NCSC Cyber Series

Introducing the new podcast series from the National Cyber Security Centre (NCSC). Join us as we dive deep into the ever-evolving world of cyber security, bringing you discussions on topical issues, emerging trends, and expert insights from our in-house experts and external guests. Each episode offers a comprehensive exploration of a specific topic, providing listeners with valuable knowledge and actionable advice. Visit ncsc.gov.uk to find out more about the topics discussed, access additional resources, and stay up-to-date with the latest cyber security developments.

Cyber Essentials

In this episode of Cyber Series, we explore the foundations of effective cyber security with experts Mary Haigh (BAE Systems), Emma Philpott (IASME Consortium), and Chris Ensor (NCSC). They discuss the purpose of Cyber Essentials, the five core technical controls, and why “getting the basics right” remains a challenge for organisations of all sizes. From practical implementation tips to tackling ransomware and myths around Cyber Essentials, this episode highlights how businesses and government can work together to build resilient cyber practices. Learn how Cyber Essentials helps organisations protect themselves and their supply chains, and what the future holds for this vital UK standard.

10-22
41:06

Post-Quantum Cryptography

In this episode of Cyber Series, Darragh sits down with Dr Jeremy Bradley (Principal TD for Crypt and High Threat Technologies), and Flo D (Deputy CTO for Cyber Policy, NCSC-CAP) to explore what “the quantum threat” really means and how organisations should prepare.From international standards and timelines for migration, to challenges facing critical national infrastructure, our guests break down the opportunities and obstacles of post-quantum cryptography. Whether you’re a CISO, IT leader, or simply curious about the future of cyber security, this conversation sheds light on the steps we all need to take as we enter the quantum era.

09-23
26:09

Professional Standards in cyber security

What does it mean to be a cyber professional today? In this episode, we explore how professional standards are shaping the field with guests from the Bank of England. From qualifications to cross-sector collaboration, we unpack what’s needed to thrive in a complex threat landscape.

07-14
31:49

Communications in an incident

When a cyber incident hits, what you say and how you say it can make all the difference. In this episode of The Cyber Series, we’re joined by Nicola Hudson, Partner at Brunswick and Global Lead for Cybersecurity, Data & Privacy, and Beth Maundrill, Editor at Infosecurity Magazine.Together, we unpack why strong communication is vital during a crisis, common mistakes organisations make, and how to prepare your messaging strategy before an incident strikes. From leadership’s role to the risks and rewards of social media, this is essential listening for anyone involved in incident response.Want to learn more about handling effective communications in a cyber crisis? Take a look at our guidance: https://www.ncsc.gov.uk/files/NCSC-Guidance-on-effective-communications-in-a-cyber-incident.pdf?utm_source=spotify&utm_medium=podcast&utm_campaign=NCSC_Cyber_Series_comms_in_an_incident_podcast

06-12
28:41

Passkeys in practice

In this episode, we are joined by Ollie Whitehouse NCSC CTO, and Google VP Cyber Security Resilience Officer, Heather Adkins to unpack passkeys.They break down what passkeys are, why they matter, and how they’re being adopted across industries. From user experience to cost savings and security, this episode explores the future of authentication and why it might be time to move on from passwords.Check out the NCSC’s blog on passkeys for more: https://www.ncsc.gov.uk/blog-post/passkeys-not-perfect-getting-better?utm_source=spotify&utm_medium=podcast&utm_campaign=ncsc_cyber_series_podcast_passkeys.

04-23
24:13

Reflections on his First 100 Days: A Conversation with Richard Horne

In this episode, we sit down with Richard Horne, our CEO, as he reflects on his first 100 days in the role.From surprises and challenges to insights on the evolving cyber security landscape, Richard shares his experiences and key takeaways from his time in post. Tune in for an inside look at his journey so far!

03-21
28:59

Artificial Intelligence

Welcome to Artificial Intelligence! In this episode we’re joined by Viscount Camrose, Minister for AI, as we discuss the security and ethical dimensions of AI, its impact on humanity, and the balance of opportunities and risks. Discover how we’re preparing the workforce for AI’s future and upcoming regulations to protect consumers from cyber crime.

04-11
34:25

Cyber Proliferation

It’s a first in the Cyber Series as in this episode we’re joined by Will Middleton, Cyber Director at the FCDO. Together, we delve into the evolving cyber threat landscape, discussing its impacts and future trajectories. Tune in for insights on strategies and actionable steps to combat cyber proliferation.

04-11
47:05

Life Beyond Passwords

Welcome to life beyond passwords! In this episode, we explore the significance of passwords and envision a world without them. Despite their drawbacks, why are passwords still pervasive? Listen as we discuss the challenges of transitioning away from passwords and our pragmatic approach to password management best practices. Correction: at 19:37 we stated that a hardware token doesn’t count as a passkey, but this is incorrect – the FIDO alliance would now describe a hardware token as an example of a single-device passkey.  

04-11
27:32

Incidents and Information Sharing

In this episode, we will uncover the crucial role of sharing cyber security insights. From enhancing resilience to fostering collective defence, discover why sharing information is paramount in combating cyber threats.

04-11
32:02

The Ransomware Ecosystem

In our debut episode, we dissect the latest cyber crime trends from our Evolution of Cyber Crime paper, and unravel the MO behind ransomware attacks. From the attack mechanics themselves to mitigation strategies, join us as we explore the who, what and how of ransomware.

04-11
38:39

Recommend Channels