Video Gallery
The Federated Identity Problem in Reinsurance
Explore how fragmented identity systems across insurers, brokers, and reinsurers create visibility gaps, access risk, and operational friction — and what security and IT leaders can do to regain control without slowing the business.
A Cyber Guy and a TPRM Guy Walk Into a Breach
Join Andy Papastefanou and Haydn Brooks as they reveal what really happens when a supplier breach ripples across your organisation. Recreate a real-life third-party incident to show how gaps between Third Party Risk Management (TPRM) processes and SOC visibility can leave businesses exposed, and what you can do about it.
What You Can Do This Month to Improve Your Cyber Resilience | Practical Cybersecurity Tips
Cyber resilience doesn’t have to mean long programmes, complex frameworks, or expensive tools. In this video, we break down practical, achievable steps you can take this month to meaningfully improve your organisation’s cyber resilience — whether you’re a CIO, IT leader, or security practitioner. If you’re thinking about Managed SOC, incident readiness, cyber insurance, or how to reduce downtime and impact when something goes wrong, this one’s for you.
Why SOC & Cyber Insurance Alignment Matters During a Security Incident
When a cyber incident happens, the technical response and the insurance response often run on separate tracks — and that gap can slow recovery, increase costs, and create avoidable risk. In this video, we briefly explain why aligning your Security Operations Centre (SOC) with your cyber insurance provider matters, especially during the critical first hours of an incident.
Before, During & After a Cyber Incident: What Really Happens | SOC + Cyber Insurance Explained
Modern cyber incidents unfold faster than ever, and the first hour can determine the entire outcome. In this joint session, Talanos Cybersecurity and Capsule Insurance take you inside the real before-during-after timeline of a cyber breach, showing how organisations can dramatically reduce impact when their Security Operations Centre (SOC) and cyber insurance strategy are aligned.
The scaleup security dilemma: Fueling growth, managing risk and protecting the bottom line
Founders want to acquire new customers. Investors want to keep it lean. The IT guy just wants to get home in time to put the kids to bed. And in amongst all of the other things that can harm a startup/scaleup, there's cyber risk. If you're an IT or security leader trying to keep the digital backbone of the company running smoothly AND protect it against cyber attacks, we hear you.
THE SECURITY PRACTICES SCALEUPS SHOULD AVOID | CYBERSECURITY FOR SMES | MSSP | VCISO
Learn about the four cybersecurity practices that deliver little in the way of protection against cyber risk and waste the most time, effort and money.
Why most cybersecurity frameworks are not for SMEs | Security for scaleups | Cyber Essentials
Why do so many cybersecurity frameworks miss the mark when it comes to giving guidance for SMEs?
HOW CYBERSECURITY FRAMEWORKS FAIL SMES | WHAT TO DO INSTEAD | CYBERSECURITY ADVICE
Cybersecurity frameworks like Cyber Essentials, NIST and ISO 27001 fail SMEs because they focus on outcomes - not what you should do, why you should do it or how to do it cost effectively. Get advice from industry experts on what you should be doing instead.
What does it mean for a solo IT leader to have a managed SOC partner?
In this short video, hear how partnering with Talanos gave him the confidence to step away, knowing his systems (and reputation) were in safe hands. Because true cybersecurity isn’t just about stopping threats - it’s about enabling peace of mind.
When is the right time for startups and scaleups to bring in a fractional CISO or managed SOC?
Just raised a round? Here's why it's the right time to think about security leadership. For startups and scaleups, every funding round marks more than just capital — it signals increased responsibility and exposure. But building a full security team too early can drain resources and slow momentum. That’s where fractional CISOs and managed SOC providers come in — scalable, strategic, and startup-savvy.
The top five measures that will protect every organisation from the vast majority of cyber attacks.
An except from our Right-Size Security: Five Critical Controls for Scaleups webinar.
Right-Size Security: The Five Critical Controls Every Scaleup Needs
As your business grows, so does your attack surface — but that doesn’t mean you need enterprise-level security overnight. This online session breaks down the five most impactful cybersecurity controls every scaleup should implement to stay protected without overbuilding. Learn how to right-size your security program, prioritise smart investments, and safeguard your momentum.
Comparing the cost of an in-house vs. Managed SOC
How much does it cost to staff your SOC? And how does that compare to a Managed SOC? And beyond monitoring and detection, what extra value should you expect from your SOC?
Minimalist Cybersecurity: What Matters Most Right Now?
For startups and scaleups, cybersecurity isn’t about covering every risk — it’s about focusing on the right ones. In this video, we explore the mindset of Minimalist Cybersecurity: a practical, risk-based approach to protecting your business without burning through time, cash, or team capacity.
Your first enterprise deal is coming — will your security stack hold up?
You’ve got product-market fit. Your team is scaling. Enterprise opportunities are finally within reach. But there’s one thing that could quietly derail your first big deal - your cyber security posture.
Are You Wasting Money on Your SOC? | Cybersecurity ROI, SOC Readiness & Containment Strategies
Is your Security Operations Centre (SOC) actually protecting your business - or just burning budget? In this must-watch session, Andrew Papastefanou (CEO & Founder, Talanos Cybersecurity) breaks down what every business needs to know before investing in a SOC. Whether you're considering building one, outsourcing, or evaluating an existing provider, this webinar will help you make smarter decisions that deliver real security and real ROI.
The moment you outgrow startup security
The moment you outgrow startup security. Discover the signs your business has outgrown ad-hoc tools and reactive defences, why “what worked before” starts to break, and how to evolve your security strategy without adding unnecessary complexity.
Why traditional security training fails and what to do instead
We spoke to virtual CISO and CEO and Founder of ICA Consultancy, Ben de la Salle, to learn why traditional phishing simulations and one off training will not equip your users identify and avoid a potential cyber incident. Watch this video to find out what you should be doing instead...
What is shadow IT risk?
By definition, shadow IT falls outside of the visibility of IT and cybersecurity leaders. It is often a result of well-meaning employees using SaaS tools in an attempt to be more productive. In this video, we take the example of Miro, and explain how shadow IT increases the probability that vulnerabilities, misconfigurations, and policy violations will go undetected.
What are spoof domains?
What are spoof domains? Learn how cybercriminals use lookalike website and email domains to impersonate trusted brands, steal credentials, and deliver phishing attacks — and how to spot the warning signs before damage is done.
How to identify criminals talking about you on the Dark Web
Learn how to identify when cyber criminals are discussing your organisation on the dark web. This video explains what dark web intelligence is, why it matters, and the early warning signs of data leaks, stolen credentials, and planned attacks—so you can respond before a threat becomes a breach.