Exploitable vulnerabilities within OT devices and how this is expected to changeCyber warfare risk in 2026 - how organisations can defend themselvesSecuring the supply chain and expanding XIoT attack surface Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Jordan M. Schroeder, CISO https://www.linkedin.com/in/schroederjordan/ Zia Ush Shamszaman, Senior Lecturer in Computer Science, Teesside University https://www.linkedin.com/in/zia-ush-shamszaman/ Elliot Gidley, Fi...
All content for teissPodcast - Cracking Cyber Security is the property of TEISS and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Exploitable vulnerabilities within OT devices and how this is expected to changeCyber warfare risk in 2026 - how organisations can defend themselvesSecuring the supply chain and expanding XIoT attack surface Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Jordan M. Schroeder, CISO https://www.linkedin.com/in/schroederjordan/ Zia Ush Shamszaman, Senior Lecturer in Computer Science, Teesside University https://www.linkedin.com/in/zia-ush-shamszaman/ Elliot Gidley, Fi...
teissTalk: Shielding sensitive data from ransomware – staying ahead of evolving threats
teissPodcast - Cracking Cyber Security
44 minutes
1 month ago
teissTalk: Shielding sensitive data from ransomware – staying ahead of evolving threats
How modern ransomware actors are deploying multidimensional tactics to outpace traditional defencesStrategies to reduce data loss and sustain business operations after an attackAI and automation – enhancing visibility and accelerating response to ransomware threatsThom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Edward Starkie, Director, GRC | Cyber Risk, Thomas Murray https://www.linkedin.com/in/edward-starkie-56712431/ Cameron Brown, Head of Cyber Threat and Risk A...
teissPodcast - Cracking Cyber Security
Exploitable vulnerabilities within OT devices and how this is expected to changeCyber warfare risk in 2026 - how organisations can defend themselvesSecuring the supply chain and expanding XIoT attack surface Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Jordan M. Schroeder, CISO https://www.linkedin.com/in/schroederjordan/ Zia Ush Shamszaman, Senior Lecturer in Computer Science, Teesside University https://www.linkedin.com/in/zia-ush-shamszaman/ Elliot Gidley, Fi...