Podcasts
CIS's own Sean Atkinson and Tony Sager host "Cybersecurity Where You Are"
Filter by Topic
91 Results Found
11 - 20 of 91 results
Published on 04.10.2024
Episode 81: Exploring IAM for Identity Management Day 2024In episode 81 of Cybersecurity Where You Are, co-host Sean Atkinson discusses IAM and Identity Management Day 2024 with Daniel McIntyre, IAM Mana...
Published on 04.02.2024
Episode 80: Advancing Common Good in Cybersecurity – Part 2In episode 80 of Cybersecurity Where You Are, co-host Tony Sager and Philip Reitinger continue their chat on the Common Good Cyber cybersecurity ...
Published on 03.27.2024
Episode 79: Advancing Common Good in Cybersecurity – Part 1In episode 79 of Cybersecurity Where You Are, co-host Tony Sager discusses the Common Good Cyber initiative in cybersecurity with Philip Reitinge...
Published on 03.12.2024
Episode 78: Conductors of Risk Building Harmony in AmbiguityIn episode 78 of Cybersecurity Where You Are, co-hosts Tony Sager and Sean Atkinson discuss harmonizing teams to determine acceptable risk with L...
Published on 02.27.2024
Episode 77: Data's Value to Decision-Making in CybersecurityIn episode 77 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager using data for decision-making in cybersecurity with Roger Gr...
Published on 02.16.2024
Episode 76: The Role of Thought Leadership in CybersecurityIn episode 76 of Cybersecurity Where You Are, co-host Tony Sager discuss discusses the role of thought leadership in cybersecurity with Julie Mor...
Published on 02.02.2024
Episode 75: How GenAI Continues to Reshape CybersecurityIn episode 75 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager discuss how GenAI continues to reshape cybersecurity.
Published on 01.19.2024
Episode 74: The Nexus of Cybersecurity & Privacy LegislationIn episode 74 of Cybersecurity Where You Are, co-host Sean Atkinson and guests discuss the nexus of cybersecurity and privacy legislation.
Published on 01.05.2024
Episode 73: A YIR for Our 2023 Cybersecurity PredictionsIn episode 73 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager look back on our 2023 cybersecurity predictions.
Published on 12.29.2023
Episode 72: Cybersecurity in Education as a Balancing ActIn episode 72 of Cybersecurity Where You Are, co-host Tony Sager discusses cybersecurity in education as a balancing act with Phyllis Lee.
Explore Related Cybersecurity Solutions
![CIS Benchmarks](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2022/11/cis-benchmarks-2x.png?h=92&iar=0&w=506&rev=d6647217d71d4c48a48d56a45310ab1d&hash=0188A344D72FBBCACB47442769D2A4F0)
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More![CIS Controls](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-controls-2x.png?h=92&iar=0&w=506&rev=ca698aae52114f09addebb2abe7ece68&hash=9A1D0EB75EC8086F47DBA4F26F17CD81)
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More![CIS CyberMarket](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-cybermarket-2x.png?h=92&iar=0&w=506&rev=ea7a40c6f3e54c499bbd4f944534be4e&hash=4761DB162EF55588ACADEAC005D87800)
CIS CyberMarket
Learn More![CIS Hardened Images](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-hardened-image-2x.png?h=92&iar=0&w=506&rev=8dcca1f1565944e68c9419e97226e635&hash=78C8AC09F2ECAEFF06AFBB8A7A678C5B)
CIS Hardened Images
Learn More![CIS SecureSuite](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-securesuite-2x.png?h=92&iar=0&w=506&rev=557d7a3960a74b40a1b48f89d355a48c&hash=480170679111A9C965586D085C24FA7B)
CIS SecureSuite
Learn More![CIS Services](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-services-2x.png?h=92&iar=0&w=506&rev=77ef3596fa0d4b0896dc8d9ed417cf2e&hash=4E8C8506E1656DAA9F002AD9F169A536)
CIS Services
Learn More![EI-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ei-isac-2x.png?h=92&iar=0&w=506&rev=8abad6f86568423fb38760487a34344d&hash=5BE5437319134F62E3271E5C09EF446F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More![MS-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ms-isac-2x.png?h=92&iar=0&w=506&rev=cd31677319d8426abd68004db480917b&hash=8D769323AB0B0D5156805F29FCC5C25F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More