Our teissVideo library features one-to-one interviews with key speakers from our summits, and in-depth Information Security Leaders’ Roundtable discussions. Please log in or register as a teissMember to listen to any of these.

Resilience What does the board need to know?

When it comes to preparing for a cyber-attack, what does the board need to know? Andy Watkin-Child, Chartered Security Professional, …

Leadership “Be clear about what it is you’re trying to achieve and then deliver it...

How do you define the role of a CISO? Can anyone be a CISO? Do all companies need the same …

Women in technology Video interview with Yubico Founder, Stina Ehrensvärd

Authentication is at the heart of cyber security: it is crucial to securing a network. And yet, single-factor authentication is …

Hacking How can we make a hacker’s job more difficult?

Eco & Biohacker, Kevin McPeake, reveals the key to making a hacker’s job more difficult. He also warns not to …

Hacking What do hackers drink?

Have you ever wondered what hackers drink? How do they stay awake at 3am, creating and cracking code, while the …

Hacking Why we all need to hug a hacker

Edwin van Andel, Hacker and CEO at Zerocopter, says it’s wrong to judge and label all hackers as criminals, and …

Hacking What’s Edwin Van Andel’s most memorable hack?

Edwin van Andel, Hacker and CEO at Zerocopter, discusses lawyers, floppy disks and Microsoft in this video where he recalls …

Cyber security Is Big Tech too powerful?

Uri Rosenthal, Commissioner, Global Commissioner on the Stability of Cyberspace, says that competition must be able to grow and thrive …

Cyber warfare How stable is cyber space right now?

Are we in troubled waters? Uri Rosenthal, Commissioner, Global Commissioner on the Stability of Cyberspace, describes the current state of …

Hacking A hacker’s advice for introverts working in InfoSec

Eco & Biohacker, Kevin McPeake, offers some useful advice for introverts working in the security industry. He reveals it’s all …

Leadership Paving the way for younger leaders in information security

Tom Linckens, Former Executive Vice President and Chief Information Officer, Bertelsmann, explains how information sharing between the public and private …

Women in technology “Some of the best security management I’ve worked for have been women”

With companies now championing and encouraging diversity into the workplace, Kevin McPeake, Cybersecurity Culture and Ethics Specialist, Peak security, shares …