Skip to content

Experiencing a breach? Contact our 24x7 emergency incident response.

  • Services
    • Go to Services
      • Identify
        • Continuous Autonomous Pentesting
        • Dark Web & Deep Web Intelligence
        • Cloud Security Assessments
        • Vulnerability Management
        • Third Party Risk Management
      • Protect
        • Identity & Access Management
        • Privileged Account Management
        • Cloud Security Operations
      • Detect & Respond
        • Endpoint Detection & Response (EDR)
        • eXtended Detection & Response (XDR)
        • Managed Detection & Response (MDR)
  • Company
    • Go to Company
    • Our People
    • Careers
  • Resources
    • Go to Resources
    • The Complete Guide to SOC Outsourcing
    • Cybersecurity for Scaleups
    • Cybersecurity Webinars, Talks and Videos
  • Insights
  • Get in Touch
Experiencing a breach?Get emergency assistance
We're available 24/7 +44 (0)20 458 35035
  • YouTube
  • Linkedin
Talanos Cybersecurity
  • Services
    • Identify
      • Continuous Autonomous Pentesting
      • Dark Web & Deep Web Intelligence
      • Cloud Security Assessments
      • Vulnerability Management
      • Third Party Risk Management
    • Protect
      • Identity & Access Management
      • Privileged Account Management
      • Cloud Security Operations
    • Detect & Respond
      • Endpoint Detection & Response (EDR)
      • eXtended Detection & Response (XDR)
      • Managed Detection & Response (MDR)
    Go to Services
  • Company
    • Our People
    • Careers
    • Go to Company
  • Resources
    • The Complete Guide to SOC Outsourcing
    • Cybersecurity for Scaleups
    • Cybersecurity Webinars, Talks and Videos
    • Go to Resources
  • Insights
  • Get in Touch
Experiencing a breach?Get emergency assistance
We're available 24/7 +44 (0)20 458 35035
Log in

Video Resources

Webinars, talks and videos from our expert team, partners and customers

Video Gallery

View our latest videos here

The Federated Identity Problem in Reinsurance

Explore how fragmented identity systems across insurers, brokers, and reinsurers create visibility gaps, access risk, and operational friction — and what security and IT leaders can do to regain control without slowing the business.

A Cyber Guy and a TPRM Guy Walk Into a Breach

Join Andy Papastefanou and Haydn Brooks as they reveal what really happens when a supplier breach ripples across your organisation. Recreate a real-life third-party incident to show how gaps between Third Party Risk Management (TPRM) processes and SOC visibility can leave businesses exposed, and what you can do about it.

What You Can Do This Month to Improve Your Cyber Resilience | Practical Cybersecurity Tips

Cyber resilience doesn’t have to mean long programmes, complex frameworks, or expensive tools. In this video, we break down practical, achievable steps you can take this month to meaningfully improve your organisation’s cyber resilience — whether you’re a CIO, IT leader, or security practitioner. If you’re thinking about Managed SOC, incident readiness, cyber insurance, or how to reduce downtime and impact when something goes wrong, this one’s for you.

Why SOC & Cyber Insurance Alignment Matters During a Security Incident

When a cyber incident happens, the technical response and the insurance response often run on separate tracks — and that gap can slow recovery, increase costs, and create avoidable risk. In this video, we briefly explain why aligning your Security Operations Centre (SOC) with your cyber insurance provider matters, especially during the critical first hours of an incident.

Before, During & After a Cyber Incident: What Really Happens | SOC + Cyber Insurance Explained

Modern cyber incidents unfold faster than ever, and the first hour can determine the entire outcome. In this joint session, Talanos Cybersecurity and Capsule Insurance take you inside the real before-during-after timeline of a cyber breach, showing how organisations can dramatically reduce impact when their Security Operations Centre (SOC) and cyber insurance strategy are aligned.

The scaleup security dilemma: Fueling growth, managing risk and protecting the bottom line

Founders want to acquire new customers. Investors want to keep it lean. The IT guy just wants to get home in time to put the kids to bed. And in amongst all of the other things that can harm a startup/scaleup, there's cyber risk. If you're an IT or security leader trying to keep the digital backbone of the company running smoothly AND protect it against cyber attacks, we hear you.

THE SECURITY PRACTICES SCALEUPS SHOULD AVOID | CYBERSECURITY FOR SMES | MSSP | VCISO

Learn about the four cybersecurity practices that deliver little in the way of protection against cyber risk and waste the most time, effort and money.

Why most cybersecurity frameworks are not for SMEs | Security for scaleups | Cyber Essentials

Why do so many cybersecurity frameworks miss the mark when it comes to giving guidance for SMEs?

HOW CYBERSECURITY FRAMEWORKS FAIL SMES | WHAT TO DO INSTEAD | CYBERSECURITY ADVICE

Cybersecurity frameworks like Cyber Essentials, NIST and ISO 27001 fail SMEs because they focus on outcomes - not what you should do, why you should do it or how to do it cost effectively. Get advice from industry experts on what you should be doing instead.

What does it mean for a solo IT leader to have a managed SOC partner?

In this short video, hear how partnering with Talanos gave him the confidence to step away, knowing his systems (and reputation) were in safe hands. Because true cybersecurity isn’t just about stopping threats - it’s about enabling peace of mind.

When is the right time for startups and scaleups to bring in a fractional CISO or managed SOC?

Just raised a round? Here's why it's the right time to think about security leadership. For startups and scaleups, every funding round marks more than just capital — it signals increased responsibility and exposure. But building a full security team too early can drain resources and slow momentum. That’s where fractional CISOs and managed SOC providers come in — scalable, strategic, and startup-savvy.

The top five measures that will protect every organisation from the vast majority of cyber attacks.

An except from our Right-Size Security: Five Critical Controls for Scaleups webinar.

Right-Size Security: The Five Critical Controls Every Scaleup Needs

As your business grows, so does your attack surface — but that doesn’t mean you need enterprise-level security overnight. This online session breaks down the five most impactful cybersecurity controls every scaleup should implement to stay protected without overbuilding. Learn how to right-size your security program, prioritise smart investments, and safeguard your momentum.

Comparing the cost of an in-house vs. Managed SOC

How much does it cost to staff your SOC? And how does that compare to a Managed SOC? And beyond monitoring and detection, what extra value should you expect from your SOC?

Minimalist Cybersecurity: What Matters Most Right Now?

For startups and scaleups, cybersecurity isn’t about covering every risk — it’s about focusing on the right ones. In this video, we explore the mindset of Minimalist Cybersecurity: a practical, risk-based approach to protecting your business without burning through time, cash, or team capacity.

Your first enterprise deal is coming — will your security stack hold up?

You’ve got product-market fit. Your team is scaling. Enterprise opportunities are finally within reach. But there’s one thing that could quietly derail your first big deal - your cyber security posture.

Are You Wasting Money on Your SOC? | Cybersecurity ROI, SOC Readiness & Containment Strategies

Is your Security Operations Centre (SOC) actually protecting your business - or just burning budget? In this must-watch session, Andrew Papastefanou (CEO & Founder, Talanos Cybersecurity) breaks down what every business needs to know before investing in a SOC. Whether you're considering building one, outsourcing, or evaluating an existing provider, this webinar will help you make smarter decisions that deliver real security and real ROI.

The moment you outgrow startup security

The moment you outgrow startup security. Discover the signs your business has outgrown ad-hoc tools and reactive defences, why “what worked before” starts to break, and how to evolve your security strategy without adding unnecessary complexity.

Why traditional security training fails and what to do instead

We spoke to virtual CISO and CEO and Founder of ICA Consultancy, Ben de la Salle, to learn why traditional phishing simulations and one off training will not equip your users identify and avoid a potential cyber incident. Watch this video to find out what you should be doing instead...

What is shadow IT risk?

By definition, shadow IT falls outside of the visibility of IT and cybersecurity leaders. It is often a result of well-meaning employees using SaaS tools in an attempt to be more productive. In this video, we take the example of Miro, and explain how shadow IT increases the probability that vulnerabilities, misconfigurations, and policy violations will go undetected.

What are spoof domains?

What are spoof domains? Learn how cybercriminals use lookalike website and email domains to impersonate trusted brands, steal credentials, and deliver phishing attacks — and how to spot the warning signs before damage is done.

How to identify criminals talking about you on the Dark Web

Learn how to identify when cyber criminals are discussing your organisation on the dark web. This video explains what dark web intelligence is, why it matters, and the early warning signs of data leaks, stolen credentials, and planned attacks—so you can respond before a threat becomes a breach.

    
  

Identify & Protect

  • Vulnerability Management
  • Cloud Security Assessments
  • Continuous Autonomous Pentesting
  • Dark Web & Deep Web Intelligence
  • Identity and Access Management
  • Privileged Account Management
  • Third Party Risk Management

Detect & Respond

  • Endpoint Detection & Response (EDR)
  • eXtended Detection & Response (XDR)
  • Managed Detection & Response (MDR)
  • Complete Guide to SOC Outsourcing
  • Cybersecurity for Startups and Scaleups

Company

  • Careers
  • Privacy Policy
  • Quality & Information Security Policy
  • Modern Slavery Statement
  • Terms and Conditions
  • Refund Policy
  • Contact Us

Country/region

United Kingdom (GBP £)
  • India (INR ₹)
  • South Africa (ZAR R)
  • United Kingdom (GBP £)
  • YouTube
  • Linkedin
© 2026, Talanos Cybersecurity Powered by Shopify
  • Choosing a selection results in a full page refresh.