Behaviour How do you overcome inbuilt biases in the workplace?

"Doing good cyber security is the cost of doing business today," says Dave Chaterjee, Associate Professor, The University of Georgia. …

Data protection Top tip from the ICO: How to best protect your customers’ data

Stephen Eckersley, Director of Investigations, ICO, shares his top tip to companies to protect their and their customers’ data. Here …

Biometrics Why is the debate on biometrics and surveillance important now?

What's so dangerous about biometrics' collecting and surveillance? Stephanie Hare, Author of Technology Ethics, suggests that George Orwell's vision of …

Podcast Contact tracing apps – can a loss of privacy ever be temporary?

On this week’s teissPodcast we discuss “contact tracing apps” - the smartphone software which - according to the health secretary, …

Communication How to overcome CISO communication issues and cyber security excuses

Communication, communication, communication! They say every security professional needs strong communications skills these days - whether it's receiving the budget …

Security awareness Beyond Security Awareness Training: Why the current approach needs to change fast

It might be tempting to label people as "lazy", "stubborn" or even "stupid". They reuse passwords across multiple sites. They’ve …

GDPR What are the main ICO learnings from GDPR?

In this video, Stephen Eckersley, Director of Investigations, ICO, outlines what the ICO has learnt since the implementation of GDPR. …

Breach Could the majority of breaches be “completely preventable” for little money?

What was at the heart of the BA, Marriott, Equifax, Capital One and Travelex breaches? Basic error, says Greg Van …

Podcast Could the majority of breaches be preventable for little money?

This week on the teissPodcast, Greg Van Der Gaast, Head of Information, University of Salford, highlights why CISOs often fail …

Leadership How to define a high-performance security culture

Interviewed at teissLondon2020, Dave Chaterjee, Associate Professor, The University of Georgia, outlines which key characteristics define a high-performance security culture. …

Culture Turning fear on its head and embracing a positive security culture

Can the cyber security industry work without “fear”? The industry is known for using "fear" as a tactic to sell …

Third party risk Advice on managing third party risk during COVID-19

The supply chain is never too far down on the agenda of potential security threats...and even more so during the …