Home
Categories
EXPLORE
True Crime
Comedy
Business
Sports
Society & Culture
Health & Fitness
TV & Film
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/72/8e/66/728e6627-cb0a-7a92-a260-15b8d3f0567d/mza_9010858961300928620.jpg/600x600bb.jpg
teissPodcast - Cracking Cyber Security
TEISS
293 episodes
2 weeks ago
Exploitable vulnerabilities within OT devices and how this is expected to changeCyber warfare risk in 2026 - how organisations can defend themselvesSecuring the supply chain and expanding XIoT attack surface Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Jordan M. Schroeder, CISO https://www.linkedin.com/in/schroederjordan/ Zia Ush Shamszaman, Senior Lecturer in Computer Science, Teesside University https://www.linkedin.com/in/zia-ush-shamszaman/ Elliot Gidley, Fi...
Show more...
Management
Technology,
Business,
News,
Tech News
RSS
All content for teissPodcast - Cracking Cyber Security is the property of TEISS and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Exploitable vulnerabilities within OT devices and how this is expected to changeCyber warfare risk in 2026 - how organisations can defend themselvesSecuring the supply chain and expanding XIoT attack surface Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Jordan M. Schroeder, CISO https://www.linkedin.com/in/schroederjordan/ Zia Ush Shamszaman, Senior Lecturer in Computer Science, Teesside University https://www.linkedin.com/in/zia-ush-shamszaman/ Elliot Gidley, Fi...
Show more...
Management
Technology,
Business,
News,
Tech News
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/72/8e/66/728e6627-cb0a-7a92-a260-15b8d3f0567d/mza_9010858961300928620.jpg/600x600bb.jpg
teissTalk: Securing against AI-driven phishing attacks
teissPodcast - Cracking Cyber Security
44 minutes
6 months ago
teissTalk: Securing against AI-driven phishing attacks
How cyber criminals are using AI tools to scale malicious operationsStreamlining user experience with biometrics or device-based authenticationMaking your organisation cyber resilient and securing critical systems as AI continues to advanceFeaturing: Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Derek Hanson, VP Solutions Architecture and Alliances, Yubico https://www.linkedin.com/in/derekthanson Jay Vinda, Global CISO and Cyber Risk Engineering Lead, Mosaic...
teissPodcast - Cracking Cyber Security
Exploitable vulnerabilities within OT devices and how this is expected to changeCyber warfare risk in 2026 - how organisations can defend themselvesSecuring the supply chain and expanding XIoT attack surface Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Jordan M. Schroeder, CISO https://www.linkedin.com/in/schroederjordan/ Zia Ush Shamszaman, Senior Lecturer in Computer Science, Teesside University https://www.linkedin.com/in/zia-ush-shamszaman/ Elliot Gidley, Fi...