Exploitable vulnerabilities within OT devices and how this is expected to changeCyber warfare risk in 2026 - how organisations can defend themselvesSecuring the supply chain and expanding XIoT attack surface Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Jordan M. Schroeder, CISO https://www.linkedin.com/in/schroederjordan/ Zia Ush Shamszaman, Senior Lecturer in Computer Science, Teesside University https://www.linkedin.com/in/zia-ush-shamszaman/ Elliot Gidley, Fi...
All content for teissPodcast - Cracking Cyber Security is the property of TEISS and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Exploitable vulnerabilities within OT devices and how this is expected to changeCyber warfare risk in 2026 - how organisations can defend themselvesSecuring the supply chain and expanding XIoT attack surface Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Jordan M. Schroeder, CISO https://www.linkedin.com/in/schroederjordan/ Zia Ush Shamszaman, Senior Lecturer in Computer Science, Teesside University https://www.linkedin.com/in/zia-ush-shamszaman/ Elliot Gidley, Fi...
teissTalk: Securing against AI-driven phishing attacks
teissPodcast - Cracking Cyber Security
44 minutes
6 months ago
teissTalk: Securing against AI-driven phishing attacks
How cyber criminals are using AI tools to scale malicious operationsStreamlining user experience with biometrics or device-based authenticationMaking your organisation cyber resilient and securing critical systems as AI continues to advanceFeaturing: Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Derek Hanson, VP Solutions Architecture and Alliances, Yubico https://www.linkedin.com/in/derekthanson Jay Vinda, Global CISO and Cyber Risk Engineering Lead, Mosaic...
teissPodcast - Cracking Cyber Security
Exploitable vulnerabilities within OT devices and how this is expected to changeCyber warfare risk in 2026 - how organisations can defend themselvesSecuring the supply chain and expanding XIoT attack surface Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Jordan M. Schroeder, CISO https://www.linkedin.com/in/schroederjordan/ Zia Ush Shamszaman, Senior Lecturer in Computer Science, Teesside University https://www.linkedin.com/in/zia-ush-shamszaman/ Elliot Gidley, Fi...