Podcasts
CIS's own Sean Atkinson and Tony Sager host "Cybersecurity Where You Are"
Filter
124 Results Found
Solutions
Industry
1 - 10 of 124 results
Published on 02.25.2025
In episode 124 of Cybersecurity Where You Are, Sean Atkinson explores the many layers of a malware takedown operation with Timothy Davis.
Published on 02.19.2025
In episode 123 of Cybersecurity Where You Are, Sean and Tony discuss an operational playbook for making a security impact with Gina Chapman.
Published on 02.11.2025
In episode 122 of Cybersecurity Where You Are, Sean Atkinson discusses the security and use of DeepSeek AI with Rian Davis and Timothy Davis.
Published on 02.04.2025
In episode 121 of Cybersecurity Where You Are, Sean and Tony discuss the economics of cybersecurity decision-making with Tyler Moore, Ph.D.
Published on 01.28.2025
In episode 120 of Cybersecurity Where You Are, Sean Atkinson explores how contextual awareness of GenAI deployment shapes AI governance strategy.
Published on 01.21.2025
In episode 119 of Cybersecurity Where You Are, Sean Atkinson discusses multidimensional threat defense for securing large events with John Cohen.
Published on 01.14.2025
In episode 118 of Cybersecurity Where You Are, Sean Atkinson discusses how to prepare for post-quantum cryptography with Andy Smith.
Published on 01.07.2025
In episode 117 of Cybersecurity Where You Are, Sean Atkinson reflects on the 2025 cybersecurity predictions of 12 experts at CIS.
Published on 12.31.2024
In episode 116 of Cybersecurity Where You Are, Sean Atkinson discusses the threat of AI-enhanced ransomware and how to defend against it.
Published on 12.24.2024
In episode 115 of Cybersecurity Where You Are, Sean Atkinson discusses continuous feedback as CIS employee culture with three of our HR leaders.
Explore Related Cybersecurity Solutions

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
Learn More
CIS Hardened Images
Learn More
CIS SecureSuite
Learn More
CIS Services
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More