Exploitable vulnerabilities within OT devices and how this is expected to changeCyber warfare risk in 2026 - how organisations can defend themselvesSecuring the supply chain and expanding XIoT attack surface Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Jordan M. Schroeder, CISO https://www.linkedin.com/in/schroederjordan/ Zia Ush Shamszaman, Senior Lecturer in Computer Science, Teesside University https://www.linkedin.com/in/zia-ush-shamszaman/ Elliot Gidley, Fi...
All content for teissPodcast - Cracking Cyber Security is the property of TEISS and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Exploitable vulnerabilities within OT devices and how this is expected to changeCyber warfare risk in 2026 - how organisations can defend themselvesSecuring the supply chain and expanding XIoT attack surface Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Jordan M. Schroeder, CISO https://www.linkedin.com/in/schroederjordan/ Zia Ush Shamszaman, Senior Lecturer in Computer Science, Teesside University https://www.linkedin.com/in/zia-ush-shamszaman/ Elliot Gidley, Fi...
teissTalk: Resilient by design – the next cyber-security imperative
teissPodcast - Cracking Cyber Security
45 minutes
9 months ago
teissTalk: Resilient by design – the next cyber-security imperative
Identifying and removing barriers to cyber resilienceReducing complexity - consolidating and eliminating legacy systemsBuilding a cyber-resilient organisation - moving from a reactive to a proactive model This episode is hosted by Thom Langford: https://www.linkedin.com/in/jonathanbcraven/ Heather Lowrie, Independent Advisor, Earthgard Ltd https://www.linkedin.com/in/heather-lowrie/ Sasha Henry, Cyber Strategy & Resilience Advisor, Confidential https://www.linkedin.com/in/alexandra...
teissPodcast - Cracking Cyber Security
Exploitable vulnerabilities within OT devices and how this is expected to changeCyber warfare risk in 2026 - how organisations can defend themselvesSecuring the supply chain and expanding XIoT attack surface Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Jordan M. Schroeder, CISO https://www.linkedin.com/in/schroederjordan/ Zia Ush Shamszaman, Senior Lecturer in Computer Science, Teesside University https://www.linkedin.com/in/zia-ush-shamszaman/ Elliot Gidley, Fi...