Razorthorn Security
Support Over Shame in Security | Razorthorn Security
1:09
Razorthorn Security
Train for Mistakes, Not Perfection | Razorthorn Security
1:35
Razorthorn Security
The Budget Myth | Razorthorn Security
1:16
Razorthorn Security
Why Phishing Tests Are Broken | Razorthorn Security
1:28
Razorthorn Security
McDonald's Knows Security Better Than You | Razorthorn Security
1:04
Razorthorn Security
How To Get Your Staff to Actually Care About Cybersecurity | Razorthorn Security
42:35
Razorthorn Security
You Trust Apple But Not IT?
0:49
Razorthorn Security
Protect Everything? Good Luck Letting People In | Razorthorn Security
1:29
Razorthorn Security
Agile MFA: Skip Complexity, Keep Security
1:29
Razorthorn Security
Use Risk Correctly — Or Risk Being A Joke
1:24
Razorthorn Security
What Die Hard 3 Teaches Us About Risk
1:30
Razorthorn Security
Security Gone Mad: The Fine Art of Overdoing It
42:41
Razorthorn Security
How I Got Into Cybersecurity (Spoiler: It Was YouTube) | Razorthorn Security
1:28
Razorthorn Security
Monitoring Workers with AI? We're Not OK With That.| Razorthorn Security
1:23
Razorthorn Security
Cyber Hit Me When It Affected My Nan | Razorthorn Security
1:20
Razorthorn Security
They Spoke Over Me… So I Binned Their Collateral | Razorthorn Security
1:12
Razorthorn Security
You're Overspending on Tech Because You’re Not Cleaning Up | Razorthorn Security
0:50
Razorthorn Security
The Hardest Job I Ever Did (And It Paid Nothing) | Razorthorn Security
0:40
Razorthorn Security
Unconventional Paths to Cybersecurity (AKA keeping your Nan Safe From Hackers)
44:12
Razorthorn Security
Spot the Toxic People Before It’s Too Late | Razorthorn Security
0:47
Razorthorn Security
Communication Isn’t Just for Crises—It’s for Growth | Razorthorn Security
0:54
Razorthorn Security
Protecting Focus During a Security Crisis | Razorthorn Security
1:04
Razorthorn Security
Build a Comms Plan Before the Cyber Incident Hits
1:27
Razorthorn Security
How to Speak Tech to Execs (And Vice Versa)
1:30
Razorthorn Security
The One Question That Builds Trust at Work
1:56
Razorthorn Security
Why Communication Matters Most During a Cyber Crisis
0:47
Razorthorn Security
Mastering the Art of Communication in InfoSec with Stefania Chaplin | Razorthorn Security
44:25
Razorthorn Security
"Which Idiot Brought Their Mac In?" - Early IT Struggles
0:53
Razorthorn Security
Lucky to Have Antivirus? Cybersecurity in the Early Days
0:31
Razorthorn Security
Hackers Now Operate Like Businesses—And the Law is Catching Up
1:25
Razorthorn Security
Security is a Balancing Act—One Wrong Move & It's Over
1:38
Razorthorn Security
Malware on Medical Devices? The Supply Chain Security Nightmare
1:54
Razorthorn Security
Getting Everyone to Think Like a Security Expert
1:11
Razorthorn Security
What Does "Hacker" Really Mean? The Origins of the Word
1:06
Razorthorn Security
How Hackers Get Into Your Network (And How to Stop Them)
1:24
Razorthorn Security
Spotlight on Technology: Mastering Attack Surface Management with Censys
51:10
Razorthorn Security
AI Data Loops: Why Machines Are Eating Their Own Mistakes
1:12
Razorthorn Security
AI’s Future: Can We Prevent Another Facebook Data Crisis?
1:11
Razorthorn Security
"AI is a massive power for good, but are we ready for it?"
1:43
Razorthorn Security
AI & Privacy Laws: Are Companies Exploiting Your Data?
1:44
Razorthorn Security
AI in Medicine: The Potential vs The Privacy Risks
0:58
Razorthorn Security
AI & IP Theft: What Happens When Your Work Gets Copied?
0:51
Razorthorn Security
Who Really Owns Your Data in the AI Era?
1:21
Razorthorn Security
AI Data Harvesting - Who Really Owns Your Digital Footprint?
49:22
Razorthorn Security
Lessons Learned: Why Post-Incident Analysis is Critical | Razorthorn Security
1:03
Razorthorn Security
Post-Incident Review: The 5 Whys of Security Failures | Razorthorn Security
0:52
Razorthorn Security
Crisis Comms: Why Every Incident Plan Needs a Spokesperson | Razorthorn Security
1:19
Razorthorn Security
Investigating a Colleague: The Reality of Insider Threats | Razorthorn Security
1:06
Razorthorn Security
Incident Response: The One Thing You Can’t Ignore | Razorthorn Security
1:17
Razorthorn Security
Inside Incident Response: Turning Chaos into Cohesive Teamwork | Razorthorn Security
50:20
Razorthorn Security
Cybersecurity Collaboration: Why CISOs Must Work Together, Not Compete | Razorthorn Security
0:51
Razorthorn Security
CISO Risk Management: How to Protect Yourself from Legal Liability | Razorthorn Security
0:48
Razorthorn Security
Cyber Warfare & Politics: How Hackers Are Changing the Game | Razorthorn Security
0:32
Razorthorn Security
Incident Response Planning: Why CISOs Must Focus on Governance, Not Just Ransomware
0:28
Razorthorn Security
CISO Strategy vs Bureaucracy: How to Navigate Leadership Challenges | Razorthorn Security
0:49
Razorthorn Security
Essential CISO Skills: How to Succeed in Modern Cybersecurity | Razorthorn Security
1:41
Razorthorn Security
The CISO Role in 2024: Why It’s More Than Just IT Security | Razorthorn Security
0:59
Razorthorn Security
CISO Liability: Why Managing Breaches Matters More Than Stopping Them | Razorthorn Security
0:43
Razorthorn Security
The Cost of Being a CISO Part 2: Ethics, Leadership and Strategic Impact | Razorthorn Security
54:47
Razorthorn Security
The Flaws in Traditional Security Training | Razorthorn Security
1:16
Razorthorn Security
Why Education in Cybersecurity Still Falls Short | Razorthorn Security
1:26
Razorthorn Security
Do Companies Value People Over Profit? | Razorthorn Security
1:00
Razorthorn Security
CEO Fraud: The Hidden Cost of Urgency | Razorthorn Security
0:45
Razorthorn Security
How Media Fuels Cyber Hacking Among Youth | Razorthorn Security
0:58
Razorthorn Security
Continuous Pen Testing: The New Standard in Cybersecurity | Razorthorn Security
0:56
Razorthorn Security
Rising Costs in Cybersecurity Tools and Consultancy | Razorthorn Security
1:16
Razorthorn Security
AI-Powered Hacktivism: The Next Cyber Threat | Razorthorn Security
0:35
Razorthorn Security
Quantum Encryption: Ready for Prime Time?
0:38
Razorthorn Security
Overregulation in Cybersecurity: Is Innovation at Risk? | Razorthorn Security
0:59
Razorthorn Security
Cybersecurity’s Cambrian Explosion: What’s Next?
1:12
Razorthorn Security
Cybersecurity 2025 – Predictions from the Experts | Razorthorn Security
52:34
Razorthorn Security
Why Pen Tests Alone Aren’t Enough Anymore | Razorthorn Security
0:46
Razorthorn Security
The Five Essentials of an InfoSec Strategy | Razorthorn Security
1:09
Razorthorn Security
A New Approach to Cybersecurity Budgets | Razorthorn Security
1:01
Razorthorn Security
The Silent Security Threat That's Killing Your Business
0:51
Razorthorn Security
Stop Buying Tools You Don’t Use | Razorthorn Security
0:41
Razorthorn Security
IT Budgets Prioritise Cybersecurity in 2025 | Razorthorn Security
0:36
Razorthorn Security
Supercharge Your Security Budget in 2025: Smarter Investments, Stronger Defence |Razorthorn Security
55:16
Razorthorn Security
Cybersecurity Maturity: A Journey, Not a Sprint | Razorthorn Security
0:35
Razorthorn Security
Educating Boards on Cyber Risk as Business Risk | Razorthorn Security
0:34
Razorthorn Security
Lessons from History: The CISO as a Modern-Day Gatekeeper
0:45
Razorthorn Security
The 24/7 Reality of Being a CISO
1:00
Razorthorn Security
CISOs Demand Decision-Making Power Amid Rising Stakes
0:45
Razorthorn Security
Organisational Failures or CISO Blame?
0:40
Razorthorn Security
Gatekeepers of Digital Trust
0:29
Razorthorn Security
The Cost of Being A CISO Part: 1 Personal, Professional & Organisational Challenges
58:49
Razorthorn Security
The Evolving Role of a CISO
0:39
Razorthorn Security
Psychological Safety: A New Approach to Cyber Vigilance | Razorthorn Security
0:34
Razorthorn Security
Scare Tactics in Cybersecurity: Why They Don’t Work | Razorthorn Security
0:36
Razorthorn Security
QR Code Scams: The New Frontier of Cyber Attacks | Razorthorn Security
1:11
Razorthorn Security
The Human Factor: Why Most Cyber Breaches Start with People | Razorthorn Security
0:42
Razorthorn Security
Human Emotions: The Hackers' Ultimate Tool
0:53
Razorthorn Security
Why Cybersecurity Training Still Matters
0:31
Razorthorn Security
From Awareness to Action: The Evolution of Security Training
0:45
Razorthorn Security
The Love Bug Virus: How It Shaped Cybersecurity Awareness
0:49
Razorthorn Security
Humans vs AI: Building a Security Culture That Actually Works with Noora Ahmed-Moshe
53:44
Razorthorn Security
Mental Health, Organisational Culture & The Human Side of Cybersecurity | Razorthorn Security
44:19
Razorthorn Security
Preparing for Outsourcing Risks: A Resiliency Plan | Razorthorn Security
1:00
Razorthorn Security
Malicious Insiders: The Threat of Corporate Espionage | Razorthorn Security
0:24
Razorthorn Security
Human Error in Cybersecurity: The Overlooked Risk | Razorthorn Security
0:42