our Guests are</p><p>Troels Oerting, Chairman, NED, award winning CSO</p><p><a href='https://www.linkedin.com/in/troelsoerting/'>https://www.linkedin.com/in/troelsoerting/</a></p><p> </p><p>Ian Hill, Global Director of Cybersecurity, Royal BAM Group</p><p><a href='https://www.linkedin.com/in/ian-hill-95123897'>https://www.linkedin.com/in/ian-hill-95123897</a></p><p> </p><p>Riyad Jazmawi, Head of Information Security and IT Governance, INVESTBANK</p><p><a href='https://www.linkedin.com/in/riyad-jazmawi-364b303/'>https://www.linkedin.com/in/riyad-jazmawi-364b303/</a></p><p> </p><p>Mike Campfield, VP, GM International Operations and Global Security Programs, ExtraHop</p><p><a href='https://www.linkedin.com/in/mikecampfield/'>https://www.linkedin.com/in/mikecampfield/</a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Scant evidence that cyber insurance boom is leading to better security</p><p><a href='https://www.scmagazine.com/home/security-news/ransomware/scant-evidence-that-cyber-insurance-boom-is-leading-to-better-security/'>https://www.scmagazine.com/home/security-news/ransomware/scant-evidence-that-cyber-insurance-boom-is-leading-to-better-security/</a></p><p> </p><p>The panel discussion is titled “Does cyber insurance incentivise ransomware?”</p><p><a href='https://www.teiss.co.uk/teisstalk/does-cyber-insurance-incentivise-ransomware/'>https://www.teiss.co.uk/teisstalk/does-cyber-insurance-incentivise-ransomware/</a></p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a> </p><p> </p><p>Our Guests are</p><p>Troels Oerting, Chairman, NED, award winning CSO</p><p><a href='https://www.linkedin.com/in/troelsoerting/'>https://www.linkedin.com/in/troelsoerting/</a></p><p> </p><p>Ian Hill, Global Director of Cybersecurity, Royal BAM Group</p><p><a href='https://www.linkedin.com/in/ian-hill-95123897'>https://www.linkedin.com/in/ian-hill-95123897</a></p><p> </p><p>Riyad Jazmawi, Head of Information Security and IT Governance, INVESTBANK</p><p><a href='https://www.linkedin.com/in/riyad-jazmawi-364b303/'>https://www.linkedin.com/in/riyad-jazmawi-364b303/</a></p><p> </p><p>Mike Campfield, VP, GM International Operations and Global Security Programs, ExtraHop</p><p><a href='https://www.linkedin.com/in/mikecampfield/'>https://www.linkedin.com/in/mikecampfield/</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/8801760-teisstalk-does-cyber-insurance-incentivise-ransomware.mp3" length="36174790" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-8801760</guid>
    <pubDate>Wed, 14 Jul 2021 09:00:00 +0100</pubDate>
    <itunes:duration>3009</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>20</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: International Transfers of Data – the InfoSec Leaders’ Briefing</itunes:title>
    <title>teissTalk: International Transfers of Data – the InfoSec Leaders’ Briefing</title>
    <itunes:summary><![CDATA[This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; EU puts out final guidance on data transfers to third countries https://techcrunch.com/2021/06/22/eu-puts-out-final-guidance-on-data-transfers-to-third-countries   The panel discussion is titled “International Transfers of Data - the InfoSec Leaders' briefing” https://www.teiss.co.uk/t...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>EU puts out final guidance on data transfers to third countries</p><p><a href='https://techcrunch.com/2021/06/22/eu-puts-out-final-guidance-on-data-transfers-to-third-countries'>https://techcrunch.com/2021/06/22/eu-puts-out-final-guidance-on-data-transfers-to-third-countries</a></p><p> </p><p>The panel discussion is titled “International Transfers of Data - the InfoSec Leaders&apos; briefing”</p><p><a href='https://www.teiss.co.uk/teisstalk/international-transfers-of-data-the-infosec-leaders-briefing/'>https://www.teiss.co.uk/teisstalk/international-transfers-of-data-the-infosec-leaders-briefing/</a></p><p> </p><p>This episode is hosted by Geoff White </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a> </p><p> </p><p>Our Guests are</p><p>Fred H. Cate, Distinguished Professor and C. Ben Dutton Professor of Law, Indiana University</p><p><a href='https://www.linkedin.com/in/fred-cate-98a2981/'>https://www.linkedin.com/in/fred-cate-98a2981/</a></p><p> </p><p>Rebecca Rakoski, Managing Partner, XPAN Law Partners</p><p><a href='https://www.linkedin.com/in/rebecca-rakoski-esq-1460b116/'>https://www.linkedin.com/in/rebecca-rakoski-esq-1460b116/</a></p><p> </p><p>Bosko Vojkic, Group Data Protection Officer and Head of Data Protection, ERGOMED PLC</p><p><a href='https://www.linkedin.com/in/boskovojkic'>https://www.linkedin.com/in/boskovojkic</a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>EU puts out final guidance on data transfers to third countries</p><p><a href='https://techcrunch.com/2021/06/22/eu-puts-out-final-guidance-on-data-transfers-to-third-countries'>https://techcrunch.com/2021/06/22/eu-puts-out-final-guidance-on-data-transfers-to-third-countries</a></p><p> </p><p>The panel discussion is titled “International Transfers of Data - the InfoSec Leaders&apos; briefing”</p><p><a href='https://www.teiss.co.uk/teisstalk/international-transfers-of-data-the-infosec-leaders-briefing/'>https://www.teiss.co.uk/teisstalk/international-transfers-of-data-the-infosec-leaders-briefing/</a></p><p> </p><p>This episode is hosted by Geoff White </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a> </p><p> </p><p>Our Guests are</p><p>Fred H. Cate, Distinguished Professor and C. Ben Dutton Professor of Law, Indiana University</p><p><a href='https://www.linkedin.com/in/fred-cate-98a2981/'>https://www.linkedin.com/in/fred-cate-98a2981/</a></p><p> </p><p>Rebecca Rakoski, Managing Partner, XPAN Law Partners</p><p><a href='https://www.linkedin.com/in/rebecca-rakoski-esq-1460b116/'>https://www.linkedin.com/in/rebecca-rakoski-esq-1460b116/</a></p><p> </p><p>Bosko Vojkic, Group Data Protection Officer and Head of Data Protection, ERGOMED PLC</p><p><a href='https://www.linkedin.com/in/boskovojkic'>https://www.linkedin.com/in/boskovojkic</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/8801725-teisstalk-international-transfers-of-data-the-infosec-leaders-briefing.mp3" length="32951422" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-8801725</guid>
    <pubDate>Mon, 12 Jul 2021 09:00:00 +0100</pubDate>
    <itunes:duration>2740</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>19</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Disposal and destruction of data and devices</itunes:title>
    <title>teissTalk: Disposal and destruction of data and devices</title>
    <itunes:summary><![CDATA[This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; Recycle Your Phone, Sure, But Maybe Not Your Number https://krebsonsecurity.com/2021/05/recycle-your-phone-sure-but-maybe-not-your-number/   The panel discussion is titled “Disposal and destruction of data and devices” https://www.teiss.co.uk/teisstalk/disposal-and-destruction-of-data-...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Recycle Your Phone, Sure, But Maybe Not Your Number</p><p><a href='https://krebsonsecurity.com/2021/05/recycle-your-phone-sure-but-maybe-not-your-number/'>https://krebsonsecurity.com/2021/05/recycle-your-phone-sure-but-maybe-not-your-number/</a></p><p> </p><p>The panel discussion is titled “Disposal and destruction of data and devices”</p><p><a href='https://www.teiss.co.uk/teisstalk/disposal-and-destruction-of-data-and-devices/'>https://www.teiss.co.uk/teisstalk/disposal-and-destruction-of-data-and-devices/</a></p><p> </p><p>This episode is hosted by Geoff White </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a> </p><p> </p><p>Our Guests are</p><p>Fraser Brown, Global Head of Information Technology, Brewdog</p><p><a href='https://www.linkedin.com/in/fraserbrown1/'>https://www.linkedin.com/in/fraserbrown1/</a></p><p> </p><p>Elena Vrakatseli, Group Data Protection Officer, Euromedica Group SA</p><p><a href='https://www.linkedin.com/in/elena-vrakatseli-170255175/'>https://www.linkedin.com/in/elena-vrakatseli-170255175/</a></p><p> </p><p>Adrian Leung, Data protection Officer, Equifax UK</p><p><a href='https://www.linkedin.com/in/adrianleung1/'>https://www.linkedin.com/in/adrianleung1/</a></p><p> </p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Recycle Your Phone, Sure, But Maybe Not Your Number</p><p><a href='https://krebsonsecurity.com/2021/05/recycle-your-phone-sure-but-maybe-not-your-number/'>https://krebsonsecurity.com/2021/05/recycle-your-phone-sure-but-maybe-not-your-number/</a></p><p> </p><p>The panel discussion is titled “Disposal and destruction of data and devices”</p><p><a href='https://www.teiss.co.uk/teisstalk/disposal-and-destruction-of-data-and-devices/'>https://www.teiss.co.uk/teisstalk/disposal-and-destruction-of-data-and-devices/</a></p><p> </p><p>This episode is hosted by Geoff White </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a> </p><p> </p><p>Our Guests are</p><p>Fraser Brown, Global Head of Information Technology, Brewdog</p><p><a href='https://www.linkedin.com/in/fraserbrown1/'>https://www.linkedin.com/in/fraserbrown1/</a></p><p> </p><p>Elena Vrakatseli, Group Data Protection Officer, Euromedica Group SA</p><p><a href='https://www.linkedin.com/in/elena-vrakatseli-170255175/'>https://www.linkedin.com/in/elena-vrakatseli-170255175/</a></p><p> </p><p>Adrian Leung, Data protection Officer, Equifax UK</p><p><a href='https://www.linkedin.com/in/adrianleung1/'>https://www.linkedin.com/in/adrianleung1/</a></p><p> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/8801427-teisstalk-disposal-and-destruction-of-data-and-devices.mp3" length="33939753" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-8801427</guid>
    <pubDate>Fri, 09 Jul 2021 14:00:00 +0100</pubDate>
    <itunes:duration>2823</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>18</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: ROI from your SOC - Measuring impact and reporting progress</itunes:title>
    <title>teissTalk: ROI from your SOC - Measuring impact and reporting progress</title>
    <itunes:summary><![CDATA[This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; 70% of SOC teams overwhelmed by threat volume https://www.securitymagazine.com/articles/95325-of-soc-teams-overwhelmed-by-threat-volume   The panel discussion is titled “ROI from your SOC:  Measuring impact and reporting progress” https://www.teiss.co.uk/teisstalk/roi-from-your-so...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>70% of SOC teams overwhelmed by threat volume</p><p><a href='https://www.securitymagazine.com/articles/95325-of-soc-teams-overwhelmed-by-threat-volume'>https://www.securitymagazine.com/articles/95325-of-soc-teams-overwhelmed-by-threat-volume</a></p><p> </p><p>The panel discussion is titled “ROI from your SOC:  Measuring impact and reporting progress”</p><p><a href='https://www.teiss.co.uk/teisstalk/roi-from-your-soc-measuring-impact-and-reporting-progress/'>https://www.teiss.co.uk/teisstalk/roi-from-your-soc-measuring-impact-and-reporting-progress/</a></p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a> </p><p> </p><p>Our Guests are</p><p>Joyce Rodriguez, Global Head - Threat and Vulnerability Management, Shell</p><p><a href='https://www.linkedin.com/in/joyce-rodriguez-7b980067/'>https://www.linkedin.com/in/joyce-rodriguez-7b980067/</a></p><p> </p><p>Minesh Dattani, Cyber Security Operations Manager, Simply Business</p><p><a href='https://www.linkedin.com/in/minesh-dattani-023b3581/'>https://www.linkedin.com/in/minesh-dattani-023b3581/</a></p><p> </p><p>Samantha Humphries, Head of Security Strategy, EMEA, Exabeam</p><p><a href='https://www.linkedin.com/in/safesecs'>https://www.linkedin.com/in/safesecs</a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>70% of SOC teams overwhelmed by threat volume</p><p><a href='https://www.securitymagazine.com/articles/95325-of-soc-teams-overwhelmed-by-threat-volume'>https://www.securitymagazine.com/articles/95325-of-soc-teams-overwhelmed-by-threat-volume</a></p><p> </p><p>The panel discussion is titled “ROI from your SOC:  Measuring impact and reporting progress”</p><p><a href='https://www.teiss.co.uk/teisstalk/roi-from-your-soc-measuring-impact-and-reporting-progress/'>https://www.teiss.co.uk/teisstalk/roi-from-your-soc-measuring-impact-and-reporting-progress/</a></p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a> </p><p> </p><p>Our Guests are</p><p>Joyce Rodriguez, Global Head - Threat and Vulnerability Management, Shell</p><p><a href='https://www.linkedin.com/in/joyce-rodriguez-7b980067/'>https://www.linkedin.com/in/joyce-rodriguez-7b980067/</a></p><p> </p><p>Minesh Dattani, Cyber Security Operations Manager, Simply Business</p><p><a href='https://www.linkedin.com/in/minesh-dattani-023b3581/'>https://www.linkedin.com/in/minesh-dattani-023b3581/</a></p><p> </p><p>Samantha Humphries, Head of Security Strategy, EMEA, Exabeam</p><p><a href='https://www.linkedin.com/in/safesecs'>https://www.linkedin.com/in/safesecs</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/8800908-teisstalk-roi-from-your-soc-measuring-impact-and-reporting-progress.mp3" length="36285788" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-8800908</guid>
    <pubDate>Wed, 07 Jul 2021 09:00:00 +0100</pubDate>
    <itunes:duration>3018</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>17</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: 2021 threat trends: Ransomware</itunes:title>
    <title>teissTalk: 2021 threat trends: Ransomware</title>
    <itunes:summary><![CDATA[This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; NATO Warns it Will Consider a Military Response to Cyber-Attacks https://www.infosecurity-magazine.com/news/nato-warns-military-response-cyber/   The panel discussion is titled “2021 threat trends: Ransomware” https://www.teiss.co.uk/teisstalk/2021-threat-trends-ransomware/   This...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>NATO Warns it Will Consider a Military Response to Cyber-Attacks</p><p><a href='https://www.infosecurity-magazine.com/news/nato-warns-military-response-cyber/'>https://www.infosecurity-magazine.com/news/nato-warns-military-response-cyber/</a></p><p> </p><p>The panel discussion is titled “2021 threat trends: Ransomware”</p><p><a href='https://www.teiss.co.uk/teisstalk/2021-threat-trends-ransomware/'>https://www.teiss.co.uk/teisstalk/2021-threat-trends-ransomware/</a></p><p> </p><p>This episode is hosted by Geoff White </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a> </p><p> </p><p>Our Guests are</p><p>Andy Powell, Chief Information Security Officer, A.P. Moller - Maersk</p><p><a href='https://uk.linkedin.com/in/andy-powell-33158518'>https://uk.linkedin.com/in/andy-powell-33158518</a></p><p> </p><p>Chris White, Head of Cyber and Innovation, The Cyber Resilience Centre for the South East</p><p><a href='https://www.linkedin.com/in/chriswhite3'>https://www.linkedin.com/in/chriswhite3</a></p><p> </p><p>Benoit Heynderickx, Principal Analyst, Information Security Forum (ISF)</p><p><a href='https://www.linkedin.com/in/benoithey/'>https://www.linkedin.com/in/benoithey/</a></p><p> </p><p>Mariana Pereira, Director of Email Security, Darktrace</p><p><a href='https://www.linkedin.com/in/mmmpp/'>https://www.linkedin.com/in/mmmpp/</a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>NATO Warns it Will Consider a Military Response to Cyber-Attacks</p><p><a href='https://www.infosecurity-magazine.com/news/nato-warns-military-response-cyber/'>https://www.infosecurity-magazine.com/news/nato-warns-military-response-cyber/</a></p><p> </p><p>The panel discussion is titled “2021 threat trends: Ransomware”</p><p><a href='https://www.teiss.co.uk/teisstalk/2021-threat-trends-ransomware/'>https://www.teiss.co.uk/teisstalk/2021-threat-trends-ransomware/</a></p><p> </p><p>This episode is hosted by Geoff White </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a> </p><p> </p><p>Our Guests are</p><p>Andy Powell, Chief Information Security Officer, A.P. Moller - Maersk</p><p><a href='https://uk.linkedin.com/in/andy-powell-33158518'>https://uk.linkedin.com/in/andy-powell-33158518</a></p><p> </p><p>Chris White, Head of Cyber and Innovation, The Cyber Resilience Centre for the South East</p><p><a href='https://www.linkedin.com/in/chriswhite3'>https://www.linkedin.com/in/chriswhite3</a></p><p> </p><p>Benoit Heynderickx, Principal Analyst, Information Security Forum (ISF)</p><p><a href='https://www.linkedin.com/in/benoithey/'>https://www.linkedin.com/in/benoithey/</a></p><p> </p><p>Mariana Pereira, Director of Email Security, Darktrace</p><p><a href='https://www.linkedin.com/in/mmmpp/'>https://www.linkedin.com/in/mmmpp/</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/8800762-teisstalk-2021-threat-trends-ransomware.mp3" length="34454442" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-8800762</guid>
    <pubDate>Mon, 05 Jul 2021 09:00:00 +0100</pubDate>
    <itunes:duration>2866</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>16</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: The CISO-Cyber Security vendor relationship</itunes:title>
    <title>teissTalk: The CISO-Cyber Security vendor relationship</title>
    <itunes:summary><![CDATA[This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; Ransomware is biggest online threat to people in UK, spy agency chief to warn https://www.theguardian.com/technology/2021/jun/14/ransomware-is-biggest-online-threat-to-people-in-uk-spy-agency-chief-to-warn   The panel discussion is titled “The CISO-Cyber Security vendor relationship” h...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Ransomware is biggest online threat to people in UK, spy agency chief to warn</p><p><a href='https://www.theguardian.com/technology/2021/jun/14/ransomware-is-biggest-online-threat-to-people-in-uk-spy-agency-chief-to-warn'>https://www.theguardian.com/technology/2021/jun/14/ransomware-is-biggest-online-threat-to-people-in-uk-spy-agency-chief-to-warn</a></p><p> </p><p>The panel discussion is titled “The CISO-Cyber Security vendor relationship”</p><p><a href='https://www.teiss.co.uk/teisstalk/the-ciso-cyber-security-vendor-relationship/'>https://www.teiss.co.uk/teisstalk/the-ciso-cyber-security-vendor-relationship/</a></p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a> </p><p> </p><p>Our Guests are</p><p>Leda Muller, Chief Information Security Officer, Stanford University</p><p><a href='https://www.linkedin.com/in/ledamuller/'>https://www.linkedin.com/in/ledamuller/</a></p><p> </p><p>Sajeed Naseem, Chief Information Security Officer, New Jersey Courts</p><p><a href='https://www.linkedin.com/in/sajednaseem/'>https://www.linkedin.com/in/sajednaseem/</a></p><p> </p><p>Todd Carroll, Chief Information Security Officer, CybelAngel</p><p><a href='https://www.linkedin.com/in/todd-carroll-5a7b6b93/'>https://www.linkedin.com/in/todd-carroll-5a7b6b93/</a> </p><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Ransomware is biggest online threat to people in UK, spy agency chief to warn</p><p><a href='https://www.theguardian.com/technology/2021/jun/14/ransomware-is-biggest-online-threat-to-people-in-uk-spy-agency-chief-to-warn'>https://www.theguardian.com/technology/2021/jun/14/ransomware-is-biggest-online-threat-to-people-in-uk-spy-agency-chief-to-warn</a></p><p> </p><p>The panel discussion is titled “The CISO-Cyber Security vendor relationship”</p><p><a href='https://www.teiss.co.uk/teisstalk/the-ciso-cyber-security-vendor-relationship/'>https://www.teiss.co.uk/teisstalk/the-ciso-cyber-security-vendor-relationship/</a></p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a> </p><p> </p><p>Our Guests are</p><p>Leda Muller, Chief Information Security Officer, Stanford University</p><p><a href='https://www.linkedin.com/in/ledamuller/'>https://www.linkedin.com/in/ledamuller/</a></p><p> </p><p>Sajeed Naseem, Chief Information Security Officer, New Jersey Courts</p><p><a href='https://www.linkedin.com/in/sajednaseem/'>https://www.linkedin.com/in/sajednaseem/</a></p><p> </p><p>Todd Carroll, Chief Information Security Officer, CybelAngel</p><p><a href='https://www.linkedin.com/in/todd-carroll-5a7b6b93/'>https://www.linkedin.com/in/todd-carroll-5a7b6b93/</a> </p><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/8800688-teisstalk-the-ciso-cyber-security-vendor-relationship.mp3" length="37124287" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-8800688</guid>
    <pubDate>Fri, 02 Jul 2021 11:00:00 +0100</pubDate>
    <itunes:duration>3088</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>15</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Passive, reactive and proactive threat management</itunes:title>
    <title>teissTalk: Passive, reactive and proactive threat management</title>
    <itunes:summary><![CDATA[This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; SolarWinds hackers found conducting widespread spear-phishing campaign https://www.teiss.co.uk/solarwinds-hackers-spear-phishing-campaign/   The panel discussion is titled “Passive, reactive and proactive threat management” https://www.teiss.co.uk/teisstalk/passive-reactive-and-proacti...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>SolarWinds hackers found conducting widespread spear-phishing campaign</p><p><a href='https://www.teiss.co.uk/solarwinds-hackers-spear-phishing-campaign/'>https://www.teiss.co.uk/solarwinds-hackers-spear-phishing-campaign/</a></p><p> </p><p>The panel discussion is titled “Passive, reactive and proactive threat management”</p><p><a href='https://www.teiss.co.uk/teisstalk/passive-reactive-and-proactive-threat-management/'>https://www.teiss.co.uk/teisstalk/passive-reactive-and-proactive-threat-management/</a></p><p> </p><p>This episode is hosted by Geoff White </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a> </p><p> </p><p>Our Guests are</p><p>Craig McEwen, Chief Information Security Officer, Anglo American</p><p><a href='https://www.linkedin.com/in/craigjmcewen/'>https://www.linkedin.com/in/craigjmcewen/</a></p><p> </p><p>Lee Howard, Head of IT Security, Risk &amp; Shared Services, N Brown Group</p><p><a href='https://www.linkedin.com/in/lee87howard'>https://www.linkedin.com/in/lee87howard</a></p><p> </p><p>Simon Goldsmith, Senior Director - Information Security, adidas</p><p><a href='https://www.linkedin.com/in/smg-cyber/'>https://www.linkedin.com/in/smg-cyber/</a></p><p> </p><p>Matt Lock, Technical Director, UK, Varonis</p><p><a href='https://www.linkedin.com/in/matt-lock-uk/'>https://www.linkedin.com/in/matt-lock-uk/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>SolarWinds hackers found conducting widespread spear-phishing campaign</p><p><a href='https://www.teiss.co.uk/solarwinds-hackers-spear-phishing-campaign/'>https://www.teiss.co.uk/solarwinds-hackers-spear-phishing-campaign/</a></p><p> </p><p>The panel discussion is titled “Passive, reactive and proactive threat management”</p><p><a href='https://www.teiss.co.uk/teisstalk/passive-reactive-and-proactive-threat-management/'>https://www.teiss.co.uk/teisstalk/passive-reactive-and-proactive-threat-management/</a></p><p> </p><p>This episode is hosted by Geoff White </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a> </p><p> </p><p>Our Guests are</p><p>Craig McEwen, Chief Information Security Officer, Anglo American</p><p><a href='https://www.linkedin.com/in/craigjmcewen/'>https://www.linkedin.com/in/craigjmcewen/</a></p><p> </p><p>Lee Howard, Head of IT Security, Risk &amp; Shared Services, N Brown Group</p><p><a href='https://www.linkedin.com/in/lee87howard'>https://www.linkedin.com/in/lee87howard</a></p><p> </p><p>Simon Goldsmith, Senior Director - Information Security, adidas</p><p><a href='https://www.linkedin.com/in/smg-cyber/'>https://www.linkedin.com/in/smg-cyber/</a></p><p> </p><p>Matt Lock, Technical Director, UK, Varonis</p><p><a href='https://www.linkedin.com/in/matt-lock-uk/'>https://www.linkedin.com/in/matt-lock-uk/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/8776867-teisstalk-passive-reactive-and-proactive-threat-management.mp3" length="33387140" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8776867</guid>
    <pubDate>Mon, 28 Jun 2021 18:00:00 +0100</pubDate>
    <itunes:duration>2777</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>14</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Passwords and the future of authentication</itunes:title>
    <title>teissTalk: Passwords and the future of authentication</title>
    <itunes:summary><![CDATA[This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; Cybersecurity Experts Share Thoughts for World Password Day https://www.securityweek.com/cybersecurity-experts-share-thoughts-world-password-day   The panel discussion is titled “Passwords and the future of authentication” https://www.teiss.co.uk/teisstalk/passwords-and-the-future-of-a...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Cybersecurity Experts Share Thoughts for World Password Day</p><p><a href='https://www.securityweek.com/cybersecurity-experts-share-thoughts-world-password-day'>https://www.securityweek.com/cybersecurity-experts-share-thoughts-world-password-day</a></p><p> </p><p>The panel discussion is titled “Passwords and the future of authentication”</p><p><a href='https://www.teiss.co.uk/teisstalk/passwords-and-the-future-of-authentication/'>https://www.teiss.co.uk/teisstalk/passwords-and-the-future-of-authentication/</a></p><p> </p><p>This episode is hosted by Geoff White </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a> </p><p> </p><p>Our Guests are</p><p>Jake Davis, Hacking and hacker culture expert</p><p><a href='https://twitter.com/doublejake'>https://twitter.com/doublejake</a></p><p> </p><p>Felipe Garcia, Chief Information Security Officer, Scotiabank</p><p><a href='https://www.linkedin.com/in/felipegarciavivanco/'>https://www.linkedin.com/in/felipegarciavivanco/</a></p><p> </p><p>David Cartwright, Head of IT Security, Standard Bank International Client Solutions</p><p><a href='https://www.linkedin.com/in/davidscartwright/'>https://www.linkedin.com/in/davidscartwright/</a></p><p> </p><p>Richard Archdeacon, Advisory CISO, Duo</p><p><a href='https://www.linkedin.com/in/richardarchdeacon/'>https://www.linkedin.com/in/richardarchdeacon/</a> </p><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Cybersecurity Experts Share Thoughts for World Password Day</p><p><a href='https://www.securityweek.com/cybersecurity-experts-share-thoughts-world-password-day'>https://www.securityweek.com/cybersecurity-experts-share-thoughts-world-password-day</a></p><p> </p><p>The panel discussion is titled “Passwords and the future of authentication”</p><p><a href='https://www.teiss.co.uk/teisstalk/passwords-and-the-future-of-authentication/'>https://www.teiss.co.uk/teisstalk/passwords-and-the-future-of-authentication/</a></p><p> </p><p>This episode is hosted by Geoff White </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a> </p><p> </p><p>Our Guests are</p><p>Jake Davis, Hacking and hacker culture expert</p><p><a href='https://twitter.com/doublejake'>https://twitter.com/doublejake</a></p><p> </p><p>Felipe Garcia, Chief Information Security Officer, Scotiabank</p><p><a href='https://www.linkedin.com/in/felipegarciavivanco/'>https://www.linkedin.com/in/felipegarciavivanco/</a></p><p> </p><p>David Cartwright, Head of IT Security, Standard Bank International Client Solutions</p><p><a href='https://www.linkedin.com/in/davidscartwright/'>https://www.linkedin.com/in/davidscartwright/</a></p><p> </p><p>Richard Archdeacon, Advisory CISO, Duo</p><p><a href='https://www.linkedin.com/in/richardarchdeacon/'>https://www.linkedin.com/in/richardarchdeacon/</a> </p><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/8659992-teisstalk-passwords-and-the-future-of-authentication.mp3" length="34466401" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8659992</guid>
    <pubDate>Mon, 14 Jun 2021 09:00:00 +0100</pubDate>
    <itunes:duration>2867</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>13</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Cybersecurity in the new era of 5G</itunes:title>
    <title>teissTalk: Cybersecurity in the new era of 5G</title>
    <itunes:summary><![CDATA[This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; 5G Technology: Driving the Cybersecurity Evolution https://www.infosecurity-magazine.com/opinions/5g-driving-cybersecurity-evolution/   The panel discussion is titled “Cybersecurity in the new era of 5G” https://www.teiss.co.uk/teisstalk/cybersecurity-in-the-new-era-of-5g/   This ...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>5G Technology: Driving the Cybersecurity Evolution</p><p><a href='https://www.infosecurity-magazine.com/opinions/5g-driving-cybersecurity-evolution/'>https://www.infosecurity-magazine.com/opinions/5g-driving-cybersecurity-evolution/</a></p><p> </p><p>The panel discussion is titled “Cybersecurity in the new era of 5G”</p><p><a href='https://www.teiss.co.uk/teisstalk/cybersecurity-in-the-new-era-of-5g/'>https://www.teiss.co.uk/teisstalk/cybersecurity-in-the-new-era-of-5g/</a></p><p> </p><p>This episode is hosted by Geoff White </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a> </p><p> </p><p>Our Guests are</p><p>Saj Huq, Director, LORCA</p><p><a href='https://www.linkedin.com/in/sajhuq/'>https://www.linkedin.com/in/sajhuq/</a></p><p> </p><p>Stephen Douglas, Head of 5G strategy, Spirent Communications</p><p><a href='https://www.linkedin.com/in/stephenndouglas/'>https://www.linkedin.com/in/stephenndouglas/</a></p><p> </p><p>Ciara Mitchell, Head of Cyber, ScotlandIS</p><p><a href='https://www.linkedin.com/in/ciara-mitchell-edinburgh/'>https://www.linkedin.com/in/ciara-mitchell-edinburgh/</a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>5G Technology: Driving the Cybersecurity Evolution</p><p><a href='https://www.infosecurity-magazine.com/opinions/5g-driving-cybersecurity-evolution/'>https://www.infosecurity-magazine.com/opinions/5g-driving-cybersecurity-evolution/</a></p><p> </p><p>The panel discussion is titled “Cybersecurity in the new era of 5G”</p><p><a href='https://www.teiss.co.uk/teisstalk/cybersecurity-in-the-new-era-of-5g/'>https://www.teiss.co.uk/teisstalk/cybersecurity-in-the-new-era-of-5g/</a></p><p> </p><p>This episode is hosted by Geoff White </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a> </p><p> </p><p>Our Guests are</p><p>Saj Huq, Director, LORCA</p><p><a href='https://www.linkedin.com/in/sajhuq/'>https://www.linkedin.com/in/sajhuq/</a></p><p> </p><p>Stephen Douglas, Head of 5G strategy, Spirent Communications</p><p><a href='https://www.linkedin.com/in/stephenndouglas/'>https://www.linkedin.com/in/stephenndouglas/</a></p><p> </p><p>Ciara Mitchell, Head of Cyber, ScotlandIS</p><p><a href='https://www.linkedin.com/in/ciara-mitchell-edinburgh/'>https://www.linkedin.com/in/ciara-mitchell-edinburgh/</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/8625516-teisstalk-cybersecurity-in-the-new-era-of-5g.mp3" length="33981111" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-8625516</guid>
    <pubDate>Fri, 11 Jun 2021 09:00:00 +0100</pubDate>
    <itunes:duration>2826</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>12</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Securing your organisation’s hybrid working environment</itunes:title>
    <title>teissTalk: Securing your organisation’s hybrid working environment</title>
    <itunes:summary><![CDATA[This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; Many CISO’s engage in risky behaviour online https://www.teiss.co.uk/many-cisos-engage-in-risky-behaviour-online/   The panel discussion is titled “Securing your organisation's hybrid working environment” https://www.teiss.co.uk/teisstalk/securing-your-organisations-hybrid-working-envi...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Many CISO’s engage in risky behaviour online</p><p><a href='https://www.teiss.co.uk/many-cisos-engage-in-risky-behaviour-online/'>https://www.teiss.co.uk/many-cisos-engage-in-risky-behaviour-online/</a></p><p> </p><p>The panel discussion is titled “Securing your organisation&apos;s hybrid working environment”</p><p><a href='https://www.teiss.co.uk/teisstalk/securing-your-organisations-hybrid-working-environment/'>https://www.teiss.co.uk/teisstalk/securing-your-organisations-hybrid-working-environment/</a></p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a> </p><p> </p><p>Our Guests are</p><p>Gary Sorrentino, Global Deputy CIO, Zoom</p><p><a href='https://www.linkedin.com/in/garysorrentino/'>https://www.linkedin.com/in/garysorrentino/</a></p><p> </p><p>Marios Clark, Chief Information Security Officer, Zava</p><p><a href='https://www.linkedin.com/in/marios-clark/'>https://www.linkedin.com/in/marios-clark/</a></p><p> </p><p>Paul Baird, Chief Technology Security Officer, UK, Qualys</p><p><a href='https://www.linkedin.com/in/paul-baird-49b74456/'>https://www.linkedin.com/in/paul-baird-49b74456/</a> </p><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Many CISO’s engage in risky behaviour online</p><p><a href='https://www.teiss.co.uk/many-cisos-engage-in-risky-behaviour-online/'>https://www.teiss.co.uk/many-cisos-engage-in-risky-behaviour-online/</a></p><p> </p><p>The panel discussion is titled “Securing your organisation&apos;s hybrid working environment”</p><p><a href='https://www.teiss.co.uk/teisstalk/securing-your-organisations-hybrid-working-environment/'>https://www.teiss.co.uk/teisstalk/securing-your-organisations-hybrid-working-environment/</a></p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a> </p><p> </p><p>Our Guests are</p><p>Gary Sorrentino, Global Deputy CIO, Zoom</p><p><a href='https://www.linkedin.com/in/garysorrentino/'>https://www.linkedin.com/in/garysorrentino/</a></p><p> </p><p>Marios Clark, Chief Information Security Officer, Zava</p><p><a href='https://www.linkedin.com/in/marios-clark/'>https://www.linkedin.com/in/marios-clark/</a></p><p> </p><p>Paul Baird, Chief Technology Security Officer, UK, Qualys</p><p><a href='https://www.linkedin.com/in/paul-baird-49b74456/'>https://www.linkedin.com/in/paul-baird-49b74456/</a> </p><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/8625478-teisstalk-securing-your-organisation-s-hybrid-working-environment.mp3" length="35905251" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8625478</guid>
    <pubDate>Wed, 09 Jun 2021 09:00:00 +0100</pubDate>
    <itunes:duration>2986</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>11</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Cyber career paths – a way out of our skills shortage?</itunes:title>
    <title>teissTalk: Cyber career paths – a way out of our skills shortage?</title>
    <itunes:summary><![CDATA[This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; Government forms UK Cyber Security Council to govern the cyber security sector https://www.teiss.co.uk/uk-cyber-security-council-to-govern-cybersec-sector/   The panel discussion is titled “Cyber career paths - a way out of our skills shortage?” https://www.teiss.co.uk/teisstalk/cyber-...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Government forms UK Cyber Security Council to govern the cyber security sector</p><p><a href='https://www.teiss.co.uk/uk-cyber-security-council-to-govern-cybersec-sector/'>https://www.teiss.co.uk/uk-cyber-security-council-to-govern-cybersec-sector/</a></p><p> </p><p>The panel discussion is titled “Cyber career paths - a way out of our skills shortage?”</p><p><a href='https://www.teiss.co.uk/teisstalk/cyber-career-paths-a-way-out-of-our-skills-shortage/'>https://www.teiss.co.uk/teisstalk/cyber-career-paths-a-way-out-of-our-skills-shortage/</a></p><p> </p><p>This episode is hosted by Geoff White </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a> </p><p> </p><p>Our Guests are</p><p>Danny Dresner, Professor of Cyber Security, University of Manchester</p><p><a href='https://www.linkedin.com/in/danny-dresner-fciis-6382381'>https://www.linkedin.com/in/danny-dresner-fciis-6382381</a></p><p> </p><p>Jay Jay Davey, Cyber Security | Ethical Hacker &amp; Blue Team expert, Nox Cyber</p><p><a href='https://www.linkedin.com/in/noxcyber/'>https://www.linkedin.com/in/noxcyber/</a></p><p> </p><p>Amanda Finch, CEO, Chartered Institute of Information Security</p><p><a href='https://www.linkedin.com/in/amanda-finch-mciis-b1b1951/'>https://www.linkedin.com/in/amanda-finch-mciis-b1b1951/</a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Government forms UK Cyber Security Council to govern the cyber security sector</p><p><a href='https://www.teiss.co.uk/uk-cyber-security-council-to-govern-cybersec-sector/'>https://www.teiss.co.uk/uk-cyber-security-council-to-govern-cybersec-sector/</a></p><p> </p><p>The panel discussion is titled “Cyber career paths - a way out of our skills shortage?”</p><p><a href='https://www.teiss.co.uk/teisstalk/cyber-career-paths-a-way-out-of-our-skills-shortage/'>https://www.teiss.co.uk/teisstalk/cyber-career-paths-a-way-out-of-our-skills-shortage/</a></p><p> </p><p>This episode is hosted by Geoff White </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a> </p><p> </p><p>Our Guests are</p><p>Danny Dresner, Professor of Cyber Security, University of Manchester</p><p><a href='https://www.linkedin.com/in/danny-dresner-fciis-6382381'>https://www.linkedin.com/in/danny-dresner-fciis-6382381</a></p><p> </p><p>Jay Jay Davey, Cyber Security | Ethical Hacker &amp; Blue Team expert, Nox Cyber</p><p><a href='https://www.linkedin.com/in/noxcyber/'>https://www.linkedin.com/in/noxcyber/</a></p><p> </p><p>Amanda Finch, CEO, Chartered Institute of Information Security</p><p><a href='https://www.linkedin.com/in/amanda-finch-mciis-b1b1951/'>https://www.linkedin.com/in/amanda-finch-mciis-b1b1951/</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/8625415-teisstalk-cyber-career-paths-a-way-out-of-our-skills-shortage.mp3" length="33781471" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-8625415</guid>
    <pubDate>Mon, 07 Jun 2021 09:00:00 +0100</pubDate>
    <itunes:duration>2810</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: The future role of the CISO</itunes:title>
    <title>teissTalk: The future role of the CISO</title>
    <itunes:summary><![CDATA[This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; HSE forced to shut down computer systems due to ‘significant cyber attack’ https://www.teiss.co.uk/hse-forced-to-shut-down-computer-systems-due-to-significant-cyber-attack/   The panel discussion is titled “The future role of the CISO” https://www.teiss.co.uk/teisstalk/the-future-role-...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>HSE forced to shut down computer systems due to ‘significant cyber attack’</p><p><a href='https://www.teiss.co.uk/hse-forced-to-shut-down-computer-systems-due-to-significant-cyber-attack/'>https://www.teiss.co.uk/hse-forced-to-shut-down-computer-systems-due-to-significant-cyber-attack/</a></p><p> </p><p>The panel discussion is titled “The future role of the CISO”</p><p><a href='https://www.teiss.co.uk/teisstalk/the-future-role-of-the-ciso/'>https://www.teiss.co.uk/teisstalk/the-future-role-of-the-ciso/</a></p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a> </p><p> </p><p>Our Guests are</p><p>Kathleen Mullin, Chief Information Security Officer, Healthmap Solutions</p><p><a href='https://www.linkedin.com/in/katemullin/'>https://www.linkedin.com/in/katemullin/</a></p><p> </p><p>Paul Raines, Chief Information Security Officer, United Nations Development Programme</p><p><a href='https://www.linkedin.com/in/paul-raines-58ab08177/'>https://www.linkedin.com/in/paul-raines-58ab08177/</a></p><p> </p><p>Ian Hill, Global Director of Cybersecurity, Royal BAM Group</p><p><a href='https://www.linkedin.com/in/ian-hill-95123897'>https://www.linkedin.com/in/ian-hill-95123897</a></p><p> </p><p>Stephen Moore, Vice President and Chief Security Strategist, Exabeam</p><p><a href='https://www.linkedin.com/in/stephenrmoore/'>https://www.linkedin.com/in/stephenrmoore/</a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>HSE forced to shut down computer systems due to ‘significant cyber attack’</p><p><a href='https://www.teiss.co.uk/hse-forced-to-shut-down-computer-systems-due-to-significant-cyber-attack/'>https://www.teiss.co.uk/hse-forced-to-shut-down-computer-systems-due-to-significant-cyber-attack/</a></p><p> </p><p>The panel discussion is titled “The future role of the CISO”</p><p><a href='https://www.teiss.co.uk/teisstalk/the-future-role-of-the-ciso/'>https://www.teiss.co.uk/teisstalk/the-future-role-of-the-ciso/</a></p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a> </p><p> </p><p>Our Guests are</p><p>Kathleen Mullin, Chief Information Security Officer, Healthmap Solutions</p><p><a href='https://www.linkedin.com/in/katemullin/'>https://www.linkedin.com/in/katemullin/</a></p><p> </p><p>Paul Raines, Chief Information Security Officer, United Nations Development Programme</p><p><a href='https://www.linkedin.com/in/paul-raines-58ab08177/'>https://www.linkedin.com/in/paul-raines-58ab08177/</a></p><p> </p><p>Ian Hill, Global Director of Cybersecurity, Royal BAM Group</p><p><a href='https://www.linkedin.com/in/ian-hill-95123897'>https://www.linkedin.com/in/ian-hill-95123897</a></p><p> </p><p>Stephen Moore, Vice President and Chief Security Strategist, Exabeam</p><p><a href='https://www.linkedin.com/in/stephenrmoore/'>https://www.linkedin.com/in/stephenrmoore/</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/8625320-teisstalk-the-future-role-of-the-ciso.mp3" length="34739693" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-8625320</guid>
    <pubDate>Fri, 04 Jun 2021 09:00:00 +0100</pubDate>
    <itunes:duration>2889</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Measuring your Organisation’s Cyber Resilience</itunes:title>
    <title>teissTalk: Measuring your Organisation’s Cyber Resilience</title>
    <itunes:summary><![CDATA[This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; US pipeline giant Colonial Pipeline suffers disruptive DarkSide ransomware attack https://www.teiss.co.uk/colonial-pipeline-darkside-ransomware-attack/   The panel discussion is titled “Measuring your organisation’s cyber resilience” https://www.teiss.co.uk/teisstalk/measuring-your-org...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>US pipeline giant Colonial Pipeline suffers disruptive DarkSide ransomware attack</p><p><a href='https://www.teiss.co.uk/colonial-pipeline-darkside-ransomware-attack/'>https://www.teiss.co.uk/colonial-pipeline-darkside-ransomware-attack/</a></p><p> </p><p>The panel discussion is titled “Measuring your organisation’s cyber resilience”</p><p><a href='https://www.teiss.co.uk/teisstalk/measuring-your-organisations-cyber-resilience/'>https://www.teiss.co.uk/teisstalk/measuring-your-organisations-cyber-resilience/</a></p><p> </p><p>This episode is hosted by Geoff White </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a> </p><p> </p><p>Our Guests are</p><p>Sandra Bell, Risk &amp; Resilience expert</p><p><a href='https://www.linkedin.com/in/sandra-bell-13a109183/'>https://www.linkedin.com/in/sandra-bell-13a109183/</a></p><p> </p><p>Martyn Booth, Chief Information Security Officer, Euromoney Institutional Investor</p><p><a href='https://www.linkedin.com/in/martynwb/'>https://www.linkedin.com/in/martynwb/</a></p><p> </p><p>Ben Lindgreen, Head of Cyber Resilience, Pay.UK</p><p><a href='https://www.linkedin.com/in/benlindgreen/'>https://www.linkedin.com/in/benlindgreen/</a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>US pipeline giant Colonial Pipeline suffers disruptive DarkSide ransomware attack</p><p><a href='https://www.teiss.co.uk/colonial-pipeline-darkside-ransomware-attack/'>https://www.teiss.co.uk/colonial-pipeline-darkside-ransomware-attack/</a></p><p> </p><p>The panel discussion is titled “Measuring your organisation’s cyber resilience”</p><p><a href='https://www.teiss.co.uk/teisstalk/measuring-your-organisations-cyber-resilience/'>https://www.teiss.co.uk/teisstalk/measuring-your-organisations-cyber-resilience/</a></p><p> </p><p>This episode is hosted by Geoff White </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a> </p><p> </p><p>Our Guests are</p><p>Sandra Bell, Risk &amp; Resilience expert</p><p><a href='https://www.linkedin.com/in/sandra-bell-13a109183/'>https://www.linkedin.com/in/sandra-bell-13a109183/</a></p><p> </p><p>Martyn Booth, Chief Information Security Officer, Euromoney Institutional Investor</p><p><a href='https://www.linkedin.com/in/martynwb/'>https://www.linkedin.com/in/martynwb/</a></p><p> </p><p>Ben Lindgreen, Head of Cyber Resilience, Pay.UK</p><p><a href='https://www.linkedin.com/in/benlindgreen/'>https://www.linkedin.com/in/benlindgreen/</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/8625224-teisstalk-measuring-your-organisation-s-cyber-resilience.mp3" length="34830010" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-8625224</guid>
    <pubDate>Wed, 02 Jun 2021 09:00:00 +0100</pubDate>
    <itunes:duration>2897</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Why do we still see email security as only a perimeter problem?</itunes:title>
    <title>teissTalk: Why do we still see email security as only a perimeter problem?</title>
    <itunes:summary><![CDATA[This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; West Midlands Trains employees emailed ‘worker bonus’ as a phishing test https://www.teiss.co.uk/west-midlands-trains-employees-emailed-worker-bonus-as-a-phishing-test/   The panel discussion is titled “Why do we still see email security as only a perimeter problem?” https://www.teiss....]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>West Midlands Trains employees emailed ‘worker bonus’ as a phishing test</p><p><a href='https://www.teiss.co.uk/west-midlands-trains-employees-emailed-worker-bonus-as-a-phishing-test/'>https://www.teiss.co.uk/west-midlands-trains-employees-emailed-worker-bonus-as-a-phishing-test/</a></p><p> </p><p>The panel discussion is titled “Why do we still see email security as only a perimeter problem?”</p><p><a href='https://www.teiss.co.uk/teisstalk/why-do-we-still-see-email-security-as-only-a-perimeter-problem/'>https://www.teiss.co.uk/teisstalk/why-do-we-still-see-email-security-as-only-a-perimeter-problem/</a></p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a> </p><p> </p><p>Our Guests are</p><p>Edward Tucker, Chief Information Security Officer, Co-founder of Email Auth, Byte and Human Firewall</p><p><a href='https://www.linkedin.com/in/tuckeredward/'>https://www.linkedin.com/in/tuckeredward/</a></p><p> </p><p>Benjamin Corll, VP Cyber Security and Data Protection, Coats</p><p><a href='https://www.linkedin.com/in/benjamincorll'>https://www.linkedin.com/in/benjamincorll</a></p><p> </p><p>Vlad Brodsky, Chief Information Security Officer, OTC Markets Group</p><p><a href='https://www.linkedin.com/in/vlad-brodsky-b18b0a3'>https://www.linkedin.com/in/vlad-brodsky-b18b0a3</a></p><p> </p><p>Fahim Afghan, Senior Product Marketing Manager, Egress</p><p><a href='https://www.linkedin.com/in/fahimafghan'>https://www.linkedin.com/in/fahimafghan</a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>West Midlands Trains employees emailed ‘worker bonus’ as a phishing test</p><p><a href='https://www.teiss.co.uk/west-midlands-trains-employees-emailed-worker-bonus-as-a-phishing-test/'>https://www.teiss.co.uk/west-midlands-trains-employees-emailed-worker-bonus-as-a-phishing-test/</a></p><p> </p><p>The panel discussion is titled “Why do we still see email security as only a perimeter problem?”</p><p><a href='https://www.teiss.co.uk/teisstalk/why-do-we-still-see-email-security-as-only-a-perimeter-problem/'>https://www.teiss.co.uk/teisstalk/why-do-we-still-see-email-security-as-only-a-perimeter-problem/</a></p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a> </p><p> </p><p>Our Guests are</p><p>Edward Tucker, Chief Information Security Officer, Co-founder of Email Auth, Byte and Human Firewall</p><p><a href='https://www.linkedin.com/in/tuckeredward/'>https://www.linkedin.com/in/tuckeredward/</a></p><p> </p><p>Benjamin Corll, VP Cyber Security and Data Protection, Coats</p><p><a href='https://www.linkedin.com/in/benjamincorll'>https://www.linkedin.com/in/benjamincorll</a></p><p> </p><p>Vlad Brodsky, Chief Information Security Officer, OTC Markets Group</p><p><a href='https://www.linkedin.com/in/vlad-brodsky-b18b0a3'>https://www.linkedin.com/in/vlad-brodsky-b18b0a3</a></p><p> </p><p>Fahim Afghan, Senior Product Marketing Manager, Egress</p><p><a href='https://www.linkedin.com/in/fahimafghan'>https://www.linkedin.com/in/fahimafghan</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/8624316-teisstalk-why-do-we-still-see-email-security-as-only-a-perimeter-problem.mp3" length="33367396" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-8624316</guid>
    <pubDate>Tue, 01 Jun 2021 15:00:00 +0100</pubDate>
    <itunes:duration>2775</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Security &amp; Privacy by Design: Avoiding a “bolt-on” Approach</itunes:title>
    <title>teissTalk: Security &amp; Privacy by Design: Avoiding a “bolt-on” Approach</title>
    <itunes:summary><![CDATA[This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; Contact-tracing apps: Android phones were leaking sensitive data, find researchers https://www.zdnet.com/article/contact-tracing-apps-android-phones-were-leaking-sensitive-data-find-researchers/   The panel discussion is titled “Security and Privacy by design: avoiding a “bolt-on” appr...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Contact-tracing apps: Android phones were leaking sensitive data, find researchers</p><p><a href='https://www.zdnet.com/article/contact-tracing-apps-android-phones-were-leaking-sensitive-data-find-researchers/'>https://www.zdnet.com/article/contact-tracing-apps-android-phones-were-leaking-sensitive-data-find-researchers/</a></p><p> </p><p>The panel discussion is titled “Security and Privacy by design: avoiding a “bolt-on” approach”</p><p><a href='https://www.teiss.co.uk/teisstalk/security-and-privacy-by-design-avoiding-a-bolt-on-approach/'>https://www.teiss.co.uk/teisstalk/security-and-privacy-by-design-avoiding-a-bolt-on-approach/</a></p><p> </p><p>This episode is hosted by Geoff White </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a> </p><p> </p><p>Our Guests are</p><p>Victoria van Roosmalen, Chief Information Security Officer, Coosto</p><p><a href='https://www.linkedin.com/in/victoriavanroosmalen'>https://www.linkedin.com/in/victoriavanroosmalen</a></p><p> </p><p>Julian Osborne, Chief Information Security Officer, Volkswagen Group UK</p><p><a href='https://www.linkedin.com/in/julianwhosborne/'>https://www.linkedin.com/in/julianwhosborne/</a></p><p> </p><p>Sarah Clarke, Data Protection and Security Governance Expert, Infospectives Ltd</p><p><a href='https://www.linkedin.com/in/infospectives/'>https://www.linkedin.com/in/infospectives/</a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Contact-tracing apps: Android phones were leaking sensitive data, find researchers</p><p><a href='https://www.zdnet.com/article/contact-tracing-apps-android-phones-were-leaking-sensitive-data-find-researchers/'>https://www.zdnet.com/article/contact-tracing-apps-android-phones-were-leaking-sensitive-data-find-researchers/</a></p><p> </p><p>The panel discussion is titled “Security and Privacy by design: avoiding a “bolt-on” approach”</p><p><a href='https://www.teiss.co.uk/teisstalk/security-and-privacy-by-design-avoiding-a-bolt-on-approach/'>https://www.teiss.co.uk/teisstalk/security-and-privacy-by-design-avoiding-a-bolt-on-approach/</a></p><p> </p><p>This episode is hosted by Geoff White </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a> </p><p> </p><p>Our Guests are</p><p>Victoria van Roosmalen, Chief Information Security Officer, Coosto</p><p><a href='https://www.linkedin.com/in/victoriavanroosmalen'>https://www.linkedin.com/in/victoriavanroosmalen</a></p><p> </p><p>Julian Osborne, Chief Information Security Officer, Volkswagen Group UK</p><p><a href='https://www.linkedin.com/in/julianwhosborne/'>https://www.linkedin.com/in/julianwhosborne/</a></p><p> </p><p>Sarah Clarke, Data Protection and Security Governance Expert, Infospectives Ltd</p><p><a href='https://www.linkedin.com/in/infospectives/'>https://www.linkedin.com/in/infospectives/</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/8605484-teisstalk-security-privacy-by-design-avoiding-a-bolt-on-approach.mp3" length="33420678" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-8605484</guid>
    <pubDate>Fri, 28 May 2021 17:00:00 +0100</pubDate>
    <itunes:duration>2779</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: The Evolution of Cloud Security – Then, Now &amp; to Come</itunes:title>
    <title>teissTalk: The Evolution of Cloud Security – Then, Now &amp; to Come</title>
    <itunes:summary><![CDATA[This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; Majority of malware now delivered via cloud apps https://www.securitymagazine.com/articles/94702-majority-of-malware-now-delivered-via-cloud-apps   The panel discussion is titled “The evolution of Cloud Security - Then, now and to come” https://www.teiss.co.uk/teisstalk/the-evolution-o...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Majority of malware now delivered via cloud apps</p><p><a href='https://www.securitymagazine.com/articles/94702-majority-of-malware-now-delivered-via-cloud-apps'>https://www.securitymagazine.com/articles/94702-majority-of-malware-now-delivered-via-cloud-apps</a></p><p> </p><p>The panel discussion is titled “The evolution of Cloud Security - Then, now and to come”</p><p><a href='https://www.teiss.co.uk/teisstalk/the-evolution-of-cloud-security-then-now-and-to-come/'>https://www.teiss.co.uk/teisstalk/the-evolution-of-cloud-security-then-now-and-to-come/</a></p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a> </p><p> </p><p>Our Guests are</p><p>John Opala, Vice President of IT Security, McCormick &amp; Company</p><p><a href='https://www.linkedin.com/in/johnopalaphd/'>https://www.linkedin.com/in/johnopalaphd/</a></p><p> </p><p>Edd Hardy, Senior Vice President Cyber Security, AlixPartners</p><p><a href='https://www.linkedin.com/in/eddhardy'>https://www.linkedin.com/in/eddhardy</a></p><p> </p><p>Dr Erdal Ozkaya, Regional Chief Information Security Officer, Standard Chartered Bank</p><p><a href='https://www.linkedin.com/in/erdalozkaya/'>https://www.linkedin.com/in/erdalozkaya/</a></p><p> </p><p>Paul Baird, Chief Technology Security Officer, UK, Qualys</p><p><a href='https://www.linkedin.com/in/paul-baird-49b74456/'>https://www.linkedin.com/in/paul-baird-49b74456/</a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Majority of malware now delivered via cloud apps</p><p><a href='https://www.securitymagazine.com/articles/94702-majority-of-malware-now-delivered-via-cloud-apps'>https://www.securitymagazine.com/articles/94702-majority-of-malware-now-delivered-via-cloud-apps</a></p><p> </p><p>The panel discussion is titled “The evolution of Cloud Security - Then, now and to come”</p><p><a href='https://www.teiss.co.uk/teisstalk/the-evolution-of-cloud-security-then-now-and-to-come/'>https://www.teiss.co.uk/teisstalk/the-evolution-of-cloud-security-then-now-and-to-come/</a></p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a> </p><p> </p><p>Our Guests are</p><p>John Opala, Vice President of IT Security, McCormick &amp; Company</p><p><a href='https://www.linkedin.com/in/johnopalaphd/'>https://www.linkedin.com/in/johnopalaphd/</a></p><p> </p><p>Edd Hardy, Senior Vice President Cyber Security, AlixPartners</p><p><a href='https://www.linkedin.com/in/eddhardy'>https://www.linkedin.com/in/eddhardy</a></p><p> </p><p>Dr Erdal Ozkaya, Regional Chief Information Security Officer, Standard Chartered Bank</p><p><a href='https://www.linkedin.com/in/erdalozkaya/'>https://www.linkedin.com/in/erdalozkaya/</a></p><p> </p><p>Paul Baird, Chief Technology Security Officer, UK, Qualys</p><p><a href='https://www.linkedin.com/in/paul-baird-49b74456/'>https://www.linkedin.com/in/paul-baird-49b74456/</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/8593511-teisstalk-the-evolution-of-cloud-security-then-now-to-come.mp3" length="35566073" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8593511</guid>
    <pubDate>Wed, 26 May 2021 18:00:00 +0100</pubDate>
    <itunes:duration>2958</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: 2021 cyber-crime trends: ransomware, BEC and social engineering</itunes:title>
    <title>teissTalk: 2021 cyber-crime trends: ransomware, BEC and social engineering</title>
    <itunes:summary><![CDATA[This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; Internet Organised Crime Threat Assessment https://www.europol.europa.eu/activities-services/main-reports/european-union-serious-and-organised-crime-threat-assessment   The panel discussion is titled “2021 cyber-crime trends: ransomware, BEC and social engineering” https://www.teiss.co...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Internet Organised Crime Threat Assessment</p><p><a href='https://www.europol.europa.eu/activities-services/main-reports/european-union-serious-and-organised-crime-threat-assessment'>https://www.europol.europa.eu/activities-services/main-reports/european-union-serious-and-organised-crime-threat-assessment</a></p><p> </p><p>The panel discussion is titled “2021 cyber-crime trends: ransomware, BEC and social engineering”</p><p><a href='https://www.teiss.co.uk/teisstalk/2021-cybercrime-threat-trends-execution-evolution-of-ransomware-bec-and-social-engineering/'>https://www.teiss.co.uk/teisstalk/2021-cybercrime-threat-trends-execution-evolution-of-ransomware-bec-and-social-engineering/</a></p><p> </p><p>This episode is hosted by Geoff White </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a> </p><p> </p><p>Our Guests are</p><p>Philipp Amann, Head of Strategy, Europol - EC3</p><p><a href='https://www.linkedin.com/in/philippamann/'>https://www.linkedin.com/in/philippamann/</a></p><p> </p><p>Milos Pesic, Global Head of Information &amp; Cyber Security, Marken</p><p><a href='https://www.linkedin.com/in/milos-pesic-87168a9b/'>https://www.linkedin.com/in/milos-pesic-87168a9b/</a></p><p> </p><p>Mariana Pereira, Director of Email Security, Darktrace</p><p><a href='https://www.linkedin.com/in/mmmpp/'>https://www.linkedin.com/in/mmmpp/</a> </p><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Internet Organised Crime Threat Assessment</p><p><a href='https://www.europol.europa.eu/activities-services/main-reports/european-union-serious-and-organised-crime-threat-assessment'>https://www.europol.europa.eu/activities-services/main-reports/european-union-serious-and-organised-crime-threat-assessment</a></p><p> </p><p>The panel discussion is titled “2021 cyber-crime trends: ransomware, BEC and social engineering”</p><p><a href='https://www.teiss.co.uk/teisstalk/2021-cybercrime-threat-trends-execution-evolution-of-ransomware-bec-and-social-engineering/'>https://www.teiss.co.uk/teisstalk/2021-cybercrime-threat-trends-execution-evolution-of-ransomware-bec-and-social-engineering/</a></p><p> </p><p>This episode is hosted by Geoff White </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a> </p><p> </p><p>Our Guests are</p><p>Philipp Amann, Head of Strategy, Europol - EC3</p><p><a href='https://www.linkedin.com/in/philippamann/'>https://www.linkedin.com/in/philippamann/</a></p><p> </p><p>Milos Pesic, Global Head of Information &amp; Cyber Security, Marken</p><p><a href='https://www.linkedin.com/in/milos-pesic-87168a9b/'>https://www.linkedin.com/in/milos-pesic-87168a9b/</a></p><p> </p><p>Mariana Pereira, Director of Email Security, Darktrace</p><p><a href='https://www.linkedin.com/in/mmmpp/'>https://www.linkedin.com/in/mmmpp/</a> </p><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/8577652-teisstalk-2021-cyber-crime-trends-ransomware-bec-and-social-engineering.mp3" length="34533502" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-8577652</guid>
    <pubDate>Mon, 24 May 2021 15:00:00 +0100</pubDate>
    <itunes:duration>2872</itunes:duration>
    <itunes:keywords>Cyber Security, InfoSec, Information Security, cyber crime, europol, ransomware</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Removing your ‘cloak of complexity’ in quantifying cyber risk</itunes:title>
    <title>teissTalk: Removing your ‘cloak of complexity’ in quantifying cyber risk</title>
    <itunes:summary><![CDATA[This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; Welcome to The Age of CISOs Quantifying Risk https://www.teiss.co.uk/welcome-to-the-age-of-cisos-quantifying-risk/   The panel discussion is titled “Removing your ‘cloak of complexity’ in quantifying cyber risk” https://www.teiss.co.uk/teisstalk/quantifying-and-reporting-cyber-risk-com...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Welcome to The Age of CISOs Quantifying Risk</p><p><a href='https://www.teiss.co.uk/welcome-to-the-age-of-cisos-quantifying-risk/'>https://www.teiss.co.uk/welcome-to-the-age-of-cisos-quantifying-risk/</a></p><p> </p><p>The panel discussion is titled “Removing your ‘cloak of complexity’ in quantifying cyber risk”</p><p><a href='https://www.teiss.co.uk/teisstalk/quantifying-and-reporting-cyber-risk-communicating-informed-decisions-and-removing-the-cloak-of-complexity/'>https://www.teiss.co.uk/teisstalk/quantifying-and-reporting-cyber-risk-communicating-informed-decisions-and-removing-the-cloak-of-complexity/</a></p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a> </p><p> </p><p>Our Guests are</p><p>Steve Brown, Cyber Security Director, Mastercard</p><p><a href='https://www.linkedin.com/in/stevebrown100/'>https://www.linkedin.com/in/stevebrown100/</a></p><p> </p><p>Michelle Griffey, Chief Risk Officer, Communisis</p><p><a href='https://www.linkedin.com/in/michelle-griffey/'>https://www.linkedin.com/in/michelle-griffey/</a></p><p> </p><p>Ken Munro, Partner, PenTest Partners</p><p><a href='https://www.linkedin.com/in/ken-munro-17899b1/'>https://www.linkedin.com/in/ken-munro-17899b1/</a> </p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Welcome to The Age of CISOs Quantifying Risk</p><p><a href='https://www.teiss.co.uk/welcome-to-the-age-of-cisos-quantifying-risk/'>https://www.teiss.co.uk/welcome-to-the-age-of-cisos-quantifying-risk/</a></p><p> </p><p>The panel discussion is titled “Removing your ‘cloak of complexity’ in quantifying cyber risk”</p><p><a href='https://www.teiss.co.uk/teisstalk/quantifying-and-reporting-cyber-risk-communicating-informed-decisions-and-removing-the-cloak-of-complexity/'>https://www.teiss.co.uk/teisstalk/quantifying-and-reporting-cyber-risk-communicating-informed-decisions-and-removing-the-cloak-of-complexity/</a></p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a> </p><p> </p><p>Our Guests are</p><p>Steve Brown, Cyber Security Director, Mastercard</p><p><a href='https://www.linkedin.com/in/stevebrown100/'>https://www.linkedin.com/in/stevebrown100/</a></p><p> </p><p>Michelle Griffey, Chief Risk Officer, Communisis</p><p><a href='https://www.linkedin.com/in/michelle-griffey/'>https://www.linkedin.com/in/michelle-griffey/</a></p><p> </p><p>Ken Munro, Partner, PenTest Partners</p><p><a href='https://www.linkedin.com/in/ken-munro-17899b1/'>https://www.linkedin.com/in/ken-munro-17899b1/</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/8557409-teisstalk-removing-your-cloak-of-complexity-in-quantifying-cyber-risk.mp3" length="33623183" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-8557409</guid>
    <pubDate>Fri, 21 May 2021 07:00:00 +0100</pubDate>
    <itunes:duration>2796</itunes:duration>
    <itunes:keywords>Jenny Radcliffe, teiss, cyber security, information security, InfoSec, Cyber, Security</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: Have you got alert fatigue? Managing threat inflation in the pandemic and beyond</itunes:title>
    <title>teissTalk: Have you got alert fatigue? Managing threat inflation in the pandemic and beyond</title>
    <itunes:summary><![CDATA[This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; Alert overload and false positives still plague the cybersecurity industry https://www.itproportal.com/news/alert-overload-and-false-positives-still-plague-the-cybersecurity-industry/   The panel discussion is titled “Have you got alert fatigue? Managing threat inflation in the pandemi...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Alert overload and false positives still plague the cybersecurity industry</p><p><a href='https://www.itproportal.com/news/alert-overload-and-false-positives-still-plague-the-cybersecurity-industry/'>https://www.itproportal.com/news/alert-overload-and-false-positives-still-plague-the-cybersecurity-industry/</a></p><p> </p><p>The panel discussion is titled “Have you got alert fatigue? Managing threat inflation in the pandemic and beyond”</p><p><a href='https://www.teiss.co.uk/teisstalk/threat-inflation-recognising-and-managing-alert-fatigue-during-and-post-pandemic/'>https://www.teiss.co.uk/teisstalk/threat-inflation-recognising-and-managing-alert-fatigue-during-and-post-pandemic/</a></p><p> </p><p>This episode is hosted by Geoff White </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a> </p><p> </p><p>Our Guests are</p><p>Dr Victoria Baines, Visiting Research Fellow, Oxford Department of International Development</p><p><a href='https://www.linkedin.com/in/dr-victoria-baines/'>https://www.linkedin.com/in/dr-victoria-baines/</a></p><p> </p><p>Karl Knowles, Global Head of Cyber | CISO, HFW</p><p><a href='https://www.linkedin.com/in/cyber-karlknowles/'>https://www.linkedin.com/in/cyber-karlknowles/</a></p><p> </p><p>Marc Samson, Chief Information Security Officer, Engie Solutions BeLux</p><p><a href='https://www.linkedin.com/in/marcsamsonit/'>https://www.linkedin.com/in/marcsamsonit/</a></p><p> </p><p>Samantha Humphries, Head of Security Strategy, EMEA, Exabeam</p><p><a href='https://www.linkedin.com/in/safesecs'>https://www.linkedin.com/in/safesecs</a></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>Alert overload and false positives still plague the cybersecurity industry</p><p><a href='https://www.itproportal.com/news/alert-overload-and-false-positives-still-plague-the-cybersecurity-industry/'>https://www.itproportal.com/news/alert-overload-and-false-positives-still-plague-the-cybersecurity-industry/</a></p><p> </p><p>The panel discussion is titled “Have you got alert fatigue? Managing threat inflation in the pandemic and beyond”</p><p><a href='https://www.teiss.co.uk/teisstalk/threat-inflation-recognising-and-managing-alert-fatigue-during-and-post-pandemic/'>https://www.teiss.co.uk/teisstalk/threat-inflation-recognising-and-managing-alert-fatigue-during-and-post-pandemic/</a></p><p> </p><p>This episode is hosted by Geoff White </p><p><a href='https://www.linkedin.com/in/geoffwhitetech/'>https://www.linkedin.com/in/geoffwhitetech/</a> </p><p> </p><p>Our Guests are</p><p>Dr Victoria Baines, Visiting Research Fellow, Oxford Department of International Development</p><p><a href='https://www.linkedin.com/in/dr-victoria-baines/'>https://www.linkedin.com/in/dr-victoria-baines/</a></p><p> </p><p>Karl Knowles, Global Head of Cyber | CISO, HFW</p><p><a href='https://www.linkedin.com/in/cyber-karlknowles/'>https://www.linkedin.com/in/cyber-karlknowles/</a></p><p> </p><p>Marc Samson, Chief Information Security Officer, Engie Solutions BeLux</p><p><a href='https://www.linkedin.com/in/marcsamsonit/'>https://www.linkedin.com/in/marcsamsonit/</a></p><p> </p><p>Samantha Humphries, Head of Security Strategy, EMEA, Exabeam</p><p><a href='https://www.linkedin.com/in/safesecs'>https://www.linkedin.com/in/safesecs</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/8542539-teisstalk-have-you-got-alert-fatigue-managing-threat-inflation-in-the-pandemic-and-beyond.mp3" length="33457732" type="audio/mpeg" />
    <link>https://www.teiss.co.uk/teisstalk/threat-inflation-recognising-and-managing-alert-fatigue-during-and-post-pandemic/</link>
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8542539</guid>
    <pubDate>Wed, 19 May 2021 07:00:00 +0100</pubDate>
    <itunes:duration>2783</itunes:duration>
    <itunes:keywords>cyber security, information security, InfoSec, alert, fatigue, Geoff white, Victoria Baines, Karl Knowles, Marc Samson, Cyber Threats, </itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>teissTalk: AI-led threat analysis – where do your humans fit in?</itunes:title>
    <title>teissTalk: AI-led threat analysis – where do your humans fit in?</title>
    <itunes:summary><![CDATA[This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting www.teiss.co.uk/talk   On this episode, we focus on the following news story; EU to propose GDPR-like fines for AI abuses https://www.itpro.co.uk/technology/artificial-intelligence-ai/359205/eu-to-propose-gdpr-like-fines-for-ai-abuses   The panel discussion is titled “AI-led threat analysis – where do your humans fit in?” https://www.teiss.co.uk/teisstalk/striki...]]></itunes:summary>
    <description><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>EU to propose GDPR-like fines for AI abuses</p><p><a href='https://www.itpro.co.uk/technology/artificial-intelligence-ai/359205/eu-to-propose-gdpr-like-fines-for-ai-abuses'>https://www.itpro.co.uk/technology/artificial-intelligence-ai/359205/eu-to-propose-gdpr-like-fines-for-ai-abuses</a></p><p> </p><p>The panel discussion is titled “AI-led threat analysis – where do your humans fit in?”</p><p><a href='https://www.teiss.co.uk/teisstalk/striking-the-balance-between-ai-and-human-involvement-in-threat-analysis/'>https://www.teiss.co.uk/teisstalk/striking-the-balance-between-ai-and-human-involvement-in-threat-analysis/</a></p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a>  </p><p> </p><p>Our Guests are</p><p>Mishu Rahman, Director of Cyber Strategy, BNP Paribas</p><p><a href='https://www.linkedin.com/in/mishurahman/'>https://www.linkedin.com/in/mishurahman/</a></p><p> </p><p>Reena Shah, Director, Cyber Security Strategy, Culture &amp; Process Optimization, London Stock Exchange Group</p><p><a href='https://www.linkedin.com/in/cybereenashah/'>https://www.linkedin.com/in/cybereenashah/</a></p><p> </p><p>Ardie Kleijn, Chief Information Security Officer, Transavia</p><p><a href='https://www.linkedin.com/in/ardie-kleijn-a4b3872/'>https://www.linkedin.com/in/ardie-kleijn-a4b3872/</a></p><p> </p><p>Reinhard Hochrieser, VP, Global Product Management, Jumio</p><p><a href='https://www.linkedin.com/in/reinhard-hochrieser-30b07288/'>https://www.linkedin.com/in/reinhard-hochrieser-30b07288/</a> </p><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>This is the audio-only version of our cyber security talk show, teissTalk.  Join us twice a week for free by visiting <a href='http://www.teiss.co.uk/talk'>www.teiss.co.uk/talk</a></p><p> </p><p>On this episode, we focus on the following news story;</p><p>EU to propose GDPR-like fines for AI abuses</p><p><a href='https://www.itpro.co.uk/technology/artificial-intelligence-ai/359205/eu-to-propose-gdpr-like-fines-for-ai-abuses'>https://www.itpro.co.uk/technology/artificial-intelligence-ai/359205/eu-to-propose-gdpr-like-fines-for-ai-abuses</a></p><p> </p><p>The panel discussion is titled “AI-led threat analysis – where do your humans fit in?”</p><p><a href='https://www.teiss.co.uk/teisstalk/striking-the-balance-between-ai-and-human-involvement-in-threat-analysis/'>https://www.teiss.co.uk/teisstalk/striking-the-balance-between-ai-and-human-involvement-in-threat-analysis/</a></p><p> </p><p>This episode is hosted by Jenny Radcliffe </p><p><a href='https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/'>https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/</a>  </p><p> </p><p>Our Guests are</p><p>Mishu Rahman, Director of Cyber Strategy, BNP Paribas</p><p><a href='https://www.linkedin.com/in/mishurahman/'>https://www.linkedin.com/in/mishurahman/</a></p><p> </p><p>Reena Shah, Director, Cyber Security Strategy, Culture &amp; Process Optimization, London Stock Exchange Group</p><p><a href='https://www.linkedin.com/in/cybereenashah/'>https://www.linkedin.com/in/cybereenashah/</a></p><p> </p><p>Ardie Kleijn, Chief Information Security Officer, Transavia</p><p><a href='https://www.linkedin.com/in/ardie-kleijn-a4b3872/'>https://www.linkedin.com/in/ardie-kleijn-a4b3872/</a></p><p> </p><p>Reinhard Hochrieser, VP, Global Product Management, Jumio</p><p><a href='https://www.linkedin.com/in/reinhard-hochrieser-30b07288/'>https://www.linkedin.com/in/reinhard-hochrieser-30b07288/</a> </p><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/8534563-teisstalk-ai-led-threat-analysis-where-do-your-humans-fit-in.mp3" length="34394011" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8534563</guid>
    <pubDate>Mon, 17 May 2021 16:00:00 +0100</pubDate>
    <itunes:duration>2861</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>&quot;People need to understand that there isn&#39;t an invisible force-field that&#39;s protecting them&quot;</itunes:title>
    <title>&quot;People need to understand that there isn&#39;t an invisible force-field that&#39;s protecting them&quot;</title>
    <itunes:summary><![CDATA[On this episode of the teissPodcast, we talk to Rich Turner, SVP of EMEA at CyberArk.  We talk about how security teams should be using all the new remote working mediums to better communicate security awareness messages with their remote colleagues, espeically as the "bad guys" tend to use these environments to mount more frequent attacks.  We also discuss how cyber security strategies need to keep pace with the changing style of the business, in our new world of work.  Presenter: Russell La...]]></itunes:summary>
    <description><![CDATA[<p>On this episode of the teissPodcast, we talk to Rich Turner, SVP of EMEA at CyberArk.<br/><br/>We talk about how security teams should be using all the new remote working mediums to better communicate security awareness messages with their remote colleagues, espeically as the &quot;bad guys&quot; tend to use these environments to mount more frequent attacks.<br/><br/>We also discuss how cyber security strategies need to keep pace with the changing style of the business, in our new world of work.<br/><br/>Presenter: Russell Lawson<br/>Music: Late Night (Loop), Joseph McDade<br/><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>On this episode of the teissPodcast, we talk to Rich Turner, SVP of EMEA at CyberArk.<br/><br/>We talk about how security teams should be using all the new remote working mediums to better communicate security awareness messages with their remote colleagues, espeically as the &quot;bad guys&quot; tend to use these environments to mount more frequent attacks.<br/><br/>We also discuss how cyber security strategies need to keep pace with the changing style of the business, in our new world of work.<br/><br/>Presenter: Russell Lawson<br/>Music: Late Night (Loop), Joseph McDade<br/><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/4762166-people-need-to-understand-that-there-isn-t-an-invisible-force-field-that-s-protecting-them.mp3" length="9710754" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-4762166</guid>
    <pubDate>Thu, 13 Aug 2020 07:00:00 +0100</pubDate>
    <itunes:duration>804</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>31</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>&quot;Crisis or no crisis; security needs to be the same&quot;</itunes:title>
    <title>&quot;Crisis or no crisis; security needs to be the same&quot;</title>
    <itunes:summary><![CDATA[On this episode of the teissPodcast, we talk to Martin Littmann, CTO &amp; CISO of the Kelsey-Seybold Clinic in Houston, Texas, about his organisation's response to the COVID-19 pandemic, and how his security team is coping with the increase in remote working.  Martin talks about his efforts to replicate the "office experience" for his security team, as well as how they have adapted their phishing tests in response to the pandemic to match what they were seeing in the wild.  Presenter: Russel...]]></itunes:summary>
    <description><![CDATA[<p>On this episode of the teissPodcast, we talk to Martin Littmann, CTO &amp; CISO of the Kelsey-Seybold Clinic in Houston, Texas, about his organisation&apos;s response to the COVID-19 pandemic, and how his security team is coping with the increase in remote working.<br/><br/>Martin talks about his efforts to replicate the &quot;office experience&quot; for his security team, as well as how they have adapted their phishing tests in response to the pandemic to match what they were seeing in the wild.<br/><br/>Presenter: Russell Lawson<br/>Music: Late Night (Loop), Joseph McDade</p>]]></description>
    <content:encoded><![CDATA[<p>On this episode of the teissPodcast, we talk to Martin Littmann, CTO &amp; CISO of the Kelsey-Seybold Clinic in Houston, Texas, about his organisation&apos;s response to the COVID-19 pandemic, and how his security team is coping with the increase in remote working.<br/><br/>Martin talks about his efforts to replicate the &quot;office experience&quot; for his security team, as well as how they have adapted their phishing tests in response to the pandemic to match what they were seeing in the wild.<br/><br/>Presenter: Russell Lawson<br/>Music: Late Night (Loop), Joseph McDade</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/4761935-crisis-or-no-crisis-security-needs-to-be-the-same.mp3" length="8362208" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-4761935</guid>
    <pubDate>Thu, 30 Jul 2020 07:00:00 +0100</pubDate>
    <itunes:duration>691</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>30</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>&quot;We&#39;ve seen a marked increase in social engineering attacks&quot;</itunes:title>
    <title>&quot;We&#39;ve seen a marked increase in social engineering attacks&quot;</title>
    <itunes:summary><![CDATA[On this episode of the teissPodcast, we talk to Richard Cassidy, Senior Director Security Strategy EMEA at Exabeam about threats and threat hunting in a post-COVID-19 world.  Attackers know that there are going to be configuration weaknesses which leave your users open to social engineering attacks.  The tools may be the same, but the techniques have developed.  Richard also gives advice to Infosec Leaders on where exactly to start with your threat hunting.  With cyber criminals nee...]]></itunes:summary>
    <description><![CDATA[<p>On this episode of the teissPodcast, we talk to Richard Cassidy, Senior Director Security Strategy EMEA at Exabeam about threats and threat hunting in a post-COVID-19 world.<br/><br/>Attackers know that there are going to be configuration weaknesses which leave your users open to social engineering attacks.  The tools may be the same, but the techniques have developed.<br/><br/>Richard also gives advice to Infosec Leaders on where exactly to start with your threat hunting.  With cyber criminals needing credentials, it&apos;s no surprise where he says you should start hunting...<br/><br/>Presenter: Russell Lawson<br/>Music: Late Night (Loop), Joseph McDade<br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>On this episode of the teissPodcast, we talk to Richard Cassidy, Senior Director Security Strategy EMEA at Exabeam about threats and threat hunting in a post-COVID-19 world.<br/><br/>Attackers know that there are going to be configuration weaknesses which leave your users open to social engineering attacks.  The tools may be the same, but the techniques have developed.<br/><br/>Richard also gives advice to Infosec Leaders on where exactly to start with your threat hunting.  With cyber criminals needing credentials, it&apos;s no surprise where he says you should start hunting...<br/><br/>Presenter: Russell Lawson<br/>Music: Late Night (Loop), Joseph McDade<br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/4029608-we-ve-seen-a-marked-increase-in-social-engineering-attacks.mp3" length="11686466" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-4029608</guid>
    <pubDate>Thu, 18 Jun 2020 07:00:00 +0100</pubDate>
    <podcast:soundbite startTime="185.0" duration="30.0" />
    <itunes:duration>968</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>28</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>&quot;The community needs to recognise and understand crime&quot;</itunes:title>
    <title>&quot;The community needs to recognise and understand crime&quot;</title>
    <itunes:summary><![CDATA[On this episode of the teissPodcast, we talk to Mick Jenkins, CISO of Brunel University, about Advanced Persistent Threat actors, espionage and the targeting of Intellectual Property.  Mick talks about the University's 5 year strategy to improve their cyber security, and how this has been affected by the COVID-19 pandemic.    Mick shares how he communicates cyber security messages to the wider university community, who might not realise that their data is the target of nefarious actors. ...]]></itunes:summary>
    <description><![CDATA[<p>On this episode of the teissPodcast, we talk to Mick Jenkins, CISO of Brunel University, about Advanced Persistent Threat actors, espionage and the targeting of Intellectual Property.<br/><br/>Mick talks about the University&apos;s 5 year strategy to improve their cyber security, and how this has been affected by the COVID-19 pandemic.  <br/><br/>Mick shares how he communicates cyber security messages to the wider university community, who might not realise that their data is the target of nefarious actors.<br/><br/>Presenter: Russell Lawson</p><p>Music: Late Night (Loop), Joseph McDade</p>]]></description>
    <content:encoded><![CDATA[<p>On this episode of the teissPodcast, we talk to Mick Jenkins, CISO of Brunel University, about Advanced Persistent Threat actors, espionage and the targeting of Intellectual Property.<br/><br/>Mick talks about the University&apos;s 5 year strategy to improve their cyber security, and how this has been affected by the COVID-19 pandemic.  <br/><br/>Mick shares how he communicates cyber security messages to the wider university community, who might not realise that their data is the target of nefarious actors.<br/><br/>Presenter: Russell Lawson</p><p>Music: Late Night (Loop), Joseph McDade</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/4029530-the-community-needs-to-recognise-and-understand-crime.mp3" length="12720184" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-4029530</guid>
    <pubDate>Thu, 04 Jun 2020 07:00:00 +0100</pubDate>
    <podcast:soundbite startTime="612.0" duration="30.0" />
    <itunes:duration>1054</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>29</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Are your new starters getting the security awareness training they need</itunes:title>
    <title>Are your new starters getting the security awareness training they need</title>
    <itunes:summary><![CDATA[On this week's teissPodcast, we discuss how Information Security leaders should be looking to adapt their security awareness training for new starters during the COVID-19 crisis.    We talk to Zari Haji Rasoul, Senior Privacy Adviser at the Ministry of Foreign Affairs in the Netherlands, about the challenges of communicating confidential data remotely - even when using "approved" internal platforms - as well as highlighting the potential risks posed by new employees at this time.   ...]]></itunes:summary>
    <description><![CDATA[<p>On this week&apos;s teissPodcast, we discuss how Information Security leaders should be looking to adapt their security awareness training for new starters during the COVID-19 crisis.  <br/><br/>We talk to Zari Haji Rasoul, Senior Privacy Adviser at the Ministry of Foreign Affairs in the Netherlands, about the challenges of communicating confidential data remotely - even when using &quot;approved&quot; internal platforms - as well as highlighting the potential risks posed by new employees at this time. <br/><br/>Presenter: Anna Delaney</p><p>Music: Late Night (Loop), Joseph McDade</p>]]></description>
    <content:encoded><![CDATA[<p>On this week&apos;s teissPodcast, we discuss how Information Security leaders should be looking to adapt their security awareness training for new starters during the COVID-19 crisis.  <br/><br/>We talk to Zari Haji Rasoul, Senior Privacy Adviser at the Ministry of Foreign Affairs in the Netherlands, about the challenges of communicating confidential data remotely - even when using &quot;approved&quot; internal platforms - as well as highlighting the potential risks posed by new employees at this time. <br/><br/>Presenter: Anna Delaney</p><p>Music: Late Night (Loop), Joseph McDade</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/3707786-are-your-new-starters-getting-the-security-awareness-training-they-need.mp3" length="12390211" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3707786</guid>
    <pubDate>Thu, 14 May 2020 09:00:00 +0100</pubDate>
    <podcast:soundbite startTime="197.0" duration="30.0" />
    <itunes:duration>1027</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>27</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Contact tracing apps - can a loss of privacy ever be temporary?</itunes:title>
    <title>Contact tracing apps - can a loss of privacy ever be temporary?</title>
    <itunes:summary><![CDATA[On this week’s teissPodcast we discuss “contact tracing apps” - the smartphone software which - according to the health secretary, Matt Hancock - is to be available in weeks in the UK. The idea is the app alerts users when someone they were recently near becomes infected with Covid-19 - a good way of slowing down the spread of the virus - but at what cost to our privacy?  Charity Wright, former NSA Chinese Offensive Operative and Cyber Threat Analyst at global threat intelligence firm, IntSig...]]></itunes:summary>
    <description><![CDATA[<p>On this week’s teissPodcast we discuss “contact tracing apps” - the smartphone software which - according to the health secretary, Matt Hancock - is to be available in weeks in the UK. The idea is the app alerts users when someone they were recently near becomes infected with Covid-19 - a good way of slowing down the spread of the virus - but at what cost to our privacy?<br/><br/>Charity Wright, former NSA Chinese Offensive Operative and Cyber Threat Analyst at global threat intelligence firm, IntSights, joins us this week where she outlines her concerns about this type of data-tracking, what she would like the UK government to be clear on with the use of this tech, and how this might impact the relationship between the state and the citizen.</p>]]></description>
    <content:encoded><![CDATA[<p>On this week’s teissPodcast we discuss “contact tracing apps” - the smartphone software which - according to the health secretary, Matt Hancock - is to be available in weeks in the UK. The idea is the app alerts users when someone they were recently near becomes infected with Covid-19 - a good way of slowing down the spread of the virus - but at what cost to our privacy?<br/><br/>Charity Wright, former NSA Chinese Offensive Operative and Cyber Threat Analyst at global threat intelligence firm, IntSights, joins us this week where she outlines her concerns about this type of data-tracking, what she would like the UK government to be clear on with the use of this tech, and how this might impact the relationship between the state and the citizen.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/3536878-contact-tracing-apps-can-a-loss-of-privacy-ever-be-temporary.mp3" length="12825192" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3536878</guid>
    <pubDate>Thu, 30 Apr 2020 03:00:00 +0100</pubDate>
    <podcast:soundbite startTime="719.0" duration="30.0" />
    <itunes:duration>1063</itunes:duration>
    <itunes:keywords>cybersecurity, cyber, security, infosec, coronavirus, covid-19, contract, tracking, tracing, surveillance, privacy, gdpr</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>26</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>What’s at the root of most security breaches?</itunes:title>
    <title>What’s at the root of most security breaches?</title>
    <itunes:summary><![CDATA[What’s at the root of most security breaches? Is there a common theme?  This week on the teisspodcast, Greg Van Der Gaast, Head of Information, University of Salford, discusses the basic common issues that go unnoticed by security departments which - more often than not - are the cause of major breaches.  Greg explains how organisations can improve their security without spending huge sums of money, as well as why he refuses to use metrics with the board and why he feels CISOs need ...]]></itunes:summary>
    <description><![CDATA[<p>What’s at the root of most security breaches? Is there a common theme? </p><p>This week on the teisspodcast, Greg Van Der Gaast, Head of Information, University of Salford, discusses the basic common issues that go unnoticed by security departments which - more often than not - are the cause of major breaches. </p><p>Greg explains how organisations can improve their security without spending huge sums of money, as well as why he refuses to use metrics with the board and why he feels CISOs need to embrace more “altruism” in their role as security leaders. </p>]]></description>
    <content:encoded><![CDATA[<p>What’s at the root of most security breaches? Is there a common theme? </p><p>This week on the teisspodcast, Greg Van Der Gaast, Head of Information, University of Salford, discusses the basic common issues that go unnoticed by security departments which - more often than not - are the cause of major breaches. </p><p>Greg explains how organisations can improve their security without spending huge sums of money, as well as why he refuses to use metrics with the board and why he feels CISOs need to embrace more “altruism” in their role as security leaders. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/3459604-what-s-at-the-root-of-most-security-breaches.mp3" length="17367262" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3459604</guid>
    <pubDate>Thu, 23 Apr 2020 03:00:00 +0100</pubDate>
    <podcast:soundbite startTime="518.0" duration="30.0" />
    <itunes:duration>1442</itunes:duration>
    <itunes:keywords>teiss, teissamsterdam, amsterdam, university of salford, greg van der gast, cyber, security, infosec, information, security, business, breaches, ciso</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>25</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How to manage the supply chain during COVID-19</itunes:title>
    <title>How to manage the supply chain during COVID-19</title>
    <itunes:summary><![CDATA[When it comes to cyber security, the supply chain is never too far down on the agenda of potential security threats...and even more so during the COVID-19 pandemic.  So, on this week’s teissPodcast, Steve Durbin, Managing Director of the Information Security Forum (ISF), outlines the information and privacy risks to watch out for in the supply chain during our current global crisis.  With on-site assessments not possible, and existing security evaluations no longer accurate, we disc...]]></itunes:summary>
    <description><![CDATA[<p>When it comes to cyber security, the supply chain is never too far down on the agenda of potential security threats...and even more so during the COVID-19 pandemic. </p><p>So, on this week’s teissPodcast, Steve Durbin, Managing Director of the Information Security Forum (ISF), outlines the information and privacy risks to watch out for in the supply chain during our current global crisis. </p><p>With on-site assessments not possible, and existing security evaluations no longer accurate, we discuss the challenges that might arise now.</p>]]></description>
    <content:encoded><![CDATA[<p>When it comes to cyber security, the supply chain is never too far down on the agenda of potential security threats...and even more so during the COVID-19 pandemic. </p><p>So, on this week’s teissPodcast, Steve Durbin, Managing Director of the Information Security Forum (ISF), outlines the information and privacy risks to watch out for in the supply chain during our current global crisis. </p><p>With on-site assessments not possible, and existing security evaluations no longer accurate, we discuss the challenges that might arise now.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/3368773-how-to-manage-the-supply-chain-during-covid-19.mp3" length="13382125" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3368773</guid>
    <pubDate>Thu, 16 Apr 2020 02:00:00 +0100</pubDate>
    <podcast:soundbite startTime="305.0" duration="30.0" />
    <itunes:duration>1110</itunes:duration>
    <itunes:keywords>Steve, Durbin, ISF, Internet Security Forum, Cyber, Security, business, resilience, supply, chain, risk, threats, COVID-19, coronavirus, </itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>24</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How should leadership respond during the COVID-19 crisis?</itunes:title>
    <title>How should leadership respond during the COVID-19 crisis?</title>
    <itunes:summary><![CDATA[Without a doubt, the Covid-19 pandemic is affecting businesses - both small and large. So in these unsettling times, what should board members be focusing on and how should leadership respond to the crisis as it unfolds?  On this week’s teissPodcast, Steve Durbin, Managing Director of the Information Security Forum (ISF), offers advice on how leadership should engage with shareholders, customers and their employees, as well as why he thinks there’s no better time than the present to reas...]]></itunes:summary>
    <description><![CDATA[<p>Without a doubt, the Covid-19 pandemic is affecting businesses - both small and large. So in these unsettling times, what should board members be focusing on and how should leadership respond to the crisis as it unfolds? </p><p>On this week’s teissPodcast, Steve Durbin, Managing Director of the Information Security Forum (ISF), offers advice on how leadership should engage with shareholders, customers and their employees, as well as why he thinks there’s no better time than the present to reassess how we operate - both as businesses and as individuals.</p><p>In Steve’s view, the pandemic will have long-term implications on the way we operate as businesses, so this is an excellent opportunity for us all to learn. </p>]]></description>
    <content:encoded><![CDATA[<p>Without a doubt, the Covid-19 pandemic is affecting businesses - both small and large. So in these unsettling times, what should board members be focusing on and how should leadership respond to the crisis as it unfolds? </p><p>On this week’s teissPodcast, Steve Durbin, Managing Director of the Information Security Forum (ISF), offers advice on how leadership should engage with shareholders, customers and their employees, as well as why he thinks there’s no better time than the present to reassess how we operate - both as businesses and as individuals.</p><p>In Steve’s view, the pandemic will have long-term implications on the way we operate as businesses, so this is an excellent opportunity for us all to learn. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/3268453-how-should-leadership-respond-during-the-covid-19-crisis.mp3" length="18591046" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3268453</guid>
    <pubDate>Thu, 09 Apr 2020 03:00:00 +0100</pubDate>
    <itunes:duration>1544</itunes:duration>
    <itunes:keywords>business, cyber, security, ISF, Steve Durbin, leadership, board, resilience, crisis, pandemic, coronavirus, covid-19</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>23</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Feeling the stress of it all? How to look after yourself and others during COVID-19</itunes:title>
    <title>Feeling the stress of it all? How to look after yourself and others during COVID-19</title>
    <itunes:summary><![CDATA[How are we all doing? We are in the midst of the COVID-19 pandemic - many of us are in lockdown - working from home - uncertain of when we'll be able to roam freely again and when things will return to normal.  During these stressful times - it's important that we take care of our mental and physical well-being - so on this week's teissPodcast I speak with the CISO of JUST EAT, Kevin Fielder, who's passionate about well-being and looking out for each other.  On the podcast we discus...]]></itunes:summary>
    <description><![CDATA[<p>How are we all doing? We are in the midst of the COVID-19 pandemic - many of us are in lockdown - working from home - uncertain of when we&apos;ll be able to roam freely again and when things will return to normal. </p><p>During these stressful times - it&apos;s important that we take care of our mental and physical well-being - so on this week&apos;s teissPodcast I speak with the CISO of JUST EAT, Kevin Fielder, who&apos;s passionate about well-being and looking out for each other. </p><p>On the podcast we discuss strategies that can make home working more productive, how to keep physically active during this time, how to deal with the avalanche of news and social media stories, and how to manage your mental well-being. We are all in this together and it&apos;s important to talk about it.</p>]]></description>
    <content:encoded><![CDATA[<p>How are we all doing? We are in the midst of the COVID-19 pandemic - many of us are in lockdown - working from home - uncertain of when we&apos;ll be able to roam freely again and when things will return to normal. </p><p>During these stressful times - it&apos;s important that we take care of our mental and physical well-being - so on this week&apos;s teissPodcast I speak with the CISO of JUST EAT, Kevin Fielder, who&apos;s passionate about well-being and looking out for each other. </p><p>On the podcast we discuss strategies that can make home working more productive, how to keep physically active during this time, how to deal with the avalanche of news and social media stories, and how to manage your mental well-being. We are all in this together and it&apos;s important to talk about it.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/3184570-feeling-the-stress-of-it-all-how-to-look-after-yourself-and-others-during-covid-19.mp3" length="20943007" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3184570</guid>
    <pubDate>Thu, 02 Apr 2020 02:00:00 +0100</pubDate>
    <itunes:duration>1740</itunes:duration>
    <itunes:keywords>mental health, business, coronavirus, covid19, covid-19, cyber, security, just eat, ciso, info, sec, resilience, working from home, wfh</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>22</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>COVID-19: What are the cyber security threats to your organisation?</itunes:title>
    <title>COVID-19: What are the cyber security threats to your organisation?</title>
    <itunes:summary><![CDATA[This week, in light of the COVID-19 pandemic I thought it appropriate to focus on the cyber security threats brought on by the crisis.  What are the threats to your organisation? What are the scams to watch out for? Will there be an increase in insider threat activity?   On this week's teissPodcast Andrew Tsonchev, Director of Technology at Darktrace, outlines the cyber security challenges for us during these uncertain times, as well as sharing some excellent advice we can all adopt...]]></itunes:summary>
    <description><![CDATA[<p>This week, in light of the COVID-19 pandemic I thought it appropriate to focus on the cyber security threats brought on by the crisis. </p><p>What are the threats to your organisation? What are the scams to watch out for? Will there be an increase in insider threat activity?  </p><p>On this week&apos;s teissPodcast Andrew Tsonchev, Director of Technology at Darktrace, outlines the cyber security challenges for us during these uncertain times, as well as sharing some excellent advice we can all adopt now. </p><p> </p>]]></description>
    <content:encoded><![CDATA[<p>This week, in light of the COVID-19 pandemic I thought it appropriate to focus on the cyber security threats brought on by the crisis. </p><p>What are the threats to your organisation? What are the scams to watch out for? Will there be an increase in insider threat activity?  </p><p>On this week&apos;s teissPodcast Andrew Tsonchev, Director of Technology at Darktrace, outlines the cyber security challenges for us during these uncertain times, as well as sharing some excellent advice we can all adopt now. </p><p> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/3120055-covid-19-what-are-the-cyber-security-threats-to-your-organisation.mp3" length="22347026" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3120055</guid>
    <pubDate>Thu, 26 Mar 2020 07:00:00 +0000</pubDate>
    <podcast:soundbite startTime="486.517" duration="49.0" />
    <itunes:duration>1857</itunes:duration>
    <itunes:keywords>business, cyber, security, infosec, covid19, coronavirus, resilience, dark trace</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>21</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Does it really matter if government has backdoors to our tech?</itunes:title>
    <title>Does it really matter if government has backdoors to our tech?</title>
    <itunes:summary><![CDATA[This week we tackle the debate around encryption on the teissPodcast.  I hope you’re keeping healthy and sane in these unsettling times triggered by the COVID-19 pandemic. If you’re cooped up at home, in need of some distraction – then listen to this podcast with Jake Moore, cyber security specialist at ESET. We dissect the debate around encryption and discuss government policy on backdoors, whether government mandated backdoors combined with data protection legislation can work together...]]></itunes:summary>
    <description><![CDATA[<p>This week we tackle the debate around encryption on the teissPodcast. </p><p>I hope you’re keeping healthy and sane in these unsettling times triggered by the COVID-19 pandemic. If you’re cooped up at home, in need of some distraction – then listen to this podcast with Jake Moore, cyber security specialist at ESET.</p><p>We dissect the debate around encryption and discuss government policy on backdoors, whether government mandated backdoors combined with data protection legislation can work together and find a happy medium and how citizens’ privacy can be protected in this data hungry world.</p>]]></description>
    <content:encoded><![CDATA[<p>This week we tackle the debate around encryption on the teissPodcast. </p><p>I hope you’re keeping healthy and sane in these unsettling times triggered by the COVID-19 pandemic. If you’re cooped up at home, in need of some distraction – then listen to this podcast with Jake Moore, cyber security specialist at ESET.</p><p>We dissect the debate around encryption and discuss government policy on backdoors, whether government mandated backdoors combined with data protection legislation can work together and find a happy medium and how citizens’ privacy can be protected in this data hungry world.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/3046885-does-it-really-matter-if-government-has-backdoors-to-our-tech.mp3" length="16989568" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3046885</guid>
    <pubDate>Wed, 18 Mar 2020 06:00:00 +0000</pubDate>
    <podcast:soundbite startTime="44.453" duration="39.5" />
    <itunes:duration>1410</itunes:duration>
    <itunes:keywords>cyber, security, hacking, business, infosec, encryption, government</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>20</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How can human error lead to a charity being scammed out of $1 million? Recorded live at #teissLondon2020</itunes:title>
    <title>How can human error lead to a charity being scammed out of $1 million? Recorded live at #teissLondon2020</title>
    <itunes:summary><![CDATA[A bit of a special one for you this week on the teissPodcast – a recording of the live security leaders’ panel at teissLondon2020. The panellists are security researcher, Leigh-Anne Galloway, Chief Risk Officer (CRO) at Communisis, Michelle Giffrey, and Thom Langford, Founder TL(2) Security. Articles referenced during the discussion include one about hackers exploiting vulnerabilities at petrol station card machines and another on a scam which cost a British housing charity $1 dollars. ]]></itunes:summary>
    <description><![CDATA[<p>A bit of a special one for you this week on the teissPodcast – a recording of the live security leaders’ panel at <a href='https://www.teiss.co.uk/london/'>teissLondon2020</a>.</p><p>The panellists are security researcher, Leigh-Anne Galloway, Chief Risk Officer (CRO) at Communisis, Michelle Giffrey, and Thom Langford, Founder TL(2) Security.</p><p>Articles referenced during the discussion include one about <a href='https://www.forbes.com/sites/leemathews/2019/12/16/visa-warning-hackers-ramp-up-card-stealing-attacks-at-gas-stations/#5f181cdf5388'>hackers exploiting vulnerabilities at petrol station card machines</a> and another on <a href='https://www.infosecurity-magazine.com/news/red-kite-spoofing-scam/'>a scam which cost a British housing charity $1 dollars</a>.</p>]]></description>
    <content:encoded><![CDATA[<p>A bit of a special one for you this week on the teissPodcast – a recording of the live security leaders’ panel at <a href='https://www.teiss.co.uk/london/'>teissLondon2020</a>.</p><p>The panellists are security researcher, Leigh-Anne Galloway, Chief Risk Officer (CRO) at Communisis, Michelle Giffrey, and Thom Langford, Founder TL(2) Security.</p><p>Articles referenced during the discussion include one about <a href='https://www.forbes.com/sites/leemathews/2019/12/16/visa-warning-hackers-ramp-up-card-stealing-attacks-at-gas-stations/#5f181cdf5388'>hackers exploiting vulnerabilities at petrol station card machines</a> and another on <a href='https://www.infosecurity-magazine.com/news/red-kite-spoofing-scam/'>a scam which cost a British housing charity $1 dollars</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/2982598-how-can-human-error-lead-to-a-charity-being-scammed-out-of-1-million-recorded-live-at-teisslondon2020.mp3" length="40021998" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2982598</guid>
    <pubDate>Thu, 12 Mar 2020 06:00:00 +0000</pubDate>
    <podcast:soundbite startTime="1559.471" duration="51.5" />
    <itunes:duration>3330</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>19</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Building a positive and modern security culture’ with Michele Hanson, CISO at Micro Focus.</itunes:title>
    <title>Building a positive and modern security culture’ with Michele Hanson, CISO at Micro Focus.</title>
    <itunes:summary><![CDATA[ Michele Hanson, CISO at software company Micro Focus, features on the teissPodcast this week. I met Michele at cyber security conference, Cyber Connect UK, where she discussed the value of listening to improve security, the importance of role modelling to drive diversity of talent and learning to run, compromised…She states on her LinkedIn profile that she’s an “advocate in the promotion of bringing a positive and modern culture of cyber security”...So my first question to her was to te...]]></itunes:summary>
    <description><![CDATA[<p> Michele Hanson, CISO at software company Micro Focus, features on the teissPodcast this week. I met Michele at cyber security conference, <a href='https://www.cybersecurityconnectuk.com/'>Cyber Connect UK</a>, where she discussed the value of listening to improve security, the importance of role modelling to drive diversity of talent and learning to run, <em>compromised</em>…She states on her LinkedIn profile that she’s an “advocate in the promotion of bringing a positive and modern culture of cyber security”...So my first question to her was to tell me more about the “positive” and “modern” culture that she promotes.  </p>]]></description>
    <content:encoded><![CDATA[<p> Michele Hanson, CISO at software company Micro Focus, features on the teissPodcast this week. I met Michele at cyber security conference, <a href='https://www.cybersecurityconnectuk.com/'>Cyber Connect UK</a>, where she discussed the value of listening to improve security, the importance of role modelling to drive diversity of talent and learning to run, <em>compromised</em>…She states on her LinkedIn profile that she’s an “advocate in the promotion of bringing a positive and modern culture of cyber security”...So my first question to her was to tell me more about the “positive” and “modern” culture that she promotes.  </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/2913094-building-a-positive-and-modern-security-culture-with-michele-hanson-ciso-at-micro-focus.mp3" length="15062045" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2913094</guid>
    <pubDate>Thu, 05 Mar 2020 06:00:00 +0000</pubDate>
    <podcast:soundbite startTime="41.244" duration="30.0" />
    <itunes:duration>1250</itunes:duration>
    <itunes:keywords>cyber,security,cyber security, infosec, information, data, privacy, ciso, business, culture</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>18</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Is the ICO all carrot and no stick?</itunes:title>
    <title>Is the ICO all carrot and no stick?</title>
    <itunes:summary><![CDATA[This week on the teiss Security Leaders’ Roundtable Podcast former CISO – Thom Langford, Founder, TL(2) Security, and Data Protection Consultant – Bilal Ghafoor, meet head to head.  There’s a lot covered in this episode – from the misconceptions about the CISO and DPO roles, to the challenges around privacy and data protection. We talk ethics, language and whether the ICO is all carrot and no stick…   Presenter: Anna Delaney Music: Light the Fuze, Audio Network and Late Night (Loops), Jo...]]></itunes:summary>
    <description><![CDATA[<p>This week on the teiss Security Leaders’ Roundtable Podcast former CISO – Thom Langford, Founder, TL(2) Security, and Data Protection Consultant – Bilal Ghafoor, meet head to head. </p><p>There’s a lot covered in this episode – from the misconceptions about the CISO and DPO roles, to the challenges around privacy and data protection. We talk ethics, language and whether the ICO is all carrot and no stick…<br/><br/></p><p>Presenter: Anna Delaney</p><p>Music: Light the Fuze, Audio Network and Late Night (Loops), Joseph McDade</p>]]></description>
    <content:encoded><![CDATA[<p>This week on the teiss Security Leaders’ Roundtable Podcast former CISO – Thom Langford, Founder, TL(2) Security, and Data Protection Consultant – Bilal Ghafoor, meet head to head. </p><p>There’s a lot covered in this episode – from the misconceptions about the CISO and DPO roles, to the challenges around privacy and data protection. We talk ethics, language and whether the ICO is all carrot and no stick…<br/><br/></p><p>Presenter: Anna Delaney</p><p>Music: Light the Fuze, Audio Network and Late Night (Loops), Joseph McDade</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/2846479-is-the-ico-all-carrot-and-no-stick.mp3" length="42175532" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2846479</guid>
    <pubDate>Thu, 27 Feb 2020 06:00:00 +0000</pubDate>
    <podcast:soundbite startTime="347.95" duration="31.5" />
    <itunes:duration>3509</itunes:duration>
    <itunes:keywords>ICO, Thom Langford, Bilal Ghafoor, CISO, privacy, data, protection, cyber security, infosec, gdpr</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>17</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>“Our industry needs critical thinkers” - Chris Hallenbeck, CISO Americas, Tanium</itunes:title>
    <title>“Our industry needs critical thinkers” - Chris Hallenbeck, CISO Americas, Tanium</title>
    <itunes:summary><![CDATA[It’s back to Nashville, Tennessee this week on the teissPodcast as I speak with Chris Hallenbeck, CISO for the Americas at Tanium, the endpoint security and systems management company. I caught up with Chris at Tanium’s recent annual conference – Converge – where we discussed the industry’s need for critical thinkers, mentors, as well as the challenges around visibility, human nature and the "unchanging" threat landscape. Before joining Tanium in 2016, Chris worked for six years on the U.S. D...]]></itunes:summary>
    <description><![CDATA[<p>It’s back to Nashville, Tennessee this week on the teissPodcast as I speak with Chris Hallenbeck, CISO for the Americas at Tanium, the endpoint security and systems management company.</p><p>I caught up with Chris at Tanium’s recent annual conference – Converge – where we discussed the industry’s need for critical thinkers, mentors, as well as the challenges around visibility, human nature and the &quot;unchanging&quot; threat landscape.</p><p>Before joining Tanium in 2016, Chris worked for six years on the U.S. Department of Homeland Security’s Computer Emergency Readiness Team…so I was eager to probe and hear his views on the current the state of cyber security.</p>]]></description>
    <content:encoded><![CDATA[<p>It’s back to Nashville, Tennessee this week on the teissPodcast as I speak with Chris Hallenbeck, CISO for the Americas at Tanium, the endpoint security and systems management company.</p><p>I caught up with Chris at Tanium’s recent annual conference – Converge – where we discussed the industry’s need for critical thinkers, mentors, as well as the challenges around visibility, human nature and the &quot;unchanging&quot; threat landscape.</p><p>Before joining Tanium in 2016, Chris worked for six years on the U.S. Department of Homeland Security’s Computer Emergency Readiness Team…so I was eager to probe and hear his views on the current the state of cyber security.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/2787040-our-industry-needs-critical-thinkers-chris-hallenbeck-ciso-americas-tanium.mp3" length="15072151" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2787040</guid>
    <pubDate>Thu, 20 Feb 2020 07:00:00 +0000</pubDate>
    <podcast:soundbite startTime="357.641" duration="29.0" />
    <itunes:duration>1250</itunes:duration>
    <itunes:keywords>thinkers,critical,cyber,security,infosec,information,security,tanium,ciso,business,converge,conference,threat,landscape</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>16</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cyber training: is trying to change people’s behaviours useless?</itunes:title>
    <title>Cyber training: is trying to change people’s behaviours useless?</title>
    <itunes:summary><![CDATA[What is behavioural economics, and how can it derail successful security training? That’s our topic this week on the teissPodcast with Bridget Kenyon, DIS EMEA CISO and Information Security Programmes, at Thales. I caught up with Bridget at the security conference Cyber Connect UK back in November. Bridget never fails to fascinate me with her ability to talk about any topic in great detail and this time she delved into why security training isn’t working in its current form – instead of worki...]]></itunes:summary>
    <description><![CDATA[<p>What is behavioural economics, and how can it derail successful security training? That’s our topic this week on the teissPodcast with Bridget Kenyon, DIS EMEA CISO and Information Security Programmes, at Thales.</p><p>I caught up with Bridget at the security conference <a href='https://www.cybersecurityconnectuk.com/'>Cyber Connect UK</a> back in November. Bridget never fails to fascinate me with her ability to talk about any topic in great detail and this time she delved into why security training isn’t working in its current form – instead of working against people’s natural behaviours, we need to work with them. In fact, trying to get people to change their behaviours is, quite frankly, useless.</p><p>Bridget explains how cyber security can work for and with people, and how this isn’t about win/lose battles…cyber security is an infinite game.</p><p>Here Bridget is, giving a brief of what behavioural economics is…</p><p>iTunes: <a href='https://itunes.apple.com/gb/podcast/cracking-cyber-security-podcast-from-teiss/id1378994502?mt=2'>https://itunes.apple.com/gb/podcast/cracking-cyber-security-podcast-from-teiss/id1378994502?mt=2</a></p><p>Stitcher: <a href='https://www.stitcher.com/podcast/business-reporter/cracking-cyber-security-podcast'>https://www.stitcher.com/podcast/business-reporter/cracking-cyber-security-podcast</a></p><p>Presenter: Anna Delaney</p><p>Music: Light the Fuze, Audio Network</p>]]></description>
    <content:encoded><![CDATA[<p>What is behavioural economics, and how can it derail successful security training? That’s our topic this week on the teissPodcast with Bridget Kenyon, DIS EMEA CISO and Information Security Programmes, at Thales.</p><p>I caught up with Bridget at the security conference <a href='https://www.cybersecurityconnectuk.com/'>Cyber Connect UK</a> back in November. Bridget never fails to fascinate me with her ability to talk about any topic in great detail and this time she delved into why security training isn’t working in its current form – instead of working against people’s natural behaviours, we need to work with them. In fact, trying to get people to change their behaviours is, quite frankly, useless.</p><p>Bridget explains how cyber security can work for and with people, and how this isn’t about win/lose battles…cyber security is an infinite game.</p><p>Here Bridget is, giving a brief of what behavioural economics is…</p><p>iTunes: <a href='https://itunes.apple.com/gb/podcast/cracking-cyber-security-podcast-from-teiss/id1378994502?mt=2'>https://itunes.apple.com/gb/podcast/cracking-cyber-security-podcast-from-teiss/id1378994502?mt=2</a></p><p>Stitcher: <a href='https://www.stitcher.com/podcast/business-reporter/cracking-cyber-security-podcast'>https://www.stitcher.com/podcast/business-reporter/cracking-cyber-security-podcast</a></p><p>Presenter: Anna Delaney</p><p>Music: Light the Fuze, Audio Network</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/2716120-cyber-training-is-trying-to-change-people-s-behaviours-useless.mp3" length="16203653" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2716120</guid>
    <pubDate>Thu, 13 Feb 2020 07:00:00 +0000</pubDate>
    <podcast:soundbite startTime="58.513" duration="39.0" />
    <itunes:duration>1345</itunes:duration>
    <itunes:keywords>cyber, security, training, culture, business, infosec, information, security, data, privacy</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>15</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Can a CISO really make significant change to an organisation’s culture in just 18 months?</itunes:title>
    <title>Can a CISO really make significant change to an organisation’s culture in just 18 months?</title>
    <itunes:summary><![CDATA[On this week’s teiss Security Leaders Roundtable Podcast - Shan Lee, CISO, Transferwise and Thom Langford, Founder TL(2) Security Ltd debate whether a CISO can make a significant change to an organisation’s culture in just 18 months (the average time a CISO stays in a company). They also discuss the Travelex breach, the spate of ransomware attacks against US state institutions and their security predictions for 2020! Please note that this was recorded on January 3rd 2020 – before it was confi...]]></itunes:summary>
    <description><![CDATA[<p>On this week’s teiss Security Leaders Roundtable Podcast - Shan Lee, CISO, Transferwise and Thom Langford, Founder TL(2) Security Ltd debate whether a CISO can make a significant change to an organisation’s culture in just 18 months (the average time a CISO stays in a company). They also discuss the <a href='https://www.bbc.co.uk/news/business-51364102'>Travelex breach</a>, the spate of <a href='https://www.govtech.com/blogs/lohrmann-on-cybersecurity/2019-the-year-ransomware-targeted-state--local-governments.html'>ransomware attacks against US state institutions</a> and their security predictions for 2020! Please note that this was recorded on January 3rd 2020 – before it was confirmed that the Travelex cyber-attack was indeed a ransomware attack. </p><p>Lots of excellent advice from both Shan and Thom and I hope you enjoy.</p><p>Music: Light the Fuze, Audio Network and Late Night (Loops), Joseph McDade</p>]]></description>
    <content:encoded><![CDATA[<p>On this week’s teiss Security Leaders Roundtable Podcast - Shan Lee, CISO, Transferwise and Thom Langford, Founder TL(2) Security Ltd debate whether a CISO can make a significant change to an organisation’s culture in just 18 months (the average time a CISO stays in a company). They also discuss the <a href='https://www.bbc.co.uk/news/business-51364102'>Travelex breach</a>, the spate of <a href='https://www.govtech.com/blogs/lohrmann-on-cybersecurity/2019-the-year-ransomware-targeted-state--local-governments.html'>ransomware attacks against US state institutions</a> and their security predictions for 2020! Please note that this was recorded on January 3rd 2020 – before it was confirmed that the Travelex cyber-attack was indeed a ransomware attack. </p><p>Lots of excellent advice from both Shan and Thom and I hope you enjoy.</p><p>Music: Light the Fuze, Audio Network and Late Night (Loops), Joseph McDade</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/2674642-can-a-ciso-really-make-significant-change-to-an-organisation-s-culture-in-just-18-months.mp3" length="35018713" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2674642</guid>
    <pubDate>Thu, 06 Feb 2020 14:00:00 +0000</pubDate>
    <podcast:soundbite startTime="268.067" duration="45.0" />
    <itunes:duration>2913</itunes:duration>
    <itunes:keywords>transferwise, business, cyber security, information security, ciso, ransomware</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>14</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>“We need to communicate the what and the why of security” – Tanium’s CISO, Chris Hodson</itunes:title>
    <title>“We need to communicate the what and the why of security” – Tanium’s CISO, Chris Hodson</title>
    <itunes:summary><![CDATA[On this week’s podcast we speak with Chris Hodson, CISO for cyber security provider, Tanium. I met fellow Brit in Nashville, at the end of last year, at Tanium’s annual conference. Previously CISO at Zscaler, Chris is one of the movers and shakers of the industry – as well as his role at Tanium, Chris is a prolific writer and vlogger about all things security, and he's named as one of the 'Top 10 Cyber Risk Experts to Follow' by Vulcan Cyber. In between conference sessions, I sat with Chris t...]]></itunes:summary>
    <description><![CDATA[<p>On this week’s podcast we speak with Chris Hodson, CISO for cyber security provider, Tanium.</p><p>I met fellow Brit in Nashville, at the end of last year, at <a href='https://www.tanium.com/tech%20blog/2019/07/26/converge2019/'>Tanium’s annual conference</a>. Previously CISO at Zscaler, Chris is one of the movers and shakers of the industry – as well as his role at Tanium, Chris is a prolific writer and vlogger about all things security, and he&apos;s named as one of the &apos;Top 10 Cyber Risk Experts to Follow&apos; by Vulcan Cyber. In between conference sessions, I sat with Chris to discuss his cyber security predictions for 2020, how he prevents self burnout, and how he goes about implementing a culture of security in the organisations he works with.</p><p>Presenter: Anna Delaney</p><p>Music: Light the Fuze, Audio Network</p>]]></description>
    <content:encoded><![CDATA[<p>On this week’s podcast we speak with Chris Hodson, CISO for cyber security provider, Tanium.</p><p>I met fellow Brit in Nashville, at the end of last year, at <a href='https://www.tanium.com/tech%20blog/2019/07/26/converge2019/'>Tanium’s annual conference</a>. Previously CISO at Zscaler, Chris is one of the movers and shakers of the industry – as well as his role at Tanium, Chris is a prolific writer and vlogger about all things security, and he&apos;s named as one of the &apos;Top 10 Cyber Risk Experts to Follow&apos; by Vulcan Cyber. In between conference sessions, I sat with Chris to discuss his cyber security predictions for 2020, how he prevents self burnout, and how he goes about implementing a culture of security in the organisations he works with.</p><p>Presenter: Anna Delaney</p><p>Music: Light the Fuze, Audio Network</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/2596507-we-need-to-communicate-the-what-and-the-why-of-security-tanium-s-ciso-chris-hodson.mp3" length="14608549" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2596507</guid>
    <pubDate>Thu, 30 Jan 2020 07:00:00 +0000</pubDate>
    <podcast:soundbite startTime="308.559" duration="57.5" />
    <itunes:duration>1212</itunes:duration>
    <itunes:keywords>cyber,security, infosec, information, security, business, risk, privacy, tanium, chris hodson, ciso, teiss, burnout, culture,  </itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>13</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>&quot;Security should be a lifestyle choice for people these days&quot; - Helen Rabe, CISO, Abcam</itunes:title>
    <title>&quot;Security should be a lifestyle choice for people these days&quot; - Helen Rabe, CISO, Abcam</title>
    <itunes:summary><![CDATA[On this week’s teiss podcast I am joined by Helen Rabe, Global CISO for biotech company, Abcam. I met up with Helen at Cyber Connect UK Conference at the end of last year where we discussed resiliency – both personal and for business, the language of security and how not to alienate your end-users, and how to be the constant eye in the storm as a security leader. Helen oozes warmth and charisma and had plenty of advice to divulge in the interview, so I hope you enjoy. Presenter: Anna Delaney ...]]></itunes:summary>
    <description><![CDATA[<p>On this week’s teiss podcast I am joined by Helen Rabe, Global CISO for biotech company, Abcam.</p><p>I met up with Helen at Cyber Connect UK Conference at the end of last year where we discussed resiliency – both personal and for business, the language of security and how not to alienate your end-users, and how to be the constant eye in the storm as a security leader. Helen oozes warmth and charisma and had plenty of advice to divulge in the interview, so I hope you enjoy.</p><p>Presenter: Anna Delaney</p><p>Music: Light the Fuze, Audio Network</p>]]></description>
    <content:encoded><![CDATA[<p>On this week’s teiss podcast I am joined by Helen Rabe, Global CISO for biotech company, Abcam.</p><p>I met up with Helen at Cyber Connect UK Conference at the end of last year where we discussed resiliency – both personal and for business, the language of security and how not to alienate your end-users, and how to be the constant eye in the storm as a security leader. Helen oozes warmth and charisma and had plenty of advice to divulge in the interview, so I hope you enjoy.</p><p>Presenter: Anna Delaney</p><p>Music: Light the Fuze, Audio Network</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/2565877-security-should-be-a-lifestyle-choice-for-people-these-days-helen-rabe-ciso-abcam.mp3" length="15981403" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2565877</guid>
    <pubDate>Fri, 24 Jan 2020 08:00:00 +0000</pubDate>
    <podcast:soundbite startTime="59.545" duration="40.5" />
    <itunes:duration>1326</itunes:duration>
    <itunes:keywords>cyber, security, infosec, resilience, business, data, protection, biotech,</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>12</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Should Microsoft 365 abandon most of its security tools? Thom Langford and Javvad Malik discuss. </itunes:title>
    <title>Should Microsoft 365 abandon most of its security tools? Thom Langford and Javvad Malik discuss. </title>
    <itunes:summary><![CDATA[On this week’s teiss Security Leaders Roundtable Podcast - Thom Langford, Founder of (TL)2 Security Ltd and Javvad Malik, Security Awareness Advocate at KnowBe4, discuss cyber security news stories such as organisations failing to maximize use of Microsoft 365 security, the “people” element in a cyber security strategy, and fake voicemail alerts in suspected whaling campaigns. I hope you enjoy the themes and the all-round bantz. Music: Light the Fuze, Audio Network and Natural Duality, Joseph...]]></itunes:summary>
    <description><![CDATA[<p>On this week’s teiss Security Leaders Roundtable Podcast - Thom Langford, Founder of (TL)2 Security Ltd and Javvad Malik, Security Awareness Advocate at KnowBe4, discuss cyber security news stories such as <a href='https://www.helpnetsecurity.com/2019/11/04/microsoft-365-security-features/'>organisations failing to maximize use of Microsoft 365 security</a>, <a href='https://www.helpnetsecurity.com/2019/11/04/pragmatic-cybersecurity-strategy/'>the “people” element in a cyber security strategy</a>, and <a href='https://www.helpnetsecurity.com/2019/10/31/office-365-voicemail-phishing/'>fake voicemail alerts in suspected whaling campaigns.</a></p><p>I hope you enjoy the themes and the all-round bantz.<br/>Music: Light the Fuze, Audio Network and Natural Duality, Joseph McDade</p>]]></description>
    <content:encoded><![CDATA[<p>On this week’s teiss Security Leaders Roundtable Podcast - Thom Langford, Founder of (TL)2 Security Ltd and Javvad Malik, Security Awareness Advocate at KnowBe4, discuss cyber security news stories such as <a href='https://www.helpnetsecurity.com/2019/11/04/microsoft-365-security-features/'>organisations failing to maximize use of Microsoft 365 security</a>, <a href='https://www.helpnetsecurity.com/2019/11/04/pragmatic-cybersecurity-strategy/'>the “people” element in a cyber security strategy</a>, and <a href='https://www.helpnetsecurity.com/2019/10/31/office-365-voicemail-phishing/'>fake voicemail alerts in suspected whaling campaigns.</a></p><p>I hope you enjoy the themes and the all-round bantz.<br/>Music: Light the Fuze, Audio Network and Natural Duality, Joseph McDade</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/2504248-should-microsoft-365-abandon-most-of-its-security-tools-thom-langford-and-javvad-malik-discuss.mp3" length="28089320" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2504248</guid>
    <pubDate>Thu, 16 Jan 2020 09:00:00 +0000</pubDate>
    <podcast:soundbite startTime="487.633" duration="36.0" />
    <itunes:duration>2335</itunes:duration>
    <itunes:keywords>cyber security, microsoft, office 365, microsoft office, word, excel, information security, data protection, voicemail, phone call, campaigns</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>11</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Could deepfakes be good for cybersecurity? </itunes:title>
    <title>Could deepfakes be good for cybersecurity? </title>
    <itunes:summary><![CDATA[This week we are exploring the weird world of deepfakes - one of the latest ways cybercriminals are exploiting people and making money. Put simplistically, the term “deepfake” refers to an image, video, or audio clip that is manipulated using artificial intelligence and deep learning to depict something that did not really happen.    On this week’s episode, we have two experts tackling the topic, first from a tech perspective - Andrzej Kawalec, Director of strategy and technology at...]]></itunes:summary>
    <description><![CDATA[<p>This week we are exploring the weird world of deepfakes - one of the latest ways cybercriminals are exploiting people and making money. Put simplistically, the term “<a href='https://en.wikipedia.org/wiki/Deepfake'>deepfake</a>” refers to an image, video, or audio clip that is manipulated using artificial intelligence and deep learning to depict something that did not really happen. </p><p> </p><p>On this week’s episode, we have two experts tackling the topic, first from a tech perspective - Andrzej Kawalec, Director of strategy and technology at <a href='https://u7061146.ct.sendgrid.net/wf/click?upn=G62jSYfZdO-2F12d8lSllQB55b-2Fk5OYdYHz-2BwJRTqKqlc-3D_dSg60j8ujFld64hnB-2B7SWKM88-2BlWaz2M01eZWZKHmnlMxt2av-2FQBU-2F-2BbJTWKNGeByfkOSB0eqdpaks2AOm6Ms4RU5-2Fi-2FmhYRKJoFuWw-2FvplthFkxeEndNP9soRNZVXQCG-2FVnLmSdUZ04DD4JI-2FZgZJR6GYAxMDLP79y2wW889t7GR0xZapy6Fnl36NlnQEg8erALRKwlq9l7WsJ0kCDkg6JgmdJRQCxWcub1PpucaYhL0ckUcyALiXgxEVNnuCi4Z3-2BZu3aNUxx-2BTF2oKud9-2Bv8hZ7tv3Z-2BYx7jYgSbAEKIdI6UlQ2TlJ5ZV1-2FuCJ3lhl7Rffa4AnVpYuNmcEOXDvaNfFRGyycy4EH1j5RQAnvs-3D'>Optiv</a>, who explains how criminals are using deepfakes to their advantage, how companies should start to think about them, and what tech is developing in the arena to combat the threat. My second guest is Tamara Quinn a non-contentious IP and Data Privacy Partner at Osborne Clarke, who shares a legal perspective on the topic. </p>]]></description>
    <content:encoded><![CDATA[<p>This week we are exploring the weird world of deepfakes - one of the latest ways cybercriminals are exploiting people and making money. Put simplistically, the term “<a href='https://en.wikipedia.org/wiki/Deepfake'>deepfake</a>” refers to an image, video, or audio clip that is manipulated using artificial intelligence and deep learning to depict something that did not really happen. </p><p> </p><p>On this week’s episode, we have two experts tackling the topic, first from a tech perspective - Andrzej Kawalec, Director of strategy and technology at <a href='https://u7061146.ct.sendgrid.net/wf/click?upn=G62jSYfZdO-2F12d8lSllQB55b-2Fk5OYdYHz-2BwJRTqKqlc-3D_dSg60j8ujFld64hnB-2B7SWKM88-2BlWaz2M01eZWZKHmnlMxt2av-2FQBU-2F-2BbJTWKNGeByfkOSB0eqdpaks2AOm6Ms4RU5-2Fi-2FmhYRKJoFuWw-2FvplthFkxeEndNP9soRNZVXQCG-2FVnLmSdUZ04DD4JI-2FZgZJR6GYAxMDLP79y2wW889t7GR0xZapy6Fnl36NlnQEg8erALRKwlq9l7WsJ0kCDkg6JgmdJRQCxWcub1PpucaYhL0ckUcyALiXgxEVNnuCi4Z3-2BZu3aNUxx-2BTF2oKud9-2Bv8hZ7tv3Z-2BYx7jYgSbAEKIdI6UlQ2TlJ5ZV1-2FuCJ3lhl7Rffa4AnVpYuNmcEOXDvaNfFRGyycy4EH1j5RQAnvs-3D'>Optiv</a>, who explains how criminals are using deepfakes to their advantage, how companies should start to think about them, and what tech is developing in the arena to combat the threat. My second guest is Tamara Quinn a non-contentious IP and Data Privacy Partner at Osborne Clarke, who shares a legal perspective on the topic. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/2314568-could-deepfakes-be-good-for-cybersecurity.mp3" length="19433322" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2314568</guid>
    <pubDate>Thu, 19 Dec 2019 10:00:00 +0000</pubDate>
    <podcast:soundbite startTime="143.832" duration="33.5" />
    <itunes:duration>1614</itunes:duration>
    <itunes:keywords>deep,fakes,information,security,cyber,security,ciso,business,continuity,ip,data,privacy</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How can we protect our children online?</itunes:title>
    <title>How can we protect our children online?</title>
    <itunes:summary><![CDATA[According to the National Crime Agency more than 2,500 arrests were made last year in the UK, after Facebook reported offenders for trying to entice children into sharing indecent images or meeting in real life. Today’s children and teenagers have grown up in the online world, and with all its benefits, these arrests are proof of the darker side of the digital space. So how can we better our children and teenagers online? On this week’s teissPodcast I had the honour of speaking with Lorin LaF...]]></itunes:summary>
    <description><![CDATA[<p>According to the National Crime Agency more than 2,500 arrests were made last year in the UK, after Facebook reported offenders for trying to entice children into sharing indecent images or meeting in real life.</p><p>Today’s children and teenagers have grown up in the online world, and with all its benefits, these arrests are proof of the darker side of the digital space. So how can we better our children and teenagers online?</p><p>On this week’s teissPodcast I had the honour of speaking with <a href='https://www.theguardian.com/lifeandstyle/2016/jan/23/breck-bednar-murder-online-grooming-gaming-lorin-lafave'>Lorin LaFave</a>, the mother of Breck Bednar, who was murdered in 2014 <a href='https://www.theguardian.com/uk-news/2015/jan/12/lewis-daynes-stabbed-breck-bednar-essex-sentenced-chelmsford-crown-court'>after being groomed online</a>. Two weeks after her son’s murder, Lorin set up the <a href='https://www.breckfoundation.org/'>Breck Foundation</a> to educate young people and their parents about online grooming and internet safety.</p><p>In the interview, Lorin talks about the misconceptions about online grooming, what measures she would like to see put in place when it comes to security by design for products and games and what she feels the cyber security industry could be doing to improve internet safety.</p><p>Do watch <a href='https://www.youtube.com/watch?v=hZIYSCE-ZjY&amp;feature=emb_logo'>Breck’s Last Game</a>; it&apos;s a tragic, powerful and important story. Details about the Breck Foundation Ball can be found <a href='https://www.breckfoundation.org/upcoming-events'>here</a>.</p>]]></description>
    <content:encoded><![CDATA[<p>According to the National Crime Agency more than 2,500 arrests were made last year in the UK, after Facebook reported offenders for trying to entice children into sharing indecent images or meeting in real life.</p><p>Today’s children and teenagers have grown up in the online world, and with all its benefits, these arrests are proof of the darker side of the digital space. So how can we better our children and teenagers online?</p><p>On this week’s teissPodcast I had the honour of speaking with <a href='https://www.theguardian.com/lifeandstyle/2016/jan/23/breck-bednar-murder-online-grooming-gaming-lorin-lafave'>Lorin LaFave</a>, the mother of Breck Bednar, who was murdered in 2014 <a href='https://www.theguardian.com/uk-news/2015/jan/12/lewis-daynes-stabbed-breck-bednar-essex-sentenced-chelmsford-crown-court'>after being groomed online</a>. Two weeks after her son’s murder, Lorin set up the <a href='https://www.breckfoundation.org/'>Breck Foundation</a> to educate young people and their parents about online grooming and internet safety.</p><p>In the interview, Lorin talks about the misconceptions about online grooming, what measures she would like to see put in place when it comes to security by design for products and games and what she feels the cyber security industry could be doing to improve internet safety.</p><p>Do watch <a href='https://www.youtube.com/watch?v=hZIYSCE-ZjY&amp;feature=emb_logo'>Breck’s Last Game</a>; it&apos;s a tragic, powerful and important story. Details about the Breck Foundation Ball can be found <a href='https://www.breckfoundation.org/upcoming-events'>here</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/2250185-how-can-we-protect-our-children-online.mp3" length="20868751" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2250185</guid>
    <pubDate>Wed, 11 Dec 2019 07:00:00 +0000</pubDate>
    <podcast:soundbite startTime="61.406" duration="58.5" />
    <itunes:duration>1733</itunes:duration>
    <itunes:keywords>children, protect, safety, crime, safe,hacking, cyber security, business, digital, online, child, kids, </itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Which cyber threats are going to impact the upcoming UK election?</itunes:title>
    <title>Which cyber threats are going to impact the upcoming UK election?</title>
    <itunes:summary><![CDATA[Apparently there’s an election on December 12th, so on this teissPodcast we’re exploring which cyber threats are going to impact the upcoming UK election. Our expert guest this week is Priscilla Moriuchi, director of strategic threat intelligence at Recorded Future, who’s researched the security threats facing elections globally, with a large focus on disinformation campaigns.   On the podcast Priscilla discusses the tactics hackers are using to target elections, whether political micro-...]]></itunes:summary>
    <description><![CDATA[<p>Apparently there’s an election on December 12th, so on this teissPodcast we’re exploring which cyber threats are going to impact the upcoming UK election.</p><p>Our expert guest this week is Priscilla Moriuchi, director of strategic threat intelligence at Recorded Future, who’s researched the security threats facing elections globally, with a large focus on disinformation campaigns.  </p><p>On the podcast Priscilla discusses the tactics hackers are using to target elections, whether political micro-targeting can really impact election results and what the security world can learn from election campaigns.  </p><p> </p>]]></description>
    <content:encoded><![CDATA[<p>Apparently there’s an election on December 12th, so on this teissPodcast we’re exploring which cyber threats are going to impact the upcoming UK election.</p><p>Our expert guest this week is Priscilla Moriuchi, director of strategic threat intelligence at Recorded Future, who’s researched the security threats facing elections globally, with a large focus on disinformation campaigns.  </p><p>On the podcast Priscilla discusses the tactics hackers are using to target elections, whether political micro-targeting can really impact election results and what the security world can learn from election campaigns.  </p><p> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/2219846-which-cyber-threats-are-going-to-impact-the-upcoming-uk-election.mp3" length="13142143" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2219846</guid>
    <pubDate>Wed, 04 Dec 2019 14:00:00 +0000</pubDate>
    <itunes:duration>1090</itunes:duration>
    <itunes:keywords>cyber, threats, election, uk, voting, polling, general election, hacking, campaigns, conservation, labour, liberal democrats, media, russia, trump</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What are the benefits of red teaming?</itunes:title>
    <title>What are the benefits of red teaming?</title>
    <itunes:summary><![CDATA[Red teaming is one of the most fascinating activities an ethical hacker can be involved in. The practice usually involves an independent group that assumes the role of a hacker to show organisations what vulnerabilities or backdoors pose a threat to their cyber security. Sounds like every organisation should employ one…but is it always necessary? And if so, how do you know if your organisation is ready for red teaming?    On this episode of the teissPodcast I speak with Ed Williams, EMEA...]]></itunes:summary>
    <description><![CDATA[<p>Red teaming is one of the most fascinating activities an ethical hacker can be involved in. The practice usually involves an independent group that assumes the role of a hacker to show organisations what vulnerabilities or backdoors pose a threat to their cyber security. Sounds like every organisation should employ one…but is it always necessary? And if so, how do you know if your organisation is ready for red teaming? <br/><br/></p><p>On this episode of the teissPodcast I speak with Ed Williams, EMEA director at SpiderLabs, Trustwave, about red teaming and deciding when is the right time for an organisation to engage a red team. Ed, a patriotic Welshman and ardent rugby enthusiast, explains some common tactics hackers use to manipulate people, where red teaming should sit in the overall cyber security strategy and how can cyber maturity be achieved through red teaming.</p>]]></description>
    <content:encoded><![CDATA[<p>Red teaming is one of the most fascinating activities an ethical hacker can be involved in. The practice usually involves an independent group that assumes the role of a hacker to show organisations what vulnerabilities or backdoors pose a threat to their cyber security. Sounds like every organisation should employ one…but is it always necessary? And if so, how do you know if your organisation is ready for red teaming? <br/><br/></p><p>On this episode of the teissPodcast I speak with Ed Williams, EMEA director at SpiderLabs, Trustwave, about red teaming and deciding when is the right time for an organisation to engage a red team. Ed, a patriotic Welshman and ardent rugby enthusiast, explains some common tactics hackers use to manipulate people, where red teaming should sit in the overall cyber security strategy and how can cyber maturity be achieved through red teaming.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/2179223-what-are-the-benefits-of-red-teaming.mp3" length="14910947" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2179223</guid>
    <pubDate>Wed, 27 Nov 2019 12:00:00 +0000</pubDate>
    <itunes:duration>1237</itunes:duration>
    <itunes:keywords>red team, cyber security, infosec, information, security, hacking, business, ceo, ciso, cio, spiderlabs, trustwave, backdoor, vulnerability,</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How can we grow the next generation of cyber talent?</itunes:title>
    <title>How can we grow the next generation of cyber talent?</title>
    <itunes:summary><![CDATA[We are told that the expected cyber skills shortage is estimated to be 1.8 million by 2022 and yet just 12% of the cybersecurity workforce is under the age of 35. This week I speak with Mark Walmsley, CISO, Freshfields, about finding, nurturing and growing the next generation of cyber talent.  Mark has a wealth of knowledge and experience in sourcing and recruiting talent – particularly in the more untraditional places – so I asked him about where and from what age the search should begi...]]></itunes:summary>
    <description><![CDATA[<p>We are told that the expected cyber skills shortage is estimated to be 1.8 million by 2022 and yet <a href='https://iamcybersafe.org/MeetTheMillennials'>just 12% of the cybersecurity workforce is under the age of 35.</a></p><p>This week I speak with Mark Walmsley, CISO, Freshfields, about finding, nurturing and growing the next generation of cyber talent. </p><p>Mark has a wealth of knowledge and experience in sourcing and recruiting talent – particularly in the more untraditional places – so I asked him about where and from what age the search should begin, what it takes to motivate young people, and what the industry should be doing to increase its talent pipeline.</p><p><em>Mark will be speaking at Cyber Security Connect UK.</em></p>]]></description>
    <content:encoded><![CDATA[<p>We are told that the expected cyber skills shortage is estimated to be 1.8 million by 2022 and yet <a href='https://iamcybersafe.org/MeetTheMillennials'>just 12% of the cybersecurity workforce is under the age of 35.</a></p><p>This week I speak with Mark Walmsley, CISO, Freshfields, about finding, nurturing and growing the next generation of cyber talent. </p><p>Mark has a wealth of knowledge and experience in sourcing and recruiting talent – particularly in the more untraditional places – so I asked him about where and from what age the search should begin, what it takes to motivate young people, and what the industry should be doing to increase its talent pipeline.</p><p><em>Mark will be speaking at Cyber Security Connect UK.</em></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/2050764-how-can-we-grow-the-next-generation-of-cyber-talent.mp3" length="18213369" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2050764</guid>
    <pubDate>Wed, 13 Nov 2019 07:00:00 +0000</pubDate>
    <itunes:duration>1512</itunes:duration>
    <itunes:keywords>cyber,security,skills,gap,recruitment,business,ciso,shortage,hiring,firing,training,growth,experience,promotion,search,young people,employee,training,culture,talent</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Does culture really trump strategy?</itunes:title>
    <title>Does culture really trump strategy?</title>
    <itunes:summary><![CDATA[There’s a saying that culture trumps strategy every time, but how do you build a strong, positive culture in the first place? I caught up with Steve Moore, VP and Chief Security Strategist at Exabeam. Steve’s been on the podcast before and it’s always inspiring to hear his thoughts on leadership, nurturing talent and creating a culture which allows people to grow and thrive in their roles.  Easy right? Steve highlights some approaches which can help. He also mentions Exambeam’s recent Cy...]]></itunes:summary>
    <description><![CDATA[<p>There’s a saying that culture trumps strategy every time, but how do you build a strong, positive culture in the first place?</p><p>I caught up with Steve Moore, VP and Chief Security Strategist at Exabeam. Steve’s been on the podcast <a href='https://www.teiss.co.uk/how-can-cisos-be-better-leaders/'>before</a> and it’s always inspiring to hear his thoughts on leadership, nurturing talent and creating a culture which allows people to grow and thrive in their roles. </p><p>Easy right? Steve highlights some approaches which can help. He also mentions <a href='https://www.businesswire.com/news/home/20191024005165/en/Exabeam-Annual-Cybersecurity-Salary-Survey-Identifies-Persistent'>Exambeam’s recent Cybersecurity Salary Survey</a> which is worth a read.</p><p><b>Check out Steve’s podcast </b><a href='https://www.exabeam.com/podcast/'><b>The New CISO</b></a><b>!</b></p><p>Interview recorded at the Exabeam user conference, San Francisco, earlier this year. </p>]]></description>
    <content:encoded><![CDATA[<p>There’s a saying that culture trumps strategy every time, but how do you build a strong, positive culture in the first place?</p><p>I caught up with Steve Moore, VP and Chief Security Strategist at Exabeam. Steve’s been on the podcast <a href='https://www.teiss.co.uk/how-can-cisos-be-better-leaders/'>before</a> and it’s always inspiring to hear his thoughts on leadership, nurturing talent and creating a culture which allows people to grow and thrive in their roles. </p><p>Easy right? Steve highlights some approaches which can help. He also mentions <a href='https://www.businesswire.com/news/home/20191024005165/en/Exabeam-Annual-Cybersecurity-Salary-Survey-Identifies-Persistent'>Exambeam’s recent Cybersecurity Salary Survey</a> which is worth a read.</p><p><b>Check out Steve’s podcast </b><a href='https://www.exabeam.com/podcast/'><b>The New CISO</b></a><b>!</b></p><p>Interview recorded at the Exabeam user conference, San Francisco, earlier this year. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/1927769-does-culture-really-trump-strategy.mp3" length="14552326" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1927769</guid>
    <pubDate>Fri, 25 Oct 2019 07:00:00 +0100</pubDate>
    <itunes:duration>1207</itunes:duration>
    <itunes:keywords>culture,strategy,exabeam,leadership,cyber security,cyber,security,info,sec,infosec</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Has Monzo perfected the art of responding to a data breach? </itunes:title>
    <title>Has Monzo perfected the art of responding to a data breach? </title>
    <itunes:summary><![CDATA[Welcome to the Security Leaders’ Roundtable Podcast, where I am joined by two exceptionally talented CISOs, Brian Brackenborough, CISO of a major broadcaster and Nick Nagle, CISO of the Publishing House, Conde Nast International.  On this podcast, recorded in July 2019, I asked them to bring two cyber security news stories to the table, as well as a “grudging respect” – a story/hack/response to a breach which deserves a tip of the hat.  Brian selected the story about the ICO intendi...]]></itunes:summary>
    <description><![CDATA[<p>Welcome to the Security Leaders’ Roundtable Podcast, where I am joined by two exceptionally talented CISOs, Brian Brackenborough, CISO of a major broadcaster and Nick Nagle, CISO of the Publishing House, Conde Nast International. </p><p>On this podcast, recorded in July 2019, I asked them to bring two cyber security news stories to the table, as well as a “grudging respect” – a story/hack/response to a breach which deserves a tip of the hat. </p><p>Brian selected the story about the <a href='https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2019/07/ico-announces-intention-to-fine-british-airways/'>ICO intending to fine British Airways £183.39M for breaches of data protection law</a>. Nick chose one on the <a href='https://gizmodo.com/anonymous-hacker-sentenced-after-dropping-usb-while-thr-1835810645'>anonymous hacker who was arrested after dropping a USB stick while throwing a Molotov cocktail</a>, as you do.</p><p>Brian’s “grudging respect” (though not so much grudging, but more pure respect) was for the digital bank Monzo and how they responded to the <a href='https://monzo.com/blog/2018/06/28/ticketmaster-breach'>Ticketmaster</a> and <a href='https://monzo.com/blog/2018/09/07/ba-data-breach'>BA</a> breaches. </p><p>Nick’s contribution was about <a href='https://www.bbc.co.uk/news/world-europe-48510027'>a fake French minister in a silicone mask who stole millions</a>. True story.</p><p>Hope you enjoy the discussion.</p>]]></description>
    <content:encoded><![CDATA[<p>Welcome to the Security Leaders’ Roundtable Podcast, where I am joined by two exceptionally talented CISOs, Brian Brackenborough, CISO of a major broadcaster and Nick Nagle, CISO of the Publishing House, Conde Nast International. </p><p>On this podcast, recorded in July 2019, I asked them to bring two cyber security news stories to the table, as well as a “grudging respect” – a story/hack/response to a breach which deserves a tip of the hat. </p><p>Brian selected the story about the <a href='https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2019/07/ico-announces-intention-to-fine-british-airways/'>ICO intending to fine British Airways £183.39M for breaches of data protection law</a>. Nick chose one on the <a href='https://gizmodo.com/anonymous-hacker-sentenced-after-dropping-usb-while-thr-1835810645'>anonymous hacker who was arrested after dropping a USB stick while throwing a Molotov cocktail</a>, as you do.</p><p>Brian’s “grudging respect” (though not so much grudging, but more pure respect) was for the digital bank Monzo and how they responded to the <a href='https://monzo.com/blog/2018/06/28/ticketmaster-breach'>Ticketmaster</a> and <a href='https://monzo.com/blog/2018/09/07/ba-data-breach'>BA</a> breaches. </p><p>Nick’s contribution was about <a href='https://www.bbc.co.uk/news/world-europe-48510027'>a fake French minister in a silicone mask who stole millions</a>. True story.</p><p>Hope you enjoy the discussion.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/1879064-has-monzo-perfected-the-art-of-responding-to-a-data-breach.mp3" length="32511665" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1879064</guid>
    <pubDate>Fri, 18 Oct 2019 07:00:00 +0100</pubDate>
    <itunes:duration>2704</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>CISO at Levi Strauss &amp; Co, Colin Anderson, on dealing with cyber security’s unknown unknowns</itunes:title>
    <title>CISO at Levi Strauss &amp; Co, Colin Anderson, on dealing with cyber security’s unknown unknowns</title>
    <itunes:summary><![CDATA[Whether it’s external threats to an organisation or bracing personal challenges, how do you respond to the unknown unknowns? Well fortunately our guest this week, Colin Anderson, CISO at Levi Strauss &amp; Co, has had much experience in this realm. I had the opportunity to speak with him at the Exabeam user conference in San Francisco last week where we spoke about his leadership style, how he forms partnerships and support from within the board and whether cyber security can be measured in n...]]></itunes:summary>
    <description><![CDATA[<p>Whether it’s external threats to an organisation or bracing personal challenges, how do you respond to the unknown unknowns? Well fortunately our guest this week, Colin Anderson, CISO at Levi Strauss &amp; Co, has had much experience in this realm.</p><p>I had the opportunity to speak with him at the Exabeam user conference in San Francisco last week where we spoke about his leadership style, how he forms partnerships and support from within the board and whether cyber security can be measured in numbers alone.</p><p>And…yes, he only wears Levi’s.</p>]]></description>
    <content:encoded><![CDATA[<p>Whether it’s external threats to an organisation or bracing personal challenges, how do you respond to the unknown unknowns? Well fortunately our guest this week, Colin Anderson, CISO at Levi Strauss &amp; Co, has had much experience in this realm.</p><p>I had the opportunity to speak with him at the Exabeam user conference in San Francisco last week where we spoke about his leadership style, how he forms partnerships and support from within the board and whether cyber security can be measured in numbers alone.</p><p>And…yes, he only wears Levi’s.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/1845850-ciso-at-levi-strauss-co-colin-anderson-on-dealing-with-cyber-security-s-unknown-unknowns.mp3" length="15671526" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1845850</guid>
    <pubDate>Fri, 11 Oct 2019 07:00:00 +0100</pubDate>
    <itunes:duration>1300</itunes:duration>
    <itunes:keywords>levi,ciso,cyber security,threats,business,education,san francisco,infosec</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What can we learn from the way cybercriminals recruit and train people in their networks to help us?</itunes:title>
    <title>What can we learn from the way cybercriminals recruit and train people in their networks to help us?</title>
    <itunes:summary><![CDATA[What can we learn from the way cybercriminals recruit and train people in their networks to help us with our own cyber security skills shortage?  On this podcast we are visiting the dark side of the moon with teissPodcast friend and regular, Joe Carson, Chief Security Scientist &amp; Advisory CISO at Thycotic. We explore how criminals recruit and train people in their network and how quickly can they take someone with no experience and coach them to be a functional member of their team. ...]]></itunes:summary>
    <description><![CDATA[<p>What can we learn from the way cybercriminals recruit and train people in their networks to help us with our own cyber security skills shortage? </p><p>On this podcast we are visiting the dark side of the moon with teissPodcast friend and regular, Joe Carson, Chief Security Scientist &amp; Advisory CISO at Thycotic. We explore how criminals recruit and train people in their network and how quickly can they take someone with no experience and coach them to be a functional member of their team. Essentially, with ethics in mind, what could we learn and even copy from them?</p>]]></description>
    <content:encoded><![CDATA[<p>What can we learn from the way cybercriminals recruit and train people in their networks to help us with our own cyber security skills shortage? </p><p>On this podcast we are visiting the dark side of the moon with teissPodcast friend and regular, Joe Carson, Chief Security Scientist &amp; Advisory CISO at Thycotic. We explore how criminals recruit and train people in their network and how quickly can they take someone with no experience and coach them to be a functional member of their team. Essentially, with ethics in mind, what could we learn and even copy from them?</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/1775917-what-can-we-learn-from-the-way-cybercriminals-recruit-and-train-people-in-their-networks-to-help-us.mp3" length="20695203" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1775917</guid>
    <pubDate>Tue, 01 Oct 2019 07:00:00 +0100</pubDate>
    <itunes:duration>1719</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Looking to invest in cyber start-ups? Listen to this.</itunes:title>
    <title>Looking to invest in cyber start-ups? Listen to this.</title>
    <itunes:summary><![CDATA[This week the teissPodcast jumps right into the heart of cyber security innovation at LORCA (the London Office for Rapid Cybersecurity Advancement) –  a Government-backed cyber accelerator which supports the most promising cyber security innovators in scaling and growing solutions to the cyber problem. teiss speaks with programme director, Saj Huq about the emerging trends in cyber innovation, the challenges that cyber start-ups face on both macro and micro levels and what role investors...]]></itunes:summary>
    <description><![CDATA[<p>This week the <a href='https://www.teiss.co.uk/tag/podcast/'>teissPodcast</a> jumps right into the heart of cyber security innovation at LORCA (the London Office for Rapid Cybersecurity Advancement) –  a Government-backed cyber accelerator which supports the most promising cyber security innovators in scaling and growing solutions to the cyber problem.</p><p>teiss speaks with programme director, Saj Huq about the emerging trends in cyber innovation, the challenges that cyber start-ups face on both macro and micro levels and what role investors should play in this space. We also discuss safeguarding and nurturing international cyber talent as the Brexit date looms.</p>]]></description>
    <content:encoded><![CDATA[<p>This week the <a href='https://www.teiss.co.uk/tag/podcast/'>teissPodcast</a> jumps right into the heart of cyber security innovation at LORCA (the London Office for Rapid Cybersecurity Advancement) –  a Government-backed cyber accelerator which supports the most promising cyber security innovators in scaling and growing solutions to the cyber problem.</p><p>teiss speaks with programme director, Saj Huq about the emerging trends in cyber innovation, the challenges that cyber start-ups face on both macro and micro levels and what role investors should play in this space. We also discuss safeguarding and nurturing international cyber talent as the Brexit date looms.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/1752955-looking-to-invest-in-cyber-start-ups-listen-to-this.mp3" length="14286540" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1752955</guid>
    <pubDate>Mon, 23 Sep 2019 12:00:00 +0100</pubDate>
    <itunes:duration>1185</itunes:duration>
    <itunes:keywords>LORCA,London,cyber,security,information,tends,data,privacy,talent,brexit</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The past, the present and the future with Paul Watts, CISO Domino’s Pizza Group PLC.</itunes:title>
    <title>The past, the present and the future with Paul Watts, CISO Domino’s Pizza Group PLC.</title>
    <itunes:summary><![CDATA[This week, The teissPodcast is at The National Museum of Computing on Bletchley Park in Milton Keynes. If you’ve not already been there – GO - it’s a treasure trove of historic computers…In fact, it's home to the world’s largest collection, from the Turing-Welchman Bombe and Colossus of the 1940s through the large systems and mainframes of the 1950s, 60s and 70s, to the rise of personal computing and the rise of mobile computing and the internet. Seeing a floppy desk, Pacman mazes and a Sega ...]]></itunes:summary>
    <description><![CDATA[<p>This week, The teissPodcast is at The National Museum of Computing on Bletchley Park in Milton Keynes.</p><p>If you’ve not already been there – GO - it’s a treasure trove of historic computers…In fact, it&apos;s home to the world’s largest collection, from the Turing-Welchman Bombe and Colossus of the 1940s through the large systems and mainframes of the 1950s, 60s and 70s, to the rise of personal computing and the rise of mobile computing and the internet.</p><p>Seeing a floppy desk, Pacman mazes and a Sega Mega Drive in a museum did make me feel quite old, but it’s incredible how these holy relics really arouse the inner child in you. It certainly did with my guest, Paul Watts CISO at Domino’s Pizza Group PLC, who bounded and buzzed with excitement at the technology that had occupied his adolescence.</p><p>I always enjoy talking with Paul and hearing his thoughts on the past, the present and the future…In this interview we talk data - ethics and its future, the double-edged sword that is technology and...Chuckie Egg!</p><p>With many thanks to The National Museum of Computing.</p>]]></description>
    <content:encoded><![CDATA[<p>This week, The teissPodcast is at The National Museum of Computing on Bletchley Park in Milton Keynes.</p><p>If you’ve not already been there – GO - it’s a treasure trove of historic computers…In fact, it&apos;s home to the world’s largest collection, from the Turing-Welchman Bombe and Colossus of the 1940s through the large systems and mainframes of the 1950s, 60s and 70s, to the rise of personal computing and the rise of mobile computing and the internet.</p><p>Seeing a floppy desk, Pacman mazes and a Sega Mega Drive in a museum did make me feel quite old, but it’s incredible how these holy relics really arouse the inner child in you. It certainly did with my guest, Paul Watts CISO at Domino’s Pizza Group PLC, who bounded and buzzed with excitement at the technology that had occupied his adolescence.</p><p>I always enjoy talking with Paul and hearing his thoughts on the past, the present and the future…In this interview we talk data - ethics and its future, the double-edged sword that is technology and...Chuckie Egg!</p><p>With many thanks to The National Museum of Computing.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/1638106-the-past-the-present-and-the-future-with-paul-watts-ciso-domino-s-pizza-group-plc.mp3" length="21013096" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1638106</guid>
    <pubDate>Tue, 03 Sep 2019 12:00:00 +0100</pubDate>
    <itunes:duration>1746</itunes:duration>
    <itunes:keywords>CISO, Cyber Security, Pacman, </itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why can’t we retain the cyber talent that we need?</itunes:title>
    <title>Why can’t we retain the cyber talent that we need?</title>
    <itunes:summary><![CDATA[There’s a cyber skills shortage, but are cyber security hiring and retention processes doing more harm than good to your organisation? This week I speak with Vicki Gavin, about recruitment, talent retention and leading teams. Vicki is an advisor on security, privacy and resilience and was previously CISO for the Economist; with years of experience under her belt I thought she was ideal to discuss these topics with. Vicki speaks with genuine warmth, passion and clarity and admits that it wasn’...]]></itunes:summary>
    <description><![CDATA[<p>There’s a cyber skills shortage, but are cyber security hiring and retention processes doing more harm than good to your organisation?</p><p>This week I speak with Vicki Gavin, about recruitment, talent retention and leading teams. Vicki is an advisor on security, privacy and resilience and was previously CISO for the Economist; with years of experience under her belt I thought she was ideal to discuss these topics with.</p><p>Vicki speaks with genuine warmth, passion and clarity and admits that it wasn’t until she <a href='https://www.nominet.uk/information-security-doesnt-require-a-special-skill-set/'>became a mother</a> that she discovered how to be a good leader. &quot;It’s the same skill set,&quot; she says, &quot;never forcing but helping them to understand the world around them and be the best they can be.” I love that.</p><p>So let’s look at the stats, findings revealed in ISACA’s recent State of Cybersecurity 2019 research, say that 64% of respondents indicated that they have trouble retaining qualified cyber security professionals. So what&apos;s going wrong?</p>]]></description>
    <content:encoded><![CDATA[<p>There’s a cyber skills shortage, but are cyber security hiring and retention processes doing more harm than good to your organisation?</p><p>This week I speak with Vicki Gavin, about recruitment, talent retention and leading teams. Vicki is an advisor on security, privacy and resilience and was previously CISO for the Economist; with years of experience under her belt I thought she was ideal to discuss these topics with.</p><p>Vicki speaks with genuine warmth, passion and clarity and admits that it wasn’t until she <a href='https://www.nominet.uk/information-security-doesnt-require-a-special-skill-set/'>became a mother</a> that she discovered how to be a good leader. &quot;It’s the same skill set,&quot; she says, &quot;never forcing but helping them to understand the world around them and be the best they can be.” I love that.</p><p>So let’s look at the stats, findings revealed in ISACA’s recent State of Cybersecurity 2019 research, say that 64% of respondents indicated that they have trouble retaining qualified cyber security professionals. So what&apos;s going wrong?</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/1554292-why-can-t-we-retain-the-cyber-talent-that-we-need.mp3" length="14851160" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1554292</guid>
    <pubDate>Fri, 16 Aug 2019 07:00:00 +0100</pubDate>
    <itunes:duration>1232</itunes:duration>
    <itunes:keywords>cyber,security,information,recruitment,employee,isaca,skills,shortage,business,</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>22</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Can we protect our National Critical Infrastructure from a major cyber-attack?</itunes:title>
    <title>Can we protect our National Critical Infrastructure from a major cyber-attack?</title>
    <itunes:summary><![CDATA[Can you imagine a world where our water, energy and transport systems just stop working? How about our hospitals, telecoms and financial services? It’s a picture I struggle to visualise, and yet we are told that the risks to our national security have never been greater. So, how safe actually is our National Critical Infrastructure right now and are we able to protect ourselves? Questions we’ll be exploring on this episode of the Cracking Cyber Security Podcast.   Tim Mackey, Principal S...]]></itunes:summary>
    <description><![CDATA[<p>Can you imagine a world where our water, energy and transport systems just stop working? How about our hospitals, telecoms and financial services? It’s a picture I struggle to visualise, and yet we are told that the risks to our national security have never been greater. So, how safe actually is our National Critical Infrastructure right now and are we able to protect ourselves? Questions we’ll be exploring on this episode of the Cracking Cyber Security Podcast.</p><p><b> </b></p><p>Tim Mackey, Principal Security Strategist at the Synopsys CyRC (Cybersecurity Research Centre) about the ominous potential of a cyber-attack on our National Critical Infrastructure. We discuss the threats, the problems and some possible solutions.</p>]]></description>
    <content:encoded><![CDATA[<p>Can you imagine a world where our water, energy and transport systems just stop working? How about our hospitals, telecoms and financial services? It’s a picture I struggle to visualise, and yet we are told that the risks to our national security have never been greater. So, how safe actually is our National Critical Infrastructure right now and are we able to protect ourselves? Questions we’ll be exploring on this episode of the Cracking Cyber Security Podcast.</p><p><b> </b></p><p>Tim Mackey, Principal Security Strategist at the Synopsys CyRC (Cybersecurity Research Centre) about the ominous potential of a cyber-attack on our National Critical Infrastructure. We discuss the threats, the problems and some possible solutions.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/1457026-can-we-protect-our-national-critical-infrastructure-from-a-major-cyber-attack.mp3" length="13448441" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1457026</guid>
    <pubDate>Fri, 26 Jul 2019 07:00:00 +0100</pubDate>
    <itunes:duration>1115</itunes:duration>
    <itunes:keywords>cyber, security, transport, energy, business, national, infrastructure, hacking, government, business, IT, technology, security </itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>21</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Up-skilling your cyber security workforce with Matt Lorentzen, Trustwave </itunes:title>
    <title>Up-skilling your cyber security workforce with Matt Lorentzen, Trustwave </title>
    <itunes:summary><![CDATA[How can we tackle the cyber skills shortage? What’s the best way to up-skill your cyber security workforce? Does it take more than just passion to work in cyber security? These are questions we’ll be exploring on this week’s Cracking Cyber Security podcast. This week I chat with Principal Security Consultant (CCSAS) at Trustwave SpiderLabs, Matt Lorentzen. We are told that cybersecurity skills shortage is worsening for the third year in a row and according to the annual global study of cybers...]]></itunes:summary>
    <description><![CDATA[<p>How can we tackle the cyber skills shortage? What’s the best way to up-skill your cyber security workforce? Does it take more than just passion to work in cyber security? These are questions we’ll be exploring on this week’s Cracking Cyber Security podcast.</p><p>This week I chat with Principal Security Consultant (CCSAS) at Trustwave SpiderLabs, Matt Lorentzen. We are told that <a href='https://www.helpnetsecurity.com/2018/09/10/reverse-cybersecurity-skills-shortage/'>cybersecurity skills shortage</a> is worsening for the third year in a row and according to the annual global study of cybersecurity professionals by the Information Systems Security Association (ISSA) and Enterprise Strategy Group (ESG) has impacted nearly three quarters (74 percent) of organisations. So what can be done about it? On the podcast Matt gives some great advice to anyone looking to work in cyber security, as well as employers who want to up-skill their current workforce.</p>]]></description>
    <content:encoded><![CDATA[<p>How can we tackle the cyber skills shortage? What’s the best way to up-skill your cyber security workforce? Does it take more than just passion to work in cyber security? These are questions we’ll be exploring on this week’s Cracking Cyber Security podcast.</p><p>This week I chat with Principal Security Consultant (CCSAS) at Trustwave SpiderLabs, Matt Lorentzen. We are told that <a href='https://www.helpnetsecurity.com/2018/09/10/reverse-cybersecurity-skills-shortage/'>cybersecurity skills shortage</a> is worsening for the third year in a row and according to the annual global study of cybersecurity professionals by the Information Systems Security Association (ISSA) and Enterprise Strategy Group (ESG) has impacted nearly three quarters (74 percent) of organisations. So what can be done about it? On the podcast Matt gives some great advice to anyone looking to work in cyber security, as well as employers who want to up-skill their current workforce.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/1412938-up-skilling-your-cyber-security-workforce-with-matt-lorentzen-trustwave.mp3" length="13232650" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1412938</guid>
    <pubDate>Fri, 19 Jul 2019 07:00:00 +0100</pubDate>
    <itunes:duration>1097</itunes:duration>
    <itunes:keywords>cyber, security, iot, infosec, hacking, trust, risk, business, skills, recruitment, jobs, </itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>20</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Leadership, imposter syndrome and humour with Thom Langford</itunes:title>
    <title>Leadership, imposter syndrome and humour with Thom Langford</title>
    <itunes:summary><![CDATA[This week we are talking about leadership, imposter syndrome and humour with Thom Langford on the Cracking Cyber Security podcast.  Founder of (TL)2 Security Ltd and former CISO at Publicis Groupe, Thom is a well-known figure in the security world, prolific public speaker and an active and engaging social media user – so to hear that he describes himself as “naturally shy” – came as a bit of a surprise. Thom speaks candidly about wrestling with imposter syndrome, using humour to his adva...]]></itunes:summary>
    <description><![CDATA[<p>This week we are talking about leadership, imposter syndrome and humour with Thom Langford on the Cracking Cyber Security podcast. </p><p>Founder of (TL)2 Security Ltd and former CISO at Publicis Groupe, Thom is a well-known figure in the security world, prolific public speaker and an active and engaging social media user – so to hear that he describes himself as “naturally shy” – came as a bit of a surprise. Thom speaks candidly about wrestling with imposter syndrome, using humour to his advantage and how public speaking has helped his confidence grow over the years. </p>]]></description>
    <content:encoded><![CDATA[<p>This week we are talking about leadership, imposter syndrome and humour with Thom Langford on the Cracking Cyber Security podcast. </p><p>Founder of (TL)2 Security Ltd and former CISO at Publicis Groupe, Thom is a well-known figure in the security world, prolific public speaker and an active and engaging social media user – so to hear that he describes himself as “naturally shy” – came as a bit of a surprise. Thom speaks candidly about wrestling with imposter syndrome, using humour to his advantage and how public speaking has helped his confidence grow over the years. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/1393087-leadership-imposter-syndrome-and-humour-with-thom-langford.mp3" length="19130035" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1393087</guid>
    <pubDate>Fri, 12 Jul 2019 07:00:00 +0100</pubDate>
    <itunes:duration>1589</itunes:duration>
    <itunes:keywords>CISO, Thom Langford, cyber, security, teiss, infosec, mental health, business, IT, computers, resilience, risk</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>19</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Spotting the Insider Threat with Lisa Forte</itunes:title>
    <title>Spotting the Insider Threat with Lisa Forte</title>
    <itunes:summary><![CDATA[How should organisations deal with the Insider Threat? Can you stop the insider before they cause harm? What are the red flags to look out for?  This week on the Cracking Cyber Security Podcast we speak with Lisa Forte, cybersecurity expert and founder of Red Goat Cyber Security about the “Insider Threat”. Lisa began her career in maritime security before moving into counter-terrorism intelligence, and then later into one of the UK Police cyber-crime units where she got to know the attac...]]></itunes:summary>
    <description><![CDATA[<p>How should organisations deal with the Insider Threat? Can you stop the insider before they cause harm? What are the red flags to look out for? </p><p>This week on the Cracking Cyber Security Podcast we speak with Lisa Forte, cybersecurity expert and founder of Red Goat Cyber Security about the “Insider Threat”.</p><p>Lisa began her career in maritime security before moving into counter-terrorism intelligence, and then later into one of the UK Police cyber-crime units where she got to know the attackers’ mindsets and methodologies well. She’s also a bit of a legend in the tech world, winning the “<b>Top 100 Women In Tech</b>” award last year. </p><p>Lisa recently conducted some research on the Insider Threat and she shares some fascinating findings on the episode.  </p>]]></description>
    <content:encoded><![CDATA[<p>How should organisations deal with the Insider Threat? Can you stop the insider before they cause harm? What are the red flags to look out for? </p><p>This week on the Cracking Cyber Security Podcast we speak with Lisa Forte, cybersecurity expert and founder of Red Goat Cyber Security about the “Insider Threat”.</p><p>Lisa began her career in maritime security before moving into counter-terrorism intelligence, and then later into one of the UK Police cyber-crime units where she got to know the attackers’ mindsets and methodologies well. She’s also a bit of a legend in the tech world, winning the “<b>Top 100 Women In Tech</b>” award last year. </p><p>Lisa recently conducted some research on the Insider Threat and she shares some fascinating findings on the episode.  </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/1366906-spotting-the-insider-threat-with-lisa-forte.mp3" length="15350189" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1366906</guid>
    <pubDate>Fri, 05 Jul 2019 07:00:00 +0100</pubDate>
    <itunes:duration>1274</itunes:duration>
    <itunes:keywords>cyber, security, threat, infosec, information, women in tech, women, feminism, teiss, risk, resilience</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>18</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How are cyber criminals collaborating?</itunes:title>
    <title>How are cyber criminals collaborating?</title>
    <itunes:summary><![CDATA[Head of Threat Intelligence at Cybereason, Assaf Dahan, shares some fascinating research about the latest cyber security trends. Assaf, shares some of the most notable attacks we’ve seen over the past year, which techniques were used, what were the attackers after and what you need to know about how to protect yourself from such attacks. We also discuss how the criminals are collaborating and what makes Israel a leader in cyber innovation. Assaf has over 15 years in the InfoSec industry. He s...]]></itunes:summary>
    <description><![CDATA[<p>Head of Threat Intelligence at Cybereason, Assaf Dahan, shares some fascinating research about the latest cyber security trends.</p><p>Assaf, shares some of the most notable attacks we’ve seen over the past year, which techniques were used, what were the attackers after and what you need to know about how to protect yourself from such attacks. We also discuss how the criminals are collaborating and what makes Israel a leader in cyber innovation.</p><p>Assaf has over 15 years in the InfoSec industry. He started his career in the Israeli Military 8200 Cyber Security unit where he developed extensive experience in offensive security. Later in his career he led Red Teams, developed penetration testing methodologies, and specialized in malware analysis and reverse engineering.</p>]]></description>
    <content:encoded><![CDATA[<p>Head of Threat Intelligence at Cybereason, Assaf Dahan, shares some fascinating research about the latest cyber security trends.</p><p>Assaf, shares some of the most notable attacks we’ve seen over the past year, which techniques were used, what were the attackers after and what you need to know about how to protect yourself from such attacks. We also discuss how the criminals are collaborating and what makes Israel a leader in cyber innovation.</p><p>Assaf has over 15 years in the InfoSec industry. He started his career in the Israeli Military 8200 Cyber Security unit where he developed extensive experience in offensive security. Later in his career he led Red Teams, developed penetration testing methodologies, and specialized in malware analysis and reverse engineering.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/1337080-how-are-cyber-criminals-collaborating.mp3" length="10884808" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1337080</guid>
    <pubDate>Fri, 28 Jun 2019 07:00:00 +0100</pubDate>
    <itunes:duration>902</itunes:duration>
    <itunes:keywords>cyber.security,research,business,infosec,criminals,hacking</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>17</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Can defenders trick their attackers?</itunes:title>
    <title>Can defenders trick their attackers?</title>
    <itunes:summary><![CDATA[Can defenders trick their attackers? Can organisations use deception successfully to level the playing field and dupe cybercriminals? This week on the Cracking Cyber Security podcast we’ll be discussing the “art of tricking the trickster”. This week Carolyn Crandall – who has the coolest title in cyber - Chief Deception Officer and CMO at Attivo Networks, joins us on the podcast and explains how organisations can turn the attackers' techniques against them. We also talk about evolving threats...]]></itunes:summary>
    <description><![CDATA[<p>Can defenders trick their attackers? Can organisations use deception successfully to level the playing field and dupe cybercriminals? This week on the Cracking Cyber Security podcast we’ll be discussing the “art of tricking the trickster”.</p><p>This week <a href='https://www.teiss.co.uk/information-security/how-to-use-deception-for-gaining-the-advantage-over-cyberattackers/'>Carolyn Crandall</a> – who has the coolest title in cyber - Chief Deception Officer and CMO at <a href='https://attivonetworks.com/'>Attivo Networks</a>, joins us on the podcast and explains how organisations can turn the attackers&apos; techniques against them. We also talk about evolving threats in 2019 and Carolyn’s quest to get more females into tech.</p>]]></description>
    <content:encoded><![CDATA[<p>Can defenders trick their attackers? Can organisations use deception successfully to level the playing field and dupe cybercriminals? This week on the Cracking Cyber Security podcast we’ll be discussing the “art of tricking the trickster”.</p><p>This week <a href='https://www.teiss.co.uk/information-security/how-to-use-deception-for-gaining-the-advantage-over-cyberattackers/'>Carolyn Crandall</a> – who has the coolest title in cyber - Chief Deception Officer and CMO at <a href='https://attivonetworks.com/'>Attivo Networks</a>, joins us on the podcast and explains how organisations can turn the attackers&apos; techniques against them. We also talk about evolving threats in 2019 and Carolyn’s quest to get more females into tech.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/1301890-can-defenders-trick-their-attackers.mp3" length="12203570" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1301890</guid>
    <pubDate>Fri, 21 Jun 2019 07:00:00 +0100</pubDate>
    <itunes:duration>1011</itunes:duration>
    <itunes:keywords>defenders, cyber, security, information, cyber security, information security, hacker, hacking,women, women in tech</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>16</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How can CISOs be better leaders?</itunes:title>
    <title>How can CISOs be better leaders?</title>
    <itunes:summary><![CDATA[On this episode of the Cracking Cyber Security Podcast, Stephen Moore, Chief Security Strategist at Exabeam says that organisations need a new breed of CISO – one who is groomed for the challenging audiences of the Executive Leadership Team (ELT), the CEO, subcommittees, and the Board. Furthermore, he shares advice on how to speak to the board in a language they understand, how to avoid sugar-coating bad news, and how to focus on co-operation not just budget. Stephen also talks passionately a...]]></itunes:summary>
    <description><![CDATA[<p>On this episode of the Cracking Cyber Security Podcast, Stephen Moore, Chief Security Strategist at Exabeam says that organisations need a new breed of CISO – one who is groomed for the challenging audiences of the Executive Leadership Team (ELT), the CEO, subcommittees, and the Board.</p><p>Furthermore, he shares advice on how to speak to the board in a language they understand, how to avoid sugar-coating bad news, and how to focus on co-operation not just budget. Stephen also talks passionately about how CISOs can be better security leaders.</p>]]></description>
    <content:encoded><![CDATA[<p>On this episode of the Cracking Cyber Security Podcast, Stephen Moore, Chief Security Strategist at Exabeam says that organisations need a new breed of CISO – one who is groomed for the challenging audiences of the Executive Leadership Team (ELT), the CEO, subcommittees, and the Board.</p><p>Furthermore, he shares advice on how to speak to the board in a language they understand, how to avoid sugar-coating bad news, and how to focus on co-operation not just budget. Stephen also talks passionately about how CISOs can be better security leaders.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/1274794-how-can-cisos-be-better-leaders.mp3" length="13778745" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1274794</guid>
    <pubDate>Fri, 14 Jun 2019 07:00:00 +0100</pubDate>
    <itunes:duration>1143</itunes:duration>
    <itunes:keywords>cyber, security, information, data, exabean, ciso, business, it, technology</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>15</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Is Huawei a security threat?</itunes:title>
    <title>Is Huawei a security threat?</title>
    <itunes:summary><![CDATA[Why has the US banned the use of Chinese company Huawei’s technology? To what extent is Huawei a security threat? What are the deeper issues at play in this power struggle? These are questions we’ll be exploring on this week’s cracking cyber security podcast. Malcolm Taylor, Head of Cyber Security at ITC Secure Networking, joins me to discuss what’s really at the root of tensions between the US, UK and China in the battle over the use of Huawei 5G technology. We also talk about the wider issu...]]></itunes:summary>
    <description><![CDATA[<p>Why has the US banned the use of Chinese company Huawei’s technology? To what extent is Huawei a security threat? What are the deeper issues at play in this power struggle? These are questions we’ll be exploring on this week’s cracking cyber security podcast.</p><p>Malcolm Taylor, Head of Cyber Security at ITC Secure Networking, joins me to discuss what’s really at the root of tensions between the US, UK and China in the battle over the use of Huawei 5G technology. We also talk about the wider issues of surveillance and data privacy. What&apos;s a surveillance state? What surveillance is ok and what is not? What would George Orwell make of all this?</p>]]></description>
    <content:encoded><![CDATA[<p>Why has the US banned the use of Chinese company Huawei’s technology? To what extent is Huawei a security threat? What are the deeper issues at play in this power struggle? These are questions we’ll be exploring on this week’s cracking cyber security podcast.</p><p>Malcolm Taylor, Head of Cyber Security at ITC Secure Networking, joins me to discuss what’s really at the root of tensions between the US, UK and China in the battle over the use of Huawei 5G technology. We also talk about the wider issues of surveillance and data privacy. What&apos;s a surveillance state? What surveillance is ok and what is not? What would George Orwell make of all this?</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/1235000-is-huawei-a-security-threat.mp3" length="10666508" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1235000</guid>
    <pubDate>Fri, 07 Jun 2019 07:00:00 +0100</pubDate>
    <itunes:duration>1325</itunes:duration>
    <itunes:keywords>cyber, security, 5g, huawei, china, technology, business, surveillance, risk, network, mobile</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>14</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What can we learn from the way &#39;national security&#39; government organisations buy security? </itunes:title>
    <title>What can we learn from the way &#39;national security&#39; government organisations buy security? </title>
    <itunes:summary><![CDATA[What can we learn from the way 'national security' government organisations think about and buy security?    This week I’ll be speaking with ex-BAE Systems cyber security technical director and now co-founder of Garrison, Henry Harrison. He tells us what we can learn from government organisations in their approach to security and advises on the mind-set and strategies companies should adopt when buying security.    Also, our podcast has been nominated for not just one but ...]]></itunes:summary>
    <description><![CDATA[<p>What can we learn from the way &apos;national security&apos; government organisations think about and buy security? </p><p> </p><p>This week I’ll be speaking with ex-BAE Systems cyber security technical director and now co-founder of Garrison, Henry Harrison<em>. He tells us what we can learn from government organisations in their approach to security and advises on the mind-set and strategies companies should adopt when buying security. </em></p><p><em> </em></p><p>Also, our podcast has been nominated for not just one but two awards at this year’s EU Security Blogger Awards…We are up for &quot;Best New Cyber Security Podcast&quot; and &quot;Best Security Podcast&quot;…We’d like to thank all of you for your support over the past year and we also ask that you go and vote for us! Cast your votes here: <a href='https://www.surveymonkey.com/r/eubloggerawards2019'>https://www.surveymonkey.com/r/eubloggerawards2019</a> (entries 1 and 5)</p>]]></description>
    <content:encoded><![CDATA[<p>What can we learn from the way &apos;national security&apos; government organisations think about and buy security? </p><p> </p><p>This week I’ll be speaking with ex-BAE Systems cyber security technical director and now co-founder of Garrison, Henry Harrison<em>. He tells us what we can learn from government organisations in their approach to security and advises on the mind-set and strategies companies should adopt when buying security. </em></p><p><em> </em></p><p>Also, our podcast has been nominated for not just one but two awards at this year’s EU Security Blogger Awards…We are up for &quot;Best New Cyber Security Podcast&quot; and &quot;Best Security Podcast&quot;…We’d like to thank all of you for your support over the past year and we also ask that you go and vote for us! Cast your votes here: <a href='https://www.surveymonkey.com/r/eubloggerawards2019'>https://www.surveymonkey.com/r/eubloggerawards2019</a> (entries 1 and 5)</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/1213337-what-can-we-learn-from-the-way-national-security-government-organisations-buy-security.mp3" length="7979781" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1213337</guid>
    <pubDate>Fri, 31 May 2019 07:00:00 +0100</pubDate>
    <itunes:duration>989</itunes:duration>
    <itunes:keywords>BAE, government, national security, cyber, security, information, cyber security, information security, teiss, strategy, business</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>13</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Can cyber security be creative?</itunes:title>
    <title>Can cyber security be creative?</title>
    <itunes:summary><![CDATA[On this podcast we speak with CEO and co-founder at Tessian, Tim Sadler, about whether - amidst high stress and anxiety – CISOs can afford to be creative and take risks in their decision-making. We also ask, can the role of defender really be a creative one? Tim also shares advice on how to *creatively recruit* for *creative thinkers* and how he keeps his own leadership inspired. Also, our podcast has been nominated for not just one but two awards at this year’s EU Security Blogger Awards…We ...]]></itunes:summary>
    <description><![CDATA[<p>On this podcast we speak with CEO and co-founder at Tessian, Tim Sadler, about whether - amidst high stress and anxiety – CISOs can afford to be creative and take risks in their decision-making. We also ask, can the role of defender really be a creative one? Tim also shares advice on how to *creatively recruit* for *creative thinkers* and how he keeps his own leadership inspired.</p><p>Also, our podcast has been nominated for not just one but two awards at this year’s EU Security Blogger Awards…We are up for &quot;best new cyber security podcast&quot; and &quot;best security podcast&quot;…We’d like to thank all of you for your support over the past year and we also ask that you go and vote for us! Cast your votes here: <a href='https://www.surveymonkey.com/r/eubloggerawards2019'>https://www.surveymonkey.com/r/eubloggerawards2019</a> (entries 1 and 5)</p>]]></description>
    <content:encoded><![CDATA[<p>On this podcast we speak with CEO and co-founder at Tessian, Tim Sadler, about whether - amidst high stress and anxiety – CISOs can afford to be creative and take risks in their decision-making. We also ask, can the role of defender really be a creative one? Tim also shares advice on how to *creatively recruit* for *creative thinkers* and how he keeps his own leadership inspired.</p><p>Also, our podcast has been nominated for not just one but two awards at this year’s EU Security Blogger Awards…We are up for &quot;best new cyber security podcast&quot; and &quot;best security podcast&quot;…We’d like to thank all of you for your support over the past year and we also ask that you go and vote for us! Cast your votes here: <a href='https://www.surveymonkey.com/r/eubloggerawards2019'>https://www.surveymonkey.com/r/eubloggerawards2019</a> (entries 1 and 5)</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/1178159-can-cyber-security-be-creative.mp3" length="10036201" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1178159</guid>
    <pubDate>Fri, 24 May 2019 07:00:00 +0100</pubDate>
    <itunes:duration>1247</itunes:duration>
    <itunes:keywords>Tessian, Cyber Security, Information Security, hacking, creativity, business, IT, resilience, mental health, defender, leadership, marketing</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>12</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What’s the big deal about zero trust?</itunes:title>
    <title>What’s the big deal about zero trust?</title>
    <itunes:summary><![CDATA[Our theme this week is “Zero trust” – what is it and how can you implement it in your organisation.  On the episode I’m joined by Richard Archdeacon, Duo Security’s Advisory CISO about a ‘Zero Trust’ approach to security (ie ‘trust no-one, verify everything’) and how this addresses some of the biggest concerns for Security Professionals: from digital transformation to enabling remote working. We discuss the evolution of trust, the psychology of a zero trust approach and how hackers are e...]]></itunes:summary>
    <description><![CDATA[<p>Our theme this week is “Zero trust” – what is it and how can you implement it in your organisation. </p><p>On the episode I’m joined by Richard Archdeacon, Duo Security’s Advisory CISO about a ‘Zero Trust’ approach to security (ie ‘trust no-one, verify everything’) and how this addresses some of the biggest concerns for Security Professionals: from digital transformation to enabling remote working.<em> We discuss </em>the evolution of trust, the psychology of a zero trust approach and how hackers are evolving in the perimeterless era.</p>]]></description>
    <content:encoded><![CDATA[<p>Our theme this week is “Zero trust” – what is it and how can you implement it in your organisation. </p><p>On the episode I’m joined by Richard Archdeacon, Duo Security’s Advisory CISO about a ‘Zero Trust’ approach to security (ie ‘trust no-one, verify everything’) and how this addresses some of the biggest concerns for Security Professionals: from digital transformation to enabling remote working.<em> We discuss </em>the evolution of trust, the psychology of a zero trust approach and how hackers are evolving in the perimeterless era.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/1112309-what-s-the-big-deal-about-zero-trust.mp3" length="9606544" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1112309</guid>
    <pubDate>Fri, 10 May 2019 07:00:00 +0100</pubDate>
    <itunes:duration>1190</itunes:duration>
    <itunes:keywords>trust, zero, cyber, security, information security, cyber security, ciso, business, verification, security, digital, transformation</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>11</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Is it time for the cyber security industry to grow up? </itunes:title>
    <title>Is it time for the cyber security industry to grow up? </title>
    <itunes:summary><![CDATA[That’s the question we’ll be tackling on this episode of the cracking cyber security podcast.  Peter Woollacott, CEO and Founder of Huntsman Security, joins us this week to discuss the changing face of cyber risk and how businesses can better understand their cybersecurity posture.  We cover security scorecards, cyber insurance and whether it’s possible to place a price on risk, as well as reflecting on how far a success GDPR has been - almost a year since its implementation. Peter,...]]></itunes:summary>
    <description><![CDATA[<p>That’s the question we’ll be tackling on this episode of the cracking cyber security podcast. </p><p>Peter Woollacott, CEO and Founder of Huntsman Security, joins us this week to discuss the changing face of cyber risk and how businesses can better understand their cybersecurity posture. </p><p>We cover security scorecards, cyber insurance and whether it’s possible to place a price on risk, as well as reflecting on how far a success GDPR has been - almost a year since its implementation. Peter, who’s been in the cyber security industry for over 20 years, is from Australia, so we took the opportunity to ask what the UK could learn about cyber regulation from our friends in Oz.</p>]]></description>
    <content:encoded><![CDATA[<p>That’s the question we’ll be tackling on this episode of the cracking cyber security podcast. </p><p>Peter Woollacott, CEO and Founder of Huntsman Security, joins us this week to discuss the changing face of cyber risk and how businesses can better understand their cybersecurity posture. </p><p>We cover security scorecards, cyber insurance and whether it’s possible to place a price on risk, as well as reflecting on how far a success GDPR has been - almost a year since its implementation. Peter, who’s been in the cyber security industry for over 20 years, is from Australia, so we took the opportunity to ask what the UK could learn about cyber regulation from our friends in Oz.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/1080047-is-it-time-for-the-cyber-security-industry-to-grow-up.mp3" length="9656108" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1080047</guid>
    <pubDate>Fri, 03 May 2019 07:00:00 +0100</pubDate>
    <itunes:duration>1196</itunes:duration>
    <itunes:keywords>cyber security, infosec, information security, business, cyber, insurance, security, gdpr</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Security training: should we give humans a break?</itunes:title>
    <title>Security training: should we give humans a break?</title>
    <itunes:summary><![CDATA[Cryptographer Bruce Schneier once said, "only amateurs attack machines, professionals target people" and yet how far should we be blaming humans for the breakdown of our cyber security? Joining us on this podcast is Flavius Plesu, former CISO at Bank of Ireland and co-founder and CEO of OutThink – a platform which is transforming the way companies are engaging with their employees. Many organisations push out some sort of security awareness training, simulated phishing emails, or bright, amus...]]></itunes:summary>
    <description><![CDATA[<p>Cryptographer Bruce Schneier once said, &quot;only amateurs attack machines, professionals target people&quot; and yet how far should we be blaming humans for the breakdown of our cyber security?</p><p>Joining us on this podcast is Flavius Plesu, former CISO at Bank of Ireland and co-founder and CEO of OutThink – a platform which is transforming the way companies are engaging with their employees.</p><p>Many organisations push out some sort of security awareness training, simulated phishing emails, or bright, amusing posters relaying the importance of cyber security – but how effective are these traditional methods? Or could they, in fact, be doing more harm than good when it comes to building a solid relationship between the workforce and security teams?</p><p>Flavius explains why we should be reframing the conversation around what is expected from humans and why we need to be talking about &quot;managing human risk&quot; rather than &quot;behavioural change&quot;. We also explore what the role of the CISO should be and how the public and private sectors can work better together.</p>]]></description>
    <content:encoded><![CDATA[<p>Cryptographer Bruce Schneier once said, &quot;only amateurs attack machines, professionals target people&quot; and yet how far should we be blaming humans for the breakdown of our cyber security?</p><p>Joining us on this podcast is Flavius Plesu, former CISO at Bank of Ireland and co-founder and CEO of OutThink – a platform which is transforming the way companies are engaging with their employees.</p><p>Many organisations push out some sort of security awareness training, simulated phishing emails, or bright, amusing posters relaying the importance of cyber security – but how effective are these traditional methods? Or could they, in fact, be doing more harm than good when it comes to building a solid relationship between the workforce and security teams?</p><p>Flavius explains why we should be reframing the conversation around what is expected from humans and why we need to be talking about &quot;managing human risk&quot; rather than &quot;behavioural change&quot;. We also explore what the role of the CISO should be and how the public and private sectors can work better together.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/1055180-security-training-should-we-give-humans-a-break.mp3" length="7701510" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1055180</guid>
    <pubDate>Fri, 26 Apr 2019 07:00:00 +0100</pubDate>
    <itunes:duration>952</itunes:duration>
    <itunes:keywords>cyber security, information security, cyber, awareness, training, business</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#Web30: Has the internet been a force for good? </itunes:title>
    <title>#Web30: Has the internet been a force for good? </title>
    <itunes:summary><![CDATA[March 12 2019 marked the 30 year anniversary of the World Wide Web and it was around this time that I met with former senior British Intelligence Officer and Head of Cyber Security at ITC, Malcolm Taylor. The serendipity of the occasion provided an opportune moment to ask Malcolm how he thinks the web has evolved since its inception and whether it’s, ultimately, been a force for good or bad…We also discussed the nature of privacy and trust and how they’ve changed during that time and are chan...]]></itunes:summary>
    <description><![CDATA[<p>March 12 2019 marked the 30 year anniversary of the World Wide Web and it was around this time that I met with former senior British Intelligence Officer and Head of Cyber Security at ITC, Malcolm Taylor.</p><p>The serendipity of the occasion provided an opportune moment to ask Malcolm how he thinks the web has evolved since its inception and whether it’s, ultimately, been a force for good or bad…We also discussed the nature of privacy and trust and how they’ve changed during that time and are changing still.</p><p>As a starting point, however, I began asking Malcolm about “spear phishing” – and how criminals specifically target their victims through carefully designed emails. This is in contrast to traditional phishing attacks usually conducted by sending malicious emails to as many people as possible. Lots of food for thought and tips to protect your “digital tattoo”.</p>]]></description>
    <content:encoded><![CDATA[<p>March 12 2019 marked the 30 year anniversary of the World Wide Web and it was around this time that I met with former senior British Intelligence Officer and Head of Cyber Security at ITC, Malcolm Taylor.</p><p>The serendipity of the occasion provided an opportune moment to ask Malcolm how he thinks the web has evolved since its inception and whether it’s, ultimately, been a force for good or bad…We also discussed the nature of privacy and trust and how they’ve changed during that time and are changing still.</p><p>As a starting point, however, I began asking Malcolm about “spear phishing” – and how criminals specifically target their victims through carefully designed emails. This is in contrast to traditional phishing attacks usually conducted by sending malicious emails to as many people as possible. Lots of food for thought and tips to protect your “digital tattoo”.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/1035151-web30-has-the-internet-been-a-force-for-good.mp3" length="12985348" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1035151</guid>
    <pubDate>Fri, 12 Apr 2019 07:00:00 +0100</pubDate>
    <itunes:duration>1612</itunes:duration>
    <itunes:keywords>web30, internet, world wide web, cyber security, intelligence, uk government, united kingdom, privacy, trust, phishing, email, digital</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Are CISOs suffering from an image crisis? </itunes:title>
    <title>Are CISOs suffering from an image crisis? </title>
    <itunes:summary><![CDATA[Are CISOs suffering from an image crisis? Do they need a rebranding of sorts? How can they be taken seriously by the board and be seen as part of business operations as opposed to purely an investment? With us to explore these questions is TEISS podcast regular Joe Carson, Chief Security Expert at Thycotic. He’ll explain why 2019 is the year of the CISO but also why CISOs need to do more listening than talking. ]]></itunes:summary>
    <description><![CDATA[<p>Are CISOs suffering from an image crisis? Do they need a rebranding of sorts? How can they be taken seriously by the board and be seen as part of business operations as opposed to purely an investment? With us to explore these questions is TEISS podcast regular Joe Carson, Chief Security Expert at Thycotic. He’ll explain why 2019 is the year of the CISO but also why CISOs need to do more listening than talking.</p>]]></description>
    <content:encoded><![CDATA[<p>Are CISOs suffering from an image crisis? Do they need a rebranding of sorts? How can they be taken seriously by the board and be seen as part of business operations as opposed to purely an investment? With us to explore these questions is TEISS podcast regular Joe Carson, Chief Security Expert at Thycotic. He’ll explain why 2019 is the year of the CISO but also why CISOs need to do more listening than talking.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/1014181-are-cisos-suffering-from-an-image-crisis.mp3" length="8913577" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1014181</guid>
    <pubDate>Fri, 29 Mar 2019 11:00:00 +0000</pubDate>
    <itunes:duration>1103</itunes:duration>
    <itunes:keywords>CISO, Crisis, board, business, cyber security, information security, </itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybercrime in the mobile space </itunes:title>
    <title>Cybercrime in the mobile space </title>
    <itunes:summary><![CDATA[This week on the show we have ESET’S Malware Analyst and Researcher, Lukas Stefanko and Head of Automated Threat Detection and Artificial Intelligence, Juraj Jánošík. TEISS caught up with them at Mobile World Congress last month in Barcelona where we discussed the tactics criminals are employing to hack into mobile phones and how we can stay secure with the fast moving innovations in the mobile space.  ]]></itunes:summary>
    <description><![CDATA[<p>This week on the show we have ESET’S Malware Analyst and Researcher, Lukas Stefanko and Head of Automated Threat Detection and Artificial Intelligence, Juraj Jánošík. TEISS caught up with them at Mobile World Congress last month in Barcelona where we discussed the tactics criminals are employing to hack into mobile phones and how we can stay secure with the fast moving innovations in the mobile space. </p>]]></description>
    <content:encoded><![CDATA[<p>This week on the show we have ESET’S Malware Analyst and Researcher, Lukas Stefanko and Head of Automated Threat Detection and Artificial Intelligence, Juraj Jánošík. TEISS caught up with them at Mobile World Congress last month in Barcelona where we discussed the tactics criminals are employing to hack into mobile phones and how we can stay secure with the fast moving innovations in the mobile space. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/1003561-cybercrime-in-the-mobile-space.mp3" length="9663583" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1003561</guid>
    <pubDate>Fri, 22 Mar 2019 07:00:00 +0000</pubDate>
    <itunes:duration>1197</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Could #QueueForTheLoo solve our diversity problem? </itunes:title>
    <title>Could #QueueForTheLoo solve our diversity problem? </title>
    <itunes:summary><![CDATA[When it comes to movers and shakers in the tech world, our guest this week is certainly making some noise in that realm. Sian John, MBE, is the Chief Security Advisor at Microsoft and the tour de force behind the #queuefortheloo initiative; a series of events and online resources aimed at women (and men) in the cyber security sector. On this podcast Sian discusses how the #queuefortheloo campaign came about as well as why we’ve gone backwards when it comes to attracting and recruiting diverse...]]></itunes:summary>
    <description><![CDATA[<p>When it comes to movers and shakers in the tech world, our guest this week is certainly making some noise in that realm. Sian John, MBE, is the Chief Security Advisor at Microsoft and the tour de force behind the #queuefortheloo initiative; a series of events and online resources aimed at women (and men) in the cyber security sector. On this podcast Sian discusses how the #queuefortheloo campaign came about as well as why we’ve gone backwards when it comes to attracting and recruiting diverse talent to the industry. </p>]]></description>
    <content:encoded><![CDATA[<p>When it comes to movers and shakers in the tech world, our guest this week is certainly making some noise in that realm. Sian John, MBE, is the Chief Security Advisor at Microsoft and the tour de force behind the #queuefortheloo initiative; a series of events and online resources aimed at women (and men) in the cyber security sector. On this podcast Sian discusses how the #queuefortheloo campaign came about as well as why we’ve gone backwards when it comes to attracting and recruiting diverse talent to the industry. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/965562-could-queuefortheloo-solve-our-diversity-problem.mp3" length="8007694" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-965562</guid>
    <pubDate>Fri, 22 Feb 2019 07:00:00 +0000</pubDate>
    <itunes:duration>990</itunes:duration>
    <itunes:keywords>diversity, cyber, women, cyber, security, queuefortheloo, microsoft, information, data</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The role of the threat hunter: what is it and why it matters</itunes:title>
    <title>The role of the threat hunter: what is it and why it matters</title>
    <itunes:summary><![CDATA[This week on the podcast we are talking with Naaman Haart, a UK-based threat hunter for the cybersecurity company, Digital Guardian. The role of the Threat hunter is a fairly new one within the industry and on this episode Naaman discusses the ins and outs of what the job entails, as well as how he hunts for, investigates and quarantines threats on a number of enterprise networks. Naaman also reveals the biggest malware trends he’s seeing at the moment. ]]></itunes:summary>
    <description><![CDATA[<p>This week on the podcast we are talking with Naaman Haart, a UK-based threat hunter for the cybersecurity company, Digital Guardian.</p><p>The role of the Threat hunter is a fairly new one within the industry and on this episode Naaman discusses the ins and outs of what the job entails, as well as how he hunts for, investigates and quarantines threats on a number of enterprise networks. Naaman also reveals the biggest malware trends he’s seeing at the moment.</p>]]></description>
    <content:encoded><![CDATA[<p>This week on the podcast we are talking with Naaman Haart, a UK-based threat hunter for the cybersecurity company, Digital Guardian.</p><p>The role of the Threat hunter is a fairly new one within the industry and on this episode Naaman discusses the ins and outs of what the job entails, as well as how he hunts for, investigates and quarantines threats on a number of enterprise networks. Naaman also reveals the biggest malware trends he’s seeing at the moment.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/948914-the-role-of-the-threat-hunter-what-is-it-and-why-it-matters.mp3" length="12061707" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-948914</guid>
    <pubDate>Fri, 08 Feb 2019 07:00:00 +0000</pubDate>
    <itunes:duration>1496</itunes:duration>
    <itunes:keywords>threat, hunter, cyber, security, information, business, </itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Are we investing too much in cyber security?</itunes:title>
    <title>Are we investing too much in cyber security?</title>
    <itunes:summary><![CDATA[On this week’s episode, we talk to cyber security company Tanium’s CEO Orion Hindawi and Chief Technology Officer, Ryan Kazanciyan, at their yearly conference, CONVERGE. Is it fair to label vendors as the snake oil of the cyber security industry? How can CISOs measure risk and present their findings to the board in a comprehensive way? Can companies really avoid having a weak link in their armour? What questions should organisations be asking when it comes to protecting themselves? Find out h...]]></itunes:summary>
    <description><![CDATA[<p>On this week’s episode, we talk to cyber security company Tanium’s CEO Orion Hindawi and Chief Technology Officer, Ryan Kazanciyan, at their yearly conference, CONVERGE.</p><p>Is it fair to label vendors as the snake oil of the cyber security industry? How can CISOs measure risk and present their findings to the board in a comprehensive way? Can companies really avoid having a weak link in their armour? What questions should organisations be asking when it comes to protecting themselves?</p><p>Find out how Orion and Ryan responded and more on the episode.</p>]]></description>
    <content:encoded><![CDATA[<p>On this week’s episode, we talk to cyber security company Tanium’s CEO Orion Hindawi and Chief Technology Officer, Ryan Kazanciyan, at their yearly conference, CONVERGE.</p><p>Is it fair to label vendors as the snake oil of the cyber security industry? How can CISOs measure risk and present their findings to the board in a comprehensive way? Can companies really avoid having a weak link in their armour? What questions should organisations be asking when it comes to protecting themselves?</p><p>Find out how Orion and Ryan responded and more on the episode.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/939467-are-we-investing-too-much-in-cyber-security.mp3" length="8130769" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-939467</guid>
    <pubDate>Fri, 01 Feb 2019 07:00:00 +0000</pubDate>
    <itunes:duration>1005</itunes:duration>
    <itunes:keywords>cyber security, info sec, information security, investment, business, finance</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How is the Met tackling international cybercrime?</itunes:title>
    <title>How is the Met tackling international cybercrime?</title>
    <itunes:summary><![CDATA[On this week’s podcast TEISS speaks with Detective Superintendent Andrew Gould - Head of the Metropolitan Police Cyber Crime Unit about how the Met is tackling international cybercrime, how well nation states cooperate when it comes to tracking down the criminals and what he’s learned from previous work in counter terrorism that is helping in the plight to clamp down on cybercrime. ]]></itunes:summary>
    <description><![CDATA[<p>On this week’s podcast TEISS speaks with Detective Superintendent Andrew Gould - Head of the Metropolitan Police Cyber Crime Unit about how the Met is tackling international cybercrime, how well nation states cooperate when it comes to tracking down the criminals and what he’s learned from previous work in counter terrorism that is helping in the plight to clamp down on cybercrime.</p>]]></description>
    <content:encoded><![CDATA[<p>On this week’s podcast TEISS speaks with Detective Superintendent Andrew Gould - Head of the Metropolitan Police Cyber Crime Unit about how the Met is tackling international cybercrime, how well nation states cooperate when it comes to tracking down the criminals and what he’s learned from previous work in counter terrorism that is helping in the plight to clamp down on cybercrime.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/923663-how-is-the-met-tackling-international-cybercrime.mp3" length="8101940" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-923663</guid>
    <pubDate>Fri, 18 Jan 2019 07:00:00 +0000</pubDate>
    <itunes:duration>1001</itunes:duration>
    <itunes:keywords>cyber crime, cyber security, hacking, crime, cyber, information</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Is password security really that important?</itunes:title>
    <title>Is password security really that important?</title>
    <itunes:summary><![CDATA[Did you know that the most popular password at the end of 2018 was "123456", followed by “password” in second place? Here's a list of the top 25 which might seem alarming...or not. So, unsurprisingly, this week we’re talking passwords…yes, those things we love to hate…but why do we love to hate them? Why exactly are we so bad at changing our passwords regularly? What’s wrong with using the same password across multiple accounts? To help us tackle the password conundrum, Cyber Security Special...]]></itunes:summary>
    <description><![CDATA[<p>Did you know that the most popular password at the end of 2018 was &quot;123456&quot;, followed by “password” in second place? Here&apos;s a <a href='https://www.welivesecurity.com/2018/12/17/most-popular-passwords-2018-revealed/'>list of the top 25</a> which might seem alarming...or not.</p><p>So, unsurprisingly, this week we’re talking passwords…yes, those things we love to hate…but why do we love to hate them? Why exactly are we so bad at changing our passwords regularly? What’s wrong with using the same password across multiple accounts?</p><p>To help us tackle the password conundrum, Cyber Security Specialist at ESET, Jake Moore, uncovers some tactics the hackers employ to steal our passwords and gives advice for better password management. </p>]]></description>
    <content:encoded><![CDATA[<p>Did you know that the most popular password at the end of 2018 was &quot;123456&quot;, followed by “password” in second place? Here&apos;s a <a href='https://www.welivesecurity.com/2018/12/17/most-popular-passwords-2018-revealed/'>list of the top 25</a> which might seem alarming...or not.</p><p>So, unsurprisingly, this week we’re talking passwords…yes, those things we love to hate…but why do we love to hate them? Why exactly are we so bad at changing our passwords regularly? What’s wrong with using the same password across multiple accounts?</p><p>To help us tackle the password conundrum, Cyber Security Specialist at ESET, Jake Moore, uncovers some tactics the hackers employ to steal our passwords and gives advice for better password management. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/913963-is-password-security-really-that-important.mp3" length="10131329" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-913963</guid>
    <pubDate>Fri, 11 Jan 2019 07:00:00 +0000</pubDate>
    <itunes:duration>1255</itunes:duration>
    <itunes:keywords>security, password, cyber, information, hacking</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Inside the mind of a hacker</itunes:title>
    <title>Inside the mind of a hacker</title>
    <itunes:summary><![CDATA[This week Joe Carson, chief security scientist at Thycotic, takes us through the mind of a hacker. What reconnaissance does a hacker conduct before an attack? What are the vulnerabilities they’re looking for? When are hackers most likely to strike? Joe shares his thoughts on these questions, as well as addressing the risks of introducing IoT for ease of use but sacrificing security and how you can prevent and reduce the risk of abuse to your critical information assets. ]]></itunes:summary>
    <description><![CDATA[<p>This week Joe Carson, chief security scientist at Thycotic, takes us through the mind of a hacker. What reconnaissance does a hacker conduct before an attack? What are the vulnerabilities they’re looking for? When are hackers most likely to strike? Joe shares his thoughts on these questions, as well as addressing the risks of introducing IoT for ease of use but sacrificing security and how you can prevent and reduce the risk of abuse to your critical information assets.</p>]]></description>
    <content:encoded><![CDATA[<p>This week Joe Carson, chief security scientist at Thycotic, takes us through the mind of a hacker. What reconnaissance does a hacker conduct before an attack? What are the vulnerabilities they’re looking for? When are hackers most likely to strike? Joe shares his thoughts on these questions, as well as addressing the risks of introducing IoT for ease of use but sacrificing security and how you can prevent and reduce the risk of abuse to your critical information assets.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/896397-inside-the-mind-of-a-hacker.mp3" length="9956590" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-896397</guid>
    <pubDate>Fri, 04 Jan 2019 00:00:00 +0000</pubDate>
    <itunes:duration>1233</itunes:duration>
    <itunes:keywords>cyber security, hacker, cyber, security, hack, IoT, Internet of Things, data</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>27</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Looking back at cyber security in 2018...and what&#39;s to come in 2019</itunes:title>
    <title>Looking back at cyber security in 2018...and what&#39;s to come in 2019</title>
    <itunes:summary><![CDATA[Here we are - at the end of 2018 – and what a year it’s been in the world of cyber security. Barely a week went by without a story of another major breach hitting the headlines. It was the year of GDPR, when businesses jostled to understand and implement the required privacy regulations. Was it also Facebook’s annus horribilis? The Cambridge Analytica scandal, Russian fake news, and the failure to remove child pornography were just a few of the problems that plagued Facebook founder, Mark Zuc...]]></itunes:summary>
    <description><![CDATA[<p>Here we are - at the end of 2018 – and what a year it’s been in the world of cyber security. Barely a week went by without a story of another major breach hitting the headlines. It was the year of <a href='https://www.exabeam.com/information-security/gdpr-and-the-security-monitoring-challenge/'>GDPR</a>, when businesses jostled to understand and implement the required privacy regulations. Was it also Facebook’s <em>annus horribilis</em>? The Cambridge Analytica scandal, Russian fake news, and the failure to remove child pornography were just a few of the problems that plagued Facebook founder, Mark Zuckerburg, in recent months. So what lessons have we learned in 2018? Has the long anticipated GDPR delivered? And what sort of trends can we expect in 2019? Former CISO and Founder and CEO of <a href='https://www.cyberriskaware.com/'>Cyber Risk Aware</a>, Stephen Burke, shared some of his thoughts on the year that was, and the year to come. </p>]]></description>
    <content:encoded><![CDATA[<p>Here we are - at the end of 2018 – and what a year it’s been in the world of cyber security. Barely a week went by without a story of another major breach hitting the headlines. It was the year of <a href='https://www.exabeam.com/information-security/gdpr-and-the-security-monitoring-challenge/'>GDPR</a>, when businesses jostled to understand and implement the required privacy regulations. Was it also Facebook’s <em>annus horribilis</em>? The Cambridge Analytica scandal, Russian fake news, and the failure to remove child pornography were just a few of the problems that plagued Facebook founder, Mark Zuckerburg, in recent months. So what lessons have we learned in 2018? Has the long anticipated GDPR delivered? And what sort of trends can we expect in 2019? Former CISO and Founder and CEO of <a href='https://www.cyberriskaware.com/'>Cyber Risk Aware</a>, Stephen Burke, shared some of his thoughts on the year that was, and the year to come. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/896299-looking-back-at-cyber-security-in-2018-and-what-s-to-come-in-2019.mp3" length="6588546" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-896299</guid>
    <pubDate>Fri, 21 Dec 2018 00:00:00 +0000</pubDate>
    <itunes:duration>812</itunes:duration>
    <itunes:keywords>cyber security, 2018, 2019, business, cyber, attack, hacking, gdpr, </itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>26</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>“GDPR has empowered extortionists” – Tim Lambon, Director, Global Response Team, NYA </itunes:title>
    <title>“GDPR has empowered extortionists” – Tim Lambon, Director, Global Response Team, NYA </title>
    <itunes:summary><![CDATA[This is Part Two of our focus on cyber extortion with Tim Lambon, Director of NYA, the Global Response Team. The episode explores the stigma attached to admitting your business has been a victim of ransomware, the emotional trauma some victims go through, how GDPR has empowered the criminals, as well as Tim’s top tips for dealing with cyber extortion. ]]></itunes:summary>
    <description><![CDATA[<p>This is Part Two of our focus on cyber extortion with Tim Lambon, Director of NYA, the Global Response Team. The episode explores the stigma attached to admitting your business has been a victim of ransomware, the emotional trauma some victims go through, how GDPR has empowered the criminals, as well as Tim’s top tips for dealing with cyber extortion.</p>]]></description>
    <content:encoded><![CDATA[<p>This is Part Two of our focus on cyber extortion with Tim Lambon, Director of NYA, the Global Response Team. The episode explores the stigma attached to admitting your business has been a victim of ransomware, the emotional trauma some victims go through, how GDPR has empowered the criminals, as well as Tim’s top tips for dealing with cyber extortion.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/887407-gdpr-has-empowered-extortionists-tim-lambon-director-global-response-team-nya.mp3" length="10389711" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-887407</guid>
    <pubDate>Fri, 14 Dec 2018 07:00:00 +0000</pubDate>
    <itunes:duration>1287</itunes:duration>
    <itunes:keywords>cyber security, information security, extortion, cyber, response, business, ransomware, </itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>25</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cyber extortion: to pay or not to pay?</itunes:title>
    <title>Cyber extortion: to pay or not to pay?</title>
    <itunes:summary><![CDATA[Cyber extortion is our theme this week; the crime involving an attack or threat of an attack coupled with a demand for money or some other response in return for stopping or remediating the attack. This is the first part of a 2 part cyber extortion special where Tim Lambon, Director of the Global Response Team at NYA, discusses the different types of cyber extortion the criminals are exploiting, when to pay the ransom and when not, the negotiation process itself, how the perception of the val...]]></itunes:summary>
    <description><![CDATA[<p>Cyber extortion is our theme this week; the crime involving an attack or threat of an attack coupled with a demand for money or some other response in return for stopping or remediating the attack. This is the first part of a 2 part cyber extortion special where Tim Lambon, Director of the Global Response Team at NYA, discusses the different types of cyber extortion the criminals are exploiting, when to pay the ransom and when not, the negotiation process itself, how the perception of the value of data changes throughout the negotiation process and what’s the psychology behind it all…</p>]]></description>
    <content:encoded><![CDATA[<p>Cyber extortion is our theme this week; the crime involving an attack or threat of an attack coupled with a demand for money or some other response in return for stopping or remediating the attack. This is the first part of a 2 part cyber extortion special where Tim Lambon, Director of the Global Response Team at NYA, discusses the different types of cyber extortion the criminals are exploiting, when to pay the ransom and when not, the negotiation process itself, how the perception of the value of data changes throughout the negotiation process and what’s the psychology behind it all…</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/881487-cyber-extortion-to-pay-or-not-to-pay.mp3" length="12377849" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-881487</guid>
    <pubDate>Fri, 07 Dec 2018 00:00:00 +0000</pubDate>
    <itunes:duration>1536</itunes:duration>
    <itunes:keywords>cyber security, extortion, ransom, ransomware, cyber</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>24</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>&quot;It’s going wrong at the human level” - Martin Smith MBE on inspiring culture change</itunes:title>
    <title>&quot;It’s going wrong at the human level” - Martin Smith MBE on inspiring culture change</title>
    <itunes:summary><![CDATA[This week we are talking about security awareness with Martin Smith MBE, Chairman of both SASIG and The Security Company. On the podcast Martin discusses the importance of humour and humanity, what is needed to inspire security culture behaviour change within an organisation, and why the security industry needs to stop isolating itself from other industries.  ]]></itunes:summary>
    <description><![CDATA[<p>This week we are talking about security awareness with Martin Smith MBE, Chairman of both SASIG and The Security Company. On the podcast Martin discusses the importance of humour and humanity, what is needed to inspire security culture behaviour change within an organisation, and why the security industry needs to stop isolating itself from other industries. </p>]]></description>
    <content:encoded><![CDATA[<p>This week we are talking about security awareness with Martin Smith MBE, Chairman of both SASIG and The Security Company. On the podcast Martin discusses the importance of humour and humanity, what is needed to inspire security culture behaviour change within an organisation, and why the security industry needs to stop isolating itself from other industries. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/874354-it-s-going-wrong-at-the-human-level-martin-smith-mbe-on-inspiring-culture-change.mp3" length="7607982" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-874354</guid>
    <pubDate>Fri, 30 Nov 2018 07:00:00 +0000</pubDate>
    <itunes:duration>940</itunes:duration>
    <itunes:keywords>cyber security, culture, behaviour</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>23</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Tanium&#39;s CSO, David Damato, on how to stop your breach hitting the headlines</itunes:title>
    <title>Tanium&#39;s CSO, David Damato, on how to stop your breach hitting the headlines</title>
    <itunes:summary><![CDATA[TEISS speaks with Tanium’s Chief Security Officer, David Damato, at CONVERGE18 in Washington DC. On the podcast, we explore how he thinks the cyber skills gap could be bridged, how WannaCry could have been avoided, lessons he’s learnt along his career path, as well as how to talk to the board effectively. New research from Tanium suggests that UK firms have a long way to go in building the business resilience required to withstand modern cyber threats and other major disruptions. Tanium's lat...]]></itunes:summary>
    <description><![CDATA[<p>TEISS speaks with Tanium’s Chief Security Officer, David Damato, at <a href='https://www.tanium.com/converge2018/'>CONVERGE18</a> in Washington DC. On the podcast, we explore how he thinks the cyber skills gap could be bridged, how WannaCry could have been avoided, lessons he’s learnt along his career path, as well as how to talk to the board effectively.</p><p>New research from Tanium suggests that UK firms have a long way to go in building the business resilience required to withstand modern cyber threats and other major disruptions. Tanium&apos;s latest Business Resilience study reveals that 96% of business decision makers claim business resilience should be core to company strategy, however only 54% say that it definitely is…so why are they struggling to take action?</p>]]></description>
    <content:encoded><![CDATA[<p>TEISS speaks with Tanium’s Chief Security Officer, David Damato, at <a href='https://www.tanium.com/converge2018/'>CONVERGE18</a> in Washington DC. On the podcast, we explore how he thinks the cyber skills gap could be bridged, how WannaCry could have been avoided, lessons he’s learnt along his career path, as well as how to talk to the board effectively.</p><p>New research from Tanium suggests that UK firms have a long way to go in building the business resilience required to withstand modern cyber threats and other major disruptions. Tanium&apos;s latest Business Resilience study reveals that 96% of business decision makers claim business resilience should be core to company strategy, however only 54% say that it definitely is…so why are they struggling to take action?</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/868090-tanium-s-cso-david-damato-on-how-to-stop-your-breach-hitting-the-headlines.mp3" length="11142647" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-868090</guid>
    <pubDate>Fri, 23 Nov 2018 07:00:00 +0000</pubDate>
    <itunes:duration>1382</itunes:duration>
    <itunes:keywords>CSO, David Damato, CONVERGE18, cyber, skills gap, cyber threats, business resilience</itunes:keywords>
    <itunes:episode>22</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The hacker vs the defender and a paranoid future</itunes:title>
    <title>The hacker vs the defender and a paranoid future</title>
    <itunes:summary><![CDATA[This week we talk hackers vs defenders, how to convince the board to invest in the unknown and the future of cybersecurity with Juraj Malcho, CTO at ESET. Also, why a dose of health paranoia could be good for us... ]]></itunes:summary>
    <description><![CDATA[<p>This week we talk hackers vs defenders, how to convince the board to invest in the unknown and the future of cybersecurity with Juraj Malcho, CTO at ESET. Also, why a dose of health paranoia could be good for us...</p>]]></description>
    <content:encoded><![CDATA[<p>This week we talk hackers vs defenders, how to convince the board to invest in the unknown and the future of cybersecurity with Juraj Malcho, CTO at ESET. Also, why a dose of health paranoia could be good for us...</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/848244-the-hacker-vs-the-defender-and-a-paranoid-future.mp3" length="6406511" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-848244</guid>
    <pubDate>Fri, 02 Nov 2018 00:00:00 +0000</pubDate>
    <itunes:duration>790</itunes:duration>
    <itunes:keywords>cyber security, business, pananoia, technology, hacking, hacker</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why geopolitics matter to our cyber security </itunes:title>
    <title>Why geopolitics matter to our cyber security </title>
    <itunes:summary><![CDATA[This week we talk with  Chris Day, Cyxtera’s Chief Cybersecurity Officer, about the importance of studying geopolitical events in this cyber sensitive world, IoT security and how to build a cyber resilient network.   ]]></itunes:summary>
    <description><![CDATA[<p>This week we talk with  Chris Day, Cyxtera’s Chief Cybersecurity Officer, about the importance of studying geopolitical events in this cyber sensitive world, IoT security and how to build a cyber resilient network.  </p>]]></description>
    <content:encoded><![CDATA[<p>This week we talk with  Chris Day, Cyxtera’s Chief Cybersecurity Officer, about the importance of studying geopolitical events in this cyber sensitive world, IoT security and how to build a cyber resilient network.  </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/840729-why-geopolitics-matter-to-our-cyber-security.mp3" length="7051633" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-840729</guid>
    <pubDate>Fri, 26 Oct 2018 00:00:00 +0100</pubDate>
    <itunes:duration>870</itunes:duration>
    <itunes:keywords>cyber security, cyber breach, geopolitics, elections, politics</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What if Hitler had access to my Facebook data?</itunes:title>
    <title>What if Hitler had access to my Facebook data?</title>
    <itunes:summary><![CDATA[This week we are exploring the somewhat complex relationship between social media and democracy and asking the question: what if Hitler had access to my Facebook data?   It’s said that today’s secret services and Big Data companies possess much more data about us than were needed to run totalitarian states in the past.  So, with this in mind, what would happen to our personal data were it to end up in the wrong hands? What would the consequences be for us as individuals and for soci...]]></itunes:summary>
    <description><![CDATA[<p>This week we are exploring the somewhat complex relationship between social media and democracy and asking the question: what if Hitler had access to my Facebook data?</p><p> </p><p>It’s said that today’s secret services and Big Data companies possess much more data about us than were needed to run totalitarian states in the past. </p><p>So, with this in mind, what would happen to our personal data were it to end up in the wrong hands? What would the consequences be for us as individuals and for society were it to be misused? </p><p> </p><p>In fact, China has already started ranking citizens with a &apos;social credit&apos; system or Citizen Score – to be fully implemented by 2020 - which would penalize or reward citizens for their actions, both on and offline. This raises alarm bells and begs the question: can democracy, as we know it, <a href='https://www.scientificamerican.com/article/will-democracy-survive-big-data-and-artificial-intelligence/'>survive Big Data and Artificial Intelligence</a>? </p><p> </p><p>With us to explore these issues is Mark Johnson, Founder and CEO of the Risk Management Group. </p>]]></description>
    <content:encoded><![CDATA[<p>This week we are exploring the somewhat complex relationship between social media and democracy and asking the question: what if Hitler had access to my Facebook data?</p><p> </p><p>It’s said that today’s secret services and Big Data companies possess much more data about us than were needed to run totalitarian states in the past. </p><p>So, with this in mind, what would happen to our personal data were it to end up in the wrong hands? What would the consequences be for us as individuals and for society were it to be misused? </p><p> </p><p>In fact, China has already started ranking citizens with a &apos;social credit&apos; system or Citizen Score – to be fully implemented by 2020 - which would penalize or reward citizens for their actions, both on and offline. This raises alarm bells and begs the question: can democracy, as we know it, <a href='https://www.scientificamerican.com/article/will-democracy-survive-big-data-and-artificial-intelligence/'>survive Big Data and Artificial Intelligence</a>? </p><p> </p><p>With us to explore these issues is Mark Johnson, Founder and CEO of the Risk Management Group. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/833545-what-if-hitler-had-access-to-my-facebook-data.mp3" length="9564388" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-833545</guid>
    <pubDate>Fri, 19 Oct 2018 00:00:00 +0100</pubDate>
    <itunes:duration>1184</itunes:duration>
    <itunes:keywords>cyber security, information security, democracy, facebook, twitter, linkedin, social media</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Getting more girls into Cyber Security with Sarah Atkinson, VP at CA Technologies</itunes:title>
    <title>Getting more girls into Cyber Security with Sarah Atkinson, VP at CA Technologies</title>
    <itunes:summary><![CDATA[ On this episode we are commemorating Ada Lovelace Day, which happens on the second Tuesday of every October to celebrate the achievements of women in STEM careers (science, technology, engineering and mathematics), and was created in memory of Ada Lovelace, the first computer programmer. However, it’s also at these moments in time when we should take note that women make up just 23 per cent of the stem industries workforce. What’s more, just last week, a leading male scientist presented...]]></itunes:summary>
    <description><![CDATA[<p> On this episode we are commemorating <a href='https://findingada.com/'>Ada Lovelace Day</a>, which happens on the second Tuesday of every October to celebrate the achievements of women in STEM careers (science, technology, engineering and mathematics), and was created in memory of Ada Lovelace, the first computer programmer. However, it’s also at these moments in time when we should take note that women make up just <a href='https://www.wisecampaign.org.uk/statistics/women-in-stem-workforce-2017/'>23 per cent of the stem industries workforce</a>. What’s more, just last week, <a href='https://www.theguardian.com/science/2018/oct/01/physics-was-built-by-men-cern-scientist-alessandro-strumia-remark-sparks-fury'>a leading male scientist</a> presented a talk at CERN, <a href='https://www.telegraph.co.uk/news/science/11416814/Pictures-reveal-bigger-and-better-Large-Hadron-Collider.html'>the European Organisation for Nuclear Research</a> in Geneva claiming that “physics was invented and built by men, it’s not by invitation”. Proof that there’s still a way to go to achieve equality in the work place and to change certain attitudes. </p><p>So what can be done about this? How can we encourage more girls to consider STEM careers? Do organisations need to change the way they recruit? If so, how? </p><p>To discuss these questions on the podcast we are joined by Sarah Atkinson, Vice President at CA Technologies. </p>]]></description>
    <content:encoded><![CDATA[<p> On this episode we are commemorating <a href='https://findingada.com/'>Ada Lovelace Day</a>, which happens on the second Tuesday of every October to celebrate the achievements of women in STEM careers (science, technology, engineering and mathematics), and was created in memory of Ada Lovelace, the first computer programmer. However, it’s also at these moments in time when we should take note that women make up just <a href='https://www.wisecampaign.org.uk/statistics/women-in-stem-workforce-2017/'>23 per cent of the stem industries workforce</a>. What’s more, just last week, <a href='https://www.theguardian.com/science/2018/oct/01/physics-was-built-by-men-cern-scientist-alessandro-strumia-remark-sparks-fury'>a leading male scientist</a> presented a talk at CERN, <a href='https://www.telegraph.co.uk/news/science/11416814/Pictures-reveal-bigger-and-better-Large-Hadron-Collider.html'>the European Organisation for Nuclear Research</a> in Geneva claiming that “physics was invented and built by men, it’s not by invitation”. Proof that there’s still a way to go to achieve equality in the work place and to change certain attitudes. </p><p>So what can be done about this? How can we encourage more girls to consider STEM careers? Do organisations need to change the way they recruit? If so, how? </p><p>To discuss these questions on the podcast we are joined by Sarah Atkinson, Vice President at CA Technologies. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/826979-getting-more-girls-into-cyber-security-with-sarah-atkinson-vp-at-ca-technologies.mp3" length="6722320" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-826979</guid>
    <pubDate>Fri, 12 Oct 2018 00:00:00 +0100</pubDate>
    <itunes:duration>829</itunes:duration>
    <itunes:keywords>Cyber Security, Women in tech, Ada Lovelace, CA Technologies, </itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>“A good conference is like a robust dinner party” – Freshfields CISO, Mark Walmsley, on getting the best value from conferences</itunes:title>
    <title>“A good conference is like a robust dinner party” – Freshfields CISO, Mark Walmsley, on getting the best value from conferences</title>
    <itunes:summary><![CDATA[As a security decision maker, you might be suffering from conference fatigue. You know, that all too familiar din as you attempt to traverse the never-ending conference floor only to be stalled in your tracks by yet another vendor touting the latest “silver bullet” for EVERY cyber vulnerability. 

And yet, relationship building, networking and discussion with peers are invaluable to CISOs. So how can CISOs gain value from events and forums without having to trawl through the claptrap?

Mark W...]]></itunes:summary>
    <description><![CDATA[As a security decision maker, you might be suffering from conference fatigue. You know, that all too familiar din as you attempt to traverse the never-ending conference floor only to be stalled in your tracks by yet another vendor touting the latest “silver bullet” for EVERY cyber vulnerability. 

And yet, relationship building, networking and discussion with peers are invaluable to CISOs. So how can CISOs gain value from events and forums without having to trawl through the claptrap?

Mark Walmsley, CISO of global law firm Freshfields Bruckhaus Deringer LLP, shares his perspectives on our podcast about the importance of getting maximum return from your time at conferences and how to do so.  ]]></description>
    <content:encoded><![CDATA[As a security decision maker, you might be suffering from conference fatigue. You know, that all too familiar din as you attempt to traverse the never-ending conference floor only to be stalled in your tracks by yet another vendor touting the latest “silver bullet” for EVERY cyber vulnerability. 

And yet, relationship building, networking and discussion with peers are invaluable to CISOs. So how can CISOs gain value from events and forums without having to trawl through the claptrap?

Mark Walmsley, CISO of global law firm Freshfields Bruckhaus Deringer LLP, shares his perspectives on our podcast about the importance of getting maximum return from your time at conferences and how to do so.  ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/820096-a-good-conference-is-like-a-robust-dinner-party-freshfields-ciso-mark-walmsley-on-getting-the-best-value-from-conferences.mp3" length="6320127" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-820096</guid>
    <pubDate>Thu, 04 Oct 2018 00:00:00 +0100</pubDate>
    <itunes:duration>779</itunes:duration>
    <itunes:keywords>cyber security, events, conferences, </itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Elections: manipulations, misinformation and misconceptions</itunes:title>
    <title>Elections: manipulations, misinformation and misconceptions</title>
    <itunes:summary><![CDATA[As the US mid-term elections approach, we thought we’d take a close look at “elections and hacking” with chief security scientist at Thycotic, Joseph Carson. 

On the podcast, Joe explains why information wars pose the greatest risk to democracy, how manipulating the mind works through misinformation, and what changes to the voting system he’d like to see put in place. 
]]></itunes:summary>
    <description><![CDATA[As the US mid-term elections approach, we thought we’d take a close look at “elections and hacking” with chief security scientist at Thycotic, Joseph Carson. 

On the podcast, Joe explains why information wars pose the greatest risk to democracy, how manipulating the mind works through misinformation, and what changes to the voting system he’d like to see put in place. 
]]></description>
    <content:encoded><![CDATA[As the US mid-term elections approach, we thought we’d take a close look at “elections and hacking” with chief security scientist at Thycotic, Joseph Carson. 

On the podcast, Joe explains why information wars pose the greatest risk to democracy, how manipulating the mind works through misinformation, and what changes to the voting system he’d like to see put in place. 
]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/814567-elections-manipulations-misinformation-and-misconceptions.mp3" length="9258050" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-814567</guid>
    <pubDate>Fri, 28 Sep 2018 00:00:00 +0100</pubDate>
    <itunes:duration>1146</itunes:duration>
    <itunes:keywords>cyber security, elections, information security, midterms, hacking</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>“Cyber is a team sport, it’s not about the star player” – Chief Security Officer of Bacs and Faster Payments, Craig Rice, on cyber resiliency </itunes:title>
    <title>“Cyber is a team sport, it’s not about the star player” – Chief Security Officer of Bacs and Faster Payments, Craig Rice, on cyber resiliency </title>
    <itunes:summary><![CDATA[What does it take to build a cyber resilient organisation? What’s the best way to educate staff? Is a revolution needed or can cyber resiliency evolve over time? What does cyber resiliency even mean? This week we are talking about “cyber resiliency” with Chief Security Officer of Bacs and Faster Payments, Craig Rice.]]></itunes:summary>
    <description><![CDATA[What does it take to build a cyber resilient organisation? What’s the best way to educate staff? Is a revolution needed or can cyber resiliency evolve over time? What does cyber resiliency even mean? This week we are talking about “cyber resiliency” with Chief Security Officer of Bacs and Faster Payments, Craig Rice.]]></description>
    <content:encoded><![CDATA[What does it take to build a cyber resilient organisation? What’s the best way to educate staff? Is a revolution needed or can cyber resiliency evolve over time? What does cyber resiliency even mean? This week we are talking about “cyber resiliency” with Chief Security Officer of Bacs and Faster Payments, Craig Rice.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/807955-cyber-is-a-team-sport-it-s-not-about-the-star-player-chief-security-officer-of-bacs-and-faster-payments-craig-rice-on-cyber-resiliency.mp3" length="10388169" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-807955</guid>
    <pubDate>Thu, 20 Sep 2018 00:00:00 +0100</pubDate>
    <itunes:duration>1287</itunes:duration>
    <itunes:keywords>Cyber Security, cyber, resilience, payments, business, information security, education, training</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Mental Health &amp; Cyber Security: Do we have a problem?</itunes:title>
    <title>Mental Health &amp; Cyber Security: Do we have a problem?</title>
    <itunes:summary><![CDATA[This week we are talking about mental health in cyber security and what businesses should be doing to help their employees deal with the stresses of the job.
Long hours and high stress levels, the cyber security profession is not for everyone and with data breaches on the rise - is it right that cyber security professionals carry all that pressure on their shoulders, from the board down? Furthermore, what’s the impact on their mental health?
With us to explore this topic is Trustwave’s Chris ...]]></itunes:summary>
    <description><![CDATA[This week we are talking about mental health in cyber security and what businesses should be doing to help their employees deal with the stresses of the job.
Long hours and high stress levels, the cyber security profession is not for everyone and with data breaches on the rise - is it right that cyber security professionals carry all that pressure on their shoulders, from the board down? Furthermore, what’s the impact on their mental health?
With us to explore this topic is Trustwave’s Chris Schueler, Senior Vice President of Managed Security Services, who has a background in the military and has seen the effects of poor mental health first hand. 
]]></description>
    <content:encoded><![CDATA[This week we are talking about mental health in cyber security and what businesses should be doing to help their employees deal with the stresses of the job.
Long hours and high stress levels, the cyber security profession is not for everyone and with data breaches on the rise - is it right that cyber security professionals carry all that pressure on their shoulders, from the board down? Furthermore, what’s the impact on their mental health?
With us to explore this topic is Trustwave’s Chris Schueler, Senior Vice President of Managed Security Services, who has a background in the military and has seen the effects of poor mental health first hand. 
]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/802766-mental-health-cyber-security-do-we-have-a-problem.mp3" length="7834036" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-802766</guid>
    <pubDate>Fri, 14 Sep 2018 00:00:00 +0100</pubDate>
    <itunes:duration>968</itunes:duration>
    <itunes:keywords>cyber security, mental health, job, stress, business</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Could veterans be the answer to the cyber skills shortage problem?</itunes:title>
    <title>Could veterans be the answer to the cyber skills shortage problem?</title>
    <itunes:summary><![CDATA[45% of businesses claim to have a shortage of cybersecurity skills and 67% of cybersecurity professionals say they’re too busy with their jobs to keep up with skills development and training. And yet there is an obvious and massively untapped resource – veterans – of which only 4% are working in tech and cyber.
 
TEISS speaks with Peter Connolly, CEO of TechVets, on why veterans are the perfect candidates to solve the cyber security skills shortage problem.]]></itunes:summary>
    <description><![CDATA[45% of businesses claim to have a shortage of cybersecurity skills and 67% of cybersecurity professionals say they’re too busy with their jobs to keep up with skills development and training. And yet there is an obvious and massively untapped resource – veterans – of which only 4% are working in tech and cyber.
 
TEISS speaks with Peter Connolly, CEO of TechVets, on why veterans are the perfect candidates to solve the cyber security skills shortage problem.]]></description>
    <content:encoded><![CDATA[45% of businesses claim to have a shortage of cybersecurity skills and 67% of cybersecurity professionals say they’re too busy with their jobs to keep up with skills development and training. And yet there is an obvious and massively untapped resource – veterans – of which only 4% are working in tech and cyber.
 
TEISS speaks with Peter Connolly, CEO of TechVets, on why veterans are the perfect candidates to solve the cyber security skills shortage problem.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/795495-could-veterans-be-the-answer-to-the-cyber-skills-shortage-problem.mp3" length="8201657" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-795495</guid>
    <pubDate>Thu, 06 Sep 2018 00:00:00 +0100</pubDate>
    <itunes:duration>1014</itunes:duration>
    <itunes:keywords>cyber security, AI, artificial intelligence, training</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How to secure your supply chain</itunes:title>
    <title>How to secure your supply chain</title>
    <itunes:summary><![CDATA[As supply chains grow in size and complexity, so does the technology, data, transactions, users, and therefore the cyber security risk. According to the 2016 Security Breaches Survey, very few UK businesses set minimum security standards for their suppliers….So, how can organisations gain an improved awareness of supply chain security and how can they work better with their suppliers?

TEISS talks with Martin Smith, MBE, Chairman and Founder of SASIG, The Security Awareness Special Interest G...]]></itunes:summary>
    <description><![CDATA[As supply chains grow in size and complexity, so does the technology, data, transactions, users, and therefore the cyber security risk. According to the 2016 Security Breaches Survey, very few UK businesses set minimum security standards for their suppliers….So, how can organisations gain an improved awareness of supply chain security and how can they work better with their suppliers?

TEISS talks with Martin Smith, MBE, Chairman and Founder of SASIG, The Security Awareness Special Interest Group, which aims to improve trust in the online environment.
]]></description>
    <content:encoded><![CDATA[As supply chains grow in size and complexity, so does the technology, data, transactions, users, and therefore the cyber security risk. According to the 2016 Security Breaches Survey, very few UK businesses set minimum security standards for their suppliers….So, how can organisations gain an improved awareness of supply chain security and how can they work better with their suppliers?

TEISS talks with Martin Smith, MBE, Chairman and Founder of SASIG, The Security Awareness Special Interest Group, which aims to improve trust in the online environment.
]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/789646-how-to-secure-your-supply-chain.mp3" length="9655876" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-789646</guid>
    <pubDate>Thu, 30 Aug 2018 00:00:00 +0100</pubDate>
    <itunes:duration>1196</itunes:duration>
    <itunes:keywords>cyber security, supply chain, business, technology, suppliers</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Summer Podcast 4! Is bitcoin the currency of our future?</itunes:title>
    <title>Summer Podcast 4! Is bitcoin the currency of our future?</title>
    <itunes:summary><![CDATA[Should we trust bitcoin? Can we really maintain anonymity using the currency? Questions covered on this week's podcast!

As part of our Summer Special Podcast Series, this week we have an interview with Tod Beardsley, Rapid7’s research director who discusses how he thinks the internet should be managed and whether he believes bitcoin will be the currency of our future.

Nick Bilogorskiy, former chief malware expert at Facebook and cyber security strategist at Juniper Networks also features an...]]></itunes:summary>
    <description><![CDATA[Should we trust bitcoin? Can we really maintain anonymity using the currency? Questions covered on this week&apos;s podcast!

As part of our Summer Special Podcast Series, this week we have an interview with Tod Beardsley, Rapid7’s research director who discusses how he thinks the internet should be managed and whether he believes bitcoin will be the currency of our future.

Nick Bilogorskiy, former chief malware expert at Facebook and cyber security strategist at Juniper Networks also features and talks about how businesses can use automation wisely to stay ahead of threats, as well as how to tackle the cyber skills&apos; shortage and what data analysts should be learning now to best prepare for the future.]]></description>
    <content:encoded><![CDATA[Should we trust bitcoin? Can we really maintain anonymity using the currency? Questions covered on this week&apos;s podcast!

As part of our Summer Special Podcast Series, this week we have an interview with Tod Beardsley, Rapid7’s research director who discusses how he thinks the internet should be managed and whether he believes bitcoin will be the currency of our future.

Nick Bilogorskiy, former chief malware expert at Facebook and cyber security strategist at Juniper Networks also features and talks about how businesses can use automation wisely to stay ahead of threats, as well as how to tackle the cyber skills&apos; shortage and what data analysts should be learning now to best prepare for the future.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/782525-summer-podcast-4-is-bitcoin-the-currency-of-our-future.mp3" length="10020804" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-782525</guid>
    <pubDate>Thu, 23 Aug 2018 00:00:00 +0100</pubDate>
    <itunes:duration>1241</itunes:duration>
    <itunes:keywords>cyber security, bitcoin, currency, blockchain, digital, technology</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>11</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Summer Special Podcast, Part III! Patching vulnerabilities: which should you prioritise? </itunes:title>
    <title>Summer Special Podcast, Part III! Patching vulnerabilities: which should you prioritise? </title>
    <itunes:summary><![CDATA[Welcome to our Cyber Summer Series. Slightly different to our usual podcast format – we’re featuring interviews recorded earlier this year at InfoSec 2018.
First up is Andrew Lloyd, President and Executive Vice President Sales and Marketing at Corero who discusses the current trends in DDoS attacks and the smokescreens criminals use to distract investigators. Following this is Technical Director at Tenable, Gavin Millard, who advises on the vulnerabilities worth prioritising and gives us insi...]]></itunes:summary>
    <description><![CDATA[Welcome to our Cyber Summer Series. Slightly different to our usual podcast format – we’re featuring interviews recorded earlier this year at InfoSec 2018.
First up is Andrew Lloyd, President and Executive Vice President Sales and Marketing at Corero who discusses the current trends in DDoS attacks and the smokescreens criminals use to distract investigators. Following this is Technical Director at Tenable, Gavin Millard, who advises on the vulnerabilities worth prioritising and gives us insight on the attackers&apos; advantage.

Anna Delaney
La bruja, Semilla, América Afroindigena Vol 1]]></description>
    <content:encoded><![CDATA[Welcome to our Cyber Summer Series. Slightly different to our usual podcast format – we’re featuring interviews recorded earlier this year at InfoSec 2018.
First up is Andrew Lloyd, President and Executive Vice President Sales and Marketing at Corero who discusses the current trends in DDoS attacks and the smokescreens criminals use to distract investigators. Following this is Technical Director at Tenable, Gavin Millard, who advises on the vulnerabilities worth prioritising and gives us insight on the attackers&apos; advantage.

Anna Delaney
La bruja, Semilla, América Afroindigena Vol 1]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/776939-summer-special-podcast-part-iii-patching-vulnerabilities-which-should-you-prioritise.mp3" length="5317994" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-776939</guid>
    <pubDate>Thu, 16 Aug 2018 00:00:00 +0100</pubDate>
    <itunes:duration>653</itunes:duration>
    <itunes:keywords>identity,digital,cyber security</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>11</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Summer Special: Daniel Moscovici on the IoT</itunes:title>
    <title>Summer Special: Daniel Moscovici on the IoT</title>
    <itunes:summary><![CDATA[In part II of the TEISS Cyber Summer Series, we feature an interview with Daniel Moscovici, co-founder of Cy-oT, about Internet of Things, connected devices and wireless attacks. This will be followed by Bill Keeler, director at Cybereason, who discusses nation state hacking and the new cyber weapons deployed by nation states. Both interviews were recorded earlier this year at InfoSec 2018.]]></itunes:summary>
    <description><![CDATA[In part II of the TEISS Cyber Summer Series, we feature an interview with Daniel Moscovici, co-founder of Cy-oT, about Internet of Things, connected devices and wireless attacks. This will be followed by Bill Keeler, director at Cybereason, who discusses nation state hacking and the new cyber weapons deployed by nation states. Both interviews were recorded earlier this year at InfoSec 2018.]]></description>
    <content:encoded><![CDATA[In part II of the TEISS Cyber Summer Series, we feature an interview with Daniel Moscovici, co-founder of Cy-oT, about Internet of Things, connected devices and wireless attacks. This will be followed by Bill Keeler, director at Cybereason, who discusses nation state hacking and the new cyber weapons deployed by nation states. Both interviews were recorded earlier this year at InfoSec 2018.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/771006-summer-special-daniel-moscovici-on-the-iot.mp3" length="7370290" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-771006</guid>
    <pubDate>Thu, 09 Aug 2018 00:00:00 +0100</pubDate>
    <itunes:duration>910</itunes:duration>
    <itunes:keywords>IoT, Cyber Security, cyber attack, state hacking</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Summer Podcast Special: how can organisations leverage the power of AI?</itunes:title>
    <title>Summer Podcast Special: how can organisations leverage the power of AI?</title>
    <itunes:summary><![CDATA[Welcome to our Special Cyber Summer Series. Over the next 4 weeks we are taking a break from our usual podcast format and featuring interviews recorded earlier this year at InfoSec 2018.

This episode features an interview with Dr Anton Grashion, managing director, security practice at Cylance who talks about how organisations can leverage the power of Artificial Intelligence. This will be followed by Staffan Truvé, CTO and Co-Founder of Recorded Future who discusses recently released researc...]]></itunes:summary>
    <description><![CDATA[Welcome to our Special Cyber Summer Series. Over the next 4 weeks we are taking a break from our usual podcast format and featuring interviews recorded earlier this year at InfoSec 2018.

This episode features an interview with Dr Anton Grashion, managing director, security practice at Cylance who talks about how organisations can leverage the power of Artificial Intelligence. This will be followed by Staffan Truvé, CTO and Co-Founder of Recorded Future who discusses recently released research which found how North Korea uses Western software and hardware on their networks.
]]></description>
    <content:encoded><![CDATA[Welcome to our Special Cyber Summer Series. Over the next 4 weeks we are taking a break from our usual podcast format and featuring interviews recorded earlier this year at InfoSec 2018.

This episode features an interview with Dr Anton Grashion, managing director, security practice at Cylance who talks about how organisations can leverage the power of Artificial Intelligence. This will be followed by Staffan Truvé, CTO and Co-Founder of Recorded Future who discusses recently released research which found how North Korea uses Western software and hardware on their networks.
]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/765371-summer-podcast-special-how-can-organisations-leverage-the-power-of-ai.mp3" length="6693461" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-765371</guid>
    <pubDate>Thu, 02 Aug 2018 00:00:00 +0100</pubDate>
    <itunes:duration>825</itunes:duration>
    <itunes:keywords>cyber security, summer, ransomware, information security</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Estonia&#39;s e-revolution</itunes:title>
    <title>Estonia&#39;s e-revolution</title>
    <itunes:summary><![CDATA[Estonia's e-revolution began in the 1990s, not long after independence from the Soviet Union. However the massive cyber breach of 2007 was a wake-up call for the country, helping Estonians become experts in cyber defence today.

With us this week is Joseph Carson, Chief Security Scientist at Thycotic, to discuss what other nations can learn from Estonia, particularly through developing a digital identity program for all citizens. Originally from Belfast,  Joseph has been based in Estonia sinc...]]></itunes:summary>
    <description><![CDATA[Estonia&apos;s e-revolution began in the 1990s, not long after independence from the Soviet Union. However the massive cyber breach of 2007 was a wake-up call for the country, helping Estonians become experts in cyber defence today.

With us this week is Joseph Carson, Chief Security Scientist at Thycotic, to discuss what other nations can learn from Estonia, particularly through developing a digital identity program for all citizens. Originally from Belfast,  Joseph has been based in Estonia since 2003.
]]></description>
    <content:encoded><![CDATA[Estonia&apos;s e-revolution began in the 1990s, not long after independence from the Soviet Union. However the massive cyber breach of 2007 was a wake-up call for the country, helping Estonians become experts in cyber defence today.

With us this week is Joseph Carson, Chief Security Scientist at Thycotic, to discuss what other nations can learn from Estonia, particularly through developing a digital identity program for all citizens. Originally from Belfast,  Joseph has been based in Estonia since 2003.
]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/759814-estonia-s-e-revolution.mp3" length="7411835" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-759814</guid>
    <pubDate>Thu, 26 Jul 2018 00:00:00 +0100</pubDate>
    <itunes:duration>915</itunes:duration>
    <itunes:keywords>estionia, data, cyber security, online, identity</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What’s the best way to respond to a data breach?</itunes:title>
    <title>What’s the best way to respond to a data breach?</title>
    <itunes:summary><![CDATA[This week TEISS talks crisis communications!

What is the best way to plan a response to a data breach? What is the key to retaining customer loyalty? How do you strike the right tone and language? How can you use the media to your advantage?

To tackle these questions, TEISS talks with Paul Murricane, Media Mentor, who relays his communications tips.

Music: The Pain by Nick Homes (YouTube Channel: Jazz Duets)]]></itunes:summary>
    <description><![CDATA[This week TEISS talks crisis communications!

What is the best way to plan a response to a data breach? What is the key to retaining customer loyalty? How do you strike the right tone and language? How can you use the media to your advantage?

To tackle these questions, TEISS talks with Paul Murricane, Media Mentor, who relays his communications tips.

Music: The Pain by Nick Homes (YouTube Channel: Jazz Duets)]]></description>
    <content:encoded><![CDATA[This week TEISS talks crisis communications!

What is the best way to plan a response to a data breach? What is the key to retaining customer loyalty? How do you strike the right tone and language? How can you use the media to your advantage?

To tackle these questions, TEISS talks with Paul Murricane, Media Mentor, who relays his communications tips.

Music: The Pain by Nick Homes (YouTube Channel: Jazz Duets)]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/752971-what-s-the-best-way-to-respond-to-a-data-breach.mp3" length="7356508" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-752971</guid>
    <pubDate>Fri, 20 Jul 2018 00:00:00 +0100</pubDate>
    <itunes:duration>908</itunes:duration>
    <itunes:keywords>cyber security, media relations, cyber breach, crisis</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Women in Cyber Special</itunes:title>
    <title>Women in Cyber Special</title>
    <itunes:summary><![CDATA[On this episode, we’re talking to a host of brilliant women who are making a difference in cyber security.
What subliminal messages discourage girls from pursuing a career in tech? 
How can women tackle ingrained prejudices in the workplace? 
Does the key to unlocking AI's potential lie in studying the liberal arts? 
Should we adopt gender neutral names? 
How can we better protect our children online? 

Just some of the questions explored on this week's programme.
]]></itunes:summary>
    <description><![CDATA[On this episode, we’re talking to a host of brilliant women who are making a difference in cyber security.
What subliminal messages discourage girls from pursuing a career in tech? 
How can women tackle ingrained prejudices in the workplace? 
Does the key to unlocking AI&apos;s potential lie in studying the liberal arts? 
Should we adopt gender neutral names? 
How can we better protect our children online? 

Just some of the questions explored on this week&apos;s programme.
]]></description>
    <content:encoded><![CDATA[On this episode, we’re talking to a host of brilliant women who are making a difference in cyber security.
What subliminal messages discourage girls from pursuing a career in tech? 
How can women tackle ingrained prejudices in the workplace? 
Does the key to unlocking AI&apos;s potential lie in studying the liberal arts? 
Should we adopt gender neutral names? 
How can we better protect our children online? 

Just some of the questions explored on this week&apos;s programme.
]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/747533-women-in-cyber-special.mp3" length="7032746" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-747533</guid>
    <pubDate>Thu, 12 Jul 2018 00:00:00 +0100</pubDate>
    <itunes:duration>868</itunes:duration>
    <itunes:keywords>women, cyber, technology, business</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What is the greatest threat to the UK’s security?</itunes:title>
    <title>What is the greatest threat to the UK’s security?</title>
    <itunes:summary><![CDATA[On this week’s podcast, TEISS talks with Robert Hannigan, former head of GCHQ at the launch of the London Office for Rapid Cybersecurity Advancement (LORCA), an accelerator for cyber security start-ups, which was officially opened last week by Secretary of State for Digital, Culture, Media and Sport, Matt Hancock. Robert shares his thoughts on how the UK is currently faring when it comes to cyber security, what cyber protocols he’d like to see put in place, as well as why he won’t be racing b...]]></itunes:summary>
    <description><![CDATA[On this week’s podcast, TEISS talks with Robert Hannigan, former head of GCHQ at the launch of the London Office for Rapid Cybersecurity Advancement (LORCA), an accelerator for cyber security start-ups, which was officially opened last week by Secretary of State for Digital, Culture, Media and Sport, Matt Hancock. Robert shares his thoughts on how the UK is currently faring when it comes to cyber security, what cyber protocols he’d like to see put in place, as well as why he won’t be racing back to Whitehall anytime soon. On this podcast we’ll be hearing from two of the start-ups included in the first LORCA cohort; B-Secur which specialises in using biometric heartbeat as an authentication solution and Zone Fox – an insider threat detection solution. More interviews with the other start-ups will be published soon. ]]></description>
    <content:encoded><![CDATA[On this week’s podcast, TEISS talks with Robert Hannigan, former head of GCHQ at the launch of the London Office for Rapid Cybersecurity Advancement (LORCA), an accelerator for cyber security start-ups, which was officially opened last week by Secretary of State for Digital, Culture, Media and Sport, Matt Hancock. Robert shares his thoughts on how the UK is currently faring when it comes to cyber security, what cyber protocols he’d like to see put in place, as well as why he won’t be racing back to Whitehall anytime soon. On this podcast we’ll be hearing from two of the start-ups included in the first LORCA cohort; B-Secur which specialises in using biometric heartbeat as an authentication solution and Zone Fox – an insider threat detection solution. More interviews with the other start-ups will be published soon. ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/743170-what-is-the-greatest-threat-to-the-uk-s-security.mp3" length="8267661" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-743170</guid>
    <pubDate>Thu, 05 Jul 2018 00:00:00 +0100</pubDate>
    <itunes:duration>1022</itunes:duration>
    <itunes:keywords>cyber security, hacking, start-ups</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>“The internet is like a flower with teeth”; with Bridget Kenyon, Global CISO, Thales eSecurity</itunes:title>
    <title>“The internet is like a flower with teeth”; with Bridget Kenyon, Global CISO, Thales eSecurity</title>
    <itunes:summary><![CDATA[“The internet is like a flower with teeth, it’s beautiful and ugly at the same time, it’s just like we are…” 

TEISS speaks with Bridget Kenyon, Global CISO at Thales eSecurity about the good, the bad and the ugly facets of the internet, how to reconcile the blurring of our private and public online lives with GDPR, as well as the challenges of diversity in AI. 

Please subscribe, rate and review our show and tweet us your questions @TeissNews!

Music: The Pain by Nick Homes (YouTube Channel:...]]></itunes:summary>
    <description><![CDATA[“The internet is like a flower with teeth, it’s beautiful and ugly at the same time, it’s just like we are…” 

TEISS speaks with Bridget Kenyon, Global CISO at Thales eSecurity about the good, the bad and the ugly facets of the internet, how to reconcile the blurring of our private and public online lives with GDPR, as well as the challenges of diversity in AI. 

Please subscribe, rate and review our show and tweet us your questions @TeissNews!

Music: The Pain by Nick Homes (YouTube Channel: Jazz Duets)
]]></description>
    <content:encoded><![CDATA[“The internet is like a flower with teeth, it’s beautiful and ugly at the same time, it’s just like we are…” 

TEISS speaks with Bridget Kenyon, Global CISO at Thales eSecurity about the good, the bad and the ugly facets of the internet, how to reconcile the blurring of our private and public online lives with GDPR, as well as the challenges of diversity in AI. 

Please subscribe, rate and review our show and tweet us your questions @TeissNews!

Music: The Pain by Nick Homes (YouTube Channel: Jazz Duets)
]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/731241-the-internet-is-like-a-flower-with-teeth-with-bridget-kenyon-global-ciso-thales-esecurity.mp3" length="6660224" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-731241</guid>
    <pubDate>Thu, 21 Jun 2018 00:00:00 +0100</pubDate>
    <itunes:duration>664</itunes:duration>
    <itunes:keywords>internet, cyber security, GDPR, AI</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Can we ever reclaim our digital identities?</itunes:title>
    <title>Can we ever reclaim our digital identities?</title>
    <itunes:summary><![CDATA[TEISS speaks with Julie Conroy, Research Director for Aite Group’s Retail Banking practice about "digital identity"...Can we reclaim our scattered digital footprint? How can we secure our online identities? How can we predict the future with digital identity? Listen to this podcast where Julie tackles these questions and more...!

Music: The Pain, Nick Homes (check out Nick's YouTube channel Jazz Duets) https://www.youtube.com/channel/UCqimxUbWsE26KSpx2_OcmmA 
]]></itunes:summary>
    <description><![CDATA[TEISS speaks with Julie Conroy, Research Director for Aite Group’s Retail Banking practice about &quot;digital identity&quot;...Can we reclaim our scattered digital footprint? How can we secure our online identities? How can we predict the future with digital identity? Listen to this podcast where Julie tackles these questions and more...!

Music: The Pain, Nick Homes (check out Nick&apos;s YouTube channel Jazz Duets) https://www.youtube.com/channel/UCqimxUbWsE26KSpx2_OcmmA 
]]></description>
    <content:encoded><![CDATA[TEISS speaks with Julie Conroy, Research Director for Aite Group’s Retail Banking practice about &quot;digital identity&quot;...Can we reclaim our scattered digital footprint? How can we secure our online identities? How can we predict the future with digital identity? Listen to this podcast where Julie tackles these questions and more...!

Music: The Pain, Nick Homes (check out Nick&apos;s YouTube channel Jazz Duets) https://www.youtube.com/channel/UCqimxUbWsE26KSpx2_OcmmA 
]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/726506-can-we-ever-reclaim-our-digital-identities.mp3" length="6914176" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-726506</guid>
    <pubDate>Thu, 14 Jun 2018 00:00:00 +0100</pubDate>
    <itunes:duration>676</itunes:duration>
    <itunes:keywords>identity,digital,cyber security</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>GDPR: Myths and Realities</itunes:title>
    <title>GDPR: Myths and Realities</title>
    <itunes:summary><![CDATA[Welcome to the inaugural TEISS Podcast! 

GDPR has arrived (YES!) and we are kicking off the season with Rowenna Fielding, Data Protection Lead at Protecture (https://protecture.org.uk/) who debunks some GDPR myths, shares some last minute GDPR advice and shows us how not to be a git…!

Have any cyber questions or suggestions? Please get in touch in the comment section below or via @TEISSNews.  
]]></itunes:summary>
    <description><![CDATA[Welcome to the inaugural TEISS Podcast! 

GDPR has arrived (YES!) and we are kicking off the season with Rowenna Fielding, Data Protection Lead at Protecture (https://protecture.org.uk/) who debunks some GDPR myths, shares some last minute GDPR advice and shows us how not to be a git…!

Have any cyber questions or suggestions? Please get in touch in the comment section below or via @TEISSNews.  
]]></description>
    <content:encoded><![CDATA[Welcome to the inaugural TEISS Podcast! 

GDPR has arrived (YES!) and we are kicking off the season with Rowenna Fielding, Data Protection Lead at Protecture (https://protecture.org.uk/) who debunks some GDPR myths, shares some last minute GDPR advice and shows us how not to be a git…!

Have any cyber questions or suggestions? Please get in touch in the comment section below or via @TEISSNews.  
]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/180185/episodes/711273-gdpr-myths-and-realities.mp3" length="9293952" type="audio/mpeg" />
    <itunes:author>TEISS</itunes:author>
    <guid isPermaLink="false">Buzzsprout-711273</guid>
    <pubDate>Thu, 24 May 2018 00:00:00 +0100</pubDate>
    <itunes:duration>1139</itunes:duration>
    <itunes:keywords>GDPR, Cyber Security, Data Security, Privacy</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
</channel>
</rss>
