teissPodcast - Cracking Cyber Security

Updated: 27 Nov 2025 • 291 episodes
www.teiss.co.uk

The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.

Show episodes

How modern ransomware actors are deploying multidimensional tactics to outpace traditional defencesStrategies to reduce data loss and sustain business operations after an attackAI and automation – enhancing visibility and accelerating response to ransomware threats Thom Langford, Host, teissTalk https://www.linkedin.co

44 min
00:00
44:49
No file found

Identifying critical assets and dependencies to focus investment where impact is highestDesigning for rapid recovery with tested runbooks and clear RTO/RPO targetsStrengthening resilience through training, playbooks, and cross-functional drills Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Sc

44 min
00:00
44:10
No file found

Leveraging AI-powered solutions to anticipate, detect and contain asymmetric cyber threatsAugmenting security teams through AI efficiencies – reducing alert fatigue whilst improving detection speed and accuracyBest AI security practices on safeguarding critical systems and sensitive data against AI-driven cyber threats

44 min
00:00
44:17
No file found

Bridging the CISO-board disconnect which hinders your cyber-security progressMeasuring cyber-risk in financial, economic and operational terms and demonstrating value in cyber-investmentsFocusing on governance and compliance – how to answer when asked “are we compliant? Thom Langford, Host, teissTalk https://www.linked

45 min
00:00
45:29
No file found

How appreciation and gamification can improve your employees’ security awarenessMaking security behaviours stick – reframing mistakes as opportunities for growthFostering a culture of continuous improvement with an inclusive learning environment Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ S

44 min
00:00
44:42
No file found

Which techniques and methods use by threat actors are bypassing security parametersReducing your cyber risk - using lessons learned from recent high-profile attacksStrategies to protect your service desk against identity-based attacks Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Paul Holland

42 min
00:00
42:33
No file found