Podcasts
CIS's own Sean Atkinson and Tony Sager host "Cybersecurity Where You Are"
Filter by Topic
91 Results Found
41 - 50 of 91 results
Published on 03.15.2023
Episode 51: Making a Roadmap for Your Cybersecurity JourneyIn episode 51 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager discuss using a roadmap to navigate your cybersecurity journe...
Published on 03.03.2023
Episode 50: The Best of Cybersecurity Where You AreIn episode 50 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager celebrate reaching Episode 50 with Randy Rose and Kathleen Mo...
Published on 02.17.2023
Episode 49: Artificial Intelligence and CybersecurityIn episode 49 of Cybersecurity Where You Are, co-hosts Tony Sager and Sean Atkinson discuss artificial intelligence (AI) and cybersecurity.
Published on 02.03.2023
Episode 48: 3 Trends to Watch in the Cybersecurity IndustryIn episode 48 of Cybersecurity Where You Are, co-host Sean Atkinson discusses three trends to watch in the cybersecurity industry.
Published on 01.06.2023
Episode 47: How Security and Compliance Support Each OtherIn episode 47 of Cybersecurity Where You Are, co-host Sean Atkinson discusses how security and compliance can align with risk3sixty's Sawyer Mill...
Published on 12.30.2022
Episode 46: Integration as a Theme for 2023In episode 46 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager discuss how integration will function as a theme for cybersec...
Published on 12.16.2022
Episode 45: The Importance of MentorshipIn episode 45 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager discuss the importance of mentorship with Valecia Stocchetti.
Published on 12.02.2022
Episode 44: A Zero Trust Framework Knows No EndIn episode 44 of Cybersecurity Where You Are, co-host Sean Atkinson discusses the journey of implementing a zero trust framework with CIS's Scott...
Published on 11.18.2022
Episode 43: Giving Back Through CIS CARESIn episode 43 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager discuss CIS CARES with Amanda Flynn and Elijah Cedeno.
Published on 10.28.2022
Episode 42: Advocacy for the UnderservedIn episode 42 of Cybersecurity Where You Are, co-host Sean Atkinson speaks with Mat Everman about advocating for the underserved.
Explore Related Cybersecurity Solutions
![CIS Benchmarks](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2022/11/cis-benchmarks-2x.png?h=92&iar=0&w=506&rev=d6647217d71d4c48a48d56a45310ab1d&hash=0188A344D72FBBCACB47442769D2A4F0)
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More![CIS Controls](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-controls-2x.png?h=92&iar=0&w=506&rev=ca698aae52114f09addebb2abe7ece68&hash=9A1D0EB75EC8086F47DBA4F26F17CD81)
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More![CIS CyberMarket](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-cybermarket-2x.png?h=92&iar=0&w=506&rev=ea7a40c6f3e54c499bbd4f944534be4e&hash=4761DB162EF55588ACADEAC005D87800)
CIS CyberMarket
Learn More![CIS Hardened Images](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-hardened-image-2x.png?h=92&iar=0&w=506&rev=8dcca1f1565944e68c9419e97226e635&hash=78C8AC09F2ECAEFF06AFBB8A7A678C5B)
CIS Hardened Images
Learn More![CIS SecureSuite](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-securesuite-2x.png?h=92&iar=0&w=506&rev=557d7a3960a74b40a1b48f89d355a48c&hash=480170679111A9C965586D085C24FA7B)
CIS SecureSuite
Learn More![CIS Services](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-services-2x.png?h=92&iar=0&w=506&rev=77ef3596fa0d4b0896dc8d9ed417cf2e&hash=4E8C8506E1656DAA9F002AD9F169A536)
CIS Services
Learn More![EI-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ei-isac-2x.png?h=92&iar=0&w=506&rev=8abad6f86568423fb38760487a34344d&hash=5BE5437319134F62E3271E5C09EF446F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More![MS-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ms-isac-2x.png?h=92&iar=0&w=506&rev=cd31677319d8426abd68004db480917b&hash=8D769323AB0B0D5156805F29FCC5C25F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More