Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
teissPodcast - Cracking Cyber Security - teissTalk: Securing the human perimeter

teissTalk: Securing the human perimeter

02/20/25 • 42 min

teissPodcast - Cracking Cyber Security
  • How the human risk surface area has broadened with GenAI and collaboration tools
  • Prevent breaches by applying the cyber kill chain to human vulnerabilities
  • Strategies to protect employees without compromising productivity

This episode is hosted by Thom Langford:
https://www.linkedin.com/in/thomlangford/

Daniela Almeida Lourenco, Chief Information Security Officer, Dutch Financial Services
https://www.linkedin.com/in/daniela-almeida-lourenco/

Rebecca Stephenson, Specialist Lead Lecturer, Highlands College
https://www.linkedin.com/in/creative-minds-in-cyber/

Frederick Coulton, Director of UX, CultureAI
https://www.linkedin.com/in/frederickcoulton

plus icon
bookmark
  • How the human risk surface area has broadened with GenAI and collaboration tools
  • Prevent breaches by applying the cyber kill chain to human vulnerabilities
  • Strategies to protect employees without compromising productivity

This episode is hosted by Thom Langford:
https://www.linkedin.com/in/thomlangford/

Daniela Almeida Lourenco, Chief Information Security Officer, Dutch Financial Services
https://www.linkedin.com/in/daniela-almeida-lourenco/

Rebecca Stephenson, Specialist Lead Lecturer, Highlands College
https://www.linkedin.com/in/creative-minds-in-cyber/

Frederick Coulton, Director of UX, CultureAI
https://www.linkedin.com/in/frederickcoulton

Previous Episode

undefined - teissTalk: Threat intelligence strategies to mitigate industrial-scale cyber-crime

teissTalk: Threat intelligence strategies to mitigate industrial-scale cyber-crime

  • How cyber-crime continues to evolve and what this means for enterprise threat intelligence strategies
  • Evaluating sources and deciding which characteristics are most relevant
  • How DNS-based threat intelligence versus a malware-centric approach disrupts industrialised cyber-crime

This episode is hosted by Thom Langford:
https://www.linkedin.com/in/thomlangford/

Todd Wade, Chief Information Security Officerhttps://www.linkedin.com/in/twade/

Matt Hardy, Senior Information Security Executivehttps://www.linkedin.com/in/matthardy67/

Craig Sanderson, Principal Cybersecurity Strategist, Infoblox
https://www.linkedin.com/in/craigsanderson1

Next Episode

undefined - teissTalk: Bolstering your defences against supply chain cyber-risk

teissTalk: Bolstering your defences against supply chain cyber-risk

  • What’s making supply chain risk the fastest-growing cyber-risk category
  • How to galvanise your internal and external peers to develop a shared responsibility for supply chain cyber-risks
  • Designing and implementing effective key controls to mitigate supply chain cyber-risks

This episode is hosted by Jonathan Craven:
https://www.linkedin.com/in/jonathanbcraven/
Mike Johnson, Global Cyber Threat & Incident Response Manager, Verifone
https://www.linkedin.com/in/mike---johnson/

Jean Carlos, Group Head of Cyber Architecture & Engineering, TP ICAP
https://www.linkedin.com/in/jeanpc/

Richard Marcus, CISO, AuditBoard
https://www.linkedin.com/in/richard-marcus-b3192261/

Episode Comments

Generate a badge

Get a badge for your website that links back to this episode

Select type & size
Open dropdown icon
share badge image

<a href="https://goodpods.com/podcasts/teisspodcast-cracking-cyber-security-221495/teisstalk-securing-the-human-perimeter-84542628"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to teisstalk: securing the human perimeter on goodpods" style="width: 225px" /> </a>

Copy