Our teissVideo library features one-to-one interviews with key speakers from our summits, and in-depth Information Security Leaders’ Roundtable discussions. Please log in or register as a teissMember to listen to any of these.

Security awareness Security Awareness – How do people receive and respond to rules

"People need a number of things over and above the rule to change their behaviour." Sarah Janes, Specialist in Culture …

GDPR Post-Brexit: What are the challenges for the ICO?

What are the challenges for the ICO in the coming year, post-Brexit? How will ongoing investigations with EU countries be …

Cyber skills COVID-19 – How will the pandemic affect the cyber recruitment industry

"A client of ours has asked to only see candidates with their own laptops".  Ian Donnelly, Principal Consultant (Cyber Security) at …

Communication How can attackers and defenders learn from and communicate with each other

"When you're doing threat modelling, invite the Red Team in and see how they can contribute".  Sebastian Avarvarei, Director - …

Breach How long is too long to respond to a breach?

A week? A day? An hour?! Watch Dave Chatterjee, Associate Professor, The University of Georgia, for his take on how …

Insider threat COVID-19 – What are the cyber security challenges now

Jay Moloo, Corporate Information Security Officer at DB Schenker, talks to Anna Delaney about the threats and risks of colleagues …

Cyber skills The Cyber ​​Skills Gap – a lack of talent or bad recruitment methods

"The supply is not obviously meeting the demand.  We have to look at alternative measures."  Anna Delaney interviews Ian Donnelly, …

Insider threat Tackling the insider threat and understanding the risk

Speaking at teissLondon2020, David Boda, CISO, Camelot (National Lottery), explains why understanding the insider threat is so important. In the …

Cyber security How does The Infosec Color Wheel fit within the DevOps paradigm

"Security is viewed more and more not as an additional skill, but as part of the normal skill set that …

Resilience COVID-19 – Cyberpsychologist Dr Mary Aiken on what we can learn from cybercriminals now

"I'd never advocate that companies should model themselves on criminal activity what they should learn is how quickly cyber criminals …

Training What is behavioural economics and how can it derail security training?

Speaking at teissLondon2020, Bridget Kenyon, DIS EMEA CISO and Information Security Programmes, Thales, defines behavioural economics and how it applies …

Phishing COVID-19 – What are the phishing scams to watch out for

"They include embedded Captcha - they are bypassing all the security controls".  Jay Moloo, Corporate Information Security Officer at DB …