Our teissVideo library features one-to-one interviews with key speakers from our summits, and in-depth Information Security Leaders’ Roundtable discussions. Please log in or register as a teissMember to listen to any of these.

Insider threat What is the best way to investigate the insider threat?

Is there a right way to deal with an insider threat investigation? Thom Langford, Founder, TL(2) Security, Christian Toon, CISO, …

Insider threat The art of the modern con: How to build a victim’s trust

What to do when senior employees go rogue? Thom Langford, Founder, TL(2) Security and Christian Toon, CISO, Pinsent Masons, discuss …

Cyber warfare Are we at war? And, with whom?

Are we in an international cyber war? At what point does cyber warfare become actual warfare? Watch this Security Leaders' …

Cyber attack What makes the targeted MSSP attack so effective?

Is the targeted MSSP attack a fine piece of art? What makes it so effective? Watch this Security Leaders' Roundtable …

Cyber skills What cyber skills gap?

There's a cyber security skills gap...or is there? What's the real issue here? Watch this Security Leaders' Roundtable where Nic …

Nation states Nation state attacks – are you worried?

How much of a threat are nation state cyber attacks? Should we be worried? Watch this Security Leaders' Roundtable where …

Education Is the end-user smart enough to make security decisions?

Is the end-user security savvy enough to make their own decisions? Should security choices be left to the end-user? At …

Mobile security Security Leaders discuss the Whatsapp Pegasus breach

Should we really worry if Whatsapp is breached? Watch this Security Leaders' Roundtable where Quentyn Taylor, Director of Information Security …

Education Should cyber security begin at school? And from what age?

How adequate is the public's cyber security awareness? How early in life should security education begin? Whose responsibility is it …

Mental health What’s the impact of a breach on your staff?

News headlines tend to focus on how a breach impacts a company's market value or reputation...but what about the internal …

Cyber security Are you using DMARC? If not, why not?

Why aren’t more companies using DMARC? Watch this Security Leaders' Roundtable where Quentyn Taylor, Director of Information Security at Canon …

Malware Why NotPetya was a really good piece of malware

What made NotPetya a really good piece of malware? Watch this Security Leaders' Roundtable where Quentyn Taylor, Director of Information …