Podcasts
CIS's own Sean Atkinson and Tony Sager host "Cybersecurity Where You Are"
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

116 Results Found
81 - 90 of 116 results
Episode 36: Strong Elections are Cyber STRONG
Published on 08.05.2022
In episode 36, co-host Sean Atkinson breaks down the EI-ISAC's Cyber STRONG campaign with Marci Andino and Trevor Timmons.

Episode 35: Remembering the Late Alan Paller
Published on 07.15.2022
In episode 35 of Cybersecurity Where You Are, co-hosts Tony Sager and Sean Atkinson join Bobbie Stempfley in remembering Alan Paller.

Episode 34: A Survey of Hacking in Hollywood
Published on 07.08.2022
In episode 34 of Cybersecurity Where You Are, co-host Sean Atkinson and Chris Elgee survey Hollywood's portrayal of hacking.

Episode 33: The Shift-Left of IoT Security to Vendors
Published on 06.28.2022
Episode 33 of Cybersecurity Where You Are examines the need to secure Internet of Things (IoT) devices at the vendor level.

Episode 32: What You Need to Know Ahead of RSA 2022
Published on 06.03.2022
Co-hosts Sean Atkinson and Tony Sager discuss RSA 2022.

Episode 31: To Achieve ICS Security Today, Look to Yesterday
Published on 05.20.2022
Sean Atkinson and Karen Sorady discuss ICS security, the threats involved, and tips for making a good OT security program.

Episode 30: Solving Cybersecurity at Scale with Nonprofits
Published on 05.06.2022
Today, the resources and expertise of nonprofits mean that enterprises don't need to solve cybersecurity issues on their own.

Episode 29: Conceptualizing Reasonableness for Risk Analysis
Published on 04.28.2022
HALOCK's Chris Cronin joins co-hosts Tony Sager and Sean Atkinson in discussing "reasonableness" for cybersecurity risk management.

Episode 28: The Convergence of Cybersecurity and Public Policy
Published on 04.08.2022
In episode 28 of Cybersecurity Where You Are co-hosts Tony Sager and Sean Atkinson are joined by Brian Ray, an academic lawyer from Ohio

Episode 27: Cyber Scams
Published on 03.29.2022
Episode 27 focuses on the common cyber scams malicious actors have been using for decades and offer advice for dealing with them.

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions