Biz and Tech Podcasts > Technology > ThreatCast
Stay informed with our exclusive interviews featuring industry experts, who share their valuable insights, expert opinions, and practical strategies to safeguard yourself and your organisation from cyber threats. In each episode, we shed light on cybersecurity trends, emerging technologies, and notable incidents shaping our digital world. Tune in to ThreatCast and embark on a journey to fortify your digital resilience.
Last Episode Date: 27 November 2024
Total Episodes: 17
Send us a textDiscover the untapped power of Microsoft Graph API! Learn how it revolutionises M365 automation for sysadmins and developers alike, from managing conditional access to enhancing email security.Unlock the full potential of Microsoft Graph API in this deep dive with Joe Hosty, a Microsoft security automation expert. Whether you’re a sysadmin streamlining conditional access or a developer building third-party apps, this video covers everything you need to know:- How Graph API saves time by automating repetitive tasks- Tips for navigating multi-tenant environments seamlessly- Best practices for securing API tokens and permissions- Using Graph Explorer to test and optimise your queries- Key insights for sysadmins, developers, and security teams- Joe also shares actionable advice on avoiding common mistakes, optimising security, and harnessing Graph API’s advanced capabilities to transform workflows.👉 Enjoy the content? Like, comment, and subscribe for more insights on M365 automation and cybersecurity! Share this video with your team to start leveraging Graph API today.ThreatCast podcast is produced by Threatscape.Our mission is to provide a secure and certain future for our clients. Keeping them protected so that they can go about their business is how we know we’re delivering on our promise.Contact us Email Address : info@threatscape.com Thanks for listening & keep podcasting!
Send us a textAI-powered Email Attacks? Learn How an Ad Tech Mindset Can Secure Your BusinessFacing complex email threats and AI-driven attacks? Discover how an Ad Tech approach using behavioural analytics can help you protect against evolving cyber threats. ⬇️With businesses facing increasingly sophisticated email security challenges, attackers are now leveraging AI to bypass traditional defences. In this episode, we dive into:* Complexities of Email Security – Why standard solutions fall short* AI as an Attack Tool – How AI’s use in attacks is reshaping cyber threats* Ad Tech Mindset – Applying behavioural insights for a proactive defence* Behavioural Analytics – Predictive insights to identify and neutralise threatsDefending against modern threats means thinking like the attacker. Join us to explore innovative ways to counteract these new attack strategies.ThreatCast podcast is produced by Threatscape.Our mission is to provide a secure and certain future for our clients. Keeping them protected so that they can go about their business is how we know we’re delivering on our promise.Contact us Email Address : info@threatscape.com Thanks for listening & keep podcasting!
Send us a textIn this episode, we dive deep into how AI, Copilot, and Purview work together to secure sensitive data, prevent insider threats, and streamline compliance.Learn:How Microsoft's Copilot enhances security with AI.The Secure by Default initiative and what it means for your organisation.Practical tips for deploying sensitivity labels and insider risk management.Discover why Purview is an underappreciated yet essential part of the Microsoft 365 stack and how AI can help safeguard your organisation’s data against leaks and exfiltration.🔒 Ready to take your data security to the next level? Don't miss out on these expert insights!📌 Follow for more on AI-driven security solutions. ThreatCast podcast is produced by Threatscape.Our mission is to provide a secure and certain future for our clients. Keeping them protected so that they can go about their business is how we know we’re delivering on our promise.Contact us Email Address : info@threatscape.com Thanks for listening & keep podcasting!
Send us a textIn this episode, William breaks down all things automation and Microsoft security! We cover essential topics like DevSecOps, managed identities, and Azure Defender for Cloud, showing how these integrate seamlessly with Azure DevOps to build more secure apps. We also dive into the Microsoft 365 Security and Compliance user group that William and I co-organise every month, sharing tips and best practices. Whether you're passionate about automation, cybersecurity, or just want to learn how Microsoft tools work together to strengthen security, this episode is packed with valuable insights. Tune in and let's get started!Don’t forget to like, comment, and subscribe for more content on automation, integration, and security!ThreatCast podcast is produced by Threatscape.Our mission is to provide a secure and certain future for our clients. Keeping them protected so that they can go about their business is how we know we’re delivering on our promise.Contact us Email Address : info@threatscape.com Thanks for listening & keep podcasting!
Send us a textJoin Paul O'Sullivan on Threat Cast as he talks to Chris Gunner, Group CISO of Pepper Financial Services Group. Chris shares his unique journey from astrophysics to cybersecurity, discussing how he's applied his skills to navigate the evolving landscape of cyber threats. Discover how he's rethinking traditional cybersecurity approaches to prioritise business success while maintaining security.In this in-depth interview, Chris shares his insights on the challenges and opportunities in the cybersecurity industry. He discusses the importance of human-centered cybersecurity, collaboration, and finding innovative solutions to complex problems. Learn how he's helped businesses balance risk and reward in a rapidly changing world, and gain valuable insights into the future of cybersecurity.ThreatCast podcast is produced by Threatscape.Our mission is to provide a secure and certain future for our clients. Keeping them protected so that they can go about their business is how we know we’re delivering on our promise.Contact us Email Address : info@threatscape.com Thanks for listening & keep podcasting!
Send us a textIn this episode of ThreatCast , Ru and Matt dive deep into the world of Microsoft GHOST, a specialised team focused on cybersecurity hunting within Microsoft. Matt explains the role of the DoD (Detection and Response Team), their work on incident response for customers dealing with ransomware and nation-state attacks, and how Microsoft telemetry plays a crucial role in detecting and mitigating threats.They also discuss current trends in the cybersecurity landscape, including token theft, adversary-in-the-middle attacks, and the importance of mandatory MFA (Multi-Factor Authentication) for securing Azure and Intune admin portals. Matt shares his insights on how these measures, along with KQL, are helping Microsoft and its customers stay ahead of evolving threats.ThreatCast podcast is produced by Threatscape.Our mission is to provide a secure and certain future for our clients. Keeping them protected so that they can go about their business is how we know we’re delivering on our promise.Contact us Email Address : info@threatscape.com Thanks for listening & keep podcasting!
Send us a textIn this episode of ThreatCast Colin Reid, Commercial Director at Threatscape, is joined by Paul Conroy to discuss: the current challenges and rewards associated with digital transformation, how these transformations can be successfully implemented, and how 2024’s evolving cyber threat landscape can impact organisations’ quest to integrate digital solutions throughout their estate, including the potential benefits and data security risks of utilising AI tools.Paul Conroy has over 30 years of experience in the ICT industry, specialising in digital transformation and cyber security. He has led complex IT projects, including cloud migrations and cyber security implementations, and has experience in securing systems, managing ERP integrations, and building data warehouses with real-time insights across global platforms.What to Expect?What does digital transformation truly mean and how can its implications and implementation differ across industries?In the face of rapid technological change, how can organisations stay ahead of emerging trends?What should senior technology leaders be doing to keep up and ensure their organisations are leveraging the latest innovations effectively?How can AI be used ethically without compromising data security?What are the key elements of a robust cyber security strategy? ThreatCast podcast is produced by Threatscape.Our mission is to provide a secure and certain future for our clients. Keeping them protected so that they can go about their business is how we know we’re delivering on our promise.Contact us Email Address : info@threatscape.com Thanks for listening & keep podcasting!
Send us a textJoin us as we delve into the intricacies of eDiscovery with Microsoft's expert, Ryan John Murphy. Discover why eDiscovery is one of the most powerful and sometimes overlooked tools in Microsoft 365. Learn about the hidden powers, the responsibilities, and the risks associated with it.What this Podcast covers: Why is eDiscovery Important?What are My eDiscovery Options?Which eDiscovery Tool is Right for Me?How Can I Get the Most Out of eDiscovery Premium?What is a Real-World eDiscovery Success Story?How Can I Protect My Data from Guest Users?How Can I Organize My Data Effectively?What are Advanced eDiscovery Techniques?What’s the Bottom Line on eDiscovery?📚 Resources:• Pre-order Ryan's Book on eDiscovery Index: https://www.amazon.co.uk/Microsoft-eD...• Connect with Ryan: / ryanjohnmurphy4 ThreatCast podcast is produced by Threatscape.Our mission is to provide a secure and certain future for our clients. Keeping them protected so that they can go about their business is how we know we’re delivering on our promise.Contact us Email Address : info@threatscape.com Thanks for listening & keep podcasting!
Send us a textIn this episode of ThreatCast, Paul O'Sullivan is joined by Jim Griffiths, Head of Information Security at Associated British Foods, to discuss the intricacies of gaining board-level support for robust cyber security practices. They delve into Jim's extensive career, from his beginnings in the Royal Air Force to his current role in the private sector. The episode highlights the critical challenges and potential strategies for aligning senior management with cyber security objectives, the human factor in security models, and the evolving landscape of information security in light of AI advancements.What We'll Cover:How can organisations effectively and safely integrate AI to enhance cyber security measures?What are the common vulnerabilities associated with the increasing use of QR codes in daily business operations?How can organisations ensure comprehensive cyber security training and awareness among employees?What are the best practices for gaining executive and board-level support for cyber security initiatives?How can the cyber security community better highlight and share successful security practices and techniques?ThreatCast podcast is produced by Threatscape.Our mission is to provide a secure and certain future for our clients. Keeping them protected so that they can go about their business is how we know we’re delivering on our promise.Contact us Email Address : info@threatscape.com Thanks for listening & keep podcasting!
Send us a textIn this week’s episode of ThreatCast, Ru Campbell is joined by Matt Call, Principal Product Manager at Microsoft, who shares insight on his journey from consulting to product engineering, touching on the challenges associated with implementing changes across endpoints and the vulnerabilities created by over-privileged user accounts. Ru and Matt close out the episode by considering the security trends on the horizon, and what they mean for those in the industry. Key Points: • What are the main challenges in implementing new security settings and managing Defender for Endpoint? • Why do organisations need a robust EPM policy? • How can security teams balance the need for control over user devices with the vulnerabilities associated with over-privileged accounts? • How does the collaborative culture at Microsoft drive innovation in security management? • What trends and challenges in security management is Microsoft preparing for in the future?ThreatCast podcast is produced by Threatscape.Our mission is to provide a secure and certain future for our clients. Keeping them protected so that they can go about their business is how we know we’re delivering on our promise.Contact us Email Address : info@threatscape.com Thanks for listening & keep podcasting!
Discover new partners and
collaboration opportunities —right in your inbox.
Get notified about new partnerships