Player FM - Internet Radio Done Right
31 subscribers
Checked 13d ago
seven 年前已添加!
内容由TEISS提供。所有播客内容(包括剧集、图形和播客描述)均由 TEISS 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal。
Player FM -播客应用
使用Player FM应用程序离线!
使用Player FM应用程序离线!
值得一听的播客
赞助
<
<div class="span index">1</div> <span><a class="" data-remote="true" data-type="html" href="/series/the-agile-brand-with-greg-kihlstromr">The Agile Brand with Greg Kihlström®</a></span>


Don't miss a thing. Hear directly from leading brands and marketing technology platforms about the challenges and opportunities facing marketers today, from AI to building customer lifetime value as well as business value. The Agile Brand with Greg Kihlström® features executives and thought leaders from top brands and platforms discussing the trends driving the industry forward, like first-party data strategies, artificial intelligence, consumer data privacy, omnichannel customer experience, and more. The Agile Brand is hosted by Greg Kihlström, advisor and consultant to leading brands, speaker, entrepreneur, and best-selling author. It provides a fresh perspective on the continually evolving dynamic between brands and the audiences they serve.
teissTalk: A playbook for new CISOs - learnings from years in the trenches
Manage episode 429504451 series 2318447
内容由TEISS提供。所有播客内容(包括剧集、图形和播客描述)均由 TEISS 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal。
- How the next generation of InfoSec leaders can better prepare themselves to navigate the threats of tomorrow
- Identifying the quick wins and making the most of the finite time new CISOs have to get their message across
- Practical measures for reducing stress, burnout and frustration within InfoSec teams over the longer term
This episode is hosted by Thom Langford
https://www.linkedin.com/in/thomlangford/
Paul Watts, Distinguished Analyst, Information Security Forum (ISF)
https://www.linkedin.com/in/paulewatts/
Dr Andrea Cullen, Co Founder/Co CEO, CAPSLOCK
https://www.linkedin.com/in/dr-andrea-cullen/
268集单集
Manage episode 429504451 series 2318447
内容由TEISS提供。所有播客内容(包括剧集、图形和播客描述)均由 TEISS 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal。
- How the next generation of InfoSec leaders can better prepare themselves to navigate the threats of tomorrow
- Identifying the quick wins and making the most of the finite time new CISOs have to get their message across
- Practical measures for reducing stress, burnout and frustration within InfoSec teams over the longer term
This episode is hosted by Thom Langford
https://www.linkedin.com/in/thomlangford/
Paul Watts, Distinguished Analyst, Information Security Forum (ISF)
https://www.linkedin.com/in/paulewatts/
Dr Andrea Cullen, Co Founder/Co CEO, CAPSLOCK
https://www.linkedin.com/in/dr-andrea-cullen/
268集单集
所有剧集
×t
teissPodcast - Cracking Cyber Security

How cyber-crime continues to evolve and what this means for enterprise threat intelligence strategies Evaluating sources and deciding which characteristics are most relevant How DNS-based threat intelligence versus a malware-centric approach disrupts industrialised cyber-crime This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Todd Wade, Chief Information Security Officer https://www.linkedin.com/in/twade/ Matt Hardy, Senior Information Security Executive https://www.linkedin.com/in/matthardy67/ Craig Sanderson, Principal Cybersecurity Strategist, Infoblox https://www.linkedin.com/in/craigsanderson1…
t
teissPodcast - Cracking Cyber Security

Automating SecOps processes and procedures - free your people, improve retention and increase productivity Where creativity and diversity is keeping your SecOps one step ahead of the attackers Matching your effectiveness to organisational objectives - aligning your internal SOC metrics with those required by the board This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Prince Adu, Board Member - ISACA Accra Chapter, ISACA https://www.linkedin.com/in/prince-adu-ccsp-cisa-crisc-3759a520/ Garrett Smiley, Chief of Staff to CDIO / Vice President of Digital Infrastructure and Technology Strategy, Maximus https://www.linkedin.com/in/garrettsmiley/ Matt Muller, Field CISO, Tines https://www.linkedin.com/in/matthewrmuller/…
t
teissPodcast - Cracking Cyber Security

How evolving methods of work are expanding the attack surface Growth of supply chain attacks targeting devices touching sensitive data Increased nation-state targeting of Critical National Infrastructure This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Richard Absalom, Principal Research Analyst, Information Security Forum (ISF) https://uk.linkedin.com/in/richard-absalom-48879116 Tom O’Driscoll, Head of Security Strategy and Intelligence, National Highways https://www.linkedin.com/in/odte/ Michael Covington, Vice President, Portfolio Strategy, Jamf https://www.linkedin.com/in/michaelcovington/…
t
teissPodcast - Cracking Cyber Security

Diverse threat vectors and complex attacks - how to expand your detection and response programmes Helping your SOC analysts achieve more - finding the right combination of internal ML/AI tools and external providers Pathways to accelerate your SOC development to detect and mitigate attacks earlier This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Mike Johnson, Global Cyber Threat & Incident Response Manager, Verifone https://www.linkedin.com/in/mike---johnson/ Alan Jenkins, CISO Team lead, Saepio https://www.linkedin.com/in/alanjenkins/ Josh Davies, Principal Technical Manager, Fortra https://www.linkedin.com/in/jdgwilym/…
t
teissPodcast - Cracking Cyber Security

Identifying which data assets to prioritise Building an enterprise-level cyber-security profile on a budget Strengthening your cyber-resilience with incident response playbooks This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Steven Furnell, Professor of Cyber Security, University of Nottingham https://www.linkedin.com/in/stevenfurnell/ Jean Carlos, VP of Information Security, AutogenAI https://www.linkedin.com/in/jeanpc/ Stephanie Lynch-Ozanar, Education and Awareness Specialist, Co-Op https://www.linkedin.com/in/stephlynchozanar Kev Eley, VP of UKI, Exabeam https://www.linkedin.com/in/keveley/…
t
teissPodcast - Cracking Cyber Security

Minimising the risks to your security posture from developers’ reliance on GenAI Using AI to speed up remediation and avoid security becoming the bottleneck Steps to ensure safe and secure implementation of GenAI in software development This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Lee Munson, Principal Research Analyst, Information Security Forum https://www.linkedin.com/in/lmunson/ Zia Ush Shamszaman, Senior Lecturer , Computer Science, Teesside University https://www.linkedin.com/in/zia-ush-shamszaman John Smith, EMEA CTO, Veracode https://www.linkedin.com/in/jtsmith123…
t
teissPodcast - Cracking Cyber Security

Why the traditional malware-centric approach to security doesn’t enable proactive protection Pre-empting and protecting attacks before they are launched - looking at the threat actors attack infrastructure Emergent domains, what are they and why they need a layered detection This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ John Rouffas, Cyber Security Executive, Author & Journalist, CyberEdBoard Community https://www.linkedin.com/in/drjohnrouffas/ Francis Annandale, Managing Consultant, CyXcel https://www.linkedin.com/in/francis-annandale-98222186/ Craig Sanderson, Principal Cybersecurity Strategist, Infoblox https://www.linkedin.com/in/craigsanderson1/…
t
teissPodcast - Cracking Cyber Security

Where does Zero Trust fall short, and why these failings encourage cyber-crime Expanding Zero Trust to protect the data itself Identifying, classifying, and securing sensitive data through automation This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Jean Carlos, VP Cyber Security, BOXT https://www.linkedin.com/in/jeanpc/ Sasha Henry, Senior Managing Consultant, Cyxcel https://www.linkedin.com/in/alexandra-pavelovna-henry-32b98465/?originalSubdomain=uk Karim Eldefrawy, CTO and Cofounder, Confidencial https://www.linkedin.com/in/karim-eldefrawy-b706b53/…
t
teissPodcast - Cracking Cyber Security

Leveraging behavioural AI to mitigate the risk of phishing attacks Fortifying your defenses against the next wave of phishing threats Practical strategies for empowering colleagues while strengthening your cyber resilience This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Rebecca Stephenson, Specialist Lead Lecturer in Digital Pedagogy, Government of Jersey https://www.linkedin.com/in/creative-minds-in-cyber/ Ben Wynn-Jones, Information Awareness Lead, Canon EMEA https://www.linkedin.com/in/ben-wynn-jones/…
t
teissPodcast - Cracking Cyber Security

Meeting your operational and legal obligations - getting your foundations in order Cyber-proofing your organisation with comprehensive cyber-security training and awareness Developing cyber-hygiene to defend against cyber-criminals using emerging technology This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Paul Holland, Head of Research, Information Security Forum (ISF) https://www.linkedin.com/in/paulinfosec/ Penny Jackson, Director Strategy, Awareness & Engagement (Human Risk Management), Aristos Partnership https://www.linkedin.com/in/pennykjackson/…
t
teissPodcast - Cracking Cyber Security

A proactive approach to third-party risk - continuous monitoring of suppliers Using threat intelligence to identify third-party risk Effectively working with partners to mitigate third-party security risks This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Chuck Brooks, Adjunct Professor, Georgetown University https://www.linkedin.com/in/chuckbrooks/ Victoria van Roosmalen, CISO & CPO, Coosto https://www.linkedin.com/in/victoriavanroosmalen/ Stuart Frost, Head of Enterprise Security & RIsk Management, Department for Work & Pensions https://www.linkedin.com/in/stuart-frost-bem/ Andy Grayland, CISO, Silobreaker https://www.linkedin.com/in/dr-andy-g-1b90b4150/…
t
teissPodcast - Cracking Cyber Security

How the next generation of InfoSec leaders can better prepare themselves to navigate the threats of tomorrow Identifying the quick wins and making the most of the finite time new CISOs have to get their message across Practical measures for reducing stress, burnout and frustration within InfoSec teams over the longer term This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Paul Watts, Distinguished Analyst, Information Security Forum (ISF) https://www.linkedin.com/in/paulewatts/ Dr Andrea Cullen, Co Founder/Co CEO, CAPSLOCK https://www.linkedin.com/in/dr-andrea-cullen/…
t
teissPodcast - Cracking Cyber Security

Gaining comprehensive visibility across your hybrid and multi-cloud environments Mitigating hidden threats and vulnerabilities beyond your endpoints and network parameters Maximising your cyber security investments with better visibility and optimised tool performance This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Dr Edewede Oriwoh, Group IT Information and Cyber Security Manager, Zigup Plc https://www.linkedin.com/in/edewedeoriwoh/ Lessie Skiba, Global Director of Outreach and Partner Engagement, Cyber Readiness Institute https://www.linkedin.com/in/lessie-skiba-2b7460bb/ Mark Jow, EMEA Tech Lead & Evangelist, Gigamon https://www.linkedin.com/in/mark-jow-4766797…
t
teissPodcast - Cracking Cyber Security

Threat trends - how threat actors are targeting C-Suite executives to access the enterprise Empowering your C-Suite to identify and avoid social engineering Creating social media policies that your C-Suite understand so that they can lead by example This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Thomas Wendrich, Associate Partner, IBM https://www.linkedin.com/in/thomas-wendrich-5470672 Jacqueline Hanson-Kotei, Senior Manager, Enterprise Information Security & Governance, MTN Ghana https://www.linkedin.com/in/jacqueihk/ Torsten Wiedemeyer, VP Europe, Cyble https://www.linkedin.com/in/wiedemeyer…
t
teissPodcast - Cracking Cyber Security

Protecting your endpoints - how do cybercriminals exfiltrate data, and what trends are we seeing? Mitigating the financial, legal, and reputational risks with a comprehensive data strategy Leveraging next-generation technology to rapidly detect and respond to data exfiltrating ransomware attacks This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Neil Hare-Brown, CEO, STORM Guidance https://www.linkedin.com/in/neilhb Prince Adu, Board Member - ISACA Accra Chapter, ISACA https://www.linkedin.com/in/prince-adu-ccsp-cisa-crisc-3759a520/ Darren Williams, CEO, BlackFog https://www.linkedin.com/in/darrenwwilliams/…
欢迎使用Player FM
Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。