Podcasts
CIS's own Sean Atkinson and Tony Sager host "Cybersecurity Where You Are"
Filter by Topic
91 Results Found
61 - 70 of 91 results
Published on 05.20.2022
Episode 31: To Achieve ICS Security Today, Look to YesterdaySean Atkinson and Karen Sorady discuss ICS security, the threats involved, and tips for making a good OT security program.
Published on 05.06.2022
Episode 30: Solving Cybersecurity at Scale with NonprofitsToday, the resources and expertise of nonprofits mean that enterprises don't need to solve cybersecurity issues on their own.
Published on 04.28.2022
Episode 29: Conceptualizing Reasonableness for Risk AnalysisHALOCK's Chris Cronin joins co-hosts Tony Sager and Sean Atkinson in discussing "reasonableness" for cybersecurity risk management.
Published on 04.08.2022
Episode 28: The Convergence of Cybersecurity and Public PolicyIn episode 28 of Cybersecurity Where You Are co-hosts Tony Sager and Sean Atkinson are joined by Brian Ray, an academic lawyer from Ohio
Published on 03.29.2022
Episode 27: Cyber ScamsEpisode 27 focuses on the common cyber scams malicious actors have been using for decades and offer advice for dealing with them.
Published on 03.11.2022
Episode 26: Automating the Secure Configuration Management ProcessIn episode 26 of Cybersecurity Where You Are, Tony Sager and guest Brian Hajost of SteelCloud discuss issues around secure configuration manageme...
Published on 02.25.2022
Episode 25 - Building an Internal Incident Response TeamEpisode 25 covers the importance of an internal incident response team and provides guidance on skills needed and tactics that can be used to imp...
Published on 02.11.2022
Episode 24: How Do I Start a Career in Cybersecurity?In episode 24 of Cybersecurity Where You Are, co-host Tony Sager poses the question that many people interested in the industry ask: How do I sta...
Published on 01.31.2022
Episode 23: Cybersecurity Predictions for 2022In Episode 23 of Cybersecurity Where You Are, hosts Tony Sager and Sean Atkinson are joined by our Senior Vice President of Operations and S...
Published on 01.24.2022
Episode 22: CIS Behind the Veil: Log4jThis podcast discusses what steps CIS took to address the Log4j vulnerability.
Explore Related Cybersecurity Solutions
![CIS Benchmarks](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2022/11/cis-benchmarks-2x.png?h=92&iar=0&w=506&rev=d6647217d71d4c48a48d56a45310ab1d&hash=0188A344D72FBBCACB47442769D2A4F0)
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More![CIS Controls](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-controls-2x.png?h=92&iar=0&w=506&rev=ca698aae52114f09addebb2abe7ece68&hash=9A1D0EB75EC8086F47DBA4F26F17CD81)
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More![CIS CyberMarket](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-cybermarket-2x.png?h=92&iar=0&w=506&rev=ea7a40c6f3e54c499bbd4f944534be4e&hash=4761DB162EF55588ACADEAC005D87800)
CIS CyberMarket
Learn More![CIS Hardened Images](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-hardened-image-2x.png?h=92&iar=0&w=506&rev=8dcca1f1565944e68c9419e97226e635&hash=78C8AC09F2ECAEFF06AFBB8A7A678C5B)
CIS Hardened Images
Learn More![CIS SecureSuite](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-securesuite-2x.png?h=92&iar=0&w=506&rev=557d7a3960a74b40a1b48f89d355a48c&hash=480170679111A9C965586D085C24FA7B)
CIS SecureSuite
Learn More![CIS Services](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-services-2x.png?h=92&iar=0&w=506&rev=77ef3596fa0d4b0896dc8d9ed417cf2e&hash=4E8C8506E1656DAA9F002AD9F169A536)
CIS Services
Learn More![EI-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ei-isac-2x.png?h=92&iar=0&w=506&rev=8abad6f86568423fb38760487a34344d&hash=5BE5437319134F62E3271E5C09EF446F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More![MS-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ms-isac-2x.png?h=92&iar=0&w=506&rev=cd31677319d8426abd68004db480917b&hash=8D769323AB0B0D5156805F29FCC5C25F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More