AI is transforming industries—but at what cost to privacy? This clip explores how companies use personal and medical data and why transparency is crucial. Do we still have control over our information?
The real work begins AFTER the incident is resolved. Learn why compliance standards like ISO & PCI-DSS require thorough post-mortems, action plans, and reporting to strengthen security posture.
Fixing an incident isn’t enough—you need to understand WHY it happened. Learn how the 5 Whys technique helps cybersecurity teams drill down into root causes and prevent repeat failures.
Communication is key during a security incident. From board reports to external disclosures, having a structured comms plan can prevent reputational damage. Learn why pre-written templates and clear internal messaging are vital.
What happens when a security breach involves someone you trust? In cybersecurity, investigating a co-worker or even a friend can be a harsh reality. Discover how to stay objective, remove emotion, and focus on the facts when handling insider threats.
Incident response is non-negotiable in cybersecurity. No matter how many countermeasures you have, breaches will happen. Learn why every security professional must master incident response protocols to mitigate damage effectively.
Our latest episode brings in security expert Iain Pye, who shares military tales with me, your host James Rees, about what really happens when everything goes wrong. We get stuck into the nitty-gritty of incident response - the sleepless nights, the pressure from executives, and how to keep your team going when they're running on fumes.
Are CISOs too competitive for their own good? Security leaders face the same threats, yet many work in silos. This clip explores why collaboration is key to reducing risk and protecting businesses.
CISOs are now personally liable for security failures. How can they protect themselves from legal action and reputational damage? Learn the key risk management strategies every CISO needs to reduce exposure.
Hackers are influencing politics more than ever—from cyber espionage to nation-state attacks. This clip explores the intersection of cyber warfare, geopolitics, and emerging security threats.