Podcasts
CIS's own Sean Atkinson and Tony Sager host "Cybersecurity Where You Are"
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

110 Results Found
71 - 80 of 110 results
Episode 40: See Yourself in Cyber to Be Cyber Smart
Published on 10.07.2022
Episode 40: See Yourself in Cyber to Be Cyber Smart
In episode 40 of Cybersecurity Where You Are, co-host Tony Sager and U.S. Bank's Murray Kenyon discuss the human element of cyber.

Episode 39: Cybersecurity at Scale
Published on 09.16.2022
Episode 39: Cybersecurity at Scale
In episode 39 of Cybersecurity Where You Are Sean Atkinson discusses the importance of scaling in relation to cybersecurity.

Episode 38: How the Cyber Threat Landscape Is Changing
Published on 09.02.2022
Episode 38: How the Cyber Threat Landscape Is Changing
In episode 38 of Cybersecurity Where You Are, co-host Sean Atkinson discusses the changing cyber threat landscape with TJ Sayers and Aaron Zalesk...

Episode 37: Collaboration at the 15th Annual MS-ISAC Meeting
Published on 08.19.2022
Episode 37: Collaboration at the 15th Annual MS-ISAC Meeting
In episode 37 of Cybersecurity Where You Are, co-hosts Tony Sager and Sean Atkinson discuss the 15th Annual MS-ISAC Meeting.

Episode 36: Strong Elections are Cyber STRONG
Published on 08.05.2022
Episode 36: Strong Elections are Cyber STRONG
In episode 36, co-host Sean Atkinson breaks down the EI-ISAC's Cyber STRONG campaign with Marci Andino and Trevor Timmons.

Episode 35: Remembering the Late Alan Paller
Published on 07.15.2022
Episode 35: Remembering the Late Alan Paller
In episode 35 of Cybersecurity Where You Are, co-hosts Tony Sager and Sean Atkinson join Bobbie Stempfley in remembering Alan Paller.

Episode 34: A Survey of Hacking in Hollywood
Published on 07.08.2022
Episode 34: A Survey of Hacking in Hollywood
In episode 34 of Cybersecurity Where You Are, co-host Sean Atkinson and Chris Elgee survey Hollywood's portrayal of hacking.

Episode 33: The Shift-Left of IoT Security to Vendors
Published on 06.28.2022
Episode 33: The Shift-Left of IoT Security to Vendors
Episode 33 of Cybersecurity Where You Are examines the need to secure Internet of Things (IoT) devices at the vendor level.

Episode 32: What You Need to Know Ahead of RSA 2022
Published on 06.03.2022
Episode 32: What You Need to Know Ahead of RSA 2022
Co-hosts Sean Atkinson and Tony Sager discuss RSA 2022.

Episode 31: To Achieve ICS Security Today, Look to Yesterday
Published on 05.20.2022
Episode 31: To Achieve ICS Security Today, Look to Yesterday
Sean Atkinson and Karen Sorady discuss ICS security, the threats involved, and tips for making a good OT security program.

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions