Security Insights

Security Insights

Putting security in focus

  • Home
  • About Security Insights
  • Guest bookings
  • Contacts

CISO

Image of code
podcast

Balancing risk and security: Rich Seiersen

June 19, 2025 admin

Effective cybersecurity is no longer about stopping every attack. That is simply no longer possible. But moving from prevention to accepting that attacks will happen means thinking much more about business risk. That is not […]

podcast

Beyond the Titanic: Cybersecurity in Northern Ireland

May 8, 2025 admin

Northern Ireland has moved on dramatically since the Good Friday agreement. And its prosperity has been boosted by significant inward investment, much of it in financial services. But its technology and cybersecurity industry is growing […]

podcast

CISO Interview: Mandy Andress, Elastic

April 24, 2025 admin

How does a CISO stay ahead of rapidly changing threats? And what do you do, if cyber attacks are more frequent, happen more quickly, and cause more harm? Can we cope when an attacker can […]

podcast

Insights interview: Dr Claudia Natanson, UK Cyber Security Council

April 10, 2025 admin

Our guest for this episode is Dr Claudia Natanson, CEO at the UK Cyber Security Council. The Council is funded by the Government’s Department for Science, Innovation and Technology and acts as an umbrella body […]

podcast

Insights Interview: Trust and security, with James Bore

March 27, 2025 admin

Our guest for this Insights Interview episode is James Bore. James is a very well-known industry figure and speaker across the cybersecurity industry. Day to day, he runs the family consultancy firm Bores. But he […]

Person in office walking away from camera
podcast

Why CISOs quit: cyber’s leadership crisis

March 13, 2025 admin

As many as one in four senior cybersecurity leaders plans to leave the profession, according to an industry survey. And as many as half are considering their positions. The causes include growing responsibilities, increasingly severe […]

podcast

Applying pressure: stress testing cyber defences

February 27, 2025 admin

Testing is an essential part of any technology deployment. And cybersecurity is no exception. Testing, exercises and drills are all part of day to day security operations, or at least they should be. But should […]

podcast

CISO Interview: Jack Mersey, Westbury Street Holdings

January 9, 2025 admin

How do you persuade baristas and chefs that cybersecurity matters? And how do you do this in a highly distributed business with 26,000 people at over 1000 sites in the UK alone? One that operates […]

podcast

AI’s risks and rewards: Jon France, CISO, ISC2

December 5, 2024 admin

AI brings both risks and challenges to cybersecurity. Bad actors can use AI tools for target reconnaissance, to make phishing attacks more believable and potentially, to find vulnerabilities in the wild. But there are also […]

podcast

A CISO’s journey: Mani Nagothu

June 6, 2024 admin

Constant change and the need to adapt is always a feature of cybersecurity. It is certainly a feature of the day to day role of the CISO. And that’s why our guest this week lists […]

Posts pagination

1 2 »

Recent Posts

  • Non-human identities: the rise of the machines
  • Balancing risk and security: Rich Seiersen
  • Cyber Security Foundations: security by the book
  • Cybersecurity Skills: Veterans in cyber
  • Verizon’s DBIR: tracking security threats

Archives

  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • May 2019

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Subscribe to Podcast

Androidby EmailRSS
  • Privacy policy
  • Cookie policy (UK)

Copyright © 2025 | MH Magazine WordPress Theme by MH Themes

Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}