Compromising Positions

    Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by Developers, User Researchers, Designers, Product Owners, Data Scientists, Cloud Specialists, Scrum Masters, C-Suite Execs, AI/MI boffins, and many, many more non-security positions! This is a podcast aim to get you thinking...

  • EPISODE 49: Are Our Cybersecurity Controls Inclusive? Going Beyond Hiring When It Comes To Diversity In Cybersecurity

  • EPISODE 48: It’s So Hard To Commit A Crime These Days! Surveillance, Dishonesty, Fraud And Other Pink-Collar Flags

  • EPISODE 47: Hacking Our Capacity To Think: The Philosophy Of Trust, Cybersecurity And AI

  • EPISODE 46: Sometimes, We Are The Villains: Tech Ethics In Software Development

  • EPISODE 45: Can Cybersecurity Teams Actually Do Scrum?

  • EPISODE 44: Embracing Failure in Cybersecurity by Learning Through Trial and Error

  • EPISODE 43: Not Everybody Does It Like US…So Hire Anthropologists in Cybersecurity!

  • EPISODE 42: Mind Science - Cyber Psychology 101

  • EPISODE 41: Empathy Over Ego: Why We're Angry At The Wrong People In Cybersecurity - The Cyber Empathy Podcast

  • EPISODE 40: How Do You Protect Your ASS-ets? An Interview On AppSec With The Modern.Net Show

  • EPISODE 39: Throwback Thursday! I’m Only H.U.M.A.N(S): Hacking the Human OS to Master Cybersecurity Compliance

  • EPISODE 38: HACK THE PLANET! THE BEST AND WORST HACKER MOVIES REVIEWED!

  • EPISODE 37: There Is No Perfect Cybersecurity, But You Could At Least Put a Padlock On It!

  • EPISODE 36: When Perception is Everything: Is it Time to Ditch the name "Cybersecurity"?

  • EPISODE 35: Can Cybersecurity Teams Flex Their Creativity To Keep Us All Safe?

  • EPISODE 34: IS YOUR RISK MANAGEMENT TOAST?

  • EPISODE 33: Inconvenient Truths: Why Technology Won’t Create The Perfect Customer Experience In Cybersecurity

  • EPISODE 32: Cybersecurity and The Human Experience: Designing for humans, not robots with John Sills

  • EPISODE 31: Can Cybersecurity Overcome its PR Problem? Building Your Brand and Social Capital with Sarah Evans, PR and Marketing Specialist

  • EPISODE 30: SAY GOODBYE TO ‘GIT BLAME’: BUILDING COLLABORATIVE AND SECURE SOFTWARE DEVELOPMENT LIFECYCLES

  • EPISODE 29: “THE DILEMMA GAME”:UNLEASHING THE POWER OF ETHICS AND GOOD CYBERSECURITY THROUGH PLAY

  • EPISODE 28: RULES WITHOUT RELATIONSHIPS CREATE REBELLION: WHY ETHICS MATTER IN CYBERSECURITY

  • EPISODE 27: Ignore all previous instructions: Threat modelling AI Systems

  • EPISODE 26: It’s A Wonderful Hack! Building A High Performance Security Team

  • EPISODE 25: SUPERCONNECTORS: UNLEASHING PURPOSE BEYOND METRICS IN YOUR CYBERSECURITY FUNCTION

  • EPISODE 24: DATA, DATA EVERYWHERE, BUT HOW DO WE MAKE IT SAFE TO SHARE? EXPLORING THE RELATIONSHIP BETWEEN DATA, CYBERSECURITY AND OUR DESIRE FOR CONVENIENCE

  • EPISODE 23: Awareness ≠ Behavioural Change - Rethinking Cybersecurity Training

  • EPISODE 22: Hands Off My Amygdala! The Psychology Behind Cybersecurity

  • EPISODE 21: Bringing The Curtain Down On Risk Theatre And Applauding Objective-Centred Risk Management

  • EPISODE 20: Not New, But Novel - Tackling Risk In The Third Sector

  • EPISODE 19: Fun With Purpose: A Scrum Guide!

  • EPISODE 18: And The BAFTA For Best Cybersecurity Awareness Training Goes To…

  • EPISODE 17: F.U.D Off! Cybersecurity Awareness Beyond Compliance and Boredom

  • EPISODE 16: That’s illuminating! Protecting aberdeen’s iot street lights from cyber attacks!

  • EPISODE 15: SHIFT HAPPENS: The ART OF NAVIGATING THE SEAS OF CYBER CHANGE

  • EPISODE 14: HACK THE NEURAL NETWORK - AI and CYBERSECURITY

  • BACK SOON

  • EPISODE 13: 5 HOT TAKES ON AI

  • EPISODE 12: How to Use ChatGPT and AI to Level UP Your Cybersecurity function

  • EPISODE 11: Are You User Experienced? Applying The Principles of UX & UR To The Cybersecurity Journey

  • EPISODE 10: It’s Not about the Cookie : THE POWER OF FRAMING INTERACTIONS

  • EPISODE 9: What the Cybersecurity Team Wants and Can’t Tell You (Because they Need More Behavioural Science)

  • EPISODE 8: CYBERCRIME - THE GREATEST HEIST IN HUMAN HISTORY

  • EPISODE 7: If Data is the new oil, how do we prevent data spills?

  • EPISODE 6: What Would Dolly Parton Do?

  • EPISODE 5: WAR (Metaphor), What is it good for? ABSOLUTELY NOTHING!

  • Episode 4 : CODE RED - Empowering engineers to secure our ci/cd pipelines

  • EPISODE 3: I’M ONLY H.U.M.A.N.(S)

  • EPISODE 2: THE HUMAN OS - WHY WE CAN’T JUST CTRL + ALT + DELETE OUR COMPLIANCE PROBLEMS

  • EPISODE 1: Row, Row, Row Your Boat, Down The Value Stream…Merrily, Merrily, Merrily, that’s the SEcurity Dream!

  • Trailer!

undefined undefined
undefined undefined