The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
1
teissTalk: Why Zero Trust Network Access is not your silver bullet
45:07
45:07
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
45:07
Where does Zero Trust fall short, and why these failings encourage cyber-crime Expanding Zero Trust to protect the data itself Identifying, classifying, and securing sensitive data through automation This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Jean Carlos, VP Cyber Security, BOXT https://www.linkedin.com/in/je…
…
continue reading
1
teissTalk: Better security awareness training with AI
40:46
40:46
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
40:46
Leveraging behavioural AI to mitigate the risk of phishing attacks Fortifying your defenses against the next wave of phishing threats Practical strategies for empowering colleagues while strengthening your cyber resilience This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Rebecca Stephenson, Specialist Lead Lecturer …
…
continue reading
1
teissTalk: Confronting cyber-criminals-strategies for cyber-hygiene
45:13
45:13
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
45:13
Meeting your operational and legal obligations - getting your foundations in order Cyber-proofing your organisation with comprehensive cyber-security training and awareness Developing cyber-hygiene to defend against cyber-criminals using emerging technology This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Paul Holla…
…
continue reading
1
teissTalk: Mitigating third-party risk with threat intelligence
43:43
43:43
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
43:43
A proactive approach to third-party risk - continuous monitoring of suppliers Using threat intelligence to identify third-party risk Effectively working with partners to mitigate third-party security risks This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Chuck Brooks, Adjunct Professor, Georgetown University https:/…
…
continue reading
1
teissTalk: A playbook for new CISOs - learnings from years in the trenches
44:49
44:49
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
44:49
How the next generation of InfoSec leaders can better prepare themselves to navigate the threats of tomorrow Identifying the quick wins and making the most of the finite time new CISOs have to get their message across Practical measures for reducing stress, burnout and frustration within InfoSec teams over the longer term This episode is hosted by …
…
continue reading
1
teissTalk: Eliminating blind spots within your cyber security environment
46:30
46:30
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
46:30
Gaining comprehensive visibility across your hybrid and multi-cloud environments Mitigating hidden threats and vulnerabilities beyond your endpoints and network parameters Maximising your cyber security investments with better visibility and optimised tool performance This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/…
…
continue reading
1
teissTalk: Protecting your C-Suite's private lives to protect the enterprise
45:39
45:39
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
45:39
Threat trends - how threat actors are targeting C-Suite executives to access the enterprise Empowering your C-Suite to identify and avoid social engineering Creating social media policies that your C-Suite understand so that they can lead by example This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Thomas Wendrich, A…
…
continue reading
1
teissTalk: Securing your sensitive data from exfiltration
44:56
44:56
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
44:56
Protecting your endpoints - how do cybercriminals exfiltrate data, and what trends are we seeing? Mitigating the financial, legal, and reputational risks with a comprehensive data strategy Leveraging next-generation technology to rapidly detect and respond to data exfiltrating ransomware attacks This episode is hosted by Thom Langford https://www.l…
…
continue reading
1
teissTalk: Fortifying your cyber defenses as a mid-sized organisation
44:44
44:44
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
44:44
How you can reduce data loss resulting from user error, disgruntled employees, or cyber attacks Leveraging existing and emerging technologies to enhance your preparedness against the latest attack vectors and threat actors Investing in autonomous and integrated security platforms without breaking the bank This episode is hosted by Thom Langford htt…
…
continue reading
1
teissTalk: Maintaining your credibility as a security advisor
45:16
45:16
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
45:16
Building rapport with the board through persuasive communication skills Leveraging your influence to drive business change and manage cyber risks Measuring the impact of your actions and advice This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Alan Jenkins, Principal Consultant, Cyber Security Navigator Ltd https://w…
…
continue reading
1
teissTalk: Is privacy the source of your failing security?
44:38
44:38
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
44:38
The privacy challenges of using the network as your fundemental point of defence Whether InfoSec leaders can ever get full network visibility Setting privacy controls to reduce vulnerabilities and blindspots within your network This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Tom Ellis-Aziz, Associate Director, Cont…
…
continue reading
1
teissTalk: Selling infosec as a business enabler
44:54
44:54
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
44:54
Proving that your infosec strategy delivers a competitive advantage Managing the risks and costs of a business-enabling infosec team Balancing business objectives with infosec needs to deliver security and growth This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Alan Jenkins, Principal Consultant, Cyber Security Navi…
…
continue reading
1
teissTalk: How AI can improve your security and compliance programmes
46:37
46:37
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
46:37
How infosec leaders can support product teams incorporating generative AI Using AI to improve compliance processes and ongoing vulnerability monitoring Mitigating and minimising AI-based information security risks with ISO 42001 This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Dean Sapp, SVP, Information Security, P…
…
continue reading
1
teissTalk: Where AI-driven threat detection can streamline your SOC
46:02
46:02
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
46:02
Closing the cybersecurity gap - acting fast against critical threats Aligning to current compliance standards without the heavy-lifting Leveraging AI-powered tools to maximise your security investments This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Mike Johnson, Global Cyber Threat & Incident Response Manager, Ver…
…
continue reading
1
teissTalk: Assessing and mitigating risks in your OT environment
45:57
45:57
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
45:57
Ensuring your risk management framework meets your organisation’s needs Ransomware, legacy devices and remote access - risk trends for OT Why you should prioritise risks based on the likelihood of exploitation as well as impact This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Syed Ubaid Ali Jafri, Head of Cyber Defe…
…
continue reading
1
teissTalk: Is your organisation prepared for NIS2?
41:36
41:36
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
41:36
How does NIS2 address risks within critical supply chains and information sharing across borders? Maintaining a proactive stance against evolving threats - how continuous improvement complies with NIS2 Ensuring timely compliance - meeting the new requirements in risk assessment and avoiding penalties This episode is hosted by Thom Langford https://…
…
continue reading
1
teissTalk: Is your organisation cyber resilient?
44:08
44:08
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
44:08
Selecting metrics that best convey the impacts and risks of your strategy to the board How the changing threat landscape will affect your cyber resilience The role cyber insurance plays as a component of your resilience strategy This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Daniel G. Dresner, Professor of Cyberse…
…
continue reading
1
teissTalk: Can AI mitigate your supply chain cyber-risks?
46:02
46:02
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
46:02
Why sharing data means better decisions across your supply chain network Where AI-powered tools can support continuous monitoring and analysis Predicting cyber-risks with AI-driven analytics This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Edd Hardy, Director Cyber and Risk, AlixPartners https://www.linkedin.com/in/…
…
continue reading
1
teissTalk: Phishing simulations – should you bother?
45:47
45:47
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
45:47
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Phishing simulations – should you bother? Why phishing simulations can be more trouble than they’re worth, and how you can lead the change Changes can you deploy to incre…
…
continue reading
1
teissTalk: Is your cyber security approach leaving neurodiverse colleagues behind?
45:59
45:59
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
45:59
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Is your cyber security approach leaving neurodiverse colleagues behind? Ensuring your digital tools and platforms are accessible to people with neurodiverse traits Implem…
…
continue reading
1
teissTalk: Can internal audit boost your cyber security readiness?
45:40
45:40
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
45:40
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Can internal audit boost your cyber security readiness? Getting an internal second opinion to help identify your cyber-security weaknesses Auditing your controls, policie…
…
continue reading
1
teissTalk: ROI from your SOC - measuring impact and reporting progress
46:37
46:37
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
46:37
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: ROI from your SOC - measuring impact and reporting progress Tools for measuring ROI for your SOC - where to look for the greatest impact What are the best capabilities an…
…
continue reading
1
teissTalk: Improving your cyber resilience with threat intelligence
45:44
45:44
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
45:44
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Improving your cyber resilience with threat intelligence How the changing threat landscape could damage your cyber resilience Implementing the latest threat intelligence …
…
continue reading
1
teissTalk: Embracing AI tools across your organisation - ensuring you remain secure
46:41
46:41
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
46:41
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Embracing AI tools across your organisation - ensuring you remain secure The opportunities and risks widespread adoption of AI poses to your organisation How infosec thin…
…
continue reading
1
teissTalk: Securing your Industrial IoT
43:33
43:33
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
43:33
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Securing your Industrial IoT How cyber-threat actors are exploiting Industrial IoT, and what the profile of a typical attack looks like Best practices for managing and mi…
…
continue reading
1
teissTalk: Helping colleagues recognise and learn from their risky behaviour
44:25
44:25
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
44:25
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Helping colleagues recognise and learn from their risky behaviour Enabling a "no-blame" culture where colleagues feel confident reporting their near misses Using examples…
…
continue reading
1
teissTalk: Building a more inclusive cybersecurity team
42:07
42:07
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
42:07
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Building a more inclusive cybersecurity team Avoiding the one-size-fits-all approach to meeting people’s neurodiversity needs Recognising burnout in your neurodiverse sec…
…
continue reading
1
teissTalk: Why your non-cyber colleagues aren't listening to you
43:33
43:33
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
43:33
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Why your non-cyber colleagues aren't listening to you How to get your language right when translating the jargon Making your training relevant and interesting How to best…
…
continue reading
1
teissTalk: Building truly diverse teams
44:52
44:52
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
44:52
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Building truly diverse teams Ways to adapt your job adverts and interview techniques that will attract diverse candidates How to reduce qualification expectations to attr…
…
continue reading
1
teissTalk: The liability of the CISO - a legal briefing
46:20
46:20
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
46:20
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: The liability of the CISO - a legal briefing How is personal liability changing, and how should CISOs protect themselves? What are the CISO’s disclosure obligations and w…
…
continue reading
1
teissTalk: How much will your next breach cost?
47:09
47:09
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
47:09
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: How much will your next breach cost? Which data do you need to estimate financial loss from a breach? Which risks should CISOs prioritise in a cyber security assessment? …
…
continue reading
1
teissTalk: Mitigating the cyber risks in your digital supply chain
47:03
47:03
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
47:03
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Mitigating the cyber risks in your digital supply chai Why the standard prescriptions for addressing supplier risk are challenged when it comes to 4th, 5th and Nth partie…
…
continue reading
1
teissTalk: Creating a security-conscious culture
45:52
45:52
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
45:52
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Creating a security-conscious culture Adapting security awareness to the way your colleagues see the online world Benchmarking behaviour to get a true representation of c…
…
continue reading
1
teissTalk: How do you demonstrate effective cyber resilience to the board?
45:55
45:55
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
45:55
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: How do you demonstrate effective cyber resilience to the board? Selecting metrics that best convey the impacts and risks of your strategy Measuring the value to the busin…
…
continue reading
1
teissTalk: Building an effective infosec strategy for critical Nth-party suppliers
43:29
43:29
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
43:29
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Building an effective infosec strategy for critical Nth-party suppliers Leveraging your relationships to build cyber resilience across your supply chain ecosystem Vendor …
…
continue reading
1
teissTalk: Leveraging AI to monitor, analyse and respond to threats
46:32
46:32
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
46:32
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Leveraging AI to monitor, analyse and respond to threats What are the practical limitations and challenges with deploying AI to respond to threats and incidents Complemen…
…
continue reading
1
teissTalk: Are you ready to respond to a ransomware attack?
47:01
47:01
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
47:01
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Are you ready to respond to a ransomware attack? Is your playbook robust enough? Stress-testing your playbook with table top exercises Reactive or proactive security - wh…
…
continue reading
1
teissTalk: Where is your next negligent insider, and what risk do they pose?
46:22
46:22
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
46:22
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Where is your next negligent insider, and what risk do they pose? What to look for in end-user behaviour to identify the negligent insider Training to protect against neg…
…
continue reading
1
teissTalk: Are infosec leaders emotionally literate enough?
46:36
46:36
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
46:36
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Are infosec leaders emotionally literate enough? Building emotionally intelligent infosec teams and strategies Adapting your security awareness programmes to keep them fr…
…
continue reading
1
teissTalk: The evolving role of identity in cyber security
47:43
47:43
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
47:43
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: The evolving role of identity in cyber security With continuous digital transformation, where do digital identities fit in? How does the evolving threat landscape change …
…
continue reading
1
teissTalk: Detecting imposters and rogue insiders in SaaS applications
46:20
46:20
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
46:20
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Detecting imposters and rogue insiders in SaaS applications Preventing and mitigating the impact of stolen credentials Identifying and managing trigger events that may le…
…
continue reading
1
teissTalk: Delivering measurable cyber risk reduction
47:12
47:12
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
47:12
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Delivering measurable cyber risk reduction Advising colleagues to improve security decision-making and reduce cyber risk Practical steps to apply cyber threat intelligenc…
…
continue reading
1
teissTalk: Protecting yourself and your infosec colleagues
47:58
47:58
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
47:58
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Protecting yourself and your infosec colleagues How to recognise burnout in your team and reduce employee stress Conducting stress assessments after security incidents an…
…
continue reading
1
teissTalk: Building competitive advantage with diverse infosec teams
47:08
47:08
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
47:08
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Building competitive advantage with diverse infosec teams Building a diverse-thinking infosec team to address the threats and vulnerabilities your organisation faces Deve…
…
continue reading
1
teissTalk: Bridging your cyber skills gap - training and retaining talent
46:56
46:56
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
46:56
This is the audio-only version of our weekly cyber security talk show, teissTalk. Join us for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Bridging your cyber skills gap - training and retaining talent Understaffed and under-trained - how can InfoSec leaders break the cycle? Recruiting for potential and tran…
…
continue reading
1
teissTalk: Control in the cloud - are your data transfers secure?
46:26
46:26
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
46:26
This is the audio-only version of our twice-weekly cyber security talk show, teissTalk. Join us twice a week for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Control in the cloud - are your data transfers secure? How to modernise data handling when integrating with cloud-based solutions? The challenges of mo…
…
continue reading
1
teissTalk: How to answer when your board asks, “Are we secure?”
47:02
47:02
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
47:02
This is the audio-only version of our twice-weekly cyber security talk show, teissTalk. Join us twice a week for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: How to answer when your board asks, “Are we secure?” Moving the conversation beyond risk – what other approaches demonstrate security? What strategies …
…
continue reading
1
teissTalk: Cyber insurance - living with spiralling costs and reduced coverage
47:25
47:25
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
47:25
This is the audio-only version of our twice-weekly cyber security talk show, teissTalk. Join us twice a week for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Cyber insurance - living with spiralling costs and reduced coverage Persuading your Board to take out cyber insurance and choosing the best coverage Ho…
…
continue reading
1
teissTalk: Where are your email risk blind spots?
45:22
45:22
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
45:22
This is the audio-only version of our twice-weekly cyber security talk show, teissTalk. Join us twice a week for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Where are your email risk blind spots? BEC attacks: understanding how cyber-criminals are using the five types of scams Adapting your training and awar…
…
continue reading
1
teissTalk: Overcoming your internal cultural AppSec challenges
36:26
36:26
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
36:26
This is the audio-only version of our twice-weekly cyber security talk show, teissTalk. Join us twice a week for free by visiting www.teiss.co.uk/teisstalk The panel discussion is titled: teissTalk: Overcoming your internal cultural AppSec challenges Avoiding a siloed security function and non-existent DevSecOps culture Implementing positive change…
…
continue reading