Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by ...
…
continue reading
1
EPISODE 53: Whose Responsibility Is It To Protect The Data? The Data Team Or The Cybersecurity Team?
43:46
43:46
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
43:46
The data landscape is changing faster than ever, and with it, the security threats - so whose responsibility is it to make sure your data is safe? Is it the data team? Or is it the cyber team? We tackle this question and more with Head of Data at AND Digital, Tim Hatton. From leveraging AI to secure data to the importance of real user testing, to h…
…
continue reading
1
EPISODE 52: People Don’t Follow Companies, They Follow People: How To Build Your Personal Brand On LinkedIN
49:30
49:30
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
49:30
LinkedIn is very divisive! Some people love it, and others hate it and everything it stands for. And if you’ve ever hangout on the subreddit, LinkedIn lunatics, then you can see why. Now for all the braggarts and the ‘what working during my wedding taught me about b2b sales’ posts, there is a lot to like about LinkedIn and many opportunities to be …
…
continue reading
1
EPISODE 51: Cha, Cha, Cha, Changes! How to get excited about organisational change (re-release)
43:38
43:38
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
43:38
No new episode this week because we’re are both speaking at the AI for the Rest of Us conference this week. So instead we’ve hit up the vaults for the wonderful Paula Cizek, Chief Research Officer at Nobl. She guides leaders and teams through the change management process, from assessing the organization’s readiness for change to implementing initi…
…
continue reading
1
EPISODE 50: Tips On How To Be A Top-Class Cybersecurity Student And Get Your First Cybersecurity Job!
42:24
42:24
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
42:24
Dreaming of a career in Cybersecurity? Currently a Student and wondering how to succeed? In this episode, we are joined by Dr. Thalita Vergilio. Thalita is a passionate technologist and cybersecurity expert dedicated to demystifying complex concepts. This episode is for those dreaming of a thrilling career in cybersecurity as Thalita gives her road…
…
continue reading
1
EPISODE 49: Are Our Cybersecurity Controls Inclusive? Going Beyond Hiring When It Comes To Diversity In Cybersecurity
47:40
47:40
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
47:40
This episode we are joined by Marcy Charollois. Marcy is a socialtech writer, content strategist, and the founder of Merci Marcy and The Safe Place. Her mission is to enable teams to embody a culture of genuine inclusion beyond superficial measures. This week we explore the complex, important, and under-discussed topic of diversity, equity and incl…
…
continue reading
1
EPISODE 48: It’s So Hard To Commit A Crime These Days! Surveillance, Dishonesty, Fraud And Other Pink-Collar Flags
54:15
54:15
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
54:15
In this Episode we are joined by Kelly Paxton. Kelly Paxton has more than 20 years of investigative experience. Kelly is a Certified Fraud Examiner, author, and podcast host-founder of Fraudish. This week’s episode asks why it is so hard to commit a crime these days! But when people do, what is their motivation behind it! We also look at the nature…
…
continue reading
1
EPISODE 47: Hacking Our Capacity To Think: The Philosophy Of Trust, Cybersecurity And AI
50:20
50:20
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
50:20
In this Episode we are joined by Dr. Rebekka Reinhard. Dr Reinhard is a philosopher and the founder and editor-in-chief of Human magazine, which aims to holistically address the impact of AI beyond the technical to include the cultural and the human. In this episode, Hacking Our Capacity to Think - The Philosophy of Trust, Cybersecurity and AI, we …
…
continue reading
1
EPISODE 46: Sometimes, We Are The Villains: Tech Ethics In Software Development
51:11
51:11
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
51:11
In this Episode we are joined by Sergès Goma, a Paris-based software developer specialising in JavaScript. In this episode, Sometimes, we are the Villains - Tech ethics in software development, we dive deep into the ethical dilemmas we face as workers and creators of technology. Heroes are few and far between in this tech landscape, even if we don’…
…
continue reading
1
EPISODE 45: Can Cybersecurity Teams Actually Do Scrum?
49:40
49:40
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
49:40
This episode we are joined by the awesome Steve Trapps. Steve is the co-owner of Scrum Facilitators, an experienced Scrum Master, and a Professional Scrum Trainer with 20 years plus of experience in delivering complex products in many different business sectors. This week we answer that age old question, Can Cybersecurity Teams Actually Do Scrum? T…
…
continue reading
1
EPISODE 44: Embracing Failure in Cybersecurity by Learning Through Trial and Error
53:16
53:16
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
53:16
This episode we are joined by the brilliant Stefan Gaillard, the co-founder and current chair of the Journal of Trial & Error, a journal dedicated to highlighting the importance of trial and error in scientific practice and scholarship. Trial and error is part of the scientific method but most of us are risk averse because we are so afraid of failu…
…
continue reading
1
EPISODE 43: Not Everybody Does It Like US…So Hire Anthropologists in Cybersecurity!
51:55
51:55
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
51:55
This episode we are joined by the wonderful Jamie Sherman, a cultural anthropologist and principal UX researcher at ESRI. We explore how words like ‘security and privacy’ are slippery and that can lead to a lot of confusion and misunderstanding. How to ask better questions to really understand how to protect the people and our customers in an organ…
…
continue reading
1
EPISODE 42: Mind Science - Cyber Psychology 101
1:03:05
1:03:05
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
1:03:05
This Episode we’re heading back into the vaults to bring you the unabridged version of our fantastic and extremely popular interview with Bec McKeown, a chartered psychologist with extensive experience in carrying out applied research for organisations including the UK Ministry of Defence and the founder and director of Mind Science, an independent…
…
continue reading
1
EPISODE 41: Empathy Over Ego: Why We're Angry At The Wrong People In Cybersecurity - The Cyber Empathy Podcast
59:38
59:38
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
59:38
We’re still on a summer break but in the meantime we are delighted to share with you an episode from friend of the show, Cyber Empathy which Lianne appeared on earlier this year. In this episode Lianne discussed how she hates the term ‘weakest link’ when talking about our colleagues, how the language that we use in cybersecurity can be incredibly h…
…
continue reading
1
EPISODE 40: How Do You Protect Your ASS-ets? An Interview On AppSec With The Modern.Net Show
1:12:34
1:12:34
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
1:12:34
We’re still on a summer break but in the meantime we are delighted to share with you an episode from friend of the show, The Modern.Net Show in which Jeff and Lianne we’re interviewed on. In this discussion we talked about how you protect your ass-ets, your SDLC, and how to overall improve cybersecurity practices within your organisation. Jamie is …
…
continue reading
1
EPISODE 39: Throwback Thursday! I’m Only H.U.M.A.N(S): Hacking the Human OS to Master Cybersecurity Compliance
1:06:00
1:06:00
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
1:06:00
Welcome to Compromising Positions! The award-winning tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats! This Episode we’re heading back into the vaults to bring you the unabridged version of …
…
continue reading
1
EPISODE 38: HACK THE PLANET! THE BEST AND WORST HACKER MOVIES REVIEWED!
35:36
35:36
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
35:36
This Episode we are joined by Simon Painter a senior software engineer with nearly 20 years of experience in the industry and author of the book Functional Programming with C#. In this episode, Hack The Planet! The Best And Worst Hacker Movies Reviewed! Our regular programming has been hijacked to bring you a discussion on the best, and worst, hack…
…
continue reading
1
EPISODE 37: There Is No Perfect Cybersecurity, But You Could At Least Put a Padlock On It!
32:09
32:09
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
32:09
Welcome to Compromising Positions! The award-winning tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats! This Episode we are joined by Simon Painter a senior software engineer with nearly 20 y…
…
continue reading
1
EPISODE 36: When Perception is Everything: Is it Time to Ditch the name "Cybersecurity"?
34:05
34:05
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
34:05
This Episode we are joined by Martina Mitz, a UX Psychologist, Strategist and Designer. In this episode, When Perception is Everything: Is it Time to Ditch the name "Cybersecurity"?, we explore how people feel when they see the title ‘cybersecurity’ and ask the question: is the term ‘cybersecurity’ it actually putting people off engaging with us! W…
…
continue reading
1
EPISODE 35: Can Cybersecurity Teams Flex Their Creativity To Keep Us All Safe?
33:11
33:11
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
33:11
This Episode we are joined by Martina Mitz, a UX Psychologist, Strategist and Designer. In this episode “Can Cybersecurity Teams Flex Their Creativity To Keep Us All Safe?”, we’re going to talk about the natural intersection between psychology, UX and Cybersecurity, and the importance of understanding human behaviour to create user-centric digital …
…
continue reading
1
EPISODE 34: IS YOUR RISK MANAGEMENT TOAST?
46:09
46:09
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
46:09
This Episode we are joined by Michael Walford-Williams, a consultant specialising in operational resilience and third-party risk management. His consultancy Westbourne Consultancy Limited sees him working for various clients providing risk management services for the financial service industry. In this episode, we look at how risk appetite evolves …
…
continue reading
1
EPISODE 33: Inconvenient Truths: Why Technology Won’t Create The Perfect Customer Experience In Cybersecurity
31:49
31:49
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
31:49
This Episode we are joined by John Sills, managing partner at customer-led growth company, The Foundation and author of the book ‘The Human Experience’ John joined us last week and shared with us fantastic tales of his time working for a major bank and how the IT team decided to rollout a new cybersecurity control without talking to the customers i…
…
continue reading
1
EPISODE 32: Cybersecurity and The Human Experience: Designing for humans, not robots with John Sills
27:31
27:31
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
27:31
Welcome to Compromising Positions! The award-winning tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats! This Episode we are joined by John Sills, managing partner at customer-led growth compa…
…
continue reading
1
EPISODE 31: Can Cybersecurity Overcome its PR Problem? Building Your Brand and Social Capital with Sarah Evans, PR and Marketing Specialist
41:38
41:38
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
41:38
Welcome to Compromising Positions! The tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats! For the longest time podcast host, Lianne Potter has been saying: “Cybersecurity has a PR problem!” S…
…
continue reading
1
EPISODE 30: SAY GOODBYE TO ‘GIT BLAME’: BUILDING COLLABORATIVE AND SECURE SOFTWARE DEVELOPMENT LIFECYCLES
36:46
36:46
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
36:46
This week we are joined by James Charlesworth, a seasoned Director of Engineering at Pendo with 15 years of experience in software engineering. James is also the creator of the Train to Code YouTube channel, where he shares a wealth of excellent training videos on software development. In this episode, Say Goodbye to ‘Git Blame’: Building Collabora…
…
continue reading
1
EPISODE 29: “THE DILEMMA GAME”:UNLEASHING THE POWER OF ETHICS AND GOOD CYBERSECURITY THROUGH PLAY
23:23
23:23
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
23:23
We are joined again by Dr Bettina Palazzo a business ethics expert! She works with compliance managers to create a culture of integrity that focuses on the leadership and behavioural dimensions of compliance. In this episode, “The Dilemma Game”: Unleashing The Power of Ethics and Good Cybersecurity Through Play”, we delve into the complexities of p…
…
continue reading
1
EPISODE 28: RULES WITHOUT RELATIONSHIPS CREATE REBELLION: WHY ETHICS MATTER IN CYBERSECURITY
28:44
28:44
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
28:44
Welcome back to season 3! To kick things off we are joined by Dr Bettina Palazzo a business ethics expert! She works with compliance managers to create a culture of integrity that focuses on the leadership and behavioural dimensions of compliance. She states that unethical organisations make people unhappy - and we couldn’t agree more. So she has d…
…
continue reading
1
EPISODE 27: Ignore all previous instructions: Threat modelling AI Systems
37:09
37:09
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
37:09
Welcome to the grand finale of season two of ‘Compromising Positions’, where we delve into the fascinating world of AI security. In this special episode, your hosts will guide you through the labyrinth of securing AI models, one step at a time. For those who prefer a quick overview, we offer an abridged version on Apple Podcasts and Spotify. This v…
…
continue reading
1
EPISODE 26: It’s A Wonderful Hack! Building A High Performance Security Team
27:15
27:15
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
27:15
This week we are joined by Dr David Burkus, one of the world’s leading business thinkers and best-selling author of five books on the topic of business and leadership. Dr Burkus has worked with the leadership teams of some internationally known names such as PepsiCo, Adobe and NASA. In this episode, “It’s a Wonderful Hack! Building a high-performan…
…
continue reading
1
EPISODE 25: SUPERCONNECTORS: UNLEASHING PURPOSE BEYOND METRICS IN YOUR CYBERSECURITY FUNCTION
28:50
28:50
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
28:50
This week we are joined by Dr David Burkus, one of the world’s leading business thinkers and best-selling author of five books on the topic of business and leadership. Dr Burkus has worked with the leadership teams of some internationally known names such as PepsiCo, Adobe and NASA. In this episode, “Storytelling Superconnectors: Unleashing Purpose…
…
continue reading
1
EPISODE 24: DATA, DATA EVERYWHERE, BUT HOW DO WE MAKE IT SAFE TO SHARE? EXPLORING THE RELATIONSHIP BETWEEN DATA, CYBERSECURITY AND OUR DESIRE FOR CONVENIENCE
35:42
35:42
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
35:42
This week we are joined by Jenn Calland, a seasoned Data Analyst, Analytics Engineer, former Platform Engineer and Full Stack Developer with expertise spanning Google Cloud, Looker, BigQuery, and many other technologies. In this episode, Data, Data Everywhere, But How Do We Make It Safe to Share? We are going explore the relationship between data, …
…
continue reading
1
EPISODE 23: Awareness ≠ Behavioural Change - Rethinking Cybersecurity Training
34:44
34:44
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
34:44
Last episode we ended by talking with Bec about how cybercriminals leverage the fight-or-flight response and get you to do things you wouldn’t normally do, like share bank details, through amygdala hijacking. Bec concluded the episode by giving us some great advice on how we can retrain ourselves NOT to be so reactive and hopefully, stop ourselves …
…
continue reading
1
EPISODE 22: Hands Off My Amygdala! The Psychology Behind Cybersecurity
33:06
33:06
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
33:06
This week we are joined by Bec McKeown, a chartered psychologist with extensive experience in carrying out applied research for organisations including the UK Ministry of Defence and the founder and director of Mind Science, an independent organisation that works with cybersecurity professionals In this episode, Hands Off My Amygdala! The Psycholog…
…
continue reading
1
EPISODE 21: Bringing The Curtain Down On Risk Theatre And Applauding Objective-Centred Risk Management
30:34
30:34
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
30:34
This week we are joined by Sabrina Segal, an integrity, risk, and compliance advisor, with almost 20 years of experience in the public, private, and third-sectors. In this week’s episode, Bringing the Curtain Down on Risk Theatre and Applauding objective-centred Risk Management, Sabrina shares with us, a quite frankly amazing model to work from: Th…
…
continue reading
1
EPISODE 20: Not New, But Novel - Tackling Risk In The Third Sector
31:08
31:08
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
31:08
This week we are joined by Sabrina Segal, an integrity, risk, and compliance advisor, with almost 20 years of experience in the public, private, and third-sectors. In this episode, Not New, but Novel - Tackling Risk in the Third Sector, We take a look at the challenges facing the third sector when it comes to cybersecurity and technology risks. The…
…
continue reading
1
EPISODE 19: Fun With Purpose: A Scrum Guide!
38:53
38:53
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
38:53
This Episode we are joined by Amy Kouppas, a Scrum Master, D&I lead, and founder of a Women’s Health & Wellbeing group at Sky. We are talking about all things agile and scrum! Most organisations have some form of agile methodologies, and the likelihood is, yours does too but what is it? What is Kanban? What is Scrum? What does a Scrum master do and…
…
continue reading
1
EPISODE 18: And The BAFTA For Best Cybersecurity Awareness Training Goes To…
23:12
23:12
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
23:12
This Episode we are joined by Damjan Obal, Head of design at Ardoq, lecturer and international speaker on all things design and data. In this episode, And the Bafta for Best Cybersecurity Awareness Training Goes To…, we are looking at how we practically apply design principles to our security awareness programmes, with things like design thinking, …
…
continue reading
1
EPISODE 17: F.U.D Off! Cybersecurity Awareness Beyond Compliance and Boredom
30:47
30:47
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
30:47
This Episode we are joined by Damjan Obal, Head of design at Ardoq, lecturer and international speaker on all things design and data. In this episode, F.U.D OFF! - Cybersecurity Awareness Beyond Compliance and Boredom, we learn from Damjan about the importance of storytelling, the difference between game theory and gamification, what accessibility …
…
continue reading
1
EPISODE 16: That’s illuminating! Protecting aberdeen’s iot street lights from cyber attacks!
41:08
41:08
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
41:08
This Episode we are joined by James Hall, developer and Founder of Parallex, a digital consultancy that focuses on ‘building better digital experiences together’. In this episode, That’s illuminating! Protecting Aberdeen’s IOT Street Lights from Cyber attacks! James shares his experience on securing public utilities, other IOT devices, how he ‘sell…
…
continue reading
1
EPISODE 15: SHIFT HAPPENS: The ART OF NAVIGATING THE SEAS OF CYBER CHANGE
45:22
45:22
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
45:22
Today we are joined by Paula Cizek, Chief Research Officer at Nobl, where she guides leaders and teams through the change management process, from assessing the organization’s readiness for change to implementing initiatives. In this episode, we explore the fascinating topic of Corporate Change and how its lessons can be applied to cybersecurity. I…
…
continue reading
1
EPISODE 14: HACK THE NEURAL NETWORK - AI and CYBERSECURITY
42:00
42:00
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
42:00
Welcome to the third part of our AI mini-series. In this episode, Jeff and Lianne discuss how AI is transforming the world of cybersecurity, and what you need to know to stay ahead of the curve. They share their personal experiences with using AI tools, such as the custom GPT suite and the tool they are creating, Security Sage, to enhance their sec…
…
continue reading
No episode this week! We’re back to finish off our AI mini-series on the 4th January where your hosts, Jeff Watkins and Lianne Potter discuss how they utilise AI in their work as cybersecurity and tech specialists, their own hints and tips on how to get the best out of the tool, and their predictions for AI usage within the security field in 2024. …
…
continue reading
1
EPISODE 13: 5 HOT TAKES ON AI
22:13
22:13
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
22:13
Welcome to the second part of our AI mini-series. Last week, Helena Hill, UX and AI expert provided us with some great practical advice on how to navigate Large language models like ChatGPT in our daily work. She gave us ideas for usage and also what we should be wary of both from a cybersecurity perspective and a quality perspective. See the show …
…
continue reading
1
EPISODE 12: How to Use ChatGPT and AI to Level UP Your Cybersecurity function
23:07
23:07
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
23:07
This week we are joined by Helena Hill, a seasoned UX Strategist and Consultant and AI expert with a wealth of experience spanning diverse clients, from pre-start-ups to global industry giants. Last week Helena taught us how we in the cybersecurity team can effectively use the User experience team, and its principles to improve our security control…
…
continue reading
1
EPISODE 11: Are You User Experienced? Applying The Principles of UX & UR To The Cybersecurity Journey
37:38
37:38
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
37:38
This week we are joined by Helena Hill, a seasoned UX Strategist and Consultant and AI expert with a wealth of experience spanning diverse clients, from pre-start-ups to global industry giants. In this episode, we explore the fascinating topic of UX and cybersecurity. We’re going to learn from the UX function to see how we can create a better user …
…
continue reading
1
EPISODE 10: It’s Not about the Cookie : THE POWER OF FRAMING INTERACTIONS
25:15
25:15
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
25:15
This week our guest is Melina Palmer, a renowned keynote speaker in behavioural economics and the CEO of The Brainy Business, as well as hosting one of the best podcasts on the subject of the practical application of behavioural economics. In this episode, we're going to discuss the art of influencing both up and down, and how to tailor your cybers…
…
continue reading
1
EPISODE 9: What the Cybersecurity Team Wants and Can’t Tell You (Because they Need More Behavioural Science)
33:24
33:24
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
33:24
This week our guest is Melina Palmer, a renowned keynote speaker in behavioural economics and the CEO of The Brainy Business, as well as hosting one of the best podcasts on the subject of the practical application of behavioural economics. In this episode, we discuss how silos and tribal mentalities occur in the workplace due to confirmation bias a…
…
continue reading
1
EPISODE 8: CYBERCRIME - THE GREATEST HEIST IN HUMAN HISTORY
41:38
41:38
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
41:38
A word of warning listeners, we do discuss the darker side of crime, including human trafficking which some of our listeners may find upsetting. If this isn’t for you, feel free to skip this one and we’ll see you next week. ——————————————————————This week our guest is Ray Blake. Ray is an advisor on financial crime matters and co-creator of the Dar…
…
continue reading
1
EPISODE 7: If Data is the new oil, how do we prevent data spills?
37:18
37:18
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
37:18
This week we have a very special guest, Reema Vadoliya. Reema is the passionate business founder of data consultancy, People of Data, a gifted storyteller, and a professional problem-solver. In this episode, Reema shares her insights on how to collaborate more effectively between cybersecurity and data professionals. She emphasizes the importance o…
…
continue reading
1
EPISODE 6: What Would Dolly Parton Do?
34:31
34:31
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
34:31
Welcome to part two of our enlightening discussion with Matt Ballentine, Engagement Manager at Equal Experts. In this episode, Lianne Potter and Jeff Watkins continue this conversation and dive deeper into the nuances of modern-day communication and work dynamics. Do we need to set new etiquette for engaging in conversations? How do we establish no…
…
continue reading
1
EPISODE 5: WAR (Metaphor), What is it good for? ABSOLUTELY NOTHING!
29:07
29:07
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
29:07
This Episode we are joined by Matt Ballentine, an Engagement Manager at Equal Experts. We do a deep dive into workplace culture and user-needs-centric cybersecurity. Matt believes that the essence of modern leadership isn't just about supervision, but about becoming a nexus between people and ideas. From the transformative shift of T-shaped manager…
…
continue reading