Our teissVideo library features one-to-one interviews with key speakers from our summits, and in-depth Information Security Leaders’ Roundtable discussions. Please log in or register as a teissMember to listen to any of these.

Mental health Resiliency? It starts with self-care and here’s how to do it

Filmed at teissLondon2020, Marilise de Villiers, Founder & CEO, MDVB Consulting offers tips for personal resiliency, and it all starts …

Training Can cognitive biases be good for security?

"It's not about demonising our capabilities, it's about recognising them," says Bridget Kenyon, DIS EMEA CISO and Information Security Programmes, …

Behaviour How do you overcome inbuilt biases in the workplace?

"Doing good cyber security is the cost of doing business today," says Dave Chaterjee, Associate Professor, The University of Georgia. …

Data protection Top tip from the ICO: How to best protect your customers’ data

Stephen Eckersley, Director of Investigations, ICO, shares his top tip to companies to protect their and their customers’ data. Here …

Biometrics Why is the debate on biometrics and surveillance important now?

What's so dangerous about biometrics' collecting and surveillance? Stephanie Hare, Author of Technology Ethics, suggests that George Orwell's vision of …

Communication How to overcome CISO communication issues and cyber security excuses

Communication, communication, communication! They say every security professional needs strong communications skills these days - whether it's receiving the budget …

GDPR What are the main ICO learnings from GDPR?

In this video, Stephen Eckersley, Director of Investigations, ICO, outlines what the ICO has learnt since the implementation of GDPR. …

Leadership How to define a high-performance security culture

Interviewed at teissLondon2020, Dave Chaterjee, Associate Professor, The University of Georgia, outlines which key characteristics define a high-performance security culture. …

Culture Turning fear on its head and embracing a positive security culture

Can the cyber security industry work without “fear”? The industry is known for using "fear" as a tactic to sell …

Third party risk Approaching supply chain risk from alternative angles

Quentyn Taylor, Director Information Security, Canon EMEA, shares his preferred approach to identifying risk in the supply chain in this …

Third party risk How to handle the supply chain risk

Filmed at teissLondon2020, Mike Seeney, Head of Supply Chain Information Risk, Pinsent Masons, shares his top tips for dealing with …

BYOD How can you manage the risks involved with BYODs?

In a globalised, inter-connected world, how do security leaders monitor BYODs (Bring your own device)? In this video Thom Langford, …