Podcasts
CIS's own Sean Atkinson and Tony Sager host "Cybersecurity Where You Are"
Filter by Topic
110 Results Found
71 - 80 of 110 results
Published on 10.07.2022
Episode 40: See Yourself in Cyber to Be Cyber SmartIn episode 40 of Cybersecurity Where You Are, co-host Tony Sager and U.S. Bank's Murray Kenyon discuss the human element of cyber.
Published on 09.16.2022
Episode 39: Cybersecurity at ScaleIn episode 39 of Cybersecurity Where You Are Sean Atkinson discusses the importance of scaling in relation to cybersecurity.
Published on 09.02.2022
Episode 38: How the Cyber Threat Landscape Is ChangingIn episode 38 of Cybersecurity Where You Are, co-host Sean Atkinson discusses the changing cyber threat landscape with TJ Sayers and Aaron Zalesk...
Published on 08.19.2022
Episode 37: Collaboration at the 15th Annual MS-ISAC MeetingIn episode 37 of Cybersecurity Where You Are, co-hosts Tony Sager and Sean Atkinson discuss the 15th Annual MS-ISAC Meeting.
Published on 08.05.2022
Episode 36: Strong Elections are Cyber STRONGIn episode 36, co-host Sean Atkinson breaks down the EI-ISAC's Cyber STRONG campaign with Marci Andino and Trevor Timmons.
Published on 07.15.2022
Episode 35: Remembering the Late Alan PallerIn episode 35 of Cybersecurity Where You Are, co-hosts Tony Sager and Sean Atkinson join Bobbie Stempfley in remembering Alan Paller.
Published on 07.08.2022
Episode 34: A Survey of Hacking in HollywoodIn episode 34 of Cybersecurity Where You Are, co-host Sean Atkinson and Chris Elgee survey Hollywood's portrayal of hacking.
Published on 06.28.2022
Episode 33: The Shift-Left of IoT Security to VendorsEpisode 33 of Cybersecurity Where You Are examines the need to secure Internet of Things (IoT) devices at the vendor level.
Published on 06.03.2022
Episode 32: What You Need to Know Ahead of RSA 2022Co-hosts Sean Atkinson and Tony Sager discuss RSA 2022.
Published on 05.20.2022
Episode 31: To Achieve ICS Security Today, Look to YesterdaySean Atkinson and Karen Sorady discuss ICS security, the threats involved, and tips for making a good OT security program.
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More