Compromising Positions - A Cyber Security Podcast

A podcast by Compromising Positions - Thursdays

Thursdays

Categories:

50 Episodes

  1. EPISODE 9: What the Cybersecurity Team Wants and Can’t Tell You (Because they Need More Behavioural Science)

    Published: 11/23/2023
  2. EPISODE 8: CYBERCRIME - THE GREATEST HEIST IN HUMAN HISTORY

    Published: 11/16/2023
  3. EPISODE 7: If Data is the new oil, how do we prevent data spills?

    Published: 11/9/2023
  4. EPISODE 6: What Would Dolly Parton Do?

    Published: 11/2/2023
  5. EPISODE 5: WAR (Metaphor), What is it good for? ABSOLUTELY NOTHING!

    Published: 10/25/2023
  6. Episode 4 : CODE RED - Empowering engineers to secure our ci/cd pipelines

    Published: 10/18/2023
  7. EPISODE 3: I’M ONLY H.U.M.A.N.(S)

    Published: 10/11/2023
  8. EPISODE 2: THE HUMAN OS - WHY WE CAN’T JUST CTRL + ALT + DELETE OUR COMPLIANCE PROBLEMS

    Published: 10/5/2023
  9. EPISODE 1: Row, Row, Row Your Boat, Down The Value Stream…Merrily, Merrily, Merrily, that’s the SEcurity Dream!

    Published: 10/4/2023
  10. Trailer!

    Published: 9/14/2023

3 / 3

Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by Developers, User Researchers, Designers, Product Owners, Data Scientists, Cloud Specialists, Scrum Masters, C-Suite Execs, AI/MI boffins, and many, many more non-security positions! This is a podcast aim to get you thinking about security without boring you to death! Join our two hosts, Lianne Potter, Cyber Anthropologist and Head of Security Operations at a major retailer and Jeff Watkins, CTO at XDesign for this informal, frank, and at times anarchic look at what people really think about cybersecurity in organisations and what cybersecurity people should ACTUALLY be doing.