Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
TV & Film
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/72/8e/66/728e6627-cb0a-7a92-a260-15b8d3f0567d/mza_9010858961300928620.jpg/600x600bb.jpg
teissPodcast - Cracking Cyber Security
TEISS
288 episodes
1 week ago
Bridging the CISO-board disconnect which hinders your cyber-security progressMeasuring cyber-risk in financial, economic and operational terms and demonstrating value in cyber-investmentsFocusing on governance and compliance – how to answer when asked “are we compliant?Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Zia Ush Shamszaman, Senior Lecturer in Computer Science, Teesside University https://www.linkedin.com/in/zia-ush-shamszaman/ Edd Hardy, Director Cyber S...
Show more...
Management
Technology,
Business,
News,
Tech News
RSS
All content for teissPodcast - Cracking Cyber Security is the property of TEISS and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Bridging the CISO-board disconnect which hinders your cyber-security progressMeasuring cyber-risk in financial, economic and operational terms and demonstrating value in cyber-investmentsFocusing on governance and compliance – how to answer when asked “are we compliant?Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Zia Ush Shamszaman, Senior Lecturer in Computer Science, Teesside University https://www.linkedin.com/in/zia-ush-shamszaman/ Edd Hardy, Director Cyber S...
Show more...
Management
Technology,
Business,
News,
Tech News
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/72/8e/66/728e6627-cb0a-7a92-a260-15b8d3f0567d/mza_9010858961300928620.jpg/600x600bb.jpg
teissTalk: From service desk to security risk - stopping social engineering at the source
teissPodcast - Cracking Cyber Security
42 minutes
1 month ago
teissTalk: From service desk to security risk - stopping social engineering at the source
Which techniques and methods use by threat actors are bypassing security parametersReducing your cyber risk - using lessons learned from recent high-profile attacksStrategies to protect your service desk against identity-based attacksThom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Paul Holland, Cyber Capability Manager, Royal Mail https://www.linkedin.com/in/paulinfosec/ Lukas Weber, Senior Vice President, AlixPartners https://www.linkedin.com/in/lukaswebr/ Rebecca...
teissPodcast - Cracking Cyber Security
Bridging the CISO-board disconnect which hinders your cyber-security progressMeasuring cyber-risk in financial, economic and operational terms and demonstrating value in cyber-investmentsFocusing on governance and compliance – how to answer when asked “are we compliant?Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Zia Ush Shamszaman, Senior Lecturer in Computer Science, Teesside University https://www.linkedin.com/in/zia-ush-shamszaman/ Edd Hardy, Director Cyber S...