Support Over Shame in Security | Razorthorn Security
Razorthorn Security
Support Over Shame in Security | Razorthorn Security
1:09
Train for Mistakes, Not Perfection | Razorthorn Security
Razorthorn Security
Train for Mistakes, Not Perfection | Razorthorn Security
1:35
The Budget Myth | Razorthorn Security
Razorthorn Security
The Budget Myth | Razorthorn Security
1:16
Why Phishing Tests Are Broken | Razorthorn Security
Razorthorn Security
Why Phishing Tests Are Broken | Razorthorn Security
1:28
McDonald's Knows Security Better Than You | Razorthorn Security
Razorthorn Security
McDonald's Knows Security Better Than You | Razorthorn Security
1:04
How To Get Your Staff to Actually Care About Cybersecurity | Razorthorn Security
Razorthorn Security
How To Get Your Staff to Actually Care About Cybersecurity | Razorthorn Security
42:35
You Trust Apple But Not IT?
Razorthorn Security
You Trust Apple But Not IT?
0:49
Protect Everything? Good Luck Letting People In | Razorthorn Security
Razorthorn Security
Protect Everything? Good Luck Letting People In | Razorthorn Security
1:29
Agile MFA: Skip Complexity, Keep Security
Razorthorn Security
Agile MFA: Skip Complexity, Keep Security
1:29
Use Risk Correctly — Or Risk Being A Joke
Razorthorn Security
Use Risk Correctly — Or Risk Being A Joke
1:24
What Die Hard 3 Teaches Us About Risk
Razorthorn Security
What Die Hard 3 Teaches Us About Risk
1:30
Security Gone Mad: The Fine Art of Overdoing It
Razorthorn Security
Security Gone Mad: The Fine Art of Overdoing It
42:41
How I Got Into Cybersecurity (Spoiler: It Was YouTube) | Razorthorn Security
Razorthorn Security
How I Got Into Cybersecurity (Spoiler: It Was YouTube) | Razorthorn Security
1:28
Monitoring Workers with AI? We're Not OK With That.| Razorthorn Security
Razorthorn Security
Monitoring Workers with AI? We're Not OK With That.| Razorthorn Security
1:23
Cyber Hit Me When It Affected My Nan | Razorthorn Security
Razorthorn Security
Cyber Hit Me When It Affected My Nan | Razorthorn Security
1:20
They Spoke Over Me… So I Binned Their Collateral | Razorthorn Security
Razorthorn Security
They Spoke Over Me… So I Binned Their Collateral | Razorthorn Security
1:12
You're Overspending on Tech Because You’re Not Cleaning Up | Razorthorn Security
Razorthorn Security
You're Overspending on Tech Because You’re Not Cleaning Up | Razorthorn Security
0:50
The Hardest Job I Ever Did (And It Paid Nothing) | Razorthorn Security
Razorthorn Security
The Hardest Job I Ever Did (And It Paid Nothing) | Razorthorn Security
0:40
Unconventional Paths to Cybersecurity (AKA keeping your Nan Safe From Hackers)
Razorthorn Security
Unconventional Paths to Cybersecurity (AKA keeping your Nan Safe From Hackers)
44:12
Spot the Toxic People Before It’s Too Late | Razorthorn Security
Razorthorn Security
Spot the Toxic People Before It’s Too Late | Razorthorn Security
0:47
Communication Isn’t Just for Crises—It’s for Growth | Razorthorn Security
Razorthorn Security
Communication Isn’t Just for Crises—It’s for Growth | Razorthorn Security
0:54
Protecting Focus During a Security Crisis | Razorthorn Security
Razorthorn Security
Protecting Focus During a Security Crisis | Razorthorn Security
1:04
Build a Comms Plan Before the Cyber Incident Hits
Razorthorn Security
Build a Comms Plan Before the Cyber Incident Hits
1:27
How to Speak Tech to Execs (And Vice Versa)
Razorthorn Security
How to Speak Tech to Execs (And Vice Versa)
1:30
The One Question That Builds Trust at Work
Razorthorn Security
The One Question That Builds Trust at Work
1:56
Why Communication Matters Most During a Cyber Crisis
Razorthorn Security
Why Communication Matters Most During a Cyber Crisis
0:47
Mastering the Art of Communication in InfoSec with Stefania Chaplin | Razorthorn Security
Razorthorn Security
Mastering the Art of Communication in InfoSec with Stefania Chaplin | Razorthorn Security
44:25
"Which Idiot Brought Their Mac In?" - Early IT Struggles
Razorthorn Security
"Which Idiot Brought Their Mac In?" - Early IT Struggles
0:53
Lucky to Have Antivirus? Cybersecurity in the Early Days
Razorthorn Security
Lucky to Have Antivirus? Cybersecurity in the Early Days
0:31
Hackers Now Operate Like Businesses—And the Law is Catching Up
Razorthorn Security
Hackers Now Operate Like Businesses—And the Law is Catching Up
1:25
Security is a Balancing Act—One Wrong Move & It's Over
Razorthorn Security
Security is a Balancing Act—One Wrong Move & It's Over
1:38
Malware on Medical Devices? The Supply Chain Security Nightmare
Razorthorn Security
Malware on Medical Devices? The Supply Chain Security Nightmare
1:54
Getting Everyone to Think Like a Security Expert
Razorthorn Security
Getting Everyone to Think Like a Security Expert
1:11
What Does "Hacker" Really Mean? The Origins of the Word
Razorthorn Security
What Does "Hacker" Really Mean? The Origins of the Word
1:06
How Hackers Get Into Your Network (And How to Stop Them)
Razorthorn Security
How Hackers Get Into Your Network (And How to Stop Them)
1:24
Spotlight on Technology: Mastering Attack Surface Management with Censys
Razorthorn Security
Spotlight on Technology: Mastering Attack Surface Management with Censys
51:10
AI Data Loops: Why Machines Are Eating Their Own Mistakes
Razorthorn Security
AI Data Loops: Why Machines Are Eating Their Own Mistakes
1:12
AI’s Future: Can We Prevent Another Facebook Data Crisis?
Razorthorn Security
AI’s Future: Can We Prevent Another Facebook Data Crisis?
1:11
"AI is a massive power for good, but are we ready for it?"
Razorthorn Security
"AI is a massive power for good, but are we ready for it?"
1:43
AI & Privacy Laws: Are Companies Exploiting Your Data?
Razorthorn Security
AI & Privacy Laws: Are Companies Exploiting Your Data?
1:44
AI in Medicine: The Potential vs The Privacy Risks
Razorthorn Security
AI in Medicine: The Potential vs The Privacy Risks
0:58
AI & IP Theft: What Happens When Your Work Gets Copied?
Razorthorn Security
AI & IP Theft: What Happens When Your Work Gets Copied?
0:51
Who Really Owns Your Data in the AI Era?
Razorthorn Security
Who Really Owns Your Data in the AI Era?
1:21
AI Data Harvesting - Who Really Owns Your Digital Footprint?
Razorthorn Security
AI Data Harvesting - Who Really Owns Your Digital Footprint?
49:22
Lessons Learned: Why Post-Incident Analysis is Critical | Razorthorn Security
Razorthorn Security
Lessons Learned: Why Post-Incident Analysis is Critical | Razorthorn Security
1:03
Post-Incident Review: The 5 Whys of Security Failures | Razorthorn Security
Razorthorn Security
Post-Incident Review: The 5 Whys of Security Failures | Razorthorn Security
0:52
Crisis Comms: Why Every Incident Plan Needs a Spokesperson | Razorthorn Security
Razorthorn Security
Crisis Comms: Why Every Incident Plan Needs a Spokesperson | Razorthorn Security
1:19
Investigating a Colleague: The Reality of Insider Threats | Razorthorn Security
Razorthorn Security
Investigating a Colleague: The Reality of Insider Threats | Razorthorn Security
1:06
Incident Response: The One Thing You Can’t Ignore | Razorthorn Security
Razorthorn Security
Incident Response: The One Thing You Can’t Ignore | Razorthorn Security
1:17
Inside Incident Response: Turning Chaos into Cohesive Teamwork | Razorthorn Security
Razorthorn Security
Inside Incident Response: Turning Chaos into Cohesive Teamwork | Razorthorn Security
50:20
Cybersecurity Collaboration: Why CISOs Must Work Together, Not Compete | Razorthorn Security
Razorthorn Security
Cybersecurity Collaboration: Why CISOs Must Work Together, Not Compete | Razorthorn Security
0:51
CISO Risk Management: How to Protect Yourself from Legal Liability | Razorthorn Security
Razorthorn Security
CISO Risk Management: How to Protect Yourself from Legal Liability | Razorthorn Security
0:48
Cyber Warfare & Politics: How Hackers Are Changing the Game | Razorthorn Security
Razorthorn Security
Cyber Warfare & Politics: How Hackers Are Changing the Game | Razorthorn Security
0:32
Incident Response Planning: Why CISOs Must Focus on Governance, Not Just Ransomware
Razorthorn Security
Incident Response Planning: Why CISOs Must Focus on Governance, Not Just Ransomware
0:28
CISO Strategy vs Bureaucracy: How to Navigate Leadership Challenges | Razorthorn Security
Razorthorn Security
CISO Strategy vs Bureaucracy: How to Navigate Leadership Challenges | Razorthorn Security
0:49
Essential CISO Skills: How to Succeed in Modern Cybersecurity | Razorthorn Security
Razorthorn Security
Essential CISO Skills: How to Succeed in Modern Cybersecurity | Razorthorn Security
1:41
The CISO Role in 2024: Why It’s More Than Just IT Security | Razorthorn Security
Razorthorn Security
The CISO Role in 2024: Why It’s More Than Just IT Security | Razorthorn Security
0:59
CISO Liability: Why Managing Breaches Matters More Than Stopping Them | Razorthorn Security
Razorthorn Security
CISO Liability: Why Managing Breaches Matters More Than Stopping Them | Razorthorn Security
0:43
The Cost of Being a CISO Part 2: Ethics, Leadership and Strategic Impact | Razorthorn Security
Razorthorn Security
The Cost of Being a CISO Part 2: Ethics, Leadership and Strategic Impact | Razorthorn Security
54:47
The Flaws in Traditional Security Training | Razorthorn Security
Razorthorn Security
The Flaws in Traditional Security Training | Razorthorn Security
1:16
Why Education in Cybersecurity Still Falls Short | Razorthorn Security
Razorthorn Security
Why Education in Cybersecurity Still Falls Short | Razorthorn Security
1:26
Do Companies Value People Over Profit? | Razorthorn Security
Razorthorn Security
Do Companies Value People Over Profit? | Razorthorn Security
1:00
CEO Fraud: The Hidden Cost of Urgency | Razorthorn Security
Razorthorn Security
CEO Fraud: The Hidden Cost of Urgency | Razorthorn Security
0:45
How Media Fuels Cyber Hacking Among Youth  | Razorthorn Security
Razorthorn Security
How Media Fuels Cyber Hacking Among Youth | Razorthorn Security
0:58
Continuous Pen Testing: The New Standard in Cybersecurity  | Razorthorn Security
Razorthorn Security
Continuous Pen Testing: The New Standard in Cybersecurity | Razorthorn Security
0:56
Rising Costs in Cybersecurity Tools and Consultancy  | Razorthorn Security
Razorthorn Security
Rising Costs in Cybersecurity Tools and Consultancy | Razorthorn Security
1:16
AI-Powered Hacktivism: The Next Cyber Threat  | Razorthorn Security
Razorthorn Security
AI-Powered Hacktivism: The Next Cyber Threat | Razorthorn Security
0:35
Quantum Encryption: Ready for Prime Time?
Razorthorn Security
Quantum Encryption: Ready for Prime Time?
0:38
Overregulation in Cybersecurity: Is Innovation at Risk?  | Razorthorn Security
Razorthorn Security
Overregulation in Cybersecurity: Is Innovation at Risk? | Razorthorn Security
0:59
Cybersecurity’s Cambrian Explosion: What’s Next?
Razorthorn Security
Cybersecurity’s Cambrian Explosion: What’s Next?
1:12
Cybersecurity 2025 – Predictions from the Experts | Razorthorn Security
Razorthorn Security
Cybersecurity 2025 – Predictions from the Experts | Razorthorn Security
52:34
Why Pen Tests Alone Aren’t Enough Anymore | Razorthorn Security
Razorthorn Security
Why Pen Tests Alone Aren’t Enough Anymore | Razorthorn Security
0:46
The Five Essentials of an InfoSec Strategy | Razorthorn Security
Razorthorn Security
The Five Essentials of an InfoSec Strategy | Razorthorn Security
1:09
A New Approach to Cybersecurity Budgets | Razorthorn Security
Razorthorn Security
A New Approach to Cybersecurity Budgets | Razorthorn Security
1:01
The Silent Security Threat That's Killing Your Business
Razorthorn Security
The Silent Security Threat That's Killing Your Business
0:51
Stop Buying Tools You Don’t Use | Razorthorn Security
Razorthorn Security
Stop Buying Tools You Don’t Use | Razorthorn Security
0:41
IT Budgets Prioritise Cybersecurity in 2025 | Razorthorn Security
Razorthorn Security
IT Budgets Prioritise Cybersecurity in 2025 | Razorthorn Security
0:36
Supercharge Your Security Budget in 2025: Smarter Investments, Stronger Defence |Razorthorn Security
Razorthorn Security
Supercharge Your Security Budget in 2025: Smarter Investments, Stronger Defence |Razorthorn Security
55:16
Cybersecurity Maturity: A Journey, Not a Sprint | Razorthorn Security
Razorthorn Security
Cybersecurity Maturity: A Journey, Not a Sprint | Razorthorn Security
0:35
Educating Boards on Cyber Risk as Business Risk | Razorthorn Security
Razorthorn Security
Educating Boards on Cyber Risk as Business Risk | Razorthorn Security
0:34
Lessons from History: The CISO as a Modern-Day Gatekeeper
Razorthorn Security
Lessons from History: The CISO as a Modern-Day Gatekeeper
0:45
The 24/7 Reality of Being a CISO
Razorthorn Security
The 24/7 Reality of Being a CISO
1:00
CISOs Demand Decision-Making Power Amid Rising Stakes
Razorthorn Security
CISOs Demand Decision-Making Power Amid Rising Stakes
0:45
Organisational Failures or CISO Blame?
Razorthorn Security
Organisational Failures or CISO Blame?
0:40
Gatekeepers of Digital Trust
Razorthorn Security
Gatekeepers of Digital Trust
0:29
The Cost of Being A CISO Part: 1 Personal, Professional & Organisational Challenges
Razorthorn Security
The Cost of Being A CISO Part: 1 Personal, Professional & Organisational Challenges
58:49
The Evolving Role of a CISO
Razorthorn Security
The Evolving Role of a CISO
0:39
Psychological Safety: A New Approach to Cyber Vigilance | Razorthorn Security
Razorthorn Security
Psychological Safety: A New Approach to Cyber Vigilance | Razorthorn Security
0:34
Scare Tactics in Cybersecurity: Why They Don’t Work | Razorthorn Security
Razorthorn Security
Scare Tactics in Cybersecurity: Why They Don’t Work | Razorthorn Security
0:36
QR Code Scams: The New Frontier of Cyber Attacks | Razorthorn Security
Razorthorn Security
QR Code Scams: The New Frontier of Cyber Attacks | Razorthorn Security
1:11
The Human Factor: Why Most Cyber Breaches Start with People | Razorthorn Security
Razorthorn Security
The Human Factor: Why Most Cyber Breaches Start with People | Razorthorn Security
0:42
Human Emotions: The Hackers' Ultimate Tool
Razorthorn Security
Human Emotions: The Hackers' Ultimate Tool
0:53
Why Cybersecurity Training Still Matters
Razorthorn Security
Why Cybersecurity Training Still Matters
0:31
From Awareness to Action: The Evolution of Security Training
Razorthorn Security
From Awareness to Action: The Evolution of Security Training
0:45
The Love Bug Virus: How It Shaped Cybersecurity Awareness
Razorthorn Security
The Love Bug Virus: How It Shaped Cybersecurity Awareness
0:49
Humans vs AI: Building a Security Culture That Actually Works with Noora Ahmed-Moshe
Razorthorn Security
Humans vs AI: Building a Security Culture That Actually Works with Noora Ahmed-Moshe
53:44
Mental Health, Organisational Culture & The Human Side of Cybersecurity | Razorthorn Security
Razorthorn Security
Mental Health, Organisational Culture & The Human Side of Cybersecurity | Razorthorn Security
44:19
Preparing for Outsourcing Risks: A Resiliency Plan | Razorthorn Security
Razorthorn Security
Preparing for Outsourcing Risks: A Resiliency Plan | Razorthorn Security
1:00
Malicious Insiders: The Threat of Corporate Espionage | Razorthorn Security
Razorthorn Security
Malicious Insiders: The Threat of Corporate Espionage | Razorthorn Security
0:24
Human Error in Cybersecurity: The Overlooked Risk | Razorthorn Security
Razorthorn Security
Human Error in Cybersecurity: The Overlooked Risk | Razorthorn Security
0:42